WO2024027217A1 - Time-sensitive implementation method and system for virtualized core network - Google Patents

Time-sensitive implementation method and system for virtualized core network Download PDF

Info

Publication number
WO2024027217A1
WO2024027217A1 PCT/CN2023/090278 CN2023090278W WO2024027217A1 WO 2024027217 A1 WO2024027217 A1 WO 2024027217A1 CN 2023090278 W CN2023090278 W CN 2023090278W WO 2024027217 A1 WO2024027217 A1 WO 2024027217A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
service network
service
backup
reliable
Prior art date
Application number
PCT/CN2023/090278
Other languages
French (fr)
Chinese (zh)
Inventor
卢华
章文飞
段雪飞
邓永平
段宜宾
Original Assignee
广东省新一代通信与网络创新研究院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广东省新一代通信与网络创新研究院 filed Critical 广东省新一代通信与网络创新研究院
Publication of WO2024027217A1 publication Critical patent/WO2024027217A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • H04L41/0836Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability to enhance reliability, e.g. reduce downtime
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/021Ensuring consistency of routing table updates, e.g. by using epoch numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Definitions

  • the present invention relates to the field of communication technology, and in particular, to a time-sensitive implementation method and system for a virtualized core network.
  • the tightly coupled modules in the original dedicated equipment are transformed into independent virtual machines.
  • These virtual machines are deployed uniformly through the virtualization cloud platform, and are connected and forwarded through the internal virtual network built by the cloud platform.
  • the external communication paths of the virtual machine mainly include: the virtual machine is bound to the physical network card PF, that is, the network card pass-through mode; the network card is virtualized to the VF, and the virtual machine is bound to the VF, that is, the SR-IOV mode; the host machine is installed with the vSwitch soft switching function , connect each port of the virtual machine to the vSwitch.
  • the current virtual machine has the following problems during operation:
  • the vSwitch in this method needs to occupy additional server vCPU resources, and the overall machine performance is affected by the vSwitch, and the control
  • the plane and forwarding plane are only logically isolated through VLAN.
  • the throughput of the forwarding plane is large, it will affect the packets of the control plane.
  • the control plane and forwarding plane of the virtual machine are bound separately.
  • the physical network card and the virtual network card VF share the bandwidth capabilities of the physical network card.
  • the forwarding plane throughput is too large, it will also affect the control plane packets. It can be seen that the above methods can easily lead to packet delays, packet loss, business failures and other problems that are not conducive to the normal operation of the virtual machine.
  • the technical problem to be solved by the present invention is to provide a time-sensitive implementation method and system for a virtualized core network, which can make the virtual machine control plane messages not affected by the forwarding plane throughput and ensure the low delay of the control plane messages. , so that the data synchronization between the control plane and the forwarding plane is complete.
  • the first aspect of the present invention discloses a time-sensitive implementation method of a virtualized core network.
  • Multiple virtualized service network elements of the core network all include backup service network elements.
  • the method includes: In response to the interaction abnormal information between the first service network element and the second service network element, obtain the registration request information of the first service network element and the intermediate service network element through the network policy control module; generate a reliable communication policy based on the registration request information; Reliable service communication between the first service network element and the backup second service network element is achieved through the reliable communication strategy.
  • a reliable communication strategy is generated based on the registration request information, wherein the reliable communication strategy includes: obtaining the interaction information of the first service network element and the backup second service network element address through the registration request information; The interaction information of the first service network element is sent to the backup second service network element based on the backup second service network element address; the backup second service network element searches whether the context information of the target user exists locally based on the interaction information; if The backup second service network element searches for the local context information of the target user, and then executes the first service network element and the backup second service. Reliable business communication of network elements.
  • the intermediate service network element includes a remote database, and generates a reliable communication strategy based on the registration request information, wherein the reliable communication strategy includes: if the backup second service network element searches for the context information of the target user that does not exist locally , obtain the address of the remote database and the address of the standby remote database through the registration request information; the first service network element issues a context information request to the remote database or the standby remote database based on the address of the remote database and the address of the standby remote database; The remote database or backup remote database sends context information to the backup second service network element; reliable service communication between the first service network element and the backup second service network element is performed through the context information.
  • the reliable communication strategy includes: if the backup second service network element searches for the context information of the target user that does not exist locally , obtain the address of the remote database and the address of the standby remote database through the registration request information; the first service network element issues a context information request to the remote database or the standby remote database based on the address of the remote database and the address of the standby
  • the intermediate service network element includes a unified data management module, and generates a reliable communication strategy based on the registration request information, wherein the reliable communication strategy includes: obtaining the address of the unified data management module through the registration request information;
  • the backup second service network element sends registration notification information and subscription information to the unified data management module based on the address of the unified data management module; and executes the first service network element and the backup second service network element through the registration notification information and the subscription information.
  • Reliable business communication for business network elements includes: obtaining the address of the unified data management module through the registration request information;
  • the backup second service network element sends registration notification information and subscription information to the unified data management module based on the address of the unified data management module; and executes the first service network element and the backup second service network element through the registration notification information and the subscription information.
  • the intermediate service network element includes a user port, and a reliable communication strategy is generated based on the registration request information, wherein the reliable communication strategy includes: obtaining the address of the user port through the registration request information; and backup second service The network element delivers takeover notification information to the user port based on the address of the user port; and performs reliable service communication between the first service network element and the backup second service network element through the takeover notification information.
  • the method further includes: delivering the reliable communication policy to a time-sensitive switching network card device configured on the server; and using the time-sensitive switching network card device to construct a system for connecting the first service network element and the backup network element. Reliable service communication link of the second service network element.
  • the first service network element is an authentication management module
  • the second service network element is a service management module
  • a time-sensitive system for virtualizing a core network includes: a network policy control module, For responding to the interaction abnormal information between the first service network element and the second service network element, obtaining the registration request information of the first service network element and the intermediate service network element, and generating a reliable communication policy based on the registration request information; through the The reliable communication strategy realizes reliable service communication between the first service network element and the backup second service network element.
  • the system further includes: a time-sensitive switching network card device configured on the server, used to obtain the reliable communication policy, and construct a reliable service for connecting the first service network element and the backup second service network element. communication link.
  • a time-sensitive switching network card device configured on the server, used to obtain the reliable communication policy, and construct a reliable service for connecting the first service network element and the backup second service network element. communication link.
  • a time-sensitive device for a virtualized core network includes: a memory storing executable program code; a processor coupled to the memory; the processor calls the memory
  • the executable program code stored in executes the time-sensitive implementation method of the virtualized core network as mentioned above.
  • the implementation of the present invention can ensure the low delay of control plane messages between service network elements and avoid service anomalies caused by interaction timeout between service network elements; moreover, the sending and receiving of control plane messages is not affected by changes in the throughput of the forwarding plane and avoids the risk of forwarding errors due to forwarding plane throughput changes. Excessive plane throughput leads to loss of control plane packets, resulting in service anomalies.
  • the service network element of the present invention that is, the reliable sending and receiving of messages on the control plane, the occurrence of dual-master service network elements in which control plane messages are lost or delayed due to heartbeat detection or other detection methods is avoided. phenomenon occurs, resulting in system anomalies, thereby ensuring the synchronization integrity of control plane and forwarding plane entry data, and avoiding various system and business anomalies due to incomplete entries.
  • Figure 1 is a schematic flow chart of a time-sensitive implementation method for a virtualized core network disclosed in an embodiment of the present invention
  • Figure 2 is a flow chart of an existing uplink message processing method after an abnormality of a service network element disclosed in an embodiment of the present invention
  • Figure 3 is a flow chart of an uplink message processing method after a time-sensitive service network element of a virtualized core network is abnormal disclosed in an embodiment of the present invention
  • Figure 4 is a schematic diagram of a time-sensitive system of a virtualized core network disclosed in an embodiment of the present invention.
  • Figure 5 is a schematic structural diagram of a time-sensitive device of a virtualized core network disclosed in an embodiment of the present invention.
  • Embodiments of the present invention disclose a time-sensitive implementation method and system for a virtualized core network, which can ensure low latency of control plane messages between service network elements and avoid service anomalies caused by interaction timeout between service network elements; and, The sending and receiving of control plane messages is not affected by changes in the throughput of the forwarding plane, avoiding service abnormalities caused by loss of control plane messages due to excessive forwarding plane throughput.
  • the service network element of the present invention that is, the reliable sending and receiving of messages on the control plane, the occurrence of dual-master service network elements in which control plane messages are lost or delayed due to heartbeat detection or other detection methods is avoided. phenomenon occurs, resulting in system anomalies, thereby ensuring the synchronization integrity of control plane and forwarding plane entry data, and avoiding various system and business anomalies due to incomplete entries.
  • UE is represented as a user terminal
  • (R)AN is represented as a wireless access network
  • DN is represented as a data network
  • SMF is represented as (Service Management Function--Service Management Function)
  • AMF is represented is (AuthenticationManagementFunction)
  • NRF is represented by (Network Repository Function--network storage function)
  • UDM is represented by (Unified Data Management--unified data management)
  • UPF is represented by (User Port Function--user port function )
  • the Redis database is represented as a remote database.
  • virtualized service network elements are connected through virtual networks.
  • each virtualized service network element in order to enhance the reliability of the 5G core network, each virtualized service network element will operate in an active and backup mode, that is, two identical virtualized service network elements will operate at the same time, that is, the service network element itself will (active) and standby service network elements (standby), thus forming a mutually active and standby mode of operation, that is, two mutually virtualized service network elements that back up each other can take over the same user and process the control plane information of the same user.
  • FIG. 1 is a schematic flowchart of a time-sensitive implementation method for a virtualized core network disclosed in an embodiment of the present invention.
  • the time-sensitive implementation method of the virtualized core network can be applied to the 5G core network system.
  • all virtualization devices that support active and backup protection can realize the invention's discovery of abnormalities, registration of interoperable network element information, and configuration of reliable communication. All other methods belong to the scope of protection and application of this embodiment, and the embodiments of the invention do not limit the application of this method.
  • the time-sensitive implementation method of the virtualized core network can include the following operations:
  • the first service network element is the authentication management module, that is, AMF
  • the second service network element is the service management module SMF.
  • the main purpose is to process the abnormal information between two interacting service network elements. Therefore, it is first necessary to respond to the interactive abnormal information between the first service network element and the second service network element.
  • the abnormal interaction information between the service network element and the second service network element can be manifested as a sudden power outage or network failure after the active SMF has been working for a period of time.
  • the response process can be implemented as follows: AMF learns that the active SMF is abnormal, specifically including: the network storage function NRF discovers that the heartbeat between the active SMF and the active SMF is abnormal. At this time, NRF will think that the active SMF is abnormal, because in the previous session When created, AMF has already subscribed to the information of the active SMF. Therefore, after NRF discovers that the active SMF is abnormal, it will send a subscription notification message to AMF. The SMF that notifies AMF that an exception has occurred will obtain the information of the first service network element and the second service network element. Interaction exception information.
  • the AMF learning that the active SMF is abnormal may also include: the HTTP module of the AMF network element itself discovers that the HTTP long link between itself and the active SMF is abnormal. This connection is after AMF successfully discovers SMF through NRF, then AMF will establish HTTP persistent connections with SMFs under the same Set. When there is a problem with the persistent connection between AMF and the main SMF, AMF can Knowing this at once helps AMF select a backup SMF as quickly as possible to continue providing session services.
  • the user port function UPF can also learn about the active SMF exception, including: The network storage function NRF discovers that the heartbeat between the active SMF and the active SMF is abnormal. At this time, the NRF will think that the active SMF is abnormal. Since UPF has subscribed to the active SMF information when the previous session was created, NRF discovers that the active SMF is abnormal. A subscription notification message will be sent to the UPF, and the SMF, which notifies the AMF that an exception has occurred, has obtained the interaction exception information between the first service network element and the second service network element.
  • the UPF learning of the active SMF abnormality may also include: UPF may also perform heartbeat message detection through PFCP (Packet Forwarding Control Protocol) between SMF and UPF. After the heartbeat of the PFCP link between them is abnormal, the UPF considers that the SMF network element is abnormal, that is, it obtains the abnormal interaction information between the first service network element and the second service network element.
  • PFCP Packet Forwarding Control Protocol
  • the registration request information of the first service network element and the intermediate service network element is obtained through the network policy control module.
  • the network policy controller that is, NPCF
  • the registration request information specifically includes the source and destination addresses, port numbers, network element types, bandwidth requirements and other information of each service network element. This embodiment does not limit the content of the registration request information.
  • the reliable communication strategy includes: obtaining the interaction information of the first service network element and the backup second service network element address through the registration request information, where the interaction information includes uplink information and downlink information; Based on the address of the standby second service network element, the standby second service network element is sent to the standby second service network element; the standby second service network element searches for the local context information of the target user based on the interaction information; if the standby second service network element searches for the local context information of the target user information, then reliable service communication between the first service network element and the backup second service network element is performed.
  • the intermediate service network element includes a remote database, and generates a reliable communication strategy based on the registration request information.
  • the reliable communication strategy includes: if the backup second service network element searches for the context information of the target user that does not exist locally, obtains the remote communication strategy through the registration request information.
  • the intermediate service network element includes a unified data management module, and generates a reliable communication strategy based on the registration request information, where the reliable communication strategy includes: obtaining the address of the unified data management module through the registration request information; the backup second service network element based on the unified data The address of the management module sends registration notification information and subscription information to the unified data management module; reliable service communication between the first service network element and the standby second service network element is performed through the registration notification information and the subscription information.
  • the intermediate service network element includes a user port, and generates a reliable communication strategy based on the registration request information.
  • the reliable communication strategy includes: obtaining the address of the user port through the registration request information; and the backup second service network element sends the user port address to the user based on the user port address.
  • the port delivers takeover notification information; reliable service communication between the first service network element and the backup second service network element is performed through the takeover notification information.
  • uplink information is used as an example object of interactive information, and a comparative example is introduced for detailed elaboration.
  • Figure 2 it is a flow chart of uplink information processing after an existing service network element is abnormal.
  • the process of uplink information in the first service network element AMF needs to be processed by the second service network element SMF.
  • the AMF refers to the above exception acquisition method through the NRF or HTTP module to learn that the primary user is the first service network element. If the service network element SMF is abnormal, then the backup second service network element SMF under the same Set is selected and the uplink information is sent to the backup SMF.
  • the backup second service network element SMF after receiving the uplink information, the backup second service network element SMF first searches whether there is the context of the user locally. If so, continue the normal business process. If not, first request the main Redis database to obtain context information. If the primary Redis is unavailable, a request context request is sent to the backup Redis database. However, if both the active and standby Redis are unavailable, the overall process fails.
  • the active or standby Redis database finds the relevant user context information, it will be returned to the standby SMF, and the standby SMF obtains the user context information. However, if there is no user context information on the context of both the active Redis database and the standby Redis database, the entire process fails.
  • the standby second service network element SMF sends a registration request message to the UDM, notifying the UDM of the SMF information served by the current user.
  • the backup SMF also needs to send a subscription message to the UDM. If the user subscription information saved on the UDM subsequently changes, the backup SMF will be notified in a timely manner.
  • the backup second SMF updates the session message to the UPF, notifying the UPF that the backup SMF will take over the session process.
  • the backup second service network element SMF may also be unreachable with the main Radis and the backup Radis, causing the process to fail and causing the service to be suspended.
  • the communication between the standby SMF and the UDM is unreachable, causing the registration and subscription requests to fail, causing the service to be suspended.
  • the communication between the standby SMF and the UPF is unreachable, and the session message update fails, causing the service to be suspended.
  • the present invention generates a reliable communication policy based on the registration request information, as shown in Figure 3, which is a flow chart of uplink message processing after a time-sensitive service network element of the virtualized core network is abnormal.
  • the NPCF network policy controller can be represented as a reliable communication link with other business network elements that is guaranteed by a time-sensitive network card.
  • the registration request information carried in the HiLinkReq message includes: source address, destination address, source port, destination port, source network element type, destination network element type, bandwidth and other information. specifically:
  • the first service network element AMF has uplink information and requires the second service network element SMF processing.
  • the first service network element AMF learns that the active SMF is abnormal (the communication link is disconnected or the network element is down) through the NRF or HTTP module, selects the backup SMF under the same Set, and reports it to the network policy controller NPCF sends a request for a reliable communication link application.
  • the uplink information is sent to the backup second service network element SMF.
  • the standby second service network element SMF first searches whether there is a context of the user locally. If there is, continue to process the business process normally, if not, proceed to the following step 3.
  • the second service network element SMF needs to interact with the main Redis database, backup Redis database, UDM, and UPF, so it can send requests for reliable communication link applications to the network policy controller NPCF respectively.
  • the first service network element SMF first requests the active Redis to obtain context information. If the primary Redis is unavailable, a request context request is sent to the backup Redis.
  • the active or standby Redis finds the relevant user context information and returns it to the standby SMF.
  • the standby second service network element SMF obtains the user context information.
  • the standby second service network element SMF sends a registration request message to the UDM, notifying the UDM of the SMF information served by the current user.
  • the standby second service network element SMF also needs to send a subscription message to the UDM. If the user subscription information saved on the UDM subsequently changes, the standby SMF will be notified in a timely manner.
  • UDM returns the results of registration and subscription.
  • the standby second service network element SMF updates the session message to the UPF, notifying the UPF that the standby second service network element SMF takes over the session process.
  • UPF returns the update result, and the entire uplink information process ends.
  • the virtual network uses shared hardware resources and adopts a best-effort forwarding mode, which is not reliable communication.
  • heartbeat detection of the active service network element fails, it is most likely due to congestion or anomalies in the virtual network that cause detection packets to be lost. Therefore, before interacting with backup service network elements, apply for reliable communication link resources first to ensure reliable communication of control information between network elements, avoid user service failures caused by sudden congestion and abnormalities in the virtual network, and improve user experience. quality.
  • the reliable communication policy is also delivered to a time-sensitive switching network card device configured on the server, and a reliable service for connecting the first service network element and the backup second service network element is constructed through the time-sensitive switching network card device. communication link.
  • This time-sensitive switching network card device can replace the original server PCIE network card.
  • the network card has the capabilities of frame preemption and traffic shaping of time-sensitive network technology.
  • the uplink process is initiated by the user terminal (UE) to the service network element of the core network; the downlink process is initiated by the core network
  • the service network element initiates to the user (UE), and the implementation of the downlink process is a similar process implemented by the uplink process in this embodiment, which will not be described in detail here.
  • FIG. 4 is a schematic diagram of a time-sensitive system of a virtualized core network disclosed in an embodiment of the present invention.
  • the time-sensitive system of the virtualized core network can be applied to the 5G core network system.
  • Multiple virtualized service network elements of the core network include backup service network elements.
  • the time-sensitive implementation system of the virtualized core network may include:
  • the network policy control module 1 is configured to respond to the abnormal interaction information between the first service network element and the second service network element, obtain the registration request information of the first service network element and the intermediate service network element, and generate a reliable communication policy based on the registration request information. , realizing reliable service communication between the first service network element and the backup second service network element through a reliable communication strategy.
  • the network policy controller that is, NPCF, can be used by service network elements to register requests for key information communication guarantee resources.
  • the registration request information specifically includes the source and destination addresses, port numbers, network element types, bandwidth requirements and other information of each service network element. This embodiment does not limit the content of the registration request information.
  • the time-sensitive switching network card device 2 is configured on the server and is used to obtain a reliable communication policy and build a reliable service communication link for connecting the first service network element and the backup second service network element.
  • This time-sensitive switching network card device can replace the original server PCIE network card.
  • the network card has the capabilities of frame preemption and traffic shaping of time-sensitive network technology.
  • Figure 5 is a schematic structural diagram of a time-sensitive device for a virtualized core network disclosed in an embodiment of the present invention.
  • the time-sensitive device of the virtualized core network described in Figure 5 can be applied in the 5G core network system, and the embodiment of the present invention does not limit the application system of the time-sensitive device of the virtualized core network.
  • the device may include:
  • Memory 501 storing executable program code
  • processor 502 coupled to memory 501;
  • the processor 502 calls the executable program code stored in the memory 501 for executing the described time-sensitive implementation method of a virtualized core network.
  • An embodiment of the present invention discloses a computer-readable storage medium that stores a computer program for electronic data exchange, wherein the computer program causes the computer to execute the described time-sensitive implementation method of a virtualized core network.
  • An embodiment of the present invention discloses a computer program product.
  • the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause the computer to execute the described virtualization core network time. Sensitive implementation method.
  • modules described as separate components may or may not be physically separated.
  • the components shown as modules may or may not be physical modules, that is, they may be located in a place, or can be distributed to multiple network modules. You can select some or all of the modules according to actual needs to implement this implementation.
  • the purpose of the example program Persons of ordinary skill in the art can understand and implement the method without any creative effort.
  • each embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, it can also be implemented by hardware.
  • the above technical solutions can be embodied in the form of software products in essence or in part that contribute to the existing technology.
  • the computer software products can be stored in computer-readable storage media, and the storage media includes read-only memories.
  • Read-Only Memory ROM
  • RAM Random Access Memory
  • PROM Programmable Read-only Memory
  • EPROM Erasable Programmable Read Only Memory
  • OTPROM One-time Programmable Read-Only Memory
  • EEPROM Electronically Erasable Programmable Read-Only Memory
  • CD-ROM Compact Disc Read -Only Memory
  • time-sensitive implementation method and system of a virtualized core network disclosed in the embodiments of the present invention are only the preferred embodiments of the present invention and are only used to illustrate the technical solutions of the present invention. Limitation thereof; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that they can still modify the technical solutions recorded in the foregoing embodiments, or modify some of the technical features. Equivalent substitutions; and these modifications or substitutions do not deviate from the essence of the corresponding technical solutions from the spirit and scope of the technical solutions of the various embodiments of the present invention.

Abstract

Disclosed is a time-sensitive implementation method for a virtualized core network. A plurality of virtualized service network elements of a core network comprise backup service network elements. The method comprises: in response to interaction exception information between a first service network element and a second service network element, obtaining registration request information of the first service network element and an intermediate service network element by means of a network policy control module; generating a reliable communication policy on the basis of the registration request information; and implementing reliable service communication between the first service network element and a backup second service network element by means of the reliable communication policy. Therefore, low latency of a control plane message between service network elements can be guaranteed, thereby preventing a service exception caused by interaction timeout between the service network elements; and in addition, the sending and receiving of the control plane message are not affected by changes in the throughput of a forwarding plane, thus preventing a service exception caused by the loss of the control plane message due to excessively large throughput of the forwarding plane.

Description

一种虚拟化核心网的时间敏感实现方法及系统A time-sensitive implementation method and system for virtualized core network 技术领域Technical field
本发明涉及通信技术领域,尤其涉及一种虚拟化核心网的时间敏感实现方法及系统。The present invention relates to the field of communication technology, and in particular, to a time-sensitive implementation method and system for a virtualized core network.
背景技术Background technique
通讯设备在虚拟化后,将原专用设备中紧耦合的各模块转变为一个个独立的虚拟机,这些虚拟机通过虚拟化云平台统一部署,通过云平台构建的内部虚拟网络进行连通及转发。其中,虚拟机对外通讯的路径主要有:虚拟机绑定物理网卡PF,即:网卡直通模式;网卡虚拟化出VF,虚拟机绑定VF,即SR-IOV模式;宿主机安装vSwitch软交换功能,将虚拟机各端口接入vSwitch上。After the communication equipment is virtualized, the tightly coupled modules in the original dedicated equipment are transformed into independent virtual machines. These virtual machines are deployed uniformly through the virtualization cloud platform, and are connected and forwarded through the internal virtual network built by the cloud platform. Among them, the external communication paths of the virtual machine mainly include: the virtual machine is bound to the physical network card PF, that is, the network card pass-through mode; the network card is virtualized to the VF, and the virtual machine is bound to the VF, that is, the SR-IOV mode; the host machine is installed with the vSwitch soft switching function , connect each port of the virtual machine to the vSwitch.
但是,目前的虚拟机在操作过程中存在下述问题:虚拟机的控制面和转发面都使用vSwitch软交换时,该方式的vSwitch需要额外占用服务器vCPU资源,整机性能受vSwitch影响,并且控制面和转发面只是通过vlan进行逻辑上的隔离,当转发面吞吐量大时,会影响控制面的报文;同样,在使用SR-IOV模式时,虚拟机的控制面和转发面分别绑定物理网卡虚拟网卡VF,VF间是共享物理网卡带宽能力,当转发面吞吐量过大,也会影响控制面的报文。可见,上述方法均容易导致报文的延时、丢包,造成业务失败等不利于虚拟机正常工作的问题。However, the current virtual machine has the following problems during operation: When both the control plane and the forwarding plane of the virtual machine use vSwitch soft switching, the vSwitch in this method needs to occupy additional server vCPU resources, and the overall machine performance is affected by the vSwitch, and the control The plane and forwarding plane are only logically isolated through VLAN. When the throughput of the forwarding plane is large, it will affect the packets of the control plane. Similarly, when using SR-IOV mode, the control plane and forwarding plane of the virtual machine are bound separately. The physical network card and the virtual network card VF share the bandwidth capabilities of the physical network card. When the forwarding plane throughput is too large, it will also affect the control plane packets. It can be seen that the above methods can easily lead to packet delays, packet loss, business failures and other problems that are not conducive to the normal operation of the virtual machine.
发明内容Contents of the invention
本发明所要解决的技术问题在于,提供一种虚拟化核心网的时间敏感实现方法及系统,能够使得虚拟机控制面报文不受转发面吞吐量影响,保证了控制面报文的低时延,从而使得控制面和转发面的数据同步具有完整性。The technical problem to be solved by the present invention is to provide a time-sensitive implementation method and system for a virtualized core network, which can make the virtual machine control plane messages not affected by the forwarding plane throughput and ensure the low delay of the control plane messages. , so that the data synchronization between the control plane and the forwarding plane is complete.
为了解决上述技术问题,本发明第一方面公开了一种虚拟化核心网的时间敏感实现方法,所述核心网的多个虚拟化的业务网元均包括备用业务网元,所述方法包括:响应于第一业务网元与第二业务网元的交互异常信息,通过网络策略控制模块获取第一业务网元和中间业务网元的注册请求信息;基于所述注册请求信息生成可靠通信策略;通过所述可靠通信策略实现第一业务网元和备用第二业务网元的可靠业务通信。In order to solve the above technical problems, the first aspect of the present invention discloses a time-sensitive implementation method of a virtualized core network. Multiple virtualized service network elements of the core network all include backup service network elements. The method includes: In response to the interaction abnormal information between the first service network element and the second service network element, obtain the registration request information of the first service network element and the intermediate service network element through the network policy control module; generate a reliable communication policy based on the registration request information; Reliable service communication between the first service network element and the backup second service network element is achieved through the reliable communication strategy.
在一些实施方式中,基于所述注册请求信息生成可靠通信策略,其中,所述可靠通信策略包括:通过所述注册请求信息获取第一业务网元的交互信息和备用第二业务网元地址;将第一业务网元的交互信息基于所述备用第二业务网元地址发送至备用第二业务网元;备用第二业务网元根据所述交互信息查找本地是否存在目标用户的上下文信息;若备用第二业务网元查找本地存在目标用户的上下文信息,则执行第一业务网元与备用第二业务 网元的可靠业务通信。In some embodiments, a reliable communication strategy is generated based on the registration request information, wherein the reliable communication strategy includes: obtaining the interaction information of the first service network element and the backup second service network element address through the registration request information; The interaction information of the first service network element is sent to the backup second service network element based on the backup second service network element address; the backup second service network element searches whether the context information of the target user exists locally based on the interaction information; if The backup second service network element searches for the local context information of the target user, and then executes the first service network element and the backup second service. Reliable business communication of network elements.
在一些实施方式中,中间业务网元包括远程数据库,基于所述注册请求信息生成可靠通信策略,其中,所述可靠通信策略包括:若备用第二业务网元查找本地不存在目标用户的上下文信息,通过所述注册请求信息获取远程数据库的地址、备用远程数据库的地址;第一业务网元基于远程数据库的地址和备用远程数据库的地址向所述远程数据库或备用远程数据库下发上下文信息请求;所述远程数据库或备用远程数据库将上下文信息发送至备用第二业务网元;通过所述上下文信息执行第一业务网元与备用第二业务网元的可靠业务通信。In some embodiments, the intermediate service network element includes a remote database, and generates a reliable communication strategy based on the registration request information, wherein the reliable communication strategy includes: if the backup second service network element searches for the context information of the target user that does not exist locally , obtain the address of the remote database and the address of the standby remote database through the registration request information; the first service network element issues a context information request to the remote database or the standby remote database based on the address of the remote database and the address of the standby remote database; The remote database or backup remote database sends context information to the backup second service network element; reliable service communication between the first service network element and the backup second service network element is performed through the context information.
在一些实施方式中,中间业务网元包括统一数据管理模块,基于所述注册请求信息生成可靠通信策略,其中,所述可靠通信策略包括:通过所述注册请求信息获取统一数据管理模块的地址;备用第二业务网元基于统一数据管理模块的地址向所述统一数据管理模块下发注册通知信息和订阅信息;通过所述注册通知信息和所述订阅信息执行第一业务网元与备用第二业务网元的可靠业务通信。In some embodiments, the intermediate service network element includes a unified data management module, and generates a reliable communication strategy based on the registration request information, wherein the reliable communication strategy includes: obtaining the address of the unified data management module through the registration request information; The backup second service network element sends registration notification information and subscription information to the unified data management module based on the address of the unified data management module; and executes the first service network element and the backup second service network element through the registration notification information and the subscription information. Reliable business communication for business network elements.
在一些实施方式中,中间业务网元包括用户端口,基于所述注册请求信息生成可靠通信策略,其中,所述可靠通信策略包括:通过所述注册请求信息获取用户端口的地址;备用第二业务网元基于用户端口的地址向所述用户端口下发接管通知信息;通过所述接管通知信息执行第一业务网元与备用第二业务网元的可靠业务通信。In some embodiments, the intermediate service network element includes a user port, and a reliable communication strategy is generated based on the registration request information, wherein the reliable communication strategy includes: obtaining the address of the user port through the registration request information; and backup second service The network element delivers takeover notification information to the user port based on the address of the user port; and performs reliable service communication between the first service network element and the backup second service network element through the takeover notification information.
在一些实施方式中,所述方法还包括:将所述可靠通信策略下发至配置于服务器的时间敏感交换网卡设备;通过所述时间敏感交换网卡设备构建用于连接第一业务网元和备用第二业务网元的可靠业务通信链路。In some embodiments, the method further includes: delivering the reliable communication policy to a time-sensitive switching network card device configured on the server; and using the time-sensitive switching network card device to construct a system for connecting the first service network element and the backup network element. Reliable service communication link of the second service network element.
在一些实施方式中,第一业务网元为认证管理模块,第二业务网元为业务管理模块。In some implementations, the first service network element is an authentication management module, and the second service network element is a service management module.
根据本发明的第二个方面,公开了一种虚拟化核心网的时间敏感系统,核心网的多个虚拟化的业务网元均包括备用业务网元,所述系统包括:网络策略控制模块,用于响应于第一业务网元与第二业务网元的交互异常信息,获取第一业务网元和中间业务网元的注册请求信息,并基于所述注册请求信息生成可靠通信策略;通过所述可靠通信策略实现第一业务网元和备用第二业务网元的可靠业务通信。According to a second aspect of the present invention, a time-sensitive system for virtualizing a core network is disclosed. Multiple virtualized service network elements of the core network all include backup service network elements. The system includes: a network policy control module, For responding to the interaction abnormal information between the first service network element and the second service network element, obtaining the registration request information of the first service network element and the intermediate service network element, and generating a reliable communication policy based on the registration request information; through the The reliable communication strategy realizes reliable service communication between the first service network element and the backup second service network element.
在一些实施方式中,所述系统还包括:配置于服务器的时间敏感交换网卡设备,用于获取所述可靠通信策略,构建用于连接第一业务网元和备用第二业务网元的可靠业务通信链路。In some embodiments, the system further includes: a time-sensitive switching network card device configured on the server, used to obtain the reliable communication policy, and construct a reliable service for connecting the first service network element and the backup second service network element. communication link.
根据本发明的第三方面,公开了虚拟化核心网的时间敏感装置,所述装置包括:存储有可执行程序代码的存储器;与所述存储器耦合的处理器;所述处理器调用所述存储器中存储的所述可执行程序代码,执行如上述的虚拟化核心网的时间敏感实现方法。According to a third aspect of the present invention, a time-sensitive device for a virtualized core network is disclosed. The device includes: a memory storing executable program code; a processor coupled to the memory; the processor calls the memory The executable program code stored in executes the time-sensitive implementation method of the virtualized core network as mentioned above.
与现有技术相比,本发明的有益效果在于: Compared with the prior art, the beneficial effects of the present invention are:
实施本发明能够保障业务网元间的控制面报文的低时延,避免业务网元间交互超时导致的业务异常;并且,控制面报文收发不受转发面吞吐量变化影响,避免因转发面吞吐量过大而导致控制面报文丢失,造成的业务异常。此外,通过本发明的业务网元即控制面上的报文的可靠性收发,避免出现了因心跳检测或其他检测方式引起控制面报文丢失或延时出现的业务网元双主业务网元现象出现,而导致系统异常,从而保障了控制面、转发面表项数据的同步完整性,避免因表项不全而出现的各种系统、业务异常。The implementation of the present invention can ensure the low delay of control plane messages between service network elements and avoid service anomalies caused by interaction timeout between service network elements; moreover, the sending and receiving of control plane messages is not affected by changes in the throughput of the forwarding plane and avoids the risk of forwarding errors due to forwarding plane throughput changes. Excessive plane throughput leads to loss of control plane packets, resulting in service anomalies. In addition, through the service network element of the present invention, that is, the reliable sending and receiving of messages on the control plane, the occurrence of dual-master service network elements in which control plane messages are lost or delayed due to heartbeat detection or other detection methods is avoided. phenomenon occurs, resulting in system anomalies, thereby ensuring the synchronization integrity of control plane and forwarding plane entry data, and avoiding various system and business anomalies due to incomplete entries.
附图说明Description of the drawings
图1为本发明实施例公开的一种虚拟化核心网的时间敏感实现方法的流程示意图;Figure 1 is a schematic flow chart of a time-sensitive implementation method for a virtualized core network disclosed in an embodiment of the present invention;
图2为本发明实施例公开的一种现有的业务网元异常后的上行消息处理方法流程图;Figure 2 is a flow chart of an existing uplink message processing method after an abnormality of a service network element disclosed in an embodiment of the present invention;
图3为本发明实施例公开的一种虚拟化核心网的时间敏感的业务网元异常后的上行消息处理方法流程图;Figure 3 is a flow chart of an uplink message processing method after a time-sensitive service network element of a virtualized core network is abnormal disclosed in an embodiment of the present invention;
图4为本发明实施例公开的一种虚拟化核心网的时间敏感系统示意图;Figure 4 is a schematic diagram of a time-sensitive system of a virtualized core network disclosed in an embodiment of the present invention;
图5为本发明实施例公开的一种虚拟化核心网的时间敏感装置结构示意图。Figure 5 is a schematic structural diagram of a time-sensitive device of a virtualized core network disclosed in an embodiment of the present invention.
具体实施方式Detailed ways
为了更好地理解和实施,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。For better understanding and implementation, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention. Not all examples. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts fall within the scope of protection of the present invention.
本发明实施例的术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或模块的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或模块,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或模块。The terms "comprising" and "having" and any variations thereof in the embodiments of the present invention are intended to cover non-exclusive inclusion, for example, a process, method, system, product or device that includes a series of steps or modules and need not be limited to the clear Those steps or modules listed may instead include other steps or modules not expressly listed or inherent to the process, method, product or apparatus.
本发明实施例公开了一种虚拟化核心网的时间敏感实现方法及系统,能够保障业务网元间的控制面报文的低时延,避免业务网元间交互超时导致的业务异常;并且,控制面报文收发不受转发面吞吐量变化影响,避免因转发面吞吐量过大而导致控制面报文丢失,造成的业务异常。此外,通过本发明的业务网元即控制面上的报文的可靠性收发,避免出现了因心跳检测或其他检测方式引起控制面报文丢失或延时出现的业务网元双主业务网元现象出现,而导致系统异常,从而保障了控制面、转发面表项数据的同步完整性,避免因表项不全而出现的各种系统、业务异常。 Embodiments of the present invention disclose a time-sensitive implementation method and system for a virtualized core network, which can ensure low latency of control plane messages between service network elements and avoid service anomalies caused by interaction timeout between service network elements; and, The sending and receiving of control plane messages is not affected by changes in the throughput of the forwarding plane, avoiding service abnormalities caused by loss of control plane messages due to excessive forwarding plane throughput. In addition, through the service network element of the present invention, that is, the reliable sending and receiving of messages on the control plane, the occurrence of dual-master service network elements in which control plane messages are lost or delayed due to heartbeat detection or other detection methods is avoided. phenomenon occurs, resulting in system anomalies, thereby ensuring the synchronization integrity of control plane and forwarding plane entry data, and avoiding various system and business anomalies due to incomplete entries.
在下述实施例中,为了便于统一表述,UE表示为用户终端,(R)AN表示为无线接入网,DN表示为数据网,SMF表示为(Service Management Function--业务管理功能)、AMF表示为(AuthenticationManagementFunction),认证管理功能)、NRF表示为(Network Repository Function--网络存储功能)、UDM表示为(Unified Data Management--统一数据管理)、UPF表示为(User Port Function--用户端口功能)、Redis数据库表示为远程数据库。其中,在该5G核心网中,各虚拟化的业务网元间都是通过虚拟网络进行连接。In the following embodiments, in order to facilitate unified expression, UE is represented as a user terminal, (R)AN is represented as a wireless access network, DN is represented as a data network, SMF is represented as (Service Management Function--Service Management Function), and AMF is represented is (AuthenticationManagementFunction), authentication management function), NRF is represented by (Network Repository Function--network storage function), UDM is represented by (Unified Data Management--unified data management), UPF is represented by (User Port Function--user port function ), the Redis database is represented as a remote database. Among them, in the 5G core network, virtualized service network elements are connected through virtual networks.
进一步地,在本发明中,为增强5G核心网的可靠性,各虚拟化业务网元会采用主备方式运行,即同时有两个相同的虚拟化业务网元运行,即业务网元本申(主)和备用业务网元(备),从而形成互为主备的方式运行,即相互备份的两个同虚拟化的业务网元都可以接管同一用户,处理同一用户的控制面信息。Further, in the present invention, in order to enhance the reliability of the 5G core network, each virtualized service network element will operate in an active and backup mode, that is, two identical virtualized service network elements will operate at the same time, that is, the service network element itself will (active) and standby service network elements (standby), thus forming a mutually active and standby mode of operation, that is, two mutually virtualized service network elements that back up each other can take over the same user and process the control plane information of the same user.
请参阅图1,图1为本发明实施例公开的一种虚拟化核心网的时间敏感实现方法的流程示意图。其中,该虚拟化核心网的时间敏感实现方法可以应用在5G核心网系统,此外,所有的支持主备保护的虚拟化设备,能够实现本发明的发现异常、注册互通网元信息、配置可靠通信等方式都属于于本实施例的保护应用范围,对于该方法的应用发明实施例不做限制。如图1所示,该虚拟化核心网的时间敏感实现方法可以包括以下操作:Please refer to FIG. 1 , which is a schematic flowchart of a time-sensitive implementation method for a virtualized core network disclosed in an embodiment of the present invention. Among them, the time-sensitive implementation method of the virtualized core network can be applied to the 5G core network system. In addition, all virtualization devices that support active and backup protection can realize the invention's discovery of abnormalities, registration of interoperable network element information, and configuration of reliable communication. All other methods belong to the scope of protection and application of this embodiment, and the embodiments of the invention do not limit the application of this method. As shown in Figure 1, the time-sensitive implementation method of the virtualized core network can include the following operations:
101、响应于第一业务网元与第二业务网元的交互异常信息,通过网络策略控制模块获取第一业务网元和中间业务网元的注册请求信息。101. In response to the abnormal interaction information between the first service network element and the second service network element, obtain the registration request information of the first service network element and the intermediate service network element through the network policy control module.
为了更加的明确详细说明本发明的实现过程,在本实施例中第一业务网元为认证管理模块即AMF,第二业务网元为业务管理模块SMF。在本实施例中主要是对两个交互的业务网元之间的异常信息进行处理,由此,首先需要先响应于第一业务网元与第二业务网元的交互异常信息,对于第一业务网元与第二业务网元的交互异常信息可以表现为主用SMF工作一段时间后突然掉电宕机或者出现网络故障。那么响应过程可以实现为:由AMF获知主用SMF异常,具体包括为:由网络存储功能NRF发现和主用SMF之间的心跳异常,此时NRF会认为主用SMF异常,由于在此前的会话创建时AMF已经订阅了主用SMF的信息,因此NRF发现主用SMF异常后会发送订阅通知消息给AMF,通知AMF已经发生异常的SMF即获取到第一业务网元与第二业务网元的交互异常信息。In order to explain the implementation process of the present invention more clearly and in detail, in this embodiment, the first service network element is the authentication management module, that is, AMF, and the second service network element is the service management module SMF. In this embodiment, the main purpose is to process the abnormal information between two interacting service network elements. Therefore, it is first necessary to respond to the interactive abnormal information between the first service network element and the second service network element. For the first The abnormal interaction information between the service network element and the second service network element can be manifested as a sudden power outage or network failure after the active SMF has been working for a period of time. Then the response process can be implemented as follows: AMF learns that the active SMF is abnormal, specifically including: the network storage function NRF discovers that the heartbeat between the active SMF and the active SMF is abnormal. At this time, NRF will think that the active SMF is abnormal, because in the previous session When created, AMF has already subscribed to the information of the active SMF. Therefore, after NRF discovers that the active SMF is abnormal, it will send a subscription notification message to AMF. The SMF that notifies AMF that an exception has occurred will obtain the information of the first service network element and the second service network element. Interaction exception information.
进一步地,由AMF获知主用SMF异常还可以包括为:AMF网元本身的HTTP模块发现自己和主用SMF之间的HTTP长链接异常。此连接是在AMF通过NRF发现SMF成功后,那么AMF会分别和在同一Set集下的SMF都建立HTTP的长连接,当AMF和主用SMF之间的长连接出现问题时,AMF就能够第一时间知道,从而帮助AMF尽快的选择备用SMF继续提供会话服务。Further, the AMF learning that the active SMF is abnormal may also include: the HTTP module of the AMF network element itself discovers that the HTTP long link between itself and the active SMF is abnormal. This connection is after AMF successfully discovers SMF through NRF, then AMF will establish HTTP persistent connections with SMFs under the same Set. When there is a problem with the persistent connection between AMF and the main SMF, AMF can Knowing this at once helps AMF select a backup SMF as quickly as possible to continue providing session services.
此外,还可以由用户端口功能UPF获知主用SMF异常,具体包括:由 网络存储功能NRF发现和主用SMF之间的心跳异常,此时NRF会认为主用SMF异常,由于在此前的会话创建时UPF已经订阅了主用SMF的信息,因此NRF发现主用SMF异常后会发送订阅通知消息给UPF,通知AMF已经发生异常的SMF即获取到第一业务网元与第二业务网元的交互异常信息。In addition, the user port function UPF can also learn about the active SMF exception, including: The network storage function NRF discovers that the heartbeat between the active SMF and the active SMF is abnormal. At this time, the NRF will think that the active SMF is abnormal. Since UPF has subscribed to the active SMF information when the previous session was created, NRF discovers that the active SMF is abnormal. A subscription notification message will be sent to the UPF, and the SMF, which notifies the AMF that an exception has occurred, has obtained the interaction exception information between the first service network element and the second service network element.
进一步地,由UPF获知主用SMF异常还可以包括为:UPF还可以通过SMF和UPF之间的PFCP(Packet Forwarding Control Protocol--包转发控制协议)进行心跳消息检测,当UPF检测到与SMF之间的PFCP链路的心跳异常后,那么UPF认为SMF网元出现了异常,即获取到第一业务网元与第二业务网元的交互异常信息。Further, the UPF learning of the active SMF abnormality may also include: UPF may also perform heartbeat message detection through PFCP (Packet Forwarding Control Protocol) between SMF and UPF. After the heartbeat of the PFCP link between them is abnormal, the UPF considers that the SMF network element is abnormal, that is, it obtains the abnormal interaction information between the first service network element and the second service network element.
在获取了第一业务网元与第二业务网元的交互异常信息后,就通过网络策略控制模块获取第一业务网元和中间业务网元的注册请求信息。其中,该网络策略控制器即NPCF能够用于业务网元对于关键信息通信保障资源的注册请求。在该注册请求信息中,具体包括各业务网元的源、目的地址,端口号,网元类型,带宽要求等信息,本实施例不对注册请求信息的内容进行限定。After obtaining the interaction exception information between the first service network element and the second service network element, the registration request information of the first service network element and the intermediate service network element is obtained through the network policy control module. Among them, the network policy controller, that is, NPCF, can be used by service network elements to register requests for key information communication guarantee resources. The registration request information specifically includes the source and destination addresses, port numbers, network element types, bandwidth requirements and other information of each service network element. This embodiment does not limit the content of the registration request information.
102、基于注册请求信息生成可靠通信策略。102. Generate a reliable communication strategy based on the registration request information.
其中,可靠通信策略包括:通过注册请求信息获取第一业务网元的交互信息和备用第二业务网元地址,其中,该交互信息包括上行信息和下行信息;将第一业务网元的交互信息基于备用第二业务网元地址发送至备用第二业务网元;备用第二业务网元根据交互信息查找本地是否存在目标用户的上下文信息;若备用第二业务网元查找本地存在目标用户的上下文信息,则执行第一业务网元与备用第二业务网元的可靠业务通信。The reliable communication strategy includes: obtaining the interaction information of the first service network element and the backup second service network element address through the registration request information, where the interaction information includes uplink information and downlink information; Based on the address of the standby second service network element, the standby second service network element is sent to the standby second service network element; the standby second service network element searches for the local context information of the target user based on the interaction information; if the standby second service network element searches for the local context information of the target user information, then reliable service communication between the first service network element and the backup second service network element is performed.
进一步地,中间业务网元包括远程数据库,基于注册请求信息生成可靠通信策略,其中,可靠通信策略包括:若备用第二业务网元查找本地不存在目标用户的上下文信息,通过注册请求信息获取远程数据库的地址、备用远程数据库的地址;第一业务网元基于远程数据库的地址和备用远程数据库的地址向远程数据库或备用远程数据库下发上下文信息请求;远程数据库或备用远程数据库将上下文信息发送至备用第二业务网元;通过上下文信息执行第一业务网元与备用第二业务网元的可靠业务通信。Further, the intermediate service network element includes a remote database, and generates a reliable communication strategy based on the registration request information. The reliable communication strategy includes: if the backup second service network element searches for the context information of the target user that does not exist locally, obtains the remote communication strategy through the registration request information. The address of the database and the address of the standby remote database; the first service network element issues a context information request to the remote database or the standby remote database based on the address of the remote database and the address of the standby remote database; the remote database or the standby remote database sends the context information to A backup second service network element; performs reliable service communication between the first service network element and the backup second service network element through context information.
进一步地,中间业务网元包括统一数据管理模块,基于注册请求信息生成可靠通信策略,其中,可靠通信策略包括:通过注册请求信息获取统一数据管理模块的地址;备用第二业务网元基于统一数据管理模块的地址向统一数据管理模块下发注册通知信息和订阅信息;通过注册通知信息和所述订阅信息执行第一业务网元与备用第二业务网元的可靠业务通信。Further, the intermediate service network element includes a unified data management module, and generates a reliable communication strategy based on the registration request information, where the reliable communication strategy includes: obtaining the address of the unified data management module through the registration request information; the backup second service network element based on the unified data The address of the management module sends registration notification information and subscription information to the unified data management module; reliable service communication between the first service network element and the standby second service network element is performed through the registration notification information and the subscription information.
进一步地,中间业务网元包括用户端口,基于注册请求信息生成可靠通信策略,其中,可靠通信策略包括:通过注册请求信息获取用户端口的地址;备用第二业务网元基于用户端口的地址向用户端口下发接管通知信息;通过接管通知信息执行第一业务网元与备用第二业务网元的可靠业务通信。 Further, the intermediate service network element includes a user port, and generates a reliable communication strategy based on the registration request information. The reliable communication strategy includes: obtaining the address of the user port through the registration request information; and the backup second service network element sends the user port address to the user based on the user port address. The port delivers takeover notification information; reliable service communication between the first service network element and the backup second service network element is performed through the takeover notification information.
具体地,为了更加精细化对比出本申请与现有技术的显著区别,在此以上行信息作为交互信息的示例对象,引入对比例进行详细阐述。如图2所示,为一种现有的业务网元异常后的上行信息处理流程图。Specifically, in order to compare the significant differences between the present application and the prior art in a more refined manner, uplink information is used as an example object of interactive information, and a comparative example is introduced for detailed elaboration. As shown in Figure 2, it is a flow chart of uplink information processing after an existing service network element is abnormal.
如图2中的①所示,在第一业务网元AMF有上行信息的流程需要第二业务网元SMF处理,此时AMF通过NRF或者HTTP模块参照上述异常获取方式得知主用即第一业务网元SMF异常,那么就选择同一Set集下的备用第二业务网元SMF,将上行信息发送给备用SMF。As shown in ① in Figure 2, the process of uplink information in the first service network element AMF needs to be processed by the second service network element SMF. At this time, the AMF refers to the above exception acquisition method through the NRF or HTTP module to learn that the primary user is the first service network element. If the service network element SMF is abnormal, then the backup second service network element SMF under the same Set is selected and the uplink information is sent to the backup SMF.
如图2中的②所示,备用第二业务网元SMF收到上行信息后首先查找本地是否有该用户的上下文。如果有则继续正常处理业务流程。如果没有,则先向主用的Redis数据库请求获取上下文信息。如果主用Redis不可用,那么就向备用的Redis数据库发送请求上下文请求。但是,如果主用和备用的Redis都不能用,则整体流程失败。As shown in ② in Figure 2, after receiving the uplink information, the backup second service network element SMF first searches whether there is the context of the user locally. If so, continue the normal business process. If not, first request the main Redis database to obtain context information. If the primary Redis is unavailable, a request context request is sent to the backup Redis database. However, if both the active and standby Redis are unavailable, the overall process fails.
如图2中的③所示,主用或者备用的Redis数据库查找到相关的用户上下文信息后就会返还给备用SMF,备用SMF就获得了用户的上下文信息。但是,如果主用Redis数据库和备用Redis数据库的上下文上都无用户上下文信息,则整体流程失败。As shown in ③ in Figure 2, after the active or standby Redis database finds the relevant user context information, it will be returned to the standby SMF, and the standby SMF obtains the user context information. However, if there is no user context information on the context of both the active Redis database and the standby Redis database, the entire process fails.
如图2中的④所示,备用第二业务网元SMF向UDM发送注册请求消息,通知UDM当前用户所服务的SMF信息。此外,备用SMF还需要向UDM发送订阅消息,后续UDM上保存的用户签约信息如果有变化,及时通知备用的SMF。As shown in ④ in Figure 2, the standby second service network element SMF sends a registration request message to the UDM, notifying the UDM of the SMF information served by the current user. In addition, the backup SMF also needs to send a subscription message to the UDM. If the user subscription information saved on the UDM subsequently changes, the backup SMF will be notified in a timely manner.
如图2中的⑤所示,UDM会返回注册和订阅的结果。As shown in ⑤ in Figure 2, UDM will return the results of registration and subscription.
如图2中的⑥所示,备用第二SMF向UPF更新会话消息,通知UPF由备用SMF接管会话流程。As shown in ⑥ in Figure 2, the backup second SMF updates the session message to the UPF, notifying the UPF that the backup SMF will take over the session process.
如图2中的⑦所示,UPF就会返回更新结果,整个上行信息流程结束。As shown in ⑦ in Figure 2, UPF will return the update result, and the entire uplink information process ends.
从该对比例中显然可见,当虚拟网络出现异常时:图2的步骤②中,备用第二业务网元SMF同主Radis、备Radis间也可能通信不可达,造成流程失败,导致业务中止。图2的步骤④中,备用SMF同UDM间通信不可达,造成注册、订阅请求失败,导致业务中止。图2的步骤⑥中,备用SMF同UPF间通信不可达,更新会话消息失败,导致业务中止。It is obvious from this comparison that when an abnormality occurs in the virtual network: in step ② of Figure 2, the backup second service network element SMF may also be unreachable with the main Radis and the backup Radis, causing the process to fail and causing the service to be suspended. In step ④ of Figure 2, the communication between the standby SMF and the UDM is unreachable, causing the registration and subscription requests to fail, causing the service to be suspended. In step ⑥ of Figure 2, the communication between the standby SMF and the UPF is unreachable, and the session message update fails, causing the service to be suspended.
此外,当虚拟网络时断时续时,可能出现备用SMF向UPF下发的表项部分丢失,造成不可预估的业务异常情况出现。In addition, when the virtual network is intermittent, the table entries delivered by the standby SMF to the UPF may be partially lost, causing unpredictable business abnormalities.
而本发明为了避免上述情形,基于注册请求信息生成可靠通信策略,如图3所示,为一种虚拟化核心网的时间敏感的业务网元异常后的上行消息处理流程图。In order to avoid the above situation, the present invention generates a reliable communication policy based on the registration request information, as shown in Figure 3, which is a flow chart of uplink message processing after a time-sensitive service network element of the virtualized core network is abnormal.
图3中,通过本实施例的方法可以将NPCF网络策略控制器表示为同其他各业务网元间均为时敏网卡保障的可靠通信链路。在HiLinkReq消息即注册请求信息携带内容包括:源地址、目的地址、源端口、目的端口、源网元类型、目的网元类型、带宽等信息。具体地:In Figure 3, through the method of this embodiment, the NPCF network policy controller can be represented as a reliable communication link with other business network elements that is guaranteed by a time-sensitive network card. The registration request information carried in the HiLinkReq message includes: source address, destination address, source port, destination port, source network element type, destination network element type, bandwidth and other information. specifically:
如图3中的①所示,第一业务网元AMF有上行信息需要第二业务网元 SMF处理,此时第一业务网元AMF通过NRF或者HTTP模块得知主用SMF异常(通信链路断链或网元宕机),选择同一Set集下的备用SMF,并向网络策略控制器NPCF发送请求可靠通信链路申请。As shown in ① in Figure 3, the first service network element AMF has uplink information and requires the second service network element SMF processing. At this time, the first service network element AMF learns that the active SMF is abnormal (the communication link is disconnected or the network element is down) through the NRF or HTTP module, selects the backup SMF under the same Set, and reports it to the network policy controller NPCF sends a request for a reliable communication link application.
如图3中的②所示,将上行信息发送给备用第二业务网元SMF。备用第二业务网元SMF收到上行信息后首先查找本地是否有该用户的上下文。如果有继续正常处理业务流程,如果没有则进入下述步骤③。As shown in ② in Figure 3, the uplink information is sent to the backup second service network element SMF. After receiving the uplink information, the standby second service network element SMF first searches whether there is a context of the user locally. If there is, continue to process the business process normally, if not, proceed to the following step ③.
如图3中的③所示,第二业务网元SMF需要同主Redis数据库、备用Redis数据库、UDM、UPF交互,因此可以向网络策略控制器NPCF分别发送请求可靠通信链路申请。As shown in ③ in Figure 3, the second service network element SMF needs to interact with the main Redis database, backup Redis database, UDM, and UPF, so it can send requests for reliable communication link applications to the network policy controller NPCF respectively.
如图3中的④所示,第一业务网元SMF先向主用的Redis请求获取上下文信息。如果主用Redis不可用,那么就向备用的Redis发送请求上下文请求。As shown in ④ in Figure 3, the first service network element SMF first requests the active Redis to obtain context information. If the primary Redis is unavailable, a request context request is sent to the backup Redis.
如图3中的⑤所示,主用或者备用的Redis查找到相关的用户上下文信息后返还给备用SMF,备用第二业务网元SMF就获得了用户的上下文信息。As shown in ⑤ in Figure 3, the active or standby Redis finds the relevant user context information and returns it to the standby SMF. The standby second service network element SMF obtains the user context information.
如图3中的⑥所示,备用第二业务网元SMF向UDM发送注册请求消息,通知UDM当前用户所服务的SMF信息。备用第二业务网元SMF还需要向UDM发送订阅消息,后续UDM上保存的用户签约信息如果有变化,及时通知备用SMF。As shown in ⑥ in Figure 3, the standby second service network element SMF sends a registration request message to the UDM, notifying the UDM of the SMF information served by the current user. The standby second service network element SMF also needs to send a subscription message to the UDM. If the user subscription information saved on the UDM subsequently changes, the standby SMF will be notified in a timely manner.
如图3中的⑦所示,UDM返回注册和订阅的结果。As shown in ⑦ in Figure 3, UDM returns the results of registration and subscription.
如图3中的⑧所示,备用第二业务网元SMF向UPF更新会话消息,通知UPF由备用第二业务网元SMF接管会话流程。As shown in ⑧ in Figure 3, the standby second service network element SMF updates the session message to the UPF, notifying the UPF that the standby second service network element SMF takes over the session process.
如图3中的⑨所示,UPF返回更新结果,整个上行信息流程结束。As shown in ⑨ in Figure 3, UPF returns the update result, and the entire uplink information process ends.
可见,经过本实施例的上行信息交互流程中,虚拟网络是使用共享硬件资源,采用尽力而为的转发模式,不是可靠通信。当主用业务网元心跳检测不通,很大可能是由于虚拟网络拥塞、异常导致检测报文丢失。因此,在同备用业务网元交互前,先申请可靠通信链路资源,以保证网元间控制类信息的可靠通信,避免因虚拟网络突发拥塞、异常而造成的用户业务失败,提升用户体验质量。It can be seen that during the uplink information exchange process in this embodiment, the virtual network uses shared hardware resources and adopts a best-effort forwarding mode, which is not reliable communication. When heartbeat detection of the active service network element fails, it is most likely due to congestion or anomalies in the virtual network that cause detection packets to be lost. Therefore, before interacting with backup service network elements, apply for reliable communication link resources first to ensure reliable communication of control information between network elements, avoid user service failures caused by sudden congestion and abnormalities in the virtual network, and improve user experience. quality.
103、通过可靠通信策略实现第一业务网元和备用第二业务网元的可靠业务通信。103. Realize reliable service communication between the first service network element and the backup second service network element through a reliable communication strategy.
由此,通过上述可靠通信策略执行,就可以实现第一业务网元和备用第二业务网元的可靠业务通信。在其他优选实施方式中,还将可靠通信策略下发至配置于服务器的时间敏感交换网卡设备,通过时间敏感交换网卡设备构建用于连接第一业务网元和备用第二业务网元的可靠业务通信链路。该时间敏感交换网卡设备能够替代原有服务器PCIE网卡,该网卡具备时间敏感网络技术的帧抢占、流量整形等能力。Therefore, through the above reliable communication policy execution, reliable service communication between the first service network element and the backup second service network element can be achieved. In other preferred embodiments, the reliable communication policy is also delivered to a time-sensitive switching network card device configured on the server, and a reliable service for connecting the first service network element and the backup second service network element is constructed through the time-sensitive switching network card device. communication link. This time-sensitive switching network card device can replace the original server PCIE network card. The network card has the capabilities of frame preemption and traffic shaping of time-sensitive network technology.
需要说明的是,在本实施例中虽然是以上行流程作为阐述对象,但是对于采用本实施例的下行流程也属于本发明的保护范围。具体地,该上行流程即由用户端(UE)向核心网的业务网元发起;下行流程即由核心网的 业务网元向用户(UE)发起,对于下行流程的实现为本实施例的上行流程实现的类似过程,在此不进行赘述。It should be noted that although the upstream process is used as the description object in this embodiment, the downlink process using this embodiment also falls within the protection scope of the present invention. Specifically, the uplink process is initiated by the user terminal (UE) to the service network element of the core network; the downlink process is initiated by the core network The service network element initiates to the user (UE), and the implementation of the downlink process is a similar process implemented by the uplink process in this embodiment, which will not be described in detail here.
请参阅图4,图4为本发明实施例公开的一种虚拟化核心网的时间敏感系统示意图。其中,该虚拟化核心网的时间敏感系统可以应用在5G核心网系统,核心网的多个虚拟化的业务网元均包括备用业务网元。如图4所示,该虚拟化核心网的时间敏感实现系统可以包括:Please refer to FIG. 4 , which is a schematic diagram of a time-sensitive system of a virtualized core network disclosed in an embodiment of the present invention. Among them, the time-sensitive system of the virtualized core network can be applied to the 5G core network system. Multiple virtualized service network elements of the core network include backup service network elements. As shown in Figure 4, the time-sensitive implementation system of the virtualized core network may include:
网络策略控制模块1和时间敏感交换网卡设备2。网络策略控制模块1用于响应于第一业务网元与第二业务网元的交互异常信息,获取第一业务网元和中间业务网元的注册请求信息,并基于注册请求信息生成可靠通信策略,通过可靠通信策略实现第一业务网元和备用第二业务网元的可靠业务通信。该网络策略控制器即NPCF能够用于业务网元对于关键信息通信保障资源的注册请求。在该注册请求信息中,具体包括各业务网元的源、目的地址,端口号,网元类型,带宽要求等信息,本实施例不对注册请求信息的内容进行限定。Network policy control module 1 and time-sensitive switching network card device 2. The network policy control module 1 is configured to respond to the abnormal interaction information between the first service network element and the second service network element, obtain the registration request information of the first service network element and the intermediate service network element, and generate a reliable communication policy based on the registration request information. , realizing reliable service communication between the first service network element and the backup second service network element through a reliable communication strategy. The network policy controller, that is, NPCF, can be used by service network elements to register requests for key information communication guarantee resources. The registration request information specifically includes the source and destination addresses, port numbers, network element types, bandwidth requirements and other information of each service network element. This embodiment does not limit the content of the registration request information.
时间敏感交换网卡设备2配置于服务器,用于获取可靠通信策略,构建用于连接第一业务网元和备用第二业务网元的可靠业务通信链路。该时间敏感交换网卡设备能够替代原有服务器PCIE网卡,该网卡具备时间敏感网络技术的帧抢占、流量整形等能力。The time-sensitive switching network card device 2 is configured on the server and is used to obtain a reliable communication policy and build a reliable service communication link for connecting the first service network element and the backup second service network element. This time-sensitive switching network card device can replace the original server PCIE network card. The network card has the capabilities of frame preemption and traffic shaping of time-sensitive network technology.
对于网络策略控制模块1和时间敏感交换网卡设备2与业务网元的交互方式可以参照上述方法的描述,在此不进行赘述。For the interaction mode between the network policy control module 1 and the time-sensitive switching network card device 2 and the service network element, reference can be made to the description of the above method, and will not be described again here.
请参阅图5,图5是本发明实施例公开的一种虚拟化核心网的时间敏感装置的结构示意图。其中,图5所描述的虚拟化核心网的时间敏感装置可以应用在5G核心网络系统,对于该虚拟化核心网的时间敏感装置的应用系统本发明实施例不做限制。如图5所示,该装置可以包括:Please refer to Figure 5. Figure 5 is a schematic structural diagram of a time-sensitive device for a virtualized core network disclosed in an embodiment of the present invention. Among them, the time-sensitive device of the virtualized core network described in Figure 5 can be applied in the 5G core network system, and the embodiment of the present invention does not limit the application system of the time-sensitive device of the virtualized core network. As shown in Figure 5, the device may include:
存储有可执行程序代码的存储器501;Memory 501 storing executable program code;
与存储器501耦合的处理器502;processor 502 coupled to memory 501;
处理器502调用存储器501中存储的可执行程序代码,用于执行所描述的虚拟化核心网的时间敏感实现方法。The processor 502 calls the executable program code stored in the memory 501 for executing the described time-sensitive implementation method of a virtualized core network.
本发明实施例公开了一种计算机可读存储介质,其存储用于电子数据交换的计算机程序,其中,该计算机程序使得计算机执行所描述的虚拟化核心网的时间敏感实现方法。An embodiment of the present invention discloses a computer-readable storage medium that stores a computer program for electronic data exchange, wherein the computer program causes the computer to execute the described time-sensitive implementation method of a virtualized core network.
本发明实施例公开了一种计算机程序产品,该计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,且该计算机程序可操作来使计算机执行所描述的虚拟化核心网的时间敏感实现方法。An embodiment of the present invention discloses a computer program product. The computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause the computer to execute the described virtualization core network time. Sensitive implementation method.
以上所描述的实施例仅是示意性的,其中所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理模块,即可以位于一个地方,或者也可以分布到多个网络模块上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施 例方案的目的。本领域普通技术人员在不付出创造性的劳动的情况下,即可以理解并实施。The embodiments described above are only illustrative, in which the modules described as separate components may or may not be physically separated. The components shown as modules may or may not be physical modules, that is, they may be located in a place, or can be distributed to multiple network modules. You can select some or all of the modules according to actual needs to implement this implementation. The purpose of the example program. Persons of ordinary skill in the art can understand and implement the method without any creative effort.
通过以上的实施例的具体描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,存储介质包括只读存储器(Read-Only Memory,ROM)、随机存储器(Random Access Memory,RAM)、可编程只读存储器(Programmable Read-only Memory,PROM)、可擦除可编程只读存储器(Erasable Programmable Read Only Memory,EPROM)、一次可编程只读存储器(One-time Programmable Read-Only Memory,OTPROM)、电子抹除式可复写只读存储器(Electrically-Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储器、磁盘存储器、磁带存储器、或者能够用于携带或存储数据的计算机可读的任何其他介质。Through the detailed description of the above embodiments, those skilled in the art can clearly understand that each embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, it can also be implemented by hardware. Based on this understanding, the above technical solutions can be embodied in the form of software products in essence or in part that contribute to the existing technology. The computer software products can be stored in computer-readable storage media, and the storage media includes read-only memories. (Read-Only Memory, ROM), Random Access Memory (RAM), Programmable Read-only Memory (PROM), Erasable Programmable Read Only Memory (EPROM) ), One-time Programmable Read-Only Memory (OTPROM), Electronically Erasable Programmable Read-Only Memory (EEPROM), Compact Disc Read -Only Memory (CD-ROM) or other optical disk storage, magnetic disk storage, magnetic tape storage, or any other computer-readable medium that can be used to carry or store data.
最后应说明的是:本发明实施例公开的一种虚拟化核心网的时间敏感实现方法及系统所揭露的仅为本发明较佳实施例而已,仅用于说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解;其依然可以对前述各项实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或替换,并不使相应的技术方案的本质脱离本发明各项实施例技术方案的精神和范围。 Finally, it should be noted that the time-sensitive implementation method and system of a virtualized core network disclosed in the embodiments of the present invention are only the preferred embodiments of the present invention and are only used to illustrate the technical solutions of the present invention. Limitation thereof; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that they can still modify the technical solutions recorded in the foregoing embodiments, or modify some of the technical features. Equivalent substitutions; and these modifications or substitutions do not deviate from the essence of the corresponding technical solutions from the spirit and scope of the technical solutions of the various embodiments of the present invention.

Claims (10)

  1. 一种虚拟化核心网的时间敏感实现方法,所述核心网的多个虚拟化的业务网元均包括备用业务网元,其特征在于,所述方法包括:A time-sensitive implementation method for a virtualized core network. Multiple virtualized service network elements of the core network all include standby service network elements. The method is characterized in that the method includes:
    响应于第一业务网元与第二业务网元的交互异常信息,通过网络策略控制模块获取第一业务网元和中间业务网元的注册请求信息;In response to the abnormal interaction information between the first service network element and the second service network element, obtain the registration request information of the first service network element and the intermediate service network element through the network policy control module;
    基于所述注册请求信息生成可靠通信策略;Generate a reliable communication policy based on the registration request information;
    发送请求可靠通信链路申请;Send a request for a reliable communication link application;
    第二业务网元向网络策略控制模块分别发送请求可靠通信链路申请;The second service network element sends a request for a reliable communication link application to the network policy control module respectively;
    先申请可靠通信链路资源,以保证网元间控制类信息的可靠通信;First apply for reliable communication link resources to ensure reliable communication of control information between network elements;
    获取可靠通信策略,构建用于连接第一业务网元和备用第二业务网元的可靠业务通信链路;Obtain a reliable communication strategy and build a reliable service communication link for connecting the first service network element and the backup second service network element;
    通过所述可靠通信策略实现第一业务网元和备用第二业务网元的可靠业务通信。Reliable service communication between the first service network element and the backup second service network element is achieved through the reliable communication strategy.
  2. 根据权利要求1所述的虚拟化核心网的时间敏感实现方法,其特征在于,基于所述注册请求信息生成可靠通信策略,其中,所述可靠通信策略包括:The time-sensitive implementation method of a virtualized core network according to claim 1, characterized in that a reliable communication strategy is generated based on the registration request information, wherein the reliable communication strategy includes:
    通过所述注册请求信息获取第一业务网元的交互信息和备用第二业务网元地址;Obtain the interaction information of the first service network element and the backup second service network element address through the registration request information;
    将第一业务网元的交互信息基于所述备用第二业务网元地址发送至备用第二业务网元;Send the interaction information of the first service network element to the backup second service network element based on the backup second service network element address;
    备用第二业务网元根据所述交互信息查找本地是否存在目标用户的上下文信息;The backup second service network element searches whether the context information of the target user exists locally according to the interaction information;
    若备用第二业务网元查找本地存在目标用户的上下文信息,则执行第一业务网元与备用第二业务网元的可靠业务通信。If the backup second service network element searches for the context information of the target user that exists locally, reliable service communication between the first service network element and the backup second service network element is performed.
  3. 根据权利要求2所述的虚拟化核心网的时间敏感实现方法,其特征在于,中间业务网元包括远程数据库,基于所述注册请求信息生成可靠通信策略,其中,所述可靠通信策略包括:The time-sensitive implementation method of a virtualized core network according to claim 2, characterized in that the intermediate service network element includes a remote database, and a reliable communication strategy is generated based on the registration request information, wherein the reliable communication strategy includes:
    若备用第二业务网元查找本地不存在目标用户的上下文信息,通过所述注册请求信息获取远程数据库的地址、备用远程数据库的地址;If the backup second service network element searches for the context information of the target user that does not exist locally, obtain the address of the remote database and the address of the backup remote database through the registration request information;
    第一业务网元基于远程数据库的地址和备用远程数据库的地址向所述远程数据库或备用远程数据库下发上下文信息请求;The first service network element issues a context information request to the remote database or the backup remote database based on the address of the remote database and the address of the backup remote database;
    所述远程数据库或备用远程数据库将上下文信息发送至备用第二业务网元;The remote database or the backup remote database sends the context information to the backup second service network element;
    通过所述上下文信息执行第一业务网元与备用第二业务网元的可靠业务通信。Reliable service communication between the first service network element and the backup second service network element is performed through the context information.
  4. 根据权利要求3所述的虚拟化核心网的时间敏感实现方法,其特征 在于,中间业务网元包括统一数据管理模块,基于所述注册请求信息生成可靠通信策略,其中,所述可靠通信策略包括:The time-sensitive implementation method of a virtualized core network according to claim 3, characterized by The intermediate service network element includes a unified data management module that generates a reliable communication strategy based on the registration request information, wherein the reliable communication strategy includes:
    通过所述注册请求信息获取统一数据管理模块的地址;Obtain the address of the unified data management module through the registration request information;
    备用第二业务网元基于统一数据管理模块的地址向所述统一数据管理模块下发注册通知信息和订阅信息;The backup second service network element delivers registration notification information and subscription information to the unified data management module based on the address of the unified data management module;
    通过所述注册通知信息和所述订阅信息执行第一业务网元与备用第二业务网元的可靠业务通信。Reliable service communication between the first service network element and the standby second service network element is performed through the registration notification information and the subscription information.
  5. 根据权利要求4所述的虚拟化核心网的时间敏感实现方法,其特征在于,中间业务网元包括用户端口,基于所述注册请求信息生成可靠通信策略,其中,所述可靠通信策略包括:The time-sensitive implementation method of a virtualized core network according to claim 4, characterized in that the intermediate service network element includes a user port, and a reliable communication strategy is generated based on the registration request information, wherein the reliable communication strategy includes:
    通过所述注册请求信息获取用户端口的地址;Obtain the address of the user port through the registration request information;
    备用第二业务网元基于用户端口的地址向所述用户端口下发接管通知信息;The backup second service network element delivers takeover notification information to the user port based on the address of the user port;
    通过所述接管通知信息执行第一业务网元与备用第二业务网元的可靠业务通信。Reliable service communication between the first service network element and the standby second service network element is performed through the takeover notification information.
  6. 根据权利要求1-5任一项所述的虚拟化核心网的时间敏感实现方法,其特征在于,所述方法还包括:The time-sensitive implementation method of a virtualized core network according to any one of claims 1 to 5, characterized in that the method further includes:
    将所述可靠通信策略下发至配置于服务器的时间敏感交换网卡设备;Deliver the reliable communication policy to the time-sensitive switching network card device configured on the server;
    通过所述时间敏感交换网卡设备构建用于连接第一业务网元和备用第二业务网元的可靠业务通信链路。A reliable service communication link for connecting the first service network element and the backup second service network element is constructed through the time-sensitive switching network card device.
  7. 根据权利要求6所述的虚拟化核心网的时间敏感实现方法,其特征在于,第一业务网元为认证管理模块,第二业务网元为业务管理模块。The time-sensitive implementation method of a virtualized core network according to claim 6, characterized in that the first service network element is an authentication management module, and the second service network element is a service management module.
  8. 一种虚拟化核心网的时间敏感系统,核心网的多个虚拟化的业务网元均包括备用业务网元,其特征在于,所述系统包括:A time-sensitive system for a virtualized core network. Multiple virtualized service network elements of the core network all include backup service network elements. The system is characterized in that the system includes:
    网络策略控制模块,用于响应于第一业务网元与第二业务网元的交互异常信息,获取第一业务网元和中间业务网元的注册请求信息,并基于所述注册请求信息生成可靠通信策略;The network policy control module is configured to respond to the abnormal interaction information between the first service network element and the second service network element, obtain the registration request information of the first service network element and the intermediate service network element, and generate reliable communication strategy;
    发送请求可靠通信链路申请;Send a request for a reliable communication link application;
    第二业务网元向网络策略控制模块分别发送请求可靠通信链路申请;The second service network element sends a request for a reliable communication link application to the network policy control module respectively;
    先申请可靠通信链路资源,以保证网元间控制类信息的可靠通信;First apply for reliable communication link resources to ensure reliable communication of control information between network elements;
    获取可靠通信策略,构建用于连接第一业务网元和备用第二业务网元的可靠业务通信链路;Obtain a reliable communication strategy and build a reliable service communication link for connecting the first service network element and the backup second service network element;
    通过所述可靠通信策略实现第一业务网元和备用第二业务网元的可靠业务通信。Reliable service communication between the first service network element and the backup second service network element is achieved through the reliable communication strategy.
  9. 根据权利要求8所述的虚拟化核心网的时间敏感系统,核心网的多个虚拟化的业务网元均包括备用业务网元,其特征在于,所述系统还包括: According to the time-sensitive system of a virtualized core network according to claim 8, multiple virtualized service network elements of the core network all include backup service network elements, characterized in that the system further includes:
    配置于服务器的时间敏感交换网卡设备,用于获取所述可靠通信策略,构建用于连接第一业务网元和备用第二业务网元的可靠业务通信链路。A time-sensitive switching network card device configured on the server is used to obtain the reliable communication policy and construct a reliable service communication link for connecting the first service network element and the backup second service network element.
  10. 虚拟化核心网的时间敏感装置,其特征在于,所述装置包括:A time-sensitive device for a virtualized core network, characterized in that the device includes:
    存储有可执行程序代码的存储器;Memory that stores executable program code;
    与所述存储器耦合的处理器;a processor coupled to said memory;
    所述处理器调用所述存储器中存储的所述可执行程序代码,执行如权利要求1-7任一项所述的虚拟化核心网的时间敏感实现方法。 The processor calls the executable program code stored in the memory to execute the time-sensitive implementation method of a virtualized core network according to any one of claims 1 to 7.
PCT/CN2023/090278 2022-08-02 2023-04-24 Time-sensitive implementation method and system for virtualized core network WO2024027217A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210919160.0A CN114978910B (en) 2022-08-02 2022-08-02 Time sensitivity realization method and system of virtualization core network
CN202210919160.0 2022-08-02

Publications (1)

Publication Number Publication Date
WO2024027217A1 true WO2024027217A1 (en) 2024-02-08

Family

ID=82969682

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/090278 WO2024027217A1 (en) 2022-08-02 2023-04-24 Time-sensitive implementation method and system for virtualized core network

Country Status (2)

Country Link
CN (1) CN114978910B (en)
WO (1) WO2024027217A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978910B (en) * 2022-08-02 2022-10-25 广东省新一代通信与网络创新研究院 Time sensitivity realization method and system of virtualization core network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073998A (en) * 2019-06-10 2020-12-11 三星电子株式会社 Method and apparatus for improving service reliability in wireless communication system
CN113422694A (en) * 2021-06-08 2021-09-21 腾讯科技(深圳)有限公司 Communication method, communication apparatus, communication medium, and electronic device
WO2022083281A1 (en) * 2020-10-22 2022-04-28 中兴通讯股份有限公司 Message transmission method and system, electronic device, and storage medium
CN114828165A (en) * 2021-01-18 2022-07-29 华为技术有限公司 Communication method and communication device
CN114978910A (en) * 2022-08-02 2022-08-30 广东省新一代通信与网络创新研究院 Time sensitivity realization method and system of virtualization core network

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200832967A (en) * 2006-10-31 2008-08-01 Qualcomm Inc Reliable uplink resource request
CN109995845B (en) * 2018-01-03 2023-12-26 中兴通讯股份有限公司 Method and device for realizing control plane resource migration and network function entity
CN114339847A (en) * 2020-09-30 2022-04-12 华为技术有限公司 Communication method and device
CN113382432B (en) * 2021-08-13 2021-11-23 新华三技术有限公司 5G network service providing method, device and equipment
CN114339854A (en) * 2022-03-01 2022-04-12 中兴通讯股份有限公司 Session management method, communication device, and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073998A (en) * 2019-06-10 2020-12-11 三星电子株式会社 Method and apparatus for improving service reliability in wireless communication system
WO2022083281A1 (en) * 2020-10-22 2022-04-28 中兴通讯股份有限公司 Message transmission method and system, electronic device, and storage medium
CN114828165A (en) * 2021-01-18 2022-07-29 华为技术有限公司 Communication method and communication device
CN113422694A (en) * 2021-06-08 2021-09-21 腾讯科技(深圳)有限公司 Communication method, communication apparatus, communication medium, and electronic device
CN114978910A (en) * 2022-08-02 2022-08-30 广东省新一代通信与网络创新研究院 Time sensitivity realization method and system of virtualization core network

Also Published As

Publication number Publication date
CN114978910A (en) 2022-08-30
CN114978910B (en) 2022-10-25

Similar Documents

Publication Publication Date Title
US10171567B2 (en) Load balancing computer device, system, and method
US7969989B2 (en) High performance ethernet networking utilizing existing fibre channel arbitrated loop HBA technology
US11734138B2 (en) Hot standby method, apparatus, and system
EP3337097B1 (en) Network element upgrading method and device
US9231826B2 (en) Zero configuration of a virtual distributed device
WO2020001442A1 (en) Data processing method and related device
WO2014101531A1 (en) Creating method and device for virtual base station
US11153269B2 (en) On-node DHCP implementation for virtual machines
WO2024027217A1 (en) Time-sensitive implementation method and system for virtualized core network
WO2020114017A1 (en) Data center traffic exchange method and apparatus, device and storage medium
CN110855488B (en) Virtual machine access method and device
US20160205033A1 (en) Pool element status information synchronization method, pool register, and pool element
WO2020057445A1 (en) Communication system, method, and device
WO2021129754A1 (en) Message processing method and device, and storage medium
US10931601B2 (en) Method and apparatus for conditional broadcasting of network configuration data
CN113709220B (en) High-availability implementation method and system of virtual load equalizer and electronic equipment
CN113839862A (en) Method, system, terminal and storage medium for synchronizing ARP information between MCLAG neighbors
WO2020181733A1 (en) Vpc-based multi-data center intercommunication method and related device
EP3627766B1 (en) Method and system for switching between active bng and standby bng
EP4184822A1 (en) Method and apparatus for keeping user terminal alive
WO2022193885A1 (en) User access processing method and related device
CN117499293B (en) Routing table maintenance method, path selection method, device, system and storage medium
WO2023197815A1 (en) Message receiving and sending method and device
CN115865906A (en) Cloud desktop communication method and system based on transfer server
JP2019161257A (en) Packet transfer device, packet transfer system, packet transfer program, and packet transfer method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23848928

Country of ref document: EP

Kind code of ref document: A1