WO2024027217A1 - Procédé et système de mise en œuvre sensible au facteur temps pour un réseau central virtualisé - Google Patents
Procédé et système de mise en œuvre sensible au facteur temps pour un réseau central virtualisé Download PDFInfo
- Publication number
- WO2024027217A1 WO2024027217A1 PCT/CN2023/090278 CN2023090278W WO2024027217A1 WO 2024027217 A1 WO2024027217 A1 WO 2024027217A1 CN 2023090278 W CN2023090278 W CN 2023090278W WO 2024027217 A1 WO2024027217 A1 WO 2024027217A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network element
- service network
- service
- backup
- reliable
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 238000004891 communication Methods 0.000 claims abstract description 99
- 230000003993 interaction Effects 0.000 claims abstract description 25
- 230000004044 response Effects 0.000 claims abstract description 5
- 230000002159 abnormal effect Effects 0.000 claims description 26
- 230000015654 memory Effects 0.000 claims description 16
- 238000013523 data management Methods 0.000 claims description 12
- 238000007726 management method Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 description 24
- 230000006870 function Effects 0.000 description 8
- 230000005856 abnormality Effects 0.000 description 7
- 238000001514 detection method Methods 0.000 description 7
- 238000004590 computer program Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000003111 delayed effect Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 238000003672 processing method Methods 0.000 description 2
- 238000007493 shaping process Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0823—Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0823—Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
- H04L41/0836—Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability to enhance reliability, e.g. reduce downtime
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/021—Ensuring consistency of routing table updates, e.g. by using epoch numbers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Definitions
- the present invention relates to the field of communication technology, and in particular, to a time-sensitive implementation method and system for a virtualized core network.
- the tightly coupled modules in the original dedicated equipment are transformed into independent virtual machines.
- These virtual machines are deployed uniformly through the virtualization cloud platform, and are connected and forwarded through the internal virtual network built by the cloud platform.
- the external communication paths of the virtual machine mainly include: the virtual machine is bound to the physical network card PF, that is, the network card pass-through mode; the network card is virtualized to the VF, and the virtual machine is bound to the VF, that is, the SR-IOV mode; the host machine is installed with the vSwitch soft switching function , connect each port of the virtual machine to the vSwitch.
- the current virtual machine has the following problems during operation:
- the vSwitch in this method needs to occupy additional server vCPU resources, and the overall machine performance is affected by the vSwitch, and the control
- the plane and forwarding plane are only logically isolated through VLAN.
- the throughput of the forwarding plane is large, it will affect the packets of the control plane.
- the control plane and forwarding plane of the virtual machine are bound separately.
- the physical network card and the virtual network card VF share the bandwidth capabilities of the physical network card.
- the forwarding plane throughput is too large, it will also affect the control plane packets. It can be seen that the above methods can easily lead to packet delays, packet loss, business failures and other problems that are not conducive to the normal operation of the virtual machine.
- the technical problem to be solved by the present invention is to provide a time-sensitive implementation method and system for a virtualized core network, which can make the virtual machine control plane messages not affected by the forwarding plane throughput and ensure the low delay of the control plane messages. , so that the data synchronization between the control plane and the forwarding plane is complete.
- the first aspect of the present invention discloses a time-sensitive implementation method of a virtualized core network.
- Multiple virtualized service network elements of the core network all include backup service network elements.
- the method includes: In response to the interaction abnormal information between the first service network element and the second service network element, obtain the registration request information of the first service network element and the intermediate service network element through the network policy control module; generate a reliable communication policy based on the registration request information; Reliable service communication between the first service network element and the backup second service network element is achieved through the reliable communication strategy.
- a reliable communication strategy is generated based on the registration request information, wherein the reliable communication strategy includes: obtaining the interaction information of the first service network element and the backup second service network element address through the registration request information; The interaction information of the first service network element is sent to the backup second service network element based on the backup second service network element address; the backup second service network element searches whether the context information of the target user exists locally based on the interaction information; if The backup second service network element searches for the local context information of the target user, and then executes the first service network element and the backup second service. Reliable business communication of network elements.
- the intermediate service network element includes a remote database, and generates a reliable communication strategy based on the registration request information, wherein the reliable communication strategy includes: if the backup second service network element searches for the context information of the target user that does not exist locally , obtain the address of the remote database and the address of the standby remote database through the registration request information; the first service network element issues a context information request to the remote database or the standby remote database based on the address of the remote database and the address of the standby remote database; The remote database or backup remote database sends context information to the backup second service network element; reliable service communication between the first service network element and the backup second service network element is performed through the context information.
- the reliable communication strategy includes: if the backup second service network element searches for the context information of the target user that does not exist locally , obtain the address of the remote database and the address of the standby remote database through the registration request information; the first service network element issues a context information request to the remote database or the standby remote database based on the address of the remote database and the address of the standby
- the intermediate service network element includes a unified data management module, and generates a reliable communication strategy based on the registration request information, wherein the reliable communication strategy includes: obtaining the address of the unified data management module through the registration request information;
- the backup second service network element sends registration notification information and subscription information to the unified data management module based on the address of the unified data management module; and executes the first service network element and the backup second service network element through the registration notification information and the subscription information.
- Reliable business communication for business network elements includes: obtaining the address of the unified data management module through the registration request information;
- the backup second service network element sends registration notification information and subscription information to the unified data management module based on the address of the unified data management module; and executes the first service network element and the backup second service network element through the registration notification information and the subscription information.
- the intermediate service network element includes a user port, and a reliable communication strategy is generated based on the registration request information, wherein the reliable communication strategy includes: obtaining the address of the user port through the registration request information; and backup second service The network element delivers takeover notification information to the user port based on the address of the user port; and performs reliable service communication between the first service network element and the backup second service network element through the takeover notification information.
- the method further includes: delivering the reliable communication policy to a time-sensitive switching network card device configured on the server; and using the time-sensitive switching network card device to construct a system for connecting the first service network element and the backup network element. Reliable service communication link of the second service network element.
- the first service network element is an authentication management module
- the second service network element is a service management module
- a time-sensitive system for virtualizing a core network includes: a network policy control module, For responding to the interaction abnormal information between the first service network element and the second service network element, obtaining the registration request information of the first service network element and the intermediate service network element, and generating a reliable communication policy based on the registration request information; through the The reliable communication strategy realizes reliable service communication between the first service network element and the backup second service network element.
- the system further includes: a time-sensitive switching network card device configured on the server, used to obtain the reliable communication policy, and construct a reliable service for connecting the first service network element and the backup second service network element. communication link.
- a time-sensitive switching network card device configured on the server, used to obtain the reliable communication policy, and construct a reliable service for connecting the first service network element and the backup second service network element. communication link.
- a time-sensitive device for a virtualized core network includes: a memory storing executable program code; a processor coupled to the memory; the processor calls the memory
- the executable program code stored in executes the time-sensitive implementation method of the virtualized core network as mentioned above.
- the implementation of the present invention can ensure the low delay of control plane messages between service network elements and avoid service anomalies caused by interaction timeout between service network elements; moreover, the sending and receiving of control plane messages is not affected by changes in the throughput of the forwarding plane and avoids the risk of forwarding errors due to forwarding plane throughput changes. Excessive plane throughput leads to loss of control plane packets, resulting in service anomalies.
- the service network element of the present invention that is, the reliable sending and receiving of messages on the control plane, the occurrence of dual-master service network elements in which control plane messages are lost or delayed due to heartbeat detection or other detection methods is avoided. phenomenon occurs, resulting in system anomalies, thereby ensuring the synchronization integrity of control plane and forwarding plane entry data, and avoiding various system and business anomalies due to incomplete entries.
- Figure 1 is a schematic flow chart of a time-sensitive implementation method for a virtualized core network disclosed in an embodiment of the present invention
- Figure 2 is a flow chart of an existing uplink message processing method after an abnormality of a service network element disclosed in an embodiment of the present invention
- Figure 3 is a flow chart of an uplink message processing method after a time-sensitive service network element of a virtualized core network is abnormal disclosed in an embodiment of the present invention
- Figure 4 is a schematic diagram of a time-sensitive system of a virtualized core network disclosed in an embodiment of the present invention.
- Figure 5 is a schematic structural diagram of a time-sensitive device of a virtualized core network disclosed in an embodiment of the present invention.
- Embodiments of the present invention disclose a time-sensitive implementation method and system for a virtualized core network, which can ensure low latency of control plane messages between service network elements and avoid service anomalies caused by interaction timeout between service network elements; and, The sending and receiving of control plane messages is not affected by changes in the throughput of the forwarding plane, avoiding service abnormalities caused by loss of control plane messages due to excessive forwarding plane throughput.
- the service network element of the present invention that is, the reliable sending and receiving of messages on the control plane, the occurrence of dual-master service network elements in which control plane messages are lost or delayed due to heartbeat detection or other detection methods is avoided. phenomenon occurs, resulting in system anomalies, thereby ensuring the synchronization integrity of control plane and forwarding plane entry data, and avoiding various system and business anomalies due to incomplete entries.
- UE is represented as a user terminal
- (R)AN is represented as a wireless access network
- DN is represented as a data network
- SMF is represented as (Service Management Function--Service Management Function)
- AMF is represented is (AuthenticationManagementFunction)
- NRF is represented by (Network Repository Function--network storage function)
- UDM is represented by (Unified Data Management--unified data management)
- UPF is represented by (User Port Function--user port function )
- the Redis database is represented as a remote database.
- virtualized service network elements are connected through virtual networks.
- each virtualized service network element in order to enhance the reliability of the 5G core network, each virtualized service network element will operate in an active and backup mode, that is, two identical virtualized service network elements will operate at the same time, that is, the service network element itself will (active) and standby service network elements (standby), thus forming a mutually active and standby mode of operation, that is, two mutually virtualized service network elements that back up each other can take over the same user and process the control plane information of the same user.
- FIG. 1 is a schematic flowchart of a time-sensitive implementation method for a virtualized core network disclosed in an embodiment of the present invention.
- the time-sensitive implementation method of the virtualized core network can be applied to the 5G core network system.
- all virtualization devices that support active and backup protection can realize the invention's discovery of abnormalities, registration of interoperable network element information, and configuration of reliable communication. All other methods belong to the scope of protection and application of this embodiment, and the embodiments of the invention do not limit the application of this method.
- the time-sensitive implementation method of the virtualized core network can include the following operations:
- the first service network element is the authentication management module, that is, AMF
- the second service network element is the service management module SMF.
- the main purpose is to process the abnormal information between two interacting service network elements. Therefore, it is first necessary to respond to the interactive abnormal information between the first service network element and the second service network element.
- the abnormal interaction information between the service network element and the second service network element can be manifested as a sudden power outage or network failure after the active SMF has been working for a period of time.
- the response process can be implemented as follows: AMF learns that the active SMF is abnormal, specifically including: the network storage function NRF discovers that the heartbeat between the active SMF and the active SMF is abnormal. At this time, NRF will think that the active SMF is abnormal, because in the previous session When created, AMF has already subscribed to the information of the active SMF. Therefore, after NRF discovers that the active SMF is abnormal, it will send a subscription notification message to AMF. The SMF that notifies AMF that an exception has occurred will obtain the information of the first service network element and the second service network element. Interaction exception information.
- the AMF learning that the active SMF is abnormal may also include: the HTTP module of the AMF network element itself discovers that the HTTP long link between itself and the active SMF is abnormal. This connection is after AMF successfully discovers SMF through NRF, then AMF will establish HTTP persistent connections with SMFs under the same Set. When there is a problem with the persistent connection between AMF and the main SMF, AMF can Knowing this at once helps AMF select a backup SMF as quickly as possible to continue providing session services.
- the user port function UPF can also learn about the active SMF exception, including: The network storage function NRF discovers that the heartbeat between the active SMF and the active SMF is abnormal. At this time, the NRF will think that the active SMF is abnormal. Since UPF has subscribed to the active SMF information when the previous session was created, NRF discovers that the active SMF is abnormal. A subscription notification message will be sent to the UPF, and the SMF, which notifies the AMF that an exception has occurred, has obtained the interaction exception information between the first service network element and the second service network element.
- the UPF learning of the active SMF abnormality may also include: UPF may also perform heartbeat message detection through PFCP (Packet Forwarding Control Protocol) between SMF and UPF. After the heartbeat of the PFCP link between them is abnormal, the UPF considers that the SMF network element is abnormal, that is, it obtains the abnormal interaction information between the first service network element and the second service network element.
- PFCP Packet Forwarding Control Protocol
- the registration request information of the first service network element and the intermediate service network element is obtained through the network policy control module.
- the network policy controller that is, NPCF
- the registration request information specifically includes the source and destination addresses, port numbers, network element types, bandwidth requirements and other information of each service network element. This embodiment does not limit the content of the registration request information.
- the reliable communication strategy includes: obtaining the interaction information of the first service network element and the backup second service network element address through the registration request information, where the interaction information includes uplink information and downlink information; Based on the address of the standby second service network element, the standby second service network element is sent to the standby second service network element; the standby second service network element searches for the local context information of the target user based on the interaction information; if the standby second service network element searches for the local context information of the target user information, then reliable service communication between the first service network element and the backup second service network element is performed.
- the intermediate service network element includes a remote database, and generates a reliable communication strategy based on the registration request information.
- the reliable communication strategy includes: if the backup second service network element searches for the context information of the target user that does not exist locally, obtains the remote communication strategy through the registration request information.
- the intermediate service network element includes a unified data management module, and generates a reliable communication strategy based on the registration request information, where the reliable communication strategy includes: obtaining the address of the unified data management module through the registration request information; the backup second service network element based on the unified data The address of the management module sends registration notification information and subscription information to the unified data management module; reliable service communication between the first service network element and the standby second service network element is performed through the registration notification information and the subscription information.
- the intermediate service network element includes a user port, and generates a reliable communication strategy based on the registration request information.
- the reliable communication strategy includes: obtaining the address of the user port through the registration request information; and the backup second service network element sends the user port address to the user based on the user port address.
- the port delivers takeover notification information; reliable service communication between the first service network element and the backup second service network element is performed through the takeover notification information.
- uplink information is used as an example object of interactive information, and a comparative example is introduced for detailed elaboration.
- Figure 2 it is a flow chart of uplink information processing after an existing service network element is abnormal.
- the process of uplink information in the first service network element AMF needs to be processed by the second service network element SMF.
- the AMF refers to the above exception acquisition method through the NRF or HTTP module to learn that the primary user is the first service network element. If the service network element SMF is abnormal, then the backup second service network element SMF under the same Set is selected and the uplink information is sent to the backup SMF.
- the backup second service network element SMF after receiving the uplink information, the backup second service network element SMF first searches whether there is the context of the user locally. If so, continue the normal business process. If not, first request the main Redis database to obtain context information. If the primary Redis is unavailable, a request context request is sent to the backup Redis database. However, if both the active and standby Redis are unavailable, the overall process fails.
- the active or standby Redis database finds the relevant user context information, it will be returned to the standby SMF, and the standby SMF obtains the user context information. However, if there is no user context information on the context of both the active Redis database and the standby Redis database, the entire process fails.
- the standby second service network element SMF sends a registration request message to the UDM, notifying the UDM of the SMF information served by the current user.
- the backup SMF also needs to send a subscription message to the UDM. If the user subscription information saved on the UDM subsequently changes, the backup SMF will be notified in a timely manner.
- the backup second SMF updates the session message to the UPF, notifying the UPF that the backup SMF will take over the session process.
- the backup second service network element SMF may also be unreachable with the main Radis and the backup Radis, causing the process to fail and causing the service to be suspended.
- the communication between the standby SMF and the UDM is unreachable, causing the registration and subscription requests to fail, causing the service to be suspended.
- the communication between the standby SMF and the UPF is unreachable, and the session message update fails, causing the service to be suspended.
- the present invention generates a reliable communication policy based on the registration request information, as shown in Figure 3, which is a flow chart of uplink message processing after a time-sensitive service network element of the virtualized core network is abnormal.
- the NPCF network policy controller can be represented as a reliable communication link with other business network elements that is guaranteed by a time-sensitive network card.
- the registration request information carried in the HiLinkReq message includes: source address, destination address, source port, destination port, source network element type, destination network element type, bandwidth and other information. specifically:
- the first service network element AMF has uplink information and requires the second service network element SMF processing.
- the first service network element AMF learns that the active SMF is abnormal (the communication link is disconnected or the network element is down) through the NRF or HTTP module, selects the backup SMF under the same Set, and reports it to the network policy controller NPCF sends a request for a reliable communication link application.
- the uplink information is sent to the backup second service network element SMF.
- the standby second service network element SMF first searches whether there is a context of the user locally. If there is, continue to process the business process normally, if not, proceed to the following step 3.
- the second service network element SMF needs to interact with the main Redis database, backup Redis database, UDM, and UPF, so it can send requests for reliable communication link applications to the network policy controller NPCF respectively.
- the first service network element SMF first requests the active Redis to obtain context information. If the primary Redis is unavailable, a request context request is sent to the backup Redis.
- the active or standby Redis finds the relevant user context information and returns it to the standby SMF.
- the standby second service network element SMF obtains the user context information.
- the standby second service network element SMF sends a registration request message to the UDM, notifying the UDM of the SMF information served by the current user.
- the standby second service network element SMF also needs to send a subscription message to the UDM. If the user subscription information saved on the UDM subsequently changes, the standby SMF will be notified in a timely manner.
- UDM returns the results of registration and subscription.
- the standby second service network element SMF updates the session message to the UPF, notifying the UPF that the standby second service network element SMF takes over the session process.
- UPF returns the update result, and the entire uplink information process ends.
- the virtual network uses shared hardware resources and adopts a best-effort forwarding mode, which is not reliable communication.
- heartbeat detection of the active service network element fails, it is most likely due to congestion or anomalies in the virtual network that cause detection packets to be lost. Therefore, before interacting with backup service network elements, apply for reliable communication link resources first to ensure reliable communication of control information between network elements, avoid user service failures caused by sudden congestion and abnormalities in the virtual network, and improve user experience. quality.
- the reliable communication policy is also delivered to a time-sensitive switching network card device configured on the server, and a reliable service for connecting the first service network element and the backup second service network element is constructed through the time-sensitive switching network card device. communication link.
- This time-sensitive switching network card device can replace the original server PCIE network card.
- the network card has the capabilities of frame preemption and traffic shaping of time-sensitive network technology.
- the uplink process is initiated by the user terminal (UE) to the service network element of the core network; the downlink process is initiated by the core network
- the service network element initiates to the user (UE), and the implementation of the downlink process is a similar process implemented by the uplink process in this embodiment, which will not be described in detail here.
- FIG. 4 is a schematic diagram of a time-sensitive system of a virtualized core network disclosed in an embodiment of the present invention.
- the time-sensitive system of the virtualized core network can be applied to the 5G core network system.
- Multiple virtualized service network elements of the core network include backup service network elements.
- the time-sensitive implementation system of the virtualized core network may include:
- the network policy control module 1 is configured to respond to the abnormal interaction information between the first service network element and the second service network element, obtain the registration request information of the first service network element and the intermediate service network element, and generate a reliable communication policy based on the registration request information. , realizing reliable service communication between the first service network element and the backup second service network element through a reliable communication strategy.
- the network policy controller that is, NPCF, can be used by service network elements to register requests for key information communication guarantee resources.
- the registration request information specifically includes the source and destination addresses, port numbers, network element types, bandwidth requirements and other information of each service network element. This embodiment does not limit the content of the registration request information.
- the time-sensitive switching network card device 2 is configured on the server and is used to obtain a reliable communication policy and build a reliable service communication link for connecting the first service network element and the backup second service network element.
- This time-sensitive switching network card device can replace the original server PCIE network card.
- the network card has the capabilities of frame preemption and traffic shaping of time-sensitive network technology.
- Figure 5 is a schematic structural diagram of a time-sensitive device for a virtualized core network disclosed in an embodiment of the present invention.
- the time-sensitive device of the virtualized core network described in Figure 5 can be applied in the 5G core network system, and the embodiment of the present invention does not limit the application system of the time-sensitive device of the virtualized core network.
- the device may include:
- Memory 501 storing executable program code
- processor 502 coupled to memory 501;
- the processor 502 calls the executable program code stored in the memory 501 for executing the described time-sensitive implementation method of a virtualized core network.
- An embodiment of the present invention discloses a computer-readable storage medium that stores a computer program for electronic data exchange, wherein the computer program causes the computer to execute the described time-sensitive implementation method of a virtualized core network.
- An embodiment of the present invention discloses a computer program product.
- the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause the computer to execute the described virtualization core network time. Sensitive implementation method.
- modules described as separate components may or may not be physically separated.
- the components shown as modules may or may not be physical modules, that is, they may be located in a place, or can be distributed to multiple network modules. You can select some or all of the modules according to actual needs to implement this implementation.
- the purpose of the example program Persons of ordinary skill in the art can understand and implement the method without any creative effort.
- each embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, it can also be implemented by hardware.
- the above technical solutions can be embodied in the form of software products in essence or in part that contribute to the existing technology.
- the computer software products can be stored in computer-readable storage media, and the storage media includes read-only memories.
- Read-Only Memory ROM
- RAM Random Access Memory
- PROM Programmable Read-only Memory
- EPROM Erasable Programmable Read Only Memory
- OTPROM One-time Programmable Read-Only Memory
- EEPROM Electronically Erasable Programmable Read-Only Memory
- CD-ROM Compact Disc Read -Only Memory
- time-sensitive implementation method and system of a virtualized core network disclosed in the embodiments of the present invention are only the preferred embodiments of the present invention and are only used to illustrate the technical solutions of the present invention. Limitation thereof; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that they can still modify the technical solutions recorded in the foregoing embodiments, or modify some of the technical features. Equivalent substitutions; and these modifications or substitutions do not deviate from the essence of the corresponding technical solutions from the spirit and scope of the technical solutions of the various embodiments of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Sont divulgués un procédé de mise en œuvre sensible au facteur temps pour un réseau central virtualisé. Une pluralité d'éléments de réseau de service virtualisés d'un réseau central comprennent des éléments de réseau de service de sauvegarde. Le procédé consiste à : en réponse à des informations d'exception d'interaction entre un premier élément de réseau de service et un second élément de réseau de service, obtenir les informations de demande d'enregistrement du premier élément de réseau de service et d'un élément de réseau de service intermédiaire au moyen d'un module de commande de politique de réseau ; générer une politique de communication fiable d'après les informations de demande d'enregistrement ; et mettre en œuvre une communication de service fiable entre le premier élément de réseau de service et un second élément de réseau de service de secours au moyen de la politique de communication fiable. Par conséquent, une faible latence d'un message de plan de commande entre des éléments de réseau de service peut être garantie, ce qui permet d'empêcher une exception de service provoquée par une temporisation d'interaction entre les éléments de réseau de service ; de plus, l'envoi et la réception du message de plan de commande ne sont pas affectés par les changements de débit d'un plan de transfert, ce qui permet d'éviter une exception de service provoquée par la perte du message de plan de commande en raison d'un débit excessivement important du plan de transfert.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210919160.0 | 2022-08-02 | ||
CN202210919160.0A CN114978910B (zh) | 2022-08-02 | 2022-08-02 | 一种虚拟化核心网的时间敏感实现方法及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024027217A1 true WO2024027217A1 (fr) | 2024-02-08 |
Family
ID=82969682
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/090278 WO2024027217A1 (fr) | 2022-08-02 | 2023-04-24 | Procédé et système de mise en œuvre sensible au facteur temps pour un réseau central virtualisé |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN114978910B (fr) |
WO (1) | WO2024027217A1 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114978910B (zh) * | 2022-08-02 | 2022-10-25 | 广东省新一代通信与网络创新研究院 | 一种虚拟化核心网的时间敏感实现方法及系统 |
CN118234053A (zh) * | 2022-12-12 | 2024-06-21 | 中兴通讯股份有限公司 | 语音业务的建立方法、网络设备及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112073998A (zh) * | 2019-06-10 | 2020-12-11 | 三星电子株式会社 | 提高无线通信系统中的服务可靠性的方法和装置 |
CN113422694A (zh) * | 2021-06-08 | 2021-09-21 | 腾讯科技(深圳)有限公司 | 通信方法、装置、介质及电子设备 |
WO2022083281A1 (fr) * | 2020-10-22 | 2022-04-28 | 中兴通讯股份有限公司 | Procédé et système de transmission de message, dispositif électronique, et support de stockage |
CN114828165A (zh) * | 2021-01-18 | 2022-07-29 | 华为技术有限公司 | 一种通信方法及通信装置 |
CN114978910A (zh) * | 2022-08-02 | 2022-08-30 | 广东省新一代通信与网络创新研究院 | 一种虚拟化核心网的时间敏感实现方法及系统 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008055239A2 (fr) * | 2006-10-31 | 2008-05-08 | Qualcomm Incorporated | Requête de ressources de liaison montante fiable |
CN109995845B (zh) * | 2018-01-03 | 2023-12-26 | 中兴通讯股份有限公司 | 一种控制面资源迁移的实现方法、装置及网络功能实体 |
CN114339847A (zh) * | 2020-09-30 | 2022-04-12 | 华为技术有限公司 | 通信方法及装置 |
CN113382432B (zh) * | 2021-08-13 | 2021-11-23 | 新华三技术有限公司 | 一种5g网络服务提供方法、装置及设备 |
CN114339854A (zh) * | 2022-03-01 | 2022-04-12 | 中兴通讯股份有限公司 | 会话管理方法、通信设备及存储介质 |
-
2022
- 2022-08-02 CN CN202210919160.0A patent/CN114978910B/zh active Active
-
2023
- 2023-04-24 WO PCT/CN2023/090278 patent/WO2024027217A1/fr unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112073998A (zh) * | 2019-06-10 | 2020-12-11 | 三星电子株式会社 | 提高无线通信系统中的服务可靠性的方法和装置 |
WO2022083281A1 (fr) * | 2020-10-22 | 2022-04-28 | 中兴通讯股份有限公司 | Procédé et système de transmission de message, dispositif électronique, et support de stockage |
CN114828165A (zh) * | 2021-01-18 | 2022-07-29 | 华为技术有限公司 | 一种通信方法及通信装置 |
CN113422694A (zh) * | 2021-06-08 | 2021-09-21 | 腾讯科技(深圳)有限公司 | 通信方法、装置、介质及电子设备 |
CN114978910A (zh) * | 2022-08-02 | 2022-08-30 | 广东省新一代通信与网络创新研究院 | 一种虚拟化核心网的时间敏感实现方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN114978910A (zh) | 2022-08-30 |
CN114978910B (zh) | 2022-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10171567B2 (en) | Load balancing computer device, system, and method | |
WO2024027217A1 (fr) | Procédé et système de mise en œuvre sensible au facteur temps pour un réseau central virtualisé | |
US7969989B2 (en) | High performance ethernet networking utilizing existing fibre channel arbitrated loop HBA technology | |
US11734138B2 (en) | Hot standby method, apparatus, and system | |
EP3337097B1 (fr) | Procédé et dispositif de mise à niveau d'éléments de réseau | |
WO2020001442A1 (fr) | Procédé de traitement de données et dispositif associé | |
US9231826B2 (en) | Zero configuration of a virtual distributed device | |
WO2014101531A1 (fr) | Procédé et dispositif pour la création d'une station de base virtuelle | |
US11153269B2 (en) | On-node DHCP implementation for virtual machines | |
WO2020114017A1 (fr) | Procédé et appareil d'échange de trafic de centre de données, dispositif et support d'informations | |
WO2020057445A1 (fr) | Système, procédé et dispositif de communication | |
WO2021129754A1 (fr) | Procédé et dispositif de traitement de messages et support de stockage | |
CN113709220B (zh) | 虚拟负载均衡器的高可用实现方法、系统及电子设备 | |
US10931601B2 (en) | Method and apparatus for conditional broadcasting of network configuration data | |
EP3038296A1 (fr) | Procédé de synchronisation d'informations d'état d'éléments de pool, registre de pool et élément de pool | |
CN113839862A (zh) | Mclag邻居之间同步arp信息的方法、系统、终端及存储介质 | |
CN110855488A (zh) | 一种虚拟机接入方法及装置 | |
WO2020181733A1 (fr) | Procédé d'intercommunication de centre de données multiples basé sur vpc et dispositif associé | |
CN114422427A (zh) | 一种流量均衡方法、装置、电子设备和存储介质 | |
EP3627766B1 (fr) | Procédé et système de commutation entre bng active et bng de remplacement | |
EP4184822A1 (fr) | Procédé et appareil de maintien en vie d'un terminal d'utilisateur | |
WO2022193885A1 (fr) | Procédé de traitement d'accès d'utilisateur et dispositif associé | |
CN117499293B (zh) | 路由表维护方法、路径选择方法、设备、系统及存储介质 | |
US11947431B1 (en) | Replication data facility failure detection and failover automation | |
WO2023197815A1 (fr) | Procédé et dispositif de réception et d'émission de messages |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23848928 Country of ref document: EP Kind code of ref document: A1 |