CN112752326B - Network slice management method and device - Google Patents
Network slice management method and device Download PDFInfo
- Publication number
- CN112752326B CN112752326B CN201911046779.XA CN201911046779A CN112752326B CN 112752326 B CN112752326 B CN 112752326B CN 201911046779 A CN201911046779 A CN 201911046779A CN 112752326 B CN112752326 B CN 112752326B
- Authority
- CN
- China
- Prior art keywords
- network slice
- nwdaf
- request
- creation
- update
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A network slice management method and device are used for optimizing management of end-to-end network slices. The method comprises the following steps: the NWDAF generates a triggering condition of a network slice operation request and corresponding operation parameters of an end-to-end network slice, and generates a first operation strategy; if the NWDAF determines that the acquired network data meet the triggering condition in the first operation strategy, a network slice operation request is generated according to the operation parameters of the end-to-end network slice in the first operation strategy; and further, instructing a proxy node to operate the end-to-end network slice according to the operation parameters of the end-to-end network slice. By the method, the control plane can directly operate the network slicing without indicating the network slicing operation one by the management plane, and the management efficiency and accuracy of the end-to-end network slicing are improved.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for managing network slices.
Background
The 5th-generation, 5G mobile communication system introduces a network slicing technique to cope with the difference of network performance requirements of different communication services. In the related art, a slice that can provide AN end-to-end network service from AN Access Network (AN) to a Core Network (CN) for a terminal is referred to as AN end-to-end network slice. Hereinafter, AN and CN are collectively referred to as a subnet. Where an end-to-end network slice may include a subnet slice, such as a core network slice, an access network slice, and so on.
In the prior art, an end-to-end network slice is managed by a Network Slice Management Function (NSMF), for example, the end-to-end network slice may be created, updated, or destroyed by the NSMF. Taking the creation of the end-to-end network slice as an example, the NSMF may respectively send a network slice creation request to a Network Slice Subnet Management Function (NSSMF) deployed in the subnet, and the NSSMF in each subnet may respectively create a subnet slice according to the network slice creation request, thereby implementing the creation of the end-to-end network slice.
In the prior art, in the definition of the third generation partnership project (3GPP) protocol, standards such as an interface for managing network slices through a management plane are difficult to be agreed, so that the current management system of the network slices is too complex, and the management difficulty of the network slices is increased. In addition, the implementation details of the management plane are not known in the cross-domain end-to-end network slice management, and the NSSMF decomposes the network slice requirements for each sub-network control plane through the NSMF, which may cause inconsistent decisions to be made when the NSSMF in each sub-network manages the sub-network slices.
Disclosure of Invention
The embodiment of the application provides a network slice management method and device, which are used for optimizing management of an end-to-end network slice.
The embodiment of the application provides the following specific technical scheme:
in a first aspect, an embodiment of the present application provides a network slice management method, including: the NSMF generates a first operating policy for the end-to-end network slice and sends the first operating policy to the NSSMF. The first operation strategy comprises a triggering condition for a network data analysis function (NWDAF) to generate a network slice operation request and corresponding operation parameters of the end-to-end network slice; the NWDAF supports the operation function of network slicing; and the network slice operation request is used for indicating the proxy node to operate the end-to-end network slice according to the operation parameters of the end-to-end network slice.
By the method, the NSMF generates the first operation strategy and sends the first operation strategy to the NWDAF, so that the NSMF manages the strategy of the network slice, the NWDAF can accurately and quickly generate the operation request of the network slice according to the first operation strategy of the NSMF and the network state, and further the optimal management of the network slice is realized. The problem of inconsistent decision or poor real-time performance caused by the fact that the management plane needs to generate the operation requests of the network slices one by one according to different standards in the prior art is solved.
The NSSMF receives a first operation policy from a network slice management function NSMF; NSSMF sends the first operating policy to the NWDAF.
By the method, the NSSMF forwards the first operation strategy of the NSMF to the NWDAF, so that the NSMF manages the strategy of the network slice, the NWDAF can accurately and quickly generate the operation request of the network slice according to the first operation strategy of the NSMF and the network state, and further the optimal management of the network slice is realized. The problem of inconsistent decision or poor real-time performance caused by the fact that NSSMF needs to issue operation requests of network slices one by one aiming at core network equipment, access network equipment or transmission network equipment in the prior art is solved.
The NWDAF receiving a first operating policy from the NSSMF; and if the NWDAF determines that the acquired network data meet the trigger condition, generating the network slice operation request comprising the operation parameters of the end-to-end network slice. The NWDAF sends the network slicing operation request to the proxy node.
By the method, the NWDAF analyzes the acquired network data simultaneously according to the received first operation strategy, the requirements of the end-to-end network slice on different sub-domains can be comprehensively, reasonably and accurately decomposed, the trigger condition met by the current network environment is determined, then the network slice operation request is correspondingly generated, and further the operation of the proxy node on the network slice is triggered, so that the operation of directly indicating the network slice by the control plane is realized, the NWDAF does not need to upload the acquired network data to the management plane, the network slice operation request is issued to the proxy node after the management plane makes a decision, and the real-time performance of the network slice is improved. In addition, the control plane directly determines whether to generate the network slice operation request, so that the problem that the management plane cannot issue an accurate network slice operation request due to unclear requirements of an end-to-end network slice on different sub-domains because standards such as an interface for performing network slice management on the management plane are inconsistent is solved.
The proxy node receives a network slicing operation request from the NWDAF; and the proxy node operates the end-to-end network slice according to the operation parameters of the end-to-end network slice in the network slice operation request.
It should be noted that the proxy node may be a newly added node of the control plane in the CN, may be integrated on the NSSF in the CN, or may be integrated on a device that can execute a network slicing operation request, such as a default access and mobility management entity (AMF). By the method, the proxy node can execute the network slicing operation request according to the network slicing operation request of the NWDAF, and can realize the end-to-end network slicing operation without the signaling interaction with the management plane, thereby ensuring the consistency of the decisions of the AN side and the CN side and effectively improving the real-time performance of the network slicing operation.
In the embodiment of the present application, how to implement the creation of the end-to-end network slice is described below. In one possible design, the first operation policy specifically includes a first trigger condition of the NWDAF-generated network slice creation request, and a first creation parameter of a corresponding end-to-end network slice.
If the NWDAF determines that the acquired network data meet the first trigger condition, a creation request of a first end-to-end network slice comprising the first creation parameter is generated; the creation request of the first end-to-end network slice is used for instructing the proxy node to create the end-to-end network slice according to the first creation parameter. The creation request of the first end-to-end network slice is used to instruct the proxy node to create the end-to-end network slice according to a first creation parameter.
The NSMF does not need to send a network slice operation request (for example, a network slice creation request) to AN access network device in the AN through the NSSMF of the management plane, or send a network slice operation request to a transmission network device in the TN, but generates a first end-to-end network slice creation request according to whether network data acquired by the NWDAF satisfies the first trigger condition, so as to implement creation of AN end-to-end network slice.
Wherein the end-to-end network slice comprises one or more of: core network slicing, access network slicing and transmission network slicing. In a scenario where a core network slice creation request needs to be generated, the NWDAF may obtain implementation details of a core network control plane according to core network slice information to which the NWDAF belongs, and then generate a first creation request of a core network slice in combination with acquired network data. And then, the proxy node creates the core network slice according to the creation request of the first end-to-end network slice. In a scenario that AN access network slice needs to be created, the proxy node may generate a first creation request of the access network slice according to a first creation parameter in the creation request of the first end-to-end network slice, and send the first creation request of the access network slice to the access network device in the AN, so that the access network device or the transmission network device at the AN side knows a decision made by the CN side, and further, the access network device or the transmission network device at the AN side may refer to the decision made by the CN side, and make a decision consistent with the CN side. Correspondingly, the TN may refer to AN implementation manner of AN, and the proxy node generates and sends the creation request of the transmission network slice to the transmission network device according to the first creation parameter in the creation request of the end-to-end network slice, so that consistency of a CN side decision is achieved, and instantaneity of network slice creation is improved.
In one possible design, the proxy node obtains a result of creating the end-to-end network slice; the creation result of the end-to-end network slice includes one or more of: a creation result of a core network slice, a creation result of the access network slice from the access network device, and a creation result of the transmission network slice from the transmission network device.
The proxy node sends a creation notification to the NWDAF; the creation notification includes a creation result of the end-to-end network slice. In a scenario where an access network slice needs to be created, because there are many access network nodes, according to a possible implementation manner, the proxy node may determine whether to generate a creation notification after receiving a creation result of all or part of the access network slices. And if the creation notification is determined to need to be generated, sending the creation result of the access network slice to the NWDAF. Through the method, the agent node can send the creation result of the end-to-end slice to the NWDAF to enable the NWDAF to know the creation result of the end-to-end network slice, and real-time management of the end-to-end network slice is achieved.
In one possible design, the NWDAF receives a creation notification from a proxy node, the creation notification including a creation result of the end-to-end network slice. Through the method, the agent node informs the NWDAF of the creation result of the end-to-end network slice, so that the NWDAF can know the decision made by the access network or the transmission network equipment, and further realize the unified management of the end-to-end network slice.
Further, the NWDAF sends the creation notification to the NSSMF. Through the method, the NWDAF can collect the creation results of the end-to-end slices, determine whether to send a creation notification to the NSMF according to the collection result, and notify the NSSMF of the creation results of the end-to-end network slices through the NWDAF, so that core network equipment on AN side, access network equipment on the side or transmission network equipment on the side can acquire the creation results of the end-to-end network slices on the side of CN, and the equipment on the side of AN can unify the decision of the network slices.
In one possible design, NSSMF receives a create notification from the NWDAF. NSSMF sends the create notification to the NSMF.
Further, the NSMF may update the operation policy according to the creation result of the end-to-end network slice, so as to achieve better management of the control plane on the created end-to-end network slice.
A possible design, NSMF receives a creation notification from the NSSMF, the creation notification including a creation result of the end-to-end network slice; the NSMF updates the first operation strategy into a second operation strategy according to the creation notice; the second operation strategy comprises a second trigger condition for generating a network slice establishing request and a second establishing parameter of a corresponding end-to-end network slice; the second trigger condition is obtained by updating the first trigger condition according to the creation notification, and the second creation parameter is obtained by updating the first creation parameter according to the creation notification. The NSMF sends the second operating policy to the NSSMF.
By the method, the NSMF receives the creation notification from the NWDAF, so that the NSMF synchronizes the creation result of the network slice of the control plane, the core network equipment at the AN side, the access network equipment at the AN side or the transmission network equipment at the AN side can acquire the creation result of the end-to-end network slice at the CN side, and the equipment at the AN side can unify the decision of the network slice; the NSMF may update an operation policy according to a creation result of an end-to-end network slice, for example, a creation policy of a newly added end-to-end network slice, so as to implement management optimization of a management plane on the network slice, and further enable a control plane to better manage the network slice after the end-to-end network slice is created.
The NSSMF receives a second operating policy from the NSMF, and transmits the second operating policy to the NWDAF. The NWDAF receives a second operating policy from the NSSMF. Further, if the NWDAF determines that the acquired network data meets the second trigger condition, generating a creation request of a second end-to-end network slice including the second creation parameter; the creation request of the second end-to-end network slice is used for instructing the proxy node to recreate the end-to-end network slice according to the second creation parameter.
By the method, NSSMF receives the creation notification from the NWDAF, so that the NSMF synchronizes the creation result of the network slice of the control plane, and the core network equipment at the AN side, the access network equipment at the AN side or the transmission network equipment at the AN side can acquire the creation result of the end-to-end network slice at the CN side, so that the equipment at the AN side can unify the decision of the network slice; the NSMF may update the operation policy according to the creation result of the end-to-end network slice, and send a creation notification to the NWDAF through the NSSMF, so as to realize management optimization of the management plane on the network slice, and further enable the control plane to better manage the network slice after the end-to-end network slice is created. The problem of inconsistent decision or poor real-time performance caused by the fact that NSSMF needs to issue operation requests of network slices to core network equipment, access network equipment or transmission network equipment one by one in the prior art is solved.
In the embodiment of the present application, how to implement the update of the end-to-end network slice is described below. In one possible design, the first operation policy specifically includes a third trigger condition for the NWDAF to generate a network slice update request, and a first update parameter of a corresponding end-to-end network slice.
If the NWDAF determines that the acquired network data meet the third trigger condition, an updating request of a first end-to-end network slice comprising the first updating parameter is generated; the update request for the first end-to-end network slice is used to instruct the proxy node to update the end-to-end network slice according to the first update parameter.
Because the network may be dynamically changed in real time, after NWDAF dynamic analysis, the network slice may need to be updated, at this time, a network slice update request may be generated according to the first operation policy, and relevant processing through the management plane is not needed, so that the problem that the update request of the corresponding network slice may not be issued due to non-uniform management plane standards is avoided, and the management performance is effectively improved.
The NWDAF may determine whether a first update request for a core network slice needs to be generated according to core network slice information to which the NWDAF belongs, in combination with acquired network data. In a scenario of a first update request requiring generation of a core network slice, the first update parameters may include parameters required by the proxy node to generate the core network slice. Similarly, the NWDAF may determine whether a first update request for an access network slice needs to be generated according to the acquired network data and the first trigger condition. In a scenario where a first update request for AN access network slice needs to be generated, the NWDAF may include, in the first update parameter, a parameter required by the proxy node to generate the first update request for the access network slice, and further, the proxy node generates, according to the first update parameter, the first update request for sending the network slice to the access network device in the AN. Similarly, the NWDAF may determine whether the first update request for the transmission network slice needs to be generated according to the acquired network data and the first trigger condition. In a scenario where a first update request of a transport network slice needs to be generated, the NWDAF may include, in the first update parameter, a parameter required by the proxy node to generate the first update request of the transport network slice, and further, the proxy node generates and sends the first update request of the transport network slice to the transport network device according to the first update parameter.
By the method, the proxy node updates the end-to-end network slice according to the update request of the first end-to-end network slice sent by the NWDAF, for example, the core network slice is updated, or the update request of the access network slice is sent to the access network equipment, or the update request of the transmission network slice is sent to the transmission network equipment, so that the consistency of the decision of the CN side is realized, and the real-time performance of updating the network slice is improved.
In one possible design, the broker node obtains the update result of the end-to-end network slice. Wherein the update result of the end-to-end network slice comprises one or more of the following items: an update result of the core network slice, an update result of the access network slice from the access network device, and an update result of the transmission network slice from the transmission network device.
In one possible design, a broker node sends an update notification to the NWDAF, the update notification including an update result of the end-to-end network slice. The proxy node may summarize the update result of the end-to-end slice, and determine whether an update notification needs to be sent to the NWDAF according to the summarized result.
In one possible design, the NWDAF receives an update notification from a proxy node, the update notification including an update result of the end-to-end network slice. The NWDAF may summarize the update result of the end-to-end slice, and determine whether an update notification needs to be sent to the NSMF according to the summarized result. By the method, the NWDAF receives the updating result of the access network equipment CN side or the transmission network equipment CN side sent by the proxy node, so that the NWDAF can acquire the decision made by the access network CN side or the transmission network equipment CN side, further can unify the decision of the network slices of the core network, the access network or the transmission network, and realize the unified management of the end-to-end network slices.
In one possible design, the NWDAF sends the update notification to the NSSMF. NSSMF receives an update notification from the NWDAF, which NSSMF sends to the NSMF.
By the method, NSSMF receives the update notification from NWDAF, realizes the synchronization of NSMF on the update result of the network slice of the control plane, and enables the core network equipment at AN side, the access network equipment at AN side or the transmission network equipment at AN side to acquire the update result of the end-to-end network slice at CN side, so that the equipment at AN side can unify the decision of the network slice.
Further, the NSMF may update the operation policy according to the update result of the end-to-end network slice, so as to achieve better management of the control plane on the created end-to-end network slice.
In one possible design, the NSMF receives an update notification from the NSSMF, and the NSMF updates the first operating policy to a third operating policy according to the update notification; the third operation strategy comprises a fourth trigger condition of the network slice updating request generated by the NWDAF and a second updating parameter of a corresponding end-to-end network slice; the fourth trigger condition is obtained by updating the third trigger condition according to the update notification, and the second update parameter is obtained by updating the first update parameter according to the update notification; the NSMF sends the third operating policy to the NSSMF.
In one possible design, NSSMF receives a third operating strategy from the NSMF; and send the third operational policy to the NWDAF. The NWDAF receives a third operating policy from the NSSMF.
Further, if the NWDAF determines that the acquired network data meets the fourth trigger condition, generating an update request of a second end-to-end network slice including the second update parameter; the update request of the second end-to-end network slice is used for instructing the proxy node to renew the end-to-end network slice according to the second update parameter.
By the method, the NSMF receives the update notification from the NWDAF, so that the NSMF synchronizes the update result of the network slice of the control plane, the core network equipment at the AN side, the access network equipment at the AN side or the transmission network equipment at the AN side can acquire the update result of the end-to-end network slice at the CN side, and the equipment at the AN side can unify the decision of the network slice; the NSMF can update the operation strategy according to the update result of the end-to-end network slice, and the NSMF issues the updated operation strategy to the NWDAF so as to realize better management of the network slice after the end-to-end network slice is updated by the control surface.
In the embodiment of the present application, how to implement destruction of an end-to-end network slice is described below. The NWDAF may need to destroy the network slices according to the requirements of the network and the user, and at this time, a network slice destruction request may be generated according to the first operation policy, and the network slice destruction request does not need to be issued through the management plane, so that the problem that the corresponding network slice destruction request may not be issued due to non-uniform standards of the management plane is avoided, and the management performance and the management efficiency are effectively improved. In one possible design, the first operation policy specifically includes a fifth trigger condition for the NWDAF to generate a network slice destruction request, and a first destruction parameter of a corresponding end-to-end network slice.
If the NWDAF determines that the acquired network data meet the fifth trigger condition, a destruction request of a first end-to-end network slice comprising the first destruction parameter is generated; the destroy request of the first end-to-end network slice is used for indicating the agent node to destroy the end-to-end network slice according to the first destroy parameter. And the NWDAF determines whether the core network slices need to be destroyed or not by combining the acquired network data according to the core network slice information to which the NWDAF belongs. In a scene that the core network slices need to be destroyed, the NWDAF may carry the parameter for destroying the core network slices in the first destruction parameter, and then the proxy node destroys the core network slices according to the first destruction parameter. In the same way, in a scene where a destruction request of the access network slice needs to be generated, the NWDAF carries a parameter for generating a first destruction request of the access network slice in the first destruction parameter, and further, the proxy node may generate the first destruction request of the access network slice according to the first destruction parameter, and sends the first destruction request of the network slice to the access network device in the AN through the proxy node in the CN. Similarly, in a scenario where a destruction request for the transmission network slice needs to be generated, the NWDAF may carry the parameter for generating the first destruction request for the transmission network slice in the first destruction parameter, and then the proxy node generates the first destruction request for the transmission network slice according to the first destruction parameter, and sends the first destruction request for the network slice to the transmission network device in the AN.
In one possible design, the agent node obtains the destruction result of the end-to-end network slice; the destruction result of the end-to-end network slice comprises one or more of the following items: the destruction result of the core network slice, the destruction result of the access network slice from the access network equipment, and the destruction result of the transmission network slice from the transmission network equipment; and the agent node sends a destruction notification to the NWDAF, wherein the destruction notification comprises a destruction result of the end-to-end network slice.
In one possible design, the NWDAF receives a destruction notification from a proxy node, the destruction notification comprising a result of destruction of the end-to-end network slice. Further, the NWDAF may summarize the destruction results of the end-to-end slices, and determine whether to send a destruction notification to the NSMF according to the summarized results.
One possible design, the NWDAF sends the destruction notification to the NSSMF; the NSSMF receives a destruction notification from the NWDAF and sends the destruction notification to the NSMF.
By the method, the NSSMF end-to-end network slice destruction result is informed by the NWDAF, so that core network equipment on AN AN side, access network equipment on the AN side or transmission network equipment on the AN side can acquire the destruction result of the end-to-end network slice on the CN side, and further the equipment on the AN side can unify the network slice decision.
Further, the NSMF may update the operation policy according to the destruction result of the end-to-end network slice. For example, a creation policy of the end-to-end network slice is newly added, so that the control plane can better manage the network slice after the end-to-end network slice is destroyed.
One possible design, the NSMF receiving a destruction notification from the NSSMF, the update notification comprising a result of destruction of the end-to-end network slice; the NSMF updates the first operation strategy into a fourth operation strategy according to the destruction notice; the fourth operation strategy comprises a sixth trigger condition of the network slice destroying request generated by the NWDAF and a second operation parameter of the corresponding end-to-end network slice; the sixth triggering condition is obtained by updating the fifth triggering condition according to the destruction notification, and the second operation parameter is obtained by updating the first destruction parameter according to the destruction notification; the NSMF sends the fourth operating policy to the NSSMF.
It should be noted that the fourth operation policy may be a creation policy, an update policy, or a destruction policy. The second operation parameter may be a destruction parameter, a creation parameter, or an update parameter, and correspondingly, the NWDAF may generate, according to the received fourth operation policy, a network slice operation request including the second operation parameter of the end-to-end network slice, which may be a creation request, an update operation, or a destruction operation, when it is determined that the acquired network data satisfies the sixth trigger condition.
In one possible design, NSSMF receives a fourth operating policy from the NSMF and sends the fourth operating policy to NWDAF. The NWDAF receives the fourth operational policy and updates the operational policy.
Further, if the NWDAF determines that the acquired network data meets the sixth trigger condition, generating an operation request of a second end-to-end network slice including the second operation parameter; the operation request of the second end-to-end network slice is used for instructing the proxy node to operate the end-to-end network slice again according to the second operation parameter.
In a second aspect, a network slice management apparatus is provided, which has a function of implementing NWDAF behavior of a network data analysis function in any one of the possible designs of the first aspect and the first aspect described above. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above-described functions.
In one possible design, the device may be a chip or an integrated circuit.
In one possible design, the apparatus includes a memory storing a set of programs and a processor for executing the programs stored in the memory, and when the programs are executed, the apparatus may perform the method described in any one of the possible designs of the first aspect and the first aspect.
In one possible design, the apparatus further includes a transceiver for communicating between the apparatus and other network elements.
In one possible design, the apparatus may be a network data analysis function.
In a third aspect, a network slice management apparatus is provided, which has a function of implementing NSSMF behavior in any one of the possible designs of the first aspect and the first aspect. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above-described functions.
In one possible design, the device may be a chip or an integrated circuit.
In one possible design, the apparatus includes a memory storing a set of programs and a processor for executing the programs stored in the memory, and when the programs are executed, the apparatus may perform the method described in any one of the possible designs of the first aspect and the first aspect.
In one possible design, the apparatus further includes a transceiver for communicating between the apparatus and other network elements.
In one possible design, the device may be NSSMF.
In a fourth aspect, a network slice management apparatus is provided, which has a function of implementing the NSMF behavior in any one of the possible designs of the first aspect and the first aspect described above. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above-described functions.
In one possible design, the device may be a chip or an integrated circuit.
In one possible design, the apparatus includes a memory storing a set of programs and a processor for executing the programs stored in the memory, and when the programs are executed, the apparatus may perform the method described in any one of the possible designs of the first aspect and the first aspect.
In one possible design, the apparatus further includes a transceiver for communicating between the apparatus and other network elements.
In one possible design, the device may be an NSMF.
In a fifth aspect, a network slice management apparatus is provided, which has a function of implementing the proxy node behavior in any one of the possible designs of the first aspect and the first aspect. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above-described functions.
In one possible design, the device may be a chip or an integrated circuit.
In one possible design, the apparatus includes a memory storing a set of programs and a processor for executing the programs stored in the memory, and when the programs are executed, the apparatus may perform the method described in any one of the possible designs of the first aspect and the first aspect.
In one possible design, the apparatus further includes a transceiver for communicating between the apparatus and other network elements.
In one possible design, the device may be a proxy node, which may be a newly added node in the CN or may be integrated on the NSSF in the CN.
A sixth aspect provides a chip, which is connected to a memory or which comprises a memory for reading and executing a software program stored in said memory, so as to implement the method according to any one of the possible designs of the first aspect and the first aspect.
In a seventh aspect, there is provided a communication system comprising the apparatus of any two of the fifth to sixth aspects and above.
In an eighth aspect, a computer storage medium is provided that stores a computer program comprising instructions for performing the aspects described above and any possible in-design method of the aspects.
In a ninth aspect, there is provided a computer program product which, when read and executed by a computer, causes the computer to perform the method as described in the aspects and any possible design of aspects.
Drawings
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a system architecture according to an embodiment of the present application;
FIG. 3a is a schematic diagram of a system architecture according to an embodiment of the present application;
FIG. 3b is a system architecture diagram according to an embodiment of the present application;
fig. 4 is a flowchart of a network slice management method according to an embodiment of the present application;
fig. 5 is a flowchart of a network slice management method according to an embodiment of the present application;
fig. 6 is a flowchart of a network slice management method according to an embodiment of the present application;
fig. 7 is a flowchart of a network slice management method according to an embodiment of the present application;
fig. 8 is a flowchart of a network slice management method according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a network slice management apparatus in an embodiment of the present application;
fig. 10 is a schematic structural diagram of a network slice management apparatus in an embodiment of the present application;
fig. 11 is a schematic structural diagram of a network slice management apparatus in an embodiment of the present application;
fig. 12 is a schematic structural diagram of a network slice management apparatus in an embodiment of the present application;
fig. 13 is a schematic structural diagram of a network slice management apparatus in an embodiment of the present application.
Detailed Description
The embodiments of the present application will be described in detail below with reference to the accompanying drawings.
The network slice management method provided in the embodiment of the present application may be applicable to a 5G communication system, and may also be applicable to a future new communication system (for example, the 6th-generation, 6G) mobile communication system, and the like), which is not limited in the present application.
Fig. 1 is a schematic diagram illustrating a system architecture to which the embodiment of the present application is applicable, and the embodiment of the present application is not limited to be applied to the system architecture shown in fig. 1. Each network element shown in fig. 1 may be hardware, or may be functionally divided into software, or a combination of the two. As shown in fig. 1, a system architecture provided in this embodiment of the present application includes a terminal, AN Access Network (AN) device, a Transmission Network (TN) device, AN access and mobility management network element (which may also be referred to as AN access and mobility management function/access and mobility management function entity), a user plane network element (which may also be referred to as a user plane function/user plane function entity), a network slice management network element (or a network slice management function/network slice management function entity), a network slice subnet management network element (or a network slice subnet management function/network slice subnet management function entity), and a data network (data network, DN). The terminal establishes communication with the DN through the access network equipment, the transmission network equipment and the user plane network element.
It should be noted that, the network element referred to in this embodiment may also be referred to as a function or a functional entity, for example, the network slice management network element may also be referred to as a network slice management function or a network slice management functional entity, and the access and mobility management network element may be referred to as an access and mobility management function or an access and mobility management functional entity, etc.
The names of the network elements are not limited in this application, and those skilled in the art may replace the names of the network elements with other names to perform the same functions, all of which are within the protection scope of this application.
Illustratively, the system architecture shown in FIG. 1 may be the system architecture of 5G as shown in FIG. 2. Wherein the functions of the respective network elements or devices are as follows.
A terminal, also referred to as User Equipment (UE), a Mobile Station (MS), a Mobile Terminal (MT), a terminal equipment, etc., is a device that provides voice and/or data connectivity to a user. For example, the terminal includes a handheld device, a vehicle-mounted device, and the like having a wireless connection function. Currently, the terminal may be: a mobile phone (mobile phone), a tablet computer, a notebook computer, a palm computer, a Mobile Internet Device (MID), a wearable device, a Virtual Reality (VR) device, an Augmented Reality (AR) device, a wireless terminal in industrial control (industrial control), a wireless terminal in unmanned driving (self driving), a wireless terminal in remote surgery (remote medical supply), a wireless terminal in smart grID (smart grID), a wireless terminal in transportation security (transportation security), a wireless terminal in city (smart city), or a wireless terminal in smart home (smart home), etc.
The access network device (also referred to as AN device) is responsible for wireless side access of the terminal, and possible deployment forms include: a Centralized Unit (CU) and a Distributed Unit (DU) separate scenarios; and single site scenarios. The single station includes a gbb/NR-NB, a Transmission Reception Point (TRP), an evolved Node B (eNB), a Radio Network Controller (RNC), a Node B (NB), a Base Station Controller (BSC), a Base Transceiver Station (BTS), a home base station (e.g., home evolved Node B, or home Node B, HNB), a Base Band Unit (BBU), or a wireless fidelity (Wifi) access point (access point, AP), etc. In the 5G communication system, a single site is gNB/NR-NB. Among them, a CU supports Radio Resource Control (RRC), Packet Data Convergence Protocol (PDCP), Service Data Adaptation Protocol (SDAP), and other protocols. CUs are typically deployed at central office points with relatively rich computing resources. The DU mainly supports Radio Link Control (RLC), Medium Access Control (MAC), and physical layer (PHY) protocols. The DU is generally deployed in a distributed manner, and in general, more than one DU is connected to one CU. The gNB has the functions of a CU and a DU, and is generally deployed as a single-site modality.
The transmission network apparatus (TN apparatus) may include: SDH/PTN/OTN and PON network equipment. The transport network (transport Net) refers to an optical fiber network governed by transport equipment, is located between a physical layer and a data link layer, and is mainly divided into three layers: an access layer, a convergence layer and a backbone layer; the backbone layer can adopt OTN equipment or DWDM equipment, the convergence layer can adopt large-capacity 10G/2.5G SDH or 10GE PTN equipment, and the access layer generally adopts small-capacity 155M/622M SDH equipment or GE PTN equipment. The Packet Transport Network (PTN) complies with an improved multiprotocol label switching (TMPLS), and the PTN monitors and manages a channel by sending and receiving a management packet through hardware.
The access and mobility management network element may be an access and mobility management entity (AMF) in 5G. The access and mobility management network element is responsible for access and mobility management of terminals in the mobile network.
The user plane network element may be a User Plane Function (UPF) in a 5G architecture, as shown in fig. 2. The UPF is responsible for message processing and forwarding.
The DN, which provides a data transmission Service for the terminal, may be a PDN network, such as the internet (internet), IP Multimedia Service (IMS), and the like.
The network slice management network element may also include: a Communication Service Management Function (CSMF) is used to convert the traffic demand into a demand for end-to-end network slicing. The Network Slice Management Function (NSMF) in the 5G architecture may also be used to manage network slice instances of the entire network and decompose the requirements of the network slice subnets.
The network slice subnet management network element may be a Network Slice Subnet Management Function (NSSMF) in a 5G architecture, and may be deployed in each subnet and communicate with the NSMF. For example, may be deployed within a CN, AN, or TN for managing network slices within a subnet. The NSSMF deployed in the CN may be referred to as AN intra-CN NSSMF or AN NSSMF of the CN domain, and the like, and similarly, the NSSMF deployed in the AN may be referred to as AN intra-AN NSSMF or AN NSSMF of the AN domain, and the NSSMF deployed in the TN may be referred to as AN intra-TN NSSMF or AN NSSMF of the TN domain, and the like. The name of NSSMF deployed in a subnet is not limited in this application.
The network data analysis function acquires performance indexes of the network slice, such as the number of users, current throughput, average rate and the like, in real time, and the NSSF acquires relevant data from the NWDAF and executes a slice selection strategy.
A Network Slice Selection Function (NSSF) may select a set of Network Slice instances that provide services for the UE, determine allowed Network slices (NSSAI), and if necessary, determine a mapping to a user 'S Network Slice identity (S-NSSAI), determine a configured Network Slice NSSAI, and if necessary, determine a mapping to a user' S-NSSAI, determine a set of AMFs for serving the UE, or, based on the configuration, may determine a list of candidate AMFs by querying NRFs.
The system architecture shown in fig. 1 may also be, for example, the system architecture of 5G shown in fig. 3 a. Taking AN and a CN as AN example, fig. 3a illustrates AN example of NSSMF being deployed at the AN and the CN respectively. In the system architecture shown in fig. 3a, the end-to-end network slices may be managed by the NSMF, e.g., the end-to-end network slices may be created, updated, or destroyed by the NSMF. Taking the creation of the end-to-end network slice as AN example, the NSMF may send a network slice creation request to the NSSMF in the AN and the NSSMF in the CN, respectively, the NSSMF in the AN creates AN access network slice according to the network slice creation request, and the NSSMF in the CN creates a core network slice according to the network slice creation request, thereby completing the creation of the end-to-end network slice. In a scenario where a TN exists, NSSMFs may be respectively deployed at the TN and the CN, at this time, the NSMF may respectively send a network slice creation request to the NSSMF in the TN and the NSSMF in the CN, the NSSMF in the TN creates an access network slice according to the network slice creation request, the NSSMF in the CN creates a core network slice according to the network slice creation request, and then the creation of an end-to-end network slice is completed.
However, since the implementation details of the core network, the access network, and the transport network control plane are not known by the NSMF, it may result in that the NSMF cannot make a decision accurately. In addition, early network slice research is mainly focused on a core network, research on AN access network slice or a transmission network slice is deficient, and a scenario that NSSMF is not deployed in AN or TN may exist for NSSMF deployment in AN or TN is late, as shown in fig. 3 b.
Based on the existing problems, the present application provides a network slice management method and apparatus, which are used to assist the NSMF in optimizing the management of an end-to-end network slice through NWDAF. The method and the device are based on the same or similar conception, and because the principle of solving the problem of the method and the device is similar, the implementation of the device and the method can be mutually referred, and repeated parts are not described again.
In the description of the embodiment of the present application, "and/or" describes an association relationship of associated objects, which means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. At least one referred to in this application means one or more; plural means two or more. It is to be understood that the terms "first," "second," and the like, in the description of the present application, are used for distinguishing between descriptions and not necessarily for describing a sequential or chronological order, or for indicating or implying a relative importance. "at least one" means one or more; "at least one" means one or more; plural means two or more.
Fig. 4 is a flowchart of a network slice management method according to an embodiment of the present application. The method comprises the following processing flows.
In step S401, the NSMF generates a first operation strategy.
The first operation policy is a policy that the NSMF authorizes the CN control plane to perform network slicing operation. The first operation strategy comprises a trigger condition of the network slicing operation request generated by the NWDAF and an operation parameter of a corresponding end-to-end network slice. Specifically, the method may include: operation type, trigger condition, operation parameter. The operation type may be classified according to the operation, for example: creating a slicing instance, updating the slicing instance, and destroying the slicing instance. The operation request of the end-to-end network slice may be AN access network slice for the AN device, a core network slice for the CN device, or a network slice in which the access network slice of the AN device and the core network slice of the CN device share resources. The network slice management method provided by the embodiment of the present application is illustrated by an example. Assume that the network slice template in the first operating policy is to create an end-to-end network slice that shares resources with the created end-to-end network slice.
The NWDAF may send a network slice creation request to a proxy node within the CN for creating an end-to-end network slice 3 sharing resources with the created end-to-end network slice according to the first operation policy and the currently created end-to-end network slice. The end-to-end network slice 3 may include a core network slice 3 and an access network slice 3, and at this time, the created end-to-end network slice may include an end-to-end network slice 1 and an end-to-end network slice 2, where the end-to-end network slice 1 includes the core network slice 1 and the access network slice 1, and the end-to-end network slice 2 includes the core network slice 2 and the access network slice 2. The proxy node creates a core network slice 3 sharing resources with the created core network slice 1 according to the network slice creation request, and sends AN access network slice creation request to AN access network device in the AN, wherein the access network slice creation request carries indication information to indicate that the core network slice 1 and the core network slice 3 share resources, so that the access network device can create the access network slice 3 sharing resources with the created access network slice 1 according to the access network slice creation request, so that subnet slices created in the AN and the CN belong to the same end-to-end network slice, and errors in subsequent use of the end-to-end network slice 3 can be avoided.
The trigger condition may be in the form of a conditional expression, or may be a specific value indicating a condition for allowing a certain operation to be performed, for example, when the number of attached users is greater than 10 ten thousand, the corresponding operation is triggered.
The operating parameters may include: initial slice ID, initial slice template, whether the operation strategy needs synchronization. Where the initial slice ID, which may be used to identify the network slice when creating the network slice, may be a specified S-NSSAI, e.g., 001-. The initial slice template, which may include a slice subnet instance template, contains a network slice ID, and parameter information required for network slice creation and update, and the data type may be NSST. For example, the format of the initial slice template may be NSST-name < type, Specification, SLA … … >. If synchronization is required, the data type may be a boolean type, e.g., synchronization may be Y, not N.
In step S402, NSMF sends a first operation policy to NSSMF. Specifically, the NSMF may send the first operation policy to the NSSMF through the restful interface.
In step S403, NSSMF sends a first operation policy to the NWDAF.
In one possible scenario, the management plane authorizes a designated NWDAF as needed to enable the capability of network slicing operation management, and at this time, the NSMF may send a first operation policy to the designated NWDAF, so that the NWDAF generates a network slicing operation request according to the first operation policy. Of course, the management plane may also revoke the authorization of the NWDAF and close the network slicing operation management capability of the NWDAF, as needed.
Therefore, the NSSMF may determine, according to the subnet capability, an NWDAF that supports the network slice operation management CP-LCM capability, and send the first operation policy to the corresponding NWDAF. Specifically, the NSSMF determines whether the NWDAF supports the CP-LCM, which may be configured locally for the NWDAF, or may discover the network slicing operation management capability of the NWDAF through the NRF, or may query whether the NWDAF activates the network slicing operation management capability through the restful interface.
Step S404, the NWDAF receives the first operation strategy.
And if the NWDAF determines that the network slice association capability is supported, the NWDAF stores the first operation strategy and is used for generating a network slice operation request according to the first operation strategy.
In step S405, the NWDAF sends a first operation policy response to the NSSMF.
The NWDAF may send a first operation policy response to the NSSMF if the NWDAF successfully receives the first operation policy. The first operation policy response may include a result of the receipt of the first operation policy, e.g., success or failure, and a corresponding reason.
In step S406, NSSMF sends a first operation policy response to NSMF.
By the method, the management plane does not need to know the implementation details of the control plane, and can generate the operation strategy aiming at the execution requirement of the management plane on the network slice and send the operation strategy to the control plane, so that the execution strategy of the control plane is ensured to meet the requirement of the management plane. After the control plane obtains the policy of the network slice of the management plane, the control plane can realize effective management of the network slice in real time according to the implementation details of the control plane under the condition of meeting the operation policy issued by the management plane.
As shown in fig. 5, the flow of the network slice management method is as follows. And taking the proxy node as a new node description in the CN.
S501: and if the NWDAF determines that the acquired network data meet the trigger condition, generating the network slice operation request comprising the operation parameters of the end-to-end network slice. And the network slice operation request is used for indicating the proxy node to operate the end-to-end network slice according to the operation parameters of the end-to-end network slice.
The network data collected by the NWDAF may include: resource sharing slice information of a core network to which the NWDAF belongs, resource sharing slice information of an access network, and resource sharing slice information of a transmission network. The NWDAF may generate an end-to-end network slice operation request according to the network slice information in the first operation policy and the network data acquired by the NWDAF. Thus, the network slice operation request may be used to request operation of a network slice in the first operation policy, and may also be used to request operation of an end-to-end network slice of the created end-to-end network slice sharing resources. Shared resources in this application may refer to shared virtual machines or containers, etc. The end-to-end network slice may include one or more of: core network slice, access network slice, or transport network slice.
In this application, a network slicing operation request may also be referred to as an end-to-end network slicing operation request or a slicing operation request. AN end-to-end network slice may be a slice that provides end-to-end network services for a terminal from the AN to the CN and may also be referred to as a network slice, or slice, etc. The end-to-end network slice may include a core network slice, an access network slice, or a transport network slice. The network slice in the core network may also be referred to as a network slice in a CN domain or a core network slice, the network slice in the access network may also be referred to as a network slice in AN domain or AN access network slice, and the network slice in the transport network may also be referred to as a network slice in a TN domain or a transport network slice.
In the present application, AN, CN, and TN may be collectively referred to as a subnet, which may also be referred to as a subnet or a sub-domain. Accordingly, network slices within the core network, network slices within the access network, and network slices within the transport network may be collectively referred to as subnet slices, or intra-subnet slices, etc.
The network data for the core network may include resource sharing slice information of the core network, that is, information of a core network slice that has been created in the core network to which the NWDAF belongs and supports resource sharing. For example, the information of the core network slice may include an identification of the core network slice, resource occupancy, and the like. In the present application, the resource occupancy of a core network slice may include the resource occupancy of a virtual machine or a container that deploys the core network slice.
Optionally, the network slice operation request may carry an identifier of a first end-to-end network slice sharing resources with the end-to-end network slice to be operated, and indicate that the end-to-end network slice to be operated shares resources with the first end-to-end network slice. When the network slice operation request carries the identifier of the first end-to-end network slice, the network slice operation request may be used to request to operate the first end-to-end network slice. That is, the NWDAF may request to operate an end-to-end network slice that shares resources with a particular end-to-end network slice.
For example, assuming that a core network to which an NWDAF belongs includes three created core network slices, which are a core network slice a, a core network slice B, and a core network slice C, respectively, resource sharing slice information of the core network to which the NWDAF belongs may include identifiers and resource occupancies of the core network slice a, the core network slice B, and the core network slice C, and further assuming that an identifier of the core network slice a is an identifier a and the resource occupancy is 30%, an identifier of the core network slice B is an identifier B and the resource occupancy is 70%, an identifier of the core network slice C is an identifier C and the resource occupancy is 50%, when determining that a trigger condition of a first operation policy is satisfied, the NWDAF may determine that a first end-to-end network slice needs to be operated according to an operation parameter. Taking the operation as the creation as an example, to ensure that the created core network slice has sufficient resources, the NWDAF may determine the core network slice sharing resources with the core network slice a with the lowest resource occupancy rate. By the method provided by this example, the NWDAF may create a core network slice sharing resources with the created core network slice with the lowest resource occupancy rate according to the resource consumption of the core network slice in the core network to which the NWDAF belongs, so that the resource sharing effect is better. The problem of low resource utilization rate caused by the fact that NSMF cannot sense the resource consumption condition of the subnet slices in the core network and the access network in the prior art is solved. Obviously, the method of the application can optimize the management of the network slices.
S502: the NWDAF sends the end-to-end network slicing operation request to the proxy node.
In the present application, the proxy node may be a newly added node in the CN, or may be integrated on the NSSF in the CN, and the following description of the embodiment of the present application takes the proxy node as the newly added node in the CN as an example.
S503: and the proxy node operates the end-to-end network slice according to the network slice operation request.
One possible design, S503 a: and the proxy node operates the core network slice according to the network slice operation request.
In one example, when an identity of a first end-to-end network slice of a shared resource is carried in a network slice operation request, an end-to-end network slice of a proxy node operation shares the resource with the first end-to-end network slice.
In another example, if the network slice request does not carry an identification of the first end-to-end network slice, that is, the NWDAF does not specify with which created end-to-end network slice the to-be-operated end-to-end network slice shares resources, it may be determined by the proxy node itself that the to-be-operated end-to-end network slice shares resources with a certain created end-to-end network slice.
One possible design, S503 b: and the proxy node sends an access network slicing operation request to the access network equipment.
Specifically, the proxy node may send an access network slice operation request to the access network device through a default (default) AMF. And after receiving the access network slice operation request from the proxy node, the default AMF sends the access network slice creation request to the access network equipment in the access network according to the identifier of the access network equipment. The proxy node may also interact with the access network device through another AMF (different from the default AMF), which is not limited in this application.
The access network slice creation request may be for requesting operation of an access network slice. The access network slice operation request may carry first indication information, where the first indication information is used to indicate that the core network slice to be operated shares resources with the first core network slice.
The access network equipment in the access network can operate the access network slice according to the time delay requirement, the isolation requirement and the like carried in the access network slice operation request.
One possible design, S503 c: the proxy node sends a transmission network slicing operation request to the transmission network equipment.
The transport network slice creation request may be for requesting operation of a transport network slice. The transmission network slice operation request may carry first indication information, where the first indication information is used to indicate that the transmission network slice to be operated shares resources with the first transmission network slice.
By the method, the control plane can generate the action of the slice LCM in real time according to the running state of the network, and can create the network slice even if the AN NSSMF is not ready or deployed by using the signaling of the CP, thereby improving the real-time performance of the network slice.
S504a the proxy node receives an access network slice operation notification from the access network device.
Specifically, the access network device sends an access network slice operation notification to the default AMF, where the access network slice operation notification may include an operation result of the access network slice. For example, the operation result may be success or failure of the operation. And the default AMF sends an access network slicing operation response to the proxy node according to the access network slicing operation notification. The access network slice operation response may include an operation result of the access network slice included in the operation notification received by the default AMF within the preset time. For example, assuming that there are 500 access network devices in the access network, each access network device may send an operation notification including an operation result of an access network slice to the default AMF after searching for the access network slice according to the access network slice operation request, but each access network device may not send the operation notification to the default AMF at the same time, the default AMF may receive the operation notification sent by each access network device within a preset time, and assuming that the default AMF receives the operation notifications sent by 450 access network devices within the preset time, the creation result of the access network slice included in the 450 operation notifications may constitute an operation response and send the operation response to the proxy node.
S504b the proxy node receives a transmission network slicing operation notification from the transmission network device.
The transmission network slicing operation notification may include an operation result of the transmission network slicing. For a specific implementation, reference may be made to the manner of the access network slice operation notification sent by the access network device in S504a, which is not described herein again.
S505: and the proxy node sends the operation result of the end-to-end network slicing to the NWDAF.
In a possible implementation manner, the proxy node may collect operation results of all or part of the access network slices or transmission network slices, and then determine whether to generate an operation notification. And if determining that an operation notification needs to be generated, sending an operation result of the access network slice to the NWDAF.
S506: the NWDAF receives the operation result of the end-to-end network slicing and sends the operation result of the end-to-end network slicing to the NSSMF.
In one possible implementation, the NWDAF may aggregate the creation results of the end-to-end slices, and determine whether a creation notification needs to be sent to the NSMF according to the aggregated results. Furthermore, the core network device at the AN side, the access network device at the AN side, or the transmission network device at the AN side can acquire the creation result of the end-to-end network slice at the CN side, so that the device at the AN side can unify the decision of the network slice; further, the NSMF may update the operation policy according to the creation result of the end-to-end network slice, so as to achieve better management of the control plane on the created end-to-end network slice.
S507: NSSMF sends the operation result of the end-to-end network slice to NSMF.
S508: and the NSMF updates the first operation strategy according to the operation result of the end-to-end network slice.
S509: the NSMF sends the updated first operating policy to the NSSMF.
S510: the NSSMF sends the updated first operating policy to the NWDAF.
S511: the NWDAF receives the updated operating policy from the NSSMF and sends a policy response to the NSSMF, the policy response confirming correct receipt of the updated operating policy.
S512: the NSSMF sends the policy response to the NSMF.
It should be noted that the steps marked with solid lines in fig. 5 all refer to steps that have to be executed, such as S501, S502, and S503, and the steps marked with dotted lines all refer to steps that can be executed optionally, such as S503a, S503b, S503c, S504a, and S504 b. In addition, in the drawings related to the present application, steps marked by solid lines all refer to steps which must be executed, and steps marked by dotted lines all refer to steps which can be executed optionally.
Fig. 6 is a flowchart of a network slice management method according to an embodiment of the present disclosure. In a scenario where a network slice operation is a network slice creation, the first operation policy may include a first trigger condition of the NWDAF generating network slice creation request and a first creation parameter of a corresponding end-to-end network slice.
The process of creating a network slice in fig. 5 is described below by taking as an example that the NWDAF and the NSMF interact with each other through NSSMF in the CN, the NWDAF interacts with the proxy node, the proxy node interacts with the access network device, the NWDAF generates a network slice creation request, and the proxy node negotiates the capability of managing an access network slice in the access network device by the proxy node after receiving the network slice creation request from the NSMF. As shown in fig. 6, the following steps are included.
S601: and if the NWDAF determines that the acquired network data meet the first trigger condition, generating a creation request of a first end-to-end network slice comprising the first creation parameter.
Wherein the creation request of the first end-to-end network slice is used to instruct the proxy node to create the end-to-end network slice according to a first creation parameter. For a different scenario of creating a network slice, for example, for a scenario of creating a core network slice, the creation request of the first end-to-end network slice is used to instruct the proxy node to create a core network slice according to a creation parameter of the core network slice in the first creation parameters; for a scenario of creating an access network slice, the creation request of the first end-to-end network slice is used for instructing the proxy node to send a first creation request of the access network slice to the access network device according to a creation parameter of the access network slice in the first creation parameter; for a scenario of creating a transport network slice, the creation request of the first end-to-end network slice is used for instructing the proxy node to send a first creation request of the transport network slice to a transport network device according to a creation parameter of the transport network slice in the first creation parameter.
For example, the network data collected by the NWDAF may be performance indicators for monitoring the network slices that have been created, such as the number of attached users and the number of sessions. According to a first trigger condition, for example, the first trigger condition is that a creation request for generating an end-to-end network slice is triggered when the number of attached users is greater than 10 ten thousand. For example, the creation request may include: the transaction ID indicating the creation request indicates the created slice ID and indicates the slice template corresponding to the created slice parameters. The first creation parameter may include a specific parameter of the end-to-end network slice, for example, a slice ID of the end-to-end network slice, a slice template of the end-to-end network slice. The slice template contains parameter information such as types, specifications, SLAs and the like required for creating slices.
S602: the NWDAF sends a create request for the first end-to-end network slice to the proxy node.
S603: and the proxy node creates the end-to-end network slice according to the creation request of the first end-to-end network slice.
In one possible implementation, the proxy node may receive a network slice creation request from the NWDAF, see S503 in fig. 5. In one possible implementation, the proxy node sends an access network slice creation request to the access network device through the default AMF, which is shown in S503a-S503c in fig. 5. And after receiving an access network slice creation request from the proxy node, the default AMF sends the access network slice creation request to access network equipment in an access network according to the pre-stored identifier of the access network equipment. And will not be described in detail herein.
After the agent node creates the slice, the slice selection scheme of the AN can be updated according to the creation result, so that the slice ID (S-NSSAI) carried by the newly added user is selected to the newly created AMF. After the slice is created, the slice selection scheme of the proxy node is automatically updated, so that new users attach and session creation requests, and NF (restricted access networks) such as AMF (advanced metering framework), SMF (simple message framework) and the like corresponding to the new slice are selected.
Step S604: and the proxy node acquires the creation result of the end-to-end network slice.
Wherein the creation notification includes a creation result of the end-to-end network slice. The end-to-end network slice creation result includes one or more of: creating a result of the core network slice; the creation result of the access network slice, or the creation result of the transmission network slice. If the CN and AN create the slice is successful, success is returned. If the CN and AN completely fail to create the slice, a failure is returned. If the CN successfully creates the slice, the part of AN successfully creates the slice, and the part of AN fails to create the slice, returning the part success, and at this time, the creation notice comprises a failure list.
The specific implementation process can be shown in S504a-S504b in fig. 5, and is not described herein again.
S605: and the proxy node generates a creation notification according to the creation result and sends the creation notification to the NWDAF.
The specific implementation process can be shown in S505 in fig. 5, and is not described herein again.
S606: the NWDAF receives a create notification from a proxy node and sends the create notification to the NSSMF.
S607: the NSSMF receives a creation notification from the NWDAF, the creation notification including a creation result of the end-to-end network slice, and transmits the creation notification to the NSMF.
Further, for a partially failed scene, the information can be fed back to an interface or a management system at an upper layer to prompt manual confirmation processing.
The specific implementation process can be shown in S507 in fig. 5, and is not described herein again.
S608: the NSMF updates the first operation strategy into a second operation strategy according to the creation notice; the second operation strategy comprises a second trigger condition for generating a network slice establishing request and a second establishing parameter of a corresponding end-to-end network slice; wherein the second trigger condition is obtained by updating the first trigger condition according to the creation notification, and the second creation parameter is obtained by updating the first creation parameter according to the creation notification.
For example, when creating a slice subnet, a slice ID and a slice template in a set of first operation policies may be consumed, and the number of times, the NSMF may refresh the operation policies, the refreshing may include generating a new slice ID and a new slice template for the NWDAF again, or may mark the consumed slice ID and the slice template as created, destroy the corresponding slice ID and the slice template in the creation policy, and generate a second operation policy after the refreshing. The second operation policy may include the newly assigned slice ID and the slice template.
S609: the NSMF sends the second operating policy to the NSSMF.
S610: the NSSMF sends the second operating policy to the NWDAF.
S611: the NWDAF receives a second operating policy from the NSSMF and sends a policy response to the NSSMF, the policy response being used to confirm correct receipt of the second operating policy.
S612: the NSSMF sends the policy response to the NSMF.
Further, if the NWDAF determines that the acquired network data meets the second trigger condition, a creation request of a second end-to-end network slice including the second creation parameter is generated; the creation request of the second end-to-end network slice is used for instructing the proxy node to recreate the end-to-end network slice according to the second creation parameter.
It is to be understood that the above embodiments of the present application are described by taking network slice creation as an example. Similarly, the foregoing method embodiment may also be used for network slice updating, where slice updating refers to performing parameter adjustment or updating of a function deployment location on an existing slice. Because the network may be dynamically changed in real time, after NWDAF dynamic analysis, the network slice may need to be updated, at this time, an update request of the end-to-end network slice may be generated according to an update policy, and related processing through a management plane is not needed, thereby avoiding the problem that the update request of the corresponding network slice may not be issued due to non-uniform management plane standards, and effectively improving management performance. The first operation policy includes a third trigger condition of the NWDAF-generated network slice update request and a first update parameter of a corresponding end-to-end network slice. As shown in fig. 7.
S701: and if the NWDAF determines that the acquired network data meet the third trigger condition, generating an updating request of the first end-to-end network slice comprising the first updating parameter. The update request for the first end-to-end network slice is used to instruct the proxy node to update the end-to-end network slice according to the first update parameter.
For example, on the AN side, when a new user of S-NSSAI1 selects AMF1, a new user of S-NSSAI2 selects AMF2, and the NWDAF monitors the performance index of AMF2, and determines that the load is too high, for example, when the load is higher than a preset threshold, according to a first update parameter in the first update policy, the corresponding network slice is updated to the network slice sharing resources with the network slice to be updated, and in this scenario, the network slice sharing resources with the network slice S-NSSAI2 to be updated is S-NSSAI1, so that the generated update request of the network slice is used to update end-to-end network slices S-NSSAI2 to S-NSSAI1 corresponding to AMF2, so that the slice selection scheme of AMF2 on the AN side is updated to end-to-end network slice S-NSSAI 3 corresponding to AMF1, and the new user designated S-NSSAI2 also selects AMF 73784.
S702: the NWDAF sends an update request for the first end-to-end network slice to a proxy node.
S703: and the proxy node updates the end-to-end network slice according to the update request of the first end-to-end network slice.
S703 a: and the proxy node updates the core network slice according to the update parameter of the core network slice in the first update parameter.
S703 b: and the proxy node generates and sends an update request of the access network slice to the access network equipment according to the update parameter of the access network slice in the first update parameter.
S703 c: and the agent node generates and sends an updating request of the transmission network slice to the transmission network equipment according to the updating parameter of the transmission network slice in the first updating parameter.
The specific implementation process can be seen in S503a-S503c in fig. 5, which is not described herein again.
S704: and the proxy node acquires the updating result of the end-to-end network slice. The updated result of the end-to-end network slice includes one or more of: an update result of the core network slice, an update result of the access network slice from the access network device, or an update result of the transmission network slice from the transmission network device.
S704 a: and the proxy node receives the updating result of the access network slice.
S704 b: and the proxy node receives the updating result of the transmission network slice.
The specific implementation process can be seen in S504b-S504b in fig. 5, and is not described herein again.
S705: the proxy node sends an update notification to the NWDAF, the update notification including an update result of the end-to-end network slice, such as an update success or failure.
The specific implementation process can be shown as S505 in fig. 5, and is not described herein again.
S706: the NWDAF receives an update notification from a proxy node and sends the update notification to the NSSMF.
S707: the NSSMF receives an update notification from the NWDAF and transmits the update notification to the NSMF.
S708: and the NSMF receives an update notice from the NSSMF, and updates the first operation strategy into a third operation strategy according to the update notice.
Wherein the third operation policy includes a fourth trigger condition for the NWDAF to generate a network slice update request, and a second update parameter of a corresponding end-to-end network slice; the fourth trigger condition is obtained by updating the third trigger condition according to the update notification, and the second update parameter is obtained by updating the first update parameter according to the update notification.
Specifically, the operation policy may be updated according to the reported update result of each network slice, for example, the creation policy is updated, the update policy is updated, or the destruction policy is updated. For example, for the update policy, the preset threshold may be updated according to the reported load condition of each network slice, and the first trigger condition in the first operation policy is updated to be the fourth trigger condition. For the creation policy, a new creation policy may be generated for the AMF corresponding to the network slice with high load by newly adding a slice ID and a slice template.
S709: the NSMF sends a third operating policy to the NSSMF.
S710: the NWDAF receives a third operating policy from the NSSMF.
S711: and the NWDAF receives the third operation strategy and sends a strategy response to the NSSMF, wherein the strategy response is used for confirming that the third operation strategy is correctly received.
S712: the NSSMF sends the policy response to the NSMF.
Furthermore, if the NWDAF determines that the acquired network data meets the fourth trigger condition, an update request of a second end-to-end network slice including the second update parameter is generated; the update request of the second end-to-end network slice is used for instructing the proxy node to renew the end-to-end network slice according to the second update parameter.
By the method, the NSMF receives the update notification from the NWDAF, so that the NSMF synchronizes the update result of the network slice of the control plane, the core network equipment at the AN side, the access network equipment at the AN side or the transmission network equipment at the AN side can acquire the update result of the end-to-end network slice at the CN side, and the equipment at the AN side can unify the decision of the network slice; the NSMF may update the operation policy according to an update result of the end-to-end network slice, and issue the updated operation policy to the NWDAF to realize better management of the network slice after the end-to-end network slice is updated by the control plane.
It will be appreciated that the method embodiments described above may also be used for web slice destruction, as illustrated with reference to fig. 8. At this time, the first operation policy specifically includes a fifth trigger condition for the NWDAF to generate a network slice destruction request, and a first destruction parameter of a corresponding end-to-end network slice. The following describes the process of destroying the network slice in fig. 8 by taking an example that the proxy node and the NSMF interact through NSSMF in the CN, the proxy node interacts with the access network device through default AMF, and the capability of the proxy node to manage the access network slice in the access network device is the proxy node.
S801: and if the NWDAF determines that the acquired network data meet the fifth trigger condition, generating a destruction request of the first end-to-end network slice comprising the first destruction parameter. The destruction request of the first end-to-end network slice is used for indicating the agent node to destroy the end-to-end network slice according to the first destruction parameter.
For example, the NWDAF monitors the performance index of the slice, the fifth trigger condition may be that the time when the user attachment number is smaller than the first threshold or the activation number is smaller than the second threshold exceeds a third threshold, and when it is determined that the user attachment number and the activation number of the end-to-end network slice 1 satisfy the fifth trigger condition, a destruction request of the end-to-end network slice is generated according to the first destruction parameter, so as to destroy the end-to-end network slice 1. For another example, if it is determined that the network data of the core network slice 1 on the CN side satisfies the fifth trigger condition, a destroy request of the core network slice 1 is generated, and similarly, if it is determined that the network data of the access network slice 1 on the AN side satisfies the fifth trigger condition, a destroy request of the access network slice 1 is generated.
The NWDAF may need to destroy the network slices according to the requirements of the network and the user, and at this time, the end-to-end network slice destruction request may be generated according to the first operation policy, and the network slice destruction request does not need to be issued through the management plane, so that the problem that the corresponding network slice destruction request may not be issued due to non-uniform management plane standards is avoided, and the management performance and the management efficiency are effectively improved.
S802: the NWDAF sends a destroy request for the first end-to-end network slice to the proxy node.
A possible design, the end-to-end network slice including one or more of: core network slicing, access network slicing and transmission network slicing; the destruction request of the end-to-end network slice is used for indicating the agent node to destroy the core network slice, and/or sending a destruction request of the access network slice to the access network equipment; and/or sending a destruction request of the transmission network slice to the transmission network equipment.
In a scenario where a core network slice destruction request needs to be generated, the NWDAF may generate a core network slice destruction request according to core network slice information to which the NWDAF belongs, in combination with acquired network data. In a scenario where a destroy request of AN access network slice needs to be generated, the NWDAF may generate a destroy request of the access network slice, and send the destroy request of the network slice to AN access network device in the AN through a proxy node in the CN. In a scenario where a destruction request for a transport network slice needs to be generated, the NWDAF may generate a destruction request for a transport network slice, and send the destruction request for a transport network slice to AN in-AN transport network device through a proxy node in the CN.
S803: and the agent node destroys the end-to-end network slice according to the first destruction parameter.
Wherein destroying the end-to-end network slice may include one or more of: destroying core network slices, accessing network slices and transmitting network slices. Correspondingly, the first destruction parameters may include one or more of: the destruction parameters of the core network slices, the destruction parameters of the access network slices and the destruction parameters of the transmission network slices.
S804: the agent node obtains the destruction result of the end-to-end network slice, such as successful destruction, failure, partial failure or partial success.
The specific implementation process can be seen in S504b-S504b in fig. 5, and is not described herein again.
Wherein the destruction result of the end-to-end network slice may include one or more of the following: the destruction result of the core network slice, the destruction result of the access network slice from the access network device, and the destruction result of the transmission network slice from the transmission network device.
S805: and the agent node sends a destruction notice to the NWDAF, wherein the destruction notice comprises the destruction result of the end-to-end network slice.
The specific implementation process can be shown in S505 in fig. 5, and is not described herein again.
S806: and the NWDAF receives the destruction notification and sends the destruction notification to the NSSMF.
By the method, the NWDAF receives the destruction result of the access network device CN side or the transmission network device CN side sent by the proxy node, so that the NWDAF can know the decision made by the access network CN side, further can unify the decisions of the network slices of the core network, the access network or the transmission network, and realizes the unified management of the end-to-end network slices.
Further, the NWDAF may summarize the destruction results of the end-to-end slices, and determine whether to send a destruction notification to the NSMF according to the summarized results.
The NSSMF sends the destroy notification to the NSMF S807.
And S808, the NSMF updates the first operation strategy into a fourth operation strategy according to the destruction notice.
The fourth operation strategy comprises a sixth trigger condition of the network slice destroying request generated by the NWDAF and a second operation parameter of a corresponding end-to-end network slice; the sixth triggering condition is obtained by updating the fifth triggering condition according to the destruction notification, and the second operation parameter is obtained by updating the first destruction parameter according to the destruction notification; the NSMF sends the fourth operating policy to the NSSMF.
The NSMF may update the operation policy according to a destruction result of the end-to-end network slice. It should be noted that the fourth operation policy may be a creation policy, an update policy, or a destruction policy. The second operation parameter may be a destruction parameter, a creation parameter, or an update parameter, and correspondingly, the NWDAF may generate, according to the received fourth operation policy, a network slice operation request including the second operation parameter of the end-to-end network slice, which may be a creation request, an update operation, or a destruction operation, when it is determined that the acquired network data satisfies the sixth trigger condition.
For example, a creation policy of the end-to-end network slice is newly added, so that the control plane can better manage the network slice after the end-to-end network slice is destroyed. For example, when the subnet section is destroyed, the destroyed subnet section may need to be restored as a new section ID and a section template, that is, a sixth creation parameter is generated according to the first destruction parameter, and a new creation policy is generated. It is also possible to update the update policy or the destruction policy in the first operation policy based on the destroyed network slice.
And S809, the NSMF sends a fourth operation strategy to the NSSMF.
S810: the NWDAF receives a fourth operating policy from the NSSMF.
S811: and the NWDAF receives the fourth operation strategy and sends a strategy response to the NSSMF, wherein the strategy response is used for confirming that the fourth operation strategy is correctly received.
S812: the NSSMF sends the policy response to the NSMF.
Further, if the NWDAF determines that the acquired network data meets the sixth trigger condition, generating an operation request of a second end-to-end network slice including the second operation parameter; the operation request of the second end-to-end network slice is used for instructing the proxy node to operate the end-to-end network slice again according to the second operation parameter.
In the embodiment of the application, the requirement of the end-to-end network slice on the AN is issued to the AN side through the control plane. The CN manages the life cycle of the network slice at the CN, AN or TN side through the control plane without depending on NSSMF readiness of all management planes, and the effectiveness is improved. Further, the NWDAF of the control plane is allowed to dynamically operate the CN and AN slice according to the real-time state of the network, so as to improve the utilization rate of client resources and the final experience of the terminal user.
Based on the same inventive concept of the above method embodiment, as shown in fig. 9, an embodiment of the present application further provides a network slice management apparatus 900, configured to perform an operation performed by NWDAF in the above network slice management method. The apparatus 900 may comprise a receiving unit 901, a processing unit 902 and a transmitting unit 903. The receiving unit 901 is configured to receive a first operation policy from a subnetwork slice management function NSSMF; the first operation strategy comprises a trigger condition of the network slicing operation request generated by the NWDAF and corresponding operation parameters of an end-to-end network slice; a processing unit 902, configured to generate the network slice operation request including an operation parameter of the end-to-end network slice if it is determined that the acquired network data meets the trigger condition; the network slice operation request is used for indicating a proxy node to operate the end-to-end network slice according to the operation parameters of the end-to-end network slice; a sending unit 903, configured to send the network slice operation request to the proxy node.
A possible design, where the first operation policy specifically includes a first trigger condition of the NWDAF-generated network slice creation request, and a first creation parameter of a corresponding end-to-end network slice; a processing unit 902, configured to generate a creation request of a first end-to-end network slice that includes the first creation parameter if it is determined that the acquired network data meets the first trigger condition; the creation request of the first end-to-end network slice is used for instructing the proxy node to create the end-to-end network slice according to a first creation parameter. A receiving unit 901, configured to receive a creation notification from a proxy node, where the creation notification includes a creation result of the end-to-end network slice, and receive a second operation policy from the NSSMF; the second operation policy includes a second trigger condition for generating a network slice creation request, and a second operation parameter of a corresponding end-to-end network slice, where the second trigger condition is obtained by updating the first trigger condition according to the creation notification, and the second operation parameter is obtained by updating the first creation parameter according to the creation notification. A processing unit 902, configured to generate a creation request of a second end-to-end network slice including the second creation parameter if it is determined that the acquired network data meets the second trigger condition; the creation request of the second end-to-end network slice is used for instructing the proxy node to recreate the end-to-end network slice according to the second creation parameter. Further, the sending unit 903 is configured to send the creation request to the NSSMF.
Illustratively, the end-to-end network slice includes one or more of: core network slicing, access network slicing and transmission network slicing; the creation request of the first end-to-end network slice is used for instructing the proxy node to create a core network slice; and/or sending a first creation request of the access network slice to the access network equipment; and/or sending a first creation request of the transmission network slice to the transmission network equipment.
In one possible design, the first operation policy specifically includes a third trigger condition for the NWDAF to generate a network slice update request, and a first update parameter of a corresponding end-to-end network slice; a processing unit 902, configured to generate an update request of a first end-to-end network slice including the first update parameter if it is determined that the acquired network data meets the third trigger condition; the update request of the first end-to-end network slice is used to instruct the proxy node to update the end-to-end network slice. A receiving unit 901, configured to receive an update notification from a proxy node, where the update notification includes an update result of the end-to-end network slice, and receive a third operation policy from the NSSMF; the third operation strategy comprises a fourth trigger condition of the network slice updating request generated by the NWDAF and a second updating parameter of a corresponding end-to-end network slice; the fourth trigger condition is obtained by updating the third trigger condition according to the update notification, and the second update parameter is obtained by updating the first update parameter according to the update notification. A processing unit 902, configured to generate an update request for a second end-to-end network slice including the second update parameter if it is determined that the acquired network data meets the fourth trigger condition; the update request of the second end-to-end network slice is used for instructing the proxy node to renew the end-to-end network slice according to the second update parameter. Further, the sending unit 903 is configured to send the update request to the NSSMF.
Illustratively, the end-to-end network slice includes one or more of: core network slicing, access network slicing and transmission network slicing; the update request of the first end-to-end network slice is used for indicating the proxy node to update the core network slice and/or sending an update request of the access network slice to the access network equipment; and/or sending an update request of the transmission network slice to the transmission network equipment.
One possible design is that the first operation policy specifically includes a fifth trigger condition for the NWDAF to generate a network slice destruction request, and a first destruction parameter of a corresponding end-to-end network slice; a processing unit 902, configured to generate a destruction request of a first end-to-end network slice including the first destruction parameter if it is determined that the acquired network data meets the fifth trigger condition; the destroy request of the first end-to-end network slice is used for indicating the agent node to destroy the end-to-end network slice according to the first destroy parameter. A receiving unit 901, configured to receive a destruction notification from an agent node, where the destruction notification includes a destruction result of the end-to-end network slice; the destruction result of the end-to-end network slice may include one or more of the following: the destruction result of the core network slice, the destruction result of the access network slice, or the destruction result of the transmission network slice. Further, the processing unit 902 may aggregate the destruction results of the end-to-end slices, and determine whether to send a destruction notification to the NSMF according to the aggregated results. A sending unit 903, configured to send the destruction notification to the NSSMF. A receiving unit 901, configured to receive a fourth operation policy from the NSSMF; the fourth operation strategy comprises a sixth trigger condition of the network slicing operation request generated by the NWDAF and a second operation parameter of a corresponding end-to-end network slice; the sixth triggering condition is obtained by updating the fifth triggering condition according to the update notification, and the second operation parameter is obtained by updating the first destruction parameter according to the destruction notification. A processing unit 902, configured to generate an operation request of a second end-to-end network slice that includes the second operation parameter if it is determined that the acquired network data meets the sixth trigger condition; the operation request of the second end-to-end network slice is used for instructing the proxy node to operate the end-to-end network slice again according to the second operation parameter.
Illustratively, the end-to-end network slice may include one or more of: core network slicing, access network slicing and transmission network slicing; the destruction request of the first end-to-end network slice is used for indicating the agent node to destroy the core network slice, and/or sending a destruction request of the access network slice to the access network equipment; and/or sending a destroy request of the transmission network slice to the transmission network equipment.
Based on the same concept of the foregoing method embodiment, as shown in fig. 10, an embodiment of the present application further provides a network slice management device 1000, configured to execute operations performed by NSSMF in the foregoing network slice management method. The apparatus 1000 may comprise a receiving unit 1001 and a processing unit 1002. Optionally, a sending unit 1003 may be further included. If the receiving unit 1001 is configured to receive the first operation policy from the network slice management function NSMF, then the sending unit 1003 is configured to send the first operation policy to the NWDAF. The first operation strategy comprises a trigger condition of a network data analysis function NWDAF generation network slicing operation request and corresponding operation parameters of an end-to-end network slice; the NWDAF supports an operation function of a network slice; the network slice operation request is used for the NWDAF indication agent node to operate the end-to-end network slice according to the operation parameters of the end-to-end network slice.
In one possible design, the receiving unit 1001 is configured to receive a creation notification from the NWDAF, and further configured to transmit the creation notification to the NSMF through the transmitting unit 1003. Illustratively, the creation notification includes one or more of: the creation result of the core network slice, the creation result of the access network slice, and the creation result of the transmission network slice. Further, the receiving unit 1001 is further configured to receive a second operation policy from the NSMF. The second operation policy includes a second trigger condition for generating a network slice creation request, and a second creation parameter of a corresponding end-to-end network slice, where the second trigger condition is obtained by updating the first trigger condition according to the creation notification, and the second creation parameter is obtained by updating the first creation parameter according to the creation notification. The second operation policy is used for the NWDAF to generate a creation request of a second end-to-end network slice including the second creation parameter if it is determined that the acquired network data meets the second trigger condition; the create request for the second end-to-end network slice is for the NWDAF to instruct the proxy node to recreate the end-to-end network slice.
In one possible design, the receiving unit 1001 is configured to receive an update notification from the NWDAF, and further configured to send the update notification to the NSMF through the sending unit 1003. Illustratively, the update notification includes one or more of: the updating result of the core network slice, the updating result of the access network slice and the updating result of the transmission network slice. Further, the receiving unit 1001 is further configured to receive a third operation policy from the NSMF. The third operation strategy comprises a fourth trigger condition of the network slice updating request generated by the NWDAF and a second updating parameter of a corresponding end-to-end network slice; the fourth trigger condition is obtained by updating the third trigger condition according to the update notification, and the second update parameter is obtained by updating the first update parameter according to the update notification. The third operation policy is used for the NWDAF to generate an update request of a second end-to-end network slice including the second update parameter if the collected network data meets the fourth trigger condition; the update request for the second end-to-end network slice is for the NWDAF to instruct the proxy node to re-update the end-to-end network slice.
In one possible design, the receiving unit 1001 is configured to receive a destruction notification from the NWDAF. Further, the destruction notification is transmitted to the NSMF by the transmission means 1003. Illustratively, the destruction notification includes one or more of: the destruction result of the core network slices, the destruction result of the access network slices and the destruction result of the transmission network slices. Further, the receiving unit 1001 is further configured to receive a fourth operation policy from the NSMF; the fourth operation strategy comprises a sixth trigger condition of the network slice updating request generated by the NWDAF and a second operation parameter of a corresponding end-to-end network slice; the sixth triggering condition is obtained by updating the fifth triggering condition according to the update notification, and the second operation parameter is obtained by updating the first destruction parameter according to the destruction notification. The fourth operation policy is used for generating an operation request of a second end-to-end network slice including the second operation parameter if the NWDAF determines that the acquired network data meets the sixth trigger condition; the operation request for the second end-to-end network slice is for the NWDAF to instruct the proxy node to re-operate the end-to-end network slice.
Based on the same inventive concept of the foregoing method embodiment, as shown in fig. 11, an embodiment of the present application further provides a network slice management apparatus 1100, configured to execute operations executed by the NSMF in the foregoing network slice management method. The apparatus 1100 may include a receiving unit 1101, a processing unit 1102 and a sending unit 1103. Optionally, a processing unit 1102 may also be included. The processing unit 1102 is configured to generate a first operation policy of an end-to-end network slice; the first operation strategy comprises a trigger condition of a network slicing operation request generated by an NWDAF (network device discovery and discovery function) and corresponding operation parameters of the end-to-end network slicing; the NWDAF supports an operation function of a network slice; the network slice operation request is used for the NWDAF indication agent node to operate the end-to-end network slice according to the operation parameters of the end-to-end network slice. Further, a sending unit 1103 is configured to send the first operation policy to NSSMF.
In a possible design, the receiving unit 1101 is configured to receive a creation notification from the NSSMF, where the creation notification includes a creation result of the end-to-end network slice, and the processing unit 1102 is configured to update the first operation policy to a second operation policy according to the creation notification; the second operation policy includes a second trigger condition for generating a network slice creation request and a second creation parameter of a corresponding end-to-end network slice. Wherein the second trigger condition is obtained by updating the first trigger condition according to the creation notification, and the second creation parameter is obtained by updating the first creation parameter according to the creation notification; the second operation policy is used for the NWDAF to generate a creation request of a second end-to-end network slice including the second creation parameter if the NWDAF determines that the acquired network data meet the second trigger condition; the create request for the second end-to-end network slice is for the NWDAF to instruct the proxy node to recreate the end-to-end network slice. Further, a sending unit 1103 is configured to send the second operation policy to the NSSMF.
In a possible design, the receiving unit 1101 is configured to receive an update notification from the NSSMF, where the update notification includes an update result of the end-to-end network slice, and the processing unit 1102 is configured to update the first operation policy to a third operation policy according to the update notification; the third operation strategy comprises a fourth trigger condition of the network slice updating request generated by the NWDAF and a second updating parameter of a corresponding end-to-end network slice; the fourth trigger condition is obtained by updating the third trigger condition according to the update notification, and the second update parameter is obtained by updating the first update parameter according to the update notification; the third operation policy is used for generating an update request of a second end-to-end network slice including the second update parameter if the NWDAF determines that the acquired network data meets the fourth trigger condition; the update request for the second end-to-end network slice is for the NWDAF to instruct the proxy node to re-update the end-to-end network slice. Further, a sending unit 1103 is configured to send the third operation policy to the NSSMF.
In a possible design, the receiving unit 1101 is configured to receive a destruction notification from the NSSMF, where the update notification includes a destruction result of the end-to-end network slice, and the processing unit 1102 is configured to update the first operation policy to a fourth operation policy according to the destruction notification; the fourth operation strategy comprises a sixth trigger condition of the network slice destroying request generated by the NWDAF and a second operation parameter of the corresponding end-to-end network slice; the sixth triggering condition is obtained by updating the fifth triggering condition according to the destruction notification, and the second operation parameter is obtained by updating the first destruction parameter according to the destruction notification; the fourth operation policy is used for generating an operation request of a second end-to-end network slice including the second operation parameter if the NWDAF determines that the acquired network data meets the sixth trigger condition; the operation request for the second end-to-end network slice is for the NWDAF to instruct the proxy node to re-operate the end-to-end network slice. Further, a sending unit 1103 is configured to send the fourth operation policy to the NSSMF.
Based on the same inventive concept of the foregoing method embodiment, as shown in fig. 12, an embodiment of the present application further provides a network slice management apparatus 1200, configured to execute an operation executed by a proxy node in the foregoing network slice management method. The apparatus 1200 may comprise a receiving unit 1201, a processing unit 1202 and a transmitting unit 1203. The receiving unit 1201 is configured to receive a network slice operation request from a network data analysis function NWDAF, and the processing unit 1202 is configured to operate the end-to-end network slice according to an operation parameter of the end-to-end network slice in the network slice operation request. The network slice operation request is generated according to operation parameters of an end-to-end network slice in a first operation strategy when the NWDAF determines that the acquired network data meets the trigger condition of the first operation strategy; the first operation strategy comprises a trigger condition for the NWDAF to generate the network slicing operation request and corresponding operation parameters of the end-to-end network slicing; the NWDAF supports operational functionality of network slices.
A scenario of a create request for a first end-to-end network slice is generated for the NWDAF. Illustratively, the end-to-end network slice includes one or more of: core network slicing, access network slicing and transmission network slicing. A processing unit 1202, configured to create the core network slice according to the creation request of the first end-to-end network slice; and/or generating a first creation request for sending the access network slice to the access network device according to the creation request of the first end-to-end network slice, and sending the first creation request of the access network slice to the access network device through a sending unit 1203; and/or, according to the creation request of the first end-to-end network slice, generating and sending a first creation request of the transport network slice to a transport network device through a sending unit 1203. A receiving unit 1201, configured to obtain a creation result of the end-to-end network slice; the end-to-end network slice creation result includes one or more of: a creation result of a core network slice, a creation result of the access network slice from the access network device, and a creation result of the transmission network slice from the transmission network device. Further, a sending unit 1203 is configured to send a creation notification to the NWDAF; the creation notification includes a creation result of the end-to-end network slice.
A scenario of an update request of a first end-to-end network slice is generated for the NWDAF. A processing unit 1202, configured to update the core network slice according to an update request of a first end-to-end network slice; and/or, according to the update request of the first end-to-end network slice, generating and sending a first update request of the access network slice to an access network device through a sending unit 1203; and/or, according to the update request of the first end-to-end network slice, generating and sending a first update request of the transmission network slice to a transmission network device through a sending unit 1203. Further, the receiving unit 1201 is configured to obtain an update result of the end-to-end network slice. Further, a transmitting unit 1203 is configured to transmit an update notification to the NWDAF, where the update notification includes an update result of the end-to-end network slice. Illustratively, the update result of the end-to-end network slice includes one or more of: the update result of the core network slice, the update result of the access network slice from the access network device, and the update result of the transmission network slice from the transmission network device.
A scenario of a destruction request of a first end-to-end network slice is generated for the NWDAF. A processing unit 1202, configured to destroy the core network slice according to the destruction request of the first end-to-end network slice; and/or generating a first destruction request for sending the access network slice to the access network device according to the destruction request for the first end-to-end network slice, and sending the first destruction request for sending the access network slice to the access network device through a sending unit 1203; and/or generating and sending a first destruction request of the transport network slice to a transport network device through a sending unit 1203 according to the destruction request of the first end-to-end network slice. A receiving unit 1201, configured to obtain a destruction result of the end-to-end network slice, and further, a sending unit 1203 is configured to send a destruction notification to the NWDAF; the destruction notification includes a result of destruction of the end-to-end network slice. Illustratively, the result of destruction of the end-to-end network slice includes one or more of: the destruction result of the core network slice, the destruction result of the access network slice from the access network equipment, and the destruction result of the transmission network slice from the transmission network equipment.
Based on the same inventive concept as that of the above method embodiment, as shown in fig. 13, an embodiment of the present application further provides a network slice management apparatus 1300, where the communication apparatus 1300 is configured to implement operations performed by an NWDAF, NSSMF, NSMF, or a proxy node in the method provided by the above embodiment, for brief description, a schematic diagram of the possible entity apparatuses of the above network elements is illustrated by referring to fig. 13, and it can be understood that fig. 13 is only a schematic diagram, and it may be applied to various network elements described above. The network slice management apparatus 1300 includes: a transceiver 1301, a processor 1302, and a memory 1303. The processor 1302 is configured to invoke a set of programs that, when executed, cause the processor 1302 to perform operations performed by the NWDAF, NSSMF, NSMF, or proxy node in one of the methods provided by the embodiments described above. The memory 1303 is used for storing programs executed by the processor 1302. The transmitting unit and the receiving unit in fig. 9-12 may be implemented by the transceiver 1301, and the processing unit may be implemented by the processor 1302.
The processor 1302 may be a Central Processing Unit (CPU), a Network Processor (NP), or a combination of a CPU and an NP.
The processor 1302 may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or a combination thereof. The PLD may be a Complex Programmable Logic Device (CPLD), a field-programmable gate array (FPGA), a General Array Logic (GAL), or any combination thereof.
The memory 1303 may include volatile memory (RAM), such as random-access memory (RAM); the memory 1303 may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a Hard Disk Drive (HDD) or a SolID State Drive (SSD); the memory 1303 may also comprise a combination of memories of the above-mentioned kinds.
In the methods provided in the above embodiments of the present application, some or all of the operations and functions performed by the described network elements or devices may be implemented by chips or integrated circuits.
In order to implement the functions of the apparatus described in fig. 9 to fig. 13, an embodiment of the present application further provides a chip, which includes a processor and is configured to support the apparatus to implement the functions related to the method provided by the foregoing embodiment. In one possible design, the chip is connected to or includes a memory for storing the necessary program instructions and data for the device.
The embodiment of the application provides a computer storage medium, which stores a computer program, wherein the computer program comprises instructions for executing the method provided by the embodiment.
The present application provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the method provided by the above embodiments.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications can be made in the embodiments of the present application without departing from the spirit and scope of the embodiments of the present application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to encompass such modifications and variations.
Claims (19)
1. A method for network slice management, comprising:
the network data analysis function NWDAF receives a first operation policy from the sub-network slice management function NSSMF; the first operation strategy comprises a trigger condition of the network slicing operation request generated by the NWDAF and corresponding operation parameters of an end-to-end network slice; the NWDAF supports network slicing operation management capabilities;
if the NWDAF determines that the acquired network data meet the trigger condition, the network slice operation request comprising the operation parameters of the end-to-end network slice is generated; the network slice operation request is used for indicating a proxy node to operate the end-to-end network slice according to the operation parameters of the end-to-end network slice;
the NWDAF sends the network slicing operation request to the proxy node.
2. The method of claim 1, wherein the first operating policy comprises a first trigger condition for the NWDAF to generate a network slice creation request, and a first creation parameter for a corresponding end-to-end network slice;
if the NWDAF determines that the acquired network data meets the trigger condition, generating the network slice operation request according to the operation parameters of the end-to-end network slice, including:
if the NWDAF determines that the acquired network data meet the first trigger condition, a creation request of a first end-to-end network slice including the first creation parameter is generated; the creation request of the first end-to-end network slice is used for instructing the proxy node to create the end-to-end network slice according to the first creation parameter.
3. The method of claim 2, wherein the method further comprises:
the NWDAF receiving a creation notification from a proxy node, the creation notification including a creation result of the end-to-end network slice;
the NWDAF sending the creation notification to the NSSMF;
the NWDAF receiving a second operating policy from the NSSMF; the second operation strategy comprises a second trigger condition for generating a network slice creation request and a second creation parameter of a corresponding end-to-end network slice, wherein the second trigger condition is obtained by updating the first trigger condition according to the creation notification, and the second creation parameter is obtained by updating the first creation parameter according to the creation notification;
if the NWDAF determines that the acquired network data meet the second trigger condition, a creation request of a second end-to-end network slice including the second creation parameter is generated; the creation request of the second end-to-end network slice is used for instructing the proxy node to recreate the end-to-end network slice according to the second creation parameter.
4. The method of claim 1, wherein the first operational policy comprises a third trigger condition for the NWDAF to generate a network slice update request, and a first update parameter for a corresponding end-to-end network slice;
if the NWDAF determines that the acquired network data meets the trigger condition, generating the network slice operation request according to the operation parameters of the end-to-end network slice, including:
if the NWDAF determines that the acquired network data meet the third trigger condition, an updating request of a first end-to-end network slice comprising the first updating parameter is generated; the update request of the first end-to-end network slice is used for instructing the proxy node to update the end-to-end network slice according to the first update parameter.
5. The method of claim 4, wherein the method further comprises:
the NWDAF receiving an update notification from a proxy node, the update notification including an update result of the end-to-end network slice;
the NWDAF sending the update notification to the NSSMF;
the NWDAF receiving a third operating policy from the NSSMF; the third operation strategy comprises a fourth trigger condition of the network slice updating request generated by the NWDAF and a second updating parameter of a corresponding end-to-end network slice; wherein the fourth trigger condition is obtained by updating the third trigger condition according to the update notification, and the second update parameter is obtained by updating the first update parameter according to the update notification;
if the NWDAF determines that the acquired network data meet the fourth trigger condition, an updating request of a second end-to-end network slice comprising the second updating parameter is generated; the update request of the second end-to-end network slice is used for instructing the proxy node to renew the end-to-end network slice according to the second update parameter.
6. A method for network slice management, comprising:
the sub-network slice management function NSSMF receiving a first operation policy from the network slice management function NSMF; the first operation strategy comprises a trigger condition for generating a network slicing operation request by a network data analysis function (NWDAF) and corresponding operation parameters of an end-to-end network slice; the NWDAF supports network slicing operation management capabilities; the network slice operation request is used for the NWDAF indication agent node to operate the end-to-end network slice according to the operation parameters of the end-to-end network slice;
the NSSMF sends the first operating policy to the NWDAF.
7. The method of claim 6, wherein the first operational policy comprises a first trigger condition of the NWDAF-generated network slice creation request and a first creation parameter of a corresponding end-to-end network slice; the first operation strategy is used for the NWDAF to generate a creation request of a first end-to-end network slice including the first creation parameter if the NWDAF determines that the acquired network data meet the first trigger condition; the create request for the first end-to-end network slice is for the NWDAF to instruct the proxy node to create the end-to-end network slice;
the method further comprises the following steps:
the NSSMF receiving a creation notification from the NWDAF, the creation notification including a creation result of the end-to-end network slice;
the NSSMF sending the create notification to the NSMF;
the NSSMF receiving a second operating policy from the NSMF; the second operation strategy comprises a second trigger condition for generating a network slice creating request and a second creating parameter of a corresponding end-to-end network slice, wherein the second trigger condition is obtained by updating the first trigger condition according to the creating notification, and the second creating parameter is obtained by updating the first creating parameter according to the creating notification;
the second operation policy is used for the NWDAF to generate a creation request of a second end-to-end network slice including the second creation parameter if the NWDAF determines that the acquired network data meet the second trigger condition; the create request for the second end-to-end network slice is for the NWDAF to instruct the proxy node to recreate the end-to-end network slice.
8. The method of claim 7, wherein the first operational policy comprises a third trigger condition for the NWDAF to generate a network slice update request, and a first update parameter for a corresponding end-to-end network slice; the first operation policy is used for the NWDAF to generate an update request of a first end-to-end network slice including the first update parameter if it is determined that the acquired network data meets the third trigger condition; the update request for the first end-to-end network slice is for the NWDAF to instruct the proxy node to update the end-to-end network slice;
the method further comprises the following steps:
the NSSMF receiving an update notification from the NWDAF, the update notification including an update result of the end-to-end network slice;
the NSSMF sending the update notification to the NSMF;
the NSSMF receiving a third operating policy from the NSMF; the third operation strategy comprises a fourth trigger condition of the network slice updating request generated by the NWDAF and a second updating parameter of a corresponding end-to-end network slice; wherein the fourth trigger condition is obtained by updating the third trigger condition according to the update notification, and the second update parameter is obtained by updating the first update parameter according to the update notification;
the third operation policy is used for generating an update request of a second end-to-end network slice including the second update parameter if the NWDAF determines that the acquired network data meets the fourth trigger condition; the update request for the second end-to-end network slice is for the NWDAF to instruct the proxy node to re-update the end-to-end network slice.
9. A method for network slice management, comprising:
a network slice management function NSMF generates a first operation strategy of an end-to-end network slice; the first operation strategy comprises a trigger condition for generating a network slicing operation request by a network data analysis function (NWDAF) and corresponding operation parameters of the end-to-end network slicing; the NWDAF supports network slicing operation management capabilities;
the NSMF sends the first operation strategy to a sub-network slice management function NSSMF; the first operation policy is used for forwarding, by the NSSMF, to the NWDAF, and for the NWDAF, after determining that the acquired network data satisfies the trigger condition, to generate the network slice operation request including the operation parameters of the end-to-end network slice; the network slice operation request is used for the NWDAF indication agent node to operate the end-to-end network slice according to the operation parameters of the end-to-end network slice.
10. The method of claim 9, wherein the first operating policy comprises a first trigger condition for the NWDAF to generate a network slice creation request, and a first creation parameter for a corresponding end-to-end network slice; the first operation policy is used for the NWDAF to generate a creation request of a first end-to-end network slice including the first creation parameter if the NWDAF determines that the acquired network data meet the first trigger condition; the creation request of the first end-to-end network slice is used for instructing the proxy node to create the end-to-end network slice according to the first creation parameter;
the method further comprises the following steps:
the NSMF receiving a creation notification from the NSSMF, the creation notification including a creation result of the end-to-end network slice;
the NSMF updating the first operation strategy into a second operation strategy according to the creation notice; the second operation strategy comprises a second trigger condition for generating a network slice establishing request and a second establishing parameter of a corresponding end-to-end network slice; wherein the second trigger condition is obtained by updating the first trigger condition according to the creation notification, and the second creation parameter is obtained by updating the first creation parameter according to the creation notification;
the second operation policy is used for the NWDAF to generate a creation request of a second end-to-end network slice including the second creation parameter if the NWDAF determines that the acquired network data meet the second trigger condition; the create request for the second end-to-end network slice is for the NWDAF to instruct the proxy node to recreate the end-to-end network slice;
the NSMF sends the second operating policy to the NSSMF.
11. The method of claim 9, wherein the first operational policy comprises a third trigger condition for the NWDAF to generate a network slice update request, and a first update parameter for a corresponding end-to-end network slice; the first operation strategy is used for generating an updating request of a first end-to-end network slice according to the first updating parameter if the NWDAF determines that the acquired network data meets the third triggering condition; the update request of the first end-to-end network slice is used for instructing the proxy node to update the end-to-end network slice according to the first update parameter;
the method further comprises the following steps:
the NSMF receiving an update notification from the NSSMF, the update notification including an update result of the end-to-end network slice;
the NSMF updating the first operation strategy into a third operation strategy according to the updating notice; the third operation strategy comprises a fourth trigger condition of the network slice updating request generated by the NWDAF and a second updating parameter of a corresponding end-to-end network slice; the fourth trigger condition is obtained by updating the third trigger condition according to the update notification, and the second update parameter is obtained by updating the first update parameter according to the update notification;
the third operation policy is used for generating an update request of a second end-to-end network slice including the second update parameter if the NWDAF determines that the acquired network data meets the fourth trigger condition; the update request for the second end-to-end network slice is for the NWDAF to instruct the proxy node to re-update the end-to-end network slice;
the NSMF sends the third operating policy to the NSSMF.
12. The method of claim 10, wherein the end-to-end network slice comprises one or more of: core network slicing, access network slicing and transmission network slicing;
the creation request of the end-to-end network slice is used for instructing the proxy node to create a core network slice; and/or sending a creation request of the access network slice to the access network equipment; and/or sending a transmission network slice creation request to the transmission network equipment;
the creation result of the end-to-end network slice includes one or more of: creating results of the core network slices; the creation result of the access network slice, or the creation result of the transmission network slice.
13. The method of claim 11, wherein the end-to-end network slice comprises one or more of: core network slicing, access network slicing and transmission network slicing;
the update request of the end-to-end network slice is used for indicating the proxy node to update the core network slice; and/or sending an update request of the access network slice to the access network equipment; and/or sending an update request of the transmission network slice to the transmission network equipment;
the updated result of the end-to-end network slice includes one or more of: updating results of the core network slices; the update result of the access network slice, or the update result of the transmission network slice.
14. A method for network slice management, comprising:
the proxy node receives a network slicing operation request from a network data analysis function (NWDAF); the NWDAF supports network slicing operation management capabilities; the network slice operation request is generated after the NWDAF determines that the acquired network data meets the trigger condition of a first operation strategy, and the network slice operation request comprises operation parameters of an end-to-end network slice in the first operation strategy; the first operation policy is sent by a network slice management function NSMF to the NWDAF via a sub-network slice management function NSSMF;
and the proxy node operates the end-to-end network slice according to the operation parameters of the end-to-end network slice in the network slice operation request.
15. The method of claim 14, wherein the end-to-end network slice comprises one or more of: core network slicing, access network slicing and transmission network slicing;
the proxy node operates the end-to-end network slice according to the operation parameters of the end-to-end network slice in the network slice operation request, and the operation comprises the following steps:
the proxy node operates the core network slice according to the operation request of the end-to-end network slice; and/or the presence of a gas in the atmosphere,
the proxy node generates and sends an operation request of the access network slice to access network equipment according to the operation request of the end-to-end network slice; and/or the presence of a gas in the gas,
and the agent node generates and sends the operation request of the transmission network slice to the transmission network equipment according to the operation request of the end-to-end network slice.
16. The method of claim 15, wherein the method further comprises:
the proxy node acquires the creation result of the end-to-end network slice; the end-to-end network slice creation result includes one or more of:
a creation result of a core network slice, a creation result of the access network slice from the access network device, and a creation result of the transmission network slice from the transmission network device;
the proxy node sending a creation notification to the NWDAF; the creation notification includes a creation result of the end-to-end network slice.
17. The method of claim 15, wherein the method further comprises:
the proxy node acquires the updating result of the end-to-end network slice; the updated result of the end-to-end network slice includes one or more of:
an update result of the core network slice, an update result of the access network slice from the access network device, or an update result of the transmission network slice from the transmission network device;
the proxy node sends an update notification to the NWDAF, the update notification including an update result of the end-to-end network slice.
18. A network slice management apparatus, comprising: a processor and a memory, the processor coupled with the memory;
a memory for storing a computer program;
a processor for executing a computer program stored in the memory to cause the apparatus to perform the method of any one of claims 1 to 17.
19. A computer storage medium comprising instructions that, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 17.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911046779.XA CN112752326B (en) | 2019-10-30 | 2019-10-30 | Network slice management method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911046779.XA CN112752326B (en) | 2019-10-30 | 2019-10-30 | Network slice management method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112752326A CN112752326A (en) | 2021-05-04 |
CN112752326B true CN112752326B (en) | 2022-08-19 |
Family
ID=75640719
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911046779.XA Active CN112752326B (en) | 2019-10-30 | 2019-10-30 | Network slice management method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112752326B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115701043B (en) * | 2021-07-14 | 2024-07-19 | 南宁富联富桂精密工业有限公司 | Network slice management method, device and computer readable storage medium |
CN113905401B (en) * | 2021-09-29 | 2023-07-18 | 中国联合网络通信集团有限公司 | Sub-slice butt joint method, device and equipment |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108809671B (en) * | 2017-04-26 | 2020-10-09 | 华为技术有限公司 | Communication method, network equipment and system |
CN109768875B (en) * | 2017-11-10 | 2021-10-15 | 华为技术有限公司 | Network slice policy management method, device, equipment and system |
-
2019
- 2019-10-30 CN CN201911046779.XA patent/CN112752326B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN112752326A (en) | 2021-05-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3675549B1 (en) | Network slice management method, device and system | |
CN112449315B (en) | Network slice management method and related device | |
CN109600755B (en) | Method and equipment for deploying and evaluating network resources | |
CN108282352B (en) | Method, device and system for managing network slice instances | |
EP3669591B1 (en) | Network entity, user equipment and method for the control and use of network slices | |
US20190149998A1 (en) | Method and apparatus for managing network slice | |
US11265808B2 (en) | Adaptive network slice selection | |
KR102058662B1 (en) | Communication system for communication in a communication network with subnetworks | |
CN109644383B (en) | Communication system, communication device, and storage medium | |
US20200014589A1 (en) | Network slice configuration method, apparatus, and system | |
CN109842507B (en) | Network slice management method and equipment | |
CN114009096A (en) | Interworking of application workload routing and network-defined edge routing | |
CN108307407B (en) | Communication method and device | |
CN109314696B (en) | Method and device for managing network slices | |
WO2018195877A1 (en) | Communication method, device and system | |
CN110875827B (en) | Network slice management method and device | |
US11418385B2 (en) | Network alarm method, device, system and terminal | |
CN110771221B (en) | Robust adaptation of access and mobility management functions | |
CN108235376B (en) | User plane anchor point selection method and device | |
US11483759B2 (en) | Address sending method and device and storage medium | |
CN109391503B (en) | Network slice management method and device | |
CN108476467B (en) | Method for establishing a communication connection of a communication terminal via a communication network | |
CN112752326B (en) | Network slice management method and device | |
CN113597021A (en) | Communication method, device and system | |
US12126459B2 (en) | Network slice charging method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |