CN108632065A - Manage method, the network equipment and the system of network slice example - Google Patents

Manage method, the network equipment and the system of network slice example Download PDF

Info

Publication number
CN108632065A
CN108632065A CN201710167783.6A CN201710167783A CN108632065A CN 108632065 A CN108632065 A CN 108632065A CN 201710167783 A CN201710167783 A CN 201710167783A CN 108632065 A CN108632065 A CN 108632065A
Authority
CN
China
Prior art keywords
network
network equipment
information
subnet example
network slice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710167783.6A
Other languages
Chinese (zh)
Other versions
CN108632065B (en
Inventor
陆伟
杨水根
孙文琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201710167783.6A priority Critical patent/CN108632065B/en
Priority to PCT/CN2018/078292 priority patent/WO2018171430A1/en
Publication of CN108632065A publication Critical patent/CN108632065A/en
Application granted granted Critical
Publication of CN108632065B publication Critical patent/CN108632065B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0668Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis

Abstract

This application provides method, the network equipment and systems that a kind of management network is sliced example, can improve the efficiency of management network slice example, including:First network equipment determines that first network slice subnet example breaks down;First network equipment sends the first instruction information to second network equipment, and the first instruction information is used to indicate second network equipment and activates the second network slice subnet example, wherein the second network slice subnet example is for replacing first network slice subnet example.

Description

Manage method, the network equipment and the system of network slice example
Technical field
This application involves the communications fields, and more particularly, to management network be sliced the method for example, the network equipment and System.
Background technology
With the high speed development of mobile communication, following mobile communication system needs to meet diversified business demand, example Such as, enhanced mobile broadband, the communication of large-scale machines class, superelevation are reliably with the communication of low latency etc..Therefore mobile in the next generation The concept of network slice is proposed in communication system.Network microtomy refers to that network is logically abstracted as to one or more A network slice, wherein each network slice includes a series of logical network function, a network slice can meet a certain The connection communication demand for services of class or a use-case.Next generation mobile communication system can be by meeting a large amount of of different concatenation abilities Network slice composition.
In a communication network, when network element breaks down, can be found by the self-checking circuit of failure network element failure or performance, Threshold measurement task finds failure.But this self-healing system is only capable of carrying out self-healing management to the failure of single network function, cannot Meet the flexible fault management demand of network slice level.
Invention content
The application provides a kind of methods, devices and systems of management network slice example, can improve management network slice The efficiency of example.
In a first aspect, a kind of method of management network slice example is provided, including:First network equipment determines the first net Network is sliced subnet example and breaks down;The first network equipment sends the first instruction information to second network equipment, and described the One instruction information is used to indicate second network equipment and activates the second network slice subnet example, wherein second network Slice subnet example is for replacing the first network slice subnet example.
In the embodiment of the present application, first network equipment is determining the case where first network slice subnet example breaks down Under, it can indicate that second network equipment activates the second network slice subnet example, subnet example is sliced to replace first network, from And network slice example can be neatly managed, improve the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment sends second to the third network equipment Indicate that information, the second instruction information are used to indicate the third network equipment and nullify the first network slice subnet reality Example.
In the embodiment of the present application, first network equipment sends the second instruction information to the third network equipment, to indicate It states the third network equipment and nullifies the first network slice subnet example to break down, in order to which the second network slice subnet example replaces First network slice subnet example is changed, example is sliced so as to neatly manage network, improves management network slice example Efficiency.
In one possible implementation, further include:The first network equipment sends third to the 4th network equipment Indicate that information, the third instruction information are used to indicate the 4th network equipment and reconfigure and first network slice subnet The associated third network of example is sliced subnet example, it is described reconfigure after third network slice subnet example with it is described It is associated that second network is sliced subnet example.
In the embodiment of the present application, first network equipment indicates that the 4th network equipment reconfigures and first network slice The associated third network of subnet example is sliced subnet example, so that first network slice subnet example and third network slice The cooperation offer service of net example is sliced example so as to neatly manage network, improves the effect of management network slice example Rate.
In one possible implementation, described before sending the second instruction information to second network equipment described Method further includes:The parameter information of first network slice subnet example is backed up to storage and set by the first network equipment It is standby.
In the embodiment of the present application, the parameter information of first network slice subnet example is backed up to and is deposited by first network equipment Equipment is stored up, example is sliced so as to neatly manage network, improves the efficiency of management network slice example.
In one possible implementation, further include:The performance that subnet example is sliced in second network is not met In the case of predetermined condition, the first network equipment sends the 4th instruction information, the 4th instruction to the third network equipment Information is used to indicate the third network equipment and backs up to the storage device based on first network slice subnet example In parameter information, restore first network slice subnet example.
In the embodiment of the present application, the first network equipment instruction third network equipment is based on first network and is sliced subnet example The parameter information backed up in storage device, restore first network be sliced subnet example, so as to neatly manage network It is sliced example, improves the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment obtains the second network slice The performance information of net example, the performance information are used to indicate the performance of the second network slice subnet example;Described first The network equipment is based on the performance information, determines whether the performance of the second network slice subnet example conforms to a predetermined condition.
In the embodiment of the present application, the first network equipment instruction third network equipment is based on first network and is sliced subnet example The parameter information backed up in storage device, restore first network be sliced subnet example, so as to neatly manage network It is sliced example, improves the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment is received from second network equipment Fault alarm information, the fault alarm information are used to indicate the first network slice subnet example and break down;Described One network equipment determines that first network slice subnet example breaks down, including:The first network equipment is according to the failure Warning message determines the first network slice subnet example.
In the embodiment of the present application, first network equipment receives fault alarm information from second network equipment, and according to event First network slice subnet example failure is stated in barrier warning message determination, and example is sliced so as to neatly manage network, Improve the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment will use second network to be sliced The procedural information that subnet example replaces the first network slice subnet example is recorded to storage device.
In the embodiment of the present application, first network equipment will use the second network slice subnet example to replace first network and cut The procedural information of piece subnet example is recorded to storage device, is sliced example so as to neatly manage network, is improved management Network is sliced the efficiency of example.
In one possible implementation, further include:The second network slice subnet example is second network The network of the redundancy of equipment management is sliced subnet example.
In one possible implementation, further include:The second network slice subnet example is second network The newly-built network of equipment is sliced subnet example.
Second aspect provides a kind of method of management network slice example, including:Second network equipment is from first network Equipment receives the first instruction information, and the first instruction information is used to indicate second network equipment and activates the second network slice Subnet example, wherein the second network slice subnet example is for replacing first network slice subnet example;Second net Network equipment indicates information according to described first, and second network is activated to be sliced subnet example.
In the embodiment of the present application, second network equipment receives the first instruction information, the second network from first network equipment Equipment activates second network to be sliced subnet example according to the first instruction information, and subnet example is sliced to replace first network, It is sliced example so as to neatly manage network, improves the efficiency of management network slice example.
In one possible implementation, further include:Second network equipment is sent to the first network equipment Fault alarm information, the fault alarm information are used to indicate the first network slice subnet example and break down.
In the embodiment of the present application, second network equipment sends fault alarm information to first network equipment, with to first The network equipment indicates that first network slice subnet example breaks down, and is sliced example so as to neatly manage network, improves The efficiency of management network slice example.
The third aspect provides a kind of method of management network slice example, including:First network equipment determines the first net Network is sliced subnet example and breaks down;The first network equipment sends the first instruction information to second network equipment, and described the One instruction information is used to indicate second network equipment and executes rollback processing to first network slice subnet example.
In the embodiment of the present application, first network equipment determines the case where first network slice subnet example breaks down Under, it can indicate that second network equipment executes rollback processing to first network slice subnet example, so as to neatly manage Network is sliced example, improves the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment obtains first network slice The historical parameter information of net example;The first network equipment is sliced the history parameters letter of subnet example based on the first network Breath determines the first instruction information.
In the embodiment of the present application, first network equipment obtains the historical parameter information of first network slice subnet example; And it is based on the historical parameter information, determine the first instruction information.It is sliced example so as to neatly manage network, is improved The efficiency of management network slice example.
In one possible implementation, further include:The first network equipment is obtained from second network equipment The historical parameter information of the first network slice subnet example;The first network is sliced subnet by the first network equipment The historical parameter information of example backs up to storage device;The first network equipment obtains the first network and is sliced subnet example Historical parameter information, including:The first network equipment obtains the first network slice subnet reality from the storage device The historical parameter information of example.
In the embodiment of the present application, historical parameter information is backed up to storage device by first network equipment, so as to spirit Network slice example is managed livingly, improves the efficiency of management network slice example.
In one possible implementation, in the first network equipment the first instruction letter is sent to second network equipment Before breath, further include:The first network equipment obtains the parameter current information of the first network slice subnet example;It is described The first network is sliced the parameter current information back-up of subnet example to storage device by first network equipment.
In the embodiment of the present application, first network is sliced the parameter current information back-up of example to depositing by first network equipment Equipment is stored up, subnet example is sliced in order to restore first network, example is sliced so as to neatly manage network, improves pipe Manage the efficiency of network slice example.
In one possible implementation, further include:It retracts that treated executing the first network is sliced subnet In the case that the performance of example does not meet predetermined condition, the first network equipment sends second to second network equipment and refers to Show information, the second instruction information be used to indicate second network equipment based on back up in the storage device first Network is sliced the parameter current information of subnet example, restores the first network slice subnet example.
In the embodiment of the present application, first network equipment obtains the parameter current that first network is sliced example from storage device Information, and first network is restored according to the current parameter information and is sliced subnet example, so as to neatly manage network slice Example improves the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment, which obtains, executes the institute that retracts that treated The performance information of first network slice subnet example is stated, the performance information is used to indicate the first network slice subnet example Performance;The first network equipment is based on the performance information, determines that the performance of the first network slice subnet example is It is no to conform to a predetermined condition.
In the embodiment of the present application, first network equipment obtains the performance letter for treated the first network slice example that retracts Breath, and determine whether the performance of first network slice subnet example conforms to a predetermined condition based on performance information, so as to flexible Ground manages network and is sliced example, improves the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment will be sliced son to the first network The procedural information that net example executes the processing that retracts is recorded to storage device.
In the embodiment of the present application, first network equipment will execute first network slice subnet example the mistake for the processing that retracts Journey information is recorded to storage device, and example is sliced so as to neatly manage network, improves management network slice example Efficiency.
In one possible implementation, further include:The first network equipment is received from second network equipment Fault alarm information, the fault alarm information are used to indicate the first network slice subnet example and break down;Described One network equipment determines that first network slice subnet example breaks down, including:The first network equipment is according to the failure Warning message determines the first network slice subnet example.
In the embodiment of the present application, first network equipment receives fault alarm information from second network equipment, and according to event Barrier warning message determines that first network slice subnet example breaks down, and is sliced example so as to neatly manage network, carries The high efficiency of management network slice example.
Fourth aspect provides a kind of method of management network slice example, including:Second network equipment is from first network Equipment receives the first instruction information, and the first instruction information is used to indicate second network equipment to the first of failure Network is sliced subnet example and executes rollback processing;Second network equipment indicates information according to described first, to described first Network is sliced subnet example and executes rollback processing.
In the embodiment of the present application, second network equipment receives the first instruction information from first network equipment, first finger Show that information is used to indicate the first network equipment and executes rollback processing, second network equipment to first network slice subnet example Rollback processing is executed to first network slice subnet example based on the first instruction information, so as to neatly manage net Network is sliced example, improves the efficiency of management network slice example.
In one possible implementation, in second network equipment the first instruction letter is received from first network equipment Before breath, the method further includes:Second network equipment sends the first network slice to the first network equipment The parameter current information of example, in order to the first network equipment by the first network be sliced subnet example parameter current Information back-up is to storage device.
In the embodiment of the present application, second network equipment sends first network to first network equipment and is sliced subnet example Parameter current information, in order to which first network equipment extremely stores the parameter current information back-up of first network slice subnet example Equipment is sliced example so as to neatly manage network, improves the efficiency of management network slice example.
In one possible implementation, further include:It retracts that treated executing the first network is sliced subnet In the case that the performance of example does not meet predetermined condition, second network equipment receives second from the first network equipment and refers to Show information, the second instruction information be used to indicate second network equipment based on back up in the storage device first Network is sliced the parameter current information of subnet example, restores the first network slice subnet example.
In the embodiment of the present application, the first instruction information that second network equipment is sent based on first network equipment, restores First network is sliced subnet example.It is sliced example so as to neatly manage network, improves management network slice example Efficiency.
In one possible implementation, further include:Second network equipment is sent to the first network equipment Fault alarm information, the fault alarm information are used to indicate the first network slice subnet example and break down.
In the embodiment of the present application, second network equipment sends fault alarm information to first network equipment, to indicate the One network is sliced subnet example and breaks down.It is sliced example so as to neatly manage network, improves management network slice The efficiency of example.
In one possible implementation, further include:Second network equipment is sent to the first network equipment The historical parameter information of the first network slice subnet example, in order to which the first network equipment cuts the first network The historical parameter information of piece subnet example backs up to storage device.
In the embodiment of the present application, second network equipment sends first network to first network equipment and is sliced subnet example Historical parameter information, in order to which the historical parameter information of first network slice subnet example is backed up to storage by first network equipment Equipment is sliced example so as to neatly manage network, improves the efficiency of management network slice example.
5th aspect, provides a kind of network equipment, the arbitrary possibility for executing above-mentioned first aspect or first aspect Realization method in method.Specifically, which includes for executing the arbitrary of above-mentioned first aspect or first aspect The unit of method in possible realization method.
6th aspect, provides another network equipment, can for executing above-mentioned second aspect or the arbitrary of second aspect Method in the realization method of energy.Specifically, which includes times for executing above-mentioned second aspect or second aspect The unit for the method anticipated in possible realization method.
7th aspect, provides another network equipment, can for executing the above-mentioned third aspect or the arbitrary of the third aspect Method in the realization method of energy.Specifically, which includes times for executing the above-mentioned third aspect or the third aspect The unit for the method anticipated in possible realization method.
Eighth aspect provides another network equipment, can for executing above-mentioned fourth aspect or the arbitrary of fourth aspect Method in the realization method of energy.Specifically, which includes times for executing above-mentioned fourth aspect or fourth aspect The unit for the method anticipated in possible realization method.
9th aspect, provide a kind of network system, the system include it is above-mentioned 5th aspect, the 6th aspect described in network Equipment, or including the network equipment described in above-mentioned 7th aspect and eighth aspect.
Tenth aspect, provides a kind of network equipment, which includes:Communication interface, memory, processor and total Linear system is united.Wherein, the communication interface, the memory and the processor are connected by the bus system, and the memory is for storing Instruction, the processor are used to execute the instruction of memory storage, are believed with controlling the communication interface and receiving signal and/or send Number, and when the processor executes the instruction of memory storage, which makes the processor execute first aspect or the Method in the arbitrary possible realization method of one side.
On the one hand tenth, provides a kind of network equipment, which includes:Communication interface, memory, processor and Bus system.Wherein, the communication interface, the memory and the processor are connected by the bus system, and the memory is for depositing Storage instruction, the processor are used to execute the instruction of memory storage, are believed with controlling the communication interface and receiving signal and/or send Number, and when the processor executes the instruction of memory storage, which makes the processor execute second aspect or the Method in the arbitrary possible realization method of two aspects.
12nd aspect, provides a kind of network equipment, which includes:Communication interface, memory, processor and Bus system.Wherein, the communication interface, the memory and the processor are connected by the bus system, and the memory is for depositing Storage instruction, the processor are used to execute the instruction of memory storage, are believed with controlling the communication interface and receiving signal and/or send Number, and when the processor executes the instruction of memory storage, which makes the processor execute the third aspect or the Method in the arbitrary possible realization method of three aspects.
13rd aspect, provides a kind of network equipment, which includes:Communication interface, memory, processor and Bus system.Wherein, the communication interface, the memory and the processor are connected by the bus system, and the memory is for depositing Storage instruction, the processor are used to execute the instruction of memory storage, are believed with controlling the communication interface and receiving signal and/or send Number, and when the processor executes the instruction of memory storage, which makes the processor execute fourth aspect or the Method in the arbitrary possible realization method of four aspects.
Fourteenth aspect provides a kind of network system, which includes above-mentioned tenth aspect, described in the tenth one side The network equipment, or including the network equipment described in above-mentioned 12nd aspect and the 13rd aspect.
15th aspect, provides a kind of computer-readable medium, for storing computer program, the computer program packet Include the instruction of the method in the arbitrary possible realization method for executing first aspect or first aspect.
16th aspect, provides a kind of computer-readable medium, for storing computer program, the computer program packet Include the instruction of the method in the arbitrary possible realization method for executing second aspect or second aspect.
17th aspect, provides a kind of computer-readable medium, for storing computer program, the computer program packet Include the instruction of the method in the arbitrary possible realization method for executing the third aspect or the third aspect.
18th aspect, provides a kind of computer-readable medium, for storing computer program, the computer program packet Include the instruction of the method in the arbitrary possible realization method for executing fourth aspect or fourth aspect.
19th aspect, provide a kind of network system, the system include it is above-mentioned 15th aspect, the 16th aspect described in Computer-readable medium, or including it is above-mentioned 17th aspect and the 18th aspect described in computer-readable medium.
Description of the drawings
Fig. 1 is the schematic diagram of the network management framework of the embodiment of the present application.
Fig. 2 is the schematic diagram of the network management framework of the another embodiment of the application.
Fig. 3 is the schematic diagram of the network management framework of the another embodiment of the application.
Fig. 4 is the schematic diagram of the network management framework of the another embodiment of the application.
Fig. 5 is the schematic diagram of the method for the management network slice example of the embodiment of the present application.
Fig. 6 is the schematic diagram of the method for the management network slice example of the another embodiment of the application.
Fig. 7 is the schematic diagram of the method for the management network slice example of the another embodiment of the application.
Fig. 8 is the schematic diagram of the method for the management network slice example of the another embodiment of the application.
Fig. 9 is the schematic diagram of the method for the management network slice example of the another embodiment of the application.
Figure 10 is the schematic diagram of the network equipment of the embodiment of the present application.
Figure 11 is the schematic diagram of the network equipment of the another embodiment of the application.
Figure 12 is the schematic diagram of the network equipment of the another embodiment of the application.
Figure 13 is the schematic diagram of the network equipment of the another embodiment of the application.
Figure 14 is the schematic diagram of the network equipment of the another embodiment of the application.
Figure 15 is the schematic diagram of the network equipment of the another embodiment of the application.
Figure 16 is the schematic diagram of the network equipment of the another embodiment of the application.
Figure 17 is the schematic diagram of the network equipment of the another embodiment of the application.
Specific implementation mode
Below in conjunction with attached drawing, the technical solution in the application is described.
Before the management network for introducing the application is sliced the methods, devices and systems of example, for the ease of understanding this Shen Content please first describes a few terms of herein presented one and network slice management system.
Network is sliced (Network slice):Refer on network infrastructure physically or a virtually, according to different Demand for services customizes different logical network.It includes terminal, access net, transmission network, core that network slice, which can be one, The complete end to end network of net and application server, is capable of providing telecommunications service, has certain network capabilities;Network is sliced It can be above-mentioned terminal, access the arbitrary combination of net, transmission network, core net and application server, for example, network slice includes only Access net and core net.Network slice may have following one or more characteristics:Access net may be sliced, it is also possible to not cut Piece.Access net may be that multiple network slices share.Their network function can with composition for the characteristic of different network slices Can be different.
Network is sliced example (Network slice instance, NSI):It is a logical network really run, energy Meet certain network characteristic or demand for services.One network slice example may provide one or more services.Network slice is real Example can be created by network management system, and a network management system may create multiple network slice examples and carry out pipe to them simultaneously Reason, performance monitoring and the fault management etc. being included in network slice example operational process.When multiple networks slice example coexists When, network may share partial network resource and network function between being sliced example.Network slice example may be sliced from network Template creates, it is also possible to not created from network slice template.One complete network slice example is to be capable of providing complete end To the network service at end, and that network consisting slice example can be network slice subnet example (network slice Subnet instance, NSSI) and/or network function.Network function may include physical network function and/or virtual network Function.Hereinafter referred to as physical network function and/or virtual network function are network function.
Network is sliced subnet example (network slice subnet instance, NSSI):Network is sliced subnet example Complete network service end to end can need not be provided, network slice subnet example can be same in network slice example The network function composition set of a equipment vendor, it is also possible to be cut by the set for the network function that domain divides, such as core net network Piece subnet example, access net network are sliced subnet example, or form set by other modes.Network is sliced subnet example may quilt Multiple network slice examples are shared.It proposes that network is sliced subnet example, network management system management can be facilitated.One network slice is real Example may be sliced subnet example by several networks and form, and each network slice subnet example is by several network functions and/or several Network is sliced subnet example composition;One network slice example may be sliced subnet example and is not divided by several networks Network is sliced the network function composition of subnet example;One network slice example may also be only made of several network functions.
Network function (Network function, NF):It is a kind of processing function in network, defines functional row For and interface, network function can be realized by specialized hardware, can also also may be used by the way that runs software is realized on specialized hardware It is realized in the form of virtual functions by general hardware platform.Therefore, from the angle of realization, network function can be divided into Physical network function and virtual network function.And from the angle used, network function can be divided into privately-owned network function and share Specifically for multiple (son) networks are sliced example, different network functions can be used independently in network function, this Kind network function is known as privately-owned network function, can also share the same network function, and this network function is known as shared network Function.
Service Management Function module (Sevice management function, SvMF):It is responsible for operator and/or the The telecommunications service demand of tripartite client is converted into the demand being sliced to network, and the demand being sliced to network is sent to NSMF, receives Operator and/or third party client are sliced management data (such as performance data, fault data, fault restoration data etc.) to network Subscription demand, obtain the management data etc. that network is sliced from NSMF.
Network is sliced management function module (network slice management function, NSMF):It is responsible for reception The network that SvMF is sent is sliced demand, and be managed to life cycle, performance, the failure etc. of network slice example (will give birth to below Order the referred to as management of period, performance, fault management), layout network is sliced the composition of example, and the demand of decomposition network slice example is The demand of each network slice subnet example sends network slice subnet instance management request to each NSSMF, network is sent to NFM Function management is asked.
Network slice subnet management function module (network slice subnet management function, NSSMF):The demand that subnet example is sliced to network is received from NSMF, to be sliced life cycle, the property of subnet example to network Energy, failure etc. are managed and (below referred to as manage life cycle, performance, fault management), and layout network is sliced the group of example At.
Network function management module (network function management, NFM):For managing NF, such as manage The life cycle of NF distributes Internet resources etc. for NF.
Network is sliced self-healing monitoring and management function (Network Slice Self-Healing Monitor and Management Function,NS-SH-MMF):It includes at least such as the next item down function:Network slice is sent to NS-SH-IF Self-healing Algorithm and parameter;NSS-SH-MMF is configured about the relevant information of network slice subnet self-healing and parameter;Monitoring network is cut Piece example operating condition and fault condition;Judge whether network slice Instance failure meets self-healing trigger condition;To NS-SH-IF It sends network and is sliced self-healing trigger request;It receives the network slice self-healing that NS-SH-IF is sent and disposes result;Net is reported to SvMF Network is sliced fault data and result is disposed in self-healing.
Network is sliced self-healing and executes function (Network Slice Self-Healing Implementation Function,NS-SH-IF:):It includes at least such as the next item down function:The network slice self-healing from NS-SH-MMF is received to calculate Method configures and parameter;It receives the network that NS-SH-MMF is sent and is sliced self-healing trigger request;Collection network is sliced operation information, packet It includes but is not limited to network slice example performance data, fault warning, configuration data, test data etc.;Failure judgement type decision Failure selfreparing acts;Failure selfreparing action is executed, including but not limited to switch failure slice example/network function is superfluous Minor is sliced example/network function, creates new son slice example/network function substitution failure and is sliced example/network function, right The network slice exemplary configuration of failure, modification is caused to retract etc.;The configuration being sliced in example to existing network is backed up; Execute specific automatically restoring fault action;Assess automatically restoring fault effect;Judge whether to need to stop fault recovery flow;It is multiple The action that former automatically restoring fault executes;The action and failure taken with NS Repository intersection record fault recoveries are extensive Multiple junction fruit;To NS-SH-MMF reporting fault restoration results.
Network is sliced subnet self-healing monitoring and management function (Network Slice Subnet Self-Healing Monitor and Management Function,NSS-SH-MMF):It includes at least such as the next item down function:To NSS-SH- IF sends network slice subnet Self-healing Algorithm and parameter;Monitor network slice subnet example operating condition and fault condition;Judge Whether network slice subnet Instance failure meets self-healing trigger condition;Network slice subnet self-healing triggering is sent to NSS-SH-IF Request;It receives the network slice subnet self-healing that NSS-SH-IF is sent and disposes result;It is sliced subnet to NS-SH-MMF report networks Result is disposed in fault data and self-healing.
Network is sliced self-healing and executes function (Network Slice Subnet Self-Healing Implementation Function,NSS-SH-IF):It includes at least such as the next item down function:Receive the network slice subnet from NSS-SH-MMF certainly More algorithm configuration and parameter;It receives the network that NSS-SH-MMF is sent and is sliced subnet self-healing trigger request;Collection network slice Network operation information, including but not limited to network are sliced subnet example performance data, fault warning, configuration data, test data etc.; Failure judgement type decision failure selfreparing acts;Failure selfreparing action is executed, including but not limited to switch failure is sliced Example (nested network slice subnet example)/network function is that redundancy is sliced example/network function, and it is real to create new son slice Example/network function replaces failure slice example (nested network slice subnet example)/network function, to causing the net of failure Network slice subnet exemplary configuration, modification retract etc.;The configuration being sliced in subnet example to existing network is backed up;It executes Specific automatically restoring fault action;Assess automatically restoring fault effect;Judge whether to need to stop fault recovery flow;Restore event The automatic action for restoring to execute of barrier;The action taken with NSS Repository intersection record fault recoveries and fault recovery knot Fruit;To NSS-SH-MMF reporting fault restoration results.
Network slice information library ((Network Slice Repository, NS Repository):It is a data Library wherein at least has recorded with the next item down content:Network is sliced instance configuration information, including network slice subnet exemplary configuration letter Breath, network function configuration information, fault message, selfreparing action and reparation result etc..NS Repository can be only with NSMF It is vertical to come, it can also be arranged in consolidated network equipment with NSMF.
Network is sliced subnet information library (Network Slice Subnet Repository, NSS Repository):. It is a database, is wherein at least had recorded with the next item down content:Network slice subnet instance configuration information, including nested Network is sliced subnet instance configuration information, network function configuration information, fault message, selfreparing action and reparation result etc..NSS Repository can be independent with NSSMF, can also be arranged in consolidated network equipment with NSSMF.
Further include at least one of lower interface interface in the network management framework 100 of Fig. 1:
Interface 1:Interface between SvMF and NSMF sends the demand that business is sliced network, NSM for SvMF to NSMF The operating condition of NSI and business are fed back to SvMF, and certain management data are provided.
Interface 2:Interface between NSMF and NSSMF, NSMF are passed in management and layout NSI, by the interface to NSSMF Pass the demand to NSSI, such as create, change, obtaining management data etc., NSSMF feeds back related NSSI by the interface to NSMF Information.
Interface 3:Interface between NSMF and NFM, NSMF transmissions are managed to NF and configuration order;NFM is connect by this Mouth receives the message from NSMF, and feeds back the information about NF by the interface.
Interface 4:Interface between NSSMF, for the mutual coordination between NSSMF, NSSMF is another by the interface requests The NSSI that a NSSMF administers it is managed, including life cycle management, performance management, fault management etc..
Interface 5:Interface between NSMF and NS Repository is recorded and is read in NS Repository for NSMF Access evidence.
Interface 6:Interface between NSSMF and NSS Repository is recorded for NSSMF in NSS Repository With reading data.
Interface 7:Interface between NSMF and NSS Repository obtains number for NSMF from NSS Repository According to.
In addition, the building form of several NSI is also illustrated in Fig. 1, including:NSI is made of several NSSI;If NSI by Dry NSSI and several NF composition;NSI is made of several NF.
It should be noted that NSSI allows nesting, i.e., a NSSI includes another NSSI, is both had respective NSSMF;Assuming that NSI includes NSSI 1, NSSI 1 is again NSSI 1 and NSSI respectively comprising NSSI 2, NSSMF 1 and NSSMF 2 2 manager, at this time to the management of NSSI 2 there are two kinds of options, option 1 is to send NSI 2 from NSSMF 1 to NSSMF 2 Management request, the option be suitable for there are under the scene of interface 4 between NSSMF 1 and NSSMF 2;Option 2 is straight by NSMF Connect the management request that NSSI 2 is sent to NSSMF 2.
In addition, NS Repository may be the corpus separatum independently of NSMF, it is also possible to a number inside NSMF According to library.NSS Repository may be the corpus separatum independently of NSSMF, it is also possible to a database inside NSSMF. When NSS Repository are a corpus separatums, it may store the information of several height slice examples and several NSSMF There are interfaces 6.
In the case where NSSI allows nested, Fig. 2 to Fig. 4 respectively illustrates the network management frame of three kinds of the embodiment of the present application Structure.
Fig. 2 is the structural schematic diagram of the network management framework 200 of the embodiment of the present application.As shown in Fig. 2, the NSSI being nested NSS_SH_IF2 by last layer NSSI NSS_SH_MMF1 manage;The NSS_SH_MMF1 of last layer is managed by NS_SH_MMF again Reason.
Fig. 3 is the structural schematic diagram of the network management framework 300 of the embodiment of the present application.As shown in figure 3, the NSSI being nested NSS_SH_IF2 can directly be managed by NSS_SH_MMF2, NSS_SH_MMF2 from NSS_SH_MMF1 receive strategy.
Fig. 4 is the structural schematic diagram of the network management framework 400 of the embodiment of the present application.As shown in figure 4, the NSSI being nested NSS_SH_IF2 by itself NSS_SH_MMF2 manage;The NSS_SH_MMF2 of own can be managed by NS_SH_MMF. In addition may exist some rapports between NSS_SH_MMF2 and NSS_SH_MMF1.
Additionally, it should be noted that each function module and unit of above-mentioned introducing, are from their possessed functions What angle considered.In practical application, above-mentioned each function module can be individually physically present, can also be two or two with Upper integration of equipments in a unit, for example, NS_SH_MMF modules and NS_SH_IF modules can be merged into a function mould Block, the function module have the functional or NS_SH_MMF modules of institute and NS_ of NS_SH_MMF modules and NS_SH_IF modules SH_IF modules can be independent module respectively, and be communicated by the interface between module.Those of ordinary skill in the art In the technical scope that the application discloses, various equivalent modifications or substitutions can be readily occurred in, these modifications or substitutions should all be contained It covers within the protection domain of the application.
The network management framework of the embodiment of the present application has been described above, below in conjunction with attached drawing, has introduced the embodiment of the present application Management network slice example methods, devices and systems.
Fig. 5 is the schematic flow chart of the method 500 of the management network slice example of the embodiment of the present application.Method 500 can To be suitable for network management framework shown in Fig. 1 to Fig. 4.First network equipment in Fig. 5 may include NS_SH_IF modules or NSMF modules, NSMF modules include NS_SH_MMF and NS_SH_IF modules.Second network equipment, the third network equipment, the 4th net Network equipment may include NSSMF modules.Wherein, the third network equipment to the 4th network equipment can respectively include individually NSSMF modules can also include the same NSSMF modules.
As shown in figure 5, method 500 includes:
S501, first network equipment determine that first network slice subnet example breaks down.
Above-mentioned first network equipment can be that the module of subnet example is sliced for managing and monitoring multiple networks.For example, First network equipment can be NSMF modules.For example, above-mentioned first network equipment is somebody's turn to do for managing and monitoring network slice example Network slice example includes the first network slice subnet example.
Optionally, first network equipment determines mode there are many first network slice subnet example failures.For example, In a kind of mode, first network equipment can receive the fault alarm information of second network equipment, which is used for Indicate that first network slice subnet example breaks down.In the second way, first network equipment can receive the 5th network The triggering self-healing information of equipment, the triggering self-healing information can meet self-healing trigger condition in first network slice subnet example In the case of send.Wherein, in the second way, which can be NS_SH_IF modules, the 5th net Network equipment can be NS_SH_MMF modules.
S502, the first network equipment send the first instruction information, second network equipment to second network equipment Receive the first instruction information.The first instruction information is used to indicate second network equipment and activates the second network slice Subnet example, wherein the second network slice subnet example is for replacing the first network slice subnet example.
Optionally, S502 is it is also understood that first network equipment determines that being sliced subnet example to the first network holds Row self-healing is handled, and self-healing processing includes that the first network equipment sends the first instruction information to second network equipment, described First instruction information is used to indicate second network equipment and activates the second network slice subnet example, wherein second net Network slice subnet example is for replacing the first network slice subnet example.
Optionally, the second network of above-mentioned activation slice subnet example may include that second network equipment is notified to start the second net Network is sliced subnet example.
Optionally, the USI user service information that first network can also be sliced to subnet example is loaded into the second network slice Net example, in order to restore business.
Optionally, the second network can also be sliced to example in NSS Repository and/or NS Repository Status indication is activated state.
The first instruction information may include configuration information, which may include at least one of following:First net Network is sliced the application parameter of subnet example, and first network is sliced location information of the subnet example in network topology, first network The interface message etc. being sliced between subnet example and other NSSI.
Second network equipment can be the module of monitoring and management network slice subnet example.For example, second network equipment Can be NSSMF modules.
Optionally, above-mentioned second network slice subnet example is the network slice of the redundancy of second network device management Subnet example, or, second network slice subnet example is the newly-built network slice subnet example of second network equipment.
In the embodiment of the present application, first network equipment is determining the case where first network slice subnet example breaks down Under, it can indicate that second network equipment activates the second network slice subnet example, subnet example is sliced to replace first network, from And network slice example can be neatly managed, improve the efficiency of management network slice example.
Optionally, method 500 further includes:The first network equipment sends the second instruction information to the third network equipment, The third network equipment receives the second instruction information.The second instruction information is used to indicate the third network equipment Nullify the first network slice subnet example.
As an example, the second instruction information can be specifically used for notice third network equipment stopping first network slice The service run on subnet example.
In method 500, nullifying first network slice subnet example can also include:First network is sliced subnet example Status indication in NSS Repository and/or NS Repository is to nullify state.
Optionally, method 500 further includes:The first network equipment sends third to the 4th network equipment and indicates information, 4th equipment receives the third and indicates information.The third instruction information is used to indicate the 4th network equipment and re-matches Set and be sliced subnet example with the associated third network of first network slice subnet example, it is described reconfigure after described the It is associated with second network slice subnet example that three networks are sliced subnet example.
Wherein, the associated third network of the above-mentioned slice subnet example with first network is sliced subnet example, can refer to First network is sliced subnet example, and there are the third networks of dependence to be sliced subnet example.
As an example, may include configuration information in third instruction information, which may include using ginseng Number change information, the interface message etc. between change in location information or the second network slice subnet example in network topology.
Optionally, before sending the second instruction information to second network equipment described, method 500 further includes:Described The parameter information that the first network is sliced subnet example by one network equipment backs up to storage device.
Before nullifying first network slice subnet example, the first network can be sliced subnet by first network equipment The parameter information of example backs up to storage device, and subnet example is sliced in order in the case of necessary, restore first network.
Optionally, method 500 further includes:The performance that subnet example is sliced in second network does not meet predetermined condition In the case of, the first network equipment sends the 4th instruction information to the third network equipment, and the third network equipment receives institute State the 4th instruction information.The 4th instruction information is used to indicate the third network equipment and is based on first network slice The parameter information of net example backed up in the storage device restores the first network slice subnet example.
Optionally, method 500 further includes:The first network equipment obtains the property of the second network slice subnet example Energy information, the performance information are used to indicate the performance of the second network slice subnet example;The first network equipment base In the performance information, determine whether the performance of the second network slice subnet example conforms to a predetermined condition.
Optionally, above-mentioned performance information can refer to the information for the performance that can reflect the second network slice subnet example.The One network equipment can obtain the performance information that the second network is sliced subnet example from second network equipment.Alternatively, first network Equipment can obtain third network associated with first network slice subnet example from the third network equipment and be sliced subnet example Performance information, third network slice subnet example performance information can also reflect the second network slice subnet example property Energy.
As an example, which may include performance measure information, threshold value monitoring information etc..
Optionally, method 500 further includes:The first network equipment receives fault alarm letter from second network equipment Breath, the fault alarm information are used to indicate the first network slice subnet example and break down;The first network equipment Determine that first network slice subnet example breaks down, including:The first network equipment is true according to the fault alarm information The fixed first network is sliced subnet example.
Optionally, method 500 further includes:The first network equipment will use second network slice subnet example to replace The procedural information for changing the first network slice subnet example is recorded to storage device.
As an example, the reparation failure even if above self-healing operation fails, restores service, also needs to record accordingly certainly More it acts, fault message and self-healing result.
As a specific example, Fig. 6 shows showing for the method 600 of the management network slice example of the embodiment of the present application Meaning property flow chart.Method 600 can be used in any network management framework in Fig. 1 to Fig. 4.Fig. 6 is shown failure NSSI It is switched to the network slice management process of the NSSI of redundancy.Wherein, the first network equipment in method 500 can be NS_SH_IF Module or NSMF modules, NSMF modules include NS_SH_MMF and NS_SH_IF modules.Second network equipment in method 600 can Can be NSSMF1 modules, the 4th network equipment can be NSSMF3 modules to be NSSMF2 modules, the third network equipment.Its In, the third network equipment to the 4th network equipment can be individual NSSMF modules respectively, can also be the same NSSMF moulds Block.
As shown in fig. 6, this method 600 includes:
S601, NS-SH-MMF configuration NS-SH-IF need the Self-healing Algorithm executed.Specifically, for being switched to redundancy The content of the self-healing mechanism of NSSI, configuration includes the identity of NSI, the fault restoration demand of the NSI, NSI establishment time-divisions The identity of redundancy NSSI matched and/or created, redundancy NSSI and form the NSI NSSI correspondence, be switched to superfluous The triggering rule of remaining NSSI includes event, fault type and condition etc..It should be noted that redundancy NSSI and composition NSI May not be one-to-one relationship between NSSI, it can be as any one in several NSSI for example, redundancy NSSI is possible Redundancy substitute, a redundancy NSSI may can be substituted as the redundancy of several same type NSSI in several NSI.
S602, a NSSI for forming NSI break down, and influence the normal operation of NSI.In the embodiment of the present application, false If NSSI 1 breaks down, it is responsible for by NSSMF 1.NSSMF 1 generates network slice subnet Instance failure and alerts and lead to It crosses interface 2 and is reported to NS-SH-MMF.NS-SH-MMF receives the fault warning from NSSMF 1.Contained in fault warning to Less with the next item down content:The ID of fault warning ID, NSSI, the time that failure occurs, fault type, failure cause, the source of trouble, therefore Hinder seriousness, the influence that failure generates service, the repair mode etc. that can be taken.
S603, NS-SH-MMF meet self-healing trigger condition according to fault warning judgement, and self-healing triggering is sent to NS-SH-IF Order.NS-SH-IF receives self-healing trigger command.
S604, NS-SH-IF collect the information of network of relation slice example and network slice subnet example, collect packet It includes at least with the next item down content:A) NS-SH-IF by interface 2 to 1 sending performance measurement tasks of NSSMF, threshold measurement task, NS-SH-IF receives the performance data and threshold measurement result that NSSMF 1 is reported by interface 2;B) NS-SH-IF to NSSI 1 There are the management work(of other interactive networks slice subnet example (the embodiment of the present application is assumed to be NSSI 3, is managed by NSSMF3) Can, i.e., 3 sending performance measurement tasks of NSSMF, threshold measurement task, NS-SH-IF receive what NSSMF 3 was reported by interface 2 Performance data and threshold measurement result;C) NS-SH-IF finds the corresponding redundancy NSSI of failure NSSI according to self-healing configuration, passes through Interface 5 reads its current state from NS Repository, and (possible state includes nullifying, activating, terminated, can not use Deng), the embodiment of the present application assumes that the redundant network slice sub-network example of NSSI 1 is NSSI 2, and NSSI 2 is managed by NSSMF 2 Reason;D) NS-SH-IF by interface 2 to NSSMF 2 send test assignment, NSSMF 2 execute test assignment and by interface 2 to NS-SH-IF reports test result;E) when NS-SH-IF reads from NS Repository 1 normal operations of NSSI by interface 5 Configuration information, including SLA, position, interface message in the logical topology that network is sliced example;F) NS-SH-IF is by connecing Mouth 2 obtains the information on services being currently running on NSSI1, including user data, configuration etc. from NSSMF 1;G) NS-SH-IF is logical The historical failure information that interface 5 reads NSSI 1 from NS Repository is crossed, the repair action taken is repaired as a result, reading The fault message of subnet example is sliced with other networks of 1 same types of NSSI, the repair action taken repairs result etc..Foundation The Self-healing Algorithm configured in the information and step S601 that are collected into, NS-SH-IF determine to replace failure NSSI with redundancy NSSI 2 1。
S605, optionally, NS-SH-IF are by interface 5 by the relevant configuration information of NSSI 1, logical topology position, user Information on services etc. backs up to NS Repository, to be restored when fault self-recovery fails.
If the state of S606, current NSSI 1 are state of activation, NS-SH-IF nullifies NSSI 1.Cancellation includes will Status indications of the NSSI 1 in NSS Repository and/or NS Repository is to nullify state, and notice NSSMF 1 stops The service run on NSSI 1.
S607, optionally, NS-SH-IF send the order of configuration NSSI 2 by interface 2 to NSSMF 2, and configuration message is extremely Include application parameter, the interface message etc. between position and other NSSI in network topology less.It should be noted that this Configuration when the configuration content at place may correctly be run with the NSSI 1 that NS-SH-IF in step S604 is collected is consistent, it is also possible to It is different.In order to ensure that network is sliced the high reliability of example, the network slice subnet example of redundancy may be some NSSI exclusive , in this case, corresponding configuration is carried out to it when creating redundancy NSSI, when changing corresponding NSSI configurations, NSMF Also the manager of redundancy NSSI can be notified correspondingly to change configuration simultaneously, to provide switch speed when sending failure, protected High reliability is demonstrate,proved, in this case, step S607 can not be necessary.In addition, when redundancy NSSI can replace several When NSSI, these NSSI may belong to same NSI, it is also possible to belong to different NSI, in this case, redundancy NSSI will not be certainly More it is configured before mechanism triggering, step S607 is steps necessary at this time.
S608, NS-SH-IF send the order of configuration NSSI 3 by interface 2 to NSSMF 3, by NSSI 3 and NSSI2 phases Association, configuration message are included at least with the next item down content:Application parameter changes, the change in location in network topology and NSSI Interface message etc. between 2.
S609, NS-SH-IF activate NSSI 2.Activation includes by NSSI 2 in NSS Repository and/or NS Status indication in Repository is activated state, and notice NSSMF 2 starts what NSSI 2 and being loaded into was obtained in step S604 USI user service information on NSSI 1 is to restore business.
The information of S610, NS-SH-IF collection network slice example simultaneously assesses self-healing result.Collect information include at least with The next item down content:NS-SH-IF issues the property for NSSI 2 and NSSI 3 by interface 2 respectively to NSSMF 2 and NSSMF 3 It can measure, threshold value monitor task, NSSMF 2 and the measurement of 3 execution performances of NSSMF, threshold value monitor task, and be reported by interface 2 To NS-SH-IF performance measurements and/or it is more than threshold alarm.
If S611, step S606 to step S609 have any one step fail or step S610 in NS-SH-IF be collected into Information show that network slice service is unable to operate normally after switching redundancy NSSI, then triggers restoring action.Specifically, NS- Network state before the self-healing action execution preserved in SH-IF read steps S605 and configuration, configure NSSI 3 and NSSI according to this 1, and activate NSSI 1.
S612, NS-SH-IF update the operating status that network in NS Repository is sliced example, topology by interface 5 The self-healing of information, configuration information etc., and recording step S606 to step S611 act, and record fault message and self-healing result.It needs It is noted that even if above self-healing action, which fails, is repaired failure, restore service, also needs to record corresponding self-healing action, therefore Hinder information and self-healing result.
The self-healing action and self-healing result that S613, NS-SH-IF are used to NS-SH-MMF reports.NS-SH-MMF is by connecing Mouthful 1 to SMF reporting fault information, self-healing action and self-healing result.
It in the embodiment of the present application, can be with when being sliced the network slice subnet example of example in network consisting and breaking down It without manual intervention automatically switches on the network slice subnet example of redundancy, while ensureing linking up and one for service as far as possible Cause property improves the reliability of network slice example entirety.Meanwhile the method for the embodiment of the present application can also be extensive when self-healing fails The multiple modification that example is sliced to network enables operator to focus on original mistake.In addition, method provided by the embodiments of the present application Reference can be provided for the automation O&M decision of network slice example by having recorded fault message, self-healing action and self-healing result, Make that system is more intelligent, quickly handles same type of network failure.
It should be noted that the embodiment of the present application management network slice method can be adapted for network slice example by Network be sliced subnet example constitute application scenarios, solve network slice subnet example occur can not self-healing failure when, may A kind of self-healing mechanism for the network slice level taken.The invention relates to flow and method be also applied for network slice Under the application scenarios that example is made of network function, solve network function occur can not self-healing failure when, may take one The network function of failure is switched to the self-healing mechanism of redundant network function by kind, is switched to the self-healing mechanism of redundant network function Process step in flow and step and the embodiment of the present application is similar, and network is sliced subnet in the interactive information of each intermodule The information of example replaces with the information of corresponding network function.
It should be noted that the NSSI 1 used in the embodiment of the present application, NSSI 2, NSSI 3 and NSSMF 1, Needs only for the purpose of illustration NSSMF2, NSSMF 3, the present processes do not limit fault network slice subnet example There is the number of the network slice subnet example of interaction, network slice of redundancy in number and fault network slice subnet example The number of net example.For example, a fault network slice subnet example may be needed by several redundant networks slice subnet reality Example substitutes simultaneously.In addition, failure NSSI, redundancy NSSI, there are other interactive NSSI to be managed by different NSSMF, It may simultaneously be managed by a NSSMF, the application is not construed as limiting this.
As a specific example, Fig. 7 shows showing for the method 700 of the management network slice example of the embodiment of the present application Meaning property flow chart.Method 700 can be used in any network management framework in Fig. 1 to Fig. 4.Fig. 7, which is shown, to be automatically created New NSSI is sliced management process with the network for replacing failure NSSI.Wherein, the first network equipment in method 500 may include NS_SH_IF modules or NSMF modules, NSMF modules include NS_SH_MMF and NS_SH_IF modules.The second net in method 500 Network equipment may include that NSSMF2 modules, the third network equipment may include that NSSMF1 modules, the 4th network equipment may include NSSMF3 modules.Wherein, the third network equipment to the 4th network equipment can be individual NSSMF modules respectively, can also be The same NSSMF modules.
As shown in fig. 7, this method 700 includes:
S701, NS-SH-MMF configuration NS-SH-IF need the Self-healing Algorithm executed.Specifically, for creating new NSSI Replace the self-healing mechanism of failure NSSI, the content of configuration includes the identity of NSI, and the fault restoration demand of the NSI can be created Build new NSSI replace the NSSMF of failure NSSI identity and establishment feasibility, create new NSSI substitution failure NSSI Triggering rule include event, fault type and condition etc..It should be noted that with the variation of network condition, such as network The variation of resource service condition, NS-SH-MMF may update configurations of the NS-SH-IF to Self-healing Algorithm at any time.
S702, a NSSI for forming NSI break down, and influence the normal operation of network slice example.In the application reality It applies in example, it is assumed that NSSI 1 breaks down, it is responsible for by NSSMF 1.NSSMF 1 generates network and is sliced subnet Instance failure It alerts and NS-SH-MMF is reported to by interface 2.NS-SH-MMF receives the fault warning from NSSMF 1.In fault warning It contains at least with the next item down content:The ID of fault warning ID, NSSI, the time that failure occurs, fault type, failure cause, The source of trouble, failure seriousness, the influence that failure generates service, the repair mode etc. that can be taken.
S703, NS-SH-MMF meet self-healing trigger condition according to fault warning judgement, and self-healing triggering is sent to NS-SH-IF Order.NS-SH-IF receives self-healing trigger command.
S704, NS-SH-IF collect the information of network of relation slice example and network slice subnet example, collect packet It includes at least with the next item down content:A) NS-SH-IF by interface 2 to 1 sending performance measurement tasks of NSSMF, threshold measurement task, NS-SH-IF receives the performance data and threshold measurement result that NSSMF 1 is reported by interface 2;B) NS-SH-IF to NSSI 1 There are the management work(of other interactive networks slice subnet example (the embodiment of the present application is assumed to be NSSI 3, is managed by NSSMF3) Can, i.e., 3 sending performance measurement tasks of NSSMF, threshold measurement task, NS-SH-IF receive what NSSMF 3 was reported by interface 2 Performance data and threshold measurement result;C) NS-SH-IF finds the phase that can create new NSSI substitution failures NSSI according to self-healing configuration Management module, the embodiment of the present application is answered to assume that it is NSSMF 3, NS-SH-IF is sent to NSSMF 3 by interface 2 and created newly The feasibility inspection of NSSI is asked;D) when NS-SH-IF reads from NS Repository 1 normal operations of NSSI by interface 5 Configuration information, including SLA, position, interface message in the logical topology that network is sliced example;E) NS-SH-IF is by connecing Mouth 2 obtains the information on services being currently running on NSSI 1, including user data, configuration etc. from NSSMF 1;F) NS-SH-IF is logical The historical failure information that interface 5 reads NSSI 1 from NS Repository is crossed, the repair action taken is repaired as a result, reading The fault message of subnet example is sliced with other networks of 1 same types of NSSI, the repair action taken repairs result etc..Foundation The Self-healing Algorithm configured in the information and step S701 that are collected into, NS-SH-IF determine to create new NSSI substitution failures NSSI.
S705, optionally, NS-SH-IF are by interface 5 by the relevant configuration information of NSSI 1, logical topology position, user Information on services etc. backs up to NS Repository, to be restored when fault self-recovery fails.
S706, NS-SH-IF are sent to NSSMF 2 by interface 2 and create NSSI requests.It at least needs to wrap in the request to create It includes:The type of the NSSI newly created, including function, the SLA that need to meet, occupied Internet resources etc..NSSMF2 foundations connect The request received creates NSSI 2.
S707, NS-SH-IF send the order of configuration NSSI 2 by interface 2 to NSSMF 2, and configuration message includes at least Application parameter, the interface message etc. between position and other NSSI in network topology.It should be noted that matching herein The configuration that content is set when may correctly be run with the NSSI 1 that NS-SH-IF in step S704 is collected is consistent, it is also possible to because of net The realization that network is sliced subnet example is different and different.
If the state of S708, current NSSI 1 are state of activation, NS-SH-IF nullifies NSSI 1.Cancellation includes will Status indications of the NSSI 1 in NSS Repository and/or NS Repository is to nullify state, and notice NSSMF 1 stops The service run on NSSI 1.
S709, NS-SH-IF send the order of configuration NSSI 3 by interface 2 to NSSMF 3, by NSSI 3 and NSSI2 phases Association, configuration message are included at least with the next item down content:Application parameter changes, the change in location in network topology and NSSI Interface message etc. between 2.
S710, NS-SH-IF activate NSSI 2.Activation includes by NSSI 2 in NSS Repository and/or NS Status indication in Repository is activated state, and notice NSSMF 2 starts what NSSI 2 and being loaded into was obtained in step S704 USI user service information on NSSI 1 is to restore business.
The information of S711, NS-SH-IF collection network slice example simultaneously assesses self-healing result.Collect information include at least with The next item down content:NS-SH-IF issues the property for NSSI 2 and NSSI 3 by interface 2 respectively to NSSMF 2 and NSSMF 3 It can measure, threshold value monitor task, NSSMF 2 and the measurement of 3 execution performances of NSSMF, threshold value monitor task, and be reported by interface 2 To NS-SH-IF performance measurements and/or it is more than threshold alarm.
If S712, step S706 to step S710 have any one step fail or step S711 in NS-SH-IF be collected into Information show that the NSSI newly created 2 can not replace 1 normal operations of NSSI of failure, then trigger restoring action.Specifically, Network state before the self-healing action execution preserved in NS-SH-IF read steps S705 and configuration, reconfigure 3 Hes of NSSI according to this NSSI 1, and activate NSSI 1.
S713, NS-SH-IF update the operating status that network in NS Repository is sliced example, topology by interface 5 The self-healing of information, configuration information etc., and recording step S706 to step S712 act, and record fault message and self-healing result.It needs It is noted that even if above self-healing action, which fails, is repaired failure, restore service, also needs to record corresponding self-healing action, therefore Hinder information and self-healing result.
The self-healing action and self-healing result that S714, NS-SH-IF are used to NS-SH-MMF reports.NS-SH-MMF is by connecing Mouthful 1 to SMF reporting fault information, self-healing action and self-healing result.
It in the embodiment of the present application, can be with when being sliced the network slice subnet example of example in network consisting and breaking down Without manual intervention automatically creating new network slice subnet example replaces fault network slice subnet example to restore to service, The coherent and consistency for ensureing service as far as possible simultaneously, improves the reliability of network slice example entirety.Meanwhile the application is real The modification that the method for applying example can also restore to be sliced network when self-healing fails example enables operator to focus on original mistake. In addition, it can be that network slice is real that method provided by the embodiments of the present application, which has recorded fault message, self-healing action and self-healing result, The automation O&M decision of example provides reference, makes that system is more intelligent, quickly handles same type of network failure.
It is answered by what network slice subnet example was constituted it should be noted that the embodiment of the present application is suitable for network slice example With scene, solve network slice subnet example occur can not self-healing failure when, a kind of network slice level that may take Self-healing mechanism.The invention relates to flow and method be also applied for the application that network slice example is made of network function Under scene, solve network function occur can not self-healing failure when, the new network function of a kind of establishment that may take and replace therefore The self-healing mechanism for hindering network function, creates the stream in the flow and step and the embodiment of the present application of the self-healing mechanism of new network function Journey step is similar, and the information that network is sliced to subnet example in the interactive information of each intermodule replaces with corresponding network function Information.
In addition, the NSSI 1 used in the embodiment of the present application, NSSI 2, NSSI 3 and NSSMF 1, NSSMF 2, NSSMF3 Needs only for the purpose of illustration, the present processes do not limit the number and fault network of fault network slice subnet example Network is sliced the number that subnet example has the network slice subnet example of interaction, of the network slice subnet example newly created Number.For example, a fault network slice subnet example may need to create several networks slice subnet example to substitute.This Outside, failure NSSI, new NSSI, there are other interactive NSSI to be managed by different NSSMF, it is also possible to by a NSSMF It manages simultaneously, the application is not construed as limiting this.
Fig. 8 is the schematic flow chart of the method 800 of the management network slice example of the embodiment of the present application.Method 800 can To be suitable for network management framework shown in Fig. 1 to Fig. 4.First network equipment in Fig. 8 can be NS_SH_IF modules or NSMF modules, NSMF modules include NS_SH_MMF and NS_SH_IF modules.Second network equipment can be NSSMF modules.Storage Equipment can be NS Repository.For sake of simplicity, please referring to phase above with same or analogous content above in method 800 The content answered, details are not described herein again.
As shown in figure 8, method 800 includes:
S801, first network equipment determine that first network slice subnet example breaks down.
Above-mentioned first network equipment can be that the module of subnet example is sliced for managing and monitoring multiple networks.For example, First network equipment can be NSMF modules.For example, above-mentioned first network equipment is somebody's turn to do for managing and monitoring network slice example Network slice example includes the first network slice subnet example.
Optionally, first network equipment determines mode there are many first network slice subnet example failures.For example, In a kind of mode, first network equipment can receive the fault alarm information of second network equipment, which is used for Indicate that first network slice subnet example breaks down.In the second way, first network equipment can receive the 5th network The triggering self-healing information of equipment, the triggering self-healing information can meet self-healing trigger condition in first network slice subnet example In the case of send.Wherein, in the second way, which can be NS_SH_IF modules, the 5th net Network equipment can be NS_SH_MMF modules.
S802, the first network equipment send the first instruction information, the first instruction information to second network equipment It is used to indicate second network equipment and rollback processing is executed to first network slice subnet example.
Optionally, above-mentioned rollback processing, it can be understood as the configuration parameter that first network is sliced to subnet example is set again The configuration parameter at a certain moment before being set to current time.The configuration parameter at a certain moment before the current time can be History configures parameter.
In the embodiment of the present application, first network equipment is determining the case where first network slice subnet example breaks down Under, it can indicate that second network equipment executes rollback processing to first network slice subnet example, so as to neatly It manages network and is sliced example, improve the efficiency of management network slice example.
Optionally, method 800 further includes:The first network equipment obtains going through for the first network slice subnet example History parameter information;The first network equipment is sliced the historical parameter information of subnet example based on the first network, determines institute State the first instruction information.
As an example, the first network equipment can also obtain the network described in first network slice subnet example It is sliced the historical parameter information of example.For example, historical parameter information may include network of relation slice example and network slice The information of net example, including at least with the next item down content:
A) for NS-SH-IF by interface 2 to 1 sending performance measurement tasks of NSSMF, threshold measurement task, NS-SH-IF is logical It crosses interface 2 and receives the performance data and threshold measurement result that NSSMF 1 is reported;
B) NS-SH-IF is sliced the management function of subnet example, i.e. NSSMF to other networks that there is interaction with NSSI 1 3 sending performance measurement tasks, threshold measurement task, NS-SH-IF receive the performance data and threshold that NSSMF 3 is reported by interface 2 It is worth measurement result;
C) NS-SH-IF finds the corresponding management module that can create new NSSI substitution failures NSSI, this Shen according to self-healing configuration Please embodiment assume that it is NSSMF 3, NS-SH-IF sends the feasibility inspection for creating new NSSI by interface 2 to NSSMF 3 Request;
D) configuration information when NS-SH-IF reads from NS Repository 1 normal operations of NSSI by interface 5, packet SLA is included, position, interface message in the logical topology that network is sliced example;
E) NS-SH-IF obtains the information on services being currently running on NSSI 1, including user by interface 2 from NSSMF 1 Data, configuration etc.;
F) NS-SH-IF reads the historical failure information of NSSI 1 by interface 5 from NS Repository, and that takes repaiies Double action is made, and repairs as a result, reading the fault message with other networks of 1 same types of NSSI slice subnet example, the reparation taken Result etc. is repaired in action.
Optionally, method 800 further includes:The first network equipment obtains first net from second network equipment Network is sliced the historical parameter information of subnet example;The first network is sliced the history of subnet example by the first network equipment Parameter information backs up to storage device;The first network equipment obtains the history parameters of the first network slice subnet example Information, including:The first network equipment obtains the history ginseng that the first network is sliced subnet example from the storage device Number information.
Optionally, method 800 further includes:In the first network equipment the first instruction information is sent to second network equipment Before, the first network equipment obtains the parameter current information of the first network slice subnet example;The first network The first network is sliced the parameter current information back-up of subnet example to storage device by equipment.
Optionally, method 800 further includes:In the performance for executing retract that treated the first network and being sliced subnet example In the case of not meeting predetermined condition, the first network equipment sends the second instruction information, institute to second network equipment It states the second instruction information and is used to indicate second network equipment based on the first network slice backed up in the storage device The parameter current information of subnet example restores the first network slice subnet example.
Optionally, method 800 further includes:The first network equipment, which obtains, executes the first network that retracts that treated It is sliced the performance information of subnet example, the performance information is used to indicate the performance of the first network slice subnet example;Institute It states first network equipment and is based on the performance information, it is predetermined to determine whether the performance of the first network slice subnet example meets Condition.
Optionally, method 800 further includes:The first network equipment receives fault alarm letter from second network equipment Breath, the fault alarm information are used to indicate the first network slice subnet example and break down;The first network equipment Determine that first network slice subnet example breaks down, including:The first network equipment is true according to the fault alarm information The fixed first network is sliced subnet example.
As a specific example, Fig. 9 shows showing for the method 600 of the management network slice example of the embodiment of the present application Meaning property flow chart.Method 900 can be used in any network management framework in Fig. 1 to Fig. 4.Fig. 9 is shown will be newly-built The network that NSSI replaces the NSSI of failure is sliced management process.Wherein, the first network equipment in method 800 can be NS_ SH_IF modules or NSMF modules, NSMF modules include NS_SH_MMF and NS_SH_IF modules.Second network equipment can be NSSMF modules.Storage device can be NS Repository.
As shown in figure 9, this method 900 includes:
S901, NS-SH-MMF configuration NS-SH-IF need the Self-healing Algorithm executed.Specifically, network is sliced real The self-healing mechanism that example modification, configuration retract, the content of configuration includes the identity of NSI, and the fault restoration demand of the NSI is right Network is sliced the information backups demands such as configuration, the state of example and network slice subnet example, such as the BACKUP TIME period, if Former backup of covering etc., the triggering rule that network is sliced example modifications, configuration retracts includes event, fault type and condition etc..It needs It is noted that NS-SH-MMF may update the configuration of the Self-healing Algorithm of NS-SH-IF at any time.
The Self-healing Algorithm of S902, NS-SH-IF according to configuration judges whether to need to create or update to be sliced example to network Information backup.The condition for triggering backup may include time, event, the expected event etc. by generation.(event refers to network It is sliced modification, configuration, the user behavior variation etc. of example.)
S903, NS-SH-IF determine the information back-up that example is sliced to network, and NSSI is obtained from NSSMF by interface 2 Information, these information may include the configuration of current NSSI, its position in network topology, it is between other NSSI Interface message, SLA, performance data etc..Optionally, NS-SH-IF reads the letter of the NSSI preserved from NS Repository Breath, and judge need which information updated.
S904, NS-SH-IF record in NS Repository by interface 5 and/or update each NSSI's of composition NSI Information.
S905, a NSSI for forming NSI break down, and influence the normal operation of network slice example.In the application reality It applies in example, it is assumed that NSSI 1 breaks down, it is responsible for by NSSMF 1.NSSMF 1 generates network and is sliced subnet Instance failure It alerts and NS-SH-MMF is reported to by interface 2.NS-SH-MMF receives the fault warning from NSSMF 1.In fault warning It contains at least with the next item down content:The ID of fault warning ID, NSSI, the time that failure occurs, fault type, failure cause, The source of trouble, failure seriousness, the influence that failure generates service, the repair mode etc. that can be taken.
S906, NS-SH-MMF meet self-healing trigger condition according to fault warning judgement, and self-healing triggering is sent to NS-SH-IF Order.NS-SH-IF receives self-healing trigger command.
S907, NS-SH-IF collect the information of network of relation slice example and network slice subnet example, collect packet It includes at least with the next item down content:A) NS-SH-IF by interface 2 to 1 sending performance measurement tasks of NSSMF, threshold measurement task, NS-SH-IF receives the performance data and threshold measurement result that NSSMF 1 is reported by interface 2;B) NS-SH-IF to NSSI 1 There are management function sending performance measurement task, threshold measurement task that other interactive networks are sliced subnet example, NS-SH- IF receives the performance data reported and threshold measurement result by interface 2;C) NS-SH-IF by interface 5 from NS Backup information when 1 normal operations of NSSI, including SLA are read in Repository, in the logical topology that network is sliced example Position, interface message etc.;D) NS-SH-IF reads the historical failure letter of NSSI 1 by interface 5 from NS Repository Breath, the repair action taken are repaired as a result, reading the failure letter with other networks of 1 same types of NSSI slice subnet example Breath, the repair action taken repair result.According to the Self-healing Algorithm configured in the information and step S901 being collected into, NS-SH- IF decisions take fallback action to NSSI 1 and determine that the backup information according to which time point executes rollback.
S908, optionally, NS-SH-IF are by interface 5 by the relevant configuration information of NSSI 1, logical topology position, user Information on services etc. backs up to NS Repository, to be restored when fault self-recovery fails.
S909, NS-SH-IF send rollback order by interface 2 to NSSMF 1.According to the concrete condition of network failure, return Moving back order may include:A) it nullifies and the NSSI 1 newly created that terminates, the order need to include the identity of NSSI 1;B) foundation The NSSI configuration backup information that step 7) obtains, reconfigures NSSI 1;C) restore the modification to NSSI 1, including reduce extension Capacity, extend the capacity of diminution, add the network function of deletion, delete newly-increased network function etc..When rollback order is wound When building and activating the NSSI being terminated, which may not be to be sent to NSSMF 1, but other NSSMF, the order It need to include the identity of NSSI, configuration information, SLA, interface message etc..In addition, when rollback order establishment is terminated When NSSI, NS-SH-IF also needs to send configuration message to the manager for having other interactive NSSI with the NSSI.
S910, NSSMF 1 (or other NSSMF) have executed corresponding actions and to NS-SH-IF execution result backs.
The information of S911, NS-SH-IF collection network slice example simultaneously assesses self-healing result.Collect information include at least with The next item down content:NS-SH-IF issues performance measurement, threshold value monitor task by interface 2 to NSSMF 1 and/or other NSSMF, Corresponding NSSMF execution performances measure, threshold value monitor task, and by interface 2 be reported to NS-SH-IF performance measurements and/or More than threshold alarm.
If the information that NS-SH-IF is collected into S912, retract failure or step S911 shows that failure is still after retracting In the presence of and do not improve, then NS-SH-IF start restore fallback action caused by change.Specifically, NS-SH-IF read steps The self-healing action preserved in S908 execute before network state and configuration, notify NSSMF 1 to reconfigure NSSI 1 and/or extensive according to this The multiple modification to NSSI 1.
S913, NS-SH-IF update the operating status that network in NS Repository is sliced example, topology by interface 5 The self-healing of information, configuration information etc., and recording step S908 to step S912 act, and record fault message and self-healing result.It needs It is noted that even if above self-healing action, which fails, is repaired failure, restore service, also needs to record corresponding self-healing action, therefore Hinder information and self-healing result.
The self-healing action and self-healing result that S914, NS-SH-IF are used to NS-SH-MMF reports.NS-SH-MMF is by connecing Mouthful 1 to SMF reporting fault information, self-healing action and self-healing result.
Method and the network management of the management network slice of the embodiment of the present application are described in detail above in association with Fig. 1 to Fig. 9 The network equipment of the embodiment of the present application is described in detail below in conjunction with Figure 10 to Figure 17 for framework.
Figure 10 is the schematic block diagram of the network equipment 1000 of the embodiment of the present application.It should be understood that the network equipment 1000 can The each step executed by first network equipment in the method for Fig. 5 to Fig. 7 is executed, in order to avoid repeating, and will not be described here in detail.Net Network equipment 1000 includes:Processing unit 1001 and communication unit 1002,
The processing unit 1001 is for determining that first network slice subnet example breaks down;Pass through the communication unit 1002 send the first instruction information to second network equipment, and the first instruction information is used to indicate second network equipment pair The first network slice subnet example executes rollback processing.
Figure 11 is the schematic block diagram of the network equipment 1100 of the embodiment of the present application.It should be understood that the network equipment 1100 can The each step executed by second network equipment in the method for Fig. 5 to Fig. 7 is executed, in order to avoid repeating, and will not be described here in detail.Net Network equipment 1100 includes:Processing unit 1101 and communication unit 1102,
The processing unit 1101, which is used to receive the first instruction from first network equipment by the communication unit 1102, to be believed Breath, the first instruction information are used to indicate second network equipment and activate the second network slice subnet example, wherein described Second network slice subnet example is for replacing first network slice subnet example;Information is indicated according to described first, activates institute State the second network slice subnet example.
Figure 12 is the schematic block diagram of the network equipment 1200 of the embodiment of the present application.It should be understood that the network equipment 1200 can The each step executed by first network equipment in the method for Fig. 8 or Fig. 9 is executed, in order to avoid repeating, and will not be described here in detail.Net Network equipment 1200 includes:Processing unit 1201 and communication unit 1202,
The processing unit 1201 is for determining that first network slice subnet example breaks down;Pass through the communication unit 1202 send the first instruction information to second network equipment, and the first instruction information is used to indicate second network equipment pair The first network slice subnet example executes rollback processing.
Figure 13 is the schematic block diagram of the network equipment 1300 of the embodiment of the present application.It should be understood that the network equipment 1300 can The each step executed by second network equipment in the method for Fig. 8 or Fig. 9 is executed, in order to avoid repeating, and will not be described here in detail.Net Network equipment 1300 includes:Processing unit 1301 and communication unit 1302,
The processing unit 1301 is used to receive the first instruction information, institute from first network equipment by communication unit 1302 It states the first instruction information and is used to indicate second network equipment and the first network of failure slice subnet example is executed back Move back processing;And indicate information according to described first, rollback processing is executed to first network slice subnet example.
Figure 14 is the schematic block diagram of the network equipment 1400 of the embodiment of the present application.It should be understood that the network equipment 1400 can The each step executed by first network equipment in the method for Fig. 5 to Fig. 7 is executed, in order to avoid repeating, and will not be described here in detail.Net Network equipment 1400 includes:
Memory 1410, for storing program;
Communication interface 1420, for being communicated with other equipment;
Processor 1430, for executing the program in memory 1410, when described program is performed, the processor 1430 for determining that first network slice subnet example breaks down;It is sent out to second network equipment by the communication interface 1420 The first instruction information, the first instruction information is sent to be used to indicate second network equipment and activate the second network slice subnet real Example, wherein the second network slice subnet example is for replacing the first network slice subnet example.
Figure 15 is the schematic block diagram of the network equipment 1500 of the embodiment of the present application.It should be understood that the network equipment 1500 can The each step executed by second network equipment in the method for Fig. 5 to Fig. 7 is executed, in order to avoid repeating, and will not be described here in detail.Net Network equipment 1500 includes:
Memory 1510, for storing program;
Communication interface 1520, for being communicated with other equipment;
Processor 1530, for executing the program in memory 1510, when described program is performed, the processor 1530 from first network equipment by the communication interface 1520 for receiving the first instruction information, and the first instruction information is used The second network is activated to be sliced subnet example in instruction second network equipment, wherein second network is sliced subnet example It is sliced subnet example for replacing first network;Information is indicated according to described first, activates the second network slice subnet real Example.
Figure 16 is the schematic block diagram of the network equipment 1600 of the embodiment of the present application.It should be understood that the network equipment 1600 can The each step executed by first network equipment in the method for Fig. 8 or Fig. 9 is executed, in order to avoid repeating, and will not be described here in detail.Net Network equipment 1600 includes:
Memory 1610, for storing program;
Communication interface 1620, for being communicated with other equipment;
Processor 1630, for executing the program in memory 1610, when described program is performed, the processor 1630 for determining that first network slice subnet example breaks down;It is sent out to second network equipment by the communication interface 1620 The first instruction information, the first instruction information is sent to be used to indicate second network equipment and be sliced subnet to the first network Example executes rollback processing.
Figure 17 is the schematic block diagram of the network equipment 1700 of the embodiment of the present application.It should be understood that the network equipment 1700 can The each step executed by second network equipment in the method for Fig. 8 or Fig. 9 is executed, in order to avoid repeating, and will not be described here in detail.Net Network equipment 1700 includes:
Memory 1710, for storing program;
Communication interface 1720, for being communicated with other equipment;
Processor 1730, for executing the program in memory 1710, when described program is performed, the processor 1730 from first network equipment by the communication interface 1720 for receiving the first instruction information, and the first instruction information is used Rollback processing is executed to the first network slice subnet example of failure in instruction second network equipment;And according to institute The first instruction information is stated, rollback processing is executed to first network slice subnet example.
It in the embodiment of the present application, can be with when being sliced the network slice subnet example of example in network consisting and breaking down Without manual intervention automatic rollback causes the configuration and modification of network slice Instance failure, repairs failure immediately, ensures service Coherent and consistency, improve the reliability of network slice example entirety.Meanwhile the method for the embodiment of the present application can also be certainly Restoring to be sliced network the modification of example when more failing enables operator to focus on original mistake.In addition, the embodiment of the present application It can be the automation O&M decision that network is sliced example that the method for offer, which has recorded fault message, self-healing action and self-healing result, Reference is provided, makes that system is more intelligent, quickly handles same type of network failure, also can avoid being sliced example to network in the future Same configuration, modification are taken, same mistake is generated.
It is answered by what network slice subnet example was constituted it should be noted that the embodiment of the present application is suitable for network slice example With scene, solve network slice subnet example occur can not self-healing failure when, a kind of network slice level that may take Self-healing mechanism.The invention relates to flow and method be also applied for the application that network slice example is made of network function Under scene, solve network function occur can not self-healing failure when, execute retract repair failure self-healing mechanism.Network function returns Process step in the flow and step and the embodiment of the present application of the self-healing mechanism moved back is similar, in the interactive information of each intermodule The information that network is sliced to subnet example replaces with the information of corresponding network function.
In addition, the needs NSSI 1 and NSSMF 1 that are used in the embodiment of the present application only for the purpose of illustration, the application Method do not limit fault network slice subnet example number and need to retract network slice subnet example number.
Fig. 2 to Fig. 4 is shown when network slice subnet example nesting network is sliced subnet example, it is understood that there may be three kinds Network management framework.The management network slice that the embodiment of the present application how is executed in these three network management frameworks is introduced below The method of example.
For example, including 1 mould of 1 modules of NSS-SH-MMF and NSS-SH-IF in system shown in Fig. 2, in NSSMF 1 Block only includes 2 modules of NSS-SH-IF in NSSMF 2.During executing the method for management network slice example,
A) 2 moulds of NSS-SH-IF Self-healing Algorithm in the block, configuration, parameter etc. by NSS-SH-MMF 1 by interface 4 into Row configuration, i.e. the transmitting terminal of step S601, S701 and S901 in method 600, method 700 and method 900 is NSS-SH-MMF 1, receiving terminal is NSS-SH-IF 2, and by interface 4, the content of configuration is the Self-healing Algorithm of NSSI 2;
B) NSSI 2 breaks down, and can fault warning NSS-SH- be transmitted to by interface 4 after generating fault warning MMF1 corresponds to method 600, step S602, S702 of method 700, the step S905, NSSMF 2 in method 900 can be by event Hinder alarm report to NSS-SH-MMF 1;
C) judge whether NSSI 2 meets fault self-recovery trigger condition by NSS-SH-MMF 1, and by interface 4 to NSS- SH-IF 2 sends self-healing trigger request, i.e. corresponding method 600, step S603, S703 of method 700, the step in method 900 S906;
D after) NSS-SH-IF 2 executes self-healing action, self-healing result can be reported to NSS-SH-MMF 1 by interface 4, Correspond to the step S613 of method 600, method 700, step S714, S914 of method 900;
E) finally, optionally, fault message and/or self-healing result are reported to NS-SH-MMF by NSS-SH-MMF 1.Such as In system shown in Fig. 2, optionally, NS-SH-MMF can configure the upper of the self-healing result in NSS-SH-MMF 1 by interface 2 Report, self-healing trigger condition and/or its to NSS-SH-IF 1, self-healing configuration of NSS-SH-IF 2 etc..
For example, including in the system as shown in fig. 3, in NSSMF 11 mould of 1 modules of NSS-SH-MMF and NSS-SH-IF Block includes 2 module of 2 modules of NSS-SH-MMF and NSS-SH-IF in NSSMF 2.In the side for executing management network slice example During method,
A) 2 moulds of NSS-SH-IF Self-healing Algorithm in the block, configuration, parameter etc. are configured by NSS-SH-MMF 2, i.e., The transmitting terminal of step S601, S701 and S901 of method 600, method 700 and method 900 are NSS-SH-MMF 2, and receiving terminal is NSS-SH-IF 2, the content of configuration are the Self-healing Algorithms of NSSI 2;
B) when the network function in NSSI 2 breaks down, NSS-SH-MMF 2 can be reported to by generating fault warning, i.e., by NSS-SH-MMF 2 monitors the network failure in NSSI 2, corresponds to method 600, step S602, S702 of method 700, method Step S905 in 900, it should be noted that the network function of composition NSSI 2 may directly be managed by NSSMF 2, it is also possible to It is managed by NFM, the application is not construed as limiting this;
C) judge whether NSSI 2 meets fault self-recovery trigger condition by NSS-SH-MMF 2, and sent out to NSS-SH-IF 2 Send self-healing trigger request i.e. corresponding method 600, step S603, S703 of method 700, the step S906 in method 900;
D after) NSS-SH-IF 2 executes self-healing action, self-healing result can be reported to NSS-SH-MMF 2, that is, correspond to side The step S613 of method 600, method 700, step S714, S914 of method 900;
E) finally, fault message and/or self-healing result are reported to NSSMF 1, optionally, NSSMF1 by NSS-SH-MMF 2 Fault message and/or self-healing result are reported to NSMF.In system as shown in Figure 10, optionally, NS-SH-MMF can pass through The self-healing result that interface 2 configures in NSS-SH-MMF 1 reports, self-healing trigger condition and/or its to NSS-SH-IF 1, NSS- Self-healing configuration of SH-MMF 2 etc..
For example, including 1 mould of 1 modules of NSS-SH-MMF and NSS-SH-IF in system shown in Fig. 4, in NSSMF 1 Block, includes 2 module of 2 modules of NSS-SH-MMF and NSS-SH-IF in NSSMF 2, exists between NSMF and NSSMF 2 and directly connects Mouth 2.During the management network for executing the embodiment of the present application is sliced example,
A) 2 moulds of NSS-SH-IF Self-healing Algorithm in the block, configuration, parameter etc. are configured by NSS-SH-MMF 2, i.e., The transmitting terminal of step S601, S701 and S901 in method 600, method 700 and method 900 are NSS-SH-MMF2, and receiving terminal is NSS-SH-IF 2, the content of configuration are the Self-healing Algorithms of NSSI 2;
B) when the network function in NSSI 2 breaks down, NSS-SH-MMF 2 can be reported to by generating fault warning, i.e., by NSS-SH-MMF 2 monitors the network failure in NSSI 2, that is, corresponds to method 600, step S602, S702 of method 700, side Step S905 in method 900, it should be noted that the network function of composition NSSI 2 may directly be managed by NSSMF 2, also may be used It can be managed by NFM, the application is not construed as limiting this;
C) judge whether NSSI 2 meets fault self-recovery trigger condition by NSS-SH-MMF 2, and sent out to NSS-SH-IF 2 Send self-healing trigger request, i.e. corresponding method 600, step S603, S703 of method 700, the step S906 in method 900;
D after) NSS-SH-IF 2 executes self-healing action, self-healing result can be reported to NSS-SH-MMF 2, that is, corresponded to real Correspond to the step S613 of method 600, method 700, step S714, S914 of method 900;
E) finally, optionally, fault message and/or self-healing result are reported to NSMF by NSS-SH-MMF 2, optionally, Fault message and/or self-healing result can be also reported to NSSMF 1 by NSS-SH-MMF 2.It, can in system as shown in figure 11 Selection of land, NS-SH-MMF can configure the self-healing result in NSS-SH-MMF 2 by interface 2 and report, self-healing trigger condition and/or Its self-healing configuration etc. to NSS-SH-MMF 2.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed Scope of the present application.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be the indirect coupling by some interfaces, device or unit It closes or communicates to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the embodiment of the present application scheme Purpose.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer read/write memory medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of step. And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM)), arbitrary access The various media that can store program code such as memory (Random Access Memory, RAM), magnetic disc or CD.
The above, the only specific implementation mode of the application, but the protection domain of the application is not limited thereto, it is any Those familiar with the art can easily think of the change or the replacement in the technical scope that the application discloses, and should all contain It covers within the protection domain of the application.Therefore, the protection domain of the application should be based on the protection scope of the described claims.

Claims (18)

1. a kind of method of management network slice example, which is characterized in that including:
First network equipment determines that first network slice subnet example breaks down;
The first network equipment sends the first instruction information to second network equipment, and the first instruction information is used to indicate institute It states second network equipment and activates the second network slice subnet example, wherein the second network slice subnet example is for replacing The first network is sliced subnet example.
2. the method as described in claim 1, which is characterized in that the method further includes:The first network equipment is to third The network equipment sends the second instruction information, and the second instruction information is used to indicate the third network equipment and nullifies described first Network is sliced subnet example.
3. method as claimed in claim 1 or 2, which is characterized in that the method further includes:The first network equipment is to Four network equipments send third and indicate information, and third instruction information is used to indicate the 4th network equipment and reconfigures and institute State first network slice subnet example associated third network slice subnet example, it is described reconfigure after the third network It is associated with second network slice subnet example to be sliced subnet example.
4. method as claimed any one in claims 1 to 3, which is characterized in that send the to second network equipment described Before two instruction information, the method further includes:
The parameter information that the first network is sliced subnet example by the first network equipment backs up to storage device.
5. method as claimed in claim 4, which is characterized in that the method further includes:It is sliced subnet in second network In the case that the performance of example does not meet predetermined condition, the first network equipment sends the 4th instruction letter to the third network equipment Breath, the 4th instruction information are used to indicate the backup that the third network equipment is sliced subnet example based on the first network To the parameter information in the storage device, the first network slice subnet example is restored.
6. method as claimed in claim 5, which is characterized in that the method further includes:The first network equipment obtains institute The performance information of the second network slice subnet example is stated, the performance information is used to indicate the second network slice subnet example Performance;
The first network equipment is based on the performance information, determines whether the performance of the second network slice subnet example accords with Close predetermined condition.
7. such as method according to any one of claims 1 to 6, which is characterized in that the method further includes:The first network Equipment receives fault alarm information from second network equipment, and the fault alarm information is used to indicate the first network and cuts Piece subnet example breaks down;
The first network equipment determines that first network slice subnet example breaks down, including:
The first network equipment determines that the first network is sliced subnet example according to the fault alarm information.
8. a kind of method of management network slice example, which is characterized in that including:
Second network equipment receives the first instruction information from first network equipment, and the first instruction information is used to indicate described the Two network equipments activate the second network to be sliced subnet example, wherein the second network slice subnet example is for replacing first Network is sliced subnet example;
Second network equipment indicates information according to described first, and second network is activated to be sliced subnet example.
9. method as claimed in claim 8, which is characterized in that the method further includes:
Second network equipment sends fault alarm information to the first network equipment, and the fault alarm information is for referring to Show that the first network slice subnet example breaks down.
10. a kind of network equipment, which is characterized in that the network equipment is first network equipment, including:
Communication interface,
Memory, for storing instruction,
Processor is respectively connected with the memory and the communication interface, the finger for executing the memory storage It enables, to execute following steps when executing described instruction:
Determine that first network slice subnet example breaks down;
The first instruction information is sent to second network equipment by the communication interface, the first instruction information is used to indicate institute It states second network equipment and activates the second network slice subnet example, wherein the second network slice subnet example is for replacing The first network is sliced subnet example.
11. the network equipment as claimed in claim 10, which is characterized in that the processor is additionally operable to through the communication interface The second instruction information is sent to the third network equipment, the second instruction information is used to indicate the third network equipment and nullifies institute State first network slice subnet example.
12. the network equipment as described in claim 10 or 11, which is characterized in that the processor is additionally operable to through the communication Interface sends third to the 4th network equipment and indicates that information, the third instruction information are used to indicate the 4th network equipment weight Configuration and first network slice subnet example associated third network slice subnet example, it is described reconfigure after it is described It is associated with second network slice subnet example that third network is sliced subnet example.
13. the network equipment as described in any one of claim 10 to 12, which is characterized in that the processor is additionally operable to: Before the second instruction information to the transmission of second network equipment, the parameter information that the first network is sliced to subnet example is standby Part to storage device.
14. the network equipment as claimed in claim 13, which is characterized in that the processor is additionally operable to:In second network In the case that the performance of slice subnet example does not meet predetermined condition, the is sent to the third network equipment by the communication interface Four instruction information, the 4th instruction information are used to indicate the third network equipment and are based on first network slice subnet reality The parameter information of example backed up in the storage device restores the first network slice subnet example.
15. the network equipment as claimed in claim 14, which is characterized in that the processor is additionally operable to obtain second network It is sliced the performance information of subnet example, the performance information is used to indicate the performance of the second network slice subnet example;Institute It states first network equipment and is based on the performance information, it is predetermined to determine whether the performance of the second network slice subnet example meets Condition.
16. the network equipment as described in any one of claim 10 to 15, which is characterized in that the processor is additionally operable to pass through The communication interface receives fault alarm information from second network equipment, and the fault alarm information is used to indicate described the One network is sliced subnet example and breaks down;Determine that first network slice subnet example breaks down in the first network equipment Aspect, the processor are specifically used for determining that the first network is sliced subnet example according to the fault alarm information.
17. a kind of network equipment, which is characterized in that including:
Communication interface,
Memory, for storing instruction,
Processor is respectively connected with the memory and the communication interface, the finger for executing the memory storage It enables, to execute following steps when executing described instruction:
The first instruction information is received from first network equipment by the communication interface, the first instruction information is used to indicate institute It states second network equipment and activates the second network slice subnet example, wherein the second network slice subnet example is for replacing First network is sliced subnet example;
Information is indicated according to described first, and second network is activated to be sliced subnet example.
18. the network equipment as claimed in claim 17, which is characterized in that the processor is additionally operable to through the communication interface Fault alarm information is sent to the first network equipment, the fault alarm information is used to indicate first network slice Net example breaks down.
CN201710167783.6A 2017-03-20 2017-03-20 Method, network device and system for managing network slice instances Active CN108632065B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710167783.6A CN108632065B (en) 2017-03-20 2017-03-20 Method, network device and system for managing network slice instances
PCT/CN2018/078292 WO2018171430A1 (en) 2017-03-20 2018-03-07 Method and system for managing network slice instance, and network device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710167783.6A CN108632065B (en) 2017-03-20 2017-03-20 Method, network device and system for managing network slice instances

Publications (2)

Publication Number Publication Date
CN108632065A true CN108632065A (en) 2018-10-09
CN108632065B CN108632065B (en) 2020-09-11

Family

ID=63585037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710167783.6A Active CN108632065B (en) 2017-03-20 2017-03-20 Method, network device and system for managing network slice instances

Country Status (2)

Country Link
CN (1) CN108632065B (en)
WO (1) WO2018171430A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602717A (en) * 2019-09-18 2019-12-20 四川长虹电器股份有限公司 Disaster recovery processing method for 5G network slice
CN111526030A (en) * 2019-02-03 2020-08-11 华为技术有限公司 Information processing method and device
CN112838942A (en) * 2019-11-25 2021-05-25 中兴通讯股份有限公司 Network operation and maintenance method, electronic equipment and storage medium
CN113068227A (en) * 2020-11-24 2021-07-02 锐捷网络股份有限公司 Method and base station for switching slices in 5G network
CN113993148A (en) * 2020-07-10 2022-01-28 ***通信集团浙江有限公司 5G network slice disaster tolerance switching method and device based on machine learning
CN114143163A (en) * 2020-08-14 2022-03-04 ***通信集团浙江有限公司 Slice false alarm identification method and device based on graph attention network
WO2022063012A1 (en) * 2020-09-27 2022-03-31 华为技术有限公司 Communication method and communication apparatus
CN115442216A (en) * 2021-06-04 2022-12-06 ***通信集团浙江有限公司 Network slice fault self-healing method, device, equipment and computer program product

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11246088B2 (en) 2020-04-10 2022-02-08 Cisco Technology, Inc. Failover and management of multi-vendor network slices

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516312A (en) * 2015-12-09 2016-04-20 重庆邮电大学 Software defined networking load balancingdevice and method
US20160353367A1 (en) * 2015-06-01 2016-12-01 Huawei Technologies Co., Ltd. System and Method for Virtualized Functions in Control and Data Planes
US20170070892A1 (en) * 2015-09-07 2017-03-09 Electronics And Telecommunications Research Institute Mobile communication network system and method for composing network component configurations

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10212589B2 (en) * 2015-06-02 2019-02-19 Huawei Technologies Co., Ltd. Method and apparatus to use infra-structure or network connectivity services provided by 3rd parties

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160353367A1 (en) * 2015-06-01 2016-12-01 Huawei Technologies Co., Ltd. System and Method for Virtualized Functions in Control and Data Planes
US20170070892A1 (en) * 2015-09-07 2017-03-09 Electronics And Telecommunications Research Institute Mobile communication network system and method for composing network component configurations
CN105516312A (en) * 2015-12-09 2016-04-20 重庆邮电大学 Software defined networking load balancingdevice and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
3GPP: "Technical Specification Group Services and System Aspects; Telecommunication management; Study on management and orchestration of network slicing for next generation network(Release 14)", 《3GPP TR 28.801 V0.5.0》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111526030A (en) * 2019-02-03 2020-08-11 华为技术有限公司 Information processing method and device
CN111526030B (en) * 2019-02-03 2021-12-14 华为技术有限公司 Information processing method and device
CN110602717A (en) * 2019-09-18 2019-12-20 四川长虹电器股份有限公司 Disaster recovery processing method for 5G network slice
CN110602717B (en) * 2019-09-18 2021-12-31 四川长虹电器股份有限公司 Disaster recovery processing method for 5G network slice
CN112838942A (en) * 2019-11-25 2021-05-25 中兴通讯股份有限公司 Network operation and maintenance method, electronic equipment and storage medium
CN113993148B (en) * 2020-07-10 2023-08-15 ***通信集团浙江有限公司 5G network slice disaster recovery switching method and device based on machine learning
CN113993148A (en) * 2020-07-10 2022-01-28 ***通信集团浙江有限公司 5G network slice disaster tolerance switching method and device based on machine learning
CN114143163A (en) * 2020-08-14 2022-03-04 ***通信集团浙江有限公司 Slice false alarm identification method and device based on graph attention network
CN114143163B (en) * 2020-08-14 2023-11-14 ***通信集团浙江有限公司 Slice false alarm identification method and device based on graph attention network
WO2022063012A1 (en) * 2020-09-27 2022-03-31 华为技术有限公司 Communication method and communication apparatus
CN113068227A (en) * 2020-11-24 2021-07-02 锐捷网络股份有限公司 Method and base station for switching slices in 5G network
CN113068227B (en) * 2020-11-24 2023-10-27 锐捷网络股份有限公司 Method and base station for switching slices in 5G network
CN115442216B (en) * 2021-06-04 2023-09-05 ***通信集团浙江有限公司 Network slice fault self-healing method, device, equipment and computer storage medium
CN115442216A (en) * 2021-06-04 2022-12-06 ***通信集团浙江有限公司 Network slice fault self-healing method, device, equipment and computer program product

Also Published As

Publication number Publication date
WO2018171430A1 (en) 2018-09-27
CN108632065B (en) 2020-09-11

Similar Documents

Publication Publication Date Title
CN108632065A (en) Manage method, the network equipment and the system of network slice example
CN104243205B (en) Message processing method and equipment when a kind of virtual switch failure
CN105187249B (en) A kind of fault recovery method and device
CN109495312A (en) The method and system of high-availability cluster based on arbitration disk and dual link
JP6117996B2 (en) Virtual network mapping protection method, system, and computer storage medium
CN106331098A (en) Server cluster system
CN105681077A (en) Fault processing method, device and system
CN109104349A (en) Train network data transmission method, system and its apparatus based on CANopen agreement
CN105165054A (en) Method for processing network service faults, service management system and system management module
CN102355368B (en) Fault processing method of network equipment and system
CN108259193A (en) A kind of network management, Network Management System and Element management system
CN107659423A (en) Method for processing business and device
CN108696392A (en) A kind of communications status monitoring method, network node and computer readable storage medium
CN104023058B (en) Method and system for managing and allocating storage resources
CN104639347A (en) Multi-cluster monitoring method and device, and system
CN106021370A (en) Memory database instance management method and device
CN108632063A (en) Manage the methods, devices and systems of network slice example
CA2808239A1 (en) Determining equivalent subsets of agents to gather information for a fabric
CN102833281A (en) Method, device and system for realizing distributed automatically-increasing counting
CN109213507A (en) A kind of upgrade method and server
CN107682411A (en) A kind of extensive SDN controllers cluster and network system
CN107491371A (en) A kind of method and device for monitoring deployment
CN106385330B (en) A kind of implementation method and device of network function virtualization composer
CN105677451A (en) Load balancing method and equipment used for multiple processes
CN105391601B (en) A kind of performance test methods and system of Network Management Equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant