CN108632065A - Manage method, the network equipment and the system of network slice example - Google Patents
Manage method, the network equipment and the system of network slice example Download PDFInfo
- Publication number
- CN108632065A CN108632065A CN201710167783.6A CN201710167783A CN108632065A CN 108632065 A CN108632065 A CN 108632065A CN 201710167783 A CN201710167783 A CN 201710167783A CN 108632065 A CN108632065 A CN 108632065A
- Authority
- CN
- China
- Prior art keywords
- network
- network equipment
- information
- subnet example
- network slice
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0654—Management of faults, events, alarms or notifications using network fault recovery
- H04L41/0668—Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
Abstract
This application provides method, the network equipment and systems that a kind of management network is sliced example, can improve the efficiency of management network slice example, including:First network equipment determines that first network slice subnet example breaks down;First network equipment sends the first instruction information to second network equipment, and the first instruction information is used to indicate second network equipment and activates the second network slice subnet example, wherein the second network slice subnet example is for replacing first network slice subnet example.
Description
Technical field
This application involves the communications fields, and more particularly, to management network be sliced the method for example, the network equipment and
System.
Background technology
With the high speed development of mobile communication, following mobile communication system needs to meet diversified business demand, example
Such as, enhanced mobile broadband, the communication of large-scale machines class, superelevation are reliably with the communication of low latency etc..Therefore mobile in the next generation
The concept of network slice is proposed in communication system.Network microtomy refers to that network is logically abstracted as to one or more
A network slice, wherein each network slice includes a series of logical network function, a network slice can meet a certain
The connection communication demand for services of class or a use-case.Next generation mobile communication system can be by meeting a large amount of of different concatenation abilities
Network slice composition.
In a communication network, when network element breaks down, can be found by the self-checking circuit of failure network element failure or performance,
Threshold measurement task finds failure.But this self-healing system is only capable of carrying out self-healing management to the failure of single network function, cannot
Meet the flexible fault management demand of network slice level.
Invention content
The application provides a kind of methods, devices and systems of management network slice example, can improve management network slice
The efficiency of example.
In a first aspect, a kind of method of management network slice example is provided, including:First network equipment determines the first net
Network is sliced subnet example and breaks down;The first network equipment sends the first instruction information to second network equipment, and described the
One instruction information is used to indicate second network equipment and activates the second network slice subnet example, wherein second network
Slice subnet example is for replacing the first network slice subnet example.
In the embodiment of the present application, first network equipment is determining the case where first network slice subnet example breaks down
Under, it can indicate that second network equipment activates the second network slice subnet example, subnet example is sliced to replace first network, from
And network slice example can be neatly managed, improve the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment sends second to the third network equipment
Indicate that information, the second instruction information are used to indicate the third network equipment and nullify the first network slice subnet reality
Example.
In the embodiment of the present application, first network equipment sends the second instruction information to the third network equipment, to indicate
It states the third network equipment and nullifies the first network slice subnet example to break down, in order to which the second network slice subnet example replaces
First network slice subnet example is changed, example is sliced so as to neatly manage network, improves management network slice example
Efficiency.
In one possible implementation, further include:The first network equipment sends third to the 4th network equipment
Indicate that information, the third instruction information are used to indicate the 4th network equipment and reconfigure and first network slice subnet
The associated third network of example is sliced subnet example, it is described reconfigure after third network slice subnet example with it is described
It is associated that second network is sliced subnet example.
In the embodiment of the present application, first network equipment indicates that the 4th network equipment reconfigures and first network slice
The associated third network of subnet example is sliced subnet example, so that first network slice subnet example and third network slice
The cooperation offer service of net example is sliced example so as to neatly manage network, improves the effect of management network slice example
Rate.
In one possible implementation, described before sending the second instruction information to second network equipment described
Method further includes:The parameter information of first network slice subnet example is backed up to storage and set by the first network equipment
It is standby.
In the embodiment of the present application, the parameter information of first network slice subnet example is backed up to and is deposited by first network equipment
Equipment is stored up, example is sliced so as to neatly manage network, improves the efficiency of management network slice example.
In one possible implementation, further include:The performance that subnet example is sliced in second network is not met
In the case of predetermined condition, the first network equipment sends the 4th instruction information, the 4th instruction to the third network equipment
Information is used to indicate the third network equipment and backs up to the storage device based on first network slice subnet example
In parameter information, restore first network slice subnet example.
In the embodiment of the present application, the first network equipment instruction third network equipment is based on first network and is sliced subnet example
The parameter information backed up in storage device, restore first network be sliced subnet example, so as to neatly manage network
It is sliced example, improves the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment obtains the second network slice
The performance information of net example, the performance information are used to indicate the performance of the second network slice subnet example;Described first
The network equipment is based on the performance information, determines whether the performance of the second network slice subnet example conforms to a predetermined condition.
In the embodiment of the present application, the first network equipment instruction third network equipment is based on first network and is sliced subnet example
The parameter information backed up in storage device, restore first network be sliced subnet example, so as to neatly manage network
It is sliced example, improves the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment is received from second network equipment
Fault alarm information, the fault alarm information are used to indicate the first network slice subnet example and break down;Described
One network equipment determines that first network slice subnet example breaks down, including:The first network equipment is according to the failure
Warning message determines the first network slice subnet example.
In the embodiment of the present application, first network equipment receives fault alarm information from second network equipment, and according to event
First network slice subnet example failure is stated in barrier warning message determination, and example is sliced so as to neatly manage network,
Improve the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment will use second network to be sliced
The procedural information that subnet example replaces the first network slice subnet example is recorded to storage device.
In the embodiment of the present application, first network equipment will use the second network slice subnet example to replace first network and cut
The procedural information of piece subnet example is recorded to storage device, is sliced example so as to neatly manage network, is improved management
Network is sliced the efficiency of example.
In one possible implementation, further include:The second network slice subnet example is second network
The network of the redundancy of equipment management is sliced subnet example.
In one possible implementation, further include:The second network slice subnet example is second network
The newly-built network of equipment is sliced subnet example.
Second aspect provides a kind of method of management network slice example, including:Second network equipment is from first network
Equipment receives the first instruction information, and the first instruction information is used to indicate second network equipment and activates the second network slice
Subnet example, wherein the second network slice subnet example is for replacing first network slice subnet example;Second net
Network equipment indicates information according to described first, and second network is activated to be sliced subnet example.
In the embodiment of the present application, second network equipment receives the first instruction information, the second network from first network equipment
Equipment activates second network to be sliced subnet example according to the first instruction information, and subnet example is sliced to replace first network,
It is sliced example so as to neatly manage network, improves the efficiency of management network slice example.
In one possible implementation, further include:Second network equipment is sent to the first network equipment
Fault alarm information, the fault alarm information are used to indicate the first network slice subnet example and break down.
In the embodiment of the present application, second network equipment sends fault alarm information to first network equipment, with to first
The network equipment indicates that first network slice subnet example breaks down, and is sliced example so as to neatly manage network, improves
The efficiency of management network slice example.
The third aspect provides a kind of method of management network slice example, including:First network equipment determines the first net
Network is sliced subnet example and breaks down;The first network equipment sends the first instruction information to second network equipment, and described the
One instruction information is used to indicate second network equipment and executes rollback processing to first network slice subnet example.
In the embodiment of the present application, first network equipment determines the case where first network slice subnet example breaks down
Under, it can indicate that second network equipment executes rollback processing to first network slice subnet example, so as to neatly manage
Network is sliced example, improves the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment obtains first network slice
The historical parameter information of net example;The first network equipment is sliced the history parameters letter of subnet example based on the first network
Breath determines the first instruction information.
In the embodiment of the present application, first network equipment obtains the historical parameter information of first network slice subnet example;
And it is based on the historical parameter information, determine the first instruction information.It is sliced example so as to neatly manage network, is improved
The efficiency of management network slice example.
In one possible implementation, further include:The first network equipment is obtained from second network equipment
The historical parameter information of the first network slice subnet example;The first network is sliced subnet by the first network equipment
The historical parameter information of example backs up to storage device;The first network equipment obtains the first network and is sliced subnet example
Historical parameter information, including:The first network equipment obtains the first network slice subnet reality from the storage device
The historical parameter information of example.
In the embodiment of the present application, historical parameter information is backed up to storage device by first network equipment, so as to spirit
Network slice example is managed livingly, improves the efficiency of management network slice example.
In one possible implementation, in the first network equipment the first instruction letter is sent to second network equipment
Before breath, further include:The first network equipment obtains the parameter current information of the first network slice subnet example;It is described
The first network is sliced the parameter current information back-up of subnet example to storage device by first network equipment.
In the embodiment of the present application, first network is sliced the parameter current information back-up of example to depositing by first network equipment
Equipment is stored up, subnet example is sliced in order to restore first network, example is sliced so as to neatly manage network, improves pipe
Manage the efficiency of network slice example.
In one possible implementation, further include:It retracts that treated executing the first network is sliced subnet
In the case that the performance of example does not meet predetermined condition, the first network equipment sends second to second network equipment and refers to
Show information, the second instruction information be used to indicate second network equipment based on back up in the storage device first
Network is sliced the parameter current information of subnet example, restores the first network slice subnet example.
In the embodiment of the present application, first network equipment obtains the parameter current that first network is sliced example from storage device
Information, and first network is restored according to the current parameter information and is sliced subnet example, so as to neatly manage network slice
Example improves the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment, which obtains, executes the institute that retracts that treated
The performance information of first network slice subnet example is stated, the performance information is used to indicate the first network slice subnet example
Performance;The first network equipment is based on the performance information, determines that the performance of the first network slice subnet example is
It is no to conform to a predetermined condition.
In the embodiment of the present application, first network equipment obtains the performance letter for treated the first network slice example that retracts
Breath, and determine whether the performance of first network slice subnet example conforms to a predetermined condition based on performance information, so as to flexible
Ground manages network and is sliced example, improves the efficiency of management network slice example.
In one possible implementation, further include:The first network equipment will be sliced son to the first network
The procedural information that net example executes the processing that retracts is recorded to storage device.
In the embodiment of the present application, first network equipment will execute first network slice subnet example the mistake for the processing that retracts
Journey information is recorded to storage device, and example is sliced so as to neatly manage network, improves management network slice example
Efficiency.
In one possible implementation, further include:The first network equipment is received from second network equipment
Fault alarm information, the fault alarm information are used to indicate the first network slice subnet example and break down;Described
One network equipment determines that first network slice subnet example breaks down, including:The first network equipment is according to the failure
Warning message determines the first network slice subnet example.
In the embodiment of the present application, first network equipment receives fault alarm information from second network equipment, and according to event
Barrier warning message determines that first network slice subnet example breaks down, and is sliced example so as to neatly manage network, carries
The high efficiency of management network slice example.
Fourth aspect provides a kind of method of management network slice example, including:Second network equipment is from first network
Equipment receives the first instruction information, and the first instruction information is used to indicate second network equipment to the first of failure
Network is sliced subnet example and executes rollback processing;Second network equipment indicates information according to described first, to described first
Network is sliced subnet example and executes rollback processing.
In the embodiment of the present application, second network equipment receives the first instruction information from first network equipment, first finger
Show that information is used to indicate the first network equipment and executes rollback processing, second network equipment to first network slice subnet example
Rollback processing is executed to first network slice subnet example based on the first instruction information, so as to neatly manage net
Network is sliced example, improves the efficiency of management network slice example.
In one possible implementation, in second network equipment the first instruction letter is received from first network equipment
Before breath, the method further includes:Second network equipment sends the first network slice to the first network equipment
The parameter current information of example, in order to the first network equipment by the first network be sliced subnet example parameter current
Information back-up is to storage device.
In the embodiment of the present application, second network equipment sends first network to first network equipment and is sliced subnet example
Parameter current information, in order to which first network equipment extremely stores the parameter current information back-up of first network slice subnet example
Equipment is sliced example so as to neatly manage network, improves the efficiency of management network slice example.
In one possible implementation, further include:It retracts that treated executing the first network is sliced subnet
In the case that the performance of example does not meet predetermined condition, second network equipment receives second from the first network equipment and refers to
Show information, the second instruction information be used to indicate second network equipment based on back up in the storage device first
Network is sliced the parameter current information of subnet example, restores the first network slice subnet example.
In the embodiment of the present application, the first instruction information that second network equipment is sent based on first network equipment, restores
First network is sliced subnet example.It is sliced example so as to neatly manage network, improves management network slice example
Efficiency.
In one possible implementation, further include:Second network equipment is sent to the first network equipment
Fault alarm information, the fault alarm information are used to indicate the first network slice subnet example and break down.
In the embodiment of the present application, second network equipment sends fault alarm information to first network equipment, to indicate the
One network is sliced subnet example and breaks down.It is sliced example so as to neatly manage network, improves management network slice
The efficiency of example.
In one possible implementation, further include:Second network equipment is sent to the first network equipment
The historical parameter information of the first network slice subnet example, in order to which the first network equipment cuts the first network
The historical parameter information of piece subnet example backs up to storage device.
In the embodiment of the present application, second network equipment sends first network to first network equipment and is sliced subnet example
Historical parameter information, in order to which the historical parameter information of first network slice subnet example is backed up to storage by first network equipment
Equipment is sliced example so as to neatly manage network, improves the efficiency of management network slice example.
5th aspect, provides a kind of network equipment, the arbitrary possibility for executing above-mentioned first aspect or first aspect
Realization method in method.Specifically, which includes for executing the arbitrary of above-mentioned first aspect or first aspect
The unit of method in possible realization method.
6th aspect, provides another network equipment, can for executing above-mentioned second aspect or the arbitrary of second aspect
Method in the realization method of energy.Specifically, which includes times for executing above-mentioned second aspect or second aspect
The unit for the method anticipated in possible realization method.
7th aspect, provides another network equipment, can for executing the above-mentioned third aspect or the arbitrary of the third aspect
Method in the realization method of energy.Specifically, which includes times for executing the above-mentioned third aspect or the third aspect
The unit for the method anticipated in possible realization method.
Eighth aspect provides another network equipment, can for executing above-mentioned fourth aspect or the arbitrary of fourth aspect
Method in the realization method of energy.Specifically, which includes times for executing above-mentioned fourth aspect or fourth aspect
The unit for the method anticipated in possible realization method.
9th aspect, provide a kind of network system, the system include it is above-mentioned 5th aspect, the 6th aspect described in network
Equipment, or including the network equipment described in above-mentioned 7th aspect and eighth aspect.
Tenth aspect, provides a kind of network equipment, which includes:Communication interface, memory, processor and total
Linear system is united.Wherein, the communication interface, the memory and the processor are connected by the bus system, and the memory is for storing
Instruction, the processor are used to execute the instruction of memory storage, are believed with controlling the communication interface and receiving signal and/or send
Number, and when the processor executes the instruction of memory storage, which makes the processor execute first aspect or the
Method in the arbitrary possible realization method of one side.
On the one hand tenth, provides a kind of network equipment, which includes:Communication interface, memory, processor and
Bus system.Wherein, the communication interface, the memory and the processor are connected by the bus system, and the memory is for depositing
Storage instruction, the processor are used to execute the instruction of memory storage, are believed with controlling the communication interface and receiving signal and/or send
Number, and when the processor executes the instruction of memory storage, which makes the processor execute second aspect or the
Method in the arbitrary possible realization method of two aspects.
12nd aspect, provides a kind of network equipment, which includes:Communication interface, memory, processor and
Bus system.Wherein, the communication interface, the memory and the processor are connected by the bus system, and the memory is for depositing
Storage instruction, the processor are used to execute the instruction of memory storage, are believed with controlling the communication interface and receiving signal and/or send
Number, and when the processor executes the instruction of memory storage, which makes the processor execute the third aspect or the
Method in the arbitrary possible realization method of three aspects.
13rd aspect, provides a kind of network equipment, which includes:Communication interface, memory, processor and
Bus system.Wherein, the communication interface, the memory and the processor are connected by the bus system, and the memory is for depositing
Storage instruction, the processor are used to execute the instruction of memory storage, are believed with controlling the communication interface and receiving signal and/or send
Number, and when the processor executes the instruction of memory storage, which makes the processor execute fourth aspect or the
Method in the arbitrary possible realization method of four aspects.
Fourteenth aspect provides a kind of network system, which includes above-mentioned tenth aspect, described in the tenth one side
The network equipment, or including the network equipment described in above-mentioned 12nd aspect and the 13rd aspect.
15th aspect, provides a kind of computer-readable medium, for storing computer program, the computer program packet
Include the instruction of the method in the arbitrary possible realization method for executing first aspect or first aspect.
16th aspect, provides a kind of computer-readable medium, for storing computer program, the computer program packet
Include the instruction of the method in the arbitrary possible realization method for executing second aspect or second aspect.
17th aspect, provides a kind of computer-readable medium, for storing computer program, the computer program packet
Include the instruction of the method in the arbitrary possible realization method for executing the third aspect or the third aspect.
18th aspect, provides a kind of computer-readable medium, for storing computer program, the computer program packet
Include the instruction of the method in the arbitrary possible realization method for executing fourth aspect or fourth aspect.
19th aspect, provide a kind of network system, the system include it is above-mentioned 15th aspect, the 16th aspect described in
Computer-readable medium, or including it is above-mentioned 17th aspect and the 18th aspect described in computer-readable medium.
Description of the drawings
Fig. 1 is the schematic diagram of the network management framework of the embodiment of the present application.
Fig. 2 is the schematic diagram of the network management framework of the another embodiment of the application.
Fig. 3 is the schematic diagram of the network management framework of the another embodiment of the application.
Fig. 4 is the schematic diagram of the network management framework of the another embodiment of the application.
Fig. 5 is the schematic diagram of the method for the management network slice example of the embodiment of the present application.
Fig. 6 is the schematic diagram of the method for the management network slice example of the another embodiment of the application.
Fig. 7 is the schematic diagram of the method for the management network slice example of the another embodiment of the application.
Fig. 8 is the schematic diagram of the method for the management network slice example of the another embodiment of the application.
Fig. 9 is the schematic diagram of the method for the management network slice example of the another embodiment of the application.
Figure 10 is the schematic diagram of the network equipment of the embodiment of the present application.
Figure 11 is the schematic diagram of the network equipment of the another embodiment of the application.
Figure 12 is the schematic diagram of the network equipment of the another embodiment of the application.
Figure 13 is the schematic diagram of the network equipment of the another embodiment of the application.
Figure 14 is the schematic diagram of the network equipment of the another embodiment of the application.
Figure 15 is the schematic diagram of the network equipment of the another embodiment of the application.
Figure 16 is the schematic diagram of the network equipment of the another embodiment of the application.
Figure 17 is the schematic diagram of the network equipment of the another embodiment of the application.
Specific implementation mode
Below in conjunction with attached drawing, the technical solution in the application is described.
Before the management network for introducing the application is sliced the methods, devices and systems of example, for the ease of understanding this Shen
Content please first describes a few terms of herein presented one and network slice management system.
Network is sliced (Network slice):Refer on network infrastructure physically or a virtually, according to different
Demand for services customizes different logical network.It includes terminal, access net, transmission network, core that network slice, which can be one,
The complete end to end network of net and application server, is capable of providing telecommunications service, has certain network capabilities;Network is sliced
It can be above-mentioned terminal, access the arbitrary combination of net, transmission network, core net and application server, for example, network slice includes only
Access net and core net.Network slice may have following one or more characteristics:Access net may be sliced, it is also possible to not cut
Piece.Access net may be that multiple network slices share.Their network function can with composition for the characteristic of different network slices
Can be different.
Network is sliced example (Network slice instance, NSI):It is a logical network really run, energy
Meet certain network characteristic or demand for services.One network slice example may provide one or more services.Network slice is real
Example can be created by network management system, and a network management system may create multiple network slice examples and carry out pipe to them simultaneously
Reason, performance monitoring and the fault management etc. being included in network slice example operational process.When multiple networks slice example coexists
When, network may share partial network resource and network function between being sliced example.Network slice example may be sliced from network
Template creates, it is also possible to not created from network slice template.One complete network slice example is to be capable of providing complete end
To the network service at end, and that network consisting slice example can be network slice subnet example (network slice
Subnet instance, NSSI) and/or network function.Network function may include physical network function and/or virtual network
Function.Hereinafter referred to as physical network function and/or virtual network function are network function.
Network is sliced subnet example (network slice subnet instance, NSSI):Network is sliced subnet example
Complete network service end to end can need not be provided, network slice subnet example can be same in network slice example
The network function composition set of a equipment vendor, it is also possible to be cut by the set for the network function that domain divides, such as core net network
Piece subnet example, access net network are sliced subnet example, or form set by other modes.Network is sliced subnet example may quilt
Multiple network slice examples are shared.It proposes that network is sliced subnet example, network management system management can be facilitated.One network slice is real
Example may be sliced subnet example by several networks and form, and each network slice subnet example is by several network functions and/or several
Network is sliced subnet example composition;One network slice example may be sliced subnet example and is not divided by several networks
Network is sliced the network function composition of subnet example;One network slice example may also be only made of several network functions.
Network function (Network function, NF):It is a kind of processing function in network, defines functional row
For and interface, network function can be realized by specialized hardware, can also also may be used by the way that runs software is realized on specialized hardware
It is realized in the form of virtual functions by general hardware platform.Therefore, from the angle of realization, network function can be divided into
Physical network function and virtual network function.And from the angle used, network function can be divided into privately-owned network function and share
Specifically for multiple (son) networks are sliced example, different network functions can be used independently in network function, this
Kind network function is known as privately-owned network function, can also share the same network function, and this network function is known as shared network
Function.
Service Management Function module (Sevice management function, SvMF):It is responsible for operator and/or the
The telecommunications service demand of tripartite client is converted into the demand being sliced to network, and the demand being sliced to network is sent to NSMF, receives
Operator and/or third party client are sliced management data (such as performance data, fault data, fault restoration data etc.) to network
Subscription demand, obtain the management data etc. that network is sliced from NSMF.
Network is sliced management function module (network slice management function, NSMF):It is responsible for reception
The network that SvMF is sent is sliced demand, and be managed to life cycle, performance, the failure etc. of network slice example (will give birth to below
Order the referred to as management of period, performance, fault management), layout network is sliced the composition of example, and the demand of decomposition network slice example is
The demand of each network slice subnet example sends network slice subnet instance management request to each NSSMF, network is sent to NFM
Function management is asked.
Network slice subnet management function module (network slice subnet management function,
NSSMF):The demand that subnet example is sliced to network is received from NSMF, to be sliced life cycle, the property of subnet example to network
Energy, failure etc. are managed and (below referred to as manage life cycle, performance, fault management), and layout network is sliced the group of example
At.
Network function management module (network function management, NFM):For managing NF, such as manage
The life cycle of NF distributes Internet resources etc. for NF.
Network is sliced self-healing monitoring and management function (Network Slice Self-Healing Monitor and
Management Function,NS-SH-MMF):It includes at least such as the next item down function:Network slice is sent to NS-SH-IF
Self-healing Algorithm and parameter;NSS-SH-MMF is configured about the relevant information of network slice subnet self-healing and parameter;Monitoring network is cut
Piece example operating condition and fault condition;Judge whether network slice Instance failure meets self-healing trigger condition;To NS-SH-IF
It sends network and is sliced self-healing trigger request;It receives the network slice self-healing that NS-SH-IF is sent and disposes result;Net is reported to SvMF
Network is sliced fault data and result is disposed in self-healing.
Network is sliced self-healing and executes function (Network Slice Self-Healing Implementation
Function,NS-SH-IF:):It includes at least such as the next item down function:The network slice self-healing from NS-SH-MMF is received to calculate
Method configures and parameter;It receives the network that NS-SH-MMF is sent and is sliced self-healing trigger request;Collection network is sliced operation information, packet
It includes but is not limited to network slice example performance data, fault warning, configuration data, test data etc.;Failure judgement type decision
Failure selfreparing acts;Failure selfreparing action is executed, including but not limited to switch failure slice example/network function is superfluous
Minor is sliced example/network function, creates new son slice example/network function substitution failure and is sliced example/network function, right
The network slice exemplary configuration of failure, modification is caused to retract etc.;The configuration being sliced in example to existing network is backed up;
Execute specific automatically restoring fault action;Assess automatically restoring fault effect;Judge whether to need to stop fault recovery flow;It is multiple
The action that former automatically restoring fault executes;The action and failure taken with NS Repository intersection record fault recoveries are extensive
Multiple junction fruit;To NS-SH-MMF reporting fault restoration results.
Network is sliced subnet self-healing monitoring and management function (Network Slice Subnet Self-Healing
Monitor and Management Function,NSS-SH-MMF):It includes at least such as the next item down function:To NSS-SH-
IF sends network slice subnet Self-healing Algorithm and parameter;Monitor network slice subnet example operating condition and fault condition;Judge
Whether network slice subnet Instance failure meets self-healing trigger condition;Network slice subnet self-healing triggering is sent to NSS-SH-IF
Request;It receives the network slice subnet self-healing that NSS-SH-IF is sent and disposes result;It is sliced subnet to NS-SH-MMF report networks
Result is disposed in fault data and self-healing.
Network is sliced self-healing and executes function (Network Slice Subnet Self-Healing Implementation
Function,NSS-SH-IF):It includes at least such as the next item down function:Receive the network slice subnet from NSS-SH-MMF certainly
More algorithm configuration and parameter;It receives the network that NSS-SH-MMF is sent and is sliced subnet self-healing trigger request;Collection network slice
Network operation information, including but not limited to network are sliced subnet example performance data, fault warning, configuration data, test data etc.;
Failure judgement type decision failure selfreparing acts;Failure selfreparing action is executed, including but not limited to switch failure is sliced
Example (nested network slice subnet example)/network function is that redundancy is sliced example/network function, and it is real to create new son slice
Example/network function replaces failure slice example (nested network slice subnet example)/network function, to causing the net of failure
Network slice subnet exemplary configuration, modification retract etc.;The configuration being sliced in subnet example to existing network is backed up;It executes
Specific automatically restoring fault action;Assess automatically restoring fault effect;Judge whether to need to stop fault recovery flow;Restore event
The automatic action for restoring to execute of barrier;The action taken with NSS Repository intersection record fault recoveries and fault recovery knot
Fruit;To NSS-SH-MMF reporting fault restoration results.
Network slice information library ((Network Slice Repository, NS Repository):It is a data
Library wherein at least has recorded with the next item down content:Network is sliced instance configuration information, including network slice subnet exemplary configuration letter
Breath, network function configuration information, fault message, selfreparing action and reparation result etc..NS Repository can be only with NSMF
It is vertical to come, it can also be arranged in consolidated network equipment with NSMF.
Network is sliced subnet information library (Network Slice Subnet Repository, NSS Repository):.
It is a database, is wherein at least had recorded with the next item down content:Network slice subnet instance configuration information, including nested
Network is sliced subnet instance configuration information, network function configuration information, fault message, selfreparing action and reparation result etc..NSS
Repository can be independent with NSSMF, can also be arranged in consolidated network equipment with NSSMF.
Further include at least one of lower interface interface in the network management framework 100 of Fig. 1:
Interface 1:Interface between SvMF and NSMF sends the demand that business is sliced network, NSM for SvMF to NSMF
The operating condition of NSI and business are fed back to SvMF, and certain management data are provided.
Interface 2:Interface between NSMF and NSSMF, NSMF are passed in management and layout NSI, by the interface to NSSMF
Pass the demand to NSSI, such as create, change, obtaining management data etc., NSSMF feeds back related NSSI by the interface to NSMF
Information.
Interface 3:Interface between NSMF and NFM, NSMF transmissions are managed to NF and configuration order;NFM is connect by this
Mouth receives the message from NSMF, and feeds back the information about NF by the interface.
Interface 4:Interface between NSSMF, for the mutual coordination between NSSMF, NSSMF is another by the interface requests
The NSSI that a NSSMF administers it is managed, including life cycle management, performance management, fault management etc..
Interface 5:Interface between NSMF and NS Repository is recorded and is read in NS Repository for NSMF
Access evidence.
Interface 6:Interface between NSSMF and NSS Repository is recorded for NSSMF in NSS Repository
With reading data.
Interface 7:Interface between NSMF and NSS Repository obtains number for NSMF from NSS Repository
According to.
In addition, the building form of several NSI is also illustrated in Fig. 1, including:NSI is made of several NSSI;If NSI by
Dry NSSI and several NF composition;NSI is made of several NF.
It should be noted that NSSI allows nesting, i.e., a NSSI includes another NSSI, is both had respective
NSSMF;Assuming that NSI includes NSSI 1, NSSI 1 is again NSSI 1 and NSSI respectively comprising NSSI 2, NSSMF 1 and NSSMF 2
2 manager, at this time to the management of NSSI 2 there are two kinds of options, option 1 is to send NSI 2 from NSSMF 1 to NSSMF 2
Management request, the option be suitable for there are under the scene of interface 4 between NSSMF 1 and NSSMF 2;Option 2 is straight by NSMF
Connect the management request that NSSI 2 is sent to NSSMF 2.
In addition, NS Repository may be the corpus separatum independently of NSMF, it is also possible to a number inside NSMF
According to library.NSS Repository may be the corpus separatum independently of NSSMF, it is also possible to a database inside NSSMF.
When NSS Repository are a corpus separatums, it may store the information of several height slice examples and several NSSMF
There are interfaces 6.
In the case where NSSI allows nested, Fig. 2 to Fig. 4 respectively illustrates the network management frame of three kinds of the embodiment of the present application
Structure.
Fig. 2 is the structural schematic diagram of the network management framework 200 of the embodiment of the present application.As shown in Fig. 2, the NSSI being nested
NSS_SH_IF2 by last layer NSSI NSS_SH_MMF1 manage;The NSS_SH_MMF1 of last layer is managed by NS_SH_MMF again
Reason.
Fig. 3 is the structural schematic diagram of the network management framework 300 of the embodiment of the present application.As shown in figure 3, the NSSI being nested
NSS_SH_IF2 can directly be managed by NSS_SH_MMF2, NSS_SH_MMF2 from NSS_SH_MMF1 receive strategy.
Fig. 4 is the structural schematic diagram of the network management framework 400 of the embodiment of the present application.As shown in figure 4, the NSSI being nested
NSS_SH_IF2 by itself NSS_SH_MMF2 manage;The NSS_SH_MMF2 of own can be managed by NS_SH_MMF.
In addition may exist some rapports between NSS_SH_MMF2 and NSS_SH_MMF1.
Additionally, it should be noted that each function module and unit of above-mentioned introducing, are from their possessed functions
What angle considered.In practical application, above-mentioned each function module can be individually physically present, can also be two or two with
Upper integration of equipments in a unit, for example, NS_SH_MMF modules and NS_SH_IF modules can be merged into a function mould
Block, the function module have the functional or NS_SH_MMF modules of institute and NS_ of NS_SH_MMF modules and NS_SH_IF modules
SH_IF modules can be independent module respectively, and be communicated by the interface between module.Those of ordinary skill in the art
In the technical scope that the application discloses, various equivalent modifications or substitutions can be readily occurred in, these modifications or substitutions should all be contained
It covers within the protection domain of the application.
The network management framework of the embodiment of the present application has been described above, below in conjunction with attached drawing, has introduced the embodiment of the present application
Management network slice example methods, devices and systems.
Fig. 5 is the schematic flow chart of the method 500 of the management network slice example of the embodiment of the present application.Method 500 can
To be suitable for network management framework shown in Fig. 1 to Fig. 4.First network equipment in Fig. 5 may include NS_SH_IF modules or
NSMF modules, NSMF modules include NS_SH_MMF and NS_SH_IF modules.Second network equipment, the third network equipment, the 4th net
Network equipment may include NSSMF modules.Wherein, the third network equipment to the 4th network equipment can respectively include individually
NSSMF modules can also include the same NSSMF modules.
As shown in figure 5, method 500 includes:
S501, first network equipment determine that first network slice subnet example breaks down.
Above-mentioned first network equipment can be that the module of subnet example is sliced for managing and monitoring multiple networks.For example,
First network equipment can be NSMF modules.For example, above-mentioned first network equipment is somebody's turn to do for managing and monitoring network slice example
Network slice example includes the first network slice subnet example.
Optionally, first network equipment determines mode there are many first network slice subnet example failures.For example,
In a kind of mode, first network equipment can receive the fault alarm information of second network equipment, which is used for
Indicate that first network slice subnet example breaks down.In the second way, first network equipment can receive the 5th network
The triggering self-healing information of equipment, the triggering self-healing information can meet self-healing trigger condition in first network slice subnet example
In the case of send.Wherein, in the second way, which can be NS_SH_IF modules, the 5th net
Network equipment can be NS_SH_MMF modules.
S502, the first network equipment send the first instruction information, second network equipment to second network equipment
Receive the first instruction information.The first instruction information is used to indicate second network equipment and activates the second network slice
Subnet example, wherein the second network slice subnet example is for replacing the first network slice subnet example.
Optionally, S502 is it is also understood that first network equipment determines that being sliced subnet example to the first network holds
Row self-healing is handled, and self-healing processing includes that the first network equipment sends the first instruction information to second network equipment, described
First instruction information is used to indicate second network equipment and activates the second network slice subnet example, wherein second net
Network slice subnet example is for replacing the first network slice subnet example.
Optionally, the second network of above-mentioned activation slice subnet example may include that second network equipment is notified to start the second net
Network is sliced subnet example.
Optionally, the USI user service information that first network can also be sliced to subnet example is loaded into the second network slice
Net example, in order to restore business.
Optionally, the second network can also be sliced to example in NSS Repository and/or NS Repository
Status indication is activated state.
The first instruction information may include configuration information, which may include at least one of following:First net
Network is sliced the application parameter of subnet example, and first network is sliced location information of the subnet example in network topology, first network
The interface message etc. being sliced between subnet example and other NSSI.
Second network equipment can be the module of monitoring and management network slice subnet example.For example, second network equipment
Can be NSSMF modules.
Optionally, above-mentioned second network slice subnet example is the network slice of the redundancy of second network device management
Subnet example, or, second network slice subnet example is the newly-built network slice subnet example of second network equipment.
In the embodiment of the present application, first network equipment is determining the case where first network slice subnet example breaks down
Under, it can indicate that second network equipment activates the second network slice subnet example, subnet example is sliced to replace first network, from
And network slice example can be neatly managed, improve the efficiency of management network slice example.
Optionally, method 500 further includes:The first network equipment sends the second instruction information to the third network equipment,
The third network equipment receives the second instruction information.The second instruction information is used to indicate the third network equipment
Nullify the first network slice subnet example.
As an example, the second instruction information can be specifically used for notice third network equipment stopping first network slice
The service run on subnet example.
In method 500, nullifying first network slice subnet example can also include:First network is sliced subnet example
Status indication in NSS Repository and/or NS Repository is to nullify state.
Optionally, method 500 further includes:The first network equipment sends third to the 4th network equipment and indicates information,
4th equipment receives the third and indicates information.The third instruction information is used to indicate the 4th network equipment and re-matches
Set and be sliced subnet example with the associated third network of first network slice subnet example, it is described reconfigure after described the
It is associated with second network slice subnet example that three networks are sliced subnet example.
Wherein, the associated third network of the above-mentioned slice subnet example with first network is sliced subnet example, can refer to
First network is sliced subnet example, and there are the third networks of dependence to be sliced subnet example.
As an example, may include configuration information in third instruction information, which may include using ginseng
Number change information, the interface message etc. between change in location information or the second network slice subnet example in network topology.
Optionally, before sending the second instruction information to second network equipment described, method 500 further includes:Described
The parameter information that the first network is sliced subnet example by one network equipment backs up to storage device.
Before nullifying first network slice subnet example, the first network can be sliced subnet by first network equipment
The parameter information of example backs up to storage device, and subnet example is sliced in order in the case of necessary, restore first network.
Optionally, method 500 further includes:The performance that subnet example is sliced in second network does not meet predetermined condition
In the case of, the first network equipment sends the 4th instruction information to the third network equipment, and the third network equipment receives institute
State the 4th instruction information.The 4th instruction information is used to indicate the third network equipment and is based on first network slice
The parameter information of net example backed up in the storage device restores the first network slice subnet example.
Optionally, method 500 further includes:The first network equipment obtains the property of the second network slice subnet example
Energy information, the performance information are used to indicate the performance of the second network slice subnet example;The first network equipment base
In the performance information, determine whether the performance of the second network slice subnet example conforms to a predetermined condition.
Optionally, above-mentioned performance information can refer to the information for the performance that can reflect the second network slice subnet example.The
One network equipment can obtain the performance information that the second network is sliced subnet example from second network equipment.Alternatively, first network
Equipment can obtain third network associated with first network slice subnet example from the third network equipment and be sliced subnet example
Performance information, third network slice subnet example performance information can also reflect the second network slice subnet example property
Energy.
As an example, which may include performance measure information, threshold value monitoring information etc..
Optionally, method 500 further includes:The first network equipment receives fault alarm letter from second network equipment
Breath, the fault alarm information are used to indicate the first network slice subnet example and break down;The first network equipment
Determine that first network slice subnet example breaks down, including:The first network equipment is true according to the fault alarm information
The fixed first network is sliced subnet example.
Optionally, method 500 further includes:The first network equipment will use second network slice subnet example to replace
The procedural information for changing the first network slice subnet example is recorded to storage device.
As an example, the reparation failure even if above self-healing operation fails, restores service, also needs to record accordingly certainly
More it acts, fault message and self-healing result.
As a specific example, Fig. 6 shows showing for the method 600 of the management network slice example of the embodiment of the present application
Meaning property flow chart.Method 600 can be used in any network management framework in Fig. 1 to Fig. 4.Fig. 6 is shown failure NSSI
It is switched to the network slice management process of the NSSI of redundancy.Wherein, the first network equipment in method 500 can be NS_SH_IF
Module or NSMF modules, NSMF modules include NS_SH_MMF and NS_SH_IF modules.Second network equipment in method 600 can
Can be NSSMF1 modules, the 4th network equipment can be NSSMF3 modules to be NSSMF2 modules, the third network equipment.Its
In, the third network equipment to the 4th network equipment can be individual NSSMF modules respectively, can also be the same NSSMF moulds
Block.
As shown in fig. 6, this method 600 includes:
S601, NS-SH-MMF configuration NS-SH-IF need the Self-healing Algorithm executed.Specifically, for being switched to redundancy
The content of the self-healing mechanism of NSSI, configuration includes the identity of NSI, the fault restoration demand of the NSI, NSI establishment time-divisions
The identity of redundancy NSSI matched and/or created, redundancy NSSI and form the NSI NSSI correspondence, be switched to superfluous
The triggering rule of remaining NSSI includes event, fault type and condition etc..It should be noted that redundancy NSSI and composition NSI
May not be one-to-one relationship between NSSI, it can be as any one in several NSSI for example, redundancy NSSI is possible
Redundancy substitute, a redundancy NSSI may can be substituted as the redundancy of several same type NSSI in several NSI.
S602, a NSSI for forming NSI break down, and influence the normal operation of NSI.In the embodiment of the present application, false
If NSSI 1 breaks down, it is responsible for by NSSMF 1.NSSMF 1 generates network slice subnet Instance failure and alerts and lead to
It crosses interface 2 and is reported to NS-SH-MMF.NS-SH-MMF receives the fault warning from NSSMF 1.Contained in fault warning to
Less with the next item down content:The ID of fault warning ID, NSSI, the time that failure occurs, fault type, failure cause, the source of trouble, therefore
Hinder seriousness, the influence that failure generates service, the repair mode etc. that can be taken.
S603, NS-SH-MMF meet self-healing trigger condition according to fault warning judgement, and self-healing triggering is sent to NS-SH-IF
Order.NS-SH-IF receives self-healing trigger command.
S604, NS-SH-IF collect the information of network of relation slice example and network slice subnet example, collect packet
It includes at least with the next item down content:A) NS-SH-IF by interface 2 to 1 sending performance measurement tasks of NSSMF, threshold measurement task,
NS-SH-IF receives the performance data and threshold measurement result that NSSMF 1 is reported by interface 2;B) NS-SH-IF to NSSI 1
There are the management work(of other interactive networks slice subnet example (the embodiment of the present application is assumed to be NSSI 3, is managed by NSSMF3)
Can, i.e., 3 sending performance measurement tasks of NSSMF, threshold measurement task, NS-SH-IF receive what NSSMF 3 was reported by interface 2
Performance data and threshold measurement result;C) NS-SH-IF finds the corresponding redundancy NSSI of failure NSSI according to self-healing configuration, passes through
Interface 5 reads its current state from NS Repository, and (possible state includes nullifying, activating, terminated, can not use
Deng), the embodiment of the present application assumes that the redundant network slice sub-network example of NSSI 1 is NSSI 2, and NSSI 2 is managed by NSSMF 2
Reason;D) NS-SH-IF by interface 2 to NSSMF 2 send test assignment, NSSMF 2 execute test assignment and by interface 2 to
NS-SH-IF reports test result;E) when NS-SH-IF reads from NS Repository 1 normal operations of NSSI by interface 5
Configuration information, including SLA, position, interface message in the logical topology that network is sliced example;F) NS-SH-IF is by connecing
Mouth 2 obtains the information on services being currently running on NSSI1, including user data, configuration etc. from NSSMF 1;G) NS-SH-IF is logical
The historical failure information that interface 5 reads NSSI 1 from NS Repository is crossed, the repair action taken is repaired as a result, reading
The fault message of subnet example is sliced with other networks of 1 same types of NSSI, the repair action taken repairs result etc..Foundation
The Self-healing Algorithm configured in the information and step S601 that are collected into, NS-SH-IF determine to replace failure NSSI with redundancy NSSI 2
1。
S605, optionally, NS-SH-IF are by interface 5 by the relevant configuration information of NSSI 1, logical topology position, user
Information on services etc. backs up to NS Repository, to be restored when fault self-recovery fails.
If the state of S606, current NSSI 1 are state of activation, NS-SH-IF nullifies NSSI 1.Cancellation includes will
Status indications of the NSSI 1 in NSS Repository and/or NS Repository is to nullify state, and notice NSSMF 1 stops
The service run on NSSI 1.
S607, optionally, NS-SH-IF send the order of configuration NSSI 2 by interface 2 to NSSMF 2, and configuration message is extremely
Include application parameter, the interface message etc. between position and other NSSI in network topology less.It should be noted that this
Configuration when the configuration content at place may correctly be run with the NSSI 1 that NS-SH-IF in step S604 is collected is consistent, it is also possible to
It is different.In order to ensure that network is sliced the high reliability of example, the network slice subnet example of redundancy may be some NSSI exclusive
, in this case, corresponding configuration is carried out to it when creating redundancy NSSI, when changing corresponding NSSI configurations, NSMF
Also the manager of redundancy NSSI can be notified correspondingly to change configuration simultaneously, to provide switch speed when sending failure, protected
High reliability is demonstrate,proved, in this case, step S607 can not be necessary.In addition, when redundancy NSSI can replace several
When NSSI, these NSSI may belong to same NSI, it is also possible to belong to different NSI, in this case, redundancy NSSI will not be certainly
More it is configured before mechanism triggering, step S607 is steps necessary at this time.
S608, NS-SH-IF send the order of configuration NSSI 3 by interface 2 to NSSMF 3, by NSSI 3 and NSSI2 phases
Association, configuration message are included at least with the next item down content:Application parameter changes, the change in location in network topology and NSSI
Interface message etc. between 2.
S609, NS-SH-IF activate NSSI 2.Activation includes by NSSI 2 in NSS Repository and/or NS
Status indication in Repository is activated state, and notice NSSMF 2 starts what NSSI 2 and being loaded into was obtained in step S604
USI user service information on NSSI 1 is to restore business.
The information of S610, NS-SH-IF collection network slice example simultaneously assesses self-healing result.Collect information include at least with
The next item down content:NS-SH-IF issues the property for NSSI 2 and NSSI 3 by interface 2 respectively to NSSMF 2 and NSSMF 3
It can measure, threshold value monitor task, NSSMF 2 and the measurement of 3 execution performances of NSSMF, threshold value monitor task, and be reported by interface 2
To NS-SH-IF performance measurements and/or it is more than threshold alarm.
If S611, step S606 to step S609 have any one step fail or step S610 in NS-SH-IF be collected into
Information show that network slice service is unable to operate normally after switching redundancy NSSI, then triggers restoring action.Specifically, NS-
Network state before the self-healing action execution preserved in SH-IF read steps S605 and configuration, configure NSSI 3 and NSSI according to this
1, and activate NSSI 1.
S612, NS-SH-IF update the operating status that network in NS Repository is sliced example, topology by interface 5
The self-healing of information, configuration information etc., and recording step S606 to step S611 act, and record fault message and self-healing result.It needs
It is noted that even if above self-healing action, which fails, is repaired failure, restore service, also needs to record corresponding self-healing action, therefore
Hinder information and self-healing result.
The self-healing action and self-healing result that S613, NS-SH-IF are used to NS-SH-MMF reports.NS-SH-MMF is by connecing
Mouthful 1 to SMF reporting fault information, self-healing action and self-healing result.
It in the embodiment of the present application, can be with when being sliced the network slice subnet example of example in network consisting and breaking down
It without manual intervention automatically switches on the network slice subnet example of redundancy, while ensureing linking up and one for service as far as possible
Cause property improves the reliability of network slice example entirety.Meanwhile the method for the embodiment of the present application can also be extensive when self-healing fails
The multiple modification that example is sliced to network enables operator to focus on original mistake.In addition, method provided by the embodiments of the present application
Reference can be provided for the automation O&M decision of network slice example by having recorded fault message, self-healing action and self-healing result,
Make that system is more intelligent, quickly handles same type of network failure.
It should be noted that the embodiment of the present application management network slice method can be adapted for network slice example by
Network be sliced subnet example constitute application scenarios, solve network slice subnet example occur can not self-healing failure when, may
A kind of self-healing mechanism for the network slice level taken.The invention relates to flow and method be also applied for network slice
Under the application scenarios that example is made of network function, solve network function occur can not self-healing failure when, may take one
The network function of failure is switched to the self-healing mechanism of redundant network function by kind, is switched to the self-healing mechanism of redundant network function
Process step in flow and step and the embodiment of the present application is similar, and network is sliced subnet in the interactive information of each intermodule
The information of example replaces with the information of corresponding network function.
It should be noted that the NSSI 1 used in the embodiment of the present application, NSSI 2, NSSI 3 and NSSMF 1,
Needs only for the purpose of illustration NSSMF2, NSSMF 3, the present processes do not limit fault network slice subnet example
There is the number of the network slice subnet example of interaction, network slice of redundancy in number and fault network slice subnet example
The number of net example.For example, a fault network slice subnet example may be needed by several redundant networks slice subnet reality
Example substitutes simultaneously.In addition, failure NSSI, redundancy NSSI, there are other interactive NSSI to be managed by different NSSMF,
It may simultaneously be managed by a NSSMF, the application is not construed as limiting this.
As a specific example, Fig. 7 shows showing for the method 700 of the management network slice example of the embodiment of the present application
Meaning property flow chart.Method 700 can be used in any network management framework in Fig. 1 to Fig. 4.Fig. 7, which is shown, to be automatically created
New NSSI is sliced management process with the network for replacing failure NSSI.Wherein, the first network equipment in method 500 may include
NS_SH_IF modules or NSMF modules, NSMF modules include NS_SH_MMF and NS_SH_IF modules.The second net in method 500
Network equipment may include that NSSMF2 modules, the third network equipment may include that NSSMF1 modules, the 4th network equipment may include
NSSMF3 modules.Wherein, the third network equipment to the 4th network equipment can be individual NSSMF modules respectively, can also be
The same NSSMF modules.
As shown in fig. 7, this method 700 includes:
S701, NS-SH-MMF configuration NS-SH-IF need the Self-healing Algorithm executed.Specifically, for creating new NSSI
Replace the self-healing mechanism of failure NSSI, the content of configuration includes the identity of NSI, and the fault restoration demand of the NSI can be created
Build new NSSI replace the NSSMF of failure NSSI identity and establishment feasibility, create new NSSI substitution failure NSSI
Triggering rule include event, fault type and condition etc..It should be noted that with the variation of network condition, such as network
The variation of resource service condition, NS-SH-MMF may update configurations of the NS-SH-IF to Self-healing Algorithm at any time.
S702, a NSSI for forming NSI break down, and influence the normal operation of network slice example.In the application reality
It applies in example, it is assumed that NSSI 1 breaks down, it is responsible for by NSSMF 1.NSSMF 1 generates network and is sliced subnet Instance failure
It alerts and NS-SH-MMF is reported to by interface 2.NS-SH-MMF receives the fault warning from NSSMF 1.In fault warning
It contains at least with the next item down content:The ID of fault warning ID, NSSI, the time that failure occurs, fault type, failure cause,
The source of trouble, failure seriousness, the influence that failure generates service, the repair mode etc. that can be taken.
S703, NS-SH-MMF meet self-healing trigger condition according to fault warning judgement, and self-healing triggering is sent to NS-SH-IF
Order.NS-SH-IF receives self-healing trigger command.
S704, NS-SH-IF collect the information of network of relation slice example and network slice subnet example, collect packet
It includes at least with the next item down content:A) NS-SH-IF by interface 2 to 1 sending performance measurement tasks of NSSMF, threshold measurement task,
NS-SH-IF receives the performance data and threshold measurement result that NSSMF 1 is reported by interface 2;B) NS-SH-IF to NSSI 1
There are the management work(of other interactive networks slice subnet example (the embodiment of the present application is assumed to be NSSI 3, is managed by NSSMF3)
Can, i.e., 3 sending performance measurement tasks of NSSMF, threshold measurement task, NS-SH-IF receive what NSSMF 3 was reported by interface 2
Performance data and threshold measurement result;C) NS-SH-IF finds the phase that can create new NSSI substitution failures NSSI according to self-healing configuration
Management module, the embodiment of the present application is answered to assume that it is NSSMF 3, NS-SH-IF is sent to NSSMF 3 by interface 2 and created newly
The feasibility inspection of NSSI is asked;D) when NS-SH-IF reads from NS Repository 1 normal operations of NSSI by interface 5
Configuration information, including SLA, position, interface message in the logical topology that network is sliced example;E) NS-SH-IF is by connecing
Mouth 2 obtains the information on services being currently running on NSSI 1, including user data, configuration etc. from NSSMF 1;F) NS-SH-IF is logical
The historical failure information that interface 5 reads NSSI 1 from NS Repository is crossed, the repair action taken is repaired as a result, reading
The fault message of subnet example is sliced with other networks of 1 same types of NSSI, the repair action taken repairs result etc..Foundation
The Self-healing Algorithm configured in the information and step S701 that are collected into, NS-SH-IF determine to create new NSSI substitution failures NSSI.
S705, optionally, NS-SH-IF are by interface 5 by the relevant configuration information of NSSI 1, logical topology position, user
Information on services etc. backs up to NS Repository, to be restored when fault self-recovery fails.
S706, NS-SH-IF are sent to NSSMF 2 by interface 2 and create NSSI requests.It at least needs to wrap in the request to create
It includes:The type of the NSSI newly created, including function, the SLA that need to meet, occupied Internet resources etc..NSSMF2 foundations connect
The request received creates NSSI 2.
S707, NS-SH-IF send the order of configuration NSSI 2 by interface 2 to NSSMF 2, and configuration message includes at least
Application parameter, the interface message etc. between position and other NSSI in network topology.It should be noted that matching herein
The configuration that content is set when may correctly be run with the NSSI 1 that NS-SH-IF in step S704 is collected is consistent, it is also possible to because of net
The realization that network is sliced subnet example is different and different.
If the state of S708, current NSSI 1 are state of activation, NS-SH-IF nullifies NSSI 1.Cancellation includes will
Status indications of the NSSI 1 in NSS Repository and/or NS Repository is to nullify state, and notice NSSMF 1 stops
The service run on NSSI 1.
S709, NS-SH-IF send the order of configuration NSSI 3 by interface 2 to NSSMF 3, by NSSI 3 and NSSI2 phases
Association, configuration message are included at least with the next item down content:Application parameter changes, the change in location in network topology and NSSI
Interface message etc. between 2.
S710, NS-SH-IF activate NSSI 2.Activation includes by NSSI 2 in NSS Repository and/or NS
Status indication in Repository is activated state, and notice NSSMF 2 starts what NSSI 2 and being loaded into was obtained in step S704
USI user service information on NSSI 1 is to restore business.
The information of S711, NS-SH-IF collection network slice example simultaneously assesses self-healing result.Collect information include at least with
The next item down content:NS-SH-IF issues the property for NSSI 2 and NSSI 3 by interface 2 respectively to NSSMF 2 and NSSMF 3
It can measure, threshold value monitor task, NSSMF 2 and the measurement of 3 execution performances of NSSMF, threshold value monitor task, and be reported by interface 2
To NS-SH-IF performance measurements and/or it is more than threshold alarm.
If S712, step S706 to step S710 have any one step fail or step S711 in NS-SH-IF be collected into
Information show that the NSSI newly created 2 can not replace 1 normal operations of NSSI of failure, then trigger restoring action.Specifically,
Network state before the self-healing action execution preserved in NS-SH-IF read steps S705 and configuration, reconfigure 3 Hes of NSSI according to this
NSSI 1, and activate NSSI 1.
S713, NS-SH-IF update the operating status that network in NS Repository is sliced example, topology by interface 5
The self-healing of information, configuration information etc., and recording step S706 to step S712 act, and record fault message and self-healing result.It needs
It is noted that even if above self-healing action, which fails, is repaired failure, restore service, also needs to record corresponding self-healing action, therefore
Hinder information and self-healing result.
The self-healing action and self-healing result that S714, NS-SH-IF are used to NS-SH-MMF reports.NS-SH-MMF is by connecing
Mouthful 1 to SMF reporting fault information, self-healing action and self-healing result.
It in the embodiment of the present application, can be with when being sliced the network slice subnet example of example in network consisting and breaking down
Without manual intervention automatically creating new network slice subnet example replaces fault network slice subnet example to restore to service,
The coherent and consistency for ensureing service as far as possible simultaneously, improves the reliability of network slice example entirety.Meanwhile the application is real
The modification that the method for applying example can also restore to be sliced network when self-healing fails example enables operator to focus on original mistake.
In addition, it can be that network slice is real that method provided by the embodiments of the present application, which has recorded fault message, self-healing action and self-healing result,
The automation O&M decision of example provides reference, makes that system is more intelligent, quickly handles same type of network failure.
It is answered by what network slice subnet example was constituted it should be noted that the embodiment of the present application is suitable for network slice example
With scene, solve network slice subnet example occur can not self-healing failure when, a kind of network slice level that may take
Self-healing mechanism.The invention relates to flow and method be also applied for the application that network slice example is made of network function
Under scene, solve network function occur can not self-healing failure when, the new network function of a kind of establishment that may take and replace therefore
The self-healing mechanism for hindering network function, creates the stream in the flow and step and the embodiment of the present application of the self-healing mechanism of new network function
Journey step is similar, and the information that network is sliced to subnet example in the interactive information of each intermodule replaces with corresponding network function
Information.
In addition, the NSSI 1 used in the embodiment of the present application, NSSI 2, NSSI 3 and NSSMF 1, NSSMF 2, NSSMF3
Needs only for the purpose of illustration, the present processes do not limit the number and fault network of fault network slice subnet example
Network is sliced the number that subnet example has the network slice subnet example of interaction, of the network slice subnet example newly created
Number.For example, a fault network slice subnet example may need to create several networks slice subnet example to substitute.This
Outside, failure NSSI, new NSSI, there are other interactive NSSI to be managed by different NSSMF, it is also possible to by a NSSMF
It manages simultaneously, the application is not construed as limiting this.
Fig. 8 is the schematic flow chart of the method 800 of the management network slice example of the embodiment of the present application.Method 800 can
To be suitable for network management framework shown in Fig. 1 to Fig. 4.First network equipment in Fig. 8 can be NS_SH_IF modules or
NSMF modules, NSMF modules include NS_SH_MMF and NS_SH_IF modules.Second network equipment can be NSSMF modules.Storage
Equipment can be NS Repository.For sake of simplicity, please referring to phase above with same or analogous content above in method 800
The content answered, details are not described herein again.
As shown in figure 8, method 800 includes:
S801, first network equipment determine that first network slice subnet example breaks down.
Above-mentioned first network equipment can be that the module of subnet example is sliced for managing and monitoring multiple networks.For example,
First network equipment can be NSMF modules.For example, above-mentioned first network equipment is somebody's turn to do for managing and monitoring network slice example
Network slice example includes the first network slice subnet example.
Optionally, first network equipment determines mode there are many first network slice subnet example failures.For example,
In a kind of mode, first network equipment can receive the fault alarm information of second network equipment, which is used for
Indicate that first network slice subnet example breaks down.In the second way, first network equipment can receive the 5th network
The triggering self-healing information of equipment, the triggering self-healing information can meet self-healing trigger condition in first network slice subnet example
In the case of send.Wherein, in the second way, which can be NS_SH_IF modules, the 5th net
Network equipment can be NS_SH_MMF modules.
S802, the first network equipment send the first instruction information, the first instruction information to second network equipment
It is used to indicate second network equipment and rollback processing is executed to first network slice subnet example.
Optionally, above-mentioned rollback processing, it can be understood as the configuration parameter that first network is sliced to subnet example is set again
The configuration parameter at a certain moment before being set to current time.The configuration parameter at a certain moment before the current time can be
History configures parameter.
In the embodiment of the present application, first network equipment is determining the case where first network slice subnet example breaks down
Under, it can indicate that second network equipment executes rollback processing to first network slice subnet example, so as to neatly
It manages network and is sliced example, improve the efficiency of management network slice example.
Optionally, method 800 further includes:The first network equipment obtains going through for the first network slice subnet example
History parameter information;The first network equipment is sliced the historical parameter information of subnet example based on the first network, determines institute
State the first instruction information.
As an example, the first network equipment can also obtain the network described in first network slice subnet example
It is sliced the historical parameter information of example.For example, historical parameter information may include network of relation slice example and network slice
The information of net example, including at least with the next item down content:
A) for NS-SH-IF by interface 2 to 1 sending performance measurement tasks of NSSMF, threshold measurement task, NS-SH-IF is logical
It crosses interface 2 and receives the performance data and threshold measurement result that NSSMF 1 is reported;
B) NS-SH-IF is sliced the management function of subnet example, i.e. NSSMF to other networks that there is interaction with NSSI 1
3 sending performance measurement tasks, threshold measurement task, NS-SH-IF receive the performance data and threshold that NSSMF 3 is reported by interface 2
It is worth measurement result;
C) NS-SH-IF finds the corresponding management module that can create new NSSI substitution failures NSSI, this Shen according to self-healing configuration
Please embodiment assume that it is NSSMF 3, NS-SH-IF sends the feasibility inspection for creating new NSSI by interface 2 to NSSMF 3
Request;
D) configuration information when NS-SH-IF reads from NS Repository 1 normal operations of NSSI by interface 5, packet
SLA is included, position, interface message in the logical topology that network is sliced example;
E) NS-SH-IF obtains the information on services being currently running on NSSI 1, including user by interface 2 from NSSMF 1
Data, configuration etc.;
F) NS-SH-IF reads the historical failure information of NSSI 1 by interface 5 from NS Repository, and that takes repaiies
Double action is made, and repairs as a result, reading the fault message with other networks of 1 same types of NSSI slice subnet example, the reparation taken
Result etc. is repaired in action.
Optionally, method 800 further includes:The first network equipment obtains first net from second network equipment
Network is sliced the historical parameter information of subnet example;The first network is sliced the history of subnet example by the first network equipment
Parameter information backs up to storage device;The first network equipment obtains the history parameters of the first network slice subnet example
Information, including:The first network equipment obtains the history ginseng that the first network is sliced subnet example from the storage device
Number information.
Optionally, method 800 further includes:In the first network equipment the first instruction information is sent to second network equipment
Before, the first network equipment obtains the parameter current information of the first network slice subnet example;The first network
The first network is sliced the parameter current information back-up of subnet example to storage device by equipment.
Optionally, method 800 further includes:In the performance for executing retract that treated the first network and being sliced subnet example
In the case of not meeting predetermined condition, the first network equipment sends the second instruction information, institute to second network equipment
It states the second instruction information and is used to indicate second network equipment based on the first network slice backed up in the storage device
The parameter current information of subnet example restores the first network slice subnet example.
Optionally, method 800 further includes:The first network equipment, which obtains, executes the first network that retracts that treated
It is sliced the performance information of subnet example, the performance information is used to indicate the performance of the first network slice subnet example;Institute
It states first network equipment and is based on the performance information, it is predetermined to determine whether the performance of the first network slice subnet example meets
Condition.
Optionally, method 800 further includes:The first network equipment receives fault alarm letter from second network equipment
Breath, the fault alarm information are used to indicate the first network slice subnet example and break down;The first network equipment
Determine that first network slice subnet example breaks down, including:The first network equipment is true according to the fault alarm information
The fixed first network is sliced subnet example.
As a specific example, Fig. 9 shows showing for the method 600 of the management network slice example of the embodiment of the present application
Meaning property flow chart.Method 900 can be used in any network management framework in Fig. 1 to Fig. 4.Fig. 9 is shown will be newly-built
The network that NSSI replaces the NSSI of failure is sliced management process.Wherein, the first network equipment in method 800 can be NS_
SH_IF modules or NSMF modules, NSMF modules include NS_SH_MMF and NS_SH_IF modules.Second network equipment can be
NSSMF modules.Storage device can be NS Repository.
As shown in figure 9, this method 900 includes:
S901, NS-SH-MMF configuration NS-SH-IF need the Self-healing Algorithm executed.Specifically, network is sliced real
The self-healing mechanism that example modification, configuration retract, the content of configuration includes the identity of NSI, and the fault restoration demand of the NSI is right
Network is sliced the information backups demands such as configuration, the state of example and network slice subnet example, such as the BACKUP TIME period, if
Former backup of covering etc., the triggering rule that network is sliced example modifications, configuration retracts includes event, fault type and condition etc..It needs
It is noted that NS-SH-MMF may update the configuration of the Self-healing Algorithm of NS-SH-IF at any time.
The Self-healing Algorithm of S902, NS-SH-IF according to configuration judges whether to need to create or update to be sliced example to network
Information backup.The condition for triggering backup may include time, event, the expected event etc. by generation.(event refers to network
It is sliced modification, configuration, the user behavior variation etc. of example.)
S903, NS-SH-IF determine the information back-up that example is sliced to network, and NSSI is obtained from NSSMF by interface 2
Information, these information may include the configuration of current NSSI, its position in network topology, it is between other NSSI
Interface message, SLA, performance data etc..Optionally, NS-SH-IF reads the letter of the NSSI preserved from NS Repository
Breath, and judge need which information updated.
S904, NS-SH-IF record in NS Repository by interface 5 and/or update each NSSI's of composition NSI
Information.
S905, a NSSI for forming NSI break down, and influence the normal operation of network slice example.In the application reality
It applies in example, it is assumed that NSSI 1 breaks down, it is responsible for by NSSMF 1.NSSMF 1 generates network and is sliced subnet Instance failure
It alerts and NS-SH-MMF is reported to by interface 2.NS-SH-MMF receives the fault warning from NSSMF 1.In fault warning
It contains at least with the next item down content:The ID of fault warning ID, NSSI, the time that failure occurs, fault type, failure cause,
The source of trouble, failure seriousness, the influence that failure generates service, the repair mode etc. that can be taken.
S906, NS-SH-MMF meet self-healing trigger condition according to fault warning judgement, and self-healing triggering is sent to NS-SH-IF
Order.NS-SH-IF receives self-healing trigger command.
S907, NS-SH-IF collect the information of network of relation slice example and network slice subnet example, collect packet
It includes at least with the next item down content:A) NS-SH-IF by interface 2 to 1 sending performance measurement tasks of NSSMF, threshold measurement task,
NS-SH-IF receives the performance data and threshold measurement result that NSSMF 1 is reported by interface 2;B) NS-SH-IF to NSSI 1
There are management function sending performance measurement task, threshold measurement task that other interactive networks are sliced subnet example, NS-SH-
IF receives the performance data reported and threshold measurement result by interface 2;C) NS-SH-IF by interface 5 from NS
Backup information when 1 normal operations of NSSI, including SLA are read in Repository, in the logical topology that network is sliced example
Position, interface message etc.;D) NS-SH-IF reads the historical failure letter of NSSI 1 by interface 5 from NS Repository
Breath, the repair action taken are repaired as a result, reading the failure letter with other networks of 1 same types of NSSI slice subnet example
Breath, the repair action taken repair result.According to the Self-healing Algorithm configured in the information and step S901 being collected into, NS-SH-
IF decisions take fallback action to NSSI 1 and determine that the backup information according to which time point executes rollback.
S908, optionally, NS-SH-IF are by interface 5 by the relevant configuration information of NSSI 1, logical topology position, user
Information on services etc. backs up to NS Repository, to be restored when fault self-recovery fails.
S909, NS-SH-IF send rollback order by interface 2 to NSSMF 1.According to the concrete condition of network failure, return
Moving back order may include:A) it nullifies and the NSSI 1 newly created that terminates, the order need to include the identity of NSSI 1;B) foundation
The NSSI configuration backup information that step 7) obtains, reconfigures NSSI 1;C) restore the modification to NSSI 1, including reduce extension
Capacity, extend the capacity of diminution, add the network function of deletion, delete newly-increased network function etc..When rollback order is wound
When building and activating the NSSI being terminated, which may not be to be sent to NSSMF 1, but other NSSMF, the order
It need to include the identity of NSSI, configuration information, SLA, interface message etc..In addition, when rollback order establishment is terminated
When NSSI, NS-SH-IF also needs to send configuration message to the manager for having other interactive NSSI with the NSSI.
S910, NSSMF 1 (or other NSSMF) have executed corresponding actions and to NS-SH-IF execution result backs.
The information of S911, NS-SH-IF collection network slice example simultaneously assesses self-healing result.Collect information include at least with
The next item down content:NS-SH-IF issues performance measurement, threshold value monitor task by interface 2 to NSSMF 1 and/or other NSSMF,
Corresponding NSSMF execution performances measure, threshold value monitor task, and by interface 2 be reported to NS-SH-IF performance measurements and/or
More than threshold alarm.
If the information that NS-SH-IF is collected into S912, retract failure or step S911 shows that failure is still after retracting
In the presence of and do not improve, then NS-SH-IF start restore fallback action caused by change.Specifically, NS-SH-IF read steps
The self-healing action preserved in S908 execute before network state and configuration, notify NSSMF 1 to reconfigure NSSI 1 and/or extensive according to this
The multiple modification to NSSI 1.
S913, NS-SH-IF update the operating status that network in NS Repository is sliced example, topology by interface 5
The self-healing of information, configuration information etc., and recording step S908 to step S912 act, and record fault message and self-healing result.It needs
It is noted that even if above self-healing action, which fails, is repaired failure, restore service, also needs to record corresponding self-healing action, therefore
Hinder information and self-healing result.
The self-healing action and self-healing result that S914, NS-SH-IF are used to NS-SH-MMF reports.NS-SH-MMF is by connecing
Mouthful 1 to SMF reporting fault information, self-healing action and self-healing result.
Method and the network management of the management network slice of the embodiment of the present application are described in detail above in association with Fig. 1 to Fig. 9
The network equipment of the embodiment of the present application is described in detail below in conjunction with Figure 10 to Figure 17 for framework.
Figure 10 is the schematic block diagram of the network equipment 1000 of the embodiment of the present application.It should be understood that the network equipment 1000 can
The each step executed by first network equipment in the method for Fig. 5 to Fig. 7 is executed, in order to avoid repeating, and will not be described here in detail.Net
Network equipment 1000 includes:Processing unit 1001 and communication unit 1002,
The processing unit 1001 is for determining that first network slice subnet example breaks down;Pass through the communication unit
1002 send the first instruction information to second network equipment, and the first instruction information is used to indicate second network equipment pair
The first network slice subnet example executes rollback processing.
Figure 11 is the schematic block diagram of the network equipment 1100 of the embodiment of the present application.It should be understood that the network equipment 1100 can
The each step executed by second network equipment in the method for Fig. 5 to Fig. 7 is executed, in order to avoid repeating, and will not be described here in detail.Net
Network equipment 1100 includes:Processing unit 1101 and communication unit 1102,
The processing unit 1101, which is used to receive the first instruction from first network equipment by the communication unit 1102, to be believed
Breath, the first instruction information are used to indicate second network equipment and activate the second network slice subnet example, wherein described
Second network slice subnet example is for replacing first network slice subnet example;Information is indicated according to described first, activates institute
State the second network slice subnet example.
Figure 12 is the schematic block diagram of the network equipment 1200 of the embodiment of the present application.It should be understood that the network equipment 1200 can
The each step executed by first network equipment in the method for Fig. 8 or Fig. 9 is executed, in order to avoid repeating, and will not be described here in detail.Net
Network equipment 1200 includes:Processing unit 1201 and communication unit 1202,
The processing unit 1201 is for determining that first network slice subnet example breaks down;Pass through the communication unit
1202 send the first instruction information to second network equipment, and the first instruction information is used to indicate second network equipment pair
The first network slice subnet example executes rollback processing.
Figure 13 is the schematic block diagram of the network equipment 1300 of the embodiment of the present application.It should be understood that the network equipment 1300 can
The each step executed by second network equipment in the method for Fig. 8 or Fig. 9 is executed, in order to avoid repeating, and will not be described here in detail.Net
Network equipment 1300 includes:Processing unit 1301 and communication unit 1302,
The processing unit 1301 is used to receive the first instruction information, institute from first network equipment by communication unit 1302
It states the first instruction information and is used to indicate second network equipment and the first network of failure slice subnet example is executed back
Move back processing;And indicate information according to described first, rollback processing is executed to first network slice subnet example.
Figure 14 is the schematic block diagram of the network equipment 1400 of the embodiment of the present application.It should be understood that the network equipment 1400 can
The each step executed by first network equipment in the method for Fig. 5 to Fig. 7 is executed, in order to avoid repeating, and will not be described here in detail.Net
Network equipment 1400 includes:
Memory 1410, for storing program;
Communication interface 1420, for being communicated with other equipment;
Processor 1430, for executing the program in memory 1410, when described program is performed, the processor
1430 for determining that first network slice subnet example breaks down;It is sent out to second network equipment by the communication interface 1420
The first instruction information, the first instruction information is sent to be used to indicate second network equipment and activate the second network slice subnet real
Example, wherein the second network slice subnet example is for replacing the first network slice subnet example.
Figure 15 is the schematic block diagram of the network equipment 1500 of the embodiment of the present application.It should be understood that the network equipment 1500 can
The each step executed by second network equipment in the method for Fig. 5 to Fig. 7 is executed, in order to avoid repeating, and will not be described here in detail.Net
Network equipment 1500 includes:
Memory 1510, for storing program;
Communication interface 1520, for being communicated with other equipment;
Processor 1530, for executing the program in memory 1510, when described program is performed, the processor
1530 from first network equipment by the communication interface 1520 for receiving the first instruction information, and the first instruction information is used
The second network is activated to be sliced subnet example in instruction second network equipment, wherein second network is sliced subnet example
It is sliced subnet example for replacing first network;Information is indicated according to described first, activates the second network slice subnet real
Example.
Figure 16 is the schematic block diagram of the network equipment 1600 of the embodiment of the present application.It should be understood that the network equipment 1600 can
The each step executed by first network equipment in the method for Fig. 8 or Fig. 9 is executed, in order to avoid repeating, and will not be described here in detail.Net
Network equipment 1600 includes:
Memory 1610, for storing program;
Communication interface 1620, for being communicated with other equipment;
Processor 1630, for executing the program in memory 1610, when described program is performed, the processor
1630 for determining that first network slice subnet example breaks down;It is sent out to second network equipment by the communication interface 1620
The first instruction information, the first instruction information is sent to be used to indicate second network equipment and be sliced subnet to the first network
Example executes rollback processing.
Figure 17 is the schematic block diagram of the network equipment 1700 of the embodiment of the present application.It should be understood that the network equipment 1700 can
The each step executed by second network equipment in the method for Fig. 8 or Fig. 9 is executed, in order to avoid repeating, and will not be described here in detail.Net
Network equipment 1700 includes:
Memory 1710, for storing program;
Communication interface 1720, for being communicated with other equipment;
Processor 1730, for executing the program in memory 1710, when described program is performed, the processor
1730 from first network equipment by the communication interface 1720 for receiving the first instruction information, and the first instruction information is used
Rollback processing is executed to the first network slice subnet example of failure in instruction second network equipment;And according to institute
The first instruction information is stated, rollback processing is executed to first network slice subnet example.
It in the embodiment of the present application, can be with when being sliced the network slice subnet example of example in network consisting and breaking down
Without manual intervention automatic rollback causes the configuration and modification of network slice Instance failure, repairs failure immediately, ensures service
Coherent and consistency, improve the reliability of network slice example entirety.Meanwhile the method for the embodiment of the present application can also be certainly
Restoring to be sliced network the modification of example when more failing enables operator to focus on original mistake.In addition, the embodiment of the present application
It can be the automation O&M decision that network is sliced example that the method for offer, which has recorded fault message, self-healing action and self-healing result,
Reference is provided, makes that system is more intelligent, quickly handles same type of network failure, also can avoid being sliced example to network in the future
Same configuration, modification are taken, same mistake is generated.
It is answered by what network slice subnet example was constituted it should be noted that the embodiment of the present application is suitable for network slice example
With scene, solve network slice subnet example occur can not self-healing failure when, a kind of network slice level that may take
Self-healing mechanism.The invention relates to flow and method be also applied for the application that network slice example is made of network function
Under scene, solve network function occur can not self-healing failure when, execute retract repair failure self-healing mechanism.Network function returns
Process step in the flow and step and the embodiment of the present application of the self-healing mechanism moved back is similar, in the interactive information of each intermodule
The information that network is sliced to subnet example replaces with the information of corresponding network function.
In addition, the needs NSSI 1 and NSSMF 1 that are used in the embodiment of the present application only for the purpose of illustration, the application
Method do not limit fault network slice subnet example number and need to retract network slice subnet example number.
Fig. 2 to Fig. 4 is shown when network slice subnet example nesting network is sliced subnet example, it is understood that there may be three kinds
Network management framework.The management network slice that the embodiment of the present application how is executed in these three network management frameworks is introduced below
The method of example.
For example, including 1 mould of 1 modules of NSS-SH-MMF and NSS-SH-IF in system shown in Fig. 2, in NSSMF 1
Block only includes 2 modules of NSS-SH-IF in NSSMF 2.During executing the method for management network slice example,
A) 2 moulds of NSS-SH-IF Self-healing Algorithm in the block, configuration, parameter etc. by NSS-SH-MMF 1 by interface 4 into
Row configuration, i.e. the transmitting terminal of step S601, S701 and S901 in method 600, method 700 and method 900 is NSS-SH-MMF
1, receiving terminal is NSS-SH-IF 2, and by interface 4, the content of configuration is the Self-healing Algorithm of NSSI 2;
B) NSSI 2 breaks down, and can fault warning NSS-SH- be transmitted to by interface 4 after generating fault warning
MMF1 corresponds to method 600, step S602, S702 of method 700, the step S905, NSSMF 2 in method 900 can be by event
Hinder alarm report to NSS-SH-MMF 1;
C) judge whether NSSI 2 meets fault self-recovery trigger condition by NSS-SH-MMF 1, and by interface 4 to NSS-
SH-IF 2 sends self-healing trigger request, i.e. corresponding method 600, step S603, S703 of method 700, the step in method 900
S906;
D after) NSS-SH-IF 2 executes self-healing action, self-healing result can be reported to NSS-SH-MMF 1 by interface 4,
Correspond to the step S613 of method 600, method 700, step S714, S914 of method 900;
E) finally, optionally, fault message and/or self-healing result are reported to NS-SH-MMF by NSS-SH-MMF 1.Such as
In system shown in Fig. 2, optionally, NS-SH-MMF can configure the upper of the self-healing result in NSS-SH-MMF 1 by interface 2
Report, self-healing trigger condition and/or its to NSS-SH-IF 1, self-healing configuration of NSS-SH-IF 2 etc..
For example, including in the system as shown in fig. 3, in NSSMF 11 mould of 1 modules of NSS-SH-MMF and NSS-SH-IF
Block includes 2 module of 2 modules of NSS-SH-MMF and NSS-SH-IF in NSSMF 2.In the side for executing management network slice example
During method,
A) 2 moulds of NSS-SH-IF Self-healing Algorithm in the block, configuration, parameter etc. are configured by NSS-SH-MMF 2, i.e.,
The transmitting terminal of step S601, S701 and S901 of method 600, method 700 and method 900 are NSS-SH-MMF 2, and receiving terminal is
NSS-SH-IF 2, the content of configuration are the Self-healing Algorithms of NSSI 2;
B) when the network function in NSSI 2 breaks down, NSS-SH-MMF 2 can be reported to by generating fault warning, i.e., by
NSS-SH-MMF 2 monitors the network failure in NSSI 2, corresponds to method 600, step S602, S702 of method 700, method
Step S905 in 900, it should be noted that the network function of composition NSSI 2 may directly be managed by NSSMF 2, it is also possible to
It is managed by NFM, the application is not construed as limiting this;
C) judge whether NSSI 2 meets fault self-recovery trigger condition by NSS-SH-MMF 2, and sent out to NSS-SH-IF 2
Send self-healing trigger request i.e. corresponding method 600, step S603, S703 of method 700, the step S906 in method 900;
D after) NSS-SH-IF 2 executes self-healing action, self-healing result can be reported to NSS-SH-MMF 2, that is, correspond to side
The step S613 of method 600, method 700, step S714, S914 of method 900;
E) finally, fault message and/or self-healing result are reported to NSSMF 1, optionally, NSSMF1 by NSS-SH-MMF 2
Fault message and/or self-healing result are reported to NSMF.In system as shown in Figure 10, optionally, NS-SH-MMF can pass through
The self-healing result that interface 2 configures in NSS-SH-MMF 1 reports, self-healing trigger condition and/or its to NSS-SH-IF 1, NSS-
Self-healing configuration of SH-MMF 2 etc..
For example, including 1 mould of 1 modules of NSS-SH-MMF and NSS-SH-IF in system shown in Fig. 4, in NSSMF 1
Block, includes 2 module of 2 modules of NSS-SH-MMF and NSS-SH-IF in NSSMF 2, exists between NSMF and NSSMF 2 and directly connects
Mouth 2.During the management network for executing the embodiment of the present application is sliced example,
A) 2 moulds of NSS-SH-IF Self-healing Algorithm in the block, configuration, parameter etc. are configured by NSS-SH-MMF 2, i.e.,
The transmitting terminal of step S601, S701 and S901 in method 600, method 700 and method 900 are NSS-SH-MMF2, and receiving terminal is
NSS-SH-IF 2, the content of configuration are the Self-healing Algorithms of NSSI 2;
B) when the network function in NSSI 2 breaks down, NSS-SH-MMF 2 can be reported to by generating fault warning, i.e., by
NSS-SH-MMF 2 monitors the network failure in NSSI 2, that is, corresponds to method 600, step S602, S702 of method 700, side
Step S905 in method 900, it should be noted that the network function of composition NSSI 2 may directly be managed by NSSMF 2, also may be used
It can be managed by NFM, the application is not construed as limiting this;
C) judge whether NSSI 2 meets fault self-recovery trigger condition by NSS-SH-MMF 2, and sent out to NSS-SH-IF 2
Send self-healing trigger request, i.e. corresponding method 600, step S603, S703 of method 700, the step S906 in method 900;
D after) NSS-SH-IF 2 executes self-healing action, self-healing result can be reported to NSS-SH-MMF 2, that is, corresponded to real
Correspond to the step S613 of method 600, method 700, step S714, S914 of method 900;
E) finally, optionally, fault message and/or self-healing result are reported to NSMF by NSS-SH-MMF 2, optionally,
Fault message and/or self-healing result can be also reported to NSSMF 1 by NSS-SH-MMF 2.It, can in system as shown in figure 11
Selection of land, NS-SH-MMF can configure the self-healing result in NSS-SH-MMF 2 by interface 2 and report, self-healing trigger condition and/or
Its self-healing configuration etc. to NSS-SH-MMF 2.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
Scope of the present application.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be the indirect coupling by some interfaces, device or unit
It closes or communicates to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the embodiment of the present application scheme
Purpose.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer read/write memory medium.Based on this understanding, the technical solution of the application is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be
People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of step.
And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM)), arbitrary access
The various media that can store program code such as memory (Random Access Memory, RAM), magnetic disc or CD.
The above, the only specific implementation mode of the application, but the protection domain of the application is not limited thereto, it is any
Those familiar with the art can easily think of the change or the replacement in the technical scope that the application discloses, and should all contain
It covers within the protection domain of the application.Therefore, the protection domain of the application should be based on the protection scope of the described claims.
Claims (18)
1. a kind of method of management network slice example, which is characterized in that including:
First network equipment determines that first network slice subnet example breaks down;
The first network equipment sends the first instruction information to second network equipment, and the first instruction information is used to indicate institute
It states second network equipment and activates the second network slice subnet example, wherein the second network slice subnet example is for replacing
The first network is sliced subnet example.
2. the method as described in claim 1, which is characterized in that the method further includes:The first network equipment is to third
The network equipment sends the second instruction information, and the second instruction information is used to indicate the third network equipment and nullifies described first
Network is sliced subnet example.
3. method as claimed in claim 1 or 2, which is characterized in that the method further includes:The first network equipment is to
Four network equipments send third and indicate information, and third instruction information is used to indicate the 4th network equipment and reconfigures and institute
State first network slice subnet example associated third network slice subnet example, it is described reconfigure after the third network
It is associated with second network slice subnet example to be sliced subnet example.
4. method as claimed any one in claims 1 to 3, which is characterized in that send the to second network equipment described
Before two instruction information, the method further includes:
The parameter information that the first network is sliced subnet example by the first network equipment backs up to storage device.
5. method as claimed in claim 4, which is characterized in that the method further includes:It is sliced subnet in second network
In the case that the performance of example does not meet predetermined condition, the first network equipment sends the 4th instruction letter to the third network equipment
Breath, the 4th instruction information are used to indicate the backup that the third network equipment is sliced subnet example based on the first network
To the parameter information in the storage device, the first network slice subnet example is restored.
6. method as claimed in claim 5, which is characterized in that the method further includes:The first network equipment obtains institute
The performance information of the second network slice subnet example is stated, the performance information is used to indicate the second network slice subnet example
Performance;
The first network equipment is based on the performance information, determines whether the performance of the second network slice subnet example accords with
Close predetermined condition.
7. such as method according to any one of claims 1 to 6, which is characterized in that the method further includes:The first network
Equipment receives fault alarm information from second network equipment, and the fault alarm information is used to indicate the first network and cuts
Piece subnet example breaks down;
The first network equipment determines that first network slice subnet example breaks down, including:
The first network equipment determines that the first network is sliced subnet example according to the fault alarm information.
8. a kind of method of management network slice example, which is characterized in that including:
Second network equipment receives the first instruction information from first network equipment, and the first instruction information is used to indicate described the
Two network equipments activate the second network to be sliced subnet example, wherein the second network slice subnet example is for replacing first
Network is sliced subnet example;
Second network equipment indicates information according to described first, and second network is activated to be sliced subnet example.
9. method as claimed in claim 8, which is characterized in that the method further includes:
Second network equipment sends fault alarm information to the first network equipment, and the fault alarm information is for referring to
Show that the first network slice subnet example breaks down.
10. a kind of network equipment, which is characterized in that the network equipment is first network equipment, including:
Communication interface,
Memory, for storing instruction,
Processor is respectively connected with the memory and the communication interface, the finger for executing the memory storage
It enables, to execute following steps when executing described instruction:
Determine that first network slice subnet example breaks down;
The first instruction information is sent to second network equipment by the communication interface, the first instruction information is used to indicate institute
It states second network equipment and activates the second network slice subnet example, wherein the second network slice subnet example is for replacing
The first network is sliced subnet example.
11. the network equipment as claimed in claim 10, which is characterized in that the processor is additionally operable to through the communication interface
The second instruction information is sent to the third network equipment, the second instruction information is used to indicate the third network equipment and nullifies institute
State first network slice subnet example.
12. the network equipment as described in claim 10 or 11, which is characterized in that the processor is additionally operable to through the communication
Interface sends third to the 4th network equipment and indicates that information, the third instruction information are used to indicate the 4th network equipment weight
Configuration and first network slice subnet example associated third network slice subnet example, it is described reconfigure after it is described
It is associated with second network slice subnet example that third network is sliced subnet example.
13. the network equipment as described in any one of claim 10 to 12, which is characterized in that the processor is additionally operable to:
Before the second instruction information to the transmission of second network equipment, the parameter information that the first network is sliced to subnet example is standby
Part to storage device.
14. the network equipment as claimed in claim 13, which is characterized in that the processor is additionally operable to:In second network
In the case that the performance of slice subnet example does not meet predetermined condition, the is sent to the third network equipment by the communication interface
Four instruction information, the 4th instruction information are used to indicate the third network equipment and are based on first network slice subnet reality
The parameter information of example backed up in the storage device restores the first network slice subnet example.
15. the network equipment as claimed in claim 14, which is characterized in that the processor is additionally operable to obtain second network
It is sliced the performance information of subnet example, the performance information is used to indicate the performance of the second network slice subnet example;Institute
It states first network equipment and is based on the performance information, it is predetermined to determine whether the performance of the second network slice subnet example meets
Condition.
16. the network equipment as described in any one of claim 10 to 15, which is characterized in that the processor is additionally operable to pass through
The communication interface receives fault alarm information from second network equipment, and the fault alarm information is used to indicate described the
One network is sliced subnet example and breaks down;Determine that first network slice subnet example breaks down in the first network equipment
Aspect, the processor are specifically used for determining that the first network is sliced subnet example according to the fault alarm information.
17. a kind of network equipment, which is characterized in that including:
Communication interface,
Memory, for storing instruction,
Processor is respectively connected with the memory and the communication interface, the finger for executing the memory storage
It enables, to execute following steps when executing described instruction:
The first instruction information is received from first network equipment by the communication interface, the first instruction information is used to indicate institute
It states second network equipment and activates the second network slice subnet example, wherein the second network slice subnet example is for replacing
First network is sliced subnet example;
Information is indicated according to described first, and second network is activated to be sliced subnet example.
18. the network equipment as claimed in claim 17, which is characterized in that the processor is additionally operable to through the communication interface
Fault alarm information is sent to the first network equipment, the fault alarm information is used to indicate first network slice
Net example breaks down.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710167783.6A CN108632065B (en) | 2017-03-20 | 2017-03-20 | Method, network device and system for managing network slice instances |
PCT/CN2018/078292 WO2018171430A1 (en) | 2017-03-20 | 2018-03-07 | Method and system for managing network slice instance, and network device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710167783.6A CN108632065B (en) | 2017-03-20 | 2017-03-20 | Method, network device and system for managing network slice instances |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108632065A true CN108632065A (en) | 2018-10-09 |
CN108632065B CN108632065B (en) | 2020-09-11 |
Family
ID=63585037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710167783.6A Active CN108632065B (en) | 2017-03-20 | 2017-03-20 | Method, network device and system for managing network slice instances |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108632065B (en) |
WO (1) | WO2018171430A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110602717A (en) * | 2019-09-18 | 2019-12-20 | 四川长虹电器股份有限公司 | Disaster recovery processing method for 5G network slice |
CN111526030A (en) * | 2019-02-03 | 2020-08-11 | 华为技术有限公司 | Information processing method and device |
CN112838942A (en) * | 2019-11-25 | 2021-05-25 | 中兴通讯股份有限公司 | Network operation and maintenance method, electronic equipment and storage medium |
CN113068227A (en) * | 2020-11-24 | 2021-07-02 | 锐捷网络股份有限公司 | Method and base station for switching slices in 5G network |
CN113993148A (en) * | 2020-07-10 | 2022-01-28 | ***通信集团浙江有限公司 | 5G network slice disaster tolerance switching method and device based on machine learning |
CN114143163A (en) * | 2020-08-14 | 2022-03-04 | ***通信集团浙江有限公司 | Slice false alarm identification method and device based on graph attention network |
WO2022063012A1 (en) * | 2020-09-27 | 2022-03-31 | 华为技术有限公司 | Communication method and communication apparatus |
CN115442216A (en) * | 2021-06-04 | 2022-12-06 | ***通信集团浙江有限公司 | Network slice fault self-healing method, device, equipment and computer program product |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11246088B2 (en) | 2020-04-10 | 2022-02-08 | Cisco Technology, Inc. | Failover and management of multi-vendor network slices |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105516312A (en) * | 2015-12-09 | 2016-04-20 | 重庆邮电大学 | Software defined networking load balancingdevice and method |
US20160353367A1 (en) * | 2015-06-01 | 2016-12-01 | Huawei Technologies Co., Ltd. | System and Method for Virtualized Functions in Control and Data Planes |
US20170070892A1 (en) * | 2015-09-07 | 2017-03-09 | Electronics And Telecommunications Research Institute | Mobile communication network system and method for composing network component configurations |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10212589B2 (en) * | 2015-06-02 | 2019-02-19 | Huawei Technologies Co., Ltd. | Method and apparatus to use infra-structure or network connectivity services provided by 3rd parties |
-
2017
- 2017-03-20 CN CN201710167783.6A patent/CN108632065B/en active Active
-
2018
- 2018-03-07 WO PCT/CN2018/078292 patent/WO2018171430A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160353367A1 (en) * | 2015-06-01 | 2016-12-01 | Huawei Technologies Co., Ltd. | System and Method for Virtualized Functions in Control and Data Planes |
US20170070892A1 (en) * | 2015-09-07 | 2017-03-09 | Electronics And Telecommunications Research Institute | Mobile communication network system and method for composing network component configurations |
CN105516312A (en) * | 2015-12-09 | 2016-04-20 | 重庆邮电大学 | Software defined networking load balancingdevice and method |
Non-Patent Citations (1)
Title |
---|
3GPP: "Technical Specification Group Services and System Aspects; Telecommunication management; Study on management and orchestration of network slicing for next generation network(Release 14)", 《3GPP TR 28.801 V0.5.0》 * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111526030A (en) * | 2019-02-03 | 2020-08-11 | 华为技术有限公司 | Information processing method and device |
CN111526030B (en) * | 2019-02-03 | 2021-12-14 | 华为技术有限公司 | Information processing method and device |
CN110602717A (en) * | 2019-09-18 | 2019-12-20 | 四川长虹电器股份有限公司 | Disaster recovery processing method for 5G network slice |
CN110602717B (en) * | 2019-09-18 | 2021-12-31 | 四川长虹电器股份有限公司 | Disaster recovery processing method for 5G network slice |
CN112838942A (en) * | 2019-11-25 | 2021-05-25 | 中兴通讯股份有限公司 | Network operation and maintenance method, electronic equipment and storage medium |
CN113993148B (en) * | 2020-07-10 | 2023-08-15 | ***通信集团浙江有限公司 | 5G network slice disaster recovery switching method and device based on machine learning |
CN113993148A (en) * | 2020-07-10 | 2022-01-28 | ***通信集团浙江有限公司 | 5G network slice disaster tolerance switching method and device based on machine learning |
CN114143163A (en) * | 2020-08-14 | 2022-03-04 | ***通信集团浙江有限公司 | Slice false alarm identification method and device based on graph attention network |
CN114143163B (en) * | 2020-08-14 | 2023-11-14 | ***通信集团浙江有限公司 | Slice false alarm identification method and device based on graph attention network |
WO2022063012A1 (en) * | 2020-09-27 | 2022-03-31 | 华为技术有限公司 | Communication method and communication apparatus |
CN113068227A (en) * | 2020-11-24 | 2021-07-02 | 锐捷网络股份有限公司 | Method and base station for switching slices in 5G network |
CN113068227B (en) * | 2020-11-24 | 2023-10-27 | 锐捷网络股份有限公司 | Method and base station for switching slices in 5G network |
CN115442216B (en) * | 2021-06-04 | 2023-09-05 | ***通信集团浙江有限公司 | Network slice fault self-healing method, device, equipment and computer storage medium |
CN115442216A (en) * | 2021-06-04 | 2022-12-06 | ***通信集团浙江有限公司 | Network slice fault self-healing method, device, equipment and computer program product |
Also Published As
Publication number | Publication date |
---|---|
WO2018171430A1 (en) | 2018-09-27 |
CN108632065B (en) | 2020-09-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108632065A (en) | Manage method, the network equipment and the system of network slice example | |
CN104243205B (en) | Message processing method and equipment when a kind of virtual switch failure | |
CN105187249B (en) | A kind of fault recovery method and device | |
CN109495312A (en) | The method and system of high-availability cluster based on arbitration disk and dual link | |
JP6117996B2 (en) | Virtual network mapping protection method, system, and computer storage medium | |
CN106331098A (en) | Server cluster system | |
CN105681077A (en) | Fault processing method, device and system | |
CN109104349A (en) | Train network data transmission method, system and its apparatus based on CANopen agreement | |
CN105165054A (en) | Method for processing network service faults, service management system and system management module | |
CN102355368B (en) | Fault processing method of network equipment and system | |
CN108259193A (en) | A kind of network management, Network Management System and Element management system | |
CN107659423A (en) | Method for processing business and device | |
CN108696392A (en) | A kind of communications status monitoring method, network node and computer readable storage medium | |
CN104023058B (en) | Method and system for managing and allocating storage resources | |
CN104639347A (en) | Multi-cluster monitoring method and device, and system | |
CN106021370A (en) | Memory database instance management method and device | |
CN108632063A (en) | Manage the methods, devices and systems of network slice example | |
CA2808239A1 (en) | Determining equivalent subsets of agents to gather information for a fabric | |
CN102833281A (en) | Method, device and system for realizing distributed automatically-increasing counting | |
CN109213507A (en) | A kind of upgrade method and server | |
CN107682411A (en) | A kind of extensive SDN controllers cluster and network system | |
CN107491371A (en) | A kind of method and device for monitoring deployment | |
CN106385330B (en) | A kind of implementation method and device of network function virtualization composer | |
CN105677451A (en) | Load balancing method and equipment used for multiple processes | |
CN105391601B (en) | A kind of performance test methods and system of Network Management Equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |