CN109768875A - Policy management method, device, equipment and the system of network slice - Google Patents

Policy management method, device, equipment and the system of network slice Download PDF

Info

Publication number
CN109768875A
CN109768875A CN201711106894.2A CN201711106894A CN109768875A CN 109768875 A CN109768875 A CN 109768875A CN 201711106894 A CN201711106894 A CN 201711106894A CN 109768875 A CN109768875 A CN 109768875A
Authority
CN
China
Prior art keywords
management
strategy
tactical
operation requests
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711106894.2A
Other languages
Chinese (zh)
Other versions
CN109768875B (en
Inventor
陆伟
冯珍妮
孙文琦
蒋若冰
杨水根
谭巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201711106894.2A priority Critical patent/CN109768875B/en
Publication of CN109768875A publication Critical patent/CN109768875A/en
Application granted granted Critical
Publication of CN109768875B publication Critical patent/CN109768875B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the present application discloses policy management method, device, equipment and the system of a kind of network slice.Wherein, the tactical management operation requests message for carrying the instruction information of instruction management object is received by the second management entity of the corresponding management object of management management strategy, and tactical management operation is carried out to indicated management object according to the request message, tactical management operation is the operation processing such as created, inquired to management strategy.Further, second management entity is handled overlapping existing for management strategy and/or conflict when executing management strategy.The technical solution can be applied to the tactical management that network is sliced in future communications network, to realize the effective management being sliced to network.

Description

Policy management method, device, equipment and the system of network slice
Technical field
This application involves the tactical managements that network in the network management of field of communication technology more particularly to communication system is sliced Technology.
Background technique
With the high speed development of mobile communication, digitlization transition almost relates to all traditional industries.But legacy cellular The network architecture can only provide unified network service, it is difficult to meet digitlization transition tide bring otherness and greatly communicate need It asks, including functional aberrancy, performance difference.In next-generation (5G) mobile network, network will be conceptualized as " network slice (Network Slice, referred to as NS) ", a network slice meet certain a kind of or a use-case connection communication demand for services, Entire 5G system is sliced by a large amount of networks for meeting different concatenation abilities and is formed.The unified network platform utilizes dynamic, safety Network slice support different function and service quality (Quality of Service, referred to as QoS) connection communication service, It is one of the basic capacity of 5G network.
For the operation of Logistics networks, network management technology is always people's technology of interest, equally, in network Slice Afterwards, network slice also needs to be managed, and is directed to be managed the management strategy that network is sliced.In Network Management System In, management strategy (or referred to as strategy) can be used for network management entity and determine the management instruction that need to specifically execute, it can also be used to net Network management entity carries out network automatically management.According to function division, policy management capability module can be divided into tactical management mould Block (also referred to as policy decision module) and policy enforcement module.Wherein policy management module is responsible for receiving strategy instruction and disappears Breath, the strategy that design, creation need to be implemented, the specific strategy information needed to be implemented is sent to policy enforcement module, to other plans Slightly management module sending strategy instruction message etc..Policy enforcement module is responsible for receiving the specific strategy sent from policy management module Information monitors network operating condition, executes corresponding strategy.In actual deployment, policy management module and policy enforcement module can To be deployed in identical network management entity, it can also be deployed in different network management entities and there are interfaces to carry out letter Breath interaction.But in the prior art, tactful management and instruction, are used in net belonging to policy management module or policy management module The all-network function (also referred to as network element) that network management module is managed, and network microtomy divides a physical network For several logical network, management object relevant to network slice, as network slice example, network slice subnet example and/ Or network function example etc. may be shared by different objects (e.g., business) simultaneously.Therefore, tactical management side in the prior art Method is not able to satisfy the different regulatory requirements and demand for services of heterogeneous networks slice, does not adapt to next generation mobile networks and flexibly manage The needs of reason.
Summary of the invention
The application provides policy management method, the apparatus and system of a kind of network slice, is sliced to realize to network The tactical management of relevant management object, and then effectively management is carried out to network slice.
In a first aspect, providing the policy management method and device of a kind of network slice.
In a kind of possible design, this method is applied to the second management that management is sliced relevant management object to network Physically, the tactical management of management object is realized.This method includes that the second management entity receives the plan that the first management entity is sent Slightly management operation request message, the tactical management operation requests message carry the finger of the corresponding management object of instruction management strategy Show information, the management object is related to network slice;Second management entity disappears according to the tactical management operation requests Breath is executed and is operated to the tactical management of the management object.It should be understood that the instruction information is used to indicate management strategy pair The management object answered may include the identity and/or class mark for managing object.Tactical management operation requests message include with At least one of lower operation requests: creative management strategy request, the request of modification management strategy, deletes pipe at searching and managing strategy request It manages strategy request, the request of activation management strategy and deactivates management strategy request, be the operation requests to strategy;Second pipe Manage entity can oneself implementation strategy management operation, the indirect implementation strategy management operation of other management entities can also be passed through
Wherein for different management objects, the second management entity/first management entity identity may be different, for example, If the management object relevant to network slice be network slice example (Network Slice Instance, referred to as NSI), then optionally, the second management entity is functional entity (e.g., the network slice management function (Network for managing NSI Slice Management Function, referred to as NSMF), relevant atomic management function or other), the first management entity is Network is sliced related object management function entity (e.g., the management function of the objects such as management business, management strategy, management network demand Can entity, relevant atomic management function or other, can be traffic guidance function (Communication Service Management Function, referred to as CSMF));If the management object relevant to network slice is network slice Net example (Network Slice Subnet Instance, referred to as NSSI), then optionally, the second management entity is pipe Manage functional entity (e.g., network slice subnet management function (the Network Slice Subnet Management of NSSI Function, referred to as NSSMF), relevant atomic management function or other), the first management entity be management NSSI composed by NSI functional entity (e.g., NSMF, relevant atomic management function or other);If the management pair relevant to network slice It likes network function example (Network Function Management Instance, referred to as NFI), then optionally, Second management entity is functional entity (e.g., network function management function (the Network Function for managing NFI Management Function, referred to as NFMF), relevant atomic management function or other), the first management entity be management NFI Composed NSSI/NSI functional entity (e.g., NSMF, NSSMF, relevant atomic management function or other).
It is furthermore appreciated that, the first management entity is before sending strategy management operation request message, according to need It asks, indicate etc. and determining and needing to operate the management that strategy is taken by the second management entity, e.g., construction strategy, is repaired deletion strategy Change strategy, activation strategy, deactivate strategy etc., optionally, strategy can also be designed.Second management entity is completed related After management operation, the Policy Status for managing object can be marked, feedback information can also be sent to the first management entity.
In this design, the instruction letter for carrying the corresponding management object of instruction management strategy is received by the second management entity The tactical management operation requests message of breath is realized the tactical management to relevant management object is sliced to network, is sliced to network Effective management is carried out.
Correspondingly, providing a kind of tactical management device of network slice, which may be implemented the correspondence in first aspect Policy management method.For example, the device limits in functional form, specific implementation form can be management equipment, Ke Yitong It crosses software, hardware or the corresponding software realization above method is executed by hardware.
In a kind of possible design, the apparatus may include processors and memory.The processor is configured as supporting The device executes corresponding function in above-mentioned first aspect method.For memory for coupling with processor, saving the device must The program (instruction) and data wanted.In addition the device can also include communication interface, for support the device and other network elements it Between communication.The communication interface can be transceiver.
In a kind of possible design, the apparatus may include Transmit-Receive Units, wherein Transmit-Receive Unit, for receiving first The tactical management operation requests message that management entity is sent;The device can also include processing unit, which is used for root According to the tactical management operation requests message, executes and the tactical management of the management object is operated.
Second aspect provides the policy management method and device of a kind of network slice.
In a kind of possible design, this method is applied on the first management entity of management network slice related object, By the interaction of itself and the second management entity of management management object, the tactical management of network slice is realized.This method includes the One management entity is carried to the second management entity sending strategy management operation request message, the tactical management operation requests message Indicate the instruction information of the corresponding management object of management strategy, the management object is related to network slice;Wherein, the strategy Management operation request message is executed for second management entity according to the tactical management operation requests message to described Manage the tactical management operation of object.It should be understood that the instruction information is used to indicate the corresponding management object of management strategy, It may include the identity and/or class mark for managing object.Tactical management operation requests message includes at least one of following behaviour Request: creative management strategy request, the request of modification management strategy, deletes management strategy request, swashs at searching and managing strategy request Management strategy request and deactivation management strategy request living, is the operation requests to strategy;Second management entity oneself can be held Row tactical management operation can also be operated by the indirect implementation strategy management of other management entities.
Wherein for different management objects, the second management entity/first management entity identity may be different, for example, If the management object relevant to network slice is NSI, optionally, the second management entity is the function of managing NSI Entity (e.g., NSMF, relevant atomic management function or other), the first management entity is that network slice related object management function is real Body (e.g., management business, management strategy, the management function entity of the management objects such as network demand, relevant atomic management function or its He, can be CSMF);If the management object relevant to network slice is NSSI, optionally, the second management entity Be manage NSSI functional entity (e.g., NSSMF, relevant atomic management function or other), the first management entity be management NSSI Composed NSI functional entity (e.g., NSMF, relevant atomic management function or other);If institute relevant to network slice Stating management object is NFI, then optionally, the second management entity is functional entity (e.g., the NFMF, relevant atomic pipe for managing NFI Manage function or other), the first management entity be manage NFI composed by NSSI/NSI functional entity (e.g., NSMF, NSSMF, Relevant atomic management function or other).
It is furthermore appreciated that, the first management entity is before sending strategy management operation request message, according to need Asking, indicate etc. and determining needs the tactical management taken by the second management entity management object to operate, and e.g., construction strategy is deleted Except strategy, modification strategy, activation strategy, deactivation strategy etc., optionally, strategy can also be designed.It is further optional , the first management entity, which can receive, completes the feedback information sent after related management operation in the second management entity.
In this design, it is sent by the first management entity to the second management entity of management management object and carries instruction pipe The tactical management operation requests message of the instruction information of the corresponding management object of reason strategy, is realized to pipe relevant to network slice The tactical management for managing object has carried out effective management to network slice.
Correspondingly, providing a kind of tactical management device of network slice, which may be implemented the correspondence in second aspect Policy management method.For example, the device limits in functional form, specific implementation form can be management equipment, Ke Yitong It crosses software, hardware or the corresponding software realization above method is executed by hardware.
In a kind of possible design, the apparatus may include processors and memory.The processor is configured as supporting The device executes corresponding function in above-mentioned second aspect method.For memory for coupling with processor, saving the device must The program (instruction) and data wanted.In addition the device can also include communication interface, for support the device and other network elements it Between communication.The communication interface can be transceiver.
In a kind of possible design, the apparatus may include Transmit-Receive Units, wherein Transmit-Receive Unit, for being managed to second Manage entity sending strategy management operation request message;The device can also include processing unit, and the processing unit is for receiving and dispatching Before unit sending strategy management operation request message, determines and the strategy taken by the second management entity management object is needed to manage Reason operation.
The third aspect provides the policy management method and system of a kind of network slice.
In a kind of possible design, this method is applied in Network Management System, realizes to relevant to network slice Manage the tactical management of object.The management system includes the first management entity and the second management entity, and this method includes the first pipe Entity is managed to the second management entity sending strategy management operation request message, the tactical management operation requests message carries instruction The instruction information of the corresponding management object of management strategy, the management object are related to network slice;Second management entity receives The tactical management operation requests message, and it is based on the request message, it executes and the tactical management of the management object is operated. It should be understood that the instruction information is used to indicate the corresponding management object of management strategy, it may include the identity for managing object Mark and/or class mark.Tactical management operation requests message includes at least one of following operation requests: creative management strategy is asked It asks, searching and managing strategy request, the request of modification management strategy, delete management strategy request, the request of activation management strategy and go Management strategy request is activated, is the operation requests to strategy;Second management entity can oneself implementation strategy management operation, can also be with Pass through the indirect implementation strategy management operation of other management entities.
Wherein for different management objects, the second management entity/first management entity identity may be different, for example, If the management object relevant to network slice is NSI, optionally, the second management entity is the function of managing NSI Entity (e.g., NSMF, relevant atomic management function or other), the first management entity is that network slice related object management function is real Body (e.g., management business, management strategy, the management function entity of the management objects such as network demand, relevant atomic management function or its He, can be CSMF);If the management object relevant to network slice is NSSI, optionally, the second management entity Be manage NSSI functional entity (e.g., NSSMF, relevant atomic management function or other), the first management entity be management NSSI Composed NSI functional entity (e.g., NSMF, relevant atomic management function or other);If institute relevant to network slice Stating management object is NFI, then optionally, the second management entity is functional entity (e.g., the NFMF, relevant atomic pipe for managing NFI Manage function or other), the first management entity be manage NFI composed by NSSI/NSI functional entity (e.g., NSMF, NSSMF, Relevant atomic management function or other).
It is furthermore appreciated that, the first management entity is before sending strategy management operation request message, according to need It asks, indicate etc. and determining and needing to operate the management that strategy is taken by the second management entity, e.g., construction strategy, is repaired deletion strategy Change strategy, activation strategy, deactivate strategy etc., optionally, strategy can also be designed.Second management entity is completed related After management operation, the Policy Status for managing object can be marked, feedback information can also be sent to the first management entity.
In this design, the carrying that the first management entity is sent is received by the second management entity and indicates that management strategy is corresponding Management object instruction information tactical management operation requests message, realize to network be sliced it is relevant manage object plan It slightly manages, effective management has been carried out to network slice.
Correspondingly, providing a kind of system of network management, which includes the first management entity and the second management entity, respectively Management entity includes corresponding managing device, and the corresponding management method in the third aspect may be implemented.For example, each device is with function Energy form limits, and specific implementation form can be management equipment, can execute phase by software, hardware or by hardware The software realization above method answered.
In a kind of possible design, each device may include processor and memory.The processor is configured as supporting The device executes corresponding function in above-mentioned third aspect method.For memory for coupling with processor, saving the device must The program (instruction) and data wanted.In addition each device can also include communication interface, for support the device and other network elements it Between communication.The communication interface can be transceiver.
In a kind of possible design, the device of corresponding first management entity may include Transmit-Receive Unit, wherein transmitting-receiving is single Member is used for the second management entity sending strategy management operation request message;Optionally, which can also include that processing is single Member, the processing unit are used for before Transmit-Receive Unit sending strategy management operation request message, are determined and are needed through the second management in fact The tactical management that body takes management object operates.The device of corresponding second management entity may include Transmit-Receive Unit, wherein receive Bill member, for receiving the tactical management operation requests message of the first management entity transmission;The device can also include that processing is single Member, which, which is used to be executed according to the tactical management operation requests message, grasps the tactical management of the management object Make.
Fourth aspect provides the policy management method and device of a kind of network slice.
In a kind of possible design, this method is applied to the second management that management is sliced relevant management object to network Physically, tactful overlap processing of especially the second management entity in test and management strategy and/or execution management strategy, is realized Tactical management to network slice.This method includes when the second management entity test and management strategy and/or executing management strategy When, if the execution condition of at least two management strategies meets simultaneously, and management strategy execution movement and/or performance objective are mutually overlapped Folded, then the second management entity executes a wherein management strategy, and pause executes other overlay strategies;Described movement is executed when determining The policy goals of other overlay strategies have met after the completion, and the overlay strategy that the second management entity executes the pause can not With;The policy goals of other overlay strategies do not meet after the completion of determining the execution movement, and the second management entity executes temporary Stop the overlay strategy executed.Wherein, management strategy is to manage the management strategy of object.It should be understood that in order to avoid band After being executed come the expense repeated and some processing can not/execution the operation of NSI (e.g., terminate) need not be repeated, really Whether the overlay strategy that fixed pause executes unavailable/it executes, it can be directly determined by the second management entity, and it can also be through the second management Entity reports other management entities (such as the first management entity), is determined indirectly according to the instruction of other management entities.Optionally, on It states after keeping the overlay strategy of the pause execution unavailable, the second management entity is unavailable to the first management entity reporting policy Event;According to the instruction of the first management entity, modifies the not available management strategy or make the not available management strategy It can use.Further alternative, the overlay strategy for executing the pause is unavailable, including the operation such as deletes, deactivates, and makes to be overlapped Strategy is unavailable.
In this design, by the tactful overlap processing of the second management entity of management management object, it is dynamic to avoid repetition Make bring expense, realizes the tactical management to network slice.
Correspondingly, providing a kind of device of network slice management, which may be implemented the corresponding pipe in fourth aspect Reason method.For example, the device limits in functional form, specific implementation form can be management equipment, can be by software, hard Part or the corresponding software realization above method is executed by hardware.
In a kind of possible design, the apparatus may include processors and memory.The processor is configured as supporting The device executes corresponding function in above-mentioned fourth aspect method.For memory for coupling with processor, saving the device must The program (instruction) and data wanted.In addition the device can also include communication interface, for support the device and other network elements it Between communication.The communication interface can be transceiver.
In a kind of possible design, which includes processing unit, wherein processing unit, for executing above-mentioned strategy Overlapping determination and overlap processing;Optionally, which can also include Transmit-Receive Unit, which is used for real with other management Body interaction obtains the related instruction of overlap processing.
5th aspect provides the policy management method and device of a kind of network slice.
In a kind of possible design, this method is applied to the second management that management is sliced relevant management object to network Physically, policy conflict processing of especially the second management entity in test and management strategy and/or execution management strategy, is realized Tactical management to network slice.This method includes when the second management entity test and management strategy and/or executing management strategy When, if the execution condition of at least two management strategies meets simultaneously, and management strategy execution movement and/or performance objective mutually conflict When, then the second management entity is to the first management entity reporting policy conflict notification message, wherein the policy conflict notification message The middle identity for carrying the management object, and the pipe for the management object returned according to first management entity Reason instruction carries out clash handle to the management strategy of the management object;Alternatively, the second management entity is according to the excellent of strategy execution First grade parameter, the management strategy that determination need to execute.It should be understood that when the second management entity determines policy conflict, Ke Yitong It crosses and the first management entity is reported to carry out clash handle according to the instruction of feedback, can also directly pass through relevant parameter, determination need to be held Capable management strategy.Clash handle to management strategy may include deactivation to management strategy, the operation such as be deleted or modified. The management strategy that determination need to execute further includes keeping its unavailable the management strategy of other conflicts or pause execution, here to other The processing of the management strategy of conflict can be directly determined by the second management entity, can also be according to other management entities (such as first Management entity) instruction.Optionally, the second management entity completes clash handle or the above-mentioned management to other conflicts according to instruction After the processing that unavailable/pause of strategy executes, processing result can be reported to the first management entity.
In this design, it is handled by the policy conflict of the second management entity of management management object, avoids conflict band The processing problem come realizes the tactical management to network slice.
Correspondingly, providing a kind of device of network slice management, which may be implemented the corresponding pipe in the 5th aspect Reason method.For example, the device limits in functional form, specific implementation form can be management equipment, can be by software, hard Part or the corresponding software realization above method is executed by hardware.
In a kind of possible design, the apparatus may include processors and memory.The processor is configured as supporting The device executes corresponding function in above-mentioned 5th aspect method.For memory for coupling with processor, saving the device must The program (instruction) and data wanted.In addition the device can also include communication interface, for support the device and other network elements it Between communication.The communication interface can be transceiver.
In a kind of possible design, which includes processing unit, wherein processing unit, for executing above-mentioned strategy Conflict determination and clash handle;Optionally, which can also include Transmit-Receive Unit, which is used for real with other management Body interaction obtains the related instruction of clash handle.
It should be noted that first aspect to the third aspect technical solution and fourth aspect to the 5th aspect technical side Case, is the design for the different level of tactical management, and the technical solution of first aspect to the third aspect stresses in tactical management In to the operating aspect of strategy, for example, construction strategy, deletion strategy, modification strategy, activation/deactivation strategy etc.;And the 4th to In terms of processing when the technical solution of 5th aspect stresses in tactical management to strategy execution, for example, in tactful specific execution In the process, for the processing carried out the case where being overlapped or conflict there are strategy execution movement and/or performance objective.It is understood that , based on any technical solution that first aspect to the third aspect provides, in a kind of possible design, in strategy execution When, any technical solution that first aspect to the third aspect provides may include any skill that the 4th to the 5th aspect provides Art scheme.
Any technical solution provided based on first aspect, second aspect or the third aspect:
In a kind of possible design, the tactical management operation requests message includes creative management strategy request, then institute State tactical management operation requests message and also carry at least one of following information: tactful type, management the additional of object are retouched State, the execution condition of strategy, the execution movement of strategy, the target of strategy execution, the description of tactful principle and strategy execution it is excellent First grade parameter.
In a kind of possible design, the tactical management operation requests message includes searching and managing strategy request, then institute It states tactical management operation requests message and also carries policy lookup conditional information and/or tactful identification information;Wherein, policy lookup item Part information may include at least one of following information: the additional description condition of tactful type, policy lookup, tactful execution item The priority parameters of part and strategy execution.
In a kind of possible design, the tactical management operation requests message includes modification management strategy request, then institute The instruction information for stating the corresponding management object of instruction management strategy includes that the management object that strategy is applicable after modifying preceding or modification refers to Show that information, the tactical management operation requests message also carry tactful identification information and/or strategy modification content;Wherein, tactful Modification content includes at least one of following information: tactful after the additional description, modification of the applicable management object of strategy after modification After execution condition, modification it is tactful it is specific execute after movement, modification tactful principle description after the target of strategy execution, modification, with And modification after strategy execution priority parameters.
In a kind of possible design, the tactical management operation requests message includes deleting management strategy request, then institute It states tactical management operation requests message and also carries tactful identification information.
In a kind of possible design, the tactical management operation requests message includes activation management strategy request, then institute It states tactical management operation requests message and also carries at least one of following information: the activation condition of strategy mark and/or strategy.
In a kind of possible design, the tactical management operation requests message includes deactivating management strategy request, then The tactical management operation requests message also carries at least one of following information: the deactivation condition of strategy mark and/or strategy.
Present invention also provides a kind of computer storage mediums, computer program (instruction) are stored thereon, when the program When (instruction) is run on computers, so that computer executes method described in any of the above-described aspect.
Present invention also provides a kind of computer program products, when run on a computer, so that computer executes Method described in any of the above-described aspect.
Present invention also provides a kind of chips, wherein instruction is stored with, when it runs in management equipment, so that management Equipment executes corresponding method described in above-mentioned various aspects.
Present invention also provides a kind of policy management apparatus of network slice, including memory, processor and are stored in On reservoir and the computer program that can run on a processor, the processor are realized above-mentioned each when executing the computer program Corresponding method described in aspect.
Present invention also provides a kind of policy management system of network slice, the management including interacting between each other is real Body, each management entity realize corresponding method described in above-mentioned various aspects.
It is to be appreciated that any device, computer storage medium, computer program product, chip, the pipe of above-mentioned offer Reason equipment or management system are used to realize corresponding method presented above, and therefore, the attainable beneficial effect of institute can With reference to the beneficial effect in corresponding method, details are not described herein again.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, institute in being described below to the embodiment of the present application Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the application Example, for those of ordinary skill in the art, without creative efforts, can also implement according to the application The content of example and these attached drawings obtain other attached drawings.
Fig. 1 a is the bright Network Management System framework being related to of the application;
Fig. 1 b is the relation schematic diagram of network management system and network infrastructure in network slice management;
Fig. 2 a is the position view of NE Explorer in traditional network management system;
Fig. 2 b is the network function management function entity in future communications network to the network equipment and/or network function management Possibility implementation position view;
Fig. 3 a is a kind of flow chart of one embodiment of the policy management method of network slice provided by the present application;
Fig. 3 b is a kind of flow chart of second embodiment of the policy management method of network slice provided by the present application;
Fig. 4 is a kind of flow chart of the third embodiment of the policy management method of network slice provided by the present application;
Fig. 5 is a kind of flow chart of the 4th embodiment of the policy management method of network slice provided by the present application;
Fig. 6 is a kind of flow chart of the 5th embodiment of the policy management method of network slice provided by the present application;
Fig. 7 is a kind of flow chart of the 6th embodiment of the policy management method of network slice provided by the present application;
Fig. 8 is a kind of flow chart of the 7th embodiment of the policy management method of network slice provided by the present application;
Fig. 9 is a kind of flow chart of the 8th embodiment of the policy management method of network slice provided by the present application;
Figure 10 is a kind of flow chart of the 9th embodiment of the policy management method of network slice provided by the present application;
Figure 11 is a kind of management equipment structural schematic diagram of simplification provided by the present application;
Figure 12 is a kind of structural block diagram of the tactical management device of network slice provided by the present application.
Specific embodiment
The technical issues of to solve the application, the technical solution of use and the technical effect that reaches are clearer, below It will be described in further detail in the form of embodiment in conjunction with technical solution of the attached drawing to the application.The detailed description is logical It crosses and proposes the various embodiments of equipment and/or process using block diagram, flow chart and/or example.Due to these block diagrams, stream Journey figure and/or example include one or more functions and/or operation, so it will be appreciated by those skilled in the art that can pass through many Hardware, software, firmware or their any combination are every individually and/or in common implementing these block diagrams, flow chart or example A function and/or operation.
" multiple " refer to two or more in the application.Term "and/or" in the application, only a kind of description The incidence relation of affiliated partner indicates may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A, simultaneously There are A and B, these three situations of individualism B.In addition, character "/" herein, it is a kind of for typicallying represent forward-backward correlation object The relationship of "or".Term " first ", " second ", " third ", " the 4th " in the application etc. be in order to distinguish different objects, and The sequence of the difference object is not limited.
In the application, network slice (Network Slice, referred to as NS): refer in network foundation physically or a virtually On facility, logical network customized according to different demands for services, different.It includes end that network slice, which can be one, End, the complete end to end network for accessing net, transmission network, core net and application server, are capable of providing complete telecommunications service, With certain network capabilities;Network slice is also possible to above-mentioned terminal, access net, transmission network, core net and application server Any combination.Network slice may have following one or more characteristics: access net may be sliced, it is also possible to be not sliced.Access Net may be that multiple network slices share.The characteristic of different network slices and the network function for forming them may be different Sample.
Network is sliced example (Network Slice Instance, abbreviation NSI): being the Logic Networks really run Network is able to satisfy certain network characteristic or demand for services.One network slice example may provide one or more services.Network is cut Piece example can be created by network management system, and a network management system may create multiple network slice examples and carry out simultaneously to them Management, including performance monitoring and the fault management etc. being sliced in network in example operational process.When multiple networks slice example is total When depositing, partial network resource and network function may be shared between network slice example.Network slice example may be cut from network Piece template creation, it is also possible to not from network slice template creation.One complete network slice example is to be capable of providing completely Network service end to end, and the network that can be of network consisting slice example is sliced subnet example and/or network function reality Example (Network Function Instance, referred to as NFI).Network function may include physical network function and/or virtual Network function.Hereinafter referred to as physical network function and/or virtual network function are network function.
Network is sliced subnet example (Network Slice Subnet Instance, abbreviation NSSI): network is sliced subnet Example can not need to provide complete network service end to end, and network slice subnet example can be in network slice example The network function example of the same equipment vendor forms set, it is also possible to by the set for the network function example that domain divides, such as Core net network is sliced subnet example, access net network is sliced subnet example, or forms set by other modes such as deployed positions. Network slice subnet example may be sliced example by multiple networks and share.It proposes that network is sliced subnet example, can be convenient network management System administration.One network slice example may be sliced subnet example by several networks and form, and each network is sliced subnet example (nested network is properly termed as and is sliced subnet example) group by several network function examples and/or several networks slice subnet example At;One network slice example may be sliced subnet example by several networks and be not divided into network slice subnet example Network function example composition;One network slice example may also be made of several network function examples.
Network function (Network Function, abbreviation NF): it is one of network processing function, defines functionality Behavior and interface, network function can be realized by specialized hardware, can also by specialized hardware runs software realize, It can also be realized in the form of virtual functions on general hardware platform.It therefore, can be by network function from the angle of realization It is divided into physical network function and virtual network function.And from the angle used, network function can be divided into privately-owned network function and Specifically for multiple (son) networks are sliced example, different network functions can be used independently in shared network function Example, this network function example are known as privately-owned network function example, can also share the same network function example, this net Network function example is known as shared network function example.
According to the application, network slice management belongs to the network management technology of future communications network (e.g., 5G network), passes through All kinds of Network Management Equipments in the following network management system are managed.Future communications network support network slice, management system is correspondingly Network slice can be managed, moreover it is possible to manage the network equipment, the network function of 5G.Fig. 1 a gives the bright network pipe being related to of the application System architecture is managed, the framework is for the difference of management object, and by function division network management module, these network management modules may be distributed On different devices, it is also possible to be fully integrated or be partially integrated in identical equipment, it will be understood that the framework should not be understood For the limitation to technical scheme.As shown in Figure 1a, which contains a few class functional entitys: network slice is related Object Management group functional entity is (for example, it may be traffic guidance functional entity, network strategy management function entity, network need Ask management function entity or other management function entities), network slice management function (Network Slice Management Function, referred to as NSMF) entity, network slice subnet management function (Network Slice Subnet Management Function, referred to as NSSMF) entity, network function management (Network Function Management Function, Referred to as NFMF) entity.How corresponding with existing network management system these functional entitys are or in 5G network management system in the application In be located at which type of position, without limitation.It is realized in various embodiments described below by functional entity each in the system Method realizes the management of network slice.
Wherein, traffic guidance function (Communication Service Management Function, abbreviation It is mainly responsible for convert the communication service demand of operator and/or third party client to for CSMF) entity and gateway/network is sliced Demand;Network strategy management function entity is mainly responsible for the management of corresponding strategies in network, can be and is sliced to specific network The regulatory requirement of corresponding strategies can be switched to the demand being sliced to gateway/network by the management of corresponding strategies;Network demand manages function The demand that energy entity is mainly responsible for gateway/network slice is managed, and has related needs thereon.
The network slice related object management function entity can pass through the interface between NSMF and send to NSMF to net The demand (such as create, terminate, modification network is sliced example request) of network slice.Optionally, the network is sliced related object Management function entity can obtain the management data (such as performance, fault data) that network is sliced from NSMF, and generation runs on net Network is sliced the management data of the communication service on example, also can receive operator and/or third party client and is sliced to network Manage data and/or the subscription demand of management data of communication service etc..The network is sliced related object management function entity It may belong to operator, operator can also be not belonging to.Optionally, in one possible implementation, network slice is related Object Management group functional entity is the logic administrative unit being composed of several atom management functions, the atomic function include but It is not limited to Service Instance (service instance) life cycle management unit, Service Instance capability management unit, service is in fact Example fault manage-ment cells, Service Instance test and management unit, Service Instance Data analysis and reporting unit, network management data are ordered Read unit, demand for services negotiation element, Charging Detail Record unit, policy management element etc..In this kind of implementation, the network consisting The management function of itself is supplied to acquisition by the atom management function of slice related object management function in a manner of service respectively The user (authorized consumer) of authorization, the user for obtaining authorization may be the atom pipe for forming NSMF Manage the atom management function of function and/or composition NSSMF and/or the atom management function of composition NFMF.
NSMF is mainly responsible for the network slice demand that network slice related object management function entity is sent that receives, to network Life cycle, performance, the failure etc. of slice example are managed and (below referred to as manage life cycle, performance, fault management), Layout network is sliced the composition of example, and the demand that decomposition network is sliced example is that each network is sliced subnet example and/or network function The demand of energy example sends network slice subnet instance management request to each NSSMF.In one possible implementation, NSMF is the logic administrative unit being composed of several atomic function, and the atomic function includes but is not limited to NSI Life Cycle Period management unit, NSI capability management unit, NSI fault manage-ment cells, NSI test and management unit, NSI data are analyzed and are reported Unit, network management data subscriber units are sliced requirement negotiation unit, Charging Detail Record unit, policy management element etc..It is realized in this kind In mode, the management function of itself is supplied in a manner of service by the atom management function of the composition NSMF respectively is awarded The user of power, the user for obtaining authorization may be the atom management function of network consisting slice related object management function It can and/or form the atom management function of NSSMF and/or the atom management function of composition NFMF.
NSSMF is mainly responsible for the network slice subnet demand that NSMF is sent that receives, and carries out pipe to network slice subnet example Reason, layout network be sliced subnet example composition, decomposition network be sliced subnet example demand be each network function example and/or Nested networks are sliced the demand of subnet example, and nested networks slice subnet instance management request may be sent to other NSSMF.? In a kind of possible implementation, NSSMF is the logic administrative unit being composed of several atomic function, the atomic function Including but not limited to NSSI life cycle management unit, NSSI capability management unit, NSSI fault manage-ment cells, NSSI testing tube Unit is managed, the analysis of NSSI data and reporting unit, network management data subscriber units are sliced subnet requirement negotiation unit, charging Unit, policy management element etc..In this kind of implementation, the atom management function of the composition NSSMF is by the management of itself Function is supplied to the user for obtaining authorization in a manner of service respectively, and the user for obtaining authorization may be network consisting It is sliced the atom management function of related object management function and/or the atom management function of composition NSMF.It should be noted that NSSMF may directly manage network function or the network equipment, it is also possible to manage network function or the network equipment by NFMF.? Under the previous case, NSSMF may also be referred to as domain manager (Domain Manager, referred to as DM), i.e. NSSMF and NFMF It is logically the same administrative unit.The atom management function of the composition NSSMF is by the pipe of itself in the latter case Reason function is supplied to the atom management function for forming NFMF in the way of service respectively.
NFMF is mainly responsible for the management to the network equipment and/or network function (example), can receive the net of NSMF transmission The demand of network function also can receive in the demand of the network function of NSMF transmission, and traditional Network Management System not being sliced Network function management (also referred to as NE management) function it is similar, NFMF be responsible for carrying out physical network function or the network equipment therefore Barrier, configuration, charging, performance, safety (Fault, Configuration, Accounting, Performance and Security, referred to as FCAPS) management, the management such as self-optimizing, self-healing, test, to the network function progress Life Cycle of virtualization Period management and FCAPS management etc..In one possible implementation, NFMF be combined by several atomic function described above and At logic administrative unit.In this kind of implementation, the atom management function of the composition NFMF is by the management function of itself The user for obtaining authorization is supplied in a manner of service respectively, the user for obtaining authorization may be network consisting slice The atom management of the atom management function of related object management function and/or the atom management function of composition NSMF and/or NSSMF Function.Its realization can be but be not limited to NE Explorer (Element Manager, referred to as EM).
The position signal of EM in traditional network management system, as shown in Figure 2 a, the network management management of traditional 3GPP are given in Fig. 2 a Framework includes network manager (Network Manager, referred to as NM) and NE Explorer (Element Manager, abbreviation For EM), general EM manages the network equipment as equipment manager, specific to execute to a network element (Network Element, letter Referred to as NE) management;NM issues management message as network manager, from higher level to EM;EM, which can be, to be individually present Equipment, can also be on NE, it is also possible to be integrated on a domain manager DM.It is given in Fig. 2 b logical in future It is real to the possibility of the network function management function entity of the network equipment and/or network function management in communication network (e.g., 5G network) The position of existing mode is illustrated, and exemplary position signal is carried out in Fig. 2 b.In future communications network, it may be possible to which NE coexists with NF , then the management to NE and NF can be realized by same management entity, this management entity may be that EM is also likely to be it He has the manager of management function;There may be a dedicated NFMF entities to be managed to NF, and EM may also be deposited still Managing NE.It should be understood that NFMF can be realized by self-existent equipment as shown in Figure 2 b, it can also be located immediately at On NF, it is also possible to be integrated on NSSMF or domain manager DM etc., or there are also a kind of possible form, i.e. NSSMF pipes There are also NFMF to exist under reason, and the NFMF entity in Fig. 2 b is also likely to be the EM of 5G, for managing NE the or NFMF entity of 5G It may be other network equipments for realizing similar management function.Wherein, as shown in Figure 2 b, NSMF can be with NM and set positioned at difference It is standby, same equipment (dotted line frame signal) can be located at NSMF and NM.
In the application, the interface between network slice related object management function entity and NSMF can be first interface, Interface between NSMF and NSSMF/NFMF can be second interface.It should be noted that NSMF is network slice management function, Network is sliced related object management function entity can send the message of network slice related needs description information, therefore net to NSMF Network slice related object management function entity can be the user of NSI, but the user of NSI is not limited to network slice phase Close Object Management group functional entity.
It should be noted that each NSSI is by several network function examples since a NSI may be made of several NSSI And/or several nesting NSSI compositions;One NSI may be by several NSSI and the network function example set for being not divided into NSSI At;One NSI may also be made of several network function examples.Therefore, in the presence of showing NFMF in Fig. 1 a, possible communication Relationship signal, is not the limitation to network slice management system framework, and NFMF therein may not also be deposited in some cases ?.
It is closed to become apparent from the management of intuitivism apprehension network slice management system framework and physical/virtual network infrastructure System, Fig. 1 b give the relationship signal of network management system and network infrastructure in network slice management.As shown in Figure 1 b, object Reason/virtual network infrastructure includes access network equipment and core net network function.Wherein, access network equipment, which can be, wirelessly connects Network (Radio Access Network, referred to as RAN) equipment (for example, gNB etc.), for core net network function in future In communication network, core net (Core Network, referred to as CN) is made of network function NF (for example, core access and mobility Management function (Core Access and Mobility Management Function, referred to as AMF), conversation management functional (Session Management Function, referred to as SMF), user plane functions (User plane Function, referred to as UPF) etc.).For traditional network, each network equipment forms one and throws the net network, under the concept of network slice, physics, Multiple logical network, i.e., multiple NSI can be supported on virtual network infrastructure.And a NSI can be by multiple NSSI groups May include the specific network equipment, network function (example) etc. at a, NSSI, i.e. NSSI and NSI be all there is logically , it is management object, NSSMF manages NSSI, and NSMF manages NSI, and network is sliced related object management function entity management network It is sliced related object, such as under the scene that network slice related object management function is CSMF, CSMF requests NSMF creation one A NSI supports some business, and NSMF determines one NSI of creation, safeguards the state of NSI since then, and NSI is made of NSSI again, then NSMF requests NSSMF to create NSSI, and NSSMF passes through network function virtual management and layout (Network Function Virtualization Management and Orchestration, referred to as NFV-MANO) function creation virtual network function Can, Configuration network equipment or network function (example) (can be, such as EM) by NFMF, thus to realize the wound to NSSI It builds and manages, NSSMF safeguards the state of NSSI since then.Network slice related object management function, NSMF, NSSMF, NFMF are equal Belong to the function in Network Management System, be likely located at different equipment, be likely located at identical equipment, depends on framework.
Embodiment one
According to an embodiment of the present application, Fig. 3 a is the first of the policy management method of a kind of network slice provided by the present application The flow chart of a embodiment.This method comprises:
S101. the second management entity receives the tactical management operation requests message that the first management entity is sent.
Wherein, the tactical management operation requests message carries the instruction letter of the corresponding management object of instruction management strategy Breath, the instruction information is used to indicate the corresponding management object of management strategy, may include management object identity and/or Class mark, wherein the identity for managing object can be the ID of management object, and class mark can be instruction and meet certain characteristic A kind of management object mark, for example, class mark, which can be, rents network slice when managing object is network slice example The sign of the tenant of example, tactical management operation requests are suitable for the all-network slice example that the tenant rents at this time Strategy, for another example, when managing object is network slice subnet example, class mark can be instruction core net network slice subnet The mark of example, tactical management operation requests are suitable for the strategy of all core net networks slice subnet example at this time.Strategy pipe Reason operation requests message may include at least one of following operation requests: creative management strategy request, searching and managing strategy request, Management strategy request is modified, management strategy request, the request of activation management strategy are deleted and deactivates management strategy request, it should Request is the operation requests to strategy.
Optionally, the first management entity is before sending strategy management operation request message, according to demand, instruction etc. really Surely need to operate the management taken of strategy by the second management entity, optionally, the first management entity can also to strategy into Row design.
S102. the second management entity executes the plan to the management object according to the tactical management operation requests message Slightly management operation.
It should be understood that the second management entity can oneself implementation strategy management operation, other management entities can also be passed through Indirect implementation strategy management operation, for example, the tactical management operation of the management object of the second management entity management is realized and to be passed through The tactical management of its each component part, which operates, to be realized;According to the operation requests, strategy of second management entity to management object Management operation may include: creative management strategy, searching and managing strategy, modification management strategy, delete management strategy, activation management Strategy, deactivation management strategy etc..Management strategy therein can be Self healing Strategy, self-optimizing strategy, self-configuration strategy, peace Full strategy, deployment strategy are equal to the relevant strategy of network management.
Wherein, the management object is related to network slice, may include at least one of following: NSI, NSI and NFI.It is right In different management objects, the second management entity/first management entity identity may be different, for example, if being sliced with network The relevant management object is NSI, then optionally, the second management entity is functional entity (e.g., the NSMF, phase for managing NSI Close atom management function or other), the first management entity be network slice related object management function entity (e.g., management business, Management strategy, the management function entity of the management objects such as network demand, relevant atomic management function or other, can be CSMF); If the management object relevant to network slice is NSSI, optionally, the second management entity is the function for managing NSSI Can entity (e.g., NSSMF, relevant atomic management function or other), the first management entity be manage NSSI composed by NSI function Can entity (e.g., NSMF, relevant atomic management function or other);If the management object relevant to network slice is NFI, It is so optional, the second management entity be manage NFI functional entity (e.g., NFMF, relevant atomic management function or other), the One management entity is functional entity (e.g., the NSMF, NSSMF, relevant atomic management function for managing NSSI/NSI composed by NFI Or other).
Optionally, after the second management entity completes corresponding strategies management operation, the Policy Status for managing object can be carried out Label can also send feedback information to the first management entity.
A kind of policy management method of network slice of the embodiment of the present application receives the first management by the second management entity The tactical management operation requests message of the instruction information for the corresponding management object of carrying instruction management strategy that entity is sent, is realized Tactical management to relevant management object is sliced to network, has carried out effective management to network slice.
Embodiment two
Fig. 3 b is a kind of flow chart of second embodiment of the policy management method of network slice provided by the present application.This The difference of embodiment and embodiment one is, further includes that the first management entity and the second management entity may be held in the embodiment Other capable processing steps, and because it is contemplated that the process of network slice management includes the friendship between different management function entities Mutually, in order to be more convenient for understanding the implementation of tactical management that network in embodiment is sliced, each entity is executed in the present embodiment The step of put together and be described, embody interactive globality, but limit the process that each entity side is related to absolutely not to close It executes together, the technical solution that the application proposes has improvement in each entity side.It is the same as example 1 or similar content exists It is repeated no more in the present embodiment.
The method of the present embodiment includes:
S201. the first management entity determines the management strategy for being suitable for the second management object of the second management entity management.
Wherein, the first management entity can determine above-mentioned management strategy according at least one of following information:
I) network is sliced related needs;Optionally, network slice related needs can be the first management entity and be managed First management object demand for services and/or network demand decompose the second management object demand for services and/or network need It asks;
Ii) the management strategy of the pre-set all management objects for being suitable for the second management entity;It should be understood that the One management entity can be chosen from pre-set management strategy;
Iii) when the management object-sharing that the second management object is managed by multiple first management entities, in addition to the first pipe Manage the demand for services and/or network demand of the management object of other the first management entity management of object;It should be understood that if Second management object is shared by multiple management objects (by the first management entity management), in order to which the first management entity determines second When managing the management strategy of object, not only need to consider the related needs of the first management object to be decomposed, it is also necessary to consider it He manages the related needs of object, needs to comprehensively consider.
Optionally, the first management entity can also be according to the demand for services and/or network of the first management object of its management The management strategy of the management object of Demand Design first;Alternatively, according to pre-set management strategy or according to other management entities Instruction determine first management object management strategy.The pre-set management strategy may be the operation maintenance personnel of operator It is arranged, it is also possible to what the first management entity carried when dispatching from the factory, it is also possible to the history management strategy of local cache.
S202. the first management entity sends to the second management entity and asks suitable for the tactical management operation of the second management entity Seek message.
Wherein, the tactical management operation requests message carries the instruction letter of the corresponding management object of instruction management strategy Breath, the instruction information is used to indicate the corresponding management object of management strategy, may include management object identity and/or Class mark.Tactical management operation requests message may include at least one of following operation requests: creative management strategy request, inquiry Management strategy request, the request of modification management strategy delete management strategy request, the request of activation management strategy and deactivate pipe Strategy request is managed, which is the operation requests to strategy.It should be understood that if managing object, management strategy for certain Created, then tactical management operation requests message relate generally to the inquiry of related management strategy, modification, activation/deactivation, And the request deleted;If related management strategy does not create also, then tactical management operation requests disappear for certain management object Breath was related to creative management strategy request before this.Optionally, which may include to above-mentioned second pipe The creative management strategy request for managing object may include the management strategy to other management objects of the second management entity management Inquiry, modification, activation/deactivation, and/or deletion request, can also be after the management strategy creation of the second management object, should Request message includes asking for the inquiry to the management strategy of the second management object, modification, activation/deactivation, and/or deletion It asks.
S203. the second management entity is executed according to the tactical management operation requests message to indicated management object Tactical management operation.
It should be understood that the second management entity can oneself implementation strategy management operation, other management entities can also be passed through Indirect implementation strategy management operation, for example, the tactical management operation of the management object of the second management entity management is realized and to be passed through The tactical management of its each component part, which operates, to be realized;According to the operation requests, strategy of second management entity to management object Management operation may include: creative management strategy, searching and managing strategy, modification management strategy, delete management strategy, activation management Strategy, deactivation management strategy etc..Management strategy therein can be Self healing Strategy, self-optimizing strategy, self-configuration strategy, peace Full strategy, deployment strategy are equal to the relevant strategy of network management.
Optionally, after the second management entity completes corresponding strategies management operation, the Policy Status of object will can also be managed It is marked, feedback information can also be sent to the first management entity.
Whether the execution condition for the management strategy that S204. monitoring of the second management entity, judgement are suitable for management objectives meets.
The step can realize during the second management entity test and management strategy, can also be in specific network management During realize.
Optionally, the second management entity can be set the task of measuring performance for management objectives, threshold monitor task, or Subscribe to fault warning information etc..
It should be noted that the not no inevitable sequencing of step S203 and S204, when what is executed in S203 is creation pipe When managing the operation of strategy, S204 may be after S203, it is also possible to which, because being directed to different management objects, S204 is before S203 It has been executed that, and if when what is executed in S203 is not the operation of creative management strategy, S204 may be before S203, it is also possible to it Afterwards, those skilled in the art can according to need the sequence for designing the two steps, or alternately.
S205. the second management entity executes management strategy.
It should be understood that when management strategy is there are execution condition, and when executing condition and meeting, the second management entity executes plan Slightly act;When execution condition is not present in management strategy, then the second management entity is when carrying out network management, according to policy mandates Implementation strategy.For example, management strategy there are execution condition, can be certain policy content are as follows: a NSI and another NSI are each other Backup, when a NSI breaks down, deactivates the NSI, activates another NSI;Execution condition is not present in management strategy, can To be certain policy content are as follows: some type of network function NF A wants and exist with it the ground of the another type of NF B deployment interacted It is close to manage position.
S206. management strategy implementing result is reported to the first management entity by the second management entity.
The step is optional step.
A kind of policy management method of network slice of the embodiment of the present application receives the first management by the second management entity The tactical management operation requests message of the instruction information for the corresponding management object of carrying instruction management strategy that entity is sent, is realized Tactical management to relevant management object is sliced to network, has carried out effective management to network slice.
Embodiment three
Fig. 4 is a kind of flow chart of the third embodiment of the policy management method of network slice provided by the present application.With The difference of embodiment one or embodiment two is, in the embodiment, tactical management operation requests message is specially creative management plan Slightly request message, repeats no more, this method packet in the present embodiment with embodiment one or the same or similar content of embodiment two It includes:
S301. the second management entity receives the creative management policy request message that the first management entity is sent.
Wherein, in the creative management policy request message, the corresponding management object of instruction management strategy is carried It indicates information, may include the identity and/or class mark for managing object.It is applicable in for example, the instruction information can be strategy Management object identity identify (ID of such as NSI/NSSI/NFI), which can be 0,1 or multiple.When the parameter When number is 0, this strategy is suitable for the management object of the second all management entity management, i.e. global policies.
In the creative management policy request message, at least one of following parameter can also be carried:
I) tactful type;Such as Self healing Strategy, self-optimizing strategy, self-configuration strategy, security strategy, deployment strategy.
Ii) the adding description information for the management object that strategy is applicable in;For example, the parameter can be geographic range, state (swashs The states such as work, deactivation, failure) etc.;The adding description information is optional information.
Iii) tactful execution condition;Such as specific time, the Performance Counter Threshold for managing object, manage the failure of object Alarm;
Iv) the specific of strategy executes movement;For example, activation/deactivation NSI.
V) target that strategy execution need to be reached;When being more than first threshold such as certain NSI load, flow equalization is carried out, it should The load of NSI controls between second threshold and first threshold.
Vi) tactful principle description;It is a kind of requirement description of principle, for example, some type of network function NF A will be with The geographical location that there is the another type of NF B deployment interacted with it is close.
Wherein, v) and the parameter that vi) is related to, it can according to need selection and use.
Vii) the priority level of strategy execution;The information is optional information.
Above-mentioned to be not understood to the limitation to this parameter to parameters exemplifications set out, those skilled in the art can To use other to meet the implementation of the parameter interpretation as needed.
S302. the second management entity is managed the management object according to the creative management policy request message Strategy creation operation.
According to the request message, the second management entity can be the management Object Creation management strategy, according to the pipe Reason strategy carries out network management.Optionally, after the second management entity completes corresponding strategies management operation, object will can be managed Policy Status is marked, and can also send feedback information to the first management entity;It is further alternative, disappeared according to the request The content of breath, the task of measuring performance for management objectives, threshold monitor task can also be arranged in the second management entity, or subscribes to Fault warning information etc..
A kind of policy management method of network slice of the embodiment of the present application receives the first management by the second management entity The creative management policy request message of the instruction information for the corresponding management object of carrying instruction management strategy that entity is sent, is realized For the management Object Creation management strategy, network management is carried out according to the management strategy, network slice has been carried out effectively Management.
Example IV
Fig. 5 is a kind of flow chart of the 4th embodiment of the policy management method of network slice provided by the present application.With The difference of embodiment one or embodiment two is, in the embodiment, tactical management operation requests message is specially searching and managing plan Slightly request message, repeats no more, this method packet in the present embodiment with embodiment one or the same or similar content of embodiment two It includes:
S401. the second management entity receives the searching and managing policy request message that the first management entity is sent.
Wherein, in the searching and managing policy request message, the corresponding management object of instruction management strategy is carried Indicate information, for example, the instruction information can be the applicable management object identity mark (ID of such as NSI/NSSI/NFI) of strategy, The parameter can be 0,1 or multiple.When the number of parameters is 0, this that be inquired management strategy is suitable for all The strategy of the management object of second management entity management, i.e. global policies.
Optionally, if not can determine that corresponding management plan to be checked according to the instruction information that above-mentioned instruction manages object Slightly, in the searching and managing policy request message, policy lookup conditional information and/or tactful identification information can also be carried, By the limitation of policy lookup condition (for example, be performed within 10 minutes in the past it is tactful, now be in activated state strategy, Self-optimizing strategy), it can the strategy to be inquired of determination;The direct instruction that (e.g., tactful ID) is identified by strategy, can determine and want The strategy of inquiry, the instruction information that can also manage object with above-mentioned instruction are combined determination.
Policy lookup conditional information may include at least one of following parameter:
I) tactful type;Such as Self healing Strategy, self-optimizing strategy, self-configuration strategy, security strategy, deployment strategy.
Ii) the additional description condition of policy lookup;If you need to the entry-into-force time of query strategy, tactful source, tactful is held Market condition (such as the strategy being performed in 10 minutes in the past) etc..
Iii) tactful execution condition;Such as specific time, the Performance Counter Threshold for managing object, manage the failure of object Alarm.
Iv) the priority level of strategy execution.
The above parameter, those skilled in the art can according to need selection and use.
It should be noted that it is above-mentioned to parameters exemplifications set out, it is not understood to the limitation to this parameter, ability Field technique personnel can according to need the implementation for meeting the parameter interpretation using other.
S402. the second management entity carries out the management for management object according to the searching and managing policy request message Policy query operation.
Optionally, after the second management entity completes corresponding strategies management operation, status indication can be carried out to management strategy, Feedback information can be sent to the first management entity.
A kind of policy management method of network slice of the embodiment of the present application receives the first management by the second management entity The searching and managing policy request message of the instruction information for the corresponding management object of carrying instruction management strategy that entity is sent, is realized For the management strategy inquiry operation of management object, effective management has been carried out to network slice.
Embodiment five
Fig. 6 is a kind of flow chart of the 5th embodiment of the policy management method of network slice provided by the present application.With The difference of embodiment one or embodiment two is, in the embodiment, tactical management operation requests message is specially to modify management plan Slightly request message, repeats no more, this method packet in the present embodiment with embodiment one or the same or similar content of embodiment two It includes:
S501. the second management entity receives the modification management strategy request message that the first management entity is sent.
Wherein, in the modification management strategy request message, the corresponding management object of instruction management strategy is carried Indicate information, for example, the instruction information can be the applicable management object identity mark (ID of such as NSI/NSSI/NFI) of strategy, The parameter can be 0,1 or multiple.When the number of parameters is 0, this management strategy of Yao Xiugai is suitable for all The strategy of the management object of second management entity management, i.e. global policies.Optionally, which can serve to indicate that be repaired The management object that the management strategy changed is applicable in, to further determine that management strategy to be modified;The instruction information can also be used The management object that management strategy is applicable in after instruction modification, the identity including the management object that management strategy after modification is applicable in Mark (for example, former strategy is suitable for NSI 1, is revised as NSI 1 and NSI 2) now.
In the modification management strategy request message, it can also further carry tactful identification information and/or strategy is repaired Change content, tactful identification information (for example, strategy ID), which strategy what is modified for determination is, also in combination with above-mentioned instruction The instruction information for managing object determines.If can have been determined by the instruction information that above-mentioned instruction manages object to be modified Management strategy, then tactful identification information can not be carried in request message.If strategy modification is just for institute's applicable object Modification, may be implemented by above-mentioned instruction information, then just no longer needing to carry following strategy modification content.
Strategy modification content can according to need at least one following parameter of selection:
I) adding description information for the management object that strategy is applicable in after modifying;For example, the parameter can be geographic range, shape State (states such as activation, deactivation, failure) etc. (for example former strategy is suitable for the NSI 1 in the region A, is now changed in the region A+B NSI 1)。
Ii tactful execution condition after) modifying;Such as specific time, the Performance Counter Threshold for managing object, manage object Fault warning.
Iii tactful after) modifying specific to execute movement;For example, activation/deactivation NSI.
Iv the target that strategy execution need to be reached after) modifying;When being more than first threshold such as certain NSI load, flow equalization is carried out, The load of the NSI is controlled between second threshold and first threshold.
V) tactful principle description after modifying;It is a kind of requirement description of principle, for example, some type of network function NF A The geographical location wanted and there is the another type of NF B deployment interacted with it is close.
Vi the priority level of strategy execution after) modifying.
It should be noted that it is above-mentioned to parameters exemplifications set out, it is not understood to the limitation to this parameter, ability Field technique personnel can according to need the implementation for meeting the parameter interpretation using other.
S502. the second management entity carries out the management for management object according to the modification management strategy request message Strategy modification operation.
Optionally, after the second management entity completes corresponding strategies management operation, status indication can be carried out to management strategy, Feedback information can be sent to the first management entity.
A kind of policy management method of network slice of the embodiment of the present application receives the first management by the second management entity The modification management strategy request message of the instruction information for the corresponding management object of carrying instruction management strategy that entity is sent, is realized Operation is modified for the management strategy of management object, effective management has been carried out to network slice.
Embodiment six
Fig. 7 is a kind of flow chart of the 6th embodiment of the policy management method of network slice provided by the present application.With The difference of embodiment one or embodiment two is, in the embodiment, tactical management operation requests message is specially to delete management plan Slightly request message, repeats no more, this method packet in the present embodiment with embodiment one or the same or similar content of embodiment two It includes:
S601. the second management entity receives the deletion management strategy request message that the first management entity is sent.
Wherein, in the deletion management strategy request message, the corresponding management object of instruction management strategy is carried Indicate information, for example, the instruction information can be the applicable management object identity mark (ID of such as NSI/NSSI/NFI) of strategy, The parameter can be 0,1 or multiple.When the number of parameters is 0, this that be deleted management strategy is suitable for all The strategy of the management object of second management entity management, i.e. global policies.The instruction information can serve to indicate that pipe to be deleted The management object that reason strategy is applicable in, to further determine that management strategy to be deleted;For example, deleting should when NSI terminates The management strategy of NSI.
Optionally, if not can determine that corresponding management plan to be deleted according to the instruction information that above-mentioned instruction manages object Slightly, in the deletion management strategy request message, tactful identification information (for example, strategy ID) can also be carried, for determining Which strategy what is deleted is, is also determined in combination with the instruction information of above-mentioned instruction management object.
S602. the second management entity carries out the management for management object according to the deletion management strategy request message Tactful delete operation.
Optionally, after the second management entity completes corresponding strategies management operation, state mark can be carried out to management strategy state Note can also send feedback information to the first management entity.
A kind of policy management method of network slice of the embodiment of the present application receives the first management by the second management entity The deletion management strategy request message of the instruction information for the corresponding management object of carrying instruction management strategy that entity is sent, is realized For the management strategy delete operation of management object, effective management has been carried out to network slice.
Embodiment seven
Fig. 8 is a kind of flow chart of the 7th embodiment of the policy management method of network slice provided by the present application.With The difference of embodiment one or embodiment two is, in the embodiment, tactical management operation requests message is specially activation/deactivation Management strategy request message repeats no more in the present embodiment with embodiment one or the same or similar content of embodiment two, should Method includes:
S701. the second management entity receives the activation/deactivation management strategy request message that the first management entity is sent.
Wherein, in the activation/deactivation management strategy request message, the corresponding management of instruction management strategy is carried The instruction information of object, for example, the instruction information can be applicable management object identity mark (such as NSI/NSSI/NFI of strategy ID), which can be 0,1 or multiple.When the number of parameters is 0, this management strategy of activation/deactivation It is the strategy of the management object suitable for the second all management entity management, i.e. global policies.
Optionally, if not can determine that corresponding to be activated/deactivation according to the instruction information that above-mentioned instruction manages object Management strategy it is (e.g., tactful can also to carry tactful identification information in the activation/deactivation management strategy request message ID), according to the direct instruction of tactful identification information, the strategy for wanting activation/deactivation can be determined, it can also be with above-mentioned instruction pipe The instruction information of reason object is combined determination.
Optionally, in the activation/deactivation management strategy request message, following parameter can also be carried: strategy Activation/deactivation condition, such as time, performance/event of failure, the parameter can not also be carried, when not carrying the parameter, stood Execute activation/deactivation.
S702. the second management entity is carried out according to the activation/deactivation management strategy request message for management object Management strategy activation/deactivation operation.
Optionally, after the second management entity completes corresponding strategies management operation, status indication can be carried out to management strategy, Feedback information can be sent to the first management entity.
A kind of policy management method of network slice of the embodiment of the present application receives the first management by the second management entity The activation/deactivation management strategy request of the instruction information for the corresponding management object of carrying instruction management strategy that entity is sent disappears Breath, realizes the management strategy activation/deactivation operation for management object, has carried out effective management to network slice.
Above-described embodiment is mainly described the operating aspect of strategy from tactical management, for example, construction strategy, deleting Except strategy, modification strategy, activation/deactivation strategy etc.;According to the introduction of embodiment two, during tactical management, also relate to And test/execution to strategy, the tactical management under these scenes are also the one side of the application concern.Following example will The second management entity is provided under the scene of tactful test/execution, carries out the implementation of tactical management, these embodiments can be with It is that the second management entity that above example one to embodiment seven further comprises carries out the concrete scene of tactful test/execution Under tactical management implementation, be also possible to be not based on the technical solution of embodiment one to embodiment seven, individually for strategy During test/execution there are the problem of, the tactical management implementation that provides.
Embodiment eight
Fig. 9 is a kind of flow chart of the 8th embodiment of the policy management method of network slice provided by the present application.It should Embodiment provides corresponding solution for overlap problem present in management strategy test/implementation procedure.
This method comprises:
S801. the test of the second management entity and/or execution management strategy, determine there is strategy overlapping.
The execution of the step, it may occur however that it (is also required to test strategy) in network slice test process, The second management entity is likely to occur in receive after the tactical management operation requests message of the first management entity or according to internal algorithm After determining several NSI/NSSI/NFI tactical management operations;Wherein, existing overlapping between several strategies is found, it may occur however that Second network management device determines that strategy execution condition meets, when being ready to carry out policy action.
Wherein, management strategy is to manage the management strategy of object.So-called strategy overlapping, if referring at least two management strategies Execution condition simultaneously when meeting, management strategy execution movement and/or performance objective overlap, for ease of understanding, careful following example Son illustrates the concrete condition (it should be understood that the strategy overlapping is not limited to following examples) of strategy overlapping: first network pipe The self-optimizing management strategy that equipment sends NSI 1 to the second network management device is managed, the content of the self-optimizing management strategy is When the big Mr. Yu's threshold value of certain performance indicator of NSI 1, the network function A (NF A) of the network slice example is extended.It is same with this When, which is NSI 1 and NSI 2 shared, and the self-optimizing management strategy of NSI 2 includes certain performance indicator as NSI 2 When big Mr. Yu's threshold value, NF A is extended.When the execution condition of two self-optimizing management strategies meets simultaneously, the self-optimizing strategy There are overlappings.
S802. the second management entity executes a wherein management strategy, and pause executes other overlay strategies.
Optionally, the second management entity can voluntarily determine the operation for taking the step according to preset strategy, can also basis After reporting the first management entity, indicate to execute according to the first management entity.
S803. determine that the policy goals of other overlay strategies after the completion of the execution acts have met.
S804. the overlay strategy that the second management entity executes the pause is unavailable.
As above example executes NSI 1 if the pause of the second management entity executes the self-optimizing management strategy of NSI 2 Self-optimizing management strategy, NF A is extended, then the second management entity can determine again whether the extension to NF A meets NSI 2 The target of self-optimizing management strategy need not execute the self-optimizing management strategy of NSI 2 again if met, can make The strategy is unavailable, avoids reprocessing.There are also a kind of situation, for example NSI 1 and NSI 2 share NSSI 1, NSI 1 certain Terminate NSSI 1 when one policy definition condition one meets, and terminate NSSI 1 when a certain policy definition condition two of NSI 2 meets, that After the strategy for executing NSI 1, NSSI 1 is terminated, and meets the policy goals of NSI 2, and NSSI 1 is by end Knot, the movement of finalization process can not repeat execution, and the strategy of the NSI 2 can be made unavailable.
Optionally, the overlay strategy for executing the pause is unavailable, including the operation such as deletes, deactivates, and makes to be overlapped plan It is slightly unavailable.
Optionally, it determines that the overlay strategy for executing pause is unavailable, can be directly determined by the second management entity, it can also It is indirectly true according to the instruction of other management entities to report other management entities (such as the first management entity) through the second management entity It is fixed.Further alternative, after the above-mentioned overlay strategy for executing the pause is unavailable, the second management entity is managed to first The unavailable event of entity reporting policy;According to the instruction of the first management entity, modifies the not available management strategy or make institute State not available management strategy can be used again.
S805. determine that the policy goals of other overlay strategies after the completion of the execution acts do not meet.
S806. the second management entity executes the overlay strategy for being suspended execution.
It should be noted that S803 and S804 are the processing modes in a kind of situation, S805 and S806 are in another case Processing mode, there is no inevitable sequencings for two kinds of processing modes.
Continuation is illustrated with above example, if the pause of the second management entity executes the self-optimizing management strategy of NSI 2, is held The self-optimizing management strategy of row NSI 1, extends NF A, then the second management entity can determine whether the extension to NF A is full again The target of the self-optimizing management strategy of sufficient NSI 2, if do not met, the second management entity also needs oneself of execution NSI 2 Optimum management strategy extends NF A again.
Optionally, it determines and executes the overlay strategy that the pause executes, can be directly determined by the second management entity, it can also It is indirectly true according to the instruction of other management entities to report other management entities (such as the first management entity) through the second management entity It is fixed.
It should be noted that the difference based on management object, the identity of the second management entity and the first management entity can be with Difference, specific explanations may refer to previous embodiment, and details are not described herein.
A kind of policy management method of network slice of the embodiment of the present application, the second management by management management object are real The tactful overlap processing of body avoids repetitive operation bring expense, realizes the tactical management to network slice.
Embodiment nine
Figure 10 is a kind of flow chart of the 9th embodiment of the policy management method of network slice provided by the present application.It should Embodiment provides corresponding solution for collision problem present in management strategy test/implementation procedure.
This method comprises:
S901. when the second management entity is tested and/or executes management strategy, determine that there are policy conflicts.
The execution of the step, it may occur however that opportunity it is similar with embodiment eight, find conflict opportunity also with embodiment eight Similar, details are not described herein.
Wherein, management strategy is to manage the management strategy of object.So-called policy conflict, if referring at least two management strategies Execution condition meet simultaneously, management strategy execution movement and/or performance objective mutually conflict, for ease of understanding, careful following example Illustrate the concrete condition (it should be understood that the policy conflict is not limited to following examples) of policy conflict: the first management entity To the second management entity send creation global policies request (so-called global policies, be exactly be applied to all second management entity pipes The management object of reason), the particular content of the global policies is that the network function (NF A) of a certain type is wanted and exist with it to hand over The geographical location of mutual another type of NF B deployment is close.Second management entity creates NSSI 1, wherein real comprising NF A Example and NF B example.First management entity has sent the fault self-recovery strategy for NSSI 1 to the second management entity, specific interior Appearance is to re-create a NF A example when NF A example plague grade is dangerous failure to replace failure NF A example.When etc. When grade occurs for dangerous NF A failure, the second management entity determines that newly created NF A example can only be deployed in from NF B example The geographical location of deployment is farther away local (such as two computer rooms).Self healing Strategy and the global policies conflict at this time.
S902. the second management entity is to the first management entity reporting policy conflict notification message.
Wherein, the identity that the management object is carried in the policy conflict notification message, for management object Carry out conflict differentiation.
S903. the first management entity returns to the management instruction for the management object to second management entity.
S904. the second management entity refers to according to the management for the management object that first management entity returns It enables, clash handle is carried out to the management strategy of the management object.
Optionally, it may include deactivation to management strategy to the clash handle of management strategy, the behaviour such as be deleted or modified Make.
It is further alternative, it, can be to the first management entity after the second management entity completes clash handle according to instruction Report processing result.
S905. priority parameters of second management entity according to strategy execution, the management strategy that determination need to execute.
It should be noted that step S902 to step S904 is a kind of processing mode, step S905 is another processing mode, It is arranged side by side to step S904 with step S902, not after it the step of.It should be understood that determining strategy punching in the second management entity When prominent, it can directly can also pass through related ginseng by reporting the first management entity to carry out clash handle according to the instruction of feedback Number, the management strategy that determination need to execute.
Optionally, the management strategy that determination need to execute further includes keeping its unavailable the management strategy of other conflicts or suspending It executes, the processing of the management strategy of other conflicts can be directly determined by the second management entity here, it can also be according to other The instruction of management entity (such as the first management entity).
Processing further alternative, that the second management entity executes unavailable/pause of other management strategies to conflict Later, processing result can be reported to the first management entity.
It should be noted that the difference based on management object, the identity of the second management entity and the first management entity can be with Difference, specific explanations may refer to previous embodiment, and details are not described herein.
A kind of policy management method of network slice of the embodiment of the present application, the second management by management management object are real The policy conflict of body is handled, and is avoided conflict bring processing problem, is realized the tactical management to network slice.
It is above-mentioned mainly to carry out the process angle of the tactical management of network slice to the application reality from communication between management entity The scheme for applying example offer is described.It is understood that each management entity, in order to realize the above functions, it comprises hold The corresponding hardware configuration of each function of row and/or software module.Those skilled in the art should be readily appreciated that, in conjunction with herein Disclosed in embodiment description each exemplary unit and algorithm steps, the application can be soft with hardware or hardware and computer The combining form of part is realized.Some functions is executed in a manner of hardware or computer software driving hardware actually, is depended on In the specific application and design constraint of technical solution.Professional technician can carry out using difference each specific application Method realizes described function, but this realizes it is not considered that exceeding scope of the present application.
The embodiment of the present application can carry out the division of functional module according to above method example to management entity, for example, can With each functional module of each function division of correspondence, two or more functions can also be integrated in a processing module In.Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It needs It is noted that be schematical, only a kind of logical function partition to the division of module in the embodiment of the present application, it is practical real It is current that there may be another division manner.It is illustrated for using corresponding each each functional module of function division below.
The embodiment of the present application also provides a kind of management equipments.If the management equipment is used as request strategy management operation, plan The slightly related instruction of overlapping/clash handle, can be used for executing in Fig. 3 a- Figure 10 either figure performed by the first management entity Step;If the management equipment is used as the corresponding management object of management management strategy, it can be used for executing Fig. 3 a- Figure 10 either figure In step performed by the second management entity.It is convenient to be easy to understand and illustrate, and Figure 11 shows a kind of management equipment knot of simplification Structure schematic diagram, Tu11Zhong, management equipment 1100, including processor/controller 1101, memory 1102 including communication interface 11031 communication unit 1103 and optional input/output unit 1104.Processor/controller 1101 is mainly used for logical Letter agreement and communication data are handled, and are controlled management equipment, and software program is executed, processing software program Data etc..Memory 1102 is mainly used for storing software program and data.Communication unit 1103 is mainly used for the biography of network communication Defeated processing.Communication interface 11031 is executed to be handled about the interface of network communication, is mainly used for messaging and data.It inputs defeated Device 1104 out, such as indicator, touch screen, display screen, keyboard etc. are mainly used for receiving the data and right of operator's input Operator's output data.It should be noted that the management equipment of some types can not have input/output unit 1104.Its In, memory 1102 and processor/controller 1101, which can be, to be integrated, and is also possible to be independently arranged.
When needing to send data, after processor/controller 1101 is handled to sent data, output to communication Unit 1103, data by being sent out by communication unit 1103 after the progress interface processing of communication interface 11031.When there is data hair When being sent to management equipment, communication unit 1103 receives data by communication interface 11031, data are handled and export to Data are further processed by processor/controller 1101, processor/controller 1101.For purposes of illustration only, being illustrated only in Figure 11 One memory 1102 and processor/controller 1101.In actual equipment, may exist one or more processors/control Device 1101 processed and one or more memories 1102.Memory 1102 is referred to as storage medium or storage equipment etc..It deposits Reservoir 1102 can be to be arranged independently of processor/controller 1101, is also possible to be integrated in one with processor/controller 1101 It rises, the embodiment of the present application is without limitation.
In the embodiment of the present application, Figure 12 provides a kind of structural block diagram of the tactical management device of network slice, the pipe Managing device includes: Transmit-Receive Unit 1201 and processing unit 1202.The tactical management device of network slice is in the form of functional unit It shows, in the case of unrestricted, term as used herein " unit " can refer to execute one or more softwares or firmware journey The specific integrated circuit (ASIC) of sequence, electronic circuit, (shared, dedicated or group) processor/controller and memory, combination are patrolled Circuit is collected, and/or other suitable components of the function are provided.
On the one hand, when the managing device is used as request strategy management operation, the correlation of tactful overlapping/clash handle indicates When management equipment, it is configured to realize following functions:
In one implementation, processing unit 1202 is used to execute related first management entity in the embodiment of Fig. 3 a Other correlations managed in the relevant operation and/or the application that operate that determination will take strategy by the second management entity Step;Corresponding operate about the first management entity sending strategy management of step S101 that Transmit-Receive Unit 1201 is used to execute Fig. 3 a is asked Seek other correlation steps in the relevant operation and/or the application of message.
In another implementation, processing unit 1202 is used to execute in the step S202 and/or the application of Fig. 3 b Other correlation steps;Transmit-Receive Unit 1201 is used to execute other correlation steps in the step S201 and/or the application of Fig. 3 b.
In another implementation, it is real to be used to execute related first management in the embodiment of Fig. 4 for processing unit 1202 Body determination will be by the second management entity to other correlation steps in the tactful relevant operation and/or the application created; The step S301 that Transmit-Receive Unit 1201 is used to execute Fig. 4 is corresponding about the transmission creative management policing action request of the first management entity The relevant operation of message and/or other correlation steps in the application.
In another implementation, it is real to be used to execute related first management in the embodiment of Fig. 5 for processing unit 1202 Body determination will be by the second management entity to other correlation steps in the tactful relevant operation and/or the application inquired; The step S401 that Transmit-Receive Unit 1201 is used to execute Fig. 5 is corresponding about the transmission searching and managing policing action request of the first management entity The relevant operation of message and/or other correlation steps in the application.
In another implementation, it is real to be used to execute related first management in the embodiment of Fig. 6 for processing unit 1202 Body determination will be by the second management entity to other correlation steps in the tactful relevant operation and/or the application modified; Corresponding send about the first management entity of step S501 that Transmit-Receive Unit 1201 is used to execute Fig. 6 modifies management strategy operation requests The relevant operation of message and/or other correlation steps in the application.
In another implementation, it is real to be used to execute related first management in the embodiment of Fig. 7 for processing unit 1202 Body determination will be by the second management entity to other correlation steps in the tactful relevant operation and/or the application deleted; Corresponding send about the first management entity of step S601 that Transmit-Receive Unit 1201 is used to execute Fig. 7 deletes management strategy operation requests The relevant operation of message and/or other correlation steps in the application.
In another implementation, it is real to be used to execute related first management in the embodiment of Fig. 8 for processing unit 1202 Body determination will carry out other phases in the relevant operation and/or the application of activation/deactivation by the second management entity to strategy Close step;The step S701 that Transmit-Receive Unit 1201 is used to execute Fig. 8 is corresponding about the first management entity transmission activation/deactivation pipe The relevant operation for managing policing action request message and/or other correlation steps in the application.
In another implementation, processing unit 1202 can be used for executing related first management in the embodiment of Fig. 9 Entity is determined through the second management entity to its in the processing mode (in optional way) and/or the application of overlay strategy His correlation step;Transmit-Receive Unit 1201 can be used for executing real in relation to the first management entity and the second management in the embodiment of Fig. 9 The relevant operation of body interaction (in optional way) and/or other correlation steps in the application.
In another implementation, processing unit 1202 can be used for executing related first management in the embodiment of Figure 10 The mode and/or other correlation steps in the application that entity determines the second management entity clash handle of instruction;Transmit-Receive Unit Corresponding related first management entity receives the second management entity in step S902 in 1201 embodiment for executing Figure 10 The relevant operation of the policy conflict notification message of report, the first management entity of step S903 return to management to the second management entity and instruct Other correlation steps in interactive relevant operation and/or the application.
In unspecific example, those skilled in the art, which can understand managing device, can be used the management equipment of Figure 11 Form is realized.Processing unit 1202 can be realized by processor/controller 1101 and memory 1102, can specifically pass through place Reason device/controller 1101 executes the first instruction in memory 1102 to determine network management action and/or determine that transmission is corresponding Information realizes that the second instruction that can also be executed by processor/controller 1101 in memory 1102 is with determination received It the content of feedback information and/or determines and pending processes operations to realize;Transmit-Receive Unit 1201 can pass through processor/control Device 1101, memory 1102, communication unit 1103 are realized, execute memory 1102 in particular by processor/controller 1101 In third instruct so that communication unit 1103 sends corresponding information by communication interface 11031 realizes, can also pass through place Reason device/controller 1101 executes the 4th instruction in memory 1102 so that communication unit 1103 is obtained by communication interface 11031 Feedforward information is negated to realize.
On the other hand, tactical management operation, plan are carried out when the managing device is used as management object corresponding to management strategy Slightly overlapping/clash handle management equipment when, be configured realize following functions:
In one implementation, Transmit-Receive Unit 1201 is used to execute its in the step S101 and/or the application of Fig. 3 a His correlation step;Processing unit 1202 is used to execute other correlation steps in the step S102 and/or the application of Fig. 3 a.
In another implementation, the step S202 that Transmit-Receive Unit 1201 is used to execute Fig. 3 b is corresponded to about the second management Entity receives other correlation steps in related operation, step S206 and/or the application of tactical management operation requests message; Processing unit 1202 is used to execute other correlation steps in step S203, S204, S205 and/or the application of Fig. 3 b.
In another implementation, Transmit-Receive Unit 1201 is used to execute in the step S301 and/or the application of Fig. 4 Other correlation steps;Processing unit 1202 is used to execute other correlation steps in the step S302 and/or the application of Fig. 4.
In another implementation, Transmit-Receive Unit 1201 is used to execute in the step S401 and/or the application of Fig. 5 Other correlation steps;Processing unit 1202 is used to execute other correlation steps in the step S402 and/or the application of Fig. 5.
In another implementation, Transmit-Receive Unit 1201 is used to execute in the step S501 and/or the application of Fig. 6 Other correlation steps;Processing unit 1202 is used to execute other correlation steps in the step S502 and/or the application of Fig. 6.
In another implementation, Transmit-Receive Unit 1201 is used to execute in the step S601 and/or the application of Fig. 7 Other correlation steps;Processing unit 1202 is used to execute other correlation steps in the step S602 and/or the application of Fig. 7.
In another implementation, Transmit-Receive Unit 1201 is used to execute in the step S701 and/or the application of Fig. 8 Other correlation steps;Processing unit 1202 is used to execute other correlation steps in the step S702 and/or the application of Fig. 8.
In another implementation, Transmit-Receive Unit 1201 can be used for executing real with the first management in the embodiment of Fig. 9 Other correlation steps in the relevant operation (optional way) of body communication and/or the application;Processing unit 1202 is for executing figure Other correlation steps in 9 step S801, S802, S803, S804, S805, S806 and/or the application.
In another implementation, Transmit-Receive Unit 1201 is used to execute in the step S902 and/or the application of Figure 10 Other correlation steps;Processing unit 1202 is used to execute other in step S901, S904, S905 and/or the application of Figure 10 Correlation step.
In unspecific example, those skilled in the art, which can understand managing device, can be used the management equipment of Figure 11 Form is realized.Processing unit 1202 can be realized by processor/controller 1101 and memory 1102, can specifically pass through place Reason device/controller 1101 executes the first instruction in memory 1102 to determine network management action and/or determine that transmission is corresponding Information realizes that the second instruction that can also be executed by processor/controller 1101 in memory 1102 is with determination received It the content of feedback information and/or determines and pending processes operations to realize;Transmit-Receive Unit 1201 can pass through processor/control Device 1101, memory 1102, communication unit 1103 are realized, execute memory 1102 in particular by processor/controller 1101 In third instruct so that communication unit 1103 sends corresponding information by communication interface 11031 realizes, can also pass through place Reason device/controller 1101 executes the 4th instruction in memory 1102 so that communication unit 1103 is obtained by communication interface 11031 Feedforward information is negated to realize.
Above, Transmit-Receive Unit 1201 is properly termed as communication unit, transceiver, transceiver, R-T unit etc..Processing unit 1202 are referred to as processor/controller, handle veneer, processing module, processing unit, control module, control unit, control Device etc..Optionally, the device in Transmit-Receive Unit 1201 for realizing receive capabilities can be considered as receiving unit, transmitting-receiving is single Device in member 1201 for realizing sending function is considered as transmission unit, i.e. Transmit-Receive Unit 1201 includes receiving unit and sends single Member.Transmit-Receive Unit is referred to as transceiver, transceiver or transmission circuit etc. sometimes.Receiving unit is referred to as connecing sometimes Receipts machine, receiver or reception circuit etc..Transmission unit is also likely to be transmitter, transmitter or transmit circuit etc. sometimes.One In a little embodiments, Transmit-Receive Unit 1201 and processing unit 1202, which can be, to be integrated, and is also possible to be independently arranged.Separately Outside, the repertoire in processing unit 1202 can integrate realizes in a chip, and one can also be integrated in partial function It realizes that another part function is integrated in other on one or more chips in chip to realize, the application is to this without limiting.
The explanation and beneficial effect of related content in the tactical management device of any network slice of above-mentioned offer With reference to corresponding embodiment of the method provided above, details are not described herein again.
In above-mentioned each Installation practice, transmission unit or transmitter execute the step of above-mentioned each embodiment of the method is sent, Receiving module or receiver execute the step of above-mentioned each embodiment of the method receives, other steps by processing module or processor/ Controller executes;Sending module receiving module can form transceiver module, communication module, and receiver and transmitter can form receipts Send out device.
The tactical management device of above-mentioned network slice can be real for the first management entity in embodiment of the method, the second management Body, or the functional module or core of the first management entity, the second management entity, third management entity, the 4th management entity Piece.
Present invention also provides a kind of policy management systems of network slice, including the first management is real in above embodiment Body and the second management entity, or realize the corresponding intrument and/or equipment of the first management entity and the second management entity correlation function.
Present invention also provides a kind of computer program products, when run on a computer, so that computer executes Any method of above-mentioned offer.Present invention also provides a kind of communication chips, wherein instruction is stored with, when it is real in each management When being run on body, so that the method that each management entity executes above-mentioned offer.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.When being realized using software program, can entirely or partly realize in the form of a computer program product.The computer Program product includes one or more computer instructions.On computers load and execute computer program instructions when, all or It partly generates according to process or function described in the embodiment of the present application.The computer can be general purpose computer, dedicated meter Calculation machine, computer network or other programmable devices.The computer instruction can store in computer readable storage medium In, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, the computer Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center Word user line (digital subscriber line, DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another A web-site, computer, server or data center are transmitted.The computer readable storage medium can be computer Any usable medium that can be accessed either includes the numbers such as one or more server, data centers that medium can be used to integrate According to storage equipment.The usable medium can be magnetic medium (for example, floppy disk, hard disk, tape), optical medium (for example, DVD), Or semiconductor medium (such as solid state hard disk (solid state disk, SSD)) etc..
Although the application is described in conjunction with each embodiment herein, however, implementing the application claimed In the process, those skilled in the art are by checking the attached drawing, disclosure and the appended claims, it will be appreciated that and it is real Other variations of the existing open embodiment.In the claims, " comprising " (comprising) word is not excluded for other compositions Part or step, "a" or "an" are not excluded for multiple situations.Single processor/controller or other units may be implemented to weigh Several functions of being enumerated in benefit requirement.Mutually different has been recited in mutually different dependent certain measures, it is not intended that These measures, which cannot combine, generates good effect.
Although the application is described in conjunction with specific features and embodiment, it is clear that, do not departing from this Shen In the case where spirit and scope please, it can be carry out various modifications and is combined.Correspondingly, the specification and drawings are only institute The exemplary illustration for the application that attached claim is defined, and be considered as covered within the scope of the application any and all and repair Change, change, combining or equivalent.Obviously, those skilled in the art the application can be carried out various modification and variations without It is detached from spirit and scope.If in this way, these modifications and variations of the application belong to the claim of this application and its Within the scope of equivalent technologies, then the application is also intended to include these modifications and variations.

Claims (28)

1. a kind of policy management method of network slice, which is characterized in that the described method includes:
Second management entity receives the tactical management operation requests message that the first management entity is sent, and the tactical management operation is asked Message is asked to carry the instruction information of the corresponding management object of instruction management strategy;
Second management entity executes the tactical management to the management object according to the tactical management operation requests message Operation;
Wherein, the management object includes at least one of the following: network slice example, network slice subnet example and network function It can example.
2. the method according to claim 1, wherein the instruction information of the management object includes: management object Identity and/or class mark.
3. method according to claim 1 or 2, which is characterized in that
The tactical management operation requests message includes at least one of following operation requests: creative management strategy request, inquiry pipe Strategy request, the request of modification management strategy are managed, management strategy request, the request of activation management strategy is deleted and deactivates management Strategy request.
4. according to the method described in claim 3, it is characterized in that,
If the tactical management operation requests message includes creative management strategy request, the tactical management operation requests message Also carry at least one of following information: tactful type, the additional description of the management object, the execution condition of strategy, strategy Execution movement, the target of strategy execution, the priority parameters of the description of tactful principle and strategy execution;
If the tactical management operation requests message includes searching and managing strategy request, the tactical management operation requests message Also carry policy lookup conditional information and/or tactful identification information;
If the tactical management operation requests message includes modification management strategy request, the corresponding pipe of the instruction management strategy The instruction information of reason object includes that the management object that strategy is applicable after modifying preceding or modification indicates information, and the tactical management operates Request message also carries tactful identification information and/or strategy modification content;
If the tactical management operation requests message includes deleting management strategy request, the tactical management operation requests message Also carry tactful identification information;
If the tactical management operation requests message includes activation management strategy request, the tactical management operation requests message Also carry at least one of following information: the activation condition of strategy mark and/or strategy;Or,
If the tactical management operation requests message includes deactivating management strategy request, the tactical management operation requests disappear Breath also carries at least one of following information: the deactivation condition of strategy mark and/or strategy.
5. the method according to claim 1, wherein the method also includes the second management entity test and managements Strategy and/or execution management strategy;Wherein, if the execution condition of at least two management strategies meets simultaneously, and management strategy is held When action is made and/or performance objective overlaps, then the second management entity executes following operation:
A wherein management strategy is executed, pause executes other overlay strategies;
Determine the overlapping that the policy goals of other overlay strategies after the completion of the execution acts have met, then execute the pause Strategy is unavailable;Or, determining that the policy goals of other overlay strategies after the completion of the execution movement do not meet, then executes and be suspended The overlay strategy executed.
6. the method according to claim 1, wherein the method also includes the second management entity test and managements Strategy and/or execution management strategy;Wherein, if the execution condition of at least two management strategies meets simultaneously, and management strategy is held When action is made and/or performance objective mutually conflicts, then the second management entity executes following operation:
To the first management entity reporting policy conflict notification message, wherein carry the pipe in the policy conflict notification message Manage the identity of object;The management instruction for the management object returned according to first management entity, to described The management strategy for managing object carries out clash handle;
Or,
According to the priority parameters of strategy execution, management strategy that determination need to execute.
7. according to the method described in claim 6, it is characterized in that, the clash handle, comprising: deactivate, be deleted or modified Operation;
The management strategy that the determination need to execute, comprising:
The management strategy that determination need to execute keeps the management strategy of other conflicts unavailable or pause is executed for the management object The management strategy of other conflicts.
8. a kind of policy management method of network slice, which is characterized in that the described method includes:
First management entity disappears to the second management entity sending strategy management operation request message, the tactical management operation requests Breath carries the instruction information of the corresponding management object of instruction management strategy;The management object includes at least one of the following: network It is sliced example, network slice subnet example and network function example;
Wherein, the tactical management operation requests message is asked for second management entity according to tactical management operation Message is sought, executes and the tactical management of the management object is operated.
9. according to the method described in claim 8, it is characterized in that, the instruction information of the management object includes: management object Identity and/or class mark.
10. method according to claim 8 or claim 9, which is characterized in that
The tactical management operation requests message includes at least one of following operation requests: creative management strategy request, inquiry pipe Strategy request, the request of modification management strategy are managed, management strategy request, the request of activation management strategy is deleted and deactivates management Strategy request.
11. according to the method described in claim 10, it is characterized in that,
If the tactical management operation requests message includes creative management strategy request, the tactical management operation requests message Also carry at least one of following information: tactful type, the additional description of the management object, the execution condition of strategy, strategy Execution movement, the target of strategy execution, the priority parameters of the description of tactful principle and strategy execution;
If the tactical management operation requests message includes searching and managing strategy request, the tactical management operation requests message Also carry policy lookup conditional information and/or tactful identification information;
If the tactical management operation requests message includes modification management strategy request, the corresponding pipe of the instruction management strategy The instruction information of reason object includes that the management object that strategy is applicable after modifying preceding or modification indicates information, and the tactical management operates Request message also carries tactful identification information and/or strategy modification content;
If the tactical management operation requests message includes deleting management strategy request, the tactical management operation requests message Also carry tactful identification information;
If the tactical management operation requests message includes activation management strategy request, the tactical management operation requests message Also carry at least one of following information: the activation condition of strategy mark and/or strategy;Or,
If the tactical management operation requests message includes deactivating management strategy request, the tactical management operation requests disappear Breath also carries at least one of following information: the deactivation condition of strategy mark and/or strategy.
12. a kind of tactical management device of network slice, which is characterized in that described device includes:
Receiving unit, for receiving the tactical management operation requests message of the first management entity transmission, the tactical management operation Request message carries the instruction information of the corresponding management object of instruction management strategy;
Processing unit is executed and is operated to the tactical management of the management object according to the tactical management operation requests message;
Wherein, the management object includes at least one of the following: network slice example, network slice subnet example and network function It can example.
13. device according to claim 12, which is characterized in that the instruction information of the management object includes: management pair The identity of elephant and/or class mark.
14. device according to claim 12 or 13, which is characterized in that
The tactical management operation requests message includes at least one of following operation requests: creative management strategy request, inquiry pipe Strategy request, the request of modification management strategy are managed, management strategy request, the request of activation management strategy is deleted and deactivates management Strategy request.
15. device according to claim 14, which is characterized in that
If the tactical management operation requests message includes creative management strategy request, the tactical management operation requests message Also carry at least one of following information: tactful type, the additional description of the management object, the execution condition of strategy, strategy Execution movement, the target of strategy execution, the priority parameters of the description of tactful principle and strategy execution;
If the tactical management operation requests message includes searching and managing strategy request, the tactical management operation requests message Also carry policy lookup conditional information and/or tactful identification information;
If the tactical management operation requests message includes modification management strategy request, the corresponding pipe of the instruction management strategy The instruction information of reason object includes that the management object that strategy is applicable after modifying preceding or modification indicates information, and the tactical management operates Request message also carries tactful identification information and/or strategy modification content;
If the tactical management operation requests message includes deleting management strategy request, the tactical management operation requests message Also carry tactful identification information;
If the tactical management operation requests message includes activation management strategy request, the tactical management operation requests message Also carry at least one of following information: the activation condition of strategy mark and/or strategy;Or,
If the tactical management operation requests message includes deactivating management strategy request, the tactical management operation requests disappear Breath also carries at least one of following information: the deactivation condition of strategy mark and/or strategy.
16. device according to claim 15, which is characterized in that
The policy lookup conditional information includes at least one of following information: the additional description item of tactful type, policy lookup The priority parameters of part, the execution condition of strategy and strategy execution;
The strategy modification content includes at least one of following information: the additional description for the management object that strategy is applicable in after modification, It is tactful after tactful execution condition, modification after modification specific to execute after movement, modification strategy after the target of strategy execution, modification The priority parameters of strategy execution after principle description and modification.
17. device according to claim 12, which is characterized in that the processing unit is also used to determining at least two pipes The execution condition of reason strategy meets simultaneously, and when management strategy execution movement and/or performance objective overlap, and executes following grasp Make:
A wherein management strategy is executed, pause executes other overlay strategies;
Determine the overlapping that the policy goals of other overlay strategies after the completion of the execution acts have met, then execute the pause Strategy is unavailable;Or, determining that the policy goals of other overlay strategies after the completion of the execution movement do not meet, then executes and be suspended The overlay strategy executed.
18. device according to claim 17, which is characterized in that described device further includes transmission unit, is used for first The unavailable event of management entity reporting policy;
The receiving unit is also used to receive the instruction of the first management entity return;
The processing unit is also used to the instruction according to the first management entity, modifies the not available management strategy or makes institute It is available to state not available management strategy.
19. device according to claim 12, which is characterized in that
Described device further includes transmission unit, is used for the first management entity reporting policy conflict notification message, wherein the plan The identity of the management object is slightly carried in conflict notification message;
The receiving unit is also used to receive the management instruction for the management object of the first management entity return;
The processing unit is also used to determining the execution condition of at least two management strategies while meeting, and management strategy is held When action is made and/or performance objective mutually conflicts, reported by the transmission unit;And instructed according to the management, it is right The management strategy of the management object carries out clash handle.
20. device according to claim 12, which is characterized in that the processing unit is also used to determining at least two The execution condition of management strategy meets simultaneously, when management strategy execution movement and/or performance objective mutually conflict, according to strategy execution Priority parameters, the management strategy that determination need to execute.
21. a kind of tactical management device of network slice, which is characterized in that described device includes:
Transmission unit is used for the second management entity sending strategy management operation request message, the tactical management operation requests Message carries the instruction information of the corresponding management object of instruction management strategy;The management object includes at least one of the following: net Network is sliced example, network slice subnet example and network function example;
Wherein, the tactical management operation requests message is asked for second management entity according to tactical management operation Message is sought, executes and the tactical management of the management object is operated.
22. device according to claim 21, which is characterized in that the instruction information of the management object includes: management pair The identity of elephant and/or class mark.
23. the device according to claim 21 or 22, which is characterized in that
The tactical management operation requests message includes at least one of following operation requests: creative management strategy request, inquiry pipe Strategy request, the request of modification management strategy are managed, management strategy request, the request of activation management strategy is deleted and deactivates management Strategy request.
24. device according to claim 23, which is characterized in that
If the tactical management operation requests message includes creative management strategy request, the tactical management operation requests message Also carry at least one of following information: tactful type, the additional description of the management object, the execution condition of strategy, strategy Execution movement, the target of strategy execution, the priority parameters of the description of tactful principle and strategy execution;
If the tactical management operation requests message includes searching and managing strategy request, the tactical management operation requests message Also carry policy lookup conditional information and/or tactful identification information;
If the tactical management operation requests message includes modification management strategy request, the corresponding pipe of the instruction management strategy The instruction information of reason object includes that the management object that strategy is applicable after modifying preceding or modification indicates information, and the tactical management operates Request message also carries tactful identification information and/or strategy modification content;
If the tactical management operation requests message includes deleting management strategy request, the tactical management operation requests message Also carry tactful identification information;
If the tactical management operation requests message includes activation management strategy request, the tactical management operation requests message Also carry at least one of following information: the activation condition of strategy mark and/or strategy;Or,
If the tactical management operation requests message includes deactivating management strategy request, the tactical management operation requests disappear Breath also carries at least one of following information: the deactivation condition of strategy mark and/or strategy.
25. device according to claim 24, which is characterized in that
The policy lookup conditional information includes at least one of following information: the additional description item of tactful type, policy lookup The priority parameters of part, the execution condition of strategy and strategy execution;
The strategy modification content includes at least one of following information: the additional description for the management object that strategy is applicable in after modification, It is tactful after tactful execution condition, modification after modification specific to execute after movement, modification strategy after the target of strategy execution, modification The priority parameters of strategy execution after principle description and modification.
26. a kind of policy management system of network slice, which is characterized in that the system comprises such as claim 12 to 20 is any Tactical management device described in, and such as the described in any item tactical management devices of claim 21 to 25.
27. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The policy management method of the network slice as described in any one of claims 1 to 11 is realized when execution.
28. a kind of network management device, can run on a memory and on a processor including memory, processor and storage Computer program, which is characterized in that the processor is realized when executing the computer program as any in claim 1 to 11 The policy management method of network slice described in.
CN201711106894.2A 2017-11-10 2017-11-10 Network slice policy management method, device, equipment and system Active CN109768875B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711106894.2A CN109768875B (en) 2017-11-10 2017-11-10 Network slice policy management method, device, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711106894.2A CN109768875B (en) 2017-11-10 2017-11-10 Network slice policy management method, device, equipment and system

Publications (2)

Publication Number Publication Date
CN109768875A true CN109768875A (en) 2019-05-17
CN109768875B CN109768875B (en) 2021-10-15

Family

ID=66449444

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711106894.2A Active CN109768875B (en) 2017-11-10 2017-11-10 Network slice policy management method, device, equipment and system

Country Status (1)

Country Link
CN (1) CN109768875B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111970720A (en) * 2020-08-06 2020-11-20 中国联合网络通信集团有限公司 Management method and device for wireless network sub-slices
WO2020244650A1 (en) * 2019-06-06 2020-12-10 华为技术有限公司 Method, device and system for acquiring performance intention indicator
CN112105026A (en) * 2019-06-17 2020-12-18 华为技术有限公司 Authorization control method, device and storage medium
CN112153719A (en) * 2019-06-28 2020-12-29 中国电信股份有限公司 Communication method, device, system and computer readable storage medium
CN112153700A (en) * 2019-06-26 2020-12-29 华为技术有限公司 Network slice resource management method and equipment
CN112752326A (en) * 2019-10-30 2021-05-04 华为技术有限公司 Network slice management method and device
CN112770336A (en) * 2019-10-21 2021-05-07 中移(成都)信息通信科技有限公司 Equipment testing method and system
CN112996013A (en) * 2019-12-16 2021-06-18 中国电信股份有限公司 Slice management method, device and system
WO2021233063A1 (en) * 2020-05-22 2021-11-25 华为技术有限公司 Method and apparatus for policy control
CN114205837A (en) * 2020-09-02 2022-03-18 ***通信集团安徽有限公司 Scheduling method and device for 5G core network operation, computing equipment and storage medium
WO2022068250A1 (en) * 2020-09-30 2022-04-07 华为技术有限公司 Network management method, apparatus, and system
CN115442216A (en) * 2021-06-04 2022-12-06 ***通信集团浙江有限公司 Network slice fault self-healing method, device, equipment and computer program product

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106937362A (en) * 2015-12-31 2017-07-07 华为技术有限公司 Network section managing device and network section management method
CN107318113A (en) * 2016-04-27 2017-11-03 华为技术有限公司 Network sliced sheet processing method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106937362A (en) * 2015-12-31 2017-07-07 华为技术有限公司 Network section managing device and network section management method
CN107318113A (en) * 2016-04-27 2017-11-03 华为技术有限公司 Network sliced sheet processing method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
3GPP: "《3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Telecommunication managem;Study on management and orchestration of network slicing for next generation network(Release 15)》", 《3GPP TR 28.801 V2.0.0(201709)》 *
ERICSSON: "pCR 28.530 Use case and requirements for activate a network slice instance", 《3GPP TSG SA WG5 (TELECOM MANAGEMENT) MEETING #115 S5-175228》 *
ERICSSON: "pCR 28.530 Use case and requirements for de-activate a network slice", 《3GPP TSG SA WG5 (TELECOM MANAGEMENT) MEETING #115 S5-175234》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020244650A1 (en) * 2019-06-06 2020-12-10 华为技术有限公司 Method, device and system for acquiring performance intention indicator
CN112105026A (en) * 2019-06-17 2020-12-18 华为技术有限公司 Authorization control method, device and storage medium
WO2020258920A1 (en) * 2019-06-26 2020-12-30 华为技术有限公司 Network slice resource management method and apparatus
CN112153700B (en) * 2019-06-26 2022-03-29 华为技术有限公司 Network slice resource management method and equipment
CN112153700A (en) * 2019-06-26 2020-12-29 华为技术有限公司 Network slice resource management method and equipment
CN112153719B (en) * 2019-06-28 2022-08-02 中国电信股份有限公司 Communication method, device, system and computer readable storage medium
CN112153719A (en) * 2019-06-28 2020-12-29 中国电信股份有限公司 Communication method, device, system and computer readable storage medium
CN112770336A (en) * 2019-10-21 2021-05-07 中移(成都)信息通信科技有限公司 Equipment testing method and system
CN112752326A (en) * 2019-10-30 2021-05-04 华为技术有限公司 Network slice management method and device
CN112996013A (en) * 2019-12-16 2021-06-18 中国电信股份有限公司 Slice management method, device and system
CN112996013B (en) * 2019-12-16 2022-06-07 中国电信股份有限公司 Slice management method, device and system
WO2021233063A1 (en) * 2020-05-22 2021-11-25 华为技术有限公司 Method and apparatus for policy control
CN113709766A (en) * 2020-05-22 2021-11-26 华为技术有限公司 Method and apparatus for policy control
CN111970720A (en) * 2020-08-06 2020-11-20 中国联合网络通信集团有限公司 Management method and device for wireless network sub-slices
CN111970720B (en) * 2020-08-06 2023-04-18 中国联合网络通信集团有限公司 Management method and device for wireless network sub-slices
CN114205837A (en) * 2020-09-02 2022-03-18 ***通信集团安徽有限公司 Scheduling method and device for 5G core network operation, computing equipment and storage medium
CN114205837B (en) * 2020-09-02 2023-09-05 ***通信集团安徽有限公司 Scheduling method, device, computing equipment and storage medium for 5G core network operation
WO2022068250A1 (en) * 2020-09-30 2022-04-07 华为技术有限公司 Network management method, apparatus, and system
CN115442216A (en) * 2021-06-04 2022-12-06 ***通信集团浙江有限公司 Network slice fault self-healing method, device, equipment and computer program product
CN115442216B (en) * 2021-06-04 2023-09-05 ***通信集团浙江有限公司 Network slice fault self-healing method, device, equipment and computer storage medium

Also Published As

Publication number Publication date
CN109768875B (en) 2021-10-15

Similar Documents

Publication Publication Date Title
CN109768875A (en) Policy management method, device, equipment and the system of network slice
CN104508627B (en) Mix cloud environment
US9612821B2 (en) Predicting the success of a continuous software deployment pipeline
US9654928B2 (en) Tracking information technology (IT) assets
CN108370341B (en) Resource allocation method, virtual network function manager and network element management system
CN112134741B (en) Client-directed networking restrictions in a distributed system
US20200287823A1 (en) Device deployment and network management using a self-service portal
US8725859B2 (en) Service network discovery
US11405259B2 (en) Cloud service transaction capsulation
CN107526659A (en) Method and apparatus for standby
CN107534570A (en) Virtualize network function monitoring
CN107921981A (en) The monitoring and control of distributed machines
CN106063194B (en) Monitoring system and monitoring method for software defined network
CN108696400A (en) network monitoring method and device
EP3574674B1 (en) A network monitoring entity, method, system and computer program for a communication network implementing network slices
CN108243012A (en) Charging application processing system, method and device in online charging system OCS
US20160119189A1 (en) System for controlling carrier virtual network
CN109787793A (en) Method, apparatus, equipment and the system of network slice management
CN108268211A (en) A kind of data processing method and device
US20130205019A1 (en) Systems and methods for managing api interactions
CN105677492B (en) A kind of reliability application execution method of terminaloriented
CN109391503A (en) A kind of network slice management method and device
CN114466005A (en) Internet of things equipment arrangement
CN109274534A (en) A kind of monitoring and managing method and equipment, communication system of network slice
CN107046581A (en) A kind of monitoring method, device and the server of service operation state

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant