The present disclosure pertains to the field of communications networks, and in particular to interaction between 5G and non-5G management function (MF) entities.
Modern approaches to network communications have included concepts of providing offerings of telecommunication services as to customer. Indeed, the Third Generation Partnership Project (3GPP) Technical Reference (TR) 28.801 has proposed the introduction of a number of such service offerings, notably Communication as a Service (CaaS), Network Slice as a Service (NSaaS), Network Slice Subnet as a Service (NSSaaS) and Infrastructure as a Service (IaaS). These service offerings employ a concept known as network slicing, in which pooled network resources are used to create a series of network slices. Within each slice, one or more existing network nodes are instantiated with those network functions (NFs) that provide a dynamic service level capability for a particular slice.
The use of network slices permits only those NFs that are appropriate, to be instantiated, and only as and when appropriate. In some examples, the NF can be located in the control plane (CP). In some examples, the NF can be located in the user plane (UP). In some examples, the NF can be located in the management plane (MP).
In order to provision these four types of telecommunication services, it would be beneficial to identify new network management functions (MFs) for supporting each service, as well as new interfaces for the various network MFs (NMFs). Further, it would be beneficial to identify new interfaces that allow such services to access non-3GPP and non-5G network management system capabilities.
An object of embodiments of the present disclosure is to provide techniques for management of network slices and associated services.
An aspect/embodiment of the present disclosure provides a method of providing telecommunication communication services to a customer, comprising, at a network MF of an telecommunication service provider: receiving an order in accordance with an agreement as to terms of a telecommunications service offering; accessing network resources that satisfy the terms of the service offering; initializing an instance of the service offering using the resources accessible thereby; creating at least one interface by which the service offering is made available to the customer; and exposing each of the at least one created interfaces to enable an MF of the customer to use the service offering.
In any preceding aspect/embodiment, the agreement can be negotiated with the customer by a network service MF (SMF). In an embodiment, the network SMF can receive directions from a BSS network MF as to the terms of the service offering.
In any preceding aspect/embodiment, the step of creating can comprise creating an SMF to SMF interface between the network SMF and an SMF of the customer. In an embodiment, the SMF to SMF interface can comprise at least one of a template request interface and a service requirement interface. In an embodiment, the SMF to SMF template request interface can specify at least one service offering selected from a group consisting of CaaS, NSaaS, NSSaaS and IaaS.
In any preceding aspect/embodiment, the step of creating can comprise creating an SMF to network MF interface between the network SMF and the network MF. In an embodiment, the SMF to network MF interface can comprise at least one of a template request interface, a service requirement interface, a network requirement interface and a resource management interface. In an embodiment, the network MF can comprise at least one of: a NSMF, where the customer MF is a CSMF and the SMF to network MF template request interface specifies an NSaaS offering; a NSSMF, where the customer MF is an NSMF and the SMF to network MF template request interface specifies an NSSaaS offering; and an InMF, where the customer MF is an NSSMF and the SMF to network MF template request interface specifies an IaaS offering. In an embodiment, the exposed at least one interface enabling the customer MF to use the service offering of the network MF comprises at least one of an RM interface and a LM interface.
In any preceding aspect/embodiment, the step of creating can comprise creating an interface between the network MF and another MF to support at least one of RM management and a LM function.
In any preceding aspect/embodiment, the step of creating can comprise creating an interface between an NSMF and at least one of an EM MF, a DM MF and a MANO MF. In an embodiment, the exposed at least one interface can perform interface conversion between the NSMF and the at least one of the EM MF, DM MF and MANO MF.
An aspect/embodiment of the present disclosure provides a network MF of a telecommunications service provider, comprising: a processor and a non-transitory memory. The memory is for storing instructions that when executed by the processor causes the network MF to provide a telecommunications communication service to a customer by: receiving an order in accordance with an agreement as to terms of a telecommunications service offering; accessing network resources that satisfy the terms of the service offering; initializing an instance of the service offering using the resources accessible thereby; creating at least one interface by which the service offering is made available to the customer; and exposing each of the at least one created interfaces to enable an MF of the customer to use the service offering.
Further features and advantages of the present disclosure will become apparent from the following detailed description, taken in combination with the appended drawings, in which:
It will be noted that throughout the appended drawings, like features are identified by like reference numerals.
In the following description, features of the present disclosure are described by way of example embodiments. For convenience of description, these embodiments make use of features and terminology known from 4G and 5G networks as defined by the Third Generation Partnership Project (3GPP). However, it shall be understood that the present disclosure is not limited to such networks. Rather, methods and systems in accordance with the present disclosure may be implemented in any network in which a mobile device may connect to the network through at least one access point, and subsequently be handed-over to at least one other access point during the course of a communications session.
The memory 108 may comprise any type of non-transitory system memory, readable by the processor 106, such as static random-access memory (SRAM), dynamic random access memory (DRAM), synchronous DRAM (SDRAM), read-only memory (ROM), or a combination thereof. In specific embodiments, the memory 108 may include more than one type of memory, such as ROM for use at boot-up, and DRAM for program and data storage for use while executing programs. The bus 112 may be one or more of any type of several bus architectures including a memory bus or memory controller, a peripheral bus, or a video bus.
The electronic device 102 may also include one or more network interfaces 110, which may include at least one of a wired network interface and a wireless network interface. As illustrated in
The mass storage 114 may comprise any type of non-transitory storage device configured to store data, programs, and other information and to make the data, programs, and other information accessible via the bus 112. The mass storage 114 may comprise, for example, one or more of a solid-state drive, hard disk drive, a magnetic disk drive, or an optical disk drive. In some embodiments, mass storage 114 may be remote to the electronic device 102 and accessible through use of a network interface such as interface 110. In the illustrated embodiment, mass storage 114 is distinct from memory 108 where it is included, and may generally perform storage tasks compatible with higher latency, but may generally provide lesser or no volatility. In some embodiments, mass storage 114 may be integrated with a memory 108 to form an heterogeneous memory.
The optional video adapter 116 and the I/O interface 118 (shown in dashed lines) provide interfaces to couple the electronic device 102 to external input and output devices. Examples of input and output devices include a display 124 coupled to the video adapter 116 and an I/O device 126 such as a touch-screen coupled to the I/O interface 118. Other devices may be coupled to the electronic device 102, and additional or fewer interfaces may be utilized. For example, a serial interface such as Universal Serial Bus (USB) (not shown) may be used to provide an interface for an external device. Those skilled in the art will appreciate that in embodiments in which ED 102 is part of a data center, I/O interface 118 and Video Adapter 116 may be virtualized and provided through network interface 110.
In some embodiments, electronic device 102 may be a standalone device, while in other embodiments electronic device 102 may be resident within a data center. A data center, as will be understood in the art, is a collection of computing resources (typically in the form of servers) that can be used as a collective computing and storage resource. Within a data center, a plurality of servers can be connected together to provide a computing resource pool upon which virtualized entities can be instantiated. Data centers can be interconnected with each other to form networks consisting of pools computing and storage resources connected to each by connectivity resources. The connectivity resources may take the form of physical connections such as Ethernet or optical communications links, and may include wireless communication channels as well. If two different data centers are connected by a plurality of different communication channels, the links can be combined together using any of a number of techniques including the formation of link aggregation groups (LAGs). It should be understood that any or all of the computing, storage and connectivity resources (along with other resources within the network) can be divided between different sub-networks, in some cases in the form of a resource slice. If the resources across a number of connected data centers or other collection of nodes are sliced, different network slices can be created.
As may be seen in
The application platform 204 provides the capabilities for hosting applications and includes a virtualization manager 210 and network application platform services 212. The virtualization manager 210 supports a flexible and efficient multi-tenancy run-time and hosting environment for applications 214 by providing Infrastructure as a Service (IaaS) facilities. In operation, the virtualization manager 210 may provide a security and resource “sandbox” for each application being hosted by the platform 204. Each “sandbox” may be implemented as a Virtual Machine (VM) 216 that may include an appropriate operating system and controlled access to (virtualized) hardware resources 206 of the server 200. The network application platform services 212 provide a set of middleware application services and infrastructure services to the applications 214 hosted on the application platform 204, as will be described in greater detail below.
Applications 214 from vendors, service providers, and third-parties may be deployed and executed within a respective Virtual Machine 216. For example, MANagement and Orchestration (MANO) functions and Service Oriented Network Auto-Creation (SONAC) functions (or any of Software Defined Networking (SDN), Software Defined Topology (SDT), Software Defined Protocol (SDP) and Software Defined Resource Allocation (SDRA) controllers that may in some embodiments be incorporated into a SONAC controller) may be implemented by means of one or more applications 214 hosted on the application platform 204 as described above. Communication between applications 214 and services in the server 200 may conveniently be designed according to the principles of Service-Oriented Architecture (SOA) known in the art.
Communication services 218 may allow applications 214 hosted on a single server 200 to communicate with the application-platform services 212 (through pre-defined Application Programming Interfaces (APIs) for example) and with each other (for example through a service-specific API).
A service registry 220 may provide visibility of the services available on the server 200. In addition, the service registry 220 may present service availability (e.g. status of the service) together with the related interfaces and versions. This may be used by applications 214 to discover and locate the end-points for the services they require, and to publish their own service end-point for other applications to use.
Mobile-edge Computing allows cloud application services to be hosted alongside virtualized mobile network elements in data centers that are used for supporting the processing requirements of the Cloud-Radio Access Network (C-RAN). For example, eNodeB or gNB nodes may be virtualized as applications 214 executing in a VM 216. Network Information Services (NIS) 222 may provide applications 214 with low-level network information. For example, the information provided by NIS 222 may be used by an application 214 to calculate and present high-level and meaningful data such as: cell-ID, location of the subscriber, cell load and throughput guidance.
A Traffic Off-Load Function (TOF) service 224 may prioritize traffic, and route selected, policy-based, user-data streams to and from applications 214. The TOF service 224 may be supplied to applications 214 in various ways, including: A Pass-through mode where (either or both of uplink and downlink) traffic is passed to an application 214 which can monitor, modify or shape it and then send it back to the original Packet Data Network (PDN) connection (e.g. 3GPP bearer); and an End-point mode where the traffic is terminated by the application 214 which acts as a server.
As may be appreciated, the server architecture of
Other virtualization technologies are known or may be developed in the future that may use a different functional architecture of the server 200. For example, Operating-System-Level virtualization is a virtualization technology in which the kernel of an operating system allows the existence of multiple isolated user-space instances, instead of just one. Such instances, which are sometimes called containers, virtualization engines (VEs) or jails (such as a “FreeBSD jail” or “chroot jail”), may emulate physical computers from the point of view of applications running in them. However, unlike virtual machines, each user space instance may directly access the hardware resources 206 of the host system, using the host systems kernel. In this arrangement, at least the virtualization layer 208 of
Resource 1332 is partitioned to allocate resources to Slice A 332A, and Slice B 332B. A portion 332U of the resources available to Resource 1332 remains unallocated. Those skilled in the art will appreciate that upon allocation of the network resources to different slices, the allocated resources are isolated from each other. This isolation, both in the compute and storage resources, ensures that processes in one slice do not interact or interfere with the processes and functions of the other slices. This isolation can be extended to the connectivity resources as well. Connectivity Resource 334 is partitioned to provide connectivity to Slice A 334A and Slice B 334B, and also retains some unallocated bandwidth 334U. It should be understood that in any resource that either has unallocated resources or that has been partitioned to support a plurality of resources, the amount of the resource (e.g. the allocated bandwidth, memory, or number of processor cycles) can be varied or adjusted to allow changes to the capacity of each slice. In some embodiments, slices are able to support “breathing”, which allows the resources allocated to the slice to increase and decrease along with any of the available resources, the required resources, an anticipated resource need, or other such factors, alone or in combination with each other. In some embodiments the allocation of resources may be in the form of soft slices in which a fixed allocation is not committed and instead the amount of the resource provided may be flexible. In some embodiments, a soft allocation may allocate a percentage the resource to be provided over a given time window, for example 50% of the bandwidth of a connection over a time window. This may be accompanied by a minimum guaranteed allocation. Receiving a guarantee of 50% of the capacity of a connectivity resource at all times may provide very different service characteristics than receiving 50% of the capacity of the connectivity resource over a ten second window.
Resource 2336 is partitioned to support allocations of the available compute and storage resources to Slice A 336A, Slice C 336C and Slice B 336B. Because there is no allocation of resources in connectivity resource 334 to Slice C, Resource 2336 may, in some embodiments, not provide a network interface to Slice C 336C to interact with connectivity resource 334. Resource 2336 can provide an interface to different slices to Connectivity Resource 338 in accordance with the slices supported by Connectivity Resource 338. Connectivity Resource 340 is allocated to Slice A 340A and Slice C 340C with some unallocated capacity 340U. Connectivity Resource 340 connects Resource 2336 with Resource 3342.
Resource 3342 provides compute and storage resources that are allocated exclusively to Slice C 342C, and is also connected to Connectivity Resource 344 which in addition to the unallocated portion 344U includes an allocation of Connectivity Resource 344A to slice A. It should be noted that from the perspective of functions or processes within Slice A, Resource 3342 may not be visible. Connectivity Resource 344 provides a connection between Resource 3342 and Resource 4346, whose resources are allocated entirely to Slice A 346A. Resource 4346 is connected to Resource 1332 by Connectivity Resource 348, which has a portion of the connection allocated to Slice A 348A, while the balance of the resources 348U are unallocated.
It should be understood that within the storage and compute resources illustrated in
The European Telecommunications Standards Institute (ETSI) has developed a set of standards for Network Function Virtualization (NFV) MANagement and Orchestration (MANO). As illustrated in
The NFV MANO 432 can communicate with an OSS/BSS system 450 through OS-MA interface, and to a Service, VNF & Infrastructure description database 452 though an SE-MA interface. The Service, VNF & Infrastructure description database 452 can contain operator information about the services, VNFs and infrastructure deployed in the network. Service, VNF & Infrastructure description database 452 and OSS/BSS 450 can be connected to each other so that the OSS/BSS 450 can update and maintain the Service, VNF & Infrastructure description database 452 as needed.
NFVI 470 interacts with the VIM 448 through the NF-VI interface. Underlying resources can often be classified as compute resources 474, memory resources 478 and network resources 482. Memory resources 478 may also be referred to as storage resources, while network resources 482 may also be referred to as connectivity resources. A virtualization layer 472 allows for the abstraction of the underlying resources which it is connected to through a Vi-HA interface. It should be understood that the underlying resources may be either physical or virtual resources. The Virtualization layer 472 allows for the abstraction of the underlying resources into virtual compute resources 476, virtual memory resources 480 and virtual network resources 484. These virtualized resources can be provided to the element management system 454 through the VN-NF interface so that they can be used as the resources upon which the VNFs (shown as VNF1458, VNF2462 and VNF 3466) can be instantiated. EM 454 can be connected to the VNFM 446 within NFV MANO 432 through interface VE-VNFM, and to the OSS/BSS 450 through another interface. Each VNF instantiated upon the virtual resources provided by NFVI 470 can be associated with an element manager (EM1456, EM2460 and EM3464). The use of an element manager allows the OSS/BSS to have two paths through which the VNFs can be managed. A VNF can be managed through the VNFM 446, or through the element manager associated with the VNF. Each element manager can provide the same management controls that it would otherwise provide for a physical network element. Thus, the OSS/BSS 450 can treat each VNF as a conventional network function. Modification to the resource allocation associated with a VNF can be requested by an element manager through the VNFM 446, or through a request from the OSS/BSS 450 over the OS-MA interface.
The virtualization of network functions allows functions to be deployed with the resources that are required. As the demand for the functions increases, the resources allocated to the functions can be increased, which avoids an intentional over provisioning of the functions at instantiation. In conjunction with the above described slicing and data center utilization, flexible networks can be deployed in a manner that allows an operator to dynamically modify the connectivity between functions (thus changing the logical topology of the network) and to dynamically modify the location of and resources allocated to the network functions (thus changing the physical topology of the underlying network). Additional resources at the same location can be allocated to existing function to allow for scaling up of an existing function, and resources can be removed from an allocation to allow for a scaling down of a function. Resources from more than one resource pool or data center can be allocated to a function so that it can be scaled out, and resources from different pools can be removed to allow a function to be scaled in. Functions can be moved by transferring their state information to another network function, and in some instances, a function can be moved through a combination of scaling out and scaling in functions.
3GPP TR 28.801 describes three functional entities for managing one or more NSIs to support communication services. These communication services and the functional entities may be, in some embodiments, designed to support fifth generation mobile communications networks (also referred to as 5G). These functional entities include:
Turning now to
The CSP 520 comprises at least one network-side MF including without limitation, a CSMF 521, an NSMF 522, an NSSMF 523 and an Infrastructure Management Function (InMF) 524.
The CSMF 521 is configured to instantiate an interface 503 and expose the interface 503 to the CSC 510 to enable the CSC 510 to use a CaaS offering provided by the CSP 520. Thus it may be said that the interface 503 between the CSMF 521 and the CSC 510 constitutes an exposed interface.
The NSMF 522 is configured to instantiate an interface 525 and expose the interface 525 to the CSMF 521 to enable the CSMF 521 to use a NSaaS offering provided by the NSMF 522. Further, the NSSMF 523 is configured to instantiate an interface 526 and expose the interface 526 to the NSMF 522 to enable the NSMF 522 to use an NSSaaS offering provided by the NSSMF 523. Still further, the InMF 524 is configured to instantiate an interface 527 and expose the interface 527 to the NSSMF 523 to enable the NSSMF 523 to use an IaaS offering provided by the InMF 524.
Turning now to
The slice provider 530 comprises at least one network-side MF including without limitation, an NSMF 522, an NSSMF 523 and an InMF 524.
The customer-side CSP 528 comprises at least one customer-side MF including without limitation, a CSMF 521 that provides it with access to communication services.
The network-side NSMF 522 is configured to instantiate an interface 505 and expose the interface 505 to enable the customer-side CSMF 521 to use network slice-related capabilities provided by the network-side NSMF 522 in the form of an NSaaS offering. Thus it may be said that the interface 505 between the network-side NSMF 522 and the customer-side CSMF 521 of the customer-side CSP 528 constitutes an exposed interface.
The network-side NSSMF 523 is configured to instantiate an interface 526 and expose the interface 526 to enable the network-side NSMF 522 to use a NSSaaS offering provided by the NSSMF 523. Further, the InMF 524 is configured to instantiate an interface 527 and expose the interface to enable the NSSMF 523 to use an IaaS offering provided by the InMF 524.
Turning now to
The subslice provider 540 comprises at least one network-side MF including without limitation, an NSSMF 523 and an InMF 524.
The customer side subslice customer 550 comprises at least one customer-side MF including without limitation, a CSMF 521 and an NSMF 522. The customer-side NSMF 522 is configured to instantiate interface 525 and expose interface 525 to enable the customer-side CSMF 521 to use an NSaaS provided by the customer side NSMF 522.
The network-side NSSMF 523 is configured to instantiate an interface 507 and expose the interface 507 to enable the customer-side NSMF 522 to use network slice subnet-related capabilities provided by the NSSMF 523 in the form of the NSSaaS offering. Thus it may be said that the interface 507 between the network-side NSSMF 523 and the customer-side NSMF 522 and of the customer-side subslice customer (NSP) 530 constitutes an exposed interface.
The network-side InMF 524 is configured to instantiate interface 527 and expose interface 527 to enable the network-side NSSMF 523 to use an IaaS offering provided by the network-side InMF 524.
Turning now to
The infrastructure provider 550 comprises at least one network-side MF including without limitation, an InMF 524.
The customer side infrastructure customer 541 comprises at least one customer-side MF including without limitation, a CSMF 521 that provides with access to communication services, an NSMF 522 that is configured to instantiate interface 525 and expose interface 525 to enable the CSMF 521 to user an NSaaS offering provided by the NSMF 522 and an NSSMF 523 that is configured to instantiate interface 526 and expose interface 526 to enable NSMF 522 to use an NSSaaS offering provided by NSSMF 523.
The network side InMF 524 is configured to instantiate an interface 509 and expose the interface 506 to enable the customer-side NSSMF 523 to use infrastructure-related capabilities provided by the network-side InFM 524 in the form of the IaaS offering. Thus it may be said that the interface 507 between the network-side InMF 524 and the customer-side NSSMF 523 and of the customer-side infrastructure customer (NSP) 540 constitutes an exposed interface.
Aspects of the present disclosure provide techniques enabling 5G management entities to interact with legacy (non-5G) management entities to provide 5G management functionality. Specific examples, which may be understood by reference to
(1) CSMF 521—service management (SM), may use interface 612 for providing a vertical service instance slice (e.g. meter reading slice) to a (B)SM 611 of the CSC 510 such as without limitation, a vertical service operator (e.g., water department). Although the B(S)M 621 is shown in
(2) NSMF 522 of the slice provider NSP 530-CSMF 521 of the CSP 520
(3) NSSMF 523 of the subslice provider 540—NSMF 522 of the subslice customer 530, which may in some examples be similar to (2) above, except that part of the network is managed by the 3rd party NSMF 522.
(4) NSMF 522 communication with a domain manager DM 632 (
(5) different architectures may make use of traditional or legacy and/or non-5G network management system components including without limitation, a network manager (NM) 631, a DM 632, and/or an EM 654 as well as the MANO 432. Those schemes may be used for different services based on the slice concept
(6) An architecture for using infrastructure as a service for slicing part.
In the example of
By contrast, the NMS on the network-side 502 is subdivided into a plurality of planes, including without limitation, a BSS plane 601, a service management plane 602 and a network management plane 603. The BSS plane 601 and the service management plane 602 lie on opposite sides of a notional boundary 604 therebetween and the service management plane 602 and the network management plane 603 lie on opposite sides of a notional boundary 605 therebetween.
The BSS 450 lies in the BSS plane 601 and is coupled to and communicates 623 with the network-side (B)SM 621 (in the service management plane 602) by which the BSS 450 may provide directions to the network-side (B)SM 621 in the context of the negotiations between the network-side (B)SM 621 and the customer-side (B)SM 611 to arrive at the SLA.
The network-side (B)SM 621 and the CSMF 521 lie in the service management plane 602. In some examples, the service management plane 602 may be subdivided by a notional boundary 606 separating the network-side (B)SM 621 and the CSMF 521. It will be appreciated that, in some examples, some of the functions attributed to the network-side CSMF 521 in the present disclosure may be moved across such notional boundary 606 to the network-side (B)SM 621 and/or vice versa.
The network-side (B)SM 621 is coupled to and communicates with the customer-side (B)SM 611 via an interface 612 to arrive at the SLA. Thus it may be said that the interface 612 between the network-side (B)SM 621 and the customer-side (B)SM 611 constitutes an exposed interface.
By way of non-limiting example, the interactions between the customer-side (B)SM 611 and the network side (B)SM 621 along the exposed interface 612 include the interfaces discussed below in detail under the heading “SM(C)-SM(P) EXPOSED INTERFACES” and may include, without limitation, a template management interface, a service requirement management interface and/or a service management interface as discussed therein.
Additionally, the network-side (B)SM 621 is coupled to and communicates 622 with the CSMF 521 to provide orders to the CSMF 521 in accordance with the terms of the SLA, once negotiated, for the CaaS offering 503. Thus it may be said that the interface 622 between the network-side (B)SM 621 and the CSMF 521 constitutes an exposed interface.
By way of non-limiting example, the interactions between the network-side (B)SM 621 and the CSMF 521 along the exposed interface 622 include the interfaces discussed below in detail under the heading “SM-CSMF EXPOSED INTERFACES” and may include, without limitation, a template management interface, a service requirement management interface, a network resource management interface, a service management interface and/or a communication service instance (CSI) lifecycle management (LM) interface as discussed therein.
The network-side (B)SM 621 is coupled to and communicates 623 with the BSS 450 to receive directions therefrom in the context of the negotiations between it and the customer-side (B)SM 611 to arrive at the SLA.
The CSMF 521 is coupled to and provides the CaaS offering 503 to the CSC 510 in accordance with the terms of the SLA once negotiated, and is coupled to and communicates 525 with the NSMF 522 (in the 5G part of the network management plane 603) to obtain access to network slice-related capabilities therefrom. In addition, the CSMF 521 is coupled to and communicates 625 with a legacy (non-5G) NM 631 (in the non-5G part of the network management plane 603), that may be considered to be part of a legacy OSS 630, to obtain access to non-5G network capabilities therefrom in a manner similar to the network slice-related capabilities it receives from the NSMF 522, but in a non-5G context, to manage legacy EMs 654 and/or legacy DMs 632 (and thus indirectly manage and/or interact with other legacy EMs 654).
All remaining network-side MFs reside in the network management plane 603. These include without limitation, the NSMF 522, the NSSMF 523, the NM 631, interface adaptors 641, 642, the associated EMs 654 and/or DMs 643 and/or the MANO 432. As discussed above, in some examples, the NMS 502 may also be subdivided into 5G network components and legacy or non-5G components. In
The NSMF 522 is coupled to and communicates 525 with the CSMF 521 to provide access to network slice-related capabilities and is coupled to and communicates 526 with the NSSMF 523 to obtain access to network slice subnet-related capabilities therefrom. Additionally in some examples, the NSMF 522 may be coupled to and communicate 526 with interface adaptor 641 in order to manage and/or interact with a legacy EM 454 and/or a legacy DM 632 (and thus indirectly manage other legacy EMs 654). Further, in some examples, the NSMF 522 may be coupled to and communicate 526 with interface adaptor 642 in order to manage and/or interact with a MANO 432.
The NSSMF 523 is coupled to and communicates 526 with the NSMF 522 to provide access to network slice subnet-related capabilities. Additionally in some examples, the NSSMF 522 may be coupled to and communicate with a legacy EM 654 to manage and/or interact with it and/or with a legacy DM 632 to manage and/or interact with it (and thus indirectly manage and/or interact with other legacy EMs 654) along an itf-n interface.
The interface adaptor 641 is coupled to and communicates 526 with the NSMF 522 and with a legacy EM 654 and/or a legacy DM 632 along an itf-n interface to allow the NSMF 522 to manage and/or interact with them (and through the DM 632, to indirectly manage and/or interact with other legacy EMs 654) by implementing the functionality of a notional NSSMF 623 through performing interface conversion functions. Thus it may be said that the interface adaptor 641 between the NSMF 522 and the legacy EM 654 and/or legacy DM 632 (and thus, indirectly other legacy EMs 654) constitutes an exposed interface.
By way of non-limiting example the interactions between the NSMF 522 and the legacy EM 654 and/or legacy DM 632 (and thus, indirectly other legacy EMs 654) along the exposed interface adaptor 641 include the interface discussed below in detail under the heading “Nsmf-nssmf to itf-n” and may include without limitation, an NSSI LM interface to Generic/Commin Interface IRPs, an NSSI LM interface to CM related Interface IRPs, an NSSI LM interface to Son related Interface IRPs, an NSSI PM interface to PM file format/collection & Trace relate Interface IRPs and/or an NSSI FM interface to FM related Interface IRPs as discussed therein.
The interface adaptor 642 is coupled to and communicates 526 with the NSMF 522 and with the MANO 432 along an Os-Ma-nfvo interface to allow the NSMF 522 to manage and/or interact with the MANO 432 by implementing the functionality of a notional NSSMF 623 through performing interface conversion functions. Thus it may be said that the interface adaptor 642 between the NSMF 522 and the MANO 432 constitutes an exposed interface.
By way of non-limiting example the interactions between the NSMF 522 and the MANO 432 along the interface adaptor 642 include the interface discussed below in detail under the heading “Nsmf-nssmf to Os-Ma-Nfvo” and may include without limitation, an NSST, SERVICEREQUIRE management interface to NSD interface, an NSSI LM interface to NS LM interface, an NSSI PM interface to NS PM interface and/or an NSSI FM interface to NS FM interface as discussed therein.
The NM 631 is coupled to and communicates 625 with the CSMF 521 and with a legacy EM 654 and/or a legacy DM 632 along an itf-n interface to allow the CSMF 521 to manage and interact with them (and through the DM 632, to indirectly manage and/or interact with other legacy EMs 654.
It should be understood that in many implementations, the resources under the management of the NSMF 522 may have been obtained from different infrastructure or resource providers. Each of these resource providers may have a different management mechanism. The resources may have been provided to a service provider in the form of a network slice. When an NSMF 522 interacts with a resource, it may do so through an NSSMF 523, 623, through a DM 632 or through a MANO 432. Different resources may be accessible through one of the available interfaces. Some resources may be available through more than one of the interfaces, while others are available through only one of the interfaces. Thus, when sending an instruction or configuration information, the NSMF 522 may select one of a plurality of interfaces in accordance with the nature of the interaction and in accordance with the resource with which it is to communicate.
It should also be understood that where an interface is illustrated between the NSMF 522 and either the DM 632 or the MANO 432, in some embodiments the interface adaptors 641, 642 (which may be used as a translation between defined Application Program Interfaces (APIs)), may be integrated in one or both of the sides of the communication. For example, in some embodiments, an NSMF 522 may be configured so that it does not need an external interface to communicate with a particular DM 632, while it may need an interface to communicate with a MANO 432 (or even with a different DM 632). The modifications to allow an NSMF 522 and DM 632 (or an NSMF 522 and a MANO 432) to communicate with each other can be implemented in one or both of the entities. This allows for the NSMF 522 to be modified so that it can interact with any MANO 432, or it may allow for both the NSMF 522 and MANO 432 to be configured to communicate without an interface. Those skilled in the art will appreciate that this may be considered as the incorporation of the interface in one or both of the functional entities.
In
Thus, as in
In this example, after negotiation 612 between customer-side and network-side (B)SMs 611, 621, the NSMF 522 can provide the MF of a Network Slice Instance (NSI) to the customer-side CSMF 521 so that the CSP 520 can use the provided NSI to support a communication service.
The NSMF 522 is coupled to and provides the NSaaS offering 505 to the customer-side CSMF 521 of the CSP 20 in accordance with the terms of the SLA once negotiated.
By way of non-limiting example, the interactions between the network-side NSMF 522 and the customer-side CSMF 521 along the exposed interface 505 include the interfaces discussed below in detail under the heading “CSMF-NSMF EXPOSED INTERFACES” and may include, without limitation, a network service template (NST) management interface (which may comprise, without limitation, a template management interface, a network requirement management interface and/or a network resource management interface), an NSI LM interface, an NSI lifecycle change notification interface, an NSI performance management (PM) interface, an NSI fault management (FM) interface and/or a network slice subnet template (NSST) management interface as discussed therein. In some examples, the NSI lifecycle change notification interface, the NSI PM interface, the NSI FM interface may use or be substantially similar to the interface discussed below in detail under the heading <specify> and entitled “Query Service Interface”. In some examples, the NSST manage interface may be substantially similar to the interface discussed below in detail under the heading “NSSI-NSSMF EXPOSED INTERFACES” and entitled “NSST Management Interface”.
Further, the NSMF 522 is coupled to and communicates 526 with the NSSMF 523 to obtain access to network slice subnet-related capabilities therefrom. Additionally in some examples, the NSMF 522 may be coupled to and communicate 526 with interface adaptor 641 in order to manage and/or interact with a legacy EM 454 and/or a legacy DM 632 (and thus indirectly manage other legacy EMs 654). Further, in some examples, the NSMF 522 may be coupled to and communicate 526 with interface adaptor 642 in order to manage and/or interact with a MANO 432.
The NSSMF 523 is coupled to and communicates 526 with the NSMF 522 to provide access to network slice subnet-related capabilities. Additionally in some examples, the NSSMF 522 may be coupled to and communicate with a legacy EM 654 to manage and/or interact with it and/or with a legacy DM 632 to manage and/or interact with it (and thus indirectly manage and/or interact with other legacy EMs 654) along an itf-n interface.
The interface 641 is coupled to and communicates 526 with the NSMF 522 and with a legacy EM 654 and/or a legacy DM 632 along an itf-n interface to allow the NSMF 522 to manage and/or interact with them (and through the DM 632, to indirectly manage and/or interact with other legacy EMs 654) by implementing the functionality of a notional NSSMF 623 through performing interface conversion functions.
The interface adaptor 642 is coupled to and communicates 526 with the NSMF 522 and with the MANO 432 along an Os-Ma-nfvo interface to allow the NSMF 522 to manage and/or interact with the MANO 432 by implementing the functionality of a notional NSSMF 623 through performing interface conversion functions.
In
Similarly, there may or may not be a network-side NSMF 522 (shown in dashed outline) in the network management plane 603 but if there is, it is not involved in the provision of the at least one NSSaaS offering 507.
Thus, as in
In this example, after negotiation 612 between customer-side and network-side (B)SMs 611, 621, a (virtual) NSSMF 523, 623 can provide the MF of a Network Slice Subnet Instance (NSSI) to the customer-side NSMF 522 so that the subslice customer (NSP) 530 can use the provided NSSI to form a network slice that may be used to support communication service.
The NSSMF 523 is coupled to and provides an NSSaaS offering 507 to the customer-side NSMF 522 of the subslice customer (NSP) 530 in accordance with the terms of the SLA once negotiated.
By way of non-limiting example, the interactions between the network-side NSSMF 523 and the customer-side NSMF 521 along the exposed interface 507 include the interfaces discussed below in detail under the heading “NSMF-NSSMF EXPOSED INTERFACES” and may include, without limitation, a network subnet service template (NSST) management interface (which may comprise, without limitation, an NSST management interface a network requirement management interface and/or a network resource management interface), an NSSI LM interface, an NSSI lifecycle change notification interface, an NSSI PM interface and/or an NSSI FM interface as discussed therein. In some examples, the NSSI lifecycle change notification interface, the NSSI PM interface and/or the NSSI FM interface may be substantially similar to respectively, the NSI lifecycle change notification interface, the NSSI PM interface and the NSSI FM interface.
Further, in some examples, the NSSMF 522 may be coupled to and communicate with a legacy EM 654 to manage and/or interact with it and/or with a legacy DM 632 to manage and/or interact with it (and thus indirectly manage and/or interact with other legacy EMs 654) along an itf-n interface.
The interface adaptor 641 is coupled to and provides an NSSaaS offering 507 to the customer-side NSMF 522 of the subslice customer (NSP) 530 in accordance with the terms of the SLA once negotiated. Additionally, the interface adaptor 641 is coupled to and communicates with a legacy EM 654 and/or a legacy DM 632 along an itf-n interface to implement the functionality of a notional NSSMF 623 through performing interface conversion functions and thus allow the customer-side NSMF 522 to manage and/or interact with them (and through the DM 632, to indirectly manage and/or interact with other legacy EMs 654).
The interface adaptor 642 is coupled to and provides an NSSaaS offering 507 to the customer-side NSMF 522 of the subslice customer (NSP) 530 in accordance with the terms of the SLA once negotiated. Additionally the interface adaptor 642 is coupled to and communicates with the MANO 432 along an Os-Ma-nfvo interface to implement the functionality of a notional NSSMF 623 through performing interface conversion functions and thus allow the customer-side NSMF 522 to manage and/or interact with the MANO 432.
In
Similarly, there may or may not be a network-side NSMF 522 and/or network-side NSSMF 523 (shown in dashed outline) in the network management plane 603 but if there is, they are not involved in the provision of the at least one IaaS offering 509.
Thus, as in
In this example, after negotiation 612 between customer-side and network-side (B)SMs 611, 621, network management entities, including without limitation, interface adaptor 641, interface adaptor 642, a legacy EM 654 and/or a legacy DM 643 (and thus indirectly, other legacy EMs 654) used for managing different network infrastructure can provide the MF of the infrastructure to corresponding customer-side MFs of the infrastructure customer (NSP) 540, which may include, without limitation an NSSMF 523 and/or a legacy NM 631, so that the infrastructure customer (NSP) 540 can use the provided network infrastructure to form an NSSI and/or an NSI that may be used to support communication service.
The interface adaptor 641 is coupled to and provides an IaaS offering 509 to the customer-side NSSMF 523 of the infrastructure customer (NSP) 540 in accordance with the terms of the SLA once negotiated. Additionally, the interface adaptor 641 is coupled to and communicates with a legacy EM 654 and/or a legacy DM 632 along an itf-n interface to implement the functionality of a notional NSSMF 623 through performing interface conversion functions and thus allow the customer-side NNSMF 523 to manage and/or interact with them (and through the DM 632, to indirectly manage and/or interact with other legacy EMs 654).
The interface adaptor 642 is coupled to and provides an IaaS offering 509 to the customer-side NSSMF 523 of the infrastructure customer (NSP) 540 in accordance with the terms of the SLA once negotiated. Additionally the interface adaptor 642 is coupled to and communicates with the MANO 432 along an Os-Ma-nfvo interface to implement the functionality of a notional NSSMF 623 through performing interface conversion functions and thus allow the customer-side NSMF 522 to manage and/or interact with the MANO 432.
In some examples, a legacy EM 654 and/or a legacy DM 632 (and thus, indirectly other legacy EMs 654) may be coupled to and provide an IaaS offering 509 to the customer-side legacy NM 631 of the infrastructure customer (NSP) 540 in accordance with the terms of the SLA once negotiated.
Method Actions
Turning now to
One example action 1010 is to receive an order in accordance with an agreement as to terms of a telecommunications service offering.
One example action 1020 is to access network resources that satisfy the terms of the service offering.
One example action 1030 is to initialize an instance of the service offering using the resources accessible thereby.
One example action 1040 is to create at least one interface by which the telecommunications service offering is made available to the customer.
One example action 1050 is to expose each of the at least one created interfaces to enable an MF of the customer to use the telecommunications service offering.
An advantage of this arrangement is that improves the functionality of non-5G management functional entities and provides a migration path for upgrading legacy networks to comply with 5G standards.
According to a broad aspect of the present disclosure, there is disclosed a network management system configured to: receive a request for a service, the request including service requirements, wherein the service comprises a selected one of: Communication as a Service (CaaS), Network Slice as a Service (NSaaS), Network Slice Subnet as a Service (NSSaaS), and Infrastructure as a Service (IaaS); and interact with one or more non-5G management entities to: configure network resources to satisfy the service requirements; and initialize a service instance using the configured network resources.
These interfaces relate to interactions between a Customer's Service Manager (SM(C)), and a Provider's Service Manager (SM(P))
This interface allows the management of templates. The following operations are defined for this interface. The MFs using this interface are the SM of both customer-side and the network-side shown in
Input Parameters
Output Parameters
On-Board Template
Input Parameters
Output Parameters
This interface allows the management of Service Requirements. The following operations are defined for this interface. The MFs using this interface are the SM of both customer-side and network-side shown in
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
This interface facilitates the management of a service. The following operations are defined for this interface. The MFs using this interfaces are the SM of both customer-side and network-side shown in
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Deactivate Service
Input Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
This interface enables the management of templates. The following operations are defined for this interface. This is the interface 622 between (B)SM 621-CSMF 521. In some embodiments, interface 503 is the same as interface 622, and B(SM) 621 can be B(SM) 611. This interface is used to manage the CSI.
Input Parameters
Output Parameters
Input Parameters
Output Parameters
This interface allows the management of Service Requirements. The following operations are defined for this interface
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
This interface allows the management of Network Resources. The following operations are defined for this interface. The MFs using this interfaces are SM and CSMF of both customer-side and network-side shown in
Input Parameters
Output Parameters
This interface facilitates the management of a service. The following operations are defined for this interface
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
This interface allows the management of service. The following operations are defined for this interface
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
This is the interface 525 between CSMF 521-NSMF 522. In some embodiments, interface 505 is the same as interface 525. This interface is used to manage the NSI that is used to serve the CSI.
This interface allows the management of templates. The following operations are defined for this interface.
NOTE: (B)SM can be used to replace CSMF when Network slice instance as a service is requested.
Input Parameters
Output Parameters
Input Parameters
Output Parameters
This interface allows the management of Service Requirements. The following operations are defined for this interface
NOTE: (B)SM can be used to replace CSMF when Network slice instance as a service is requested.
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
This interface allows the management of Network Resources. The following operations are defined for this interface
Input Parameters
Output Parameters
This interface allows the management of services. The following operations are defined for this interface
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
This is the interface 526 between NSMF 522-NSSMF 523 and or interface adaptor 641. In some embodiments, interface 507 is the same as interface 526. This interface is used to manage the NSSI that is used to serve the NSI.
This interface allows the management of templates. The following operations are defined for this interface
NOTE: (B)SM can be used to replace NSMF when Network slice instance as a service is requested.
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
This interface allows the management of Service Requirements. The following operations are defined for this interface
NOTE: (B)SM can be used to replace NSMF when Network slice instance as a service is requested.
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
This interface allows the management of Network Resources. The following operations are defined for this interface
Input Parameters
Output Parameters
This interface allows the management of service. The following operations are defined for this interface
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
Input Parameters
Output Parameters
Input Parameters
Output Parameters
Input Parameters
NOTE: (B)SM can be used to replace NSMF when Network slice instance as a service is requested.
NOTE: (B)SM can be used to replace NSSMF when Network slice instance as a service is requested.
In this section, attributes of a CST are listed.
In this section, attributes of a NST are listed
In this section, attributes of a NSST are listed
Network management entities carrying out or controlling the methods described above may be resident within a management plane of a communications network. These entities may interact with control plane entities (and possibly user/data plane entities) within the network slices instances that are created and discussed. These network management entities may provide methods and functions for the utilization of slice templates and slice instance profiles to satisfy or address (wholly or in part) communication service requests. These communication service requests may be received from a customer of a service provider. Addressing the communication service requests may include taking into account aspects of the lifecycle management of communication service instances and network slices instances.
Although the present disclosure has been described with reference to specific features and embodiments thereof, it is evident that various modifications and combinations can be made thereto without departing from the disclosure. The specification and drawings are, accordingly, to be regarded simply as an illustration of the disclosure as defined by the appended claims, and are contemplated to cover any and all modifications, variations, combinations or equivalents that fall within the scope of the present disclosure.
The present disclosure is related to U.S. Provisional Patent Application No. 62/569,182 entitled “Interaction between 5G and non-5G Management Function Entities” filed Oct. 6, 2017, the contents of which are incorporated by reference, inclusive of all filed appendices.
Number | Date | Country | |
---|---|---|---|
62569182 | Oct 2017 | US |