H04L41/0897

Method and system of performance assurance with conflict management in provisioning a network slice service

Method and system for performance assurance in a network slice subset instance (NSSI) or a network slice instance (NSI) of a network. The method comprises receiving, at a network management function (OAM) of the network, a trigger indicating a network performance deficiency; based on the trigger, determining, by a data analytics (DAM) function of the OAM (OAM DAM) in coordination with a network analytics function of one of the core network and a radio access network (RAN), an NSI/NSSI modification; and implementing, by the OAM, a change in at least one of: NSI/NSSI policies, configurations in at least one of core network functions, the RAN and network resources, in accordance with the NSF NSSI modification.

Network slicing using dedicated network node

In a 4G LTE wireless carrier network, network slice instances are instantiated that are configured to provide a configured set of services that are accessible to a controlled set of user devices. A service profile for a user device is identified and analyzed. When the service profile matches a configured set of services for one of the instantiated network slice instances, the user device is enabled to access the matching instantiated network instance. The provisioning of the network slice instances is performed by a dedicated node.

TECHNIQUE FOR REPLACING VNFMs IN A VNF BASED ENVIRONMENT
20220393946 · 2022-12-08 ·

A technique for replacing a source Virtualized Network Function Manager, VNFM, managing a source Virtualized Network Function, VNF, in a VNF based environment by a target VNFM is disclosed. A method implementation of the technique comprises the steps of triggering (S302) instantiating a target VNF, the target VNF being managed by the target VNFM and being executed in parallel to the source VNF, triggering (S304) redirecting traffic from the source VNF to the target VNF in accordance with a traffic redirection schedule, triggering (S306) terminating the source VNF when redirecting traffic from the source VNF to the target VNF is complete, and triggering (S308) terminating the source VNFM.

TECHNIQUE FOR REPLACING VNFMs IN A VNF BASED ENVIRONMENT
20220393946 · 2022-12-08 ·

A technique for replacing a source Virtualized Network Function Manager, VNFM, managing a source Virtualized Network Function, VNF, in a VNF based environment by a target VNFM is disclosed. A method implementation of the technique comprises the steps of triggering (S302) instantiating a target VNF, the target VNF being managed by the target VNFM and being executed in parallel to the source VNF, triggering (S304) redirecting traffic from the source VNF to the target VNF in accordance with a traffic redirection schedule, triggering (S306) terminating the source VNF when redirecting traffic from the source VNF to the target VNF is complete, and triggering (S308) terminating the source VNFM.

SYSTEMS AND METHODS FOR DYNAMIC NETWORK FUNCTION RESOURCE ALLOCATION THROUGH THE NETWORK REPOSITORY FUNCTION

A device may include a processor configured to register a network function, of a core network associated with a radio access network, in a network function repository for the core network. The processor may be further configured to obtain load information for the network function, wherein the load information indicates a load associated with the network function during a time period; determine that the load associated with the network function has reached a threshold based on the load information; and send an alert to an orchestration system to adjust a capacity for the network function, in response to determining that the load associated with the network function has reached the threshold.

Method for configuring service node, service node pool registrars, and system

A method for configuring a service node, a service node pool registrar, and a system are provided. The method includes receiving a service node query request sent by a management configuration device. The service node query request includes a service requirement. The service requirement is from a user or caused by a network change. The method further includes searching a service node database, to obtain service node information that matches the service node query request. The method further includes sending the matching service node information to the management configuration device, causing the management configuration device to perform network and service configuration on the matching service node according to network topology information that has been obtained and the matching service node information.

System and method for hosting mobile packet core and value-added services using a software defined network and service chains

An example method is provided in one example embodiment and may include receiving traffic associated with at least one of a mobile network and a Gi-Local Area Network (data-plane), wherein the traffic comprises one or more packets; determining a classification of the traffic to a service chain, wherein the service chain comprises one or more service functions associated at least one of one or more mobile network services and one or more data-plane services; routing the traffic through the service chain; and routing the traffic to a network using one of a plurality of egress interfaces, wherein each egress interface of the plurality of egress interfaces is associated with at least one of the one or more mobile network services and the one or more data-plane services.

Mobility network slice selection

Core network slices that belong to a given operator community are efficiently tracked at the network control/user plane functions level, with rich data analytics in real-time based on their geographic instantiations. In one aspect, an enhanced vendor agnostic orchestration mechanism is utilized to connect a unified management layer with an integrated slice-components data analytics engine (SDAE), a slice performance engine (SPE), and a network slice selection function (NSSF) in a closed-loop feedback system with the serving network functions of one or more core network slices. The tight-knit orchestration mechanism provides economies of scale to mobile carriers in optimal deployment and utilization of their critical core network resources while serving their customers with superior quality.

Location-aware service request handling
11595388 · 2023-02-28 · ·

Example methods and systems are provided for location-aware service request handling. The method may comprise: generating and sending location information associated with virtualized computing instance to a service node or a management entity for transmission to the service node. The location information may identify logical element(s) to which the virtualized computing instance is connected. The method may further comprise: in response to detecting, from the virtualized computing instance, a service request for a service from the service node, generating a modified service request by modifying the service request to include the location information associated with the virtualized computing instance; and sending the modified service request towards the service node.

Management device, information processing system, and non-transitory computer-readable storage medium for storing management program

A management device of managing an information processing system includes: a memory; and a processor coupled to the memory, the processor being configured to perform processing, the processing including: determining a Quality of Service (QoS) value of a migration destination volume by using a first throughput and a second throughput, the first throughput being a throughput regarding an access to a migration source storage device of a migration source physical server, the second throughput being a throughput regarding an access to a migration destination storage device of a migration destination physical server; and generating a first command to issue the generated first command to the migration destination storage device, the first command being a command to create the migration destination volume by using the determined QoS value.