H04L41/5045

Methods and apparatus for managing resource usage across domains in a communication network

A method (100) for managing resource usage across domains in a communication network is disclosed. The communication network comprises a radio access domain, a core domain and a transport domain providing connectivity between the radio access domain and the core domain. The method comprises receiving from the core domain an indication of load status of gateway nodes in the core domain (110), receiving from the transport domain an indication of load status of transport resources in the transport domain (120), normalising across the core and transport domain a cost of using resources in each domain (130), calculating, on the basis of the normalised costs, optimal chains of resources in the core and transport domains for providing a service from different radio access nodes to different possible Access Point Names (APNs) (140), and sending to the core and transport domains information about the calculated optimal resource chains (150). Also disclosed are methods for managing resource usage in a core domain, a transport domain and a radio access domain of a communication network, together with cross domain, core domain, transport domain and radio access domain control elements.

Information technology (IT) topology solutions according to operational goals

Disclosed are various examples for determining an IT topology for an enterprise IT organization based on operational goals of the enterprise organization. Visual models that are designed to facilitate responses associated with the current IT topology and operational goals of an enterprise IT organization are displayed to an entity of the enterprise. The entity can provide enterprise profile data to an IT solutions system by interacting with user interfaces. The IT solutions system can generate the IT topology prescription and roadmap for implementing the IT topology prescription based on the operational goals identified in the responses. Statements of work can be dynamically generated that outline details and terms of implementing the IT topology prescription for the enterprise IT organization.

NETWORK SLICE INSTANCE PROVISIONING BASED ON A PERMISSIONED DISTRIBUTED LEDGER

A method and system for deployment of services for customers. Network service templates (NSTs) are determined, from a permissioned distributed ledger that is distributed between network operator systems of one or more network operators and customer systems. The NSTs include respective descriptions of network characteristics that provide respective logical networks. A subset of the NSTs and a corresponding subset of the network operator systems are selected based on a service description of the first service for deployment of the first service. Instantiation of the subset of the NSTs is requested on the corresponding subset of network operator systems as a subset of network slice instances to form the first service deployed for the first customer.

SLICE INTENT EFFICIENCY ASSURANCE AND ENHANCEMENT IN ENTERPRISE PRIVATE 5G NETWORK

An approach to configure enterprise wireless mobile network slices. A method includes receiving slice definition information representative of a network slice, the slice definition information including an expected slice efficiency index of the network slice, provisioning the network slice, consistent with the slice definition information, in a wireless network, receiving telemetry corresponding to operational metrics of an instance of the network slice that is used by one or more devices in the wireless network, calculating an actual slice efficiency index for the instance of the network slice based on the telemetry corresponding to the operation metrics of the instance of the network slice, determining whether the expected slice efficiency index differs from the actual slice efficiency index by a predetermined threshold, and indicating a course of action to cause the actual slice efficiency index to more closely align with the expected slice efficiency index.

Service monitoring interface with an aggregate key performance indicator of a service and aspect key performance indicators of aspects of the service

A method is disclosed that includes receiving a request to display a service-monitoring user interface that illustrates performance of one or more services that are each provided by one or more entities. Each service is associated with a stored service definition that identifies the one or more entities, and each entity is associated with stored entity definition information that identifies machine data produced by or about the entity from one or more sources. The method further includes causing display of the service-monitoring user interface illustrating performance of each service via an aggregate key performance indicator (KPI) that characterizes a respective service as a whole, and a plurality of aspect KPIs that each characterize an aspect of an associated service. Each KPI is defined by a search query that produces a value derived from the machine data identified by the entity definition information, the value indicative of a measure of the service at a point in time or during a period of time. The machine data is produced by one or more components within an information technology environment and reflects activity within the information technology environment.

Service enabler function

The present application describes a method and apparatus for updating a service in a service layer function of a network. In particular, a method for adding a service is disclosed. Initially, a request is received at a service enabler function located in the service layer function to add the service. A service description of the requested service is reviewed to understand its capabilities. A verification request is sent to a service capability located in the service layer function. Further, another service layer function or application is notified that the requested service is enabled.

Systems and methods for contextual transformation of analytical model of IoT edge devices

Disclosed are methods, systems, and non-transitory computer-readable medium for a contextual transformation of an analytical model for an industrial internet of things (IIoT) edge node. For instance, the method may include receiving the analytical model from a cloud service; obtaining local data of the IIoT edge node; analyzing the local data to determine a situational context of the IIoT edge node; determining whether to transform the analytical model based on a fit between the analytical model and the situational context; and in response to determining to transform the analytical model, transforming the analytical model based on the situational context to derive a transformed analytical model.

Systems and methods for configuring and deploying multi-access edge computing applications

A device may include a processor configured to determine a plurality of requirements for a Multi-Access Edge Computing (MEC) application requested by a customer; select a solution blueprint for the MEC application, from a set of solution blueprints, based on the determined plurality of requirements, wherein the solution blueprint includes an application deployment blueprint and a connectivity blueprint; and receive approval of the selected solution blueprint from the customer. The processor may be further configured to configure at least one transport network device based on the connectivity blueprint, in response to receiving the approval of the selected solution blueprint from the customer; and deploy at least one component of the MEC application on a MEC device in a MEC network based on the application deployment blueprint, in response to receiving the approval of the selected solution blueprint from the customer.

End-to-end network slice selection and configuration
11553411 · 2023-01-10 · ·

A system and associated method for enabling end-to-end (E2E) network slicing in a 5G network are described. A (Radio) Access Network-Network Slice Selection Function ((R)AN-NSSF) can be configured to receive a (R)AN slice selection request and to select, from a pool of (R)AN slice instances, a (R)AN network slice instance including one or more (R)AN slice components. A Core Network-Network Slice Selection Function (CN-NSSF) can be configured to receive a CN slice selection request to select, from a pool of CN slice instances, a CN network slice instance including one or more CN slice components. A Network Slice Policy Control (NSPC) function can be configured to verify that the selected (R)AN slice instance and CN slice instance are consistent with operator policies.

Service chain accomodation apparatus and service chain accommodation method

A service chain accommodation device includes an influence coefficient calculation unit that calculates an influence coefficient indicating that an influence at the time of processing failure of a service chain is greater for a VNF located in a subsequent stage of a service chain and a VNF shared among a plurality of service chains, a residual resource calculation unit that corrects an amount of residual resources that can be accommodated for each of the VNFs through which the service chain passes, and an accommodation design unit that assigns a new service chain on the basis of the amount of the residual resources.