FEASIBILITY CHECK FOR NETWORK SLICE INSTANTIATION
20220200874 · 2022-06-23
Inventors
- Andrea FENDT (Dasing, DE)
- Borislava GAJIC (Unterhaching, DE)
- Christian Mannweiler (Munich, DE)
- Lars Christoph Schmelz (Haar, DE)
Cpc classification
H04L41/5051
ELECTRICITY
H04L41/40
ELECTRICITY
H04L41/5006
ELECTRICITY
H04W28/16
ELECTRICITY
International classification
H04L41/5054
ELECTRICITY
H04L41/5006
ELECTRICITY
H04L41/5051
ELECTRICITY
Abstract
It is provided a method, comprising qualitatively checking if an infrastructure provides all features required to fulfill a request to set up a network slice instance; quantitatively checking if an available capacity of the infrastructure is sufficient to fulfill the request to set up the network slice instance; inhibiting the quantitative checking if, according to the qualitative checking, the infra-structure does not provide all the features required to fulfill the request to set up the network slice instance.
Claims
1. An apparatus, comprising: at least one processor; and at least one memory including computer program code, said at least one memory and computer program code being configured, with the at least one processor, to cause the apparatus to: check qualitatively if an infrastructure provides all features required to fulfill a request to set up a network slice instance; check quantitatively if an available capacity of the infrastructure is sufficient to fulfill the request to set up the network slice instance; and inhibit the quantitative checking if, according to the qualitative checking, the infrastructure does not provide all the features required to fulfill the request to set up the network slice instance.
2. The apparatus according to claim 1, wherein the at least one memory and computer program code are further configured, with the at least one processor, to check quantitatively if the available capacity of the infrastructure is sufficient to fulfill the request to set up the network slice instance based on a probabilistic model of usage of resources of the infrastructure.
3. The apparatus according to claim 2, wherein the probabilistic model uses data on the historical usage of the resources.
4. The apparatus according to claim 1, wherein the at least one memory and computer program code are further configured, with the at least one processor, to cause the apparatus to provide a confidence value specifying a confidence of the result of the quantitative checking.
5. The apparatus according to claim 1, wherein the at least one memory and computer program code are further configured, with the at least one processor, to cause the apparatus to: respond to the request based on the result of the qualitative checking if, according to the qualitative checking, the infrastructure does not provide all the features required to fulfill the request to set up the network slice instance; and respond to the request based on the result of the quantitative checking if, according to the qualitative checking, the infrastructure provides all the features required to fulfill the request to set up the network slice instance.
6. An apparatus, comprising: at least one processor; and at least one memory including computer program code, said at least one memory and computer program code being configured, with the at least one processor, to cause the apparatus to: check quantitatively if an available capacity of an infrastructure is sufficient to fulfill a request to set up a network slice instance and for calculating a confidence value of a result of the checking; and provide a confidence value specifying a confidence of the result of the quantitative checking.
7. The apparatus according to claim 6, wherein the at least one memory and computer program code are further configured, with the at least one processor, to cause the apparatus to check quantitatively if the available capacity is sufficient to fulfill the request to set up the network slice instance and to calculate the confidence value of the result of the checking based on a probabilistic model of usage of resources of the infrastructure.
8. The apparatus according to claim 7, wherein the probabilistic model uses data on the historical usage of the resources.
9. The apparatus according to claim 6, wherein the at least one memory and computer program code are further configured, with the at least one processor, to cause the apparatus to check qualitatively, prior to the quantitatively checking, if an infrastructure provides all features required to fulfill a request to set up a network slice instance.
10. An apparatus, comprising: at least one processor; and at least one memory including computer program code, said at least one memory and computer program code being configured, with the at least one processor, to cause the apparatus to: query a network capacity of a network from the network; store an indication of the network capacity received in response to the querying; monitor if a request to provide an indication of the network capacity is received; and respond to the request by providing the stored indication of the network capacity if the request is received.
11. The apparatus according to claim 10, wherein the network capacity is at least one of an overall network capacity of the network and a utilized network capacity of the network.
12. The apparatus according to claim 10, wherein the at least one memory and computer program code are further configured, with the at least one processor, to cause the apparatus to query periodically.
13. The apparatus according to claim 10, wherein the at least one memory and computer program code are further configured, with the at least one processor, to cause the apparatus to inhibit the querying due to the received request.
14.-28. (canceled)
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0086] Further details, features, objects, and advantages are apparent from the following detailed description of the preferred example embodiments of the present invention which is to be taken in conjunction with the appended drawings, wherein:
[0087]
[0088]
[0089]
[0090]
[0091]
[0092]
[0093]
[0094]
[0095]
[0096]
[0097]
[0098]
DETAILED DESCRIPTION OF CERTAIN EXAMPLE EMBODIMENTS
[0099] Herein below, certain example embodiments of the present invention are described in detail with reference to the accompanying drawings, wherein the features of the example embodiments can be freely combined with each other unless otherwise described. However, it is to be expressly understood that the description of certain example embodiments is given by way of example only, and that it is by no way intended to be understood as limiting the invention to the disclosed details.
[0100] Moreover, it is to be understood that the apparatus is configured to perform the corresponding method, although in some cases only the apparatus or only the method are described.
[0101] In contrast to the high-level feasibility check according to ETSI GS ZSM 002 V0.8.0, some example embodiments of the invention are not bound to the Management Domains (also named orchestration domains), but perform the feasibility check in the End-to-End Service Management Domain. The feasibility check collects all required NSI resource and parameter data from the Management Domains and analyzes and aggregates them. This allows to make a deployment decision based on profound data, taking interrelation between NSSIs from several Management Domains and their composition to an NSI into account.
[0102] In contrast to the work in [5] and [6], some example embodiments of this invention tackle the NSI embedding problem under uncertainty. Furthermore, some example embodiments of this invention provide a novel architecture and apparatus for the NSI Feasibility Checking. Furthermore, some example embodiments provide a confidence of the provisioning. Some example embodiments of the invention estimate at least one of the expected resource utilization and the expected resource provisioning of a realistic e2e mobile network from historical data. Some example embodiments of the invention are not in control of the number and size of incoming NSI requests and aim to embed as many NSIs as reasonably possible, while allowing a careful overbooking of several partly interdependent resources, combined with numerous further qualitative and quantitative feasibility constraints. Furthermore, they may estimate the confidence in resource availability for a requested NSI in a network such as an e2e mobile network. This is to the best of our knowledge not addressed in academic literature and by any prior art yet.
[0103] Some example embodiments address the problem of performing a time-constrained, very fast feasibility check for a requested, additional NSI and constituent NSSIs, respectively. A decision on whether or not there are enough resources in the subnet domains shall be made automatically within only a few minutes. Idle resources can then be used to deploy an additional NSSI or modify and reuse existing NSSIs.
[0104] This decision must respect the SLAs and the QoS requirements of the already operational NSI(s) and the additional NSI(s). The desired short response time does not allow for querying the different potential NSSI providers for their current resource availability. In addition to that, the future resource availability is uncertain, especially for the RAN NSSIs.
[0105] Therefore, accurate predictions on the future resource availability and QoS parameters are required to be able to decide on the feasibility of deploying an additional NSI(s). Furthermore, some example embodiments of this invention provide confidence values for the resource availability and (based on that) the risk of SLA violation for the new, additional NSI(s).
[0106] The NSI Feasibility Checker (NSI-FC) of some example embodiments of this invention may be embedded in the multi-domain network and service management reference framework of ETSI ZSM, which defines, among others, an e2e service management domain and several domain management areas targeting at, e.g., specific network or technology domains [3]. The NSI Feasibility Checker (NSI-FC) is a composition of several NSI admission services in the e2e Service Management Domain (see
[0107] Some example embodiments of the invention work as follows: A Network Slice Instance Request (NSI-R) is submitted via the Customer Portal of the Digital Storefront, where the Network Slice Instance Provider (NSI-P) may have a chance to review and potentially adapt the NSI-R in cooperation with the NSI Requester. Usually, the role of the NSI-P will be carried out by the Mobile Network Operator. Then, the final NSI-R is passed on to the NSI-FC service that is exposed by the e2e Service Management Domain.
[0108] The NSI-FC takes the NSI-R as input. For each MD, it derives the MD-specific resource, features and configuration parameters for the respective required NSSI and compares them with the current resource utilization and the network performance status information provided by the respective MDs from the marketplace. Combining the information from each MD, the NSI-FC computes a detailed Evaluation Result (EVR) and returns a simplified EVR to the NSI Requester.
[0109] The Detailed Evaluation Result (EVR) contains detailed information on the feasibility of deploying the requested, additional NSI in a collection of the available MDs offered in the Network Slice Subnet Marketplaces (both internal and external ones). It may contain information on potential resource overbookings and/or confidences (in form of the probability) in the availability of the required resources and services. It may contain a confidence value of being able to fulfil the resource and QoS requirements for the NSI-R. The confidence level may be available at different granularity levels, for instance on QoS parameter, resource, and network element level. Based on the Detailed EVR, the NSI-P decides on the acceptance of the NSI-R and submits the detailed EVR or (preferably) a Simplified EVR to the NSI Requester. The Simplified EVR may only contain reduced (e.g., aggregated) information about the feasibility of the NSI-R.
[0110] The overall architecture of the NSI Feasibility Checker (NSI-FC) may be aligned with the ETSI ZSM reference architectures [3].
[0111] As shown in
[0112] Each MD manages one or several NSSIs and has its own Intra-domain Integration Fabric for Service registration, discovery, access control, and data exchange. Performance and resource availability data as well as the Parameters and Configuration of the MDs are separately stored in e.g. two (potentially dedicated) databases for each MD. As for the other MD services, the databases can be accessed via the “Intra-domain Integration Fabric” and may also be partially exposed to the Inter-domain Integration Fabric.
[0113] The e2e Service Management Domain, which is (amongst other) responsible for the NSI Lifecycle Management, includes the NSI-FC according to some example embodiments of the invention (a flowchart explaining its function according to some example embodiments of the invention is depicted in
[0114] Note that the Inter-domain Integration Fabric as well as the ETSI ZSM Digital Storefront are a set of functions and interfaces defined in the ETSI ZSM reference architecture [2]. The ETSI ZSM Digital Storefront, the E2e Service Management domain and the individual MDs are augmented by the NSI-FC according to some example embodiments of this invention. Therefore, this invention can contribute to the ETSI ZSM standard and might also be applicable to the SA5 [13] service-based architecture in the mid-term future.
[0115]
[0116]
[0117] The message flow according to
[0132]
[0133]
[0138] Due to the regular querying, the Available Network Resource Estimation Service is aware of the overall network capacity and the utilized network capacity when it receives a query (message 8 of
[0139] In some example embodiments of the invention, the Available Network Resource Estimation Service queries the Network Capability Provisioning Service and Available Network Resource Estimation Service with different periodicities, or may not query one of these services at all. For example, it may assume that the overall network capacity is constant and, thus, may not query the Network Capability Provisioning Service.
[0140] The Network Capability Provisioning Service and Available Network Resource Estimation Service (jointly named Parameter & Resource Data Consumer Service) receives the requested capacity indications from the management domains. The corresponding message flow is shown in
TABLE-US-00001 TABLE 1 comprises an In- and Output description of the NSI-FC according to some example embodiments of the invention. Input/Output Description Network Contains Typical SLA parameters: Slice Instance latency Request (NSI-R) coverage bandwidth (traffic profile) performance reliability mobility . . . Additional parameters are defined in the GSMA GST (Generic Network Slicing Template) [14]. Network A technical description of the NSI-R, based on GSMA Slice Instance GST [14]. Specifies all requirements regarding resource Description and network capabilities. (NSI-D) Typical Parameters: latency throughput computational power memory capacities availability reliability . . . Network Selected features and configuration parameters of the Parameter Network Slice Subnet (NSS) domains. e.g.: RAN technology coverage edge cloud availability security features (like access control, encryption) service and session continuity (e.g. seamless handover) . . . Qualitative “yes”/“no” Feasibility and the gap to feasibility regarding the Network Answer Parameters. Network A technical description of the overall capacity of the Capacity network (combining the idle NSSs) as well as the network capabilities, features and a probabilistic model of the resource availability for all consumable resources that are part of the NSI-D. Network Slice A probabilistic model of resource utilization (for Instances instance a probability distribution) for all consumable Resource resources of the NSI-D. Utilization Remaining A probabilistic model of the remaining capacity (for Resources each consumable resource in the NSI-D) for the overall network combining the idle NSSs, when all operational NSIs are considered. Resource “yes”/“no” Feasibility Potential overbooking: for each consumable resource in Answer the NSI-D, the absolute value of expected overbooking, as well as a probabilistic model for each (overbooked) resource. Detailed Feasibility: “yes”/“no” Evaluation Plus, the overall confidence in SLA fulfilment/the Result (EVR) overall risk of SLA violation. Confidence and For each resource: the absolute value of expected Risk Levels overbooking, as well as a probabilistic model for each overbooked resource. The confidence level is available at different granularity levels, for instance on QoS parameter, resource, and network element level. Simplified EVR Feasibility: “yes”/“no” and other selected excerpts of the Detailed EVR MD Parameter & Parameters and configuration of operational NSSIs as Configurations well as the configuration possibilities of the overall MD. Typical parameters are: RAN technology coverage edge cloud availability security features (like access control, encryption) service and session continuity (e.g. seamless handover) maximum number of UEs coverage area latency UE mobility level resource sharing level Additional parameters are/will be defined in the 3GPP 28.541 Standard (see section 6.3.3 Service Profile and 6.3.4 Slice Profile). MD The resource allocation and utilization of the operational Resource Data NSSIs as well as the remaining capacity of the entire MD. It contains the collected data of actual resource availability for all consumable resources defined in the NSI-D for the operational NSSIs as well as idle capacity and collected data of the actual resource utilization for all consumable resources defined in the NSI-D for the operational NSSs.
[0145] Table 1: In- and output description of the NSI-FC according to some example embodiments of the invention
[0146] An example embodiment of the Resource Feasibility Checker Service and the Confidence and Risk Evaluation Service is given below.
[0147] Resource Feasibility Checker Service
[0148] One way of doing a resource feasibility check for a set of network slices to be embedded into an end-to-end mobile network is modelling the substrate (mobile network) as well as the network slices in form of undirected graphs. The elements (for instance data connections and services, functions and applications) are mapped on suitable elements of the substrate network. This can be done with an adapted version of the so called VNE (Virtual Network Embedding), especially including latency requirements and considering that UEs already have a fixed location in the substrate network.
[0149] A potential model may look similar to the following. It may be solved with an out-of-the-box Integer Linear Program solver, like the GLPK (https://www.gnu.org/software/glpk/) or the SCIP (https://scip.zib.de).
[0150] a) Definitions and Notation
[0151] An undirected graph G, defined as an ordered pair G=(V,ε) will be used to model the substrate network, i.e. the physical network infrastructure, as well as the virtual networks, i.e. the network slices. A graph is defined by a set of n ∈ vertices V={v.sub.1, v.sub.2, . . . , v.sub.n} that are interconnected by a set of m ∈ N edges. Every edge e.sub.ij has exactly two ends, one so called start-node v.sub.i and one so called end-node v.sub.j, for i,j=1, . . . , n. Therefore, e.sub.ij can be written as e.sub.ij:={v.sub.i, v.sub.j} or shorter as e.sub.ij:=v.sub.iv.sub.j. Since the graphs are undirected, we have e.sub.ij=e.sub.ji.
[0152] Based on that, we define N=(,
, ε) as a network graph, which is an undirected Graph with a set of vertices V:=
∪
, consisting of the UEs
:={u.sub.1, . . . , u.sub.n} with n ∈
and the cloud server nodes
:={c.sub.1, . . . , c.sub.m} with m ∈
. The edges can start either in an UE node or in a cloud node, but always end in a cloud node: ε .Math. {u.sub.ic.sub.j, c.sub.kc.sub.i} for all i=1, . . . , n as well as for all j,k,l=1, . . . , m with k≠l.
[0153] A path P=v.sub.1v.sub.2v.sub.3 . . . v.sub.n of length n ∈ N shall be defined as an undirected graph P(V,ε) with successively connected, pairwise different vertices V={v.sub.1, v.sub.2, . . . , v.sub.n} connected by the set of edges ε={v.sub.1v.sub.2, v.sub.2v.sub.3, . . . , v.sub.n−1v.sub.n}.
[0154] The so-called start vertex of P is v.sub.1, while the so-called end-vertex is v.sub.n. The set of paths, sharing the same start-vertex v.sub.i and the same end-vertex v.sub.j, with i≠j, shall be denoted as . Paths in network graphs P.sub.r ∈
can start either in an UE or cloud node d.sub.v ∈
∪
, but must end in a cloud node c.sub.w ∈
.
[0155] b) Model Parameters and Variables
[0156] The NSE model defines a network graph N=(,
, ε) for the physical network infrastructure or substrate, with the UEs u.sub.v ∈
, the cloud servers c.sub.w ∈
and the wired and wireless communication links c.sub.w ∈
, also referred to as edges in the following. n ∈
virtual networks, in this case NSLs shall be embedded into N. Whereas each NSL is modeled as an undirected graph N.sub.k=(
.sub.k,
.sub.k,
.sub.k) for k=1, . . . , n. The set of UEs associated with a network slice is always a subset of the UEs in the physical network:
.sub.k .Math.
. Each NSL has it's on distinct set of applications a.sub.m.sup.k ∈
.sub.k and virtual communication links l.sub.i.sup.k ∈
.sub.k. Since NSLs are isolated, they do not share applications and links.
[0157] The embedding is aiming at an optimal embedding of virtual applications a.sub.m.sup.k on physical cloud nodes c.sub.w and virtual link l.sub.i.sup.k to physical path mapping, with a fixed, i.e. already embedded set of UEs. This mapping is subject to numerous quality of service constraints, based on, for instance, the throughput and reliability of the communication links and the computation power and memory of the cloud nodes. The expected available throughput of an edge e.sub.j in the substrate is represented by a normal distribution with mean μ.sub.T.sub. in the substrate have a constant computation power P.sub.w.sup.s and memory capacity M.sub.w.sup.s. The NSLs require a specific maximum Latency L.sub.i.sup.k for each communication link l.sub.i.sup.k. The required throughput, however is uncertain and therefore modeled as a normal distribution
for each link l.sub.i.sup.k ∈ .sub.k. Note that a standard-deviation of 0 represents the special case of resource certainty. Also, the required computation power and the memory capacity for the application are defined as normal distributions:
(μ.sub.P.sub.
(μ.sub.M.sub.
[0158] The following binary and continuous embedding variables are defined for the NSE optimization problem:
[0159] l2p.sub.ir.sup.k ∈ (0,1) percentage of data transfer of l.sub.i.sup.k mapped on P.sub.r ∈
[0160] For a given substrate the p2e.sub.rj mapping is known and not subject to optimization. The l2e.sub.ij.sup.k mapping results from the l2p.sub.ir.sup.k mapping combined with the l2p.sub.ir.sup.k mapping. Representing the problem as far as possible by binary variables is desirable regarding runtime-efficiency. The continuous variables are used to enable path splitting. (Path splitting refers to a mapping, where one virtual link is embedded on several physical edges, providing 100% of the required resources, when combined.)
[0161] c) Objective Function
[0162] In order to maintain a linear program, that can be efficiently solved nearly optimally. The uncertainty in the resource availability and utilization will be considered only in the objective function. While the linear constraints of the NSE optimization problem use the expected values for the resource availability and utilization, the objective function makes sure that: as many network slices are embedded as possible, the most beneficial ones are selected if there are not enough resource and the allocation minimizes uncertainty.
[0163] This is achieved by maximizing the following objective function:
max ρ.sub.1.Math.f.sub.1((y.sub.k))+ρ.sub.2.Math.f.sub.2((l2e.sub.ij.sup.k))+ρ.sub.3.Math.f.sub.3((a2c.sub.mw.sup.k))+ρ.sub.4.Math.f.sub.4((a2c.sub.mw.sup.k))
[0164] The weights ρ.sub.1, ρ.sub.2, ρ.sub.3, ρ.sub.4 ∈ [0,1], associated to the four sub-functions, sum up to one.
[0165] ε>0 shall be defined as a very small positive double value.
[0166] d) Linear Constraints
[0167] The above robust NSE objective function is subject to the following constraints. Eq. 1 specifies the map-once constraints, which states that every application must be mapped exactly once, if the corresponding NSL has been embedded. The graph constraints in eq. 2 to eq. 4 make sure that the physical paths and cloud nodes the virtual links and applications are mapped to are connected accordingly. The eq. 5 to eq. 7 model the resource availability constraints using the expected (mean) available resources and resource utilization. The eq. 8 models the latency.
[0168] 6.4.2 Confidence and Risk Evaluation Service
[0169] The model as described above may be used to determine a nearly optimal network slice embedding using the most stable network resources. To provide a beneficial solution, the expected resource demand and provisioning are used instead of the worst-case demand and availability. This may lead to a resource overbooking and resource availability violations can occur. The probability of meeting the resource constraints and the according risk of SLA violation can be evaluated as follows:
[0170] The provisioning of an uncertain resource R is normal distributed with (μ.sub.R, σ.sub.R), while it is used by several NSLs, with normal distributed uncertain demands
(μ.sub.D.sub.
(μ.sub.D.sub.
(μ.sub.D.sub.
(Σ.sub.i.sup.nμ.sub.D.sub.
(μ.sub.R−Σ.sub.i.sup.nμ.sub.D.sub.
[0171] Thus, the PoF for meeting the constraint requirements for R, for the embedded network slices is
[0172] The PoF of a network slice resource constraint is calculated for each resource, as well as for each communication link and node of the requested network slice. For instance, the required throughput of a network slice link l.sub.i.sup.k has been assumed to be normal distributed with a mean μ.sub.T.sub.
[0173] Since the computing power and the memory provided by the cloud servers are certain, but the resource demands can deviate from the expectations, the PoF for those resource is defined as follows:
[0174] Thus, the PoF.sub.T is calculated for each virtual link l.sub.i.sup.k in every network slice. Furthermore, the FoF.sub.P and PoF.sub.M is determined for every application node a.sub.m.sup.k in every network slice.
[0175] In order to evaluate the confidence in meeting the requirements of a network slice a box-plot for the PoF is created for each network slice as well as the overall confidence. Since stochastic independence of the PoF is assumed we can estimate the NSL confidence as:
PoF.sub.k:=Π.sub.iPoF.sub.T.sub.
[0176]
[0177] The apparatus comprises means for qualitatively checking 10, means for quantitatively checking 20, and means for inhibiting 30. The means for qualitatively checking 10, means for quantitatively checking 20, and means for inhibiting 30 may be a qualitatively checking means, quantitatively checking means, and inhibiting means, respectively. The means for qualitatively checking 10, means for quantitatively checking 20, and means for inhibiting 30 may be a qualitatively checker, quantitatively checker, and inhibiter, respectively. The means for qualitatively checking 10, means for quantitatively checking 20, and means for inhibiting 30 may be a qualitatively checking processor, quantitatively checking processor, and inhibiting processor, respectively.
[0178] The means for qualitatively checking 10 checks qualitatively if an infrastructure provides all features required to fulfill a request to set up a network slice instance (S10).
[0179] The means for quantitatively checking 20 checks quantitatively if an available capacity of the infrastructure is sufficient to fulfill the request to set up the network slice instance (S20).
[0180] If, according to the qualitative checking by the means for qualitative checking 10, the infrastructure does not provide all the features required to fulfill the request to set up the network slice instance (S10=no), the means for inhibiting 30 inhibits (S30) the means for quantitatively checking 20 from the quantitative checking (S20).
[0181]
[0182] The apparatus comprises means for quantitatively checking 110 and means for providing 120. The means for quantitatively checking 110 and means for providing 120 may be a quantitatively checking means and providing means, respectively. The means for quantitatively checking 110 and means for providing 120 may be a quantitatively checker and provider, respectively. The means for quantitatively checking 110 and means for providing 120 may be a quantitatively checking processor and providing processor, respectively.
[0183] The means for quantitatively checking 110 checks quantitatively if an available capacity of an infrastructure is sufficient to fulfill a request to set up a network slice instance and calculates a confidence value of a result of the checking (S110).
[0184] The means for providing 120 provides the confidence value (S120).
[0185]
[0186] The apparatus comprises means for querying 210, means for storing 220, means for monitoring 230, and means for responding 240. The means for querying 210, means for storing 220, means for monitoring 230, and means for responding 240 may be a querying means, storing means, monitoring means, and responding means, respectively. The means for querying 210, means for storing 220, means for monitoring 230, and means for responding 240 may be a questor, memory, monitor, and responder, respectively. The means for querying 210, means for storing 220, means for monitoring 230, and means for responding 240 may be a querying processor, memory, monitoring processor, and responding processor, respectively.
[0187] The means for querying 210 queries a network capacity (e.g. an overall network capacity and/or a utilized network capacity) of a network from the network (S210). The means for storing 220 stores an indication of the network capacity received in response to the querying (S220). S210 and S220 may be repeated, e.g. periodically and/or due to specific events.
[0188] The means for monitoring 230 monitors if a request to provide an indication of the network capacity is received (S230). If the request is received (S230=yes), the means for responding 240 responds to the request by providing the stored indication of the network capacity (S240). The means for querying 210 may not query the network due to the received request. That is, S210 and S220 may be performed independent from 230 and S240. This is indicated by the dashed arrow in
[0189]
[0190] According to some example embodiments of the invention, the Available Network Resource Estimation Service queries the Network Capability Provisioning Service and the NSI Requirement Provisioning Service on a regular basis (e.g. periodically). However, the invention is not limited thereto. In some example embodiments, the Available Network Resource Estimation Service queries the Network Capability Provisioning Service and the NSI Requirement Provisioning Service upon a query from the NSI-FC Provisioning Service (message 8 in
[0191] Some example embodiments of the invention are described which are based on a 3GPP network. However, the invention is not limited to 3GPP networks of any generation (3G, 4G, 5G, etc.). It may be applied to other wireless and wireline networks applying slicing, too.
[0192] The definitions indicated in the present description are based on the current 3GPP standards. However, they do not limit the invention. Other definitions according to the same or a corresponding concept are applicable to some example embodiments of the invention, too.
[0193] One piece of information may be transmitted in one or plural messages from one entity to another entity. Each of these messages may comprise further (different) pieces of information.
[0194] Names of network elements, protocols, and methods are based on current standards. In other versions or other technologies, the names of these network elements and/or protocols and/or methods may be different, as long as they provide a corresponding functionality.
[0195] If not otherwise stated or otherwise made clear from the context, the statement that two entities are different means that they perform different functions. It does not necessarily mean that they are based on different hardware. That is, each of the entities described in the present description may be based on a different hardware, or some or all of the entities may be based on the same hardware. It does not necessarily mean that they are based on different software. That is, each of the entities described in the present description may be based on different software, or some or all of the entities may be based on the same software. Each of the entities described in the present description may be embodied in the cloud.
[0196] According to the above description, it should thus be apparent that example embodiments of the present invention provide, for example, a feasibility checker, or a component thereof, an apparatus embodying the same, a method for controlling and/or operating the same, and computer program(s) controlling and/or operating the same as well as mediums carrying such computer program(s) and forming computer program product(s).
[0197] Implementations of any of the above described blocks, apparatuses, systems, techniques or methods include, as non-limiting examples, implementations as hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
[0198] It is to be understood that what is described above is what is presently considered the preferred example embodiments of the present invention. However, it should be noted that the description of the preferred example embodiments is given by way of example only and that various modifications may be made without departing from the scope of the invention as defined by the appended claims.