摘要:
The disclosure relates to a method, apparatus and computer readable media for combining user and operator intents in network slice design and deployment. The method comprises receiving user intents for requested functionalities. The method comprises generating a solution map in which a network slice design is created for each requested functionality, each network slice design being associated with a plurality of operator policies that satisfy the user intents. The method comprises comparing the operator policies associated with the network slice designs for the requested functionalities and combining the network slice designs with matching operator policies into one or more merged network slice design if the user and operator intents are satisfied and if no isolation requirement is violated. The method comprises deploying, in a network of the operator, one or more merged network slice based on the one or more merged network slice design.
摘要:
An upgrade campaign is generated for entities of a system described by a source configuration. According to the upgrade campaign, the system is upgraded to a target configuration using available software. A change model describes changes from the source configuration to the target configuration. According to the change model, an upgrade campaign specification model is generated, which contains at least one upgrade campaign element for each change in the change model. A subset of upgrade campaign elements are matched based on a first set of rules, and the matched upgrade campaign elements are merged into an upgrade procedure in the upgrade campaign specification model. The upgrade procedures are ordered based on a second set of rules and dependencies among the entities of the system, where the dependencies are extracted from the source configuration, the target configuration and the description of available software.
摘要:
A non-transitory computer readable media, methods, system and network function virtualization orchestrator can be used to instantiate a network service operating as at least a portion of a network slice. A network service descriptor describing the network service comprises at least one service deployment flavor; zero or more sharing allowed attribute defining if the network service or constituent instances of the network service is allowed to be shared with another network service instance, or with its constituent instances; and zero or more external placement rule attribute defining if the network service or constituent instances of the network service, is affine or anti-affine with current and future other network service or constituent instances of the current and future other network service.
摘要:
The disclosure relates to a method, system and computer readable media for validating that a configuration of a cloud system meets requirements, using a reduced test suite selected from a test suite. The method includes classifying the requirements and service instances realizing the requirements composing the cloud system. The method includes applying test suite reduction rules to the test suite, using the classified requirements and service instances, to obtain the reduced test suite. The method includes applying the reduced test suite to the cloud system configured with the configuration, thereby validating that the configuration of the cloud system meets the requirements.
摘要:
A non-transitory computer readable media, methods, system and network function virtualization orchestrator can be used to instantiate a network service operating as at least a portion of a network slice. A network service descriptor describing the network service comprises at least one service deployment flavor; zero or more sharing allowed attribute defining if the network service or constituent instances of the network service is allowed to be shared with another network service instance, or with its constituent instances; and zero or more external placement rule attribute defining if the network service or constituent instances of the network service, is affine or anti-affine with current and future other network service or constituent instances of the current and future other network service.
摘要:
Resources in an Infrastructure-as-a-Service (IaaS) system are upgraded in an iterative process. In response to an upgrade request indicating requested changes to a current configuration of the system, one or more graph representations of the current configuration and the requested changes are created. The graph representations include a control graph which has vertices representing resource groups, and edges representing dependences among the resource groups. A batch of resource groups is identified to be upgraded in a current iteration based on the dependencies and Service Level Agreement (SLA) requirements including availability and elasticity of the system. Upgrade operations are executed on the identified batch using selected upgrade methods which handle potential incompatibilties during transition of system configurations. The graph representations are updated to include any new requested changes and recovery operations in response to feedback of failed upgrade operations. The iterative process proceed to upgrade remaining one or more resource groups.
摘要:
A system performs runtime adjustment of a configuration model. The system receives, at runtime, a change request directed at one or more modified entities in the configuration model. Based on leadership information, one or more infringing entities are identified among the one or more modified entities. The leadership information indicates an impact that one entity has on another entity with respect to a given constraint. Based on the leadership information, a propagation scope is identified for a constraint violated by an infringing entity. The propagation scope includes the infringing entity and other entities that are potentially affected by the request. For resolving single constraint violation, a collection of paths are created in the propagation scope and a path is selected one at a time starting from the shortest path in the collection. For resolving multiple constraint violation, a bonded path is formed for a group of propagation scopes that overlap.
摘要:
A configuration is generated for a software that is to be deployed for providing high service availability to satisfy configuration requirements. One or more configuration patterns are identified, each of which specifies a set of attribute values and an actual recovery action for a failed component as a configuration option of the software. The unchangeable attribute values of the software are matched with the configuration patterns to obtain a matching configuration pattern, whose actual recovery action incurs a smallest component failure recovery impact zone. The matching configuration pattern is selected as at least a portion of the configuration of the software. Then the changeable attribute values of the software are set to the corresponding attribute values of the matching configuration pattern to satisfy the configuration requirements.
摘要:
A method and network node are provided for dimensioning a network service (NS). The method comprises calculating, based on given capacity requirements of the NS, a required number of virtual network functions component (VNFC) instances of each of a plurality of virtual network function (VNF) in the NS; selecting a VNF deployment flavor (VnfDf) for each of the plurality of VNFs in the NS, based on the calculated required number of VNFC instances; generating a network service deployment flavor (NsDf) including the selected VnfDfs; and onboarding a network service descriptor (NSD), which includes the NsDf, for use for instantiating the dimensioned NS.
摘要:
The disclosure relates to a method and a state controller running in a Kubernetes system. The state controller being operative to assign labels to pods, the labels indicating services to which the pods are assigned and high-availability states of the pods; detect a failed pod having a label indicating a high-availability state of not ready; and reassign the label indicating the high-availability state of the failed pod to a healthy pod, thereby changing endpoints of services provided and service flows from the failed pod to the healthy pod.