Abstract: The present disclosure relates to a method and a system for deploying a network functions virtualization infrastructure. The present disclosure encompasses: logging, by a processing unit [202], to a set of controller nodes and a set of compute nodes; configuring, by a configuration unit [204], a controller node from the set of controller nodes as a deployment host; downloading a set of scripts on the deployment host; configuring, by the configuration unit [204], at the central controller, one or more configurations at the deployment host to configure Secure Shell (SSH) password less connection with the set of compute nodes and one or more remaining controller node(s) in the set of controller nodes; executing, by the processing unit [202], the one or more scripts at the deployment host, in a sequence; and receiving, by a transceiver unit [206], one or more real time logs from the deployment host. [FIG. 3]
FORM 2
THE PATENTS ACT, 1970 (39 OF 1970) & THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR DEPLOYING A NETWORK FUNCTIONS VIRTUALIZATION INFRASTRUCTURE
(NFVI)”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is to be performed.
METHOD AND SYSTEM FOR DEPLOYING A NETWORK FUNCTIONS VIRTUALIZATION INFRASTRUCTURE (NFVI)
FIELD OF INVENTION
[0001] The present disclosure generally relates to network infrastructure technologies. More particularly, embodiments of the present disclosure relate to methods and systems for deploying a network functions virtualization infrastructure (NFVI).
BACKGROUND
[0002] The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art.
[0003] Cloud computing has revolutionized Information Technology (IT) infrastructure by offering scalable, on-demand access to compute, storage, and networking resources. Cloud computing platforms emerged for building and managing private and public clouds. Such platforms provide a set of modular services that can be integrated to create a customizable cloud environment tailored to specific organizational needs.
[0004] With the advent of Network Functions Virtualization (NFV), there has been a shift towards virtualizing network functions using a software running on standard hardware infrastructure. The NFV decouples network functions from proprietary hardware appliances, allowing them to run as virtualized instances on commodity servers, storage, and networking hardware.
[0005] Virtualized Network Infrastructure (VIN) Cloud is an open-source cloud such as, including but not limited to, a cloud computing platform. VIN typically refers to a setup where network functions and services are abstracted from their physical hardware and run on virtualized platforms within a cloud or data centre environment. Conventionally, a deployment in Network Functions Virtualization Infrastructure (NFVI)-cloud is done manually, which includes making several configurations and running multiple automation engines. The manual deployment is a time-inefficient as well as an error-prone process wherein constant monitoring and checks are needed to make sure correct deployment is done or not.
[0006] Further, over the period of time various solutions have been developed for NFVI-cloud deployment. However, there are certain challenges with existing solutions. The existing solutions do not provide automated solutions to allow NFVI-cloud deployment. Further, the existing solutions do not provide an automated offline solution for deployment of the NFVI-cloud.
[0007] Thus, there exists an imperative need in the art to provide the automated offline NFVI-cloud deployment, which the present disclosure aims to address.
SUMMARY
[0008] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0009] An aspect of the present disclosure may relate to a method for deploying a Network Functions Virtualization infrastructure (NFVI). The method comprising logging, by a processing unit, at a central controller, to a set of controller nodes and a set of compute nodes. The method further comprises configuring, by a
configuration unit, at the central controller, a controller node from the set of controller nodes as a deployment host. The method further comprises downloading, by the processing unit, at the central controller, a set of scripts on the deployment host. The method further comprises configuring, by the configuration unit, at the central controller, one or more configurations at the deployment host to configure Secure Shell (SSH) password less connection with the set of compute nodes and one or more remaining controller nodes in the set of controller nodes. The method further comprises executing, by the processing unit, at the central controller, the one or more scripts at the deployment host, in a sequence. The method further comprises receiving, by a transceiver unit, at the central controller, one or more real time logs from the deployment host.
[0010] In an exemplary aspect of the present disclosure, prior to logging to the set of controller nodes and to the set of compute nodes, the method comprises: configuring, by the configuration unit, at the central controller, one or more services for NFVI deployment; receiving, by the transceiver unit, at the central controller, a set of login credentials for the set of controller nodes and the set of compute nodes; validating, by a validation unit, at the central controller, the set of login credentials and reachability of the set of controller nodes and the set of compute nodes; and initiating, by an installation unit, at the central controller, a deploy command to initiate the NFVI deployment.
[0011] In an exemplary aspect of the present disclosure, the method is performed by a user at a user interface of the central controller.
[0012] In an exemplary aspect of the present disclosure, the one or more services configured for NFVI deployment comprise at least one of an Advanced Packaging Tool (APT) Cache related service, a Python Package Index (PYPI) server Uniform Resource Locator (URL) related service, and a Hypertext Transfer Protocol (HTTP) server related service.
[0013] In an exemplary aspect of the present disclosure, the method further comprises redirecting, by the processing unit, at the central controller, the user interface to a log console to check the received one or more real time logs from the deployment host.
[0014] In an exemplary aspect of the present disclosure, the method further comprises, adding, by the processing unit, at the central controller, one or more compute nodes.
[0015] In an exemplary aspect of the present disclosure, the method further comprises deleting, by the processing unit, at the central controller, one or more compute nodes from the set of compute nodes.
[0016] In an exemplary aspect of the present disclosure, the method further comprises, receiving, by the transceiver unit, at the central controller, one or more login credentials for the one or more compute nodes to be added; and initiating, by the processing unit, at the central controller, a compute scaling command to run corresponding one or more scripts on the deployment host.
[0017] In an exemplary aspect of the present disclosure, the method further comprises selecting, by the processing unit, at the central controller, the one or more compute nodes from the set of compute nodes for deletion; and initiating, by the processing unit, at the central controller, a delete command to run corresponding one or more scripts on the deployment host.
[0018] Another aspect of the present disclosure may relate to a system for deploying a Network Functions Virtualization infrastructure (NFVI), the system comprising a processing unit, at a central controller, configured to, log-in to a set of controller nodes and to a set of compute nodes. Further, the system comprises a configuration unit connected at least to the processing unit, the configuration unit at the central controller, is configured to configure a controller node from the set of
controller nodes as a deployment host. Further, the system comprises the processing unit, at the central controller, configured to download a set of scripts on the deployment host. Further, the system comprises the configuration unit, at the central controller, to configure, one or more configurations at the deployment host to configure Secure Shell (SSH) password less connection with the set of compute nodes and one or more remaining controller nodes in the set of controller nodes. Further, the system comprises the processing unit, at the central controller, further configured to execute, the one or more scripts at the deployment host, in a sequence. Further, the system comprises a transceiver unit connected at least to the configuration unit, at the central controller, is configured to receive one or more real time logs from the deployment host.
[0019] Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instructions for deploying a Network Functions Virtualization infrastructure (NFVI), the instructions include executable code which, when executed by one or more units of a system comprising a central controller causes: a processing unit to log-in to a set of controller nodes and to a set of compute nodes. Further, instructions include executable code which, when executed causes a configuration unit to configure a controller node from the set of controller nodes as a deployment host. Further, instructions include executable code which, when executed causes the processing unit to download a set of scripts on the deployment host. Further, instructions include executable code which, when executed causes the configuration unit to configure, one or more configurations at the deployment host to configure Secure Shell (SSH) password less connection with the set of compute nodes and one or more remaining controller nodes in the set of controller nodes. Further instructions include executable code which, when executed causes the processing unit to execute the one or more scripts at the deployment host, in a sequence. Further, instructions include executable code which, when executed causes a transceiver unit to receive one or more real time logs from the deployment host.
[0020] Yet another aspect of the present disclosure may relate to User Equipment (UE), comprising a transmitter unit, configured to transmit to a system, a request to deploy Network Functions Virtualization infrastructure (NFVI); and a receiver unit, configured to receive from the system, a response to the request, wherein the response comprises one or more real time logs from a deployment host, and wherein to generate the response at the system: a processing unit is configured to, log-in to a set of controller nodes and to a set of compute nodes; a configuration unit is configured to, configure a controller node from the set of controller nodes as the deployment host; the processing unit is further configured to download a set of scripts on the deployment host; the configuration unit is further configured to, configure, one or more configurations at the deployment host to configure Secure Shell (SSH) password less connection with the set of compute nodes and one or more remaining controller nodes in the set of controller nodes; the processing unit is further configured to execute, the one or more scripts at the deployment host, in a sequence; and a transceiver unit is configured to receive, one or more real time logs from the deployment host.
OBJECTS OF THE DISCLOSURE
[0021] Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below.
[0022] It is an object of the present disclosure to provide a system and a method for an automated offline NFVI-cloud deployment to allow the automated running of automation engines one by one.
[0023] It is another object of the present disclosure to provide a solution that is time efficient.
[0024] It is another object of the present disclosure to provide a solution that provides an ability to use the NFVI-Cloud even when there is insufficient internet connectivity.
[0025] It is another object of the present disclosure to provide a solution that reduces chances of error while deploying the NFVI-Cloud.
[0026] It is yet another object of the present disclosure to provide a solution that makes configurations like Secure Shell (SSH) password less login automatically.
BRIEF DESCRIPTION OF THE DRAWINGS
[0027] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Also, the embodiments shown in the figures are not to be construed as limiting the disclosure, but the possible variants of the method and system according to the disclosure are illustrated herein to highlight the advantages of the disclosure. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components or circuitry commonly used to implement such components.
[0028] FIG. 1 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
[0029] FIG. 2 illustrates an exemplary block diagram of a system for deploying a Network Functions Virtualization infrastructure (NFVI), in accordance with exemplary implementations of the present disclosure.
[0030] FIG. 3 illustrates a method flow diagram for deploying a Network Functions
Virtualization infrastructure (NFVI), in accordance with exemplary
implementations of the present disclosure. 5
[0031] FIG.4 illustrates an exemplary architecture of an automated offline Network Functions Virtualization infrastructure (NFVI) cloud deployment, in accordance with exemplary implementations of the present disclosure.
10 [0032] The foregoing shall be more apparent from the following more detailed
description of the disclosure.
DETAILED DESCRIPTION
15 [0033] In the following description, for the purposes of explanation, various
specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter may each be used independently of one
20 another or with any combination of other features. An individual feature may not
address any of the problems discussed above or might address only some of the problems discussed above.
[0034] The ensuing description provides exemplary embodiments only, and is not
25 intended to limit the scope, applicability, or configuration of the disclosure. Rather,
the ensuing description of the exemplary embodiments will provide those skilled in
the art with an enabling description for implementing an exemplary embodiment.
It should be understood that various changes may be made in the function and
arrangement of elements without departing from the spirit and scope of the
30 disclosure as set forth.
9
[0035] Specific details are given in the following description to provide a thorough
understanding of the embodiments. However, it will be understood by one of
ordinary skill in the art that the embodiments may be practiced without these
specific details. For example, circuits, systems, processes, and other components
5 may be shown as components in block diagram form in order not to obscure the
embodiments in unnecessary detail.
[0036] Further, in accordance with the present disclosure, it is to be acknowledged that the functionality described for the various components/units can be
10 implemented interchangeably. While specific embodiments may disclose a
particular functionality of these units for clarity, it is recognized that various configurations and combinations thereof are within the scope of the disclosure. The functionality of specific units as disclosed in the disclosure should not be construed as limiting the scope of the present disclosure. Consequently, alternative
15 arrangements and substitutions of units, provided they achieve the intended
functionality described herein, are considered to be encompassed within the scope of the present disclosure.
[0037] Also, it is noted that individual embodiments may be described as a process
20 which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure
diagram, or a block diagram. Although a flowchart may describe the operations as
a sequential process, many of the operations may be performed in parallel or
concurrently. In addition, the order of the operations may be re-arranged. A process
is terminated when its operations are completed but could have additional steps not
25 included in a figure.
[0038] The word “exemplary” and/or “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the
subject matter disclosed herein is not limited by such examples. In addition, any
30 aspect or design described herein as “exemplary” and/or “demonstrative” is not
necessarily to be construed as preferred or advantageous over other aspects or
10
designs, nor is it meant to preclude equivalent exemplary structures and techniques
known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes,” “has,” “contains,” and other similar words are used in either the detailed
description or the claims, such terms are intended to be inclusive—in a manner
5 similar to the term “comprising” as an open transition word—without precluding
any additional or other elements.
[0039] As used herein, a “processing unit” or “processor” or “operating processor” includes one or more processors, wherein processor refers to any logic circuitry for
10 processing instructions. A processor may be a general-purpose processor, a special
purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a Digital Signal Processing (DSP) core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of
15 integrated circuits, etc. The processor may perform signal coding data processing,
input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
20 [0040] As used herein, “a user equipment”, “a user device”, “a smart-user-device”,
“a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”, “a wireless communication device”, “a mobile communication device”, “a communication device” may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure. The
25 user equipment/device may include, but is not limited to, a mobile phone, smart
phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable of implementing the one or more features of the present disclosure. Also, the user device may contain at least one input means configured to receive an input from
30 unit(s) which are required to implement the one or more features of the present
disclosure.
11
[0041] As used herein, “storage unit” or “memory unit” refers to a machine or
computer-readable medium including any mechanism for storing information in a
form readable by a computer or similar machine. For example, a computer-readable
5 medium includes read-only memory (“ROM”), random access memory (“RAM”),
magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media. The storage unit stores at least the data that may be required by one or more units of the system to perform their respective functions.
10
[0042] As used herein “interface” or “user interface refers to a shared boundary across which two or more separate components of a system exchange information or data. The interface may also be referred to a set of rules or protocols that define communication or interaction of one or more modules or one or more units with
15 each other, which also includes the methods, functions, or procedures that may be
called.
[0043] All modules, units, components used herein, unless explicitly excluded herein, may be software modules or hardware processors, the processors being a
20 general-purpose processor, a special purpose processor, a conventional processor, a
digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc.
25
[0044] As used herein the transceiver unit includes at least one receiver and at least one transmitter configured respectively for receiving and transmitting data, signals, information or a combination thereof between units/components within the system and/or connected with the system.
30
12
[0045] As discussed in the background section, the current known solutions for a
Network Functions Virtualization infrastructure (NFVI) cloud deployment have
several shortcomings. The existing solutions do not provide automated solutions to
allow NFVI-cloud deployment and thereby, do not allow automated running of
5 automation engines one-by-one. Further, the existing solutions do not provide an
automated offline solution for deployment of the NFVI-cloud to allow the users to deploy NFVI cloud in those areas where the internet connectivity is insufficiently available.
10 [0046] The present disclosure aims to overcome the above-mentioned and other
existing problems in this field of technology by configuring all pre-requisite configurations by the user. Further, the user is allowed to create a deployment plan for deploying the NFVI-cloud at a Graphical User Interface (GUI) of a central controller for target nodes provided by a user. The target nodes may include but are
15 not limited to controller nodes and compute nodes. The present disclosure allows a
user to configure a deployment host (one of the controller nodes), where one or more scripts gets executed and ensures Secure Shell (SSH) password less connection with the set of compute nodes and one or more remaining controller node(s) in the set of controller nodes. After execution of the one or more scripts, an
20 Automated Cloud Installer User Interface (ACI-UI) displays one or more real time
logs received from the deployment host.
[0047] Hereinafter, exemplary embodiments of the present disclosure will be described with reference to the accompanying drawings.
25
[0048] FIG. 1 illustrates an exemplary block diagram of a computing device [100] upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure. In an implementation, the computing device [100] may be in communication with a
30 communication network (such as a 5th-generation network) and may also
implement a method for deploying a Network Functions Virtualization
13
infrastructure (NFVI). In another implementation, the computing device [100] in
communication with the communication network, itself implements the method
deploying a Network Functions Virtualization infrastructure (NFVI) within the
computing device [100], wherein a person skilled in the art would appreciate that
5 said one or more units are capable of implementing the features as disclosed in the
present disclosure.
[0049] The computing device [100] may include a bus [102] or other communication mechanism for communicating information, and a hardware
10 processor [104] coupled with bus [102] for processing information. The hardware
processor [104] may be, for example, a general-purpose microprocessor. The computing device [100] may also include a main memory [106], such as a random-access memory (RAM), or other dynamic storage device, coupled to the bus [102] for storing information and instructions to be executed by the processor [104]. The
15 main memory [106] also may be used for storing temporary variables or other
intermediate information during execution of the instructions to be executed by the processor [104]. Such instructions, when stored in non-transitory storage media accessible to the processor [104], render the computing device [100] into a special-purpose machine that is customized to perform the operations specified in the
20 instructions. The computing device [100] further includes a read only memory
(ROM) [108] or other static storage device coupled to the bus [102] for storing static information and instructions for the processor [104].
[0050] A storage device [110], such as a magnetic disk, optical disk, or solid-state
25 drive is provided and coupled to the bus [102] for storing information and
instructions. The computing device [100] may be coupled via the bus [102] to a
display [112], such as a cathode ray tube (CRT), Liquid crystal Display (LCD),
Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for
displaying information to a computer user. An input device [114], including
30 alphanumeric and other keys, touch screen input means, etc. may be coupled to the
bus [102] for communicating information and command selections to the processor
14
[104]. Another type of user input device may be a cursor controller [116], such as a
mouse, a trackball, or cursor direction keys, for communicating direction
information and command selections to the processor [104], and for controlling
cursor movement on the display [112]. This input device typically has two degrees
5 of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow
the device to specify positions in a plane.
[0051] The computing device [100] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware
10 and/or program logic which in combination with the computing device [100] causes
or programs the computing device [100] to be a special-purpose machine. According to one implementation, the techniques herein are performed by the computing device [100] in response to the processor [104] executing one or more sequences of one or more instructions contained in the main memory [106]. Such
15 instructions may be read into the main memory [106] from another storage medium,
such as the storage device [110]. Execution of the sequences of instructions contained in the main memory [106] causes the processor [104] to perform the process steps described herein. In alternative implementations of the present disclosure, hard-wired circuitry may be used in place of or in combination with
20 software instructions.
[0052] The computing device [100] also may include a communication interface [1018] coupled to the bus [102]. The communication interface [118] provides a two-way data communication coupling to a network link [120] that is connected to a
25 local network [122]. For example, the communication interface [118] may be an
integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, the communication interface [118] may be a local area network (LAN) card to provide a data communication connection to a
30 compatible LAN. Wireless links may also be implemented. In any such
implementation, the communication interface [118] sends and receives electrical,
15
electromagnetic or optical signals that carry digital data streams representing various types of information.
[0053] The computing device [100] can send messages and receive data, including
5 program code, through the network(s), the network link [120] and the
communication interface [118]. In the Internet example, a server [130] might
transmit a requested code for an application program through the Internet [128], the
Internet Service Provider (ISP) [126], the local network [122], the host [124] and
the communication interface [118]. The received code may be executed by the
10 processor [104] as it is received, and/or stored in the storage device [110], or other
non-volatile storage for later execution.
[0054] The computing device [100] encompasses a wide range of electronic devices capable of processing data and performing computations. Examples of
15 computing device [100] include, but are not limited only to, personal computers,
laptops, tablets, smartphones, servers, and embedded systems. The devices may operate independently or as part of a network and can perform a variety of tasks such as data storage, retrieval, and analysis. Additionally, computing device [100] may include peripheral devices, such as monitors, keyboards, and printers, as well
20 as integrated components within larger electronic systems, showcasing their
versatility in various technological applications.
[0055] Referring to FIG. 2, an exemplary block diagram of a system [200] for deploying a Network Functions Virtualization infrastructure (NFVI), is shown, in
25 accordance with the exemplary implementations of the present disclosure. The
system [200] comprises a central controller [200a], the central controller [200a] may include at least one processing unit [202], at least one configuration unit [204], at least one transceiver unit [206], at least one validation unit [208], and at least one installation unit [210]. Also, all of the components/ units of the system [200] are
30 assumed to be connected to each other unless otherwise indicated below. Also, in
FIG. 2 only a few units are shown, however, the system [200] may comprise
16
multiple such units or the system [200] may comprise any such numbers of said
units, as required to implement the features of the present disclosure. Further, in an
implementation, the system [200] may be in communication with the user device
(may also referred herein as a user equipment or UE). In another implementation,
5 the system [200] may reside in a server or at a network entity.
[0056] The system [200] is configured for deploying the Network Functions Virtualization infrastructure (NFVI), with the help of the interconnection between the components/units of the system [200].
10
[0057] At first, a user has to configure all requisite configurations like, but not limited to Advanced Packaging Tool (APT) cache, a Python Package Index (PYPI) server Uniform Resource Locator (URL), etc. in an Automated Cloud Installer (ACI) for deploying NFVI. ACI automates the deployment process of complex
15 cloud infrastructure, such as Network Functions Virtualization Infrastructure
(NFVI). The functionality of ACI revolves around streamlining the setup and configuration tasks involved in deploying NFVI. ACI automates the configuration of various components necessary for deploying NFVI. ACI facilitates the creation of deployment plans. ACI manages the integration and interconnection between
20 different components or units of the NFVI system. Further, the user has to create a
deployment plan with input login credentials for all controller and compute nodes. The compute nodes are the nodes in a computing system that primarily handle computational tasks. The controller nodes are the nodes that typically manage and coordinate the activities of the compute nodes.
25
[0058] More specifically for deploying the Network Functions Virtualization infrastructure (NFVI), at first, prior to logging by the processing unit [202], to a set of controller nodes and to a set of compute nodes, the configuration unit [204] configures one or more services for NFVI deployment. The one or more services
30 configured for NFVI deployment comprise at least one of an Advanced Packaging
Tool (APT) Cache related service, a Python Package Index (PYPI) server Uniform
17
Resource Locator (URL) related service, and a Hypertext Transfer Protocol (HTTP)
server related service. It is to be noted that the user may configure all pre-requisite
configurations such as, but not limited to, APT cache, PYPI server URL, etc. in an
Automated Cloud Installer (ACI). The APT Cache related service refers to a system
5 or method for managing and storing metadata and binaries used by APT-based
package managers. The Python Package Index (PYPI) server Uniform Resource
Locator (URL) related service refers to a server hosting Python packages that can
be accessed via a specific URL. The HTTP server related service refers to a software
service that handles requests and serves content over the Hypertext Transfer
10 Protocol (HTTP).
[0059] The system [200] may configure various micro-services in the Automated
Cloud Installer (ACI) during the NFVI-Deployment to enable such deployment.
The micro services are explained as follows: the APT cache is configured to host
15 APT packages which are required for NFVI deployment. The PYPI is configured
to host Python Package Installer (PIP) packages. The HTTP server is configured to host other required files.
[0060] Further, the transceiver unit [206] is configured to receive, a set of login
20 credentials for the set of controller nodes and the set of compute nodes. The login
credentials may include username, password, keys, etc. For example, during the
NFVI-Cloud deployment initiation, the ACI-UI performs logging into all the target
nodes, once the user initiates the NFVI-Cloud Deployment. The target nodes may
include but are not limited to the controller nodes and compute nodes. The target
25 node refers to a specific node or server within the infrastructure that is targeted for
configuration, management, or deployment of resources.
[0061] Further, the validation unit [208] is configured to validate, the set of login
credentials and reachability of the set of controller nodes and the set of compute
30 nodes. Further, the installation unit [210] is configured to initiate, a deploy
command to initiate the NFVI deployment. In an implementation, at least one of
18
the configuration unit [204], the transceiver unit [206], the validation unit [208],
and the installation unit [210] are configured to receive inputs by a user at a user
interface (UI) of the central controller [200a]. For example, initiating the
deployment of the NFVI-Cloud by the installation unit [210] and logging in the
5 details in a log console. The installation unit [210] sends out deployment commands
to the designated controller nodes and compute nodes. These commands instruct the controller nodes to orchestrate the setup and configuration of the NFVI environment. If any errors or issues encountered during deployment, the same are reported back to the ACI-UI for administrator review and action.
10
[0062] The processing unit [202] is configured to log-in to the set of controller nodes and to the set of compute nodes. Further, the configuration unit [204] connected at least to the processing unit [202], is configured to configure a controller node from the set of controller nodes as a deployment host.
15
[0063] The deployment host is a centralized server or node within a network infrastructure that is selected and configured to manage the deployment of software, configurations, or updates to other nodes or devices (such as compute nodes) within the same network.
20
[0064] Further, the processing unit [202], at the central controller [200a] is further configured to download a set of scripts on the deployment host. The central controller [200a], using the processing unit [202], initiates a process where it downloads a set of scripts. After downloading the scripts, the central controller
25 [200a] then proceed to execute such scripts on the deployment host. The scripts
might contain commands to install packages, configure services, or perform other necessary tasks to set up the desired software environment.
[0065] Further, the configuration unit [204] is connected at least to the processing
30 unit [202], and at the central controller [200a], the configuration unit [204] is
configured to configure one or more configurations at the deployment host to
19
configure Secure Shell (SSH) password less connection with the set of compute
nodes and one or more remaining controller nodes in the set of controller nodes.
The configuration unit [204] configures the deployment host (i.e. one of the
controller nodes) and the configuration unit [204] is responsible for managing
5 configurations. It initiates and oversees the process of configuring SSH settings on
the deployment host. By configuring SSH passwordless connections, the central controller [200a] simplifies management tasks such as software updates, file transfers, and monitoring across multiple nodes, ensuring efficient and secure communication within the network. SSH is one of the best ways to handle tasks
10 such as automated backups, file synchronization, and remote server access and
management. SSH passwordless login is an SSH authentication method that employs a pair of public and private keys for asymmetric encryption. The public key resides on the server, and only a client that presents the private key can connect. When SSH connections are passwordless, automation scripts (such as those
15 mentioned earlier for NFVI deployment) can securely connect to the set of compute
nodes and execute commands or scripts without requiring manual intervention. This enables smooth execution of deployment tasks across multiple nodes. Passwordless SSH eliminates the need for entering passwords repetitively during configuration tasks. This simplifies configuration management, especially when configuring
20 multiple compute nodes simultaneously or in a scripted deployment scenario. In
large-scale NFVI deployments, managing SSH connections with passwords can become cumbersome and prone to errors. Passwordless SSH simplifies the management process, improves scalability, and reduces administrative overhead. Although, key based authentication is more secure than password less SSH, but for
25 automation tasks passwordless SSH authentication provides greater efficiency.
[0066] The processing unit [202], at the central controller [200a], is further
configured to execute, the one or more scripts at the deployment host, in a sequence.
The processing unit [202] may initiate the execution of the one or more scripts on
30 the deployment host according to a predefined sequence. Scripts (Automation-
workflows) automate repetitive tasks involved in deploying NFVI, such as
20
configuring network settings, installing necessary software packages such as APT
cache and PYPI server URL configurations (not limited to any specific set of
packages), and setting up security policies, and initializing services and fine tuning
the configuration for the NFVI deployment in accordance with the Infrastructure
5 Resource limit. This way scripts help in deployment of NFVI.
[0067] In one implementation, the processing unit [202], is further configured to initiate, a compute scaling command to run corresponding one or more scripts on the deployment host. 10
[0068] In an embodiment, the processing unit [202] of the system [200] is further configured to compute scaling, wherein the user can add or remove compute nodes to the existing NFVI-Cloud via the ACI-UI.
15 [0069] The processing unit [202] is further configured to add one or more compute
nodes. The transceiver unit [206] receives, one or more login credentials for the one or more compute nodes to be added and the processing unit [202] is further configured to initiate a compute scaling command to run corresponding one or more scripts on the deployment host. The transceiver unit [206] receives the login
20 credentials (like SSH keys or usernames/passwords) required to securely access
these new compute nodes that to be added and the processing unit [202] executes the one or more scripts to efficiently add and configure the new compute nodes.
[0070] The processing unit [202] is further configured to delete, one or more
25 compute nodes from the set of compute nodes. The processing unit [202] is
configured to select the one or more compute nodes from the set of compute nodes
for deletion and the processing unit [202] is configured to initiate a delete command
to run corresponding one or more scripts on the deployment host. The processing
unit [202] selects the specific compute nodes that are to be deleted from the set of
30 compute nodes and initiates a delete command, which triggers corresponding
scripts on the deployment host. For example, in compute downscaling: the user may
21
select compute nodes in existing setup, and then initiate operation, where the ACI-UI will run appropriate automation engine on deployment host for removal of compute nodes. This way the processing unit [202] performs the addition or deletion of the compute nodes. 5
[0071] The transceiver unit [206], at the central controller [200a], is configured to receive, one or more real time logs from the deployment host. The processing unit [202], is further configured to redirect, the user interface, to a log console to check the received one or more real time logs from the deployment host. The logs may
10 include deployment logs, execution logs and error logs. Deployment logs may
include timestamps, actions taken (like package installations, configurations, and restarts), and completion messages. Execution logs may include start and end times, task descriptions, and outcomes. Error logs highlight issues encountered during operations. Error logs may provide error messages, timestamps, and sometimes
15 diagnostic information to help identify and resolve problems quickly.
[0072] A log console is a user interface or a dedicated tool within a management
system that provides visibility into logs generated by various nodes or devices
within a network or application infrastructure. Logs refer to structured or semi-
20 structured records of events, actions, or messages that are generated by various
components within an IT system or network infrastructure.
[0073] Referring to FIG.3, an exemplary flow diagram of a method [300] for deploying a Network Functions Virtualization infrastructure (NFVI) in accordance
25 with exemplary implementations of the present disclosure is shown. In an
implementation the method [300] is performed by the system [200]. Further, in an implementation, the system [200] may be present in a server device to implement the features of the present disclosure. Also, as shown in FIG. 3, the method [300] starts at step [302].
30
22
[0074] At first, a user has to configure all requisite configurations like Advanced
Packaging Tool (APT) cache, a Python Package Index (PYPI) server Uniform
Resource Locator (URL), etc. in an Automated Cloud Installer (ACI) for deploying
NFVI. Further, the user has to create a deployment plan with input login credentials
5 for all controller and compute nodes. The compute nodes are the nodes in a
computing system that primarily handle computational tasks. The controller nodes are the nodes that typically manage and coordinate the activities of the compute nodes.
10 [0075] In one implementation, prior to logging to a set of controller nodes and to a
set of compute nodes, the method [300] comprises configuring, by a configuration unit [204], at a central controller [200a], one or more services for NFVI deployment; receiving, by a transceiver unit [206], at the central controller [200a], a set of login credentials for the set of controller nodes and the set of compute nodes;
15 validating, by a validation unit [208], at the central controller [200a], the set of login
credentials and reachability of the set of controller nodes and the set of compute nodes; and initiating, by an installation unit [210], at the central controller [200a], a deploy command to initiate the NFVI deployment. The method is performed by a user at a user interface (UI) of the central controller [200a]. Further, at step 304, the
20 method [300] comprises logging, by a processing unit [202], at the central controller
[200a], to the set of controller nodes and the set of compute nodes.
[0076] The login credentials may include username, password, keys, etc. For example, during the NFVI-Cloud deployment initiation, the ACI-UI performs
25 logging into all the target nodes, once the user initiates the NFVI-Cloud
Deployment. The target nodes may include but are not limited to the controller nodes and compute nodes. The target node refers to a specific node or server within the infrastructure that is targeted for configuration, management, or deployment of resources.
30
23
[0077] For example, for initiating the deployment of the NFVI-Cloud by the
installation unit [210] and logging in the details in a log console, the installation
unit [210] sends out deployment commands to the designated controller nodes and
compute nodes. These commands instruct the controller nodes to orchestrate the
5 setup and configuration of the NFVI environment. If any errors or issues
encountered during deployment, the same are reported back to the ACI-UI for administrator review and action.
[0078] The one or more services configured for NFVI deployment comprise at least
10 one of an Advanced Packaging Tool (APT) Cache related service, a Python Package
Index (PYPI) server Uniform Resource Locator (URL) related service, and a
Hypertext Transfer Protocol (HTTP) server related service. The APT Cache related
service refers to a system or method for managing and storing metadata and binaries
used by APT-based package managers. The Python Package Index (PYPI) server
15 Uniform Resource Locator (URL) related service refers to a server hosting Python
packages that can be accessed via a specific URL. The HTTP server related service
refers to a software service that handles requests and serves content over the
Hypertext Transfer Protocol (HTTP). The micro services are explained as follows:
the APT cache is configured to host APT packages which are required for NFVI
20 deployment. The PYPI is configured to host Python Package Installer (PIP)
packages. The HTTP server is configured to host other required files.
[0079] At step 306, the method [300] comprises configuring, by a configuration unit [204] connected at least to the processing unit [202], the configuration unit
25 [204] at the central controller [200a], a controller node from the set of controller
nodes as a deployment host. The deployment host is a centralized server or node within a network infrastructure that is selected and configured to manage the deployment of software, configurations, or updates to other nodes or devices (such as compute nodes) within the same network.
30
24
[0080] At step 308, the method [300] comprises downloading, by the processing
unit [202], at the central controller [200a], a set of scripts on the deployment host.
More specifically, the method encompasses initiating, by the central controller
[200a], using the processing unit [202], a process where it downloads a set of
5 scripts. After downloading the scripts, the central controller [200a] then proceed to
execute such scripts on the deployment host. The scripts might contain commands to install packages, configure services, or perform other necessary tasks to set up the desired software environment.
10 [0081] At step 310, the method [300] comprises configuring, by the configuration
unit [204], at the central controller [200a], one or more configurations at the deployment host to configure Secure Shell (SSH) password less connection with the set of compute nodes and one or more remaining controller nodes in the set of controller nodes. The configuration unit [204] configures the deployment host (i.e.
15 one of the controller nodes) and initiates and oversees the process of configuring
SSH settings on the deployment host. By configuring SSH passwordless connections, the central controller [200a] simplifies management tasks such as software updates, file transfers, and monitoring across multiple nodes, ensuring efficient and secure communication within the network.
20
[0082] At step 312, the method [300] comprises executing, by the processing unit [202], at the central controller [200a], the one or more scripts at the deployment host, in a sequence. The processing unit [202] may initiate the execution of the one or more scripts on the deployment host according to a predefined sequence. The
25 scripts refer to automation scripts which includes a series of tasks to be performed
on remote hosts written using an open-source automation tool used for configuration management, application deployment, and task automation.
[0083] The method [300] further comprises adding, by the processing unit [202], at
30 the central controller [200a], one or more compute nodes. The method comprises
receiving, by the transceiver unit [206], at the central controller [200a], one or more
25
login credentials for the one or more compute nodes to be added; and initiating, by
the processing unit [202], at the central controller [200a], a compute scaling
command to run corresponding one or more scripts on the deployment host. For
example, the transceiver unit [206] receives the login credentials (like SSH keys or
5 usernames/passwords) required to securely access these new compute nodes that to
be added. Thereafter, the processing unit [202] executes the one or more scripts to efficiently add and configure the new compute nodes.
[0084] The method [300] further comprises deleting, by the processing unit [202],
10 at the central controller [200a], one or more compute nodes from the set of compute
nodes. More specifically the method encompasses selecting, by the processing unit
[202], at the central controller [200a], the one or more compute nodes from the set
of compute nodes for deletion; and initiating, by the processing unit [202], at the
central controller [200a], a delete command to run corresponding one or more
15 scripts on the deployment host.
[0085] The processing unit [202] selects the specific compute nodes that are to be
deleted from the set of compute nodes and initiates a delete command, which
triggers corresponding scripts on the deployment host. For example, in compute
20 downscaling: the user may select compute nodes in existing setup, and then initiate
operation, where the ACI-UI will run appropriate automation engine on deployment host for removal of compute nodes. This way the processing unit [202] performs the addition or deletion of the compute node.
25 [0086] At step 314, the method [300] comprises receiving, by a transceiver unit
[206], at the central controller [200a], one or more real time logs from the deployment host. The method comprises redirecting, by the processing unit [202], at the central controller [200a], the user interface to a log console to check the received one or more real time logs from the deployment host.
30
26
[0087] The logs may include deployment logs, execution logs and error logs.
Deployment logs may include timestamps, actions taken (like package installations,
configurations, and restarts), and completion messages. Execution logs may include
start and end times, task descriptions, and outcomes. Error logs highlight issues
5 encountered during operations. Error logs may provide error messages, timestamps,
and sometimes diagnostic information to help identify and resolve problems quickly.
[0088] Thereafter, at step [316], the method [300] terminates.
10
[0089] Referring to FIG. 4, an architecture [400] of an automated offline Network Functions Virtualization infrastructure (NFVI) cloud deployment, in accordance with exemplary implementations of the present disclosure. The architecture [400] is configured for an automated offline NFVI-cloud deployment to allow automated
15 running of automation engines one-by-one, with the help of the interconnection
between the components/units as shown in FIG. 4.
[0090] As shown in FIG.4, an Automated Cloud Installer User Interface (ACI UI) [402] is connected with a stack service [404] (or also referred to as NFVI cloud
20 service [404]) which further includes one or more micro services which are
performed by the ACI UI [402] during the NFVI-Deployment to enable such deployment. To provide the automated offline NFVI-cloud deployment to allow automated running of automation engines one-by-one, architecture [400] as shown in FIG. 4 is configured to automated deployed the NFVI-Cloud in an offline based
25 environment.
[0091] The one or more services configured for NFVI deployment comprises Advanced Packaging Tool (APT) Cache, Python Package Index (PYPI) server Uniform Resource Locator (URL) and Hypertext Transfer Protocol (HTTP) server. 30
27
[0092] The services are explained as follows: the APT cache hosts APT packages which are required for NFVI deployment. The PYPI hosts PIP packages.
[0093] At first, a user has to configure all pre-requisite configurations such as, but
5 not limited to, APT cache, PYPI server URL, etc. in the ACI UI [402].
[0094] Steps to be followed by a user on the ACI UI [402], before logging into a set of target nodes and to a set of compute nodes, are mentioned as follows: the user creates a deployment plan with input login credentials for all target nodes [406],
10 including the set of compute nodes. Further, the user via the ACI UI [402], validates
the deployment plan to check and verify for reachability of all the target nodes and the login credentials by selecting validate option on the ACI UI [402]. Further, the user needs to select a deploy option which will initiate a stack deployment via the stack service [404], thereafter, redirecting to a log console by the ACI UI [402]
15 where the user can check real time logs.
[0095] Once user initiates deployment (i.e. NFVI-Cloud Deployment) over the stack service [404], the ACI UI [402] logins into all the nodes. It is to be noted that the stack service [404] handles all requests related to a stack deployment. Further,
20 the stack service [404] configures a deployment host (one of the controller nodes)
and performs steps of downloading a set of scripts on the deployment host; configuring one or more configurations at the deployment host to configure Secure Shell (SSH) password less connection with the set of compute nodes and one or more remaining controller nodes in the set of controller nodes. The stack service
25 [404] downloads required scripts in offline mode to the deployment host.
Thereafter, the ACI UI [402] executes the scripts at the deployment host, in a sequence. The ACI UI [402] then receives real time logs from the deployment host.
[0096] In an embodiment, the ACI UI [402] is further configured to do compute
30 scaling, wherein the user can add or remove compute nodes to and from the existing
NFVI-Cloud via the ACI UI [402]. The compute scaling allows the user to add new
28
compute nodes and then initiate compute scaling. Also, compute scaling allows the
user to select compute nodes in the existing setup, for the removal of compute
nodes. The ACI UI accepts one or more login credentials for the compute nodes to
be added; and initiates a compute scaling command to run corresponding scripts on
5 the deployment host. The ACI UI allows the user to select the compute nodes from
the set of compute nodes for deletion. The ACI UI then initiates a delete command to run corresponding scripts on the deployment host.
[0097] Yet another aspect of the present disclosure may relate to a User Equipment
10 (UE), comprising a transmitter unit, configured to transmit to a system [200], a
request to deploy Network Functions Virtualization infrastructure (NFVI); and a receiver unit, configured to receive from the system [200], a response to the request, wherein the response comprises one or more real time logs from a deployment host, and wherein to generate the response at the system [200]: a processing unit [202] is
15 configured to, log-in to a set of controller nodes and to a set of compute nodes; a
configuration unit [204] is configured to, configure a controller node from the set of controller nodes as the deployment host; the processing unit [202] is further configured to download a set of scripts on the deployment host; the configuration unit [204] is further configured to, configure, one or more configurations at the
20 deployment host to configure Secure Shell (SSH) password less connection with
the set of compute nodes and one or more remaining controller nodes in the set of controller nodes; the processing unit [202] is further configured to execute, the one or more scripts at the deployment host, in a sequence; and a transceiver unit [206] is configured to receive, one or more real time logs from the deployment host.
25
[0098] Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instructions for deploying a Network Functions Virtualization infrastructure (NFVI), the instructions include executable code which, when executed by one or more units of a system [200] comprising a
30 central controller [200a] causes: a processing unit [202] to log-in to a set of
controller nodes and to a set of compute nodes. Further, instructions include
29
executable code which, when executed causes a configuration unit [204] to
configure a controller node from the set of controller nodes as a deployment host.
Further, instructions include executable code which, when executed causes the
processing unit [202] to download a set of scripts on the deployment host. Further,
5 instructions include executable code which, when executed causes the
configuration unit [204] to configure, one or more configurations at the deployment
host to configure Secure Shell (SSH) password less connection with the set of
compute nodes and one or more remaining controller nodes in the set of controller
nodes. Further instructions include executable code which, when executed causes
10 the processing unit [202] to execute the one or more scripts at the deployment host,
in a sequence. Further, instructions include executable code which, when executed causes a transceiver unit [206] to receive one or more real time logs from the deployment host.
15 [0099] As is evident from the above, the present disclosure provides a technically
advanced solution for deploying a Network Functions Virtualization infrastructure (NFVI). Various advantages of the present disclosure include:
- Automated offline solution to deploy the NFVI-Cloud.
- Ability to use the NFVI-Cloud even when there is insufficient internet 20 connectivity.
- Time-efficient solution to deploy the NFVI-Cloud.
- Reduced chances of error while deploying the NFVI-Cloud.
- Making configurations like SSH password less login automatically.
- Running automation engines one-by-one automatically. 25
[0100] While considerable emphasis has been placed herein on the disclosed
implementations, it will be appreciated that many implementations can be made and
that many changes can be made to the implementations without departing from the
principles of the present disclosure. These and other changes in the implementations
30 of the present disclosure will be apparent to those skilled in the art, whereby it is to
30
be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.
We Claim:
1. A method [300] for deploying a Network Functions Virtualization
Infrastructure (NFVI), the method comprising:
logging, by a processing unit [202], at a central controller [200a], to a set of
controller nodes and a set of compute nodes;
configuring, by a configuration unit [204], at the central controller [200a], a
controller node from the set of controller nodes as a deployment host;
downloading, by the processing unit [202], at the central controller [200a], a set
of scripts on the deployment host;
configuring, by the configuration unit [204], at the central controller [200a], one
or more configurations at the deployment host to configure Secure Shell (SSH)
password less connection with the set of compute nodes and one or more
remaining controller nodes in the set of controller nodes;
executing, by the processing unit [202], at the central controller [200a], the one
or more scripts at the deployment host, in a sequence; and
receiving, by a transceiver unit [206], at the central controller [200a], one or
more real time logs from the deployment host.
2. The method [300] as claimed in claim 1, wherein prior to logging to the set of
controller nodes and to the set of compute nodes, the method comprises:
configuring, by the configuration unit [204], at the central controller [200a], one
or more services for NFVI deployment;
receiving, by the transceiver unit [206], at the central controller [200a], a set of login credentials for the set of controller nodes and the set of compute nodes; validating, by a validation unit [208], at the central controller [200a], the set of login credentials and reachability of the set of controller nodes and the set of compute nodes; and
initiating, by an installation unit [210], at the central controller [200a], a deploy command to initiate the NFVI deployment.
3. The method [300] as claimed in claim 2, wherein, the method is performed by a user at a user interface of the central controller [200a].
4. The method [300] as claimed in claim 2, wherein the one or more services configured for NFVI deployment comprise at least one of an Advanced Packaging Tool (APT) Cache related service, a Python Package Index (PYPI) server Uniform Resource Locator (URL) related service, and a Hypertext Transfer Protocol (HTTP) server related service.
5. The method [300] as claimed in claim 3, the method further comprises: redirecting, by the processing unit [202], at the central controller [200a], the user interface to a log console to check the received one or more real time logs from the deployment host.
6. The method [300] as claimed in claim 1, the method further comprises, adding, by the processing unit [202], at the central controller [200a], one or more compute nodes.
7. The method [300] as claimed in claim 1, the method further comprises, deleting, by the processing unit [202], at the central controller [200a], one or more compute nodes from the set of compute nodes.
8. The method [300] as claimed in claim 6, the method further comprises: receiving, by the transceiver unit [206], at the central controller [200a], one or more login credentials for the one or more compute nodes to be added; and initiating, by the processing unit [202], at the central controller [200a], a compute scaling command to run corresponding one or more scripts on the deployment host.
9. The method [300] as claimed in claim 7, the method further comprises:
selecting, by the processing unit [202], at the central controller [200a], the one or more compute nodes from the set of compute nodes for deletion; and initiating, by the processing unit [202], at the central controller [200a], a delete command to run corresponding one or more scripts on the deployment host.
10. A system [200] for deploying a Network Functions Virtualization infrastructure
(NFVI), the system [200] comprising:
- a processing unit [202], at a central controller [200a], configured to, log-in to a set of controller nodes and to a set of compute nodes;
- a configuration unit [204] connected at least to the processing unit [202], the configuration unit [204] at the central controller [200a] is configured to, configure a controller node from the set of controller nodes as a deployment host;
- the processing unit [202], at the central controller [200a], further configured to download a set of scripts on the deployment host;
- the configuration unit [204], at the central controller [200a], further configured to, configure, one or more configurations at the deployment host to configure Secure Shell (SSH) password less connection with the set of compute nodes and one or more remaining controller nodes in the set of controller nodes;
- the processing unit [202], at the central controller [200a], further configured to execute, the one or more scripts at the deployment host, in a sequence; and
- a transceiver unit [206] connected at least to the configuration unit [204], the transceiver unit [206] at the central controller [200a] is configured to receive, one or more real time logs from the deployment host.
11. The system [200] as claimed in claim 10, wherein, prior to logging by the
processing unit [202], to the set of controller nodes and to the set of compute
nodes:
- the configuration unit [204] at the central controller [200a] is configured to configure, one or more services for NFVI deployment;
- the transceiver unit [206] at the central controller [200a] is configured to receive, a set of login credentials for the set of controller nodes and the set of compute nodes;
- a validation unit [208] at the central controller [200a] is configured to validate, the set of login credentials and reachability of the set of controller nodes and the set of compute nodes; and
- an installation unit [210] at the central controller [200a] is configured to initiate, a deploy command to initiate the NFVI deployment.
12. The system [200] as claimed in claim 11, wherein, at least one of the configuration unit [204], the transceiver unit [206], the validation unit [208], and the installation unit [210] are configured to receive inputs by a user at a user interface of the central controller [200a].
13. The system [200] as claimed in claim 11, wherein the one or more services configured for NFVI deployment comprise at least one of an Advanced Packaging Tool (APT) Cache related service, a Python Package Index (PYPI) server Uniform Resource Locator (URL) related service, and a Hypertext Transfer Protocol (HTTP) server related service.
14. The system [200] as claimed in claim 12, wherein, the processing unit [202], is further configured to redirect, the user interface, to a log console to check the received one or more real time logs from the deployment host.
15. The system [200] as claimed in claim 10, wherein, the processing unit [202] is further configured to add one or more compute nodes.
16. The system [200] as claimed in claim 10, wherein, the processing unit [202] is further configured to delete, one or more compute nodes from the set of compute nodes.
17. The system [200] as claimed in claim 15, wherein:
- the transceiver unit [206], is further configured to receive, one or more login credentials for the one or more compute nodes to be added; and
- the processing unit [202], is further configured to initiate, a compute scaling command to run corresponding one or more scripts on the deployment host.
18. The system [200] as claimed in claim 16, wherein, the processing unit [202] is
further configured to:
- select, the one or more compute nodes from the set of compute nodes for deletion; and
- initiate, a delete command to run corresponding one or more scripts on the deployment host.
19. A User Equipment (UE), comprising:
- a transmitter unit, configured to transmit to a system [200], a request to deploy Network Functions Virtualization infrastructure (NFVI); and
- a receiver unit, configured to receive from the system [200], a response to the request, wherein the response comprises one or more real time logs from a deployment host, and wherein to generate the response at the system [200], the system [200] comprises:
o a processing unit [202] configured to, log-in to a set of controller
nodes and to a set of compute nodes; o a configuration unit [204] configured to configure a controller node
from the set of controller nodes as the deployment host; o the processing unit [202] further configured to download a set of
scripts on the deployment host;
o the configuration unit [204] further configured to, configure, one or more configurations at the deployment host to configure Secure Shell (SSH) password less connection with the set of compute nodes and one or more remaining controller nodes in the set of controller nodes;
o the processing unit [202] further configured to execute, the one or more scripts at the deployment host, in a sequence; and
o a transceiver unit [206] configured to receive, one or more real time logs from the deployment host.
| # | Name | Date |
|---|---|---|
| 1 | 202321047309-STATEMENT OF UNDERTAKING (FORM 3) [13-07-2023(online)].pdf | 2023-07-13 |
| 2 | 202321047309-PROVISIONAL SPECIFICATION [13-07-2023(online)].pdf | 2023-07-13 |
| 3 | 202321047309-FORM 1 [13-07-2023(online)].pdf | 2023-07-13 |
| 4 | 202321047309-FIGURE OF ABSTRACT [13-07-2023(online)].pdf | 2023-07-13 |
| 5 | 202321047309-DRAWINGS [13-07-2023(online)].pdf | 2023-07-13 |
| 6 | 202321047309-FORM-26 [14-09-2023(online)].pdf | 2023-09-14 |
| 7 | 202321047309-Proof of Right [25-10-2023(online)].pdf | 2023-10-25 |
| 8 | 202321047309-ORIGINAL UR 6(1A) FORM 1 & 26)-011223.pdf | 2023-12-08 |
| 9 | 202321047309-ENDORSEMENT BY INVENTORS [07-07-2024(online)].pdf | 2024-07-07 |
| 10 | 202321047309-DRAWING [07-07-2024(online)].pdf | 2024-07-07 |
| 11 | 202321047309-CORRESPONDENCE-OTHERS [07-07-2024(online)].pdf | 2024-07-07 |
| 12 | 202321047309-COMPLETE SPECIFICATION [07-07-2024(online)].pdf | 2024-07-07 |
| 13 | 202321047309-FORM 3 [02-08-2024(online)].pdf | 2024-08-02 |
| 14 | Abstract-1.jpg | 2024-08-09 |
| 15 | 202321047309-Request Letter-Correspondence [14-08-2024(online)].pdf | 2024-08-14 |
| 16 | 202321047309-Power of Attorney [14-08-2024(online)].pdf | 2024-08-14 |
| 17 | 202321047309-Form 1 (Submitted on date of filing) [14-08-2024(online)].pdf | 2024-08-14 |
| 18 | 202321047309-Covering Letter [14-08-2024(online)].pdf | 2024-08-14 |
| 19 | 202321047309-CERTIFIED COPIES TRANSMISSION TO IB [14-08-2024(online)].pdf | 2024-08-14 |