Abstract: The present disclosure relates to a method and a system for evaluating one or more resources for a network function in a network environment. The method comprises receiving, by a transceiver unit [302] at a network function virtualization platform decision analytics (NPDA) module, a request for performing evaluation of the one or more resources for the network function. The evaluation is based on one or more policies defined for the network function. The method comprises detecting, by a detection unit [304], a threshold breach event associated with the one or more resources, based on the one or more policies. The method comprises performing, by a processing unit [306], a hysteresis-based computation of utilization of the one or more resources, based on detecting threshold breach event. The method comprises triggering, by the transceiver unit [302], a notification for orchestration of one or more resources, based on detecting the threshold breach event. [FIG. 4]
FORM 2
THE PATENTS ACT, 1970
(39 OF 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR EVALUATING ONE OR
MORE RESOURCES FOR A NETWORK FUNCTION”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr.
Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in
which it is to be performed.
2
METHOD AND SYSTEM FOR EVALUATING ONE OR MORE
RESOURCES FOR A NETWORK FUNCTION
FIELD OF THE DISCLOSURE
5
[0001] Embodiments of the present disclosure generally relate to network
management. More particularly, embodiments of the present disclosure relate to
evaluating one or more resources for a network function in a network environment.
10 BACKGROUND
[0002] The following description of the related art is intended to provide
background information pertaining to the field of the disclosure. This section may
include certain aspects of the art that may be related to various features of the
15 present disclosure. However, it should be appreciated that this section is used only
to enhance the understanding of the reader with respect to the present disclosure,
and not as admissions of the prior art.
[0003] The 5G core networks are based on service‐based architecture (SBA) that is
20 centred around network function (NF) services. In the said Service‐Based
Architecture (SBA), a set of interconnected Network Functions (NFs) deliver the
control plane functionality and common data repositories of the 5G network, where
each NF is authorized to access services of other NFs. Particularly, each NF can
register itself and its supported services to a Network Repository Function (NRF),
25 which is used by other NFs for the discovery of NF instances and their services.
Further, the network functions may include, but not limited to, a containerized
network function (CNF) and a virtual network function (VNF).
[0004] The CNFs are a set of small, independent, and loosely coupled services such
30 as microservices. These microservices work independently, which may increase
speed and flexibility while reducing deployment risk. In 5G communication, cloud-
3
native 5G network offers the fully digitized architecture necessary for deploying
new cloud services and taking full advantage of cloud-native 5G features such as
edge computing, as well as network slicing and other services. Whereas the VNFs
may run in virtual machines (VMs) on common virtualization infrastructure. The
5 VNFs may be created on top of network function virtualization infrastructure
(NFVI) which may allocate resources like compute, storage, and networking
efficiently among the VNFs. MANO, which stands for Management and
Orchestration is a key NFV architectural framework that includes all the essential
management modules. It coordinates network resources in NFV framework.
10
[0005] The platforms core services module of the MANO framework comprises
network function virtualization platform decision analytics (NPDA) which helps in
deciding the priority of using the network resources. The problem at hand revolves
around the complex landscape of NPDA and its pivotal role in resource utilization
15 assessment. NPDA operates on threshold-based policies, which are customizable
for each Virtual Network Function (VNF)/VNFC or Containerized Network
Function (CNF)/CNFC. These policies encompass more than simple breach criteria,
by also incorporating hysteresis-based computations to gauge resource load. This
entails not only detecting breaches, but also keeping tabs on the frequency of such
20 breaches. Once the breach count surpasses the hysteresis breach count outlined in
the policy, an orchestration notification is triggered. What sets NPDA apart is its
ability to conduct real-time evaluations of resource loads, aligning them precisely
with the policies defined for each VNF/VNFC or CNF/CNFC. This distinctive
feature stands as a crucial asset in addressing the challenges of resource
25 management and policy enforcement in network environments.
[0006] Thus, there exists an imperative need in the art for a solution to provide realtime evaluation of VNF or VNFC or CNF or CNFC policies pertaining to breach in
their thresholds and help with better resource optimization.
30
4
SUMMARY
[0007] This section is provided to introduce certain aspects of the present disclosure
in a simplified form that are further described below in the detailed description.
5 This summary is not intended to identify the key features or the scope of the claimed
subject matter.
[0008] An aspect of the present disclosure may relate to a method for evaluating
one or more resources for a network function in a network environment. The
10 method comprises receiving, by a transceiver unit at a network function
virtualization platform decision analytics (NPDA) module, a request for performing
evaluation of the one or more resources for the network function. The evaluation is
based on one or more policies defined for the network function. The method
comprises detecting, by a detection unit, at the NPDA, a threshold breach event
15 associated with the one or more resources, based on the one or more policies.
Furthermore, the method comprises performing, by a processing unit, at the NPDA,
a hysteresis-based computation of utilization of the one or more resources, based
on detecting the threshold breach event. Hereinafter, the method comprises
triggering, by the transceiver unit, a notification for orchestration of the one or more
20 resources, based on detecting the threshold breach event.
[0009] In an exemplary aspect of the present disclosure, the network function is
one of a virtual network function (VNF) and a containerized network function
(CNF).
25
[0010] In an exemplary aspect of the present disclosure, the one or more policies
define a threshold breach criteria for each of the one or more resources.
[0011] In an exemplary aspect of the present disclosure, the method comprises real30 time evaluation of the one or more resources, based on the one or more policies for
the network function.
5
[0012] In an exemplary aspect of the present disclosure, the at least one of the
threshold breach criteria for the one or more resources is a combination of one or
more threshold breach criteria for the one or more resources.
5
[0013] In an exemplary aspect of the present disclosure, the hysteresis-based
computation is performed if the threshold breach event is related to the threshold
breach criteria which is a combination of the one or more threshold breach criteria
for the one or more resources.
10
[0014] In an exemplary aspect of the present disclosure, the one or more policies
further define a hysteresis breach count for the one or more resources.
[0015] In an exemplary aspect of the present disclosure, the hysteresis-based
15 computation evaluates a count of detection of the threshold breach event and if the
count breaches the hysteresis breach count defined in the one or more policies.
[0016] In an exemplary aspect of the present disclosure, the notification for
orchestration of the one or more resources is triggered if the count breaches
20 hysteresis breach count.
[0017] In an exemplary aspect of the present disclosure, the one or more resources
comprise a central processing units (CPU), a random memory access (RAM),
network bandwidth, one or more key performance indicators (KPIs), a counter
25 value, an alarm value, and combinations thereof.
[0018] In an exemplary aspect of the present disclosure, the orchestration of the
one or more resources comprises at least one of a healing action, a scale-in action,
and a scale-out action.
30
6
[0019] Another aspect of the present disclosure may relate to a system for
evaluating one or more resources for a network function in a network environment.
The system comprises a transceiver unit. The transceiver unit is configured to
receive, at a network function virtualization platform decision analytics (NPDA)
5 module, a request for performing evaluation of the one or more resources for the
network function. The evaluation is based on one or more policies defined for the
network function. The system further comprises a detection unit. The detection unit
is configured to detect, at the NPDA, a threshold breach event associated with the
one or more resources, based on the one or more policies. The system further
10 comprises a processing unit. The processing unit is configured to perform, at the
NPDA, a hysteresis-based computation of utilization of the one or more resources,
based on detecting the threshold breach event. Further, the transceiver unit is
configured to trigger a notification for orchestration of the one or more resources,
based on detecting the threshold breach event.
15
[0020] Yet another aspect of the present disclosure may relate to a non-transitory
computer readable storage medium storing instructions for evaluating one or more
resources for a network function in a network environment, the instructions include
executable code which, when executed by one or more units of a system cause a
20 transceiver unit to receive, at a network function virtualization platform decision
analytics (NPDA) module, a request for performing evaluation of the one or more
resources for the network function. The evaluation is based on one or more policies
defined for the network function. The instructions when executed by the system
further cause a detection unit to detect, at the NPDA, a threshold breach event
25 associated with the one or more resources, based on the one or more policies. The
instructions when executed by the system further cause a processing unit to
perform, at the NPDA, a hysteresis-based computation of utilization of the one or
more resources, based on detecting the threshold breach event. The instructions
when executed by the system further cause the transceiver unit to trigger a
30 notification for orchestration of the one or more resources, based on detecting the
threshold breach event.
7
OBJECTS OF THE DISCLOSURE
[0021] Some of the objects of the present disclosure, which at least one
embodiment disclosed herein satisfies are listed herein below.
5
[0022] It is an object of the present disclosure to provide a solution for evaluation
of network resource utilization.
[0023] It is another object of the present disclosure to provide a system and method
10 that allows for real time evaluation of VNF or VNFC or CNF or CNFC policy
pertaining to breach in their thresholds help with better resource optimization.
[0024] It is another object of the present disclosure to provide a dynamic decision
making support for resource orchestration.
15
[0025] It is yet another object of the present invention to provide a solution to
identify if evaluation of threshold breach event requires a hysteresis-based
computation or not.
20 DESCRIPTION OF THE DRAWINGS
[0026] The accompanying drawings, which are incorporated herein, and constitute
a part of this disclosure, illustrate exemplary embodiments of the disclosed methods
and systems in which like reference numerals refer to the same parts throughout the
25 different drawings. Components in the drawings are not necessarily to scale,
emphasis instead being placed upon clearly illustrating the principles of the present
disclosure. Also, the embodiments shown in the figures are not to be construed as
limiting the disclosure, but the possible variants of the method and system
according to the disclosure are illustrated herein to highlight the advantages of the
30 disclosure. It will be appreciated by those skilled in the art that disclosure of such
8
drawings includes disclosure of electrical components or circuitry commonly used
to implement such components.
[0027] FIG. 1 illustrates an exemplary block diagram representation of
5 management and orchestration (MANO) architecture/ platform, in accordance with
exemplary implementation of the present disclosure.
[0028] FIG. 2 illustrates an exemplary block diagram of a computing device upon
which the features of the present disclosure may be implemented in accordance with
10 exemplary implementation of the present disclosure.
[0029] FIG. 3 illustrates an exemplary block diagram of a system for evaluating
one or more resources for a network function in a network environment, in
accordance with exemplary implementations of the present disclosure.
15
[0030] FIG. 4 illustrates a method flow diagram for evaluating one or more
resources for a network function in a network environment, in accordance with
exemplary implementations of the present disclosure.
20 [0031] FIG.5 illustrates an implementation of the architecture of NPDA for
evaluating one or more resources for a network function in a network environment,
in accordance with exemplary implementations of the present disclosure.
[0032] FIG. 6 an exemplary implementation of the method flow [600] for
25 performing the NPDA operations via the interfaces for evaluating one or more
resources for a network function in a network environment, in accordance with
exemplary implementations of the present disclosure.
[0033] The foregoing shall be more apparent from the following more detailed
30 description of the disclosure.
9
DETAILED DESCRIPTION
[0034] In the following description, for the purposes of explanation, various
specific details are set forth in order to provide a thorough understanding of
5 embodiments of the present disclosure. It will be apparent, however, that
embodiments of the present disclosure may be practiced without these specific
details. Several features described hereafter may each be used independently of one
another or with any combination of other features. An individual feature may not
address any of the problems discussed above or might address only some of the
10 problems discussed above.
[0035] The ensuing description provides exemplary embodiments only, and is not
intended to limit the scope, applicability, or configuration of the disclosure. Rather,
the ensuing description of the exemplary embodiments will provide those skilled in
15 the art with an enabling description for implementing an exemplary embodiment.
It should be understood that various changes may be made in the function and
arrangement of elements without departing from the spirit and scope of the
disclosure as set forth.
20 [0036] Specific details are given in the following description to provide a thorough
understanding of the embodiments. However, it will be understood by one of
ordinary skill in the art that the embodiments may be practiced without these
specific details. For example, circuits, systems, processes, and other components
may be shown as components in block diagram form in order not to obscure the
25 embodiments in unnecessary detail.
[0037] Also, it is noted that individual embodiments may be described as a process
which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure
diagram, or a block diagram. Although a flowchart may describe the operations as
30 a sequential process, many of the operations may be performed in parallel or
concurrently. In addition, the order of the operations may be re-arranged. A process
10
is terminated when its operations are completed but could have additional steps not
included in a figure.
[0038] The word “exemplary” and/or “demonstrative” is used herein to mean
5 serving as an example, instance, or illustration. For the avoidance of doubt, the
subject matter disclosed herein is not limited by such examples. In addition, any
aspect or design described herein as “exemplary” and/or “demonstrative” is not
necessarily to be construed as preferred or advantageous over other aspects or
designs, nor is it meant to preclude equivalent exemplary structures and techniques
10 known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes,” “has,” “contains,” and other similar words are used in either the detailed
description or the claims, such terms are intended to be inclusive—in a manner
similar to the term “comprising” as an open transition word—without precluding
any additional or other elements.
15
[0039] As used herein, a “processing unit” or “processor” or “operating processor”
includes one or more processors, wherein processor refers to any logic circuitry for
processing instructions. A processor may be a general-purpose processor, a special
purpose processor, a conventional processor, a digital signal processor, a plurality
20 of microprocessors, one or more microprocessors in association with a (Digital
Signal Processing) DSP core, a controller, a microcontroller, Application Specific
Integrated Circuits, Field Programmable Gate Array circuits, any other type of
integrated circuits, etc. The processor may perform signal coding data processing,
input/output processing, and/or any other functionality that enables the working of
25 the system according to the present disclosure. More specifically, the processor or
processing unit is a hardware processor.
[0040] As used herein, “a user equipment”, “a user device”, “a smart-user-device”,
“a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”,
30 “a wireless communication device”, “a mobile communication device”, “a
communication device” may be any electrical, electronic and/or computing device
11
or equipment, capable of implementing the features of the present disclosure. The
user equipment/device may include, but is not limited to, a mobile phone, smart
phone, laptop, a general-purpose computer, desktop, personal digital assistant,
tablet computer, wearable device or any other computing device which is capable
5 of implementing the features of the present disclosure. Also, the user device may
contain at least one input means configured to receive an input from at least one of
a transceiver unit, a processing unit, a storage unit, a detection unit and any other
such unit(s) which are required to implement the features of the present disclosure.
10 [0041] As used herein, “storage unit” or “memory unit” refers to a machine or
computer-readable medium including any mechanism for storing information in a
form readable by a computer or similar machine. For example, a computer-readable
medium includes read-only memory (“ROM”), random access memory (“RAM”),
magnetic disk storage media, optical storage media, flash memory devices or other
15 types of machine-accessible storage media. The storage unit stores at least the data
that may be required by one or more units of the system to perform their respective
functions.
[0042] As used herein “interface” or “user interface” refers to a shared boundary
20 across which two or more separate components of a system exchange information
or data. The interface may also be referred to a set of rules or protocols that define
communication or interaction of one or more modules or one or more units with
each other, which also includes the methods, functions, or procedures that may be
called.
25
[0043] All modules, units, components used herein, unless explicitly excluded
herein, may be software modules or hardware processors, the processors being a
general-purpose processor, a special purpose processor, a conventional processor,
a digital signal processor (DSP), a plurality of microprocessors, one or more
30 microprocessors in association with a DSP core, a controller, a microcontroller,
12
Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array
circuits (FPGA), any other type of integrated circuits, etc.
[0044] As used herein the transceiver unit include at least one receiver and at least
5 one transmitter configured respectively for receiving and transmitting data, signals,
information or a combination thereof between units/components within the system
and/or connected with the system.
[0045] As discussed in the background section, the current known solutions have
10 several shortcomings. The present disclosure aims to overcome the abovementioned and other existing problems in this field of technology by providing
method and system of evaluating one or more resources for a network function in a
network environment.
15 [0046] FIG. 1 illustrates an exemplary block diagram representation of a
management and orchestration (MANO) architecture/ platform [100], in
accordance with exemplary implementation of the present disclosure. The MANO
architecture [100] is developed for managing telecom cloud infrastructure
automatically, managing design or deployment design, managing instantiation of
20 network node(s)/ service(s) etc. The MANO architecture [100] deploys the network
node(s) in the form of Virtual Network Function (VNF) and Cloud-native/
Container Network Function (CNF). The system may comprise one or more
components of the MANO architecture [100]. The MANO architecture [100] is
used to auto-instantiate the VNFs into the corresponding environment of the present
25 disclosure so that it could help in onboarding other vendor(s) CNFs and VNFs to
the platform.
[0047] As shown in FIG. 1, the MANO architecture [100] comprises a user
interface layer, a network function virtualization (NFV) and software defined
30 network (SDN) design function module [104], a platforms foundation services
module [106], a platform core services module [108] and a platform resource
13
adapters and utilities module [112]. All the components are assumed to be
connected to each other in a manner as obvious to the person skilled in the art for
implementing features of the present disclosure.
5 [0048] The NFV and SDN (NFVSDN) design function module [104] comprises a
VNF lifecycle manager (compute) [1042], a VNF catalogue [1044], a network
services catalogue [1046], a network slicing and service chaining manager [1048],
a physical and virtual resource manager [1050] and a CNF lifecycle manager
[1052]. The VNF lifecycle manager (compute) [1042] is responsible for deciding
10 on which server of the communication network, the microservice will be
instantiated. The VNF lifecycle manager (compute) [1042] may manage the overall
flow of incoming/ outgoing requests during interaction with the user. The VNF
lifecycle manager (compute) [1042] is responsible for determining which sequence
to be followed for executing the process. For e.g. in an AMF network function of
15 the communication network (such as a 5G network), sequence for execution of
processes P1 and P2 etc. The VNF catalogue [1044] stores the metadata of all the
VNFs (also CNFs in some cases). The network services catalogue [1046] stores the
information about the services that need to be run. The network slicing and service
chaining manager [1048] manages the slicing (an ordered and connected sequence
20 of network service/ network functions (NFs)) that must be applied to a specific
networked data packet. The physical and virtual resource manager [1050] stores the
logical and physical inventory of the VNFs. Just like the VNF lifecycle manager
(compute) [1042], the CNF lifecycle manager [1052] is used for the CNFs lifecycle
management.
25
[0049] The platforms foundation services module [106] comprises a microservices
elastic load balancer [1062], an identify & access manager [1064], a command line
interface (CLI) [1066], a central logging manager [1068], and an event routing
manager [1070]. The microservices elastic load balancer [1062] is used for
30 maintaining the load balancing of the request for the services. The identify & access
manager [1064] is used for logging purposes. The command line interface (CLI)
14
[1066] is used to provide commands to execute certain processes which require
changes during the run time. The central logging manager [1068] is responsible for
keeping the logs of every service. These logs are generated by the MANO platform
[100]. These logs are used for debugging purposes. The event routing manager
5 [1070] is responsible for routing the events i.e., the application programming
interface (API) hits to the corresponding services.
[0050] The platforms core services module [108] comprises NFV infrastructure
monitoring manager [1082], an assure manager [1084], a performance manager
10 [1086], a policy execution engine [1088], a capacity monitoring manager [1090], a
release management (mgmt.) repository [1092], a configuration manager & GCT
[1094], an NFV platform decision analytics [1096], a platform NoSQL DB [1098];
a platform schedulers and cron jobs [1100], a VNF backup & upgrade manager
[1102], a micro service auditor [1104], and a platform operations, administration
15 and maintenance manager [1106]. The NFV infrastructure monitoring manager
[1082] monitors the infrastructure part of the NFs. For e.g., any metrics such as
CPU utilization by the VNF. The assure manager [1084] is responsible for
supervising the alarms the vendor is generating. The performance manager
[1086] is responsible for managing the performance counters. The policy execution
20 engine (PEEGN) [1088] is responsible for all the managing the policies. The
capacity monitoring manager (CMM) [1090] is responsible for sending the request
to the PEEGN [1088]. The release management (mgmt.) repository (RMR) [1092]
is responsible for managing the releases and the images of all the vendor network
node. The configuration manager & (GCT) [1094] manages the configuration and
25 GCT of all the vendors. The NFV platform decision analytics (NPDA) [1096]
helps in deciding the priority of using the network resources. It is further noted that
the policy execution engine (PEEGN) [1088], the configuration manager & GCT
[1094] and the NPDA [1096] work together. The platform NoSQL DB [1098] is a
database for storing all the inventory (both physical and logical) as well as the
30 metadata of the VNFs and CNF. The platform schedulers and cron jobs [1100]
schedules the task such as but not limited to triggering of an event, traverse the
15
network graph etc. The VNF backup & upgrade manager [1102] takes backup of
the images, binaries of the VNFs and the CNFs and produces that backup on
demand in case of server failure. The micro service auditor [1104] audits the
microservices. For e.g., in a hypothetical case, instances not being instantiated by
5 the MANO architecture [100] using the network resources then the micro service
auditor [1104] audits and informs the same so that resources can be released for
services running in the MANO architecture [100], thereby assuring the services
only run on the MANO platform [100]. The platform operations, administration and
maintenance manager [1106] is used for newer instances that are spawning.
10
[0051] The platform resource adapters and utilities module [112] further comprises
a platform external API adaptor and gateway [1122]; a generic decoder and indexer
(XML, CSV, JSON) [1124]; a docker swarm adaptor [1126]; an OpenStack API
adapter [1128]; and a NFV gateway [1130]. The platform external API adaptor and
15 gateway [1122] is responsible for handling the external services (to the MANO
platform [100]) that requires the network resources. The generic decoder and
indexer (XML, CSV, JSON) [1124] gets directly the data of the vendor system in
the XML, CSV, JSON format. The docker swarm adaptor [1126] is the interface
provided between the telecom cloud and the MANO architecture [100] for
20 communication. The OpenStack API adapter [1128] is used to connect with virtual
machines (VMs). The NFV gateway [1130] is responsible for providing the path to
each service going to/incoming from the MANO architecture [100].
[0052] FIG. 2 illustrates an exemplary block diagram of a computing device [200]
25 upon which the features of the present disclosure may be implemented in
accordance with exemplary implementation of the present disclosure. In an
implementation, the computing device [200] may also implement a method for
evaluating one or more resources for a network function in a network environment
utilising the system. In another implementation, the computing device [200] itself
30 implements the method for evaluating one or more resources for a network function
in a network environment, using one or more units configured within the computing
16
device [200], wherein said one or more units are capable of implementing the
features as disclosed in the present disclosure.
[0053] The computing device [200] may include a bus [202] or other
5 communication mechanism for communicating information, and a hardware
processor [204] coupled with bus [202] for processing information. The hardware
processor [204] may be, for example, a general-purpose microprocessor. The
computing device [200] may also include a main memory [206], such as a randomaccess memory (RAM), or other dynamic storage device, coupled to the bus [202]
10 for storing information and instructions to be executed by the processor [204]. The
main memory [206] also may be used for storing temporary variables or other
intermediate information during execution of the instructions to be executed by the
processor [204]. Such instructions, when stored in non-transitory storage media
accessible to the processor [204], render the computing device [200] into a special15 purpose machine that is customized to perform the operations specified in the
instructions. The computing device [200] further includes a read only memory
(ROM) [208] or other static storage device coupled to the bus [202] for storing static
information and instructions for the processor [204].
20 [0054] A storage device [210], such as a magnetic disk, optical disk, or solid-state
drive is provided and coupled to the bus [202] for storing information and
instructions. The computing device [200] may be coupled via the bus [202] to a
display [212], such as a cathode ray tube (CRT), Liquid crystal Display (LCD),
Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for
25 displaying information to a computer user. An input device [214], including
alphanumeric and other keys, touch screen input means, etc. may be coupled to the
bus [202] for communicating information and command selections to the processor
[204]. Another type of user input device may be a cursor controller [216], such as
a mouse, a trackball, or cursor direction keys, for communicating direction
30 information and command selections to the processor [204], and for controlling
cursor movement on the display [212]. This input device typically has two degrees
17
of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow
the device to specify positions in a plane.
[0055] The computing device [200] may implement the techniques described
5 herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware
and/or program logic which in combination with the computing device [200] causes
or programs the computing device [200] to be a special-purpose machine.
According to one implementation, the techniques herein are performed by the
computing device [200] in response to the processor [204] executing one or more
10 sequences of one or more instructions contained in the main memory [206]. Such
instructions may be read into the main memory [206] from another storage medium,
such as the storage device [210]. Execution of the sequences of instructions
contained in the main memory [206] causes the processor [204] to perform the
process steps described herein. In alternative implementations of the present
15 disclosure, hard-wired circuitry may be used in place of or in combination with
software instructions.
[0056] The computing device [200] also may include a communication interface
[218] coupled to the bus [202]. The communication interface [218] provides a two20 way data communication coupling to a network link [220] that is connected to a
local network [222]. For example, the communication interface [218] may be an
integrated services digital network (ISDN) card, cable modem, satellite modem, or
a modem to provide a data communication connection to a corresponding type of
telephone line. As another example, the communication interface [218] may be a
25 local area network (LAN) card to provide a data communication connection to a
compatible LAN. Wireless links may also be implemented. In any such
implementation, the communication interface [218] sends and receives electrical,
electromagnetic or optical signals that carry digital data streams representing
various types of information.
30
18
[0057] The computing device [200] can send messages and receive data, including
program code, through the network(s), the network link [220] and the
communication interface [218]. In the Internet example, a server [230] might
transmit a requested code for an application program through the Internet [228], the
5 ISP [226], the local network [222], the host [224] and the communication interface
[218]. The received code may be executed by the processor [204] as it is received,
and/or stored in the storage device [210], or other non-volatile storage for later
execution.
10 [0058] The present disclosure is implemented by a system [300] (as shown in FIG.
3). In an implementation, the system [300] may include the computing device [200]
(as shown in FIG. 2). It is further noted that the computing device [200] is able to
perform the steps of a method [400] (as shown in FIG. 4).
15 [0059] Referring to FIG. 3, an exemplary block diagram of a system [300] for
evaluating one or more resources for a network function in a network environment
is shown, in accordance with the exemplary implementations of the present
disclosure. The system [300] comprises at least one transceiver unit [302], at least
one detection unit [304] and at least one processing unit [306]. Also, all of the
20 components/ units of the system [300] are assumed to be connected to each other
unless otherwise indicated below. As shown in the figures all units shown within
the system should also be assumed to be connected to each other. Also, in FIG. 3
only a few units are shown, however, the system [300] may comprise multiple such
units or the system [300] may comprise any such numbers of said units, as required
25 to implement the features of the present disclosure. Further, in an implementation,
the system [300] may reside in a server or a network entity. In yet another
implementation, the system [300] may reside partly in the server/ network entity.
[0060] The system [300] is configured for evaluating one or more resources for a
30 network function (NF) in a network environment, with the help of the
interconnection between the components/units of the system [300]. In an exemplary
19
aspect of the present disclosure, the network function is one of a virtual network
function (VNF) and a containerized network function (CNF). As used herein, the
VNF may refer to software applications that deliver network functions such as
directory services, routers, firewalls, load balancers, etc. The CNF may be a
5 component or a software service that fulfils certain network functionalities while
adhering to cloud-native design principles without requiring any hardware or
appliance to house it.
[0061] Collecting accurate network function (NF) resource utilization information
10 is important for performing a variety of operational tasks. For example, when
provisioning resources, resource utilization information from the network function
is used as the basis for sizing of virtual machines which host the network function.
For overload operational tasks, virtual machine resource utilization information is
used to select virtual machines which are to be migrated to another server, as well
15 as the target servers which are to receive the virtual machines.
[0062] The transceiver unit [302] is configured to receive, at a network function
virtualization platform decision analytics (NPDA) module, a request for performing
evaluation of the one or more resources for the network function. In one example,
20 the system [300] may be implemented as NPDA [1096] aa shown in FIG. 1. In such
cases, the NPDA module may be responsible for performing the functions of the
NPDA [1096]. In an exemplary aspect of the present disclosure, the request for
performing evaluation of the one or more resources for the network function is
received, by the transceiver unit, at the NPDA module, from at least one of a
25 command line interface (CLI), and a user interface (UI). The evaluation is based on
one or more policies defined for the network function. The NPDA module
implements an intelligent policy mechanism that helps prevent network outages by
proactively analyzing network defects by evaluating utilization of the one or more
resources and triggering healing processes in real-time. NPDA module evaluates
30 the network resources utilization based on the pre-defined policies and received
actual network resource usage. Policies allow network operators to monitor a set
20
of pre-defined key performance indicators (KPIs) and create rules to define when
the applications running on the network function indicate an overload, underload,
or a healing condition. The policy also allows network operators to define an
automatic triggered action to be performed when any of these conditions is met.
5 This ensures that the VNF/VNFC or CNF/CNFC instances are either restarted or
migrated to a healthy host. Thus, optimizing resource utilization and network
performance.
[0063] In an exemplary aspect of the present disclosure, the system [300] is
10 configured to perform real-time evaluation of the utilization of the one or more
resources, based on the one or more policies for the network function. The NPDA
module provides an intelligent, dynamic, real-time policy mechanism. This
mechanism, combined with NFVSDN [104] module’s (as shown and described in
FIG. 1) network defect detection and proactive notification through PVIM
15 microservice, allows for swift and informed action to address potential network
issues before they escalate into outages. NFVSDN [104] module with its
components plays a crucial role in analyzing network defects, enabling quick
responses and maintaining a healthy network environment.
20 [0064] The system [300] helps prevent network outages by proactively analyzing
network defects and triggering healing processes in real-time. The real-time
evaluation of the utilization of the one or more resources ensures quick adaptability
to changing network conditions, immediate response, and efficient healing
processes, ultimately leading to improved network reliability, and minimized
25 downtime.
[0065] In an exemplary aspect of the present disclosure, the one or more resources
comprise at least a central processing units (CPU), a random memory access
(RAM), network bandwidth, one or more key performance indicators (KPIs), a
30 counter value, an alarm value, and combinations thereof. These resources will be
described in the following paragraphs.
21
[0066] In an exemplary aspect of the present disclosure, the one or more policies
define a threshold breach criteria for each of the one or more resources. The policies
set by network operator for the NF monitor a set of pre-defined KPIs and create
5 rules to define when the applications running on the NF indicate an overload,
underload, or healing condition based on the utilization of the one or more
resources. These rules define a criteria based on which the overload, underload or
the healing condition is detected. These criteria further define a threshold, where
the values of the threshold when breached define the overload, underload and
10 healing conditions. The breach occurs in both the conditions when the value is
below the threshold and also above the threshold. This refers to defining threshold
breach criteria for the each of the resources utilized by the NF. Network operators
can use a template available at the UI /CLI of the NPDA module to define a list of
conditions and rules and specify an action to be automatically performed when
15 those conditions are met. The template can be used to create a VNF/CNF policy
comprising the rules defining the threshold breach criteria. The network operators
can modify the defined conditions/rules and actions through the UI/CLI at the
NPDA module. The policies are created for VNF/VNFC or CNF/CNFC through
the UI/CLI interfaces and then the policies are stored in a database by NPDA.
20
[0067] In an exemplary aspect of the present disclosure, the at least one of the
threshold breach criteria for the one or more resources is a combination of one or
more threshold breach criteria for the one or more resources. The threshold breach
criteria defined for a resource can be a combination of threshold breach criteria for
25 two or more other resources. For example, a threshold breach criteria defined for
network bandwidth can be a combination of threshold breach criteria defined for
CPU and RAM. In an implementation, the combination can be formed through an
‘AND’ or an ‘OR’ operator.
30 [0068] In an exemplary aspect of the present disclosure, the one or more policies
further define a hysteresis breach count for the one or more resources. The
22
hysteresis breach count is pre-defined in the one or more policies. The hysteresis
count defines for how many number of times the threshold breach event has
occurred for a combination of threshold breach criteria for the one or more
resources. For example, how many times the system [300] has detected the
5 threshold breach event for network bandwidth. If the hysteresis count reaches the
pre-defined hysteresis breach count, then the system [300] has to trigger an action.
[0069] The detection unit [304] is configured to detect, at the NPDA module, a
threshold breach event associated with the one or more resources, based on the one
10 or more policies. The NPDA module is configured to evaluate the VNF/VNFC and
the CNF/CNFC resource load based on the resource load information received from
a Capacity Monitoring Platform (CMP) microservice and simultaneously an alarm
notification from a Physical and Virtual Inventory Manager (PVIM) microservice,
which are routed through an Event Routing Manager (EVM) microservice to the
15 NPDA module. It is to be noted that the CMP, PVIM and ERM microservices are
integrated with the MANO architecture as described with reference to FIG.1. The
detection unit [304] detects the resource load information and alarm notification
received from the EVM. As described earlier, each policy defines a threshold breach
criteria for the one or more resources. When the one or more resources, breach the
20 threshold breach criteria, based on their utilization, this is termed as the threshold
breach event, which is received by the detection unit [304] from the EVM.
[0070] Further, based on detecting the threshold breach event, the processing unit
[306] is configured to perform, at the NPDA, a hysteresis-based computation of
25 utilization of the one or more resources. In an exemplary aspect of the present
disclosure, the hysteresis-based computation is performed if the threshold breach
event is related to the threshold breach criteria which is a combination of one or
more other threshold breach criteria for the one or more resources. To evaluate the
threshold breach event associated with the one or more resources, and take
30 necessary actions, the system [300] is configured to further evaluate if the threshold
breach criteria associated with the threshold breach event is a combination of
23
threshold breach criteria of the one or more resources. For example, a threshold
breach criteria for network bandwidth may be a combination of threshold breach
criteria for CPU and RAM utilization. If the threshold breach event is associated
with a combination of threshold breach criteria, then the processing unit [306]
5 performs the hysteresis-based computation of the resources load. The processing
unit [306] at the NPDA module fetches the policy defined against the VNF/VNFC
or CNF/CNFC from the database and performs hysteresis evaluation based on the
received resource utilization details. The processing unit [306] at the NPDA module
also fetches the policies defined against the provided VNF/VNFC or CNF/CNFC
10 and the alarm history from the database for the component and then it performs
hysteresis evaluation over the same.
[0071] In an exemplary aspect of the present disclosure, the hysteresis-based
computation evaluates a count of detection of the threshold breach event and if the
15 count breaches the hysteresis breach count defined in the one or more policies. The
count of threshold breach events as detected by the detection unit [304] is compared
with the hysteresis breach count as pre-defined in the one or more policies. If the
count of threshold breach events equals the pre-defined hysteresis breach count,
then the system [300] is configured to take necessary actions.
20
[0072] In an exemplary implementation of the present disclosure, consider a
scenario where a policy name: “Policy X” has been designed through UI /CLI of
the NPDA module for a particular CNF say “CNF1”.
Parameter Name Parameter Value
Policy Name Policy X
CNF Name CNF1
CPU >=90%
RAM >=80 GB
ALARM DISK_SIZE_INCREASED
24
ALARM Hysteresis Count 10
ALARM Hysteresis Time interval 10 minutes
Trigger Relation (CPU AND RAM ) OR ALARM
Action Scale-In new CNF name CNF2
[0073] When a resource threshold breach event has been sent by CMP micro
service for the CNF named CNF1, where the threshold breach event is related to
the CPU usage as 90 %. As soon the threshold breach event is received, NPDA
5 module fetches the respective policy details for CNF1 from the database. Once the
policy is fetched, say Policy X as described in the above table, NPDA module starts
comparing the received CPU usage i.e. 90% with the value mentioned in Policy X
and since there is a breach but the trigger relation is not met, i.e. RAM or ALARM
event has not exceeded, therefore, the threshold-based policy evaluation yields to
10 false. Here, the trigger relation defines the threshold breach criteria which is a
combination of threshold breach criteria for RAM and CPU. This combination
requires hysteresis-based computation as described above.
[0074] Similarly, after some time, if the CMP sends an alarm
15 DISK_SIZE_INCREASED continuously for 20 times to NPDA module with in 1
minute, then NPDA module comparesthis with the Policy X and evaluatesthe result
as true because hysteresis count has breached more than 10 times in 10 minutes
interval. The evaluated result is then sent to the PEEGN micro service [1088] with
the action to perform scale in with the new CNF named as CNF2. The PEEGN
20 microservice [1088] as described in FIG. 1 illustrating the MANO framework, is
responsible for actual resource scaling through a scaling policy.
[0075] Further, based on detecting the threshold breach event, the transceiver unit
[302] is further configured to trigger, a notification for orchestration of the one or
25 more resources. The notification for orchestration of the one or more resources is
triggered if the count of threshold breach event breaches the hysteresis breach
count. The notification for orchestration of the one or more resources may also be
25
triggered even if the threshold breach event is not related to the combination of the
threshold breach criteria, and the threshold breach criteria in the one or more
policies defines an action to be taken.
5 [0076] In an exemplary aspect of the present disclosure, the orchestration of the
one or more resources comprises at least one of a healing action, a scale-in action,
and a scale-out action. In general, healing action refers to automated processes that
detect and correct issues within a system. For example, if a server instance becomes
unresponsive, a healing action might automatically restart the server, replace it with
10 a new instance or reroute traffic to healthy instances. Further, the scale-in action
includes reducing number of resources, or instances in a system. In addition, the
scale-out action refers to a process of adding more resources or instances to handle
increased demand. For example, if traffic to a network function spikes, scaling out
would involve adding more instances to distribute load. In an exemplary aspect, the
15 PEEGN [1088] of the MANO framework, is responsible for actual resource scaling
through a scaling policy.
[0077] Referring to FIG. 4, an exemplary method flow diagram [400] for evaluating
one or more resources for a network function in a network environment, in
20 accordance with exemplary implementations of the present disclosure is shown. In
an implementation the method [400] is performed by the system [300]. Further, in
an implementation, the system [300] may be present in a server device to implement
the features of the present disclosure. Also, as shown in FIG. 4, the method [400]
starts at step [402].
25
[0078] The one or more resources comprise a central processing units (CPU), a
random memory access (RAM), network bandwidth, one or more key performance
indicators (KPIs), a counter value, an alarm value, and combinations thereof. The
network function is one of a virtual network function (VNF) and a containerized
30 network function (CNF). An alarm notifies network operators once a resource or a
service reaches a pre-defined threshold like errors or usage. The alarm is triggered
26
based on an alarm value which is pre-defined in the policies. The counters
encapsulate crucial performance data of various resources. The counter value
defines metrics such as connection speed, latency, data transfer rates, and many
others. The counter value is processed and aggregated as required, forming a
5 comprehensive overview of network performance. The system [300] uses the
counters, which are collected and processed from various resources. The counter
values are processed to determine one or more KPIs.
[0079] At step [404], the method [400] comprises receiving, by a transceiver unit
10 [302] at a network function virtualization platform decision analytics (NPDA)
module, a request for performing evaluation of the one or more resources for the
network function. In an exemplary aspect of the present disclosure, the request for
performing evaluation of the one or more resources for the network function is
received, by the transceiver unit, at the NPDA module, from at least one of a
15 command line interface (CLI), and a user interface (UI). The evaluation is based on
one or more policies defined for the network function. The NPDA module
implements an intelligent policy mechanism that helps prevent network outages by
proactively analyzing network defects by evaluating utilization of the one or more
resources and triggering healing processes in real-time. Policies allow network
20 operators to monitor a set of pre-defined key performance indicators (KPIs) and
create rules to define when the applications running on the network function
indicates an overload, underload, or a healing condition. The policy also allows
network operators to define an automatic triggered action to be performed when
any of these conditions is met. This ensures that the VNF/VNFC or CNF/CNFC
25 instances are either restarted or migrated to a healthy host. Thus, optimizing
resource utilization and network performance.
[0080] The one or more policies define a threshold breach criteria for each of the
one or more resources. The policies set by network operator for the NF monitor a
30 set of pre-defined KPIs and create rules to define when the applications running on
the NF indicate an overload, underload, or healing condition based on the utilization
27
of the one or more resources. These rules define a criteria based on which the
overload, underload or the healing condition is detected. These criteria further
define a threshold, where the values of the threshold when breached define the
overload, underload and healing conditions. The breach occurs in both the
5 conditions when the value is below the threshold and also above the threshold. This
refers to defining threshold breach criteria for the each of the resources utilized by
the NF. Network operators can use a template available at the UI /CLI of the NPDA
module to define a list of conditions and rules and specify an action to be
automatically performed when those conditions are met. The template can be used
10 to create a VNF/CNF policy comprising the rules defining the threshold breach
criteria. The network operators can modify the defined conditions/rules and actions
through the UI/CLI at the NPDA module. The policies are created for VNF/VNFC
or CNF/CNFC through the UI/CLI interfaces and then the policies are stored in a
database by NPDA.
15
[0081] The at least one of the threshold breach criteria for the one or more resources
is a combination of one or more threshold breach criteria for the one or more
resources. In an exemplary aspect of the present disclosure, the at least one of the
threshold breach criteria for the one or more resources is a combination of one or
20 more threshold breach criteria for the one or more resources. The threshold breach
criteria defined for a resource can be a combination of threshold breach criteria for
two or more other resources. For example, a threshold breach criteria defined for
network bandwidth can be a combination of threshold breach criteria defined for
CPU and RAM. The combination can be formed through and or an OR operator.
25
[0082] The method [400] comprises real-time evaluation of the one or more
resources, based on the one or more policies for the network function.
[0083] The one or more policies further define a hysteresis breach count for the one
30 or more resources. The hysteresis breach count is pre-defined in the one or more
policies. The hysteresis count defines for how many number of times the threshold
28
breach event has occurred for a combination of threshold breach criteria for the one
or more resources. For example, how many times the system [300] has detected the
threshold breach event for network bandwidth. If the hysteresis count reaches the
pre-defined hysteresis breach count, then the system [300] has to trigger an action.
5
[0084] At step [406], the method [400] comprises detecting, by a detection unit
[304], at the NPDA, a threshold breach event associated with the one or more
resources, based on the one or more policies.
10 [0085] Next at step [408], the method [400] comprises performing, by a processing
unit [306], at the NPDA, a hysteresis-based computation of utilization of the one or
more resources, based on detecting the threshold breach event. The hysteresis-based
computation is performed if the threshold breach event is related to the threshold
breach criteria which is a combination of one or more other threshold breach criteria
15 for the one or more resources. To evaluate the threshold breach event associated
with the one or more resources, and take necessary actions, the system [300] is
configured to further evaluate if the threshold breach criteria associated with the
threshold breach event is a combination of threshold breach criteria of the one or
more resources. For example, a threshold breach criteria for network bandwidth
20 may be a combination of threshold breach criteria for CPU and RAM utilization. If
the threshold breach event is associated with a combination of threshold breach
criteria, then the processing unit [302] performs the hysteresis-based computation
of the resources load. The processing unit [302] at the NPDA module fetches the
policy defined against the VNF/VNFC or CNF/CNFC from the database and
25 performs hysteresis evaluation based on the received resource utilization details.
[0086] Further, at step [410], the method [400] comprises triggering, by the
transceiver unit [302], a notification for orchestration of the one or more resources,
based on detecting the threshold breach event. The notification for orchestration of
30 the one or more resources is triggered if the count breaches hysteresis breach count.
29
The orchestration of the one or more resources comprises at least one of a healing
action, a scale-in action, and a scale-out action.
[0087] The method [400] terminates at step [412].
5
[0088] Referring to FIG.5, an implementation of the architecture of NPDA [500]
for evaluating one or more resources for a network function in a network
environment, in accordance with exemplary implementations of the present
disclosure is shown.
10
[0089] At Step [1], a network operator defined threshold-based policies for a
VNF/VNFC or a CNF/CNFC using the user interface [UI] [502]. It is to be noted
that the same action can also be performed using the command line interface (CLI)
[506]. The threshold-based policies are for one or more resources used by the
15 VNF/CNF. The CRUD (create, read, update, delete) operations can be performed
on the policies from either the UI [502] or the CLI [506]. The NPDA [503] provides
dynamic update/enrichment of the policies defined for a VNF/VNFC or
CNF/CNFC through the UI and those updated policy rules can then be applied for
computation of the resources load. Further, the UI [502] or the CLI [506] are also
20 designed to receive requests for evaluation of the one or more resources for the
VNF/CNF. The evaluation will be based on the threshold-based policies defined for
the VNF/VNFC or CNF/CNFC and stored in the NoSQL database [1098] by the
NPDA [1096].
25 [0090] At Step [2], the request for evaluation for the one or more resources, is
forwarded to the NPDA [1096] via a Load Balancer (LB) [504].
[0091] At Step [3], for evaluation of the one or more resources, the NPDA [1096]
will fetch real time / historical alarms, counters and infra-metric meta-data for the
30 VNF/CNF. For fetching meta data parameter name and parameter type are one of
the parameters.
30
[0092] Further, the NPDA [1096] is configured to evaluate the VNF/VNFC and the
CNF/CNFC resource load based on the resource load information received from the
Capacity Monitoring Platform (CMP) microservice [510] at Step [4] and
5 simultaneously an alarm notification from the PVIM [514] which are routed
through the Event Routing Manager [512] at Step [5] to the NPDA [1096]. The
evaluation is performed for threshold-based and hysteresis-based breach events.
[0093] In an exemplary implementation of the present disclosure, consider a
10 scenario where a policy name: “Policy X” has been designed through UI /CLI of
the NPDA module for a particular CNF say “CNF1”.
Parameter Name Parameter Value
Policy Name Policy X
CNF Name CNF1
CPU >=90%
RAM >=80 GB
ALARM DISK_SIZE_INCREASED
ALARM Hysteresis Count 10
ALARM Hysteresis Time interval 10 minutes
Trigger Relation (CPU AND RAM ) OR ALARM
Action Scale-In new CNF name CNF2
[0094] When a resource threshold breach event has been sent by CMP micro
15 service for the CNF named CNF1, where the threshold breach event is related to
the CPU usage as 90 %. As soon the threshold breach event is received, NPDA
module fetches the respective policy details for CNF1 from the database. Once the
policy is fetched, say Policy X as described in the above table, NPDA module starts
comparing the received CPU usage i.e. 90% with the value mentioned in Policy X
20 and since there is a breach but the trigger relation is not met, i.e. RAM or ALARM
event has not exceeded, therefore, the threshold-based policy evaluation yields to
31
false. Here, the trigger relation defines the threshold event criteria which is a
combination of threshold breach criteria for RAM and CPU. This combination
requires hysteresis-based computation as described above.
5 [0095] Similarly, after some time, if the CMP sends an alarm
DISK_SIZE_INCREASED continuously for 20 times to NPDA module with in 1
minute, then NPDA module comparesthis with the Policy X and evaluatesthe result
as true because hysteresis count has breached more than 10 times in 10 minutes
interval. The evaluated result is then sent to the PEEGN micro service [1088] with
10 the action to perform scale in with the new CNF named as CNF2. The PEEGN
microservice [1088] as described in FIG. 1 illustrating the MANO framework, is
responsible for actual resource scaling through a scaling policy.
[0096] Furthermore, the NPDA [1096] is configured to perform at least one of a
15 scale-in operation, scale-out operation and healing operations via the micro service
Policy Execution Engine (PEEGN) [1088] in an event the hysteresis-based
evaluation of the defined policy is true. In general, healing action refers to
automated processes that detect and correct issues within a system. For example, if
a server instance becomes unresponsive, a healing action might automatically
20 restart the server, replace it with a new instance or reroute traffic to healthy
instances. Further, the scale-in action includes reducing number of resources, or
instances in a system. In addition, the scale-out action refers to a process of adding
more resources or instances to handle increased demand. For example, if traffic to
a network function spikes, scaling out would involve adding more instances to
25 distribute load. In an exemplary aspect, the PEEGN [1088] of the MANO
framework, is responsible for actual resource scaling through a scaling policy.
[0097] The NPDA [1096] is also configured to receive, from an operations,
administration, and management (OAM) [508], a set of details related to the
30 network function (NF) such VNF/CNF, in response to the received request for
evaluation of the one or more resources, as shown in Step [7]. Further, the NPDA
32
[1096] is also configured to store the received set of details in the NoSQL database
[1098].
[0098] Referring to FIG. 6, an exemplary implementation of the method flow [600]
5 for performing the NPDA operations via the interfaces for evaluating one or more
resources for a network function in a network environment, in accordance with
exemplary implementations of the present disclosure is shown.
[0099] NPDA_UI [602]: This interface is used to create/modify/delete/view
10 threshold-based policies for a VNF or VNFC, CNF or CNFC. The resources alarms,
counters and infra-metric data related policies are defined through UI [502] at
NPDA [1096] end.
[0100] NPDA_CL [604]: This interface is used to create/modify/delete/view
15 VNF/VNFC or CNF/CNFC threshold-based policies at NPDA [1096] using
command line interface (CLI) [506]. Permitted operations will be pre-defined at
NPDA [1096] and those can be executed using this interface. In addition,
configuration changes can be done using this interface.
20 [0101] NPDA_LB [606]: This interface is used to distribute all incoming/outgoing
requests to balance load equally on the instances of NPDA [1096].
[0102] NPDA_OA [608]: This interface is a central connecting point of NPDA
[1096]. The instances of the NPDA module [1096] register/deregister/reregister
25 themselves using this interface. Central server thus receives IP port, Path,
Component Broadcast Context, Subscribe Component Type etc. for instances of
NPDA [1096]. On successful registration, web socket connection is established
between central server and NPDA [1096] instances (using interface client). This
interface broadcasts registration information to the subscribed micro service
30 instances and provides data broadcast in which micro service can circulate data
among their instances. That is how micro services manage HA (high availability)
33
using data broadcast. This interface is also used to send fault, configuration,
accounting, performance and security (FCAPS) request to respective micro service
instances and also consolidates all the micro service FCAPS responses and sends
the consolidated response to EMS.
5
[0103] NPDA_EM [610]: This interface is used to route the events between all the
micro services. It follows a subscription and notification model based on the events
that are published to it. Each micro service registers its standard platform events
with the interface. For each event, there can be multiple subscribers. Whenever the
10 event of interest is received, the notifications are sent by this interface to the
subscribers informing them of the said event.
[0104] NPDA_CP [612]: This interface is used for notification of
VNF/CNF/VNFC/CNFC instance resources load to NPDA [1096]. Using the
15 reported load NPDA [1096] evaluates the policies defined for the respective
VNF/VNFC or CNF/CNFC. Based on the evaluation appropriate actions such as
scale-in/scale-out is suggest by NPDA [1096].
[0105] NPDA_PVIM [614]: This interface is used for notification of
20 VNF/CNF/VNFC/CNFC instances resources alarms to NPDA [1096]. Using the
reported alarms NPDA [1096] evaluates the policies defined for the respective
VNF/VNFC or CNF/CNFC. Based on the evaluation appropriate actions such as
healing are suggested by NPDA [1096].
25 [0106] NPDA_NS [616]: This interface is used to store all the data in NoSql
database [1098]. In addition, any operation that needs to be performed on NoSql
database [1098] will be done using this interface.
[0107] NPDA_PS [618]: This interface is used to inform scale-in/scale-out/healing
30 of a VNF/VNFC or CNF/CNFC whenever the gating criteria yields to true which
34
usually happens when there is a breach in the reported load at NPDA [1096] end
and that meets the defined policy criteria.
[0108] The present disclosure further discloses a non-transitory computer readable
5 storage medium storing instructions for evaluating one or more resources for a
network function in a network environment, the instructions include executable
code which, when executed by one or more units of a system, cause a transceiver
unit [302] to receive, at a network function virtualization platform decision
analytics (NPDA) module, a request for performing evaluation of the one or more
10 resources for the network function. The evaluation is based on one or more policies
defined for the network function. The instructions when executed by the system
further cause a detection unit [304] to detect, at the NPDA, a threshold breach event
associated with the one or more resources, based on the one or more policies. The
instructions when executed by the system further cause a processing unit [306] to
15 perform, at the NPDA, a hysteresis-based computation of utilization of the one or
more resources, based on detecting the threshold breach event. The instructions
when executed by the system further cause the transceiver unit [302] to trigger a
notification for orchestration of the one or more resources, based on detecting the
threshold breach event.
20
[0109] As is evident from the above, the present disclosure provides a technically
advanced solution for evaluating one or more resources for a network function in a
network environment. The present solution provides a solution for evaluation of
network resources utilization. The present disclosure further provides a system and
25 method that allows for real time evaluation of VNF or VNFC or CNF or CNFC
policy pertaining to breach in their thresholds help better resource optimization. The
present invention further provides a solution to identify if evaluation of threshold
breach event requires a hysteresis-based computation or not. On the fly evaluation
of VNF or VNFC or CNF or CNFC policy pertaining to breach in their thresholds
30 helps better resource optimization. The present disclosure also provides the ability
to handle AND / OR combinations over thresholds of CPU, RAM, Bandwidth, KPI,
35
Counter and Alarms using threshold-based policy evaluation of load of a
VNF/VNFC or CNF/CNFC. The present disclosure further provides gating criteria
for invocation of policy that needs to be triggered whenever the evaluation of load
results in a breach.
5
[0110] While considerable emphasis has been placed herein on the disclosed
implementations, it will be appreciated that many implementations can be made and
that many changes can be made to the implementations without departing from the
principles of the present disclosure. These and other changes in the implementations
10 of the present disclosure will be apparent to those skilled in the art, whereby it is to
be understood that the foregoing descriptive matter to be implemented is illustrative
and non-limiting.
[0111] Further, in accordance with the present disclosure, it is to be acknowledged
15 that the functionality described for the various components/units can be
implemented interchangeably. While specific embodiments may disclose a
particular functionality of these units for clarity, it is recognized that various
configurations and combinations thereof are within the scope of the disclosure. The
functionality of specific units as disclosed in the disclosure should not be construed
20 as limiting the scope of the present disclosure. Consequently, alternative
arrangements and substitutions of units, provided they achieve the intended
functionality described herein, are considered to be encompassed within the scope
of the present disclosure.
36
We Claim:
1. A method [400] for evaluating one or more resources for a network function
in a network environment, the method comprising:
5 - receiving, by a transceiver unit [302] at a network function
virtualization platform decision analytics (NPDA) module, a request
for performing evaluation of the one or more resources for the network
function, wherein the evaluation is based on one or more policies
defined for the network function;
10 - detecting, by a detection unit [304], at the NPDA, a threshold breach
event associated with the one or more resources, based on the one or
more policies;
- performing, by a processing unit [306], at the NPDA, a hysteresisbased computation of utilization of the one or more resources, based
15 on detecting the threshold breach event;
- triggering, by the transceiver unit [302], a notification for
orchestration of the one or more resources, based on detecting the
threshold breach event.
20 2. The method [400] as claimed in claim 1, wherein, the network function is
one of a virtual network function (VNF) and a containerized network
function (CNF).
3. The method [400] as claimed in claim 1, wherein the one or more policies
25 define a threshold breach criteria for each of the one or more resources.
4. The method [400] as claimed in claim 1, wherein the method comprises realtime evaluation of the one or more resources, based on the one or more
policies for the network function.
30
37
5. The method [400] as claimed in claim 3, wherein at least one of the
threshold breach criteria for the one or more resources is a combination of
one or more threshold breach criteria for the one or more resources.
5 6. The method [400] as claimed in claim 5, wherein the hysteresis-based
computation is performed if the threshold breach event is related to the
threshold breach criteria which is a combination of the one or more
threshold breach criteria for the one or more resources.
10 7. The method [400] as claimed in 3, wherein the one or more policies further
define a hysteresis breach count for the one or more resources.
8. The method [400] as claimed in claim 7, wherein the hysteresis-based
computation evaluates a count of detection of the threshold breach event
15 and if the count breaches the hysteresis breach count defined in the one or
more policies.
9. The method [400] as claimed in claim 8, wherein the notification for
orchestration of the one or more resources is triggered if the count breaches
20 hysteresis breach count.
10. The method [400] as claimed in claim 1, wherein the one or more resources
comprise a central processing units (CPU), a random memory access
(RAM), network bandwidth, one or more key performance indicators
25 (KPIs), a counter value, an alarm value, and combinations thereof.
11. The method [400] as claimed in claim 1, wherein the orchestration of the
one or more resources comprises at least one of a healing action, a scale-in
action, and a scale-out action.
30
38
12. A system [300] for evaluating one or more resources for a network function
in a network environment, the system comprising:
- a transceiver unit [302], configured to receive, at a network function
virtualization platform decision analytics (NPDA) module, a request
5 for performing evaluation of the one or more resources for the network
function, wherein the evaluation is based on one or more policies
defined for the network function;
- a detection unit [304], configured to detect, at the NPDA, a threshold
breach event associated with the one or more resources, based on the
10 one or more policies;
- a processing unit [306], configured to perform, at the NPDA, a
hysteresis-based computation of utilization of the one or more
resources, based on detecting the threshold breach event;
- the transceiver unit [302], configured to trigger, a notification for
15 orchestration of the one or more resources, based on detecting the
threshold breach event.
13. The system [300] as claimed in claim 12, wherein, the network function is
one of a virtual network function (VNF) and a containerized network
20 function (CNF).
14. The system [300] as claimed in claim 12, wherein the one or more policies
define a threshold breach criteria for each of the one or more resources.
25 15. The system [300] as claimed in claim 12, wherein the system is configured
to perform real-time evaluation of the utilization of the one or more
resources, based on the one or more policies for the network function.
39
16. The system [300] as claimed in claim 14, wherein, at least one of the
threshold breach criteria for the one or more resources is a combination of
one or more threshold breach criteria for the one or more resources.
5 17. The system [300] as claimed in claim 16, wherein the hysteresis-based
computation is performed if the threshold breach event is related to the
threshold breach criteria which is a combination of the one or more
threshold breach criteria for the one or more resources.
10 18. The system as claimed in 14, wherein the one or more policies further define
a hysteresis breach count for the one or more resources.
19. The system [300] as claimed in claim 18, wherein the hysteresis-based
computation evaluates a count of detection of the threshold breach event
15 and if the count breaches the hysteresis breach count defined in the one or
more policies.
20. The system [300] as claimed in claim 19, wherein the notification for
orchestration of the one or more resources is triggered if the count breaches
20 the hysteresis breach count.
21. The system [300] as claimed in claim 12, wherein the one or more
resources comprise a central processing units (CPU), a random memory
access (RAM), network bandwidth, one or more key performance
25 indicators (KPIs), a counter value, an alarm value, and combinations
thereof.
22. The system [300] as claimed in claim 12, wherein the orchestration of the
one or more resources comprises at least one of a healing action, a scale-in
30 action, and a scale-out action.
| # | Name | Date |
|---|---|---|
| 1 | 202321063841-STATEMENT OF UNDERTAKING (FORM 3) [22-09-2023(online)].pdf | 2023-09-22 |
| 2 | 202321063841-PROVISIONAL SPECIFICATION [22-09-2023(online)].pdf | 2023-09-22 |
| 3 | 202321063841-POWER OF AUTHORITY [22-09-2023(online)].pdf | 2023-09-22 |
| 4 | 202321063841-FORM 1 [22-09-2023(online)].pdf | 2023-09-22 |
| 5 | 202321063841-FIGURE OF ABSTRACT [22-09-2023(online)].pdf | 2023-09-22 |
| 6 | 202321063841-DRAWINGS [22-09-2023(online)].pdf | 2023-09-22 |
| 7 | 202321063841-Proof of Right [19-01-2024(online)].pdf | 2024-01-19 |
| 8 | 202321063841-FORM-5 [21-09-2024(online)].pdf | 2024-09-21 |
| 9 | 202321063841-ENDORSEMENT BY INVENTORS [21-09-2024(online)].pdf | 2024-09-21 |
| 10 | 202321063841-DRAWING [21-09-2024(online)].pdf | 2024-09-21 |
| 11 | 202321063841-CORRESPONDENCE-OTHERS [21-09-2024(online)].pdf | 2024-09-21 |
| 12 | 202321063841-COMPLETE SPECIFICATION [21-09-2024(online)].pdf | 2024-09-21 |
| 13 | 202321063841-Request Letter-Correspondence [08-10-2024(online)].pdf | 2024-10-08 |
| 14 | 202321063841-Power of Attorney [08-10-2024(online)].pdf | 2024-10-08 |
| 15 | 202321063841-FORM 3 [08-10-2024(online)].pdf | 2024-10-08 |
| 16 | 202321063841-Form 1 (Submitted on date of filing) [08-10-2024(online)].pdf | 2024-10-08 |
| 17 | 202321063841-Covering Letter [08-10-2024(online)].pdf | 2024-10-08 |
| 18 | 202321063841-CERTIFIED COPIES TRANSMISSION TO IB [08-10-2024(online)].pdf | 2024-10-08 |
| 19 | Abstract.jpg | 2024-10-19 |
| 20 | 202321063841-ORIGINAL UR 6(1A) FORM 1 & 26-030125.pdf | 2025-01-07 |