[go: up one dir, main page]

CN112512057B - Network slicing abnormality identification method, device, equipment and computer storage medium - Google Patents

Network slicing abnormality identification method, device, equipment and computer storage medium Download PDF

Info

Publication number
CN112512057B
CN112512057B CN201910869412.1A CN201910869412A CN112512057B CN 112512057 B CN112512057 B CN 112512057B CN 201910869412 A CN201910869412 A CN 201910869412A CN 112512057 B CN112512057 B CN 112512057B
Authority
CN
China
Prior art keywords
network slice
bearer
target network
current
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910869412.1A
Other languages
Chinese (zh)
Other versions
CN112512057A (en
Inventor
李湛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Hebei Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Hebei Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Hebei Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201910869412.1A priority Critical patent/CN112512057B/en
Publication of CN112512057A publication Critical patent/CN112512057A/en
Application granted granted Critical
Publication of CN112512057B publication Critical patent/CN112512057B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention relates to the technical field of business support, and discloses a method, a device, equipment and a computer storage medium for identifying network slice abnormity, wherein the method comprises the following steps: acquiring the bearing information of the target network slice at the current moment; acquiring bearing information of the next moment of the adjacent network slice of the target network slice; calculating the bearing variation of the target network slice according to the bearing information at the current moment and the bearing information at the next moment; and determining whether the target network slice is abnormal or not according to the bearing variation and a preset error value. Through the mode, the abnormal network slice can be more accurately identified.

Description

网络切片异常识别方法、装置、设备及计算机存储介质Network slicing exception identification method, device, equipment and computer storage medium

技术领域technical field

本发明实施例涉及业务支撑技术领域,具体涉及一种网络切片异常识别方法、装置、设备及计算机存储介质。Embodiments of the present invention relate to the technical field of business support, and in particular to a method, device, device, and computer storage medium for identifying abnormalities in network slices.

背景技术Background technique

在5G(5th-Generation,第五代移动通信技术)网络中,由于不同的网络应用场景对应的服务质量不同,因此可将一个物理网络划分成多个支持不同网络应用场景的逻辑网络,一个网络应用场景支持一类业务,一个逻辑网络即为一个网络切片。In a 5G (5th-Generation, fifth-generation mobile communication technology) network, since different network application scenarios correspond to different service qualities, a physical network can be divided into multiple logical networks that support different network application scenarios. A network The application scenario supports a class of services, and a logical network is a network slice.

在实现本发明实施例的过程中,发明人发现:目前在对网络切片进行识别的方式主要是针对网络中的硬件的异常情况进行监控,而当业务量较大等其它情况下也会导致网络切片异常,因此现有的5G网络切片异常识别准确性较低。In the process of implementing the embodiment of the present invention, the inventors found that: the current way of identifying network slices is mainly to monitor the abnormality of the hardware in the network, and when the traffic volume is large and other situations will also cause network Slicing is abnormal, so the accuracy of existing 5G network slice anomaly identification is low.

发明内容Contents of the invention

鉴于上述问题,本发明实施例提供了一种网络切片异常识别方法、装置、设备及计算机存储介质,克服了上述问题或者至少部分地解决了上述问题。In view of the above problems, embodiments of the present invention provide a network slice anomaly identification method, device, device, and computer storage medium, which overcome the above problems or at least partially solve the above problems.

根据本发明实施例的一个方面,提供了一种网络切片异常识别方法,所述方法包括:获取目标网络切片当前时刻的承载信息;获取所述目标网络切片相邻网络切片下一时刻的承载信息;根据所述当前时刻的承载信息和所述下一时刻的承载信息,计算所述目标网络切片的承载变化量;根据所述承载变化量和预设误差值,确定所述目标网络切片是否异常。According to an aspect of an embodiment of the present invention, there is provided a network slice anomaly identification method, the method comprising: obtaining bearer information of a target network slice at a current moment; acquiring bearer information of a network slice adjacent to the target network slice at a next moment ; Calculate the bearer variation of the target network slice according to the bearer information at the current moment and the bearer information at the next moment; determine whether the target network slice is abnormal according to the bearer variation and a preset error value .

在一种可选的方式中,所述预设误差值通过机器学习的方式确定。In an optional manner, the preset error value is determined by machine learning.

在一种可选的方式中,所述获取所述目标网络切片相邻网络切片下一时刻的承载信息之后,所述方法还包括:根据所述当前时刻的承载信息,确定所述目标网络切片的接入用户;获取所述接入用户的上报数据;根据所述上报数据,确定所述接入用户中的实际迁出用户;其中,所述实际迁出用户为当前时刻位于所述目标网络切片的覆盖范围内但在下一时刻位于所述目标网络切片的覆盖范围外的接入用户;将所述当前时刻的承载信息和所述下一时刻的承载信息中和所述实际迁出用户关联的承载信息剔除。In an optional manner, after acquiring the bearer information of the network slice adjacent to the target network slice at the next moment, the method further includes: determining the target network slice according to the bearer information at the current moment access users; obtain the reported data of the access users; determine the actual outgoing users among the access users according to the reported data; wherein, the actual outgoing users are located in the target network at the current moment An access user within the coverage of the slice but outside the coverage of the target network slice at the next moment; associating the bearer information at the current moment and the bearer information at the next moment with the actual outgoing user The bearer information is removed.

在一种可选的方式中,所述根据所述当前时刻的承载信息和所述下一时刻的承载信息,计算所述目标网络切片的承载变化量,具体为:根据所述当前时刻的承载信息,确定所述目标网络切片的当前承载量;根据所述下一时刻的承载信息和所述当前承载量,计算下一时刻从所述目标网络切片迁移到所述目标网络切片相邻网络切片的所述承载变化量。In an optional manner, the calculating the bearer change amount of the target network slice according to the bearer information at the current moment and the bearer information at the next moment is specifically: according to the bearer information at the current moment information, determine the current carrying capacity of the target network slice; calculate the migration from the target network slice to the adjacent network slice of the target network slice at the next time according to the carrying information at the next moment and the current carrying capacity The load variation of .

在一种可选的方式中,所述根据所述承载变化量和所述预设误差值,确定所述目标网络切片是否异常,具体为:当所述承载变化量超过所述预设误差值时,确定所述目标网络切片异常,并发送迁移超限预警。In an optional manner, the determining whether the target network slice is abnormal according to the bearer variation and the preset error value is specifically: when the bearer variation exceeds the preset error value , it is determined that the target network slice is abnormal, and a migration overrun warning is sent.

在一种可选的方式中,所述当前承载量包括当前用户接入量,所述承载变化量包括用户迁移量,所述预设误差值包括预设用户误差值;和/或,所述当前承载量包括当前CPU资源占用量,所述承载变化量包括CPU资源迁移量,所述预设误差值包括预设CPU误差值;和/或,所述当前承载量包括当前内存占用量,所述承载变化量包括内存迁移量,所述预设误差值包括预设内存误差值;和/或,所述当前承载量包括当前存储占用量,所述承载变化量包括存储迁移量,所述预设误差值包括预设存储误差值。In an optional manner, the current bearer amount includes a current user access amount, the bearer change amount includes a user migration amount, and the preset error value includes a preset user error value; and/or, the The current load includes a current CPU resource usage, the load change includes a CPU resource migration, and the preset error value includes a preset CPU error value; and/or, the current load includes a current memory usage, so The load change amount includes a memory migration amount, and the preset error value includes a preset memory error value; and/or, the current load amount includes a current storage usage amount, the load change amount includes a storage migration amount, and the preset The set error value includes a preset stored error value.

在一种可选的方式中,所述根据所述承载变化量和所述预设误差值,确定所述目标网络切片是否异常,具体为:将所述承载变化量中的用户迁移量与预设用户权重值的乘积、所述承载变化量中的CPU资源迁移量与预设CPU权重值的乘积、所述承载变化量中的内存资源迁移量与预设内存权重值的乘积和所述承载变化量中的存储资源迁移量与预设存储权重值的乘积求和,得到参数变化总量;当所述参数变化总量超过预设误差值时,确定所述网络切片异常。In an optional manner, the determining whether the target network slice is abnormal according to the bearer change amount and the preset error value is specifically: combining the user migration amount in the bearer change amount with the preset The product of the user weight value, the product of the CPU resource migration amount in the load variation and the preset CPU weight value, the product of the memory resource migration in the load variation and the preset memory weight value, and the load The product of the storage resource migration amount in the variation and the preset storage weight value is summed to obtain the total amount of parameter variation; when the total amount of parameter variation exceeds a preset error value, it is determined that the network slice is abnormal.

根据本发明实施例的另一方面,提供了一种网络切片异常识别装置,包括:第一获取模块,用于获取目标网络切片当前时刻的承载信息;第二获取模块,用于获取所述目标网络切片相邻网络切片下一时刻的承载信息;计算模块,用于根据所述当前时刻的承载信息和所述下一时刻的承载信息,计算所述目标网络切片的承载变化量;第一确定模块,用于根据所述承载变化量和预设误差值,确定所述目标网络切片是否异常。According to another aspect of the embodiments of the present invention, there is provided a network slice anomaly identification device, including: a first acquisition module, configured to acquire the bearer information of the target network slice at the current moment; a second acquisition module, configured to acquire the target The bearer information of the network slice adjacent to the network slice at the next moment; the calculation module is used to calculate the bearer variation of the target network slice according to the bearer information at the current moment and the bearer information at the next moment; the first determination A module, configured to determine whether the target network slice is abnormal according to the bearer variation and a preset error value.

根据本发明实施例的另一方面,提供了一种网络切片异常识别设备,包括:处理器、存储器、通信接口和通信总线,所述处理器、所述存储器和所述通信接口通过所述通信总线完成相互间的通信;所述存储器用于存放至少一可执行指令,所述可执行指令使所述处理器执行上述一种网络切片异常识别方法对应的操作。According to another aspect of the embodiments of the present invention, there is provided a network slice anomaly identification device, including: a processor, a memory, a communication interface, and a communication bus, and the processor, the memory, and the communication interface communicate through the The bus completes mutual communication; the memory is used to store at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the above-mentioned network slice exception identification method.

根据本发明实施例的又一方面,提供了一种计算机存储介质,所述存储介质中存储有至少一可执行指令,所述可执行指令使所述处理器执行上述一种网络切片异常识别方法对应的操作。According to yet another aspect of the embodiments of the present invention, a computer storage medium is provided, and at least one executable instruction is stored in the storage medium, and the executable instruction causes the processor to execute the above-mentioned network slice anomaly identification method corresponding operation.

本发明实施例通过获取目标网络切片当前时刻和其相邻网络切片下一时刻的承载信息,计算出目标网络切片迁移到其相邻网络切片的承载变化量,并通过比较承载变化量与预设误差值的大小来确定目标网络切片是否异常。和现有技术相比,本发明实施例通过目标网络切片迁移到其相邻网络切片的承载变化量的大小来判断目标网络切片是否异常,而非通过监控硬件的故障情况来判断目标网络切片是否异常,其能识别出业务量较大等其它情况下导致的网络切片异常,因此其识别准确性更高。In the embodiment of the present invention, by obtaining the bearer information of the target network slice at the current moment and the bearer information of its adjacent network slice at the next moment, calculate the bearer change amount of the target network slice migrating to its adjacent network slice, and compare the bearer change amount with the preset The size of the error value is used to determine whether the target network slice is abnormal. Compared with the prior art, the embodiment of the present invention judges whether the target network slice is abnormal by the magnitude of the bearer variation of the target network slice migrating to its adjacent network slices, instead of judging whether the target network slice is abnormal by monitoring the fault condition of the hardware. Anomalies, which can identify network slice anomalies caused by other situations such as large traffic volumes, so the identification accuracy is higher.

上述说明仅是本发明实施例技术方案的概述,为了能够更清楚了解本发明实施例的技术手段,而可依照说明书的内容予以实施,并且为了让本发明实施例的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solutions of the embodiments of the present invention. In order to better understand the technical means of the embodiments of the present invention, it can be implemented according to the contents of the description, and in order to make the above and other purposes, features and The advantages can be more obvious and understandable, and the specific embodiments of the present invention are enumerated below.

附图说明Description of drawings

通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiment. The drawings are only for the purpose of illustrating a preferred embodiment and are not to be considered as limiting the invention. Also throughout the drawings, the same reference numerals are used to designate the same parts. In the attached picture:

图1示出了本发明实施例提供的一种网络切片异常识别方法的流程图;FIG. 1 shows a flow chart of a network slice anomaly identification method provided by an embodiment of the present invention;

图2示出了本发明另一实施例提供的一种网络切片异常识别方法的流程图;FIG. 2 shows a flow chart of a network slice anomaly identification method provided by another embodiment of the present invention;

图3示出了本发明实施例中计算目标网络切片的承载变化量的子步骤流程图;FIG. 3 shows a flow chart of sub-steps for calculating the bearer variation of a target network slice in an embodiment of the present invention;

图4示出了本发明实施例中确定目标网络切片是否异常的子步骤流程图;FIG. 4 shows a flow chart of sub-steps for determining whether a target network slice is abnormal in an embodiment of the present invention;

图5示出了本发明实施例提供的一种网络切片异常识别装置的结构示意图;Fig. 5 shows a schematic structural diagram of a network slice anomaly identification device provided by an embodiment of the present invention;

图6示出了本发明实施例提供的网络切片异常识别设备的结构示意图。FIG. 6 shows a schematic structural diagram of a network slice anomaly identification device provided by an embodiment of the present invention.

具体实施方式Detailed ways

下面将参照附图更详细地描述本发明的示例性实施例。虽然附图中显示了本发明的示例性实施例,然而应当理解,可以以各种形式实现本发明而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本发明,并且能够将本发明的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

在5G网络中,网络业务丰富多样,且不同的网络业务对网络有不同的要求。例如,自动驾驶和远程控制等网络业务要求网络具备超低时延和超高可靠性;增强现实/虚拟现实等网络业务要求网络具备超高带宽;物联网等网络业务要求网络具备支持海量设备接入和超低省电;无人机和高铁等网络业务要求网络具备高移动性。为了应对这些不同类型的网络业务需要,5G网络引入了网络切片技术,将大量的物理网络基础设施组成虚拟逻辑网络资源并按照5G网络的各个应用场景划分成一个个小的虚拟逻辑网络单元,它们之间通过API接口等方式实现信息交互与传递。网络切片的类型通常有eMBB(Enhanced MobileBroadband,增强型移动宽带)、mMTC(Massive Machine Type Communication,大规模机器类通信)和uRLLC(Ultra-reliable and Low Latency Communication,超高可靠与低延迟的通信)这三种类型。用户则可以通过UE(User Equipment,用户设备)接入到不同网络业务对应的网络切片中,以进行不同的网络业务。UE可以是无线终端,例如可以为移动电话、计算机、平板电脑、个人数码助理(personal digital assistant,PDA)、移动互联网设备(mobile Internet device,MID)、可穿戴设备、互联网协议(InternetProtocol,IP)电话、网络打印机和电子书阅读器(e-book reader)等。网络切片可以由管理设备进行管理,管理设备可以是具有网络切片管理功能的任意设备,比如切片管理系统、策略控制中心和智能分析中心等。其中,切片管理系统可以是某个服务器中的功能模块,也可以是一个单独的服务器,网络管理员可以通过切片管理系统进行创建网络切片、删除网络切片、以及将某网络切片中的部分用户设备迁移到另一网络切片等操作。网络切片包括RAN切片、核心网切片以及传输切片。其中,RAN切片相当于1个或多个基站的覆盖网络,其用于将UE接入网络。In a 5G network, network services are rich and diverse, and different network services have different requirements on the network. For example, network services such as autonomous driving and remote control require the network to have ultra-low latency and ultra-high reliability; network services such as augmented reality/virtual reality require the network to have ultra-high bandwidth; Income and ultra-low power saving; network services such as drones and high-speed rail require high mobility of the network. In order to meet the needs of these different types of network services, the 5G network introduces network slicing technology, which combines a large number of physical network infrastructures into virtual logical network resources and divides them into small virtual logical network units according to each application scenario of the 5G network. Information interaction and transmission are realized through API interfaces and other means. The types of network slicing usually include eMBB (Enhanced MobileBroadband, enhanced mobile broadband), mMTC (Massive Machine Type Communication, large-scale machine-type communication) and uRLLC (Ultra-reliable and Low Latency Communication, ultra-reliable and low-latency communication) These three types. A user can access network slices corresponding to different network services through a UE (User Equipment, user equipment), so as to perform different network services. The UE may be a wireless terminal, such as a mobile phone, computer, tablet computer, personal digital assistant (personal digital assistant, PDA), mobile Internet device (mobile Internet device, MID), wearable device, Internet protocol (Internet Protocol, IP) Telephones, network printers and e-book readers (e-book readers), etc. Network slicing can be managed by a management device, which can be any device with network slicing management functions, such as a slice management system, policy control center, and intelligent analysis center. Among them, the slice management system can be a functional module in a certain server, or it can be a separate server. The network administrator can create network slices, delete network slices, and transfer some user equipment in a certain network slice through the slice management system. Migrating to another network slice etc. Network slicing includes RAN slicing, core network slicing and transmission slicing. Wherein, the RAN slice is equivalent to an overlay network of one or more base stations, which is used for connecting the UE to the network.

下面结合附图对本发明实施例进行说明。Embodiments of the present invention will be described below in conjunction with the accompanying drawings.

请参阅图1,图1示出了本发明实施例提供的一种网络切片异常识别方法的流程图,该方法包括以下步骤:Please refer to FIG. 1. FIG. 1 shows a flow chart of a network slicing anomaly identification method provided by an embodiment of the present invention. The method includes the following steps:

步骤S110:获取目标网络切片当前时刻的承载信息。Step S110: Obtain bearer information of the target network slice at the current moment.

在本步骤中,所述目标网络切片是指需要进行异常识别的网络切片,所述承载信息可以通过上述切片管理系统获取,其包括该目标网络切片的接入用户的信息。所述接入用户的信息包括接入用户的IMSI(International Mobile Subscriber Identity,国际移动用户识别码)信息以及各接入用户占用的CPU(Central Processing Unit,中央处理器)资源量、内存资源量和存储资源量。其中,内存资源量是指接入用户占用服务器的内存条的资源量,而存储资源量是指接入用户占用服务器的硬盘资源量。In this step, the target network slice refers to a network slice that needs to be identified abnormally, and the bearer information can be obtained through the above-mentioned slice management system, which includes information of access users of the target network slice. The information of the access user includes the IMSI (International Mobile Subscriber Identity, International Mobile Subscriber Identity) information of the access user and the CPU (Central Processing Unit, central processing unit) resource amount, memory resource amount and Amount of storage resources. Wherein, the amount of memory resources refers to the resource amount of the memory bar of the server occupied by the access user, and the amount of storage resource refers to the amount of hard disk resource of the server occupied by the access user.

步骤S120:获取所述目标网络切片相邻网络切片下一时刻的承载信息。Step S120: Obtain bearer information of a network slice adjacent to the target network slice at a next moment.

在本步骤中,所述目标网络切片相邻网络切片是指和目标网络切片覆盖范围相邻的网络切片,其可以通过上述切片管理系统确定。若目标网络切片为RAN切片,RAN切片为基站的网络覆盖范围,而基站通过包含多个小区。各小区皆有与其相邻的邻小区,目标网络切片对应的小区的邻小区所属基站对应的RAN切片即为目标网络切片相邻网络切片。所述下一时刻是指在步骤S110中所述的当前时刻之后的一个时刻,若当前时刻为tk,所述下一时刻通常为t(k+1)。所述目标网络切片的承载信息和所述目标网络切片相邻网络切片的承载信息都会周期性更新,即所述目标网络切片和其相邻的网络切片在当前tk会皆有一组承载信息,在之后的t(k+1)、t(k+2)...t(k+n)时刻也皆有一组承载信息。In this step, the network slice adjacent to the target network slice refers to a network slice adjacent to the coverage area of the target network slice, which can be determined by the above-mentioned slice management system. If the target network slice is a RAN slice, the RAN slice is the network coverage area of the base station, and the base station includes multiple cells. Each cell has its neighboring cells, and the RAN slice corresponding to the base station of the neighboring cell of the cell corresponding to the target network slice is the adjacent network slice of the target network slice. The next moment refers to a moment after the current moment mentioned in step S110, if the current moment is tk, the next moment is usually t(k+1). Both the bearer information of the target network slice and the bearer information of adjacent network slices of the target network slice will be periodically updated, that is, the target network slice and its adjacent network slices will have a set of bearer information at the current tk. There is also a set of bearer information at the time t(k+1), t(k+2)...t(k+n) thereafter.

步骤S170:根据所述当前时刻的承载信息和所述下一时刻的承载信息,计算所述目标网络切片的承载变化量。Step S170: Calculate the bearer variation of the target network slice according to the bearer information at the current moment and the bearer information at the next moment.

在本步骤中,通过所述目标网络切片当前时刻的承载信息和所述目标网络切片相邻网络切片下一时刻的承载信息中用户的IMSI信息,即可以确定从目标网络切片迁移到其相邻的网络切片的用户迁移量。例如,目标网络切片当前时刻tk的接入用户的IMSI信息分别为S1、S2、S3和S4,而目标网络切片相邻网络切片下一时刻t(k+1)的接入用户的IMSI信息分别为S1、S2、S3和S5,则可以说明目标网络切片在下一时刻迁移到其相邻的网络切片接入用户为S1、S2和S3,因此,目标网络切片的用户迁移量为3。同时,接入用户S1、S2和S3在当前时刻占用的CPU资源量、内存资源量和存储资源量则可以分别视为目标网络切片的CPU资源迁移量、内存迁移量和存储迁移量。所述用户迁移量和/或CPU资源迁移量和/或内存迁移量和/或存储迁移量可以视为本步骤中的承载变化量。In this step, the user’s IMSI information in the bearer information of the target network slice at the current moment and the bearer information of the adjacent network slice of the target network slice at the next moment can be used to determine whether to migrate from the target network slice to its adjacent network slice. The user migration amount of the network slice. For example, the IMSI information of the access users of the target network slice at the current time tk are S1, S2, S3 and S4 respectively, while the IMSI information of the access users of the adjacent network slices of the target network slice at the next time t(k+1) are respectively are S1, S2, S3, and S5, which means that the target network slice will migrate to its adjacent network slices at the next moment to access users S1, S2, and S3. Therefore, the user migration amount of the target network slice is 3. At the same time, the amount of CPU resources, memory resources, and storage resources occupied by access users S1, S2, and S3 at the current moment can be regarded as the CPU resource migration amount, memory migration amount, and storage migration amount of the target network slice, respectively. The user migration amount and/or the CPU resource migration amount and/or the memory migration amount and/or the storage migration amount may be regarded as the load change amount in this step.

步骤S180:根据所述承载变化量和预设误差值,确定所述目标网络切片是否异常。Step S180: Determine whether the target network slice is abnormal according to the bearer variation and a preset error value.

通常情况下,网络切片在没有异常时也偶发性的迁出用户到其相邻的网络切片,而预设误差值则是可容许的用户迁出的数量和/或CPU资源迁移量和/或内存迁移量和/或存储迁移量。因此,预设误差值也可以分为预设用户误差值、预设CPU误差值、预设内存误差值和预设存储误差值。而当目标网络切片的承载变化量超过这些误差值,则可以说明目标网络切片的用户迁出并非偶发性事件,进而可以确定该目标网络切片异常。Usually, a network slice occasionally migrates out users to its adjacent network slices when there is no abnormality, and the preset error value is the allowable number of user migrations and/or the amount of CPU resource migration and/or Memory migration and/or storage migration. Therefore, the preset error value can also be divided into a preset user error value, a preset CPU error value, a preset memory error value, and a preset storage error value. And when the bearer variation of the target network slice exceeds these error values, it can be explained that the user migration of the target network slice is not an accidental event, and then it can be determined that the target network slice is abnormal.

在一些实施例中,所述预设误差值可以通过机器学习的方式确定。具体地,可以通过已经存在异常和无异常的网络切片迁移到其相邻网络切片的用承载变化量与预先设置的误差值进行比较,得到预测的异常识别结果。之后将该预测的异常识别结果与网络切片实际异常情况进行比较,并根据该结果调整预先设置的误差值尽可能使所有的预测的异常识别结果都和实际的异常情况一致,从而得到所述预设误差值。此外,在实际应用本发明实施例对目标网络切片进行异常识别的过程中,也可以通过将本方式实施例得到识别结果与运维人员人工核查的结果进行对比,来对本实施例中的预设误差值进行不断优化调整,以保证本发明实施例的识别准确性。In some embodiments, the preset error value may be determined by machine learning. Specifically, the predicted anomaly identification result can be obtained by comparing the amount of change in load capacity of the network slices that already have anomalies and those without anomalies migrating to their adjacent network slices with a preset error value. Then compare the predicted abnormality recognition result with the actual abnormality of the network slice, and adjust the preset error value according to the result to make all the predicted abnormality recognition results consistent with the actual abnormality, so as to obtain the predicted Set the error value. In addition, in the process of actually applying the embodiment of the present invention to identify the abnormality of the target network slice, it is also possible to compare the identification results obtained in the embodiment of the present method with the results of manual verification by the operation and maintenance personnel to compare the preset The error value is continuously optimized and adjusted to ensure the recognition accuracy of the embodiment of the present invention.

需要说明的是:若输入的承载变化量为用户迁移量、CPU资源迁移量、内存迁移量和存储迁移量中的一项或多项,通过机器学习得到的预设误差值也相应地包括预设用户误差值、预设CPU误差值、预设内存误差值和预设存储误差值中的一项或多项。It should be noted that if the input load change amount is one or more of user migration amount, CPU resource migration amount, memory migration amount, and storage migration amount, the preset error value obtained through machine learning also includes the preset error value correspondingly. One or more items of user error value, preset CPU error value, preset memory error value and preset storage error value are set.

本发明实施例通过获取目标网络切片当前时刻和其相邻网络切片下一时刻的承载信息,计算出目标网络切片迁移到其相邻网络切片的承载变化量,并通过比较承载变化量与预设误差值的大小来确定目标网络切片是否异常。和现有技术相比,本发明实施例通过目标网络切片迁移到其相邻网络切片的承载变化量的大小来判断目标网络切片是否异常,而非通过监控硬件的故障情况来判断目标网络切片是否异常,其能识别出业务量较大等其它情况下导致的网络切片异常,因此其识别准确性更高。In the embodiment of the present invention, by obtaining the bearer information of the target network slice at the current moment and the bearer information of its adjacent network slice at the next moment, calculate the bearer change amount of the target network slice migrating to its adjacent network slice, and compare the bearer change amount with the preset The size of the error value is used to determine whether the target network slice is abnormal. Compared with the prior art, the embodiment of the present invention judges whether the target network slice is abnormal by the magnitude of the bearer variation of the target network slice migrating to its adjacent network slices, instead of judging whether the target network slice is abnormal by monitoring the fault condition of the hardware. Anomalies, which can identify network slice anomalies caused by other situations such as large traffic volumes, so the identification accuracy is higher.

在一些实施例中,目标网络切片中的接入用户迁入其相邻的网络切片也可能是接入用户的实际位置发生了变化造成的,而非由于目标网络切片的异常导致。因此,如图2所示,其示出了本发明另一实施例提供的一种网络切片异常识别方法的流程图,在本实施例中,所述方法在步骤S120之后还包括:In some embodiments, the migration of the access users in the target network slice to its adjacent network slice may also be caused by changes in the actual locations of the access users, rather than due to abnormality of the target network slice. Therefore, as shown in FIG. 2 , it shows a flow chart of a method for identifying network slice anomalies provided by another embodiment of the present invention. In this embodiment, the method further includes after step S120:

步骤S130:根据所述当前时刻的承载信息,确定所述目标网络切片的接入用户。Step S130: Determine the access users of the target network slice according to the bearer information at the current moment.

如步骤S110所述,目标网络切片承载信息包括该目标网络切片的接入用户的IMSI信息,通过承载信息中的IMSI信息可以确定目标网络切片的接入用户。As described in step S110, the bearer information of the target network slice includes the IMSI information of the access users of the target network slice, and the access users of the target network slice can be determined through the IMSI information in the bearer information.

步骤S140:获取所述接入用户的上报数据。Step S140: Obtain the reported data of the access user.

步骤S150:根据所述上报数据,确定所述接入用户中的实际迁出用户;其中,所述实际迁出用户为当前时刻位于所述目标网络切片的覆盖范围内但在下一时刻位于所述目标网络切片的覆盖范围外的接入用户。Step S150: According to the reported data, determine the actual moving-out user among the access users; wherein, the actual moving-out user is located within the coverage of the target network slice at the current moment but located at the Access users outside the coverage of the target network slice.

其中,所述上报数据可以是接入用户的用户设备上报的MR数据或用户设备上的手机营业厅APP上报的经纬度数据,根据这些数据可以对接入用户各个时刻的位置进行定位。之后,通过从基站的基础数据获取工程参数可以确定目标网络切片和与其相邻的网络切片包含的基站的覆盖范围。通过结合接入用户在当前时刻和下一时刻的位置以及目标网络切片和与其相邻的网络切片的覆盖范围,可以判定是否存在目标网络切片的接入用户在当前时刻的位置位于目标网络切片的覆盖范围内,但下一时刻位于目标网络切片的覆盖范围之外,这种接入用户可以确定为所述实际迁出用户,表明其迁出了目标网络切片的覆盖范围。Wherein, the reported data may be the MR data reported by the user equipment of the access user or the latitude and longitude data reported by the mobile phone business hall APP on the user equipment, and the position of the access user at each moment can be located according to these data. After that, the coverage of the target network slice and the base stations contained in the adjacent network slices can be determined by obtaining the engineering parameters from the basic data of the base station. By combining the location of the access user at the current moment and the next moment and the coverage of the target network slice and its adjacent network slices, it can be determined whether the access user of the target network slice is located at the current moment of the target network slice. In the coverage area, but outside the coverage area of the target network slice at the next moment, such an access user can be determined as the actual outgoing user, indicating that it has moved out of the coverage area of the target network slice.

步骤S160:将所述当前时刻的承载信息和所述下一时刻的承载信息中和所述实际迁出用户关联的承载信息剔除。Step S160: Remove the bearer information associated with the actual outgoing user from the bearer information at the current moment and the bearer information at the next moment.

由于实际迁出用户在下一时刻并未在目标网络切片的覆盖范围内,所以其必然无法接入目标网络切片,只能接入到其它网络切片。因此,这种情况的用户迁出并非由于目标网络切片的异常造成的,所以需要将和实际迁出用户关联的承载信息剔除,提高本发明实施例异常识别的准确性。具体地,实际迁出用户在目标网络切片和其相邻的网络切片的承载信息中的IMSI信息、占用CPU资源量、占用内存资源量和占用存储资源量等都会被剔除,即后续步骤S170计算承载变化量时不再考虑这些实际迁出用户的数据。Since the actual migrating user is not within the coverage of the target network slice at the next moment, it must not be able to access the target network slice, but can only access other network slices. Therefore, the user migration in this situation is not caused by the abnormality of the target network slice, so it is necessary to remove the bearer information associated with the actual outgoing user to improve the accuracy of abnormality identification in the embodiment of the present invention. Specifically, the IMSI information, occupied CPU resources, occupied memory resources, and occupied storage resources of the actually migrated user in the bearer information of the target network slice and its adjacent network slices will all be eliminated, that is, the subsequent step S170 calculates The data of these actually migrated users is no longer considered when bearing the amount of change.

本发明实施例通过增加实际迁出用户的确定步骤以及剔除实际迁出用户关联的承载信息的步骤,将由于接入用户实际迁出了目标网络切片的覆盖范围造成的目标网络切片的承载变化量排除,提高了通过比较目标网络切片的承载变化量和预设误差值来判定目标网络是否异常的准确性。In the embodiment of the present invention, by adding the step of determining the actual moving-out user and removing the bearer information associated with the actual moving-out user, the bearer change of the target network slice caused by the access user actually moving out of the coverage of the target network slice Exclusion improves the accuracy of determining whether the target network is abnormal by comparing the bearer variation of the target network slice with the preset error value.

对于上述步骤S170,其可以有多种实现方式,如图3所示,其示出了本发明实施例中计算目标网络切片的承载变化量的子步骤流程图,步骤S170的实现方式具体为:For the above step S170, it can be implemented in many ways. As shown in FIG. 3, it shows a flow chart of the sub-steps for calculating the bearer variation of the target network slice in the embodiment of the present invention. The implementation of step S170 is specifically as follows:

步骤S171:根据所述当前时刻的承载信息,确定所述目标网络切片的当前承载量。Step S171: Determine the current bearer capacity of the target network slice according to the bearer information at the current moment.

如骤S110所述,目标网络切片的承载信息包括接用户的IMSI信息以及各接入用户占用的CPU资源量、内存资源量和存储资源量。由此,可以通过将目标网络切片当前时刻的接入用户数量求和,以及各接入用户占用的资源量求和得到当前承载量。例如,目标网络切片当前时刻的接入用户为【S1、S2、S3和S4】,其占用的CPU资源量、内存资源量和存储资源量分别为【C1、C2、C3和C4】、【M1、M2、M3和M4】和【N1、N2、N3和N4】,此时目标网络切片的当前承载量包括当前用户接入量、当前CPU资源占用量、当前内存占用量和当前存储占用量,其分别为4、C1+C2+C3+C4、M1+M2+M3+M4和N1+N2+N3+N4。此外,当前承载量还包括当前时刻各接入用户的IMSI信息,以便后续计算承载变化量。As described in step S110, the bearer information of the target network slice includes the IMSI information of the access user and the amount of CPU resources, memory resources, and storage resources occupied by each access user. Thus, the current bearer capacity can be obtained by summing the number of access users of the target network slice at the current moment and the amount of resources occupied by each access user. For example, the current access users of the target network slice are [S1, S2, S3, and S4], and the amount of CPU resources, memory resources, and storage resources occupied by them are [C1, C2, C3, and C4], [M1 . They are 4, C1+C2+C3+C4, M1+M2+M3+M4 and N1+N2+N3+N4, respectively. In addition, the current bearer amount also includes the IMSI information of each access user at the current moment, so as to calculate the bearer change amount subsequently.

步骤S172:根据所述下一时刻的承载信息和所述当前承载量,计算下一时刻从所述目标网络切片迁移到所述目标网络切片相邻网络切片的所述承载变化量。Step S172: According to the bearer information at the next moment and the current bearer amount, calculate the bearer change amount for migrating from the target network slice to an adjacent network slice of the target network slice at the next moment.

在本步骤中,所述承载变化量可以分为用户迁移量、CPU资源迁移量、内存迁移量和存储迁移量中的一个或多个,其可以是从目标网络切片迁移到目标网络切片相邻网络切片的用户接入量和/或CPU资源占用量和/或内存占用量和/或存储占用量,或是它们与目标网络切片的当前承载量的比值。若目标网络切片当前时刻的接入用户为【S1、S2、S3和S4】;而目标网络切片相邻网络切片有两个,它们下一时刻的接入用户为分别为【S1、S5、S6和S7】和【S2、S8、S9和S10】。由此可以确定标网络切片在下一时刻迁移到邻网络切片的用户为S1和S2,所以目标网络切片的用户迁移量为2或2/4。此外,根据用户S1和S2在当前时刻占用的CPU资源量、内存资源量和存储资源量,也可以计算出目标网络切片的CPU资源迁移量、内存迁移量和存储迁移量。例如,若当前CPU资源占用量、当前内存占用量和当前存储占用量分别为C1+C2+C3+C4、M1+M2+M3+M4和N1+N2+N3+N4,其中,用户S1和S2对应的当前时刻占用的CPU资源量、内存资源量和存储资源量分别为C1和C2、M1和M2以及N1和N2,此时目标网络切片的CPU资源迁移量、内存迁移量和存储迁移量分别为C1+C2或(C1+C2)/(C1+C2+C3+C4)、M1+M2或(M1+M2)/(M1+M2+M3+M4)以及N1+N2或(N1+N2)/(N1+N2+N3+N4)。In this step, the load change amount can be divided into one or more of user migration amount, CPU resource migration amount, memory migration amount, and storage migration amount. User access and/or CPU resource usage and/or memory usage and/or storage usage of the network slice, or a ratio between them and the current carrying capacity of the target network slice. If the current access users of the target network slice are [S1, S2, S3, and S4]; and there are two adjacent network slices of the target network slice, their access users at the next moment are [S1, S5, S6] respectively. and S7] and [S2, S8, S9 and S10]. From this, it can be determined that the users of the target network slice to migrate to the adjacent network slice at the next moment are S1 and S2, so the user migration amount of the target network slice is 2 or 2/4. In addition, according to the amount of CPU resources, memory resources, and storage resources occupied by users S1 and S2 at the current moment, the CPU resource migration amount, memory migration amount, and storage migration amount of the target network slice can also be calculated. For example, if the current CPU resource usage, current memory usage, and current storage usage are respectively C1+C2+C3+C4, M1+M2+M3+M4, and N1+N2+N3+N4, among them, users S1 and S2 The corresponding amounts of CPU resources, memory resources, and storage resources occupied at the current moment are respectively C1 and C2, M1 and M2, and N1 and N2. At this time, the amount of CPU resource migration, memory migration, and storage migration of the target network slice are respectively C1+C2 or (C1+C2)/(C1+C2+C3+C4), M1+M2 or (M1+M2)/(M1+M2+M3+M4) and N1+N2 or (N1+N2) /(N1+N2+N3+N4).

可以理解的是:在其它实施例中,承载变化量不仅限于上面的描述,其也可以为其它表示目标网络切片的承载变化状态的参数,例如,承载变化量也可以是目标网络切片迁移到其相邻网络切片的承载量与从其相邻网络切片迁入到目标网络切片的承载量之和。若目标网络切片当前时刻的接入用户为【S1、S2、S3和S4】,目标网络切片相邻网络切片当前时刻的接入用户为【S5、S6、S7和S8】,而下一时刻目标网络切片和其相邻的网络切片分别为【S5、S6、S3和S4】和【S1、S2、S7和S8】,则可以说明下一时刻迁出目标网络切片的用户为S1和S2,而迁入目标网络切片的用户为S5和S6,因此,此时目标网络切片的承载变化量中的用户迁移量为4。It can be understood that: in other embodiments, the bearer change amount is not limited to the above description, it may also be other parameters representing the bearer change state of the target network slice, for example, the bearer change amount may also be The sum of the carrying capacity of adjacent network slices and the carrying capacity migrated from its adjacent network slices to the target network slice. If the current access users of the target network slice are [S1, S2, S3 and S4], the current access users of the adjacent network slices of the target network slice are [S5, S6, S7 and S8], and the next target network slice is [S5, S6, S7 and S8]. The network slice and its adjacent network slices are [S5, S6, S3, and S4] and [S1, S2, S7, and S8] respectively. It can be shown that the users who migrate out of the target network slice at the next moment are S1 and S2, and The users migrating into the target network slice are S5 and S6. Therefore, the user migration amount in the bearer variation of the target network slice is 4 at this time.

对于上述步骤S180,其可以有多种实现方式,在一些实施例中,步骤S180的实现方式具体为:当所述承载变化量超过所述预设误差值时,确定所述目标网络切片异常,并发送迁移超限预警。For the above step S180, there may be multiple implementations. In some embodiments, the implementation of step S180 is specifically: when the bearer variation exceeds the preset error value, determine that the target network slice is abnormal, And send migration limit warning.

在本步骤中,可以通过目标网络切片的承载变化量的大小来评判目标网络切片是否异常,并决定是否发送迁移超限预警,通知运维人员排除故障。In this step, it is possible to judge whether the target network slice is abnormal based on the amount of bearer variation of the target network slice, and decide whether to send a migration overrun warning to notify the operation and maintenance personnel to troubleshoot.

具体地,当所述当前承载量包括当前用户接入量,所述承载变化量包括用户迁移量时,所述预设误差值包括预设用户误差值,步骤S180为:当所述用户迁移量超过所述预设用户误差值时,确定所述目标网络切片异常,并发送用户迁移超限预警。Specifically, when the current bearer amount includes the current user access amount, and the bearer change amount includes the user migration amount, and the preset error value includes a preset user error value, step S180 is: when the user migration amount When the preset user error value is exceeded, it is determined that the target network slice is abnormal, and a user migration exceeding limit warning is sent.

当所述当前承载量包括当前CPU资源占用量,所述承载变化量包括CPU资源迁移量时,所述预设误差值包括预设CPU误差值,步骤S180为:当所述CPU资源迁移量超过所述预设CPU误差值时,确定所述目标网络切片异常,并发送CPU资源迁移超限预警。When the current load includes the current CPU resource occupancy, and the load change includes CPU resource migration, the preset error value includes a preset CPU error value. Step S180 is: when the CPU resource migration exceeds When the preset CPU error value is determined, it is determined that the target network slice is abnormal, and a CPU resource migration overrun warning is sent.

当所述当前承载量包括当前内存资源占用量,所述承载变化量包括内存资源迁移量时,所述预设误差值包括预设内存误差值,步骤S180为:当所述内存资源迁移量超过所述预设内存误差值时,确定所述目标网络切片异常,并发送内存资源迁移超限预警。When the current carrying amount includes the current memory resource occupancy, and the carrying change includes the memory resource migration amount, the preset error value includes a preset memory error value, and step S180 is: when the memory resource migration amount exceeds When the preset memory error value is determined, it is determined that the target network slice is abnormal, and a memory resource migration overrun warning is sent.

当所述当前承载量包括当前存储资源占用量,所述承载变化量包括存储资源迁移量时,所述预设误差值包括预设存储误差值,步骤S180为:当所述存储资源迁移量超过所述预设存储误差值时,确定所述目标网络切片异常,并发送存储资源迁移超限预警。When the current carrying amount includes the current storage resource occupancy, and the carrying change includes the storage resource migration amount, the preset error value includes the preset storage error value, step S180 is: when the storage resource migration amount exceeds When the preset storage error value is determined, it is determined that the target network slice is abnormal, and a storage resource migration overrun warning is sent.

本发明实施例根据输入的目标网络切的承载量的类型不同,分别进行了不同类型的异常识别,并发送了不同类型的预警,方便运维人员根据预警的类型来排查目标网络切片的故障原因。According to the different types of load capacity of the input target network slice, the embodiment of the present invention performs different types of abnormal identification and sends different types of early warnings, so that the operation and maintenance personnel can troubleshoot the cause of the fault of the target network slice according to the type of early warning. .

在另一些实施例中,上述步骤S180还可以有其它实现方式,如图4所示,其示出了本发明实施例中确定目标网络切片是否异常的子步骤流程图,步骤S180具体为:In some other embodiments, the above step S180 may also be implemented in other ways, as shown in FIG. 4 , which shows a flow chart of sub-steps for determining whether the target network slice is abnormal in the embodiment of the present invention. Step S180 is specifically:

步骤S181:将所述承载变化量中的用户迁移量与预设用户权重值的乘积、所述承载变化量中的CPU资源迁移量与预设CPU权重值的乘积、所述承载变化量中的内存资源迁移量与预设内存权重值的乘积和所述承载变化量中的存储资源迁移量与预设存储权重值的乘积求和,得到参数变化总量。Step S181: Calculate the product of the user migration amount in the load change amount and the preset user weight value, the product of the CPU resource migration amount in the load change amount and the preset CPU weight value, and the user migration amount in the load change amount The product of the memory resource migration amount and the preset memory weight value and the product of the storage resource migration amount and the preset storage weight value in the load variation amount are summed to obtain the total amount of parameter changes.

步骤S182:当所述参数变化总量超过预设误差值时,确定所述网络切片异常。Step S182: When the total amount of parameter changes exceeds a preset error value, determine that the network slice is abnormal.

当承载变化量包括用户迁移量、CPU资源迁移量、内存迁移量和存储迁移量时,本发明实施例会为其分别配置不同的权重值,并将其求和来与预设误差值来比较,从而从目标网络切片的四个维度综合评判该目标网络切片是否异常。具体地,若目标网络切片的用户迁移量、CPU资源迁移量、内存迁移量和存储迁移量分别为a、b、c和d,且预设用户权重值、预设CPU权重值、预设内存权重值和预设存储权重值分别为k1、k2、k3和k4,参数变化总量则为a*k1+b*k2+c*k3+d*k4。若承载变化量仅包括用户迁移量、CPU资源迁移量、内存迁移量和存储迁移量中的部分,则可以将承载变化量不包括的迁移量对应的权重值设置为0即可,例如,若承载变化量不包括CPU资源迁移量,则预设CPU权重值为0。When the bearer variation includes user migration, CPU resource migration, memory migration, and storage migration, the embodiment of the present invention configures different weight values for them respectively, and compares the sum of them with the preset error value, Therefore, it is comprehensively judged whether the target network slice is abnormal from the four dimensions of the target network slice. Specifically, if the user migration amount, CPU resource migration amount, memory migration amount, and storage migration amount of the target network slice are respectively a, b, c, and d, and the preset user weight value, preset CPU weight value, preset memory The weight value and preset storage weight value are k1, k2, k3 and k4 respectively, and the total amount of parameter change is a*k1+b*k2+c*k3+d*k4. If the load variation only includes part of user migration, CPU resource migration, memory migration, and storage migration, you can set the weight value corresponding to the migration not included in the load variation to 0. For example, if If the load variation does not include the CPU resource migration, the default CPU weight is 0.

本发明实施例通过获取目标网络切片当前时刻和其相邻网络切片下一时刻的承载信息,计算出目标网络切片迁移到其相邻网络切片的承载变化量,并通过比较承载变化量与预设误差值的大小来确定目标网络切片是否异常。和现有技术相比,本发明实施例通过目标网络切片迁移到其相邻网络切片的承载变化量的大小来判断目标网络切片是否异常,而非通过监控硬件的故障情况来判断目标网络切片是否异常,其能识别出业务量较大等其它情况下导致的网络切片异常,因此其识别准确性更高。In the embodiment of the present invention, by obtaining the bearer information of the target network slice at the current moment and the bearer information of its adjacent network slice at the next moment, calculate the bearer change amount of the target network slice migrating to its adjacent network slice, and compare the bearer change amount with the preset The size of the error value is used to determine whether the target network slice is abnormal. Compared with the prior art, the embodiment of the present invention judges whether the target network slice is abnormal by the magnitude of the bearer variation of the target network slice migrating to its adjacent network slices, instead of judging whether the target network slice is abnormal by monitoring the fault condition of the hardware. Anomalies, which can identify network slice anomalies caused by other situations such as large traffic volumes, so the identification accuracy is higher.

图5示出了本发明实施例提供的一种网络切片异常识别装置的结构示意图。如图5所示,所述装置100包括第一获取模块10、第二获取模块20、计算模块30和第一确定模块40。FIG. 5 shows a schematic structural diagram of an apparatus for identifying anomalies in network slices according to an embodiment of the present invention. As shown in FIG. 5 , the apparatus 100 includes a first acquisition module 10 , a second acquisition module 20 , a calculation module 30 and a first determination module 40 .

第一获取模块10,用于获取目标网络切片当前时刻的承载信息;第二获取模块20,用于获取所述目标网络切片相邻网络切片下一时刻的承载信息;计算模块30,用于根据所述当前时刻的承载信息和所述下一时刻的承载信息,计算所述目标网络切片的承载变化量;第一确定模块40,用于根据所述承载变化量和预设误差值,确定所述目标网络切片是否异常。The first obtaining module 10 is used to obtain the bearer information of the target network slice at the current moment; the second obtainment module 20 is used to obtain the bearer information of the adjacent network slice of the target network slice at the next moment; the calculation module 30 is used to obtain the bearer information according to The bearer information at the current moment and the bearer information at the next moment calculate the bearer variation of the target network slice; the first determining module 40 is configured to determine the bearer variation according to the bearer variation and a preset error value. Whether the target network slice is abnormal.

在一种可选的方式中,所述预设误差值通过机器学习的方式确定。In an optional manner, the preset error value is determined by machine learning.

在一种可选的方式中,所述装置100还包括第二确定模块50、第三获取模块60、第三确定模块70和剔除模块80。In an optional manner, the apparatus 100 further includes a second determination module 50 , a third acquisition module 60 , a third determination module 70 and a rejection module 80 .

第二确定模块50,用于根据所述当前时刻的承载信息,确定所述目标网络切片的接入用户;第三获取模块60,用于获取所述接入用户的上报数据;第三确定模块70,用于根据所述上报数据,确定所述接入用户中的实际迁出用户;其中,所述实际迁出用户为当前时刻位于所述目标网络切片的覆盖范围内但在下一时刻位于所述目标网络切片的覆盖范围外的接入用户;剔除模块80,用于将所述当前时刻的承载信息和所述下一时刻的承载信息中和所述实际迁出用户关联的承载信息剔除。The second determination module 50 is configured to determine the access user of the target network slice according to the bearer information at the current moment; the third acquisition module 60 is configured to acquire the reported data of the access user; the third determination module 70. Determine, according to the reported data, an actual outgoing user among the access users; wherein, the actual outgoing user is located within the coverage of the target network slice at the current moment but located at the target network slice at the next moment. The access user outside the coverage of the target network slice; the removing module 80 is configured to remove the bearer information associated with the actual outgoing user from the bearer information at the current moment and the bearer information at the next moment.

在一种可选的方式中,所述计算模块30具体为:根据所述当前时刻的承载信息,确定所述目标网络切片的当前承载量;根据所述下一时刻的承载信息和所述当前承载量,计算下一时刻从所述目标网络切片迁移到所述目标网络切片相邻网络切片的所述承载变化量。In an optional manner, the calculation module 30 is specifically: according to the bearer information at the current moment, determine the current bearer capacity of the target network slice; according to the bearer information at the next moment and the current The bearer amount is used to calculate the change amount of the bearer migrating from the target network slice to an adjacent network slice of the target network slice at the next moment.

在一种可选的方式中,所述第一确定模块40具体为:当所述承载变化量超过所述预设误差值时,确定所述目标网络切片异常,并发送迁移超限预警。In an optional manner, the first determination module 40 is specifically: when the bearer variation exceeds the preset error value, determine that the target network slice is abnormal, and send a migration overrun warning.

在一种可选的方式中,所述当前承载量包括当前用户接入量,所述承载变化量包括用户迁移量,所述预设误差值包括预设用户误差值;和/或,所述当前承载量包括当前CPU资源占用量,所述承载变化量包括CPU资源迁移量,所述预设误差值包括预设CPU误差值;和/或,所述当前承载量包括当前内存占用量,所述承载变化量包括内存迁移量,所述预设误差值包括预设内存误差值;和/或,所述当前承载量包括当前存储占用量,所述承载变化量包括存储迁移量,所述预设误差值包括预设存储误差值。In an optional manner, the current bearer amount includes a current user access amount, the bearer change amount includes a user migration amount, and the preset error value includes a preset user error value; and/or, the The current load includes a current CPU resource usage, the load change includes a CPU resource migration, and the preset error value includes a preset CPU error value; and/or, the current load includes a current memory usage, so The load change amount includes a memory migration amount, and the preset error value includes a preset memory error value; and/or, the current load amount includes a current storage usage amount, the load change amount includes a storage migration amount, and the preset The set error value includes a preset stored error value.

在一种可选的方式中,所述第一确定模块40具体为:将所述承载变化量中的用户迁移量与预设用户权重值的乘积、所述承载变化量中的CPU资源迁移量与预设CPU权重值的乘积、所述承载变化量中的内存资源迁移量与预设内存权重值的乘积和所述承载变化量中的存储资源迁移量与预设存储权重值的乘积求和,得到参数变化总量;当所述参数变化总量超过预设误差值时,确定所述网络切片异常。In an optional manner, the first determination module 40 is specifically: the product of the user migration amount in the bearer variation and the preset user weight value, the CPU resource migration amount in the bearer variation and the product of the preset CPU weight value, the product of the memory resource migration amount in the load variation amount and the preset memory weight value, and the product of the storage resource migration amount in the load variation amount and the preset storage weight value are summed , to obtain a total amount of parameter changes; when the total amount of parameter changes exceeds a preset error value, it is determined that the network slice is abnormal.

本发明实施例通过第一获取模块10和第二获取模块20分别获取目标网络切片当前时刻和其相邻网络切片下一时刻的承载信息,之后通过计算模块30计算出目标网络切片迁移到其相邻网络切片的承载变化量,并通过第一确定模块40比较承载变化量与预设误差值的大小来确定目标网络切片是否异常。和现有技术相比,本发明实施例通过目标网络切片迁移到其相邻网络切片的承载变化量的大小来判断目标网络切片是否异常,而非通过监控硬件的故障情况来判断目标网络切片是否异常,其能识别出业务量较大等其它情况下导致的网络切片异常,因此其识别准确性更高。In the embodiment of the present invention, the first acquisition module 10 and the second acquisition module 20 respectively acquire the bearer information of the target network slice at the current moment and its adjacent network slice at the next moment, and then use the calculation module 30 to calculate the migration of the target network slice to its corresponding Adjacent to the bearer variation of the network slice, and determine whether the target network slice is abnormal by comparing the bearer variation with a preset error value through the first determining module 40 . Compared with the prior art, the embodiment of the present invention judges whether the target network slice is abnormal by the magnitude of the bearer variation of the target network slice migrating to its adjacent network slices, instead of judging whether the target network slice is abnormal by monitoring the fault condition of the hardware. Anomalies, which can identify network slice anomalies caused by other situations such as large traffic volumes, so the identification accuracy is higher.

本发明实施例提供了一种非易失性计算机存储介质,所述计算机存储介质存储有至少一可执行指令,该计算机可执行指令可执行上述任意方法实施例中的网络切片异常识别方法。An embodiment of the present invention provides a non-volatile computer storage medium, the computer storage medium stores at least one executable instruction, and the computer executable instruction can execute the network slice anomaly identification method in any of the above method embodiments.

图6示出了本发明实施例提供的网络切片异常识别设备的结构示意图,本发明具体实施例并不对网络切片异常识别设备的具体实现做限定。FIG. 6 shows a schematic structural diagram of a network slice anomaly identification device provided by an embodiment of the present invention. The specific embodiment of the present invention does not limit the specific implementation of the network slicing anomaly identification device.

如图6所示,该网络切片异常识别设备可以包括:处理器(processor)202、通信接口(Communications Interface)204、存储器(memory)206、以及通信总线208。As shown in FIG. 6 , the network slice anomaly identification device may include: a processor (processor) 202 , a communication interface (Communications Interface) 204 , a memory (memory) 206 , and a communication bus 208 .

其中:处理器202、通信接口204、以及存储器206通过通信总线208完成相互间的通信。通信接口204,用于与其它设备比如客户端或其它服务器等的网元通信。处理器202,用于执行程序210,具体可以执行上述网络切片异常识别方法实施例中的相关步骤。Wherein: the processor 202 , the communication interface 204 , and the memory 206 communicate with each other through the communication bus 208 . The communication interface 204 is used to communicate with network elements of other devices such as clients or other servers. The processor 202 is configured to execute the program 210, and specifically, may execute relevant steps in the above embodiments of the method for identifying anomalies in network slices.

具体地,程序210可以包括程序代码,该程序代码包括计算机操作指令。Specifically, the program 210 may include program codes including computer operation instructions.

处理器202可能是中央处理器CPU,或者是特定集成电路ASIC(ApplicationSpecific Integrated Circuit),或者是被配置成实施本发明实施例的一个或多个集成电路。网络切片异常识别设备包括的一个或多个处理器,可以是同一类型的处理器,如一个或多个CPU;也可以是不同类型的处理器,如一个或多个CPU以及一个或多个ASIC。The processor 202 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present invention. One or more processors included in the network slicing exception identification device can be the same type of processor, such as one or more CPUs; or different types of processors, such as one or more CPUs and one or more ASICs .

存储器206,用于存放程序210。存储器206可能包含高速RAM存储器,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。The memory 206 is used to store the program 210 . The memory 206 may include a high-speed RAM memory, and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.

程序210具体可以用于使得处理器202执行以下操作:The program 210 can specifically be used to make the processor 202 perform the following operations:

获取目标网络切片当前时刻的承载信息;Obtain the bearer information of the target network slice at the current moment;

获取所述目标网络切片相邻网络切片下一时刻的承载信息;Acquiring the bearer information of the adjacent network slice of the target network slice at the next moment;

根据所述当前时刻的承载信息和所述下一时刻的承载信息,计算所述目标网络切片的承载变化量;calculating the bearer variation of the target network slice according to the bearer information at the current moment and the bearer information at the next moment;

根据所述承载变化量和预设误差值,确定所述目标网络切片是否异常。Determine whether the target network slice is abnormal according to the bearer variation and a preset error value.

在一种可选的方式中,程序210具体可以进一步用于使得处理器202执行以下操作:In an optional manner, the program 210 may be further specifically configured to enable the processor 202 to perform the following operations:

根据所述当前时刻的承载信息,确定所述目标网络切片的接入用户;Determine the access users of the target network slice according to the bearer information at the current moment;

获取所述接入用户的上报数据;Obtain the reported data of the access user;

根据所述上报数据,确定所述接入用户中的实际迁出用户;其中,所述实际迁出用户为当前时刻位于所述目标网络切片的覆盖范围内但在下一时刻位于所述目标网络切片的覆盖范围外的接入用户;According to the reported data, determine the actual outgoing user among the access users; wherein, the actual outgoing user is located within the coverage of the target network slice at the current moment but located in the target network slice at the next moment Access users outside the coverage area;

将所述当前时刻的承载信息和所述下一时刻的承载信息中和所述实际迁出用户关联的承载信息剔除。The bearer information associated with the actual moving-out user is removed from the bearer information at the current moment and the bearer information at the next moment.

在一种可选的方式中,程序210具体可以进一步用于使得处理器202执行以下操作:In an optional manner, the program 210 may be further specifically configured to enable the processor 202 to perform the following operations:

根据所述当前时刻的承载信息,确定所述目标网络切片的当前承载量;Determine the current bearer capacity of the target network slice according to the bearer information at the current moment;

根据所述下一时刻的承载信息和所述当前承载量,计算下一时刻从所述目标网络切片迁移到所述目标网络切片相邻网络切片的所述承载变化量。According to the bearer information at the next moment and the current bearer capacity, calculate the bearer change amount for migrating from the target network slice to an adjacent network slice of the target network slice at the next moment.

在一种可选的方式中,程序210具体可以进一步用于使得处理器202执行以下操作:In an optional manner, the program 210 may be further specifically configured to enable the processor 202 to perform the following operations:

当所述承载变化量超过所述预设误差值时,确定所述目标网络切片异常,并发送迁移超限预警。When the bearer variation exceeds the preset error value, it is determined that the target network slice is abnormal, and a migration exceeding limit warning is sent.

在一种可选的方式中,程序210具体可以进一步用于使得处理器202执行以下操作:In an optional manner, the program 210 may be further specifically configured to enable the processor 202 to perform the following operations:

将所述承载变化量中的用户迁移量与预设用户权重值的乘积、所述承载变化量中的CPU资源迁移量与预设CPU权重值的乘积、所述承载变化量中的内存资源迁移量与预设内存权重值的乘积和所述承载变化量中的存储资源迁移量与预设存储权重值的乘积求和,得到参数变化总量;The product of the user migration amount in the bearer variation and a preset user weight value, the product of the CPU resource migration in the bearer variation and a preset CPU weight value, and the memory resource migration in the bearer variation The product of the amount and the preset memory weight value and the product of the storage resource migration amount in the load variation and the preset storage weight value are summed to obtain the total amount of parameter changes;

当所述参数变化总量超过预设误差值时,确定所述网络切片异常。When the total amount of parameter changes exceeds a preset error value, it is determined that the network slice is abnormal.

本发明实施例通过获取目标网络切片当前时刻和其相邻网络切片下一时刻的承载信息,计算出目标网络切片迁移到其相邻网络切片的承载变化量,并通过比较承载变化量与预设误差值的大小来确定目标网络切片是否异常。和现有技术相比,本发明实施例通过目标网络切片迁移到其相邻网络切片的承载变化量的大小来判断目标网络切片是否异常,而非通过监控硬件的故障情况来判断目标网络切片是否异常,其能识别出业务量较大等其它情况下导致的网络切片异常,因此其识别准确性更高。In the embodiment of the present invention, by obtaining the bearer information of the target network slice at the current moment and the bearer information of its adjacent network slice at the next moment, calculate the bearer change amount of the target network slice migrating to its adjacent network slice, and compare the bearer change amount with the preset The size of the error value is used to determine whether the target network slice is abnormal. Compared with the prior art, the embodiment of the present invention judges whether the target network slice is abnormal based on the magnitude of the bearer variation of the target network slice migrating to its adjacent network slices, instead of judging whether the target network slice is abnormal by monitoring hardware failures. Anomalies, which can identify network slice anomalies caused by other situations such as large traffic volumes, so the identification accuracy is higher.

本发明实施例提供了一种可执行程序,所述可执行程序可执行上述任意方法实施例中的网络切片异常识别方法。An embodiment of the present invention provides an executable program, and the executable program can execute the network slice anomaly identification method in any of the above method embodiments.

在此提供的算法或程序不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明实施例也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms or programs presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, embodiments of the present invention are not directed to any particular programming language. It should be understood that various programming languages can be used to implement the contents of the present invention described herein, and the above description of specific languages is for disclosing the best mode of the present invention.

在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure the understanding of this description.

类似地,应当理解,为了精简本发明并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明实施例的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, in order to streamline the present disclosure and to facilitate an understanding of one or more of the various inventive aspects, various features of the embodiments of the invention are sometimes grouped together into a single implementation examples, figures, or descriptions thereof. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the Detailed Description are hereby expressly incorporated into this Detailed Description, with each claim standing on its own as a separate embodiment of this invention.

本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art can understand that the modules in the device in the embodiment can be adaptively changed and arranged in one or more devices different from the embodiment. Modules or units or components in the embodiments may be combined into one module or unit or component, and furthermore may be divided into a plurality of sub-modules or sub-units or sub-assemblies. All features disclosed in this specification (including accompanying claims, abstract and drawings) and any method or method so disclosed may be used in any combination, except that at least some of such features and/or processes or units are mutually exclusive. All processes or units of equipment are combined. Each feature disclosed in this specification (including accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.

此外,本领域的技术人员能够理解,尽管在此的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。Furthermore, those skilled in the art will understand that although some embodiments herein include some features included in other embodiments but not others, combinations of features from different embodiments are meant to be within the scope of the invention. And form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.

应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。上述实施例中的步骤,除有特殊说明外,不应理解为对执行顺序的限定。It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In a unit claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The use of the words first, second, and third, etc. does not indicate any order. These words can be interpreted as names. The steps in the above embodiments, unless otherwise specified, should not be construed as limiting the execution order.

Claims (9)

1.一种网络切片异常识别方法,其特征在于,包括:1. A network slicing abnormal identification method, characterized in that, comprising: 获取目标网络切片当前时刻的承载信息;Obtain the bearer information of the target network slice at the current moment; 获取所述目标网络切片相邻网络切片下一时刻的承载信息;Acquiring the bearer information of the adjacent network slice of the target network slice at the next moment; 根据所述当前时刻的承载信息,确定所述目标网络切片的接入用户;Determine the access users of the target network slice according to the bearer information at the current moment; 获取所述接入用户的上报数据;Obtain the reported data of the access user; 根据所述上报数据,确定所述接入用户中的实际迁出用户;其中,所述实际迁出用户为当前时刻位于所述目标网络切片的覆盖范围内但在下一时刻位于所述目标网络切片的覆盖范围外的接入用户;According to the reported data, determine the actual outgoing user among the access users; wherein, the actual outgoing user is located within the coverage of the target network slice at the current moment but located in the target network slice at the next moment Access users outside the coverage area; 将所述当前时刻的承载信息和所述下一时刻的承载信息中和所述实际迁出用户关联的承载信息剔除;removing the bearer information associated with the actual moving-out user from the bearer information at the current moment and the bearer information at the next moment; 根据所述当前时刻的承载信息和所述下一时刻的承载信息,计算所述目标网络切片的承载变化量;calculating the bearer variation of the target network slice according to the bearer information at the current moment and the bearer information at the next moment; 根据所述承载变化量和预设误差值,确定所述目标网络切片是否异常。Determine whether the target network slice is abnormal according to the bearer variation and a preset error value. 2.如权利要求1所述的方法,其特征在于,所述预设误差值通过机器学习的方式确定。2. The method according to claim 1, wherein the preset error value is determined by machine learning. 3.如权利要求1-2中任一项所述的方法,其特征在于,所述根据所述当前时刻的承载信息和所述下一时刻的承载信息,计算所述目标网络切片的承载变化量,具体为:3. The method according to any one of claims 1-2, wherein the bearer change of the target network slice is calculated according to the bearer information at the current moment and the bearer information at the next moment amount, specifically: 根据所述当前时刻的承载信息,确定所述目标网络切片的当前承载量;Determine the current bearer capacity of the target network slice according to the bearer information at the current moment; 根据所述下一时刻的承载信息和所述当前承载量,计算下一时刻从所述目标网络切片迁移到所述目标网络切片相邻网络切片的所述承载变化量。According to the bearer information at the next moment and the current bearer capacity, calculate the bearer change amount for migrating from the target network slice to an adjacent network slice of the target network slice at the next moment. 4.如权利要求3所述的方法,其特征在于,所述根据所述承载变化量和所述预设误差值,确定所述目标网络切片是否异常,具体为:4. The method according to claim 3, wherein the determining whether the target network slice is abnormal according to the bearer variation and the preset error value is specifically: 当所述承载变化量超过所述预设误差值时,确定所述目标网络切片异常,并发送迁移超限预警。When the bearer variation exceeds the preset error value, it is determined that the target network slice is abnormal, and a migration exceeding limit warning is sent. 5.如权利要求4所述的方法,其特征在于,所述当前承载量包括当前用户接入量,所述承载变化量包括用户迁移量,所述预设误差值包括预设用户误差值;和/或,所述当前承载量包括当前CPU资源占用量,所述承载变化量包括CPU资源迁移量,所述预设误差值包括预设CPU误差值;和/或,所述当前承载量包括当前内存占用量,所述承载变化量包括内存迁移量,所述预设误差值包括预设内存误差值;和/或,所述当前承载量包括当前存储占用量,所述承载变化量包括存储迁移量,所述预设误差值包括预设存储误差值。5. The method according to claim 4, wherein the current bearer amount includes a current user access amount, the bearer change amount includes a user migration amount, and the preset error value includes a preset user error value; And/or, the current load includes a current CPU resource occupation, the load change includes a CPU resource migration, and the preset error value includes a preset CPU error value; and/or, the current load includes The current memory usage, the load variation includes memory migration, and the preset error value includes a preset memory error value; and/or, the current load includes the current storage usage, and the load variation includes storage Migration amount, the preset error value includes a preset storage error value. 6.如权利要求3所述的方法,其特征在于,所述根据所述承载变化量和所述预设误差值,确定所述目标网络切片是否异常,具体为:6. The method according to claim 3, wherein the determining whether the target network slice is abnormal according to the bearer variation and the preset error value is specifically: 将所述承载变化量中的用户迁移量与预设用户权重值的乘积、所述承载变化量中的CPU资源迁移量与预设CPU权重值的乘积、所述承载变化量中的内存资源迁移量与预设内存权重值的乘积和所述承载变化量中的存储资源迁移量与预设存储权重值的乘积求和,得到参数变化总量;The product of the user migration amount in the bearer variation and a preset user weight value, the product of the CPU resource migration in the bearer variation and a preset CPU weight value, and the memory resource migration in the bearer variation The product of the amount and the preset memory weight value and the product of the storage resource migration amount in the load variation and the preset storage weight value are summed to obtain the total amount of parameter changes; 当所述参数变化总量超过预设误差值时,确定所述网络切片异常。When the total amount of parameter changes exceeds a preset error value, it is determined that the network slice is abnormal. 7.一种网络切片异常识别装置,其特征在于,包括:7. A network slicing anomaly identification device, characterized in that, comprising: 第一获取模块,用于获取目标网络切片当前时刻的承载信息;The first obtaining module is used to obtain the bearer information of the target network slice at the current moment; 第二获取模块,用于获取所述目标网络切片相邻网络切片下一时刻的承载信息;The second obtaining module is used to obtain the bearer information of the adjacent network slice of the target network slice at the next moment; 第二确定模块,用于根据所述当前时刻的承载信息,确定所述目标网络切片的接入用户;The second determination module is configured to determine the access users of the target network slice according to the bearer information at the current moment; 第三获取模块,用于获取所述接入用户的上报数据;A third acquiring module, configured to acquire the reported data of the access user; 第三确定模块,用于根据所述上报数据,确定所述接入用户中的实际迁出用户;其中,所述实际迁出用户为当前时刻位于所述目标网络切片的覆盖范围内但在下一时刻位于所述目标网络切片的覆盖范围外的接入用户;The third determining module is configured to determine the actual moving-out user among the access users according to the reported data; wherein, the actual moving-out user is located within the coverage of the target network slice at the current moment but in the next access users located outside the coverage of the target network slice at all times; 剔除模块,用于将所述当前时刻的承载信息和所述下一时刻的承载信息中和所述实际迁出用户关联的承载信息剔除;A removing module, configured to remove the bearer information associated with the actual outgoing user from the bearer information at the current moment and the bearer information at the next moment; 计算模块,用于根据所述当前时刻的承载信息和所述下一时刻的承载信息,计算所述目标网络切片的承载变化量;A calculation module, configured to calculate the bearer variation of the target network slice according to the bearer information at the current moment and the bearer information at the next moment; 第一确定模块,用于根据所述承载变化量和预设误差值,确定所述目标网络切片是否异常。The first determining module is configured to determine whether the target network slice is abnormal according to the bearer variation and a preset error value. 8.一种网络切片异常识别设备,其特征在于,包括:处理器、存储器、通信接口和通信总线,所述处理器、所述存储器和所述通信接口通过所述通信总线完成相互间的通信;8. A network slice anomaly identification device, characterized in that it includes: a processor, a memory, a communication interface, and a communication bus, and the processor, the memory, and the communication interface complete mutual communication through the communication bus ; 所述存储器用于存放至少一可执行指令,所述可执行指令使所述处理器执行如权利要求1-6任意一项所述的网络切片异常识别方法。The memory is used to store at least one executable instruction, and the executable instruction causes the processor to execute the network slice exception identification method according to any one of claims 1-6. 9.一种计算机存储介质,其特征在于,所述存储介质中存储有至少一可执行指令,所述可执行指令使处理器执行如权利要求1-6任意一项所述的网络切片异常识别方法。9. A computer storage medium, characterized in that at least one executable instruction is stored in the storage medium, and the executable instruction causes the processor to perform the network slice exception identification according to any one of claims 1-6 method.
CN201910869412.1A 2019-09-16 2019-09-16 Network slicing abnormality identification method, device, equipment and computer storage medium Active CN112512057B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910869412.1A CN112512057B (en) 2019-09-16 2019-09-16 Network slicing abnormality identification method, device, equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910869412.1A CN112512057B (en) 2019-09-16 2019-09-16 Network slicing abnormality identification method, device, equipment and computer storage medium

Publications (2)

Publication Number Publication Date
CN112512057A CN112512057A (en) 2021-03-16
CN112512057B true CN112512057B (en) 2023-02-10

Family

ID=74923957

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910869412.1A Active CN112512057B (en) 2019-09-16 2019-09-16 Network slicing abnormality identification method, device, equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN112512057B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115348192A (en) * 2021-05-10 2022-11-15 华为技术有限公司 Method, communication device and communication system for detecting abnormality
CN113507729B (en) * 2021-09-10 2021-12-28 之江实验室 RAN side network slice management system and method based on artificial intelligence
CN116016150B (en) * 2022-12-02 2025-03-28 中国电信股份有限公司 Physical network early warning method, device, electronic device, and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490956A (en) * 2013-09-22 2014-01-01 杭州华为数字技术有限公司 Self-adaptive energy-saving control method, device and system based on traffic predication
CN104113885A (en) * 2013-04-16 2014-10-22 中国移动通信集团公司 Wireless network parameter configuration method, and wireless network parameter configuration device
CN107223350A (en) * 2017-04-26 2017-09-29 北京小米移动软件有限公司 Cell is selected or reselecting method, apparatus and system
CN107682135A (en) * 2017-09-30 2018-02-09 重庆邮电大学 A kind of network slice adaptive virtual resource allocation method based on NOMA
CN108337110A (en) * 2018-01-02 2018-07-27 中兴通讯股份有限公司 A kind of virtual resource management method and device, computer readable storage medium
CN109788491A (en) * 2017-11-10 2019-05-21 中国电信股份有限公司 For managing the methods, devices and systems of slice migration
CN110213780A (en) * 2018-02-28 2019-09-06 中兴通讯股份有限公司 Management method, management and the layout entity and storage medium of network slice

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013004790A1 (en) * 2011-07-05 2013-01-10 Telefonaktiebolaget L M Ericsson (Publ) Method and devices for allocating bearers
CN107222318A (en) * 2016-03-21 2017-09-29 中兴通讯股份有限公司 The performance data processing method and device and NMS of a kind of network element
CN109842910A (en) * 2017-11-28 2019-06-04 中国移动通信有限公司研究院 A kind of processing method and access network elements of network slice

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113885A (en) * 2013-04-16 2014-10-22 中国移动通信集团公司 Wireless network parameter configuration method, and wireless network parameter configuration device
CN103490956A (en) * 2013-09-22 2014-01-01 杭州华为数字技术有限公司 Self-adaptive energy-saving control method, device and system based on traffic predication
CN107223350A (en) * 2017-04-26 2017-09-29 北京小米移动软件有限公司 Cell is selected or reselecting method, apparatus and system
CN107682135A (en) * 2017-09-30 2018-02-09 重庆邮电大学 A kind of network slice adaptive virtual resource allocation method based on NOMA
CN109788491A (en) * 2017-11-10 2019-05-21 中国电信股份有限公司 For managing the methods, devices and systems of slice migration
CN108337110A (en) * 2018-01-02 2018-07-27 中兴通讯股份有限公司 A kind of virtual resource management method and device, computer readable storage medium
CN110213780A (en) * 2018-02-28 2019-09-06 中兴通讯股份有限公司 Management method, management and the layout entity and storage medium of network slice

Also Published As

Publication number Publication date
CN112512057A (en) 2021-03-16

Similar Documents

Publication Publication Date Title
US11722867B2 (en) Systems and methods to determine mobile edge deployment of microservices
KR102626273B1 (en) Network abnormality detection
US20210022022A1 (en) Method and device for monitoring network data
US20200358523A1 (en) Predictive connectivity service layers
CN112512057B (en) Network slicing abnormality identification method, device, equipment and computer storage medium
US11314559B2 (en) Method for balanced scale out of resources in distributed and collaborative container platform environment
CN109951877A (en) A method and device for updating slice information
CN108512890B (en) Container cloud platform resource scheduling method and system based on rack sensing
EP3217753B1 (en) Methods and systems for adaptive scheduling of packets in a wireless broadband network
WO2019120109A1 (en) Slice information update method and apparatus
US20170331762A1 (en) Virtual resource automatic selection system and method
WO2014194704A1 (en) A grouping processing method and system
EP3644646A1 (en) Load-balancing method and apparatus
WO2023155468A1 (en) Methods for determining root cause fault, and apparatuses
US12395926B2 (en) Management device, management method, and management program
US20150236910A1 (en) User categorization in communications networks
CN111107569B (en) Method and device for screening problem cells
US10353741B2 (en) Load distribution of workflow execution request among distributed servers
US20240235968A9 (en) Method and apparatus for logging events in communication networks
US20200177512A1 (en) Network architecture with control plane node
US10897401B2 (en) Determining the importance of network devices based on discovered topology, managed endpoints, and activity
JP6319425B2 (en) Gateway device and communication system
US9479579B2 (en) Grouping processing method and system
US11228525B2 (en) Mission context routing data communication system
CN112075056A (en) Method for testing network service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant