US-12627762-B2 - Methods and systems for network slice monitoring and verification
Abstract
A method comprises generating, by a storage application in a data store implemented as an interplanetary file system (IPFS), a slice data structure dedicated for the network slice in response to receiving the parameters from the slice application, in which the slice data structure comprises the parameters of the network slice, monitoring, by the slice application, usage of the one or more NEs in the network slice by the client, storing, by the storage application in the slice data structure, usage data describing the usage of the one or more NEs in the network slice, and updating, by the storage application, the slice data structure to indicate update data describing an update to one or more parameters of the network slice in response to receiving update data from the slice application.
Inventors
- Marouane Balmakhtar
- Galip Murat Karabulut
- Lyle W. Paczkowski
Assignees
- T-MOBILE INNOVATIONS LLC
Dates
- Publication Date
- 20260512
- Application Date
- 20231204
Claims (20)
- 1 . A system comprising: at least one processor; at least one data store implemented as an interplanetary file system (IPFS); a storage application, stored in the at least one data store, which when executed by the at least one processor, causes the at least one processor to be configured to maintain a slice data structure dedicated for a network slice, wherein the slice data structure comprises an identifier of the network slice, parameters describing a configuration of the network slice, usage data describing a usage of the network slice by a client, and updates to the parameters of the network slice; and a slice application, stored at least one non-transitory memory, which when executed by the at least one processor, causes the at least one processor to be configured to: monitor an instantiation of the network slice, the usage of the network slice by the client, and the updates to the parameters of the network slice; and transmit, to the at least one data store, data describing the instantiation of the network slice, the usage of the network slice by the client, and the updates to the configuration of the network slice; wherein the storage application is further configured to: update the slice data structure based on the data received from the slice application to maintain an up-to-date reflection of the network slice; and transmit at least a portion of the slice data structure to a billing system application in response to a request for the slice data structure received from the billing system application to generate an invoice for the client, and wherein the request comprises the identifier of the network slice.
- 2 . The system of claim 1 , wherein the slice application is further configured to communicate with at least one of a session management function (SMF), an access and mobility management function (AMF), or a network slice selection function (NSSF) in the system monitor the instantiation of the network slice, the usage of the network slice by the client, and the updates to the parameters of the network slice.
- 3 . The system of claim 1 , wherein the storage application is further configured to generate the identifier of the network slice based on a hash function applied to the slice data structure.
- 4 . The system of claim 3 , wherein the storage application is further configured to add the identifier of the network slice in the slice data structure.
- 5 . The system of claim 1 , wherein the slice application is further configured to generate usage data describing the usage of the network slice by the client, wherein the usage data indicates an amount of data or resources consumed in the network slice by the client.
- 6 . The system of claim 1 , wherein the updates to the configuration of the network slice comprise updates to the parameters describing the network slice.
- 7 . A method for network slice monitoring and verification in a network, wherein the method comprises: maintaining, by a storage application in a data store implemented as an interplanetary file system (IPFS) in the network, a slice data structure dedicated for a network slice, wherein the slice data structure comprises an identifier of the network slice, parameters describing a configuration of the network slice, usage data describing a usage of one or more network elements (NEs) in the network slice by one or more clients, and update data describing updates to the parameters of the network slice; monitoring, by a slice application in a core network of the network, an instantiation of the network slice, the usage of the network slice by the one or more clients, and the updates to the parameters of the network slice; transmitting, by the slice application to the data store, data describing the instantiation of the network slice, the usage of the network slice by the one or more clients, and the updates to the parameters of the network slice; updating, by the storage application, the slice data structure based on the data received from the slice application to maintain an up-to-date representation of the network slice; and transmitting, by the storage application, at least a portion of the slice data structure to a client application in response to a request for the slice data structure received from the client application for verification that the network slice provided for the client matches subscription parameters of the network slice, wherein the request comprises the identifier of the network slice, wherein the client application autonomously verifies the subscription parameters of the network slice using the portion of the slice data structure.
- 8 . The method of claim 7 , further comprising communicating, by the slice application, with at least one of a session management function (SMF), an access and mobility management function (AMF), or a network slice selection function (NSSF) in the core network to monitor the instantiation of the network slice, the usage of the network slice by the one or more clients, and the updates to the parameters of the network slice.
- 9 . The method of claim 7 , further comprising generating, by the storage application, the identifier of the network slice based on a hash function applied to the slice data structure.
- 10 . The method of claim 9 , further comprising adding, by the storage application, the identifier of the network slice to the slice data structure.
- 11 . The method of claim 7 , further comprising generating, by the slice application, usage data describing the usage of the network slice by the one or more clients, wherein the usage data indicates an amount of data or resources consumed in the network slice by the one or more clients.
- 12 . The method of claim 7 , wherein the updates to the configuration of the network slice comprise updates to the parameters describing the network slice.
- 13 . The method of claim 7 , wherein the slice data structure is implemented as at least one of a blockchain or a container, and wherein the slice data structure is immutable.
- 14 . A method for network slice monitoring and verification in a network, wherein the method comprises: determining, by a slice application in a core network of the network, instantiation of a network slice for a client, wherein the network slice comprises one or more network elements (NE) in the network configured to provide a service to the client; obtaining, by the slice application, parameters for the network slice instantiated for the client, wherein the parameters indicate a configuration of the network slice in the network; generating, by a storage application in a data store implemented as an interplanetary file system (IPFS), a slice data structure dedicated for the network slice in response to receiving the parameters from the slice application, wherein the slice data structure comprises the parameters of the network slice; monitoring, by the slice application, usage of the one or more NEs in the network slice by the client; storing, by the storage application in the slice data structure, usage data describing the usage of the one or more NEs in the network slice, wherein the usage data indicates an amount of data or resources consumed in the network slice by the client; and updating, by the storage application, the slice data structure to indicate update data describing an update to one or more parameters of the network slice in response to receiving update data from the slice application.
- 15 . The method of claim 14 , further comprising communicating, by the slice application, with at least one of a session management function (SMF), an access and mobility management function (AMF), or an network slice selection function (NSSF) in the core network to monitor the usage of the network slice and detect the update to the network slice.
- 16 . The method of claim 14 , further comprising generating, by the storage application, an identifier of the network slice based on a hash function applied to the slice data structure; and storing, by the storage application, the identifier of the network slice in the slice data structure.
- 17 . The method of claim 16 , further comprising transmitting, by the storage application, the identifier of the network slice to the client and one or more other applications that share the network slice with the client.
- 18 . The method of claim 14 , wherein the slice data structure is implemented as a blockchain.
- 19 . The method of claim 14 , wherein the slice data structure is implemented as a container.
- 20 . The method of claim 14 , wherein data stored in the slice data structure is immutable after being added to the slice data structure.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS None. STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT Not applicable. REFERENCE TO A MICROFICHE APPENDIX Not applicable. BACKGROUND Network slicing overlays multiple virtual networks on top of a shared network, that is, a set of shared network and computing resources. Each network slice corresponds to a particular logical topology, and a separate set of security rules and performance characteristics—within the limits imposed by the underlying physical networks. Different slices can be dedicated to different purposes, such as (1) ensuring a specific application gets priority access to capacity and (2) delivering or isolating traffic for specific users or device classes. Network slicing enables the network operator to maximize the use of network resources and service flexibility. For example, network slicing enables concurrent support for services with vastly different requirements, from a connected vehicle to a voice call, over a common network infrastructure. Functional components and resources may be shared across network slices, but capabilities such as data speed, capacity, connectivity, quality, latency, reliability, and services may be customized in each network slice to conform to a specific service level agreement (SLA). SUMMARY In an embodiment, a method for network slice monitoring and verification in a network is disclosed. The method comprises determining, by a slice application in a core network of the network, instantiation of a network slice for a client, in which the network slice comprises one or more network elements (NE) in the network configured to provide a service to the client. The method further comprises generating, by a storage application in a data store implemented as an interplanetary file system (IPFS), a slice data structure dedicated for the network slice in response to receiving the parameters from the slice application, in which the slice data structure comprises the parameters of the network slice. The method further comprises monitoring, by the slice application, usage of the one or more NEs in the network slice by the client, storing, by the storage application in the slice data structure, usage data describing the usage of the one or more NEs in the network slice, wherein the usage data indicates an amount of data or resources consumed in the network slice by the client, and updating, by the storage application, the slice data structure to indicate update data describing an update to one or more parameters of the network slice in response to receiving update data from the slice application. In another embodiment, a method for network slice monitoring and verification in a network. The method comprises maintaining, by a storage application in a data store implemented as an interplanetary file system (IPFS) in the network, a slice data structure dedicated for a network slice, in which the slice data structure comprises an identifier of the network slice, parameters describing a configuration of the network slice, usage data describing a usage of one or more network elements (NEs) in the network slice by one or more clients, and update data describing updates to the parameters of the network slice. The method further comprises monitoring, by a slice application in a core network of the network, an instantiation of the network slice, the usage of the network slice by the one or more clients, and the updates to the parameters of the network slice, transmitting, by the slice application to the data store, data describing the instantiation of the network slice, the usage of the network slice by the one or more clients, and the updates to the parameters of the network slice, and updating, by the storage application, the slice data structure based on the data received from the slice application to maintain an up-to-date representation of the network slice. The method further comprises transmitting, by the storage application, at least a portion of the slice data structure to a client application in response to a request for the slice data structure received from the client application for verification that the network slice provided for the client matches subscription parameters of the network slice, in which the request comprises the identifier of the network slice. The client application autonomously verifies the subscription parameters of the network slice using the portion of the slice data structure. In yet another embodiment, a system is disclosed. The system comprises at least one processor, at least one data store implemented as an interplanetary file system (IPFS), a storage application, and a slice application. The storage application is in the at least one data store, which when executed by the at least one processor, causes the at least one processor to be configured to maintain a slice data structure dedicated for a network slice, wherein the slice data structure comprises an identifier of the network slice, par