Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD FOR USING CONTEXT AWARENESS FOR THE COORDINATION OF MANAGEMENT AND MOBILE NETWORK SERVICE OPERATION PLANES
Document Type and Number:
WIPO Patent Application WO/2018/228674
Kind Code:
A1
Abstract:
The present invention relates to a MCN supporting E2E network slicing, which comprises a controlling entity (CA_NF), one or more NF entities extended with functionalities (CA‐NFExt), an OSS extended with functionalities (CA_OSSExt) and a coordination entity (CA_CF). The CA_NF communicates with the CA_OSSExt through the CA_CF using If‐CA_MP and If‐CAC_OSS interfaces, and with the CA‐NFExts using a respective If‐CA_NF interface and/or other NFs interfaces. Based on information received from the OSS and the NF entities, the CA_NF generates a context with a certain type, sends, based on the generated context, context‐related information towards any entity that is impacted by the generated context amongst the NF entities and the OSS, and blocks, for a period of time, a transmission of any generated context towards the NF entities upon receiving, from the OSS, a notification message once the OSS decides to enforce a change upon receiving the generated context from the CA_NF.

Inventors:
MARQUEZAN CLARISSA (DE)
AN XUELI (DE)
TRIVISONNO RICCARDO (DE)
Application Number:
PCT/EP2017/064398
Publication Date:
December 20, 2018
Filing Date:
June 13, 2017
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
HUAWEI TECH CO LTD (CN)
MARQUEZAN CLARISSA (DE)
International Classes:
H04L12/24
Foreign References:
US20170141973A12017-05-18
Other References:
GENG CHINA MOBILE S BRYANT J DONG HUAWEI TECHNOLOGIES L: "Network Slicing Architecture; draft-geng-netslices-architecture-00.txt", NETWORK SLICING ARCHITECTURE; DRAFT-GENG-NETSLICES-ARCHITECTURE-00.TXT, INTERNET ENGINEERING TASK FORCE, IETF; STANDARDWORKINGDRAFT, INTERNET SOCIETY (ISOC) 4, RUE DES FALAISES CH- 1205 GENEVA, SWITZERLAND, 13 March 2017 (2017-03-13), pages 1 - 12, XP015118508
TAESANG CHOI ETRI REPUBLIC OF KOREA: "Output - Draft Recommendation of "IMT-2020 Network Management Framework (Y.IMT-2020-mgmt-frame)" (version 0.2);TD 129 (WP 1/13)", vol. 21/13, 10 June 2017 (2017-06-10), pages 1 - 53, XP044209507, Retrieved from the Internet [retrieved on 20170610]
CHATRAS BRUNO ET AL: "NFV enabling network slicing for 5G", 2017 20TH CONFERENCE ON INNOVATIONS IN CLOUDS, INTERNET AND NETWORKS (ICIN), IEEE, 7 March 2017 (2017-03-07), pages 219 - 225, XP033085379, DOI: 10.1109/ICIN.2017.7899415
MAKHIJANI J QIN R RAVINDRAN HUAWEI TECHNOLOGIES L GENG CHINA MOBILE L QIANG S PENG HUAWEI TECHNOLOGIES X DE FOY A RAHMAN INTERDIGI: "Network Slicing Use Cases: Network Customization and Differentiated Services; draft-netslices-usecases-00.txt", NETWORK SLICING USE CASES: NETWORK CUSTOMIZATION AND DIFFERENTIATED SERVICES; DRAFT-NETSLICES-USECASES-00.TXT; INTERNET-DRAFT: NONE, INTERNET ENGINEERING TASK FORCE, IETF; STANDARDWORKINGDRAFT, INTERNET SOCIETY (ISOC) 4, RUE DES FALAISES CH- 1205 GEN, 2 June 2017 (2017-06-02), pages 1 - 45, XP015119938
"Study on architecture for next generation system", 3GPP TR 23.799
"System architecture for the 5G system", 3GPP TS 23.501
"Study on management and orchestration of network slicing for next generation network", 3GPP TR 28.801
Attorney, Agent or Firm:
KREUZ, Georg (DE)
Download PDF:
Claims:
CLAIMS

1. A controlling entity (CA_NF) communicating with a network management entity (OSS) and one or more network function (NF) entities, the controlling entity (CA_NF) being configured to: receive information from the one or more NF entities and from the network management entity (OSS), the received information being relevant to generate a context; generate the context based on the received information; and based on the generated context, send context-related information towards any entity that is impacted by the generated context amongst the one or more NF entities and the network management entity (OSS).

2. The controlling entity (CA_NF) of claim 1, wherein: the information from the network management entity (OSS) is received using a first interface (lf-CA_M P); and the information from the one or more NF entities is received using a respective second interface (lf-CA_NF).

3. The controlling entity (CA_NF) of claim 2, wherein: the context-related information is sent towards the network management entity (OSS) using the first interface (lf-CA_MP) when the network management entity (OSS) is impacted by the generated context; and the context-related information is sent towards one amongst the one or more NF entities using the second interface (lf-CA_NF) when the one amongst the one or more NF entities is impacted by the generated context.

4. The controlling entity (CA_NF) of claim 3, wherein: the context-related information comprises the generated context when the entity that is impacted by the generated context is an entity susceptible to enforce a change upon receiving the generated context; and the context-related information comprises a notification message about a type of the generated context when the entity that is impacted by the generated context is an entity susceptible to be influenced by the enforced change.

5. The controlling entity (CA_NF) of claim 4, wherein: the type of the generated context has a format giving an indication about only a first entity (CP, MP) comprising the entity that is susceptible to enforce the change, or about the first entity (CP, M P) comprising the entity that is susceptible to enforce the change together with a second entity (MP, CP) comprising the entity that is susceptible to be influenced by the enforced change; the second entity (MP, CP) is other than the first entity (CP, M P); and the one or more NF entities are deployed in the first entity and the network management entity (OSS) is deployed in the second entity, or the one or more NF entities are deployed in the second entity and the network management entity (OSS) is deployed in the first entity.

6. The controlling entity (CA_NF) of claim 4 or 5, which is configured to: block, for a period of time, a transmission of any generated context towards the one or more NF entities upon receiving a notification message from the network management entity (OSS), wherein: the notification message is generated by the network management entity (OSS) once the network management entity (OSS) decides to enforce the change upon receiving the generated context from the controlling entity (CA_NF), and the period of time, during which the transmission is blocked, is greater than or equal to a time required for the network management entity (OSS) to enforce the change.

7. A network management entity (OSS) as specified in any one of claims 1 to 6.

8. The network management entity (OSS) of claim 7, which is configured to: be extended with functionalities as to obtain an extended network management entity (CA_OSSExt), the functionalities allowing the network management entity (OSS) to communicate with a controlling entity (CA_NF) as claimed in any one of claims 1 to 6, wherein: the extended network management entity (CA_OSSExt) is configured to send the information that is relevant to generate the context towards the controlling entity (CA_NF), and configured to receive, when the network management entity (OSS) is impacted by the generated context, the context-related information from the controlling entity (CA_NF).

9. The network management entity (OSS) of claim 8, wherein: the extended network management entity (CA_OSSExt) communicates with the controlling entity (CA_NF) through a communication with a coordination entity (CA_CF).

10. The network management entity (OSS) of claim 9, wherein: the extended network management entity (CA_OSSExt) communicates with the coordination entity (CA_CF) using a third interface (lf-CAC_OSS).

11. The network management entity (OSS) of any one of claims 8 to 10, wherein: the extended network management entity (CA_OSSExt) is configured to block, for a period of time, any change at the network management entity (OSS) upon receiving, from the controlling entity (CA_NF), a notification message as specified in claim 4, wherein: the period of time, during which any change is blocked, is greater than or equal to a time required for the one or more NF entities being impacted by the generated context to enforce the change.

12. A network function (NF) entity as specified in any one of claims 1 to 11.

13. The network function (NF) entity of claim 12, which is configured to: be extended with functionalities as to obtain an extended NF entity (CA_NFExt), the functionalities allowing the NF entity to communicate with the controlling entity (CA_NF), wherein: the extended NF entity (CA_NFExt) is configured to send the information that is relevant to generate the context towards the controlling entity (CA_NF), and configured to receive, when the NF entity is impacted by the generated context, the context-related information from the controlling entity (CA_NF).

14. A coordination entity (CA_CF) as specified in claim 9 and 10.

15. A mobile core network (MCN) supporting E2E network slicing, the mobile core network (MCN) comprising: a controlling entity (CA_NF) as claimed in any one of claims 1 to 6; a network management entity (OSS) as claimed in any one of claims 7 to 11; one or more network function (NF) entities as individually claimed in any one of claims 12 to 13; and a coordination entity (CA_CF) as claimed in claim 14.

16. The mobile core network (MCN) of claim 16, wherein: the network management entity (OSS) and the coordination entity (CA_CF) are implemented into a management plane (MP); and the controlling entity (CA_NF) and the one or more NF entities are implemented in a control plane (CP) and/or a user plane (UP), the CP and the MP being respectively one amongst the first entity (CP, M P) and the second entity (MP, CP) as specified in claim 5.

17. The mobile core network (MCN) of claim 15, which is configured to have a network function virtualization (NFV) framework.

18. The mobile core network (MCN) of claim 17, wherein: the one or more network function (NF) entities and the network management entity (OSS) are part of the NFV framework; and the controlling entity (CA_NF) and the coordination entity (CA_CF) are standalone entities.

19. The mobile core network (MCN) of claim 17, wherein: the controlling entity (CA_NF), the one or more network function (NF) entities, the network management entity (OSS) and the coordination entity (CA_CF) are part of the NFV framework.

20. A method for communicating with a network management entity (OSS) and one or more network function (NF) entities, the method comprising: receiving, at the controlling entity (CA_NF), information from the one or more NF entities and from the network management entity (OSS), the received information being relevant to generate a context; generating, at the controlling entity (CA_NF), the context based on the received information; and based on the generated context, sending, from the controlling entity (CA_NF), context-related information towards any entity that is impacted by the generated context amongst the one or more NF entities and the network management entity (OSS).

21. The method of claim 20 comprising: blocking, at the controlling entity (CA_NF) and for a period of time, a transmission of any generated context towards the one or more NF entities upon receiving a notification message from the network management entity (OSS), wherein: the notification message is generated by the network management entity (OSS) once the network management entity (OSS) decides to enforce a change upon receiving the generated context derived from the context-related information; and the period of time, during which the transmission is blocked, is greater than or equal to a time required for the network management entity (OSS) to enforce the change.

22. A method for communicating with a controlling entity (CA_NF) and one or more network function (NF) entities, the method comprising: sending, from the network management entity (OSS), information towards the controlling entity (CA_NF), the sent information being relevant to generate a context at the controlling entity (CA_NF); and based on the generated context, receiving, at the network management entity (OSS) and from the controlling entity (CA_NF), context-related information when the network management entity (OSS) is impacted by the generated context.

23. The method of claim 22 comprising: blocking, for a period of time, any change at the network management entity (OSS) upon receiving, at the network management entity (OSS) and from the controlling entity (CA_NF), a notification message about a type of the generated context, wherein: the one or more NF entities are impacted by the generated context by being susceptible to enforce the change; the network management entity (OSS) is impacted by the generated context by being susceptible to be influenced by the enforced change; and the period of time, during which any change at the network management entity (OSS) is blocked, is greater than or equal to a time required for the one or more NF entities being impacted by the generated context to enforce the change.

24. A computer program comprising a program code for performing the method according to any one of claims 20 to 23 when executed on a computer.

Description:
TITLE

Method for Using Context Awareness for the Coordination of Management and Mobile Network Service Operation Planes.

TECHNICAL FIELD

The present invention relates to the field of wireless communications, and more particularly to the design of a mobile core network (MCN) architecture for next generation systems.

BACKGROUND

Technology trends in the fields of softwarization, virtualization, cloud and mobile edge computing have increasingly spread their influence in the evolution of mobile telecommunication systems.

Focusing on the mobile network domain, some of the latest fourth generation (4G) features (e.g., 3GPP release 14: control and user plane separation) as well as the key design principles of fifth generation (5G) systems (5GS) (e.g., 3GPP release 15: support of network slicing and architecture modularization) clearly manifest the attempt to leverage on the potentials of network function virtualization and software defined networking.

Network slicing is a key feature of 5GS whose purpose is to ena ble mobile network operators to create customized networks, which provide optimized solutions for different market scenarios including the integration of vertical industries within the telecommunications domain. This may lead to diverse requirements in terms of supported functionality, performance and isolation, as disclosed in the technical report entitled: 3GPP TR 23.799, "Study on architecture for next generation system", vl4.0.0. The technical specification, entitled: 3GPP TS 23.501, "System architecture for the 5G system", v0.3.0, defines a network slice as a complete logical network that comprises a set of network functions (NFs) and corresponding resources, which are necessary to provide certain network capabilities and network characteristics. A network slice includes both an access network (AN) and a core network (CN). A network slice instance (NSI) is defined as the instantiation of a network slice, i.e., as a deployed set of network functions delivering the intended network slice services. The support of network slicing is ena bled by the architecture modularization design principle stating that the 5GS reference architecture features the core network decomposition into orthogonal sets of network functions for control plane (CP or C-plane) and user plane (UP or U-plane). The control plane network functions are classified as common control network fu nctions (CCNFs) and slice-specific control network functions (SCNFs), in order to d istinguish between the N Fs that may be shared among multiple NSIs and those that are NSI-specific.

Based on the a bove, it is clear that the extreme 5GS flexibility will come at a price of upcoming deployment scenarios of a n increased complexity in terms of network planning and engineering, network configuration, network management and network optimization, thereby blurring the boundaries between the control and management domains.

In this scenario, enhanced network operational models and mechanism, which tighten the relationship between management, control and user planes, will have to emerge.

In 4G, information management is limited within physical network entities for several reasons. First, there is no requirement for information unification, while each 3GPP-type physical box (e.g., the su bcomponents of the evolved packet core (EPC) like the mobility management entity (M M E), the serving gateway (SGW) a nd the packet data network (PDN) gateway (PGW) amongst others) may cover a wide range for service provisioning, so that self-optimization is sufficient. Second, a network is very static and the services are also limited. For example, there are only data and voice-over-long- term-evolution (VoLTE) services for mobile broad ba nd (M BB). Hence, there is no foreseen dynamicity that requires complex information processing. In comparison, the next generation mobile system will support a wide variety of devices (e.g., smartphones, weara ble devices, smart cars, electronic household appliances or industrial equipment amongst others), thereby requiring network services with diversified network provisioning requirements. Thus, the next generation mobile system is envisioned to be more flexible and efficient to handle different use cases. To do so, monolithic network entity like M M E shall disappear and be replaced with finer granularity network functions (e.g., mobility management or session management amongst others) together with network fu nctions virtualization (N FV) and software-defined networking (SDN) technology. Moreover, the d istribution of user pla ne functions will also invoke U-plane dynamicity. Such system dynamicity will have a high demand in terms of system automation in order to avoid that the operation of the system would be too complicated a nd expensive.

In this case, the network management plane (M P), where the network entity information is collected, for example, via operations support systems (OSS), is expected to play an essential role to ena ble system automation. However, the major limitation of a conventional network management plane (MP) is that the information collected from the production network is not for control purpose. For instance, it can be only used as historical data for fault analysis or statistic purpose, which is normally also required by human intervention. In order to enable full automation of the system, it is important to have a mechanism to generate a useful context based on the existing information that has been collected from the network management plane (MP), and it is also important to feed such a useful context back to the network service layer for controlling the purpose of, for example, improving the system operation efficiency or avoiding conflict operations due to a lack of information exchange. For instance, a C-plane function could change a user from a U-plane gateway denoted by A to another U- plane gateway denoted by B because it has noticed a prolonged latency on the gateway A, while, in the infrastructure, the gateway A is in a first data center (DC) (designated by DC#1) and the gateway B is in a second DC (designated by DC#2). At the infrastructure layer, the virtual machine (VM) that hosts the gateway B could be migrated to the DC#1 due to maintenance purpose. From such simultaneous and non-coordinated changes in both planes, it would result an increase in the delays that were occurring or a perception, by the users, of the same delay after the changes.

SUMMARY

It is therefore an object of the present invention to provide a solution for the control plane (CP) as well as the management plane (MP) of mobile networks in order to close the decision-making loop between the CP and MP entities using context awareness and to thereby optimize the mobile networks operation.

The object is achieved by the features of the independent claims. Further embodiments of the invention are apparent from the dependent claims, the description and the drawings.

According to a first aspect, the invention relates to a controlling entity (CA_NF) communicating with a network management entity (OSS) and one or more network function (NF) entities. The controlling entity (CA_NF) is configured to receive information from the one or more NF entities and from the network management entity (OSS), the received information being relevant to generate a context, configured to generate the context based on the received information, and, based on the generated context, configured to send context-related information towards any entity that is impacted by the generated context amongst the one or more NF entities and the network management entity (OSS). According to a further implementation form of the first aspect, the information from the network management entity (OSS) is received using a first interface (lf-CA_MP), and the information from the one or more NF entities is received using a respective second interface (lf-CA_NF).

According to a further implementation form of the first aspect, the context-related information is sent towards the network management entity (OSS) using the first interface (lf-CA_MP) when the network management entity (OSS) is impacted by the generated context, and the context-related information is sent towards one amongst the one or more NF entities using the second interface (If- CA_NF) when the one amongst the one or more NF entities is impacted by the generated context.

According to a further implementation form of the first aspect, the context-related information comprises the generated context when the entity that is impacted by the generated context is an entity susceptible to enforce a change upon receiving the generated context, and the context-related information comprises a notification message about a type of the generated context when the entity that is impacted by the generated context is an entity susceptible to be influenced by the enforced change.

According to a further implementation form of the first aspect, the type of the generated context has a format giving an indication about only a first entity (CP, MP) comprising the entity that is susceptible to enforce the change or about the first entity (CP, MP) comprising the entity that is susceptible to enforce the change together with a second entity (MP, CP) comprising the entity that is susceptible to be influenced by the enforced change. Further, the second entity (MP, CP) is other than the first entity (CP, MP), and the one or more NF entities are deployed in the first entity and the network management entity (OSS) is deployed in the second entity, or the one or more NF entities are deployed in the second entity and the network management entity (OSS) is deployed in the first entity.

According to a further implementation form of the first aspect, the controlling entity (CA_NF) is configured to block, for a period of time, a transmission of any generated context towards the one or more NF entities upon receiving a notification message from the network management entity (OSS), wherein the notification message is generated by the network management entity (OSS) once the network management entity (OSS) decides to enforce the change upon receiving the generated context from the controlling entity (CA_NF), and wherein the period of time, during which the transmission is blocked, is greater than or equal to a time required for the network management entity (OSS) to enforce the change. The above object is also solved in accordance with a second aspect.

According to the second aspect, the invention relates to a network management entity (OSS) as specified in the first aspect and/or in any one of the implementation forms of the first aspect.

According to a further implementation form of the second aspect, the network management entity (OSS) is configured to be extended with functionalities as to obtain an extended network management entity (CA_OSSExt), the functionalities allowing the network management entity (OSS) to communicate with a controlling entity (CA_NF) as claimed in the first aspect and/or in any one of the implementation forms of the first aspect. Further, the extended network management entity (CA_OSSExt) is configured to send the information that is relevant to generate the context towards the controlling entity (CA_NF), and configured to receive, when the network management entity (OSS) is impacted by the generated context, the context-related information from the controlling entity (CA_NF).

According to a further implementation form of the second aspect, the extended network management entity (CA_OSSExt) communicates with the controlling entity (CA_NF) through a communication with a coordination entity (CA_CF).

According to a further implementation form of the second aspect, the extended network management entity (CA_OSSExt) communicates with the coordination entity (CA_CF) using a third interface (lf-CAC_OSS).

According to a further implementation form of the second aspect, the extended network management entity (CA_OSSExt) is configured to block, for a period of time, any change at the network management entity (OSS) upon receiving, from the controlling entity (CA_NF), a notification message as specified in an implementation form of the first aspect. Further, the period of time, during which any change is blocked, is greater than or equal to a time required for the one or more NF entities being impacted by the generated context to enforce the change.

The above object is also solved in accordance with a third aspect.

According to the third aspect, the invention relates to a network function (NF) entity as specified in the preceding aspects and/or in any implementation forms of the preceding aspects.

According to a further implementation form of the third aspect, the network function (NF) entity is configured to be extended with functionalities as to obtain an extended NF entity (CA_NFExt), the functionalities allowing the NF entity to communicate with the controlling entity (CA_NF). Further, the extended NF entity (CA_NFExt) is configured to send the information that is relevant to generate the context towards the controlling entity (CA_NF), and configured to receive, when the NF entity is impacted by the generated context, the context-related information from the controlling entity (CA_NF).

The above object is also solved in accordance with a fourth aspect.

According to the fourth aspect, the invention relates to a coordination entity (CA_CF) as specified in implementation forms of the second aspect.

The above object is also solved in accordance with a fifth aspect.

According to the fifth aspect, the invention relates to a mobile core network (MCN) supporting E2E network slicing. The mobile core network (MCN) comprises a controlling entity (CA_NF) as claimed in the first aspect and/or in any one of the implementation forms of the first aspect, a network management entity (OSS) as claimed in the second aspect and/or in any one of the implementation forms of the second aspect, one or more network function (NF) entities as individually claimed in the third aspect and/or in any one of the implementation forms of the third aspect, and a coordination entity (CA_CF) as claimed in the fourth aspect.

According to a further implementation form of the fifth aspect, the network management entity (OSS) and the coordination entity (CA-CF) are implemented into a management plane (MP), and the controlling entity (CA_NF) and the one or more NF entities are implemented in a control plane (CP) and/or a user plane (UP), wherein the CP and the MP are respectively one amongst the first entity (CP, MP) and the second entity (MP, CP) as specified in an implementation form of the first aspect.

According to a further implementation form of the fifth aspect, the mobile core network (MCN) is configured to have a network function virtualization (NFV) framework.

According to a further implementation form of the fifth aspect, the one or more network function (NF) entities and the network management entity (OSS) are part of the NFV framework, and the controlling entity (CA_NF) and the coordination entity (CA_CF) are standalone entities.

According to a further implementation form of the fifth aspect, the controlling entity (CA_NF), the one or more network function (NF) entities, the network management entity (OSS) and the coordination entity (CA_CF) are part of the NFV framework.

The above object is also solved in accordance with a sixth aspect. According to the sixth aspect, the invention relates to a method for communicating with a network management entity (OSS) and one or more network function (NF) entities. The method comprises the step of receiving, at the controlling entity (CA_NF), information from the one or more NF entities and from the network management entity (OSS), the received information being relevant to generate a context, the step of generating, at the controlling entity (CA_NF), the context based on the received information, and, based on the generated context, the step of sending, from the controlling entity (CA_NF), context-related information towards any entity that is impacted by the generated context amongst the one or more NF entities and the network management entity (OSS).

According to a further implementation form of the sixth aspect, the method comprises the step of blocking, at the controlling entity (CA_NF) and for a period of time, a transmission of any generated context towards the one or more NF entities upon receiving a notification message from the network management entity (OSS). Further, the notification message is generated by the network management entity (OSS) once the network management entity (OSS) decides to enforce a change upon receiving the generated context derived from the context-related information, and the period of time, during which the transmission is blocked, is greater than or equal to a time required for the network management entity (OSS) to enforce the change.

The above object is also solved in accordance with a seventh aspect.

According to the seventh aspect, the invention relates to a method for communicating with a controlling entity (CA_NF) and one or more network function (NF) entities. The method comprises the step of sending, from the network management entity (OSS), information towards the controlling entity (CA_NF), the sent information being relevant to generate a context at the controlling entity (CA_NF), and, based on the generated context, the step of receiving, at the network management entity (OSS) and from the controlling entity (CA_NF), context-related information when the network management entity (OSS) is impacted by the generated context.

According to a further implementation form of the seventh aspect, the method comprises the step of blocking, for a period of time, any change at the network management entity (OSS) upon receiving, at the network management entity (OSS) and from the controlling entity (CA_NF), a notification message about a type of the generated context. Further, the one or more NF entities are impacted by the generated context by being susceptible to enforce the change, the network management entity (OSS) is impacted by the generated context by being susceptible to be influenced by the enforced change, and the period of time, during which any change at the network management entity (OSS) is blocked, is greater than or equal to a time required for the one or more NF entities being impacted by the generated context to enforce the change. The above object is also solved in accordance with an eighth aspect.

According to the eighth aspect, the invention relates to a computer program comprising a program code for performing the method according to the sixth aspect and/or any one of the implementation forms of the sixth aspect and/or the seventh aspect and/or any one of the implementation forms of the seventh aspect, when executed on a computer.

Thereby, the method can be performed in an automatic and repeatable manner. The computer program can be performed by the above apparatuses.

More specifically, it should be noted that all the above apparatuses may be implemented based on a discrete hardware circuitry with discrete hardware components, integrated chips or arrangements of chip modules, or based on a signal processing device or chip controlled by a software routine or program stored in a memory, written on a computer-readable medium or downloaded from a network such as the Internet.

It shall further be understood that a preferred embodiment of the invention can also be any combination of the dependent claims or above embodiments with the respective independent claim.

These and other aspects of the invention will be apparent and elucidated with reference to the embodiments described hereinafter.

BRIEF DESCRIPTION OF THE DRAWINGS

In the following detailed portion of the present disclosure, the invention will be explained in more detail with reference to the exemplary embodiments shown in the drawings, in which:

Fig. 1 shows a typical end-to-end (E2E) slicing architecture 100 in a simplified version;

Fig. 2 shows an enhanced end-to-end (E2E) slicing architecture 200 with functionality

extensions and communication interfaces, according to an embodiment of the present invention;

Fig. 3 shows a first sequence of steps (numbered from 1 to 4) about the manner the specific function entities (CA_NF, CA_OSSExt, CA_CF, CA_NFExt) of the enhanced end-to-end

(E2E) slicing architecture 200 may communicate between themselves while handling any type of generated context, according to an embodiment of the present invention;

Fig. 4 shows a second sequence of steps (numbered 5) about the manner the specific function entities (CA_NF, CA_OSSExt, CA_CF, CA_NFExt) of the enhanced end-to-end (E2E) slicing architecture 200 may communicate between themselves while handling a "CP only" type of generated context, according to an embodiment of the present invention;

Fig. 5 shows a third sequence of steps (numbered from 5 to 8) a bout the manner the specific function entities (CA_NF, CA_OSSExt, CA_CF, CA_NFExt) of the enhanced end-to-end (E2E) slicing architecture 200 may communicate between themselves while handling a "CP-MP" type of generated context, according to an embodiment of the present invention;

Fig. 6 shows a fourth sequence of steps (numbered from 5 to 10) about the manner the

specific function entities (CA_NF, CA_OSSExt, CA_CF, CA_NFExt) of the enhanced end-to- end (E2E) slicing architecture 200 may communicate between themselves while handling a "MP-CP" type of generated context, according to an embodiment of the present invention;

Fig. 7 shows an enhanced end-to-end (E2E) slicing architecture 300 based on the enhanced end-to-end (E2E) slicing architecture 200 and a 3GPP control plane (CP) architecture, according to an embodiment of the present invention;

Fig. 8 shows an enhanced ETSI NFV MANO architecture 400, according to an embodiment of the present invention; and

Fig. 9 shows an enhanced ETSI NFV MANO architecture 500, according to an embodiment of the present invention.

Identical reference signs are used for identical or at least functionally equivalent features.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

A network slice may be defined as a set of functions that are bundled together for providing a specific mobile network service. A network slice may comprise an access network (AN), a transport network (TN) and a core network (CN), while the CN may in turn comprise user plane (UP) and control plane (CP) functions. The UP function (UPF) concept used in this invention refers to the network functions (NFs) or network function (NF) entities that are used in the CN in order to process the UP traffic and thereby provide certain network services. An example of UPF may be a mobility anchoring function. Moreover, the CP function (CPF) concept used in this invention refers to the NFs or NF entities that are used in the CN in order to perform the CPFs for a terminal (e.g., a user equipment (UE)) while it is connected to the mobile CN. Fig. 1 shows a typical end-to-end (E2E) slicing architecture 100 in a simplified version. An E2E slicing architecture may define the entities that are involved in the operation and management of a network slice instance (NSI). As divulged in the technical report entitled: 3GPP T 28.801, "Study on management and orchestration of network slicing for next generation network", a NSI may be defined as "a set of network functions and the resources for these network functions which are arranged and configured, forming a complete logical network to meet certain network

characteristics". A more detailed view of such a NSI may, for example, be found in the white paper entitled: "5G Service-guaranteed network slicing" and released at the mobile world congress 2017 (MWC 2017) in Barcelona.

On the left side of Fig. 1, the NSI is depicted with its network function (NF) entities deployed in the control plane (CP) and the user plane (UP), as well as its resources located in the access network (AN), the transport network (TN) and the core network (CN). On the right side of Fig. 1, the management plane (MP) is depicted with its entities and functions related to the management of a network slice, its resources, network entities and network function (NF) entities. As illustrated, the MP entities may be the business support system (BSS), the operations support systems (OSS) as a network management entity, and the slice management system (SMS). The BSS may be responsible for a high-level management in the business layer, while the network management entity (OSS) may remain with the task of managing the entities of the network and the SMS may be responsible for managing the entities (AN, TN, CN) associated with the NSI. Data center resources, which host third party applications and/or network functions, may also be included in such an E2E slicing architecture.

In the following, the proposed invention will be illustrated based on a 5G framework supporting network slicing (NS). However, it should be noted that the present invention can also be applied to any earlier generation systems not featuring NS or to any future systems not supporting NS.

As depicted in the enhanced end-to-end (E2E) slicing architecture 200 of Fig. 2, the typical end-to- end (E2E) slicing architecture 100 of Fig. 1 has been extended with specific function entities (CA_NF, CA_OSSExt, CA_CF, CA_NFExt) and interfaces (lf-CA_NF, lf-CA_MP, lf-CAC_OSS) needed to enable a context-awareness mechanism to close a decision-making loop between the CP and MP entities.

Amongst the specific function entities, a controlling entity (CA_NF), also named a context awareness network function entity (CA_NF), may be configured to communicate in both directions with the network management entity (OSS) through the slice management system (SMS), and also configured to communicate in both directions with one or more network function (NF) entities of the NSI. In particular, the controlling entity (CA_NF) may be configured to receive information relevant to generate a context from the one or more NF entities using a respective dedicated interface (If- CA_NF) and from the network management entity (OSS) using a dedicated interface (lf-CA_MP). It may further be configured to generate the context based on the received information, and, based on the generated context, it may also be configured to send context-related information (e.g., the generated context or a notification message according to whether a change is to be enforced or is already enforced, respectively) towards any entity that is impacted by the generated context amongst the one or more NF entities and the network management entity (OSS).

As regards the context-related information, it may be sent towards the network management entity (OSS) using the dedicated interface (lf-CA_MP) when the network management entity (OSS) is impacted by the generated context, and it may also be sent towards one amongst the one or more NF entities using the respective dedicated interface (lf-CA_NF) when the one amongst the one or more NF entities is impacted by the generated context. Furthermore, the context-related information may comprise the generated context when the entity that is impacted by the generated context is an entity susceptible to enforce a change upon receiving the generated context.

On the other hand, the context-related information may comprise a notification message about a type of the generated context when the entity that is impacted by the generated context is an entity susceptible to be influenced by the enforced change. In an embodiment, the type of the generated context may have a format giving an indication about only a first entity (e.g., the CP or the MP) comprising the entity that is susceptible to enforce the change. Referring to this embodiment, the format of the type of the generated context may be described as a tuple (<first entity>), also simply denoted by the term "first entity only", where the first entity is the entity that enforces a certain change in its plane. In another embodiment, the type of the generated context may have a format giving an indication about said first entity (e.g., the CP or the MP) together with a second entity (e.g., the MP if the first entity is the CP or the CP if the first entity is the MP), which is other than the first entity (CP, M P) and comprises the entity that is susceptible to be influenced by the enforced change. Referring to this other embodiment, the format of the type of the generated context may be described as a tuple (<first entity>, <second entity>), also simply denoted by the term "first entity- second entity", where the first entity is the entity that enforces a certain change in its plane and the second entity is the entity that might be influenced by the consequences of the enforced change by probably perceiving the effects of the change in its plane.

In a non-limiting enumeration, the type of the generated context may, for example, be described as "CP only", "CP-MP" or "MP-CP" amongst others. Thus, the type of context denoted by "CP only" will be related to changes to be enforced in the CP with minimal or no effect in the MP, and, in that case, no notification message will be sent. As regards the type of context denoted by "CP-MP", it will be related to changes in the CP that will probably affect the M P, and in that case, a notification message will be sent towards the specific function entities of the MP. For example, if the CP changes the gateway from the users, then the MP will see a traffic reduction in a part of the network and an increase in traffic in another part. As regards the type of context denoted by "MP-CP", it will be related to changes in the MP that will probably affect the CP, and a notification message will be sent towards the specific function entities of the CP.

In an embodiment, the one or more NF entities may be deployed in the first entity (CP, M P) and the network management entity (OSS) may be deployed in the second entity (MP, CP), and in another embodiment, the one or more NF entities may be deployed in the second entity (MP, CP) and the network management entity (OSS) may be deployed in the first entity (CP, MP).

In addition, the controlling entity (CA_NF) may be configured to block, for a period of time, a transmission of any generated context towards the one or more NF entities upon receiving a notification message from the network management entity (OSS). The notification message may be generated by the network management entity (OSS) once the network management entity (OSS) decides to enforce the change upon receiving the generated context from the controlling entity (CA_NF), and the period of time, during which the transmission is blocked, shall be greater than or equal to a time required for the network management entity (OSS) to enforce the change.

The network management entity (OSS) may be configured to be extended with functionalities as to obtain an extended network management entity (CA_OSSExt), also named an extended context awareness operations support system (CA_OSSExt), these functionalities allowing the network management entity (OSS) to communicate with the controlling entity (CA_NF). In particular, the extended network management entity (CA_OSSExt) may be configured to send the information that is relevant to generate the context towards the controlling entity (CA_NF), and also configured to receive, when the network management entity (OSS) is impacted by the generated context, the context-related information from the controlling entity (CA_NF).

The extended network management entity (CA_OSSExt) may communicate with the controlling entity (CA_NF) through a communication with a coordination entity (CA_CF, also denoted by CA Coordinator), also named context awareness coordination function entity (CA_CF, CA Coordinator). On the other hand, the extended network management entity (CA_OSSExt) may communicate with the coordination entity (CA_CF, CA Coordinator) using a dedicated interface (lf-CAC_OSS). The extended network management entity (CA_OSSExt) may be further configured to block, for a period of time, any change at the network management entity (OSS) upon receiving the notification message from the controlling entity (CA_NF), and the period of time, during which any change is blocked, shall be greater than or equal to a time required for the one or more NF entities being impacted by the generated context to enforce the change.

As regards the network function (NF) entity, it may be configured to be extended with functionalities as to obtain an extended NF entity (CA_NFExt), these functionalities allowing the NF entity to communicate with the controlling entity (CA_NF). For its part, the extended NF entity (CA_NFExt) may be configured to send the information that is relevant to generate the context towards the controlling entity (CA_NF), and it may also be configured to receive, when the NF entity is impacted by the generated context, the context-related information from the controlling entity (CA_NF).

As can be seen in Fig. 2, the network management entity (OSS) and the coordination entity (CA_CF) may be implemented into the management plane (MP), while the controlling entity (CA_NF) and the one or more NF entities may be implemented in the control plane (CP) and/or the user plane (UP).

In the following, the drawings of Figs. 3 to 6 illustrate a sequence of steps about the manner the specific function entities (CA_NF, CA_OSSExt, CA_CF, CA_NFExt) of the enhanced end-to-end (E2E) slicing architecture 200 may communicate between themselves using the specific interfaces (If- CA_NF, lf-CA_MP, lf-CAC_OSS) while handling the different types of context that can be generated.

Fig. 3 shows a first sequence of steps (depicted by the numbers "1", "2", "3" and "4", respectively) applicable to any type of generated context, according to an embodiment of the present invention.

In the step 1, the information, which is monitored from different sources (e.g., CP NF entities for the NF entities deployed in the CP and/or UP NF entities for the NF entities deployed in the UP) of the NSI and is relevant to generate a context, is respectively sent towards the controlling entity (CA_NF) via each respective lf-CA_NF interface.

In the step 2, the information, which is monitored by the network management entity (OSS) and is relevant to generate the context, is sent from the extended network management entity

(CA_OSSExt) towards the coordination entity (CA_CF, CA coordinator) of the SMS via the lf-CAC_OSS interface.

In the step 3, the coordination entity (CA_CF, CA coordinator) acts as a relay of the monitored information received from the extended network management entity (CA_OSSExt) or optionally received directly from the SMS, and sends this monitored information towards the controlling entity (CA_NF) via the lf-CA_MP interface. In the step 4, the controlling entity (CA_NF) generates a context-related information based on the monitored information and in any context model as defined above by the tuples (<first entity>) and/or (<first entity>, <second entity>).

It should be noted that the steps 1 and 3 may occur at the same time and not sequentially. Indeed, the illustration shows the propagation of the information as sequential steps only for explanation purposes, so that it should be understood that the enumeration of the steps does not necessarily represent a temporal execution order.

Fig. 4 shows a second sequence of steps (depicted by the number "5") applicable to a "CP only" type of generated context, according to an embodiment of the present invention.

In the step 5, the controlling entity (CA_NF) sends the generated context towards a NF entity (e.g., the CP NF entity as depicted in Fig. 4) that is registered to receive it. Then, based on the generated context, the NF entity will eventually make changes, for example, in order to optimize, among others, CP procedures (e.g., concerning mobility management, device location and reachability, session management, authentication and authorization, etc.), access and core resources utilization (e.g., radio resources, transport resources, etc.), and selection and utilization of UPFs.

Fig. 5 shows a third sequence of steps (depicted by the numbers "5", "6", "7" and "8") applicable to a "CP-MP" type of generated context, according to an embodiment of the present invention.

In the step 5, the controlling entity (CA_NF) sends the generated context towards a NF entity (e.g., the CP NF entity as depicted in Fig. 5) that is registered to receive it.

In the step 6, the controlling entity (CA_NF) also sends a notification message about the specific type (i.e., CP-MP in the present case) of the generated context towards the coordination entity (CA_CF, CA coordinator).

In the step 7, upon receiving the notification message from the controlling entity (CA_NF), the coordination entity (CA_CF, CA coordinator) relays such a notification message towards the extended network management entity (CA_OSSExt).

In the step 8, based on the received notification message, the extended network management entity (CA_OSSExt) will trigger or enforce the mechanisms at the network management entity (OSS) in order to block, therein and for a period of time, any change related to the notified context, the period of time being greater than or equal to a time required for the one or more NF entities concerned by the generated context to enforce the change. It should be noted that the steps 5 and 6 may occur at the same time and not sequentially. Indeed, the illustration shows the propagation of the generated context as sequential steps only for explanation purposes, so that it should be understood that the enumeration of the steps does not necessarily represent a temporal execution order.

Fig. 6 shows a fourth sequence of steps (depicted by the numbers "5", "6", "7", "8", "9" and "10") applicable to a "MP-CP" type of generated context, according to an embodiment of the present invention.

In the step 5, the controlling entity (CA_NF) sends the generated context towards the coordination entity (CA_CF, CA coordinator).

In the step 6, the coordination entity (CA_CF, CA coordinator) receives a "MP-CP" type of generated context and forwards it towards the extended network management entity (CA_OSSExt), which in turns delivers the generated context towards the network management entity (OSS).

In the step 7, if the network management entity (OSS) decides, based on the receipt of the generated context, to trigger or enforce a change on the operation of the entities of the NSI, then the network management entity (OSS) notifies the extended network management entity (CA_OSSExt).

In the step 8, the extended network management entity (CA_OSSExt) notifies the coordination entity (CA_CF, CA coordinator) that a change, from the MP perspective, may be enforced by the network management entity (OSS) of the MP in entities of the NSI associated with the received context.

In the step 9, upon receiving, from the extended network management entity (CA_OSSExt), the notification message about the change to be enforced, the coordination entity (CA_CF, CA coordinator) forwards this notification message towards the controlling entity (CA_NF).

In the step 10, upon receiving, from the coordination entity (CA_CF, CA coordinator), the notification message about the change to be enforced, the controlling entity (CA_NF) blocks, for a period of time that is greater than or equal to a time required for the network management entity (OSS) to enforce the change, the generation of any context and/or the transmission of any generated context towards the NF entities of the NSI in order to avoid that both MP and CP/UP perform simultaneous changes in the NSI.

It should be noted that the enhanced end-to-end (E2E) slicing architecture 200 may be supported by a mobile core network (MCN) comprising at least the controlling entity (CA_NF), the network management entity (OSS), the one or more NF entities and the coordination entity (CA_CF). In an exemplary and non-limiting implementation of the specific function entities and interfaces of the present invention, Fig. 7 shows an enhanced end-to-end (E2E) slicing architecture 300 based on the enhanced end-to-end (E2E) slicing architecture 200 and the 3GPP control plane (CP) architecture from 3GPP TS 23.501, according to an embodiment of the present invention.

The left side of Fig. 7 shows the main NF entities (NEF, N F, PCF, UDM, AF, AUSF, AMF, SMF) deployed in the CP, their service-based interfaces (Nnef, Nnrf, Npcf, Nudm, Naf, Nausf, Namf, Nsmf) and the interfaces (Nl, N2, N3, N4, N6) between the core network (CN) and the UP, as defined in 3GPP TS 23.501, into which the specific function entities (CA_NF, CA_NFExt) and interfaces (lf-CA_NF, lf-CA_MP) of the enhanced end-to-end (E2E) slicing architecture 200 have been implemented. The right side of Fig. 7 shows the specific function entities of the MP (CA_OSSExt, CA_CF) and the specific interface (lf-CAC_OSS) of the enhanced end-to-end (E2E) slicing architecture 200.

In line with 3GPP TS 23.501, the implemented lf-CA_NF interface may be defined as a service-based interface. Via such an interface, any NF entity can invoke the services (i.e., the functionalities) provided by the controlling entity (CA_NF). In addition, some existing NF entities from the 3GPP TS 23.501 technical specification have been functionally extended as to become extended 3GPP NF entities that can operate using the context as generated by the controlling entity (CA_NF) in the present invention. Amongst the extended 3GPP NF entities as depicted in Fig. 7, the following ones can be listed in a non-limiting enumeration:

- NEF (network exposure function): functionally extended to be a ble to receive and expose the generated contexts to any other NF entity or external applications to the CN;

- PCF (policy control function): functionally extended to send information to CA_NF and consume the contexts generated by the controlling entity (CA_NF), so that the PCF can optimize the policies to be applied;

- AF (application function): functionally extended to allow applications to send information towards the controlling entity (CA_NF) and to consume the contexts generated by the controlling entity (CA_NF) with the aim of making decisions about whether or not to improve the performance of the application operation;

- AMF (access and mobility management function): functionally extended to send information and to consume the contexts generated by the controlling entity (CA_NF) with the aim of optimizing the AN operation and mobility support; and - SMF (session management function): functionally extended to send information and to consume the contexts generated by the controlling entity (CA_NF) with the aim of optimizing the management of ongoing sessions as well the establishment of new sessions.

It should however be noted that other existing NF entities, found in the 3GPP TS 23.501 technical specification and not depicted in Fig. 7, may also be functionally extended as to become extended 3GPP NF entities that can operate using the context as generated by the controlling entity (CA_NF) in the present invention.

The other specific function entities (CA_CF, CA_OSSExt) and interfaces (lf-CA_MP, lf-CAC_OSS) defined in the present invention are embedded into the MP of the enhanced end-to-end (E2E) slicing architecture 300, wherein the IF-CA_MP interface connects the CA_NF entity at the CP to the CA_CF entity at the MP.

In comparison with the enhanced end-to-end (E2E) slicing architecture 200, a virtual network function (VNF) entity in a management and orchestration (MANO) framework will be assumed to be equivalent to a NF entity of the NSI. However, no NSI is depicted in Fig. 8. Moreover, the SMS is not fully covered by the MANO framework, which only considers the existence of the OSS/BSS, and the MANO framework itself cannot be equivalent to the SMS. However, it comprises some of the functionalities that must be provided by a SMS when it comes to managing the NF entities, i.e., the VNF entities.

In an exemplary and non-limiting implementation of the specific function entities and interfaces of the present invention, Fig. 8 shows an enhanced European telecommunications standards institute (ETSI) network functions virtualization (NFV) MANO architecture 400, according to an embodiment of the present invention. The enhanced ETSI NFV MANO architecture 400 is based on the NFV-MANO functional blocks and reference points as illustrated in Fig. 4.1.1 of the group specification (GS) entitled: ETSI GS NFV-IFA 009 vl.1.1 (2016-07). Therein, definitions and details, applicable to its functional blocks, reference points and interfaces as also illustrated in Fig. 8, are disclosed.

In the embodiment of Fig. 8, the CA_NF entity is a standalone NF entity, i.e., it is not deployed as a VNF entity by the MANO framework for a given NSI. This means that the VNF entities deployed and managed by the MANO framework are the NF entities of the CP and UP. Each VNF entity is then functionally extended as to obtain a respective CA_NFExt entity as proposed in the present invention. In addition, the coordination entity (CA_CF) is not under the control or management of the MANO framework itself. It is also a standalone entity. The mapping of the interfaces proposed in this embodiment of the present invention is straightforward. The VNF entity with the CA_NFExt entity is connected to the CA_NF entity via the if-CA_NF interface. The CA_NF entity and the coordination entity (CA_CF) are connected to each other via the lf-CA_MP interface. The OSS is functionally extended as to obtain the CA_OSSExt entity, which is connected to the coordination entity (CA_CF) via the lf-CAC_OSS interface.

In another exemplary and non-limiting implementation of the specific function entities and interfaces of the present invention, Fig. 9 shows an enhanced ETSI NFV MANO architecture 500, according to an embodiment of the present invention. The enhanced ETSI NFV MANO architecture 500 is based on the NFV-MANO functional blocks and reference points as illustrated in Fig. 4.1.1 of the GS document entitled: ETSI GS NFV-IFA 009 vl.1.1 (2016-07). Therein, definitions and details, applicable to its functional blocks, reference points and interfaces as also illustrated in Fig. 9, are disclosed.

In this other embodiment of Fig. 9, the specific function entities and interfaces defined in the present invention are tightly integrated with the MANO framework. Some of the functionalities of these specific function entities and interfaces need to be split into different parts of the MANO framework. For example, the functionalities of the coordination entity (CA_CF) need to be split into the NFV orchestrator (NFVO) and at the VNF manager (VNFM). In this case, the NFVO can be extended with all key functionalities of the coordination entity (CA_CF), while the VNFM can be extended in order to serve as a relay for the coordination entity (CA_CF), which is embedded into the NFVO to allow messages from the CP of the CN to reach the coordination entity (CA_CF).

Another aspect of this embodiment of Fig. 9 is that a CA_NF entity can be considered as a VNF entity that is deployed and managed by the MANO framework. In this case, the functionalities of the CA_NF entity are split between the element manager (EM) of the MANO framework and the VNF entity, which is the CA_NF entity itself. Moreover, neither the CA_NFExt entity nor the lf-CA_NF interface are depicted in Fig. 9, whereas they are depicted in Fig. 8 and are connected to the CA_NF entity. The other specific interfaces (lf-CA_MP, lf-CAC_OSS) defined in the present invention can be

implemented as extensions of existing interfaces in the MANO framework. In particular, the Ve- Vnfm-em interface from the MANO framework can be extended with the functionalities of the If- CA_MP interface. In addition, the Or-Vnfm interface from the MANO framework can be extended with the capabilities of both lf-CA_MP and lf-CAC_OSS interfaces because the VNFM entity of the MANO framework can also behave as a relay of the coordination entity (CA_CF). Moreover, the Or- Ma-nfvo interface from the MANO framework can be extended with the capabilities of the If- CAC OSS interface. In summary, the present invention relates to a MCN supporting E2E network slicing, which comprises a controlling entity (CA_NF), one or more NF entities extended with functionalities (CA-NFExt), a network management entity (OSS) extended with functionalities (CA_OSSExt) and a coordination entity (CA_CF). The CA_NF communicates with the CA_OSSExt through the CA_CF using first (If- CA_MP) and third interfaces (lf-CAC_OSS), and with the one or more extended NF entities (CA-NFExt) using a respective second interface (lf-CA_NF) and/or other NFs interfaces. Based on information received from the OSS and the one or more NF entities, the CA_NF generates a context with a certain type, sends, based on the generated context, context-related information towards any entity that is impacted by the generated context amongst the one or more NF entities and the OSS, and blocks, for a period of time, a transmission of any generated context towards the one or more NF entities upon receiving, from the OSS, a notification message once the OSS decides to enforce a change upon receiving the generated context from the CA_NF. On the other hand, the extended network management entity (CA_OSSExt) blocks, for a period of time, any change at the network

management entity (OSS) upon receiving a notification message from the controlling entity (CA_NF).

Furthermore, by closing the decision-making loop between the CP and MP entities using context awareness thanks to an inter-communication between controlling entity (CA_NF) and network management entity (OSS), the present invention has, in a non-limiting enumeration, the following benefits:

- to enable information about the status of entities of the system kept in the MP to be considered in the decision-making of the NF entities deployed in the CP;

- to reduce the occurrence of unnecessary or multiple changes at the MP and the CP for solving a situation involving related entities or entities in the same geographical region. For instance, the present invention may reduce the occurrence of performing a gateway relocation at the CP and simultaneously changing the infrastructure resources associated with the same gateway involved in the relocation at the CP; and

- to have the potential to reduce the need for long-term capacity planning and pre-provisioning of infrastructure resources in order to guarantee the expected performance of mobile network services. For example, in 4G, quality of service (QoS) class identifier (QCI) has a budget of delay that is expected to be provisioned at the infrastructure by the M P. This means that it is first necessary to understand what the characteristics of the mobile traffic are, prior to dimensioning and pre- provisioning the network up front for such demand. With respect to 4G, the present invention has the potential to make the adjustments more dynamically, thereby reducing the possibility for over provisioning. While the present invention has been illustrated and described in detail in the drawings and the foregoing description, such illustration and description are to be considered illustrative or exemplary and not restrictive. The invention is not limited to the disclosed embodiments. From reading the present disclosure, other modifications will be apparent to a person skilled in the art. Such modifications may involve other features, which are already known in the art and may be used instead of or in addition to features already described herein.

The invention has been described in conjunction with various embodiments herein. However, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed invention, from a study of the drawings, the disclosure and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the indefinite article "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage. A computer program may be stored/distributed on a suitable medium, such as an optical storage medium or a solid-state medium supplied together with or as part of other hardware, but may also be distributed in other forms, such as via the Internet or other wired or wireless telecommunication systems.

Although the present invention has been described with reference to specific features and embodiments thereof, it is evident that various modifications and combinations can be made thereto without departing from the spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded simply as an illustration of the invention as defined by the appended claims, and are contemplated to cover any and all modifications, variations, combinations or equivalents that fall within the scope of the present invention.