白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Methods for delivering network slices to a user

專利號
US11997535B2
公開日期
2024-05-28
申請人
T-Mobile Innovations LLC(US KS Overland Park)
發(fā)明人
Lyle W. Paczkowski; William M. Parsel
IPC分類
H04W28/06
技術(shù)領(lǐng)域
slice,network,artifact,114a,ue,segment,may,slices,filename,106a
地域: KS KS Overland Park

摘要

A method for delivering a network slice to a user is disclosed. The method includes receiving communication from a network slice artifact comprising a multi-segment filename that includes a first segment comprising instructions for executing the network slice artifact, and a second segment comprising an identity of a network slice instantiable by the network slice artifact. The method also includes retrieving a set of executable instructions associated with the network slice from a data store of the network in response to receiving the communication from the network slice artifact, and communicating the set of executable instructions to the network slice artifact whereby the network slice artifact instantiates the network slice transforming the computer system into an endpoint node of the network slice. The method further includes completing the instantiation of the network slice in response to receiving the communication from the network slice artifact.

說明書

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims priority under 35 U.S.C. § 120 to U.S. patent application Ser. No. 17/676,223, filed on Feb. 21, 2022, entitled “Methods for Delivering Network Slices to a User,” by Lyle W. Paczkowski, et al., which is a continuation of and claims priority under 35 U.S.C. § 120 to U.S. patent application Ser. No. 17/081,828, filed on Oct. 27, 2020, entitled “Methods for Delivering Network Slices to a User,” by Lyle W. Paczkowski, et al., now U.S. Pat. No. 11,317,321 issued Apr. 26, 2022, all of which are incorporated herein by reference in their entirety for all purposes.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

Not applicable.

REFERENCE TO A MICROFICHE APPENDIX

Not applicable.

BACKGROUND

Network slices provide a dedicated communication network for use by a user, such as an enterprise, organization, or individual, where the dedicated communication network may be delivered as a virtual resource to the user. From the point of view of the user, the network slice may behave as if it were a separate network infrastructure, but the network slice may be delivered by virtualized computing resources provided by a common physical communication and computing infrastructure. Network slices of some networks, such as 5G networks, may have a lifecycle including multiple distinct phases, including preparation, instantiation, run-time, and decommissioning. At least some of the lifecycle phases of the network slice, including preparation, instantiation, and decommissioning, may be performed by a carrier or provider of the network.

SUMMARY

權(quán)利要求

1
What is claimed is:1. A method for delivering a network slice to a user, comprising:receiving by a network a communication from a network slice artifact executing on a computer system, wherein the network slice artifact comprises a file including a multi-segment filename with a segment of the multi-segment filename comprising an identity of a network slice, and wherein the communication comprises the identity of the network slice;comparing by a network function of the network the identity of the network slice communicated from the network slice artifact with a set of executable instructions associated with the network slice;retrieving the set of executable instructions by the network function from a data store of the network in response to matching the identity of the network slice with the set of executable instructions;communicating the set of executable instructions by the network function to the network slice artifact, wherein the network slice artifact instantiates the network slice transforming the computer system into an endpoint node of the network slice;receiving by the network a second communication from the network slice artifact;deactivating the network slice by a second network function in response to receiving the second communication, wherein at least some network resources allocated to the network slice upon instantiation are released;receiving by the network a third communication from the network slice artifact; andcompleting a re-instantiation of the network slice by the second network function in response to receiving the third communication.2. The method of claim 1, further comprising storing the set of executable instructions on the network by the network function prior to receiving the communication from the network slice artifact.3. The method of claim 2, wherein the set of executable instructions are stored in a distributed ledger.4. The method of claim 1, wherein the multi-segment filename provides for two way authentication before the network slice associated with the network artifact is instantiated.5. The method of claim 1, wherein the multi-segment filename further comprises a segment comprising instructions for executing the network slice artifact and a segment comprising a hash of the binary code associated with the set of executable instructions.6. The method of claim 1, further comprising:receiving by the network a fourth communication from a second network slice artifact executing on the computer system, wherein the second network slice artifact comprises a file including a multi-segment filename with a segment of the multi-segment filename comprising an identity of a second network slice, and wherein the second communication comprises the identity of the second network slice;comparing by the network function the identity of the second network slice communicated from the second network slice artifact with a second set of executable instructions associated with the second network slice;retrieving the second set of executable instructions by the network function from the data store in response to matching the identity of the second network slice with the second set of executable instructions; andcommunicating the second set of executable instructions by the network function to the second network slice artifact, wherein the second network slice artifact instantiates the second network slice transforming the computer system into an endpoint node of the second network slice.7. The method of claim 6, wherein the network slice comprises one or more quality of service parameters, and wherein the second network slice comprises one or more different quality of service parameters than the network slice.8. The method of claim 6, wherein at least one of the network slice is selectably instantiated by a user of the computer system invoking the network slice artifact or the second network slice is selectably instantiated by the user invoking the second network slice artifact.9. The method of claim 8, wherein at least one of the network slice is selectably deactivated by the user invoking the network slice artifact or the second network slice is selectably deactivated by the user invoking the second network slice artifact.10. A system for delivering a network slice to a user, comprising:a server comprising a non-transitory memory and a processor; anda network function executed on the server that:compares an identity of a network slice communicated from a network slice artifact executing on a computer system with a set of executable instructions associated with the network slice, wherein the network slice artifact comprises a file including a multi-segment filename with a segment of the multi-segment filename comprising the identity of the network slice,retrieves the set of executable instructions from a data store in response to matching the identity of the network slice with the set of executable instructions, andcommunicates the set of executable instructions to the network slice artifact, wherein the network slice artifact instantiates the network slice transforming the computer system into an endpoint node of the network slice;a second server comprising a second non-transitory memory and a second processor; anda second network function executed on the second server that:deactivates the network slice in response to receiving a communication from the network slice artifact, wherein at least some network resources allocated to the network slice upon instantiation are released, andcompletes a re-instantiation of the network slice in response to receiving a second communication from the network slice artifact.11. The system of claim 10, wherein the network function further stores the set of executable instructions on a network prior to the identity of the network slice being received from the network slice artifact.12. The system of claim 11, wherein the set of executable instructions are stored in a distributed ledger.13. The system of claim 10, wherein the multi-segment filename provides for two way authentication before the network slice associated with the first network artifact is instantiated.14. The system of claim 10, wherein the multi-segment filename further comprises a segment comprising instructions for executing the network slice artifact and a segment comprising a hash of the binary code associated with the set of executable instructions.15. The system of claim 10, wherein the server and the second server comprise different virtual servers.16. The system of claim 10, wherein the network function further:compares an identity of a second network slice communicated from a second network slice artifact executing on the computer system with a second set of executable instructions associated with the second network slice, wherein the second network slice artifact comprises a file including a multi-segment filename with a segment of the multi-segment filename comprising the identity of the second network slice,retrieves the second set of executable instructions from the data store in response to matching the identity of the second network slice with the second set of executable instructions, andcommunicates the second set of executable instructions to the second network slice artifact, wherein the second network slice artifact instantiates the second network slice transforming the computer system into an endpoint node of the second network slice.17. The system of claim 16, wherein at least one of the network slice is selectably instantiated by a user of the computer system invoking the network slice artifact or the second network slice is selectably instantiated by the user invoking the second network slice artifact.18. The system of claim 17, wherein at least one of the network slice is selectably deactivated by the user invoking the network slice artifact or the second network slice is selectably deactivated by the user invoking the second network slice artifact.
微信群二維碼
意見反饋