Method and system for configuration protection group
A technology of protection group and configuration device, applied in the field of communication, can solve the problem of complicated operation of configuring protection group, and achieve the effect of simplifying the configuration operation of protection group
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0021] Hereinafter, the present invention will be described in detail with reference to the drawings and in conjunction with the embodiments. It should be noted that the embodiments in this application and the features in the embodiments can be combined with each other if there is no conflict.
[0022] image 3 It is a flowchart of a method for configuring a protection group according to an embodiment of the present invention. Such as image 3 As shown, the method of configuring the protection group mainly includes the following processing:
[0023] Step S302: When the call control device of the source node learns that it is currently in the client-side protection configuration mode through query, it requests the protection group configuration device of the source node to configure the protection group;
[0024] Step S304: The call control device of the source node sends a call creation request to the call control device of the destination node, where the call creation request carri...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap