Method and device for performing connectivity detection
A connectivity detection and purpose technology, applied in the communication field, can solve the problem of low reliability of the access network and achieve the effect of improving reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0131] Figure 2a A schematic flowchart of a method 200 for performing connectivity detection according to an embodiment of the present invention is shown. The method 200 can be used to detect connectivity between modules or units of a deconstructed network node.
[0132] S210, the first virtual proxy module obtains identification information, where the identification information is used to identify the VNF module set to which the first VNF module belongs.
[0133]In various embodiments of the present invention, the first virtual proxy module is a proxy node of a virtual node, such as a virtual node proxy (VAN proxy). The virtual node agent of the first virtual agent module may be an operation management and maintenance (Operation, Administration and Maintenance, OAM) or connectivity detection agent. The first virtual agent module virtual node agent and the virtual node can be a kind of OAM or connectivity detection protocol, such as bidirectional forwarding detection (Bid...
Embodiment 2
[0175] In the method provided by another embodiment of the present invention, if there is no VNF module corresponding to the first virtual agent module, the first virtual agent module directly sends a message to the second virtual agent module, through the The second virtual agent module performs connectivity detection on the VNF module corresponding to the second virtual agent module.
[0176] The method for performing connectivity detection provided by another embodiment of the present invention includes:
[0177] The first virtual agent module obtains identification information, and the identification information is used to identify the VNF module set to which the first VNF module belongs;
[0178] The first virtual agent module obtains the address information of the second virtual agent module according to the identification information and the VNF module list, and the VNF module list includes the identification information and the address information of the second virtu...
Embodiment 3
[0190] In the following, the case where the virtual node corresponds to the first virtual network, and the virtual node corresponds to the first virtual network and the second virtual network will be respectively described as examples.
[0191] The first virtual agent module receives the first message sent by the physical node. The first message may be an OAM message or a connectivity detection message. The first OAM message carries the identification information. For example, the first message is a first OAM message, and the first OAM message carries the identification information. The identification information includes the ID of the virtual node or the ID of the first virtual network.
[0192] The first virtual agent module determines the address of the first VNF module according to the identification information and the VNF module list.
[0193] The first virtual agent module sends a second OAM message to the first VNF module according to the first OAM message and t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


