Unlock instant, AI-driven research and patent intelligence for your innovation.

Alarm method and device

A technology for serving entities and identifying information, applied in the field of communications, and can solve problems such as failure to analyze the cause of network slice instance failures

Active Publication Date: 2019-12-24
HUAWEI TECH CO LTD
View PDF12 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides an alarm method and device to solve the problem in the prior art that it is impossible to analyze the cause of the failure of the network slice instance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm method and device
  • Alarm method and device
  • Alarm method and device

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0120] In this example, it is assumed that the identification information of the VNF instance and the identification information of the VNFC instance are carried in the alarm filtering list, and it is assumed that the first service entity uses the method of requesting the identification information of the VNF instance and the identification information of the VNFC instance from the third service entity An alarm filtering list and a first corresponding relationship are generated.

[0121] refer to Figure 10 As shown, it is a flow chart of another alarm method provided by this application, including the following steps:

[0122] S301: The first service entity sends a sixth request to the third service entity. The sixth request carries the identification information of the first network slice instance, and the sixth request is used to request the identification information of the VNF instance corresponding to the first network slice instance and the identification information o...

example 2

[0137]In this example, it is assumed that the identification information of the VNF instance and the identification information of the VNFC instance are carried in the alarm filtering list, and it is assumed that the second service entity uses the method of requesting the identification information of the VNF instance and the identification information of the VNFC instance from the third service entity , to generate an alarm filtering list and a first corresponding relationship. This method is also applicable to the scenario where only the identification information of the VNF instance is carried in the alarm filtering list, and is not limited thereto.

[0138] refer to Figure 11 As shown, it is a flow chart of another alarm method provided by this application, including the following steps:

[0139] S401: The second service entity receives a ninth request from the first service entity. The ninth request includes identification information of the first network slice instanc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an alarm method and a device. The method comprises the steps that a first service entity sends a first request to a second service entity, the first service entity is used formanaging network slice instances, and the second service entity is used for managing alarms of network function instances. The first request comprises identification information of the VNF instance; the first request is used for requesting a virtual resource alarm carrying the identification information, the VNF instance has a corresponding relationship with a first network slice instance managedby a first service entity, the first service entity receives a first response from a second service entity, and the first response carries the virtual resource alarm. The VNF instance and the first network slice instance have a corresponding relationship. And the first service entity can associate the virtual resource alarm to the first network slice instance according to the corresponding relationship, so that when the network slice instance fails, the reason why the network slice instance fails can be analyzed according to the virtual resource alarm associated to the network slice instance.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to an alarm method and device. Background technique [0002] Network slice (NS) technology is introduced into the fifth-generation mobile communication (the 5th-generation, 5G) system. Network slice refers to a logical network customized according to different service requirements on a physical or virtual network infrastructure. After the network slice is instantiated into a specific network slice instance (network slice instance, NSI), it becomes a logical network that actually runs and meets certain network characteristics or service requirements. NSI can be created through network function virtualization (network function virtualization, NFV) technology. Usually, a network slice needs to satisfy one or more network functions. Correspondingly, an NSI created through NFV technology can include one or more network functions. An instance (network function inst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W24/04H04L12/24
CPCH04W24/04H04L41/0631H04L41/0686H04L41/0618H04L41/5041H04L41/40H04L41/342H04W88/18G06F9/45558G06F2009/45595H04L41/0627
Inventor 李卓明
Owner HUAWEI TECH CO LTD