Alarm method and device
A technology for serving entities and identifying information, applied in the field of communications, and can solve problems such as failure to analyze the cause of network slice instance failures
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0120] In this example, it is assumed that the identification information of the VNF instance and the identification information of the VNFC instance are carried in the alarm filtering list, and it is assumed that the first service entity uses the method of requesting the identification information of the VNF instance and the identification information of the VNFC instance from the third service entity An alarm filtering list and a first corresponding relationship are generated.
[0121] refer to Figure 10 As shown, it is a flow chart of another alarm method provided by this application, including the following steps:
[0122] S301: The first service entity sends a sixth request to the third service entity. The sixth request carries the identification information of the first network slice instance, and the sixth request is used to request the identification information of the VNF instance corresponding to the first network slice instance and the identification information o...
example 2
[0137]In this example, it is assumed that the identification information of the VNF instance and the identification information of the VNFC instance are carried in the alarm filtering list, and it is assumed that the second service entity uses the method of requesting the identification information of the VNF instance and the identification information of the VNFC instance from the third service entity , to generate an alarm filtering list and a first corresponding relationship. This method is also applicable to the scenario where only the identification information of the VNF instance is carried in the alarm filtering list, and is not limited thereto.
[0138] refer to Figure 11 As shown, it is a flow chart of another alarm method provided by this application, including the following steps:
[0139] S401: The second service entity receives a ninth request from the first service entity. The ninth request includes identification information of the first network slice instanc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


