Network slice cutover alarm shielding method and device

A network slicing and slicing technology, which is applied in the field of electronic information, can solve problems such as inability to adapt to needs, complex slicing structure, and intricate relationships, and achieve the effect of improving accuracy and efficiency

Active Publication Date: 2021-12-07
CHINA MOBILE GROUP ZHEJIANG +1
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003]However, in 5G network slicing, the slice structure is complex, the node types are diverse, and the relationship is intricate, which brings difficulties to the manual selection process of shielding alarms
Therefore, the traditional manual decision-making method can no longer meet the needs, and a more intelligent alarm shielding method is urgently needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network slice cutover alarm shielding method and device
  • Network slice cutover alarm shielding method and device
  • Network slice cutover alarm shielding method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] figure 1 A flow chart of a cutover alarm shielding method for network slicing provided by Embodiment 1 of the present invention is shown. Such as figure 1 As shown, the method includes:

[0054] Step S110: Receive a network slice cutover request, and obtain cutover feature information contained in the network slice cutover request.

[0055] Among them, the cutover feature information contained in the network slice cutover request is used to describe the objects and processing methods of the network slice cutover processing. Therefore, any cutover processing objects and cutover processing that can be used to describe the network slice The information of the mode can be used as the cutover feature information.

[0056] For example, in a specific example, the cutover feature information contained in the network slice cutover request includes at least one of the following: network elements involved in cutover, network element components involved in cutover, cutover duratio...

Embodiment 3

[0129] image 3 A schematic structural diagram of a cutover alarm shielding device for network slicing provided by Embodiment 3 of the present invention is shown, specifically including:

[0130] The receiving module 31 is adapted to receive a network slice cutover request, and obtain cutover feature information contained in the network slice cutover request;

[0131] The acquiring module 32 is adapted to acquire a slice cutover topology map corresponding to the cutover feature information, and determine slice cutover topology data corresponding to the slice cutover topology map;

[0132] The input module 33 is adapted to input the slice cutover topology data into a preset alarm masking model, and obtain masking configuration information output by the alarm masking model;

[0133] The masking module 34 is adapted to perform alarm masking processing according to the masking configuration information.

[0134] Optionally, the acquisition module is specifically adapted to:

[...

Embodiment 4

[0147] Embodiment 4 of the present application provides a non-volatile computer storage medium, where at least one executable instruction is stored in the computer storage medium, and the computer executable instruction can execute the network slice cutover alarm in any of the above method embodiments Shielding method. The executable instruction may be specifically used to cause the processor to perform each corresponding operation in the foregoing method embodiments.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a network slice cutover alarm shielding method and device, electronic equipment and a storage medium, and relates to the field of electronic information. The method comprises the steps of receiving a network slice cutover request, and obtaining cutover feature information contained in the network slice cutover request; acquiring a slice cutover topological graph corresponding to the cutover feature information, and determining slice cutover topological data corresponding to the slice cutover topological graph; inputting the slice cutover topological data into a preset alarm shielding model to obtain shielding configuration information output by the alarm shielding model; and performing alarm shielding processing according to the shielding configuration information. According to the mode, the alarm item to be shielded can be intelligently determined by means of the slice cutover topological graph and the alarm shielding model, and the accuracy and efficiency of alarm shielding setting are improved.

Description

technical field [0001] The invention relates to the field of electronic information, in particular to a network slicing cutover alarm shielding method and device. Background technique [0002] The purpose of masking slice cutover alarms is to avoid generating too many alarms during the cutover process, making it difficult for O&M personnel to distinguish which alarms need attention. Currently, the cutover alarm masking of 5G network slices needs to be Check the alarm items that need to be masked, or manually define the masking rules in advance. [0003] However, in 5G network slicing, the slice structure is complex, the node types are diverse, and the relationships are intricate, which brings difficulties to the manual selection process of shielding alarms. Therefore, the traditional manual decision-making method can no longer meet the needs, and a more intelligent alarm shielding method is urgently needed. Contents of the invention [0004] In view of the above problems...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24G06N3/04
CPCH04L41/0604H04L41/0618G06N3/049G06N3/045
Inventor 邢彪张卷卷陈维新章淑敏
Owner CHINA MOBILE GROUP ZHEJIANG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products