CN113612648B - Network element re-reproduction method, computer apparatus and storage medium - Google Patents

Network element re-reproduction method, computer apparatus and storage medium Download PDF

Info

Publication number
CN113612648B
CN113612648B CN202111076267.5A CN202111076267A CN113612648B CN 113612648 B CN113612648 B CN 113612648B CN 202111076267 A CN202111076267 A CN 202111076267A CN 113612648 B CN113612648 B CN 113612648B
Authority
CN
China
Prior art keywords
network
network element
function
function network
functional
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111076267.5A
Other languages
Chinese (zh)
Other versions
CN113612648A (en
Inventor
邱权冠
苏国章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Aipu Road Network Technology Co Ltd
Original Assignee
Guangzhou Aipu Road Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Aipu Road Network Technology Co Ltd filed Critical Guangzhou Aipu Road Network Technology Co Ltd
Priority to CN202111076267.5A priority Critical patent/CN113612648B/en
Publication of CN113612648A publication Critical patent/CN113612648A/en
Application granted granted Critical
Publication of CN113612648B publication Critical patent/CN113612648B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability

Abstract

The invention discloses a network element reappearing method, a computer device and a storage medium, wherein the network element reappearing method comprises the steps of recording error logs by a first network function network element when a second network function network element discovered by the first network storage function network element is unavailable, packaging the error logs into a network element reappearing request, acquiring the network element reappearing request by the first network storage function network element, discovering the network element by the first network storage function network element according to discovery conditions and the error logs and the like. The invention records the information of the found unavailable network function network elements to the error log, and carries out network element rediscovery according to the error log, thereby dynamically recording the information of the unavailable network function network elements and avoiding repeatedly finding the unavailable network function network elements which are found before in the rediscovery process, thereby realizing the active avoidance of the unavailable network function network elements, improving the success rate of rediscovery and avoiding occupying excessive network resources. The invention is widely applied to the technical field of communication networks.

Description

Network element re-reproduction method, computer apparatus and storage medium
Technical Field
The present invention relates to the field of communications network technologies, and in particular, to a network element re-occurrence method, a computer apparatus, and a storage medium.
Background
The core network of a communication network such as a 5G mobile network and the like is provided with an NRF network element for providing discovery service between network elements for other NF network elements. When the network element discovery service is provided, the NRF network element can search the network elements meeting the conditions according to the discovery conditions in the discovery request message sent by the NF network element, and the function of dynamic discovery between the network elements is realized. Due to the performance fault or link failure of the discovered NF network element, even if the discovered NF network element meets the discovery condition, the discovered NF network element may not provide a service for the NF network element initiating the discovery request, that is, the discovered NF network element may not be available for the NF network element initiating the discovery request, and therefore, the network element needs to be re-discovered for the NF network element initiating the discovery request, which may be referred to as re-discovery of the network element.
However, at present, a perfect retransmission process is lacking in related technologies such as the 3GPP TS 29510 communication protocol, and therefore, efficiency is low when network element retransmission is performed. For example, the related art lacks a dynamic adjustment process, and it is easy to cause that the network elements discovered by re-discovering each time are the same as the network elements discovered by the network element discovering performed for the first time, so that the re-discovering function is actually disabled, and the network resources are occupied to influence the communication efficiency.
Interpretation of terms:
NF: english abbreviation of Network Function; a core network of the 5G network is provided with a network function network element;
NRF: english abbreviation of network storage Function NF hierarchy Function; the core network of the 5G network is provided with a network storage function network element, and the network storage function network element can provide network function discovery service for other network elements.
Disclosure of Invention
In view of at least one of the above technical problems of poor re-occurrence function and occupying more network resources, the present invention provides a network element re-occurrence method, a computer device, and a storage medium.
In one aspect, an embodiment of the present invention includes a method for network element re-occurrence, including:
when a first network storage function network element responds to a network element discovery request, a second network function network element is discovered for the first network function network element, and the second network function network element is unavailable relative to the first network function network element, the first network storage function network element records an error log, and returns the error log to the first network function network element; the error log is used for indicating that the second network function network element is unavailable;
the first network storage function network element acquires a network element re-occurrence request of the first network function network element; the network element re-discovery request comprises a discovery condition and the error log;
and the first network storage function network element discovers the network element according to the discovery condition and the error log.
Further, the network element re-occurrence method further includes:
and the first network storage function network element returns the result of the network element discovery to the first network function network element.
Further, the logging an error log, comprising:
acquiring second identification information; the second identification information is used for identifying the second network function network element;
analyzing the reason why the second network function network element is unavailable to obtain second error reason information;
recording the second identification information and the second error reason information to the error log.
Further, the logging an error log, comprising:
acquiring a second operation parameter; the second operation parameter is an operation parameter of the second network function network element;
determining a third operating parameter according to the second operating parameter; the deviation between the third operating parameter and the second operating parameter is within a preset range;
finding out a third network functional network element according to the third operation parameter;
acquiring third identification information; the third identification information is used for identifying the third network function network element;
recording the third identification information to the error log.
Further, the network element discovery by the first network storage function network element according to the discovery condition and the error log includes:
searching a network functional network element which accords with the discovery condition;
removing the network functional network elements recorded in the error logs from the found network functional network elements;
and taking the network functional network elements which are not removed in the searched network functional network elements as the network element discovery result.
Further, the searching for the network functional network element meeting the discovery condition includes:
searching the network functional network element which meets the discovery condition from the network functional network element information stored in the first network storage functional network element;
or
Searching a network function network element which accords with the discovery condition through a second network storage function network element; the second network storage function network element is a network storage function network element that can be mutually discovered with the first network storage function network element.
Further, the network element re-occurrence method further includes:
setting a first time period;
and within the first time period, the first network storage function network element refuses to receive or refuse to respond to the network element rediscovery request of the first network function network element.
Further, the network element re-occurrence method further includes:
setting an upper limit of the request times;
and when the accumulated times of the network element rediscovery requests sent by the first network functional network element reaches the request time upper limit, the first network storage functional network element refuses to receive or refuse to respond to the network element rediscovery requests of the first network functional network element.
In another aspect, the present invention further includes a computer apparatus for a network element as a first network storage function in the network element re-occurrence method in the embodiment, the computer apparatus including a memory for storing at least one program and a processor for loading the at least one program to execute the network element re-occurrence method in the embodiment.
In another aspect, the present invention further includes a storage medium for storing a program executable by a processor for executing the network element re-occurrence method in the embodiment as a component of a first network storage function network element in the network element re-occurrence method in the embodiment.
The invention has the beneficial effects that: in the network element redisplaying method in the embodiment, the found information of the unavailable network function network element is recorded to the error log, and the network element redisplaying is performed according to the error log, so that the information of the unavailable network function network element can be dynamically recorded, and the unavailable network function network element found before is repeatedly found in the redisplaying process is avoided, so that the unavailable network function network element is actively avoided, the redisplaying success rate is improved, and the phenomenon that the repeated multiple redisplaying results occupy too much network resources is avoided.
Drawings
Fig. 1 is a network element communication flow diagram of a first network function network element NF1 requesting a discovery network element from a first network storage function network element NRF1 in an embodiment;
fig. 2 is a flowchart of a method for network element re-occurrence in an embodiment;
fig. 3 is a schematic diagram of a network element re-occurrence method in an embodiment.
Detailed Description
Fig. 1 shows a communication flow diagram between network elements in a case where a first network function network element NF1 requests a first network storage function network element NRF1 to discover a network element, and the first network storage function network element NRF1 normally returns a second network function network element NF2 capable of providing services, that is, a network element re-discovery is not required. NF1 in fig. 1 is a network function element that requests discovery of a network function that provides a service, i.e., a first network function element; the NF2 is a network function that is discovered, eligible, and capable of serving a first network function network element NF 1.
Referring to fig. 1, when the first network storage function network element NRF1 receives the network function network element discovery request message of the first network function network element NF1, the second network function network element NF2 meeting the condition is found, and the corresponding service access address of the second network function network element NF2 is returned to the first network function network element NF1 through the network function network element discovery response message, then the first network function network element NF1 requests the corresponding service from the second network function network element NF2 according to the second network function network element NF2 service access address, and the second network function network element NF2 also provides the service for the first network function network element NF 1.
For the case shown in fig. 1, if the first network storage function network element NRF1 responds to the network function network element discovery request sent by the first network function network element NF1, discovers the second network function network element NF2 for the first network function network element NF1, and the first network function network element NF1 detects that the second network function network element NF2 is not available with respect to the first network function network element NF1, the network element re-discovery method in this embodiment may be executed.
In this embodiment, the network elements involved in the network element re-occurrence method include a first network function network element NF1, a second network function network element NF2, a third network function network element NF3, a first network storage function network element NRF1, and a second network storage function network element NRF 2. The first network storage function network element NRF1 and the second network storage function network element NRF2 are network elements capable of providing network element discovery services, the first network function network element NF1 is a network function network element that requests to discover other network elements, and the second network function network element NF2 and the third network function network element NF3 are network function network elements that may meet discovery conditions of the first network function network element NF 1. In this embodiment, the second network functional network element NF2 is a network functional network element that satisfies the discovery conditions of the first network functional network element NF1, but is not available with respect to the first network functional network element.
In this embodiment, referring to fig. 2, the method for network element re-occurrence includes the following steps:
when the first network storage function network element responds to the network element discovery request, a second network function network element is discovered for the first network function network element, and the first network function network element detects that the second network function network element is unavailable relative to the first network function network element, the following steps are executed:
s1, a first network function network element generates an error log; the error log comprises information used for indicating that the second network function network element is unavailable;
s2; a first network function network element generates a network element re-occurrence request; the network element re-occurrence request comprises a discovery condition and an error log;
s3, the first network storage function network element obtains a network element reappearance request;
s4, the first network storage function network element discovers the network element according to the discovery condition and the error log;
and S5, the first network storage function network element returns the result of the network element discovery to the first network function network element.
The second network function network element NF2 is not available with respect to the first network function network element NF1, and specifically, the second network function network element NF2 cannot provide services such as data forwarding, storage, or routing to the first network function network element NF1 due to a network link failure, a firewall configured by the second network function network element NF2 or the first network function network element NF1, and a performance failure of the second network function network element NF 2.
The steps S1-S5 may be performed when a situation occurs in which the second network enabled network element NF2 is unavailable with respect to the first network enabled network element NF 1. In step S1, the first network function network element NF1 records in an error log information indicating that the second network function network element NF2 is unavailable. For the sake of brevity, without being particularly noted, it may be considered that the error log includes only information indicating that the second network function network element NF2 is not available, so that the error log may be used to represent the information indicating that the second network function network element is not available.
In this embodiment, step S1, that is, the step of recording the error log, specifically includes the following steps:
s101, acquiring second identification information; the second identification information is used for identifying a second network function network element;
s102, analyzing the reason that the second network function network element is unavailable to obtain second error reason information;
and S103, recording the second identification information and the second error reason information to an error log.
In step S101, the second network function network element NF2 obtains identification information, i.e. second identification information, such as its own IP address or MAC address, which has uniqueness within a certain period of time or permanently. In step S102, the reason that the second network function network element NF2 is unavailable may be analyzed by the first network storage function network element NRF1 or the first network function network element NF1 that initiates the discovery request, and the obtained analysis result is the second error reason information. In step S102, the first network functional network element NF1 or the first network storage functional network element NRF1 may also submit the second error cause information to the network management platform for further analysis. In step S103, the first network function network element NF1 may record the second identification information and the second error reason information to an error log.
By performing steps S101-S103, the first network storage function network element NRF1 that received the error log can be enabled to read information of the second network function network element NF2 from the error log, so that the second network function network element NF2 can be identified as an unavailable network function network element. When the first network functional network element NF1 initiates a re-occurrence request to the first network storage functional network element NRF1, the first network storage functional network element NRF1 may parse an error log from a re-occurrence request message sent by the first network functional network element NF1, so that the second network functional network element NF2 can be determined as an unavailable network functional network element, and the second network functional network element NF2 is prevented from being discovered again, thereby implementing active avoidance of the unavailable network functional network element, improving the success rate of re-discovery, and preventing the result of repeated re-discovery from occupying too much network resources.
In this embodiment, step S1, that is, the step of recording the error log, specifically includes the following steps:
s104, acquiring a second operation parameter; the second operation parameter is an operation parameter of a second network function network element;
s105, determining a third operation parameter according to the second operation parameter; the deviation between the third operating parameter and the second operating parameter is within a preset range;
s106, searching out a third network function network element according to the third operation parameter;
s107, acquiring third identification information; the third identification information is used for identifying a third network function network element;
and S108, recording the third identification information to an error log.
In step S104, the second operation parameter is one or more operation parameters of the second network function network element NF2, such as a routing location, a network speed, a temperature, a signal strength, and a packet drop rate. In step S105, when a single parameter such as signal strength or packet drop rate is used as the second operation parameter, the preset range may be a range of positive and negative deviations of such a single parameter; when a vector composed of a plurality of parameters such as signal strength, packet drop rate, and network speed is used as the second operating parameter, the preset range may be a combination of positive and negative deviation ranges of the respective parameters.
In step S106, the first network functional network element NF1 finds out the third network functional network element NF3, that is, finds out one or more third network functional network elements NF3 according to the third operating parameter, where the operating parameter of the third network functional network element NF3 is equal to the third operating parameter.
The principle of steps S107-S108 is the same as that of steps S101 and S103. In step S107, the third network function network element NF3 obtains identification information, that is, third identification information, that has uniqueness within a certain period of time or permanently, such as its own IP address or MAC address. In step S108, the third network function network element NF3 may record the third identification information and the third error reason information to the error log.
The principle of steps S104-S108 is that: since the second network function network element NF2 is an already verified unavailable network function network element, the operating parameter of the second network function network element NF2 is the second operating parameter, and the third operating parameter is an operating parameter close to the second operating parameter, it can be reasonably determined that the third network function network element NF3 having the third operating parameter has similar properties to the second network function network element NF2, and may belong to an unavailable network function network element. By performing steps S104-S108, the information of the third network functional network element NF3 may be recorded in the error log, and the first network storage functional network element NRF1 that received the error log may be enabled to read the information of the third network functional network element NF3 from the error log, thereby being enabled to identify the third network functional network element NF3 as an unavailable network functional network element. When the first network functional network element NF1 initiates a re-occurrence request to the first network storage functional network element NRF1, the first network storage functional network element NRF1 may parse an error log from a re-occurrence request message sent by the first network functional network element NF1, so as to determine that the third network functional network element NF3 is an unavailable network functional network element, and on the basis of avoiding re-discovering the second network functional network element NF2, can also avoid re-discovering the third network functional network element NF3, thereby implementing active avoidance of the unavailable network functional network element, further improving the success rate of re-discovery, and avoiding that the results of multiple times of re-discovery are repeated and occupy too many network resources.
The principle of steps S1-S5 is shown in FIG. 3. Referring to fig. 3, the first network function network element NF1 may request the first network storage function network element NRF1 to discover the network function network element, but the second network function network element NF2 found by the first network storage function network element NRF1 is unavailable, for example, after the second network function network element NF2 fails to provide the service to the first network storage function network element NRF1, the first network function network element NF1 may send a network function network element rediscovery request to the first network storage function network element NRF1, and request the first network storage function network element NRF1 to discover the network function element again.
In step S2, the first network function network element NF1 packs the discovery condition and the error log into a network element re-discovery request.
In step S3, the first network storage function network element NRF1 obtains a network element re-occurrence request of the first network function network element NF1, and parses the discovery condition and the error log from the network element re-occurrence request.
In step S4, the first network storage function network element NRF1 performs network element discovery according to the discovery condition and the error log. Specifically, step S4 specifically includes the following steps:
s401, searching network functional network elements meeting the discovery conditions;
s402, removing the network function network elements recorded in the error logs from the found network function network elements;
and S403, using the network functional network elements which are not removed in the searched network functional network elements as the network element discovery result.
In step S401, the first network storage function network element NRF1 only filters the network function network element information stored in the first network storage function network element NRF1 according to the discovery condition set by the first network function network element NF 1. The first network storage function network element NRF1 may also filter from the network function network element information stored by the second network storage function network element NRF2 that is capable of discovering each other with itself. The processes of screening from the network function network element information stored in the first network storage function network element storage NRF1 and screening from the network function network element information stored in the second network storage function network element storage NRF2 can also be performed synchronously, and the searched network function network element is the network function network element meeting the discovery condition.
If the first network storage function network element NRF1 screens the discovered network function network element through the second network storage function network element NRF2, and the second network storage function network element NRF2 returns an available network function network element meeting the condition, the first network storage function network element NRF1 may cache the information of the available network function network element to the local of the first network storage function network element NRF1, and when a corresponding discovery request comes next time, the first network storage function network element NRF1 may directly provide the available network function network element to the network function network element initiating the request, and it is not necessary to search the second network storage function network element NRF2 or other network storage function network elements NRF again.
In step S402, the first network storage function network element NRF1 searches according to the condition that the network function network element recorded in the error log is "NOT", so that the network function network element recorded in the error log is removed from the found network function network elements, and finally the remaining network function network elements do NOT include the network function network element recorded in the error log. For example, the error log after the step S103 is executed includes information of the second network function network element NF2, the error log after the step S108 is executed includes information of the second network function network element NF2 and information of the third network function network element NF3, and the step S402 is executed for the error log after the step S108, and the second network function network element NF2 and the third network function network element NF3 may be removed from the found network function network elements.
In step S403, the result of the network element discovery is the network functional network element that meets the discovery condition found in step S401, but does not include the second network functional network element NF2 and the third network functional network element NF 3.
By executing steps S401 to S403, the first network storage function network element NRF1 can determine the network function network element recorded in the error log, specifically, in this embodiment, the second network function network element NF2 and the third network function network element NF3 are determined to be unavailable network function network elements, and rediscovery of the unavailable second network function network element NF2 and the very unavailable third network function network element NF3 can be avoided, so that active avoidance of the unavailable network function network element is achieved, a success rate of rediscovery is improved, and excessive network resources are prevented from being occupied due to repeated rediscovery results of multiple times of rediscovery.
In step S5, the first network storage function network element NRF1 returns the result of the network element discovery to the first network function network element NF1, and the first network function network element NF1 may request the network function network element in the result of the network element discovery to provide a service by itself or through the first network storage function network element NRF 1.
In step S4, the first network storage function network element NRF1 performs a network element discovery result according to the discovery condition and the error log, and may not discover a network function network element that meets the requirements of the discovery condition and the error log. The first network storage function network element NRF1 may return this result to the first network function network element NF1, and the first network function network element NF1 may attempt to issue a network element rediscovery request again. In this embodiment, the first network storage function network element NRF1 may set an upper limit of the request times, and if the first network function network element NF1 sends a network element re-occurrence request to the first network storage function network element NRF1 once, and the first network storage function network element NRF1 does not find a network function network element that meets the requirements of the discovery condition and the error log at the same time, the first network storage function network element NF1 sends the cumulative times of the network element re-occurrence requests plus 1; the cumulative number of times that the first network functional network element NF1 issues network element re-occurrence requests may be cleared if the first network functional network element NF1 issues a network element re-occurrence request to the first network storage functional network element NRF1 and the first network storage functional network element NRF1 issues network functional network elements that meet both the discovery condition and the error log requirement. If the accumulated number of times of sending out the network element re-occurrence requests by the first network function network element NF1 reaches the request number upper limit, the first network storage function network element NRF1 may reject to receive the network element re-occurrence requests of the first network function network element NF1, or to receive the network element re-occurrence requests of the first network function network element NF1, but reject to respond to the network element re-occurrence requests of the first network function network element NF1, so as to avoid that the first network function network element NF1 still frequently sends out the network element re-occurrence requests under the condition of poor re-occurrence effect, thereby saving network resources.
In step S4, the first network storage function network element NRF1 performs a network element discovery result according to the discovery condition and the error log, and may not discover a network function network element that meets the requirements of the discovery condition and the error log. The first network storage function network element NRF1 may return this result to the first network function network element NF1, and the first network function network element NF1 may attempt to issue a network element rediscovery request again. In this embodiment, the first network storage function network element NRF1 may set an upper limit of the request times, and if the first network function network element NF1 sends a network element re-occurrence request to the first network storage function network element NRF1 once, and the first network storage function network element NRF1 does not find a network function network element that meets the requirements of the discovery condition and the error log at the same time, the first network storage function network element NF1 sends the cumulative times of the network element re-occurrence requests plus 1; the cumulative number of times that the first network functional network element NF1 issues network element re-occurrence requests may be cleared if the first network functional network element NF1 issues a network element re-occurrence request to the first network storage functional network element NRF1 and the first network storage functional network element NRF1 issues network functional network elements that meet both the discovery condition and the error log requirement. If the accumulated number of times of the network element re-occurrence requests sent by the first network functional network element NF1 reaches the upper limit of the number of requests, the first network storage functional network element NRF1 may start a timer to count the first time period. The length of the first time period may be inversely proportional to the load of the first network function network element NF1, so as to minimize the negative impact on the busy network function network element.
In the first time period, the first network storage function network element NRF1 may refuse to receive the network element re-occurrence request of the first network function network element NF1, or receive the network element re-occurrence request of the first network function network element NF1, but refuse to respond to the network element re-occurrence request of the first network function network element NF1, so as to avoid that the first network function network element NF1 frequently sends out network element re-occurrence requests under the condition that the re-occurrence effect is not good, thereby saving network resources.
In this embodiment, the timer may only act on the first network function network element NF1, and the other network function network elements may still send network element rediscovery requests to the first network storage function network element NRF1 before the timer expires, that is, send network element rediscovery requests to the first network storage function network element NRF1 within the first time period, and network element rediscovery requests sent by other network function network elements except the first network function network element NF1 may be received and responded by the first network storage function network element NRF 1. This is because the first network function network element NF1 fails to acquire the network element discovery service, which has many factors that affect it, and does not represent that other network function network elements also fail to acquire the network element discovery service. By setting the timer to only act on the NF1 of the first network function network element, it is possible to prevent other network function network elements from being affected by sending out network element re-occurrence requests.
A computer program may be written according to the network element re-occurrence method in this embodiment, and the computer program is written in a memory of a computer device or an independent storage medium, and when the computer program is read out, the computer program may instruct a processor to execute the network element re-occurrence method in the embodiment, thereby achieving the same technical effect as the method embodiment.
It should be noted that, unless otherwise specified, when a feature is referred to as being "fixed" or "connected" to another feature, it may be directly fixed or connected to the other feature or indirectly fixed or connected to the other feature. Furthermore, the descriptions of upper, lower, left, right, etc. used in the present disclosure are only relative to the mutual positional relationship of the constituent parts of the present disclosure in the drawings. As used in this disclosure, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. In addition, unless defined otherwise, all technical and scientific terms used in this example have the same meaning as commonly understood by one of ordinary skill in the art. The terminology used in the description of the embodiments herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this embodiment, the term "and/or" includes any combination of one or more of the associated listed items.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element of the same type from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of the present disclosure. The use of any and all examples, or exemplary language ("e.g.," such as "or the like") provided with this embodiment is intended merely to better illuminate embodiments of the invention and does not pose a limitation on the scope of the invention unless otherwise claimed.
It should be recognized that embodiments of the present invention can be realized and implemented by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The methods may be implemented in a computer program using standard programming techniques, including a non-transitory computer-readable storage medium configured with the computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner, according to the methods and figures described in the detailed description. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Further, operations of processes described in this embodiment can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes described in this embodiment (or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions, and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) collectively executed on one or more processors, by hardware, or combinations thereof. The computer program includes a plurality of instructions executable by one or more processors.
Further, the method may be implemented in any type of computing platform operatively connected to a suitable interface, including but not limited to a personal computer, mini computer, mainframe, workstation, networked or distributed computing environment, separate or integrated computer platform, or in communication with a charged particle tool or other imaging device, and the like. Aspects of the invention may be embodied in machine-readable code stored on a non-transitory storage medium or device, whether removable or integrated into a computing platform, such as a hard disk, optically read and/or write storage medium, RAM, ROM, or the like, such that it may be read by a programmable computer, which when read by the storage medium or device, is operative to configure and operate the computer to perform the procedures described herein. Further, the machine-readable code, or portions thereof, may be transmitted over a wired or wireless network. The invention described in this embodiment includes these and other different types of non-transitory computer-readable storage media when such media include instructions or programs that implement the steps described above in conjunction with a microprocessor or other data processor. The invention also includes the computer itself when programmed according to the methods and techniques described herein.
A computer program can be applied to input data to perform the functions described in the present embodiment to convert the input data to generate output data that is stored to a non-volatile memory. The output information may also be applied to one or more output devices, such as a display. In a preferred embodiment of the invention, the transformed data represents physical and tangible objects, including particular visual depictions of physical and tangible objects produced on a display.
The above description is only a preferred embodiment of the present invention, and the present invention is not limited to the above embodiment, and any modifications, equivalent substitutions, improvements, etc. within the spirit and principle of the present invention should be included in the protection scope of the present invention as long as the technical effects of the present invention are achieved by the same means. The invention is capable of other modifications and variations in its technical solution and/or its implementation, within the scope of protection of the invention.

Claims (10)

1. A network element re-occurrence method, characterized in that the network element re-occurrence method comprises:
when a first network storage function network element responds to a network element discovery request, a second network function network element is discovered for the first network function network element, and the first network function network element detects that the second network function network element is unavailable, the first network function network element generates an error log; the error log is used for indicating that the second network function network element is unavailable;
the first network function network element generates a network element re-occurrence request; the network element re-discovery request comprises a discovery condition and the error log;
the first network storage function network element acquires the network element re-occurrence request;
and the first network storage function network element discovers the network element according to the discovery condition and the error log.
2. The network element re-occurrence method of claim 1, further comprising:
and the first network storage function network element returns the result of the network element discovery to the first network function network element.
3. The network element re-occurrence method of claim 1, wherein recording the error log comprises:
acquiring second identification information; the second identification information is used for identifying the second network function network element;
analyzing the reason why the second network function network element is unavailable to obtain second error reason information;
recording the second identification information and the second error reason information to the error log.
4. A network element re-occurrence method according to any of claims 1-3, wherein logging errors comprises:
acquiring a second operation parameter; the second operation parameter is an operation parameter of the second network function network element;
determining a third operating parameter according to the second operating parameter; the deviation between the third operating parameter and the second operating parameter is within a preset range;
finding out a third network functional network element according to the third operation parameter;
acquiring third identification information; the third identification information is used for identifying the third network function network element;
recording the third identification information to the error log.
5. The method of claim 1, wherein the discovering the network element by the first network storage function network element according to the discovery condition and the error log comprises:
searching a network functional network element which accords with the discovery condition;
removing the network functional network elements recorded in the error logs from the found network functional network elements;
and taking the network functional network elements which are not removed in the searched network functional network elements as the network element discovery result.
6. The method for network element re-discovery according to claim 5, wherein said searching for network function network elements meeting said discovery condition comprises:
searching the network functional network element which meets the discovery condition from the network functional network element information stored in the first network storage functional network element;
or
Searching a network function network element which accords with the discovery condition through a second network storage function network element; the second network storage function network element is a network storage function network element that can be mutually discovered with the first network storage function network element.
7. The network element re-occurrence method of claim 1, further comprising:
setting a first time period;
and within the first time period, the first network storage function network element refuses to receive or refuse to respond to the network element rediscovery request of the first network function network element.
8. The network element re-occurrence method of claim 1, further comprising:
setting an upper limit of the request times;
and when the accumulated times of the network element rediscovery requests sent by the first network functional network element reaches the request time upper limit, the first network storage functional network element refuses to receive or refuse to respond to the network element rediscovery requests of the first network functional network element.
9. A computer arrangement for use as a first network storage function network element in the method of any one of claims 1 to 8, the computer arrangement comprising a memory for storing at least one program and a processor for loading the at least one program to perform the method of any one of claims 1 to 8.
10. A storage medium for use as a component of a first network storage function network element in the method of any one of claims 1-8, the storage medium having stored therein a program executable by a processor, wherein the program executable by the processor is configured to perform the method of any one of claims 1-8 when executed by the processor.
CN202111076267.5A 2021-09-14 2021-09-14 Network element re-reproduction method, computer apparatus and storage medium Active CN113612648B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111076267.5A CN113612648B (en) 2021-09-14 2021-09-14 Network element re-reproduction method, computer apparatus and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111076267.5A CN113612648B (en) 2021-09-14 2021-09-14 Network element re-reproduction method, computer apparatus and storage medium

Publications (2)

Publication Number Publication Date
CN113612648A CN113612648A (en) 2021-11-05
CN113612648B true CN113612648B (en) 2022-04-19

Family

ID=78310495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111076267.5A Active CN113612648B (en) 2021-09-14 2021-09-14 Network element re-reproduction method, computer apparatus and storage medium

Country Status (1)

Country Link
CN (1) CN113612648B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995973A (en) * 2019-12-18 2021-06-18 中兴通讯股份有限公司 Network function network element searching method, network element and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995973A (en) * 2019-12-18 2021-06-18 中兴通讯股份有限公司 Network function network element searching method, network element and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"29510-f10";3GPP;《3GPP specs\29_series》;20180922;全文 *
"C4-205143_v1_29510_Rel17_NF Discovery procedure enhancements";Nokia,Nokia Shanghai Bell,Cisco;《3GPP tsg_ct\wg4_protocollars_ex-cn4》;20201109;全文 *
"S3-190779 SCAS 5G_search result handling for NF discovery";Nokia,Nokia Shanghai Bell;《3GPP inbox\sa3》;20190304;全文 *

Also Published As

Publication number Publication date
CN113612648A (en) 2021-11-05

Similar Documents

Publication Publication Date Title
US11870656B2 (en) Network data analytics method and apparatus
CN112868206B (en) Method, system and computer readable medium for providing service broker functionality
US11258667B2 (en) Network management method and related device
US10305822B2 (en) Service chain routing method and system, and equipment in system
EP2806602A1 (en) Feature extraction device, network traffic identification method, device and system.
CN103067199B (en) Depth message detection result diffusion method and device
EP2717515A1 (en) Virtual port monitoring method and device
JP6888078B2 (en) Network function NF management method and NF management device
CN103763121A (en) Method and device for quickly issuing network configuration information
CN111885005B (en) Container cloud platform service communication method, device, equipment and medium
CN108989151B (en) Flow collection method for network or application performance management
CN105119993A (en) Virtual machine deployment method and apparatus
CN112491941A (en) Data management method, related product and communication system
CN106850268B (en) device and method for realizing linear protection switching
WO2021233564A1 (en) Improving classification accuracy in user plane function re-selection scenarios
EP3229426A1 (en) Uplink data packet forwarding method and apparatus, and downlink data packet forwarding method and apparatus
CN114401258A (en) Short message sending method, device, electronic device and storage medium
CN113612648B (en) Network element re-reproduction method, computer apparatus and storage medium
CN108243056B (en) Method and device for acquiring abnormal information
EP1641222A1 (en) Method and apparatus assigning network addresses for network devices
CN106302838B (en) Domain name system DNS resolution processing method and device
US8069268B2 (en) Recycling items in a network device
CN113098904B (en) Communication method and device of network equipment
CN110011820B (en) Method and device for connecting systems and computer storage medium
CN111988446B (en) Message processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant