WO2024012450A1 - 业务处理方法、装置、电子设备及存储介质 - Google Patents

业务处理方法、装置、电子设备及存储介质 Download PDF

Info

Publication number
WO2024012450A1
WO2024012450A1 PCT/CN2023/106792 CN2023106792W WO2024012450A1 WO 2024012450 A1 WO2024012450 A1 WO 2024012450A1 CN 2023106792 W CN2023106792 W CN 2023106792W WO 2024012450 A1 WO2024012450 A1 WO 2024012450A1
Authority
WO
WIPO (PCT)
Prior art keywords
instance
candidate
instances
backup
network element
Prior art date
Application number
PCT/CN2023/106792
Other languages
English (en)
French (fr)
Inventor
易飞
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2024012450A1 publication Critical patent/WO2024012450A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices

Definitions

  • the present disclosure relates to the field of mobile communication technology, and in particular, to a business processing method, device, electronic equipment and storage medium.
  • each Network Function (NF) instance will be deployed in a set, and Each NF instance in the set generally undergoes physical disaster recovery. For example, different NF instances are deployed in different computer rooms or even in different cities.
  • NRF network storage function
  • UDM Unified Data Management
  • UDM network elements usually directly and fixedly select the first candidate NF instance or the last candidate NF instance as the backup NF instance, but cannot make the optimal selection according to the actual business processing scenario, resulting in the loss of services of the entire mobile communication network. Processing capabilities are limited.
  • the present disclosure provides a business processing method, device, electronic equipment and storage medium to solve the problem that in the existing technology, UDM network elements usually directly and fixedly select the first candidate NF instance or the last NF instance as the backup NF instance, and cannot Optimal selection is made based on actual business processing scenarios, which leads to the problem that the business processing capabilities of the entire mobile communication network are limited.
  • the present disclosure provides a business processing method applied to a unified data management function UDM network element.
  • the method includes: when it is determined that an abnormality occurs in the main network function NF instance, the network storage function NRF network element Send a candidate NF instance acquisition request; receive multiple candidate NF instances returned by the NRF network element.
  • the multiple candidate NF instances are determined by the NRF network element in response to the candidate NF instance acquisition request; based on the preset policy, from multiple candidate NF instances
  • a standby NF instance is determined for business processing, and the preset policy is a policy preset according to actual business processing needs.
  • the present disclosure also provides a business processing device, which is applied to the unified data management function UDM network element.
  • the device includes: a sending module, configured to send a message to the network storage function NRF when it is determined that the active NF instance is abnormal.
  • the network element sends a candidate NF instance acquisition request; the receiving module is used to receive multiple candidate NF instances returned by the NRF network element.
  • the multiple candidate NF instances are determined by the NRF network element in response to the candidate NF instance acquisition request; the determining module is used to Based on the preset strategy, a backup NF instance is determined from multiple candidate NF instances for business processing.
  • the preset strategy is a strategy preset according to actual business processing needs.
  • the present disclosure also provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory complete communication with each other through the communication bus; the memory is used to store the computer.
  • Program used to implement the steps of the business processing method of any embodiment of the first aspect when executing the program stored in the memory.
  • the present disclosure also provides a computer-readable storage medium on which a computer program is stored.
  • the computer program is executed by a processor, the steps of the business processing method according to any embodiment of the first aspect are implemented.
  • Figure 1 is a schematic flow chart of a business processing method provided by an embodiment of the present disclosure
  • Figure 2 is a schematic diagram of the NF instance disaster recovery network provided by an embodiment of the present disclosure
  • Figure 3 is a disaster recovery flow chart for determining an abnormality in the active NF instance based on the received response result of the active NF instance provided by an embodiment of the present disclosure
  • Figure 4 is a disaster recovery flow chart for determining an abnormality in the active NF instance based on the received subscription message of the active NF instance provided by an embodiment of the present disclosure
  • Figure 5 is a schematic structural diagram of a business processing device provided by an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of an electronic device provided by an embodiment of the present disclosure.
  • Figure 1 is a schematic flowchart of a business processing method provided by an embodiment of the present disclosure. This business processing method is applied to the unified data management function UDM network element, and the method includes the following steps:
  • Step 101 When it is determined that the main network function NF instance is abnormal, send a candidate NF instance acquisition request to the network storage function NRF network element.
  • the service processing method is applied to UDM network elements, which can be combined with NRF network elements and network elements with NF instances such as Access and Mobility Management Function (AMF) network elements. , Session Management Function (SMF) network elements, etc. for communication connections.
  • NF instances such as Access and Mobility Management Function (AMF) network elements.
  • SMF Session Management Function
  • the UDM network element can discover the NF instance from the NRF network element, select the optimal backup NF instance when the active NF instance is abnormal, and finally send service messages to the backup NF instance. , perform business processing, as shown in Figure 2.
  • the UDM network element when it determines that the main network function NF instance is abnormal, it can send a candidate NF instance acquisition request to the NRF network element, where the candidate NF instance acquisition request is used to request to obtain the candidate NF in the set set. In this way, after receiving the candidate NF instance acquisition request, the NRF network element can respond to the candidate NF instance acquisition request and send multiple candidate NF instances to the UDM network element.
  • Step 102 Receive multiple candidate NF instances returned by the NRF network element.
  • the multiple candidate NF instances are determined by the NRF network element in response to the candidate NF instance acquisition request.
  • the UDM network element can receive multiple candidate NF instances returned by the NRF network element, where the multiple candidate NF instances are determined by the NRF network element in response to the candidate NF instance acquisition request.
  • the candidate NF instance acquisition here is The request carries the globally unique AMF identifier (Globally Unique AMF Identifier, referred to as GUAMI) or the disaster recovery fully qualified domain name (Fully Qualified Domain Name, referred to as FQDN) of the active NF instance.
  • GUAMI Globally Unique AMF Identifier
  • FQDN Fully Qualified Domain Name
  • Step 103 Based on the preset policy, determine a standby NF instance from multiple candidate NF instances for business processing.
  • the preset policy is a policy preset according to actual business processing needs.
  • the above-mentioned preset strategy can be flexibly set according to actual business processing needs.
  • the method of selecting standby NF instances by the preset strategy may include but is not limited to: selecting based on parameter information corresponding to multiple candidate NF instances, selecting based on multiple candidate NF instances. The selection is based on the business response success rate corresponding to the instance, the selection is based on the business response time corresponding to multiple candidate NF instances, the selection is based on the location information corresponding to multiple candidate NF instances, the selection is based on pre-executed NF instances, etc. In this way, the UDM network element can determine a backup NF instance from multiple candidate NF instances for service processing.
  • the UDM network element can select a candidate NF instance from multiple candidate NF instances as a backup NF instance according to the preset policy when the active NF instance is abnormal. Due to the unified data management function in the UDM network element, The prediction strategy can be pre-set according to the actual business processing needs, so the backup NF instance can be flexibly selected according to different business processing scenarios. Compared with the traditional fixed selection of the first candidate NF instance or the last candidate NF instance as the backup NF instance The method in the present disclosure can be optimally selected according to the actual business processing scenario, thereby improving the business processing capability of the entire mobile communication network.
  • the above step 103 is to determine a backup NF instance from multiple candidate NF instances for business processing based on the preset policy, including:
  • the parameter information includes priority, capacity and load level
  • a random number is generated based on the capacity and load level corresponding to the candidate NF instance with the highest priority among the multiple candidate NF instances, and the random number is The candidate NF instance with the highest priority corresponding to the numerical interval corresponding to the number is determined as the standby NF instance, and business processing is performed through the standby NF instance.
  • the upper limit of the value range of the random number is the sum of the priority factors, and the priority The factor divides the value range of the random number into multiple numerical intervals, and the priority factor is determined based on the capacity and load level.
  • the UDM network element can select a backup NF instance based on parameter information corresponding to multiple candidate NF instances.
  • the parameter information here includes priority (ie, priority), capacity (ie, capacity) and load level (ie, load). wait.
  • the UDM network element may first select a backup NF instance based on priorities corresponding to multiple candidate NF instances. If the priority of the candidate NF instance is higher, the priority of selecting it as the backup NF instance is also higher; if the priority of the candidate NF instance is lower, the priority of selecting it as the backup NF instance is also lower.
  • the UDM network element will give priority to the candidate NF instance when selecting the backup NF instance. 1 as an alternate NF embodiment.
  • the determination also needs to be based on the capacity and load level of each candidate NF instance.
  • capacity*(1-load%) to calculate the priority factor of each candidate NF instance, the UDM network element then generates a random number based on the sum of all priority factors, and finally selects the corresponding candidate NF instance based on the value range of the random number, as Standby NF instance.
  • the UDM network element discovers three candidate AMF network elements (i.e., candidate NF instances).
  • the parameter information of the three candidate AMF network elements is as follows:
  • the UDM network element can generate any random number with a value ranging from 1 to 5300. Assuming that the random number falls within the numerical range of [1 to 2500], then AMF1 is selected as the backup AMF network element; assuming that the random number falls within the range of [1 to 2500]. If the random number is within the numerical range of [2501 ⁇ 4300], then AMF2 is selected as the backup AMF network element; assuming that the random number falls within the numerical range of [4301 ⁇ 5300], then AMF3 is selected as the backup AMF network element. According to this algorithm, it can be ensured that the number of messages processed by AMF is consistent with its capacity ratio. In this way, a standby NF instance matching its capabilities can be selected for processing based on the number of messages processed by the business to avoid wasting resources.
  • the above-mentioned step 103 determines a backup NF instance from multiple candidate NF instances for business processing based on the preset policy, including:
  • the business response success rate is determined based on the number of times each candidate NF instance successfully returns a business response among the multiple candidate NF instances;
  • the candidate NF instance with the highest business response success rate among multiple candidate NF instances is determined as the backup NF instance, and business processing is performed through the backup NF instance.
  • the UDM network element may select a backup NF instance based on the service response success rate corresponding to multiple candidate NF instances. Specifically, every time an exception occurs in the active NF instance of the UDM network element, the multiple candidate NF instances discovered will be counted. When the number of candidate NF instances discovered is n, the generated value range is [1 , n], select the candidate NF instance corresponding to the random value to send the business message. If the sending is successful and a response is returned successfully, record and update the business response success rate of the candidate NF instance corresponding to the random value; if sending If it fails, another candidate NF instance corresponding to the random number is randomly selected to send the business message, and its business response success rate is recorded simultaneously. In subsequent business processing, the candidate NF instance with the highest business response success rate is given priority for business processing. In this way, the needs of business scenarios that require a high business response success rate can be met.
  • the above-mentioned step 103 determines a backup NF instance from multiple candidate NF instances for business processing based on the preset policy, including:
  • the business response time is determined based on the business response time of each candidate NF instance among the multiple candidate NF instances;
  • the candidate NF instance with the smallest service response time among multiple candidate NF instances is determined as the backup NF instance, and business processing is performed through the backup NF instance.
  • the UDM network element may select a backup NF instance based on the service response times corresponding to multiple candidate NF instances. Specifically, when the UDM network element discovers multiple candidate NF instances, it will traverse all candidate NF instances and record the service response time of each candidate NF instance.
  • the service response time here may refer to the response corresponding to each service response. average over time. Then the UDM network element can preferentially select the candidate NF instance with the smallest service response time for service processing. In this way, it can meet the needs of business scenarios that require higher service response time.
  • the above-mentioned step 103 determines a backup NF instance from multiple candidate NF instances for business processing based on the preset policy, including:
  • the location information is obtained from the NRF network element.
  • the NRF network element is used to obtain the location information corresponding to the multiple candidate NF instances when the registration of multiple candidate NF instances is successful. storage;
  • the nearest candidate NF instance among multiple candidate NF instances is determined as the backup NF instance, and business processing is performed through the backup NF instance.
  • the UDM network element may select a backup NF instance based on the location information corresponding to multiple candidate NF instances. Specifically, when a UDM network element discovers multiple candidate NF instances, the distance between each candidate NF instance and the UDM network element can be determined based on the location information corresponding to each candidate NF instance, and then a backup NF instance is selected based on the distance. It should be noted that the UDM network element can obtain the location information from the NRF network element. For example, the location information of the NF instance can be defined in the NF instance of the NRF network element. The location information can be country, region, province, city, and computer room. and other information.
  • the NRF network element When the candidate NF instance is successfully registered, the NRF network element will store the location information corresponding to the candidate NF instance in the NF instance.
  • the UDM network element sends an NF instance acquisition request to the NRF network element, the NRF network element will store the location information of the candidate NF instance in the NF instance.
  • the NF instance and the location information corresponding to multiple candidate NF instances are sent to the UDM network element together.
  • the candidate NF instance with the closest location can be prioritized as a backup NF instance based on the location information. In this way, the needs of business scenarios with high distance requirements can be met.
  • the above-mentioned step 103 determines a backup NF instance from multiple candidate NF instances for business processing based on the preset policy, including:
  • the identification information is recorded when multiple candidate NF instances are successfully registered;
  • the candidate NF instance corresponding to the pre-specified target identification information is determined as the backup NF instance, and business processing is performed through the backup NF instance.
  • the UDM network element may select a backup NF instance based on pre-specified target identification information. Specifically, the UDM network element can specify the target identification information of the backup NF instance in advance. When the UDM network element discovers multiple candidate NF instances, it can find the candidate NF corresponding to the target identification information from the identification information corresponding to the multiple candidate NF instances. The instance is determined to be the standby NF instance, and the service message is directly sent to the standby NF instance. In this way, the need for business scenarios in which standby NF instances are designated in advance can be met.
  • ways to determine that the active NF instance is abnormal include:
  • the determination is based on the received response result of the active NF instance.
  • the response result of the active NF instance is determined by the active NF instance based on the service message sent by the UDM network element. When the active NF instance is abnormal, The response result of the active NF instance is empty; or,
  • Determination is based on the received subscription message of the active NF instance.
  • the subscription message of the active NF instance is obtained from the NRF network element.
  • the NRF network element is used to register the active NF instance in real time when the active NF instance is successfully registered. Monitor the status of NF instances.
  • the UDM network element may determine that the active NF instance is abnormal based on the received response result of the active NF instance, and may also determine that the active NF instance is abnormal based on the received subscription message of the active NF instance.
  • the interaction diagram between the UDM network element and other network elements is shown in Figure 3.
  • the UDM network element sends a client message (equivalent to the service message above) to the active NF instance based on the active NF instance address saved in the library.
  • UDM network When the client message fails to be sent or the active NF instance responds timeout, UDM network The NRF network element will trigger a discovery request (equivalent to the candidate NF instance acquisition request above). After receiving the discovery request, the NRF network element returns the discovery result to the UDM network element (equivalent to the multiple candidate NF instances, parameter information and location information, etc.), the UDM network element selects a backup NF instance according to the preset policy and sends a client message to the backup NF instance.
  • the interaction diagram between the UDM network element and other network elements is shown in Figure 4.
  • the UDM network element when the active NF instance completes registration, the UDM network element will record the information of the active NF instance and subscribe to the status of the active NF instance to the NRF network element; when the active NF instance is abnormal, the NRF network element Abnormalities can be detected and notified to the UDM network element; after receiving the status abnormality notification sent by the NRF network element, the UDM network element records the status abnormality of the active NF instance. Then the UDM network element will trigger a discovery request (equivalent to the candidate NF instance acquisition request above).
  • the NRF network element After receiving the discovery request, the NRF network element returns the discovery result (equivalent to multiple candidate NF instances, Parameter information and location information, etc.), the UDM network element determines a backup NF instance from multiple candidate NF instances according to the preset policy, and sends a client message to the backup NF instance.
  • the UDM network element can flexibly select the backup NF instance according to different business processing scenarios.
  • the method in this disclosure Optimal selection can be made based on actual business processing scenarios, thereby improving the business processing capabilities of the entire mobile communication network.
  • Figure 5 is a schematic structural diagram of a service processing device provided by an embodiment of the present disclosure. As shown in Figure 5, the service processing device 500 is applied to the unified data management function UDM network element.
  • the device 500 includes:
  • the sending module 501 is used to send a candidate NF instance acquisition request to the network storage function NRF network element when it is determined that the main NF instance is abnormal;
  • the receiving module 502 is configured to receive multiple candidate NF instances returned by the NRF network element.
  • the multiple candidate NF instances are determined by the NRF network element in response to the candidate NF instance acquisition request;
  • the determination module 503 is used to determine a backup NF instance from multiple candidate NF instances for business processing based on a preset policy, where the preset policy is a policy preset according to actual business processing needs.
  • the determination module 503 includes:
  • the first acquisition sub-module is used to obtain parameter information corresponding to multiple candidate NF instances.
  • the parameter information includes priority, capacity and load level;
  • the first determination submodule is used to determine the candidate NF instance with the highest priority among the multiple candidate NF instances as the backup NF instance when there is one candidate NF instance with the highest priority, and pass Standby NF instance performs business processing;
  • the second determination submodule is used to determine the capacity and load level corresponding to the candidate NF instance with the highest priority among the multiple candidate NF instances when there are multiple candidate NF instances with the highest priority. Generate a random number, and determine the candidate NF instance with the highest priority corresponding to the value interval corresponding to the random number as the backup NF instance, and perform business processing through the backup NF instance.
  • the upper limit of the value range of the random number is The sum of priority factors.
  • the priority factor divides the value range of the random number into multiple numerical intervals. The priority factor is determined based on the capacity and load level.
  • the determination module 503 includes:
  • the second acquisition submodule is used to obtain the business response success rate corresponding to multiple candidate NF instances.
  • the business response success rate is determined based on the number of times each candidate NF instance successfully returns a business response among the multiple candidate NF instances;
  • the third determination sub-module is used to determine the candidate NF instance with the highest business response success rate among multiple candidate NF instances as a standby NF instance, and perform business processing through the standby NF instance.
  • the determining module 503 includes:
  • the third acquisition sub-module is used to obtain the business response time corresponding to multiple candidate NF instances.
  • the business response time is determined based on the business response time of each candidate NF instance among the multiple candidate NF instances;
  • the fourth determination sub-module is used to determine the candidate NF instance with the smallest service response time among the multiple candidate NF instances as the backup NF instance, and perform business processing through the backup NF instance.
  • the determining module 503 includes:
  • the fourth acquisition sub-module is used to obtain the location information corresponding to multiple candidate NF instances.
  • the location information is obtained from the NRF network element.
  • the NRF network element is used to obtain multiple candidate NF instances when the registration is successful.
  • the location information corresponding to the candidate NF instance is stored;
  • the fifth determination sub-module is used to determine the nearest candidate NF instance among multiple candidate NF instances as a standby NF instance, and perform business processing through the standby NF instance.
  • the determination module 503 includes:
  • the fifth acquisition sub-module is used to obtain identification information corresponding to multiple candidate NF instances.
  • the identification information is recorded when multiple candidate NF instances are successfully registered;
  • the sixth determination sub-module is used to determine the candidate NF instance corresponding to the pre-specified target identification information as the backup NF instance, and perform business processing through the backup NF instance.
  • ways to determine that the active NF instance is abnormal include:
  • the determination is based on the received response result of the active NF instance.
  • the response result of the active NF instance is determined by the active NF instance based on the service message sent by the UDM network element. In the case of an abnormality of the active NF instance, The response result of the active NF instance is empty; or,
  • Determination is based on the received subscription message of the active NF instance.
  • the subscription message of the active NF instance is obtained from the NRF network element.
  • the NRF network element is used to register the active NF instance in real time when the active NF instance is successfully registered. Monitor the status of NF instances.
  • the device 500 can implement the steps of the business processing method provided in any of the foregoing method embodiments to achieve the same technical effect, which will not be described again here.
  • the embodiment of the present disclosure provides an electronic device, including a processor 611, a communication interface 612, a memory 613, and a communication bus 614.
  • the processor 611, the communication interface 612, and the memory 613 are completed through the communication bus 614. communication between each other,
  • Memory 613 used to store computer programs
  • the processor 611 is used to implement the business processing method provided by any of the foregoing method embodiments when executing the program stored on the memory 613, including:
  • Receive multiple candidate NF instances returned by the NRF network element Receive multiple candidate NF instances returned by the NRF network element.
  • the multiple candidate NF instances are determined by the NRF network element in response to the candidate NF instance acquisition request;
  • a backup NF instance is determined from multiple candidate NF instances for business processing.
  • the preset strategy is a strategy preset according to actual business processing needs.
  • Embodiments of the present disclosure also provide a computer-readable storage medium on which a computer program is stored.
  • the computer program When executed by the processor, the steps of the business processing method provided by any of the foregoing method embodiments are implemented.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Hardware Redundancy (AREA)

Abstract

本公开涉及一种业务处理方法、装置、电子设备及存储介质,该方法包括:在确定主用网络功能NF实例出现异常的情况下,向网络存储功能NRF网元发送候选NF实例获取请求;接收NRF网元返回的多个候选NF实例,多个候选NF实例是NRF网元响应于候选NF实例获取请求确定得到;基于预设策略,从多个候选NF实例中确定出一个备用NF实例进行业务处理,预设策略为根据实际业务处理需要预先设置的策略。

Description

业务处理方法、装置、电子设备及存储介质
相关申请的交叉引用
本公开基于2022年07月11日提交的发明名称为“业务处理方法、装置、电子设备及存储介质”的中国专利申请CN202210814522.X,并且要求该专利申请的优先权,通过引用将其所公开的内容全部并入本公开。
技术领域
本公开涉及移动通信技术领域,尤其涉及一种业务处理方法、装置、电子设备及存储介质。
背景技术
随着第五代移动通信技术(5th Generation Mobile Communication Technology,简称5G)的发展,为了提高网元的可靠性,各网络功能(Network Function,简称为NF)实例都会部署在一个set集合中,且set集合内的各NF实例一般都会进行物理上的容灾,比如不同的NF实例部署在不同的机房甚至部署在不同的城市。当set集合中的主用NF实例出现异常时,网络存储功能(NF Repository Function,简称为NRF)网元会返回多个候选NF实例给到统一数据管理功能(Unified Data Management,简称为UDM)网元。现有技术中UDM网元通常是直接固定选择第一个候选NF实例或者最后一个候选NF实例作为备用NF实例,而无法根据实际的业务处理场景进行最优选择,从而导致整个移动通讯网络的业务处理能力受到限制。
发明内容
本公开提供了一种业务处理方法、装置、电子设备及存储介质,以解决现有技术中UDM网元通常是直接固定选择第一个候选NF实例或者最后个NF实例作为备用NF实例,而无法根据实际的业务处理场景进行最优选择,从而导致整个移动通讯网络的业务处理能力受到限制的问题。
第一方面,本公开提供了一种业务处理方法,应用于统一数据管理功能UDM网元,所述方法包括:在确定主用网络功能NF实例出现异常的情况下,向网络存储功能NRF网元发送候选NF实例获取请求;接收NRF网元返回的多个候选NF实例,多个候选NF实例是NRF网元响应于候选NF实例获取请求确定得到;基于预设策略,从多个候选NF实例中确定出一个备用NF实例进行业务处理,预设策略为根据实际业务处理需要预先设置的策略。
第二方面,本公开还提供了一种业务处理装置,应用于统一数据管理功能UDM网元,装置包括:发送模块,用于在确定主用NF实例出现异常的情况下,向网络存储功能NRF网元发送候选NF实例获取请求;接收模块,用于接收NRF网元返回的多个候选NF实例,多个候选NF实例是NRF网元响应于候选NF实例获取请求确定得到;确定模块,用于基于预设策略,从多个候选NF实例中确定出一个备用NF实例进行业务处理,预设策略为根据实际业务处理需要预先设置的策略。
第三方面,本公开还提供了一种电子设备,包括处理器、通信接口、存储器和通信总线,其中,处理器,通信接口,存储器通过通信总线完成相互间的通信;存储器,用于存放计算机程序;处理器,用于执行存储器上所存放的程序时,实现第一方面任一项实施例的业务处理方法的步骤。
第四方面,本公开还提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现如第一方面任一项实施例的业务处理方法的步骤。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。
为了更清楚地说明本公开实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,对于本领域普通技术人员而言,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本公开实施例提供的业务处理方法的流程示意图;
图2为本公开实施例提供的NF实例容灾组网的示意图;
图3为本公开实施例提供的基于接收到的主用NF实例的响应结果确定主用NF实例出现异常的容灾流程图;
图4为本公开实施例提供的基于接收到的主用NF实例的订阅消息确定主用NF实例出现异常的容灾流程图;
图5为本公开实施例提供的业务处理装置的结构示意图;
图6为本公开实施例提供的电子设备的结构示意图。
具体实施方式
为使本公开实施例的目的、技术方案和优点更加清楚,下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开的一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本公开保护的范围。
参见图1,图1为本公开实施例提供的业务处理方法的流程示意图。该业务处理方法应用于统一数据管理功能UDM网元,该方法包括如下步骤:
步骤101、在确定主用网络功能NF实例出现异常的情况下,向网络存储功能NRF网元发送候选NF实例获取请求。
具体地,该业务处理方法应用于UDM网元,该UDM网元可以与NRF网元和具有NF实例的网元如接入和移动性管理功能(Access and Mobility Management Function,简称为AMF)网元、会话管理功能(Session Management Function,简称为SMF)网元等进行通信连接。在NF实例容灾组网场景下,该UDM网元可以从NRF网元发现NF实例,并在主用NF实例出现异常时,选择出最优的备用NF实例,最后向备用NF实例发送业务消息,进行业务处理,如图2所示。
在该步骤中,UDM网元在确定主用网络功能NF实例出现异常时,可以向NRF网元发送候选NF实例获取请求,其中,该候选NF实例获取请求用于请求获取set集合中的候选NF实例,这样,NRF网元在接收到该候选NF实例获取请求后,可以响应于该候选NF实例获取请求,将多个候选NF实例发送给UDM网元。
步骤102、接收NRF网元返回的多个候选NF实例,多个候选NF实例是NRF网元响应于候选NF实例获取请求确定得到。
在该步骤中,UDM网元可以接收NRF网元返回的多个候选NF实例,其中,该多个候选NF实例是NRF网元响应于候选NF实例获取请求确定得到,此处的候选NF实例获取请求中携带有主用NF实例的全球唯一的AMF标识符(Globally Unique AMF Identifier,简称为GUAMI)或者容灾全限定域名(Fully Qualified Domain Name,简称为FQDN)。这样,NRF网元可以根据主用NF实例的GUAMI或者容灾FQDN发现候选NF实例,并返回给UDM网元。
步骤103、基于预设策略,从多个候选NF实例中确定出一个备用NF实例进行业务处理,预设策略为根据实际业务处理需要预先设置的策略。
具体地,上述预设策略可以根据实际业务处理需要灵活设置,该预设策略选择备用NF实例的方式可以包括但不限于:基于多个候选NF实例对应的参数信息进行选择、基于多个候选NF实例对应的业务响应成功率进行选择、基于多个候选NF实例对应的业务响应时间进行选择、基于多个候选NF实例对应的位置信息进行选择、基于预先执行的NF实例进行选择等。这样,UDM网元可以从多个候选NF实例中确定出一个备用NF实例进行业务处理。
在本实施例中,UDM网元可以在主用NF实例出现异常时,按照预设策略从多个候选NF实例中选取出一个候选NF实例作为备用NF实例,由于统一数据管理功能UDM网元中的预测策略可以根据实际业务处理需要预先设置,因而可以根据不同的业务处理场景灵活地选择备用NF实例,相较于传统的固定选择第一个候选NF实例或者最后一个候选NF实例作为备用NF实例的方式,本公开中的方式可以根据实际的业务处理场景进行最优选择,从而提高了整个移动通讯网络的业务处理能力。
作为第一种实施方式,上述步骤103、基于预设策略,从多个候选NF实例中确定出一个备用NF实例进行业务处理,包括:
获取多个候选NF实例对应的参数信息,参数信息包括优先级、容量和负载等级;
在多个候选NF实例中优先级最高的候选NF实例为一个的情况下,将多个候选NF实例中优先级最高的候选NF实例确定为备用NF实例,并通过备用NF实例进行业务处理;
在多个候选NF实例中优先级最高的候选NF实例为多个的情况下,根据多个候选NF实例中优先级最高的候选NF实例对应的容量和负载等级,生成一随机数,并将随机数对应的数值区间所对应的优先级最高的候选NF实例确定为备用NF实例,通过备用NF实例进行业务处理,其中,随机数的取值范围的上限值为优先级因子之和,优先级因子将随机数的取值范围划分为多个数值区间,优先级因子根据容量和负载等级确定得到。
在一实施例中,UDM网元可以基于多个候选NF实例对应的参数信息选择备用NF实例,此处的参数信息包括优先级(即priority)、容量(即capacity)和负载等级(即load)等。具体地,UDM网元可以先基于多个候选NF实例对应的优先级选择备用NF实例。如果候选NF实例的优先级越高,那么选择作为备用NF实例的优先级也就越高;如果候选NF实例的优先级越低,那么选择作为备用NF实例的优先级也就越低。例如,假设候选NF实例1的优先级为200,候选NF实例2的优先级为100,候选NF实例3的优先级为50,那么UDM网元在选择备用NF实例时,会优先选择候选NF实例1作为备用NF实施例。当优先级最高的候选NF实例为多个时,还需要结合各候选NF实例的容量和负载等级进行确定。作为一示例性实施方式,可以使用 capacity*(1-load%)来计算各候选NF实例的优先级因子,UDM网元再根据所有优先级因子之和产生一随机数,最后根据随机数的数值区间选择对应的候选NF实例,作为备用NF实例。
例如,假设UDM网元发现了3个候选AMF网元(即候选NF实例),该3个候选AMF网元的参数信息如下表;
那么,UDM网元可生成取值范围为1~5300的任一随机数,假设该随机数落在[1~2500]的数值区间内,则选择AMF1作为备用AMF网元;假设该随机数落在[2501~4300]的数值区间内,则选择AMF2作为备用AMF网元;假设该随机数落在[4301~5300]的数值区间内,则选择AMF3作为备用AMF网元。按此算法,可以保证AMF处理的消息数和能力比例一致。这样,可以根据业务处理的消息数选择与之能力相匹配的备用NF实例进行处理,避免造成资源浪费。
作为第二种实施方式,上述步骤103、基于预设策略,从多个候选NF实例中确定出一个备用NF实例进行业务处理,包括:
获取多个候选NF实例对应的业务响应成功率,业务响应成功率是基于多个候选NF实例中各候选NF实例成功返回业务响应的次数确定得到;
将多个候选NF实例中业务响应成功率最高的候选NF实例确定为备用NF实例,并通过备用NF实例进行业务处理。
在一实施例中,UDM网元可以基于多个候选NF实例对应的业务响应成功率选择备用NF实例。具体地,UDM网元每次在主用NF实例发生异常时,会将发现的多个候选NF实例进行统计,当发现的候选NF实例的个数为n时,则生成取值范围为[1、n]的任一随机值,选取该随机值对应的候选NF实例发送业务消息,如果发送成功并成功返回响应,则记录并更新该随机值对应的候选NF实例的业务响应成功率;如果发送失败,则随机选择另一随机数对应的候选NF实例发送业务消息,同步记录其业务响应成功率。在后续业务处理时,优先选择业务响应成功率最高的候选NF实例进行业务处理。这样,可以满足对业务响应成功率要求较高的业务场景的需求。
作为第三种实施方式,上述步骤103、基于预设策略,从多个候选NF实例中确定出一个备用NF实例进行业务处理,包括:
获取多个候选NF实例对应的业务响应时间,业务响应时间是基于多个候选NF实例中各候选NF实例的业务响应时间确定得到;
将多个候选NF实例中业务响应时间最小的候选NF实例确定为备用NF实例,并通过备用NF实例进行业务处理。
在一实施例中,UDM网元可以基于多个候选NF实例对应的业务响应时间选择备用NF实例。具体地,当UDM网元发现多个候选NF实例时,会遍历所有候选NF实例,记录每个候选NF实例的业务响应时间,此处的业务响应时间可以是指各次进行业务响应对应的响应时间的平均值。然后UDM网元可以优先选择业务响应时间最小的候选NF实例进行业务处理,这样,可以满足对业务响应时间要求较高的业务场景的需求。
作为第四种实施方式,上述步骤103、基于预设策略,从多个候选NF实例中确定出一个备用NF实例进行业务处理,包括:
获取多个候选NF实例对应的位置信息,位置信息是从NRF网元中获取得到,NRF网元用于在多个候选NF实例注册成功的情况下,将多个候选NF实例对应的位置信息进行存储;
将多个候选NF实例中位置最近的候选NF实例确定为备用NF实例,并通过备用NF实例进行业务处理。
在一实施例中,UDM网元可以基于多个候选NF实例对应的位置信息选择备用NF实例。具体地,当UDM网元发现多个候选NF实例时,可以根据各候选NF实例对应的位置信息,确定各候选NF实例与该UDM网元的距离,再根据距离选择备用NF实例。需要说明的是,UDM网元可以从NRF网元中获取该位置信息,例如,可以在NRF网元的NF instance中定义NF实例的位置信息,位置信息可以为国家、区域、省、市、机房等信息。当候选NF实例注册成功时,NRF网元会将该候选NF实例对应的位置信息存储在NF instance中,当UDM网元向NRF网元发送NF实例获取请求时,NRF网元会将多个候选NF实例和多个候选NF实例对应的位置信息一同发送给UDM网元,UDM网元发现以后,可以根据位置信息优先选择位置最近的候选NF实例作为备用NF实例。这样,可以满足对距离要求较高的业务场景的需求。
作为第五种实施方式,上述步骤103、基于预设策略,从多个候选NF实例中确定出一个备用NF实例进行业务处理,包括:
获取多个候选NF实例对应的标识信息,标识信息是在多个候选NF实例注册成功的情况下记录得到;
将预先指定的目标标识信息对应的候选NF实例确定为备用NF实例,并通过备用NF实例进行业务处理。
在一实施例中,UDM网元可以基于预先指定的目标标识信息选择备用NF实例。具体地,UDM网元可以提前指定备用NF实例的目标标识信息,当UDM网元发现了多个候选NF实例时,可以从多个候选NF实例对应的标识信息中找到目标标识信息对应的候选NF实例,确定为备用NF实例,直接向该备用NF实例发送业务消息。这样,可以满足对提前指定备用NF实例的业务场景的需求。
进一步地,确定主用NF实例出现异常的方式包括:
基于接收到的主用NF实例的响应结果进行确定,其中,主用NF实例的响应结果是由主用NF实例基于UDM网元发送的业务消息确定得到,在主用NF实例异常的情况下,主用NF实例的响应结果为空;或者,
基于接收到的主用NF实例的订阅消息进行确定,其中,主用NF实例的订阅消息是从NRF网元中订阅得到,NRF网元用于在主用NF实例注册成功的情况下实时对主用NF实例的状态进行监测。
在一实施例中,UDM网元可以基于接收到的主用NF实例的响应结果确定主用NF实例出现异常,还可以基于接收到的主用NF实例的订阅消息确定主用NF实例出现异常。当基于接收到的主用NF实例的响应结果确定主用NF实例出现异常时,UDM网元与其他网元的交互示意图如图3所示。在图3中,UDM网元根据库中保存的主用NF实例地址,向主用NF实例发送客户端消息(相当于上文中的业务消息),当客户端消息发送失败或者主用NF实例响应超时,UDM网 元会触发发现请求(相当于上文中的候选NF实例获取请求),NRF网元在接收到发现请求后,向UDM网元返回发现结果(相当于上文中的多个候选NF实例、参数信息和位置信息等),UDM网元根据预设策略选择备用NF实例,并向该备用NF实例发送客户端消息。
当基于接收到的主用NF实例的订阅消息确定主用NF实例出现异常时,UDM网元与其他网元的交互示意图如图4所示。在图4中,在主用NF实例完成注册时,UDM网元将记录主用NF实例的信息,并且到NRF网元订阅主用NF实例的状态;当主用NF实例出现异常时,NRF网元能检测到异常,并且通知UDM网元;UDM网元在收到NRF网元发送的状态异常通知后,记录主用NF实例状态异常。而后UDM网元会触发发现请求(相当于上文中的候选NF实例获取请求),NRF网元在接收到发现请求后,向UDM网元返回发现结果(相当于上文中的多个候选NF实例、参数信息和位置信息等),UDM网元根据预设策略从多个候选NF实例中确定出一个备用NF实例,并向该备用NF实例发送客户端消息。
这样,UDM网元可以根据不同的业务处理场景灵活地选择备用NF实例,相较于传统的固定选择第一个候选NF实例或者最后一个候选NF实例作为备用NF实例的方式,本公开中的方式可以根据实际的业务处理场景进行最优选择,从而提高了整个移动通讯网络的业务处理能力。
参见图5,图5为本公开实施例提供的业务处理装置的结构示意图。如图5所示,该业务处理装置500应用于统一数据管理功能UDM网元,该装置500包括:
发送模块501,用于在确定主用NF实例出现异常的情况下,向网络存储功能NRF网元发送候选NF实例获取请求;
接收模块502,用于接收NRF网元返回的多个候选NF实例,多个候选NF实例是NRF网元响应于候选NF实例获取请求确定得到;
确定模块503,用于基于预设策略,从多个候选NF实例中确定出一个备用NF实例进行业务处理,预设策略为根据实际业务处理需要预先设置的策略。
进一步地,确定模块503包括:
第一获取子模块,用于获取多个候选NF实例对应的参数信息,参数信息包括优先级、容量和负载等级;
第一确定子模块,用于在多个候选NF实例中优先级最高的候选NF实例为一个的情况下,将多个候选NF实例中优先级最高的候选NF实例确定为备用NF实例,并通过备用NF实例进行业务处理;
第二确定子模块,用于在多个候选NF实例中优先级最高的候选NF实例为多个的情况下,根据多个候选NF实例中优先级最高的候选NF实例对应的容量和负载等级,生成一随机数,并将随机数对应的数值区间所对应的优先级最高的候选NF实例确定为备用NF实例,通过备用NF实例进行业务处理,其中,随机数的取值范围的上限值为优先级因子之和,优先级因子将随机数的取值范围划分为多个数值区间,优先级因子根据容量和负载等级确定得到。
进一步地,确定模块503包括:
第二获取子模块,用于获取多个候选NF实例对应的业务响应成功率,业务响应成功率是基于多个候选NF实例中各候选NF实例成功返回业务响应的次数确定得到;
第三确定子模块,用于将多个候选NF实例中业务响应成功率最高的候选NF实例确定为备用NF实例,并通过备用NF实例进行业务处理。
进一步地,确定模块503包括:
第三获取子模块,用于获取多个候选NF实例对应的业务响应时间,业务响应时间是基于多个候选NF实例中各候选NF实例的业务响应时间确定得到;
第四确定子模块,用于将多个候选NF实例中业务响应时间最小的候选NF实例确定为备用NF实例,并通过备用NF实例进行业务处理。
进一步地,确定模块503包括:
第四获取子模块,用于获取多个候选NF实例对应的位置信息,位置信息是从NRF网元中获取得到,NRF网元用于在多个候选NF实例注册成功的情况下,将多个候选NF实例对应的位置信息进行存储;
第五确定子模块,用于将多个候选NF实例中位置最近的候选NF实例确定为备用NF实例,并通过备用NF实例进行业务处理。
进一步地,确定模块503包括:
第五获取子模块,用于获取多个候选NF实例对应的标识信息,标识信息是在多个候选NF实例注册成功的情况下记录得到;
第六确定子模块,用于将预先指定的目标标识信息对应的候选NF实例确定为备用NF实例,并通过备用NF实例进行业务处理。
进一步地,确定主用NF实例出现异常的方式包括:
基于接收到的主用NF实例的响应结果进行确定,其中,主用NF实例的响应结果是由主用NF实例基于UDM网元发送的业务消息确定得到,在主用NF实例异常的情况下,主用NF实例的响应结果为空;或者,
基于接收到的主用NF实例的订阅消息进行确定,其中,主用NF实例的订阅消息是从NRF网元中订阅得到,NRF网元用于在主用NF实例注册成功的情况下实时对主用NF实例的状态进行监测。
需要说明的是,该装置500可以实现如前述任意一个方法实施例提供的业务处理方法的步骤,目能达到相同的技术效果,在此不再一一赘述。
如图6所示,本公开实施例提供了一种电子设备,包括处理器611、通信接口612、存储器613和通信总线614,其中,处理器611,通信接口612,存储器613通过通信总线614完成相互间的通信,
存储器613,用于存放计算机程序;
在本公开一个实施例中,处理器611,用于执行存储器613上所存放的程序时,实现前述任意一个方法实施例提供的业务处理方法,包括:
在确定主用网络功能NF实例出现异常的情况下,向网络存储功能NRF网元发送候选NF实例获取请求;
接收NRF网元返回的多个候选NF实例,多个候选NF实例是NRF网元响应于候选NF实例获取请求确定得到;
基于预设策略,从多个候选NF实例中确定出一个备用NF实例进行业务处理,预设策略为根据实际业务处理需要预先设置的策略。
本公开实施例还提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序 被处理器执行时实现如前述任意一个方法实施例提供的业务处理方法的步骤。
需要说明的是,在本文中,诸如“第一”和“第二”等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括要素的过程、方法、物品或者设备中还存在另外的相同要素。
以上仅是本公开的具体实施方式,使本领域技术人员能够理解或实现本公开。对这些实施例的多种修改对本领域的技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本公开的精神或范围的情况下,在其它实施例中实现。因此,本公开将不会被限制于本文所示的这些实施例,而是要符合与本文所申请的原理和新颖特点相一致的最宽的范围。

Claims (10)

  1. 一种业务处理方法,应用于统一数据管理功能UDM网元,所述方法包括:
    在确定主用网络功能NF实例出现异常的情况下,向网络存储功能NRF网元发送候选NF实例获取请求;
    接收所述NRF网元返回的多个候选NF实例,所述多个候选NF实例是所述NRF网元响应于所述候选NF实例获取请求确定得到;
    基于预设策略,从所述多个候选NF实例中确定出一个备用NF实例进行业务处理,所述预设策略为根据实际业务处理需要预先设置的策略。
  2. 根据权利要求1所述的方法,其中,所述基于预设策略,从所述多个候选NF实例中确定出一个备用NF实例进行业务处理,包括:
    获取所述多个候选NF实例对应的参数信息,所述参数信息包括优先级、容量和负载等级;
    在所述多个候选NF实例中优先级最高的候选NF实例为一个的情况下,将所述多个候选NF实例中优先级最高的候选NF实例确定为所述备用NF实例,并通过所述备用NF实例进行业务处理;
    在所述多个候选NF实例中优先级最高的候选NF实例为多个的情况下,根据所述多个候选NF实例中优先级最高的候选NF实例对应的容量和负载等级,生成一随机数,并将所述随机数对应的数值区间所对应的所述优先级最高的候选NF实例确定为所述备用NF实例,通过所述备用NF实例进行业务处理;其中,所述随机数的取值范围的上限值为优先级因子之和,所述优先级因子将所述随机数的取值范围划分为多个数值区间,所述优先级因子根据所述容量和所述负载等级确定得到。
  3. 根据权利要求1所述的方法,其中,所述基于预设策略,从所述多个候选NF实例中确定出一个备用NF实例进行业务处理,包括:
    获取所述多个候选NF实例对应的业务响应成功率,所述业务响应成功率是基于所述多个候选NF实例中各候选NF实例成功返回业务响应的次数确定得到;
    将所述多个候选NF实例中业务响应成功率最高的候选NF实例确定为所述备用NF实例,并通过所述备用NF实例进行业务处理。
  4. 根据权利要求1所述的方法,其中,所述基于预设策略,从所述多个候选NF实例中确定出一个备用NF实例进行业务处理,包括:
    获取所述多个候选NF实例对应的业务响应时间,所述业务响应时间是基于所述多个候选NF实例中各候选NF实例的业务响应时间确定得到;
    将所述多个候选NF实例中业务响应时间最小的候选NF实例确定为所述备用NF实例,并通过所述备用NF实例进行业务处理。
  5. 根据权利要求1所述的方法,其中,所述基于预设策略,从所述多个候选NF实例中确定出一个备用NF实例进行业务处理,包括:
    获取所述多个候选NF实例对应的位置信息,所述位置信息是从所述NRF网元中获取得到,所述NRF网元用于在所述多个候选NF实例注册成功的情况下,将所述多个候选NF实例对应的位置信息进行存储;
    将所述多个候选NF实例中位置最近的候选NF实例确定为所述备用NF实例,并通过所述备用NF实例进行业务处理。
  6. 根据权利要求1所述的方法,其中,所述基于预设策略,从所述多个候选NF实例中确定出一个备用NF实例进行业务处理,包括:
    获取所述多个候选NF实例对应的标识信息,所述标识信息是在所述多个候选NF实例注册成功的情况下记录得到;
    将预先指定的目标标识信息对应的候选NF实例确定为所述备用NF实例,并通过所述备用NF实例进行业务处理。
  7. 根据权利要求1所述的方法,其中,确定所述主用NF实例出现异常的方式包括:
    基于接收到的所述主用NF实例的响应结果进行确定,其中,所述主用NF实例的响应结果是由所述主用NF实例基于所述UDM网元发送的业务消息确定得到,在所述主用NF实例异常的情况下,所述主用NF实例的响应结果为空;或者,
    基于接收到的所述主用NF实例的订阅消息进行确定,其中,所述主用NF实例的订阅消息是从所述NRF网元中订阅得到,所述NRF网元用于在所述主用NF实例注册成功的情况下实时对所述主用NF实例的状态进行监测。
  8. 一种业务处理装置,应用于统一数据管理功能UDM网元,所述装置包括:
    发送模块,用于在确定主用NF实例出现异常的情况下,向网络存储功能NRF网元发送候选NF实例获取请求;
    接收模块,用于接收所述NRF网元返回的多个候选NF实例,所述多个候选NF实例是所述NRF网元响应于所述候选NF实例获取请求确定得到;
    确定模块,用于基于预设策略,从所述多个候选NF实例中确定出一个备用NF实例进行业务处理,所述预设策略为根据实际业务处理需要预先设置的策略。
  9. 一种电子设备,包括处理器、通信接口、存储器和通信总线,其中,处理器,通信接口,存储器通过通信总线完成相互间的通信;
    存储器,用于存放计算机程序;
    处理器,用于执行存储器上所存放的程序时,实现权利要求1-7任一项所述的业务处理方法的步骤。
  10. 一种计算机可读存储介质,其上存储有计算机程序,其中,所述计算机程序被处理器执行时实现如权利要求1-7任一项所述的业务处理方法的步骤。
PCT/CN2023/106792 2022-07-11 2023-07-11 业务处理方法、装置、电子设备及存储介质 WO2024012450A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210814522.XA CN117425167A (zh) 2022-07-11 2022-07-11 业务处理方法、装置、电子设备及存储介质
CN202210814522.X 2022-07-11

Publications (1)

Publication Number Publication Date
WO2024012450A1 true WO2024012450A1 (zh) 2024-01-18

Family

ID=89525258

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/106792 WO2024012450A1 (zh) 2022-07-11 2023-07-11 业务处理方法、装置、电子设备及存储介质

Country Status (2)

Country Link
CN (1) CN117425167A (zh)
WO (1) WO2024012450A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109818766A (zh) * 2017-11-21 2019-05-28 中兴通讯股份有限公司 一种通信方法、网络功能实体、网络功能仓储及计算机可读存储介质
CN110167195A (zh) * 2018-02-13 2019-08-23 华为技术有限公司 通信方法和通信装置
CN110798360A (zh) * 2019-11-06 2020-02-14 腾讯科技(深圳)有限公司 Nwdaf网元的选择方法、装置、电子设备及可读存储介质
CN112188514A (zh) * 2019-07-05 2021-01-05 中兴通讯股份有限公司 一种业务处理方法、网络设备及存储介质
CN112566072A (zh) * 2019-09-26 2021-03-26 华为技术有限公司 一种基于nf的通信方法、设备及存储介质
CN114303348A (zh) * 2019-08-21 2022-04-08 瑞典爱立信有限公司 用于网络功能发现的方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109818766A (zh) * 2017-11-21 2019-05-28 中兴通讯股份有限公司 一种通信方法、网络功能实体、网络功能仓储及计算机可读存储介质
CN110167195A (zh) * 2018-02-13 2019-08-23 华为技术有限公司 通信方法和通信装置
CN112188514A (zh) * 2019-07-05 2021-01-05 中兴通讯股份有限公司 一种业务处理方法、网络设备及存储介质
CN114303348A (zh) * 2019-08-21 2022-04-08 瑞典爱立信有限公司 用于网络功能发现的方法和装置
CN112566072A (zh) * 2019-09-26 2021-03-26 华为技术有限公司 一种基于nf的通信方法、设备及存储介质
CN110798360A (zh) * 2019-11-06 2020-02-14 腾讯科技(深圳)有限公司 Nwdaf网元的选择方法、装置、电子设备及可读存储介质

Also Published As

Publication number Publication date
CN117425167A (zh) 2024-01-19

Similar Documents

Publication Publication Date Title
US11729260B2 (en) Internet-of-things resource access system and method
US20200288302A1 (en) Service Notification Method For Mobile Edge Host And Apparatus
CN108173976A (zh) 域名解析方法及装置
CN111597061A (zh) 一种客户端或服务端进行远程过程调用方法及装置
CN112218342A (zh) 一种实现核心网子切片容灾的方法、装置和系统
CN112732756B (zh) 数据查询方法、装置、设备及存储介质
CN113076212A (zh) 一种集群的管理方法、装置、设备及计算机可读存储介质
CN112416594A (zh) 一种微服务分配方法、电子设备和计算机存储介质
CN109982034A (zh) 视频监控系统中的访问请求处理方法及装置
CN114158030B (zh) 会话绑定方法、系统以及存储介质
WO2024012450A1 (zh) 业务处理方法、装置、电子设备及存储介质
CN110661836B (zh) 消息路由方法、装置及系统、存储介质
CN112583875B (zh) 一种资产扫描方法及装置
WO2019201111A1 (zh) 信息处理方法、装置、设备及计算机可读存储介质
EP4344259A1 (en) Session binding relationship processing method and apparatus, electronic device, and readable medium
CN114827017B (zh) Kafka集群的通信方法、装置、电子设备和存储介质
WO2012167657A1 (zh) 一种实现事件转发的方法及通用信息模型cim服务器
CN116647476A (zh) 网络管理方法、装置、计算机设备、存储介质和程序产品
US11638134B2 (en) Methods, systems, and computer readable media for resource cleanup in communications networks
TWI767427B (zh) 監控伺服器及其設備資源監控方法
CN115480934A (zh) 一种分布式数据处理的方法、装置、设备及储存介质
CN110830305B (zh) 无线设备接入wifi网络的方法、装置、电子设备及存储介质
CN111400327B (zh) 一种数据同步方法、装置、电子设备及存储介质
WO2016177103A1 (zh) 一种发现共享资源的方法、系统及装置
JPH08292922A (ja) ネットワーク管理装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23838941

Country of ref document: EP

Kind code of ref document: A1