WO2024109568A1 - Service request processing method and apparatus, electronic device, and storage medium - Google Patents

Service request processing method and apparatus, electronic device, and storage medium Download PDF

Info

Publication number
WO2024109568A1
WO2024109568A1 PCT/CN2023/131161 CN2023131161W WO2024109568A1 WO 2024109568 A1 WO2024109568 A1 WO 2024109568A1 CN 2023131161 W CN2023131161 W CN 2023131161W WO 2024109568 A1 WO2024109568 A1 WO 2024109568A1
Authority
WO
WIPO (PCT)
Prior art keywords
service discovery
service
request
failure result
network device
Prior art date
Application number
PCT/CN2023/131161
Other languages
French (fr)
Chinese (zh)
Inventor
屠强
夏天
管建池
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2024109568A1 publication Critical patent/WO2024109568A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/566Grouping or aggregating service requests, e.g. for unified processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements

Definitions

  • the present application belongs to the field of communication technology, and specifically relates to a method, device, electronic device and storage medium for processing a service request.
  • Service Discovery is the process by which a service consumer obtains the required service registration information from a network repository function (Net Repository Function, NRF) and calls the required service, where the service information stored in NRF is pre-registered by the service provider network function (NF).
  • NRF Network Repository Function
  • NF service provider network function
  • conventional service discovery is that after receiving a service request, a service consumer (such as access and mobility management function (AMF), session management function (SMF), policy control function (PCF), unified data management function (UDM) and other network elements) will initiate a service discovery request corresponding to the service request to NRF.
  • AMF access and mobility management function
  • SMF session management function
  • PCF policy control function
  • UDM unified data management function
  • service discovery failure may occur due to many reasons.
  • NRF will reply with a response of service discovery failure.
  • the consumer may initiate the same service discovery request to the NRF again. Repeated failed service discovery will have an impact on the network element, resulting in reduced performance of the network element.
  • the embodiments of the present application provide a method, device, electronic device and storage medium for processing a service request, which can solve the problem that repeated failed service discovery will have an impact on network elements, resulting in reduced performance of the network elements.
  • an embodiment of the present application provides a method for processing a service request, the method comprising: receiving a first service request; and when a first service discovery failure result corresponding to the first service request is stored, feeding back the first service discovery failure result.
  • an embodiment of the present application provides a device for processing a business request, the device comprising: a receiving module for receiving a first business request; an execution module for feeding back a first service discovery failure result when a first service discovery failure result corresponding to the first business request is stored.
  • an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or instruction stored in the memory and executable on the processor, wherein the program or instruction, when executed by the processor, implements the steps of the method described in the first aspect.
  • an embodiment of the present application provides a readable storage medium, on which a program or instruction is stored, and when the program or instruction is executed by a processor, the steps of the method described in the first aspect are implemented.
  • FIG1 is a flow chart of a method for processing a service request provided in an embodiment of the present application
  • FIG2 is a flow chart of another method for processing a service request provided in an embodiment of the present application.
  • FIG. 3 is a schematic diagram of the structure of a service request processing device provided in an embodiment of the present application.
  • FIG. 4 is a schematic diagram of the structure of an electronic device provided in an embodiment of the present application.
  • first, second, etc. in the specification and claims of this application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It should be understood that the data used in this way can be interchangeable under appropriate circumstances, so that the embodiments of the present application can be implemented in an order other than those illustrated or described here, and the objects distinguished by "first”, “second”, etc. are generally of one type, and the number of objects is not limited.
  • the first object can be one or more.
  • “and/or” in the specification and claims represents at least one of the connected objects, and the character “/" generally indicates that the objects associated with each other are in an "or” relationship.
  • FIG1 shows a method for processing a service request provided by an embodiment of the present application.
  • the method may be executed by a first network device for processing a service request.
  • the method includes the following steps.
  • Step 102 Receive a first service request.
  • the first network device may include but is not limited to an access and mobility management function (AMF), a session management function (SMF), a policy control function (PCF) or a unified data management (UDM) network device, and the first network device is not specifically limited herein.
  • the service request device may include a network device that can initiate a service request, such as a (Radio) Access Network (R)AN) or a user terminal (UE), and the service request device is not specifically limited herein.
  • R Radio) Access Network
  • UE user terminal
  • the service request device may receive the first service request sent by the service request device.
  • Step 104 When a first service discovery failure result corresponding to the first business request is stored, the first service discovery failure result is fed back.
  • a first service discovery request corresponding to the first business request will be initiated to the second network device corresponding to the first business request.
  • the first service discovery request is used to obtain the service registration information required for the first business request from the second network device and call the required service, wherein the second network device may be a network device that stores service registration information and services, such as a network repository function (Net Repository Function, NRF) network element.
  • NRF Network Repository Function
  • the second network device corresponding to the second business request is not specifically limited here.
  • the service information and services are pre-registered in the second network device by the service provider network function (Network Function, NF) network element.
  • Network Function Network Function
  • the first network device may store the result of the failure of the first service discovery request. If the first network device stores the result of the failure of the first service discovery request, it means that before receiving the first service request, the first network device has also received other service requests, and the other service requests match the first service request. The first network device has initiated a service discovery request corresponding to the above-mentioned other service requests to the second network device, and the result of the service discovery request corresponding to the other service request is failure. The first network device can store the service discovery failure result. Since the above-mentioned other service requests match the first service request, the service discovery failure result corresponding to the above-mentioned other service requests is also the first service discovery failure result corresponding to the first service request.
  • the first network device when the first network device receives the first service request and finds that the first service discovery failure result corresponding to the first service request is stored, it can directly feedback the first service discovery failure result to the service request device, and there is no need to send the first service discovery request to the second network device corresponding to the first service request.
  • the first service discovery failure result is fed back. Since the first service discovery failure result can be stored in advance, when it is determined that the first service discovery failure result corresponding to the first business has been stored, the first service discovery failure result can be directly fed back, and there is no need to send the first service discovery request to the second network device corresponding to the first service discovery request, thereby avoiding repeated impact of failed service discovery on the second network device corresponding to the first service discovery request, improving the performance of the second network device, and saving network resources.
  • the first service discovery failure result is fed back. Since the first service discovery failure result can be stored in advance, when it is determined that the first service discovery failure result corresponding to the first business has been stored, the first service discovery failure result can be directly fed back, thereby avoiding repeated impact of failed service discovery on the network element corresponding to the first business request, and improving the performance of the network element.
  • the feedback of the first service discovery failure result before the feedback of the first service discovery failure result, it also includes: receiving a second business request; sending a second service discovery request corresponding to the second business request to a second network device; and storing the second service discovery failure result when the second service discovery failure result sent by the second network device is received.
  • the first network device may initiate a second service discovery request to the second network device corresponding to the second service request according to the second service request. If the second service discovery request is successful, the service registration information required for the second service request can be obtained from the second network device and the required service can be called. If the second service discovery request fails, an error response replied by the second network device will be received. If the second service discovery request fails, the second service discovery failure result can be stored, wherein the storage of the second service discovery failure result can be local storage or local cache, and the storage validity period of the second service discovery failure result can be between 0 and 86400 seconds. It should be understood that the above-mentioned storage validity period of the second service discovery failure result is exemplary and does not limit the storage validity period of the second service discovery failure result in the embodiment of the present application.
  • the second network device does not allow the first network device to discover the service corresponding to the service discovery request, and the second network device returns a 403 Forbidden response; or due to an input data error in the Uniform Resource Locator (URL) query parameter in the service discovery request, the service discovery request fails in the second network device, and the second network device returns a 400 Bad Request status code; or due to an internal error in the second network device, the service discovery request fails on the second network device, and the second network device returns a 400 Bad Request status code.
  • URL Uniform Resource Locator
  • the second network device will return a 500 Internal Server Error status code; or if the service discovery returns successfully, but in the second network device, the configuration information (NF Profile List) of the NF instance providing the service list is empty, this scenario is also marked as a service discovery failure.
  • the first service discovery failure result when a first service discovery failure result corresponding to the first business request is stored, the first service discovery failure result is fed back, including: when the first business request matches the second business request, determining the second service discovery failure result as the result of the first service discovery; and feeding back the result of the first service discovery.
  • the received first service request matches the second service request, it means that the first service discovery request initiated based on the first service request also matches the second service discovery request initiated based on the second service request. Therefore, when the second service discovery failure result corresponding to the second service request is stored, the second service discovery failure result can be used as the result of the first service discovery to be fed back to the service request device, and there is no need to send the first service discovery corresponding to the first service request to the second network device.
  • the failure result of the second service discovery is determined as the result of the first service discovery; the result of the first service discovery is fed back, thereby avoiding the failed service discovery from repeatedly impacting the second network device corresponding to the first service discovery request, thereby improving the performance of the second network device and saving network resources.
  • the received first service request matches the second service request, it indicates that the first service discovery request initiated according to the first service request matches the second service discovery request initiated according to the second service request.
  • the second service discovery request also matches. Therefore, when the second service discovery failure result corresponding to the second business request is stored, it means that the result of the first service discovery request initiated according to the first business request will also fail. Therefore, the stored second service discovery request failure result can be determined as the first service discovery request failure result for feedback.
  • the second service discovery failure result is determined as the first service discovery failure result; the first service discovery failure result is fed back, thereby avoiding the failed service discovery from repeatedly impacting the second network device corresponding to the first service discovery request, thereby improving the performance of the second network device and saving network resources.
  • the first service discovery failure result when a first service discovery failure result corresponding to the first business request is stored, the first service discovery failure result is fed back, including: when the first business request matches the second business request, the storage of the second service discovery failure result does not exceed a predetermined time threshold, and the number of times the second service discovery failure result is fed back does not exceed a first predetermined number threshold, determining the second service discovery failure result as the result of the first service discovery; and feeding back the result of the first service discovery.
  • the storage of the second service discovery failure result does not exceed the predetermined time threshold, and the number of times the second service discovery failure result is fed back does not exceed the first predetermined number threshold, it means that the first service discovery request initiated according to the first service request and the second service discovery request initiated according to the second service request also match. Therefore, when the second service discovery failure result corresponding to the second service request is stored, the second service discovery failure result can be fed back to the service request device as the result of the first service discovery request, and there is no need to send the first service discovery corresponding to the first service request to the second network device.
  • the storage of the second service discovery failure result does not exceed the predetermined time threshold, and the number of times the second service discovery failure result is fed back does not exceed the first predetermined number threshold, the second service discovery failure result is determined as the result of the first service discovery; the result of the first service discovery is fed back, thereby avoiding the failed service discovery from repeatedly impacting the second network device corresponding to the first service discovery request, improving the performance of the second network device, and saving network time. Network resources.
  • the storage of the second service discovery failure result does not exceed a predetermined time threshold, and the number of times the second service discovery failure result is fed back does not exceed a first predetermined number threshold, the second service discovery failure result is determined as the first service discovery failure result; and the first service discovery failure result is fed back.
  • the second service discovery failure result can be fed back to the service request device as the result of the first service discovery request, that is, the second service discovery failure result is determined as the first service discovery failure result and fed back to the service request device, and there is no need to send the first service discovery corresponding to the first service request to the second network device.
  • the storage of the second service discovery failure result does not exceed the predetermined time threshold, and the number of times the second service discovery failure result is fed back does not exceed the first predetermined number threshold, the second service discovery failure result is determined as the first service discovery failure result; the first service discovery failure result is fed back, thereby avoiding the failed service discovery from repeatedly impacting the second network device corresponding to the first service discovery request, thereby improving the performance of the second network device and saving network resources.
  • the method further includes: sending a first service discovery request corresponding to the first service request to a second network device when at least one of the following conditions is met; the storage time of the second service discovery failure result exceeds a predetermined time threshold; the number of times the second service discovery failure result is fed back exceeds a first predetermined number threshold.
  • the first service discovery failure result if the first service request is received and the first service request matches the second service request, that is, the first service request initiated according to the first service request If the service discovery request matches the second service discovery request initiated according to the second business request, it can be determined first whether the time for storing the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold; if the time for storing the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold, the first service discovery request corresponding to the first business request can be sent to the second network device.
  • the first service discovery request corresponding to the first business request is sent to the second network device, which can reduce the impact of the service discovery request on the second network device and save network resources.
  • the first service discovery request can be initiated to the second network device if the conditions are met, and then the service registration information and the service to be called required for the first business request can be obtained if the first service discovery is successful.
  • the second service discovery failure result is stored, including: when the number of times the second service discovery failure result is received exceeds a second predetermined number threshold, the second service discovery failure result is stored.
  • the received second service discovery failure results can be counted.
  • the counting of the second service discovery failure results can be that the first network device counts the number of consecutive second service discovery failure results received.
  • the second predetermined number threshold can be set according to actual needs and is not specifically limited here. If the counted number of second service discovery request failure results does not exceed the second predetermined number threshold, the second service discovery failure result will not be stored. If the counted number of second service discovery request failures exceeds the second predetermined number threshold, the second service discovery failure result can be stored.
  • FIG2 is a flow chart of another method for processing a service request provided in an embodiment of the present application. As shown in FIG2 , the method for processing a service request includes the following steps.
  • Step 1 Receive a second service request.
  • the first network device 202 may include but is not limited to a network device of an AMF network element, an SMF network element, a PCF network element or a UDM network element, and the first network device 202 is not specifically limited herein.
  • the service request device 201 may include a network device such as an (R)AN or a user terminal that can initiate a service request, and the service request device 201 is not specifically limited herein.
  • the service request device 201 may receive the first service request sent by the service request device 201.
  • Step 2 Send a second service discovery request.
  • the second network device 203 may be a network device including an NRF network element and the like storing service registration information and services, and the second network device 203 corresponding to the second service request is not specifically limited herein.
  • the first network device 202 may initiate a second service discovery request to the second network device 203 corresponding to the second service request according to the second service request. If the second service discovery request is successful, the service registration information required for the second service request may be obtained from the second network device 203 and the required service may be called. If the second service discovery request fails, an error response replied by the second network device 203 may be received.
  • Step 3 Receive a second service discovery failure result.
  • the second service discovery failure result sent by the second network device 203 can be received.
  • the second network device 203 does not allow the first network device 202 to discover the service corresponding to the service discovery request, and the second network device 203 will return a 403 Forbidden response; or due to an input data error in the URL query parameter in the service discovery request, the service discovery request fails in the second network device 203, and the second network device 203 will return a 400 Bad Request status code; or due to an internal error in the second network device 203, the service discovery request fails in the second network device 203, and the second network device 203 will return a 400 Bad Request status code.
  • the second network device 203 will return a 500 Internal Server Error status code; or if the service discovery returns successfully, but in the second network device 203, the NF Profile List of the service list provided by the NF is empty, or the configuration information of the NF instance of the service list provided by the NF is empty, this situation is also marked as a service discovery failure.
  • Step 4 Store the second service discovery failure result.
  • the second service discovery failure result can be counted.
  • the second service discovery failure result can be counted by the first network device 202 counting the number of second service discovery failure results received consecutively.
  • the second predetermined number threshold can be set according to actual needs and is not specifically limited here. If the counted number of second service discovery request failures does not exceed the second predetermined number threshold, the second service discovery failure result is not stored. If the counted number of second service discovery request failures exceeds the second predetermined number threshold, the second service discovery failure result can be stored. This can avoid erroneous storage caused by the failure of a single service discovery request.
  • Step 5 Receive a first service request.
  • the first network device 202 may receive a first service request initiated by the service request device 201 .
  • Step 6 Feedback the result of the second service discovery failure.
  • the first service discovery request initiated according to the first business request also matches the second service discovery request.
  • the second service discovery failure result is stored in the first network device 202, it can be determined whether the time for storing the second service discovery failure result exceeds the predetermined time threshold or whether the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold. If the time for storing the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold, the first service discovery request corresponding to the first business request can be sent to the second network device 203. If the above conditions are not met, then when the first service request is received, the stored first service discovery failure result (second service discovery failure result) may be directly fed back to the service request device 201 .
  • Step 7 Receive the third service request.
  • the first network device 202 may receive the third service request initiated by the service request device 201 .
  • Step 8 Send a third service discovery request.
  • the third service discovery request initiated based on the third business request also matches the second service discovery request.
  • the second service discovery failure result is stored in the first network device 202, it can be determined whether the time for storing the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold. If the time for storing the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold, the third service discovery request corresponding to the third business request can be sent to the second network device 203. If the above conditions are met, the third service discovery request can be sent to the second network device 203.
  • Step 9 Receive the third service discovery success result.
  • the third service discovery success result may include service registration information required by the third service request and a service to be called.
  • Step 10 Feedback the successful result of the third service discovery.
  • the third service discovery success result may be fed back to the service request device 201 .
  • the first service discovery failure result can be directly fed back, and there is no need to send the first service discovery request to the second network device 203 corresponding to the first service discovery request, thereby avoiding the failed service discovery from repeatedly impacting the second network device 203 corresponding to the first service discovery request, improving the performance of the second network device 203, saving network resources, and,
  • the storage time of the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number of times, the received third service discovery request that matches the second service discovery request can be sent to the second network device 203 to obtain service registration information and services.
  • Example 1 (R)AN initiates a registration service request to AMF, and AMF initiates a service discovery request to NRF. However, NRF does not find a NF that matches the query parameters in the service discovery request, and NRF returns a "403 Forbidden" response. If the result of initiating a service discovery request for five consecutive times is still a failure, the service discovery failure result can be stored, and a validity period can be set for the storage, such as 86400 seconds. When a new service request triggers the above service discovery request, the service discovery failure result "403 Forbidden" is used for feedback within the storage validity period. When the storage validity period ends or the service discovery failure result has been fed back 1000 times in a row, the stored service discovery failure result becomes invalid, and service discovery can be directly initiated to NRF.
  • Example 2 (R)AN initiates a registration service request to SMF, and SMF sends a service discovery request to NRF. At this time, NRF replies "200OK", but the NF Profile List carried is empty, and it is judged that the service discovery failed.
  • the service discovery failure result can be stored, and a validity period can be set for the storage, such as 43200 seconds.
  • the above-mentioned service discovery failure result "404" is used for feedback within the storage validity period.
  • the storage validity period ends or the service discovery failure result has been fed back 500 times in a row, the storage is invalid, and a service discovery request can be directly initiated to NRF.
  • Example 3 (R)AN initiates a registration service request to AMF, and AMF initiates a service discovery request to NRF. Due to an internal error in NRF, service discovery fails, and NRF returns a "500Internal Server Error" status code.
  • the service discovery request fails three times in a row the service discovery failure result is stored, and a validity period can be set for the storage, such as 21600 seconds.
  • the storage validity period expires and a new service triggers the service discovery request AMF can directly initiate a service discovery request to NRF even if the continuous feedback of the service discovery failure result does not reach the preset number of times.
  • Example 4 (R)AN initiates a registration service request to AMF, and SMF initiates a service discovery request to NRF. Due to the input data error of the URI query parameter in the service discovery request, the service discovery fails at NRF, and NRF returns a "400 Bad Request" status code.
  • the service discovery fails three times in a row the service discovery failure result is stored, and a validity period is set for the storage, such as 43200 seconds.
  • the storage of the service discovery failure result will become invalid even if the storage validity period has not expired.
  • SMF directly initiates service discovery to NRF. When the number of service discovery failures reaches 3 times again, the service discovery failure result is stored again.
  • the execution subject of the method for processing a business request provided in the embodiment of the present application may be a processing device for a business request, or a control module in the processing device for a business request for executing the method for processing a business request.
  • the processing device for processing a business request is taken as an example to illustrate the processing device for processing a business request provided in the embodiment of the present application.
  • Fig. 3 is a schematic diagram of the structure of a device for processing a service request according to an embodiment of the present invention.
  • the device for processing a service request 300 comprises: a receiving module 310 and an executing module 320 .
  • the receiving module 310 is used to receive a first service request; the executing module 320 is used to feed back the first service discovery failure result when a first service discovery failure result corresponding to the first service request is stored.
  • the execution module 320 is further used to receive a second business request; send a second service discovery request corresponding to the second business request to a second network device; and store the second service discovery failure result when a second service discovery failure result sent by the second network device is received.
  • the execution module 320 is used to determine the second service discovery failure result as the result of the first service discovery when the first service request matches the second service request; and to feed back the result of the first service discovery.
  • the execution module 320 is configured to determine the second service discovery failure result as the result of the first service discovery if the first service request matches the second service request and the storage of the second service discovery failure result does not exceed a predetermined time threshold; Feedback the result of the first service discovery.
  • the execution module 320 is also used to send a first service discovery request corresponding to the first business request to the second network device when at least one of the following conditions is met; the storage time of the second service discovery failure result exceeds a predetermined time threshold; the number of times the first service discovery failure result is fed back exceeds a first predetermined number threshold.
  • the execution module 320 is configured to store the second service discovery failure result when the number of times the second service discovery failure result is received exceeds a second predetermined number threshold.
  • the processing device for the service request in the embodiment of the present application can be a device, or a component, integrated circuit, or chip in a terminal.
  • the device can be a mobile electronic device or a non-mobile electronic device.
  • the mobile electronic device can be a mobile phone, a tablet computer, a laptop computer, a PDA, an in-vehicle electronic device, a wearable device, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a netbook or a personal digital assistant (personal digital assistant, PDA), etc.
  • the non-mobile electronic device can be a server, a network attached storage (Network Attached Storage, NAS), a personal computer (personal computer, PC), a television (television, TV), a teller machine or a self-service machine, etc., which is not specifically limited in the embodiment of the present application.
  • Network Attached Storage Network Attached Storage
  • the service request processing device in the embodiment of the present application may be a device having an operating system.
  • the operating system may be an Android operating system, an iOS operating system, or other possible operating systems, which are not specifically limited in the embodiment of the present application.
  • the service request processing device provided in the embodiment of the present application can implement each process implemented by the method embodiments of Figures 1 to 2, and will not be described again here to avoid repetition.
  • an embodiment of the present application further provides an electronic device 400, including a processor 401 and a memory 402, and the memory 402 stores a program or instruction that can be executed on the processor 401, and when the program or instruction is executed by the processor 401, it implements: receiving a first business request; and in the case of storing a first service discovery failure result corresponding to the first business request, feeding back the first service discovery failure result.
  • a second service request is received before the first service discovery failure result is fed back; a second service discovery request corresponding to the second service request is sent to a second network device; and upon receiving the second service discovery failure result sent by the second network device, the second service discovery failure result is stored.
  • the second service discovery failure result is determined as the result of the first service discovery; and the result of the first service discovery is fed back.
  • the second service discovery failure result is determined as the result of the first service discovery; and the result of the first service discovery is fed back.
  • a first service discovery request corresponding to the first service request is sent to the second network device when at least one of the following conditions is met; the storage time of the second service discovery failure result exceeds a predetermined time threshold; the number of times the first service discovery failure result is fed back exceeds a first predetermined number threshold.
  • the second service discovery failure result is stored.
  • the specific execution steps can refer to the various steps of the above-mentioned business request processing method embodiment, and can achieve the same technical effect. To avoid repetition, they will not be repeated here.
  • the electronic devices in the embodiments of the present application include: servers, terminals or other devices except terminals.
  • the above electronic device structure does not constitute a limitation on the electronic device.
  • the electronic device may include more or fewer components than shown in the figure, or combine certain components, or arrange the components differently.
  • the input unit may include a graphics processing unit (GPU) and a microphone
  • the display unit may be configured in the form of a liquid crystal display, an organic light emitting diode, etc.
  • the user input unit includes at least one of a touch panel and other input devices.
  • the touch panel is also called Other input devices may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which will not be described in detail here.
  • the memory can be used to store software programs and various data.
  • the memory may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, an image playback function, etc.), etc.
  • the memory may include a volatile memory or a non-volatile memory, or the memory may include both volatile and non-volatile memories.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
  • ROM read-only memory
  • PROM programmable read-only memory
  • EPROM erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • flash memory a flash memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • the processor may include one or more processing units; optionally, the processor integrates an application processor and a modem processor, wherein the application processor mainly processes operations related to the operating system, user interface, and application programs, and the modem processor mainly processes wireless communication signals, such as a baseband processor. It is understandable that the modem processor may not be integrated into the processor.
  • An embodiment of the present application also provides a readable storage medium, on which a program or instruction is stored.
  • a program or instruction is stored.
  • the program or instruction is executed by a processor, each process of the above-mentioned business request processing method embodiment is implemented, and the same technical effect can be achieved. To avoid repetition, it will not be repeated here.
  • the processor is the processor in the electronic device described in the above embodiment.
  • the readable storage medium includes a computer readable storage medium, such as ROM, RAM, magnetic disk or optical disk.
  • the technical solution of the present application can be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, a magnetic disk, or an optical disk), and includes a number of instructions for a terminal (which can be a mobile phone, a computer, a server, or a network device, etc.) to execute the methods described in each embodiment of the present application.
  • a storage medium such as ROM/RAM, a magnetic disk, or an optical disk
  • a terminal which can be a mobile phone, a computer, a server, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present application relates to the technical field of communications, and discloses a service request processing method and apparatus, an electronic device, and a storage medium. The method comprises: receiving a first service request; and when a first service discovery failure result corresponding to the first service request is stored, feeding back the first service discovery failure result.

Description

业务请求的处理方法、装置、电子设备及存储介质Business request processing method, device, electronic device and storage medium
相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS
本申请要求在2022年11月25日提交中国专利局、申请号为202211497902.1、发明名称为“业务请求的处理方法、装置、电子设备及存储介质”的中国专利申请的优先权,该中国专利申请的全部内容通过引用包含于此。This application claims priority to a Chinese patent application filed with the Chinese Patent Office on November 25, 2022, with application number 202211497902.1 and invention name “Method, device, electronic device and storage medium for processing business requests”. The entire contents of the Chinese patent application are incorporated herein by reference.
技术领域Technical Field
本申请属于通信技术领域,具体涉及一种业务请求的处理方法、装置、电子设备及存储介质。The present application belongs to the field of communication technology, and specifically relates to a method, device, electronic device and storage medium for processing a service request.
背景技术Background technique
服务发现(Service Discover)是服务消费者(Service Consumer)从网络仓储功能(Net Repository Function,NRF)中获取需要的服务注册信息并调用所需服务的过程,其中NRF存储的服务信息由服务提供者网络功能(Network Function,NF)预先注册。目前常规的服务发现是服务消费者(例如接入和移动性管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management function,SMF)、策略控制功能(Policy Control function,PCF)、统一数据管理功能(Unified Data Management,UDM)等网元)接收到业务请求后,会向NRF发起与业务请求对应的服务发现请求,在服务消费者从NRF中获取需要的服务注册信息并调用所需服务过程中,由于诸多原因可能会出现服务发现失败,当服务发现失败时NRF会回复服务发现失败的响应。Service Discovery is the process by which a service consumer obtains the required service registration information from a network repository function (Net Repository Function, NRF) and calls the required service, where the service information stored in NRF is pre-registered by the service provider network function (NF). At present, conventional service discovery is that after receiving a service request, a service consumer (such as access and mobility management function (AMF), session management function (SMF), policy control function (PCF), unified data management function (UDM) and other network elements) will initiate a service discovery request corresponding to the service request to NRF. In the process of obtaining the required service registration information from NRF and calling the required service, service discovery failure may occur due to many reasons. When service discovery fails, NRF will reply with a response of service discovery failure.
服务发现失败后消费者可能会再次对NRF发起相同的服务发现请求,重复发起失败的服务发现会对网元产生冲击,导致网元的性能降低。 After a service discovery failure, the consumer may initiate the same service discovery request to the NRF again. Repeated failed service discovery will have an impact on the network element, resulting in reduced performance of the network element.
发明内容Summary of the invention
本申请实施例提供一种业务请求的处理方法、装置、电子设备及存储介质,能够解决重复发起失败的服务发现会对网元产生冲击,导致网元的性能降低的问题。The embodiments of the present application provide a method, device, electronic device and storage medium for processing a service request, which can solve the problem that repeated failed service discovery will have an impact on network elements, resulting in reduced performance of the network elements.
第一方面,本申请实施例提供了一种业务请求的处理方法,该方法包括:接收第一业务请求;在存储有所述第一业务请求对应的第一服务发现失败结果的情况下,反馈所述第一服务发现失败结果。In a first aspect, an embodiment of the present application provides a method for processing a service request, the method comprising: receiving a first service request; and when a first service discovery failure result corresponding to the first service request is stored, feeding back the first service discovery failure result.
第二方面,本申请实施例提供了一种业务请求的处理装置,该装置包括:接收模块,用于接收第一业务请求;执行模块,用于在存储有所述第一业务请求对应的第一服务发现失败结果的情况下,反馈所述第一服务发现失败结果。In a second aspect, an embodiment of the present application provides a device for processing a business request, the device comprising: a receiving module for receiving a first business request; an execution module for feeding back a first service discovery failure result when a first service discovery failure result corresponding to the first business request is stored.
第三方面,本申请实施例提供了一种电子设备,该电子设备包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or instruction stored in the memory and executable on the processor, wherein the program or instruction, when executed by the processor, implements the steps of the method described in the first aspect.
第四方面,本申请实施例提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤。In a fourth aspect, an embodiment of the present application provides a readable storage medium, on which a program or instruction is stored, and when the program or instruction is executed by a processor, the steps of the method described in the first aspect are implemented.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是本申请实施例提供的一种业务请求的处理方法的流程示意图;FIG1 is a flow chart of a method for processing a service request provided in an embodiment of the present application;
图2是本申请实施例提供的另一种业务请求的处理方法的流程示意图;FIG2 is a flow chart of another method for processing a service request provided in an embodiment of the present application;
图3是本申请实施例提供的一种业务请求的处理装置的结构示意图;3 is a schematic diagram of the structure of a service request processing device provided in an embodiment of the present application;
图4是本申请实施例提供的一种电子设备的结构示意图。FIG. 4 is a schematic diagram of the structure of an electronic device provided in an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行 清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be described below in conjunction with the accompanying drawings in the embodiments of the present application. Clearly and completely described, it is obvious that the described embodiments are part of the embodiments of the present application, not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the present application.
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”等所区分的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”,一般表示前后关联对象是一种“或”的关系。The terms "first", "second", etc. in the specification and claims of this application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It should be understood that the data used in this way can be interchangeable under appropriate circumstances, so that the embodiments of the present application can be implemented in an order other than those illustrated or described here, and the objects distinguished by "first", "second", etc. are generally of one type, and the number of objects is not limited. For example, the first object can be one or more. In addition, "and/or" in the specification and claims represents at least one of the connected objects, and the character "/" generally indicates that the objects associated with each other are in an "or" relationship.
下面结合附图,通过具体的实施例及其应用场景对本申请实施例提供的业务请求的处理方法、装置、电子设备及存储介质进行详细地说明。The following, in conjunction with the accompanying drawings, describes in detail the service request processing method, device, electronic device and storage medium provided by the embodiments of the present application through specific embodiments and their application scenarios.
图1示出本申请的一个实施例提供的一种业务请求的处理方法,该方法可以由处理业务请求的第一网络设备执行,该方法包括如下步骤。FIG1 shows a method for processing a service request provided by an embodiment of the present application. The method may be executed by a first network device for processing a service request. The method includes the following steps.
步骤102:接收第一业务请求。Step 102: Receive a first service request.
具体的,第一网络设备可以包括但不限于接入和移动性管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management function,SMF)、策略控制功能(Policy Control function,PCF)或者统一数据管理(Unified Data Management,UDM)的网络设备,在此不对第一网络设备作具体限定。业务请求设备可以包括(无线)接入网((Radio)Access Network,(R)AN)或者用户终端(User Equipment,UE)等可以发起业务请求的网络设备,在此不对业务请求设备作具体限定,在业务请求设备向第一网络设备发起第一业务请求的情况下,第一网络设备可以接收业务请求设备发送的第一业务请求。Specifically, the first network device may include but is not limited to an access and mobility management function (AMF), a session management function (SMF), a policy control function (PCF) or a unified data management (UDM) network device, and the first network device is not specifically limited herein. The service request device may include a network device that can initiate a service request, such as a (Radio) Access Network (R)AN) or a user terminal (UE), and the service request device is not specifically limited herein. When the service request device initiates a first service request to the first network device, the first network device may receive the first service request sent by the service request device.
步骤104:在存储有所述第一业务请求对应的第一服务发现失败结果的情况下,反馈所述第一服务发现失败结果。 Step 104: When a first service discovery failure result corresponding to the first business request is stored, the first service discovery failure result is fed back.
通常情况下,在接收到第一业务请求之后,会向第一业务请求对应的第二网络设备发起与第一业务请求对应的第一服务发现请求,第一服务发现请求用于从第二网络设备中获取第一业务请求需要的服务注册信息并调用需要的服务,其中,第二网络设备可以是包括网络仓储功能(Net Repository Function,NRF)网元等保存有服务注册信息和服务的网络设备,在此不对第二业务请求对应的第二网络设备作具体限定,服务信息和服务由服务提供者网络功能(Network Function,NF)网元预先在第二网络设备中注册。Normally, after receiving the first business request, a first service discovery request corresponding to the first business request will be initiated to the second network device corresponding to the first business request. The first service discovery request is used to obtain the service registration information required for the first business request from the second network device and call the required service, wherein the second network device may be a network device that stores service registration information and services, such as a network repository function (Net Repository Function, NRF) network element. The second network device corresponding to the second business request is not specifically limited here. The service information and services are pre-registered in the second network device by the service provider network function (Network Function, NF) network element.
在本申请实施例中,第一网络设备中可能会存储有第一服务发现请求失败的结果,若第一网络设备存储有第一服务发现请求失败的结果,说明在接收到第一业务请求之前,第一网络设备还接收过其他业务请求,该其他业务请求与第一业务请求匹配,第一网络设备向第二网络设备发起过与上述其他业务请求对应的服务发现请求,并且其他业务请求对应的服务发现请求的结果为失败,第一网络设备可以将该服务发现失败结果进行存储,由于上述其他业务请求与第一业务请求匹配,因此,上述其他业务请求对应的服务发现失败结果也即第一业务请求对应的第一服务发现失败结果,因此,当第一网络设备接收到第一业务请求之后,发现存储有第一业务请求对应的第一服务发现失败结果的情况下,可以直接向业务请求设备反馈第一服务发现失败结果,不需要再将第一服务发现请求发送至第一业务请求对应的第二网络设备。In an embodiment of the present application, the first network device may store the result of the failure of the first service discovery request. If the first network device stores the result of the failure of the first service discovery request, it means that before receiving the first service request, the first network device has also received other service requests, and the other service requests match the first service request. The first network device has initiated a service discovery request corresponding to the above-mentioned other service requests to the second network device, and the result of the service discovery request corresponding to the other service request is failure. The first network device can store the service discovery failure result. Since the above-mentioned other service requests match the first service request, the service discovery failure result corresponding to the above-mentioned other service requests is also the first service discovery failure result corresponding to the first service request. Therefore, when the first network device receives the first service request and finds that the first service discovery failure result corresponding to the first service request is stored, it can directly feedback the first service discovery failure result to the service request device, and there is no need to send the first service discovery request to the second network device corresponding to the first service request.
在本申请实施例中,通过接收第一业务请求;在存储有第一业务请求对应的第一服务发现失败结果的情况下,反馈第一服务发现失败结果,由于可以预先对第一服务发现失败结果进行存储,因此,在确定已经存储了第一业务对应的第一服务发现失败结果的情况下,可以直接将第一服务发现失败结果进行反馈,不需要再将第一服务发现请求发送至第一服务发现请求对应的第二网络设备,进而避免了失败的服务发现重复对第一服务发现请求对应的第二网络设备进行冲击,提升了第二网络设备的性能,节约了网络资源。In an embodiment of the present application, by receiving a first business request, and in a case where a first service discovery failure result corresponding to the first business request is stored, the first service discovery failure result is fed back. Since the first service discovery failure result can be stored in advance, when it is determined that the first service discovery failure result corresponding to the first business has been stored, the first service discovery failure result can be directly fed back, and there is no need to send the first service discovery request to the second network device corresponding to the first service discovery request, thereby avoiding repeated impact of failed service discovery on the second network device corresponding to the first service discovery request, improving the performance of the second network device, and saving network resources.
在本申请实施例中,通过接收第一业务请求;在存储有第一业务请求对 应的第一服务发现失败结果的情况下,反馈第一服务发现失败结果,由于可以预先对第一服务发现失败结果进行存储,因此,在确定已经存储了第一业务对应的第一服务发现失败结果的情况下,可以直接将第一服务发现失败结果进行反馈,避免了失败的服务发现重复对第一业务请求对应的网元进行冲击,提升了网元的性能。In the embodiment of the present application, by receiving a first service request; storing the first service request In the case of a failure result of the first service discovery, the first service discovery failure result is fed back. Since the first service discovery failure result can be stored in advance, when it is determined that the first service discovery failure result corresponding to the first business has been stored, the first service discovery failure result can be directly fed back, thereby avoiding repeated impact of failed service discovery on the network element corresponding to the first business request, and improving the performance of the network element.
在一种实现方式中,在所述反馈所述第一服务发现失败结果之前,还包括:接收第二业务请求;向第二网络设备发送与所述第二业务请求对应的第二服务发现请求;在接收到所述第二网络设备发送的第二服务发现失败结果的情况下,存储所述第二服务发现失败结果。In one implementation, before the feedback of the first service discovery failure result, it also includes: receiving a second business request; sending a second service discovery request corresponding to the second business request to a second network device; and storing the second service discovery failure result when the second service discovery failure result sent by the second network device is received.
在本申请实施例中,在接收到业务请求设备发送的第二业务请求之后,若第一网络设备未存储有第二业务对应的第二服务发现失败结果,则第一网络设备可以根据第二业务请求向第二业务请求对应的第二网络设备发起第二服务发现请求,在第二服务发现请求成功的情况下,可以从第二网络设备中获取第二业务请求需要的服务注册信息并调用需要的服务,在第二服务发现请求失败的情况下,会接收到第二网络设备回复的错误响应,可以在第二服务发现请求失败的情况下,对第二服务发现失败结果进行存储,其中,对第二服务发现失败结果进行存储可以是在本地进行存储,也可以是在本地进行缓存,对第二服务发现失败结果的存储有效期可以在0~86400秒之间,应理解,上述对第二服务发现失败结果的存储有效期是示例性的,并不对本申请实施例中的第二服务发现失败结果的存储有效期进行限定。In an embodiment of the present application, after receiving the second service request sent by the service request device, if the first network device does not store the second service discovery failure result corresponding to the second service, the first network device may initiate a second service discovery request to the second network device corresponding to the second service request according to the second service request. If the second service discovery request is successful, the service registration information required for the second service request can be obtained from the second network device and the required service can be called. If the second service discovery request fails, an error response replied by the second network device will be received. If the second service discovery request fails, the second service discovery failure result can be stored, wherein the storage of the second service discovery failure result can be local storage or local cache, and the storage validity period of the second service discovery failure result can be between 0 and 86400 seconds. It should be understood that the above-mentioned storage validity period of the second service discovery failure result is exemplary and does not limit the storage validity period of the second service discovery failure result in the embodiment of the present application.
第二服务发现请求失败的因素可能存在多种,例如第二网络设备不允许第一网络设备发现服务发现请求对应的服务,第二网络设备会返回403禁止(403 Forbidden)响应;或者由于服务发现请求中统一资源定位符(Uniform Resource Locator,URL)查询参数中的输入数据错误,导致在第二网络设备中服务发现请求失败,第二网络设备会返回400错误请求(400 Bad Request)状态码;或者由于第二网络设备内部错误导致在第二网络设备上服务发现请 求失败,第二网络设备会返回500网络服务器故障(500 Internal Server Error)状态码;或者服务发现返回成功,但是第二网络设备中,NF提供服务列表的NF实例的配置信息(NF Profile List)为空,该场景也被标记为服务发现失败。There may be many factors that cause the second service discovery request to fail. For example, the second network device does not allow the first network device to discover the service corresponding to the service discovery request, and the second network device returns a 403 Forbidden response; or due to an input data error in the Uniform Resource Locator (URL) query parameter in the service discovery request, the service discovery request fails in the second network device, and the second network device returns a 400 Bad Request status code; or due to an internal error in the second network device, the service discovery request fails on the second network device, and the second network device returns a 400 Bad Request status code. If the request fails, the second network device will return a 500 Internal Server Error status code; or if the service discovery returns successfully, but in the second network device, the configuration information (NF Profile List) of the NF instance providing the service list is empty, this scenario is also marked as a service discovery failure.
这样,通过接收第二业务请求;向第二网络设备发送与第二业务请求对应的第二服务发现请求;在接收到第二网络设备发送的第二服务发现失败结果的情况下,存储第二服务发现失败结果,进而可以在再次接收到与第二业务请求匹配的业务请求的情况下,不需要再次向第二网络设备发起第二服务发现请求,可以直接将存储的第二服务发现失败结果进行反馈,进而避免了失败的服务发现重复对第一服务发现请求对应的第二网络设备进行冲击,提升了第二网络设备的性能,节约了网络资源。In this way, by receiving a second business request; sending a second service discovery request corresponding to the second business request to the second network device; and storing the second service discovery failure result when a second service discovery failure result sent by the second network device is received, and then when a business request matching the second business request is received again, there is no need to initiate a second service discovery request to the second network device again, and the stored second service discovery failure result can be directly fed back, thereby avoiding repeated impact of failed service discovery on the second network device corresponding to the first service discovery request, thereby improving the performance of the second network device and saving network resources.
在一种实现方式中,在存储有所述第一业务请求对应的第一服务发现失败结果的情况下,反馈所述第一服务发现失败结果,包括:在所述第一业务请求与所述第二业务请求匹配的情况下,将所述第二服务发现失败结果确定为所述第一服务发现的结果;反馈所述第一服务发现的结果。In one implementation, when a first service discovery failure result corresponding to the first business request is stored, the first service discovery failure result is fed back, including: when the first business request matches the second business request, determining the second service discovery failure result as the result of the first service discovery; and feeding back the result of the first service discovery.
具体的,若接收到的第一业务请求与第二业务请求匹配,说明根据第一业务请求发起的第一服务发现请求与根据第二业务请求发起的第二服务发现请求也匹配,因此,在存储有第二业务请求对应的第二服务发现失败结果的情况下,可以将第二服务发现失败结果作为第一服务发现的结果反馈至业务请求设备,不需要再将第一业务请求对应的第一服务发现发送至第二网络设备。Specifically, if the received first service request matches the second service request, it means that the first service discovery request initiated based on the first service request also matches the second service discovery request initiated based on the second service request. Therefore, when the second service discovery failure result corresponding to the second service request is stored, the second service discovery failure result can be used as the result of the first service discovery to be fed back to the service request device, and there is no need to send the first service discovery corresponding to the first service request to the second network device.
这样,在第一业务请求与第二业务请求匹配的情况下,将第二服务发现失败结果确定为第一服务发现的结果;反馈第一服务发现的结果,进而避免了失败的服务发现重复对第一服务发现请求对应的第二网络设备进行冲击,提升了第二网络设备的性能,节约了网络资源。In this way, when the first service request matches the second service request, the failure result of the second service discovery is determined as the result of the first service discovery; the result of the first service discovery is fed back, thereby avoiding the failed service discovery from repeatedly impacting the second network device corresponding to the first service discovery request, thereby improving the performance of the second network device and saving network resources.
在一种实现方式中,若接收到的第一业务请求与第二业务请求匹配,说明根据第一业务请求发起的第一服务发现请求与根据第二业务请求发起的第 二服务发现请求也匹配,因此,在存储有第二业务请求对应的第二服务发现失败结果的情况下,说明根据第一业务请求发起的第一服务发现请求的结果也会失败,因此,可以将存储的第二服务发现请求失败结果确定为第一服务发现请求失败结果进行反馈。In one implementation, if the received first service request matches the second service request, it indicates that the first service discovery request initiated according to the first service request matches the second service discovery request initiated according to the second service request. The second service discovery request also matches. Therefore, when the second service discovery failure result corresponding to the second business request is stored, it means that the result of the first service discovery request initiated according to the first business request will also fail. Therefore, the stored second service discovery request failure result can be determined as the first service discovery request failure result for feedback.
这样,在第一业务请求与第二业务请求匹配的情况下,将第二服务发现失败结果确定为第一服务发现失败结果;反馈第一服务发现失败结果,进而避免了失败的服务发现重复对第一服务发现请求对应的第二网络设备进行冲击,提升了第二网络设备的性能,节约了网络资源。In this way, when the first service request matches the second service request, the second service discovery failure result is determined as the first service discovery failure result; the first service discovery failure result is fed back, thereby avoiding the failed service discovery from repeatedly impacting the second network device corresponding to the first service discovery request, thereby improving the performance of the second network device and saving network resources.
在一种实现方式中,在存储有所述第一业务请求对应的第一服务发现失败结果的情况下,反馈所述第一服务发现失败结果,包括:在所述第一业务请求与所述第二业务请求匹配、存储所述第二服务发现失败结果未超过预定时间阈值和反馈所述第二服务发现失败结果的次数未超过第一预定次数阈值的情况下,将所述第二服务发现失败结果确定为所述第一服务发现的结果;反馈所述第一服务发现的结果。In one implementation, when a first service discovery failure result corresponding to the first business request is stored, the first service discovery failure result is fed back, including: when the first business request matches the second business request, the storage of the second service discovery failure result does not exceed a predetermined time threshold, and the number of times the second service discovery failure result is fed back does not exceed a first predetermined number threshold, determining the second service discovery failure result as the result of the first service discovery; and feeding back the result of the first service discovery.
具体的,若接收到的第一业务请求与第二业务请求匹配、存储第二服务发现失败结果未超过预定时间阈值并且反馈所述第二服务发现失败结果的次数未超过第一预定次数阈值,说明根据第一业务请求发起的第一服务发现请求与根据第二业务请求发起的第二服务发现请求也匹配,因此,在存储有第二业务请求对应的第二服务发现失败结果的情况下,可以将第二服务发现失败结果作为第一服务发现请求的结果反馈至业务请求设备,不需要再将第一业务请求对应的第一服务发现发送至第二网络设备。Specifically, if the received first service request matches the second service request, the storage of the second service discovery failure result does not exceed the predetermined time threshold, and the number of times the second service discovery failure result is fed back does not exceed the first predetermined number threshold, it means that the first service discovery request initiated according to the first service request and the second service discovery request initiated according to the second service request also match. Therefore, when the second service discovery failure result corresponding to the second service request is stored, the second service discovery failure result can be fed back to the service request device as the result of the first service discovery request, and there is no need to send the first service discovery corresponding to the first service request to the second network device.
这样,在第一业务请求与第二业务请求匹配、存储第二服务发现失败结果未超过预定时间阈值和反馈第二服务发现失败结果的次数未超过第一预定次数阈值的情况下,将第二服务发现失败结果确定为第一服务发现的结果;反馈第一服务发现的结果,进而避免了失败的服务发现重复对第一服务发现请求对应的第二网络设备进行冲击,提升了第二网络设备的性能,节约了网 络资源。In this way, when the first service request matches the second service request, the storage of the second service discovery failure result does not exceed the predetermined time threshold, and the number of times the second service discovery failure result is fed back does not exceed the first predetermined number threshold, the second service discovery failure result is determined as the result of the first service discovery; the result of the first service discovery is fed back, thereby avoiding the failed service discovery from repeatedly impacting the second network device corresponding to the first service discovery request, improving the performance of the second network device, and saving network time. Network resources.
在一种实现方式中,在第一业务请求与第二业务请求匹配、存储第二服务发现失败结果未超过预定时间阈值和反馈第二服务发现失败结果的次数未超过第一预定次数阈值的情况下,将第二服务发现失败结果确定为第一服务发现失败结果;反馈第一服务发现失败结果。In one implementation, when the first service request matches the second service request, the storage of the second service discovery failure result does not exceed a predetermined time threshold, and the number of times the second service discovery failure result is fed back does not exceed a first predetermined number threshold, the second service discovery failure result is determined as the first service discovery failure result; and the first service discovery failure result is fed back.
具体的,若接收到的第一业务请求与第二业务请求匹配、存储第二服务发现失败结果未超过预定时间阈值并且反馈所述第二服务发现失败结果的次数未超过第一预定次数阈值,说明根据第一业务请求发起的第一服务发现请求与根据第二业务请求发起的第二服务发现请求也匹配,因此,在存储有第二业务请求对应的第二服务发现失败结果的情况下,可以将第二服务发现失败结果作为第一服务发现请求的结果反馈至业务请求设备,即将第二服务发现失败结果确定为第一服务发现失败结果反馈至业务请求设备,不需要再将第一业务请求对应的第一服务发现发送至第二网络设备。Specifically, if the received first service request matches the second service request, the storage of the second service discovery failure result does not exceed the predetermined time threshold, and the number of times the second service discovery failure result is fed back does not exceed the first predetermined number threshold, it means that the first service discovery request initiated according to the first service request and the second service discovery request initiated according to the second service request also match. Therefore, when the second service discovery failure result corresponding to the second service request is stored, the second service discovery failure result can be fed back to the service request device as the result of the first service discovery request, that is, the second service discovery failure result is determined as the first service discovery failure result and fed back to the service request device, and there is no need to send the first service discovery corresponding to the first service request to the second network device.
这样,在第一业务请求与第二业务请求匹配、存储第二服务发现失败结果未超过预定时间阈值和反馈第二服务发现失败结果的次数未超过第一预定次数阈值的情况下,将第二服务发现失败结果确定为第一服务发现失败结果;反馈第一服务发现失败结果,进而避免了失败的服务发现重复对第一服务发现请求对应的第二网络设备进行冲击,提升了第二网络设备的性能,节约了网络资源。In this way, when the first service request matches the second service request, the storage of the second service discovery failure result does not exceed the predetermined time threshold, and the number of times the second service discovery failure result is fed back does not exceed the first predetermined number threshold, the second service discovery failure result is determined as the first service discovery failure result; the first service discovery failure result is fed back, thereby avoiding the failed service discovery from repeatedly impacting the second network device corresponding to the first service discovery request, thereby improving the performance of the second network device and saving network resources.
在一种实现方式中,在存储所述第二服务发现失败结果之后,所述方法还包括:在满足以下条件中的至少一种时,向第二网络设备发送与所述第一业务请求对应的第一服务发现请求;存储所述第二服务发现失败结果的存储时间超过预定时间阈值;反馈所述第二服务发现失败结果的次数超过第一预定次数阈值。In one implementation, after storing the second service discovery failure result, the method further includes: sending a first service discovery request corresponding to the first service request to a second network device when at least one of the following conditions is met; the storage time of the second service discovery failure result exceeds a predetermined time threshold; the number of times the second service discovery failure result is fed back exceeds a first predetermined number threshold.
具体的,在对第二服务发现失败结果进行存储之后,若接收到第一业务请求且第一业务请求与第二业务请求匹配,即根据第一业务请求发起的第一 服务发现请求与根据第二业务请求发起的第二服务发现请求匹配,则可以先确定存储第二服务发现失败结果的时间是否超过预定时间阈值或者反馈第二服务发现失败结果的次数是否超过第一预定次数阈值,若存储第二服务发现失败结果的时间超过预定时间阈值或者反馈第二服务发现失败结果的次数超过第一预定次数阈值,则可以将第一业务请求对应的第一服务发现请求发送至第二网络设备。Specifically, after the second service discovery failure result is stored, if the first service request is received and the first service request matches the second service request, that is, the first service request initiated according to the first service request If the service discovery request matches the second service discovery request initiated according to the second business request, it can be determined first whether the time for storing the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold; if the time for storing the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold, the first service discovery request corresponding to the first business request can be sent to the second network device.
这样,在存储第二服务发现失败结果的存储时间超过预定时间阈值或者反馈第二服务发现失败结果的次数超过第一预定次数阈值的情况下,向第二网络设备发送与所述第一业务请求对应的第一服务发现请求,能够减少服务发现请求对第二网络设备的冲击,节约了络资源,并且可以在符合条件的情况下对第二网络设备发起第一服务发现请求,进而可以第一服务发现成功的情况下,实现获取第一业务请求需要的服务注册信息和需要调用的服务。In this way, when the storage time of the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold, the first service discovery request corresponding to the first business request is sent to the second network device, which can reduce the impact of the service discovery request on the second network device and save network resources. In addition, the first service discovery request can be initiated to the second network device if the conditions are met, and then the service registration information and the service to be called required for the first business request can be obtained if the first service discovery is successful.
在一种实现方式中,在接收到所述第二网络设备发送的第二服务发现失败结果的情况下,存储所述第二服务发现失败结果,包括:在接收到所述第二服务发现失败结果的次数超过第二预定次数阈值的情况下,存储所述第二服务发现失败结果。In one implementation, when a second service discovery failure result sent by the second network device is received, the second service discovery failure result is stored, including: when the number of times the second service discovery failure result is received exceeds a second predetermined number threshold, the second service discovery failure result is stored.
具体的,在对第二网络设备发起第二服务发现请求之后,可以对接收到的第二服务发现失败结果进行统计,对第二服务发现失败结果进行统计可以是第一网络设备对连续接收到的第二服务发现失败结果的次数进行统计,在发起第二服务发现请求且该第二服务发现请求的结果为失败的情况下,确定统计的第二服务发现请求失败的次数是否超过第二预定次数阈值,该第二预定次数阈值可以根据实际需求进行设定,在此不作具体限定,若统计的第二服务发现请求失败结果的次数未超过第二预定次数阈值,则不对该第二服务发现失败结果进行存储,若统计的第二服务发现请求失败的次数超过第二预定次数阈值,则可以对该第二服务发现失败结果进行存储。Specifically, after initiating a second service discovery request to the second network device, the received second service discovery failure results can be counted. The counting of the second service discovery failure results can be that the first network device counts the number of consecutive second service discovery failure results received. When the second service discovery request is initiated and the result of the second service discovery request is a failure, it is determined whether the counted number of second service discovery request failures exceeds a second predetermined number threshold. The second predetermined number threshold can be set according to actual needs and is not specifically limited here. If the counted number of second service discovery request failure results does not exceed the second predetermined number threshold, the second service discovery failure result will not be stored. If the counted number of second service discovery request failures exceeds the second predetermined number threshold, the second service discovery failure result can be stored.
这样,在接收到第二服务发现失败结果的次数超过第二预定次数阈值的 情况下,存储第二服务发现失败结果,可以避免由于单次服务发现失败导致误存储。In this way, when the number of times the second service discovery failure result is received exceeds the second predetermined number threshold, In this case, storing the second service discovery failure result can avoid erroneous storage due to a single service discovery failure.
图2是本申请实施例提供的另一种业务请求的处理方法流程示意图,如图2所示,业务请求的处理方法包括以下步骤。FIG2 is a flow chart of another method for processing a service request provided in an embodiment of the present application. As shown in FIG2 , the method for processing a service request includes the following steps.
步骤1:接收第二业务请求。Step 1: Receive a second service request.
具体的,在本申请实施例中,第一网络设备202可以包括但不限于AMF网元、SMF网元、PCF网元或者UDM网元的网络设备,在此不对第一网络设备202作具体限定。业务请求设备201可以包括(R)AN或者用户终端等可以发起业务请求的网络设备等,在此不对业务请求设备201作具体限定,在业务请求设备201向第一网络设备202发起第一业务请求的情况下,第一网络设备202可以接收业务请求设备201发送的第一业务请求。Specifically, in the embodiment of the present application, the first network device 202 may include but is not limited to a network device of an AMF network element, an SMF network element, a PCF network element or a UDM network element, and the first network device 202 is not specifically limited herein. The service request device 201 may include a network device such as an (R)AN or a user terminal that can initiate a service request, and the service request device 201 is not specifically limited herein. When the service request device 201 initiates a first service request to the first network device 202, the first network device 202 may receive the first service request sent by the service request device 201.
步骤2:发送第二服务发现请求。Step 2: Send a second service discovery request.
具体的,第二网络设备203可以是包括NRF网元等保存有服务注册信息和服务的网络设备,在此不对第二业务请求对应的第二网络设备203作具体限定。第一网络设备202可以根据第二业务请求向第二业务请求对应的第二网络设备203发起第二服务发现请求,在第二服务发现请求成功的情况下,可以从第二网络设备203中获取第二业务请求需要的服务注册信息并调用需要的服务,在第二服务发现请求失败的情况下,会接收到第二网络设备203回复的错误响应。Specifically, the second network device 203 may be a network device including an NRF network element and the like storing service registration information and services, and the second network device 203 corresponding to the second service request is not specifically limited herein. The first network device 202 may initiate a second service discovery request to the second network device 203 corresponding to the second service request according to the second service request. If the second service discovery request is successful, the service registration information required for the second service request may be obtained from the second network device 203 and the required service may be called. If the second service discovery request fails, an error response replied by the second network device 203 may be received.
步骤3:接收第二服务发现失败结果。Step 3: Receive a second service discovery failure result.
具体的,在第二服务发现请求失败的情况下,可以接收第二网络设备203发送的第二服务发现失败结果,例如第二网络设备203不允许第一网络设备202发现服务发现请求对应的服务,第二网络设备203会返回403 Forbidden响应;或者由于服务发现请求中URL查询参数中的输入数据错误,导致在第二网络设备203中服务发现请求失败,第二网络设备203会返回400 Bad Request状态码;或者由于第二网络设备203内部错误导致在第二网络设备 203上服务发现请求失败,第二网络设备203会返回500 Internal Server Error状态码;或者服务发现返回成功,但是第二网络设备203中,NF提供服务列表的NF Profile List为空,或者NF提供服务列表的NF实例的配置信息为空,该情形也被标记为服务发现失败。Specifically, in the case where the second service discovery request fails, the second service discovery failure result sent by the second network device 203 can be received. For example, the second network device 203 does not allow the first network device 202 to discover the service corresponding to the service discovery request, and the second network device 203 will return a 403 Forbidden response; or due to an input data error in the URL query parameter in the service discovery request, the service discovery request fails in the second network device 203, and the second network device 203 will return a 400 Bad Request status code; or due to an internal error in the second network device 203, the service discovery request fails in the second network device 203, and the second network device 203 will return a 400 Bad Request status code. If the service discovery request on 203 fails, the second network device 203 will return a 500 Internal Server Error status code; or if the service discovery returns successfully, but in the second network device 203, the NF Profile List of the service list provided by the NF is empty, or the configuration information of the NF instance of the service list provided by the NF is empty, this situation is also marked as a service discovery failure.
步骤4:存储第二服务发现失败结果。Step 4: Store the second service discovery failure result.
具体的,在接收到第二服务发现失败结果的情况下,可以对第二服务发现失败结果进行统计,对第二服务发现失败结果进行统计可以是第一网络设备202对连续接收到的第二服务发现失败结果的次数进行统计,当发起第二服务发现请求且该第二服务发现请求的接收为失败的情况下,确定统计的第二服务发现请求失败的次数是否超过第二预定次数阈值,该第二预定次数阈值可以根据实际需求进行设定,在此不作具体限定,若统计的第二服务发现请求失败的次数未超过第二预定次数阈值,则不对该第二服务发现失败结果进行存储,若统计的第二服务发现请求失败的次数超过第二预定次数阈值,则可以对该第二服务发现失败结果进行存储,这样能够避难单次服务发现请求失败导致误存储。Specifically, when a second service discovery failure result is received, the second service discovery failure result can be counted. The second service discovery failure result can be counted by the first network device 202 counting the number of second service discovery failure results received consecutively. When a second service discovery request is initiated and the reception of the second service discovery request fails, it is determined whether the counted number of second service discovery request failures exceeds a second predetermined number threshold. The second predetermined number threshold can be set according to actual needs and is not specifically limited here. If the counted number of second service discovery request failures does not exceed the second predetermined number threshold, the second service discovery failure result is not stored. If the counted number of second service discovery request failures exceeds the second predetermined number threshold, the second service discovery failure result can be stored. This can avoid erroneous storage caused by the failure of a single service discovery request.
步骤5:接收第一业务请求。Step 5: Receive a first service request.
具体的,第一网络设备202可以接收业务请求设备201发起的第一业务请求。Specifically, the first network device 202 may receive a first service request initiated by the service request device 201 .
步骤6:反馈第二服务发现失败结果。Step 6: Feedback the result of the second service discovery failure.
具体的,若接收到的第一业务请求与第二业务请求匹配,则根据第一业务请求发起的第一服务发现请求也与第二服务发现请求匹配,在第一网络设备202中存储有第二服务发现失败结果的情况下,可以判断存储第二服务发现失败结果的时间是否超过预定时间阈值或者反馈第二服务发现失败结果的次数是否超过第一预定次数阈值,若存储第二服务发现失败结果的时间超过预定时间阈值或者反馈第二服务发现失败结果的次数超过第一预定次数阈值,则可以将第一业务请求对应的第一服务发现请求发送至第二网络设备203, 若不满足上述条件,则在接收到该第一业务请求的情况下,可以直接将存储的第一服务发现失败结果(第二服务发现失败结果)反馈至业务请求设备201。Specifically, if the received first business request matches the second business request, the first service discovery request initiated according to the first business request also matches the second service discovery request. In the case where the second service discovery failure result is stored in the first network device 202, it can be determined whether the time for storing the second service discovery failure result exceeds the predetermined time threshold or whether the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold. If the time for storing the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold, the first service discovery request corresponding to the first business request can be sent to the second network device 203. If the above conditions are not met, then when the first service request is received, the stored first service discovery failure result (second service discovery failure result) may be directly fed back to the service request device 201 .
步骤7:接收第三业务请求。Step 7: Receive the third service request.
具体的,第一网络设备202可以接收业务请求设备201发起的第三业务请求。Specifically, the first network device 202 may receive the third service request initiated by the service request device 201 .
步骤8:发送第三服务发现请求。Step 8: Send a third service discovery request.
具体的,若接收到的第三业务请求与第二业务请求匹配,则根据第三业务请求发起的第三服务发现请求也与第二服务发现请求匹配,在第一网络设备202中存储有第二服务发现失败结果的情况下,可以判断存储第二服务发现失败结果的时间是否超过预定时间阈值或者反馈第二服务发现失败结果的次数是否超过第一预定次数阈值,若存储第二服务发现失败结果的时间超过预定时间阈值或者反馈第二服务发现失败结果的次数超过第一预定次数阈值,则可以将第三业务请求对应的第三服务发现请求发送至第二网络设备203,若满足上述条件,可以将第三服务发现请求发送至第二网络设备203。Specifically, if the received third business request matches the second business request, the third service discovery request initiated based on the third business request also matches the second service discovery request. When the second service discovery failure result is stored in the first network device 202, it can be determined whether the time for storing the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold. If the time for storing the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number threshold, the third service discovery request corresponding to the third business request can be sent to the second network device 203. If the above conditions are met, the third service discovery request can be sent to the second network device 203.
步骤9:接收第三服务发现成功结果。Step 9: Receive the third service discovery success result.
具体的,在第三服务发现请求成功的情况下,接收第三服务发现成功结果,该第三服务发现成功结果可以包括第三业务请求需要的服务注册信息和需要调用的服务。Specifically, when the third service discovery request is successful, a third service discovery success result is received, and the third service discovery success result may include service registration information required by the third service request and a service to be called.
步骤10:反馈第三服务发现成功结果。Step 10: Feedback the successful result of the third service discovery.
具体的,接收到第三服务发现成功结果的情况下,可以将该第三服务发现成功结果过反馈至业务请求设备201。Specifically, when the third service discovery success result is received, the third service discovery success result may be fed back to the service request device 201 .
这样,在确定已经存储了第一业务对应的第一服务发现失败结果(第二服务发现失败)的情况下,可以直接将第一服务发现失败结果进行反馈,不需要再将第一服务发现请求发送至第一服务发现请求对应的第二网络设备203,进而避免了失败的服务发现重复对第一服务发现请求对应的第二网络设备203进行冲击,提升了第二网络设备203的性能,节约了网络资源,并且, 在第二服务发现失败结果存储时间超过预定时间阈值或者反馈第二服务发现失败结果的次数超过第一预定次数的情况下,可以将接收到的与第二服务发现请求匹配的第三服务发现请求发送至第二网络设备203,以实现服务注册信息和服务的获取。In this way, when it is determined that the first service discovery failure result (second service discovery failure) corresponding to the first business has been stored, the first service discovery failure result can be directly fed back, and there is no need to send the first service discovery request to the second network device 203 corresponding to the first service discovery request, thereby avoiding the failed service discovery from repeatedly impacting the second network device 203 corresponding to the first service discovery request, improving the performance of the second network device 203, saving network resources, and, When the storage time of the second service discovery failure result exceeds the predetermined time threshold or the number of times the second service discovery failure result is fed back exceeds the first predetermined number of times, the received third service discovery request that matches the second service discovery request can be sent to the second network device 203 to obtain service registration information and services.
下面结合具体实施例对本申请提出的业务请求的处理方法作进一步说明。The method for processing the service request proposed in this application is further described below in conjunction with specific embodiments.
示例1:(R)AN向AMF发起注册业务请求,AMF向NRF发起服务发现请求,但NRF未找到服务发现请求中的查询参数匹配的NF,则NRF返回“403 Forbidden”响应。当连续5次发起服务发现请求的结果仍为失败则可以将服务发现失败结果进行存储,可以对该存储设置一个有效期,例如86400秒。当有新业务请求触发上述服务发现请求,在存储有效时间内则使用服务发现失败结果“403 Forbidden”进行反馈,当存储有效时间结束或者已经连续反馈服务发现失败结果1000次,此时存储的上述服务发现失败结果失效,可以直接向NRF发起服务发现。Example 1: (R)AN initiates a registration service request to AMF, and AMF initiates a service discovery request to NRF. However, NRF does not find a NF that matches the query parameters in the service discovery request, and NRF returns a "403 Forbidden" response. If the result of initiating a service discovery request for five consecutive times is still a failure, the service discovery failure result can be stored, and a validity period can be set for the storage, such as 86400 seconds. When a new service request triggers the above service discovery request, the service discovery failure result "403 Forbidden" is used for feedback within the storage validity period. When the storage validity period ends or the service discovery failure result has been fed back 1000 times in a row, the stored service discovery failure result becomes invalid, and service discovery can be directly initiated to NRF.
示例2:(R)AN向SMF发起注册业务请求,SMF向NRF发送服务发现请求,此时NRF回复“200OK”,但是所携带的NF Profile List为空,判为服务发现失败。当该服务发现连续失败3次则可以对该服务发现失败结果进行存储,对该存储设置一个有效期,例如43200秒。当有新业务请求触发该服务发现请求,在存储有效时间内则使用上述服务发现失败结果“404”进行反馈,当存储有效时间结束或者已经连续反馈该服务发现失败结果500次,此时存储失效,可以直接向NRF发起服务发现请求。Example 2: (R)AN initiates a registration service request to SMF, and SMF sends a service discovery request to NRF. At this time, NRF replies "200OK", but the NF Profile List carried is empty, and it is judged that the service discovery failed. When the service discovery fails three times in a row, the service discovery failure result can be stored, and a validity period can be set for the storage, such as 43200 seconds. When a new service request triggers the service discovery request, the above-mentioned service discovery failure result "404" is used for feedback within the storage validity period. When the storage validity period ends or the service discovery failure result has been fed back 500 times in a row, the storage is invalid, and a service discovery request can be directly initiated to NRF.
示例3:(R)AN向AMF发起注册业务请求,AMF向NRF发起服务发现请求,由于NRF内部错误而导致服务发现失败,NRF返回“500Internal Server Error”状态码。当连续3次服务发现请求失败则对服务发现失败结果进行存储,可以对该存储设置一个有效期,例如21600秒。当存储有效期结束,并且有新业务触发该服务发现请求,即使连续反馈该服务发现失败结果未达到预设次数,AMF也可以直接向NRF发起服务发现请求。 Example 3: (R)AN initiates a registration service request to AMF, and AMF initiates a service discovery request to NRF. Due to an internal error in NRF, service discovery fails, and NRF returns a "500Internal Server Error" status code. When the service discovery request fails three times in a row, the service discovery failure result is stored, and a validity period can be set for the storage, such as 21600 seconds. When the storage validity period expires and a new service triggers the service discovery request, AMF can directly initiate a service discovery request to NRF even if the continuous feedback of the service discovery failure result does not reach the preset number of times.
示例4:(R)AN向AMF发起注册业务请求,SMF向NRF发起服务发现请求,由于服务发现请求中URI查询参数的输入数据错误导致在NRF处服务发现失败,NRF返回“400 Bad Request”状态码。当连续3次服务发现失败则对服务发现失败结果进行存储,对该存储设置一个有效期,如43200秒。当连续反馈服务发现失败结果的次数超过了200次即使存储有效期未结束该服务发现失败结果的存储也失效,此时SMF直接向NRF发起服务发现,当服务发现失败次数再次达到3次则再对服务发现失败结果进行存储。Example 4: (R)AN initiates a registration service request to AMF, and SMF initiates a service discovery request to NRF. Due to the input data error of the URI query parameter in the service discovery request, the service discovery fails at NRF, and NRF returns a "400 Bad Request" status code. When the service discovery fails three times in a row, the service discovery failure result is stored, and a validity period is set for the storage, such as 43200 seconds. When the number of consecutive feedback service discovery failure results exceeds 200 times, the storage of the service discovery failure result will become invalid even if the storage validity period has not expired. At this time, SMF directly initiates service discovery to NRF. When the number of service discovery failures reaches 3 times again, the service discovery failure result is stored again.
需要说明的是,本申请实施例提供的业务请求的处理方法,执行主体可以为业务请求的处理装置,或者该业务请求的处理装置中的用于执行业务请求的处理方法的控制模块。本申请实施例中以业务请求的处理装置执行业务请求的处理方法为例,说明本申请实施例提供的业务请求的处理装置。It should be noted that the execution subject of the method for processing a business request provided in the embodiment of the present application may be a processing device for a business request, or a control module in the processing device for a business request for executing the method for processing a business request. In the embodiment of the present application, the processing device for processing a business request is taken as an example to illustrate the processing device for processing a business request provided in the embodiment of the present application.
图3是根据本发明实施例的业务请求的处理装置的结构示意图。如图3所示,业务请求的处理装置300包括:接收模块310、执行模块320。Fig. 3 is a schematic diagram of the structure of a device for processing a service request according to an embodiment of the present invention. As shown in Fig. 3 , the device for processing a service request 300 comprises: a receiving module 310 and an executing module 320 .
接收模块310,用于接收第一业务请求;执行模块320,用于在存储有所述第一业务请求对应的第一服务发现失败结果的情况下,反馈所述第一服务发现失败结果。The receiving module 310 is used to receive a first service request; the executing module 320 is used to feed back the first service discovery failure result when a first service discovery failure result corresponding to the first service request is stored.
在一种实现方式中,所述执行模块320,还用于接收第二业务请求;向第二网络设备发送与所述第二业务请求对应的第二服务发现请求;在接收到所述第二网络设备发送的第二服务发现失败结果的情况下,存储所述第二服务发现失败结果。In one implementation, the execution module 320 is further used to receive a second business request; send a second service discovery request corresponding to the second business request to a second network device; and store the second service discovery failure result when a second service discovery failure result sent by the second network device is received.
在一种实现方式中,所述执行模块320,用于在所述第一业务请求与所述第二业务请求匹配的情况下,将所述第二服务发现失败结果确定为所述第一服务发现的结果;反馈所述第一服务发现的结果。In one implementation, the execution module 320 is used to determine the second service discovery failure result as the result of the first service discovery when the first service request matches the second service request; and to feed back the result of the first service discovery.
在一种实现方式中,所述执行模块320,用于在所述第一业务请求与所述第二业务请求匹配并且存储所述第二服务发现失败结果未超过预定时间阈值的情况下,将所述第二服务发现失败结果确定为所述第一服务发现的结果; 反馈所述第一服务发现的结果。In one implementation, the execution module 320 is configured to determine the second service discovery failure result as the result of the first service discovery if the first service request matches the second service request and the storage of the second service discovery failure result does not exceed a predetermined time threshold; Feedback the result of the first service discovery.
在一种实现方式中,所述执行模块320,还用于在满足以下条件中的至少一种时,向第二网络设备发送与所述第一业务请求对应的第一服务发现请求;存储所述第二服务发现失败结果的存储时间超过预定时间阈值;反馈所述第一服务发现失败结果的次数超过第一预定次数阈值。In one implementation, the execution module 320 is also used to send a first service discovery request corresponding to the first business request to the second network device when at least one of the following conditions is met; the storage time of the second service discovery failure result exceeds a predetermined time threshold; the number of times the first service discovery failure result is fed back exceeds a first predetermined number threshold.
在一种实现方式中,所述执行模块320,用于在接收到所述第二服务发现失败结果的次数超过第二预定次数阈值的情况下,存储所述第二服务发现失败结果。In one implementation, the execution module 320 is configured to store the second service discovery failure result when the number of times the second service discovery failure result is received exceeds a second predetermined number threshold.
本申请实施例中的业务请求的处理装置可以是装置,也可以是终端中的部件、集成电路、或芯片。该装置可以是移动电子设备,也可以为非移动电子设备。示例性的,移动电子设备可以为手机、平板电脑、笔记本电脑、掌上电脑、车载电子设备、可穿戴设备、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本或者个人数字助理(personal digital assistant,PDA)等,非移动电子设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)、个人计算机(personal computer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。The processing device for the service request in the embodiment of the present application can be a device, or a component, integrated circuit, or chip in a terminal. The device can be a mobile electronic device or a non-mobile electronic device. Exemplarily, the mobile electronic device can be a mobile phone, a tablet computer, a laptop computer, a PDA, an in-vehicle electronic device, a wearable device, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a netbook or a personal digital assistant (personal digital assistant, PDA), etc., and the non-mobile electronic device can be a server, a network attached storage (Network Attached Storage, NAS), a personal computer (personal computer, PC), a television (television, TV), a teller machine or a self-service machine, etc., which is not specifically limited in the embodiment of the present application.
本申请实施例中的业务请求的处理装置可以为具有操作系统的装置。该操作系统可以为安卓(Android)操作系统,可以为ios操作系统,还可以为其他可能的操作系统,本申请实施例不作具体限定。The service request processing device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android operating system, an iOS operating system, or other possible operating systems, which are not specifically limited in the embodiment of the present application.
本申请实施例提供的业务请求的处理装置能够实现图1至图2的方法实施例实现的各个过程,为避免重复,这里不再赘述。The service request processing device provided in the embodiment of the present application can implement each process implemented by the method embodiments of Figures 1 to 2, and will not be described again here to avoid repetition.
可选地,如图4所示,本申请实施例另提供一种电子设备400,包括处理器401和存储器402,存储器402上存储有可在所述处理器401上运行的程序或指令,该程序或指令被处理器401执行时实现:接收第一业务请求;在存储有所述第一业务请求对应的第一服务发现失败结果的情况下,反馈所述第一服务发现失败结果。 Optionally, as shown in Figure 4, an embodiment of the present application further provides an electronic device 400, including a processor 401 and a memory 402, and the memory 402 stores a program or instruction that can be executed on the processor 401, and when the program or instruction is executed by the processor 401, it implements: receiving a first business request; and in the case of storing a first service discovery failure result corresponding to the first business request, feeding back the first service discovery failure result.
在一种实现方式中,在所述反馈所述第一服务发现失败结果之前,接收第二业务请求;向第二网络设备发送与所述第二业务请求对应的第二服务发现请求;在接收到所述第二网络设备发送的第二服务发现失败结果的情况下,存储所述第二服务发现失败结果。In one implementation, before the first service discovery failure result is fed back, a second service request is received; a second service discovery request corresponding to the second service request is sent to a second network device; and upon receiving the second service discovery failure result sent by the second network device, the second service discovery failure result is stored.
在一种实现方式中,在所述第一业务请求与所述第二业务请求匹配的情况下,将所述第二服务发现失败结果确定为所述第一服务发现的结果;反馈所述第一服务发现的结果。In one implementation, when the first service request matches the second service request, the second service discovery failure result is determined as the result of the first service discovery; and the result of the first service discovery is fed back.
在一种实现方式中,在所述第一业务请求与所述第二业务请求匹配并且存储所述第二服务发现失败结果未超过预定时间阈值的情况下,将所述第二服务发现失败结果确定为所述第一服务发现的结果;反馈所述第一服务发现的结果。In one implementation, when the first service request matches the second service request and the storage of the second service discovery failure result does not exceed a predetermined time threshold, the second service discovery failure result is determined as the result of the first service discovery; and the result of the first service discovery is fed back.
在一种实现方式中,在存储所述第二服务发现失败结果之后,在满足以下条件中的至少一种时,向第二网络设备发送与所述第一业务请求对应的第一服务发现请求;存储所述第二服务发现失败结果的存储时间超过预定时间阈值;反馈所述第一服务发现失败结果的次数超过第一预定次数阈值。In one implementation, after storing the second service discovery failure result, a first service discovery request corresponding to the first service request is sent to the second network device when at least one of the following conditions is met; the storage time of the second service discovery failure result exceeds a predetermined time threshold; the number of times the first service discovery failure result is fed back exceeds a first predetermined number threshold.
在一种实现方式中,在接收到所述第二服务发现失败结果的次数超过第二预定次数阈值的情况下,存储所述第二服务发现失败结果。In one implementation, when the number of times the second service discovery failure result is received exceeds a second predetermined number threshold, the second service discovery failure result is stored.
具体执行步骤可以参见上述业务请求的处理方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。The specific execution steps can refer to the various steps of the above-mentioned business request processing method embodiment, and can achieve the same technical effect. To avoid repetition, they will not be repeated here.
需要说明的是,本申请实施例中的电子设备包括:服务器、终端或除终端之外的其他设备。It should be noted that the electronic devices in the embodiments of the present application include: servers, terminals or other devices except terminals.
以上电子设备结构并不构成对电子设备的限定,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,例如,输入单元,可以包括图形处理器(Graphics Processing Unit,GPU)和麦克风,显示单元可以采用液晶显示器、有机发光二极管等形式来配置显示面板。用户输入单元包括触控面板以及其他输入设备中的至少一种。触控面板也称为 触摸屏。其他输入设备可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。The above electronic device structure does not constitute a limitation on the electronic device. The electronic device may include more or fewer components than shown in the figure, or combine certain components, or arrange the components differently. For example, the input unit may include a graphics processing unit (GPU) and a microphone, and the display unit may be configured in the form of a liquid crystal display, an organic light emitting diode, etc. The user input unit includes at least one of a touch panel and other input devices. The touch panel is also called Other input devices may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which will not be described in detail here.
存储器可用于存储软件程序以及各种数据。存储器可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器可以包括易失性存储器或非易失性存储器,或者,存储器可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。The memory can be used to store software programs and various data. The memory may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, an image playback function, etc.), etc. In addition, the memory may include a volatile memory or a non-volatile memory, or the memory may include both volatile and non-volatile memories. Among them, the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory. Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
处理器可包括一个或多个处理单元;可选的,处理器集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器中。The processor may include one or more processing units; optionally, the processor integrates an application processor and a modem processor, wherein the application processor mainly processes operations related to the operating system, user interface, and application programs, and the modem processor mainly processes wireless communication signals, such as a baseband processor. It is understandable that the modem processor may not be integrated into the processor.
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述业务请求的处理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。An embodiment of the present application also provides a readable storage medium, on which a program or instruction is stored. When the program or instruction is executed by a processor, each process of the above-mentioned business request processing method embodiment is implemented, and the same technical effect can be achieved. To avoid repetition, it will not be repeated here.
其中,所述处理器为上述实施例中所述的电子设备中的处理器。所述可读存储介质,包括计算机可读存储介质,如ROM、RAM、磁碟或者光盘等。 The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as ROM, RAM, magnetic disk or optical disk.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。It should be noted that, in this article, the terms "comprise", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or device including a series of elements includes not only those elements, but also other elements not explicitly listed, or also includes elements inherent to such process, method, article or device. In the absence of further restrictions, an element defined by the sentence "comprises one..." does not exclude the presence of other identical elements in the process, method, article or device including the element. In addition, it should be noted that the scope of the methods and devices in the embodiments of the present application is not limited to performing functions in the order shown or discussed, and may also include performing functions in a substantially simultaneous manner or in reverse order according to the functions involved, for example, the described method may be performed in an order different from that described, and various steps may also be added, omitted, or combined. In addition, the features described with reference to certain examples may be combined in other examples.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。Through the description of the above implementation methods, those skilled in the art can clearly understand that the above-mentioned embodiment methods can be implemented by means of software plus a necessary general hardware platform, and of course by hardware, but in many cases the former is a better implementation method. Based on such an understanding, the technical solution of the present application, or the part that contributes to the prior art, can be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, a magnetic disk, or an optical disk), and includes a number of instructions for a terminal (which can be a mobile phone, a computer, a server, or a network device, etc.) to execute the methods described in each embodiment of the present application.
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。 The embodiments of the present application are described above in conjunction with the accompanying drawings, but the present application is not limited to the above-mentioned specific implementation methods. The above-mentioned specific implementation methods are merely illustrative and not restrictive. Under the guidance of the present application, ordinary technicians in this field can also make many forms without departing from the purpose of the present application and the scope of protection of the claims, all of which are within the protection of the present application.

Claims (9)

  1. 一种业务请求的处理方法,应用于第一网络设备,包括:A method for processing a service request, applied to a first network device, comprising:
    接收第一业务请求;receiving a first service request;
    在存储有所述第一业务请求对应的第一服务发现失败结果的情况下,反馈所述第一服务发现失败结果。In a case where a first service discovery failure result corresponding to the first business request is stored, the first service discovery failure result is fed back.
  2. 根据权利要求1所述的处理方法,其中,在所述反馈所述第一服务发现失败结果之前,还包括:The processing method according to claim 1, wherein, before feeding back the first service discovery failure result, it further comprises:
    接收第二业务请求;receiving a second service request;
    向第二网络设备发送与所述第二业务请求对应的第二服务发现请求;Sending a second service discovery request corresponding to the second service request to a second network device;
    在接收到所述第二网络设备发送的第二服务发现失败结果的情况下,存储所述第二服务发现失败结果。When the second service discovery failure result sent by the second network device is received, the second service discovery failure result is stored.
  3. 根据权利要求2所述的处理方法,其中,在存储有所述第一业务请求对应的第一服务发现失败结果的情况下,反馈所述第一服务发现失败结果,包括:The processing method according to claim 2, wherein, when a first service discovery failure result corresponding to the first service request is stored, feeding back the first service discovery failure result comprises:
    在所述第一业务请求与所述第二业务请求匹配的情况下,将所述第二服务发现失败结果确定为所述第一服务发现的结果;In a case where the first service request matches the second service request, determining the second service discovery failure result as the result of the first service discovery;
    反馈所述第一服务发现的结果。Feedback the result of the first service discovery.
  4. 根据权利要求2所述的处理方法,其中,在存储有所述第一业务请求对应的第一服务发现失败结果的情况下,反馈所述第一服务发现失败结果,包括:The processing method according to claim 2, wherein, when a first service discovery failure result corresponding to the first service request is stored, feeding back the first service discovery failure result comprises:
    在所述第一业务请求与所述第二业务请求匹配、存储所述第二服务发现失败结果未超过预定时间阈值和反馈所述第二服务发现失败结果的次数未超过第一预定次数阈值的情况下,将所述第二服务发现失败结果确定为所述第一服务发现的结果;If the first service request matches the second service request, the second service discovery failure result is stored for a period of time not exceeding a predetermined time threshold, and the number of times the second service discovery failure result is fed back does not exceed a first predetermined number of times threshold, determining the second service discovery failure result as the result of the first service discovery;
    反馈所述第一服务发现的结果。Feedback the result of the first service discovery.
  5. 根据权利要求2所述的处理方法,其中,在存储所述第二服务发现失 败结果之后,所述方法还包括:The processing method according to claim 2, wherein the second service is found to be lost when storing the second service After the failure result is obtained, the method further comprises:
    在满足以下条件中的至少一种时,向第二网络设备发送与所述第一业务请求对应的第一服务发现请求;When at least one of the following conditions is met, sending a first service discovery request corresponding to the first service request to the second network device;
    存储所述第二服务发现失败结果的存储时间超过预定时间阈值;The storage time for storing the second service discovery failure result exceeds a predetermined time threshold;
    反馈所述第二服务发现失败结果的次数超过第一预定次数阈值。The number of times that the second service discovery failure result is fed back exceeds a first predetermined number threshold.
  6. 根据权利要求2所述的处理方法,其中,在接收到所述第二网络设备发送的第二服务发现失败结果的情况下,存储所述第二服务发现失败结果,包括:The processing method according to claim 2, wherein, in the case of receiving the second service discovery failure result sent by the second network device, storing the second service discovery failure result comprises:
    在接收到所述第二服务发现失败结果的次数超过第二预定次数阈值的情况下,存储所述第二服务发现失败结果。When the number of times the second service discovery failure result is received exceeds a second predetermined number threshold, the second service discovery failure result is stored.
  7. 一种业务请求的处理装置,应用于第一网络设备,包括:A service request processing device, applied to a first network device, comprising:
    接收模块,用于接收第一业务请求;A receiving module, configured to receive a first service request;
    执行模块,用于在存储有所述第一业务请求对应的第一服务发现失败结果的情况下,反馈所述第一服务发现失败结果。The execution module is used to feed back the first service discovery failure result when the first service discovery failure result corresponding to the first business request is stored.
  8. 一种电子设备,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1-6任一项所述的业务请求的处理方法的步骤。An electronic device comprises a processor, a memory, and a program or instruction stored in the memory and executable on the processor, wherein the program or instruction, when executed by the processor, implements the steps of the method for processing a service request as described in any one of claims 1 to 6.
  9. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1-6任一项所述的业务请求的处理方法的步骤。 A readable storage medium stores a program or instruction, and when the program or instruction is executed by a processor, the steps of the method for processing a service request as described in any one of claims 1 to 6 are implemented.
PCT/CN2023/131161 2022-11-25 2023-11-13 Service request processing method and apparatus, electronic device, and storage medium WO2024109568A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211497902.1A CN118101764A (en) 2022-11-25 2022-11-25 Service request processing method and device, electronic equipment and storage medium
CN202211497902.1 2022-11-25

Publications (1)

Publication Number Publication Date
WO2024109568A1 true WO2024109568A1 (en) 2024-05-30

Family

ID=91164171

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/131161 WO2024109568A1 (en) 2022-11-25 2023-11-13 Service request processing method and apparatus, electronic device, and storage medium

Country Status (2)

Country Link
CN (1) CN118101764A (en)
WO (1) WO2024109568A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110740464A (en) * 2018-07-20 2020-01-31 普天信息技术有限公司 NF service discovery method and device
WO2020202043A1 (en) * 2019-04-02 2020-10-08 Telefonaktiebolaget Lm Ericsson (Publ) Method for reselection of a network function (nf) service instance of a nf service producer
CN113612648A (en) * 2021-09-14 2021-11-05 广州爱浦路网络技术有限公司 Network element re-reproduction method, computer apparatus and storage medium
CN114765622A (en) * 2021-01-13 2022-07-19 诺基亚技术有限公司 Network function request error handling

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110740464A (en) * 2018-07-20 2020-01-31 普天信息技术有限公司 NF service discovery method and device
WO2020202043A1 (en) * 2019-04-02 2020-10-08 Telefonaktiebolaget Lm Ericsson (Publ) Method for reselection of a network function (nf) service instance of a nf service producer
CN114765622A (en) * 2021-01-13 2022-07-19 诺基亚技术有限公司 Network function request error handling
CN113612648A (en) * 2021-09-14 2021-11-05 广州爱浦路网络技术有限公司 Network element re-reproduction method, computer apparatus and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHINA MOBILE: "Discussion of error handling in service layer procedures", 3GPP TSG SA WG3 (SECURITY) MEETING #91BIS S3-181807, 18 May 2018 (2018-05-18), XP051457082 *

Also Published As

Publication number Publication date
CN118101764A (en) 2024-05-28

Similar Documents

Publication Publication Date Title
US8737579B2 (en) Methods of routing messages using a listener registry
CN110119292B (en) System operation parameter query method, matching method, device and node equipment
EP3002927A1 (en) Page redirection method, routing device, terminal device and system
US9973513B2 (en) Method and apparatus for communication number update
CN109933439B (en) Message transmission method, device, computer equipment and storage medium
CN112134954A (en) Service request processing method and device, electronic equipment and storage medium
CN110471884A (en) Data managing method, device, equipment, system and computer readable storage medium
US20140378116A1 (en) Method And System For Sending Notification Message, Management Control Apparatus, And Terminal Device
WO2024109568A1 (en) Service request processing method and apparatus, electronic device, and storage medium
CN112565238A (en) Method for popping privacy policy, client and computer-readable storage medium
WO2019201111A1 (en) Information processing method, apparatus and device, and computer-readable storage medium
KR20040008189A (en) Requests in a communication system
WO2021103644A1 (en) Data structure, communication method and apparatus, storage medium and device
CN113285994A (en) Message sending method, device, server and storage medium
EP2003853B1 (en) Method for managing functions of a mobile phone during a browsing session, remote gateway and remote phone managing unit
WO2024104021A1 (en) Session establishment method and apparatus, electronic device and storage medium
CN114679302B (en) Method, device, equipment and storage medium for docking single sign-on system
WO2017173967A1 (en) Redirection method, service provider, unstructured supplementary service data center, and system
CN115878352B (en) Event delivery processing method and device based on pre-subscription
CN113315875B (en) Call information synchronization method and device, call information synchronization equipment and storage medium
CN110072200B (en) Short message sending control processing method and device and computer equipment
CN112165535B (en) Message pushing processing method and system
CN114765596B (en) Social relation construction method, device, server and storage medium
WO2024046157A1 (en) Cloud desktop access method, electronic device, and computer readable medium
KR102340954B1 (en) Apparatus and method for transmitting message

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23893658

Country of ref document: EP

Kind code of ref document: A1