Method and system for processing NF component exception, and device
11178000 · 2021-11-16
Assignee
Inventors
Cpc classification
International classification
Abstract
A method and a system for processing an NF component exception, where the method is applied to a network including user equipment, a first NF component, a second NF component, and an NF repository management function component. The method includes: receiving, by the NF repository management function component, an NF discovery request message that includes an identifier of a set to which the second NF component belongs; determining, by the NF repository management function component based on the identifier of the set to which the second NF component belongs, that a third NF component having a same function as the second NF component exists in the network; and sending, by the NF repository management function component to the first NF component, a first message that includes an identifier of the third NF component.
Claims
1. A method for processing a network function (NF) component exception, wherein the method comprises: receiving, by an NF repository management function component, a registration request message from a second NF component, wherein the registration request message comprises an identifier of the second NF component and a set identifier of an NF component set to which the second NF component belongs, receiving, by the NF repository management function component, a registration request message from a third NF component, wherein the third NF component and the second NF component belong to the same NF component set, and the registration request message comprises an identifier of the third NF component and the set identifier, receiving, by the NF repository management function component, a discovery request from a first network element when the second NF component cannot provide a service, wherein the discovery request comprises the set identifier, finding, by the NF repository management function component, the identifier of the third NF component as an alternative NF component based on the set identifier, and sending, by the NF repository management function component, the identifier of the third NF component to the first network element.
2. The method according to claim 1, wherein finding, by the NF repository management function component, the identifier of the third NF component based on the set identifier comprises: learning of, by the NF repository management function component based on the set identifier, the NF component set to which the second NF component belongs; and selecting the third NF component from the NF component set to which the second NF component belongs, wherein the third NF component includes one or more NF components.
3. The method according to claim 1, wherein the first network element is one of a first NF component, the second NF component, or an access network.
4. The method according to claim 1, further comprising: sending, by the first network element, the set identifier to the NF repository management function component; and receiving, by the first network element, the identifier of the third NF component from the NF repository management function component.
5. The method according to claim 4, further comprising: learning, by the first network element, that the second NF component cannot provide a service, and obtaining, by the first network element, the set identifier.
6. The method according to claim 5, wherein obtaining, by the first network element, the set identifier comprises either: locally obtaining the set identifier; or receiving, by the first network element, a message from a user equipment, wherein the message carries the set identifier, and wherein the first network element obtains the set identifier carried in the message.
7. The method according to claim 4, wherein when the first network element is an access network, sending, by the first network element, the set identifier to the NF repository management function component comprises sending, by the access network, the set identifier to the NF repository management function component via an NF discovery management function, and wherein when the first network element is the access network, receiving, by the first network element, the identifier of the third NF component from the NF repository management function component comprises receiving, by the access network via the NF discovery management function, the identifier of the third NF component from the NF repository management function component.
8. The method according to claim 4, further comprising sending, by the second NF component, the identifier of the third NF component to an access network when the first network element is the second NF component.
9. A network function (NF) repository management function component, comprising: a memory storing instructions; and one or more processors in communication with the memory, wherein the one or more processors execute the instructions to: receive a registration request message from a second NF component, wherein the registration request message comprises an identifier of the second NF component and a set identifier of an NF component set to which the second NF component belongs, receive a registration request message from a third NF component, wherein the third NF component and the second NF component belong to the same NF component set, and the registration request message comprises an identifier of the third NF component and the set identifier, receive a discovery request from a first network element when the second NF component cannot provide a service, wherein the discovery request comprises the set identifier, find the identifier of the third NF component as an alternative NF component based on the set identifier, and send the identifier of the third NF component to the first network element.
10. The NF repository management function component according to claim 9, wherein the one or more processors execute the instructions to: learn of, based on the set identifier, an NF component set to which the second NF component belongs, and select the third NF component from the NF component set to which the second NF component belongs, wherein the third NF component includes one or more NF components.
11. A system, comprising: a first network element configured to: learn that a second network function (NF) component cannot provide a service; obtain a set identifier of an NF component set to which the second NF component belongs; and send the set identifier; and an NF repository management function component configured to: receive a registration request message from the second NF component; wherein the registration request message comprises an identifier of the second NF component and the set identifier; receive a registration request message from a third NF component; wherein the third NF component and the second NF component belong to the same NF component set; and the registration request message comprises an identifier of the third NF component and the set identifier; receive the set identifier from the first network element; find the identifier of the third NF component as an alternative NF component based on the set identifier; wherein the third NF component and the second NF component belong to a same NF component set, and send the identifier of the third NF component to the first network element.
12. The system according to claim 11, wherein the NF repository management function component is configured to find the identifier of the third NF component by: learning of, based on the set identifier, an NF component set to which the second NF component belongs; and selecting the third NF component from the NF component set to which the second NF component belongs, wherein the third NF component comprises one or more NF components.
13. The system according to claim 11, wherein the first network element is configured to either: locally obtain the set identifier, or receive a message from a user equipment, wherein the message carries the set identifier, and wherein the first network element is configured to obtain the set identifier carried in the message.
14. The system according to claim 11, wherein the first network element is one of a first NF component, the second NF component, or an access network.
15. The method according to claim 1, wherein context data of a user equipment is shared by the second NF component and the third NF component.
16. The NF repository management function component according to claim 9, wherein context data of a user equipment is shared by the second NF component and the third NF component.
17. The system according to claim 11, wherein context data of a user equipment is shared by the second NF component and the third NF component.
18. The method according to claim 1, wherein the third NF component and the second NF component have a same NF type, wherein the registration request message from the second NF component comprise the NF type, and wherein the registration request message from the third NF component comprises the NF type.
19. The method according to claim 1, wherein: the first network element is an access network, and the second NF component is a mobility management component, or the first network element is a mobility management component, and the second NF component is a session management component or a small data component, or the first network element is a session management component or a small data component,and the second NF component is a mobility management component; or the first network element is the second NF component, and the second NF component is a mobility management component.
20. The method according to claim 1, wherein the discovery request comprises the identifier of the second NF component.
21. The NF repository management function component according to claim 9, wherein the third NF component and the second NF component have a same NF type, wherein the registration request message from the second NF component comprises the NF type, and wherein the registration request message from the third NF component comprises the NF type.
22. The NF repository management function component according to claim 9, wherein: the first network element is an access network, and the second NF component is a mobility management component, or the first network element is a mobility management component, and the second NF component is a session management component or a small data component, or the first network element is a session management component or a small data component, and the second NF component is a mobility management component, or the first network element is the second NF component, and the second NF component is a mobility management component.
23. The NF repository management function component according to claim 9, wherein the discovery request comprises the identifier of the second NF component.
24. The system according to claim 11, wherein the third NF component and the second NF component have a same NF type, wherein the registration request message from the second NF component comprise the NF type, and wherein the registration request message from the third NF component comprises the NF type.
25. The system according to claim 11, wherein: the first network element is an access network, and the second NF component is a mobility management component, or the first network element is a mobility management component, and the second NF component is a session management component or a small data component, or the first network element is a session management component or a small data component, and the second NF component is a mobility management component, or the first network element is the second NF component, and the second NF component is a mobility management component.
26. The system according to claim 11, wherein the NF repository management function component is further configured to receive, from the first network element, the identifier of the second NF component.
Description
BRIEF DESCRIPTION OF DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
DESCRIPTION OF EMBODIMENTS
(20) A main principle of the present disclosure is as follows. An NF repository management function component is added to a core network, and a plurality of NF components of a same type (for example, components of a same NF type, or components sharing a same user context, or components sharing a same network configuration) are used as a set that is pre-stored in the NF repository management function component, such that when an exception occurs in an NF component, a new NF component is selected from a set to which the NF component belongs in the NF repository management function component to complete partial or all working of the NF component in which an exception occurs, to ensure that a procedure message is properly exchanged between NF components.
(21) The following describes the technical solutions in the embodiments of the present disclosure clearly with reference to accompanying drawings in the embodiments of the present disclosure. In descriptions of the embodiments of the present disclosure, it should be understood that, a system or an element indicated using terms such as “first”, “second”, and “another” is a system or an element that is described based on the embodiments and that has a particular function, and is used only for describing the present disclosure and for description simplicity, but does not indicate or imply that the indicated system or element needs to have the name, and therefore should not be construed as a limitation on the present disclosure.
(22) Before the solutions are described in detail, to facilitate understanding of the technical solutions in the present disclosure, some nouns in the present disclosure are explained in detail. It should be understood that, the following nouns are named by persons skilled in the present disclosure only for convenience of description, do not represent or imply that an indicated system or element needs to have the name, and therefore should not be construed as a limitation on the present disclosure.
(23) An NF component is a component obtained after a network element in a core network is split based on function types, where each NF component corresponds to one or more NF types; or is a new NF component introduced to implement an NF. The NF component may be an application program used to implement an NF corresponding to the NF component, and the application program may be deployed on an application platform or a server for being invoked by the server or another device to execute the NF corresponding to the NF component. Alternatively, the NF component may be a function module that is independently deployed in the core network. This is not limited in the embodiments of the present disclosure. Only an example in which the NF component is a function module deployed in the core network is used for description in the embodiments of the present disclosure. NF components may have different names based on network functions corresponding to the NF components, to distinguish between the NF components. For example, an NF component having a Session Management (SM) function may be referred to as an SM component, an NF component having a Mobility Management (MM) function may be referred to as an MM component, and an NF component having a Small Data (SD) function may be referred to as an SD component. The SM component is responsible for managing a Protocol Data Unit (PDU) session connection of user equipment, including establishment, update, deletion, and the like of the PDU session connection. The MM component is responsible for transferring messages related to a PDU session between the SM component and the user equipment and that between the SM component and an access network. The MM component is responsible for network access management of the user equipment, location management of the user equipment, reachability management of the user equipment, and the like.
(24) An NF component exception means that an NF component is faulty or is overloaded.
(25) An NF component fault may mean that an NF component cannot operate because the NF component shuts down, for example, cannot receive or send a message exchanged with another NF component.
(26) NF component overload may mean: load (such as a quantity of received messages) on an NF component is greater than or equal to a preset threshold, or load on a Central Processing Unit (CPU) on an NF component is greater than or equal to a preset threshold, or memory consumption of an NF component is greater than or equal to a preset threshold. The preset threshold may be set as required. This is not limited in the embodiments of the present disclosure.
(27) A method for processing an NF component exception in the embodiments of the present disclosure may be applied to a network system shown in
(28) It should be noted that,
(29) Main network elements executing the solutions provided in the embodiments of the present disclosure are described in detail below with reference to
(30) The communications interface 1011 is a transceiver unit of the first NF component 100, and is configured to exchange signaling or a message with an external network element. For example, the communications interface 1011 of the first NF component 100 may receive control signaling sent by user equipment, or forward control signaling to the second NF component 200.
(31) The communications interface 2011 is a transceiver unit of the second NF component 200, and is configured to exchange signaling or a message with an external network element. For example, the communications interface 2011 may receive control signaling sent by the communications interface 2011 of the first NF component 100, or send a request message to the NF repository management function component 300.
(32) The communications interface 3011 is a transceiver unit of the NF repository management function component 300, and is configured to exchange a message with an external network element. For example, the communications interface 3011 may receive a request message sent by the communications interface 1011 of the first NF component 100 or the communications interface 2011 of the second NF component 200, or send a response message to the first NF component 100 or the second NF component 200.
(33) The processor 1012, the processor 2012, and the processor 3012 each may be a Central Processing Unit (CPU), or may be an Application Specific Integrated Circuit (ASIC), or may be one or more integrated circuits configured to implement the embodiments of the present disclosure, for example, one or more microprocessors, or one or more Digital Signal Processors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs).
(34) The memory 1013, the memory 2013, and the memory 3013 each may be a volatile memory such as a Random-Access Memory (RAM); or may be a non-volatile memory such as a Read-Only Memory (ROM), a flash memory, a hard disk such as a Hard Disk Drive (HDD), or a Solid-State Drive (SSD); or may be a combination of the foregoing types of memories. The memory 1013, the memory 2013, and the memory 3013 may be configured to store data and code. In this way, the processor 1012 runs or executes the program code stored in the memory 1013 and invokes the data stored in the memory 1013, to implement various functions of the first NF component 100; the processor 2012 runs or executes the program code stored in the memory 2013 and invokes the data stored in the memory 2013, to implement various functions of the second NF component 200; the processor 3012 runs or executes the program code stored in the memory 3013 and invokes the data stored in the memory 3013, to implement various functions of the NF repository management function component 300.
(35) The communications bus 1014, the communications bus 2014, and the communications bus 3014 each may be classified into an address bus, a data bus, a control bus, and the like, and may be an Industry Standard Architecture (ISA) bus, a peripheral component interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. For ease of denotation, each communications bus is indicated using only one thick line in
(36) In a process of processing an NF component exception provided in the embodiments of the present disclosure, as shown in 1.1 to 1.5 in
(37) Alternatively, as shown by dashed lines in
(38) Therefore, when an exception occurs in an NF component, another NF component having a same function as the NF component may process partial or all signaling sent by user equipment, such that a signaling message is properly exchanged between NF components, and network quality of service of a network is well ensured. In actual application, the first NF component shown in
(39) For ease of description, the following embodiments use an example shown in
(40)
(41) Step 101: At least one user equipment establishes a PDU session with an SM component 1.
(42) Each user equipment may establish a PDU session with the SM component 1 via an AN or an MM component, this process is an existing process, and details are not described herein. It should be noted that, for ease of description,
(43) Step 102: The SM component 1 sends a PDU session registration request message to an MM component.
(44) The PDU session registration request message may include an identifier of the user equipment establishing the PDU session with the SM component 1, an identifier of the PDU session connection, an identifier of the SM component 1, and an identifier of a set to which the SM component 1 belongs.
(45) Step 103: The MM component receives the PDU session registration request message, creates and stores a context of the PDU session connection, and returns a PDU session registration response message to the SM component 1.
(46) A correspondence among the session identifier of the PDU session connection, the identifier of the user equipment, and the identifier of the SM component 1 is recorded in the context of the PDU session connection.
(47) The PDU session registration response message is used to notify the SM component 1 that PDU session registration is completed.
(48) The session identifier of the PDU session is used to identify the PDU session. The identifier of the user equipment is used to uniquely identify the user equipment, and the identifier may be an International Mobile Subscriber Identity (IMSI). The identifier of the SM component 1 is used to uniquely identify the SM component 1.
(49) Step 104: The SM component 1 detects that the SM component 1 is overloaded.
(50) Optionally, the SM component 1 may detect whether a quantity of messages received by the SM component 1 is greater than or equal to a preset threshold, and if the quantity is greater than or equal to the preset threshold, the SM component 1 determines that the SM component 1 is overloaded and needs to perform load balancing.
(51) Alternatively, the SM component 1 detects whether load on a CPU of the SM component 1 is greater than or equal to a preset threshold, and if the load is greater than or equal to the preset threshold, the SM component 1 determines that the SM component 1 is overloaded and needs to perform load balancing.
(52) Alternatively, the SM component 1 detects whether memory consumption (such as memory usage) of the SM component 1 is greater than or equal to a preset threshold, and if the memory consumption is greater than or equal to the preset threshold, the SM component 1 determines that the SM component 1 is overloaded and needs to perform load balancing.
(53) The preset threshold may be set as required. This is not limited in this embodiment of the present disclosure.
(54) Step 105: The SM component 1 sends an NF discovery request message to an NF repository management function component.
(55) The NF discovery request message is used to request the NF repository management function component to query whether an alternative SM component exists in a network in which the SM component 1 is located.
(56) The alternative SM component may be an SM component that has a same function as the SM component 1 and that is in a same SM component set as the SM component 1.
(57) The NF discovery request message may include the identifier of the set to which the SM component 1 belongs, or may include the identifier of the SM component 1.
(58) The NF repository management function component pre-stores at least one SM component set. Each SM component set includes at least one SM component, one SM component corresponds to one identifier, and SM components in a same SM component set have a same network function. The NF repository management function component may store the at least one SM component set in a form of a table, or may store the at least one SM component set in another form. This is not limited in this embodiment of the present disclosure.
(59) Optionally, a solution shown in
(60) Optionally, as shown in
(61) An identifier of an SM component is used to uniquely identify a location of the SM component in the network. The identifier of the SM component may be a network address of the SM component or a Fully Qualified Domain Name (FQDN) of the SM component. An NF type corresponding to the SM component is used to identify a network function correspondingly executed by the SM component. An identifier of a set to which the SM component belongs is used to identify the set to which the SM component belongs.
(62) For example, the identifier of the SM component 1 is an Internet Protocol (IP) address 1, an NF type corresponding to the SM component 1 is a type 1, and the identifier of the set to which the SM component 1 belongs is A. An identifier of an SM component 2 is an IP address 2, an NF type corresponding to the SM component 2 is the type 1, and an identifier of a set to which the SM component 2 belongs is A. An identifier of an SM component 3 is an IP address 3, an NF type corresponding to the SM component 3 is a type 2, and an identifier of a set to which the SM component 3 belongs is B. An identifier of an SM component 4 is an IP address 4, an NF type corresponding to the SM component 4 is the type 2, and an identifier of a set to which the SM component 4 belongs is B. In this case, after receiving related information of these SM components, the NF repository management function component may store the information in a form of a table (as shown in the following Table 1):
(63) TABLE-US-00001 TABLE 1 SM component set SM component Identifier of the SM component Set A SM component 1 IP address 1 SM component 2 IP address 2 Set B SM component 3 IP address 3 SM component 4 IP address 4
(64) It may be understood that, the related information of the SM component includes but is not limited to the identifier of the SM component, the NF type corresponding to the SM component, and the identifier of the set to which the SM component belongs, and may further include related information of another NF component accessible by the SM component, and the like. This is not limited in this embodiment of the present disclosure.
(65) Step 106: The NF repository management function component receives the NF discovery request message, searches at least one stored SM component set, determines that an alternative SM component 2 exists, and sends an NF discovery response message to the SM component 1.
(66) The NF discovery response message may include the identifier of the SM component 2, and the NF discovery response message is used to notify the SM component 1 that the SM component 2 having a same function as the SM component 1 exists in the core network and can share load on the SM component 1.
(67) Optionally, the NF repository management function component may search for, based on the identifier of the SM component 1, an SM component set corresponding to the identifier, namely, the SM component set to which the SM component belongs; if an SM component other than the SM component 1 exists in the found SM component set, select any of the SM component other than the SM component 1 as the SM component 2; and add the identifier of the SM component 2 to the NF discovery response message, and send the NF discovery response message to the SM component 1.
(68) Alternatively, the NF repository management function component may search the at least one SM component set, to find an SM component set identified by the identifier that is in the NF discovery request message and that is of the set to which the SM component 1 belongs; if an SM component other than the SM component 1 exists in the found SM component set, select any of the SM component other than the SM component 1 as the SM component 2; and add the identifier of the SM component 2 to the NF discovery response message, and send the NF discovery response message to the SM component 1.
(69) For example, if the identifier of the set to which the SM component 1 belongs is A, after receiving the NF discovery request message, the NF repository management function component searches the foregoing Table 1; determines that the set whose set identifier is A further includes the SM component 2 and that the identifier of the SM component 2 is the IP address 2; and adds the IP address 2 to the NF discovery response message, and sends the NF discovery response message to the SM component 1.
(70) Step 107: The SM component 1 sends an NF update request message to the MM component.
(71) The NF update request message may include the identifier of the SM component 2, or may include the identifier of the SM component 2 and a load balancing policy.
(72) The load balancing policy may be determined by the SM component 1 based on a load status of the SM component 1. The load balancing policy is used to specify load shared by each SM component during load sharing, for example, the load on the SM component 1 and load on the SM component 2, to implement load balancing.
(73) In some implementations, the load balancing policy may be as follows. A plurality of UEs that correspond to a segment of consecutive IMSIs and that are in the at least one user equipment establishing a PDU session with the SM component 1 are allocated to the SM component 2, such that the SM component 2 is responsible for PDU sessions of these UEs, and the SM component 1 is responsible for a PDU session of remaining user equipment in the at least one user equipment. Alternatively, a plurality of UEs that correspond to a segment of consecutive IMSIs are allocated to the SM component 1, such that the SM component 1 is responsible for PDU sessions of these UEs, and the SM component 2 is responsible for a PDU session of remaining user equipment in the at least one user equipment. The segment of consecutive IMSIs may be some consecutive IMSIs but not all IMSIs in an IMSI corresponding to the at least one user equipment.
(74) For example, if 200 UEs establish PDU sessions with the SM component 1, and IMSIs corresponding to these UEs are from 1 to 200, the SM component 1 may formulate a load balancing policy based on the load status of the SM component 1. For example, the SM component 1 may allocate, to the SM component 2, 40 UEs corresponding to a segment of IMSIs from 60 to 100, such that the SM component 2 completes PDU sessions of the 40 UEs, and PDU sessions of 160 remaining UEs are still completed by the SM component 1.
(75) Alternatively, the load balancing policy may be an IMSI hash rule. For example, an IMSI corresponding to the at least one user equipment establishing a PDU session with the SM component 1 is classified into a set of even IMSIs and a set of odd IMSIs. The set of even IMSIs includes all even IMSIs in the IMSI corresponding to the at least one user equipment, and the set of odd IMSIs includes all odd IMSIs in the IMSI corresponding to the at least one user equipment. The SM component 1 completes PDU sessions of UEs corresponding to the even IMSIs, and the SM component 2 completes PDU sessions of UEs corresponding to the odd IMSIs. Alternatively, the SM component 2 completes PDU sessions of UEs corresponding to the even IMSIs, and the SM component 1 completes PDU sessions of UEs corresponding to the odd IMS Is.
(76) For example, if 200 UEs establish PDU sessions with the SM component 1, and IMSIs corresponding to these UEs are from 1 to 200, UEs corresponding to even IMSIs in the 200 IMSIs may be allocated to the SM component 2, the SM component 2 completes PDU sessions of the 100 UEs, and PDU sessions of 100 remaining UEs are still completed by the SM component 1.
(77) Step 108: The MM component receives the NF update request message, updates the context of the SM component 1 according to a load balancing policy, and creates a context of the SM component 2.
(78) Optionally, after receiving the NF update request message that includes only the identifier of the SM component 2, the MM component may autonomously determine which user equipment performing a PDU session with the SM component 1 is to be allocated to the SM component 2.
(79) Alternatively, after receiving the NF update request message that includes the identifier of the SM component 2 and the load balancing policy, the MM component determines, according to the load balancing policy, which user equipment performing a PDU session with the SM component 1 is to be allocated to the SM component 2; searches the context of the SM component 1 stored in the MM component; deletes an identifier, in the context of the SM component 1, of the user equipment to be allocated to the SM component 2; and records, as the context of the SM component 2, a correspondence among the identifier of the user equipment to be allocated to the SM component 2, a session identifier of the PDU session, and the identifier of the SM component 2.
(80) Step 109: The MM component receives SM signaling sent by the user equipment, searches a context of an SM component stored in the MM component, and forwards the SM signaling to an SM component (such as SM component 2) based on an identifier of the SM component in found context of the SM component.
(81) The SM signaling may include the identifier of the user equipment and the session identifier of the PDU session.
(82) Optionally, after receiving the SM signaling sent by the user equipment, the MM component searches, based on the identifier of the user equipment and the session identifier of the PDU session that are carried in the SM signaling, the context of the SM component stored in the MM component for a context of an SM component including the identifier of the user equipment and the identifier of the PDU session, and sends the SM signaling to the SM component based on an identifier of the SM component in the found context of the SM component. For example, if the identifier of the user equipment and the identifier of the PDU session are included in the context of the SM component 1, the MM component sends the SM signaling to the SM component 1. Alternatively, if the identifier of the user equipment and the identifier of the PDU session are included in the context of the SM component 2, the MM component sends the SM signaling to the SM component 2.
(83) Therefore, after the technical solution shown in
(84) In another implementation solution of the embodiments of the present disclosure, the following problem may be further resolved: An SM component shuts down (cannot operate) in a process in which user equipment performs a session with the SM component. As shown in
(85) For steps 201 to 203, step 201 is the same as step 101 shown in
(86) Step 204: The MM component detects that the SM component 1 shuts down.
(87) Optionally, the MM component may detect, using conventional approaches, that the SM component 1 shuts down, so detailed description is not repeated in this embodiment of the present disclosure.
(88) Step 205: The MM component sends an NF discovery request message to an NF repository management function component.
(89) The NF discovery request message is used to request the NF repository management function component to query whether an alternative SM component exists in a network in which the SM component 1 is located. The NF discovery request message may include an identifier of the SM component 1, or may include an identifier of a set to which the SM component 1 belongs. The alternative SM component may be an SM component that has a same function as the SM component 1 and that is in a same SM component set as the SM component 1.
(90) The NF repository management function component pre-stores at least one SM component set. Each SM component set includes at least one SM component, one SM component corresponds to one identifier, and SM components in a same SM component set have a same network function. The NF repository management function component may store the at least one SM component set in a form of a table, or may store the at least one SM component set in another form. This is not limited in this embodiment of the present disclosure.
(91) A process in which the NF repository management function component pre-stores at least one SM component set is shown in
(92) Step 206: The NF repository management function component receives the NF discovery request message, searches at least one stored SM component set, determines that an alternative SM component 2 exists, and sends an NF discovery response message to the MM component.
(93) The NF discovery response message may include an identifier of the SM component 2, and the NF discovery response message is used to notify the MM component that the SM component 2 having a same function as the SM component 1 exists in the network in which the SM component 1 is located and can share load on the SM component 1.
(94) The process of determining that an alternative SM component 2 exists in step 206 is the same as that in step 106, and details are not described herein again.
(95) Step 207: The MM component receives the NF discovery response message, deletes the context of the SM component 1 based on the NF discovery response message, and creates a context of the SM component 2.
(96) Optionally, after receiving the NF discovery response message, the MM component determines, based on the identifier of the SM component 2 in the response message, to allocate all services of the SM component 1 to the SM component 2 for processing; searches the context of the SM component 1 stored in the MM component; deletes the context of the SM component 1; and records, as the context of the SM2 component, a correspondence among an identifier of the user equipment, a session identifier of the PDU session, and the identifier of the SM component 2, where the identifier of the user equipment and the session identifier of the PDU session are in the SM component 1.
(97) Step 208: The MM component receives SM signaling sent by the user equipment, searches a context of an SM component stored in the MM component, and forwards the SM signaling to the SM component 2 based on an identifier of the SM component in a found context of the SM component.
(98) The SM signaling may include the identifier of the user equipment and the session identifier of the PDU session.
(99) Optionally, after receiving the SM signaling sent by the user equipment, the MM component searches, based on the identifier of the user equipment and the session identifier of the PDU session that are carried in the SM signaling, the context of the SM component stored in the MM component for a context of an SM component including the identifier of the user equipment and the identifier of the PDU session. Further, the MM component sends the SM signaling to the SM component based on an identifier of the SM component in the found context of the SM component.
(100) Therefore, after the technical solution shown in
(101) In another implementation solution of the embodiments of the present disclosure, the following problem may be further resolved. An SD component shuts down (cannot operate) in a process in which user equipment performs small data transmission with the SD component. As shown in
(102) Step 301: An MM component detects that an SD component 1 shuts down.
(103) Optionally, the MM component may detect, using conventional approaches, that the SD component 1 shuts down, so detailed description is not repeated in this embodiment of the present disclosure.
(104) Step 302: The MM component sends an NF discovery request message to an NF repository management function component.
(105) The NF discovery request message is used to request the NF repository management function component to query whether an alternative SD component exists in a network in which the SD component 1 is located. The NF discovery request message may include an identifier of a set to which the SD component 1 belongs, or may include an identifier of the SD component 1. The alternative SD component may be an SD component that has a same function as the SD component 1 and that is in a same SD component set as the SD component 1.
(106) The NF repository management function component pre-stores at least one SD component set. Each SD component set includes at least one SD component, one SD component corresponds to one identifier, and SD components in a same SD component set have a same network function. The NF repository management function component may store the at least one SD component set in a form of a table, or may store the at least one SD component set in another form. This is not limited in this embodiment of the present disclosure.
(107) A process in which the NF repository management function component pre-stores at least one SD component set is shown in
(108) Step 303: The NF repository management function component receives the NF discovery request message, searches at least one stored SD component set, determines that an alternative SD component 2 exists, and sends an NF discovery response message to the MM component.
(109) The NF discovery response message may include an identifier of the SD component 2, and the NF discovery response message is used to notify the MM component that the SD component 2 having a same function as the SD1 component exists in the core network and can share load on the SD component 1.
(110) The process of determining that an alternative SD component 2 exists in step 303 is the same as that in step 106, and details are not described herein again.
(111) Step 304: The MM component receives the NF discovery response message, deletes a context of the SD component 1 based on the NF discovery response message, and creates a context of the SD component 2.
(112) Optionally, after receiving the NF discovery response message, the MM component determines, based on the identifier of the SD component 2 in the response message, to allocate all services of the SD component 1 to the SD component 2 for processing; searches the context of the SD component 1 stored in the MM component; deletes the context of the SD component 1; and records, as the context of the SD2 component, a correspondence among an identifier of user equipment, a session identifier of a PDU session, and the identifier of the SD component 2, where the identifier of the user equipment and the session identifier of the PDU session are in the SD component 1.
(113) Step 305: The MM component receives SD signaling sent by user equipment, searches a context of an SD component stored in the MM component, and forwards the SD signaling to the SD component 2 based on an identifier of an SD component in a found context of the SD.
(114) The SD signaling may include the identifier of the user equipment and the session identifier of the PDU session.
(115) Optionally, after receiving the SD signaling sent by the user equipment, the MM component searches, based on the identifier of the user equipment and the session identifier of the PDU session that are carried in the SD signaling, the context of the SD component stored in the MM component for a context of an SD component including the identifier of the user equipment and the identifier of the PDU session. Further, the MM component sends the SD signaling to the SD component based on an identifier of the SD component in the found context of the SD component.
(116) Therefore, after the technical solution shown in
(117) The foregoing mainly describes, from the perspective of interaction between the NF repository management function component, the first NF component, and the second NF component, the method for processing an NF component exception provided in the embodiments of the present disclosure. It may be understood that, to achieve the foregoing functions, the foregoing node or network element includes a corresponding hardware structure and/or software module for implementing each function. Persons skilled in the art may be easily aware that, units and algorithm steps in each example described with reference to the embodiments disclosed in this specification can be implemented in a form of hardware or a combination of hardware and computer software in the present disclosure. Whether a function is implemented by hardware or computer software driving hardware depends on particular applications and design constraint conditions of the technical solutions. Persons skilled in the art may use different methods to implement the described functions for each particular application, but it should not be considered that the implementation goes beyond the scope of the present disclosure.
(118) Based on the methods in the first embodiment to the third embodiment, an embodiment of the present disclosure may be further used to process an exception occurring in an MM component. An access network transfers a message exchanged between user equipment and the MM component, to complete service interaction between the user equipment and an NF component in a core network. If an exception occurs in the MM component in a message exchange process, a solution provided in this embodiment of the present disclosure may be used to ensure that the access network exchanges a message with an alternative MM component. This way, a network side can continue to provide a service for the user equipment, and network quality of service of the network is improved. As shown in
(119) 1001. A first network element learns that a second NF component cannot provide a service.
(120) The first network element learns, using conventional approaches, that the second NF component cannot provide a service. For example, the first network element finds, using a detection technology, that the second NF component shuts down; or when sending, to the second NF component, information from a terminal, the first network element does not receive response and the like within a specified time; or the second NF component sends a notification message to notify the first network element that the second NF component cannot provide a service. The first network element may be a first NF component, the second NF component, or an access network AN. For example, if the first network element is an access network (AN), the second NF component may be an MM component; or if the first network element is a first NF component and is an MM component, the second NF component may be an SM component, an SD component, or another NF component described above; or if the first network element is a first NF component and is an SM component or an SD component, the second NF component may be an MM component. If the first network element is the second NF component, the second NF component may be an MM component.
(121) 1002. The first network element obtains a set identifier of the second NF component, and sends the set identifier of the second NF component to an NF repository management function component, to request to query an alternative NF component.
(122) Optionally, the first network element may send an identifier of the second NF component.
(123) In some implementations, the set identifier of the second NF component may be carried in a request message, for example, an NF discovery request message. Alternatively, the request message may further include the identifier of the second NF component.
(124) An implementation in which the first network element obtains the set identifier of the second NF component may include the following manners.
(125) Manner 1: The first network element receives a message sent by user equipment, where the message carries the set identifier of the second NF component, and the first network element obtains the carried set identifier from the message sent by the user equipment.
(126) Manner 2: The first network element locally obtains the set identifier of the second NF component. For example, the first network element receives a message sent by user equipment, where the message carries the component identifier of the second NF component, and locally obtains the set identifier of the second NF component based on the component identifier of the second NF component. Alternatively, the first network element finds that the second NF component is faulty, and locally obtains the set identifier of the second NF component.
(127) 1003. The NF repository management function component obtains an identifier of an alternative third NF component based on the set identifier of the second NF component, where the third NF component and the second NF component belong to a same set.
(128) There may be one or more identifiers of third NF components. The identifier of the third NF component is different from the identifier of the second NF component, that is, the third NF component and the second NF component are not a same component.
(129) An implementation of step 1003 may be as follows. The NF repository management function component learns of, based on the set identifier of the second NF component, an NF component set to which the second NF component belongs, and selects, as the alternative third NF component, one or more NF components from the NF component set to which the second NF component belongs.
(130) Optionally, this embodiment may further include the following step.
(131) The NF repository management function component receives a registration request message from a network management function server (for details, refer to
(132) 1004. The NF repository management function component sends the identifier of the third NF component to the first network element, where there may be one or more identifiers of third NF components.
(133) 1005. The first network element determines that the third NF component provides a service for user equipment.
(134) If there are a plurality of third NF components, the first network element may select one of the third NF components to provide a service, or may select a plurality of third NF components as required, to provide a service.
(135) Optionally, in this embodiment, when the first network element is the second NF component, that is, after finding that itself cannot provide a service, the second NF component obtains the identifier of the alternative third NF component. In this case, step 1005 may include: sending, by the second NF component, the identifier of the third NF component to an access network, that is, the second NF component notifies the access network that the third NF component takes over a service of the second NF component.
(136) Optionally, in this embodiment, when the first network element is a first NF component or an access network, step 1005 may include the following manners.
(137) Manner 1: The first NF component or the access network updates a correspondence between the user equipment and the second NF component to a correspondence between the user equipment and the third NF component. When subsequently receiving information to be sent by the user equipment or another network device to the second NF component, the first NF component or the access network may send the information to the third NF component based on the updated correspondence. When the first NF component is an SM component and the second NF component is an MM component, the correspondence further includes an identifier of a PDU session.
(138) Manner 2: If the user equipment requests to access the second NF component, step 1005 includes: sending, by the first NF component or the access network to the third NF component, information to be sent by the user equipment to the second NF component. It may be understood that, the information to be sent by the user equipment may be transmitted via different messages in a transmission process. For example, the access network receives a request message from the user equipment, where the message carries the information, and the first network element directly sends the message to the third NF component, or the first network element extracts the information, performs re-encapsulation to generate a new message, and then sends the message to the third NF component.
(139) Optionally, in this embodiment, when the first network element is an access network, step 1002 of sending, by the first network element, the set identifier of the second NF component to an NF repository management function component includes: sending, by the access network, the set identifier of the second NF component to the NF repository management function component via an NF discovery management function, and step 1004 of sending, by the NF repository management function component, the identifier of the third NF component to the first network element includes: sending, by the NF repository management function component, the identifier of the third NF component to the access network via the NF discovery management function. It may be understood that, the set identifier of the second NF component and the identifier of the third NF component may be transmitted using messages in different forms in a transmission process. For example, the access network sends the set identifier of the second NF component to the NF repository management function component via the NF discovery management function, and after receiving the set identifier of the second NF component sent by the access network, the NF discovery management function may generate a new message through re-encapsulation, and send the message to the NF repository management function component.
(140) It may be understood that, there is no sequence between step 1001 and steps 1002 to 1004. In other words, the first network element may learn that the second NF component cannot provide a service, and then obtain the identifier of the alternative third NF component from the NF repository management function component and determine that the third NF component provides a service for the user equipment. Alternatively, the first network element may obtain the identifier of the alternative third NF component from the NF repository management function component, and when learning that the second NF component cannot provide a service, the first network element determines, based on the obtained identifier of the third NF component, that the third NF component provides a service for the user equipment.
(141) Based on the embodiment in
(142) Step 1101: The access network (AN) transmits a message between user equipment and the MM component 1.
(143) The message between the user equipment and the MM component 1 includes data (such as SMS data) or control-plane signaling (for example, the signaling may be signaling of an access and mobility management type, signaling of a session management type, or the like). The AN stores an obtained identifier of the MM component 1 and an obtained identifier of an MM set to which the MM component 1 belongs.
(144) Step 1102: The access network learns that the MM component 1 cannot provide a service.
(145) For example, the AN may detect, using conventional approaches, that the MM component 1 shuts down. For details, refer to descriptions in the embodiment in
(146) Step 1103: The AN sends an NF discovery request message to an NF repository management function component.
(147) The NF discovery request message is used to request the NF repository management function component to query whether an alternative MM component exists in a network corresponding to the MM component 1. The NF discovery request message may include the identifier of the set to which the MM component 1 belongs, or may further include the identifier of the MM component 1. The alternative MM component may be an MM component that has a same function as the MM component 1 and that is in a same MM component set as the MM component 1.
(148) Step 1104: The NF repository management function component receives the NF discovery request message, searches at least one stored MM component set, and obtains an identifier of the alternative MM component 2.
(149) The identifier of the MM component 2 is different from the identifier of the MM component 1.
(150) For an obtaining process, refer to descriptions in step 1003. For example, the NF repository management function component pre-stores at least one MM component set. An MM component set includes at least one MM component, one MM component corresponds to one component identifier, and MM components in a same MM component set have a same network function NF. The NF repository management function component may store the at least one MM component set in a form of a table, or may store the at least one MM component set in another form. This is not limited in this embodiment of the present disclosure.
(151) Step 1105: Send an NF discovery response message to the access network.
(152) The NF discovery response message may include the identifier of the MM component 2, and the NF discovery response message is used to notify the access network that the MM component 2 having a same function as the MM component 1 exists in a core network and can share load on the MM component 1.
(153) Step 1106: The access network receives the NF discovery response message, and updates, based on the NF discovery response message, context information used to transmit a message between the user equipment and an MM component in a core network.
(154) For example, after receiving the NF discovery response message, the access network determines, based on the identifier of the MM component 2 in the response message, to allocate a service of the MM component 1 to the MM component 2 for processing, and changes a stored correspondence between the user equipment and the identifier of the MM component 1 to a correspondence between the user equipment and the identifier of the MM component 2.
(155) Step 1107: The access network receives information (for example, the information is carried in control-plane signaling) sent by the user equipment, searches context information that is used to transmit a message between the user equipment and the MM component 2 in the core network and that is stored in the access network, and sends, to the MM component 2 based on the found identifier of the MM component 2, the information sent by the user equipment.
(156) The control-plane signaling may include an identifier of the user equipment and an identifier of a type of the control-plane signaling.
(157) Based on the embodiment in
(158) For steps 1201 and 1202, refer to descriptions in steps 1101 and 1102, respectively.
(159) Step 1203: The AN sends an NF discovery request message to an NF repository management function component via an NF discovery management function on an access network side.
(160) The NF discovery management function on the access network side is deployed in the access network, and the NF discovery management function receives an NF discovery request message from the AN, checks whether the AN allows discovering an MM component in a core network, and further sends the NF discovery request message to the NF repository management function component.
(161) For steps 1204 and 1205, refer to descriptions in steps 1104 and 1105.
(162) Step 1206: The access network receives the NF discovery response message via the NF discovery management function on the access network side, and updates, based on the NF discovery response message, context information used to transmit a message between the user equipment and an MM component in a core network.
(163) Optionally, after receiving the NF discovery response message, the NF discovery management function on the access network side further sends the NF discovery response message to the AN. The AN determines, based on the identifier of the MM component 2 in the response message, to allocate all services of the MM component 1 to the MM component 2 for processing, and changes a stored correspondence between the user equipment and an identifier of the MM component 1 to a correspondence between the user equipment and the identifier of the MM component 2.
(164) For step 1207, refer to descriptions in step 1107.
(165) Based on the embodiment in
(166) Step 1301: An access network AN transmits a message between user equipment and the MM component 1.
(167) For details of the step, refer to step 1101. Details are not described herein again.
(168) Step 1302: The MM component 1 determines that itself cannot continue to provide a service.
(169) The MM component 1 may detect, using conventional approaches, that an exception occurs in the MM component 1, and consequently the MM component 1 cannot continue to process a message and the like from the user equipment and needs to enable an alternative MM component, so detailed description is not repeated in this embodiment of the present disclosure.
(170) Step 1303: The MM component 1 sends an NF discovery request message to an NF repository management function component.
(171) For details of the step, refer to step 1103. The NF discovery request message is used to request the NF repository management function component to query whether an alternative MM component exists in a network in which the MM component 1 is located. The NF discovery request message may include an identifier of a set to which the MM component 1 belongs, or may include an identifier of the MM component 1. The alternative MM component may be an MM component that has a same function as the MM component 1 and that is in a same MM component set as the MM component 1.
(172) Step 1304: The NF repository management function component obtains an identifier of the alternative MM component 2.
(173) For details of the step, refer to step 1104. Details are not described herein again.
(174) Step 1305: The NF repository management function component receives the NF discovery request message, searches at least one stored MM component set, determines that the alternative MM component 2 exists, and sends an NF discovery response message to the MM component 1.
(175) The NF discovery response message may include the identifier of the MM component 2, and the NF discovery response message is used to notify the MM component 1 that the MM component 2 having a same function as the MM component 1 exists in the core network and can share load on the MM component 1.
(176) Step 1306: The MM component 1 receives the NF discovery response message, and sends an MM component update message to the access network based on the NF discovery response message.
(177) The MM component update message includes the identifier of the MM component 2.
(178) Optionally, the MM component 1 stores an identifier of an access network establishing a connection to the MM component 1, and sends the MM component update message to the access network corresponding to the identifier of the access network.
(179) Step 1307: The access network receives the MM component update message, and updates, based on the MM component update message, context information used to transmit a message between the user equipment and an MM component in a core network.
(180) Optionally, after receiving the MM component update message, the AN determines, based on the identifier of the MM component 2 in the message, to allocate all services of the MM component 1 to the MM component 2 for processing, and changes a stored correspondence between the user equipment and the identifier of the MM component 1 to a correspondence between the user equipment and the identifier of the MM component 2.
(181) Step 1308 may be the same as step 1107. Details are not described herein again.
(182) Based on the methods in the foregoing embodiments, an embodiment of the present disclosure may be further used to process an exception occurring in an MM component. An MM component 1 transfers a message exchanged between user equipment and another core network component (such as an SM component or an SD component), to complete service interaction between the user equipment and an NF component in a core network. If an exception occurs in the MM component 1 in a message exchange process, the other core network component (such as an SM component or an SD component) may request an alternative MM component 2 from an NF repository management function component via a set identifier of the MM component 1, such that a network side can continue to provide a service for the user equipment, and network quality of service and reliability of the network are improved. As shown in
(183) Step 1401: An access network AN transmits a message between user equipment and the MM component 1.
(184) Step 1402: The SM component detects that the MM component 1 shuts down.
(185) Optionally, the SM component may detect, using conventional approaches, that the MM component 1 shuts down. For details, refer to related descriptions in the embodiment in
(186) Step 1403: The SM component sends an NF discovery request message to an NF repository management function component.
(187) The NF discovery request message is used to request the NF repository management function component to query whether an alternative MM component exists in a network in which the MM component 1 is located. The NF discovery request message may include an identifier of a set to which the MM component 1 belongs, or may further include an identifier of the MM component 1. The alternative MM component may be an MM component that has a same function as the MM component 1 and that is in a same MM component set as the MM component 1. In addition, to improve network running reliability, the alternative MM component and the MM component 1 that are in a same MM component set share a same context database, and the MM component 1 stores context data of the user equipment in the context database. Therefore, when the MM component 1 is faulty, the alternative MM component may obtain the context data of the user equipment from the context database based on an identifier of the user equipment, and further provide a service for the user equipment based on the context data of the user equipment.
(188) The NF repository management function component pre-stores at least one MM component set. Each MM component set includes at least one MM component, one MM component corresponds to one identifier, and MM components in a same MM component set have a same network function. The NF repository management function component may store the at least one MM component set in a form of a table, or may store the at least one MM component set in another form. This is not limited in this embodiment of the present disclosure.
(189) For a process in which the NF repository management function component pre-stores at least one MM component set, refer to the foregoing embodiments, for example, the embodiment in FIG.
(190) Step 1404: The NF repository management function component receives the NF discovery request message, searches at least one stored MM component set, determines that the alternative MM component 2 exists, and sends an NF discovery response message to the SM component.
(191) The NF discovery response message may include an identifier of the MM component 2, and the NF discovery response message is used to notify the SM component that the MM component 2 having a same function as the MM component 1 exists in the core network and can share load on the MM component 1.
(192) The process of determining that the alternative MM component 2 exists in step 1404 is the same as that in step 106, and details are not described herein again.
(193) Step 1405: The SM component receives the NF discovery response message, searches, based on an identifier of the MM component 2 in the NF discovery response message, a context of the user equipment stored in the SM component, updates, to the identifier of the MM component 2, an identifier of the MM component 1 in information about a correspondence among an identifier of the user equipment, an identifier of a PDU session of the user equipment, and the identifier of the MM component 1 that are in the context of the user equipment.
(194) Step 1406: When the SM component needs to send a PDU session message to the user equipment, the SM component determines, based on the context of the user equipment that is updated in step 1405 and is stored in the SM component, to send the PDU session message to the user equipment via the MM component 2, and the SM component sends, to the MM component 2, the PDU session message to be sent to the user equipment, where the PDU session message includes the identifier of the user equipment.
(195) Step 1407: The MM component 2 receives the PDU session message sent by the SM component, and obtains, based on the identifier of the user equipment in the PDU session message, context data of the user equipment from a context database used by the MM component 1, where the context data of the user equipment includes context data of a control-plane connection between the user equipment and a core network, an identifier of an access network that provides network access for the user equipment, context data of access and mobility management performed for the user equipment, and the like, such that the MM component 2 recovers the control-plane connection between the user equipment and the core network. The MM component 2 further sends the PDU session message to the user equipment via the control-plane connection between the user equipment and the core network.
(196) Therefore, after the technical solution shown in
(197) In the embodiments of the present disclosure, with reference to
(198) When each function module obtained through division based on a corresponding function is used,
(199) When an integrated unit is used, the receiving unit 101 and the sending unit 103 shown in
(200) When each function module obtained through division based on a corresponding function is used,
(201) When an integrated unit is used, the receiving unit 201 and the sending unit 202 shown in
(202) When each function module obtained through division based on a corresponding function is used,
(203) When an integrated unit is used, the sending unit 301 and the receiving unit 302 shown in
(204)
(205)
(206) It may be understood that, the processing unit 1502 in
(207) When the processing unit 1502 is a processor, the receiving unit 1501 and the sending unit 1503 is a transceiver, and the storage unit is a memory, the NF repository management function component and the first network element in this embodiment of the present disclosure may be a network device shown in
(208) It should be noted that, all related content of the steps in the method embodiments may be cited as function descriptions of corresponding function modules. Details are not described herein again.
(209) In another aspect, an embodiment of the present disclosure further provides a system for processing an NF component exception. As shown in
(210) The NF repository management function component 10, the first NF component 20, and the second NF component 30 are the same as the foregoing devices. Details are not described herein again.
(211) In addition, the system for processing an NF component exception provided in this embodiment of the present disclosure implements the methods for processing an NF component exception shown in
(212) It may be clearly understood by persons skilled in the art that, for the purpose of convenient and brief description, for a detailed working process of the foregoing system, apparatus, and unit, refer to a corresponding process in the foregoing method embodiments, and details are not described herein.
(213) In the several embodiments provided in this application, it should be understood that the disclosed system, apparatus, and method may be implemented in other manners. For example, the described apparatus embodiment is only an example. For example, the unit division is only logical function division and may be other division in actual implementation. For example, a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed. In addition, the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented via some interfaces. The indirect couplings or communication connections between the apparatuses or units may be implemented in electronic or other forms.
(214) The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on a plurality of network devices. Some or all of the units may be selected based on actual needs to achieve the objectives of the solutions of the embodiments.
(215) In addition, function units in the embodiments of the present disclosure may be integrated into one processing unit, or each of the function units may exist alone, or two or more units are integrated into one unit. The integrated unit may be implemented in a form of hardware, or may be implemented in a form of hardware in addition to a software function unit.
(216) When the foregoing integrated unit is implemented in a form of a software function unit, the integrated unit may be stored in a computer-readable storage medium. The software function unit is stored in a storage medium and includes several instructions for instructing a computer device (which may be a personal computer, a server, a network device, or the like) to perform some of the steps of the methods described in the embodiments of the present disclosure. The foregoing storage medium includes: any medium that can store program code, such as a Universal Serial Bus (USB) flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disc.
(217) Finally, it should be noted that, the foregoing embodiments are only intended for describing the technical solutions of the present disclosure rather than limiting the present disclosure. Although the present disclosure is described in detail with reference to the foregoing embodiments, persons of ordinary skill in the art should understand that they may still make modifications to the technical solutions described in the foregoing embodiments or make equivalent replacements to some technical features thereof, without departing from the scope of the claims.