Abstract: The present disclosure provides a system (100) and method (500) for policy control function (PCF) - Sd interface support in a communication network. The system includes a Session Management Function (SMF) responsible for generating session management (SM) policy control messages and the PCF (106) coupled with the SMF (104) to collect and process these messages. The PCF extracts diameter attribute value pair (AVP) from the SM policy control messages to create diameter messages, which are transmitted to a Deep Packet Inspection (DPI) node (114) via a Diameter Routing Agent (DRA) (112). The DPI node forwards these messages to the User Plane Function (UPF) (108), which provides regulatory services within the network, enabling effective traffic management and control. FIG.1
FORM 2
PATENTS ACT, 1970 (39 of 1970) PATENTS RULES, 2003
COMPLETE SPECIFICATION
(See section 10; rule 13)
TITLE OF THE INVENTION
SYSTEM AND METHOD FOR PCF - SD INTERFACE SUPPORT IN A COMMUNICATION
NETWORK
APPLICANT
JIO PLATFORMS LIMITED
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India; Nationality: India
following specification particularly describes the invention and the manner in which it is to be performed
RESERVATION OF RIGHTS
[0001] A portion of the disclosure of this patent document contains material,
which is subject to intellectual property rights such as, but are not limited to, copyright, design, trademark, Integrated Circuit (IC) layout design, and/or trade 5 dress protection, belonging to Jio Platforms Limited (JPL) or its affiliates (hereinafter referred as owner). The owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights whatsoever. All rights to such intellectual property are fully 10 reserved by the owner.
FIELD OF DISCLOSURE
[0002] The embodiments of the present disclosure generally relate to a
communication network. In particular, the present disclosure relates to a system and method for policy control function (PCF) – Sd interface support in the 15 communication network.
DEFINITION
[0003] As used in the present disclosure, the following terms are generally
intended to have the meaning as set forth below, except to the extent that the context
in which they are used indicate otherwise.
20 [0004] The expression ‘SMF’ used hereinafter in the specification refers to
session management function for collecting information related to packet data unit
(PDU) session management from various network components in the 5G core
network.
[0005] The expression ‘PCF’ used hereinafter in the specification refers to
25 policy control function specifying policy rules for application and service data flow
detection, gating, quality of service (QoS), and flow-based charging to the SMF.
2
[0006] The expression ‘AMF’ used hereinafter in the specification refers to
access and mobility management function providing control plane network functions (NF) of the 5G core network.
[0007] The expression ‘UPF’ used hereinafter in the specification refers to
5 user plane function for connecting the actual data coming over the Radio Area Network (RAN) to the Internet.
[0008] The expression ‘DPI node’ used hereinafter in the specification
refers to a deep packet inspection node for examining the content of data packets as
these data packets pass by a checkpoint in a communication network.
10 [0009] These definitions are in addition to those expressed in the art.
BACKGROUND OF DISCLOSURE
[0010] The following description of related art is intended to provide
background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the
15 present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art.
[0011] In recent times, there have been many users subscribing to fifth
generation (5G) network services, and it is essential to provide proper service
20 delivery and high-quality experience to the users. In the existing fourth generation (4G) network, a deep packet inspection (DPI) node supports regulatory requirements to enhance user experience. With the growing 5G subscribers, it is required that the DPI node performs regulatory functions for the 5G network. The existing 4G DPI node may be used in the 5G core network (5GCN) production
25 environment to fulfil such regulatory requirements. However, there needs to be specifications related to the techniques for interfacing the existing 4G DPI node with the 5G network.
[0012] There is, therefore, a need in the art to provide a method and a system
that can overcome the shortcomings of the existing prior arts.
3
OBJECTS OF THE PRESENT DISCLOSURE
[0013] Some of the objects of the present disclosure, which at least one
embodiment herein satisfies are as listed herein below.
[0014] An object of the present disclosure is to enable the existing 4G deep
5 packet inspection (DPI) node to provide regulatory services for the 5G network.
[0015] An object of the present disclosure is to provide a policy control
function (PCF) to send diameter messages to the diameter routing agent (DRA).
[0016] An object of the present disclosure is to enable PCF to collect
diameter attribute value pair (AVP) information from session management (SM) 10 policy control hypertext transfer protocol (http2) messages.
[0017] An object of the present disclosure is to enable PCF to collect
information related to a user plane function control place (UPF-CP) from a session
management function (SMF).
[0018] An object of the present disclosure is to enable the PCF to send the
15 Sd traffic to the 4G DPI nodes for specific UPF which may be connected with DPI.
[0019] An object of the present disclosure is to provide a standby DPI node
to perform the functions of the active DPI node during a failure.
SUMMARY
[0020] The present disclosure discloses a system for catering traffic in a
20 communication network. The system includes a session management function (SMF), a policy control function (PCF), and a deep packet inspection (DPI) node. The session management function (SMF) is configured to generate a plurality of session management (SM) policy control messages. The PCF is coupled with the SMF to receive the generated plurality of SM policy control messages. The PCF is 25 further configured to extract at least one diameter attribute value pair (AVP) from the received SM policy control messages to generate a plurality of diameter messages. The PCF is configured to transmit the plurality of generated diameter messages to the deep packet inspection (DPI) node, via a diameter routing agent (DRA). The DPI node is configured to cater to the traffic by forwarding the plurality
4
of diameter messages to at least one User Plane Function (UPF) connected with the DPI node. The at least one UPF is configured to provide at least one regulatory service in the communication network.
[0021] In an embodiment, the plurality of SM policy control messages
5 includes one or more of a policy creation message and a policy updation message.
[0022] In an embodiment, the at least one diameter attribute value pair
(AVP) includes a destination-Host AVP, a Server-Name AVP, a Subscription ID AVP, a Framed IP Address AVP, an Origin-Host AVP, an Origin-Realm AVP, a Destination-Realm AVP, an ADC-Rule-Install AVP, an Event-Trigger AVP, a 10 Subscription-id AVP, a User-Equipment-Info AVP, a Framed-IP-Address AVP, a Framed-IPv6-Prefix AVP, a Called-Station-id AVP, a 3GPP-SGSN-MCC-MNC AVP, and a 3GPP-User-Location-Info AVP.
[0023] In an embodiment, the plurality of diameter messages includes a
number of data messages, a plurality of diameter interface messages, and at least 15 one diameter AVP.
[0024] In an embodiment, the plurality of diameter interface messages
includes at least one or more of a traffic detection function (TDF) -Session-Request (TSR) message, a TDF-Session-Answer (TSA) message, a Re-Auth-Request (RAR) message, a Re-Auth-Answer (RAA) message, and a Credit-Control (CC) 20 Request (CCR) message and a CC-Answer (CCA) message.
[0025] In an embodiment, the DPI node is coupled with the PCF or a policy
and charging rules function (PCRF) via an Sd interface.
[0026] In an embodiment, the DPI node is configured to manage traffic of
at least one UPF cluster having 3 Active UPF data plane (DP) servers.
25 [0027] In an embodiment, the DRA is configured to control distribution of
the plurality of diameter messages among the DP servers of the at least one UPF cluster.
5
[0028] In an embodiment, the PCF is configured to maintain a runtime
configurable table having values of a control plane information, at least one data network name (DNN), a Diameter-Host DPI, a Diameter-Realm DPI, a primary DRA Internet Protocol (IP) address, and a secondary DRA IP address.
5 [0029] In an embodiment, the PCF is configured to extract at least one
control plane information from the SM policy control message and map the extracted control plane information with the control plane information stored in the runtime configurable table corresponding to the at least one UPF to take an action accordingly.
10 [0030] In an embodiment, the action is selected from a group consisting of
triggering a Sd session, terminating an existing Sd session, and establishing a new Sd session.
[0031] In an embodiment, the at least one regulatory service is an
application-level barring service.
15 [0032] The present disclosure discloses a method of catering traffic in a
communication network. The method includes generating, by a session management function (SMF), a plurality of session management (SM) policy control messages. The method includes collecting, by a policy control function (PCF), the generated plurality of SM policy control messages. The method includes
20 extracting, by the PCF, at least one diameter attribute value pair (AVP) from the received SM policy control messages to generate a plurality of diameter messages. The method includes transmitting, by the PCF, the plurality of generated diameter messages to a deep packet inspection (DPI) node, via a diameter routing agent (DRA). The method includes catering, by the DPI node, the traffic by forwarding
25 the plurality of diameter messages to at least one User Plane Function (UPF). The at least one UPF is configured to provide at least one regulatory service in the communication network.
6
[0033] In an embodiment, the method further includes a step of extracting
at least one control plane information from the SM policy control message and mapping the extracted control plane information with a control plane information stored in the runtime configurable table corresponding to the at least one UPF to 5 take an action accordingly.
[0034] The present disclosure discloses a user equipment (UE)
communicatively coupled with a system for catering traffic in a communication network. The coupling comprises steps of receiving a connection request by the system, sending an acknowledgment of the connection request to the system, and
10 transmitting a plurality of signals in response to the connection request. The system includes a session management function (SMF), a policy control function (PCF), and a deep packet inspection (DPI) node. The session management function (SMF) is configured to generate a plurality of session management (SM) policy control messages. The PCF is coupled with the SMF to receive the generated plurality of
15 SM policy control messages. The PCF is further configured to extract at least one diameter attribute value pair (AVP) from the received SM policy control messages to generate a plurality of diameter messages. The PCF is configured to transmit the plurality of generated diameter messages to the deep packet inspection (DPI) node, via a diameter routing agent (DRA). The DPI node is configured to cater the traffic
20 by forwarding the plurality of diameter messages to at least one User Plane Function (UPF) connected with the DPI node. The at least one UPF is configured to provide at least one regulatory service in the communication network.
BRIEF DESCRIPTION OF DRAWINGS
[0035] The accompanying drawings, which are incorporated herein, and
25 constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Some drawings may indicate the components
7
using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such drawings includes the disclosure of electrical components, electronic components or circuitry commonly used to implement such components.
5 [0036] FIG. 1 illustrates an exemplary architecture of a system for catering
traffic in a communication network, in accordance with embodiments of the present disclosure;
[0037] FIG. 2 illustrates an exemplary block diagram representation of the
system for performing Sd interface support at a policy control function (PCF), in 10 accordance with embodiments of the present disclosure;
[0038] FIG. 3 illustrates an architecture of a PCF-Sd interface support, in
accordance with embodiments of the present disclosure;
[0039] FIG. 4 illustrates is an illustration of a non-limiting example of
details of computing hardware used in the system, in accordance with an 15 embodiment of the present disclosure; and
[0040] FIG. 5 illustrates various steps of a method for catering traffic in the
communication network, in accordance with embodiments of the present disclosure.
[0041] The foregoing shall be more apparent from the following more
20 detailed description of the disclosure.
LIST OF REFERENCE NUMERALS
100 – System
101 – User Equipment
102 – Access and Mobility Management Function (AMF) 25 104 – Session Management Function (SMF)
106 – Policy Control Function (PCF)
8
108 – User Plane Function (UPF)
112 – Diameter Routing Agent (DRA)
114 – Deep Packet Inspection (DPI) Node
116 – Data network (DN) 5 202 – One or more processor(s)
204 – Memory
206 – A Plurality of Interfaces
208 – Processing Engine
210 – Database 10 212 – Acquisition Unit
214 – DPI support unit
216 – Other Engines/Units
410 – External Storage Device
420 – Bus 15 430 – Main Memory
440 – Read Only Memory
450 – Mass Storage Device
460 – Communication Port
470 – Processor
20 DETAILED DESCRIPTION OF THE INVENTION
[0042] In the following description, for the purposes of explanation, various
specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific
25 details. Several features described hereafter can each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above. Some of the problems discussed above might not be fully addressed by any of the features described herein. Example embodiments of
30 the present disclosure are described below, as illustrated in various drawings in
9
which like reference numerals refer to the same parts throughout the different drawings.
[0043] The ensuing description provides exemplary embodiments only, and
is not intended to limit the scope, applicability, or configuration of the disclosure. 5 Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
10 [0044] Specific details are given in the following description to provide a
thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, networks, processes, and other components may be shown as components in block diagram form in order not to
15 obscure the embodiments in unnecessary detail. In other instances, well-known
circuits, processes, algorithms, structures, and techniques may be shown without
unnecessary detail in order to avoid obscuring the embodiments.
[0045] Also, it is noted that individual embodiments may be described as a
process that is depicted as a flowchart, a flow diagram, a data flow diagram, a
20 structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure. A process may correspond to a method, a function, a
25 procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination can correspond to a return of the function to the calling function or the main function.
[0046] The word “exemplary” and/or “demonstrative” is used herein to
mean serving as an example, instance, or illustration. For the avoidance of doubt,
30 the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not
10
necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed 5 description or the claims, such terms are intended to be inclusive like the term “comprising” as an open transition word without precluding any additional or other elements.
[0047] Reference throughout this specification to “one embodiment” or “an
embodiment” or “an instance” or “one instance” means that a particular feature,
10 structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, the appearances of the phrases “in one embodiment” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined
15 in any suitable manner in one or more embodiments.
[0048] The terminology used herein is to describe particular embodiments
only and is not intended to be limiting the disclosure. As used herein, the singular forms “a”, “an”, and “the” are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms
20 “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term “and/or” includes any combinations of one or more of the
25 associated listed items. It should be noted that the terms “mobile device”, “user equipment”, “user device”, “communication device”, “device” and similar terms are used interchangeably for the purpose of describing the invention. These terms are not intended to limit the scope of the invention or imply any specific functionality or limitations on the described embodiments. The use of these terms
30 is solely for convenience and clarity of description. The invention is not limited to any particular type of device or equipment, and it should be understood that other
11
equivalent terms or variations thereof may be used interchangeably without
departing from the scope of the invention as defined herein.
[0049] As used herein, an “electronic device”, or “portable electronic
device”, or “user device” or “communication device” or “user equipment” or 5 “device” refers to any electrical, electronic, electromechanical, and computing device. The user device is capable of receiving and/or transmitting one or parameters, performing function/s, communicating with other user devices, and transmitting data to the other user devices. The user equipment may have a processor, a display, a memory, a battery, and an input-means such as a hard keypad
10 and/or a soft keypad. The user equipment may be capable of operating on any radio access technology including but not limited to IP-enabled communication, Zig Bee, Bluetooth, Bluetooth Low Energy, Near Field Communication, Z-Wave, Wi-Fi, Wi-Fi direct, etc. For instance, the user equipment may include, but not limited to, a mobile phone, smartphone, virtual reality (VR) devices, augmented reality (AR)
15 devices, laptop, a general-purpose computer, desktop, personal digital assistant,
tablet computer, mainframe computer, or any other device as may be obvious to a
person skilled in the art for implementation of the features of the present disclosure.
[0050] Further, the user device may also comprise a “processor” or
“processing unit” includes processing unit, wherein processor refers to any logic
20 circuitry for processing instructions. The processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of
25 integrated circuits, etc. The processor may perform signal coding data processing,
input/output processing, and/or any other functionality that enables the working of
the system according to the present disclosure. More specifically, the processor is
a hardware processor.
[0051] As portable electronic devices and wireless technologies continue to
30 improve and grow in popularity, the advancing wireless technologies for data transfer are also expected to evolve and replace the older generations of
12
technologies. In the field of wireless data communications, the dynamic advancement of various generations of cellular technology are also seen. The development, in this respect, has been incremental in the order of second generation (2G), third generation (3G), fourth generation (4G), and now fifth generation (5G), 5 and more such generations are expected to continue in the forthcoming time.
[0052] While considerable emphasis has been placed herein on the
components and component parts of the preferred embodiments, it will be appreciated that many embodiments can be made and that many changes can be made in the preferred embodiments without departing from the principles of the
10 disclosure. These and other changes in the preferred embodiment as well as other embodiments of the disclosure will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be interpreted merely as illustrative of the disclosure and not as a limitation.
15 [0053] At present, there has been a surge in users subscribing to fifth-
generation (5G) network services, emphasizing the importance of delivering optimal services and a high-quality experience. In the current fourth-generation (4G) network, a deep packet inspection (DPI) node plays a crucial role in meeting regulatory requirements to enhance user satisfaction. With the increasing number
20 of 5G subscribers, the DPI now has the additional responsibility of performing regulatory functions for the 5G network. While the existing 4G DPI node can be utilized in the 5G production environment to meet these regulatory requirements, there is a need for specifications outlining the techniques for integrating the existing 4G DPI node with the 5G network. The present disclosure simplifies network
25 architecture by disclosing a method and a system for supporting an Sd interface in
a communication network such that the 4G DPI node is utilized in the production
environment for 5GCN in order to comply with regulatory requirements.
[0054] In an aspect, the present disclosure relates to a method of employing
the existing 4G DPI node with the 5G core network production environment to fulfil
30 regulatory requirements, wherein the regulatory requirement includes an application-level service barring.
13
[0055] In some embodiments, there are two types of service requirements:
1. Circle-level barring is implemented at a circle level and is generally
needed in border areas within a country or between two countries where
military security is high. In such a scenario, the DPI node needs to be
5 deployed to cater to complete internet traffic of all UPF clusters deployed
in that circle.
2. Tracking area level barring is for a specific area in a given circle. In such
scenarios, the DPI node is deployed to cater traffic of one UPF cluster. In
some embodiments, whenever required, the traffic of the tracking area may
10 be routed through this UPF-DPI combination.
[0056] In some embodiments, two dedicated instances of DPI and UPF are
deployed at a centralized location for catering application-level traffic-barring scenarios. SMF from various circles is configured to connect with these dedicated UPF instances based on tracking area barring requirements.
15 [0057] The various embodiments throughout the disclosure will be
explained in more detail with reference to FIG. 1- FIG. 5.
[0058] FIG. 1 illustrates an exemplary architecture of a system (100) for
catering traffic in a communication network, in accordance with embodiments of the present disclosure.
20 [0059] Referring to FIG. 1, the system (100) includes an Access and
Mobility Management Function (AMF) (102), a session management function (SMF) (104), a policy control function (PCF) (106), at least one User Plane Function (UPF) (108), a deep packet inspection (DPI) node (114), and the data network (DN) (116). In an example, the DPI node (114) is a 4G DPI node. In an
25 example, the present disclosure may be embedded in the PCF (106) for providing the PCF-Sd interface functionality. In some embodiments, the PCF (106) is connected to the 4G DPI (114) via a diameter routing agent (DRA) (112). The DPI node (114) is coupled with the PCF (106) or a policy and charging rules function (PCRF) via an Sd interface. The Sd interface plays a crucial role in enabling
30 communication between different network functions within the 5G core network
14
architecture. It facilitates the exchange of service-related data and signalling messages between various network elements, allowing for the provision and management of services for users. In an embodiment, the DPI node (114) is configured to manage traffic of at least one UPF cluster having 3 Active UPF data 5 plane (DP) servers.
[0060] In an example, the system (100) may be installed as an independent
interfacing unit coupled with the PCF (106). In another aspect, the system (100) may be assembled with the DPI node (114) or with DRA (112). The 4G DPI node (114) is connected with the DN (116).
10 [0061] In some embodiments, the DPI platform (DPI node) includes two
components: a DPI control plane (CP) and a DPI user plane (UP). The DPI CP is used for interacting with the PCF (106) or with the PCRF over the Sd interface to get the policy and session information. The DPI UP is integrated in an inline mode with system architecture evolution (SAE) gateway (SAEGW)/UPF/ spine switches
15 to receive and inspect the internet traffic.
[0062] In an embodiment, the DPI UP node is a vendor-proprietary node
(chassis) and includes the following internal design: 4 interface blades, each having 24 ports IN and 24 ports OUT (where IN and OUT ports are paired together). Each port supports a 10G interface. These interface blades are connected with the optical
20 bypass (passive) blades for external connectivity to support the bypass feature in
case of any failure conditions. Further, there are 10 processing blades, each having
a capacity of 36 Gbps. Thus, the total processing capacity is 360 Gbps per DPI node
(114).
[0063] The SMF (104) is configured to generate a plurality of session
25 management (SM) policy control messages. In an example, the plurality of SM policy control messages includes one or more of a policy creation message and a policy updation message.
[0064] In an operative aspect, the PCF (106) is configured to receive the
plurality of SM policy control messages from the SMF (104). The PCF (106) is
30 configured to extract at least one diameter attribute value pair (AVP) from the plurality of received SM policy control messages. In an example, the at least one
15
diameter AVP includes a Destination-Host AVP, a Server-Name AVP, a
Subscription ID AVP, a Framed IP Address AVP, a Origin-Host AVP, a Origin-
Realm AVP, a Destination-Realm AVP, a ADC-Rule-Install AVP, an Event-
Trigger AVP, a Subscription-id AVP, a User-Equipment-Info AVP, a Framed-IP-
5 Address AVP, a Framed-IPv6-Prefix AVP, a Called-Station-id AVP, a 3GPP-
SGSN-MCC-MNC AVP, and a 3GPP-User-Location-Info AVP.
[0065] In an aspect, the diameter AVP may be described as:
I. Destination-Host AVP: Specifies the intended recipient host to
which a message should be delivered.
10 2. Server-Name AVP: Identifies the server by its name, often used for
authentication or routing purposes.
3. Subscription ID AVP: Contains subscriber identification
information, such as IMSI or MSISDN.
4. Framed IP Address AVP: Provides the IP address assigned to a user 15 session, often used in dial-up or VPN connections.
5. Origin-Host AVP: Indicates the sender of a Diameter message.
6. Origin-Realm AVP: Specifies the realm of the sender of a Diameter
message.
7. Destination-Realm AVP: Specifies the intended realm to which a
20 Diameter message should be routed.
8. ADC-Rule-Install AVP: Contains information related to installing ADC (Application Data Conversion) rules for traffic management.
9. Event-Trigger AVP: Indicates an event or condition that triggers a specific action or behaviour.
25 10. User-Equipment-Info AVP: Provides information about the user
equipment, such as device type or capabilities.
II. Framed-IPv6-Prefix AVP: Similar to Framed-IP-Address AVP but
for IPv6 addresses.
12. Called-Station-id AVP: Identifies the access point or network device
30 being called or accessed.
16
13. 3GPP-SGSN-MCC-MNC AVP: Contains Mobile Country Code
(MCC) and Mobile Network Code (MNC) information for 3GPP
SGSN (Serving GPRS Support Node).
14. 3GPP-User-Location-Info AVP: Provides location information for a
5 user in a 3GPP network.
[0066] In an aspect, the PCF (106) is configured to extract at least one
control plane (CP) information from the SM policy control message and compares (maps) the extracted control plane information with a control plane information (stored in a runtime configurable table) corresponding to the at least one UPF (108)
10 to take an action accordingly. For example, the action includes triggering a Sd
session, terminating an existing Sd session, and establishing a new Sd session.
[0067] Based on the extracted CP information, the PCF (106) is further
configured to generate a plurality of diameter messages. In the 5G and 4G LTE networks, the plurality of diameter messages plays a significant role in supporting
15 authentication, authorization, and accounting (AAA) functions. With the advent of 5G, there are some enhancements and adaptations to the diameter protocol to accommodate the requirements and capabilities of the new network technology. For example, the plurality of diameter messages includes a number of data messages, a plurality of diameter interface messages, and at least one diameter AVP. In another
20 example, the plurality of diameter interface messages includes at least one or more of a traffic detection function (TDF) -Session-Request (TSR) message, a TDF-Session-Answer (TSA) message, a Re-Auth-Request (RAR) message, a Re-Auth-Answer (RAA) message, and a Credit-Control (CC) Request (CCR) message and a CC-Answer (CCA) message.
25 [0068] In the context of 5G networks and Policy and Charging Control
(PCC), the Traffic Detection Function (TDF) plays a crucial role in traffic identification and management. The plurality of diameter interface messages may be explained as:
1. TDF-Session-Request (TSR) message: The TDF sends the TSR
30 message to the PCRF to establish a session. The TSR message contains
17
information about the detected traffic flows that need to be managed, along with other relevant session parameters.
2. TDF-Session-Answer (TSA) message: The PCRF responds to the TSR
with the TSA message, providing authorization and policy rules for the
5 identified traffic flows. The TSA message confirms the session
establishment and includes relevant policy and charging control information.
3. Re-Auth-Request (RAR) message: The RAR message is sent by the
TDF to an Authentication, Authorization, and Accounting (AAA)
10 server, typically the Home Subscriber Server (HSS), to request re-
authentication of a session.
4. Re-Auth-Answer (RAA) message: The AAA server responds to the
RAR with the RAA message, providing the outcome of the re-
authentication process. The RAA may include updated authentication
15 and authorization information or indicate any issues encountered during
the process.
5. Credit-Control (CC) Request (CCR) message: When credit control is
enabled for a session, the TDF sends this message to the Online
Charging System (OCS) to request credit authorization for the session.
20 The CCR message includes information about the requested service and
the desired credit limit.
6. Credit-Control (CC) Answer (CCA) message: The OCS responds to the
CCR with the CCA message, providing the outcome of the credit
authorization process. The CCA message includes information about the
25 granted credit limit, accounting information, and any additional
instructions for handling the session.
[0069] The PCF (106) is configured to transmit the plurality of generated
diameter messages to the DPI node (114), via the diameter routing agent (DRA)
(112). The DPI node (114) is configured to forward the plurality of diameter
30 messages to at least one UPF (108) connected with the DPI node (114). The at least one UPF (108) is configured to provide at least one regulatory service in the
18
communication network. In an example, the at least one regulatory service is an
application-level barring service. The application-level barring service allows the
service providers to restrict access to specific applications or services based on
various criteria such as subscriber profile, service plan, time of day, or network
5 conditions. The DRA (112) is configured to control a distribution of the diameter
messages among the DP servers of the at least one UPF cluster. In an embodiment,
the DPI node (114) is configured to handle traffic of one UPF cluster having 3
Active UPF data plane (DP) server.
[0070] Referring to FIG. 1, the PCF (106) is configured to send the diameter
10 messages (also known as Sd diameter messages) towards the DRA (112) with AVPs = Origin-Host, Origin-Realm, Destination-Host, Destination-Realm, ADC-Rule-Install, Event-Trigger, Subscription-id, User-Equipment-Info, Framed-IP-Address, Framed-IPv6-Prefix, Called-Station-id, 3GPP-SGSN-MCC-MNC, 3GPP-User-Location-Info, etc., after receiving SM policy control create/update message from
15 the SMF (104).
[0071] In some embodiments, the PCF (106) collects diameter AVP
information from the SM policy control Hypertext Transfer Protocol version 2 (http2) messages. In an existing 4G deployment, all UPF (108) may not be connected with the existing 4G DPI node (114). Further, the PCF (106) sends the
20 Sd traffic to 4G DPI nodes (114) for specific UPF (108) which may be connected with the DPI node (114). The PCF (106) is configured to collect UPF CP information from SMF (104) using the below method:
For example, the SMF (104) sends UPF CP information in SmPlicyUpdateContextData -> ipDomain (string value, may include UPF CP IP or
25 FQDN (Fully qualified domain name))
[0072] In some embodiments, the SMF (104) uses the above option for
sending UPF info in the SM policy control create message (when static user equipment (UE) IP is assigned) and the SM policy control update (selection of dynamic UE IP) messages to the PCF (106). In an embodiment, the PCF (106) is
30 configured to compare the received control plane information with the control plane information fetched from the UPF (108) to take action accordingly.
19
[0073] In some embodiments, the PCF (106) is configured to maintain the
runtime configurable table (as shown in Table 1 below). In an example, the runtime configurable table includes values of the extracted control plane (CP) information, at least one data network name (DNN), a Diameter-Host DPI, a Diameter-Realm 5 DPI, a primary DRA Internet Protocol (IP) address, and a secondary DRA IP address.
UPF CP DNN Diameter-Host Diameter- Primary Secondary
info DPI Realm DPI DRA IP DRA IP
(FQDN/IP)
Table 1
[0074] In some embodiments, the PCF (106) is configured to read info from
the SM policy control message and compare the UPF CP Info (IP or fully qualified 10 domain name (FQDN)) and DNN received in the message and configuration table. In case a match is found and there is no pre-existing Sd session for Subscription Permanent Identifier (SUPI), PCF (106) is configured to trigger a new Sd session towards 4G DPI node (114). Upon termination of SM session for specified DNN, PCF (106) may send RAR indicating session release cause. 4G DPI may send CCR-15 T (session deletion request) to the PCF (106) to close the Sd session. PCF (106) is configured to send CCA-T to close the session. Stale session functionality may be extended to handle Sd session. An operator may be able to provision application detection and control (ADC) rules in a PCF rule engine as well as may be able to create business rules to send ADC rules towards DPI node (114) based on operator-20 defined criteria such as tracking area identity (TAI) range, custom fields, IMSI (International Mobile Subscriber Identity) range, DNN etc. that may be runtime user-configurable.
[0075] In some embodiments, for a configuration related to the data plane
the following are considered:
25 1.UPF cluster info:
a. 1 UPF = 2 UPF CP Server (1 Active and 1 Standby) + 4 UPF DP Server (3 Active UPF DP Server and 1 Standby UPF DP Server)
20
b. 1 UPF DP Server = 2 UPF DP Instances, each bind to 1 physical
100G port with Port level redundancy through another NIC on the same server
c. 1 UPF DP instance = 60 Gbps, so from 1 Active UPF DP Server =
5 120 Gbps, so from 3 Active UPF DP Server = 360 Gbps (Including
both UL and DL)
d. N3 (Interface between the RAN (gNB) and the (initial) UPF) and N6
(Interface between the Data Network (DN) and the UPF) running
from same single 100G physical port, so all 60 Gbps may be
10 downlink (DL) or all 60 Gbps may be uplink (UL) or mix and match
(10 Gbps UL and 50 Gbps DL).
e. On SGi interface (interface between the Evolved Packet Core (EPC)
and the Public IP network), only internet DN traffic needs to be
routed from DPI node (114). UPF (108) currently does not supports
15 segregating Internet and IMS (IP Multimedia Subsystem) traffic at
the SGi interface. Hence this feature may be supported at an
application centric infrastructure / spine-leaf architecture.
[0076] Although FIG. 1 shows exemplary components of the system (100),
in other embodiments, the system (100) may include fewer components, different
20 components, differently arranged components, or additional functional components
than depicted in FIG. 1. Additionally, or alternatively, one or more components of
the system (100) may perform functions described as being performed by one or
more other components of the system (100).
[0077] FIG. 2 illustrates an exemplary block diagram representation (200)
25 of the system (100) for performing Sd interface support at the PCF (106), in accordance with embodiments of the present disclosure.
[0078] Referring to FIG. 2, the PCF system or system (100) may include
one or more processor(s) (202). The one or more processor(s) (202) may be implemented as one or more microprocessors, microcomputers, microcontrollers, 30 edge or fog microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that process data based on operational
21
instructions. Among other capabilities, the one or more processor(s) (202) may be configured to fetch and execute computer-readable instructions stored in a memory (204) of the system (100). The memory (204) may be configured to store one or more computer-readable instructions or routines in a non-transitory computer 5 readable storage medium, which may be fetched and executed to create or share data packets over a network service. The memory (204) may be configured to store the run time configurable table. The memory (204) may comprise any non-transitory storage device including, for example, volatile memory such as Random-Access Memory (RAM), or non-volatile memory such as Electrically Erasable
10 Programmable Read-only Memory (EPROM), flash memory, and the like.
[0079] In an embodiment, the system (100) may include an interface(s)
(206). The interface(s) (206) may comprise a variety of interfaces, for example, interfaces for data input and output devices, referred to as input/output (I/O) devices, storage devices, and the like. The interface(s) (206) may facilitate
15 communication for the system (100). The interface(s) (206) may also provide a
communication pathway for one or more components of the system (100).
Examples of such components include, but are not limited to, processing
unit/module(s) (208) and a database (210).
[0080] The processing unit/module(s) (208) may be implemented as a
20 combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processing module(s) (208). In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processing module(s) (208) may be processor-executable
25 instructions stored on a non-transitory machine-readable storage medium and the hardware for the processing unit(s) (208) may comprise a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine(s) (208). In
30 such examples, the system (100) includes the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or
22
the machine-readable storage medium may be separate but accessible to the system (208) and the processing resource. In other examples, the processing engine(s) (208) may be implemented by electronic circuitry. In an aspect, the database (210) may comprise data that may be either stored or generated as a result of 5 functionalities implemented by any of the components of the processor (202) or the processing engines (208).
[0081] In an embodiment, the processing engine (208) includes one or more
units/modules, such as, but not limited to, an acquisition unit (212), a DPI support unit (214), and other unit(s) (216).
10 [0082] Referring to FIG. 2, the database (210) stores one or more data
associated with the communication network (100).
[0083] A person of ordinary skill in the art will appreciate that the
exemplary block diagram (200) may be modular and flexible to accommodate any kind of changes in the system (100).
15 [0084] FIG. 3 illustrates an architecture (300) of a PCF-Sd interface support,
in accordance with embodiments of the present disclosure.
[0085] Referring to FIG. 3, the PCF-Sd interface support architecture (300)
includes the DPI node (114), UPF (108), and one or more switches (for example, spine switch, border leaf switch). In an aspect, the one or more spine switches are
20 configured to connect multiple leaf switches together, forming a scalable and high-bandwidth fabric. Every border leaf switch is connected to the spine switch in a full mesh topology. In an example, the spine switches are connected with all the leaf switches in a mesh topology while the border leaf switches are connected to a server and end users. In some embodiments, the DPI node (114) is associated with the
25 spine switch, and one DPI node (having 360 Gbps capacity) may cater the traffic of one UPF cluster (3 Active UPF DP Server = 360 Gbps).
[0086] As shown by 302, internet traffic flows from the gNB to the spine
switch via the UPF (108). In step 304, the ingress internet traffic flows from the spine switch to the DPI node (114). In step 306, the ingress internet traffic flows
30 from the DPI node to the spine switch. In step 308, the traffic flows from the spine switch to the internet (DN).
23
[0087] However, there may be some conditions during which the DPI node
(114) may face operational difficulty. For example, during a Port or Interface Blade
Failure, traffic for that port/interface blade may be bypassed and may not be
inspected by the DPI node (114). Though internet services may not be affected, the
5 desired feature (like barring) may not function in this case for that traffic, and during
a Processing Blade Failure, traffic (equivalent to the capacity of that blade) may be
bypassed and may not be inspected by the DPI node (114). Though internet services
may not be affected, but desired feature (like barring) may not function in this case
for that traffic. In such cases, to overcome these failure conditions, in an
10 embodiment, the DPI node (114) may be deployed in 1+1 redundancy (active -
standby) mode. In this case, any of the failure conditions trigger, and then traffic
may be forwarded toward the standby DPI node by the spine switch.
[0088] In some embodiments, the AMF (102)/SMF (104) is responsible for
the selection of specific UPF connected with a 4G DPI node in case application-15 level barring is needed for a specific tracking area.
[0089] A person of ordinary skill in the art will appreciate that these are
mere examples, and in no way, limit the scope of the present disclosure.
[0090] FIG. 4 is an illustration (400) of a non-limiting example of details of
computing hardware used in the system (100), in accordance with an embodiment 20 of the present disclosure. As shown in FIG. 4, the system (100) may include an external storage device (410), a bus (420), a main memory (430), a read only memory (440), a mass storage device (450), a communication port (460), and a processor (470). A person skilled in the art will appreciate that the system (100) may include more than one processor (470) and communication ports (460). 25 Processor (470) may include various modules associated with embodiments of the present disclosure.
[0091] In an embodiment, the communication port (460) is any of an RS-
232 port for use with a modem-based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or 30 other existing or future ports. The communication port (460) is chosen depending
24
on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which the system (100) connects.
[0092] In an embodiment, the memory (430) is Random Access Memory
(RAM) or any other dynamic storage device commonly known in the art. Read-5 only memory (440) is any static storage device(s), e.g., but not limited to, a Programmable Read-Only Memory (PROM) chip for storing static information, e.g., start-up or Basic Input/Output System (BIOS) instructions for the processor (470).
[0093] In an embodiment, the mass storage (450) is any current or future
10 mass storage solution, which is used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), one or more optical discs, 15 Redundant Array of Independent Disks (RAID) storage, e.g., an array of disks (e.g., SATA arrays).
[0094] In an embodiment, the bus (420) communicatively couples the
processor(s) (470) with the other memory, storage, and communication blocks. The bus (420) is, e.g., a Peripheral Component Interconnect (PCI)/PCI Extended (PCI-20 X) bus, Small Computer System Interface (SCSI), Universal Serial Bus (USB) or the like, for connecting expansion cards, drives and other subsystems as well as other buses, such a front side bus (FSB), which connects the processor (470) to the system (400).
[0095] Optionally, operator and administrative interfaces, e.g., a display,
25 keyboard, joystick, and a cursor control device, may also be coupled to the bus (420) to support direct operator interaction with the system (100). Other operator and administrative interfaces are provided through network connections connected through the communication port (460). The components described above are meant only to exemplify various possibilities. In no way should the aforementioned 30 exemplary illustration (400) limit the scope of the present disclosure.
25
[0096] FIG. 5 illustrates various steps of a method (500) for catering traffic
in the communication network, in accordance with embodiments of the present disclosure.
[0097] At step (502), the SMF (104) generates a plurality of SM policy
5 control messages. In an example, the plurality of SM policy control messages includes one or more of a policy creation message and a policy updation message.
[0098] At step (504), the PCF (106) collects the plurality of generated SM
policy control messages from the SMF (104).
[0099] At step (506), the PCF (106) extracts at least one diameter attribute
10 value pair (AVP) from the received SM policy control messages to generate a plurality of diameter messages. In an example, the at least one diameter AVP includes a destination-Host AVP, a Server-Name AVP, a Subscription ID AVP, a Framed IP Address AVP, an Origin-Host AVP, an Origin-Realm AVP, a Destination-Realm AVP, an ADC-Rule-Install AVP, an Event-Trigger AVP, a 15 Subscription-id AVP, a User-Equipment-Info AVP, a Framed-IP-Address AVP, a Framed-IPv6-Prefix AVP, a Called-Station-id AVP, a 3GPP-SGSN-MCC-MNC AVP, and a 3GPP-User-Location-Info AVP. The plurality of diameter messages includes a number of data messages, a plurality of diameter interface messages, and at least one diameter attribute value pair (AVP). The plurality of diameter interface 20 messages includes at least one or more of a traffic detection function (TDF) -Session-Request (TSR) message, a TDF-Session-Answer (TSA) message, a Re-Auth-Request (RAR) message, a Re-Auth-Answer (RAA) message, and a Credit-Control (CC) Request (CCR) message and a CC-Answer (CCA) message.
[00100] At step (508), the PCF (106) transmits the plurality of generated
25 diameter messages to the DPI node (114), via the DRA (112). The DPI node (114) is coupled with the PCF (106) or the PCRF via the Sd interface.
[00101] At step (510), the DPI node (114) caters the traffic by forwarding the
plurality of diameter messages to at least one UPF (108). The at least one UPF (108)
26
is configured to provide at least one regulatory service in the communication network. The DPI node (114) is configured to manage traffic of at least one UPF cluster having 3 active UPF data plane (DP) servers. The DRA (112) is configured to control the distribution of the plurality of diameter messages among the DP 5 servers of the at least one UPF cluster.
[00102] In an embodiment, the method includes a step of extracting at least
one control plane information from the SM policy control message and mapping the extracted control plane information with a control plane information stored in the runtime configurable table corresponding to the at least one UPF to take an 10 action accordingly. In an example, the PCF (106) is configured to maintain a runtime configurable table having values of the extracted control plane information, at least one data network name (DNN), a Diameter-Host DPI, a Diameter-Realm DPI, a primary DRA Internet Protocol (IP) address, and a secondary DRA IP address.
15 [00103] In an example, the action includes triggering a Sd session,
terminating an existing Sd session, and establishing a new Sd session.
[00104] The present disclosure discloses a user equipment (UE)
communicatively coupled with a system for catering traffic in a communication network. The coupling comprises steps of receiving a connection request by the 20 system, sending an acknowledgment of the connection request to the system, and transmitting a plurality of signals in response to the connection request.
[00105] The system includes a session management function (SMF), a policy
control function (PCF), and a deep packet inspection (DPI) node. The session management function (SMF) is configured to generate a plurality of session 25 management (SM) policy control messages. The PCF is coupled with the SMF to receive the generated plurality of SM policy control messages. The PCF is further configured to extract at least one diameter attribute value pair (AVP) from the received SM policy control messages to generate a plurality of diameter messages. The PCF is configured to transmit the plurality of generated diameter messages to
27
the deep packet inspection (DPI) node, via a diameter routing agent (DRA). The DPI node is configured to cater the traffic by forwarding the plurality of diameter messages to at least one User Plane Function (UPF) connected with the DPI node. The at least one UPF is configured to provide at least one regulatory service in the 5 communication network.
[00106] In an aspect, the present disclosure caters to different types of traffic
efficiently by employing:
a. Traffic Analysis: DPI node inspects packets at the application layer
to identify the type of traffic (e.g., web browsing, video streaming,
10 file transfer). This analysis helps in understanding the nature of
traffic and its requirements.
b. Quality of Service (QoS) Management: DPI node can prioritize
traffic based on its type and requirements. For example, real-time
applications like VoIP or video conferencing can be given higher
15 priority to ensure low latency and smooth operation.
c. Traffic Shaping and Policing: DPI node can be used to shape traffic
flows, ensuring that bandwidth is allocated fairly among different
types of traffic. It can also enforce traffic policies, such as rate
limiting or blocking certain types of traffic that may consume
20 excessive resources.
d. Content Filtering: DPI node can be used to enforce content filtering
policies, blocking access to specific websites or types of content
deemed inappropriate or against organizational policies.
e. Network Optimization: DPI node can provide insights into network
25 usage patterns and trends, helping network administrators optimize
network resources and plan for capacity upgrades based on actual usage data.
28
f. Traffic Offloading: DPI node can identify opportunities for traffic offloading, such as redirecting certain types of traffic to less congested network paths or to alternative network technologies like Wi-Fi or cellular networks.
5 g. Other traffic-related operations.
[00107] The present disclosure is configured to provide a system (100) and a
method for catering traffic in a communication network. The present disclosure is configured to enhance the functionalities of PCF (106) by offering seamless support for Sd diameter interface messages such as TSR-TSA, RAR-RAA, and CCR-CCA
10 based on a flag. To ensure efficient traffic management, the enhanced PCF routes the Sd traffic to 4G DPI nodes, which are then connected to UPF. This will enable a smooth and hassle-free experience for the users. The system (100) may be placed within a 5G communication network or with various network elements that may involve various algorithms, protocols, or mechanisms to enhance the efficiency and
15 reliability of triggering events, ensuring a smoother operation of user equipment and network elements in 5G networks.
[00108] The method and system of the present disclosure may be
implemented in a number of ways. For example, the methods and systems of the present disclosure may be implemented by software, hardware, firmware, or any
20 combination of software, hardware, and firmware. The above-described order for the steps of the method is for illustration only, and the steps of the method of the present disclosure are not limited to the order specifically described above unless specifically stated otherwise. Further, in some embodiments, the present disclosure may also be embodied as programs recorded in a recording medium, the programs
25 including machine-readable instructions for implementing the methods according to the present disclosure. Thus, the present disclosure also covers a recording medium storing a program for executing the method according to the present disclosure.
29
[00109] While the foregoing describes various embodiments of the present
disclosure, other and further embodiments of the present disclosure may be devised without departing from the basic scope thereof. The scope of the present disclosure is determined by the claims that follow. The present disclosure is not limited to the 5 described embodiments, versions, or examples, which are included to enable a person having ordinary skill in the art to make and use the present disclosure when combined with information and knowledge available to the person having ordinary skill in the art.
ADVANTAGES OF THE PRESENT DISCLOSURE
10 [00110] The present disclosure provides regulatory services for the 5G
network with the existing 4G DPI node.
[00111] The present disclosure enables PCF to collect diameter attribute
value pair (AVP) information from session management (SM) policy control hypertext transfer protocol version 2 (http2) messages to decide on which user plane 15 function node the traffic may be forwarded.
[00112] The present disclosure provides a standby DPI node to perform the
functions of the active DPI node during a failure.
30
We claim:
1. A system (100) for catering traffic in a communication network, said
system (100) comprising:
5 a session management function (SMF) (104) configured to generate
a plurality of session management (SM) policy control messages;
a policy control function (PCF) (106) coupled with said SMF (104)
to receive said plurality of generated SM policy control messages and is
further configured to:
10 extract at least one diameter attribute value pair (AVP) from
said received SM policy control messages to generate a plurality of
diameter messages; and
transmit said plurality of generated diameter messages to a
deep packet inspection (DPI) node (114), via a diameter routing
15 agent (DRA) (112); and
said DPI node (114) is configured to cater the traffic by forwarding said plurality of diameter messages to at least one User Plane Function (UPF) (108), wherein said at least one UPF (108) is configured to provide at least one regulatory service in said communication network.
20 2. The system (100) as claimed in claim 1, wherein said plurality of SM policy
control messages includes one or more of a policy creation message and a policy updation message.
3. The system (100) as claimed in claim 1, wherein said at least one diameter
25 AVP includes a destination-Host AVP, a Server-Name AVP, a Subscription
ID AVP, a Framed IP Address AVP, an Origin-Host AVP, an Origin-Realm AVP, a Destination-Realm AVP, an ADC-Rule-Install AVP, an Event-Trigger AVP, a Subscription-id AVP, a User-Equipment-Info AVP, a Framed-IP-Address AVP, a Framed-IPv6-Prefix AVP, a Called-Station-id
31
AVP, a 3GPP-SGSN-MCC-MNC AVP, and a 3GPP-User-Location-Info AVP.
4. The system (100) as claimed in claim 1, wherein said plurality of diameter
messages includes a number of data messages, a plurality of diameter
5 interface messages, and at least one diameter AVP.
5. The system (100) as claimed in claim 4, wherein said plurality of diameter
interface messages includes at least one or more of a traffic detection
function (TDF) -Session-Request (TSR) message, a TDF-Session-Answer
(TSA) message, a Re-Auth-Request (RAR) message, a Re-Auth-Answer
10 (RAA) message, and a Credit-Control (CC) Request (CCR) message and a
CC-Answer (CCA) message.
6. The system (100) as claimed in claim 1, wherein said DPI node (114) is
coupled with said PCF (106) or a policy and charging rules function (PCRF)
via an Sd interface.
15 7. The system (100) as claimed in claim 1, wherein said DPI node (114) is
configured to manage traffic of at least one UPF cluster having three active UPF data plane (DP) servers.
8. The system (100) as claimed in claim 7, wherein said DRA (112) is
configured to control distribution of said plurality of diameter messages
20 among said three active UPF DP servers of said at least one UPF cluster.
9. The system (100) as claimed in claim 1, wherein said PCF (106) is
configured to maintain a runtime configurable table having values of a
control plane information, at least one data network name (DNN), a
Diameter-Host DPI, a Diameter-Realm DPI, a primary DRA Internet
25 Protocol (IP) address, and a secondary DRA IP address.
10. The system (100) as claimed in claim 9, wherein said PCF is configured to
extract at least one control plane information from said SM policy control
32
messages and map said extracted control plane information with the control plane information stored in said runtime configurable table corresponding to said at least one UPF to take an action accordingly.
11. The system (100) as claimed in claim 10, wherein said action includes
5 triggering a Sd session, terminating an existing Sd session, and establishing
a new Sd session.
12. The system (100) as claimed in claim 1, wherein said at least one regulatory
service is an application-level barring service.
13. A method (500) of catering traffic in a communication network, said method
10 (500) comprising:
generating (502), by a session management function (SMF) (104), a plurality of session management (SM) policy control messages;
receiving (504), by a policy control function (PCF) (106), said
generated plurality of SM policy control messages;
15 extracting (506), by said PCF (106), at least one diameter attribute
value pair (AVP) from said received SM policy control messages to generate a plurality of diameter messages;
transmitting (508), by said PCF (106), said plurality of generated
diameter messages to a deep packet inspection (DPI) node (114), via a
20 diameter routing agent (DRA) (112); and
catering (510), by said DPI node (114), the traffic by forwarding said plurality of diameter messages to at least one User Plane Function (UPF) (108), wherein said at least one UPF (108) is configured to provide at least one regulatory service in said communication network.
25 14. The method (500) as claimed in claim 13, wherein said plurality of SM
policy control messages includes one or more of a policy creation message and a policy updation message.
33
15. The method (500) as claimed in claim 13, wherein said at least one diameter
AVP includes a destination-Host AVP, a Server-Name AVP, a Subscription
ID AVP, a Framed IP Address AVP, an Origin-Host AVP, an Origin-Realm
AVP, a Destination-Realm AVP, an ADC-Rule-Install AVP, an Event-
5 Trigger AVP, a Subscription-id AVP, a User-Equipment-Info AVP, a
Framed-IP-Address AVP, a Framed-IPv6-Prefix AVP, a Called-Station-id AVP, a 3GPP-SGSN-MCC-MNC AVP, and a 3GPP-User-Location-Info AVP.
16. The method (500) as claimed in claim 13, wherein said at least one diameter
10 message includes a number of data messages, a plurality of diameter
interface messages, and at least one diameter AVP.
17. The method (500) as claimed in claim 16, wherein said plurality of diameter
interface messages includes at least one or more of a traffic detection
function (TDF) -Session-Request (TSR) message, a TDF-Session-Answer
15 (TSA) message, a Re-Auth-Request (RAR) message, a Re-Auth-Answer
(RAA) message, and a Credit-Control (CC) Request (CCR) message and a CC-Answer (CCA) message.
18. The method (500) as claimed in claim 13, wherein said DPI node (114) is
coupled with said PCF (106) or a policy and charging rules function (PCRF)
20 via an Sd interface.
19. The method (500) as claimed in claim 13, wherein said DPI node (114) is
configured to manage traffic of at least one UPF cluster having three active
UPF data plane (DP) servers.
20. The method (500) as claimed in claim 19, wherein said DRA (112) is
25 configured to control distribution of said plurality of diameter messages
among said three active UPF-DP servers of said at least one UPF cluster.
34
21. The method (500) as claimed in claim 13, wherein said PCF (106) is
configured to maintain a runtime configurable table having values of a
control plane information, at least one data network name (DNN), a
Diameter-Host DPI, a Diameter-Realm DPI, a primary DRA Internet
5 Protocol (IP) address, and a secondary DRA IP address.
22. The method (500) as claimed in claim 21, further comprising extracting at
least one control plane information from said SM policy control messages
and mapping said extracted control plane information with a control plane
information stored in said runtime configurable table corresponding to said
10 at least one UPF to take an action accordingly.
23. The method (500) as claimed in claim 22, wherein said action includes
triggering a Sd session, terminating an existing Sd session, and establishing
a new Sd session.
24. The method (500) as claimed in claim 13, wherein said at least one
15 regulatory service is an application-level barring service.
25. A user equipment (UE) (101) communicatively coupled with a system (100)
for catering traffic in a communication network, said coupling comprises
steps of:
receiving a connection request by said system (100);
20 sending an acknowledgment of the connection request to said system
(100); and
transmitting a plurality of signals in response to the connection request, wherein said system (100) comprising:
a session management function (SMF) (104) configured to
25 generate a plurality of session management (SM) policy control
messages;
a policy control function (PCF) (106) coupled with said SMF (104) to receive said plurality of generated SM policy control messages and is further configured to:
35
extract at least one diameter attribute value pair (AVP) from said received SM policy control messages to generate a plurality of diameter messages; and
transmit said plurality of generated diameter
5 messages to a deep packet inspection (DPI) node (114), via
a diameter routing agent (DRA) (112); and
said DPI node (114) is configured to cater the traffic
by forwarding said plurality of diameter messages to at least
one User Plane Function (UPF) (108), wherein said at least
10 one UPF (108) is configured to provide at least one
regulatory service in said communication network.
| # | Name | Date |
|---|---|---|
| 1 | 202321044261-STATEMENT OF UNDERTAKING (FORM 3) [02-07-2023(online)].pdf | 2023-07-02 |
| 2 | 202321044261-PROVISIONAL SPECIFICATION [02-07-2023(online)].pdf | 2023-07-02 |
| 3 | 202321044261-FORM 1 [02-07-2023(online)].pdf | 2023-07-02 |
| 4 | 202321044261-DRAWINGS [02-07-2023(online)].pdf | 2023-07-02 |
| 5 | 202321044261-DECLARATION OF INVENTORSHIP (FORM 5) [02-07-2023(online)].pdf | 2023-07-02 |
| 6 | 202321044261-FORM-26 [13-09-2023(online)].pdf | 2023-09-13 |
| 7 | 202321044261-Request Letter-Correspondence [06-03-2024(online)].pdf | 2024-03-06 |
| 8 | 202321044261-Power of Attorney [06-03-2024(online)].pdf | 2024-03-06 |
| 9 | 202321044261-Covering Letter [06-03-2024(online)].pdf | 2024-03-06 |
| 10 | 202321044261-RELEVANT DOCUMENTS [08-03-2024(online)].pdf | 2024-03-08 |
| 11 | 202321044261-POA [08-03-2024(online)].pdf | 2024-03-08 |
| 12 | 202321044261-FORM 13 [08-03-2024(online)].pdf | 2024-03-08 |
| 13 | 202321044261-AMENDED DOCUMENTS [08-03-2024(online)].pdf | 2024-03-08 |
| 14 | 202321044261-CORRESPONDENCE(IPO)-(WIPO DAS)-18-03-2024.pdf | 2024-03-18 |
| 15 | 202321044261-ENDORSEMENT BY INVENTORS [04-06-2024(online)].pdf | 2024-06-04 |
| 16 | 202321044261-DRAWING [04-06-2024(online)].pdf | 2024-06-04 |
| 17 | 202321044261-CORRESPONDENCE-OTHERS [04-06-2024(online)].pdf | 2024-06-04 |
| 18 | 202321044261-COMPLETE SPECIFICATION [04-06-2024(online)].pdf | 2024-06-04 |
| 19 | Abstract1.jpg | 2024-06-26 |
| 20 | 202321044261-ORIGINAL UR 6(1A) FORM 26-090824.pdf | 2024-08-17 |
| 21 | 202321044261-FORM 18 [26-09-2024(online)].pdf | 2024-09-26 |
| 22 | 202321044261-FORM 3 [07-11-2024(online)].pdf | 2024-11-07 |