Sign In to Follow Application
View All Documents & Correspondence

Method And System For Processing A Registration Request In A Communication Network

Abstract: The present disclosure relates to method and system for processing a registration request in a communication network. The method comprises receiving dynamically, at a load balancer, the registration request from one or more user devices; determining continuously, by a counter unit [304], a number of registration request received at the load balancer; extracting, by a decision unit [306], a process identifier and a thread identifier from the received registration request, and performing, a first level throttling of the determined number of registration request; performing, by the decision unit [306], a second level throttling of the determined number of registration request; performing, by the decision unit [306], a third level throttling of the determined number of registration request; and processing, by the load balancer, the registration request based on the first level throttling, the second level throttling and the third level throttling of the determined number of registration request. [FIG. 3]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
03 July 2023
Publication Number
2/2025
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

Jio Platforms Limited
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Inventors

1. Birendra Singh Bisht
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
2. Harbinder Pal Singh
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
3. Aayush Bhatnagar
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
4. Mahendra Varma Eslavath
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
5. R Abhishek
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
6. Suman Naskar
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
7. Harshit Mandowara
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
8. Shakshi Chandra
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
9. Pradeep Kumar
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Specification

FORM 2
THE PATENTS ACT, 1970 (39 OF 1970) & THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR PROCESSING A REGISTRATION REQUEST IN A
COMMUNICATION NETWORK”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is to be performed.

METHOD AND SYSTEM FOR PROCESSING A REGISTRATION REQUEST IN A
COMMUNICATION NETWORK
TECHNICAL FIELD
5
[001] Embodiments of the present disclosure generally relate to network performance management systems. More particularly, embodiments of the present disclosure relate to methods and systems for processing a registration request in a communication network.
10 BACKGROUND
[002] The following description of the related art is intended to provide background
information pertaining to the field of the disclosure. This section may include certain aspects
of the art that may be related to various features of the present disclosure. However, it should
15 be appreciated that this section is used only to enhance the understanding of the reader with
respect to the present disclosure, and not as admissions of the prior art.
[003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first
20 generation of wireless communication technology was based on analog technology and offered
only voice services. However, with the advent of the second-generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third-generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth-generation (4G) technology
25 revolutionized wireless communication with faster data speeds, better network coverage, and
improved security. Currently, the fifth-generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
30
[004] In a 5G communication system include a user equipment (UE) that communicated with a network core over a radio access network (RAN). The network core comprises a plurality of network functions (NFs) such as an Access and Mobility Management Function (AMF), a
2

Session Management Function (SMF), and others. The plurality of NFs communicate with each other using different interfaces like N1/N2, N11, N26 and S11.
[005] For example, the AMF communicated with the UE/RAN via the N1/N2 interface using
5 a Non-Access Stratum (NAS) protocol or Next Generation Application Protocol (NGAP). The
AMF utilized various load balancers, such as Next Generation Application Protocol Load Balancer (NGAP LB), General Packet Radio Service (GPRS) Tunnelling Protocol (GTP LB), and a Hypertext Transfer Protocol Load Balancer (HTTP-LB), to handle the communication with the UE/RAN and other NFs.
10
[006] Additionally, the AMF receives a high volume of transactions or requests on the load balancers, which is referred to as "traffic." The rate of this traffic may increase due to system failures or other unforeseen circumstances, potentially exceeding the transaction capacity threshold. To prevent system failure, the AMF's load balancers are equipped with a throttling
15 module. The throttling module divides the incoming transactions into allowed and rejected sets.
The allowed transactions are executed by the AMF's core application, while the rejected transactions are further divided into discarded and rejection-responded sets. The discarded transactions are completely discarded, and for the rejection-responded set, the AMF sends response rejection signals back to the UE/RAN.
20
[007] “Throttling” technique is commonly known in the communication industry, wherein the number of transactions in a defined time period is limited to a defined level. Specifically, the throttling module is suitably functioned to divide the plurality of transactions between allowed set of transactions and a rejected set of transactions, as the number of the plurality of
25 transactions reached beyond a first transaction capacity threshold level.
[008] Even after throttling the overall transaction rate, there may still be instances where the
number of transactions for a specific process function or thread in the AMF's core application
exceeds their respective capacity thresholds, leading to system failures or interruptions. This
30 type of scenario may occur and in said scenario a set of users face network failure conditions
due to unforeseen reasons.
[009] Thus, there exists an imperative need in the art to provide an efficient system and method for processing registration request in a communication network.
3

SUMMARY
[010] This section is provided to introduce certain aspects of the present disclosure in a
5 simplified form that are further described below in the detailed description. This summary is
not intended to identify the key features or the scope of the claimed subject matter.
[011] An aspect of the present disclosure may relate to a method for processing a registration request in a communication network. The method comprises receiving dynamically, at a load
10 balancer of an access and mobility management function (AMF) unit, the registration request
from one or more user devices. The method further comprises determining continuously, by a counter unit of the AMF unit, a number of registration request received at the load balancer. The method further comprises extracting, by a decision unit of the AMF unit, a process identifier and a thread identifier from the received registration request. The method further
15 comprises performing, by the decision unit of the AMF unit, a first level throttling of the
determined number of registration request. The method further comprises performing, by the decision unit of the AMF unit, a second level throttling of the determined number of registration request. The method further comprises performing, by the decision unit of the AMF unit, a third level throttling of the determined number of registration request. The method
20 further comprises processing, by the load balancer of the AMF unit, the registration request
based on the first level throttling, the second level throttling and the third level throttling of the determined number of registration request.
[012] In an exemplary aspect of the present disclosure, the counter unit of the AMF unit
25 determines the number of registration request received at the load balancer within a
configurable predefined time period.
[013] In an exemplary aspect of the present disclosure, extracting the process identifier and
the thread identifier from the received registration request further comprises hashing, by the
30 decision unit of the AMF unit, the received registration request.
[014] In an exemplary aspect of the present disclosure, performing the first level throttling comprises of analysing, by the decision unit of the AMF unit, whether the number of registration request exceeds a first threshold count.
4

[015] In an exemplary aspect of the present disclosure, the processing the registration request
based on the first level throttling comprises determining, by the load balancer of the AMF unit,
the registration request as a first unsuccessful request in an event the number of the registration
5 request exceeds the first threshold count. The processing the registration request based on the
first level throttling further comprises rejecting, by the load balancer of the AMF unit, the first unsuccessful request.
[016] In an exemplary aspect of the present disclosure, processing the registration request
10 based on the first level throttling further comprises determining, by the load balancer of the
AMF unit, the registration request as a first successful request in an event the number of the registration request is less than or equal to the first threshold count.
[017] In an exemplary aspect of the present disclosure, the performing the second level
15 throttling comprises of determining, by the decision unit of the AMF unit, the first successful
request as a second successful request based on the process identifier successfully matching with an allowed process identifier.
[018] In an exemplary aspect of the present disclosure, processing the registration request
20 based on the second level throttling comprises determining, by the load balancer of the AMF
unit, the first successful request as a second unsuccessful request based on a mismatch in the process identifier with an allowed process identifier. The processing the registration request based on the second level throttling further comprises rejecting, by the load balancer of the AMF unit, the second unsuccessful request. 25
[019] In an exemplary aspect of the present disclosure, performing the third level throttling comprises of determining, by the decision unit of the AMF unit, the second successful request as a third successful request based on the thread identifier successfully matching with an allowed thread identifier. 30
[020] In an exemplary aspect of the present disclosure, processing the registration request based on the third level throttling comprises: determining, by the load balancer of the AMF unit, the second successful request as a third unsuccessful request based on a mismatch in the
5

thread identifier with an allowed third identifier; and rejecting, by the load balancer of the AMF unit, the third unsuccessful request.
[021] Another aspect of the present disclosure may relate to a system for processing a
5 registration request in a communication network. The system comprises access and mobility
management function (AMF) unit. The AMF unit further comprises a load balancer configured to dynamically receive the registration request from one or more user devices. The AMF unit further comprises a counter unit connected at least with the load balancer, the counter unit is configured to continuously determine a number of registration request received at the load
10 balancer. The AMF unit further comprises a decision unit connected at least with the counter
unit, the decision unit is configured to extract a process identifier and a thread identifier from the received registration request. The decision unit is further configured to perform a first level throttling of the determined number of registration request. The decision unit is further configured to perform a second level throttling of the determined number of registration
15 request. The decision unit is further configured to perform a third level throttling of the
determined number of registration request. The load balancer is further configured to process the registration request based on the first level throttling, the second level throttling and the third level throttling of the determined number of registration request.
20 [022] Yet another aspect of the present disclosure may relate to a non-transitory computer
readable storage medium storing instructions for processing a registration request in a communication network, the instructions include executable code which, when executed by a one or more units of a system, causes: a load balancer within an access and mobility management function (AMF) unit of the system to dynamically receive the registration request
25 from one or more user devices; a counter unit within the AMF unit of the system to
continuously determine a number of registration request received at the load balancer; a decision unit within the AMF unit of the system to extract a process identifier and a thread identifier from the received registration request, perform a first level throttling of the determined number of registration request, perform a second level throttling of the determined
30 number of registration request, and perform a third level throttling of the determined number
of registration request; the load balancer to process the registration request based on the first level throttling, the second level throttling and the third level throttling of the determined number of registration request.
6

OBJECTS OF THE INVENTION
[023] Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below. 5
[024] It is an object of the present disclosure to provide a system and a method for processing registration request in a communication network.
[025] It is another object of the present disclosure to provide a system and a method for multi-
10 level throttling of transactions through load parameters of an Access and Mobility Management
Function (AMF).
[026] It is yet another object of the present disclosure to provide a system and a method for
multi-level throttling of transactions through Next Generation Application Protocol Load
15 Balancer (NGAP LB) of the AMF.
[027] It is yet another object of the present disclosure to provide a system and a method for
multi-level throttling of transactions through load parameters of network functions (NFs),
wherein the multi-level throttling includes, throttling based on the total number of transactions,
20 throttling based on the number of transactions provided for a particular process, throttling based
on the number of transactions assigned with a particular thread. Accordingly, this multi-level throttling of transactions avoids system failure.
DESCRIPTION OF THE DRAWINGS
25
[028] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon
30 clearly illustrating the principles of the present disclosure. Also, the embodiments shown in the
figures are not to be construed as limiting the disclosure, but the possible variants of the method and system according to the disclosure are illustrated herein to highlight the advantages of the disclosure. It will be appreciated by those skilled in the art that disclosure of such drawings
7

includes disclosure of electrical components or circuitry commonly used to implement such components.
[029] FIG. 1 illustrates an exemplary block diagram representation of 5th generation core
5 (5GC) network architecture.
[030] FIG. 2 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure. 10
[031] FIG. 3 illustrates an exemplary block diagram of a system for processing a registration request in a communication network in accordance with exemplary implementations of the present disclosure.
15 [032] FIG. 4 illustrates a method flow diagram for processing a registration request in a
communication network in accordance with exemplary implementations of the present disclosure.
[033] FIG. 5 illustrates an exemplary signal flow diagram for processing a registration request
20 in a communication network in accordance with exemplary implementations of the present
disclosure.
[034] FIG. 6 illustrates an exemplary implementation method flow diagram for processing a
registration request in a communication network, in accordance with exemplary
25 implementations of the present disclosure.
[035] The foregoing shall be more apparent from the following more detailed description of the disclosure.
30 DETAILED DESCRIPTION
[036] In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be
8

practiced without these specific details. Several features described hereafter may each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above. 5
[037] The ensuing description provides exemplary embodiments only, and is not intended to
limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description
of the exemplary embodiments will provide those skilled in the art with an enabling description
for implementing an exemplary embodiment. It should be understood that various changes may
10 be made in the function and arrangement of elements without departing from the spirit and
scope of the disclosure as set forth.
[038] Specific details are given in the following description to provide a thorough
understanding of the embodiments. However, it will be understood by one of ordinary skill in
15 the art that the embodiments may be practiced without these specific details. For example,
circuits, systems, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail.
[039] Also, it is noted that individual embodiments may be described as a process which is
20 depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block
diagram. Although a flowchart may describe the operations as a sequential process, many of the operations may be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure. 25
[040] The word “exemplary” and/or “demonstrative” is used herein to mean serving as an
example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed
herein is not limited by such examples. In addition, any aspect or design described herein as
“exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or
30 advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary
structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive—in a manner similar
9

to the term “comprising” as an open transition word—without precluding any additional or other elements.
[041] As used herein, a “processing unit” or “processor” or “operating processor” includes
5 one or more processors, wherein processor refers to any logic circuitry for processing
instructions. A processor may be a general-purpose processor, a special purpose processor, a
conventional processor, a digital signal processor, a plurality of microprocessors, one or more
microprocessors in association with a (Digital Signal Processing) DSP core, a controller, a
microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array
10 circuits, any other type of integrated circuits, etc. The processor may perform signal coding
data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
15 [042] As used herein, “a user equipment”, “a user device”, “a smart-user-device”, “a smart-
device”, “an electronic device”, “a mobile device”, “a handheld device”, “a wireless communication device”, “a mobile communication device”, “a communication device” may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure. The user equipment/device may include, but is not limited
20 to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital
assistant, tablet computer, wearable device or any other computing device which is capable of implementing the features of the present disclosure. Also, the user device may contain at least one input means configured to receive an input from at least one of a transceiver unit, a processing unit, a storage unit, a detection unit and any other such unit(s) which are required
25 to implement the features of the present disclosure.
[043] As used herein, “storage unit” or “memory unit” refers to a machine or computer-
readable medium including any mechanism for storing information in a form readable by a
computer or similar machine. For example, a computer-readable medium includes read-only
30 memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical
storage media, flash memory devices or other types of machine-accessible storage media. The storage unit stores at least the data that may be required by one or more units of the system to perform their respective functions.
10

[044] As used herein “interface” or “user interface refers to a shared boundary across which
two or more separate components of a system exchange information or data. The interface may
also be referred to a set of rules or protocols that define communication or interaction of one
or more modules or one or more units with each other, which also includes the methods,
5 functions, or procedures that may be called.
[045] As used herein NG Application Protocol (NGAP) is a protocol that supports the
functions of the NG interface by signalling procedures. Further, a NGAP Load Balancer
(NGAP LB) is a load balancer associated with the NGAP and a GTPv2 protocol to track a
10 network procedures based on a light parsing of incoming messages associated with the network
procedures.
[046] All modules, units, components used herein, unless explicitly excluded herein, may be
software modules or hardware processors, the processors being a general-purpose processor, a
15 special purpose processor, a conventional processor, a digital signal processor (DSP), a
plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc.
20 [047] As used herein the transceiver unit include at least one receiver and at least one
transmitter configured respectively for receiving and transmitting data, signals, information or a combination thereof between units/components within the system and/or connected with the system.
25 [048] As discussed in the background section, that even after throttling the overall transaction
rate, there may still be instances where the number of transactions for a specific process function or thread in an Access and Mobility Management Function (AMF) core application exceeds their respective capacity thresholds, leading to system failures or interruptions. This type of scenario may occur when a set of users face network failure conditions due to
30 unforeseen reasons. The current known solutions have several shortcomings. The present
disclosure aims to overcome the above-mentioned and other existing problems in this field of technology by providing method and system of processing registration request in a communication network that may be deployed in any form to a control traffic system or process-set wise or thread wise. Also, the method and system may be applicable by a fourth-11

generation (4G) procedure or a fifth-generation (5G) procedure in an access and mobility
management function (AMF) or a Session Management Function (SMF) for an incoming
interface of Non-Access Stratum (NAS) protocol or Next Generation Application Protocol
(NGAP) or a General Packet Radio Service (GPRS) Tunnelling Protocol version 2 (GTPv2)
5 protocol.
[049] FIG. 1 illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture, in accordance with exemplary implementation of the present disclosure. As shown in FIG. 1, the 5GC network architecture [100] includes a user equipment
10 (UE) [102], a radio access network (RAN) [104], an access and mobility management function
(AMF) [106], a Session Management Function (SMF) [108], a Service Communication Proxy (SCP) [110], an Authentication Server Function (AUSF) [112], a Network Slice Specific Authentication and Authorization Function (NSSAAF) [114], a Network Slice Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a Network Repository
15 Function (NRF) [120], a Policy Control Function (PCF) [122], a Unified Data Management
(UDM) [124], an application function (AF) [126], a User Plane Function (UPF) [128], a data network (DN) [130], wherein all the components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present disclosure.
20
[050] Radio Access Network (RAN) [104] is the part of a mobile telecommunications system that connects user equipment (UE) [102] to the core network (CN) and provides access to different types of networks (e.g., 5G network). It consists of radio base stations and the radio access technologies that enable wireless communication.
25
[051] Access and Mobility Management Function (AMF) [106] is a 5G core network function responsible for managing access and mobility aspects, such as UE registration, connection, and reachability. It also handles mobility management procedures like handovers and paging.
30 [052] Session Management Function (SMF) [108] is a 5G core network function responsible
for managing session-related aspects, such as establishing, modifying, and releasing sessions. It coordinates with the User Plane Function (UPF) [128] for data forwarding and handles IP address allocation and QoS enforcement.
12

[053] Service Communication Proxy (SCP) [110] is a network function in the 5G core network that facilitates communication between other network functions by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces.
5 [054] Authentication Server Function (AUSF) [112] is a network function in the 5G core
responsible for authenticating UEs during registration and providing security services. It generates and verifies authentication vectors and tokens.
[055] Network Slice Specific Authentication and Authorization Function (NSSAAF) [114] is
10 a network function that provides authentication and authorization services specific to network
slices. It ensures that UEs can access only the slices for which they are authorized.
[056] Network Slice Selection Function (NSSF) [116] is a network function responsible for
selecting the appropriate network slice for a UE based on factors such as subscription,
15 requested services, and network policies.
[057] Network Exposure Function (NEF) [118] is a network function that exposes capabilities and services of the 5G network to external applications, enabling integration with third-party services and applications. 20
[058] Network Repository Function (NRF) [120] is a network function that acts as a central repository for information about available network functions and services. It facilitates the discovery and dynamic registration of network functions.
25 [059] Policy Control Function (PCF) [122] is a network function responsible for policy
control decisions, such as QoS, charging, and access control, based on subscriber information and network policies.
[060] Unified Data Management (UDM) [124] is a network function that centralizes the
30 management of subscriber data, including authentication, authorization, and subscription
information.
[061] Application Function (AF) [126] is a network function that represents external applications interfacing with the 5G core network to access network capabilities and services.
13

[062] User Plane Function (UPF) [128] is a network function responsible for handling user data traffic, including packet routing, forwarding, and QoS enforcement.
5 [063] Data Network (DN) [130] refers to a network that provides data services to user
equipment (UE) [102] in a telecommunications system. The data services may include but are not limited to Internet services, private data network related services.
[064] FIG. 2 illustrates an exemplary block diagram of a computing device [1000] upon
10 which the features of the present disclosure may be implemented in accordance with exemplary
implementation of the present disclosure. In an implementation, the computing device [1000]
may also implement a method for processing registration request in a communication network
utilising the system. In another implementation, the computing device [1000] itself implements
the method for processing registration request in a communication network using one or more
15 units configured within the computing device [1000], wherein said one or more units are
capable of implementing the features as disclosed in the present disclosure.
[065] The computing device [1000] may include a bus [1002] or other communication mechanism for communicating information, and a hardware processor [1004] coupled with the
20 bus [1002] for processing information. The hardware processor [1004] may be, for example, a
general purpose microprocessor. The computing device [1000] may also include a main memory [1006], such as a random access memory (RAM), or other dynamic storage device, coupled to the bus [1002] for storing information and instructions to be executed by the processor [1004]. The main memory [1006] also may be used for storing temporary variables
25 or other intermediate information during execution of the instructions to be executed by the
processor [1004]. Such instructions, when stored in non-transitory storage media accessible to the processor [1004], render the computing device [1000] into a special-purpose machine that is customized to perform the operations specified in the instructions. The computing device [1000] further includes a read only memory (ROM) [1008] or other static storage device
30 coupled to the bus [1002] for storing static information and instructions for the processor
[1004].
[066] A storage device [1010], such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to the bus [1002] for storing information and instructions. The computing
14

device [1000] may be coupled via the bus [1002] to a display [1012], such as a cathode ray
tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED
(OLED) display, etc. for displaying information to a computer user. An input device [1014],
including alphanumeric and other keys, touch screen input means, etc. may be coupled to the
5 bus [1002] for communicating information and command selections to the processor [1004].
Another type of user input device may be a cursor control [1016], such as a mouse, a trackball,
or cursor direction keys, for communicating direction information and command selections to
the processor [1004], and for controlling cursor movement on the display [1012]. This input
device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis
10 (e.g., y), that allow the device to specify positions in a plane.
[067] The computing device [1000] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic which in combination with the computing device [1000] causes or programs the computing device [1000] to be a special-purpose machine. According to one implementation, the techniques herein are performed by the computing device [1000] in response to the processor [1004] executing one or more sequences of one or more instructions contained in the main memory [1006]. Such instructions may be read into the main memory [1006] from another storage medium, such as the storage device [1010]. Execution of the sequences of instructions contained in the main memory [1006] causes the processor [1004] to perform the process steps described herein. In alternative implementations of the present disclosure, hard-wired circuitry may be used in place of or in combination with software instructions.
[068] The computing device [1000] also may include a communication interface [1018]
25 coupled to the bus [1002]. The communication interface [1018] provides a two-way data
communication coupling to a network link [1020] that is connected to a local network [1022].
For example, the communication interface [1018] may be an integrated services digital network
(ISDN) card, cable modem, satellite modem, or a modem to provide a data communication
connection to a corresponding type of telephone line. As another example, the communication
30 interface [1018] may be a local area network (LAN) card to provide a data communication
connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, the communication interface [1018] sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
15

[069] The computing device [1000] can send messages and receive data, including program
code, through the network(s), the network link [1020] and the communication interface [1018].
In the Internet example, a server [1030] might transmit a requested code for an application
5 program through the Internet [1028], the ISP [1026], the local network [1022] and the
communication interface [1018]. The received code may be executed by the processor [1004] as it is received, and/or stored in the storage device [1010], or other non-volatile storage for later execution.
[070] Referring to FIG. 3, an exemplary block diagram of a system [300] for processing a registration request in a communication network, is shown, in accordance with the exemplary implementations of the present disclosure. The system [300] comprises at least one access and mobility management function (AMF) unit [106]. The AMF unit [106] further comprises at least one load balancer [302], at least one counter unit [304], and at least one decision unit [306]. Also, all of the components/ units of the system [300] are assumed to be connected to each other unless otherwise indicated below. As shown in the figures all units shown within the system [300] should also be assumed to be connected to each other. Also, in FIG. 1 only a few units are shown, however, the system [300] may comprise multiple such units or the system [300] may comprise any such numbers of said units, as required to implement the features of the present disclosure.
[071] The system [300] is configured for processing the registration request in the communication network with the help of the interconnection between the components/units of the system [300].
25
[072] Further, in accordance with the present disclosure, it is to be acknowledged that the functionality described for the various the components/units can be implemented interchangeably. While specific embodiments may disclose a particular functionality of these units for clarity, it is recognized that various configurations and combinations thereof are
30 within the scope of the disclosure. The functionality of specific units as disclosed in the
disclosure should not be construed as limiting the scope of the present disclosure. Consequently, alternative arrangements and substitutions of units, provided they achieve the intended functionality described herein, are considered to be encompassed within the scope of the present disclosure.
16

[073] In order to process the registration request in the communication network, the load
balancer [302] is configured to dynamically (i.e. real-time or as needed) receive the registration
request from one or more user devices (such as mobile phone). The registration request is
5 generated from the one or more user device to access or connect to the communication network.
[074] The counter unit [304] is connected at least with the load balancer [302] and the counter unit [304] is configured to continuously determine a number of registration request received at the load balancer [302]. The present disclosure encompasses that the counter unit [304] of the
10 AMF unit [106] is further configured to determine the number of registration request received
at the load balancer [302] within a configurable predefined time period (such as every 5 seconds). The present disclosure encompasses that the counter unit [304] of the AMF unit [106] may utilize one or more determination techniques which may be known to the person skilled in the art, to continuously determining the number of registration request.
15
[075] The decision unit [306] is connected at least with the counter unit [304]. The decision unit [306] is configured to extract a process identifier and a thread identifier from the received registration request. The present disclosure encompasses that the process identifier is a unique number assigned to each network process and the thread identifier is a unique number assigned
20 to each individual network thread within a network process. For example, the process identifier
and the thread identifier help to distinguish between one or more network processes handling one or more registration requests.
[076] The decision unit [306] is further configured to perform a first level throttling of the
25 determined number of registration request. The decision unit [306] is further configured to
perform a second level throttling of the determined number of registration request. The decision unit [306] is further configured to perform a third level throttling of the determined number of registration request.
30 [077] The present disclosure encompasses that the first level throttling, the second level
throttling and the third level throttling may include but not limited to queuing and/or delaying one or more registration requests and rejection a portion of the registration request.
17

[078] The present disclosure encompasses that the decision unit [306] is further configured to hash the received registration request to extract the process identifier and the thread identifier from the received registration request.
5 [079] As disclosed by the present disclosure, the hashing of the registration request refers to
applying a cryptographic hash function to the received registration request. The hashing is preferably done by a cryptographic hash function-based technique that takes an input (i.e. the registration request) and produces a fixed-size string of bytes, which is a unique representation of the input data (i.e. hashed registration request). 10
[080] The present disclosure encompasses that the decision unit [306] is further configured to analyse whether the number of registration request exceeds a first threshold count.
[081] The present disclosure encompasses that process the registration request based on the
15 first level throttling, the load balancer [302] is configured to determine the registration request
as a first unsuccessful request in an event the number of the registration request exceeds the
first threshold count. The load balancer [302] is further configured to reject the first
unsuccessful request based on determine the registration request as the first unsuccessful. The
present disclosure as disclosed herein comprises that performing the first level throttling
20 comprises of analysing, by the decision unit [306] of the AMF unit [106], whether the number
of registration request exceeds a first threshold count. The threshold count signifies a predetermined limit or a threshold value that is pre-set to regulate the flow of registration requests. For example, the first threshold count may range from 50 to 60 registration requests.
25 [082] The present disclosure encompasses that to process the registration request based on
the first level throttling, the load balancer [302] is further configured to determine the registration request as a first successful request in an event the number of the registration request is less than or equal to the first threshold count.
30 [083] The present disclosure encompasses that to perform the second level throttling, the
decision unit [306] is configured to determine the first successful request as a second successful request based on the process identifier successfully matching with an allowed process identifier.
18

[084] The present disclosure encompasses that to process the registration request based on
the second level throttling, the load balancer [302] is configured to determine the first
successful request as a second unsuccessful request based on a mismatch in the process
identifier with an allowed process identifier. The load balancer [302] is further configured to
5 reject the second unsuccessful request in an event the first successful request is determined as
the second unsuccessful request.
[085] The present disclosure encompasses that to perform the third level throttling, the
decision unit [306] is configured to determine the second successful request as a third
10 successful request based on the thread identifier successfully matching with an allowed thread
identifier.
[086] The present disclosure encompasses that to process the registration request based on
the third level throttling, the load balancer [302] is configured to determine the second
15 successful request as a third unsuccessful request based on a mismatch in the thread identifier
with an allowed third identifier. The load balancer [302] is further configured to reject the third unsuccessful request in an event the second successful request is determined as the third unsuccessful request.
20 [087] The load balancer [302] further configured to process the registration request based on
the first level throttling, the second level throttling and the third level throttling of the determined number of registration request.
[088] For example, if the incoming number of registration requests exceeds a certain
25 threshold (such as beyond 200), in the first level throttling, the decision unit [306] limits the
processing of one or more registration request. Thereafter, in the second level throttling, the
decision unit [306] checks if the process identifier is successfully matches with the allowed
process identifier. In case the process identifier is successfully matched, then the process is
carried forward or else a rejection message is transmitted to the user device. Further, in third
30 level throttling, the decision unit [306] checks if the thread identifier successful matches with
the allowed thread identifier and upon successful matching, the registration request is processed, based on the first level throttling, the second level throttling and the third level throttling of the determined number of registration request.
19

[089] Referring to FIG. 4, an exemplary method flow diagram [400] for processing a
registration request in a communication network in accordance with exemplary
implementations of the present disclosure is shown. In an implementation the method [400] is
performed by the system [300]. Further, in an implementation, the system [300] may be present
5 in a server device to implement the features of the present disclosure. Also, as shown in Figure
4, the method [400] starts at step [402].
[090] Next, at step [404], the method [400] comprises receiving dynamically (i.e. real-time
or as needed), at a load balancer [302] of an access and mobility management function (AMF)
10 unit [106], the registration request from one or more user devices (such as mobile phone). The
registration request is generated from the one or more user device to access or connect to the communication network.
[091] At step [406], the method [400] comprises determining continuously, by a counter unit
15 [304] of the AMF unit [106], a number of registration request received at the load balancer
[302].
[092] As disclosed by the present disclosure herein, the counter unit [304] of the AMF unit [106] determines the number of registration request received at the load balancer [302] within
20 a configurable predefined time period (such as every 5 seconds). Further, the method [400] for
determination of the number of registration request received at the load balancer [302] one or more determination techniques which may be known to the person skilled in the art may be utilized by the counter unit [304], to continuously determining the number of registration request.
25
[093] At step [408], the method [400] comprises extracting, by a decision unit [306] of the AMF unit [106], a process identifier and a thread identifier from the received registration request. For example, the process identifier and the thread identifier help to distinguish between one or more processes handling one or more registration requests.
30
[094] The present disclosure as disclosed herein comprises that extracting the process identifier and the thread identifier from the received registration request further comprises hashing, by the decision unit [306] of the AMF unit [106], the received registration request.
20

[095] The present disclosure encompasses that the hashing of the registration request refers
to applying a cryptographic hash function to the received registration request. The hashing is
preferably done by a cryptographic hash function-based technique that takes an input (i.e. the
registration request) and produces a fixed-size string of bytes, which is a unique representation
5 of the input data (i.e. hashed registration request).
[096] At step [410], the method [400] comprises performing, by the decision unit [306] of the AMF unit [106], a first level throttling of the determined number of registration request.
[097] The present disclosure as disclosed herein comprises that performing the first level throttling comprises of analysing, by the decision unit [306] of the AMF unit [106], whether the number of registration request exceeds a first threshold count. The threshold count signifies a predetermined limit or a threshold value that is pre-set to regulate the flow of registration requests. For example, the first threshold count may range from 50 to 60 registration requests.
[098] The present disclosure as disclosed herein comprise that method [400] for processing the registration request based on the first level throttling comprises determining, by the load balancer [302] of the AMF unit [106], the registration request as a first unsuccessful request in an event the number of the registration request exceeds the first threshold count. Further, the present disclosure encompasses rejecting, by the load balancer [302] of the AMF unit [106], the first unsuccessful request in an event the registration request is determined as the first unsuccessful request.
[099] The method [400] as disclosed herein may further comprises processing the registration
25 request based on the first level throttling further comprises determining, by the load balancer
[302] of the AMF unit [106], the registration request as a first successful request in an event the number of the registration request is less than or equal to the first threshold count.
[100] At step [412], the method [400] comprises performing, by the decision unit [306] of the
30 AMF unit [106], a second level throttling of the determined number of registration request.
[101] The method [400] as disclosed herein may further comprises performing the second level throttling comprises of determining, by the decision unit [306] of the AMF unit [106], the
21

first successful request as a second successful request based on the process identifier successfully matching with an allowed process identifier.
[102] The method [400] as disclosed herein may further comprises processing the registration
5 request based on the second level throttling comprises determining, by the load balancer [302]
of the AMF unit [106], the first successful request as a second unsuccessful request based on a
mismatch in the process identifier with an allowed process identifier. Thereafter, the method
[400] as disclosed herein may further comprises rejecting, by the load balancer [302] of the
AMF unit [106], the second unsuccessful request in an event the first successful request is
10 determined as the second unsuccessful request.
[103] At step [414], the method [400] comprises performing, by the decision unit [306] of the AMF unit [106], a third level throttling of the determined number of registration request.
15 [104] The method [400] as disclosed herein may further comprises performing the third level
throttling comprises of determining, by the decision unit [306] of the AMF unit [106], the second successful request as a third successful request based on the thread identifier successfully matching with an allowed thread identifier.
20 [105] The method [400] as disclosed herein may further comprises processing the registration
request based on the third level throttling comprises determining, by the load balancer [302] of the AMF unit [106], the second successful request as a third unsuccessful request based on a mismatch in the thread identifier with an allowed third identifier. Thereafter, the method [400] as disclosed herein may further comprises processing the registration request based on the third
25 level throttling comprises rejecting, by the load balancer [302] of the AMF unit [106], the third
unsuccessful request in an event the second successful request is determined as the third unsuccessful request.
[106] At step [416], the method [400] comprises processing, by the load balancer [302] of the
30 AMF unit [106], the registration request based on the first level throttling, the second level
throttling and the third level throttling of the determined number of registration request.
[107] For example, if the incoming number of registration requests exceeds a certain threshold (such as beyond 200), in the first level throttling, the decision unit [306] limits the
22

processing of one or more registration request. Thereafter, in the second level throttling, the
decision unit [306] checks if the process identifier is successfully matches with the allowed
process identifier. In case the process identifier is successfully matched, then the process is
carry forward or else a rejection message is transmitted to the user device. Further, in third
5 level throttling, the decision unit [306] checks if the thread identifier successful matches with
the allowed thread identifier and upon successful matching, the registration request is processed, based on the first level throttling, the second level throttling and the third level throttling of the determined number of registration request.
10 [108] Thereafter, the method [400] terminates at step [418].
[109] Referring to FIG. 5, illustrates an exemplary signal flow diagram for processing registration requests in a communication network in accordance with exemplary implementations of the present disclosure is shown. The method [500] may be implemented
15 using the system [300]. At step S1, a registration request is transmitted to a Radio Access
Network (RAN) from the one or more user devices. At step S2, an Access and Mobility Management Function (AMF) [106] is selected, and at step S3, the registration request is forwarded to the selected AMF [106]. At step S4, the registration procedure is calculated: if the traffic exceeds throttling level 1 rate i.e., a first level of threshold count, the procedure is
20 rejected; if the traffic rate exceeds throttling level 2 rate, the procedure is dropped; if the traffic
rate is below throttling level 1 rate, the procedure is processed further. At step S5, if the traffic exceeds throttling level 1 rate, the procedure is rejected and transmitted from the AMF [106] to the RAN, and at step S6, the registration reject is transmitted to the user device from the RAN.
25
[110] For ease of understanding, let’s consider an example. In accordance with the present solution as disclosed herein, a registration request, for example, an “initialUEMessage” from a user device, is received at the load balancer [302]. Thereupon, on receipt of said registration request, the counter unit [304] determines a number of registration requests already received,
30 i.e., the number of pending registration requests at the load balancer [302]. Let's say already
that there are 50 registration requests that are pending with the load balance [302]. In that scenario, the said registration request received at the load balancer [302] increases the number of the registration requests that are pending with the load balance [302] to 51.
23

[111] Further, in accordance with the present disclosure, a process identifier and a thread
identifier from said received registration request are extracted by the decision unit [306]. Now,
a first level throttling of the determined number of registration requests is performed by the
decision unit [306], wherein let’s suppose a first level of threshold count is 40. In this scenario,
5 a first unsuccessful request is determined by the load balancer [302], as the number of the
registration requests that are pending with the load balance [302] is 51, which is greater than the first level of threshold count, i.e., 40. Further, based on determining the first unsuccessful request, the load balancer [302] rejects the registration request. In this case, the solution terminates here.
10
[112] Further, let us consider if there is an additional threshold associated with said received registration request, i.e., the throttling level 2 rate, where the throttling level 2 rate signifies a maximum number of registrations associated with the registration request in the communication network of 50 requests. In that scenario, as the number of the registration
15 requests that are pending with the load balance [302] is 51, which exceeds the throttling level
2 rate, i.e., 50, said registration request would be dropped and the solution would terminate.
[113] Now, to continue from the above, let’s suppose the first level of threshold count would have been 60 and the throttling level 2 rate is 75 requests. In that scenario, a result of the first
20 level throttling would have been successful, i.e., the first successful request, as the number of
the registration requests that are pending with the load balance [302] is 51, which is less than the first level of threshold count, i.e., 60. In said scenario, the solution may perform a second level throttling once the result of the first level throttling based on the first level throttling performed above is determined to be successful by the load balancer [302]. Then, in order to
25 perform the second level throttling, the decision unit [306] determines the first successful
request and a second successful request associated with the registration request based on the extracted process identifier successfully matching with an allowed process identifier. In a scenario where the extracted process identifier is unsuccessfully matched with the allowed process identifier, the solution terminates in said scenario.
30
[114] Now, continuing from above, if the extracted process identifier is successfully matched with the allowed process identifier, a third level throttling is performed, wherein the decision unit [306] based on the successful matching of the extracted identifier determines a third successful request based on the extracted thread identifier successfully matching with an
24

allowed thread identifier. In a scenario where the extracted thread identifier is unsuccessfully matched with the allowed thread identifier, the solution terminates in said scenario.
[115] In an event the extracted thread identifier is successfully matched with the allowed
5 thread identifier, the load balancer [302] then processes the registration request; therefore, the
present solution in this manner performs the first level throttling, the second level throttling, and the third level throttling of the determined number of registration requests for processing the registration request.
10 [116] Referring to FIG. 6, illustrates an exemplary implementation method flow diagram for
processing a registration request in a communication network, in accordance with exemplary implementations of the present disclosure is shown. Firstly, at step A, traffic goes towards an application. The incoming one or more registration requests are directed to the application for processing. As used herein, application, refers to a software program or set of programs
15 designed to perform specific tasks or functions for the user.
[117] At step B, the application gets a throttling status from a throttling framework Application Programming Interface (API). The application queries the throttling framework, which is an API-driven interface, to determine the current throttling status.
20
[118] At step C, at the throttling framework, a throttling rate calculation to determine whether to respond a positive, a negative or a drop packet. Further at step C, throttling can be applied on system level, SG level (core application entity level), Thread level (within core application entity).
25
[119] FIG. 6 depicts a multi-level throttling approach followed by the method and system of the present disclosure, where the method and system may apply throttling technique at a plurality of levels (i.e. overall system, core application entity, individual threads within the application). The method and system of the present disclosure is flexible and adaptive to
30 manager the influx of plurality of registration requests.
[120] The present disclosure further discloses a non-transitory computer readable storage medium storing instructions for processing a registration request in a communication network, the instructions include executable code which, when executed by a one or more units of a
25

system, causes: a load balancer [302] within an access and mobility management function
(AMF) unit [106] of the system to dynamically receive the registration request from one or
more user devices; a counter unit [304] within the AMF unit [106] of the system to continuously
determine a number of registration request received at the load balancer [302]; a decision unit
5 [306] within the AMF unit [106] of the system to extract a process identifier and a thread
identifier from the received registration request, perform a first level throttling of the
determined number of registration request, perform a second level throttling of the determined
number of registration request, and perform a third level throttling of the determined number
of registration request; the load balancer [302] to process the registration request based on the
10 first level throttling, the second level throttling and the third level throttling of the determined
number of registration request.
[121] For example, the method and system for processing a registration request in a communication network may be implemented in a 5G network that include an Access and
15 Mobility Management Function (AMF) unit [106] to handle user registration and mobility
management. The load balancer [302] dynamically receives one or more registration requests from the one or more user device. Further the counter unit [304] determines the number of registration requests in every 5 second. Thereafter, the decision unit [306] extract the process identifier and the thread identifier from each incoming registration request by using one or
20 more hashing techniques. Further, If the number of requests exceeds a predefined first
threshold, the decision unit [306] marks the requests as "first unsuccessful", and the load balancer [302] rejects these requests. Furthermore, in first level throttling, If the number of requests is below the first threshold, the requests are marked as "first successful" and proceed to the next level of throttling. Next, in second level throttling, for the "first successful" requests,
25 the decision unit [306] checks if the extracted process identifier matches the allowed process
identifiers. If the process identifier does not match, the decision unit [306] marks the request as "second unsuccessful", and the load balancer [302] rejects these requests. If the process identifier matches, the request is marked as "second successful" and moves to the third level of throttling. Next, in third level throttling, for the "second successful" requests, the decision unit
30 [306] checks if the extracted thread identifier matches the allowed thread identifiers. If the
thread identifier matches, the request is considered "third successful" and is processed by the load balancer [302]. If the thread identifier does not match, the request is marked as "third unsuccessful" and is rejected by the load balancer [302]. When rejecting requests at any level of the throttling process, the decision unit [306] generates a differential timer value within a
26

configured range. This differential timer value is included in the negative response sent back
to the user device, acting as a retry-timer. The user device then uses this retry-timer value to
determine when to reattempt the registration request, providing a dynamic back-off
mechanism. Thereby, effectively managing and controlling the arrival of registration requests,
5 ensuring the stability and responsiveness of the overall 5G network.
[122] As is evident from the above, the present disclosure provides a technically advanced solution for processing registration request in a communication network that may be deployed in any form to control a network traffic, such as system wise, process-set wise and thread wise.
10 Further, it may be applicable for both a fourth-generation (4G) procedure and a fifth-generation
(5G) procedure in an Access and Mobility Management Function (AMF) and/or a Session Management Function (SMF) for incoming interface of a Non-Access Stratum (NAS) protocol or a Next Generation Application Protocol (NGAP) or a General Packet Radio Service (GPRS) Tunnelling Protocol version 2 (GTPv2) protocol. Also, the present solution is able to calculate
15 a current rate of procedure and generate one or more negative response until a level and further
drop messages beyond a particular level. The present solution may generate a differential timer value within a configured range, which may be set in negative responses as a retry-timer.
[123] While considerable emphasis has been placed herein on the disclosed implementations,
20 it will be appreciated that many implementations can be made and that many changes can be
made to the implementations without departing from the principles of the present disclosure. These and other changes in the implementations of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.
27

We Claim:
1. A method [400] for processing a registration request in a communication network, the
method comprising:
5 - receiving dynamically, at a load balancer [302] of an access and mobility
management function (AMF) unit [106], the registration request from one or more user devices;
- determining continuously, by a counter unit [304] of the AMF unit [106], a
number of registration request received at the load balancer [302];
10 - extracting, by a decision unit [306] of the AMF unit [106], a process identifier
and a thread identifier from the received registration request;
- performing, by the decision unit [306] of the AMF unit [106], a first level
throttling of the determined number of registration request;
- performing, by the decision unit [306] of the AMF unit [106], a second level
15 throttling of the determined number of registration request;
- performing, by the decision unit [306] of the AMF unit [106], a third level throttling of the determined number of registration request; and
- processing, by the load balancer [302] of the AMF unit [106], the registration request based on the first level throttling, the second level throttling and the
20 third level throttling of the determined number of registration request.

25

2. The method [400] as claimed in claim 1, wherein the counter unit [304] of the AMF unit [106] determines the number of registration request received at the load balancer [302] within a configurable predefined time period.
3. The method [400] as claimed in claim 1, wherein extracting the process identifier and the thread identifier from the received registration request further comprises hashing, by the decision unit [306] of the AMF unit [106], the received registration request.

30 4. The method [400] as claimed in claim 1, wherein performing the first level throttling
comprises of analysing, by the decision unit [306] of the AMF unit [106], whether the number of registration request exceeds a first threshold count.

5. The method [400] as claimed in claim 4, wherein the processing the registration request
based on the first level throttling comprises:
- determining, by the load balancer [302] of the AMF unit [106], the registration
request as a first unsuccessful request in an event the number of the registration
5 request exceeds the first threshold count; and
- rejecting, by the load balancer [302] of the AMF unit [106], the first
unsuccessful request.
6. The method [400] as claimed in claim 4, wherein processing the registration request
10 based on the first level throttling further comprises:
determining, by the load balancer [302] of the AMF unit [106], the registration request as a first successful request in an event the number of the registration request is less than or equal to the first threshold count.
The method [400] as claimed in claim 6, wherein performing the second level throttling comprises of determining, by the decision unit [306] of the AMF unit [106], the first successful request as a second successful request based on the process identifier successfully matching with an allowed process identifier.
The method [400] as claimed in claim 7, wherein processing the registration request based on the second level throttling comprises:
- determining, by the load balancer [302] of the AMF unit [106], the first
25 successful request as a second unsuccessful request based on a mismatch in the
process identifier with an allowed process identifier; and
- rejecting, by the load balancer [302] of the AMF unit [106], the second
unsuccessful request.
30 9. The method [400] as claimed in claim 8, wherein performing the third level throttling
comprises of determining, by the decision unit [306] of the AMF unit [106], the second successful request as a third successful request based on the thread identifier successfully matching with an allowed thread identifier.

10. The method [400] as claimed in claim 9, wherein processing the registration request based on the third level throttling comprises:
- determining, by the load balancer [302] of the AMF unit [106], the second successful request as a third unsuccessful request based on a mismatch in the thread identifier with an allowed third identifier; and
- rejecting, by the load balancer [302] of the AMF unit [106], the third unsuccessful request.
11. A system [300] for processing a registration request in a communication network, the
10 system [300] comprising:
- an access and mobility management function (AMF) unit [106] further comprising:
o a load balancer [302] configured to dynamically receive the registration
request from one or more user devices;
15 o a counter unit [304] connected at least with the load balancer [302], the
counter unit [304] configured to continuously determine a number of
registration request received at the load balancer [302]; and
o a decision unit [306] connected at least with the counter unit [304], the
decision unit [306] configured to:
20 ▪ extract a process identifier and a thread identifier from the
received registration request, ▪ perform a first level throttling of the determined number of
registration request,
▪ perform a second level throttling of the determined number of
25 registration request, and
▪ perform a third level throttling of the determined number of registration request; and
the load balancer [302] further configured to process the
registration request based on the first level throttling, the second
30 level throttling and the third level throttling of the determined
number of registration request.
.

12. The system [300] as claimed in claim 11, wherein the counter unit [304] of the AMF unit [106] is further configured to determine the number of registration request received at the load balancer [302] within a configurable predefined time period.
5 13. The system [300] as claimed in claim 11, wherein the decision unit [306] is further
configured to hash the received registration request to extract the process identifier and the thread identifier from the received registration request.
14. The system [300] as claimed in claim 11, wherein the decision unit [306] is further
10 configured to analyse whether the number of registration request exceeds a first
threshold count.
15. The system [300] as claimed in claim 14, wherein to process the registration request
based on the first level throttling, the load balancer [302] is configured to:
15
determine the registration request as a first unsuccessful request in an event the number of the registration request exceeds the first threshold count; and reject the first unsuccessful request.
20 16. The system [300] as claimed in claim 14, wherein to process the registration request
based on the first level throttling, the load balancer [302] is further configured to:
determine the registration request as a first successful request in an event the number of the registration request is less than or equal to the first threshold count. 25
17. The system [300] as claimed in claim 16, wherein to perform the second level throttling,
the decision unit [306] is configured to determine the first successful request as a second
successful request based on the process identifier successfully matching with an
allowed process identifier.
30
18. The system [300] as claimed in claim 17, wherein to process the registration request
based on the second level throttling, the load balancer [302] is configured to:

- determine the first successful request as a second unsuccessful request based on a mismatch in the process identifier with an allowed process identifier; and
- reject the second unsuccessful request.
5 19. The system [300] as claimed in claim 18, wherein to perform the third level throttling,
the decision unit [306] is configured to determine the second successful request as a third successful request based on the thread identifier successfully matching with an allowed thread identifier.
10 20. The system [300] as claimed in claim 19, wherein to process the registration request
based on the third level throttling, the load balancer [302] is configured to
- determine the second successful request as a third unsuccessful request based
on a mismatch in the thread identifier with an allowed third identifier; and
15 - reject the third unsuccessful request.
21. A user equipment comprising for processing a registration request in a communication network, the UE comprising:
- a memory; and
20 - a processor coupled to the memory, wherein the processor is configured to:
o transmit, to an access and mobility management function (AMF) unit
[106] at a load balancer [302], the registration request, and o receive, from a load balancer [302] of the AMF unit [106], a response based on processing the registration request, 25
wherein to the response based on processing the registration request is received based on:
- receiving dynamically, at the load balancer [302], the registration request from
one or more user devices,
30 - determining continuously, by a counter unit [304] of the AMF unit [106], a
number of registration request received at the load balancer [302],
- extracting, by a decision unit [306] of the AMF unit [106], a process identifier
and a thread identifier from the received registration request,

- performing, by the decision unit [306] of the AMF unit [106], a first level throttling of the determined number of registration request,
- performing, by the decision unit [306] of the AMF unit [106], a second level throttling of the determined number of registration request, and
5 - performing, by the decision unit [306] of the AMF unit [106], a third level
throttling of the determined number of registration request.

Documents

Application Documents

# Name Date
1 202321044319-STATEMENT OF UNDERTAKING (FORM 3) [03-07-2023(online)].pdf 2023-07-03
2 202321044319-PROVISIONAL SPECIFICATION [03-07-2023(online)].pdf 2023-07-03
3 202321044319-FORM 1 [03-07-2023(online)].pdf 2023-07-03
4 202321044319-FIGURE OF ABSTRACT [03-07-2023(online)].pdf 2023-07-03
5 202321044319-DRAWINGS [03-07-2023(online)].pdf 2023-07-03
6 202321044319-FORM-26 [06-09-2023(online)].pdf 2023-09-06
7 202321044319-Proof of Right [13-12-2023(online)].pdf 2023-12-13
8 202321044319-ORIGINAL UR 6(1A) FORM 1 & 26-300124.pdf 2024-02-03
9 202321044319-ENDORSEMENT BY INVENTORS [05-06-2024(online)].pdf 2024-06-05
10 202321044319-DRAWING [05-06-2024(online)].pdf 2024-06-05
11 202321044319-CORRESPONDENCE-OTHERS [05-06-2024(online)].pdf 2024-06-05
12 202321044319-COMPLETE SPECIFICATION [05-06-2024(online)].pdf 2024-06-05
13 Abstract1.jpg 2024-06-27
14 202321044319-FORM 3 [31-07-2024(online)].pdf 2024-07-31
15 202321044319-Request Letter-Correspondence [09-08-2024(online)].pdf 2024-08-09
16 202321044319-Power of Attorney [09-08-2024(online)].pdf 2024-08-09
17 202321044319-Form 1 (Submitted on date of filing) [09-08-2024(online)].pdf 2024-08-09
18 202321044319-Covering Letter [09-08-2024(online)].pdf 2024-08-09
19 202321044319-CERTIFIED COPIES TRANSMISSION TO IB [09-08-2024(online)].pdf 2024-08-09
20 202321044319-FORM 18 [31-01-2025(online)].pdf 2025-01-31