Abstract: The present disclosure relates to a method and a system for performing a backup and a restoration of an application. The disclosure encompasses installing the application and a physical agent component (PAC) [206] of the application; sharing a set of details of the PAC [206], with a network management system (NMS) [210]; initialising a health check procedure; calculating resource parameter(s); notifying about a set of threshold values; sending an alarm to the NMS [210] in an event of a breach of a threshold value; and performing one of: a backup operation and a restore operation of the application based on a user input and the alarm. [Figure 4]
FORM 2
THE PATENTS ACT, 1970 (39 OF 1970) & THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR PERFORMING BACKUP AND RESTORATION OF APPLICATION”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is to be performed.
METHOD AND SYSTEM FOR PERFORMING BACKUP AND RESTORATION OF APPLICATION
FIELD OF THE DISCLOSURE
[0001] Embodiments of the present disclosure generally relate to the field of network performance management. More particularly, embodiments of the present disclosure relate to method and system for performing a backup and a restoration of application.
BACKGROUND
[0002] The following description of related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art.
[0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth generation (5G) technology is
being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
[0004] Various nodes are connected with a network management system for providing various services related to communication systems. All such nodes have other internal components. The components are run using some applications which need to be upgraded, downgraded at various instances. Also, the files related to these applications also need to be stored in back-up systems so as to fetch as and when needed. There may be instances where an upgrade, i.e., switching to an upper version of an application is needed. Similarly, there may be other instances where a downgrade, i.e., switching to a lower version of an application is needed. Also, there may be instances where restoration of files is needed.
[0005] Further, over the period of time various solutions have been developed to perform application backup and restoration. However, there are certain challenges with existing solutions. The existing solutions provide for manual backup and restoration. Also, the systems do not monitor performance of the components before performing a backup or restoration of files.
[0006] Hence, in view of these and other existing limitations, there arises an imperative need to provide a method and a system to overcome the above-mentioned limitations and to provide a method and system for performing a backup and a restoration of an application, which the present disclosure aims to address.
OBJECTS OF THE DISCLOSURE
[0007] Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below.
[0008] It is an object of the present disclosure to provide a system and a method for application backup and restoration that provides for performing automatic backup based on a defined policy.
[0009] It is another object of the present disclosure to provide a solution in which a backup history is maintained for each backup.
[0010] It is yet another object of the present disclosure to provide a solution where monitoring of internal components status of the network function is done before performing backup and/or restoration of application files.
[0011] It is yet another object of the present disclosure to provide a solution that provides alarm management, i.e., raising and/or clearing alarms in case of threshold breach.
SUMMARY
[0012] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0013] The aspect of the present disclosure may relate to a method for performing a backup and a restoration of an application. The method comprises installing, by a processing unit, the application and a physical agent component of the application. The method further comprises sharing, by the application, a set of details of the physical agent component with a network management system (NMS). The method further comprises initialising, by the NMS via a health check unit, a health check procedure upon receiving a ping request from the PAC. The method further
comprises calculating, by the PAC, one or more resource parameters in a set of resource parameters associated with the application. The method further comprises notifying, by the NMS to the PAC, about a set of threshold values based on the set of resource parameters stored in a database at a storage unit, wherein one threshold value is associated with one resource parameter. The method further comprises sending, by the PAC, an alarm to the NMS in an event of a breach of a threshold value in the set of threshold values of the one or more resource parameters. And the method further comprises performing, by a back-up and restoration unit, one of a backup operation and a restore operation of the application based on a user input and the alarm.
[0014] In an exemplary aspect of the present disclosure, the backup operation comprises creating, by the back-up and restoration unit, a profile of the application, the profile comprising one or more file names, one or more folder names, and a path associated with each of the folder name from the one or more folder names for which the backup operation is to be performed. The backup operation further comprises sending, by the back-up and restoration unit to the PAC, an application server credentials, a backup server credentials, and the profile. The backup operation further comprises creating, by the back-up and restoration unit, one or more backup files of the one or more files associated with the one or more file names and the one or more folders associated with the one or more folder name. The backup operation further comprises moving, by the back-up and restoration unit, the one or more backup files to the backup server.
[0015] In an exemplary aspect of the present disclosure, the method further comprises notifying, by the PAC to the NMS, a status of the backup operation based on one of a successful completion of backup operation and an unsuccessful completion of backup operation, wherein the successful completion of the backup operation is when the one or more backup files are moved successfully to the backup server, and wherein the unsuccessful completion of the backup operation is
when moving of the one or more backup files to the backup server fails. The method further comprises sharing, by the PAC, a reason for unsuccessful completion of the backup operation in an event of the unsuccessful completion of the backup operation with the NMS. The method further comprises storing, by the backup and restoration unit, at the storage unit, the status of the backup operation, and time of completion of the backup operation in an event of the successful completion of backup operation.
[0016] In an exemplary aspect of the present disclosure, prior to the moving, by the back-up and restoration unit, the one or more backup files to the backup server, the method comprises compressing, by the back-up and restoration unit, the one or more backup files.
[0017] In an exemplary aspect of the present disclosure, the restore operation comprises receiving, by the back-up and restoration unit, a selection of a backup file from the one or more backup files stored in the backup server. The restore operation further comprises sending, by the NMS to the PAC, the application server credentials, a backup server credentials, and a path associated with the backup file. The restore operation further comprises fetching, by the PAC, the backup file from the backup server. The restore operation further comprises unarchiving, by the back-up and restoration unit, the backup file. The restore operation further comprises running, by the back-up and restoration unit, a restore script.
[0018] In an exemplary aspect of the present disclosure, the method further comprises notifying, by the PAC to the NMS, a status of the restore operation from one of the successful completion of restore operation in an event of the successful completion of restore operation, and the unsuccessful completion of restore operation with a reason for unsuccessful completion of restore operation in an event of the unsuccessful completion of restore operation. The method further comprises storing, by the NMS, at the storage unit, the status of the restore operation, and time
of completion of the restore operation in an event of the successful completion of restore operation.
[0019] In an exemplary aspect of the present disclosure, the set of resource
5 parameters comprises a central processing unit (CPU) usage parameter, a memory
status parameter, and a hard disc drive (HDD) memory parameter.
[0020] Another aspect of the present disclosure may relate to a system for performing a backup and a restoration of an application. The system comprises a
10 processing unit; a physical agent component connected at least to the processing
unit; a network management system connected at least to the processing unit, the network management system further comprising a health check unit; a backup and restoration unit; and a storage unit connected at least to the back-up and restoration unit. The processing unit is configured to install the application and the physical
15 agent component of the application. The application is configured to share, a set of
details of the physical agent component with the network management system (NMS). The NMS is configured to initialise, via the health check unit, a health check procedure upon receiving a ping request from the PAC. The PAC is further configured to calculate one or more resource parameters in a set of resource
20 parameters associated with the application. The NMS is further configured to notify
to the PAC, about a set of threshold values based on the set of resource parameters stored in a database at a storage unit, wherein one threshold value is associated with one resource parameter. The PAC is further configured to send an alarm to the NMS in an event of a breach of a threshold value in the set of threshold values of the one
25 or more resource parameters. The back-up and restoration unit is configured to
perform one of a backup operation and a restore operation of the application based on a user input and the alarm.
[0021] Another aspect of the present disclosure may relate to non-transitory
30 computer-readable storage medium storing instructions for performing a backup
7
and a restoration of an application, the instructions comprising executable code
which, when executed by one or more units of a system, causes: a processing unit
of the system to install an application and a physical agent component (PAC) of the
application. The instructions, which when executed, cause the application to share
5 a set of details of the PAC with the network management system (NMS) and the
NMS of the system to initialize, via a health check unit, a health check procedure upon receiving a ping request from the PAC. The instructions, which when executed, cause the PAC of the system to calculate one or more resource parameters in a set of resource parameters associated with the application and the NMS of the
10 system to notify to the PAC, about a set of threshold values based on the set of
resource parameters stored in a database at a storage unit, wherein one threshold value is associated with one resource parameter. The instructions, which when executed, cause the PAC of the system to send an alarm to the NMS in an event of a breach of a threshold value in the set of threshold values of the one or more
15 resource parameters and the back-up and restoration unit of the system to perform
one of a backup operation and a restore operation of the application based on a user input and the alarm.
DESCRIPTION OF DRAWINGS
20
[0022] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale,
25 emphasis instead being placed upon clearly illustrating the principles of the present
disclosure. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components, electronic components or circuitry commonly used to
30 implement such components.
8
[0023] FIG. 1 illustrates an exemplary block diagram of a computing device upon
which the features of the present disclosure may be implemented in accordance with
5 exemplary implementation of the present disclosure.
[0024] FIG. 2 illustrates an exemplary block diagram of a system for performing a backup and a restoration of an application, in accordance with exemplary implementations of the present disclosure. 10
[0025] FIG. 3 illustrates an exemplary method flow diagram for performing a backup and a restoration of an application, in accordance with the exemplary embodiments of the present disclosure.
15 [0026] FIG. 4 illustrates an exemplary flow diagram depicting the process of
monitoring the network resources, in accordance with exemplary embodiments of the present disclosure.
[0027] FIG. 5 illustrates an exemplary flow diagram indicating the process for
20 applying a backup operation, in accordance with exemplary embodiments of the
present disclosure.
[0028] FIG. 6 illustrates an exemplary flow diagram indicating the process for
applying a restore operation, in accordance with exemplary embodiments of the
25 present disclosure.
[0029] The foregoing shall be more apparent from the following more detailed description of the disclosure.
30 DETAILED DESCRIPTION
9
[0030] In the following description, for the purposes of explanation, various
specific details are set forth to provide a thorough understanding of embodiments
of the present disclosure. It will be apparent, however, that embodiments of the
5 present disclosure may be practiced without these specific details. Several features
described hereafter can each be used independently of one another or with any
combination of other features. An individual feature may not address any of the
problems discussed above or might address only some of the problems discussed
above. Some of the problems discussed above might not be fully addressed by any
10 of the features described herein. Example embodiments of the present disclosure
are described below, as illustrated in various drawings in which like reference numerals refer to the same parts throughout the different drawings.
[0031] The ensuing description provides exemplary embodiments only, and is not
15 intended to limit the scope, applicability, or configuration of the disclosure. Rather,
the ensuing description of the exemplary embodiments will provide those skilled in
the art with an enabling description for implementing an exemplary embodiment.
It should be understood that various changes may be made in the function and
arrangement of elements without departing from the spirit and scope of the
20 disclosure as set forth.
[0032] It should be noted that the terms "mobile device", "user equipment", "user device", “communication device”, “device” and similar terms are used interchangeably for the purpose of describing the disclosure. These terms are not
25 intended to limit the scope of the disclosure or imply any specific functionality or
limitations on the described embodiments. The use of these terms is solely for convenience and clarity of description. The disclosure is not limited to any particular type of device or equipment, and it should be understood that other equivalent terms or variations thereof may be used interchangeably without
30 departing from the scope of the disclosure as defined herein.
10
[0033] Specific details are given in the following description to provide a thorough
understanding of the embodiments. However, it will be understood by one of
ordinary skill in the art that the embodiments may be practiced without these
5 specific details. For example, circuits, systems, networks, processes, and other
components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.
10
[0034] Also, it is noted that individual embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or
15 concurrently. In addition, the order of the operations may be re-arranged. A process
is terminated when its operations are completed but could have additional steps not included in a figure.
[0035] The word “exemplary” and/or “demonstrative” is used herein to mean
20 serving as an example, instance, or illustration. For the avoidance of doubt, the
subject matter disclosed herein is not limited by such examples. In addition, any
aspect or design described herein as “exemplary” and/or “demonstrative” is not
necessarily to be construed as preferred or advantageous over other aspects or
designs, nor is it meant to preclude equivalent exemplary structures and techniques
25 known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes,” “has,” “contains,” and other similar words are used in either the detailed
description or the claims, such terms are intended to be inclusive—in a manner
similar to the term “comprising” as an open transition word—without precluding
any additional or other elements.
30
11
[0036] As used herein, an “electronic device”, or “portable electronic device”, or
“user device” or “communication device” or “user equipment” or “device” refers
to any electrical, electronic, electromechanical and computing device. The user
device is capable of receiving and/or transmitting one or parameters, performing
5 function/s, communicating with other user devices, and transmitting data to the
other user devices. The user equipment may have a processor, a display, a memory, a battery and an input-means such as a hard keypad and/or a soft keypad. The user equipment may be capable of operating on any radio access technology including but not limited to IP-enabled communication, Zig Bee, Bluetooth, Bluetooth Low
10 Energy, Near Field Communication, Z-Wave, Wi-Fi, Wi-Fi direct, etc. For
instance, the user equipment may include, but not limited to, a mobile phone, smartphone, virtual reality (VR) devices, augmented reality (AR) devices, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other device as may be obvious to a person skilled in
15 the art for implementation of the features of the present disclosure.
[0037] Further, the user device and/or a system as described herein to implement technical features as disclosed in the present disclosure may also comprise a “processor” or “processing unit”, wherein processor refers to any logic circuitry
20 for processing instructions. The processor may be a general-purpose processor, a
special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a Digital Signal Processor (DSP) core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other
25 type of integrated circuits, etc. The processor may perform signal coding data
processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor is a hardware processor.
12
[0038] As used herein, “a user equipment”, “a user device”, “a smart-user-device”,
“a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”,
“a wireless communication device”, “a mobile communication device”, “a
communication device” may be any electrical, electronic and/or computing device
5 or equipment, capable of implementing the features of the present disclosure. The
user equipment/device may include, but is not limited to, a mobile phone, smart
phone, laptop, a general-purpose computer, desktop, personal digital assistant,
tablet computer, wearable device or any other computing device which is capable
of implementing the features of the present disclosure. Also, the user device may
10 contain at least one input means configured to receive an input from at least one of
a transceiver unit, a processing unit, a storage unit, a detection unit and any other such unit(s) which are required to implement the features of the present disclosure.
[0039] As used herein, “storage unit” or “memory unit” refers to a machine or
15 computer-readable medium including any mechanism for storing information in a
form readable by a computer or similar machine. For example, a computer-readable
medium includes read-only memory (“ROM”), random access memory (“RAM”),
magnetic disk storage media, optical storage media, flash memory devices or other
types of machine-accessible storage media. The storage unit stores at least the data
20 that may be required by one or more units of the system to perform their respective
functions.
[0040] As used herein “interface” or “user interface refers to a shared boundary
across which two or more separate components of a system exchange information
25 or data. The interface may also be referred to a set of rules or protocols that define
communication or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called.
13
[0041] All modules, units, components used herein, unless explicitly excluded
herein, may be software modules or hardware processors, the processors being a
general-purpose processor, a special purpose processor, a conventional processor,
a digital signal processor (DSP), a plurality of microprocessors, one or more
5 microprocessors in association with a DSP core, a controller, a microcontroller,
Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc.
[0042] As used herein the transceiver unit include at least one receiver and at least
10 one transmitter configured respectively for receiving and transmitting data, signals,
information or a combination thereof between units/components within the system and/or connected with the system.
[0043] As discussed in the background section, the current known solutions have
15 several shortcomings. The present disclosure aims to overcome the above-
mentioned and other existing problems in this field of technology by providing method and system of performing a backup and a restoration of an application.
[0044] FIG. 1 illustrates an exemplary block diagram of the computing device
20 [100] upon which the features of the present disclosure may be implemented in
accordance with exemplary implementation of the present disclosure. In an
implementation, the computing device [100] may also implement a method for
performing a backup and a restoration of an application, utilising the system. In
another implementation, the computing device [100] itself implements the method
25 for performing a backup and a restoration of an application using one or more units
configured within the computing device [100], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
[0045] The computing device [100] may include a bus [102] or other
30 communication mechanism for communicating information, and a hardware
14
processor [104] coupled with bus [102] for processing information. The hardware
processor [104] may be, for example, a general-purpose microprocessor. The
computing device [100] may also include a main memory [106], such as a random-
access memory (RAM), or other dynamic storage device, coupled to the bus [102]
5 for storing information and instructions to be executed by the processor [104]. The
main memory [106] also may be used for storing temporary variables or other
intermediate information during execution of the instructions to be executed by the
processor [104]. Such instructions, when stored in non-transitory storage media
accessible to the processor [104], render the computing device [100] into a special-
10 purpose machine that is customized to perform the operations specified in the
instructions. The computing device [100] further includes a read only memory
(ROM) [108] or other static storage device coupled to the bus [102] for storing static
information and instructions for the processor [104].
15 [0046] A storage device [110], such as a magnetic disk, optical disk, or solid-state
drive is provided and coupled to the bus [102] for storing information and instructions. The computing device [100] may be coupled via the bus [102] to a display [112], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for
20 displaying information to a computer user. An input device [114], including
alphanumeric and other keys, touch screen input means, etc. may be coupled to the bus [102] for communicating information and command selections to the processor [104]. Another type of user input device may be a cursor controller [116], such as a mouse, a trackball, or cursor direction keys, for communicating direction
25 information and command selections to the processor [104], and for controlling
cursor movement on the display [112]. The input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
15
[0047] The computing device [100] may implement the techniques described
herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware
and/or program logic which in combination with the computing device [100] causes
or programs the computing device [100] to be a special-purpose machine.
5 According to one implementation, the techniques herein are performed by the
computing device [100] in response to the processor [104] executing one or more
sequences of one or more instructions contained in the main memory [106]. Such
instructions may be read into the main memory [106] from another storage medium,
such as the storage device [110]. Execution of the sequences of instructions
10 contained in the main memory [106] causes the processor [104] to perform the
process steps described herein. In alternative implementations of the present disclosure, hard-wired circuitry may be used in place of or in combination with software instructions.
15 [0048] The computing device [100] also may include a communication interface
[118] coupled to the bus [102]. The communication interface [118] provides a two-way data communication coupling to a network link [120] that is connected to a local network [122]. For example, the communication interface [118] may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or
20 a modem to provide a data communication connection to a corresponding type of
telephone line. As another example, the communication interface [118] may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, the communication interface [118] sends and receives electrical,
25 electromagnetic or optical signals that carry digital data streams representing
various types of information.
[0049] The computing device [100] can send messages and receive data, including
program code, through the network(s), the network link [120] and the
30 communication interface [118]. In the Internet example, a server [130] might
16
transmit a requested code for an application program through the Internet [128], the
ISP [126], the local network [122], host [124] and the communication interface
[118]. The received code may be executed by the processor [104] as it is received,
and/or stored in the storage device [110], or other non-volatile storage for later
5 execution.
[0050] The present disclosure is implemented by a system [200] (as shown in FIG. 2). The computing device [100] (as shown in Fig. 1) may reside in said system [200]. In an implementation, the computing device [100] may be connected to the
10 system [200] to perform the present disclosure. Referring to FIG. 2, an exemplary
block diagram of the system [200] for performing a backup and a restoration of an application, is shown, in accordance with the exemplary implementations of the present disclosure. The system [200] comprises at least one processing unit [202], at least one storage unit [204], at least one physical agent component (PAC) [206],
15 at least one network management system (NMS) [210] comprising at least one
health check unit [208] and at least one backup/ back-up and restoration unit [212]. It is to be noted that the NMS [210] is a component of the system [200] in the communication network responsible for monitoring, managing and optimizing the various components and functions within the 5G communication network. The
20 NMS [210] is a converged system capable of managing the core and the RAN
network elements. The NMS [210] is responsible for maintaining high performance levels as the number of network elements increases. The NMS [210] also provides simplified integration with third-party systems.
25 [0051] Also, all of the components/ units of the system [200] are assumed to be
connected to each other unless otherwise indicated below. As shown in the figures all units shown within the system should also be assumed to be connected to each other. Also, in FIG. 2 only a few units are shown, however, the system [200] may comprise multiple such units or the system [200] may comprise any such numbers
30 of said units, as required to implement the features of the present disclosure. The
17
system [200] may be independent of but in communication with a user device [may also referred herein as a user equipment (UE)]. In another implementation, the system [200] may reside in a server or a network entity. In yet another implementation, the system [200] may reside partly in the server/ network entity. 5
[0052] The system [200] is configured for performing a backup and a restoration of an application, with the help of the interconnection between the components/units of the system [200]. The application herein refers to network elements such as a UPF, an AMF, and the like. The UPF refers to a User Plane
10 Function (UPF) and is responsible for handling user data traffic, including packet
routing, forwarding, and QoS enforcement. Further, The AMF refers to Access and Mobility Management Function (AMF) and is responsible for managing mobility of a user equipment, registration to the network, connection and reachability, and the like.
15
[0053] In an exemplary scenario, if a user wants to upgrade version of a currently running application, the user can take backup of current application version first. The user can specify particulars for which back up is to be taken (for example, configurations, bin, settings, local data, and the like). After this, backup data is
20 compressed and stored on a remote server. Let us assume that the currently running
application version is 1.0.0. After upgrade, it gets updated to latest version (example, 2.0.0). Further, if the user takes backup of the currently running application, then backup for the application version 1.0.0 is created.
25 [0054] At any point of time if the user wants to roll back its application’s version,
the user can choose from back up versions and restore the application completely to the selected version. For example, application version 2.0.0 is running, and the user wants to roll back to 1.0.0 version. The user can directly select restore option to backup version 1.0.0.
30
18
[0055] The processing unit [202] is configured to install the application and the physical agent component [206] of the application.
[0056] The application is configured to share, a set of details of the physical agent
5 component (PAC) [206] with the network management system (NMS) [210]. It is
to be noted that the PAC [206] may include any physical (preferably hardware)
network infrastructure device that supports the installation of the application. The
set of details may include but not limited to functions performed by the PAC [206],
positions of deployment of base stations with respect to the PAC [206], technical
10 specifications such as power output, capacity etc.
[0057] The NMS [210] is configured to initialise, via the health check unit [208], a health check procedure upon receiving a ping request from the PAC [206]. The health check procedure is performed by the NMS [210] to ascertain network
15 reliability and enhance network performance. This is done via checking/monitoring
of statuses of connected devices, key performance indicators (KPIs), checking standards and defined policies, optimizing resources utilization and security analysis. The ping request is sent by the PAC [206] to the NMS [210] for invoking the health check procedure of one or more resources for ensuring good network
20 performance. It is further noted that the NMS [210] is further configured to store,
at the storage unit [204], the status of the restore operation and time of completion of the restore operation in an event of the successful completion of restore operation.
25 [0058] The PAC [206] is further configured to calculate one or more resource
parameters in a set of resource parameters associated with the application. It is to be noted that the set of resource parameters comprise a central processing unit (CPU) usage parameter, a memory status parameter, and a hard disc drive (HDD) memory parameter. The parameters may include such as but not limited to CPU
30 utilization, CPU temperature, performance level (in case of CPU); disk usage, read/
19
write (R/W) speeds, input/output (I/O operations (in case of HDD) and cache usage,
memory access time (in case of memory). The PAC [206] is further configured to
send an alarm to the NMS [210] in an event of a breach of a threshold value in a set
of threshold values of the one or more resource parameters. For e.g., if the threshold
5 value of a resource parameter like cache usage of memory exceeds a preset limit of
storing temporary data, then the alarm is invoked. The PAC [206] is further configured to notify to the NMS [210], a status of the backup operation based on one of a successful completion of backup operation and an unsuccessful completion of backup operation. Further, the status is indicative of the current state of the
10 resource parameter like cache usage of memory. It is to be noted that the successful
completion of backup operation is when the one or more backup files are moved successfully to the backup server. It is to be noted that the unsuccessful completion of the backup operation is when moving of the one or more backup files to the backup server fails.
15
[0059] The PAC [206] is further configured to share, a reason for unsuccessful completion of backup operation in the event of the unsuccessful completion of the backup operation with the NMS [210]. It is to be noted, for further performing the restore operation, the PAC [206] is configured to receive the application server
20 credentials, the backup server credentials, and a path associated with the backup
file. The PAC [206] is configured to fetch the backup file from the backup server. It is further noted that the PAC [206] is further configured to notify, to the NMS [210], a status of the restore operation from one of the successful completion of restore operation in an event of the successful completion of restore operation, and
25 the unsuccessful completion of restore operation with a reason for unsuccessful
completion of restore operation in an event of the unsuccessful completion of restore operation. The PAC [206] may identify the reason of unsuccessful completion of backup operation in the event of the unsuccessful completion of the backup operation with the NMS [210] by actively monitoring the backup and
30 restoration operation.
20
[0060] The NMS [210] is further configured to notify to the PAC [206], about a
set of threshold values of the set of resource parameters stored in a database at a
storage unit [204], wherein one threshold value is associated with one resource
5 parameter. It is to be noted that the set of threshold values are configured/defined
by the user for managing different severity of the alarm associated with the resource parameters. For instance, the NMS [210] may notify the PAC [206] that a configured threshold value of a particular resource parameter of the set of resource parameters is reached.
10
[0061] The back-up and restoration unit [212] is configured to perform one of a backup operation and a restore operation of the application based on a user input and the alarm. It is to be noted that the user input may include the input of performing restore operation or backup operation by the user via a user interface
15 (UI) from the NMS [210]. It is to be noted that for performing the backup operation,
the back-up and restoration unit [212] is further configured to create a profile of the application. It is further noted that the profile comprises one or more file names, one or more folder names, and a path associated with each of the folder name from the one or more folder names for which the backup operation is to be performed.
20 The back-up and restoration unit [212] is further configured to send to the PAC
[206], an application server credentials, a backup server credentials, and the profile. The back-up and restoration unit [212] is further configured to create one or more backup files of the one or more files associated with the one or more file names and the one or more folders associated with the one or more folder names. The back-up
25 and restoration unit [212] is further configured to move the one or more backup
files to the backup server. The backup and restoration unit [212] is further configured to store, at the storage unit [204], the status of the backup operation, and time of completion of the backup operation in an event of the successful completion of backup operation. The back-up and restoration unit [212], prior to moving the
30 one or more backup files to the backup server, is further configured to compress the
21
one or more backup files. It is further noted that, for performing the restore
operation, the back-up and restoration unit [212] is configured to receive a selection
of a backup file from the one or more backup files stored in the backup server. It is
also noted that, for performing the restore operation, the back-up and restoration
5 unit [212] is further configured to unarchive the backup file. The back-up and
restoration unit [212] is further configured to run a restore script.
[0062] Referring to FIG 3, an exemplary method flow diagram [300] for performing a backup and a restoration of an application, in accordance with
10 exemplary implementations of the present disclosure is shown. In an
implementation the method [300] is performed by the system [200]. Further, in an implementation, the system [200] may be present in a server device to implement the features of the present disclosure. Also, as shown in Figure 4, the method [300] starts at step [302].
15
[0063] At step [304], the method [300] comprises installing, by a processing unit [202], the application and a physical agent component [206] of the application. It is to be noted that the PAC [206] may include any physical (preferably hardware) network infrastructure device that supports the installation of the application.
20
[0064] At step [306], the method [300] comprises sharing, by the application, a set of details of the physical agent component [206], with a network management system (NMS) [210]. The set of details may include but not limited to functions performed by the PAC [206], positions of deployment of base stations with respect
25 to the PAC [206], technical specifications such as power output, capacity etc.
[0065] At step [308], the method [300] comprises initialising, by the NMS [210]
via a health check unit [208], a health check procedure upon receiving a ping
request from the PAC [206]. The health check procedure is performed by the NMS
30 [210] to ascertain network reliability and enhance network performance. This is
22
done via checking/monitoring of statuses of connected devices, key performance
indicators (KPIs), checking standards and defined policies, optimizing resources
utilization and security analysis. The ping request is sent by the PAC [206] to the
NMS [210] for invoking the health check procedure of one or more resources for
5 ensuring good network performance.
[0066] At step [310], the method [300] further comprises calculating, by the PAC [206], one or more resource parameters in a set of resource parameters associated with the application.
10
[0067] In an exemplary aspect of the present disclosure, in the disclosed method [300], the set of resource parameters comprises a central processing unit (CPU) usage parameter, a memory status parameter, and a hard disc drive (HDD) memory parameter. The parameters may include such as but not limited to CPU utilization,
15 CPU temperature, performance level (in case of CPU); disk usage, read/ write
(R/W) speeds, input/output (I/O0 operations (in case of HDD) and cache usage, memory access time (in case of memory).
[0068] At step [312], the method [300] further comprises notifying, by the NMS
20 [210] to the PAC [206], about a set of threshold values based on the set of resource
parameters stored in a database at a storage unit [204]. It is to be noted that one threshold value is associated with one resource parameter.
[0069] At step [314], the method [300] further comprises sending, by the PAC
25 [206], an alarm to the NMS [210] in an event of a breach of a threshold value in the
set of threshold values of the one or more resource parameters. For e.g., if the
threshold value of a resource parameter like cache usage of memory exceeds a
preset limit of storing temporary data, then the alarm is invoked. It is further noted
that the set of threshold values are configured/defined by the user for managing
30 different severity of the alarm associated with the resource parameters.
23
[0070] At step [316], the method [300] further comprises performing, by a back-up
and restoration unit [212], one of a backup operation and a restore operation of the
application based on a user input and the alarm. It is to be noted that the user input
5 may include the input of performing restore operation or backup operation by the
user via a user interface (UI) from the NMS [210].
[0071] In an exemplary aspect of the present disclosure, in the disclosed method [300], the backup operation comprises creating, by the back-up and restoration unit
10 [212], a profile of the application, the profile comprising one or more file names,
one or more folder names, and a path associated with each of the folder name from the one or more folder names for which the backup operation is to be performed. The backup operation further comprises sending, by the back-up and restoration unit [212] to the PAC [206], an application server credentials, a backup server
15 credentials, and the profile. The backup operation further comprises creating, by
the back-up and restoration unit [212], one or more backup files of the one or more files associated with the one or more file names and the one or more folders associated with the one or more folder names. And, the backup operation further comprises moving, by the back-up and restoration unit [212], the one or more
20 backup files to the backup server.
[0072] In an exemplary aspect of the present disclosure, in the disclosed method
[300], prior to the moving, by the by the back-up and restoration unit [212], the one
or more backup files to the backup server, the method [300] comprises
25 compressing, by the back-up and restoration unit [212], the one or more backup
files.
[0073] In an exemplary aspect of the present disclosure, the restore operation
comprises receiving, by the back-up and restoration unit [212], a selection of a
30 backup file from the one or more backup files stored in the backup server. The
24
restore operation further comprises sending, by the NMS [210] to the PAC [206],
the application server credentials, a backup server credentials, and a path associated
with the backup file. The restore operation further comprises fetching, by the PAC
[206], the backup file from the backup server. The restore operation further
5 comprises unarchiving, by the back-up and restoration unit [212], the backup file.
The unarchiving may include decompressing the one or more backup files to their
respective original to format thereby ensuring the data consistency. The restore
operation further comprises running, by the back-up and restoration unit [212], a
restore script. It is to be noted that the restore script may include a predefined
10 sequence of commands for employing automated restoring operations in case of
events like network disruption or network disaster.
[0074] Thereafter, the method [300] terminates at step [318].
15 [0075] In an exemplary aspect of the present disclosure, the method further
comprises notifying, by the PAC [206] to the NMS [210], a status of the backup operation based on one of a successful completion of backup operation and an unsuccessful completion of backup operation, wherein the successful completion of the backup operation is when the one or more backup files are moved
20 successfully to the backup server, and wherein the unsuccessful completion of the
backup operation is when moving of the one or more backup files to the backup server fails. Further, the status is indicative of the current state of the resource parameter like cache usage of memory. It is to be noted that the successful completion of backup operation is when the one or more backup files are moved
25 successfully to the backup server. It is to be noted that the unsuccessful completion
of the backup operation is when moving of the one or more backup files to the backup server fails. The method [300] further comprises sharing, by the PAC [206], a reason for unsuccessful completion of the backup operation in an event of the unsuccessful completion of the backup operation with the NMS [210]. The method
30 [300] further comprises storing, by the backup and restoration unit [212], at the
25
storage unit [204], the status of the backup operation, and time of completion of the backup operation in an event of the successful completion of backup operation.
[0076] In an exemplary aspect of the present disclosure, the method further
5 comprises notifying, by the PAC [206] to the NMS [210], a status of the restore
operation from one of a successful completion of restore operation in an event of
the successful completion of restore operation, and an unsuccessful completion of
restore operation with a reason for unsuccessful completion of restore operation in
an event of the unsuccessful completion of restore operation. The method [300]
10 further comprises storing, by the NMS [210], at the storage unit [204], the status of
the restore operation, and time of completion of the restore operation in an event of the successful completion of restore operation.
[0077] Referring to FIG. 4, an exemplary method flow [400] indicating the process
15 for applying of monitoring the network resources, in accordance with exemplary
implementations of the present disclosure is shown. In an implementation the method [400] is performed by the system [200] (as shown in FIG. 2). This is performed in the following steps:
20 - At step S1, a physical agent component (PAC) [206] (as shown in Fig. 2) is
installed along with the application which is to be monitored.
- Step S2 is performed when the application gets connected to a network
management system (NMS) [210] (as shown in Fig. 2), and the details of
the PAC [206] are shared.
25 - Step S3 involves the NMS [210] storing the details of the PAC [206] of the
application in a database (DB) in a storage unit [204] (as shown in Fig. 2).
- Thereafter, Step S4 is executed when the health check is started upon
receiving the ping request from the PAC [206].
26
5
10
-
-
-
-
-
Step S5 requires the PAC [206] to calculate resource parameters such as but
not limited to CPU, memory, HDD depending on the application which is
running on a physical server or inside a container.
The PAC [206] then sends this data towards the NMS [210] by executing
Step S6.
At step S7, the NMS [210] stores the resource parameters in the DB. It is to
be noted that in the NMS [210], one can configure threshold values of the
resource parameters by executing step S7A.
The NMS [210] thereafter notifies the PAC [206] about the configured
threshold values of the resource parameter by executing Step S8.
Step S9 involves the PAC [206] to generate alarms to the NMS [210] if any
of the resource parameters breaches the threshold value.
[0078] Referring to FIG. 5, an exemplary method flow [500] indicating the process
15 for applying a backup operation, in accordance with exemplary implementations of
the present disclosure is shown. In an implementation the method [500] is
performed by the system [200] (as shown in Fig. 2). This is performed in the
following steps when the backup/back-up operation is initiated on demand or
scheduled from a network management system (NMS) [210] (as shown in FIG. 2)
20 by a user via a user interface (UI):
- At step S1, a user creates a profile which contains files and folders name
and path for which the backup operation is to be performed. The user also
provides application servers and backup server credentials.
- Step S2 begins when the backup operation initiates. Here, all the server
25 credentials and information about backup files are sent to a physical agent
component (PAC) [206] (as shown in Fig. 2) via the NMS [210].
- Step S3 is executed when the PAC [206] makes a copy of the backup files,
compress them, and move them to the backup server.
27
- Step S4 is about the PAC [206] notifying the NMS [210] whether the backup
operation is performed successfully or if it is failed. In case of the latter, the
PAC [206] notifies the failure with the cause.
- Step S5 requires the NMS [210] to store backup success/failure status and
5 time when backup operation was performed.
[0079] Referring to FIG. 6, an exemplary method flow [600] indicating the process
for applying a restore operation, in accordance with exemplary implementations of
the present disclosure is shown. In an implementation the method [600] is
10 performed by the system [200] (as shown in FIG. 2). This is performed in the
following steps when a restore operation is initiated on demand from a network management system (NMS) [210] (as shown in FIG. 2) by a user via a user interface (UI):
- Step S1 is where the user selects a successful backup from the backup
15 history which it wants to restore.
- Thereafter, the restore operation gets initiated, all the server credentials and
information about backup file path which is to be restored are sent to a
physical agent component (PAC) [206] (as shown in FIG. 2) via the NMS
[210] by executing Step S2.
20 - Step S3 is executed when the PAC [206] fetches/downloads the backup files
from the backup server and unarchive those files. Thereafter, the PAC [206] runs a restore script.
- Step S4 involves the PAC [206] notifying the NMS [210] whether the
restore operation is completed successfully or if it is failed. In case of the
25 latter, it notifies the failure of the restore operation with the cause.
- Step S5 is executed when the NMS [210] stores the restore success/failure
status and time when restore operation was performed.
[0080] The present disclosure further discloses a non-transitory computer-readable
30 storage medium storing instructions for performing a backup and a restoration of
28
an application, the storage medium comprising executable code which, when
executed by one or more units of a system, causes: a processing unit [202] of the
system [200] to install an application and a physical agent component (PAC) [206]
of the application; the application to share a set of details of the PAC [206] with the
5 network management system (NMS) [210]. The executable code which, when
executed, cause the NMS [210] of the system [200] to initialize, via a health check unit [208], a health check procedure upon receiving a ping request from the PAC [206]; the PAC [206] of the system [200] to calculate one or more resource parameters in a set of resource parameters associated with the application; the NMS
10 [210] to notify to the PAC [206], about a set of threshold values based on the set of
resource parameters stored in a database at a storage unit [204], wherein one threshold value is associated with one resource parameter; the PAC [206] to send an alarm to the NMS [210] in an event of a breach of a threshold value in the set of threshold values of the one or more resource parameters; and the back-up and
15 restoration unit [212] of the system [200] to perform one of a backup operation and
a restore operation of the application based on a user input and the alarm.
[0081] Further, in accordance with the present disclosure, it is to be acknowledged that the functionality described for the various the components/units can be
20 implemented interchangeably. While specific embodiments may disclose a
particular functionality of these units for clarity, it is recognized that various configurations and combinations thereof are within the scope of the disclosure. The functionality of specific units as disclosed in the disclosure should not be construed as limiting the scope of the present disclosure. Consequently, alternative
25 arrangements and substitutions of units, provided they achieve the intended
functionality described herein, are considered to be encompassed within the scope of the present disclosure.
[0082] As is evident from the above, the present disclosure provides a technically
30 advanced solution for application backup and restoration. The solution of the
29
present invention provides for performing automatic backup based on a defined
policy. Further, the solution of the present invention provides for maintaining a
backup history for each backup. Further, the solution of the present invention
provides for monitoring of internal components status of the network function
5 before performing backup and/or restoration of application files. Further, the
solution of the present invention provides alarm management, i.e., raising and/or clearing alarms in case of threshold breach.
[0083] While considerable emphasis has been placed herein on the disclosed
10 implementations, it will be appreciated that many implementations can be made and
that many changes can be made to the implementations without departing from the
principles of the present disclosure. These and other changes in the implementations
of the present disclosure will be apparent to those skilled in the art, whereby it is to
be understood that the foregoing descriptive matter to be implemented is illustrative
15 and non-limiting.
30
We Claim:
1. A method [300] for performing a backup and a restoration of an application, the
method [300] comprising:
installing, by a processing unit [202], the application and a physical agent component (PAC) [206] of the application;
sharing, by the application, a set of details of the physical agent component [206], with a network management system (NMS) [210];
initialising, by the NMS [210] via a health check unit [208], a health check procedure upon receiving a ping request from the PAC [206];
calculating, by the PAC [206], one or more resource parameters in a set of resource parameters associated with the application;
notifying, by the NMS [210] to the PAC [206], about a set of threshold values of the set of resource parameters stored in a database at a storage unit [204], wherein one threshold value is associated with one resource parameter;
sending, by the PAC [206], an alarm to the NMS [210] in an event of a breach of a threshold value in the set of threshold values of the one or more resource parameters; and
performing, by a back-up and restoration unit [212], one of a backup operation and a restore operation of the application based on at least one of: a user input and the alarm.
2. The method [300] as claimed in claim 1, wherein the backup operation
comprises:
creating, by the back-up and restoration unit [212], a profile of the application, the profile comprising at least one of: one or more file names, one or more folder names, and a path associated with each of the folder name from the one or more folder names for which the backup operation is to be performed;
sending, by the back-up and restoration unit [212] to the PAC [206], an application server credentials, a backup server credentials, and the profile;
creating, by the back-up and restoration unit [212], one or more backup files of one or more files associated with the one or more file names and one or more folders associated with the one or more folder names; and
moving, by the back-up and restoration unit [212], the one or more backup files to a backup server.
3. The method [300] as claimed in claim 2, the method [300] further comprising:
notifying, by the PAC [206] to the NMS [210], a status of the backup operation based on one of a successful completion of backup operation and an unsuccessful completion of backup operation, wherein the successful completion of the backup operation is when the one or more backup files are moved successfully to the backup server, and wherein the unsuccessful completion of the backup operation is when moving of the one or more backup files to the backup server fails;
sharing, by the PAC [206], a reason for unsuccessful completion of the backup operation in an event of the unsuccessful completion of the backup operation with the NMS [210]; and
storing, by the backup and restoration unit [212], at the storage unit [204], the status of the backup operation, and time of completion of the backup operation in an event of the successful completion of backup operation.
4. The method [300] as claimed in claim 2, wherein prior to the moving, by the
back-up and restoration unit [212], the one or more backup files to the backup
server, the method [300] comprises:
compressing, by the back-up and restoration unit [212], the one or more backup files.
5. The method [300] as claimed in claim 2, wherein the restore operation
comprises:
receiving, by the back-up and restoration unit [212], a selection of a backup file from the one or more backup files stored in the backup server;
sending, by the NMS [210] to the PAC [206], the application server credentials, a backup server credentials, and a path associated with the backup file;
fetching, by the PAC [206], the backup file from the backup server;
unarchiving, by the back-up and restoration unit [212], the backup file; and
running, by the back-up and restoration unit [212], a restore script.
6. The method [300] as claimed in claim 5, the method [300] further comprising:
notifying, by the PAC [206] to the NMS [210], a status of the restore operation from one of a successful completion of restore operation in an event of the successful completion of restore operation, and an unsuccessful completion of restore operation with a reason for unsuccessful completion of restore operation in an event of the unsuccessful completion of restore operation; and
storing, by the NMS [210], at the storage unit [204], the status of the restore operation, and time of completion of the restore operation in an event of the successful completion of restore operation.
7. The method [300] as claimed in claim 1, wherein the set of resource parameters comprises a central processing unit (CPU) usage parameter, a memory status parameter, and a hard disc drive (HDD) memory parameter.
8. A system [200] for performing a backup and a restoration of an application, the system [200] comprising:
a processing unit [202];
a physical agent component (PAC) [206] connected at least to the processing unit [202];
a network management system [210] connected at least to the processing unit [202], the network management system [210] further comprising a health check unit [208];
a backup and restoration unit [212] connected at least to the network management system [210]; and
a storage unit [204] connected at least to the back-up and restoration unit [212];
the processing unit [202] configured to install the application and the physical agent component [206] of the application;
the application configured to share, a set of details of the physical agent component [206] with the network management system (NMS) [210];
the NMS [210] configured to initialise, via the health check unit [208], a health check procedure upon receiving a ping request from the PAC [206];
the PAC [206] further configured to calculate one or more resource parameters in a set of resource parameters associated with the application;
the NMS [210] further configured to notify to the PAC [206], about a set of threshold values based on the set of resource parameters stored in a database at a storage unit [204], wherein one threshold value is associated with to one resource parameter;
the PAC [206] further configured to send an alarm to the NMS [210] in an event of a breach of a threshold value in the set of threshold values of the one or more resource parameters; and
the back-up and restoration unit [212] configured to perform one of a backup operation and a restore operation of the application based on a user input and the alarm.
9. The system [200] as claimed in claim 8, wherein for performing the backup operation, the back-up and restoration unit [212] is configured to:
create a profile of the application, the profile comprising one or more file names, one or more folder names, and a path associated with each of the folder name from the one or more folder names for which the backup operation is to be performed;
send to the PAC [206], an application server credentials, a backup server credentials, and the profile;
create one or more backup files of one or more files associated with the one or more file names and one or more folders associated with the one or more folder names; and
move the one or more backup files to a backup server.
10. The system [200] as claimed in claim 9, wherein the PAC [206] is further
configured to:
notify to the NMS [210], a status of the backup operation based on one of: a successful completion of backup operation and an unsuccessful completion of backup operation, wherein the successful completion of backup operation is when the one or more backup files are moved successfully to the backup server, and wherein the unsuccessful completion of the backup operation is when moving of the one or more backup files to the backup server fails; and
share, a reason for unsuccessful completion of backup operation in an event of the unsuccessful completion of the backup operation with the NMS [210].
11. The system [200] as claimed in claim 10, wherein the backup and restoration unit [212] is further configured to: store, at the storage unit [204], the status of the backup operation, and time of completion of the backup operation in an event of the successful completion of backup operation.
12. The system [200] as claimed in claim 9, wherein the back-up and restoration unit [212], prior to moving the one or more backup files to the backup server, is configured to:
- compress the one or more backup files.
13. The system [200] as claimed in claim 9, wherein for performing the restore
operation, the back-up and restoration unit [212] is configured to:
- receive a selection of a backup file from the one or more backup files
stored in the backup server.
14. The system [200] as claimed in claim 13, wherein for further performing the
restore operation, the PAC [206] is configured to:
- receive the application server credentials, the backup server credentials, and a path associated with the backup file; and
- fetch the backup file from the backup server.
15. The system [200] as claimed in claim 14, wherein for further performing the
restore operation, the back-up and restoration unit [212] is further configured
to:
- unarchive the backup file; and
- run a restore script.
16. The system [200] as claimed in claim 8, wherein the PAC [206] is further
configured to:
- notify, to the NMS [210], a status of the restore operation from one of:
a successful completion of restore operation in an event of the successful
completion of restore operation, and an unsuccessful completion of
restore operation with a reason for unsuccessful completion of restore
operation in an event of the unsuccessful completion of restore
operation.
17. The system [200] as claimed in claim 16, wherein the NMS [210] is further
configured to:
- store, at the storage unit [204], the status of the restore operation, and time of completion of the restore operation in an event of the successful completion of restore operation.
18. The system [200] as claimed in claim 8, wherein the set of resource parameters comprise a central processing unit (CPU) usage parameter, a memory status parameter, and a hard disc drive (HDD) memory parameter.
| # | Name | Date |
|---|---|---|
| 1 | 202321047030-STATEMENT OF UNDERTAKING (FORM 3) [12-07-2023(online)].pdf | 2023-07-12 |
| 2 | 202321047030-PROVISIONAL SPECIFICATION [12-07-2023(online)].pdf | 2023-07-12 |
| 3 | 202321047030-FORM 1 [12-07-2023(online)].pdf | 2023-07-12 |
| 4 | 202321047030-FIGURE OF ABSTRACT [12-07-2023(online)].pdf | 2023-07-12 |
| 5 | 202321047030-DRAWINGS [12-07-2023(online)].pdf | 2023-07-12 |
| 6 | 202321047030-FORM-26 [19-09-2023(online)].pdf | 2023-09-19 |
| 7 | 202321047030-Proof of Right [06-10-2023(online)].pdf | 2023-10-06 |
| 8 | 202321047030-ORIGINAL UR 6(1A) FORM 1 & 26)-231023.pdf | 2023-11-06 |
| 9 | 202321047030-ENDORSEMENT BY INVENTORS [10-07-2024(online)].pdf | 2024-07-10 |
| 10 | 202321047030-DRAWING [10-07-2024(online)].pdf | 2024-07-10 |
| 11 | 202321047030-CORRESPONDENCE-OTHERS [10-07-2024(online)].pdf | 2024-07-10 |
| 12 | 202321047030-COMPLETE SPECIFICATION [10-07-2024(online)].pdf | 2024-07-10 |
| 13 | 202321047030-FORM 3 [01-08-2024(online)].pdf | 2024-08-01 |
| 14 | Abstract-1.jpg | 2024-08-13 |
| 15 | 202321047030-Request Letter-Correspondence [14-08-2024(online)].pdf | 2024-08-14 |
| 16 | 202321047030-Power of Attorney [14-08-2024(online)].pdf | 2024-08-14 |
| 17 | 202321047030-Form 1 (Submitted on date of filing) [14-08-2024(online)].pdf | 2024-08-14 |
| 18 | 202321047030-Covering Letter [14-08-2024(online)].pdf | 2024-08-14 |
| 19 | 202321047030-CERTIFIED COPIES TRANSMISSION TO IB [14-08-2024(online)].pdf | 2024-08-14 |