Sign In to Follow Application
View All Documents & Correspondence

System And Method For Managing Data Storage In A Communication Network

Abstract: ABSTRACT SYSTEM AND METHOD FOR MANAGING DATA STORAGE IN A COMMUNICATION NETWORK The present invention relates to a system (120) and a method (400) for managing data storage in a communication network (105) is disclosed. The system (120) includes a receiving unit (220) configured to enable a first component (310) of a probing agent (225) to receive data from a plurality of network elements (125). The system (120) includes a transmitting unit (235) to transmit the data from the first component (310) to the second component (315) via the established connection. The system includes a detection unit (240) to detect a failure in the established connection between the first component (310) and the second component (315). The system (120) includes the transmitting unit (235) configured to transmit in real time, the stored data from the database (250) to the second component (315) subsequent to rectifying the failure in the established connection between the first component (310) and the second component (315). Ref. Fig. 2

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
12 July 2023
Publication Number
03/2025
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

JIO PLATFORMS LIMITED
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India

Inventors

1. Aayush Bhatnagar
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
2. Ankit Murarka
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
3. Chandra kumar Ganveer
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
4. Mohit Bhanwria
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
5. Vinay Gayki
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
6. Meenakshi Shobharam
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
7. Durgesh Kumar
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
8. Zenith
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
9. Shashank Bhushan
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
10. Aniket Anil Khade
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
11. Avinash Kushwaha
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
12. Dharmendra Kumar Vishwakarma
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
13. Sajal Soni
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
14. Sanjana Chaudhary
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
15. Yogesh Kumar
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
16. Supriya De
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
17. Kumar Debashish
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
18. Tilala Mehul
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India
19. Kothagundla Vinay Kumar
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India

Specification

DESC:
FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENTS RULES, 2003

COMPLETE SPECIFICATION
(See section 10 and rule 13)
1. TITLE OF THE INVENTION
SYSTEM AND METHOD FOR MANAGING DATA STORAGE IN A COMMUNICATION NETWORK
2. APPLICANT(S)
NAME NATIONALITY ADDRESS
JIO PLATFORMS LIMITED INDIAN OFFICE-101, SAFFRON, NR. CENTRE POINT, PANCHWATI 5 RASTA, AMBAWADI, AHMEDABAD 380006, GUJARAT, INDIA
3.PREAMBLE TO THE DESCRIPTION

THE FOLLOWING SPECIFICATION PARTICULARLY DESCRIBES THE NATURE OF THIS INVENTION AND THE MANNER IN WHICH IT IS TO BE PERFORMED.

The present application takes priority from Indian Provisional Applications Bearing Number 202321047033 filed on 12th July 2023 and 202321047348 filed on 13th July 2023, the disclosure of which is hereby incorporated by reference herein.
FIELD OF THE INVENTION
[0001] The present invention relates to the field of wireless communication systems, more particularly relates to a method and system for managing data storage in the wireless communication network.

BACKGROUND OF THE INVENTION
[0002] In communication networks, Fifth Generation (5G) networks have revolutionized the telecommunications industry by providing higher data rates, lower latency, increased capacity, and improved reliability compared to previous generations. These networks are designed to support a wide range of applications and services, including enhanced mobile broadband, massive machine-type communications, and ultra-reliable low-latency communications.
[0003] The 3rd Generation Partnership Project (3GPP) is an organization that develops technical specifications and standards for mobile communications, including 5G networks. These standards define various protocols, interfaces, and procedures to ensure interoperability and compatibility among different network elements and equipment.
[0004] In the 5G network, probes play a crucial role in monitoring, debugging, and troubleshooting. Probes are network elements responsible for collecting and analyzing network data, such as signalling and traffic information, to ensure optimal network performance. They provide insights into the behavior of the network elements, identify issues, and assist in resolving them. One example of such probes is XProbe.
[0005] XProbe is an innovative component designed for RAN (Radio Access Network) level debugging and troubleshooting in 5G networks. It serves as a probe within the network architecture and focuses on capturing and transmitting NRSL (New Radio Signaling Layer) data. NRSL data contains essential information about the signaling messages exchanged between the gNBs (gNodeBs) and other network elements.
[0006] In the context of the present invention, the user of 5G network who is facing no calling service or network related issues, usually raise a complaint to the customer care. The customer care executives access the data to trouble shoot the problem. During the troubleshooting process, it is crucial to ensure that no data loss occurs. The NRSL data captured by the probes contains valuable insights that can aid in identifying and resolving network issues. Losing this data may result in incomplete analysis, prolonged debugging time, and increased network downtime.
[0007] Efficient and reliable access to NRSL data is paramount for successful troubleshooting and debugging in a 5G network. The data should be seamlessly transmitted from the gNBs to the system responsible for analysis and processing. Any interruptions or failures in the data transfer process can hinder the effective resolution of network issues.
[0008] Existing solutions in the field of network debugging and troubleshooting often encounter challenges when it comes to maintaining a zero data loss mechanism. These solutions may suffer from issues such as data loss during system failures, network connectivity disruptions, or message broker unavailability. In such cases, manual intervention and re-pushing of NRSL data are often required, leading to delays in problem resolution and potential data inconsistencies.
[0009] Thus, there is a need for an improved approach that ensures uninterrupted and reliable data transfer, even in the face of system failures, network disruptions, or message broker unavailability. The invention addresses this need by introducing a novel solution that automatically detects failures, stores data in a resilient manner, and resumes data transfer when the system is back online, thus maintaining a policy of zero data loss and high availability.
SUMMARY OF THE INVENTION
[0010] One or more embodiments of the present disclosure provide a method and system for managing data storage in a communication network.
[0011] In one aspect of the present invention, a method for managing data storage in a communication network is disclosed. The method includes the step of enabling, by one or more processors, a first component of a probing agent to receive data from a plurality of network elements. The probing agent includes at least the first component and a second component. The method includes the step of establishing, by the one or more processors, a connection between the first component and the second component. The method includes the step of transmitting, by the one or more processors, the data from the first component to the second component via the established connection. The method includes the step of in response to detecting, by the one or more processors, a failure in the established connection between the first component and the second component while transmitting the data therebetween, storing, by the one or more processors, the data in a database. The method includes the step of transmitting, by the one or more processors, in real time, the stored data from the database to the second component subsequent to rectifying the failure in the established connection between the first component and the second component.
[0012] In one embodiment, the plurality of network elements is at least one of, a base station or eNodeB (eNB), and one or more Network Functions (NFs).
[0013] In another embodiment, the data received at the first component of the probing agent pertains to at least one of, New Radio Signaling Layer (NRSL) Radio Access Network (RAN) data and Service Data Request (SDR) data.
[0014] In yet another embodiment, the first component of the probing agent receives the data from the plurality of network elements via at least one protocol, wherein the protocol includes at least one of, a Hypertext Transfer Protocol version 2 (HTTP2) protocol and a Transmission Control Protocol (TCP).
[0015] In yet another embodiment, the second component of the probing agent is at least one of, a conductor component and a message broker.
[0016] In yet another embodiment, the second component of the probing agent is configured to perform multiple tasks including at least one of, parsing, decoding, analysis, troubleshooting, and additional processing of the data.
[0017] In yet another embodiment, the segregated NRSL data received at the first component is transmitted to a message broker. The message broker acts as an intermediary component between the first component and the second component to transmit the segregated NRSL data.
[0018] In yet another embodiment, the step of enabling, by one or more processors, a first component of the probing agent to receive data from the plurality of network elements, includes the step of segregating, by the one or more processors, the received data from the plurality of network elements based on a respective version of the first component.
[0019] In yet another embodiment, in response to detecting, by the one or more processors, the failure in the established connection between the first component and the second component while transmitting the data therebetween, the one or more processors, stores the data in the database utilizing an Artificial Intelligence/Machine Learning (AI/ML) model.
[0020] In yet another embodiment, the database stores the data in at least one of, an Application Data Records (ADR) utilizing the AI/ML model in case of failure in the established connection between the first component and the second component.
[0021] In yet another embodiment, the failure in the established connection between the first component and the second component is detected by the one or more processors based on continuously monitoring the established connection between the first component and the second component.
[0022] In yet another embodiment, the step of, transmitting, by the one or more processors, in real time, the stored data from the database to the second component subsequent to rectifying the failed connection between the first component and the second component, includes the step of fetching, by the one or more processors, the data from the database utilizing the AI/ML model, and transmitting, by the one or more processors, the fetched data to the second component of the probing agent subsequent to rectifying the failure in the established connection between the first component and the second component.
[0023] In another aspect of the present invention, a system for managing data storage in a communication network is disclosed. The system includes a receiving unit configured to enable a first component of a probing agent to receive data from a plurality of network elements. The probing agent includes at least of, the first component and a second component. The system includes an establishment unit configured to establish a connection between the first component and the second component. The system includes a transmitting unit configured to transmit the data from the first component to the second component via the established connection. The system includes in response to detecting, by a detection unit, a failure in the established connection between the first component and the second component while transmitting the data therebetween, a storage unit configured to, store, the data in a database. The system includes the transmitting unit configured to transmit in real time, the stored data from the database to the second component subsequent to rectifying the failure in the established connection between the first component and the second component.
[0024] In yet another aspect of the present invention, a non-transitory computer-readable medium having stored thereon computer-readable instructions that, when executed by a processor is disclosed. The processor is configured to enable a first component of a probing agent to receive data from a plurality of network elements. The probing agent includes at least of, the first component and a second component. The processor is configured to establish a connection between the first component and the second component. The processor is configured to transmit the data from the first component to the second component via the established connection. The processor is configured to in response to detecting, a failure in the established connection between the first component and the second component while transmitting the data therebetween, store, the data in a database. The processor is configured to transmit in real time, the stored data from the database to the second component subsequent to rectifying the failure in the established connection between the first component and the second component.
[0025] Other features and aspects of this invention will be apparent from the following description and the accompanying drawings. The features and advantages described in this summary and in the following detailed description are not all-inclusive, and particularly, many additional features and advantages will be apparent to one of ordinary skill in the relevant art, in view of the drawings, specification, and claims hereof. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes and may not have been selected to delineate or circumscribe the inventive subject matter, resort to the claims being necessary to determine such inventive subject matter.
BRIEF DESCRIPTION OF THE DRAWINGS
[0026] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components, electronic components or circuitry commonly used to implement such components.
[0027] FIG. 1 is an exemplary block diagram of an environment for managing data storage in a communication network, according to one or more embodiments of the present invention;
[0028] FIG. 2 is an exemplary block diagram of a system for managing data storage in the communication network, according to one or more embodiments of the present invention;
[0029] FIG. 3 is an exemplary block diagram of an architecture can be implemented in the system of FIG.2, according to one or more embodiments of the present invention;
[0030] FIG. 4 is a flow diagram illustrating a method for managing data storage in the communication network, according to one or more embodiments of the present disclosure; and
[0031] FIG. 5 is a flow diagram illustrating a method for transmitting stored data from a database to a second component, according to one or more embodiments of the present disclosure.
[0032] The foregoing shall be more apparent from the following detailed description of the invention.
DETAILED DESCRIPTION OF THE INVENTION
[0033] Some embodiments of the present disclosure, illustrating all its features, will now be discussed in detail. It must also be noted that as used herein and in the appended claims, the singular forms "a", "an" and "the" include plural references unless the context clearly dictates otherwise.
[0034] Various modifications to the embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments. However, one of ordinary skill in the art will readily recognize that the present disclosure including the definitions listed here below are not intended to be limited to the embodiments illustrated but is to be accorded the widest scope consistent with the principles and features described herein.
[0035] A person of ordinary skill in the art will readily ascertain that the illustrated steps detailed in the figures and here below are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
[0036] Referring to FIG. 1, FIG. 1 illustrates an exemplary block diagram of an environment 100 for managing data storage in a communication network 105, according to one or more embodiments of the present invention. The environment 100 includes the communication network 105, a User Equipment (UE) 110, a server 115, a system 120, and a plurality of Network Elements (NEs) 125. The UE 110 aids a user to interact with the system 120 for managing data storage in the communication network 105. In an embodiment, a user includes a service provider or a network administrator. The plurality of NEs 125 involves multiple interconnected components working together to store, manage, and ensure the integrity and availability of data across the communication network 105. In an embodiment, the plurality of NEs 125 is at least one of, a base station or eNodeB (eNB) 305 (shown in FIG.3), and one or more Network Functions (NFs). The data storage refers to the collection, management, and preservation of digital information that allows it to be retrieved and used efficiently. The data storage involves various methods and technologies to store data in different formats, ensuring its accessibility, security, and integrity over time. For example, the data storage includes, but not limited to, NoSQL Database, Hadoop Distributed File System (HDFS), a distributed storage system and the like.
[0037] For the purpose of description and explanation, the description will be explained with respect to the UE 110, or to be more specific will be explained with respect to a first UE 110a, a second UE 110b, and a third UE 110c, and should nowhere be construed as limiting the scope of the present disclosure. Each of the UE 110 from the first UE 110a, the second UE 110b, and the third UE 110c is configured to connect to the server 115 via the communication network 105.
[0038] In an embodiment, each of the first UE 110a, the second UE 110b, and the third UE 110c is one of, but not limited to, any electrical, electronic, electro-mechanical or an equipment and a combination of one or more of the above devices such as virtual reality (VR) devices, augmented reality (AR) devices, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other computing device.
[0039] The communication network 105 includes, by way of example but not limitation, one or more of a wireless network, a wired network, an internet, an intranet, a public network, a private network, a packet-switched network, a circuit-switched network, an ad hoc network, an infrastructure network, a Public-Switched Telephone Network (PSTN), a cable network, a cellular network, a satellite network, a fiber optic network, or some combination thereof. The communication network 105 may include, but is not limited to, a Third Generation (3G), a Fourth Generation (4G), a Fifth Generation (5G), a Sixth Generation (6G), a New Radio (NR), a Narrow Band Internet of Things (NB-IoT), an Open Radio Access Network (O-RAN), and the like.
[0040] The server 115 may include by way of example but not limitation, one or more of a standalone server, a server blade, a server rack, a bank of servers, a server farm, hardware supporting a part of a cloud service or system, a home server, hardware running a virtualized server, one or more processors executing code to function as a server, one or more machines performing server-side functionality as described herein, at least a portion of any of the above, some combination thereof. In an embodiment, the entity may include, but is not limited to, a vendor, a network operator, a company, an organization, a university, a lab facility, a business enterprise, a defense facility, or any other facility that provides content.
[0041] The environment 100 further includes the system 120 communicably coupled to the server 115 and each of the first UE 110a, the second UE 110b, and the third UE 110c via the communication network 105. The system 120 is configured for managing the data storage in the communication network 105. The system 120 is adapted to be embedded within the server 115 or is embedded as the individual entity, as per multiple embodiments of the present invention.
[0042] Operational and construction features of the system 120 will be explained in detail with respect to the following figures.
[0043] FIG. 2 is an exemplary block diagram of the system 108 for managing the data storage in the communication network 105, according to one or more embodiments of the present invention.
[0044] The system 120 includes a processor 205, a memory 210, a user interface 215, and a database 250. For the purpose of description and explanation, the description will be explained with respect to one or more processors 205, or to be more specific will be explained with respect to the processor 205 and should nowhere be construed as limiting the scope of the present disclosure. The one or more processor 205, hereinafter referred to as the processor 205 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, single board computers, and/or any devices that manipulate signals based on operational instructions.
[0045] As per the illustrated embodiment, the processor 205 is configured to fetch and execute computer-readable instructions stored in the memory 210. The memory 210 may be configured to store one or more computer-readable instructions or routines in a non-transitory computer-readable storage medium, which may be fetched and executed to create or share data packets over a network service. The memory 210 may include any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like.
[0046] The user interface 215 includes a variety of interfaces, for example, interfaces for a Graphical User Interface (GUI), a web user interface, a Command Line Interface (CLI), and the like. The user interface 215 facilitates communication of the system 120. In one embodiment, the user interface 215 provides a communication pathway for one or more components of the system 120. Examples of the one or more components include, but are not limited to, the UE 110, and the database 250.
[0047] The database 250 is configured to store the data from the UE 110. The database 250 is one of, but not limited to, a centralized database, a cloud-based database, a commercial database, an open-source database, a distributed database, an end-user database, a graphical database, a No-Structured Query Language (NoSQL) database, an object-oriented database, a personal database, an in-memory database, a document-based database, a time series database, a wide column database, a key value database, a search database, a cache databases, and so forth. The foregoing examples of database 250 types are non-limiting and may not be mutually exclusive e.g., a database can be both commercial and cloud-based, or both relational and open-source, etc.
[0048] Further, the processor 205, in an embodiment, may be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processor 205. In the examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processor 205 may be processor-executable instructions stored on a non-transitory machine-readable storage medium and the hardware for processor 205 may comprise a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the memory 210 may store instructions that, when executed by the processing resource, implement the processor 205. In such examples, the system 120 may comprise the memory 210 storing the instructions and the processing resource to execute the instructions, or the memory 210 may be separate but accessible to the system 120 and the processing resource. In other examples, the processor 205 may be implemented by electronic circuitry.
[0049] In order for the system 120 to manage data storage in the communication network 105. The processor 205 includes a receiving unit 220, a probing agent 225, an establishment unit 230, a transmitting unit 235, a detection unit 240, and a storage unit 245 communicably coupled to each other. In an embodiment, operations and functionalities of the receiving unit 220, the probing agent 225, the establishment unit 230, the transmitting unit 235, the detection unit 240, and the storage unit 245 can be used in combination or interchangeably.
[0050] The receiving unit 220 is configured to enable a first component 310 (shown in FIG.3) of the probing agent 225 to receive data from the plurality of NEs 125. The probing agent 225 is a component within a network monitoring or management system designed to monitor, capture, and analyze the data from the plurality of NEs 125. The probing agent 225 is configured to collect detailed information about network performance, traffic patterns, and potential issues, facilitating network management, troubleshooting, and optimization. The probing agent 225 includes at least of the first component 310 and a second component 315 (shown in FIG.3). In an embodiment, the plurality of NEs 125 is at least one of, a base station or eNodeB (eNB) 305, and one or more Network Functions (NFs).
[0051] As per one embodiment, the data received at the first component 310 of the probing agent 225 pertains to at least one of, New Radio Signaling Layer (NRSL) Radio Access Network (RAN) data and Service Data Request (SDR) data. The NRSL RAN Data includes all the control and user data exchanged between the UE 110 and the plurality of NEs 125 in a 5G network. The SDR data refers to access, retrieve, or manipulate the data provided by the communication network 105 or the service provider. The first component 310 of the probing agent 225 collects the NRSL RAN data to monitor the performance of the RAN. For instance, the NRSL RAN data can track how well the network handles signaling and handovers, providing insights into potential bottlenecks or areas for improvement. By analyzing the SDR data, the probing agent 225 can ensure that service requests are being processed efficiently and that resources are being allocated properly, which helps in maintaining high service quality and user satisfaction.
[0052] Upon enabling the first component 310 of the probing agent 225 to receive the data from the plurality of NEs 125. The receiving unit 220 is further configured to segregate the received data from the plurality of NEs 125 based on a respective version of the first component 310. The system 120 employs multiple instances of the first component 310 deployed across different network segments, each running a different version or configuration. The instances of the first component 310 collect performance data from the plurality of NEs 125. The processor 205 is configured to analyze the incoming data, segregating the data into streams based on the respective version of the first component 310 associated with each dataset. The segregation process allows the network operators to analyze and compare performance metrics, detect version-specific issues, and optimize network management strategies based on insights from each component version.
[0053] Let’s consider for an example, the data from the plurality of NEs 125 analyzes the performance metrics from version 1.0 to identify any issues or areas for optimization specific to the version. The performance metrics from the version 2.0 are compared to those from the version 1.0 to detect improvements or new issues. The performance metrics from version 3.0 are analyzed and compared to previous versions to ensure continued improvements and identify any new problems. The Version-Specific Issues is configured to detect any performance issues that are specific to a particular version of the first component 310.
[0054] Upon segregating the received data from the plurality of NEs 125, the establishment unit 230 is configured to establish a connection between the first component 310 and the second component 315. The first component 310 of the probing agent 225 receives the data from the plurality of NEs 125 via at least one protocol. In an embodiment, the protocol includes at least one of, a Hypertext Transfer Protocol version 2 (HTTP2) protocol and a Transmission Control Protocol (TCP).
[0055] As per one embodiment, the HTTP2 protocol is designed for better performance and efficiency. The HTTP2 allows for multiplexing multiple requests and responses over a single connection, reducing latency and improving throughput. The TCP protocol of the Internet Protocol Suite provides reliable, ordered, and error-checked delivery of data between applications running on hosts communicating via an IP network. The TCP protocol ensures that the data packets are delivered in the same order.
[0056] Upon establishing the connection between the first component 310 and the second component 315, the transmitting unit 235 is configured to transmit the data from the first component 310 to the second component 315 via the established connection. In one embodiment, the second component 315 of the probing agent 225 is at least one of a conductor component and a message broker. The conductor component coordinates the processing of data received by the first component 310, ensuring that the data is analyzed and stored efficiently. The conductor component also controls activation of different probing functions based on network conditions. The message broker facilitates the exchange of data between the first component 310 and other system components, such as data storage, or external monitoring services. The message broker ensures that the messages are properly routed, formatted, and queued for processing.
[0057] In one embodiment, the second component 315 of the probing agent 225 is configured to perform multiple tasks including at least one of, parsing, decoding, analysis, troubleshooting, and additional processing of the data. Upon transmitting the data, the detection unit 240 is configured to detect a failure in the established connection between the first component 310 and the second component 315. The failure in the established connection between the first component 310 and the second component 315 based on continuously monitoring the established connection between the first component 310 and the second component 315.
[0058] While transmitting the data therebetween, the storage unit 245 is configured to store the data in the database 250 utilizing an Artificial Intelligence/Machine Learning (AI/ML) model. The AI/ML model utilizes an anomaly detection model, Recurrent Neural Networks (RNN), reinforcement learning model, Support Vector Machines (SVM), and clustering model.
[0059] The anomaly detection model is configured to identify anomalies in data transmission that could indicate a connection failure. Let’s consider for an example, the anomaly detection model detects unusual patterns in the data transmission between the first component 310 and the second component 315 to trigger storage of the data in the database 250. The reinforcement learning model learns the optimal actions to take in case of connection failures to minimize data loss. Let’s consider for an example, the reinforcement learning model decides the optimal strategy to store data in the database 250 when the connection failure is detected between the first and second components 310 and 315. The Recurrent Neural Networks (RNN) predicts potential failures in data transmission based on historical data patterns. Let’s consider for an example, the RNN utilizes past transmission data to forecast potential connection failures and preemptively store data in the database 250.
[0060] The Support Vector Machines (SVM) classifies the status of data transmission as either 'normal' or 'failed'. Let’s consider for an example, the SVM performs real-time classification of transmission status to determine when to store the data in the database 250. The clustering model includes K-Means Clustering. The K-Means Clustering groups similar transmission events to identify patterns that precede failures. Let’s consider for an example, the K-means clustering groups the transmission data to understand and predict failure scenarios such as the connection failure, ensuring timely data storage.
[0061] The database 250 is configured to store the data in at least one of, an Application Data Records (ADRs) utilizing the AI/ML model in case of failure in the established connection between the first component 310 and the second component 315. The ADRs are structured records containing application-specific data. In an embodiment, the ADRs include logs, transaction details, user interactions, or any other relevant information generated by the application.
[0062] Further, the AI/ML model is configured to analyze, process, or make predictions based on the ADRs. The AI/ML model involves anomaly detection, predictive maintenance, or other intelligent data processing tasks. In the event of the failure in the established connection between the first component 310, and the second component 315, the anomaly detection model is configured to identify anomalies in data transmission during the connection failure. Let’s consider for an example, the anomaly detection model detects unusual patterns in the data transmission between the first component 310 and the second component 315 to trigger storage of the data in the database 250. The RNN model utilizes the past transmission data to forecast potential connection failures and preemptively store the data in the database 250, which ensures that the stored data is still processed appropriately, possibly by adjusting to the failure scenario and continuing operations with the available data.
[0063] The transmitting unit 235 is configured to transmit the stored data from the database 250 to the second component 315 in real time by the transmitting unit 235 subsequent to rectifying the failure in the established connection between the first component 310 and the second component 315. The probing agent 225 in the network monitoring system is designed to capture and analyze the network performance data. Let us consider for an example, due to a network glitch, the connection between the first component 310 and the second component 315 was temporarily disrupted, causing the connection failure in data transmission. The processor 205 is configured to detect and rectify the connection failure. Once the connection is restored and confirmed stable, the processor 205 initiates the transmission of stored data from the database 250. The data, which includes recent network performance metrics and status updates, is transmitted in real-time to the second component 315. The second component 315 is configured to receive the up-to-date data promptly after the connection issue is resolved.
[0064] By doing so, the system 120 utilizes the ADRs for preserving the data during failures. The system 120 implementing the steps involved in data reception, segregation, transmission, processing, and any scenarios data is not lost. The processor 205 is highly available at all times irrespective of the server failure scenarios, network failure scenarios, and automatically pauses and resumes the data in case of failure, thus improving processing speed of the processor 205, and reducing space requirement of the memory 210.
[0065] The stored data is fetched from the database 250 utilizing the AI/ML model. The AI/ML model can suggest optimized queries based on past retrieval patterns or data usage trends. The AI/ML model can preprocess the fetched data to enhance its relevance or structure before presenting it to the users or downstream systems. By leveraging machine learning, the system 120 optimizes execution of request to quickly retrieve relevant data, improving the accuracy of the data. Upon fetching, the transmitting unit 235 is configured to transmit the fetched data to the second component 315 of the probing agent 225 subsequent to rectifying the failure in the established connection between the first component 310 and the second component 315.
[0066] FIG. 3 illustrates an exemplary block diagram of an architecture 300 that can be implemented in the system of FIG.2, according to one or more embodiments of the present invention. More specifically, FIG. 3 illustrates the system 120 configured for managing the data storage in the communication network 105.
[0067] The architecture 300 can be implemented in the system 120 for effective transmission of NRSL (New Radio Signaling Layer) data from the eNBs 305a-c to the first component 310 and the second component 315, in accordance with the present embodiment. The architecture 300 of the system 120 mainly includes, but may not be limited to, eNBs 305a-c, the first component 310, the second component 315, and the database 250.
[0068] In one implementation, the eNBs 305a-c represent the base stations in the 5G network. The base stations generate the data that contains essential information about the signaling messages exchanged within the communication network 105. The eNBs 305a-c are implemented using various hardware and software configurations, complying with the 3GPP (3rd Generation Partnership Project) standards for the 5G networks.
[0069] According to the present embodiment, the probing agent 225 includes the first component 310 and the second component 315. The probing agent 225 is configured to act as a probe within the network architecture, designed for RAN (Radio Access Network) level debugging and troubleshooting. The probing agent 225 is configured to facilitate the reception and segregation of the data from the eNBs 305a-c. The implementation of the probing agent 225 involves a software module running on a dedicated server or virtual machine, equipped with the necessary network interfaces and processing capabilities.
[0070] To establish connectivity with the eNBs 305a-c, the probing agent 225 utilizes the TCP protocol. The TCP protocol ensures a reliable, connection-oriented communication channel between the probing agent 225 and the eNBs 305a-c, allowing for the accurate reception of the data. The implementation of TCP involves network socket programming, adhering to the TCP/IP protocol stack.
[0071] In an embodiment, the probing agent 225 is implemented using a scalable and distributed architecture, where the multiple probing agent instances are deployed across different locations within the communication network 105. The implementation enables load balancing and fault tolerance, ensuring uninterrupted data reception even in the presence of component failures or network congestion.
[0072] In accordance with the present embodiment, the first component 310 is connected to the second component 315. The second component 315 can be various components of the probing agent 225. The second component 315 of the probing agent 225 is at least one of, the conductor component and the message broker.
[0073] The message broker component serves as an intermediary for transmitting the data from the probing agent 225 to other system components responsible for analysis and processing. The implementation of the message broker can utilize messaging frameworks such as Apache Kafka, RabbitMQ, or similar technologies. The messaging frameworks provide efficient and reliable message queuing mechanisms, ensuring the seamless delivery of the data to subsequent components. The messaging frameworks are designed to facilitate the exchange of messages between different components within the system 120, which provides a way for applications to communicate with each other asynchronously, ensuring that the messages are delivered reliably and efficiently.
[0074] In an embodiment, the message broker may be deployed in a distributed manner, enabling high availability and fault tolerance. The implementation ensures continuous data flow and minimizes disruptions in scenarios where the individual message broker instance experience failures or maintenance activities.
[0075] The conductor component receives the data from the probing agent 225 via the message broker. The primary function of the conductor component is to process the received data for analysis, troubleshooting, and other relevant operations. The conductor component can be implemented as a software module, running on a dedicated server or virtual machine with sufficient processing and storage capabilities.
[0076] In an embodiment, the conductor component employs parsing and decoding algorithms to extract meaningful information from the data. The conductor component utilizes libraries and frameworks tailored for efficient data processing, such as JSON parsers or protocol-specific decoding libraries. The extracted data can be stored in the database 250, such as a relational or NoSQL database, for further analysis and querying.
[0077] In cases where failures or connectivity loss occur between the system components, the Application Data Records (ADR) is implemented to ensure the retention of the data. The ADRs are structured records containing application-specific data. In an embodiment, the ADRs include logs, transaction details, user interactions, or any other relevant information generated by the application. When the connectivity is disrupted, the probing agent 225 starts storing the data in the ADRs, which are temporary files stored in the database 250. The ADRs act as a buffer for preserving the data until connectivity is restored.
[0078] The implementation of ADRs involves file management techniques, such as creating and managing files in a designated directory within the database 250. The ADRs can be structured based on timestamp, unique identifiers, or other metadata to facilitate efficient retrieval and processing.
[0079] Once connectivity is reestablished, the second component 315 retrieves the data from the ADRs and resumes the transmission to the message broker for further processing. The implementation ensures the continuity of data flow, minimizing any potential data loss or disruptions in the troubleshooting process.
[0080] In various embodiments, the architecture 300 of the system 120 includes additional components or variations in the implementation details. For example, the architecture 300 of the system 120 can incorporate the AI/ML model to enhance data analysis and troubleshooting capabilities. Different network protocols or messaging frameworks can be employed, depending on the specific requirements and configurations of the network environment.
[0081] FIG. 4 is a flow diagram illustrating a method 400 for managing data storage in the communication network 105, according to one or more embodiments of the present disclosure. For the purpose of description, the method 400 is described with the embodiments as illustrated in FIG. 2 and should nowhere be construed as limiting the scope of the present disclosure.
[0082] At step 405, the method 400 includes the step of enabling the first component 310 of the probing agent 225 to receive data from the plurality of NEs 125 by the receiving unit 220. The probing agent 225 includes at least of the first component 310 and the second component 315. In an embodiment, the plurality of NEs 125 is at least one of, a base station or eNodeB (eNB) 305, and one or more Network Functions (NFs). The data received at the first component 310 of the probing agent 225 pertains to at least one of, New Radio Signaling Layer (NRSL) Radio Access Network (RAN) data and Service Data Request (SDR) data.
[0083] At step 410, the method 400 includes the step of establishing the connection between the first component 310 and the second component 315 by the establishment unit 230 based on segregating the received data from the plurality of NEs 125. The first component 310 of the probing agent 225 receives the data from the plurality of NEs 125 via at least one protocol. In an embodiment, the protocol includes at least one of, a Hypertext Transfer Protocol version 2 (HTTP2) protocol and a Transmission Control Protocol (TCP).
[0084] At step 415, the method 400 includes the step of transmitting the data from the first component 310 to the second component 315 via the established connection by the transmitting unit 235 based on establishing the connection between the first component 310 and the second component 315. In one embodiment, the second component 315 of the probing agent 225 is at least one of the conductor component and the message broker.
[0085] At step 420, the method 400 includes the step of detecting the failure in the established connection between the first component 310 and the second component 315 by the detection unit 240. The failure in the established connection between the first component 310 and the second component 315 based on continuously monitoring the established connection between the first component 310 and the second component 315.
[0086] While transmitting the data therebetween, the storage unit 245 is configured to store the data in the database 250 utilizing an Artificial Intelligence/Machine Learning (AI/ML) model. The database 250 is configured to store the data in at least one of, an Application Data Records (ADRs) utilizing the AI/ML model in case of failure in the established connection between the first component 310 and the second component 315.
[0087] At step 425, the method 400 includes the step of transmitting the stored data from the database 250 to the second component 315 in real time subsequent to rectifying the failure in the established connection between the first component 310 and the second component 315.
[0088] FIG. 5 is a flow diagram illustrating a method 500 for transmitting stored data from the database 250 to the second component 315, according to one or more embodiments of the present disclosure.
[0089] At step 505, the method 500 includes the step of fetching the stored data from the database 250 utilizing the AI/ML model. The AI/ML model is configured to analyze, process, or make predictions based on the ADRs. The AI/ML model involves anomaly detection, predictive maintenance, or other intelligent data processing tasks.
[0090] At step 510, the method 500 includes the step of transmitting the fetched data to the second component 315 of the probing agent 225 by the transmitting unit 235 subsequent to rectifying the failure in the established connection between the first component 310 and the second component 315.
[0091] By doing so, the method 500 utilizes the ADRs for preserving the data during failures. The method 500 implementing the steps involved in data reception, segregation, transmission, processing, and any scenarios data is not lost. The processor 205 is highly available at all times irrespective of the server failure scenarios, network failure scenarios, and automatically pauses and resumes the data in case of failure, thus improving processing speed of the processor 205, and reducing space requirement of the memory 210.
[0092] The present invention further discloses a non-transitory computer-readable medium having stored thereon computer-readable instructions. The computer-readable instructions are executed by the processor 205 is disclosed. The processor 205 is configured to enable a first component 310 of a probing agent 225 to receive data from a plurality of network elements 125. The probing agent 225 includes at least of, the first component 310 and a second component 315. The processor 205 is configured to establish a connection between the first component 310 and the second component 315. The processor 205 is configured to transmit the data from the first component 310 to the second component 315 via the established connection. The processor 205 is configured to in response to detect a failure in the established connection between the first component 310 and the second component 315 while transmitting the data therebetween, store, the data in a database 250. The processor 205 is configured to transmit in real time, the stored data from the database 250 to the second component 315 subsequent to rectifying the failure in the established connection between the first component 310 and the second component 315.
[0093] A person of ordinary skill in the art will readily ascertain that the illustrated embodiments and steps in description and drawings (FIG.1-5) are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
[0094] The present disclosure provides technical advancement for preserving the data during failures by utilizing the ADRs. The present disclosure implementing the steps involved in data reception, segregation, transmission, processing, and any scenarios data is not lost. The processor 205 is highly available at all times irrespective of the server failure scenarios, network failure scenarios, and automatically pauses and resumes the data in case of failure, thus improving processing speed of the processor 205, and reducing space requirement of the memory 210.
[0095] The present invention offers multiple advantages over the prior art and the above listed are a few examples to emphasize on some of the advantageous features. The listed advantages are to be read in a non-limiting manner.

REFERENCE NUMERALS

[0096] Environment - 100;
[0097] Communication Network-105;
[0098] User equipment- 110;
[0099] Server - 115;
[00100] System -120;
[00101] Processor - 205;
[00102] Memory - 210;
[00103] User interface-215;
[00104] Receiving unit – 220;
[00105] Probing agent– 225;
[00106] Establishment unit – 230;
[00107] Transmitting unit– 235;
[00108] Detection unit-240;
[00109] Storage unit-245;
[00110] Database- 250;
[00111] eNBs- 305a-305c;
[00112] First component-310;
[00113] Second component-315.

,CLAIMS:CLAIMS
We Claim:
1. A method (400) for managing data storage in a communication network (105), the method (400) comprises the steps of:
enabling (405), by one or more processors (205), a first component (310) of a probing agent (225) to receive data from a plurality of network elements (125), wherein the probing agent (225) includes at least of, the first component (310) and a second component (315);
establishing (410), by the one or more processors (205), a connection between the first component (310) and the second component (315);
transmitting (415), by the one or more processors (205), the data from the first component (310) to the second component (315) via the established connection;
in response to detecting (420), by the one or more processors (205), a failure in the established connection between the first component (310) and the second component (315) while transmitting the data therebetween, storing, by the one or more processors (205), the data in a database (250); and
transmitting (425), by the one or more processors (205), in real time, the stored data from the database (250) to the second component (315) subsequent to rectifying the failure in the established connection between the first component (310) and the second component (315).

2. The method (400) as claimed in claim 1, wherein the plurality of network elements (125) is at least one of, a base station or eNodeB (eNB) (305a-305c), and one or more Network Functions (NFs).

3. The method (400) as claimed in claim 1, wherein the data received at the first component (310) of the probing agent (225) pertains to at least one of, New Radio Signalling Layer (NRSL) Radio Access Network (RAN) data and Service Data Request (SDR) data.

4. The method (400) as claimed in claim 1, wherein the first component (310) of the probing agent (225) receives the data from the plurality of network elements (125) via at least one protocol, wherein the protocol includes at least one of, a Hypertext Transfer Protocol version 2 (HTTP2) protocol and a Transmission Control Protocol (TCP).

5. The method (400) as claimed in claim 1, wherein the second component (315) of the probing agent (225) is at least one of, a conductor component and a message broker.

6. The method (400) as claimed in claim 1, wherein the second component (315) of the probing agent (225) is configured to perform multiple tasks including at least one of, parsing, decoding, analysis, troubleshooting, and additional processing of the data.

7. The method (400) as claimed in claim 1, wherein the step of enabling (405), by the one or more processors (205), the first component (310) of the probing agent (225) to receive data from the plurality of network elements (125), includes the step of:
segregating, by the one or more processors (205), the received data from the plurality of network elements (125) based on a respective version of the first component (310).

8. The method (400) as claimed in claim 1, wherein in response to detecting, by the one or more processors (205), the failure in the established connection between the first component (310) and the second component (315) while transmitting the data therebetween, the one or more processors (205), stores the data in the database (250) utilizing an Artificial Intelligence/Machine Learning (AI/ML) model.

9. The method (400) as claimed in claim 8, wherein the database (250) stores the data in at least one of, an Application Data Records (ADR) utilizing the AI/ML model in case of failure in the established connection between the first component (310) and the second component (315).

10. The method (400) as claimed in claim 1, wherein the failure in the established connection between the first component (310) and the second component (315) is detected by the one or more processors (205) based on continuously monitoring the established connection between the first component (310) and the second component (315).

11. The method (400) as claimed in claim 1, wherein the step of, transmitting (425), by the one or more processors (205), in real time, the stored data from the database (250) to the second component (315) subsequent to rectifying the failed connection between the first component (310) and the second component (315), includes the step of:
fetching, by the one or more processors (205), the data from the database (250) utilizing the AI/ML model; and
transmitting, by the one or more processors (205), the fetched data to the second component (315) of the probing agent (225) subsequent to rectifying the failure in the established connection between the first component (310) and the second component (315).

12. A system (120) for managing data storage in a communication network (105), the system (120) comprising:
a receiving unit (220), configured to, enable, a first component (310) of a probing agent (225) to receive data from a plurality of network elements (125), wherein the probing agent (225) includes at least of, the first component (310) and a second component (315);
an establishment unit (230), configured to, establish, a connection between the first component (310) and the second component (315);
a transmitting unit (235), configured to, transmit, the data from the first component (310) to the second component (315) via the established connection;
in response to detecting, by a detection unit (240), a failure in the established connection between the first component (310) and the second component (315) while transmitting the data therebetween, a storage unit (245), configured to, store, the data in a database (250); and
the transmitting unit (235), configured to, transmit, in real time, the stored data from the database (250) to the second component (315) subsequent to rectifying the failure in the established connection between the first component (310) and the second component (315).

13. The system (120) as claimed in claim 12, wherein the plurality of network elements (125) is at least one of, a base station or eNodeB (eNB) (305a-305c), and one or more Network Functions (NFs).

14. The system (120) as claimed in claim 12, wherein the data received at the first component (310) of the probing agent (225) pertains to at least one of, New Radio Signalling Layer (NRSL) Radio Access Network (RAN) data and Service Data Request (SDR) data.

15. The system (120) as claimed in claim 12, wherein the first component (310) of the probing agent (225) receives the data from the plurality of network elements (125) via at least one protocol, wherein the protocol includes at least one of, a Hypertext Transfer Protocol version 2 (HTTP2) protocol and a Transmission Control Protocol (TCP).

16. The system (120) as claimed in claim 12, wherein the second component (315) of the probing agent (225) is at least one of, a conductor component and a message broker.

17. The system (120) as claimed in claim 12, wherein the second component (315) of the probing agent (225) is configured to perform multiple tasks including at least one of, parsing, decoding, analysis, troubleshooting, and additional processing of the data.

18. The system (120) as claimed in claim 12, wherein the receiving unit (220) enables, the first component (310) of the probing agent (225) to receive data from the plurality of network elements (125), and further configured to:
segregate, the received data from the plurality of network elements (125) based on a respective version of the first component (310).

19. The system (120) as claimed in claim 12, wherein in response to detecting, by the detection unit (240), the failure in the established connection between the first component (310) and the second component (315) while transmitting the data therebetween, the storage unit (245), stores the data in the database (250) utilizing an Artificial Intelligence/Machine Learning (AI/ML) model.

20. The system (120) as claimed in claim 19, wherein the database (250) stores the data in at least one of, an Application Data Records (ADR) utilizing the AI/ML model in case of failure in the established connection between the first component (310) and the second component (315).

21. The system (120) as claimed in claim 12, wherein the failure in the established connection between the first component (310) and the second component (315) is detected by the detection unit (240) based on continuously monitoring the established connection between the first component (310) and the second component (315).

22. The system (120) as claimed in claim 12, wherein the transmitting unit (235), transmits, in real time, the stored data from the database (250) to the second component (315) subsequent to rectifying the failed connection between the first component (310) and the second component (315), by:
fetching, the data from the database (250) utilizing the AI/ML model; and
transmitting, the fetched data to the second component (315) of the probing agent (225) subsequent to rectifying the failure in the established connection between the first component (310) and the second component (315).

Documents

Application Documents

# Name Date
1 202321047033-STATEMENT OF UNDERTAKING (FORM 3) [12-07-2023(online)].pdf 2023-07-12
2 202321047033-PROVISIONAL SPECIFICATION [12-07-2023(online)].pdf 2023-07-12
3 202321047033-FORM 1 [12-07-2023(online)].pdf 2023-07-12
4 202321047033-FIGURE OF ABSTRACT [12-07-2023(online)].pdf 2023-07-12
5 202321047033-DRAWINGS [12-07-2023(online)].pdf 2023-07-12
6 202321047033-DECLARATION OF INVENTORSHIP (FORM 5) [12-07-2023(online)].pdf 2023-07-12
7 202321047033-FORM-26 [20-09-2023(online)].pdf 2023-09-20
8 202321047033-Proof of Right [08-01-2024(online)].pdf 2024-01-08
9 202321047033-DRAWING [03-07-2024(online)].pdf 2024-07-03
10 202321047033-COMPLETE SPECIFICATION [03-07-2024(online)].pdf 2024-07-03
11 Abstract-1.jpg 2024-08-06
12 202321047033-Power of Attorney [11-11-2024(online)].pdf 2024-11-11
13 202321047033-Form 1 (Submitted on date of filing) [11-11-2024(online)].pdf 2024-11-11
14 202321047033-Covering Letter [11-11-2024(online)].pdf 2024-11-11
15 202321047033-CERTIFIED COPIES TRANSMISSION TO IB [11-11-2024(online)].pdf 2024-11-11
16 202321047033-FORM 3 [08-12-2024(online)].pdf 2024-12-08
17 202321047033-FORM 18 [20-03-2025(online)].pdf 2025-03-20