Abstract: The present disclosure relates to a method and system for network configuration in a communication system. The disclosure encompasses: receiving, via a receiving unit [204] at an automated cloud installer (ACI) network service unit (NSU) [202], a set of network configuration and a set of login details for one or more target nodes. Thereafter the disclosure encompasses logging, via a processing unit [206] at the ACI NSU [202], using the received set of login details onto the one or more target nodes. Thereafter the disclosure encompasses creating, via a creating unit [208] at the ACI NSU [202], one or more network configuration files from the received set of network configurations for the one or more target nodes, and then the disclosure encompasses writing, via a writing unit [210] at the ACI NSU [202], the one or more network configuration files to corresponding one or more target nodes. [FIG. 3]
FORM 2
THE PATENTS ACT, 1970 (39 OF 1970) & THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR NETWORK CONFIGURATION IN A COMMUNICATION SYSTEM”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is to be performed.
METHOD AND SYSTEM FOR NETWORK CONFIGURATION IN A COMMUNICATION SYSTEM
FIELD OF INVENTION
[0001] Embodiments of the present disclosure generally relate to a field of wireless communication system. More particularly, embodiments of the present disclosure relate to a method and system for network configuration in a communication system.
BACKGROUND
[0002] The following description of related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art.
[0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
[0004] In the 5G communication systems, a plurality of network functions (NFs) are provided, for example an Access and Mobility Management Function (AMF), Session Management Function (SMF), Authentication Server Function (AUSF), a Network Slice Selection Function (NSSF), Policy Control Function (PCF), a Network Repository Function (NRF), Network Exposure Function (NEF) and the like. One or more of the aforementioned NFs communicate with each other, to implement multiple activities on the 5G communication system.
[0005] In 5G communication systems, for providing network services or communication services, and for the installation of network function nodes, servers and network devices, there is a requirement to configure the network as per network operational needs. However, in traditional or conventional methods, network configurations are done manually, which includes logging to each server, creating multiple network configuration files, restarting the network services and servers, and then verifying if all the configurations have been performed. This process is less efficient, time consuming and requires more manpower for installations of greater number of network function nodes and devices.
[0006] Thus, there exists an imperative need in the art to provide an efficient system and method for network configuration of network function nodes and servers for installations. The method and system of the present invention provide a network configuration in a communication system.
SUMMARY
[0007] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0008] An aspect of the present disclosure may relate to a method for network configuration in a communication system. The method includes receiving, via a receiving unit at an Automated Cloud Installer (ACI) Network Service Unit (NSU), a set of network configurations and a set of login details for one or more target nodes. Next, the method includes logging, via a processing unit at the ACI NSU, using the received set of login details onto the one or more target nodes. Next, the method includes creating, via a creating unit at the ACI NSU, one or more network configuration files from the received set of network configurations for the one or more target nodes. Thereafter, the method includes writing, via a writing unit at the ACI NSU, the one or more network configuration files to corresponding one or more target nodes from the one or more target nodes.
[0009] In an exemplary aspect of the present disclosure, the method further comprises rebooting, via the processing unit at the ACI NSU, the one or more target nodes; re-logging, via the processing unit at the ACI NSU, onto the one or more target nodes; and verifying, via a verifying unit at the ACI NSU, the one or more network configuration files in the corresponding one or more target nodes.
[00010] In an exemplary aspect of the present disclosure, the ACI NSU concurrently
creates the one or more network configuration files for the one or more target nodes.
[00011] In an exemplary aspect of the present disclosure, the ACI NSU concurrently
writes the one or more network configuration files to the one or more target nodes.
[00012] In an exemplary aspect of the present disclosure, prior to writing the one or
more network configuration files to corresponding one or more target nodes, the method comprises receiving, via the receiving unit, a network configuration request comprising the one or more network configuration files and corresponding IP details; validating, via a validating unit, a syntax of the received one or more network configuration files and corresponding IP details; and transmitting, via a transmitting unit, the validated one or more network configuration files to ACI user interface (UI).
[00013] Another aspect of the present disclosure may relate to a system for network
configuration in a communication system. The system comprises an automated cloud installer (ACI) network service unit (NSU). The ACI NSU further comprises a receiving unit configured to receive a set of a network configurations and a set of login details for one or more target nodes. The ACI NSU further comprises a processing unit configured to log-in, using the set of received login details, onto the one or more target nodes. The ACI NSU further comprises a creating unit configured to create one or more network configuration files, from the received set of network configurations for the one or more target nodes. The ACI NSU further comprises a writing unit configured to write the one or more network configuration files to the corresponding one or more target nodes.
[00014] Yet another aspect of the present disclosure may relate to a non-transitory
computer readable storage medium storing instructions for network configuration in a communication system, wherein the instructions include an executable code which, when executed by one or more units of a system, causes: a receiving unit of the system to receive a set of network configurations and a set of login details for one or more target nodes. Further, the instructions include an executable code which, when executed causes a processing unit of the system to log, using the received set of login details, onto the one or more target nodes. Further, the instructions include an executable code which, when executed causes a creating unit of the system to create one or more network configuration files from the received set of network configurations, for the one or more target nodes. Further, the instructions include an executable code which, when executed causes a writing unit of the system to write the one or more network configuration files to the corresponding one or more target nodes.
[00015] Yet another aspect of the present disclosure may relate to a user equipment
(UE). The UE comprises: a transmitter unit, configured to transmit a request to a system for network configuration in a communication system; and a receiver unit, configured to receive from the system, a response to the request, wherein the response comprises an indication of writing of one or more network configuration files to corresponding one or
more target nodes. The response is generated by the system based on: receiving, via a receiving unit at an Automated Cloud Installer (ACI) Network Service Unit (NSU), a set of network configurations and a set of login details for one or more target nodes; logging, via a processing unit at the ACI NSU, using the received set of login details onto the one or more target nodes; creating, via a creating unit at the ACI NSU, one or more network configuration files from the set of received network configuration for the one or more target nodes; and writing, via a writing unit at the ACI NSU, the one or more network configuration files to the corresponding one or more target nodes from the one or more target nodes.
OBJECTS OF THE DISCLOSURE
[00016] Some of the objects of the present disclosure, which at least one
embodiment disclosed herein satisfies are listed herein below.
[00017] It is an object of the present disclosure to provide a method and system for
network configuration in a communication system in parallel manner.
[00018] It is another object of the present disclosure to provide a method and system
for network configuration in a communication system, on multiple target nodes, such as network servers and devices via automated cloud installer for enabling and/or deploying communication services in the network.
[00019] It is yet another object of the present disclosure to provide a method and
system for network configuration in a communication system, via automatically re-logging after reboot and verifying all network configurations.
DESCRIPTION OF THE DRAWINGS
[00020] The accompanying drawings, which are incorporated herein, and constitute
a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and
systems in which like reference numerals refer to the same parts throughout the different
drawings. Components in the drawings are not necessarily to scale, emphasis instead being
5 placed upon clearly illustrating the principles of the present disclosure. Also, the
embodiments shown in the figures are not to be construed as limiting the disclosure, but
the possible variants of the method and system according to the disclosure are illustrated
herein to highlight the advantages of the disclosure. It will be appreciated by those skilled
in the art that disclosure of such drawings includes disclosure of electrical components or
10 circuitry commonly used to implement such components.
[00021] FIG. 1 illustrates an exemplary block diagram of a computing device upon
which the features of the present disclosure may be implemented, in accordance with exemplary implementations of the present disclosure. 15
[00022] FIG. 2 illustrates an exemplary block diagram of a system for network
configuration in a communication system, in accordance with exemplary implementations of the present disclosure.
20 [00023] FIG. 3 illustrates a method flow diagram for network configuration in a
communication system, in accordance with exemplary implementations of the present disclosure.
[00024] FIG. 4 illustrates an exemplary connection between an exemplary system
25 [400] and target nodes, for the implementation of network configuration, in accordance
with exemplary implementations of the present disclosure.
[00025] The foregoing shall be more apparent from the following more detailed
description of the disclosure. 30
7
DETAILED DESCRIPTION
[00026] In the following description, for the purposes of explanation, various
specific details are set forth to provide a thorough understanding of embodiments of the
5 present disclosure. It will be apparent, however, that embodiments of the present disclosure
may be practiced without these specific details. Several features described hereafter may each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above.
10
[00027] The ensuing description provides exemplary embodiments only, and is not
intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. Various changes may
15 be made in the function and arrangement of elements without departing from the spirit and
scope of the disclosure as set forth.
[00028] Specific details are given in the following description to provide a thorough
understanding of the embodiments. However, it will be understood by one of ordinary skill
20 in the art that the embodiments may be practiced without these specific details. For
example, circuits, systems, processes, and other components may be shown as components in block diagram form in order to not obscure the embodiments in unnecessary detail.
[00029] Also, it is noted that individual embodiments may be described as a process
25 which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram,
or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations may be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure. 30
8
[00030] The word “exemplary” and/or “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the subject
matter disclosed herein is not limited by such examples. In addition, any aspect or design
described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed
5 as preferred or advantageous over other aspects or designs, nor is it meant to preclude
equivalent exemplary structures and techniques known to those of ordinary skill in the art.
Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar
words are used in either the detailed description or the claims, such terms are intended to
be inclusive—in a manner similar to the term “comprising” as an open transition word—
10 without precluding any additional or other elements.
[00031] As used herein, a “processing unit” or “processor” or “operating processor”
includes one or more processors, wherein processor refers to any logic circuitry for processing instructions. A processor may be a general-purpose processor, a special purpose
15 processor, a conventional processor, a digital signal processor, a plurality of
microprocessors, one or more microprocessors in association with a (Digital Signal Processing) DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing, input/output processing, and/or
20 any other functionality that enables the working of the system according to the present
disclosure. More specifically, the processor or processing unit is a hardware processor.
[00032] As used herein, “a user equipment”, “a user device”, “a smart-user-device”,
“a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”, “a
25 wireless communication device”, “a mobile communication device”, “a communication
device” may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure. The user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other
30 computing device which is capable to implement the one or more features of the present
9
disclosure. Also, the user device may contain at least one input means configured to receive an input from unit(s) which are required to implement the one or more features of the present disclosure.
5 [00033] As used herein, “storage unit” or “memory unit” refers to a machine or
computer-readable medium including any mechanism for storing information in a form
readable by a computer or similar machine. For example, a computer-readable medium
includes read-only memory (“ROM”), random access memory (“RAM”), magnetic disk
storage media, optical storage media, flash memory devices or other types of machine-
10 accessible storage media. The storage unit stores at least the data that may be required by
one or more units of the system to perform their respective functions.
[00034] As used herein “interface” or “user interface refers to a shared boundary
across which two or more separate components of a system exchange information or data.
15 The interface may also be referred to a set of rules or protocols that define communication
or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called.
[00035] All modules, units, components used herein, unless explicitly excluded
20 herein, may be software modules or hardware processors, the processors being a general-
purpose processor, a special purpose processor, a conventional processor, a digital signal
processor (DSP), a plurality of microprocessors, one or more microprocessors in
association with a DSP core, a controller, a microcontroller, Application Specific
Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other
25 type of integrated circuits, etc.
[00036] As used herein the transceiver unit may include at least one receiver and at
least one transmitter configured respectively for receiving and transmitting data, signals,
information or a combination thereof between units/components within the system and/or
30 connected with the system.
10
[00037] As used herein, network configurations may refer to assigning network
settings, bonding, aliasing, internet protocol (IP) configuration, policies, flows, and/or controls in the network. 5
[00038] As used herein, aliasing may refer to assigning more than one internet
protocol (IP) address to a network interface. This enables multiple connections for a network node in the network.
10 [00039] As used herein, bonding may refer to aggregating multiple network
interfaces in parallel for providing a single interface.
[00040] As discussed in the background section, the current known solutions have
several shortcomings. The present disclosure aims to overcome the above-mentioned and
15 other existing problems in this field of technology by providing method and system for
network configuration in a communication system.
[00041] FIG. 1 illustrates an exemplary block diagram of a computing device [100]
(also referred to herein as a computer system [100]) upon which the features of the present
20 disclosure may be implemented in accordance with exemplary implementation of the
present disclosure. In an implementation, the computing device [100] may also implement a method for network configuration in a communication system, by utilising the system of the present disclosure. In another implementation, the computing device [100] itself implements the method for network configuration in a communication system using one or
25 more units configured within the computing device [100], wherein said one or more units
are capable to implement the features as disclosed in the present disclosure.
[00042] The computing device [100] may include a bus [102] or other
communication mechanism for communicating information, and a hardware processor
30 [104] coupled with bus [102] for processing information. The hardware processor [104]
11
may be, for example, a general-purpose microprocessor. The computing device [100] may
also include a main memory [106], such as a random-access memory (RAM), or other
dynamic storage device, coupled to the bus [102] for storing information and instructions
to be executed by the processor [104]. The main memory [106] also may be used for storing
5 temporary variables or other intermediate information during execution of the instructions
to be executed by the processor [104]. Such instructions, when stored in non-transitory
storage media accessible to the processor [104], render the computing device [100] into a
special-purpose machine that is customized to perform the operations specified in the
instructions. The computing device [100] further includes a read only memory (ROM)
10 [108] or other static storage device coupled to the bus [102] for storing static information
and instructions for the processor [104].
[00043] A storage device [110], such as a magnetic disk, optical disk, or solid-state
drive is provided and coupled to the bus [102] for storing information and instructions. The
15 computing device [100] may be coupled via the bus [102] to a display [112], such as a
Cathode Ray Tube (CRT), Liquid Crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for displaying information to a computer user. An input device [114], including alphanumeric and other keys, touch screen input means, etc. may be coupled to the bus [102] for communicating information and command
20 selections to the processor [104]. Another type of user input device may be a cursor
controller [116], such as a mouse, a trackball, or cursor direction keys, for communicating direction information and command selections to the processor [104], and for controlling cursor movement on the display [112]. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device
25 to specify positions in a plane.
[00044] The computing device [100] may implement the techniques described
herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or
program logic which in combination with the computing device [100] causes or programs
30 the computing device [100] to be a special-purpose machine. According to one
12
implementation, the techniques herein are performed by the computing device [100] in
response to the processor [104] executing one or more sequences of one or more
instructions contained in the main memory [106]. Such instructions may be read into the
main memory [106] from another storage medium, such as the storage device [110].
5 Execution of the sequences of instructions contained in the main memory [106] causes the
processor [104] to perform the process steps described herein. In alternative implementations of the present disclosure, hard-wired circuitry may be used in place of or in combination with software instructions.
10 [00045] The computing device [100] also may include a communication interface
[118] coupled to the bus [102]. The communication interface [118] provides a two-way data communication coupling to a network link [120] that is connected to a local network [122]. For example, the communication interface [118] may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data
15 communication connection to a corresponding type of telephone line. As another example,
the communication interface [118] may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, the communication interface [118] sends and receives electrical, electromagnetic or optical signals that carry digital data streams
20 representing various types of information.
[00046] The computing device [100] can send messages and receive data, including
program code, through the network(s), the network link [120] and the communication
interface [118]. In the Internet example, a server [130] might transmit a requested code for
25 an application program through the Internet [128], the Internet Service Provider (ISP)
[126], the local network [122], host [124] and the communication interface [118]. The received code may be executed by the processor [104] as it is received, and/or stored in the storage device [110], or other non-volatile storage for later execution.
13
[00047] The computing device [100] encompasses a wide range of electronic
devices capable of processing data and performing computations. Examples of computing
device [100] include, but are not limited only to, personal computers, laptops, tablets,
smartphones, servers, and embedded systems. The devices may operate independently or
5 as part of a network and can perform a variety of tasks such as data storage, retrieval, and
analysis. Additionally, computing device [100] may include peripheral devices, such as monitors, keyboards, and printers, as well as integrated components within larger electronic systems, showcasing their versatility in various technological applications.
10 [00048] Referring to FIG. 2, an exemplary block diagram of a system [200] for
network configuration in a communication system, is shown, in accordance with the exemplary implementations of the present disclosure. The system [200] comprises at least one Automated Cloud Installer (ACI) Network Service Unit (NSU) [202] and at least one Automated Cloud Installer (ACI) User Interface (UI) [220]. The ACI NSU [202] further
15 comprises at least one receiving unit [204], at least one processing unit [206], at least one
creating unit [208], at least one writing unit [210], at least one verifying unit [212], at least one validating unit [214], and at least one transmitting unit [216]. Also, all the components/ units of the system [200] are assumed to be connected to each other unless otherwise indicated below. Also, in FIG. 2 only a few units are shown, however, the system [200]
20 may comprise multiple such units or the system [200] may comprise any such numbers of
said units, as required to implement the features of the present disclosure. Further, in an implementation, the system [200] may be in communication with the user device (may also referred herein as a user equipment or UE). In another implementation, the system [200] may reside in a server or a network entity.
25
[00049] The system [200] is configured for network configuration in a
communication system, with the help of the interconnection between the components/units of the system [200].
14
[00050] More specifically, the system [200] comprises the Automated Cloud
Installer (ACI) Network Service Unit (NSU) [202]. The ACI NSU [202] further comprises
the receiving unit [204], which is configured to receive a set of network configurations and
a set of login details for one or more target nodes. As used herein, the set of the network
5 configurations may refer to the configurations related to assigning network settings,
bonding, aliasing, IP configuration, flows, and controls in the network. The user or network operator may configure the set of the network configurations, such as, but not limited to, IP configurations, bonding, and storage capacity for one or more target nodes. The receiving unit [204] receives the login details or login credentials which is a set of unique
10 identifiers–such as a username and password. In an exemplary aspect of the present
disclosure, one or more target nodes may be, such as, but not limited to, routers, switches, hubs, gateways, load balancers, wireless base stations servers or network devices, etc. In an exemplary aspect of the present disclosure, one or more target nodes may be associated with a communication network, such as, 5G network. In an implementation, the target node
15 in 5G network may be associated with Access and Mobility Management Function (AMF),
Session Management Function (SMF), Policy Control Function (PCF) and Network Repository Function (NRF). In an exemplary aspect of the present disclosure, one or more target nodes may be associated with a communication network other than 5G network, such as 6G network and the like.
20
[00051] The ACI NSU [202] further comprises the processing unit [206]. The
processing unit [206] is communicatively coupled with the receiving unit [204]. The processing unit [206] is configured to log-in, using the set of received login details, onto the one or more target nodes. The processing unit [206] enables a user or network
25 administrator to login to one or more target nodes by providing login details or login
credentials and one or more target nodes information, for accessing and configuring the one or more target nodes.
[00052] The ACI NSU [202] further comprises the creating unit [208]. The creating
30 unit [208] is configured to create one or more network configuration files, from the
15
received set of network configurations for the one or more target nodes. In an exemplary
aspect, the creating unit [208] is configured to create one or more network configuration
files based on the user provided network configuration types such as, but not limited to,
bonding configuration for one or more target nodes, such as but not limited to, server and
5 router. Further, the user may also specify the number of target nodes (e.g., number of
servers) and type of network configuration based on the network requirements.
[00053] In an aspect, the ACI NSU [202] concurrently creates the one or more
network configuration files for the one or more target nodes. In an exemplary aspect, the
10 creating unit [208] of the ACI NSU [202] creates one or more network configuration files
concurrently i.e., creating one or more files at the same time for one or more target nodes based on the user provided network configuration parameters and operational requirements.
15 [00054] In an aspect, the receiving unit [204] is configured, prior to writing the one
or more network configuration files to corresponding one or more target nodes, to receive a network configuration request comprising the one or more network configurations and corresponding IP details. The receiving unit [204] may receive the network configuration request comprising the one or more network configurations, such as bonding, aliasing,
20 packet flow and corresponding IP details, such as, but not limited to, secure shell (SSH) IP
details. In an exemplary aspect, the receiving unit [204] is configured to receive the one or more network configuration files and corresponding IP details in a form of file such as an excel file.
25 [00055] The ACI NSU [202] further comprises the validating unit [214]. The
validating unit [214] is configured, prior to writing the one or more network configuration files to corresponding one or more target nodes, to validate a syntax of the received one or more network configuration files, and corresponding IP details. The validating unit [214] may be attached communicatively with the receiving unit [204]. After receiving the one or
30 more network configuration files and corresponding IP details for one or more target nodes
16
from the receiving unit [204], the validating unit [214] is configured to validate the syntax
of the received one or more network configuration files and corresponding IP details. In an
exemplary aspect, the validating unit [214] may trigger at least one of “validate”
Application Programming Interface (API), script, instruction(s) or command(s) to validate
5 the syntax of the received network configurations and IP details input, which includes, but
is not limited to, comma format, full stop format, IP syntax validation, IP duplicity check, etc.
[00056] The ACI NSU [202] further comprises the transmitting unit [216]. The
10 transmitting unit [216] is configured, prior to writing the one or more network
configuration files to corresponding one or more target nodes, to transmit the validated one
or more network configuration files to an ACI User Interface (UI) [220]. After validating
the one or more network configuration files via the validating unit [214], the transmitting
unit [216] may transmit the validated one or more network configuration files to the ACI
15 UI [220]. The ACI UI [220] may display at least one of network configuration success,
configuration table, and configured target nodes.
[00057] In an exemplary aspect of the present disclosure, the ACI UI [220] may also
be used herein as an ACI Command Line Interface (CLI).
20
[00058] The ACI NSU [202] further comprises the writing unit [210]. The writing
unit [210] is configured to write the one or more network configuration files to the corresponding one or more target nodes. The writing unit [210] writes one or more network configuration files based on the user defined parameters or configurations to the
25 corresponding one or more target nodes so that target nodes operate properly as per network
requirements.
[00059] In an exemplary aspect, the writing unit [210] is configured to initiate
writing the one or more network configuration files. The writing unit [210] may run at least
17
one of “configure network” script, command(s) and instruction(s), which may write the one or more network configuration files to the corresponding one or more target nodes.
[00060] In an aspect, the ACI NSU [202] concurrently writes the one or more
5 network configuration files to the one or more target nodes. In an exemplary aspect, the
writing unit [210] of the ACI NSU [202] writes one or more network configuration files concurrently i.e., writing one or more files at the same time for one or more target nodes based on user provided network configuration parameters and operational requirements.
10 [00061] In an exemplary aspect, the processing unit [206] is configured to reboot the
one or more target nodes. The processing unit [206] is configured to reboot i.e. restart the one or more target nodes, without affecting network configuration settings or user specifications. Furthermore, the processing unit [206] is configured to re-log onto the one or more target nodes. In an exemplary aspect, the processing unit [206] enables the user to
15 re-log onto one or more target nodes by providing login details or login credentials and
target nodes information, for accessing and configuring the one or more target nodes.
[00062] The ACI NSU [202] further comprises the verifying unit [212], which is
configured to verify the one or more network configuration files in the corresponding one
20 or more target nodes. In an exemplary aspect, the verifying unit [212] may verify one or
more network configuration files to check whether all the configurations are set as per user specification in the respective one or more target nodes. After writing the one or more network configuration files via the writing unit [210] on to the one or more target nodes, the verifying unit [212] may verify all the target nodes are configured as per network
25 administrator’s defined specification in the network configuration files. If the one or more
target nodes are configured as per network configuration files, the verifying unit [212] sends success response to the ACI UI [220]. If one or more target nodes are not configured as per network configuration files, the verifying unit [212] provides details of the failed target nodes or status of target nodes to the ACI UI [220] for further processing.
30
18
[00063] Referring to FIG. 3 an exemplary flow diagram of a method [300], for
network configuration in a communication system is shown, in accordance with the
exemplary implementations of the present disclosure. In an implementation, the method
[300] is performed by the system [200]. As shown in FIG. 3, the method [300] starts at step
5 [302].
[00064] At step [304], the method [300] comprises receiving, via a receiving unit
[204] at an Automated Cloud Installer (ACI) Network Service Unit (NSU) [202], a set of network configurations and a set of login details for one or more target nodes. As used
10 herein, the set of the network configurations may refer to the configurations related to
assigning network settings, bonding, aliasing, IP configuration, flows, and controls in the network. The user or network operator may configure the set of the network configurations, such as but not limited to IP configurations, bonding, and storage capacity for one or more target nodes. The receiving unit [204] receives the login details or login credentials, which
15 are a set of unique identifiers such as a username and password. In an exemplary aspect of
the present disclosure, one or more target nodes may comprise but are not limited to, routers, switches, hubs, gateways, load balancers, wireless base stations servers or network devices etc. In an exemplary aspect of the present disclosure, one or more target nodes may be associated with a communication network with such as, 5G network. In an
20 implementation, the target node in 5G network may be associated with Access and Mobility
Management Function (AMF), Session Management Function (SMF), Policy Control Function (PCF) and Network Repository Function (NRF). In an exemplary aspect of the present disclosure, one or more target nodes may be associated with a communication network other than 5G network, such as 6G network and the like.
25
[00065] At step [306], the method [300] further comprises logging, via a processing
unit [206] at the ACI NSU [202], using the set of received login details, onto the one or more target nodes. The method [300] further implemented via the processing unit [206] at the ACI NSU [202] may log onto the one or more target nodes. The processing unit [206]
30 enables a user to login to one or more target nodes by providing login details or login
19
credentials and one or more target nodes information for accessing and configuring into one or more target nodes.
[00066] At step [308], the method [300] further comprises creating, via a creating
5 unit [208] at the ACI NSU [202], one or more network configuration files, from the
received set of network configuration for the one or more target nodes. The method [300]
further implemented by the ACI NSU [202] via the creating unit [208] may create one or
more network configuration files based on the user provided network configuration types
such as, but not limited to, bonding configuration for one or more target nodes, such as but
10 not limited to, server and router. Further, the user may also specify the number of target
nodes (e.g., number of servers) and type of network configuration based on the network requirements.
[00067] In an aspect, the ACI NSU [202] further concurrently creates the one or
15 more network configuration files for the one or more target nodes. In an exemplary aspect,
the creating unit [208] of the ACI NSU [202] may create one or more network configuration files concurrently i.e., creating one or more files at the same time for one or more target nodes based on user provided network configuration parameters and operational requirements.
20
[00068] The method [300] further comprises, prior to writing the one or more
network configuration files to corresponding one or more target nodes, receiving, via the receiving unit [204], a network configuration request comprising the one or more network configurations and corresponding IP details. The receiving unit [204] may receive the
25 network configuration request comprising the one or more network configurations, such as
bonding, aliasing, packet flow and corresponding IP details, such as, but not limited to, secure shell (SSH) IP details. In an exemplary aspect, the receiving unit [204] may receive the one or more network configuration files and corresponding IP details in a form of a file such as an excel file.
30
20
[00069] The method [300] further comprises, prior to writing the one or more
network configuration files to corresponding one or more target nodes, validating, via a
validating unit [214] a syntax of the received one or more network configuration files, and
corresponding IP details. The ACI NSU [202] further comprises the validating unit [214].
5 The validating unit [214] may be attached communicatively with the receiving unit [204].
After receiving the one or more network configuration files and corresponding IP details
for one or more target nodes from the receiving unit [204], the validating unit [214] may
validate the syntax of the received one or more network configuration files and
corresponding IP details. In an exemplary aspect, the validating unit [214] may trigger at
10 least one of “validate” application programming interface (API), script, instruction(s) or
command(s) to validate the syntax of the received network configurations and IP details input which includes, but not limited to, comma format, full stop format, IP syntax validation, IP duplicity check, etc.
15 [00070] The method [300] further comprises, prior to writing the one or more
network configuration files to corresponding one or more target nodes, transmitting, via a transmitting unit [216], the validated one or more network configuration files to an ACI User Interface (UI) [220]. After validating the one or more network configuration files via the validating unit [214], the transmitting unit [216] may transmit the validated one or more
20 network configuration files to the ACI UI [220]. The ACI UI [220] may display at least
one of network configuration success, configuration table, and configured target nodes.
[00071] At step [310], the method [300] further comprises writing, via a writing unit
[210] at the ACI NSU [202], the one or more network configuration files to the
25 corresponding one or more target nodes. The method [300] further implemented by the
ACI NSU [202], via the writing unit [210], may comprise writing one or more network configuration files based on user defined parameters or configurations, to the corresponding one or more target nodes so that target nodes operate properly as per network requirements. In an exemplary aspect, the writing unit [210] is configured to initiate writing
30 the one or more network configuration files. The writing unit [210] may run at least one of
21
“configure network” script, command(s) and instruction(s), which may write the one or more network configuration files to the corresponding one or more target nodes [408].
[00072] In an aspect, the ACI NSU [202] further concurrently writes the one or more
5 network configuration files to the one or more target nodes. In an exemplary aspect, the
ACI NSU [202], via the writing unit [210], may write one or more network configuration files concurrently i.e., writing one or more files at the same time for one or more target nodes based on user provided network configuration parameters and operational requirements.
10
[00073] The method [300] further comprises rebooting, via the processing unit [206]
at the ACI NSU [202], the one or more target nodes. In an exemplary aspect, the ACI NSU [202] via the processing unit [206] may reboot i.e. restart the one or more target nodes, without affecting network configuration settings or user specification. The method [300]
15 further comprises re-logging, via the processing unit [206] at the ACI NSU [202], onto the
one or more target nodes. In an exemplary aspect, the ACI NSU [202], via the processing unit [206], may enable the user to re-log onto one or more target nodes by providing login details or login credentials and target nodes information, for accessing and configuring into one or more target nodes.
20
[00074] The method [300] further comprises verifying, via a verifying unit [212] at
the ACI NSU [202], the one or more network configuration files in the corresponding one or more target nodes. In an exemplary aspect, the ACI NSU [202] may verify, via the verifying unit [212], the one or more network configuration files to check whether all the
25 configurations are set as per user specification in the respective one or more target nodes.
After writing the one or more network configuration files via the writing unit [210] on to the one or more target nodes, the verifying unit [212] may verify all the target nodes are configured as per network administrator’s defined specification in the network configuration files. If the one or more target nodes are configured as per network
30 configuration files, the verifying unit [212] may send success response to the ACI UI [220].
22
If one or more target nodes are not configured as per network configuration files, the verifying unit [212] may provide details of the failed target nodes to or status of target nodes to the ACI UI [220] for further processing.
5 [00075] Thereafter, the method [300] terminates at step [312].
[00076] The present disclosure further discloses a non-transitory computer readable
storage medium storing instructions for network configuration in a communication system, the instructions include an executable code which, when executed by one or more units of
10 a system [200] causes a receiving unit [204] of the system [200] to receive, a set of network
configurations and a set of login details for one or more target nodes. Further, the instructions, when executed, may cause a processing unit [206] of the system [200] to log, using the received set of login details, onto the one or more target nodes. Further, the instructions, when executed, may cause a creating unit [208] of the system [200] to create
15 one or more network configuration files from the received set of network configurations,
for the one or more target nodes. Further, the instructions, when, executed may cause a writing unit [210] of the system [200] to write the one or more network configuration files to the corresponding one or more target nodes.
20 [00077] The present disclosure further discloses a user equipment (UE). A user
equipment (UE) comprises: a transmitter unit, configured to transmit a request to a system [200] for network configuration in a communication system; and a receiver unit, configured to receive from the system [200] a response to the request, wherein the response comprises an indication of writing of one or more network configuration files to corresponding one
25 or more target nodes. The response is generated by the system [200] based on: receiving,
via a receiving unit [204] at an Automated Cloud Installer (ACI) network service unit (NSU) [202], a set of network configurations and a set of login details for one or more target nodes; logging, via a processing unit [206] at the ACI NSU [202], using the received set of login details onto the one or more target nodes; creating, via a creating unit [208] at
30 the ACI NSU [202], one or more network configuration files from the set of received
23
network configurations for the one or more target nodes; and writing, via a writing unit [210] at the ACI NSU [202], the one or more network configuration files to the corresponding one or more target nodes.
5 [00078] FIG. 4 illustrates an exemplary connection between an exemplary system
[400] and target nodes, for the implementation of network configuration, in accordance with exemplary implementations of the present disclosure. Further, the method [300] may be implemented using the system [400]. The system [400] includes an Automated Cloud Installer (ACI) Command Line Interface (CLI) / User Interface (UI) [404], An Automated
10 Cloud Installer (ACI) [406] and one or more target nodes [408]. In an exemplary aspect of
the present disclosure, the system [400] may have different network configurations, such as, but not limited to, bonding, aliasing, internet protocol (IP) configurations, and the like. The target nodes [408] may be such as, but not limited to, servers, network devices. The Automated Cloud Installer (ACI) Command Line Interface (CLI) / User Interface (UI)
15 [404] is configured for preparing input including secure shell (SSH) login details and list
of network configurations file. The ACI CLI/UI [404] is also configured for triggering “validate” application command interface (API) script or instructions to validate the input which includes, but not limited to, internet protocol (IP) syntax validation, comma format, full stop format, duplicity check, etc., and for running “configure network” command
20 which initiates network configuration.
[00079] After the network configuration is initiated, ACI [406] logs in to the one or
more target nodes [408] and handles all the network configuration files and write the files to the one or more target nodes. Next, in an implementation, the ACI [406] restarts the
25 network service and then reboots the one or more target nodes [408]. Upon rebooting, ACI
[406] performs re-login to the target nodes and verifies whether all configurations are set as per user requirements. The ACI [406] may club all configurations per node, and operations can be parallelized at target node level. The ACI [406] may also generate an output, which includes all the attributes in files created by ACI [506], which thereby allows
30 the user to understand the configurations made. The ACI [406] sends generated output with
24
at least information of network configurations, configured target nodes, success of configurations and the like.
[00080] In an exemplary aspect of the present disclosure, ACI CLI/UI [404] may be
configured for performing actions, such as,
• Preparing files with all network configurations against secure socket shell (SSH) internet protocol (IP),
• Running validation scripts to check for syntax verification of the network configuration files, and
• Running network script to install network configurations on the target nodes [408].
[00081] In an exemplary aspect, the ACI [406] may handle all requests related to
network configurations.
[00082] In an exemplary aspect, the ACI [406] may perform following actions on
the target nodes [408], such as,
• Backup of existing network configurations, creation and writing of all the network configuration files,
• Restarting the network service and then rebooting the target nodes [408],
• Upon rebooting, logging the target nodes [408] again and verifying all the network configurations, and
• Returning a success message if all the configurations are set as per user specification.
[00083] As is evident from the above, the present disclosure provides a technically
advanced system and method for network configuration in a communication system. The system and method of the present disclosure provides an automated network configuration solution for installation of multiple target nodes in parallel manner. This process is efficient, time saving and requires no extensive labour power for installation of greater number of network function nodes and devices. Further, with the implementation of the
present invention, the user does not need to not have in-depth technical knowledge. The present disclosure enables for backups up existing network configurations in case user wants to roll back. The present disclosure also automatically re-logins after reboot and verifies all network configurations.
[00084] Further, in accordance with the present disclosure, it is to be acknowledged
that the functionality described for the various components/units can be implemented interchangeably. While specific embodiments may disclose a particular functionality of these units for clarity, it is recognized that various configurations and combinations thereof are within the scope of the disclosure. The functionality of specific units as disclosed in the disclosure should not be construed as limiting the scope of the present disclosure. Consequently, alternative arrangements and substitutions of units, provided they achieve the intended functionality described herein, are encompassed within the scope of the present disclosure.
[00085] While considerable emphasis has been placed herein on the disclosed
embodiments, it will be appreciated that many embodiments can be made and that many changes can be made to the embodiments without departing from the principles of the present disclosure. These and other changes in the embodiments of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.
We Claim:
1. A method for network configuration in a communication system, the method
comprising:
receiving, via a receiving unit [204] at an automated cloud installer (ACI) network service unit (NSU) [202], a set of network configurations and a set of login details for one or more target nodes;
logging, via a processing unit [206] at the ACI NSU [202], using the received set of login details onto the one or more target nodes;
creating, via a creating unit [208] at the ACI NSU [202], one or more network configuration files from the received set of network configurations for the one or more target nodes; and
writing, via a writing unit [210] at the ACI NSU [202], the one or more network configuration files to corresponding one or more target nodes.
2. The method as claimed in claim 1, further comprising:
rebooting, via the processing unit [206] at the ACI NSU [202], the one or more target nodes;
re-logging, via the processing unit [206] at the ACI NSU [202], onto the one or more target nodes; and
verifying, a verifying unit [212] at the ACI NSU [202], the one or more network configuration files in the corresponding one or more target nodes.
3. The method as claimed in claim 1, wherein the ACI NSU [202] concurrently creates
the one or more network configuration files for the one or more target nodes.
4. The method as claimed in claim 1, wherein the ACI NSU [202] concurrently writes the one or more network configuration files to the one or more target nodes.
5. The method as claimed in claim 1, wherein the method prior to writing the one or more network configuration files to corresponding one or more target nodes, comprises:
receiving, via the receiving unit [204], a network configuration request comprising the one or more network configuration files and corresponding IP details;
validating, via a validating unit [214], a syntax of the received one or more network configuration files and corresponding IP details; and
transmitting, via a transmitting unit [216], the validated one or more network configuration files to ACI) user interface (UI) [220].
6. A system for network configuration in a communication system, the system
comprises:
an automated cloud installer (ACI) network service unit (NSU) [202] comprising:
a receiving unit [204] configured to receive a set of network configurations and a set of login details for one or more target nodes;
a processing unit [206] configured to log, using the set of received login details, onto the one or more target nodes;
a creating unit [208] configured to create one or more network configuration files, from the received set of network configurations for the one or more target nodes; and
a writing unit [210] configured to write the one or more network configuration files to corresponding one or more target nodes.
7. The system as claimed in claim 6, wherein:
the processing unit [206] is configured to reboot the one or more target nodes;
the processing unit [206] is configured to re-log onto the one or more target nodes; and
a verifying unit [212] is configured to verify the one or more network configuration files in the corresponding one or more target nodes.
8. The system as claimed in claim 6, wherein the ACI NSU [202] concurrently creates the one or more network configuration files for the one or more target nodes.
9. The system as claimed in claim 6, wherein the ACI NSU [202] concurrently writes the one or more network configuration files to the one or more target nodes.
10. The system as claimed in claim 6, herein prior to writing the one or more network configuration files to corresponding one or more target nodes, the system is configured to:
the receiving unit [204] is configured to receive a network configuration request comprising the one or more network configuration files and corresponding IP details;
a validating unit [214] configured to validate a syntax of the received one or more network configuration files and corresponding IP details; and
a transmitting unit [216] configured to transmit the validated one or more network configuration files to ACI (user interface) UI [220].
11. A user equipment (UE) comprises:
a transmitter unit, configured to transmit a request to a system [200] for network configuration in a communication system; and
a receiver unit, configured to receive from the system [200] a response to the request, wherein the response comprises an indication of writing of one or more network configuration files to corresponding one or more target nodes, and wherein the response is generated by the system [200] based on:
receiving, via a receiving unit [204] at an automated cloud installer (ACI) network service unit (NSU) [202], a set of network configurations and a set of login details for one or more target nodes;
logging, via a processing unit [206] at the ACI NSU [202], using the received set of login details onto the one or more target nodes;
creating, via a creating unit [208] at the ACI NSU [202], one or more network configuration files from the set of received network configurations for the one or more target nodes; and
writing, via a writing unit [210] at the ACI NSU [202], the one or more network configuration files to the corresponding one or more target nodes.
| # | Name | Date |
|---|---|---|
| 1 | 202321047302-STATEMENT OF UNDERTAKING (FORM 3) [13-07-2023(online)].pdf | 2023-07-13 |
| 2 | 202321047302-PROVISIONAL SPECIFICATION [13-07-2023(online)].pdf | 2023-07-13 |
| 3 | 202321047302-FORM 1 [13-07-2023(online)].pdf | 2023-07-13 |
| 4 | 202321047302-FIGURE OF ABSTRACT [13-07-2023(online)].pdf | 2023-07-13 |
| 5 | 202321047302-DRAWINGS [13-07-2023(online)].pdf | 2023-07-13 |
| 6 | 202321047302-FORM-26 [14-09-2023(online)].pdf | 2023-09-14 |
| 7 | 202321047302-Proof of Right [25-10-2023(online)].pdf | 2023-10-25 |
| 8 | 202321047302-ORIGINAL UR 6(1A) FORM 1 & 26)-011223.pdf | 2023-12-08 |
| 9 | 202321047302-ENDORSEMENT BY INVENTORS [07-07-2024(online)].pdf | 2024-07-07 |
| 10 | 202321047302-DRAWING [07-07-2024(online)].pdf | 2024-07-07 |
| 11 | 202321047302-CORRESPONDENCE-OTHERS [07-07-2024(online)].pdf | 2024-07-07 |
| 12 | 202321047302-COMPLETE SPECIFICATION [07-07-2024(online)].pdf | 2024-07-07 |
| 13 | 202321047302-FORM 3 [02-08-2024(online)].pdf | 2024-08-02 |
| 14 | Abstract-1.jpg | 2024-08-09 |
| 15 | 202321047302-Request Letter-Correspondence [14-08-2024(online)].pdf | 2024-08-14 |
| 16 | 202321047302-Power of Attorney [14-08-2024(online)].pdf | 2024-08-14 |
| 17 | 202321047302-Form 1 (Submitted on date of filing) [14-08-2024(online)].pdf | 2024-08-14 |
| 18 | 202321047302-Covering Letter [14-08-2024(online)].pdf | 2024-08-14 |
| 19 | 202321047302-CERTIFIED COPIES TRANSMISSION TO IB [14-08-2024(online)].pdf | 2024-08-14 |