Abstract: ABSTRACT METHOD AND SYSTEM FOR ENRICHMENT OF DATA RECORDS The present disclosure relates to a system (120) and a method (600) for enrichment of data records. The method (600) receiving data records pertaining to a plurality of network elements. The method (600) further includes the step of fetching, from a storage unit, one or more pre-defined policies of each of the network elements. The method (600) further includes the step of performing, a validation on the data records by applying the fetched one or more pre-defined policies to the data records. The method (600) upon successful validation of the data records includes the step of extracting clear codes from the data records. The method (600) further includes the step of enriching the data records utilizing the extracted clear codes. Refer FIG. 2
DESC:
FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENTS RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
1. TITLE OF THE INVENTION
METHOD AND SYSTEM FOR ENRICHMENT OF DATA RECORDS
2. APPLICANT(S)
NAME NATIONALITY ADDRESS
JIO PLATFORMS LIMITED INDIAN OFFICE-101, SAFFRON, NR. CENTRE POINT, PANCHWATI 5 RASTA, AMBAWADI, AHMEDABAD 380006, GUJARAT, INDIA
3.PREAMBLE TO THE DESCRIPTION
THE FOLLOWING SPECIFICATION PARTICULARLY DESCRIBES THE NATURE OF THIS INVENTION AND THE MANNER IN WHICH IT IS TO BE PERFORMED.
FIELD OF THE INVENTION
[0001] The present invention relates to the field of telecommunications and network management, more particularly relates to a method and system for enrichment of data records.
BACKGROUND OF THE INVENTION
[0002] Network analysis techniques are invaluable tools for identifying and resolving issues in communication networks. These techniques encompass various approaches, including performance monitoring, packet analysis, protocol analysis, and traffic flow analysis. By examining network data and traffic patterns, service providers can gain insights into network performance, identify anomalies, and pinpoint the root causes of issues.
[0003] However, most of the conventional techniques may be limited by geographical considerations and may not provide adequate or a true sense of analytical data for network issues resolution or network insights evaluation.
[0004] Thus, there is a need for a solution which solves the above problem.
SUMMARY OF THE INVENTION
[0005] One or more embodiments of the present invention provides a method and a system for enrichment of data records.
[0006] In one aspect of the present invention, the method for enrichment of the data records is disclosed. The method includes the step of receiving the data records pertaining to a plurality of network elements. The method further includes the step of fetching from a storage unit, one or more pre-defined policies of each of the network elements. The method further includes the step of performing validation on the data records by applying the fetched one or more pre-defined policies to the data records. The method further includes the step of extracting clear codes from the data records. The method further includes the step of enriching the data records utilizing the extracted clear codes.
[0007] In one embodiment, the step of receiving data records pertaining to a plurality of network elements includes the steps of collecting at a collection component the raw data record received from the plurality of network elements. Further the step of receiving data records includes screening the collected raw data records.
[0008] In one embodiment, the step of fetching from a storage unit, one or more pre-defined policies of each of the network elements includes the step of determining a location in the storage unit, which includes the one or more pre-defined policies of each of the plurality of network elements and fetching, the one or more pre-defined policies from the determined location.
[0009] In one embodiment, the one or more pre-defined policies define criteria to validate the data records with reference to the patterns and data formats.
[0010] In one embodiment, the extracted clear codes include information related to at least one of, procedure names, service operations and interface details.
[0011] In one embodiment, the step of enriching the data records utilizing the extracted clear codes from the data records includes the step of dynamically adding one or more essential fields to the data records utilizing the extracted clear codes based on the corresponding one or more pre-defined policies and one or more pre-defined conditions.
[0012] In one embodiment, the one or more essential fields include at least one of a clear code, a Network Function (NF) instance identifier, a circle and a procedure name.
[0013] In one embodiment, the plurality of network elements includes data sources such as at least one of, a Network Function (NF) and a probe.
[0014] In one embodiment, the storage unit includes at least one of, a file system located in a server and a database.
[0015] In one embodiment, the data records include at least one of, Streaming Data Records (SDRs).
[0016] In one embodiment, wherein the enrichment data records include at least one of, operation and management metadata, probe solutioning headers and other user defined static content.
[0017] In another aspect of the present invention, a system for enrichment of data records is disclosed. The system includes a transceiver configured to receive data records pertaining to a plurality of network elements. The system further includes a fetching unit configured to fetch from a storage unit, one or more pre-defined policies of each of the network elements. The system further includes a performing unit, configured to perform, a validation on the data records by applying the fetched one or more pre-defined policies to the data records. The system further includes an extraction unit configured to extract clear codes from the data records. The system further includes an enriching unit, configured to enrich the data records utilizing the extracted clear codes.
[0018] In yet another aspect of the present invention, a non-transitory computer-readable medium having stored thereon computer-readable instructions that, when executed by a processor, causes the processor to receive, data records pertaining to a plurality of network elements. The processor is further configured to fetch, from a storage unit, one or more pre-defined policies of each of the network elements. The processor is further configured perform, a validation on the data records by applying the fetched one or more pre-defined policies to the data records. The processor upon successful validation of data records is further configured to extract clear codes from the data records. The system is further configured to enrich the data records utilizing the extracted clear codes.
[0019] Other features and aspects of this invention will be apparent from the following description and the accompanying drawings. The features and advantages described in this summary and in the following detailed description are not all-inclusive, and particularly, many additional features and advantages will be apparent to one of ordinary skill in the relevant art, in view of the drawings, specification, and claims hereof. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes and may not have been selected to delineate or circumscribe the inventive subject matter, resort to the claims being necessary to determine such inventive subject matter.
BRIEF DESCRIPTION OF THE DRAWINGS
[0020] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components, electronic components or circuitry commonly used to implement such components.
[0021] FIG. 1 is an exemplary block diagram of a communication system for enrichment of data records, according to one or more embodiments of the present disclosure;
[0022] FIG. 2 is an exemplary block diagram of a system for the enrichment of the data records, according to one or more embodiments of the present disclosure;
[0023] FIG. 3 is a schematic representation of a workflow of the system of FIG. 2 communicably coupled with a User equipment (UE), according to one or more embodiments of the present disclosure
[0024] FIG. 4 is an exemplary diagram of an architecture of the system of FIG. 2, according to one or more embodiments of the present disclosure;
[0025] FIG. 5 is a signal flow diagram for the enrichment of the data records, according to one or more embodiments of the present disclosure; and
[0026] FIG. 6 is a flow chart illustrating a method for the enrichment of the data records, according to one or more embodiments of the present disclosure.
[0027] The foregoing shall be more apparent from the following detailed description of the invention.
DETAILED DESCRIPTION OF THE INVENTION
[0028] Some embodiments of the present disclosure, illustrating all its features, will now be discussed in detail. It must also be noted that as used herein and in the appended claims, the singular forms "a", "an" and "the" include plural references unless the context clearly dictates otherwise.
[0029] Various modifications to the embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments. However, one of ordinary skill in the art will readily recognize that the present disclosure including the definitions listed here below are not intended to be limited to the embodiments illustrated but is to be accorded the widest scope consistent with the principles and features described herein.
[0030] A person of ordinary skill in the art will readily ascertain that the illustrated steps detailed in the figures and here below are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
[0031] The present disclosure addresses the challenges faced in established technologies where the conventional techniques may be limited by geographical considerations and may not provide suitable or true sense of analytical data for network issues resolution or network insights evaluation. The solution provides slice-level debugging, performance analysis, and insights into cell performance, the invention facilitates the optimization of network performance, minimizes service disruptions, and facilitates the overall quality of service of the network. The present invention facilitates the end users to gain valuable insights and perform in-depth analysis based on network slices. By analyzing data at the network slice level, the network operators can identify the impact of slice performance on cell performance and alter their optimizations in accordance with the analysis.
[0032] Referring to FIG. 1, FIG. 1 illustrates an exemplary block diagram of a communication system 100 for enrichment of data records, according to one or more embodiments of the present disclosure. The communication system 100 includes a network 105, a User Equipment (UE) 110, a server 115, and a system 120. The UE 110 aids a user to interact with the system 120. In an embodiment, the UE 110 is one of, but not limited to, any electrical, electronic, electro-mechanical or an equipment and a combination of one or more of the above devices such as virtual reality (VR) devices, augmented reality (AR) devices, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other computing device.
[0033] For the purpose of description and explanation, the description will be explained with respect to the UE 110, or to be more specific will be explained with respect to a first UE 110a, a second UE 110b, and a third UE 110c, and should nowhere be construed as limiting the scope of the present disclosure. Each of the first UE 110a, the second UE 110b, and the third UE 110c is configured to connect to the server 115 via the network 105. As per the illustrated embodiment, the communication system 100 includes one or more base stations 125. In alternate embodiments, the UE 110 may include a plurality of UEs as per the requirement. For ease of reference, each of the first UE 110a, the second UE 110b, and the third UE 110c, will hereinafter be collectively and individually referred to as the “User Equipment (UE) 110”.
[0034] For the purpose of description and explanation, the description will be explained with respect to one or more base stations 125, or to be more specific will be explained with respect to a first base station 125a, a second base station 125b, and a third base station 125c, and should nowhere be construed as limiting the scope of the present disclosure. For ease of reference, each of the first base station 125a, the second base station 125b, and the third base station 125c, will hereinafter be collectively and individually referred to as the “base station 125”.
[0035] The first base station 125a includes, by way of example but not limitation, a cell site, cell phone tower, or cellular base station. Each of the first base station 125a, the second base station 125b, and the third base station 125c is a cellular-enabled mobile device site where antennas and electronic communications equipment are placed (typically on a radio mast, tower, or other raised structure) to create a cell, or adjacent cells, in the communication network. The structure typically supports an antenna and one or more sets of transmitters/receivers, digital signal processors, control electronics, a GPS receiver for timing, primary and backup electrical power sources, and sheltering.
[0036] The network 105 may include, by way of example but not limitation, at least a portion of one or more networks having one or more nodes that transmit, receive, forward, generate, buffer, store, route, switch, process, or a combination thereof, etc. one or more messages, packets, signals, waves, voltage or current levels, some combination thereof, or so forth. The network 105 may also include, by way of example but not limitation, one or more of a wireless network, a wired network, an internet, an intranet, a public network, a private network, a packet-switched network, a circuit-switched network, an ad hoc network, an infrastructure network, a Public-Switched Telephone Network (PSTN), a cable network, a cellular network, a satellite network, a fiber optic network, or some combination thereof.
[0037] The network 105 includes, by way of example but not limitation, one or more of a wireless network, a wired network, an internet, an intranet, a public network, a private network, a packet-switched network, a circuit-switched network, an ad hoc network, an infrastructure network, a Public-Switched Telephone Network (PSTN), a cable network, a cellular network, a satellite network, a fiber optic network, or some combination thereof. The network 105 may include, but is not limited to, a Third Generation (3G), a Fourth Generation (4G), a Fifth Generation (5G), a Sixth Generation (6G), a New Radio (NR), a Narrow Band Internet of Things (NB-IoT), an Open Radio Access Network (O-RAN), and the like.
[0038] The network 105 may also include, by way of example but not limitation, at least a portion of one or more networks having one or more nodes that transmit, receive, forward, generate, buffer, store, route, switch, process, or a combination thereof, etc. one or more messages, packets, signals, waves, voltage or current levels, some combination thereof, or so forth. The network 105 may also include, by way of example but not limitation, one or more of a wireless network, a wired network, an internet, an intranet, a public network, a private network, a packet-switched network, a circuit-switched network, an ad hoc network, an infrastructure network, a Public-Switched Telephone Network (PSTN), a cable network, a cellular network, a satellite network, a fiber optic network, a VOIP or some combination thereof.
[0039] The communication system 100 includes the server 115 accessible via the network 105. The server 115 may include by way of example but not limitation, one or more of a standalone server, a server blade, a server rack, a bank of servers, a server farm, hardware supporting a part of a cloud service or system, a home server, hardware running a virtualized server, one or more processors executing code to function as a server, one or more machines performing server-side functionality as described herein, at least a portion of any of the above, some combination thereof. In an embodiment, the entity may include, but is not limited to, a vendor, a network operator, a company, an organization, a university, a lab facility, a business enterprise side, a defense facility side, or any other facility that provides service.
[0040] The communication system 100 further includes the system 120 communicably coupled to the server 115 and the UE 110 via the network 105. The system 120 is adapted to be embedded within the server 115 or is embedded as the individual entity. However, for the purpose of description, the system 120 is illustrated as remotely coupled with the server 115, without deviating from the scope of the present disclosure.
[0041] Operational and construction features of the system 120 will be explained in detail with respect to the following figures.
[0042] FIG. 2 illustrates an exemplary block diagram of the system 120 for enrichment of the data records, according to one or more embodiments of the present disclosure.
[0043] As per the illustrated embodiment, the system 120 includes one or more processors 205, a memory 210, a user interface 215 and a database 220. For the purpose of description and explanation, the description will be explained with respect to one processor 205 and should nowhere be construed as limiting the scope of the present disclosure. In alternate embodiments, the system 120 may include more than one processor 205 as per the requirement of the network 105. The one or more processors 205, hereinafter referred to as the processor 205 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, single board computers, and/or any devices that manipulate signals based on operational instructions.
[0044] As per the illustrated embodiment, the processor 205 is configured to fetch and execute computer-readable instructions stored in the memory 210. The memory 210 may be configured to store one or more computer-readable instructions or routines in a non-transitory computer-readable storage medium which may be fetched and executed to display the enriched data to the user via the user interface in order to perform analysis. The memory 210 may include any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as disk memory, EPROMs, FLASH memory, unalterable memory, and the like.
[0045] In an embodiment, the user interface 215 includes a variety of interfaces, for example, interfaces for data input and output devices, referred to as Input/Output (I/O) devices, storage devices, and the like. The user interface 215 facilitates communication of the system 120. In one embodiment, the user interface 215 provides a communication pathway for one or more components of the system 120.
[0046] In an embodiment, the database 220 is one of, but not limited to, a centralized database, a cloud-based database, a commercial database, an open-source database, a distributed database, an end-user database, a graphical database, a No-Structured Query Language (NoSQL) database, an object-oriented database, a personal database, an in-memory database, a document-based database, a time series database, a wide column database, a key value database, a search database, a cache databases, and so forth. The foregoing examples of database 220 types are non-limiting and may not be mutually exclusive e.g., the database can be both commercial and cloud-based, or both relational and open-source, etc.
[0047] In order for the system 120 to enrich the data records, the processor 205 includes one or more modules. In one embodiment, the one or more modules includes, but not limited to, a transceiver 225, a storing unit 230, a fetching unit 235, a performing unit 240, an extraction unit 245, and an enrichment unit 250 communicably coupled to each other.
[0048] The transceiver 225, the storing unit 230, the fetching unit 235, the performing unit 240, the extraction unit 245, and the enrichment unit 250 in an embodiment, may be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processor 205. In the examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processor 205 may be processor-executable instructions stored on a non-transitory machine-readable storage medium and the hardware for processor 205 may comprise a processing resource (for example, one or more processors), to execute such instructions. In the present example, the memory 210 may store instructions that, when executed by the processing resource, implement the processor 205. In such examples, the system 120 may comprise the memory 210 storing the instructions and the processing resource to execute the instructions, or the memory 210 may be separate but accessible to the system 120 and the processing resource. In other examples, the processor 205 may be implemented by electronic circuitry.
[0049] The transceiver 225 of the system 120 is configured to receive the data records pertaining to the plurality of network elements. In an embodiment, the plurality of network elements includes data sources such as at least one of, a Network Function (NF) and a probe. The NF refers to a component that provides specific network services within the network 105. In an embodiment the NF includes, but not limited to, Access and Mobility Management Function (AMF), User Plane Function (UPF), Session Management Function (SMF), Policy Control Function (PCF), Authentication Server Function (AUSF), Network Slice Selection Function (NSSF), Application Function (AF). In one embodiment, the plurality of the network elements may include, but not limited to, Next Generation Node B (GnodeBs), core network elements, network slicing components. In an embodiment, the transceiver 225 receives data records pertaining to a plurality of network elements by collecting at a collection component the raw data record received from the plurality of network elements. Upon collecting, the transceiver 225 is further configured to screen the collected raw data records. The data records include at least one of, Streaming Data Records (SDRs). The SDRs refers to structured data records containing information pertaining to the plurality of network elements, transactions, events, or activities within the network 105.
[0050] Upon receiving the data records from the plurality of network elements, the fetching unit 235 of the system 120 is configured to fetch from a storage unit 230 one or more pre-defined policies of each of the network elements. In order to do so, the fetching unit 235 is configured to determine a location of the one or more pre-defined policies of each of the plurality of network elements in the storage unit230. The storage unit 230 includes the one or more pre-defined policies of each of the plurality of network elements. In an embodiment, the storage unit 230 includes at least one of, a file system located in the server 115 and the database 220.
[0051] In an embodiment, the one or more pre-defined policies defines criteria to validate the data records with reference to the expected patterns and data formats. The expected patterns includes, but is not limited to, timestamps, message structure, data integrity, and session state. The expected data formats includes, but is not limited to, field validation, protocol compliance, encoding standards, and metadata.
[0052] Upon fetching the one or more pre-defined policies of each of the plurality of network elements, the performing unit 240 of the system 120 is configured to perform a validation on the data records by applying the fetched one or more pre-defined policies to the data records. The one or more predefined network policies are stored in the configured location in the file system 315 of the server 115.
[0053] Upon successful validation of the data records, the extraction unit 245 of the system 120 is configured to extract clear codes from the data records. In an embodiment, the clear codes refer to identifiers used within the system 120 to indicate various conditions, events, or states. The clear codes facilitate network management, troubleshooting, and communication between network elements of the network 105. The extracted clear codes include information related to at least one of, procedure names, service operations and interface details.
[0054] Upon extracting the clear codes from the data records, the enriching unit 250 of the system 120 is configured to enrich the data records utilizing the extracted clear codes from the data records. The enriching unit 250 enriches the data records by dynamically adding one or more essential fields to the data records utilizing the extracted clear codes based on the corresponding one or more pre-defined policies. In an embodiment the one or more essential fields includes at least one of, clear code, Network Function (NF) instance identifier, circle and procedure name. The one or more essential fields include at least one of, Network Function (NF) instance identifier, circle and procedure name. In an embodiment, the enrichment data records include at least one of, operation and management metadata, probe solutioning headers and other user defined static content.
[0055] FIG. 3 is an exemplary architecture 300 which can be implemented in the system 120 of the FIG. 2 for managing data of a network slice of at least one cell, according to one or more embodiments of the present invention. The exemplary embodiment as illustrated in the FIG. 3 includes one or more Network functions (NF) 305, a probing agent 310, a file system 315, a data collection unit 320, a conductor 325, the user interface 215, and a data filtration 330.
[0056] The data collection unit 320 receives the raw data records, such as the SDR, from the NF 305, the probing agent 310, the files system 315. The data collection unit 320 is communicably coupled with the conductor 325 and transmits the collected SDRs to the conductor 325.
[0057] Upon receiving the SDRs from the data collection unit 320, the conductor 325 is configured to perform initial validation of the collected SDRs. The one or more predefined network policies, which are registered for each of the specific NF 305, call flows, and versions, are fetched from a configured location in the file system 315. In an embodiment, the one or more pre-defined policies define the criteria for validating the SDRs against expected patterns and data formats.
[0058] Upon the completion of the validation process of the SDRs, the conductor 325 initiates the smart segregation of clear codes from the SDRs. In one embodiment, AI/ML techniques are implemented for smart segregation of clear codes from the data records. The clear codes include but are not limited to sub-components such as procedure names, service operations, interface details, identified and extracted from the SDRs. Further, the conductor 325 performs various operations, such as, but not limited to, matching, substring, concatenation, on single or multiple fields of the SDRs. In an embodiment, the conductor 325 performs operations to enrich the extracted clear code details and add relevant information to the collected SDRs.
[0059] In an embodiment, the architecture 300 includes the policy fetch module to fetch the specific conditions and enrich the one or more pre-defined policies from the user via the user interface 215. The one or more pre-defined policies includes, but not limited to, operation and management metadata, probing agent solutioning headers, static content.
[0060] Upon segregation and initial enrichment of the extracted clear code, the conductor 325 is configured to enrich the SDRs in real-time based on specific conditions and the one or more pre-defined policies.
[0061] The conductor 325 receives the raw data records such as SDRs from the one or more NF 305, and the probing agent 310, over a specified network protocol. The network protocol refers to the specific communication protocol that governs the SDR transmission between different the components in the architecture 300.
[0062] Upon receiving the SDRs, the conductor 325 is configured to validate the SDRs by applying one or more pre predefined network policies, which are registered for the NF 305, call flows and version in the validation module of the conductor 325. The one or more pre-defined network policies are stored in the configured location in the file system 315 of the server 115 fetches the conductor 325 and are applied for the validation of the SDRs. In an embodiment, the one or more pre-defined policies defines criteria to validate the SDRs with reference to the expected patterns and data formats. The expected patterns can include but are not limited to, timestamps, message structure, data integrity, session state. The expected data formats can include but are not limited to, field validation, protocol compliance, encoding standards, metadata.
[0063] Further upon successful validation of the SDRs the conductor 325 initiates the segregation of clear codes from the data records. In one embodiment, the AI/ML techniques are implemented for the segregation of the clear codes from the data records. The AI/ML techniques can include for example, but not limited to, Natural Language Processing (NLP) for text extraction, pattern recognition and classification, clustering and segmentation, deep learning for Sequence analysis, information retrieval and document parsing. The clear codes include, for example but not limited to, procedure names, service operations, interface details are identified and extracted from the SDRs by the conductor 325. Further the conductor 325 performs operations such as but not limited to match, substring, concatenation, and more, on single or multiple fields of the SDRs to enrich the extracted clear code details and add relevant information to the records.
[0064] Upon segregation and initial enrichment, the conductor 325 fetches the enrichment policies such as but not limited to, NF instance identifier, circle and procedure name defined by the user via the user interface 215. The conductor 325 based on the specified polices incorporates additional means and methods to identify data points and enrich the SDRs in the conductor 325. The additional means and methods include, but not limited to, temporal enrichment, Quality of Service (QoS) metrics, security and compliance attributes, service orchestration and automation, predictive analytics and forecasting. The enrichment of the SDRs contains essential fields such as, but not limited to, NF, instance ID, circle, procedure name. The conductor 325 supports multiple enrichment types such as but not limited to, Operation and Management Metadata, which includes details during broadcast messages, probing agent Solutioning headers, which includes details from specified network protocol of the network 105 headers of probing agent 310 data collectors, static content, which facilitates user-defined values to be added to the enriched SDRs.
[0065] The architecture 300 facilitates an efficient and scalable solution for segregation of clear codes and enrichment of data records in the network 105. By leveraging the conductor 325 and predefined network policies, the architecture 300 facilitates the accurate extraction and enrichment of valuable information from the SDRs, enabling enhanced analysis, error detection, and real-time data enrichment.
[0066] FIG. 4 is a signal flow diagram for managing data of a network slice of at least one cell, according to one or more embodiments of the present invention. For the purpose of description, the signal flow diagram is described with the embodiments as illustrated in FIG. 2 and should nowhere be construed as limiting the scope of the present disclosure.
[0067] At step 405, the data collection unit 320 receives the raw data records such as Streaming Data Records (SDR) form the one or more NFs 305, probing agent 310, and the file system 315. In an embodiment the SDR refers to detailed records of data usage such as but not limited to volume of data, type of data, session duration and network activity such as but not limited, connection establishment, session management, quality of service parameters generated by mobile network operators. These records are crucial for billing purposes, network optimization, and maintaining quality of service.
[0068] At step 410, upon receiving the SDRs, the data collection unit 320 is communicably coupled with the conductor 325, transmits the collected SDR to the conductor 325. The SDR refers to detailed records of data usage and network activity generated by mobile network operators. These records are crucial for billing purposes, network optimization, and maintaining quality of service.
[0069] At step 415, upon receiving the collected SDRs, the conductor 325 interacts with data collection unit 320 over a specified network protocol interface and receives the validated streaming data records (SDRs). The conductor 325 validates SDRs by applying predefined network policies fetches by the user via the user interface, which are registered for specific NF, Call flows and version. Further the conductor 325 enriches the received SDRs by adding a few more details based on the policies configured. The enrichment type includes, but not limited to, Operation and Management Metadata, which includes details during broadcast messages, probing agent Solutioning headers, which includes details from specified network protocol of the network 105 headers of probing agent data collectors, static content, which facilitates user-defined values to be added to the enriched SDR.
[0070] At step 420, upon successful validation and enrichment of the SDRs, the conductor 325 starts queuing and processing for the filtration. The conductor 325 transmits the enriched SDRs to the data filtration 330
[0071] FIG. 5 is a flow chart illustrating a method 500 for detecting the enrichment of the data records.
[0072] At step 505, the method 500 includes the step of receiving data records pertaining to a plurality of network elements. In an embodiment, the plurality of network elements includes, but not limited to, data sources such as at least one of, a Network Function (NF) and a Probe. The NF refers to a specific component, which provides specific network services within the network 105. In an embodiment the NF can include but not limited to, Access and Mobility Management Function (AMF), User Plane Function (UPF), Session Management Function (SMF), Policy Control Function (PCF), Authentication Server Function (AUSF), Network Slice Selection Function (NSSF), Application Function (AF). In one embodiment, the plurality of the network elements may include, but not limited to, GnodeBs, core network elements, network slicing components. In an embodiment, the received data records pertaining to a plurality of network elements by collecting at a collection component the raw data record received from the plurality of network elements. Upon collecting the raw data records, the further includes screening the collected raw data records. The data records include at least one of, Streaming Data Records (SDRs). The SDRs refers to structured data records containing information about various network elements, transactions, events, or activities within the network 105.
[0073] At step 510, the method 500 includes the step of fetching from a storage unit one or more pre-defined policies of each of the network elements. The fetching from the storage unit, one or more pre-defined policies of each of the network elements is performed determining a location in the storage unit. The storage unit includes the one or more pre-defined policies of each of the plurality of network elements. In an embodiment, storage unit includes at least one of, a file system located in the server 115 and the database 220. In an embodiment, the one or more pre-defined policies defines criteria to validate the data records with reference to the expected patterns and data formats. The expected patterns can include but are not limited to, timestamps, message structure, data integrity, session state. The expected data formats can include but are not limited to, field validation, protocol compliance, encoding standards, metadata.
[0074] At step 515, the method 500 includes the step of validation on the data records by applying the fetched one or more pre-defined policies to the data records. The one or more predefined network policies are stored in the configured location in the file system 315 of the server 115 fetches the conductor 325 and are applied for validation of the SDRs
[0075] At step 520, the method 500 includes the step of extracting clear codes from the data records. In an embodiment, the clear codes refer to the identifiers used within the system 120 to indicate various conditions, events, or states. The clear codes facilitate network management, troubleshooting, and communication between network elements of the network 105. The extracted clear codes include information related to at least one of, procedure names, service operations and interface details.
[0076] At step 525, the method 500 includes the step of enriching the data records utilizing the extracted clear codes. wherein the enriching unit, enriches, the data records utilizing the extracted clear codes from the data records, by dynamically adding one or more essential fields to the data records utilizing the extracted clear codes based on the corresponding one or more pre-defined policies and one or more pre-defined conditions. The one or more essential fields include at least one of, Network Function (NF) instance identifier, circle and procedure name. In an embodiment, the enrichment data records include at least one of, operation and management metadata, probe solutioning headers and other user defined static content.
[0077] A person of ordinary skill in the art will readily ascertain that the illustrated embodiments and steps in description and drawings (FIG.1-5) are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
[0078] The present disclosure incorporates technical advancement that facilitates the end users to gain valuable insights and perform in-depth analysis based on network slices. By analyzing data at the network slice level, the network operators can understand the impact of slice performance on the cell performance and alter their optimizations. The solution facilitates debugging the network slice data of the at least one cell, determining at least one of radio and network parameters of each of the at least one cell of the network slice based on debugging and identifying, a pattern/trend corresponding to the identified at least one of, the radio and the network parameters within specific network slices. This facilitates comprehensive end-to-end management and network surveillance. Further the comprehensive approach facilitates network operator to address issues efficiently, optimize network performance, and align their business objectives with network environment analysis.
[0079] The present invention provides various advantages, including optimal resource utilization and reduced execution time. By eliminating the limited geographical considerations, further the system facilitates suitable or true sense of analytical data for the network issues resolution. The solution performs network slice data analysis on to compute information pertaining to the network slice, which facilitates identifying a pattern/trend corresponding to the at least one of, the radio and the network parameters. The solution provides slice-level debugging, performance analysis, and provide the user to have insights into cell performance. Further the invention facilitates the optimization of network performance, minimizes service disruptions, and facilitates the overall quality of service of the network.
[0080] The present invention offers multiple advantages over the prior art and the above listed are a few examples to emphasize on some of the advantageous features. The listed advantages are to be read in a non-limiting manner.
REFERENCE NUMERALS
[0081] Communication system – 100
[0082] Network – 105
[0083] User Equipment – 110
[0084] Server – 115
[0085] System – 120
[0086] Processor -205
[0087] Memory – 210
[0088] User Interface – 215
[0089] Database- 220
[0090] Transceiver – 225
[0091] Fetching unit – 230
[0092] Performing unit – 235
[0093] Extraction unit – 240
[0094] Enrichment unit – 245
[0095] Network functions (NF) – 305
[0096] Probing agent – 310
[0097] File system – 315
[0098] Data collection unit – 320
[0099] Conductor – 325
[00100] Data filtration - 330
,CLAIMS:CLAIMS
We Claim:
1. A method (500) for enrichment of data records, the method comprises the steps of:
receiving (505), by one or more processors, data records pertaining to a plurality of network elements;
fetching (510), by the one or more processors, from a storage unit, one or more pre-defined policies of each of the network elements;
performing (515), by the one or more processors, a validation on the data records by applying the fetched one or more pre-defined policies to the data records;
upon successful validation of the data records, extracting (520), by the one or more processors, clear codes from the data records; and
enriching (525), by the one or more processors, the data records utilizing the extracted clear codes.
2. The method (500) as claimed in claim 1, wherein the step of, receiving, data records pertaining to a plurality of network elements, includes the steps of:
collecting, by one or more processors, at a collection component, the raw data records received from the plurality of network elements; and
screening, by the one or more processors, the collected raw data records.
3. The method (500) as claimed in claim 1, wherein the step of, fetching, from a storage unit, one or more pre-defined policies of each of the network elements includes the step of:
determining, by the one or more processors, a location in the storage unit, which includes the one or more pre-defined policies of each of the plurality of network elements; and
fetching, by the one or more processors, the one or more pre-defined policies from the determined location.
4. The method (500) as claimed in claim 1, wherein the one or more pre-defined policies define criteria to validate the data records with reference to the patterns and data formats.
5. The method (500) as claimed in claim 1, wherein the extracted clear codes include information related to at least one of, procedure names, service operations and interface details.
6. The method (500) as claimed in claim 1, wherein the step of, enriching, the data records utilizing the extracted clear codes from the data records, includes the step of:
dynamically adding, by the one or more processors, one or more essential fields to the data records utilizing the extracted clear codes based on the corresponding one or more pre-defined policies and one or more pre-defined conditions.
7. The method (500) as claimed in claim 6, wherein the one or more essential fields include at least one of, clear code, Network Function (NF) instance identifier, circle and procedure name.
8. The method (500) as claimed in claim 1, wherein the plurality of network elements include data sources such as at least one of, a Network Function (NF) and a probe.
9. The method as claimed in claim 1, wherein storage unit includes at least one of, a file system located in a server and a database.
10. The method (500) as claimed in claim 1, wherein the data records include at least one of, Streaming Data Records (SDRs).
11. The method (500) as claimed in claim 1, wherein the enrichment data records include at least one of, operation and management metadata, probe solutioning headers and other user defined static content.
12. A system (120) for enrichment of data records, the system comprising:
a transceiver (225), configured to, receive, data records pertaining to a plurality of network elements;
a fetching unit (235), configured to, fetch, from a storage unit (230), one or more pre-defined policies of each of the network elements;
a performing unit (240), configured to, perform, a validation on the data records by applying the fetched one or more pre-defined policies to the data records;
upon successful validation of the data records, an extraction unit (245), configured to, extract, clear codes from the data records; and
an enriching unit (250), configured to enrich, the data records utilizing the extracted clear codes.
13. The system (120) as claimed in claim 12, wherein the transceiver, receives, data records pertaining to a plurality of network elements, by:
collecting, at a collection component, the raw data records received from the plurality of network elements; and
screening, the collected raw data records.
14. The system (120) as claimed in claim 12, wherein the fetching unit, fetches from a storage unit, one or more pre-defined policies of each of the network elements, by:
determining, a location in the storage unit, which includes the one or more pre-defined policies of each of the plurality of network elements; and
fetching, the one or more pre-defined policies from the determined location.
15. The system (120) as claimed in claim 12, wherein the one or more pre-defined policies define criteria to validate the data records with reference to the expected patterns and data formats.
16. The system (120) as claimed in claim 12, wherein the extracted clear codes include information related to at least one of, procedure names, service operations and interface details.
17. The system (120) as claimed in claim 12, wherein the enriching unit, enriches, the data records utilizing the extracted clear codes from the data records, by:
dynamically adding, one or more essential fields to the data records utilizing the extracted clear codes based on the corresponding one or more pre-defined policies and one or more pre-defined conditions.
18. The system (120) as claimed in claim 17, wherein the one or more essential fields include at least one of, Network Function (NF) instance identifier, circle and procedure name.
19. The system (120 as claimed in claim 12, wherein the plurality of network elements include data sources such as at least one of, a Network Function (NF) and a Probe (Probe).
20. The system (120) as claimed in claim 12, wherein storage unit includes at least one of, a file system located in a server and a database.
21. The system (120) as claimed in claim 12, wherein the data records include at least one of, Streaming Data Records (SDRs).
22. The system (120) as claimed in claim 12, wherein the enrichment data records include at least one of, operation and management metadata, probe solutioning headers and other user defined static content.
| # | Name | Date |
|---|---|---|
| 1 | 202321048724-STATEMENT OF UNDERTAKING (FORM 3) [19-07-2023(online)].pdf | 2023-07-19 |
| 2 | 202321048724-PROVISIONAL SPECIFICATION [19-07-2023(online)].pdf | 2023-07-19 |
| 3 | 202321048724-FORM 1 [19-07-2023(online)].pdf | 2023-07-19 |
| 4 | 202321048724-FIGURE OF ABSTRACT [19-07-2023(online)].pdf | 2023-07-19 |
| 5 | 202321048724-DRAWINGS [19-07-2023(online)].pdf | 2023-07-19 |
| 6 | 202321048724-DECLARATION OF INVENTORSHIP (FORM 5) [19-07-2023(online)].pdf | 2023-07-19 |
| 7 | 202321048724-FORM-26 [03-10-2023(online)].pdf | 2023-10-03 |
| 8 | 202321048724-Proof of Right [08-01-2024(online)].pdf | 2024-01-08 |
| 9 | 202321048724-DRAWING [17-07-2024(online)].pdf | 2024-07-17 |
| 10 | 202321048724-COMPLETE SPECIFICATION [17-07-2024(online)].pdf | 2024-07-17 |
| 11 | Abstract-1.jpg | 2024-09-05 |
| 12 | 202321048724-Power of Attorney [25-10-2024(online)].pdf | 2024-10-25 |
| 13 | 202321048724-Form 1 (Submitted on date of filing) [25-10-2024(online)].pdf | 2024-10-25 |
| 14 | 202321048724-Covering Letter [25-10-2024(online)].pdf | 2024-10-25 |
| 15 | 202321048724-CERTIFIED COPIES TRANSMISSION TO IB [25-10-2024(online)].pdf | 2024-10-25 |
| 16 | 202321048724-FORM 3 [03-12-2024(online)].pdf | 2024-12-03 |
| 17 | 202321048724-FORM 18 [20-03-2025(online)].pdf | 2025-03-20 |