Abstract: The present disclosure provides a system (108) and a method (300B) to monitor mated pair configuration in a wireless network. The system (108) automatically shifts diameter signaling traffic of particular session towards its mated peer (i.e., another peer of the pair), despite of having multiple peers at a primary site for achieving session stickiness, when any unreachability is observed. The system (108) auto-shifts the diameter signaling traffic of particular session from a secondary peer to a primary peer once connection with the primary peer is re-established. Thereby, maintaining a robust and reliable network infrastructure with minimal disruptions in the network. The system (108) enables seamless transition and efficient utilization of resources by ensuring that the diameter signaling traffic is directed to the primary/secondary site without any manual intervention as per network situation and session stickiness characteristics of the network. FIG. 3A
FORM 2
THE PATENTS ACT, 1970
THE PATENTS RULES, 2003
COMPLETE SPECIFICATION
APPLICANT
380006, Gujarat, India; Nationality : India
The following specification particularly describes
the invention and the manner in which
it is to be performed
RESERVATION OF RIGHTS
[0001] A portion of the disclosure of this patent document contains material
which is subject to intellectual property rights such as, but are not limited to, copyright, design, trademark, integrated circuit (IC) layout design, and/or trade dress protection, belonging to Jio Platforms Limited (JPL) or its affiliates (herein after referred as owner). The owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights whatsoever. All rights to such intellectual property are fully reserved by the owner.
TECHNICAL FIELD
[0002] The present disclosure relates to a field of a wireless network, and
specifically to a system and a method for mated pair configuration in a wireless
network.
DEFINITION
[0003] As used in the present disclosure, the following terms are generally
intended to have the meaning as set forth below, except to the extent that the context
in which they are used to indicate otherwise.
[0004] Network functions (NFs) are the logical entities or software-based
functionalities that define how the network operates and processes data.
[0005] Peer refers to a device or entity that has equal standing with another
device or entity within a network topology. Peers are usually part of the same
network or network segment and communicate with each other directly, often
exchanging data, services, or resources without the need for intermediaries.
[0006] Network node refers to any device or entity on a network that can
send, receive, or forward data packets. Nodes can vary widely in their form and
function, ranging from simple end-user devices like computers and smartphones to
complex networking equipment like routers, switches, and gateways.
[0007] Diameter connection refers to the establishment of a communication
link between two Diameter nodes within a network. Diameter is a protocol used in
telecommunications and networking for Authentication, Authorization, and
Accounting (AAA) purposes. Diameter connections are essential for various network functions, including authentication of users, authorization of services, and accounting for usage. These connections facilitate the exchange of Diameter messages between Diameter peers, enabling the implementation of advanced network services and functionalities.
[0008] Diameter connection status refers to a state or condition of the
diameter connection within a telecommunications network. The diameter connection status can be connected, disconnected, idle, busy, error, etc. Monitoring of the diameter connection status is important for network administrators to ensure the reliability, performance, and security of Diameter-based services within the network.
[0009] Diameter signaling traffic refers to the data exchange occurring
between Diameter nodes within a telecommunications network. Diameter signaling traffic flows between Diameter clients (e.g., Diameter User Agents) and Diameter servers. The Diameter clients initiate requests for authentication, authorization, or accounting, and the Diameter servers respond to these requests and perform the necessary actions based on configured policies. Monitoring Diameter signaling traffic is essential for network administrators to ensure the reliability, security, and performance of services within the network.
[0010] Consumer network function refers to a software application or
service designed to run on network infrastructure within a consumer's environment. These functions can encompass a wide range of services, from basic network routing and security tasks to more specialized functions such as content filtering, parental controls, or Quality of Service (QoS) management. The consumer network function" focuses on the end-user or consumer side of the network.
[0011] The producer network function encompasses functions or services
aimed at managing, optimizing, or securing the network infrastructure within the producer's environment to ensure the smooth delivery of services to consumers. The producer network function refers to the network functions and services that support the infrastructure providing those services.
[0012] Session stickiness is a concept in networking and load balancing that
refers to the practice of directing multiple requests from the same client to the same
server for the duration of a session.
[0013] Internet Protocol (IP) is the fundamental protocol of the Internet
Protocol Suite, responsible for the addressing and routing of packets across networks. In IP addressing, the IP uses unique numerical identifiers called IP addresses to identify devices on the network.
BACKGROUND
[0014] The following description of related art is intended to provide
background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art.
[0015] Network functions are key nodes in 5th Generation (5G) and 4th
Generation (4G) network communicating with each other. The network functions are deployed in primary and secondary architecture to ensure high availability. The primary and secondary nodes (e.g., peers) are located at geographically different locations. There may be multiple peers deployed at the primary site and multiple peers in the secondary site. So, each primary peer may contain its own secondary peer creating a pair of primary peer and secondary peer.
[0016] When session stickiness is needed in the network like all the requests
of particular one session need to be served by same peer or another peer of the pair,
in such case if that primary peer is not able to serve the request, then any other
primary peers may also not be able to serve that request. Therefore, the consumer
network function needs to send a diameter request to secondary peer of that primary
peer at the secondary site. Once the primary peer is able to serve again, there is a
need to switch the diameter signaling traffic back to the primary peer for the
sessions served by that primary peer automatically without manual intervention.
[0017] There is, therefore, a need in the art to improve state of monitoring
connection towards both primary and secondary peers by overcoming the deficiencies of the prior arts.
SUMMARY
[0018] In an exemplary embodiment, a method for directing diameter
signaling traffic between a plurality of peers by a consumer network function in a network is described. The method comprises receiving a request from a user and identifying a primary target peer from the plurality of peers of a primary site. The primary target peer of the primary site and a secondary target peer of a secondary site are configured to form a pair configuration based on internet protocol (IP) details. The method further comprises detecting whether the primary target peer is available based on a diameter connection status. The method comprises on detecting the primary target peer is available, sending the request to the primary target peer. The method further comprises on detecting that the primary target peer is not available, checking the secondary target peer from the pair configuration. The method comprises detecting whether the secondary target peer is available based on the diameter connection status. The consumer network function is configured to periodically retry connection on the primary target peer. The method comprises on detecting the secondary target peer is available, sending the request to the secondary target peer.
[0019] In some embodiments, the method comprises on detecting the
primary and secondary target peers from the pair configuration are not available, dropping the request.
[0020] In some embodiments, the method comprises detecting whether re-
establishment of the connection with the primary target peer is available. The method further comprises on detecting that re-establishment of the connection with the primary target peer is available, performing re-establishment of the connection with the primary target peer. The method comprises triggering shift of the diameter signaling traffic to the primary target peer.
[0021] In some embodiments, the method comprises pre-configuring the
plurality of peers of the primary site and the secondary site of the network into a plurality of pairs of primary target peer and secondary target peer as pair based on the IP details of the plurality peers.
[0022] In some embodiments, the method comprises periodically re-trying
connection on both the primary and secondary target peers when the primary and
secondary target peers from the pair configuration are not available.
[0023] In another exemplary embodiment, a system for directing diameter
signaling traffic between a plurality of peers in a network is described. The system
comprises a consumer network function. The consumer network function comprises
a receiving unit configured to receive a request from a user. A diameter connection
management unit comprises an identification unit configured to identify a primary
target peer from the plurality of peers of a primary site. The primary target peer of
the primary site and a secondary target peer of a secondary site are configured to
form a pair configuration based on internet protocol (IP) details. A detection unit is
configured to detect whether the primary target peer is available based on a diameter
connection status. On detecting that the primary target peer is available, a sending
unit is configured to send the request to the primary target peer. On detecting that
the primary target peer is not available, a checking unit is configured to check the
secondary target peer from the pair configuration. The detection unit is configured
to detect whether the secondary target peer is available based on the diameter
connection status. A connection unit is configured to periodically retry connection
on the primary target peer. On detecting that the secondary target peer is available,
the sending unit is configured to send the request to the secondary target peer.
[0024] In some embodiments, on detecting that the primary and secondary
target peers from the pair configuration are not available, a processing unit is configured to drop the request.
[0025] In some embodiments, the detection unit is configured to detect
whether re-establishment of the connection with the primary target peer is available. On detecting that re-establishment of the connection with the primary target peer is available, the connection unit is configured to perform re-establishment of the connection with the primary target peer and trigger shift of the diameter signaling traffic to the primary target peer.
[0026] In some embodiments, the processing unit is configured to pre-
configure the plurality of peers of the primary site and the secondary site of the
network into a plurality of pairs of primary target peer and secondary target peer as
a pair based on the IP details of the plurality peers.
[0027] In some embodiments, the connection unit is configured to
periodically re-try connection on both the primary and secondary target peers, when
the primary and secondary target peers from the pair configuration are not available.
[0028] In some embodiments, a user equipment (UE) is communicatively
coupled with a system. The coupling comprises steps of receiving, by the system, a
connection request and sending, by the system, an acknowledgment of the
connection request to the UE. The coupling further comprises transmitting a
plurality of signals in response to the connection request. The system is configured
for directing diameter signaling traffic between a plurality of peers in a network.
[0029] The foregoing general description of the illustrative embodiments
and the following detailed description thereof are merely exemplary aspects of the teachings of this disclosure and are not restrictive.
OBJECTS OF THE PRESENT DISCLOSURE
[0030] It is an object of the present disclosure to provide a system and a
method to monitor mated pair configuration in a wireless network.
[0031] It is an object of the present disclosure to automatically shift
diameter signaling traffic of particular session towards its mated peer/nodes, despite
of having multiple peers/nodes at a primary site for achieving session stickiness,
when any unreachability is observed.
[0032] It is an object of the present disclosure to auto-shift the diameter
signaling traffic of particular session from a secondary peer to a primary peer once
connection with primary peer is re-established. Thereby, maintaining a robust and
reliable network infrastructure with minimal disruptions in the network.
[0033] It is an object of the present disclosure to enable seamless transition
and efficient utilization of resources by ensuring that the diameter signaling traffic
is directed to the primary/secondary site without any manual intervention as per
network situation and session stickiness characteristics of the network.
[0034] It is an object of the present disclosure to enable a level of
automation and efficiency that reduces manual efforts and minimizes the risk of
downtime or service disruptions.
[0035] In the figures, similar components and/or features may have the
same reference label. Further, various components of the same type may be
distinguished by following the reference label with a second label that distinguishes
among the similar components. If only the first reference label is used in the
specification, the description is applicable to any one of the similar components
having the same first reference label irrespective of the second reference label.
[0036] The diagrams are for illustration only, which thus is not a limitation
of the present disclosure, and wherein:
[0037] FIG. 1 illustrates an exemplary network architecture in which or with
which embodiments of the present disclosure may be implemented.
[0038] FIG. 2A illustrates an exemplary block diagram of a system, in
accordance with an embodiment of the present disclosure.
[0039] FIG. 2B illustrates an exemplary block diagram of a consumer
network function, in accordance with an embodiment of the present disclosure.
[0040] FIG. 3A illustrates an exemplary flow diagram implementing a pair
configuration method, in accordance with an embodiment of the present disclosure.
[0041] FIG. 3B illustrates an exemplary flow diagram implementing a
method for directing diameter signaling traffic between a plurality of peers by a
consumer network function in a network, in accordance with an embodiment of the
present disclosure.
[0042] FIG. 4 illustrates an exemplary architecture of the system (108), in
accordance with an embodiment of the present disclosure.
[0043] FIG. 5 illustrates an exemplary computer system in which or with
which embodiments of the present disclosure may be implemented.
DETAILED DESCRIPTION
[0044] The following is a detailed description of embodiments of the
disclosure depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the
appended claims.
[0045] In the following description, for the purposes of explanation, various
specific details are set forth in order to provide a thorough understanding of
embodiments of the present disclosure. It will be apparent, however, that
5 embodiments of the present disclosure may be practiced without these specific
details. Several features described hereafter can each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above. Some of the problems discussed above might not be
10 fully addressed by any of the features described herein. Example embodiments of
the present disclosure are described below, as illustrated in various drawings in
which like reference numerals refer to the same parts throughout the different
drawings.
[0046] The ensuing description provides exemplary embodiments only, and
15 is not intended to limit the scope, applicability, or configuration of the disclosure.
Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope
20 of the disclosure as set forth.
[0047] Specific details are given in the following description to provide a
thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, networks, processes, and other
25 components may be shown as components in block diagram form in order not to
obscure the embodiments in unnecessary detail. In other instances, well-known
circuits, processes, algorithms, structures, and techniques may be shown without
unnecessary detail in order to avoid obscuring the embodiments.
[0048] Also, it is noted that individual embodiments may be described as a
30 process that is depicted as a flowchart, a flow diagram, a data flow diagram, a
structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in
9
parallel or concurrently. In addition, the order of the operations may be re-arranged.
A process is terminated when its operations are completed but could have additional
steps not included in a figure. A process may correspond to a method, a function, a
procedure, a subroutine, a subprogram, etc. When a process corresponds to a
5 function, its termination can correspond to a return of the function to the calling
function or the main function.
[0049] The word “exemplary” and/or “demonstrative” is used herein to
mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any
10 aspect or design described herein as “exemplary” and/or “demonstrative” is not
necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed
15 description or the claims, such terms are intended to be inclusive like the term
“comprising” as an open transition word without precluding any additional or other elements.
[0050] Reference throughout this specification to “one embodiment” or “an
embodiment” or “an instance” or “one instance” means that a particular feature,
20 structure, or characteristic described in connection with the embodiment is included
in at least one embodiment of the present disclosure. Thus, the appearances of the phrases “in one embodiment” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined
25 in any suitable manner in one or more embodiments.
[0051] The terminology used herein is to describe particular embodiments
only and is not intended to be limiting the disclosure. As used herein, the singular forms “a”, “an”, and “the” are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms
30 “comprises” and/or “comprising,” when used in this specification, specify the
presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other
10
features, integers, steps, operations, elements, components, and/or groups thereof.
As used herein, the term “and/or” includes any combinations of one or more of the
associated listed items. It should be noted that the terms “mobile device”, “user
equipment”, “user device”, “communication device”, “device” and similar terms
5 are used interchangeably for the purpose of describing the invention. These terms
are not intended to limit the scope of the invention or imply any specific functionality or limitations on the described embodiments. The use of these terms is solely for convenience and clarity of description. The invention is not limited to any particular type of device or equipment, and it should be understood that other
10 equivalent terms or variations thereof may be used interchangeably without
departing from the scope of the invention as defined herein.
[0052] The present disclosure monitors and automatically switches
diameter signaling traffic of particular session from a primary peer to a secondary peer, and switch back to the primary peer once the primary peer becomes reachable
15 again. This enables seamless transition and efficient utilization of resources by
ensuring that the diameter signaling traffic is directed to the primary peer or secondary peer without any manual intervention as per network situation and session stickiness characteristics of network. The present disclosure detects re-establishment of the connection with the primary peer and triggers the diameter
20 signaling traffic shift efficiently. Thereby, improving automation and efficiency,
reducing manual efforts, and minimizing the risk of downtime or service disruptions.
[0053] The present disclosure optimizes network performance, provides
session stickiness and ensures high availability by seamlessly transitioning required
25 diameter signaling traffic between the primary and secondary peers in 5G and 4G
networks.
[0054] The various embodiments of the present disclosure will be explained
in detail with reference to FIGs. 1 to 5.
[0055] FIG. 1 illustrates an exemplary network architecture (100) in which
30 or with which embodiments of the present disclosure may be implemented.
[0056] Referring to FIG. 1, the network architecture (100) may include one
or more computing devices or user equipments (104-1, 104-2…104-N) associated
11
with one or more users (102-1, 102-2…102-N) in an environment. A person of
ordinary skill in the art will understand that one or more users (102-1, 102-2…102-
N) may be individually referred to as the user (102) and collectively referred to as
the users (102). Similarly, a person of ordinary skill in the art will understand that
5 one or more user equipments (104-1, 104-2…104-N) may be individually referred
to as the user equipment (104) and collectively referred to as the user equipment (104). A person of ordinary skill in the art will appreciate that the terms “computing device(s)” and “user equipment” may be used interchangeably throughout the disclosure. Although three user equipments (104) are depicted in FIG. 1, however
10 any number of the user equipments (104) may be included without departing from
the scope of the ongoing description.
[0057] In an embodiment, the user equipment (104) may include smart
devices operating in a smart environment, for example, an Internet of Things (IoT) system. In such an embodiment, the user equipment (104) may include, but is not
15 limited to, smart phones, smart watches, smart sensors (e.g., mechanical, thermal,
electrical, magnetic, etc.), networked appliances, networked peripheral devices, networked lighting system, communication devices, networked vehicle accessories, networked vehicular devices, smart accessories, tablets, smart television (TV), computers, smart security system, smart home system, other devices for monitoring
20 or interacting with or for the users (102) and/or entities, or any combination thereof.
A person of ordinary skill in the art will appreciate that the user equipment (104) may include, but is not limited to, intelligent, multi-sensing, network-connected devices, that can integrate seamlessly with each other and/or with a central server or a cloud-computing system or any other device that is network-connected.
25 [0058] In an embodiment, the user equipment (104) may include, but is not
limited to, a handheld wireless communication device (e.g., a mobile phone, a smart phone, a phablet device, and so on), a wearable computer device(e.g., a head-mounted display computer device, a head-mounted camera device, a wristwatch computer device, and so on), a Global Positioning System (GPS) device, a laptop
30 computer, a tablet computer, or another type of portable computer, a media playing
device, a portable gaming system, and/or any other type of computer device with wireless communication capabilities, and the like. In an embodiment, the user
12
equipment (104) may include, but is not limited to, any electrical, electronic,
electro-mechanical, or an equipment, or a combination of one or more of the above
devices such as virtual reality (VR) devices, augmented reality (AR) devices,
laptop, a general-purpose computer, desktop, personal digital assistant, tablet
5 computer, mainframe computer, or any other computing device, wherein the user
equipment (104) may include one or more in-built or externally coupled accessories including, but not limited to, a visual aid device such as a camera, an audio aid, a microphone, a keyboard, and input devices for receiving input from the user (102) or the entity such as touch pad, touch enabled screen, electronic pen, and the like.
10 A person of ordinary skill in the art will appreciate that the user equipment (104)
may not be restricted to the mentioned devices and various other devices may be used.
[0059] Referring to FIG. 1, the user equipment (104) may communicate
with a system (108), for example, a mated pair configuration system, through a
15 network (106). The system (108) may switch the diameter signaling traffic of
particular session towards a secondary peer from a primary peer once connection is down with the particular primary peer providing automatic switchover mechanism between the primary site and the secondary site. Once connection with the primary peer is re-established, the diameter signaling traffic of particular session may be
20 auto shifted from the secondary peer to the primary peer.
[0060] In an embodiment, the peer may be, but not limited to, a network
function, network nodes. A person of ordinary skill in the art will appreciate that the terms “peer”, “network function” and “node” may be used interchangeably throughout the disclosure.
25 [0061] In an embodiment, the network (106) may include at least one of a
Fifth Generation (5G) network, 6G network, or the like. The network (106) may enable the user equipment (104) to communicate with other devices in the network architecture (100) and/or with the system (108). The network (106) may include a wireless card or some other transceiver connection to facilitate this communication.
30 In another embodiment, the network (106) may be implemented as, or include any
of a variety of different communication technologies such as a wide area network (WAN), a local area network (LAN), a wireless network, a mobile network, a
13
Virtual Private Network (VPN), the Internet, the Public Switched Telephone Network (PSTN), or the like.
[0062] In an embodiment, the user equipment (104) is communicatively
coupled with the system (108). The system (108) may receive a connection request
5 from the UE (104). The system (108) may send an acknowledgment of the
connection request to the UE (104). The UE (104) may transmit a plurality of signals in response to the connection request. The system (108) may configure for directing diameter signaling traffic between a plurality of peers in the network (106).
10 [0063] Although FIG. 1 shows exemplary components of the network
architecture (100), in other embodiments, the network architecture (100) may include fewer components, different components, differently arranged components, or additional functional components than depicted in FIG. 1. Additionally, or alternatively, one or more components of the network architecture (100) may
15 perform functions described as being performed by one or more other components
of the network architecture (100).
[0064] FIG. 2A illustrates an exemplary block diagram (200A) of the
system (108), in accordance with an embodiment of the present disclosure.
[0065] In an aspect, the system (108) may include one or more processor(s)
20 (202). The one or more processor(s) (202) may be implemented as one or more
microprocessors, microcomputers, microcontrollers, edge or fog microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that process data based on operational instructions. Among other capabilities, one or more processor(s) (202) may be configured to fetch and execute
25 computer-readable instructions stored in a memory (204) of the system (108). The
memory (204) may be configured to store one or more computer-readable instructions or routines in a non-transitory computer-readable storage medium, which may be fetched and executed to create or share data packets over a network service. The memory (204) may comprise any non-transitory storage device
30 including, for example, volatile memory such as Random-Access Memory (RAM),
or non-volatile memory such as Erasable Programmable Read-Only Memory (EPROM), flash memory, and the like.
14
[0066] In an embodiment, the system (108) may include an interface(s)
(206). The interface(s) (206) may include a variety of interfaces, for example,
interfaces for data input and output devices, referred to as I/O devices, storage
devices, and the like. The interface(s) (206) may facilitate communication of the
5 system (108). The interface(s) (206) may also provide a communication pathway
for one or more components of the system (108). Examples of such components
include, but are not limited to, processing unit/engine(s) (208) and a database (210).
[0067] The processing unit/engine(s) (208) may be implemented as a
combination of hardware and programming (for example, programmable
10 instructions) to implement one or more functionalities of the processing engine(s)
(208). In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processing engine(s) (208) may be processor-executable instructions stored on a non-transitory machine-readable storage medium and the
15 hardware for the processing engine(s) (208) may comprise a processing resource
(for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine(s) (208). In such examples, the system (108) may comprise the machine-readable storage
20 medium storing the instructions and the processing resource to execute the
instructions, or the machine-readable storage medium may be separate but
accessible to the system (108) and the processing resource. In other examples, the
processing engine(s) (208) may be implemented by an electronic circuitry.
[0068] The processing engine (208) may include one or more engines
25 selected from any of a monitoring engine (212), a switching engine (214), and other
engine(s) (216).
[0069] The monitoring engine (212) may monitor connection towards both
primary and secondary peers of the pair in the primary and secondary sites.
[0070] The switching engine (214) may automatically shift or switch
30 diameter signaling traffic of the session towards another peer from the pair (e.g.,
mated pair) when any unreachability observed then.
[0071] In an embodiment, the database (210) may comprise data that may
15
be either stored or generated as a result of functionalities implemented by any of the components of the processor(s) (202) or the processing engine(s) (208) or the system (108).
[0072] Although FIG. 2A shows an exemplary block diagram (200A) of the
5 system (108), in other embodiments, the system (108) may include fewer
components, different components, differently arranged components, or additional functional components than depicted in FIG. 2A. Additionally, or alternatively, one or more components of the system (108) may perform functions described as being performed by one or more other components of the system (108).
10 [0073] FIG. 2B illustrates an exemplary block diagram of a consumer
network function (110), in accordance with an embodiment of the present disclosure.
[0074] The consumer network function (110) comprises a receiving unit
(222), a sending unit (224), a diameter connection management unit (226), and a
15 database (238). The diameter connection management unit (226) comprises a
processing unit (228), an identification unit (230), a detection unit (232), a checking unit (234) and a connection unit (236).
[0075] The receiving unit (222) is configured to receive a request from a
user. In an example, the request from the user may comprise, but not limited to, an
20 access to the network, an authentication request, an authorization request, a service
request, etc.
[0076] The identification unit (230) is configured to identify a primary
target peer from the plurality of peers of a primary site. The primary target peer is identified based on the received request. For example, on receiving the
25 authentication request, the peer responsible for serving the authentication request is
identified from the plurality of peers. In examples, the primary target peer is identified from configuration files. In some examples, the primary target peer may be identified through command line interface (CLI) commands. In some examples, the primary target peer may be identified through status indictors or logs.
30 [0077] The primary target peer of the primary site and a secondary target
peer of a secondary site are configured to form a pair configuration based on internet protocol (IP) details. In some implementations, the pair configuration may refer as
16
a mated pair configuration. The pair configuration may refer to refers to a setup
where two NFs are configured to support services to provide continuous service. In
implementations, one NF may be configured as primary peer (active peer), and
other NF may be configured as secondary peer (standby peer). The processing unit
5 (228) is configured to pre-configure the plurality of peers of the primary site and
the secondary site of the network into a plurality of pairs of primary peer and secondary peer as a pair based on the IP details of the plurality of peers. In an aspect, the IP details may comprise IP addresses corresponding to the peers. The IP address is a unique identifier assigned to any device or domain that connects to the internet
10 network. In an aspect, IP address is assigned to each of the plurality of peers from
the primary site and the secondary site. For pre-configuring the plurality of peers as pair of the primary peer and the secondary peer, IP address of one peer from the primary site and the IP address of one peer from the secondary site are used to configure the pair of the primary peer and the secondary peer. For example, the
15 primary site comprises plurality of primary peers such as P1, P2, P3, P4, P5 and the
secondary site comprises plurality of secondary peers such as S1, S2, S3, S4, S5. The primary peers have IP details such as P1 with IP details as X1, P2 with X2, P3 with X3, P4 with X4, and P5 with X5. The secondary peers have IP details such as S1 with Y1, S2 with Y2, S3 with Y3, S4 with Y4, and S5 with Y5. The pairs of the
20 primary site and the secondary site comprises P1 and S1, P2 and S2, P3 and S3, P4
and S4, and P5 and S5. For example, if a primary target peer is P1, so a secondary target peer is S1 based on the pair configuration. The pair of primary and secondary target peers is P1 and S1. In an example, the pairs such as P1 and S1, P2 and S2, P3 and S3, P4 and S4, and P5 and S5 may referred to as mated pairs.
25 [0078] The detection unit (232) is configured to detect whether the primary
target peer is available based on a diameter connection status. In an embodiment, the diameter connection status may include, but is not limited to, available, busy, idle, establishing, closing, etc. The diameter connection status of the target peer is checked to forward the received user request to the target peer. On detecting the
30 diameter connection status of the target peer is available, the received user request
is sent to the target peer. In an embodiment, the diameter connection status of each of plurality of peers is maintained by the diameter connection management unit.
17
The data corresponding to the diameter connection status of each of plurality of peers is stored in the database of the system (108).
[0079] On detecting that the primary target peer is available, the sending
unit (224) is configured to send the received request to the primary target peer.
5 [0080] On detecting that the primary target peer is not available, the
checking unit (234) is configured to check the secondary target peer from the pair
configuration. In examples, the secondary target peer from the pair configuration
is checked based on IP address of the secondary target peer in a configuration file.
[0081] The detection unit (232) is configured to detect whether the
10 secondary target peer is available based on the diameter connection status. The
connection unit (236) is configured to periodically retry connection on the primary target peer. In examples, the connection unit (236) is configured by placing instructions in configuration file to periodically retry connection on the primary target peer. In an aspect, to periodically retry connection to the primary target peer,
15 the connection unit may configure to set a time interval (e.g., every 5 minutes). On
detecting the primary target peer is not available, after time interval (i.e., after every 5 minutes), the connection unit may again send a connection request to the primary target peer. On detecting no response from the primary target peer, the connection unit may again try to attempt connection after the time interval. Further, the
20 connection unit may decide maximum number of retry attempts when the target
peer is unavailable.
[0082] On detecting that the secondary target peer is available, the sending
unit (224) is configured to send the request to the secondary target peer. For example, on detecting that primary target peer P1 of the primary site is not available,
25 checking the secondary target peer S1 of the secondary site from the pair P1-S1. On
detecting that the secondary target peer S1 is available, the received request is forwarded to the secondary target peer S1.
[0083] On detecting that both the primary and secondary target peers from
the pair configuration are not available, the processing unit (228) is configured to
30 drop the request. The connection unit (236) is configured to periodically re-try
connection on both the primary and secondary target peers, when the primary and secondary target peers from the pair configuration (e.g., mated pair configuration)
18
are not available. For example, on detecting that both the primary and secondary
target peers P1 and S1 are not available, the received request is dropped.
[0084] In an aspect, the detection unit (232) is configured to detect whether
re-establishment of the connection with the primary target peer is available. On
5 detecting that re-establishment of the connection with the primary target peer is
available, the connection unit (236) is configured to perform re-establishment of the connection with the primary target peer and trigger shift of the diameter signaling traffic to the primary target peer. In an aspect, the detection unit (232) detects whether re-establishment is available by triggering the connection unit (236)
10 to periodically retry connection with the primary target peer after time interval (i.e.,
after every 5 minutes). The connection unit (236) may send a connection request to the primary target peer after the time interval. If a response is received from the primary target peer, then the connection with the primary target peer is again re-established. The diameter signaling traffic is shifted back to the primary target peer.
15 For example, on detecting that re-establishment of the connection with the primary
target peer P1 of the primary site is available. The diameter signaling traffic is again shifted to the primary target peer P1.
[0085] FIG. 3A illustrates an exemplary flow diagram (300A)
implementing a pair configuration method, in accordance with an embodiment of
20 the present disclosure.
[0086] Referring to FIG. 3A, the pair configuration method may include
pre-configuring Internet Protocol (IP) details of primary and secondary peers at a consumer network function in a pair of primary and secondary peer as a pair (e.g., mated pair). In an aspect, the pair configuration method may refer as a mated pair
25 configuration.
[0087] At step 302, the method (300A) includes identifying a primary target
peer.
[0088] At step 304, the method (300A) includes checking a targeted primary
peer status based on a diameter connection status, before sending a request to the
30 peers.
[0089] At step 306, the method (300A) includes if the targeted primary peer
status is okay, then sending the request toward the targeted primary peer.
19
[0090] At step 308, the method (300A) includes if the targeted primary peer
status is not okay then despite of having multiple peers at the primary peer, the
consumer network function may get secondary peer details of that primary peer
from a pair configuration.
5 [0091] At step 310, the method (300A) includes checking the targeted
secondary peer status based on the diameter connection status. The consumer
network function may periodically re-try connection on the targeted primary peer.
[0092] At step 312, the method (300A) includes if the targeted secondary
peer status is okay, then the consumer network function may send the request
10 toward the targeted secondary peer.
[0093] At step 314, the method (300A) includes if both the targeted primary
and secondary peer status are not okay, then the request may be dropped despite of having multiple peers at the primary site due to session stickiness characteristics of the network. Further, the consumer network function may periodically re-try
15 connection on both primary and secondary peers.
[0094] In an aspect, a plurality of peers of a primary site and a secondary
site of a network are preconfigured by a consumer network function into a plurality of pairs of primary target peer and secondary target peer as pair based on internet protocol (IP) details of the plurality of peers. All requests of any session are served
20 by pair of primary target peer and secondary target peer of the pair. So, when the
primary target peer of the primary site is unable to serve requests, the requests are routed to the secondary target peer of the pair at the secondary site despite of having multiple peers at primary site for achieving session stickiness. The consumer network function is configured to periodically retry connection on the primary
25 target peer. When the primary and secondary target peers from the pair
configuration are not available, the request is dropped by the consumer network
function. Further, the consumer network function is configured to periodically re¬
try connection on both the primary and secondary target peers.
[0095] FIG. 3B illustrates an exemplary flow diagram implementing a
30 method for directing diameter signaling traffic between a plurality of peers by a
consumer network function in a network, in accordance with an embodiment of the present disclosure.
20
[0096] At step 322, the method (300B) includes receiving a request from a
user. The consumer network function may receive the request from the user. The
request may comprise an authentication request, a service request, an authorization
request, an access request, etc.
5 [0097] At step 324, the method (300B) includes identifying a primary target
peer from the plurality of peers of a primary site. The primary target peer of the primary site and a secondary target peer of a secondary site are configured to form a pair configuration based on internet protocol (IP) details. In an aspect, the pair configuration is referred as a mated pair configuration.
10 [0098] At step 326, the method (300B) includes detecting whether the
primary target peer is available based on a diameter connection status.
[0099] At step 328, the method (300B) includes on detecting the primary
target peer is available, sending the request to the primary target peer.
[00100] At step 330, the method (300B) includes on detecting that the
15 primary target peer is not available, checking the secondary target peer from the
pair configuration.
[00101] At step 332, the method (300B) includes detecting whether the
secondary target peer is available based on the diameter connection status.
[00102] At step 334, the method (300B) includes on detecting the secondary
20 target peer is available, sending the request to the secondary target peer.
[00103] At step 336, the method (300B) includes periodically re-trying
connection on both the primary and secondary target peers when the primary and
secondary target peers from the pair configuration are not available.
[00104] FIG. 4 illustrates an exemplary architecture (400) of the (108), in
25 accordance with an embodiment of the present disclosure.
[00105] Referring to FIG. 4, the system (108) may include a consumer
network function (402), a diameter connection management unit (404), a primary producer network function (406), and a secondary producer network function (408). In an aspect, the producer network function may be referred to as, but not limited
30 to, producer peers, producer nodes.
[00106] The consumer network function (402) may be connected with the
primary producer network function (406), and the secondary producer network
21
function (408) via the diameter connection management unit (404). In an aspect, the diameter connection management unit (404) may be part of the consumer network function (402).
[00107] The diameter connection management unit (404) may determine a
5 diameter connection status of the primary producer network function (406), and the
secondary producer network function (408). The diameter signaling traffic of session from the consumer network function (402) may be automatically switched from the primary producer network function (406) to the secondary producer network function (408), when unreachability of the primary producer network
10 function is observed. The diameter connection management unit (404) may
periodically retry connection on the primary producer network function (406).
[00108] On detecting the primary producer network function (406) is
available again, the consumer network function (402) may be again switched back to the primary producer network function (406).
15 [00109] FIG. 5 illustrates an exemplary computer system (500) in which or
with which embodiments of the present disclosure may be implemented.
[00110] As shown in FIG. 5, the computer system (500) may include an
external storage device (510), a bus (520), a main memory (530), a read only memory (540), a mass storage device (550), a communication port (560), and a
20 processor (570). A person skilled in the art will appreciate that the computer system
(500) may include more than one processor (570) and communication ports (560).
Processor (570) may include various modules associated with embodiments of the
present disclosure.
[00111] In an embodiment, the communication port (560) may be any of an
25 RS-232 port for use with a modem-based dialup connection, a 10/100 Ethernet port,
a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. The communication port (560) may be chosen depending on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which the computer system (500) connects.
30 [00112] In an embodiment, the main memory (530) may be Random Access
Memory (RAM), or any other dynamic storage device commonly known in the art. Read-only memory (540) may be any static storage device(s) e.g., but not limited
22
to, a Programmable Read Only Memory (PROM) chips for storing static information e.g., start-up or Basic Input/Output System (BIOS) instructions for the processor (570).
[00113] In an embodiment, the mass storage (550) may be any current or
5 future mass storage solution, which may be used to store information and/or
instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), one
10 or more optical discs, Redundant Array of Independent Disks (RAID) storage, e.g.,
an array of disks (e.g., SATA arrays).
[00114] In an embodiment, the bus (520) communicatively couples the
processor(s) (570) with the other memory, storage and communication blocks. The bus (520) may be, e.g., a Peripheral Component Interconnect (PCI)/PCI Extended
15 (PCI-X) bus, Small Computer System Interface (SCSI), Universal Serial Bus (USB)
or the like, for connecting expansion cards, drives and other subsystems as well as
other buses, such a front side bus (FSB), which connects the processor (570) to the
computer system (500).
[00115] Optionally, operator and administrative interfaces, e.g., a display,
20 keyboard, joystick, and a cursor control device, may also be coupled to the bus
(520) to support direct operator interaction with the computer system (500). Other operator and administrative interfaces may be provided through network connections connected through the communication port (560). Components described above are meant only to exemplify various possibilities. In no way should
25 the aforementioned exemplary computer system (500) limit the scope of the present
disclosure.
[00116] In an aspect, the present disclosure provides technical advancement
related to diameter signaling traffic. This advancement addresses the limitations of existing solutions by providing automatic switchover mechanism between network
30 peers (e.g., network functions/network nodes). The disclosure involves monitoring
connection towards both primary and secondary peers of pair and on detecting any unreachability to any one of peers, then automatically shifting the diameter
23
signaling traffic of particular session towards another peer of pair. By implementing shifting of the diameter signaling traffic between the peers of the pair based on the availability of the peers, resulting in enhancing high availability.
[00117] While the foregoing describes various embodiments of the present
5 disclosure, other and further embodiments of the present disclosure may be devised
without departing from the basic scope thereof. The scope of the present disclosure
is determined by the claims that follow. The present disclosure is not limited to the
described embodiments, versions or examples, which are included to enable a
person having ordinary skill in the art to make and use the present disclosure when
10 combined with information and knowledge available to the person having ordinary
skill in the art.
ADVANTAGES OF THE PRESENT DISCLOSURE
[00118] The present disclosure provides a system and a method to monitor
15 pair configuration (e.g., mated pair configuration) in a wireless network.
[00119] The present disclosure automatically shifts diameter signaling traffic
of particular session towards its peer of the pair, despite of having multiple peers at
a primary site for achieving session stickiness, when any unreachability is observed.
[00120] The present disclosure auto-shifts the diameter signaling traffic of
20 particular session from a secondary peer to a primary peer once connection with
primary peer is re-established. Thereby, maintaining a robust and reliable network
infrastructure with minimal disruptions in the network.
[00121] The present disclosure enables seamless transition and efficient
utilization of resources by ensuring that the diameter signaling traffic is directed to
25 the primary/secondary site without any manual intervention as per network
situation and session stickiness characteristics of the network.
[00122] The present disclosure enables a level of automation and efficiency
that reduces manual efforts and minimizes the risk of downtime or service
disruptions.
30 [00123] The present disclosure enhances high availability of primary and
secondary peers/nodes in the network architecture, by ensuring that the diameter
signaling traffic of particular session is directed to the secondary peer whenever
24
primary peer is not able to serve and diameter signaling traffic of particular session
may be directed to the primary peer once it becomes reachable again. This helps to
maintain a robust and reliable network infrastructure with minimal disruptions in
the network.
5 [00124] The present disclosure ensures to serve all requests of any particular
session by pair of primary peer and secondary peer. Thus, when the primary peer is unable to serve, the requests may be routed to its another peer of the pair at the secondary site despite of having multiple peers at the primary site for achieving session stickiness. 10
25
WE CLAIM:
1. A method (300B) for directing diameter signaling traffic between a plurality
of peers by a consumer network function (110, 402) in a network (106), the
method (300B) comprising:
receiving (322) a request from a user (102);
identifying (324) a primary target peer (406) from the plurality of peers of a primary site, wherein the primary target peer (406) of the primary site and a secondary target peer (408) of a secondary site are configured to form a pair configuration based on internet protocol (IP) details;
detecting (326) whether the primary target peer (406) is available based on a diameter connection status; and
on detecting the primary target peer (406) is available, sending (328) the request to the primary target peer (406), wherein:
on detecting that the primary target peer (406) is not
available, checking (330) the secondary target peer (408) from the
pair configuration;
detecting (332) whether the secondary target peer (408) is
available based on the diameter connection status, wherein the
consumer network function (110, 402) is configured to periodically
retry connection on the primary target peer (406); and
on detecting the secondary target peer (408) is available,
sending (334) the request to the secondary target peer (408).
2. The method (300B) as claimed in claim 1, wherein on detecting the primary target peer (406) and secondary target peers (408) from the pair configuration are not available, dropping the request.
3. The method (300B) as claimed in claim 1 further comprising:
detecting whether re-establishment of the connection with the primary target peer (406) is available;
on detecting that re-establishment of the connection with the primary target peer (406) is available, performing re-establishment of the connection with the primary target peer (406); and
triggering shift of the diameter signaling traffic to the primary target peer (406).
4. The method (300B) as claimed in claim 1 further comprising:
pre-configuring the plurality of peers of the primary site and the secondary site of the network into a plurality of pairs of primary target peer and the secondary target peer as pair based on the IP details of the plurality of peers.
5. The method (300B) as claimed in claim 1 further comprising:
periodically (336) re-trying the connection on both the primary target peers (406) and secondary (408) when the primary target peers (406) and secondary target peers (408) from the pair configuration are not available.
6. A system (108) for directing diameter signaling traffic between a plurality
of peers in a network (106), the system (108) comprising a consumer
network function (110, 402), the consumer network function (110, 402)
comprising:
a receiving unit (222) configured to receive a request from a user (102);
a diameter connection management unit (226) comprising:
an identification unit (230) configured to identify a primary target peer (406) from the plurality of peers of a primary site, wherein the primary target peer (406) of the primary site and a secondary target peer (408) of a secondary site are configured to form a pair configuration based on internet protocol (IP) details;
a detection unit (232) configured to detect whether the primary target peer (406) is available based on a diameter connection status;
on detecting that the primary target peer (406) is available, a sending unit (224) is configured to send the request to the primary target peer (406);
on detecting that the primary target peer (406) is not available, a checking unit (234) is configured to check the secondary target peer (408) from the pair configuration;
the detection unit (232) configured to detect whether the secondary target peer (408) is available based on the diameter connection status, wherein a connection unit (236) is configured to periodically retry connection on the primary target peer (406); and
on detecting that the secondary target peer (408) is available, the sending unit (224) is configured to send the request to the secondary target peer (408).
7. The system (108) as claimed in claim 6, wherein on detecting that the primary target peers (406) and secondary target peers (408) from the pair configuration are not available, a processing unit (228) is configured to drop the request.
8. The system (108) as claimed in claim 6, wherein the detection unit (232) is configured to detect whether re-establishment of the connection with the primary target peer (406) is available; and
on detecting that re-establishment of the connection with the primary target peer (406) is available, the connection unit (236) is configured to:
perform re-establishment of the connection with the primary target peer (406); and
trigger shift of the diameter signaling traffic to the primary target peer (406).
9. The system (108) as claimed in claim 7, wherein the processing unit (228) is configured to pre-configure the plurality of peers of the primary site and the secondary site of the network into a plurality of pairs of primary target peer and the secondary target peer as pair based on the IP details of the plurality of peers.
10. The system (108) as claimed in claim 6, wherein the connection unit (236) is configured to periodically re-try the connection on both the primary target peers (406) and secondary target peers (408), when the primary target peers (406) and secondary target peers (408) from the pair configuration are not available.
11. A user equipment (104) communicatively coupled with a system (108), the coupling comprises steps of:
receiving, by the system (108), a connection request;
sending, by the system (108), an acknowledgment of the connection request to the UE (104); and
transmitting a plurality of signals in response to the connection request, wherein the system (108) is configured for directing a diameter signaling traffic between a plurality of peers in a network (106) as claimed in claim
| # | Name | Date |
|---|---|---|
| 1 | 202321048806-STATEMENT OF UNDERTAKING (FORM 3) [20-07-2023(online)].pdf | 2023-07-20 |
| 2 | 202321048806-PROVISIONAL SPECIFICATION [20-07-2023(online)].pdf | 2023-07-20 |
| 3 | 202321048806-FORM 1 [20-07-2023(online)].pdf | 2023-07-20 |
| 4 | 202321048806-DRAWINGS [20-07-2023(online)].pdf | 2023-07-20 |
| 5 | 202321048806-DECLARATION OF INVENTORSHIP (FORM 5) [20-07-2023(online)].pdf | 2023-07-20 |
| 6 | 202321048806-FORM-26 [19-10-2023(online)].pdf | 2023-10-19 |
| 7 | 202321048806-FORM-26 [12-04-2024(online)].pdf | 2024-04-12 |
| 8 | 202321048806-FORM 13 [15-04-2024(online)].pdf | 2024-04-15 |
| 9 | 202321048806-AMENDED DOCUMENTS [15-04-2024(online)].pdf | 2024-04-15 |
| 10 | 202321048806-Request Letter-Correspondence [03-06-2024(online)].pdf | 2024-06-03 |
| 11 | 202321048806-Power of Attorney [03-06-2024(online)].pdf | 2024-06-03 |
| 12 | 202321048806-Covering Letter [03-06-2024(online)].pdf | 2024-06-03 |
| 13 | 202321048806-CORRESPONDANCE-WIPO CERTIFICATE-11-06-2024.pdf | 2024-06-11 |
| 14 | 202321048806-ENDORSEMENT BY INVENTORS [24-06-2024(online)].pdf | 2024-06-24 |
| 15 | 202321048806-DRAWING [24-06-2024(online)].pdf | 2024-06-24 |
| 16 | 202321048806-CORRESPONDENCE-OTHERS [24-06-2024(online)].pdf | 2024-06-24 |
| 17 | 202321048806-COMPLETE SPECIFICATION [24-06-2024(online)].pdf | 2024-06-24 |
| 18 | 202321048806-ORIGINAL UR 6(1A) FORM 26-190724.pdf | 2024-07-24 |
| 19 | 202321048806-FORM 18 [04-10-2024(online)].pdf | 2024-10-04 |
| 20 | Abstract.jpg | 2024-10-08 |
| 21 | 202321048806-FORM 3 [04-11-2024(online)].pdf | 2024-11-04 |