Abstract: ABSTRACT SYSTEM AND METHOD OF MONITORING AND ANALYSIS OF DATA IN A NETWORK The present disclosure relates to a system (102) and a method (500) for monitoring and analysis of data in a network (106). The system (102) includes a transceiver module (320) configured to receive a policy request from at least one of a user equipment (104). The system (102) includes a provisioning module (325) configured to implement a set of pre-defined rules at the probe unit (204) on receipt of the policy request. The system (102) includes a provisioning module (330) configured to provision the set of pre-defined rules at the conductor unit (206) on receipt of the policy request. The system (102) includes an analysis module (330) configured to parse the data received from one or more Network Functions (NF) based on the set of pre-defined rules implemented at the probe unit (204). Thereby, the system (102) monitors and analyzes the data in the network (106). Ref. Fig. 3
DESC:
FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENTS RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
1. TITLE OF THE INVENTION
SYSTEM AND METHOD FOR MONITORING AND ANALYSIS OF DATA IN A NETWORK
2. APPLICANT(S)
NAME NATIONALITY ADDRESS
JIO PLATFORMS LIMITED INDIAN OFFICE-101, SAFFRON, NR. CENTRE POINT, PANCHWATI 5 RASTA, AMBAWADI, AHMEDABAD 380006, GUJARAT, INDIA
3.PREAMBLE TO THE DESCRIPTION
THE FOLLOWING SPECIFICATION PARTICULARLY DESCRIBES THE NATURE OF THIS INVENTION AND THE MANNER IN WHICH IT IS TO BE PERFORMED.
FIELD OF THE INVENTION
[0001] The present invention relates to a field of network management, and more particularly relates to a system and a method of monitoring and analysis of data in a network.
BACKGROUND OF THE INVENTION
[0002] In traditional network management systems, the identification and analysis of failures at the lowest network level posed significant challenges. The Raw data generated by Network Functions (NFs) was typically stored in a centralized location or database. Subsequently, extensive data searching, and analysis is to be performed on this large volume of data, resulting in time-consuming processes and increased system load.
[0003] The advent of 5G technology has brought about a higher level of complexity in network infrastructures, requiring more efficient methods to identify and address failures. Network operators face the need to pinpoint failures at the lowest level, such as specific networks, procedures, or interfaces, in order to streamline the debugging and troubleshooting processes. Additionally, reducing the system load and minimizing the manual effort involved in analysing failures has become a crucial objective for network management.
[0004] Thus, there is a need for a solution which solves the above problem.
BRIEF SUMMARY OF THE INVENTION
[0005] One or more embodiments of the present disclosure provide a system and a method of monitoring and analysis of data in a network.
[0006] In one aspect of the present invention, the method of monitoring and analysis of data in the network is disclosed. The method includes the step of receiving, by one or more processors, a policy request from at least one of a User Equipment (UE). The method includes the step of transferring, by the one or more processors, the policy request to each of a probe unit and a conductor unit. The method includes the step of implementing, by the one or more processors, a set of pre-defined rules at the probe unit on receipt of the policy request. The method further includes the step of provisioning, by the one or more processors, the set of pre-defined rules at the conductor unit on receipt of the policy request. Further, the method includes the step of parsing, by the one or more processors, the data received from one or more Network Functions (NF) based on the set of predefined rules implemented at the probe unit, and thereby monitoring and analyzing the network data.
[0007] In one embodiment, the policy request includes the set of pre-defined rules configured to provide at least one of an alias name, a call flow name, and a version for each network function. In one embodiment, the set of pre-defined rules pertaining to the conductor unit is stored in a database. In one embodiment, based on parsing, the data is subjected to actions such as data filtering, data enrichment, and creation of additional fields with respect to the set of pre-defined rules implemented at the probe unit.
[0008] In one embodiment, the method further includes the step of transmitting, by one or more processors, the parsed data to the conductor unit. On receipt of the parsed data, the conductor unit utilizes the parsed data to perform actions based on the provisioned set of pre-defined rules. In one embodiment, the actions include one of the data aggregation, data correlation, forwarding of the data to components of a probe. The components include a fulcrum, an indexer, a normalizer, and a co-relation engine. In one embodiment, the data received from the NF is analyzed at multiple network entities, including at least one of, a network, an interface, a procedure, the NF, the NF instance, and a container ID, thereby aiding in identifying an error and the network entity where the error originated from.
[0009] In another aspect of the present invention, the system for monitoring and analysis of data in the network is disclosed. Accordingly, the system includes a transceiver. The transceiver is configured to receive a policy request from at least one of a user equipment and thereafter transfer the policy request to each of the probe unit and the conductor unit. The system includes a provisioning module. The provisioning module is configured to provision the set of pre-defined rules at the probe unit and the conductor unit on receipt of the policy request. The system further includes an analysis module. The analysis module is configured to parse the data received from one or more Network Functions (NF) based on the set of pre-defined rules implemented at the probe unit, and thereby monitor and analyze the network data.
[0010] Other features and aspects of this invention will be apparent from the following description and the accompanying drawings. The features and advantages described in this summary and in the following detailed description are not all-inclusive, and particularly, many additional features and advantages will be apparent to one of ordinary skill in the relevant art, in view of the drawings, specification, and claims hereof. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes and may not have been selected to delineate or circumscribe the inventive subject matter, resort to the claims being necessary to determine such inventive subject matter.
BRIEF DESCRIPTION OF THE DRAWINGS
[0011] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components, electronic components or circuitry commonly used to implement such components.
[0012] FIG. 1 is an exemplary block diagram of an environment for monitoring and analyzing of data in the network, according to various embodiments of the present invention;
[0013] FIG. 2 is an exemplary block diagram of the system architecture for monitoring and analyzing of data in the network, according to various embodiments of the present invention;
[0014] FIG. 3 is an exemplary block diagram of the system for monitoring and analysis of data in the network, according to various embodiments of the present invention;
[0015] FIG. 4 is an exemplary embodiment of monitoring and analyzing of data system of FIG. 3, according to one or more embodiments of the present subject invention; and
[0016] FIG. 5 shows a flow diagram of the method implemented for monitoring and analysis of data in the network, according to various embodiments of the present invention.
[0017] The foregoing shall be more apparent from the following detailed description of the invention.
DETAILED DESCRIPTION OF THE INVENTION
[0018] Some embodiments of the present disclosure, illustrating all its features, will now be discussed in detail. It must also be noted that as used herein and in the appended claims, the singular forms "a", "an" and "the" include plural references unless the context clearly dictates otherwise.
[0019] Various modifications to the embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments. However, one of ordinary skill in the art will readily recognize that the present disclosure including the definitions listed here below are not intended to be limited to the embodiments illustrated but is to be accorded the widest scope consistent with the principles and features described herein.
[0020] A person of ordinary skill in the art will readily ascertain that the illustrated steps detailed in the figures and here below are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
[0021] As per various embodiments depicted, the present invention discloses a system and method for monitoring and analyzing data in a network. More specifically, the present invention is directed towards policy driven data analysis and monitoring in networks. The invention is directed towards efficient policy provisioning and utilizing the same for ingestion, parsing, decoding, and furnishing data from the Network Function (NF) for analyzing and monitoring purposes. Doing so results in time saving data searches and analysis, reduced system load, efficient failure identification capabilities at a lowest network level onwards, and enhanced resource utilization. Additionally, the system and method as disclosed aids in network management and further facilitates optimal utilization of virtual probe networks.
[0022] Referring to FIG. 1, FIG. 1 illustrates an exemplary block diagram of an environment 100 for monitoring and analysis of data in a network 106, according to various embodiments of the present invention. The environment 100 includes an at least one User Equipment (UE) 104 configured to generate and transmit a policy request to monitor and analyze the network data. In one embodiment, the policy request includes a set of predefined rules configured to provide at least one of, but not limited to, an alias name, a call flow name, and a version for each Network Function (NF). Some examples of the NF may include, but not limited to, a user plane function (UPF). The UPF manages the user data during the data transmission process. A Network Repository Function (NRF). The NRF serves as a centralized repository for all the NF’s instances. An Application Function (AF) provides application services to the subscriber. A Session Management Function (SMF) responsible for establishing, maintaining, and terminating network sessions for at least one of the UE 104. In one embodiment, the version for each NF may include, but is not limited to at least one of the network, an interface, a procedure, the NF, the NF instance, and container Identifier (ID).
[0023] More information regarding the same will be provided with reference to the following figures.
[0024] Further, as per the illustrated embodiment, the at least one UE 104 is at least one of a first UE 104a, a second UE 104b, and a third UE 104c. It is to be however noted that that the UE 104 may include one or more UEs 104 and is only described with respect to the first UE 104a, the second UE 104b, and the third UE 104c for the purpose of description and illustration and should nowhere be construed as limiting the scope of the present disclosure. As such, each of the first UE 104a, the second UE 104b, and the third UE 104c is configured to transmit the policy request to a remote server 108 via the network 106.
[0025] The first UE 104a, the second UE 104b, and the third UE 104c may include, but are not limited to, a handheld wireless communication device (e.g., a mobile phone, a smart phone, a tablet device, and so on), a wearable computer device (e.g., a head-mounted display computer device, a head-mounted camera device, a wristwatch computer device, and so on), a Global Positioning System (GPS) device, a laptop computer, a tablet computer, or another type of portable computer, a media playing device, a portable gaming system, and/or any other type of computer device with wireless communication capabilities, and the like, any electrical, electronic, electro-mechanical or an equipment and a combination of one or more of the above devices such as virtual reality (VR) devices, augmented reality (AR) devices, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other computing device.
[0026] The remote server 108 may include by way of example but not limitation, one or more of a standalone server, a server blade, a server rack, a bank of servers, a server farm, hardware supporting a part of a cloud service or system, a home server, hardware running a virtualized server, one or more processors executing code to function as a server, one or more machines performing server-side functionality as described herein, at least a portion of any of the above, some combination thereof. In an embodiment, the entity may include, but is not limited to, a vendor, a network operator, a company, an organization, a university, a lab facility, a business enterprise, a defense facility, or any other facility that provides content.
[0027] The network 106 includes, by way of example but not limitation, a probe networks, one or more of a wireless network, a wired network, an internet, an intranet, a public network, a private network, a packet-switched network, a circuit-switched network, an ad hoc network, an infrastructure network, a Public-Switched Telephone Network (PSTN), a cable network, a cellular network, a satellite network, a fiber optic network, or some combination thereof. The network 106 may include, but is not limited to, a Third Generation (3G), a Fourth Generation (4G), a Fifth Generation (5G), a Sixth Generation (6G), a New Radio (NR), a Narrow Band Internet of Things (NB-IoT), an Open Radio Access Network (O-RAN), and the like.
[0028] The environment 100 further includes a system 102 communicably coupled to the remote server 108 and each of the first UE 104a, the second UE 104b, and the third UE 104c via the network 106. The system 102 is configured to monitor and analyze the data in the network 106. Further, in one or more embodiments, the system 102 is adapted to be embedded within the remote server 108 or is embedded as an individual entity, without deviating from the scope of the present disclosure.
[0029] Operational and constructional features of the system 102 will be explained in detail with respect to the following figures.
[0030] Referring to FIG. 2, FIG. 2, is an exemplary block diagram of the system 102 for monitoring and analyzing of data in the network 106, according to various embodiments of the present invention. In one embodiment, the system 102 architecture comprises various components to enable efficient policy provisioning, data analysis, and monitoring. In one embodiment, the system 102 architecture includes multiple components to monitor and analyze the network activity and perform actions. In one embodiment, the actions includes at least one of, but not be limited to, data filtering, data enrichment, and creation of additional fields.
[0031] Further, the system 102 architecture includes a user interface 200, a probe manager 202, and a probing system 210. In one embodiment, the probing system 210 includes a plurality of components. The plurality of components includes at least one of, but not be limited to, a probe unit 204, a conductor unit 206, a fulcrum 212, an indexer 214, a normalizer 216, and a correlation engine 218, along with a database 208 for the policy storage. The database 208 is configured to store and retrieve the relevant policy-related data.
[0032] The user interface 200 serves as the primary interface for the network operators to configure and manage the policies. The user interface 200 enables a network operator to provision policies for the NF, specify parameters such as alias names, call flow names, and versions. In one embodiment, the network operator is a provider of wired and wireless communications services to control the infrastructure necessary to deliver services to mobile network operators, virtual network operators, and the end users. In one embodiment, a user utilizes the user interface 200 to send the policy request to the probe manager 202.
[0033] The probe manager 202 acts as a central entity configured for policy management and coordination within the system 102. The probe manager 202 receives the policy requests data from the user interface 200 and stores the relevant policy-related data in the database 208 for future reference. In one embodiment, the policy requests data includes but may not be limited to, at least one of an alias name, a call flow name, and a version for each of the NF. The probe manager 202 redirects the policy requests data to the conductor unit 206.
[0034] In one embodiment, the probe manager 202 redirects the policy requests data to the fulcrum 212. The fulcrum 212 describes a central or pivotal point in the system 102 or the network 106 upon which other components or processes depend. For instance, in a network management, the fulcrum 212 might refer to a critical node or device that plays a central role in the functioning or management of the network 106, similar to a pivotal point that supports and balances the system 102. In another embodiment, the probe manager 202 also redirects the received policy request data from the user interface 200 to the ML probe unit 204. The term “probe unit” and “ML probe unit” are used interchangeably without limiting the scope of the disclosure. The probe unit 204 is embedded in the network functions of 5G or 4G core network. The probe unit 204 allows to probe geographically distributed Virtualized Network Functions (VNFs)/Cloud Native Functions (CNFs).
[0035] In one embodiment, the ML probe unit 204 utilizes a Machine Learning (ML) technique to analyze and process the data from the NF. In one embodiment, for example, the ML techniques include at least one of, but not be limited to, a Supervised Learning (SL), a Support Vector Machine (SVM), a K-Nearest Neighbors (KNN), a Support Vector Regression (SVR) and a Gaussian Process Regression (DPR) algorithm. In an alternative embodiment, the ML is deployed separately as a “Machine Learning as a Service” (MLaaS) solution. The ML probe unit 204 interacts with the MLaaS to process the data from the NF. The ML probe unit 204 is configured to collect the data from NFs and stream the data in real-time to other components of the probing system 210. Further, the data collected based on the configured policy request includes the set of pre-defined rules to provide at least one of an alias name, a call flow name, and a version for each network function. The data is referred to as Streaming Data Records (SDRs) data. These records are crucial for network operations, management, and analytics. The SDRs can be a transaction or procedure in 5G CN or a call flow in 4G network. Further, the SDR can also be a call detail record (CDR) written in network nodes or a debugging record (can be logs as well).
[0036] Upon analyzing and processing the data from the NF, the ML probe unit 204 parses and filters the data based on the policies provisioned for each of the NF. The ML Probe unit 204 performs an action, such as data filtering, data enrichment, and creation of new fields based on the configured policies. The ML probe unit 204 reduces the false positives and enhances decision-making certainty using crowdsourced data and algorithms trained on diverse datasets. The processed data is then forwarded to the conductor unit 206 for further processing.
[0037] The conductor unit 206 performs tasks based on the configured policies. The conductor unit 206 utilizes the processed data received from the ML probe unit 204 and takes an appropriate action based on the policy provisions. The conductor unit 206 is a customized decoder which deciphers and ingests the processed data based on the policy before feeding it to other components of the probing system 210. The conductor unit 206 performs one or more operations, but not limited to, data aggregation, correlation, and forwarding of the data to the probing system 210 within the system 102 architecture. Further, the conductor unit 206 perform primary operations on the incoming data. These operations shall include sorting the data, filtering certain configured attributes which are not required for analysis, splitting the data, etc, based on the configured policy request.
[0038] The indexer 214 provides additional functionality for efficient data processing and indexing of the data within the system 102 or as a file in file system. The indexer 214 components assist in optimizing the data analysis and monitoring operations by organizing and managing the data streams based on the configured policies.
[0039] The normalizer 216 and the correlation engine 218 directly receive the policy request data from the user interface 200. In one embodiment, the normalizer 216 performs data normalization of the policy request data. In one embodiment, the correlation engine 218 performs correlation analysis, and generates actionable insights for network optimization, troubleshooting, and decision-making. The correlation engine 218 typically processes data such as logs, performance metrics, error codes, and other relevant information from different network elements. By correlating the processed data, the correlation engine 218 can detect anomalies, root causes of issues, and areas for optimization, ultimately providing actionable insights for improving network performance, troubleshooting problems, and making informed decisions.
[0040] The system 102 architecture is interconnected, with the data flows and policy management and being coordinated through the probe manager 202. The probing system 210 collaborate to ensure seamless data ingestion, processing, and analysis, enabling effective monitoring and troubleshooting in the network 106.
[0041] Referring to FIG. 3, FIG. 3 illustrates an exemplary block diagram of the system 102 for monitoring and analysis of data in the network 106, according to various embodiments of the present invention. The system 102 includes one or more processors 302, a memory 304, an input/output (I/O) interface unit 200, a display unit 308, an input device 310 and the probing system 210. Further, the system 102 comprises one or more processors 302. The one or more processors 302, hereinafter referred to as the processor 302 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, single board computers, and/or any devices that manipulate signals based on operational instructions. However, it is to be noted that the system 102 may include multiple processors as per the requirement and without deviating from the scope of the present disclosure. Among other capabilities, the processor 302 is configured to fetch and execute computer-readable instructions stored in the memory 304.
[0042] The memory 304 may be configured to store one or more computer-readable instructions or routines in a non-transitory computer-readable storage medium, which may be fetched and executed to create or share data packets over the network service. The memory 304 may include any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like. In an embodiment, the input/output (I/O) interface unit 200 includes a variety of interfaces, for example, interfaces for data input and output devices, referred to as Input/Output (I/O) devices, storage devices, and the like. The I/O interface unit 200 facilitates communication of the system 102. In one embodiment, the I/O interface unit 200 provides a communication pathway for one or more components of the system 102.
[0043] The I/O interface unit 200 may include functionality similar to at least a portion of functionality implemented by one or more computer system interfaces such as those described herein and/or generally known to one having ordinary skill in the art. The I/O interface unit 200 may be rendered on the display unit 308, implemented using LCD display technology, OLED display technology, and/or other types of conventional display technology. The display unit 308 is integrated within the system 102 or connected externally. Further the policy request may be configured to receive request, queries, or information from the user by using the input device 310. The input device 310 may include, but not limited to, keyboard, buttons, scroll wheels, cursors, touchscreen sensors, audio command interfaces, magnetic strip reader, optical scanner, etc.
[0044] The system 102, may further comprise the database 208. The database 208 may be communicably connected to the processor 302, and the memory 304. The database 208 is configured to store and retrieve the relevant policy-related data provided by an administrator. Further, the processor 302, in an embodiment, may be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processor 302. In the examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processor 302 may be processor-executable instructions stored on a non-transitory machine-readable storage medium and the hardware for processor 302 may comprise a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the memory 304 may store instructions that, when executed by the processing resource, implement the processor 302. In such examples, the system 102 may comprise the memory 304 storing the instructions and the processing resource to execute the instructions, or the memory 304 may be separate but accessible to the system 102 and the processing resource. In other examples, the processor 302 may be implemented by electronic circuitry.
[0045] In order for the system 102 to monitor and analyze the data in the network 106, the processor 302 includes a plurality of modules. The plurality of modules includes a transceiver module 320, a provisioning module 325 and an analysis module 330 communicably coupled to each other. The system 102 is configured to associate each of the plurality of units with the components of the probing system 210.
[0046] The transceiver module 320 of the processor 302 is communicably connected to each of the at least first UE 104a, the second UE 104b, and the third UE 104c via the network 106. Accordingly, the transceiver module 308 is configured to receive the policy request from at least one of the user equipment 104 and transfer the policy request to each of the ML probe unit 204 and the conductor unit 206. The ML probe unit 204 enables the network analytics to customize network baselines and identify issues, trends, and root causes accurately. In one embodiment, the policy request includes the set of pre-defined rules configured to provide at least one of an alias name, a call flow name, and a version for each network function.
[0047] The provisioning module 325 of the processor 202 is communicably connected to the transceiver module 320. The provisioning module 325 receives the policy request from the transceiver module 320 to implement the set of pre-defined rules at the ML probe unit 204. In one embodiment, the set of pre-defined rules are implemented at the ML probe unit 204 based on the receipt of the policy request from the user equipment 104.
[0048] The provisioning module 325 is configured to provision the set of pre-defined rules at the conductor unit 206 on receipt of the policy request. In one embodiment, the set of pre-defined rules pertaining to the conductor unit 206 is stored in the database 208 for easy access and efficient management. The analysis module 330 of the processor 202 is communicably connected to the provisioning module 325. The analysis module 330 is configured to parse the data received from one or more NF based on the set of pre-defined rules implemented at the ML probe unit 204.
[0049] In one embodiment, based on parsing the data is subjected to actions such as data filtering, data enrichment, and creation of additional fields with respect to the set of predefined rules implemented at the ML probe unit 204. The parsed data is continuously monitored according to the set of predefined rules. The provisioning module 330 is configured for specific conditions, such as performance issues or security anomalies, as defined by the set of predefined rules. The monitoring process involves continuously tracking the parsed data to identify any deviations, anomalies, or conditions that meet the criteria specified by the set of predefined rules at the ML probe unit 204. In one embodiment, the monitoring process includes, at least one of, but not limited to, monitoring for unusual traffic patterns, detecting performance bottlenecks, or identifying potential security threats. The parsed data analysis helps in understanding the current state of the network 106 and predicting potential future issues.
[0050] In one embodiment, the transceiver module 320 transmits the parsed data to the conductor unit 206. In one embodiment, the conductor unit 206 utilizes the parsed data to perform one or more actions based on the provisioned set of pre-defined rules. In one embodiment, the one or more actions include one of data aggregation, data correlation, forwarding of the data to the probing system 210 such as the fulcrum 212, the indexer 214, the normalizer 216 and the co-relation engine 218. In one embodiment, the data received from the one or more NF is analyzed at multiple network entities, including at least one of, a network, an interface, a procedure, the NF, the NF instance, and container ID, thereby aiding in identifying an error and the network entity where the error originated from. The process of analyzing clear codes/error codes received in the SDR (Streaming Data Records) records across various network hierarchies involves multiple steps to pinpoint the exact network entity causing the issue. The clear codes/error codes are collected from the SDR records. The collected error codes are analyzed at different levels of the network hierarchy, from the highest level (e.g., a core network) to the lowest level (e.g., individual devices or network elements). Once the issue occurs in the network entity is identified, the issue is reported to network administrators to take targeted actions to resolve the issue. By doing so, the system 102 enables efficient policy provisioning, reducing the burden of data searching and analysis. The system 102 streamlines debugging and troubleshooting processes, reduces manpower requirements, and minimizes the load on the network 106.
[0051] Referring to FIG. 4, FIG. 4 is an exemplary embodiment of a monitoring and analyzing of the data system 102 of FIG. 3, according to various embodiments of the present invention. As mentioned earlier in FIG. 1, each of the at least first UE 104a, the second UE 104b, and the third UE 104c transmits the policy request to the probe manager 202 via the network 106. As mentioned earlier, the first UE 104a includes one or more primary processors 405 communicably coupled to the one or more processors 302 of the system 102. The one or more primary processors 405 are coupled with a memory 410 storing instructions which are executed by the one or more primary processors 302. Execution of the stored instructions by the one or more primary processors 405 enables the first UE 104a to transmit the policy request from the user via an interface module to the system 102. The execution of the stored instructions by the one or more primary processors 405 further enables the first UE 10a4 to transmit the policy request from where the request is initiated to the one or more processors 305.
[0052] The first UE 104a includes one or more primary processors 405 coupled with the memory 410 storing instructions which are executed by the one or more primary processors 405. Execution of the stored instructions by the one or more primary processors 405 enables the first UE 104a to transmit the policy request from each of the at least first UE 104a, the second UE 104b, and the third UE 104c.
[0053] The at least first UE 104a, the second UE 104b, and the third UE 104c may comprise the memory 410 such as a volatile memory (e.g., RAM), a non-volatile memory (e.g., disk memory, FLASH memory, EPROMs, etc.), an unalterable memory, and/or other types of memory. In one implementation, the memory 410 might be configured or designed to store data. The data may pertain to attributes and access rights specifically defined for each of the at least the first UE 104a, the second UE 104b, and the third UE 104c.
[0054] As mentioned earlier in FIG. 3, the processor 302 includes the transceiver module 320, the provisioning module 325 and the analysis module 330 communicably coupled to each other.
[0055] For the sake of brevity, it is to be noted that similar description related to the working and operation of the system 102 as illustrated in FIG. 3 has been omitted to avoid repetition. The limited description provided for the system 102 in FIG. 4, should be read with the description as provided for the system 102 in the FIG. 3 above, and should not be construed as limiting the scope of the present disclosure.
[0056] Referring to FIG. 5, FIG. 5 shows a flow diagram of monitoring and analysis of data in the network 106, according to various embodiments of the present system. More specifically, the method 500 further retrieves the policy request from the user interface 200 to facilitate in ease of accessing the remote server 108 to monitor and analyze the data in the network 106. For the purpose of description, the method 500 is described with the embodiments as illustrated in FIG. 3 and should nowhere be construed as limiting the scope of the present disclosure.
[0057] At step 501, the method 500 includes the step of receiving the policy request from at least one of the user interface 200 and transmit the policy request to each of the ML probe unit 204 and the conductor unit 206. In one embodiment, the policy request includes the set of pre-defined rules configured to provide at least one of an alias name, a call flow name, and a version for each the network function.
[0058] At step 502, the method 500 includes the step to provision the set of pre-defined rules at the ML probe unit 204 on receipt of the policy request from the user equipment 104.
[0059] At step 503, the method 500 includes the step of provisioning the set of pre-defined rules at the conductor unit 206 on receipt of the policy request. In one embodiment, the set of pre-defined rules pertaining to the conductor unit 206 is stored in the database 208 for easy access and efficient management.
[0060] At step 504, the method 500 includes the step to parse the data received from the one or more NF based on the set of pre-defined rules implemented at the ML probe unit 204. In one embodiment, based on parsing the data is subjected to actions such as data filtering, data enrichment, and creation of additional fields with respect to the set of pre-defined rules implemented at the ML probe unit 204. In one embodiment, the data received from the one or more NF is analyzed at multiple network entities, including at least one of, a network, an interface, a procedure, the NF, the NF instance, and container ID, thereby aiding in identifying an error and the network entity where the error originated from.
[0061] At step 505, the method 500 include the step of transmitting the parsed data to the conductor unit 206 from the transceiver module 320. In one embodiment, the conductor unit 206 utilizes the parsed data to perform one or more actions based on the provisioned set of pre-defined rules. In one embodiment, the one or more actions include one of data aggregation, data correlation, forwarding of the data to the probing system 210 such as the fulcrum 212, the indexer 214, the normalizer 216 and the co-relation engine 218. In one embodiment, the fulcrum 212 and the indexer 214 components help in efficient data processing and indexing of the data within the system 102. The fulcrum 212 and the indexer 214 assist in optimizing the data analysis and monitoring operations by organizing and managing the data streams based on the configured policies. Further, the normalizer 216 and the correlation engine 218 perform data normalization, correlation analysis, and generate actionable insights for network optimization, troubleshooting, and decision-making.
[0062] The present invention further discloses a non-transitory computer-readable medium having stored thereon computer-readable instructions. The computer-readable instructions are executed by a processor 302. The processor 302 is configured to receive the policy request from at least one of the user equipment 104 and transfers the policy request to each of the ML probe unit 204 and the conductor unit 206. The processor 302 implements the set of pre-defined rules at the ML unit 204 on receipt of the policy request, wherein the policy request includes the set of pre-defined rules configured to provide at least one of an alias name, a call flow name, and a version for each network function. The processor 302 is configured to provision the set of pre-defined rules at the conductor unit 206 on receipt of the policy request. Further, the processor 302 is configured to parse the data received from the one or more NF based on the set of pre-defined rules implemented at the ML unit 204 and thereby monitor and analyze the network data.
[0063] A person of ordinary skill in the art will readily ascertain that the illustrated embodiments and steps in description and drawings (FIG.1-5) are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
[0064] The present disclosure incorporates technical advancement of the network management and facilitates an optimal utilization of probing system networks. The advantages of the invention include the ability to monitor and analyze the data in the network, predict the failures at the lowest network level, reducing the load on the network, streamlining debugging and troubleshooting processes, and minimizing the need for manual intervention. The system improves network performance, enhances resource utilization, and provides valuable insights for network optimization and decision-making.
[0065] The present invention offers multiple advantages over the prior art and the above listed are a few examples to emphasize on some of the advantageous features. The listed advantages are to be read in a non-limiting manner.
REFERENCE NUMERALS
[0066] Environment - 100;
[0067] System - 102;
[0068] User Equipment - 104;
[0069] Network - 106;
[0070] Remote server-108;
[0071] User interface- 200;
[0072] Probe manager- 202;
[0073] ML probe unit- 204;
[0074] Conductor unit- 206;
[0075] Database- 208;
[0076] Probing system- 210;
[0077] Fulcrum-212;
[0078] Index- 214;
[0079] Normalizer- 216;
[0080] Correlation engine- 218;
[0081] One or more processor -302;
[0082] Memory – 304;
[0083] Display- 308;
[0084] Input device- 310;
[0085] Transceiver Module- 320;
[0086] Provisioning Module - 325;
[0087] Analysis Module - 330;
[0088] Primary processor- 405;
[0089] Memory- 410.
,CLAIMS:CLAIMS:
We Claim:
1. A method (500) of monitoring and analysis of data in a network (106), the method (500) comprising the steps of:
receiving, by one or more processors (302), a policy request from at least one of a User Equipment (UE) (104);
transferring, by the one or more processors (302), the policy request to each of a probe unit (204) and a conductor unit (206);
provisioning, by the one or more processors (302), a set of pre-defined rules at the probe unit (204) and the conductor unit (206) on receipt of the policy request; and
parsing, by the one or more processors (302), the data received from one or more Network Functions (NF) based on the set of predefined rules provisioned at the probe unit (204), and thereby monitoring and analysing the network data.
2. The method (500) as claimed in claim 1, wherein the policy request includes the set of pre-defined rules configured to provide at least one of an alias name, a call flow name, and a version for each network function.
3. The method (500) as claimed in claim 1, wherein the set of pre-defined rules pertaining to the conductor unit (206) is stored in a database (208).
4. The method (500) as claimed in claim 1, wherein based on parsing, the data is subjected to actions such, as data filtering, data enrichment, and creation of additional fields with respect to the set of pre-defined rules implemented at the probe unit (204).
5. The method (500) as claimed in claim 1 further comprising the step of:
transmitting, by the one or more processors (302), the parsed data to the conductor unit (206), wherein the conductor unit (206) utilizes the parsed data to perform actions based on the provisioned set of pre-defined rules.
6. The method (500) as claimed in claim 5, wherein the actions include one of data aggregation, data corelation, forwarding of the data to components of a probing system (210), wherein the components of the probing system (210) include a fulcrum (212), an indexer (214), a normalizer (216) and a co-relation engine (218).
7. The method (500) as claimed in claim 1, wherein the data received from the NF is analysed at multiple network entities, including at least one of, a network, an interface, a procedure, the NF, the NF instance, and container ID, thereby aiding in identifying an error and the network entity where the error originated from.
8. A system (102) for monitoring and analysis of data in a network (106), the system (102) comprising:
a transceiver (320) configured to:
receive, a policy request from at least one of a user equipment (104);
transfer, the policy request to each of a probe unit (204) and a conductor unit (206);
a provisioning module (325) configured to, provision, a set of pre-defined rules at the probe unit (204) and the conductor unit (206) on receipt of the policy request; and
an analysis module (330) configured to, parse, the data received from one or more Network Functions (NF) based on the set of pre-defined rules implemented at the probe unit (204), and thereby monitor and analyse the network data.
9. The system (102) as claimed in claim 8, the transceiver (320) further configured to:
transmit, the parsed data to the conductor unit (206), wherein the conductor unit (206) utilizes the parsed data to perform actions based on the provisioned set of pre-defined rules.
10. The system (102) as claimed in claim 9, wherein the actions include one of data aggregation, data corelation, forwarding of the data to components of a probing system (210), wherein the components of the probing system (210) include a fulcrum (212), an indexer (214), a normalizer (216) and a co-relation engine (218).
11. The system (102) as claimed in claim 8, wherein the data received from the NF is analysed at multiple network entities, including at least one of, a network, an interface, a procedure, the NF, the NF instance, and container ID, thereby aiding in identifying an error and the network entity where the error originated from.
12. The system (102) as claimed in claim 8, wherein the policy request includes the set of pre-defined rules configured to provide at least one of an alias name, a call flow name, and a version for each network function.
13. The system (102) as claimed in claim 8, wherein the set of pre-defined rules pertaining to the conductor unit (206) is stored in a database (208) f
14. The system (102) as claimed in claim 8, wherein based on parsing, the data is subjected to actions such, as data filtering, data enrichment, and creation of additional fields with respect to the set of pre-defined rules implemented at the probe unit (204).
15. A user equipment (UE) (104) comprising:
one or more primary processors (405) communicatively coupled to one or more processors (302) in a system (102), the one or more primary processors (405) coupled with a memory (410), wherein said memory (410) stores instructions which when executed by the one or more primary processors (405) causes the UE (104) to:
generate and transmit a policy request to the one or more processors (302), wherein the one or more processors (302) is configured to perform the steps as claimed in claim 1.
| # | Name | Date |
|---|---|---|
| 1 | 202321049437-STATEMENT OF UNDERTAKING (FORM 3) [21-07-2023(online)].pdf | 2023-07-21 |
| 2 | 202321049437-PROVISIONAL SPECIFICATION [21-07-2023(online)].pdf | 2023-07-21 |
| 3 | 202321049437-FORM 1 [21-07-2023(online)].pdf | 2023-07-21 |
| 4 | 202321049437-FIGURE OF ABSTRACT [21-07-2023(online)].pdf | 2023-07-21 |
| 5 | 202321049437-DRAWINGS [21-07-2023(online)].pdf | 2023-07-21 |
| 6 | 202321049437-DECLARATION OF INVENTORSHIP (FORM 5) [21-07-2023(online)].pdf | 2023-07-21 |
| 7 | 202321049437-FORM-26 [03-10-2023(online)].pdf | 2023-10-03 |
| 8 | 202321049437-Proof of Right [08-01-2024(online)].pdf | 2024-01-08 |
| 9 | 202321049437-DRAWING [19-07-2024(online)].pdf | 2024-07-19 |
| 10 | 202321049437-COMPLETE SPECIFICATION [19-07-2024(online)].pdf | 2024-07-19 |
| 11 | Abstract-1.jpg | 2024-10-01 |
| 12 | 202321049437-Power of Attorney [05-11-2024(online)].pdf | 2024-11-05 |
| 13 | 202321049437-Form 1 (Submitted on date of filing) [05-11-2024(online)].pdf | 2024-11-05 |
| 14 | 202321049437-Covering Letter [05-11-2024(online)].pdf | 2024-11-05 |
| 15 | 202321049437-CERTIFIED COPIES TRANSMISSION TO IB [05-11-2024(online)].pdf | 2024-11-05 |
| 16 | 202321049437-FORM 3 [02-12-2024(online)].pdf | 2024-12-02 |
| 17 | 202321049437-FORM 18 [20-03-2025(online)].pdf | 2025-03-20 |