Sign In to Follow Application
View All Documents & Correspondence

Method And System For Managing Overload Conditions At Network Fucntions Within A Telecommunication Network

Abstract: The present disclosure relates to a method and a system for managing overload conditions at network functions (NFs) within a network. The method comprises configuring an object pool within a Policy Control Function (PCF) [122]. The method comprises setting a threshold value for a number of objects to be concurrently selected from the object pool by NFs at the PCF [122]. The method comprises monitoring a number of objects currently selected from the object pool by the NFs via an alarm module [316]. The method comprises detecting a breach of the threshold value when the number of objects currently selected by the NF exceeds the set threshold value via the alarm module [316]. The method comprises raising a conditional alarm indicative of overload condition based on detection of the threshold breach for managing the overload condition and display it to user via a display unit [312]. [FIG. 4]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
05 September 2023
Publication Number
1/2025
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

Jio Platforms Limited
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Inventors

1. Aayush Bhatnagar
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
2. Mukta Bhaskar Shetty
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
3. Alok Bhaskar
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
4. Rajesh Hansda
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
5. Sanjeev Singh
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
6. Shreyas Markad
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.

Specification

FORM 2
THE PATENTS ACT, 1970
(39 OF 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR MANAGING OVERLOAD CONDITIONS
AT NETWORK FUCNTIONS WITHIN A TELECOMMUNICATION
NETWORK”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr.
Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat,
India.
The following specification particularly describes the invention and the manner in
which it is to be performed.
2
METHOD AND SYSTEM FOR MANAGING OVERLOAD CONDITIONS
AT NETWORK FUCNTIONS WITHIN A TELECOMMUNICATION
NETWORK
5 TECHNICAL FIELD
[0001] Embodiments of the present disclosure generally relate to network
performance management systems. More particularly, embodiments of the present
disclosure relate to managing overload conditions at network functions (NFs)
within a telecommunication network.
10 BACKGROUND
[0002] The following description of the related art is intended to provide
background information pertaining to the field of the disclosure. This section may
include certain aspects of the art that may be related to various features of the
present disclosure. However, it should be appreciated that this section is used only
15 to enhance the understanding of the reader with respect to the present disclosure,
and not as admissions of the prior art.
[0003] Wireless communication technology has rapidly evolved over the past few
decades, with each generation bringing significant improvements and
20 advancements. The first generation of wireless communication technology was
based on analog technology and offered only voice services. However, with the
advent of the second generation (2G) technology, digital communication and data
services became possible, and text messaging was introduced. 3G technology
marked the introduction of high-speed internet access, mobile video calling, and
25 location-based services. The fourth generation (4G) technology revolutionized
wireless communication with faster data speeds, better network coverage, and
improved security. Currently, the fifth generation (5G) technology is being
deployed, promising even faster data speeds, low latency, and the ability to connect
3
multiple devices simultaneously. With each generation, wireless communication
technology has become more advanced, sophisticated, and capable of delivering
more services to its users.
[0004] In the fifth-generation (5G) technology, 5 due to an increase in the number of
users accessing 5G services, overload conditions in various network function(s)
such as a Policy Control Function (PCF), a Binding Support Function (BSF), a
Charging Function (CHF), and a Network Repository Function (NRF) also
increases, which are required to be monitored to prevent an adverse impact on the
10 overall experience of the radio communication network.
[0005] 5G network function(s) including PCF, BSF, CHF, and NRF are susceptible
to overload due to various internal and external reasons. One of these reasons is
when the permissible limit to borrow objects from a pool exceeds. The overload
15 conditions in the network function(s) lead to wastage of resources, affect the
stability, network, and performance of the 5G network, and also degrade the user
experience.
[0006] Thus, in order to improve the radio access network capacity, network
20 stability, and network performance, there exists an imperative need in the art to
reliably monitor and manage the overload conditions at various network
function(s), which the present disclosure aims to address.
SUMMARY
[0007] This section is provided to introduce certain aspects of the present disclosure
25 in a simplified form that are further described below in the detailed description.
This summary is not intended to identify the key features or the scope of the claimed
subject matter.
4
[0008] An aspect of the present disclosure may relate to a method for managing
overload conditions at network functions (NFs) within a telecommunication
network. The method comprises configuring, by a configuration unit, an object pool
within a Policy Control Function (PCF). The method further comprises setting, by
an implementation unit within the PCF, 5 a threshold value for a number of objects
to be concurrently selected from the object pool by a NF. Furthermore, the method
comprises monitoring, by a determination unit via an alarm module within the PCF,
a number of objects currently selected from the object pool by the NF. The method
further comprises detecting, by the determination unit via the alarm module, a
10 breach of the threshold value when the number of objects currently selected by the
NF exceeds the set threshold value. The method further encompasses raising, by an
execution unit via the PCF, a conditional alarm indicative of an overload condition
based on the detection of the threshold breach for managing the overload condition.
15 [0009] In an exemplary aspect of the present disclosure, the object pool is
configured with a set of parameters comprising a maximum number of active
objects, a maximum number of idle objects, and a maximum wait time for object
selection.
20 [0010] In an exemplary aspect of the present disclosure, the method further
comprises maintaining, by a maintenance unit via the PCF, a mapping within the
PCF, wherein the mapping comprises a key corresponding to interface or thread for
each object of the object pool.
25 [0011] In an exemplary aspect of the present disclosure, the threshold value is
uniformly applied across a plurality of nodes within a network cluster.
[0012] In an exemplary aspect of the present disclosure, the method further
comprises displaying, by a display unit via a graphical user interface (GUI), the
30 conditional alarm for user visibility and reset.
5
[0013] In an exemplary aspect of the present disclosure, the monitoring by the
alarm module is performed periodically to enable continuous tracking of the
number of objects selected from the object pool.
5
[0014] In an exemplary aspect of the present disclosure, the raising of the
conditional alarm is based on a comparison between the threshold value and the
number of objects currently selected from the object pool.
10 [0015] Another aspect of the present disclosure may relate to a system for
managing overload conditions at network functions (NFs) within a
telecommunication network. The system comprises a configuration unit. The
configuration unit is configured to configure, an object pool within a Policy Control
Function (PCF). The system further comprises an implementation unit connected at
15 least with a maintenance unit. The implementation unit is configured to set, within
the PCF, a threshold value for a number of objects to be concurrently selected from
the object pool by a NF. The system further includes a determination unit connected
at least with the implementation unit. The determination unit is configured to
monitor, via an alarm module within the PCF, a number of objects currently
20 selected from the object pool by the NF. The determination unit is further
configured to detect, via the alarm module, a breach of the threshold value when
the number of objects currently selected by the NF exceeds the set threshold value.
The system further comprises an execution unit connected at least with the
determination unit. The execution unit is configured to raise, via the PCF, a
25 conditional alarm indicative of an overload condition based on the detection of the
threshold breach for managing the overload condition.
[0016] Yet another aspect of the present disclosure may relate to a non-transitory
computer readable storage medium storing instructions for managing overload
30 conditions at network functions (NFs) within a telecommunication network, the
6
instructions include executable code which, when executed by one or more units of
a system, cause a configuration unit of the system to configure, an object pool
within a Policy Control Function (PCF). The instructions when executed by the
system further cause an implementation unit of the system, connected at least with
a maintenance unit, to set, within the PCF, 5 a threshold value for a number of objects
to be concurrently selected from the object pool by a NF. The instructions when
executed by the system further cause a determination unit of the system, connected
at least with the implementation unit, to monitor, via an alarm module within the
PCF, a number of objects currently selected from the object pool by the NF. The
10 instructions when executed by the system further cause the determination unit to
detect, via the alarm module, a breach of the threshold value when the number of
objects currently selected by the NF exceeds the set threshold value. The
instructions when executed by the system further cause an execution unit connected
at least with the determination unit, to raise, via the PCF, a conditional alarm
15 indicative of an overload condition based on the detection of the threshold breach
for managing the overload condition.
OBJECTS OF THE INVENTION
[0017] Some of the objects of the present disclosure, which at least one
embodiment disclosed herein satisfies are listed herein below.
20
[0018] It is an object of the present disclosure to provide a system and a method to
monitor the overload conditions in the network functions (NFs).
[0019] It is another object of the present disclosure to track or monitor the behavior
25 of objects being borrowed from the pool in 5G NFs.
[0020] It is another object of the present disclosure to enhance the overall stability
and performance of the 5G network.
7
[0021] It is another object of the present disclosure to set threshold values and
triggering alarms at the NFs to proactively monitor resource utilization and take
preventive actions before an overload situation occurs.
[0022] It is yet another object of 5 the present disclosure to allow the NFs to operate
at their optimal levels, providing consistent and reliable services to end-users.
[0023] It is another object of the present disclosure to implement an alarm-based
monitoring system with low complexity and minimal impact on the interfaces.
10 DESCRIPTION OF THE DRAWINGS
[0024] The accompanying drawings, which are incorporated herein, and constitute
a part of this disclosure, illustrate exemplary embodiments of the disclosed methods
and systems in which like reference numerals refer to the same parts throughout the
different drawings. Components in the drawings are not necessarily to scale,
15 emphasis instead being placed upon clearly illustrating the principles of the present
disclosure. Also, the embodiments shown in the figures are not to be construed as
limiting the disclosure, but the possible variants of the method and system
according to the disclosure are illustrated herein to highlight the advantages of the
disclosure. It will be appreciated by those skilled in the art that disclosure of such
20 drawings includes disclosure of electrical components or circuitry commonly used
to implement such components.
[0025] FIG. 1 illustrates an exemplary block diagram representation of 5th
generation core (5GC) network architecture.
25
[0026] FIG. 2 illustrates an exemplary block diagram of a computing device upon
which the features of the present disclosure may be implemented in accordance with
exemplary implementation of the present disclosure.
8
[0027] FIG. 3 illustrates an exemplary block diagram of a system for managing
overload conditions at network functions (NFs) within a telecommunication
network, in accordance with exemplary implementations of the present disclosure.
[0028] FIG. 4 illustrates a 5 method flow diagram for managing overload conditions
at network functions (NFs) within a telecommunication network, in accordance
with exemplary implementations of the present disclosure.
[0029] FIG. 5 illustrates an exemplary implementation of the method for managing
10 overload conditions at network functions (NFs) within a telecommunication
network, in accordance with exemplary implementations of the present disclosure.
[0030] The foregoing shall be more apparent from the following more detailed
description of the disclosure.
15 DETAILED DESCRIPTION
[0031] In the following description, for the purposes of explanation, various
specific details are set forth in order to provide a thorough understanding of
embodiments of the present disclosure. It will be apparent, however, that
embodiments of the present disclosure may be practiced without these specific
20 details. Several features described hereafter may each be used independently of one
another or with any combination of other features. An individual feature may not
address any of the problems discussed above or might address only some of the
problems discussed above.
25 [0032] The ensuing description provides exemplary embodiments only, and is not
intended to limit the scope, applicability, or configuration of the disclosure. Rather,
the ensuing description of the exemplary embodiments will provide those skilled in
the art with an enabling description for implementing an exemplary embodiment.
It should be understood that various changes may be made in the function and
30 arrangement of elements without departing from the spirit and scope of the
disclosure as set forth.
9
[0033] Specific details are given in the following description to provide a thorough
understanding of the embodiments. However, it will be understood by one of
ordinary skill in the art that the embodiments may be practiced without these
specific details. For example, 5 circuits, systems, processes, and other components
may be shown as components in block diagram form in order not to obscure the
embodiments in unnecessary detail.
[0034] Also, it is noted that individual embodiments may be described as a process
10 which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure
diagram, or a block diagram. Although a flowchart may describe the operations as
a sequential process, many of the operations may be performed in parallel or
concurrently. In addition, the order of the operations may be re-arranged. A process
is terminated when its operations are completed but could have additional steps not
15 included in a figure.
[0035] The word “exemplary” and/or “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the
subject matter disclosed herein is not limited by such examples. In addition, any
20 aspect or design described herein as “exemplary” and/or “demonstrative” is not
necessarily to be construed as preferred or advantageous over other aspects or
designs, nor is it meant to preclude equivalent exemplary structures and techniques
known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes,” “has,” “contains,” and other similar words are used in either the detailed
25 description or the claims, such terms are intended to be inclusive—in a manner
similar to the term “comprising” as an open transition word—without precluding
any additional or other elements.
10
[0036] As used herein, a “processing unit” or “processor” or “operating processor”
includes one or more processors, wherein processor refers to any logic circuitry for
processing instructions. A processor may be a general-purpose processor, a special
purpose processor, a conventional processor, a digital signal processor, a plurality
of microprocessors, one or more microprocessors 5 in association with a (Digital
Signal Processing) DSP core, a controller, a microcontroller, Application Specific
Integrated Circuits, Field Programmable Gate Array circuits, any other type of
integrated circuits, etc. The processor may perform signal coding data processing,
input/output processing, and/or any other functionality that enables the working of
10 the system according to the present disclosure. More specifically, the processor or
processing unit is a hardware processor.
[0037] As used herein, “a user equipment”, “a user device”, “a smart-user-device”,
“a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”,
15 “a wireless communication device”, “a mobile communication device”, “a
communication device” may be any electrical, electronic and/or computing device
or equipment, capable of implementing the features of the present disclosure. The
user equipment/device may include, but is not limited to, a mobile phone, smart
phone, laptop, a general-purpose computer, desktop, personal digital assistant,
20 tablet computer, wearable device or any other computing device which is capable
of implementing the features of the present disclosure. Also, the user device may
contain at least one input means configured to receive an input from at least one of
a transceiver unit, a processing unit, a storage unit, a detection unit and any other
such unit(s) which are required to implement the features of the present disclosure.
25
[0038] As used herein, “storage unit” or “memory unit” refers to a machine or
computer-readable medium including any mechanism for storing information in a
form readable by a computer or similar machine. For example, a computer-readable
medium includes read-only memory (“ROM”), random access memory (“RAM”),
30 magnetic disk storage media, optical storage media, flash memory devices or other
types of machine-accessible storage media. The storage unit stores at least the data
11
that may be required by one or more units of the system to perform their respective
functions.
[0039] As used herein “interface” or “user interface” refers to a shared boundary
across which two or more separate components 5 of a system exchange information
or data. The interface may also be referred to a set of rules or protocols that define
communication or interaction of one or more modules or one or more units with
each other, which also includes the methods, functions, or procedures that may be
called.
10
[0040] All modules, units, components used herein, unless explicitly excluded
herein, may be software modules or hardware processors, the processors being a
general-purpose processor, a special purpose processor, a conventional processor,
a digital signal processor (DSP), a plurality of microprocessors, one or more
15 microprocessors in association with a DSP core, a controller, a microcontroller,
Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array
circuits (FPGA), any other type of integrated circuits, etc.
[0041] As used herein the transceiver unit include at least one receiver and at least
20 one transmitter configured respectively for receiving and transmitting data, signals,
information or a combination thereof between units/components within the system
and/or connected with the system.
[0042] As discussed in the background section, the current known solutions have
25 several shortcomings. The present disclosure aims to overcome the abovementioned
and other existing problems in this field of technology by providing
method and system for managing overload conditions at network functions (NFs)
within a telecommunication network.
12
[0043] FIG. 1 illustrates an exemplary block diagram representation of 5th
generation core (5GC) network architecture [100], in accordance with exemplary
implementation of the present disclosure. As shown in FIG. 1, the 5GC network
architecture [100] includes a user equipment (UE) [102], a radio access network
(RAN) [104], an access and mobility 5 management function (AMF) [106], a Session
Management Function (SMF) [108], a Service Communication Proxy (SCP) [110],
an Authentication Server Function (AUSF) [112], a Network Slice Specific
Authentication and Authorization Function (NSSAAF) [114], a Network Slice
Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a
10 Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122],
a Unified Data Management (UDM) [124], an application function (AF) [126], a
User Plane Function (UPF) [128], a data network (DN) [130], wherein all the
components are assumed to be connected to each other in a manner as obvious to
the person skilled in the art for implementing features of the present disclosure.
15
[0044] The Radio Access Network (RAN) [104] is the part of a mobile
telecommunications system that connects user equipment (UE) [102] to the core
network (CN) and provides access to different types of networks (e.g., 5G network).
It consists of radio base stations and the radio access technologies that enable
20 wireless communication.
[0045] The Access and Mobility Management Function (AMF) [106] is a 5G core
network function responsible for managing access and mobility aspects, such as UE
registration, connection, and reachability. It also handles mobility management
25 procedures like handovers and paging.
[0046] The Session Management Function (SMF) [108] is a 5G core network
function responsible for managing session-related aspects, such as establishing,
modifying, and releasing sessions. It coordinates with the User Plane Function
30 (UPF) for data forwarding and handles IP address allocation and QoS enforcement.
13
[0047] The Service Communication Proxy (SCP) [110] is a network function in the
5G core network that facilitates communication between other network functions
by providing a secure and efficient messaging service. It acts as a mediator for
service-based interfaces.
5
[0048] The Authentication Server Function (AUSF) [112] is a network function in
the 5G core responsible for authenticating UEs during registration and providing
security services. It generates and verifies authentication vectors and tokens.
10 [0049] The Network Slice Specific Authentication and Authorization Function
(NSSAAF) [114] is a network function that provides authentication and
authorization services specific to network slices. It ensures that UEs can access only
the slices for which they are authorized.
15 [0050] The Network Slice Selection Function (NSSF) [116] is a network function
responsible for selecting the appropriate network slice for a UE based on factors
such as subscription, requested services, and network policies.
[0051] The Network Exposure Function (NEF) [118] is a network function that
20 exposes capabilities and services of the 5G network to external applications,
enabling integration with third-party services and applications.
[0052] The Network Repository Function (NRF) [120] is a network function that
acts as a central repository for information about available network functions and
25 services. It facilitates the discovery and dynamic registration of network functions.
[0053] The Policy Control Function (PCF) [122] is a network function responsible
for policy control decisions, such as QoS, charging, and access control, based on
subscriber information and network policies.
30
14
[0054] The Unified Data Management (UDM) [124] is a network function that
centralizes the management of subscriber data, including authentication,
authorization, and subscription information.
[0055] The Application Function (AF) 5 [126] is a network function that represents
external applications interfacing with the 5G core network to access network
capabilities and services.
[0056] The User Plane Function (UPF) [128] is a network function responsible for
10 handling user data traffic, including packet routing, forwarding, and QoS
enforcement.
[0057] The Data Network (DN) [130] refers to a network that provides data
services to user equipment (UE) in a telecommunications system. The data services
15 may include but are not limited to Internet services, private data network related
services.
[0058] FIG. 2 illustrates an exemplary block diagram of a computing device [200]
upon which the features of the present disclosure may be implemented in
20 accordance with exemplary implementation of the present disclosure. In an
implementation, the computing device [200] may also implement a method for
managing overload conditions at network functions (NFs) within a
telecommunication network, utilizing the system. In another implementation, the
computing device [200] itself implements the method managing overload
25 conditions at network functions (NFs) within a telecommunication network, using
one or more units configured within the computing device [200], wherein said one
or more units are capable of implementing the features as disclosed in the present
disclosure.
15
[0059] The computing device [200] may include a bus [202] or other
communication mechanism for communicating information, and a hardware
processor [204] coupled with bus [202] for processing information. The hardware
processor [204] may be, for example, a general-purpose microprocessor. The
computing device [200] may also include 5 a main memory [206], such as a randomaccess
memory (RAM), or other dynamic storage device, coupled to the bus [202]
for storing information and instructions to be executed by the processor [204]. The
main memory [206] also may be used for storing temporary variables or other
intermediate information during execution of the instructions to be executed by the
10 processor [204]. Such instructions, when stored in non-transitory storage media
accessible to the processor [204], render the computing device [200] into a specialpurpose
machine that is customized to perform the operations specified in the
instructions. The computing device [200] further includes a read only memory
(ROM) [208] or other static storage device coupled to the bus [202] for storing static
15 information and instructions for the processor [204].
[0060] A storage device [210], such as a magnetic disk, optical disk, or solid-state
drive is provided and coupled to the bus [202] for storing information and
instructions. The computing device [200] may be coupled via the bus [202] to a
20 display [212], such as a cathode ray tube (CRT), Liquid crystal Display (LCD),
Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for
displaying information to a computer user. An input device [214], including
alphanumeric and other keys, touch screen input means, etc. may be coupled to the
bus [202] for communicating information and command selections to the processor
25 [204]. Another type of user input device may be a cursor controller [216], such as
a mouse, a trackball, or cursor direction keys, for communicating direction
information and command selections to the processor [204], and for controlling
cursor movement on the display [212]. The input device typically has two degrees
of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow
30 the device to specify positions in a plane.
16
[0061] The computing device [200] may implement the techniques described
herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware
and/or program logic which in combination with the computing device [200] causes
or programs the computing device [200] to be a special-purpose machine.
According to one implementation, the techniques 5 herein are performed by the
computing device [200] in response to the processor [204] executing one or more
sequences of one or more instructions contained in the main memory [206]. Such
instructions may be read into the main memory [206] from another storage medium,
such as the storage device [210]. Execution of the sequences of instructions
10 contained in the main memory [206] causes the processor [204] to perform the
process steps described herein. In alternative implementations of the present
disclosure, hard-wired circuitry may be used in place of or in combination with
software instructions.
15 [0062] The computing device [200] also may include a communication interface
[218] coupled to the bus [202]. The communication interface [218] provides a twoway
data communication coupling to a network link [220] that is connected to a
local network [222]. For example, the communication interface [218] may be an
integrated services digital network (ISDN) card, cable modem, satellite modem, or
20 a modem to provide a data communication connection to a corresponding type of
telephone line. As another example, the communication interface [218] may be a
local area network (LAN) card to provide a data communication connection to a
compatible LAN. Wireless links may also be implemented. In any such
implementation, the communication interface [218] sends and receives electrical,
25 electromagnetic or optical signals that carry digital data streams representing
various types of information.
[0063] The computing device [200] can send messages and receive data, including
program code, through the network(s), the network link [220] and the
30 communication interface [218]. In the Internet example, a server [230] might
transmit a requested code for an application program through the Internet [228], the
17
ISP [226], the local network [222], the host [224] and the communication interface
[218]. The received code may be executed by the processor [204] as it is received,
and/or stored in the storage device [210], or other non-volatile storage for later
execution.
5
[0064] The present disclosure is implemented by a system [300] (as shown in FIG.
3). In an implementation, the system [300] may include the computing device [200]
(as shown in FIG. 2). It is further noted that the computing device [200] is able to
perform the steps of a method [400] (as shown in FIG. 4).
10
[0065] Referring to FIG. 3, an exemplary block diagram of a system [300] for
managing overload conditions at network functions (NFs) within a
telecommunication network, is shown, in accordance with the exemplary
implementations of the present disclosure. The system [300] comprises at least one
15 configuration unit [302], at least one implementation unit [304], at least one
determination unit [306], at least one execution unit [308], at least one maintenance
unit [310] and at least one display unit [312]. Also, all of the components/ units of
the system [300] are assumed to be connected to each other unless otherwise
indicated below. As shown in the figures all units shown within the system should
20 also be assumed to be connected to each other. Also, in FIG. 3 only a few units are
shown, however, the system [300] may comprise multiple such units or the system
[300] may comprise any such numbers of said units, as required to implement the
features of the present disclosure. Further, in an implementation, the system [300]
may be present in a user device to implement the features of the present disclosure.
25 The system [300] may be a part of the user device / or may be independent of but
in communication with the user device (may also referred herein as a UE). In
another implementation, the system [300] may reside in a server or a network entity.
In yet another implementation, the system [300] may reside partly in the server/
network entity and partly in the user device.
30
18
[0066] The system [300] is configured to manage overload conditions at network
functions (NFs) within a telecommunication network, with the help of the
interconnection between the components/units of the system [300]. The overload
condition refers to a condition when multiple user equipment are accessing the same
5G core network service and send requests 5 at the PCF [122], and the number of
requests at the PCF [122] have increased and are higher than a permissible limit. In
an implementation of the present disclosure, the system [300] is configured to
manage overload conditions at the PCF [122]. Furthermore, the system [300] may
be implemented at any of the network functions of the 5G Network Architecture
10 [100] as shown in FIG.1. The system [300] may be configured to perform the
functionalities at the UE [102], the RAN [104], the AMF [106], the SMF [108], the
SCP [110], the AUSF [112], the NSSAAF [114], the NSSF [116], the NEF [118],
the NRF [120], the UDM [124], the AF [126] or the UPF [128].
15 [0067] The system [300] comprises a configuration unit [302]. The configuration
unit [302] configures an object pool within the Policy Control Function (PCF)
[122]. The object pool refers to a collection of pre-initialized objects that may be
ready to be used by a network function (NF). The pre-initialized objects may reduce
time taken to create a new object for every new process. When a new request to
20 execute a process is received, the pre-initialized object may be used and returned to
the object pool. An example of the pre-initialized objects from the object pool may
be threads, database connections, and the like. For instance, in a thread pool, a fixed
number of threads are pre-created to execute incoming processes as creating a new
thread for every process is time consuming and slow. The database connection
25 refers to a link between the PCF [122] and a database. Since establishing a new
connection can be time-consuming, the database connection pool may maintain a
set of pre-established database connections. When the PCF [122] needs to interact
with the database, the PCF [122] may borrow a database connection from the
database connection pool, use the database connection, and then return the database
30 connection to the database connection pool for reuse. The object pool is configured
with a set of parameters. The set of parameters include but may not be limited to a
19
maximum number of active objects, a maximum number of idle objects, and a
maximum wait time for object selection. In an example, the object may be a thread,
a database connection, and the like. For instance, the thread pool may include
parameters for the maximum number of threads in the thread pool, the maximum
number of threads active in the thread 5 pool, the maximum number of threads idle
in the thread pool, and the maximum duration of waiting to select a thread from the
thread pool. In an implementation of the present disclosure, the PCF [122] may
configure the object pool at bootstrap of the system [300]. The bootstrap refers to a
phase when the PCF [122] is getting started. The object pool may be configured
10 when the PCF [122] starts, to ensure that the PCF [122] may access the object pool
through a common interface.
[0068] The system [300] includes an implementation unit [304] connected to at
least a maintenance unit [310]. The implementation unit [304] is configured to set,
15 within the PCF [122], a threshold value for a number of objects to be concurrently
selected from the object pool by the NF. The threshold value is uniformly applied
across a plurality of nodes within a network cluster. The threshold value may be
defined by a user. The threshold values can be set at runtime for the object pool
through a Command Line Interface (CLI). The maintenance unit [310] is configured
20 to maintain via the PCF [122], a mapping within the PCF [122]. The mapping
comprises a key corresponding to interface or thread for each object of the object
pool. In an implementation of the present disclosure, the key may map a
corresponding database connection from the database connection pool.
25 [0069] The system [300] further comprises a determination unit [306] connected at
least with the implementation unit [304]. The determination unit [306] is configured
to monitor, via an alarm module [316] within the PCF [122], a number of objects
currently selected from the object pool by the NF. The monitoring by the alarm
module [316] is performed periodically to enable continuous tracking of the number
30 of objects selected from the object pool. In an exemplary embodiment, the periodic
monitoring refers to monitoring at pre-defined intervals. The pre-defined intervals
20
may be set by the user. In another exemplary embodiment, the pre-defined intervals
may be set by the determination unit [306] of the system [300]. The determination
unit [306] is further configured to detect, via the alarm module [316], a breach of
the threshold value when the number of objects currently selected by the NF
exceeds the set threshold value. 5 In an implementation of the present disclosure, the
breach of the threshold value may be when the number of objects currently selected
by the NF exceeds the threshold value.
[0070] Further, the system [300] comprises an execution unit [308] connected at
10 least with the determination unit [306]. The execution unit [308] is configured to
raise, via the PCF [122], a conditional alarm indicative of an overload condition
based on the detection of the threshold breach for managing the overload condition.
The conditional alarm refers to an alarm which may be raised on fulfilling of a
condition. In an implementation of the present disclosure, the condition may be the
15 breach of the threshold value. The raising of the conditional alarm is based on a
comparison between the threshold value and the number of objects currently
selected from the object pool. In an example, if the number of objects currently
selected from the object pool is more than the threshold value, the conditional alarm
will be raised. If the number of objects currently selected from the object pool is
20 less than the threshold value, the conditional alarm may not be raised and the
determination unit [306] may continue to monitor the number of objects currently
selected by the NF from the object pool.
[0071] The system [300] further comprises a display unit [312] configured to
25 display via a graphical user interface (GUI), the conditional alarm for user visibility
and reset. In an implementation of the present disclosure, based on the conditional
alarm, the user may manage the load condition at the NF to avoid overloading.
[0072] In one implementation, the system [300] may comprise at least one
30 processor, at least one memory, at least one Database and at least one interface (Not
shown in FIG). The database may store the object pool that comprises one or more
21
pre-initialized objects. The system [300] further comprises at least one Fault,
Configuration, Accounting, Performance and Security (FCAPS) Module [314].
[0073] The at least one FCAPS Module [314] comprises the alarm module [316],
at least one Counter Module [5 318], at least one Threshold Monitor for Condition
alarms [320]. Also, all of the components/ units of the system [300] are assumed to
be connected to each other unless otherwise indicated below. Also, in FIG. 3 only
a few units are shown, however, the system [300] may comprise multiple such units
or the system [300] may comprise any such numbers of said units, as required to
10 implement the features of the present disclosure. Further, in an implementation, the
system [300] may be present at a network level to implement the features of the
present invention. In an implementation, the system [300] may reside in a server or
a network entity.
15 [0074] The system [300] is configured for the management of overload conditions
in network functions.
[0075] The processor may maintain a mapping within the system [300]. The
mapping includes allocating a key corresponding to each object of the object pool.
20
[0076] The mapped key may be stored in the memory of the system [300].
[0077] The threshold monitor for conditional alarms [320] in the FCAPS module
[314] may monitor a number of objects currently selected from an object pool by
25 the NF. The object pool refers to a collection of pre-initialized objects that may be
ready to be used by the NF. An example of the pre-initialized objects from the object
pool may be threads, database connections, and the like. The threshold value may
be set for the number of objects concurrently selected from the object pool by the
NF. The threshold value can be set at runtime for the object pool through the
30 Interface by the user. The threshold value may be stored in the database of the
system [300]. The monitoring is performed periodically to enable continuous
22
tracking of the number of objects selected from the object pool. In an exemplary
embodiment, the periodic monitoring refers to monitoring at pre-defined intervals.
The user may set the pre-defined intervals. The pre-defined intervals may be set by
the user via the interface.
5
[0078] Next, the alarm module [316] in the FCAPS module [314] may monitor to
detect a breach of the threshold value when the number of objects currently selected
by the NF exceeds the set threshold value. In an implementation of the present
disclosure, the breach of the threshold value may be when the number of objects
10 currently selected by the NF exceeds the threshold value.
[0079] Once the threshold value is breached, i.e., the number of objects selected
from the object pool is more than the threshold value, the conditional alarm may be
raised by the alarm module [316]. In an exemplary embodiment, the conditional
15 alarm raised can be logged, viewed and reset through the interface.
[0080] The counter module [318] may store the object pool. The counter module
[318] may further store the object from the object pool along with the set of
maximum number of objects in the object pool, maximum number of active objects,
20 a maximum number of idle objects, and the like.
[0081] Referring to FIG. 4, an exemplary flow diagram of a method [400] for
managing overload conditions at network functions (NFs) within a
telecommunication network, in accordance with exemplary implementations of the
25 present disclosure is shown. The overload condition refers to a condition when
multiple user equipments are accessing 5G core network services, and requests at
the PCF [122] and other network functions have increased to be higher than a
permissible limit. In an implementation the method [400] is performed by the
system [300]. Further, in an implementation, the system [300] may be present in a
30 server device to implement the features of the present disclosure. Also, as shown in
FIG. 4, the method [400] starts at step [402].
23
[0082] At step [404], the method comprises configuring, by a configuration unit
[302], an object pool within a Policy Control Function (PCF) [122]. The object pool
refers to a collection of pre-initialized objects that may be ready to be used by a
network function (NF). The pre-initialized objec 5 ts may reduce time taken to create
a new object for every new process. When a new request to execute the process is
received, the pre-initialized object may be used and returned back to the object pool.
An example of the pre-initialized objects from the object pool may be threads,
database connections, and the like. For instance, in a thread pool, a fixed number of
10 threads are pre-created to execute incoming processes as creating a new thread for
every process is time consuming and slow. The database connection refers to a link
between the PCF [122] and a database. Since establishing a new connection can be
time-consuming, a database connection pool may maintain a set of pre-established
database connections. When the PCF [122] needs to interact with the database, the
15 PCF [122] may borrow a database connection from the database connection pool,
use the database connection, and then return the database connection to the database
connection pool for reuse. The object pool is configured with a set of parameters.
The set of parameters include but may not be limited to a maximum number of
active objects, a maximum number of idle objects, and a maximum wait time for
20 object selection. In an example, the object may be a thread, a database connection,
and the like. For instance, the thread pool may include parameters for the maximum
number of threads in the thread pool, the maximum number of threads active in the
thread pool, the maximum number of threads idle in the thread pool, and the
maximum duration of waiting to select a thread from the thread pool. In an
25 implementation of the present disclosure, the PCF [122] may configure the object
pool at bootstrap of the system [300]. The bootstrap refers to a phase when the PCF
[122] is getting started. The object pool may be configured when the PCF [122]
starts, to ensure that the PCF [122] may access the object pool through a common
interface.
30
24
[0083] Next, at step [406], the method comprises setting, by an implementation unit
[304] within the PCF [122], a threshold value for a number of objects to be
concurrently selected from the object pool by the NF. The threshold value is
uniformly applied across a plurality of nodes within a network cluster. The
threshold value may be defined by a user. The 5 threshold values can be set at runtime
for the object pool through a Command Line Interface (CLI). The method further
comprises maintaining, by a maintenance unit [310] via the PCF [122], a mapping
within the PCF [122]. The mapping comprises allocating a key corresponding to
the interface or thread for each object of the object pool. In an implementation of
10 the present disclosure, the key may map a corresponding database connection from
the database connection pool.
[0084] Next, at step [408], the method comprises monitoring, by a determination
unit [306] via an alarm module [316] within the PCF [122], a number of objects
15 currently selected from the object pool by the NF. The monitoring, by the alarm
module [316], is performed periodically to enable continuous tracking of the
number of objects selected from the object pool. In an exemplary embodiment, the
periodic monitoring refers to monitoring at pre-defined intervals. In an
embodiment, the user may set the pre-defined intervals. In another exemplary
20 embodiment, the determination unit [306] of the system [300] may set the predefined
intervals.
[0085] Next, at step [410], the method comprises detecting, by the determination
unit [306] via the alarm module [316], a breach of the threshold value when the
25 number of objects currently selected by the NF exceeds the set threshold value. In
an implementation of the present disclosure, the breach of the threshold value may
be when the number of objects currently selected by the NF exceeds the threshold
value.
30 [0086] Next, at step [412], the method includes raising, by an execution unit [308]
via the PCF [122], a conditional alarm indicative of an overload condition based on
25
the detection of the threshold breach for managing the overload condition. The
conditional alarm refers to an alarm which may be raised on fulfilling of a condition.
In an implementation of the present disclosure, the condition may be the breach of
the threshold value. The raising of the conditional alarm is based on a comparison
between the threshold value and the number 5 of objects currently selected from the
object pool. In an example, if the number of objects currently selected from the
object pool is more than the threshold value, the conditional alarm may be raised.
If the number of objects currently selected from the object pool is less than the
threshold value, the conditional alarm may not be raised and the determination unit
10 [306] may continue to monitor the number of objects currently selected by the NF
from the object pool.
[0087] The method further comprises displaying, by a display unit [312] via a
graphical user interface (GUI), the conditional alarm for user visibility and reset. In
15 an implementation of the present disclosure, based on the conditional alarm, the
user may manage the load condition at the NF to avoid overloading.
[0088] Referring to FIG. 5, an exemplary implementation of the method [500] for
managing overload conditions at network functions (NFs) within a
20 telecommunication network is shown, in accordance with exemplary
implementations of the present disclosure.
[0089] The exemplary method [500] starts at step [502].
25 [0090] At step [504], the method comprises monitoring, via the alarm module
[316], a number of objects selected from the object pool by the NF. In an exemplary
embodiment, the alarm module [316] may monitor the number of threads selected
from the thread pool by the PCF [122]. The monitoring by the alarm module [316]
is performed periodically to enable continuous tracking of the number of objects
30 selected from the object pool.
26
[0091] At step [506], the method comprises setting a threshold value for a number
of objects to be concurrently selected from the object pool by a NF. The threshold
value may be determined by the user. For instance, the user defines the threshold
value for concurrent selection of threads from the thread pool as 5. If the threshold
value is not breached, i.e., the 5 number of threads selected from the thread pool
remains below 5, the threshold monitor for conditional alarms [320] may follow
step [504] and continue to monitor the number of objects selected. If the threshold
value is breached, i.e., the number of threads selected from the thread pool crosses
5, the exemplary method [500] may proceed to step [508].
10
[0092] At step [508], the method comprises raising the conditional alarm indicative
of the overload condition for managing the overload condition, by the alarm module
[316]. The raising of the conditional alarm is based on a comparison between the
threshold value and the number of objects currently selected from the object pool.
15
[0093] Further, at step [510], the method comprises displaying the conditional
alarm for user visibility, via a Graphical user interface (GUI) or a Command Line
Interface (CLI). The GUI refers to an interface to interact with the system [300] as
shown in FIG. 3 by the user by visual or graphical representation of icons, menu,
20 etc. The GUI is an interface that may be used within a smartphone, laptop,
computer, etc. The CLI refers to a text-based interface to interact with the system
[300] as shown in FIG. 3 by the user. The user may input text lines called as
command lines in the CLI to access the data in the system [300].
25 [0094] The method terminates at step [512].
[0095] The present disclosure further relates to a non-transitory computer readable
storage medium storing instruction for managing overload conditions at network
functions (NFs) within a telecommunication network, the instructions include
30 executable code which, when executed by one or more units of a system, cause a
configuration unit [302] of the system to configure, an object pool within a Policy
27
Control Function (PCF) [122]. The instructions when executed by the system
further cause an implementation unit [304] of the system, connected at least with a
maintenance unit [310], to set, within the PCF [122], a threshold value for a number
of objects to be concurrently selected from the object pool by a NF. The instructions
when executed by the system further cause a 5 determination unit [306] of the system,
connected at least with the implementation unit [304], to monitor, via an alarm
module [316] within the PCF [122], a number of objects currently selected from the
object pool by the NF. The instructions when executed by the system further cause
the determination unit [306] to detect, via the alarm module [316], a breach of the
10 threshold value when the number of objects currently selected by the NF exceeds
the set threshold value. The instructions when executed by the system further cause
an execution unit [308] connected at least with the determination unit [306], to raise,
via the PCF [122], a conditional alarm indicative of an overload condition based on
the detection of the threshold breach for managing the overload condition.
15
[0096] As is evident from the above, the present disclosure provides a technically
advanced solution for managing overload conditions at network functions (NFs)
within a telecommunication network. The present disclosure provides a system and
a method to monitor the overload conditions in the network functions (NFs). The
20 present disclosure further monitors the behavior of objects being borrowed from the
pool in 5G NFs. The present disclosure further enhances the overall stability and
performance of the 5G network. Further, the present disclosure allows to set
threshold values and triggering alarms at the NFs to proactively monitor resource
utilization and take preventive actions before an overload situation occurs. The
25 present disclosure may further allow the NFs to operate at their optimal levels.
Operating at optimal levels provides consistent and reliable services to end-users.
The present disclosure further implements an alarm-based monitoring system with
low complexity and minimal impact on the interfaces.
30 [0097] While considerable emphasis has been placed herein on the disclosed
implementations, it will be appreciated that many implementations can be made and
28
that many changes can be made to the implementations without departing from the
principles of the present disclosure. These and other changes in the implementations
of the present disclosure will be apparent to those skilled in the art, whereby it is to
be understood that the foregoing descriptive matter to be implemented is illustrative
5 and non-limiting.
[0098] Further, in accordance with the present disclosure, it is to be acknowledged
that the functionality described for the various components/units can be
implemented interchangeably. While specific embodiments may disclose a
10 particular functionality of these units for clarity, it is recognized that various
configurations and combinations thereof are within the scope of the disclosure. The
functionality of specific units as disclosed in the disclosure should not be construed
as limiting the scope of the present disclosure. Consequently, alternative
arrangements and substitutions of units, provided they achieve the intended
15 functionality described herein, are considered to be encompassed within the scope
of the present disclosure.

We Claim:

1. A method for managing overload conditions at network functions (NFs)
within a telecommunication network, the method comprising the steps of:
configuring, by a configuration unit [302], an object pool within a
Policy Control Function (PCF) [122];
setting, by an implementation unit [304] within the PCF [122], a
threshold value for a number of objects to be concurrently selected from the
object pool by an NF;
monitoring, by a determination unit [306] via an alarm module [316]
within the PCF [122], a number of objects currently selected from the object
pool by the NF;
detecting, by the determination unit [306] via the alarm module [316],
a breach of the threshold value when the number of objects currently
selected by the NF exceeds the set threshold value; and
raising, by an execution unit [308] via the PCF [122], a conditional
alarm indicative of an overload condition based on the detection of the
threshold breach for managing the overload condition.

2. The method as claimed in claim 1, wherein the object pool is configured
with a set of parameters comprising a maximum number of active objects,
a maximum number of idle objects, and a maximum wait time for object
selection.

3. The method as claimed in claim 1, wherein the method further comprises
maintaining, by a maintenance unit [310] via the PCF [122], a mapping
within the PCF [122], wherein the mapping comprises a key corresponding
to interface or thread for each object of the object pool.

4. The method as claimed in claim 1, wherein the threshold value is uniformly
applied across a plurality of nodes within a network cluster.

5. The method as claimed in claim 1, wherein the method further comprises
displaying, by a display unit [312] via a graphical user interface (GUI), the
conditional alarm for user visibility and reset.

6. The method as claimed in claim 1, wherein the monitoring by the alarm
module [316] is performed periodically to enable continuous tracking of the
number of objects selected from the object pool.

7. The method as claimed in claim 1, wherein the raising of the conditional
alarm is based on a comparison between the threshold value and the number
of objects currently selected from the object pool.

8. A system for managing overload conditions at network functions (NFs)
within a telecommunication network, said system comprising:
- a configuration unit [302], configured to:
 configure, an object pool within a Policy Control Function (PCF) [122];
- an implementation unit [304] connected at least with a maintenance unit
[310], wherein the implementation unit [304] configured to:
 set, within the PCF [122], a threshold value for a number of objects to be
concurrently selected from the object pool by a NF;
- a determination unit [306] connected at least with the implementation unit
[304], wherein the determination unit [306] is configured to:
 monitor, via an alarm module [316] within the PCF [122], a number of
objects currently selected from the object pool by the NF;
 detect, via the alarm module [316], a breach of the threshold value when the
number of objects currently selected by the NF exceeds the set threshold
value; and

- an execution unit [308] connected at least with the determination unit [306],
wherein the execution unit [308] is configured to:
 raise, via the PCF [122], a conditional alarm indicative of an overload
condition based on the detection of the threshold breach for managing the
overload condition.

9. The system as claimed in claim 8, wherein the object pool is configured with
a set of parameters comprising a maximum number of active objects, a
maximum number of idle objects, and a maximum wait time for object
selection.

10. The system as claimed in claim 8, wherein the system further comprises the
maintenance unit [310] configured to maintain via the PCF [122] a mapping
within the PCF [122], wherein the mapping comprises a key corresponding
to interface or thread for each object of the object pool.

11. The system as claimed in claim 8, wherein the threshold value is uniformly
applied across a plurality of nodes within a network cluster.

12. The system as claimed in claim 8, wherein the system further comprises a
display unit [312] configured to display via a graphical user interface (GUI),
the conditional alarm for user visibility and reset.

13. The system as claimed in claim 8, wherein the monitoring by the alarms
module is performed periodically to enable continuous tracking of the
number of objects selected from the object pool.

14. The system as claimed in claim 8, wherein the raising of the conditional
alarm is based on a comparison between the threshold value and the number
of objects currently selected from the object pool.

Dated this the 5th Day of September, 2023

Documents

Application Documents

# Name Date
1 202321059588-STATEMENT OF UNDERTAKING (FORM 3) [05-09-2023(online)].pdf 2023-09-05
2 202321059588-PROVISIONAL SPECIFICATION [05-09-2023(online)].pdf 2023-09-05
3 202321059588-POWER OF AUTHORITY [05-09-2023(online)].pdf 2023-09-05
4 202321059588-FORM 1 [05-09-2023(online)].pdf 2023-09-05
5 202321059588-FIGURE OF ABSTRACT [05-09-2023(online)].pdf 2023-09-05
6 202321059588-DRAWINGS [05-09-2023(online)].pdf 2023-09-05
7 202321059588-Proof of Right [26-12-2023(online)].pdf 2023-12-26
8 202321059588-ORIGINAL UR 6(1A) FORM 1 & 26-050424.pdf 2024-04-15
9 202321059588-FORM-5 [23-08-2024(online)].pdf 2024-08-23
10 202321059588-ENDORSEMENT BY INVENTORS [23-08-2024(online)].pdf 2024-08-23
11 202321059588-DRAWING [23-08-2024(online)].pdf 2024-08-23
12 202321059588-COMPLETE SPECIFICATION [23-08-2024(online)].pdf 2024-08-23
13 202321059588-Request Letter-Correspondence [30-08-2024(online)].pdf 2024-08-30
14 202321059588-Power of Attorney [30-08-2024(online)].pdf 2024-08-30
15 202321059588-Form 1 (Submitted on date of filing) [30-08-2024(online)].pdf 2024-08-30
16 202321059588-Covering Letter [30-08-2024(online)].pdf 2024-08-30
17 202321059588-CERTIFIED COPIES TRANSMISSION TO IB [30-08-2024(online)].pdf 2024-08-30
18 Abstract 1.jpg 2024-09-02
19 202321059588-FORM 3 [07-10-2024(online)].pdf 2024-10-07
20 202321059588-FORM-9 [31-12-2024(online)].pdf 2024-12-31
21 202321059588-FORM 18A [01-01-2025(online)].pdf 2025-01-01
22 202321059588-FER.pdf 2025-01-21
23 202321059588-FER_SER_REPLY [06-03-2025(online)].pdf 2025-03-06
24 202321059588-US(14)-HearingNotice-(HearingDate-30-05-2025).pdf 2025-04-24
25 202321059588-FORM-26 [15-05-2025(online)].pdf 2025-05-15
26 202321059588-Correspondence to notify the Controller [15-05-2025(online)].pdf 2025-05-15
27 202321059588-Written submissions and relevant documents [06-06-2025(online)].pdf 2025-06-06

Search Strategy

1 SearchE_20-01-2025.pdf