Abstract: ABSTRACT SYSTEM AND METHOD FOR MANAGEMENT OF NETWORK PROTOCOL CONNECTIONS IN A NETWORK The present invention relates to a system (120) and a method (500) for management of network protocol connections in the network (105) is disclosed. The system (120) includes a determining unit (220) to determine a number of active network protocol connections for an endpoint and a threshold number of network protocol connections. The system (120) includes a comparing unit (225) to compare the number of active network protocol connections to the threshold number of network protocol connections. The system (120) includes the determining unit (220) to determine a number of excess network protocol connections required in response to the number of active network protocol connections being lesser than the threshold number of network protocol connections. The system (120) includes a creating unit (230) to create a one or more extra network connections at the endpoint in response to determination of the number of excess network protocol connections. Ref. Fig. 2
DESC:
FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENTS RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
1. TITLE OF THE INVENTION
METHOD AND SYSTEM FOR MANAGEMENT OF NETWORK PROTOCOL CONNECTIONS IN A NETWORK
2. APPLICANT(S)
NAME NATIONALITY ADDRESS
JIO PLATFORMS LIMITED INDIAN OFFICE-101, SAFFRON, NR. CENTRE POINT, PANCHWATI 5 RASTA, AMBAWADI, AHMEDABAD 380006, GUJARAT, INDIA
3.PREAMBLE TO THE DESCRIPTION
THE FOLLOWING SPECIFICATION PARTICULARLY DESCRIBES THE NATURE OF THIS INVENTION AND THE MANNER IN WHICH IT IS TO BE PERFORMED.
FIELD OF THE INVENTION
[0001] The present invention relates to the field of wireless communication networks, more particularly relates to management of network protocol connections in the networks.
BACKGROUND OF THE INVENTION
[0002] In a network environment, a Hypertext Transfer Protocol/2.0 (HTTP/2.0) (HTTP/2.0 connection cannot actually handle all requests. For example, if one lakh (1,00,000) requests need to be sent per second, a single HTTP/2.0 connection will not be able to handle all these connections, as there is a limit of for each HTTP/2.0 connection. The maximum capacity of each HTTP/2.0 connection is typically 10,000 to 15,000 requests, depending on the data size of the requests. For requests of higher data sizes, only 10,000 Transactions Per Second (TPS) per connection may be possible; and for requests of lower data sizes, 15,000 TPS per connection may be possible. Outages due to fewer channels (i.e. connections) under a load spike condition (i.e. traffic surge condition) may lead to user service degradation and poor user experience in the telecommunication network. Further, this increases the network latency.
[0003] Considering a scenario, where five HTTP/2.0 connections are created between a client and a server, such the capacity of each of these five HTTP/2.0 connections is 10,000 TPS. Therefore, the combined capacity of the five HTTP/2.0 connections is 50,000 TPS. During traffic surge, the five HTTP/2.0 connections may not be able to handle all the requests. For example, when (during the traffic surge) the number of requests increases to 80,000, then the five HTTP/2.0 connections will not be able to handle the delta 30,000 TPS (80,000-50,000 TPS). As a result, the extra 30,000 TPS will fail, even with the five HTTP/2.0 connections running at their full capacity. In other words, when the requests are coming from user mobile devices, then 30,000 users will not be able to make calls. This leads to degraded network Key Performance Indicators (KPI) and also impacts the user experience.
[0004] There is, therefore, a need for a solution for dynamically managing connections (in particular, HTTP/2.0 connections) based on traffic surge conditions.
SUMMARY OF THE INVENTION
[0005] One or more embodiments of the present disclosure provide a method and a system for management of network protocol connections in a network.
[0006] In one aspect of the present invention, the method for management of the network protocol connections in the network is disclosed. The method includes the step of determining, by one or more processors, a number of active network protocol connections for an endpoint and a threshold number of network protocol connections. The method includes the step of comparing, by the one or more processors, the number of active network protocol connections to the threshold number of network protocol connections. The method includes the step of determining, by the one or more processors, a number of excess network protocol connections required in response to the number of active network protocol connections being lesser than the threshold number of network protocol connections. The method includes the step of creating, by the one or more processors, a one or more extra network connections at the endpoint in response to determination of the number of excess network protocol connections required, and thereby managing network protocol connections in the network.
[0007] In one embodiment, the active network protocol connections include connections which aid in communication between a client end and a server end.
[0008] In another embodiment, the threshold Transaction Per Second (TPS) for the endpoint is the product of the number of active connections for the endpoint and TPS Capacity per active connection of the endpoint.
[0009] In yet another embodiment, the number of excess network connections is determined by number of extra channels is equal to a ratio of a difference of the number of active network protocol connection and the threshold number of network protocol connections to the capacity per active network protocol connection.
[0010] In yet another embodiment, the method further includes the step if deleting, by the one or more processors, the one or more extra network connections when the number of active network protocol connections is greater than the threshold number of network protocol connections.
[0011] In another aspect of the present invention, the system for management of the network protocol connections in the network is disclosed. The system includes a determining unit configured to determine a number of active network protocol connections for an endpoint and a threshold number of network protocol connections. The system includes a comparing unit configured to compare the number of active network protocol connections to the threshold number of network protocol connections. The system includes the determining unit configured to determine a number of excess network protocol connections required in response to the number of active network protocol connections being lesser than the threshold number of network protocol connections. The system includes a creating unit configured to create a one or more extra network connections at the endpoint in response to determination of the number of excess network protocol connections, and thereby managing network protocol connections in the network.
[0012] In yet another aspect of the present invention, a non-transitory computer-readable medium having stored thereon computer-readable instructions that, when executed by a processor is disclosed. The processor is configured to determine a number of active network protocol connections for an endpoint and a threshold number of network protocol connections. The processor is configured to compare the number of active network protocol connections to the threshold number of network protocol connections. The processor is configured to determine a number of excess network protocol connections required in response to the number of active network protocol connections being lesser than the threshold number of network protocol connections. The processor is configured to create a one or more extra network connections at the endpoint in response to determination of the number of excess network protocol connections, and thereby managing network protocol connections in the network.
[0013] Other features and aspects of this invention will be apparent from the following description and the accompanying drawings. The features and advantages described in this summary and in the following detailed description are not all-inclusive, and particularly, many additional features and advantages will be apparent to one of ordinary skill in the relevant art, in view of the drawings, specification, and claims hereof. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes and may not have been selected to delineate or circumscribe the inventive subject matter, resort to the claims being necessary to determine such inventive subject matter.
BRIEF DESCRIPTION OF THE DRAWINGS
[0014] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components, electronic components or circuitry commonly used to implement such components.
[0015] FIG. 1 is an exemplary block diagram of an environment for management of network protocol connections in a network, according to one or more embodiments of the present disclosure;
[0016] FIG. 2 is an exemplary block diagram of a system for the management of the network protocol connections in the network, according to one or more embodiments of the present disclosure;
[0017] FIG. 3 is a block diagram of an architecture that can be implemented in the system of FIG.2, according to one or more embodiments of the present disclosure;
[0018] FIG. 4 is an exemplary block diagram of the system for the management of the network protocol connections in the network, according to one or more embodiments of the present disclosure; and
[0019] FIG. 5 is a flow diagram illustrating a method for the management of the network protocol connections in the network, according to one or more embodiments of the present disclosure.
[0020] The foregoing shall be more apparent from the following detailed description of the invention.
DETAILED DESCRIPTION OF THE INVENTION
[0021] Some embodiments of the present disclosure, illustrating all its features, will now be discussed in detail. It must also be noted that as used herein and in the appended claims, the singular forms "a", "an" and "the" include plural references unless the context clearly dictates otherwise.
[0022] Various modifications to the embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments. However, one of ordinary skill in the art will readily recognize that the present disclosure including the definitions listed here below are not intended to be limited to the embodiments illustrated but is to be accorded the widest scope consistent with the principles and features described herein.
[0023] A person of ordinary skill in the art will readily ascertain that the illustrated steps detailed in the figures and here below are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
[0024] The present disclosure provides a method and system for management of network protocol connections in a network based on traffic surge conditions. In particular, the techniques of the present subject matter provide for maintaining the network protocol connections, instead of keeping the network protocol connections static. As a result, the number of network protocol connections are dynamically managed (increased or decreased) depending on the load. As such, the overall network Key Performance Indicator (KPI) is improved. Further, network latency is improved.
[0025] Referring to FIG. 1, FIG. 1 illustrates an exemplary block diagram of an environment 100 for management of network protocol connections in a network 105, according to one or more embodiments of the present invention. The environment 100 includes the network 105, a User Equipment (UE) 110, a server 115, and a system 120. The UE 110 aids a user to interact with the system 120 for the management of the network protocol connections in the network 105. The network protocol connections refer to the established pathways through which the UE 110 in the network 105 communicate, following a set of rules or protocols. The protocols define how data is formatted, transmitted, and received, ensuring reliable and efficient communication between devices. In an embodiment, the user is one of, but not limited to, a network administrator or a service provider.
[0026] For the purpose of description and explanation, the description will be explained with respect to the UE 110, or to be more specific will be explained with respect to a first UE 110a, a second UE 110b, and a third UE 110c, and should nowhere be construed as limiting the scope of the present disclosure. Each of the UE 110 from the first UE 110a, the second UE 110b, and the third UE 110c is configured to connect to the server 115 via the network 105.
[0027] In an embodiment, each of the first UE 110a, the second UE 110b, and the third UE 110c is one of, but not limited to, any electrical, electronic, electro-mechanical or an equipment and a combination of one or more of the above devices such as smartphones, virtual reality (VR) devices, augmented reality (AR) devices, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other computing device.
[0028] The network 105 includes, by way of example but not limitation, one or more of a wireless network, a wired network, an internet, an intranet, a public network, a private network, a packet-switched network, a circuit-switched network, an ad hoc network, an infrastructure network, a Public-Switched Telephone Network (PSTN), a cable network, a cellular network, a satellite network, a fiber optic network, or some combination thereof. The network 105 may include, but is not limited to, a Third Generation (3G), a Fourth Generation (4G), a Fifth Generation (5G), a Sixth Generation (6G), a New Radio (NR), a Narrow Band Internet of Things (NB-IoT), an Open Radio Access Network (O-RAN), and the like.
[0029] The server 115 may include by way of example but not limitation, one or more of a standalone server, a server blade, a server rack, a bank of servers, a server farm, hardware supporting a part of a cloud service or system, a home server, hardware running a virtualized server, one or more processors executing code to function as a server, one or more machines performing server-side functionality as described herein, at least a portion of any of the above, some combination thereof. In an embodiment, the entity may include, but is not limited to, a vendor, a network operator, a company, an organization, a university, a lab facility, a business enterprise, a defense facility, or any other facility that provides content.
[0030] The environment 100 further includes the system 120 communicably coupled to the server 115 and each of the first UE 110a, the second UE 110b, and the third UE 110c via the network 105. The system 120 is configured for managing the network protocol connections in the network 105. The system 120 is adapted to be embedded within the server 115 or is embedded as the individual entity, as per multiple embodiments of the present invention.
[0031] Operational and construction features of the system 120 will be explained in detail with respect to the following figures.
[0032] FIG. 2 is an exemplary block diagram of the system 120 for the management of network protocol connections in the network 105, according to one or more embodiments of the present disclosure.
[0033] The system 120 includes one or more processors 205, a memory 210, a user interface 215, and a database 240. For the purpose of description and explanation, the description will be explained with respect to the one or more processors 205, or to be more specific will be explained with respect to the processor 205 and should nowhere be construed as limiting the scope of the present disclosure. The one or more processors 205, hereinafter referred to as the processor 205 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, single board computers, and/or any devices that manipulate signals based on operational instructions.
[0034] As per the illustrated embodiment, the processor 205 is configured to fetch and execute computer-readable instructions stored in the memory 210. The memory 210 may be configured to store one or more computer-readable instructions or routines in a non-transitory computer-readable storage medium, which may be fetched and executed to create or share data packets over a network service. The memory 210 may include any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like.
[0035] The user interface 215 includes a variety of interfaces, for example, interfaces for a Graphical User Interface (GUI), a web user interface, a Command Line Interface (CLI), and the like. The user interface 215 facilitates communication of the system 120. In one embodiment, the user interface 215 provides a communication pathway for one or more components of the system 120. Examples of the one or more components include, but are not limited to, the user equipment 110, and the database 240.
[0036] The database 240 is one of, but not limited to, a centralized database, a cloud-based database, a commercial database, an open-source database, a distributed database, an end-user database, a graphical database, a No-Structured Query Language (NoSQL) database, an object-oriented database, a personal database, an in-memory database, a document-based database, a time series database, a wide column database, a key value database, a search database, a cache databases, and so forth. The foregoing examples of database 240 types are non-limiting and may not be mutually exclusive e.g., a database can be both commercial and cloud-based, or both relational and open-source, etc.
[0037] Further, the processor 205, in an embodiment, may be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processor 205. In the examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processor 205 may be processor-executable instructions stored on a non-transitory machine-readable storage medium and the hardware for processor 205 may comprise a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the memory 210 may store instructions that, when executed by the processing resource, implement the processor 205. In such examples, the system 120 may comprise the memory 210 storing the instructions and the processing resource to execute the instructions, or the memory 210 may be separate but accessible to the system 120 and the processing resource. In other examples, the processor 205 may be implemented by electronic circuitry.
[0038] In order for the system 120 to manage the network protocol connections in the network 105, the processor 205 includes a determining unit 220, a comparing unit 225, a creating unit 230, and a deleting unit 235 communicably coupled to each other. In an embodiment, operations and functionalities of the determining unit 220, the comparing unit 225, the creating unit 230, and the deleting unit 235 can be used in combination or interchangeably.
[0039] The determining unit 220 is configured to determine a number of active network protocol connections for an endpoint and a threshold number of network protocol connections. The endpoint refers to a specific point of communication in the network 105. The endpoint may be an application, or service that is involved in the network protocol connections. The determining unit 220 is configured to continuously monitor the endpoint to track the number of active network protocol connections, which involves real-time data collection from various network interfaces or system logs. The system log is a record of events, processes, and activities that occur within the network 105. The system log is used to track and document various aspects of system performance, security, and operational behavior. The determining unit 220 is configured to analyze the system logs on the endpoint to identify the number of the active network protocol connections. The active network protocol connections include connections which aid in communication between a client end and a server end. The active network protocol connections represent those that are currently in use and engaging in data transmission, which is crucial for real-time monitoring and understanding current network activity. The active network protocol connections are analyzed to provide insights into the performance of both the endpoint and the network 105.
[0040] The determining unit 220 is configured to retrieve the threshold number of network protocol connections from the database 240, or a configuration file. The threshold number of network protocol connections represents the maximum allowable number of active network protocol connections for the endpoint. The threshold number of network protocol connections for the endpoint is defined by the network operator. Further, the threshold is determined based on network policies. The network policies specify limits for different types of endpoints or traffic patterns.
[0041] Furthermore, the threshold number is adjustable based on the network policies or static values set during system configuration. The threshold number of network protocol connections for the endpoint is a product of the number of active network protocol connections for the endpoint and a capacity per active network protocol connection of the endpoint. Determination of the threshold number of network protocol connections aids in, advantageously, reducing a waiting time of a request at the endpoint and circumventing one or more errors that may occur owing to a breach in the threshold number of network protocol connections at the endpoint. In an example, by setting and adhering to the threshold for the number of active network protocol connections, the system 120 manage the incoming requests more efficiently. If the number of active network protocol connections approaches the threshold, the system 120 can prioritize or manage new requests to avoid overwhelming the endpoint, which aids in reducing the waiting time for each request, ensuring that the system 120 remains responsive and efficient. In an embodiment, the one or more errors include, but not limited to, timeouts, dropped connections, and degraded performance. By maintaining connections within the threshold, the system 120 avoids the one or more errors, leading to more stable and reliable network performance.
[0042] Upon determining of the number of active network protocol connections for the endpoint and the threshold number of network protocol connections, the comparing unit 225 is configured to compare the number of active network protocol connections to the threshold number of network protocol connections. The comparing unit 225 is configured to check the relationship between the number of active network protocol connections for the endpoint and the threshold number of network protocol connections if the number of active network protocol connections is greater than, less than or equal to the threshold number of network protocol connections. If the number of active network protocol connections is greater than the threshold number of network protocol connections, which may simply log the status or take no action. If the number of active network protocol connections is equal to the threshold number of network protocol connections, it might prepare for potential future actions if the trend continues. If the number of active network protocol connections is less than the threshold number of network protocol connections, the determining unit 220 is configured to determine a number of excess network protocol connections required.
[0043] The determining unit 220 is configured to determine the number of excess network protocol connections required in response to the number of active network protocol connections being less than the threshold number of network protocol connections. Further, the number of excess network protocol connections is a ratio of a difference of the number of active network protocol connections and the threshold number of network protocol connections to the capacity per active network protocol connection of the endpoint. In an embodiment, the threshold Transaction Per Second (TPS) for the endpoint is the product of the number of active connections for the endpoint and TPS Capacity per active connection of the endpoint. In an embodiment, the number of active network protocol connections is the present request per second transmitting to the endpoint. The number of excess network protocol connections is calculated using the below formula:
Number of excess network protocol connections = CEILING ((number of active network protocol connections – threshold number of network protocol connections)/capacity per active network protocol connection) …………eq (1)
[0044] Upon determining the number of excess network protocol connections, the creating unit 230 is configured to create one or more extra network protocol connections at the endpoint. The creating unit 230 is configured to establish one or more extra network protocol connections at the endpoint in response to determination of the number of excess network protocol connections required. In an embodiment, the one or more extra network protocol connections at the endpoint include, but not limited to, allocating necessary resources, configuring network settings, and ensuring new connections comply with security and performance standards. Further, the creating unit 230 is configured to ensure that the creation of one or more extra network protocol connections helps to manage the load and balance the network protocol connections efficiently within the network 105.
[0045] In an example embodiment, the determining unit 220 determines that the number of excess network protocol connections is 300. Then, the creating unit 230 is configured to create 300 additional network protocol connections to manage the load effectively. The creating unit 230 is configured to allocate necessary resources such as bandwidth and processing power and configure network settings to establish 300 additional network protocol connections. The determining unit 220 is configured to continuously monitor the performance of the one or more extra network protocol connections to ensure correct functioning of the one or more extra network protocol connections and provide the desired load management.
[0046] In one embodiment, the deleting unit 235 is configured to delete the one or more extra network protocol connections when the number of active network protocol connections is greater than the threshold number of network protocol connections. If the number of active network protocol connections is greater than the threshold number of network protocol connections, the determining unit 220 is configured to determine that the one or more extra connections are no longer needed. In this regard, the deleting unit 235 is configured to initiate the process to delete the one or more extra network protocol connections that are previously created to manage the load.
[0047] In an example embodiment, the deleting unit 235 detects that the number of active network protocol connections is 1050. Further, the threshold number of network protocol connections is set at 1000. The comparing unit 225 is configured to compare the number of active network protocol connections with the threshold number of network protocol connections. Upon comparison, the comparison unit XXX determines that the number of active network protocol connections is greater than the threshold number of network protocol connections. Accordingly, the deleting unit 235 is configured to delete the 50 extra network protocol connections, ensuring efficient use of network resources. Furthermore, the deleting unit 235 is configured to ensure that the deletion process does not impact the remaining active network protocol connections or the overall network KPI performance.
[0048] By doing so, the system 120 is able to, advantageously, improve overall performance of the network 105 by fast determination and addition of extra network protocol connections under load spike condition, utilizes optimal resources, reduces the overall latency in the network 105, reduces the number of pending requests and waiting time in the system 120.
[0049] FIG. 3 is a block diagram of an architecture 300 that can be implemented in the system of FIG.2, according to one or more embodiments of the present disclosure.
[0050] The architecture 300 includes a Hypertext Transfer protocol (HTTP) client scheduler module 305, a HTTP client memory cache 310, a HTTP client connection module 315, a first HTTP server 320, a second HTTP server 325, and a third HTTP server 330.
[0051] The HTTP client scheduler module 305 is configured to connect with the HTTP client connection module 315 and the HTTP client memory cache 310. The HTTP client memory cache 310 is configured to store the information about the network protocol connections for each endpoint. In an embodiment, each endpoint includes, but is not limited to, a first endpoint and a second endpoint. In an example, the first endpoint includes 10, and the second endpoint includes 13. Further, the HTTP client scheduler module 305 is configured to determine the number of active network protocol connections and determine the capacity per active network protocol connection of the endpoint. The HTTP client scheduler module 305 is configured to determine the threshold number of network protocol connections based on the determination of the number of active network protocol connections and the capacity per active network protocol connection of the endpoint. Further, the number of active network protocol connections is compared with the threshold number of network protocol connections.
[0052] As per the above embodiment, in case the number of active network protocol connections is less than the threshold number of network protocol connections, the number of excess network protocol connections is created for that endpoint, which helps to reduce waiting time of the request. Owing to this, the HTTP client connection module 315 is configured to ensure that the creation of one or more extra network protocol connections helps to manage the load and balance the network protocol connections efficiently within the network 105 to improve overall network performance and user experience. Further, the HTTP client connection module 315 is connected with the first HTTP server 320, the second HTTP server 325, and the third HTTP server 330. The number of connections is increased only at a time when the traffic surge conditions arise, which saves critical CPU cycle and memory during normal traffic flow.
[0053] FIG. 4 is an exemplary block diagram of the system 120 for the management of network protocol connections in the network 105, according to one or more embodiments of the present disclosure.
[0054] Referring to FIG. 4 in order to manage the number of network protocol connections, depending on the load, the number of network protocol connections is maintained at an endpoint-wise. Further, the architecture 400 includes multiple NF instances (endpoints). For example, as shown in FIG. 4, two NF instances 410, 415 may exist. Further, there is a connection of SCP proxy 405 (SCP client) with each NF instance 410, 415. In an embodiment of the present subject matter, a track of each NF instance 410, 415 of the network protocol connections is maintained. In another words, how much data is sent to each NF instance 410, 415 is tracked.
[0055] Further, in an alternate embodiment, the maximum capacity of each NF instance 410, 415 is considered. For example, for the first NF instance 410, maximum capacity per active network protocol connections is 10,000; for second NF instance 415, the maximum capacity per active network protocol connections is 5,000; and for a third NF instance (not shown in FIG.3b), the maximum capacity is 15,000 (depending upon the data size). As such, the data size may change depending on the endpoint. Different endpoints may handle different types of requests –for example, some endpoints may handle requests with low data size and some endpoints may handle requests with higher data size. Accordingly, the endpoint-wise capacity of the network protocol connections is also maintained.
[0056] In an example embodiment, the SCP proxy 405 includes three network protocol connections, and the capacity of each of three network protocol connections is 10,000. Accordingly, the combined capacity of the three network protocol connections is 30,000. During traffic surge, the three network protocol connections may not be able to handle incoming requests. For example, the number of requests increases to 50,000 during the traffic surge, then the three network protocol connections will not be able to handle the remaining 20,000 requests. As a result, the remaining 20,000 network protocol connections will fail, even with the three network protocol connections running at their full capacity. Owing to this, the SCP proxy 405 is configured to ensure that the creation of one or more extra network protocol connections helps to manage the load and balance the network protocol connections efficiently within the network 105 to improve overall network KPI and user experience.
[0057] As per the above embodiment, the SCP proxy 405 is configured to continuously determine the number of active network protocol connections and compare the number of active network protocol connections with the threshold number of network protocol connections. In the first scenario, when the number of active network protocol connections is less than the threshold number of network protocol connections, the SCP proxy 405 is configured to create the one or more extra network protocol connections. In a second scenario, when the number of active network protocol connections is greater than the threshold number of network protocol connections, then the number of network protocol connections are deleted based on the data size.
[0058] FIG. 5 is a flow diagram illustrating a method 500 for management of the network protocol connections in the network 105, according to one or more embodiments of the present disclosure. For the purpose of description, the method 500 is described with the embodiments as illustrated in FIG. 2 and should nowhere be construed as limiting the scope of the present disclosure.
[0059] At step 505, the method 500 includes the step of determining the number of active network protocol connections for the endpoint and the threshold number of network protocol connections by the determining unit 220. The active network protocol connections include connections which aid in communication between the client end and the server end. The determining unit 220 is configured to retrieve the threshold number of network protocol connections from the database 240, or the configuration file. The threshold number represents the maximum allowable number of active network protocol connections for the endpoint.
[0060] At step 510, the method 500 includes the step of comparing the number of active network protocol connections to the threshold number of network protocol connections by the comparing unit 225. The comparing unit 225 is configured to check the relationship between the number of active network protocol connections for the endpoint and the threshold number of network protocol connections if the number of active network protocol connections is greater than, less than or equal to the threshold. If the number of active network protocol connections is greater than the threshold number of network protocol connections, which may simply log the status or take no action. If the number of active network protocol connections is equal to the threshold number of network protocol connections, it might prepare for potential future actions if the trend continues. If the number of active network protocol connections is less than the threshold number of network protocol connections, the determining unit 220 is configured to determine the number of excess network protocol connections required.
[0061] At step 515, the method 500 includes the step of determining the number of excess network protocol connections required in response to the number of active network protocol connections being less than the threshold number of network protocol connections by the determining unit 220. Further, the determining unit 220 is configured to determine the number of excess network protocol connections by the ratio of the difference of the number of active network protocol connections and the threshold number of network protocol connections to the capacity per active network protocol connection of the endpoint.
[0062] At step 520, the method 500 includes the step of creating the one or more extra network protocol connections at the endpoint by the creating unit 230. The creating unit 230 is configured to establish one or more extra network protocol connections at the endpoint in response to determination of the number of excess network protocol connections. In an embodiment, the one or more extra network protocol connections at the endpoint include, but not limited to, allocating necessary resources, configuring network settings, and ensuring new connections comply with security and performance standards. Further, the creating unit 230 is configured to ensure that the creation of one or more extra network protocol connections helps to manage the load and balance the network protocol connections efficiently within the network 105.
[0063] The present invention further discloses a non-transitory computer-readable medium having stored thereon computer-readable instructions. The computer-readable instructions are executed by the processor 205. The processor 205 is configured to determine a number of active network protocol connections for an endpoint and a threshold number of network protocol connections. The processor 205 is configured to compare the number of active network protocol connections to the threshold number of network protocol connections. The processor 205 is configured to determine a number of excess network protocol connections required in response to the number of active network protocol connections being lesser than the threshold number of network protocol connections. The processor 205 is configured to create a one or more extra network connections at the endpoint in response to determination of the number of excess network protocol connections, and thereby managing network protocol connections in the network 105.
[0064] A person of ordinary skill in the art will readily ascertain that the illustrated embodiments and steps in description and drawings (FIG.1-5) are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
[0065] The present disclosure provides technical advancement for creating one or more extra network protocol connections at the endpoint. The creating unit is configured to allocate necessary resources such as bandwidth and processing power and configure network settings to establish additional network protocol connections. Upon establishing the additional network protocol connections, the present invention continuously monitors the performance of the one or more extra network protocol connections to ensure correct functioning of the one or more extra network protocol connections and provide the desired load management.
[0066] The present disclosure provides advantages for improving overall KPI of the network by fast determination and addition of extra network protocol connections under load spike condition, utilizes optimal resources, reduces the overall latency in the network, reduces the number of pending requests and waiting time in the system.
[0067] The present invention offers multiple advantages over the prior art and the above listed are a few examples to emphasize on some of the advantageous features. The listed advantages are to be read in a non-limiting manner.
REFERENCE NUMERALS
[0068] Environment - 100
[0069] Network-105
[0070] User equipment- 110
[0071] Server - 115
[0072] System -120
[0073] Processor - 205
[0074] Memory - 210
[0075] User interface-215
[0076] Determining unit – 220
[0077] Comparing unit– 225
[0078] Creating unit – 230
[0079] Deleting unit– 235
[0080] Database- 240
[0081] HTTP client scheduler module- 305
[0082] HTTP client memory cache – 310
[0083] HTTP client connection module- 315
[0084] First HTTP server- 320
[0085] Second HTTP server- 325
[0086] Third HTTP server- 330
[0087] SCP proxy- 405
[0088] First NF instance- 410
[0089] Second NF instance- 415
,CLAIMS:CLAIMS
We Claim:
1. A method (500) of management of network protocol connections in a network (105), the method (500) comprising the steps of:
determining, by one or more processors (205), a number of active network protocol connections for an endpoint and a threshold number of network protocol connections;
comparing, by the one or more processors (205), the number of active network protocol connections to the threshold number of network protocol connections;
determining, by the one or more processors (205), a number of excess network protocol connections required in response to the number of active network protocol connections being lesser than the threshold number of network protocol connections; and
creating, by the one or more processors (205), a one or more extra network connections at the endpoint in response to determination of the number of excess network protocol connections required, and thereby managing network protocol connections in the network.
2. The method (500) as claimed in claim 1, wherein the active network protocol connections include connections which aid in communication between a client end and a server end.
3. The method (500) as claimed in claim 1, wherein the threshold Transaction Per Second (TPS) for the endpoint is the product of the number of active connections for the endpoint and TPS Capacity per active connection of the endpoint.
4. The method (500) as claimed in claim 1, wherein the number of excess network connections is determined by the number of extra channels is equal to a ratio of the difference of the number of the active network protocol connections and the threshold number of network protocol connections to the capacity per active network protocol connection.
5. The method (500) as claimed in claim 1, wherein the method (500) further comprises the step of:
deleting, by the one or more processors, the one or more extra network connections when the number of active network protocol connections is greater than the threshold number of network protocol connections.
6. A system (120) for management of network protocol connections in a network (105), the system (120) comprising:
a determining unit (220) configured to determine, a number of active network protocol connections for an endpoint and a threshold number of network protocol connections;
a comparing unit (225) configured to compare, the number of active network protocol connections to the threshold number of network protocol connections;
the determining unit (220) configured to determine, a number of excess network protocol connections required in response to the number of active network protocol connections being less than the threshold number of network protocol connections, and
a creating unit (230) configured to create, a one or more extra network connections at the endpoint in response to determination of the number of excess network protocol connections, and thereby managing network protocol connections in the network (105).
7. The system (120) as claimed in claim 7, wherein the active network protocol connections include connections which aid in communication between a client end and a server end.
8. The system (120) as claimed in claim 7, wherein the threshold Transaction Per Second (TPS) for the endpoint is the product of the number of active connections for the endpoint and TPS Capacity per active connection of the endpoint.
9. The system (120) as claimed in claim 7, wherein the number of excess network connections is determined by the number of extra channels is equal to a ratio of the difference of the number of the active network protocol connections and the threshold number of network protocol connections to the capacity per active network protocol connection.
10. The system (120) as claimed in claim 7, wherein the system further comprises:
a deleting unit (235) configured to delete the one or more extra network protocol connections when the number of active network protocol connections is greater than the threshold number of network protocol connections.
11. The system (120) as claimed in claim 7, wherein upon determination of the threshold number of network protocol connections aids in reducing a waiting time of a request at the endpoint and circumvent one or more errors that occur owing to a breach in the threshold number of network protocol connections at the endpoint.
| # | Name | Date |
|---|---|---|
| 1 | 202321060020-STATEMENT OF UNDERTAKING (FORM 3) [06-09-2023(online)].pdf | 2023-09-06 |
| 2 | 202321060020-PROVISIONAL SPECIFICATION [06-09-2023(online)].pdf | 2023-09-06 |
| 3 | 202321060020-FORM 1 [06-09-2023(online)].pdf | 2023-09-06 |
| 4 | 202321060020-FIGURE OF ABSTRACT [06-09-2023(online)].pdf | 2023-09-06 |
| 5 | 202321060020-DRAWINGS [06-09-2023(online)].pdf | 2023-09-06 |
| 6 | 202321060020-DECLARATION OF INVENTORSHIP (FORM 5) [06-09-2023(online)].pdf | 2023-09-06 |
| 7 | 202321060020-FORM-26 [17-10-2023(online)].pdf | 2023-10-17 |
| 8 | 202321060020-Proof of Right [12-02-2024(online)].pdf | 2024-02-12 |
| 9 | 202321060020-DRAWING [03-09-2024(online)].pdf | 2024-09-03 |
| 10 | 202321060020-COMPLETE SPECIFICATION [03-09-2024(online)].pdf | 2024-09-03 |
| 11 | Abstract 1.jpg | 2024-09-25 |
| 12 | 202321060020-Power of Attorney [24-01-2025(online)].pdf | 2025-01-24 |
| 13 | 202321060020-Form 1 (Submitted on date of filing) [24-01-2025(online)].pdf | 2025-01-24 |
| 14 | 202321060020-Covering Letter [24-01-2025(online)].pdf | 2025-01-24 |
| 15 | 202321060020-CERTIFIED COPIES TRANSMISSION TO IB [24-01-2025(online)].pdf | 2025-01-24 |
| 16 | 202321060020-FORM 3 [29-01-2025(online)].pdf | 2025-01-29 |
| 17 | 202321060020-FORM 18 [20-03-2025(online)].pdf | 2025-03-20 |