Abstract: The present disclosure relates to a method and a system for facilitating routing in a network. The method comprises receiving, at a controller node [300], a first user input. The method comprises identifying, at the controller node [300], a network function (NF) from plurality of NFs based on the first user input and establishing, at the controller node [300], a connection between the controller node [300] and the NF. The method further comprises selecting, at the controller node [300], an interface based on the established connection and triggering, at the controller node [300], an automation task remotely via the interface on one or more network nodes. Furthermore, the method comprises facilitating, at the controller node [300], a routing from the one or more network nodes to the NF based on the automation task. [FIG. 4]
FORM 2
THE PATENTS ACT, 1970
(39 OF 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR FACILITATING ROUTING IN
A NETWORK”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr.
Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat,
India.
The following specification particularly describes the invention and the manner in
which it is to be performed.
2
METHOD AND SYSTEM FOR FACILITATING ROUTING IN A
NETWORK
FIELD OF INVENTION
5
[0001] Embodiments of the present disclosure generally relate to wireless
communication. More particularly, embodiments of the present disclosure relate to
facilitate routing in a network.
10 BACKGROUND
[0002] The following description of the related art is intended to provide
background information pertaining to the field of the disclosure. This section may
include certain aspects of the art that may be related to various features of the
15 present disclosure. However, it should be appreciated that this section is used only
to enhance the understanding of the reader with respect to the present disclosure,
and not as admissions of the prior art.
[0003] Wireless communication technology has rapidly evolved over the past few
20 decades, with each generation bringing significant improvements and
advancements. The first generation of wireless communication technology was
based on analog technology and offered only voice services. However, with the
advent of the second-generation (2G) technology, digital communication and data
services became possible, and text messaging was introduced. 3G technology
25 marked the introduction of high-speed internet access, mobile video calling, and
location-based services. The fourth-generation (4G) technology revolutionized
wireless communication with faster data speeds, better network coverage, and
improved security. Currently, the fifth-generation (5G) technology is being
deployed, promising even faster data speeds, low latency, and the ability to connect
30 multiple devices simultaneously. With each generation, wireless communication
3
technology has become more advanced, sophisticated, and capable of delivering
more services to its users.
[0004] In the current existing solution, routing is a complex task, especially to
enable efficient communication between 5 network nodes and multiple third-party
Network Functions (NFs). The problem that routing in 5G solves is how to establish
efficient communication pathways between nodes and these diverse NFs. Without
a proper routing mechanism, data exchange between nodes and NFs could be
inefficient, slow, or even fail altogether. Routing ensures that data packets are
10 directed along optimal paths, taking into consideration factors such as network
congestion, latency, and bandwidth availability. To achieve this, routing is essential
to facilitate communication between them. Further, 5G networks are complex as
they involve multiple frequency bands, network types and network slicing. Further,
large routing tables can add to the complexity, thereby leading to network latency
15 due to the delay in taking routing decisions. There is a need in the existing solutions
to collectively transform routing from a conventional process into a sophisticated
mechanism that optimizes data transmission and supports the diverse requirements
of the 5G landscape.
20 [0005] Thus, there exists an imperative need in the art to overcome the above-stated
disadvantages. The present disclosure provides a solution that addresses the
complexities of enabling efficient communication between nodes and multiple
third-party NFs. The solution involves dynamic adaptability, intelligent decisionmaking,
NF integration, QoS optimization, security measures, support for
25 heterogeneous networks, and redundancy mechanisms.
SUMMARY
[0006] This section is provided to introduce certain aspects of the present disclosure
30 in a simplified form that are further described below in the detailed description.
4
This summary is not intended to identify the key features or the scope of the claimed
subject matter.
[0007] An aspect of the present disclosure may relate to a method for facilitating
routing in a network. The method comprises receiving, 5 by a transceiver unit at a
controller node, a first user input. The method further comprises identifying, by a
processing unit at the controller node, a network function (NF) from a plurality of
network functions (NFs) based on the first user input. Furthermore, the method
comprises establishing, by the transceiver unit at the controller node, a connection
10 between the controller node and the NF. The method further comprises selecting,
by the processing unit at the controller node, an interface based on the established
connection. The method further comprises triggering, by an execution unit at the
controller node, an automation task via the interface on one or more network nodes.
Furthe, the method comprises facilitating, by the execution unit at the controller
15 node, a routing from the one or more network nodes to the NF based on the
automation task.
[0008] In an exemplary aspect of the present disclosure, the method further
comprises performing, by the processing unit at the controller node, a sanity check
20 to validate completion of routing between the one or more network nodes and the
NF.
[0009] In an exemplary aspect of the present disclosure, the automation task is
triggered remotely on the one or more network nodes via the interface.
25
[0010] In an exemplary aspect of the present disclosure, the method facilitates at
least a data transmission, a data processing and a data exchange between the one or
more network nodes and the NF based on routing.
30 [0011] In an exemplary aspect of the present disclosure, the interface is selected
based on a second user input at the user interface of the controller node.
5
[0012] In an exemplary aspect of the present disclosure, the triggering the
automation task remotely on the one or more network nodes is based on a second
user input at the user interface of the controller node.
5
[0013] Another aspect of the present disclosure may relate to a system for
facilitating routing in a network. The system comprises a controller node, which
further comprises a transceiver unit. The transceiver unit is configured to receive a
first user input. Furthermore, the controller node comprises a processing unit. The
10 processing unit is configured to identify a network function (NF) from a plurality
of network functions (NFs) based on the first user input. The transceiver unit is
further configured to establish a connection between the controller node and the
NF. The processing unit is further configured to select, an interface based on the
established connection. The controller node further comprises an execution unit.
15 The execution unit is configured to trigger an automation task via the interface on
one or more network nodes. The execution unit is further configured to facilitate, a
routing from the one or more network nodes to the NF based on the automation
task.
20 [0014] Yet another aspect of the present disclosure may relate to a non-transitory
computer readable storage medium storing instruction for facilitating routing in a
network, the instructions include executable code which, when executed by one or
more units of a system, cause a transceiver unit of the system to receive a first user
input. The instructions when executed by the system further cause a processing unit
25 of the system to identify a network function (NF) from a plurality of network
functions (NFs) based on the first user input. The instructions when executed by the
system further cause the transceiver unit to establish, a connection between the
controller node and the NF. The instructions when executed by the system further
cause the processing unit to select, an interface based on the established connection.
30 The instructions when executed by the system further cause an execution unit to
trigger, the automation task remotely via the interface on one or more network
6
nodes. The instructions when executed by the system further cause the execution
unit to facilitate a routing from the one or more network nodes to the NF based on
the automation task.
5 OBJECTS OF THE INVENTION
[0015] Some of the objects of the present disclosure, which at least one
embodiment disclosed herein satisfies are listed herein below.
10 [0016] It is an object of the present disclosure to provide a system and a method for
facilitating routing in a network.
[0017] It is yet another object of the present disclosure to provide a solution for
dynamic adaptability, intelligent decision-making, NF integration, QoS
15 optimization, security measures, support for heterogeneous networks, and
redundancy mechanisms.
[0018] Yet another object of the present disclosure is to address the complexities
of enabling efficient communication between nodes and multiple third-party
20 Network Functions (NFs).
DESCRIPTION OF THE DRAWINGS
[0019] The accompanying drawings, which are incorporated herein, and constitute
25 a part of this disclosure, illustrate exemplary embodiments of the disclosed methods
and systems in which like reference numerals refer to the same parts throughout the
different drawings. Components in the drawings are not necessarily to scale,
emphasis instead being placed upon clearly illustrating the principles of the present
disclosure. Also, the embodiments shown in the figures are not to be construed as
30 limiting the disclosure, but the possible variants of the method and system
according to the disclosure are illustrated herein to highlight the advantages of the
7
disclosure. It will be appreciated by those skilled in the art that disclosure of such
drawings includes disclosure of electrical components or circuitry commonly used
to implement such components.
[0020] FIG. 1 illustrates 5 an exemplary block diagram representation of 5th
generation core (5GC) network architecture.
[0021] FIG. 2 illustrates an exemplary block diagram of a computing device upon
which the features of the present disclosure may be implemented in accordance with
10 exemplary implementation of the present disclosure.
[0022] FIG. 3 illustrates an exemplary block diagram of a system for facilitating
routing in a network, in accordance with exemplary implementations of the present
disclosure.
15
[0023] FIG. 4 illustrates a method flow diagram for facilitating routing in a
network, in accordance with exemplary implementations of the present disclosure.
[0024] FIG. 5 illustrates an exemplary system diagram for facilitating routing in a
20 network, in accordance with exemplary implementations of the present disclosure.
[0025] FIG. 6 illustrates an exemplary method flow for facilitating routing in a
network, in accordance with exemplary implementations of the present disclosure.
25 [0026] The foregoing shall be more apparent from the following more detailed
description of the disclosure.
DETAILED DESCRIPTION
30 [0027] In the following description, for the purposes of explanation, various
specific details are set forth in order to provide a thorough understanding of
8
embodiments of the present disclosure. It will be apparent, however, that
embodiments of the present disclosure may be practiced without these specific
details. Several features described hereafter may each be used independently of one
another or with any combination of other features. An individual feature may not
address any of the problems 5 discussed above or might address only some of the
problems discussed above.
[0028] The ensuing description provides exemplary embodiments only, and is not
intended to limit the scope, applicability, or configuration of the disclosure. Rather,
10 the ensuing description of the exemplary embodiments will provide those skilled in
the art with an enabling description for implementing an exemplary embodiment.
It should be understood that various changes may be made in the function and
arrangement of elements without departing from the spirit and scope of the
disclosure as set forth.
15
[0029] Specific details are given in the following description to provide a thorough
understanding of the embodiments. However, it will be understood by one of
ordinary skill in the art that the embodiments may be practiced without these
specific details. For example, circuits, systems, processes, and other components
20 may be shown as components in block diagram form in order not to obscure the
embodiments in unnecessary detail.
[0030] Also, it is noted that individual embodiments may be described as a process
which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure
25 diagram, or a block diagram. Although a flowchart may describe the operations as
a sequential process, many of the operations may be performed in parallel or
concurrently. In addition, the order of the operations may be re-arranged. A process
is terminated when its operations are completed but could have additional steps not
included in a figure.
30
9
[0031] The word “exemplary” and/or “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the
subject matter disclosed herein is not limited by such examples. In addition, any
aspect or design described herein as “exemplary” and/or “demonstrative” is not
necessarily to be construed as preferred 5 or advantageous over other aspects or
designs, nor is it meant to preclude equivalent exemplary structures and techniques
known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes,” “has,” “contains,” and other similar words are used in either the detailed
description or the claims, such terms are intended to be inclusive in a manner similar
10 to the term “comprising” as an open transition word without precluding any
additional or other elements.
[0032] As used herein, a “processing unit” or “processor” or “operating processor”
includes one or more processors, wherein processor refers to any logic circuitry for
15 processing instructions. A processor may be a general-purpose processor, a special
purpose processor, a conventional processor, a digital signal processor, a plurality
of microprocessors, one or more microprocessors in association with a (Digital
Signal Processing) DSP core, a controller, a microcontroller, Application Specific
Integrated Circuits, Field Programmable Gate Array circuits, any other type of
20 integrated circuits, etc. The processor may perform signal coding data processing,
input/output processing, and/or any other functionality that enables the working of
the system according to the present disclosure. More specifically, the processor or
processing unit is a hardware processor.
25 [0033] As used herein, “a user equipment”, “a user device”, “a smart-user-device”,
“a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”,
“a wireless communication device”, “a mobile communication device”, “a
communication device” may be any electrical, electronic and/or computing device
or equipment, capable of implementing the features of the present disclosure. The
30 user equipment/device may include, but is not limited to, a mobile phone, smart
phone, laptop, a general-purpose computer, desktop, personal digital assistant,
10
tablet computer, wearable device or any other computing device which is capable
of implementing the features of the present disclosure. Also, the user device may
contain at least one input means configured to receive an input from at least one of
a transceiver unit, a processing unit, a storage unit, a detection unit and any other
such unit(s) which a 5 re required to implement the features of the present disclosure.
[0034] As used herein, “storage unit” or “memory unit” refers to a machine or
computer-readable medium including any mechanism for storing information in a
form readable by a computer or similar machine. For example, a computer-readable
10 medium includes read-only memory (“ROM”), random access memory (“RAM”),
magnetic disk storage media, optical storage media, flash memory devices or other
types of machine-accessible storage media. The storage unit stores at least the data
that may be required by one or more units of the system to perform their respective
functions.
15
[0035] As used herein “interface” or “user interface” refers to a shared boundary
across which two or more separate components of a system exchange information
or data. The interface may also be referred to a set of rules or protocols that define
communication or interaction of one or more modules or one or more units with
20 each other, which also includes the methods, functions, or procedures that may be
called.
[0036] All modules, units, components used herein, unless explicitly excluded
herein, may be software modules or hardware processors, the processors being a
25 general-purpose processor, a special purpose processor, a conventional processor,
a digital signal processor (DSP), a plurality of microprocessors, one or more
microprocessors in association with a DSP core, a controller, a microcontroller,
Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array
circuits (FPGA), any other type of integrated circuits, etc.
30
11
[0037] As used herein the transceiver unit include at least one receiver and at least
one transmitter configured respectively for receiving and transmitting data, signals,
information or a combination thereof between units/components within the system
and/or connected with the system.
5
[0038] As discussed in the background section, the current known solutions have
several shortcomings. In the existing solution, routing is a complex task, especially
to enable efficient communication between network nodes and multiple third-party
NFs. 5G networks are complex as they involve multiple frequency bands, network
10 types and network slicing. Further, large routing tables can add to the complexity,
thereby leading to network latency due to the delay in taking routing decisions.
There is a need in the existing solutions to collectively transform routing from a
conventional process into a sophisticated mechanism that optimizes data
transmission and supports the diverse requirements of the 5G landscape. The
15 present disclosure aims to overcome the above-mentioned and other existing
problems in this field of technology by providing method and system of facilitating
routing in a network.
[0039] FIG. 1 illustrates an exemplary block diagram representation of 5th
20 generation core (5GC) network architecture, in accordance with exemplary
implementation of the present disclosure. As shown in FIG. 1, the 5GC network
architecture [100] includes a user equipment (UE) [102], a radio access network
(RAN) [104], an access and mobility management function (AMF) [106], a Session
Management Function (SMF) [108], a Service Communication Proxy (SCP) [110],
25 an Authentication Server Function (AUSF) [112], a Network Slice Specific
Authentication and Authorization Function (NSSAAF) [114], a Network Slice
Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a
Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122],
a Unified Data Management (UDM) [124], an application function (AF) [126], a
30 User Plane Function (UPF) [128], a data network (DN) [130], wherein all the
12
components are assumed to be connected to each other in a manner as obvious to
the person skilled in the art for implementing features of the present disclosure.
[0040] The Radio Access Network (RAN) [104] is the part of a mobile
telecommunications system that connects 5 user equipment (UE) [102] to the core
network (CN) and provides access to different types of networks (e.g., 5G network).
It consists of radio base stations and the radio access technologies that enable
wireless communication.
10 [0041] The Access and Mobility Management Function (AMF) [106] is a 5G core
network function responsible for managing access and mobility aspects, such as UE
registration, connection, and reachability. It also handles mobility management
procedures like handovers and paging.
15 [0042] The Session Management Function (SMF) [108] is a 5G core network
function responsible for managing session-related aspects, such as establishing,
modifying, and releasing sessions. It coordinates with the User Plane Function
(UPF) for data forwarding and handles IP address allocation and QoS enforcement.
20 [0043] The Service Communication Proxy (SCP) [110] is a network function in the
5G core network that facilitates communication between other network functions
by providing a secure and efficient messaging service. It acts as a mediator for
service-based interfaces.
25 [0044] The Authentication Server Function (AUSF) [112] is a network function in
the 5G core responsible for authenticating UEs during registration and providing
security services. It generates and verifies authentication vectors and tokens.
[0045] The Network Slice Specific Authentication and Authorization Function
30 (NSSAAF) [114] is a network function that provides authentication and
13
authorization services specific to network slices. It ensures that UEs can access only
the slices for which they are authorized.
[0046] The Network Slice Selection Function (NSSF) [116] is a network function
responsible for selecting the appropriate network 5 slice for a UE based on factors
such as subscription, requested services, and network policies.
[0047] The Network Exposure Function (NEF) [118] is a network function that
exposes capabilities and services of the 5G network to external applications,
10 enabling integration with third-party services and applications.
[0048] The Network Repository Function (NRF) [120] is a network function that
acts as a central repository for information about available network functions and
services. It facilitates the discovery and dynamic registration of network functions.
15
[0049] The Policy Control Function (PCF) [122] is a network function responsible
for policy control decisions, such as QoS, charging, and access control, based on
subscriber information and network policies.
20 [0050] The Unified Data Management (UDM) [124] is a network function that
centralizes the management of subscriber data, including authentication,
authorization, and subscription information.
[0051] The Application Function (AF) [126] is a network function that represents
25 external applications interfacing with the 5G core network to access network
capabilities and services.
[0052] The User Plane Function (UPF) [128] is a network function responsible for
handling user data traffic, including packet routing, forwarding, and QoS
30 enforcement.
14
[0053] The Data Network (DN) [130] refers to a network that provides data
services to user equipment (UE) in a telecommunications system. The data services
may include but are not limited to Internet services, private data network related
services.
5
[0054] Further, the 5G core architecture relies on a "Service-Based Architecture"
(SBA) framework, where the architecture elements defined in terms of "Network
Functions" (NFs) offer their services to all the other NFs and/or to any "consumers"
that are permitted to make use of these provided services via interfaces of a common
10 framework.
[0055] FIG. 2 illustrates an exemplary block diagram of a computing device [200]
upon which the features of the present disclosure may be implemented in
accordance with exemplary implementation of the present disclosure. In an
15 implementation, the computing device [200] may also implement a method for
facilitating routing in a network, utilising the system. In another implementation,
the computing device [200] itself implements the method for facilitating routing in
a network using one or more units configured within the computing device [200],
wherein said one or more units are capable of implementing the features as
20 disclosed in the present disclosure.
[0056] The computing device [200] may include a bus [202] or other
communication mechanism for communicating information, and a hardware
processor [204] coupled with bus [202] for processing information. The hardware
25 processor [204] may be, for example, a general-purpose microprocessor. The
computing device [200] may also include a main memory [206], such as a randomaccess
memory (RAM), or other dynamic storage device, coupled to the bus [202]
for storing information and instructions to be executed by the processor [204]. The
main memory [206] also may be used for storing temporary variables or other
30 intermediate information during execution of the instructions to be executed by the
processor [204]. Such instructions, when stored in non-transitory storage media
15
accessible to the processor [204], render the computing device [200] into a specialpurpose
machine that is customized to perform the operations specified in the
instructions. The computing device [200] further includes a read only memory
(ROM) [208] or other static storage device coupled to the bus [202] for storing static
5 information and instructions for the processor [204].
[0057] A storage device [210], such as a magnetic disk, optical disk, or solid-state
drive is provided and coupled to the bus [202] for storing information and
instructions. The computing device [200] may be coupled via the bus [202] to a
10 display [212], such as a cathode ray tube (CRT), Liquid crystal Display (LCD),
Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for
displaying information to a computer user. An input device [214], including
alphanumeric and other keys, touch screen input means, etc. may be coupled to the
bus [202] for communicating information and command selections to the processor
15 [204]. Another type of user input device may be a cursor controller [216], such as
a mouse, a trackball, or cursor direction keys, for communicating direction
information and command selections to the processor [204], and for controlling
cursor movement on the display [212]. This input device typically has two degrees
of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow
20 the device to specify positions in a plane.
[0058] The computing device [200] may implement the techniques described
herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware
and/or program logic which in combination with the computing device [200] causes
25 or programs the computing device [200] to be a special-purpose machine.
According to one implementation, the techniques herein are performed by the
computing device [200] in response to the processor [204] executing one or more
sequences of one or more instructions contained in the main memory [206]. Such
instructions may be read into the main memory [206] from another storage medium,
30 such as the storage device [210]. Execution of the sequences of instructions
contained in the main memory [206] causes the processor [204] to perform the
16
process steps described herein. In alternative implementations of the present
disclosure, hard-wired circuitry may be used in place of or in combination with
software instructions.
[0059] The computing device [200] 5 also may include a communication interface
[218] coupled to the bus [202]. The communication interface [218] provides a twoway
data communication coupling to a network link [220] that is connected to a
local network [222]. For example, the communication interface [218] may be an
integrated services digital network (ISDN) card, cable modem, satellite modem, or
10 a modem to provide a data communication connection to a corresponding type of
telephone line. As another example, the communication interface [218] may be a
local area network (LAN) card to provide a data communication connection to a
compatible LAN. Wireless links may also be implemented. In any such
implementation, the communication interface [218] sends and receives electrical,
15 electromagnetic or optical signals that carry digital data streams representing
various types of information.
[0060] The computing device [200] can send messages and receive data, including
program code, through the network(s), the network link [220] and the
20 communication interface [218]. In the Internet example, a server [230] might
transmit a requested code for an application program through the Internet [228], the
ISP [226], the local network [222], the host [224] and the communication interface
[218]. The received code may be executed by the processor [204] as it is received,
and/or stored in the storage device [210], or other non-volatile storage for later
25 execution.
[0061] The present disclosure is implemented by a system [300] (as shown in FIG.
3). In an implementation, the system [300] may include the computing device [200]
(as shown in FIG. 2). It is further noted that the computing device [200] is able to
30 perform the steps of a method [400] (as shown in FIG. 4).
17
[0062] Referring to FIG. 3, an exemplary block diagram of a system comprising a
controller node [300] for facilitating routing in a network, is shown, in accordance
with the exemplary implementations of the present disclosure. The controller node
[300] comprises at least one transceiver unit [302], at least one processing unit
[304], at least one execution unit [306] and 5 at least one user interface [308]. Also,
all of the components/ units of the controller node [300] are assumed to be
connected to each other unless otherwise indicated below. As shown in the FIG. 3
all units shown within the controller node [300] should also be assumed to be
connected to each other. Also, in FIG. 3 only a few units are shown, however, the
10 controller node [300] may comprise multiple such units or the controller node [300]
may comprise any such number of said units, as required to implement the features
of the present disclosure. In an implementation, the controller node [300] may
reside in a server or a network entity.
15 [0063] The system comprising controller node [300] is configured for facilitating
routing in a network, with the help of the interconnection between the
components/units of the system [300]. Furthermore, the controller node [300] may
be implemented at any of the network functions of the 5G Network Architecture
[100] as shown in FIG.1. The controller node [300] may be configured to perform
20 the functionalities at the AMF [106], the SMF [108], the SCP [110], the AUSF
[112], the NSSAAF [114], the NSSF [116], the NEF [118], the NRF [120], the
UDM [124], the AF [126] or the UPF [128].
[0064] The system as shown in FIG. 3 comprises a controller node [300]. The
25 controller node [300] refers to a node that may control and perform a third-party
routing between one or more network nodes and a network function (NF). The thirdparty
routing refers to selection of an intermediary path for data traffic in a network,
instead of data packets traveling directly from the one or more network nodes to the
NF. The intermediary path may be a router, a switch, and the like. In an exemplary
30 implementation, the application function (AF) [126] as shown in FIG. 1, resembles
an application server that can interact with the other control-plane NFs. AFs [126]
18
can exist for different application services and can be owned by the network
operator or by trusted third parties. For example, the AF [126] of an application
provider can influence routing, steering its traffic towards its external edge servers.
For services considered to be trusted by the network operator, the AF [126] can
access Network Functions directly 5 whereas untrusted or third-party AFs would
access the Network Functions through the NEF [118]. The one or more network
nodes refer to network nodes or network functions of the network. In an
implementation, the network is the 5th generation core network. The network may
be a 4th generation network, 6th generation network, or any other future generations
10 of network. In an implementation, the network functions may be one of the AMF
[106], the SMF [108], the SCP [110], the AUSF [112], the NSSAAF [114], the
NSSF [116], the NEF [118], the NRF [120], the UDM [124], the AF [126] or the
UPF [128].
15 [0065] The controller node [300] comprises the transceiver unit [302]. The
transceiver unit [302] is configured to receive a first user input. The first user input
is received at a user interface [308] of the controller node [300]. The first user input
comprises but may not be limited to providing a network function (NF) from the
one or more network functions for which the routing is to be performed.
20
[0066] The controller node [300] further comprises the processing unit [304]. The
processing unit [304] is configured to identify the NF from a plurality of network
functions (NFs) based on the first user input. To identify, the processing unit [304]
may select an appropriate NF from the plurality of network functions based on the
25 first user input. The plurality of network functions (NFs) are third party network
functions (NFs). The third-party NFs refers to intermediary functions of a network
provided by a third party rather than the network operator. To identify the NF from
the plurality of NFs, the processing unit [304] may analyse the first user input
provided at the user interface [308] of the controller node [300]. Based on the
30 analysis of the first user input, the processing unit [304] may identify the NF that
may be appropriate and for which routing needs to be established.
19
[0067] The transceiver unit [302] is further configured to establish a connection
between the controller node [300] and the NF. In an implementation of the present
disclosure, the connection may be established between the controller node [300]
and the NF, based on the identification of 5 the NF from the first user input. In an
implementation of the present disclosure, the connection may be established based
on network addresses, hostnames, or other unique identifiers associated with the
NF. Once identified, the controller node [300] initiates a connection using a suitable
communication protocol. This may involve protocols like SSH, HTTPS, or others,
10 depending on the network environment and the specific requirements of the NFs.
The controller node [300] must authenticate itself to the NF using credentials, such
as passwords, keys, or certificates. This confirms that the controller node [300] has
the necessary permissions to interact with the NF. Finally, after successful
authentication, a secure and stable communication channel is established between
15 the controller node [300] and the NF. The processing unit [304] is further
configured to select an interface based on the established connection. In an
implementation of the present disclosure, the processing unit [304] may evaluate
the established connection parameters. The parameters may include Quality of
Service (QoS), current network conditions, and the like. On the basis of the
20 evaluation, the processing unit [304] may provide the interfaces that may be
appropriate to route the data traffic on the user interface [308] of the controller node
[300]. Further, the interface is selected based on a second user input at the user
interface [308] of the controller node [300]. Based on the provided interfaces at the
user interface [308], the appropriate interface is selected by the second user input.
25 The functional architecture of 5G core is flexibly designed to adopt implementation
changes. The network nodes in the 5G core network within the control plane enable
cross-domain interactions allowing other authorized network functions (thirdparty)
to access their services. The 5G core network is designed as an
interconnected system of Network Functions (NFs) that communicate through
30 service-based interfaces or reference point interfaces. The network Functions
within the 5G control plane will use service-based interfaces for their interactions.
20
The user plane functions, and radio interactions shall use the reference point
interfaces. Each NF exposes specific functionality and provides services to other
NFs. Therefore, any communication or routing between NFs or between nodes and
NFs takes place through these interfaces. The interfaces are self-contained software
modules that are reusable independently of each 5 other and can be thought of as
micro services. In an example, a N5 interface is used to connect the PCF (Policy
Control Function) [122] and an AF (Application Function) [126].
[0068] The controller node [300] further comprises an execution unit [306]. The
10 execution unit [306] is configured to trigger an automation task remotely via the
selected interface on one or more network nodes. The interface is selected based on
a second user input at the user interface [308] of the controller node. The
configuration of the execution unit [306] allows the execution unit to identify when
the automation task needs to be initiated based on user input, and subsequently carry
15 out the necessary operations to execute the automation task on one or more network
nodes. In an implementation, the automation task is the third-party routing task. The
automation task may be stored at the controller node [300]. The triggering of the
automation task remotely on the one or more network nodes is based on a third user
input at the user interface [308] of the controller node [300]. The automation task
20 is triggered remotely on the one or more network nodes via the interface. The third
user input includes but may not be limited to a command to trigger the automation
task. The triggering of the automation task allows execution of the command and
necessary operations to execute the automation task. In an implementation of the
present disclosure, the user interface [308] may be a graphical user interface [308]
25 (GUI) or a command line interface (CLI). The GUI refers to an interface for the
user to interact with the system [300] by visual or graphical representation of icons,
menu, etc. The GUI may be used in a smartphone, laptop, computer, etc. The CLI
refers to a text-based interface to interact with the system [300] for the user. The
user may input text lines called as command lines in the CLI to access the data in
30 the system [300].
21
[0069] The execution unit [306] is further configured to facilitate a routing from
the one or more network nodes to the NF based on the automation task. The
automation task establishes a network path for routing from the one or more
network nodes to the third-party NF, and hence facilitates routing. In an
implementation of the present 5 disclosure, the routing refers to selection of an
intermediary path for the network nodes to the third-party NF. To facilitate the
routing from the one or more network nodes to the NF, the execution unit [306]
may configure a set of policies for routing. Furthermore, the execution unit [306]
may initiate a data transmission, a data processing and a data exchange between the
10 one or more network nodes and the NF.
[0070] The processing unit [304] is further configured to perform, a sanity check
to validate completion of routing between the one or more network nodes and the
NF. The sanity check refers to a process for checking and validating if the
15 automation task has completed without any error. In an implementation of the
present disclosure, if a response to the sanity check is a positive response, it signifies
that the automation task has completed successfully, and the controller node [300]
may terminate the automation task. To perform the sanity check, the execution unit
[306] may monitor the routing for checking the completion of routing between the
20 one or more network nodes and the NF. In another implementation of the present
disclosure, if the response to the sanity check is a negative response, the controller
node [300] may wait for a pre-defined time period before performing another sanity
check. The pre-defined time period may be defined by the user.
25 [0071] Referring to FIG. 4, an exemplary method flow diagram [400] for
facilitating routing in a network, in accordance with exemplary implementations of
the present disclosure is shown. In an implementation the method [400] is
performed by the system [300]. Further, in an implementation, the system [300]
may be present in a server device to implement the features of the present
30 disclosure. Also, as shown in FIG. 4, the method [400] starts at step [402].
22
[0072] At step [404], the method comprises receiving, by a transceiver unit [302]
at a controller node [300], a first user input. The first user input is received at a user
interface [308] of the controller node [300]. The first user input comprises but may
not be limited to a providing a network function (NF) from the one or more network
functions (NFs) for which the routing is 5 to be performed. The controller node [300]
refers to a node that may control and perform a third-party routing between one or
more network nodes and a network function (NF). The third-party routing refers to
selection of an intermediary path for data traffic in a network, instead of data
packets traveling directly from the one or more network nodes to the NF. The
10 intermediary path may be a router, a switch, and the like. In an exemplary
implementation, the application function (AF) [126] as shown in FIG. 1, resembles
an application server that can interact with the other control-plane NFs. AFs can
exist for different application services and can be owned by the network operator
or by trusted third parties. For instance, the AF [126] of an application provider can
15 influence routing, steering its traffic towards its external edge servers. For services
considered to be trusted by the operator, the AF [126] can access Network Functions
directly whereas untrusted or third-party AFs would access the Network Functions
through the NEF [118]. The one or more network nodes refer to core network nodes
or network functions of the network. In an implementation, the network is the 5th
20 generation core network. The network may be a 4th generation network, 6th
generation network, or any other future generations of network. In an
implementation, the network functions may be one of the AMF [106], the SMF
[108], the SCP [110], the AUSF [112], the NSSAAF [114], the NSSF [116], the
NEF [118], the NRF [120], the UDM [124], the AF [126] or the UPF [128].
25
[0073] Next, at step [406], the method comprises identifying, by a processing unit
[304] at the controller node [300], a network function (NF) from a plurality of
network functions (NFs) based on the first user input. To identify, the processing
unit [304] may select an appropriate NF from the plurality of network functions
30 based on the first user input. The plurality of network functions (NFs) are third party
network functions (NFs). The third-party NFs refers to intermediary functions of a
23
network provided by a third party rather than the network operator. To identify the
NF from the plurality of NFs, the processing unit [304] may analyse the first user
input. Based on the analysis of the first user input, the processing unit [304] may
identify the NF that may be appropriate and for which routing needs to be
5 established.
[0074] Next, at step [408], the method comprises establishing, by the transceiver
unit [302] at the controller node [300], a connection between the controller node
[300] and the NF. In an implementation of the present disclosure, the connection
10 may be established between the controller node [300] and the NF, based on the
identification of the NF from the first user input. In an implementation of the present
disclosure, the connection may be established based on network addresses,
hostnames, or other unique identifiers associated with the NF. Once identified, the
controller node [300] initiates a connection using a suitable communication
15 protocol. This may involve protocols like SSH, HTTPS, or others, depending on
the network environment and the specific requirements of the NFs. The controller
node [300] must authenticate itself to the NF using credentials, such as passwords,
keys, or certificates. This confirms that the controller node [300] has the necessary
permissions to interact with the NF. Finally, after successful authentication, a
20 secure and stable communication channel is established between the controller node
[300] and the NF.
[0075] Further, at step [410], the method comprises selecting, by the processing
unit [304] at the controller node [300], an interface based on the established
25 connection. In an implementation of the present disclosure, the processing unit
[304] may evaluate the established connection parameters to select the interface.
The parameters may include Quality of Service (QoS), current network conditions,
and the like. On the basis of the evaluation, the processing unit [304] may select the
interface that may be appropriate to route the data traffic on the user interface [308]
30 of the controller node [300]. Further, the interface is selected based on a second
user input at the user interface [308] of the controller node [300]. Based on the
24
provided interfaces at the user interface [308], the appropriate interface is selected
by the second user input. The functional architecture of 5G core is flexibly designed
to adopt implementation changes. The network nodes in the 5G core network within
the control plane enable cross-domain interactions allowing other authorized
network functions (third-party) to access their 5 services. The 5G core network is
designed as an interconnected system of Network Functions (NFs) that
communicate through service-based interfaces or reference point interfaces. The
network functions within the 5G control plane will use service-based interfaces for
their interactions. The user plane functions, and radio interactions shall use the
10 reference point interfaces. Each NF exposes specific functionality and provides
services to other NFs. Therefore, any communication or routing between NFs or
between nodes and NFs takes place through these interfaces. Interfaces are selfcontained
software modules that are reusable independently of each other and can
be thought of as micro services. In an example, a N5 interface is used to connect
15 the PCF (Policy Control Function) [122] and an AF (Application Function) [126].
In an example, a N5 interface is used to connect the PCF [122] and the AF [126].
[0076] Further, at step [412], the method encompasses triggering, by an execution
unit [306] at the controller node [300], an automation task remotely via the selected
20 interface on one or more network nodes. The interface is selected based on a second
user input at the user interface [308] of the controller node. The configuration of
the execution unit [306] allows the execution unit to identify when the automation
task needs to be initiated based on user input, and subsequently carry out the
necessary operations to execute the automation task on one or more network nodes.
25 In an implementation, the automation task is a third-party routing task. The
automation task may be stored at the controller node [300]. The triggering the
automation task remotely on the one or more network nodes is based on a third user
input at the user interface [308] of the controller node [300]. The triggering of the
automation task allows execution of the command and necessary operations to
30 execute the automation task. The third user input includes but may not be limited
to a command to trigger the automation task. In an implementation of the present
25
disclosure, the user interface [308] may be a graphical user interface (GUI) or a
command line interface (CLI). The GUI refers to an interface for the user to interact
with the system [300] by visual or graphical representation of icons, menu, etc. The
GUI may be used in a smartphone, laptop, computer, etc. The CLI refers to a textbased
interface to interact 5 with the system [300] for the user. The user may input
text lines called as command lines in the CLI to access the data in the system [300].
[0077] Next, at step [414], the method comprises facilitating, by the execution unit
[306] at the controller node [300], a routing from the one or more network nodes to
10 the NF based on the automation task. In an implementation of the present
disclosure, the routing refers to selection of an intermediary path for the third-party
network nodes to the third-party NF. To facilitate the routing from the one or more
network nodes to the NF, the execution unit [306] may configure a set of policies
for routing. The automation task establishes a network path for routing from the one
15 or more network nodes to the third-party NF, and hence facilitates routing.
Furthermore, the execution unit [306] may initiate a data transmission, a data
processing and a data exchange between the one or more network nodes and the
NF. The method further comprises performing, by the processing unit [304] at the
controller node [300], a sanity check to validate completion of routing between the
20 one or more network nodes and the NF. To validate the completion of routing, the
processing unit [304] may perform check on the network, where the processing unit
[304] may check if data packets are being transferred, network parameters, and the
like. The sanity check refers to a process for checking and validating if the
automation task has completed without any error. To perform the sanity check, the
25 execution unit [306] may monitor the routing for checking the completion of
routing between the one or more network nodes and the NF. In an implementation
of the present disclosure, if a response to the sanity check is a positive response, it
signifies that the automation task has completed successfully, and the controller
node [300] may terminate the automation task. In another implementation of the
30 present disclosure, if the response to the sanity check is a negative response, the
26
controller node [300] may wait for a pre-defined time period before performing
another sanity check. The pre-defined time period may be defined by the user.
[0078] Thereafter, the method terminates at step [416].
5
[0079] Referring to FIG. 5, an exemplary system diagram [500] for facilitating
routing in a network, in accordance with exemplary implementations of the present
disclosure is shown.
10 [0080] The exemplary system diagram [500] comprises a router [502], a switch1
[504], a server1 [506], a switch2 [508] and a server2 [510].
[0081] In an implementation of the present disclosure, the router [502] may be the
controller node [300] as shown in FIG. 3.
15
[0082] The switch1 [504] enables connection and communication between the
server1 [506] and the router [502]. Further, the switch2 [508] enables the
connection and communication between the server2 [510] and the router [502].
20 [0083] The router [502] may perform the third-party routing between the one or
more network nodes and the network function (NF). The third-party routing refers
to selection of an intermediary path for data traffic in a network. The one or more
network nodes refers to the core network nodes or network functions that form the
core of the network. In an implementation, the network is the 5th generation core
25 network. The network may be a 4th generation network, 6th generation network, or
any other future generations of network. In an implementation, the network
functions may be one of the AMF [106], the SMF [108], the SCP [110], the AUSF
[112], the NSSAAF [114], the NSSF [116], the NEF [118], the NRF [120], the
UDM [124], the AF [126] or the UPF [128].
30
27
[0084] In an implementation of the present disclosure, the router [502] may receive
the first user input. The first user input is received at a user interface [308] of the
router [502].
[0085] The router [502] may further 5 identify the NF from the plurality of NFs based
on the first user input. The plurality of network functions (NFs) are third party
network functions (NFs).
[0086] The router [502] may further establish a connection with the NF. Further,
10 the router [502] may select an interface based on the established connection. The
router [502] may evaluate the established connection parameters. The parameters
may include Quality of Service (QoS), current network conditions, and the like.
Based on the evaluation, the router [502] may select the interface that may be
appropriate to route the data traffic.
15
[0087] Furthermore, the router [502] may be configured to trigger the automation
task for the one or more network nodes routing the server1 [506] with the server2
[510]. The automation task may be for the third-party routing. The automation task
may be stored at the router [502]. The triggering of the automation task may be
20 based on the second user input at the user interface [308] of the router [502]. The
user interface [308] of the router may be one of the GUI and the CLI.
[0088] The router [502] may further perform the sanity check. The sanity check is
to validate the completion of routing between the server1 [506] and the server2
25 [510]. If the response to the sanity check is a positive response, the automation task
is complete, and the router [502] may terminate the automation task. In another
embodiment, if the response to the sanity check is a negative response, the router
[502] may wait for a pre-defined time period before performing another sanity
check. The pre-defined time period may be defined by the user.
30
28
[0089] Referring to FIG. 6, an exemplary method flow [600] for facilitating routing
in a network, in accordance with exemplary implementations of the present
disclosure is shown.
[0090] The exemplary 5 method flow [600] may be implemented in any of the
network functions of the 5G Network Architecture [100] as shown in FIG.1. The
functionalities of the exemplary method flow [600] may be performed at the AMF
[106], the SMF [108], the SCP [110], the AUSF [112], the NSSAAF [114], the
NSSF [116], the NEF [118], the NRF [120], the UDM [124], the AF [126] or the
10 UPF [128].
[0091] At [602], the connectivity of the controller node [300] with the plurality of
network nodes may be checked by the user or the system [500] as shown in FIG. 5.
The checking of the connectivity ensures that there is a communication path
15 established between the controller node [300] and the plurality of network nodes.
Further, this step implies that the connection has already been pre-established.
Further, in an implementation of the present disclosure, the connection may be
established based on network addresses, hostnames, or other unique identifiers
associated with the NF. Once identified, the controller node [300] initiates a
20 connection using a suitable communication protocol. This may involve protocols
like SSH, HTTPS, or others, depending on the network environment and the
specific requirements of the NFs. The controller node [300] must authenticate itself
to the NF using credentials, such as passwords, keys, or certificates. This confirms
that the controller node [300] has the necessary permissions to interact with the NF.
25 Finally, after successful authentication, a secure and stable communication channel
is established between the controller node [300] and the NF.
[0092] Further, at [604], a network function (NF) from the plurality of NFs may be
identified by the controller node [300] where the third-party routing from the one
30 or more network nodes to the NF is to be performed, based on the first user input.
The first user input may be received at the user interface [308] of the controller
29
node [300]. The first user input selects a network function from the plurality of
network functions where third-party routing is to be performed.
[0093] Further, at [606], based on the identification of the NF from the plurality of
NFs, a connection between the controller node 5 [300] and the NF may be established.
The connection is established through an interface Furthermore, an automation task
of third-party routing from the one or more network nodes to the NF may be
triggered by the controller node [300] remotely.
10 [0094] Next, at [608], the controller node [300] may monitor the automation task
and perform the sanity check to validate if the third-party routing between the one
or more network nodes and the NF is complete or not.
[0095] Next, at [610], if the response to the sanity check is a positive response, the
15 automation task is complete, and the method flow [600] may terminate. If the
response to the sanity check is a negative response, the controller node [300] may
wait for a pre-defined time period before performing another sanity check.
[0096] The present disclosure further discloses a non-transitory computer readable
20 storage medium storing instruction for facilitating routing in a network, the
instructions include executable code which, when executed by one or more units of
a system cause a transceiver unit [302] of the system [300] to receive a first user
input. The instructions when executed by the system further cause a processing unit
[304] of the system to identify a network function (NF) from a plurality of network
25 functions (NFs) based on the first user input. The instructions when executed by the
system further cause the transceiver unit [302] to establish, a connection between
the controller node and the NF. The instructions when executed by the system
further cause the processing unit [304] to select, an interface based on the
established connection. The instructions when executed by the system further cause
30 an execution unit [306] to trigger, the automation task remotely via the interface on
one or more network nodes. The instructions when executed by the system further
30
cause the execution unit [306] to facilitate a routing from the one or more network
nodes to the NF based on the automation task.
[0097] As is evident from the above, the present disclosure provides a technically
advanced solution for facilitating 5 routing in a network. The present solution
provides a system and a method for facilitating routing in a network. The present
solution further provides a solution for dynamic adaptability, intelligent decisionmaking,
NF integration, QoS optimization, security measures, support for
heterogeneous networks, and redundancy mechanisms. The present solution further
10 addresses the complexities of enabling efficient communication between nodes and
multiple third-party NFs.
[0098] While considerable emphasis has been placed herein on the disclosed
implementations, it will be appreciated that many implementations can be made and
15 that many changes can be made to the implementations without departing from the
principles of the present disclosure. These and other changes in the implementations
of the present disclosure will be apparent to those skilled in the art, whereby it is to
be understood that the foregoing descriptive matter to be implemented is illustrative
and non-limiting.
We Claim:
1. A method for facilitating routing in a network, the method comprising:
- receiving, by a transceiver unit [302] at a controller node [300], a first
5 user input;
- identifying, by a processing unit [304] at the controller node [300], a
network function (NF) from a plurality of network functions (NFs)
based on the first user input;
- establishing, by the transceiver unit [302] at the controller node [300],
10 a connection between the controller node [300] and the NF;
- selecting, by the processing unit [304] at the controller node [300], an
interface based on the established connection;
- triggering, by an execution unit [306] at the controller node [300], an
automation task via the interface on one or more network nodes; and
15 - facilitating, by the execution unit [306] at the controller node [300], a
routing from the one or more network nodes to the NF based on the
automation task.
2. The method as claimed in claim 1, further comprising:
20 - performing, by the processing unit [304] at the controller node [300], a
sanity check to validate completion of routing between the one or more
network nodes and the NF.
3. The method as claimed in claim 1, wherein the automation task is triggered
25 remotely on the one or more network nodes via the interface.
4. The method as claimed in claim 1, wherein the method facilitates at least a
data transmission, a data processing and a data exchange between the one
or more network nodes and the NF based on routing.
30
32
5. The method as claimed in claim 1, wherein the first user input is received at
a user interface [308] of the controller node [300].
6. The method as claimed in claim 1, wherein the interface is selected based
on a second user input at the user 5 interface [308] of the controller node
[300].
7. The method as claimed in claim 1, wherein, the triggering the automation
task remotely on the one or more network nodes is based on a third user
10 input at the user interface [308] of the controller node [300].
8. A system [300] for facilitating routing in a network, wherein the system
[300] comprises:
- a controller node [300], wherein the controller node [300] comprises:
15 - a transceiver unit [302], configured to receive a first user input;
- a processing unit [304], configured to identify, a network function (NF)
from a plurality of network functions (NFs) based on the first user
input;
- the transceiver unit [302] further configured to establish, a connection
20 between the controller node [300] and the NF;
- the processing unit [304] further configured to select, an interface based
on the established connection; and
- an execution unit [306], configured to
- trigger, an automation task via the interface on one or more network
25 nodes; and
- facilitate, a routing from the one or more network nodes to the NF based
on the automation task.
33
9. The system [300] as claimed in claim 7, wherein the processing unit [304]
is further configured to perform, a sanity check to validate completion of
routing between the one or more network nodes and the NF.
10. The system as claimed in claim 5 8, wherein the automation task is triggered
remotely on the one or more network nodes via the interface.
11. The system as claimed in claim 8, wherein the system facilitates at least a
data transmission, a data processing and a data exchange between the one
10 or more network nodes and the NF based on routing.
12. The system [300] as claimed in claim 7, wherein the first user input is
received at a user interface [308] of the controller node [300].
15 13. The system as claimed in claim 8, wherein the interface is selected based on
a second user input at the user interface [308] of the controller node [300].
14. The system [300] as claimed in claim 7, wherein, the triggering the
automation task remotely on the one or more network nodes is based on a
20 third user input at the user interface [308] of the controller node [300].
Dated this the 8th Day of September, 2023
| # | Name | Date |
|---|---|---|
| 1 | 202321060624-STATEMENT OF UNDERTAKING (FORM 3) [08-09-2023(online)].pdf | 2023-09-08 |
| 2 | 202321060624-PROVISIONAL SPECIFICATION [08-09-2023(online)].pdf | 2023-09-08 |
| 3 | 202321060624-POWER OF AUTHORITY [08-09-2023(online)].pdf | 2023-09-08 |
| 4 | 202321060624-FORM 1 [08-09-2023(online)].pdf | 2023-09-08 |
| 5 | 202321060624-FIGURE OF ABSTRACT [08-09-2023(online)].pdf | 2023-09-08 |
| 6 | 202321060624-DRAWINGS [08-09-2023(online)].pdf | 2023-09-08 |
| 7 | 202321060624-Proof of Right [12-01-2024(online)].pdf | 2024-01-12 |
| 8 | 202321060624-ORIGINAL UR 6(1A) FORM 1 & 26-050424.pdf | 2024-04-15 |
| 9 | 202321060624-FORM-5 [30-08-2024(online)].pdf | 2024-08-30 |
| 10 | 202321060624-ENDORSEMENT BY INVENTORS [30-08-2024(online)].pdf | 2024-08-30 |
| 11 | 202321060624-DRAWING [30-08-2024(online)].pdf | 2024-08-30 |
| 12 | 202321060624-CORRESPONDENCE-OTHERS [30-08-2024(online)].pdf | 2024-08-30 |
| 13 | 202321060624-COMPLETE SPECIFICATION [30-08-2024(online)].pdf | 2024-08-30 |
| 14 | Abstract 1.jpg | 2024-09-04 |
| 15 | 202321060624-Request Letter-Correspondence [09-09-2024(online)].pdf | 2024-09-09 |
| 16 | 202321060624-Power of Attorney [09-09-2024(online)].pdf | 2024-09-09 |
| 17 | 202321060624-Form 1 (Submitted on date of filing) [09-09-2024(online)].pdf | 2024-09-09 |
| 18 | 202321060624-Covering Letter [09-09-2024(online)].pdf | 2024-09-09 |
| 19 | 202321060624-CERTIFIED COPIES TRANSMISSION TO IB [09-09-2024(online)].pdf | 2024-09-09 |
| 20 | 202321060624-FORM 3 [08-10-2024(online)].pdf | 2024-10-08 |