Sign In to Follow Application
View All Documents & Correspondence

Method And System For Managing Network Function Virtualization (Nfv) Platform Data Analytics (Npda) Operations

Abstract: The present disclosure relates to a method and system for managing network function virtualization (NFV) platform data analytics (NPDA) operations. The method encompasses: receiving a request comprising one or more commands associated with one or more network functions, wherein the one or more commands are at least one of a register command, a deregister command and a set of configuration command; performing one or more operations on at least one of a set of configuration data, and a set of policy data associated with one or more network functions based on the one or more commands, wherein the one or more operations are at least one of a create operation, a modify operation, a delete operation, a view operation, an AND operation, and an OR operation; and generating dynamically a response associated with the one or more network functions based on the one or more operations. [FIG. 4]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
14 September 2023
Publication Number
14/2025
Publication Type
INA
Invention Field
MECHANICAL ENGINEERING
Status
Email
Parent Application

Applicants

Jio Platforms Limited
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Inventors

1. Aayush Bhatnagar
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
2. Ankit Murarka
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
3. Rizwan Ahmad
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
4. Kapil Gill
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
5. Arpit Jain
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
6. Shashank Bhushan
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
7. Jugal Kishore
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
8. Meenakshi Sarohi
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
9. Kumar Debashish
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
10. Supriya Kaushik De
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
11. Gaurav Kumar
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
12. Kishan Sahu
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
13. Gaurav Saxena
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
14. Vinay Gayki
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
15. Mohit Bhanwria
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
16. Durgesh Kumar
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
17. Rahul Kumar
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.

Specification

FORM 2
THE PATENTS ACT, 1970 (39 OF 1970) & THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR MANAGING NETWORK
FUNCTION VIRTUALIZATION (NFV) PLATFORM DATA
ANALYTICS (NPDA) OPERATIONS”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr.
Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is to be performed.

METHOD AND SYSTEM FOR MANAGING NETWORK FUNCTION VIRTUALIZATION (NFV) PLATFORM DATA ANALYTICS (NPDA)
OPERATIONS
FIELD OF DISCLOSURE
[0001] The present disclosure generally relates to the field of wireless communication systems. More particularly, embodiments of the present disclosure relate to a method and a system for managing network function virtualization (NFV) platform data analytics (NPDA) operations.
BACKGROUND
[0002] The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art.
[0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second-generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. 3G technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth-generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth-generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless communication

technology has become more advanced, sophisticated, and capable of delivering more services to its users.
[0004] In recent years, Network Function Virtualization (NFV) has revolutionized the way network services are deployed and managed by replacing traditional hardware-based network appliances with software-based virtualized functions. Virtual Network Functions (VNFs) and Container Network Functions (CNFs) have become essential components in modern telecommunications and cloud environments. However, as these virtualized network functions evolve, the need for efficient management of configuration, performance, and operational policies has increased significantly. Managing these functions involves handling complex operations such as registering, modifying, and deleting network functions, along with monitoring their performance and security in real time.
[0005] Existing NFV platforms often lack the ability to perform real-time, dynamic updates to configuration and policy data, especially in scenarios where quick scaling, fault tolerance, and on-demand adjustments are required. Traditional systems tend to follow static management procedures, making it difficult to achieve flexibility when handling network scaling operations, failure recovery, and policy adjustments. Additionally, the absence of an efficient monitoring framework for Fault, Configuration, Accounting, Performance, and Security (FCAPS) data at runtime limits the ability to perform proactive system maintenance or ensure optimal performance of VNFs and CNFs.
[0006] Furthermore, in traditional platforms, user interaction through command-line interfaces (CLI) or other user interfaces is often limited in scope, making it challenging to dynamically register or deregister network functions or manage configuration changes without impacting the ongoing network service. The static approach results in service disruptions, increased operational complexity, and delays in policy enforcement, hindering the ability to provide seamless, real-time adjustments required in modern NFV environments.

[0007] The present disclosure provides a solution for seamless operations that is necessary to monitor fault, configuration, accounting, performance and security (FCAPS) data of NPDA service and allow configuration changes that require changing at runtime.
SUMMARY
[0008] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0009] An aspect of the present disclosure may relate to a method for managing network function virtualization (NFV) platform data analytics (NPDA) operations. The method includes receiving, by a transceiver unit from a communication unit, a request comprising one or more commands associated with one or more network functions, wherein the one or more commands are at least one of a register command, a deregister command and a set of configuration commands. The method further includes performing, by a processing unit, one or more operations on at least one of a set of configuration data, and a set of policy data associated with one or more network functions based on the one or more commands, wherein the one or more operations are at least one of a create operation, a modify operation, a delete operation, a view operation, an AND operation, and an OR operation. The method further includes generating dynamically, by a generating unit at the NPDA, a response associated with the one or more network functions based on the one or more operations.
[0010] In an exemplary aspect of the present disclosure, the method further comprises monitoring, by a monitoring unit, at least fault, configuration, accounting, performance, and security (FCAPS) data of the NPDA during the performance of the one or more operations, and allowing, by the processing unit, one or more configuration changes at runtime based on the monitored FCAPS data.

[0011] In an exemplary aspect of the present disclosure, the one or more commands are received, by the transceiver unit from the communication unit, via a command line interface (CLI).
[0012] In an exemplary aspect of the present disclosure, the one or more network functions is one of a virtual network functions (VNFs), a container network functions (CNFs), a container network function component(CNFC), and a Virtual Networking Function Component (VNFC).
[0013] In an exemplary aspect of the present disclosure, the response associated with the one or more network functions based on the one or more operations is generated dynamically by the processing unit in a predefined format.
[0014] In an exemplary aspect of the present disclosure, the method further comprises displaying, by a displaying unit at the communication unit, the response associated with the request based on the one or more operations.
[0015] Another aspect of the present disclosure may relate to a system for managing network function virtualization (NFV) platform data analytics (NPDA) operations. The system comprises a transceiver unit configured to receive from a communication unit, a request comprising one or more commands associated with one or more network functions, wherein the one or more commands are at least one of a register command, a deregister command and a set of configuration commands. The system further comprises a processing unit configured to perform one or more operations on at least one of a set of configuration data, and a set of policy data associated with one or more network functions based on the one or more commands, wherein the one or more operations are at least one of a create operation, a modify operation, a delete operation, a view operation, an AND operation, and an OR operation. The system further comprises a generating unit configured to generate dynamically at the NPDA, a response associated with the one or more network functions based on the one or more operations.

[0016] Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instructions for managing network function virtualization (NFV) platform data analytics (NPDA) operations, the instructions include executable code which, when executed by one or more units of 5 a system, causes a transceiver unit to receive from a communication unit, a request comprising one or more commands associated with one or more network functions, wherein the one or more commands are at least one of a register command, a deregister command and a set of configuration command. The executable code when causes further causes a processing unit to perform one or more operations on
10 at least one of a set of configuration data, and a set of policy data associated with one or more network functions based on the one or more commands, wherein the one or more operations are at least one of a create operation, a modify operation, a delete operation, a view operation, an AND operation, and an OR operation; and a generating unit configured to generate dynamically at the NPDA, a response
15 associated with the one or more network functions based on the one or more operations. The executable code when executed further causes a generating unit to generate dynamically at the NPDA, a response associated with the one or more network functions based on the one or more operations.
OBJECTS OF THE DISCLOSURE
20 [0017] Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below.
[0018] It is an object of the present disclosure to provide a system and a method for ensuring seamless interaction between a NFV Platform Data Analytics (NPDA) and command line interface (CLI).
25 [0019] It is another object of the present disclosure to provide fault tolerance for any event failure.
6

[0020] It is another object of the present disclosure to provide an interface that works in a high availability mode and if one NPDA instance went down during request processing then the next available instance will take care of the request.
[0021] It is yet another object of the present disclosure that facilitates in async 5 event-based implementation to utilize interface efficiently.
DESCRIPTION OF THE DRAWINGS
[0022] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods
10 and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Also, the embodiments shown in the figures are not to be construed as limiting the disclosure, but the possible variants of the method and system
15 according to the disclosure are illustrated herein to highlight the advantages of the disclosure. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components or circuitry commonly used to implement such components.
[0023] FIG. 1 illustrates an exemplary block diagram representation of 5th 20 generation core (5GC) network architecture.
[0024] FIG. 2 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
[0025] FIG. 3 illustrates an exemplary block diagram of a system for managing 25 network function virtualization (NFV) platform data analytics (NPDA) operations, in accordance with exemplary implementations of the present disclosure.
7

[0026] FIG. 4 illustrates a method flow diagram for managing network function virtualization (NFV) platform data analytics (NPDA) operations, in accordance with exemplary implementations of the present disclosure.
[0027] FIG. 5 illustrates an exemplary block diagram of a system architecture for 5 managing network function virtualization (NFV) platform data analytics (NPDA) operations, in accordance with exemplary implementations of the present disclosure.
[0028] FIG. 6 illustrates a process flow diagram for managing network function virtualization (NFV) platform data analytics (NPDA) operations, in accordance 10 with exemplary implementations of the present disclosure.
[0029] FIG. 7 illustrates an exemplary NPDA_CL interface for managing network function virtualization (NFV) platform data analytics (NPDA) operations, in accordance with exemplary implementations of the present disclosure.
[0030] The foregoing shall be more apparent from the following more detailed 15 description of the disclosure.
DETAILED DESCRIPTION
[0031] In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that 20 embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter may each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above.
25 [0032] The ensuing description provides exemplary embodiments only, and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in
8

the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
5 [0033] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skills in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, processes, and other components may be shown as components in block diagram form in order not to obscure the 10 embodiments in unnecessary detail.
[0034] Also, it is noted that individual embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations may be performed in parallel or 15 concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure.
[0035] The word “exemplary” and/or “demonstrative” is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the
20 subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms
25 “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive—in a manner similar to the term “comprising” as an open transition word—without precluding any additional or other elements.
9

[0036] As used herein, a “processing unit” or “processor” or “operating processor” includes one or more processors, wherein processor refers to any logic circuitry for processing instructions. A processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality 5 of microprocessors, one or more microprocessors in association with a (Digital Signal Processing) DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of 10 the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
[0037] As used herein, “a user equipment”, “a user device”, “a smart-user-device”, “a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”, “a wireless communication device”, “a mobile communication device”, “a
15 communication device” may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure. The user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable
20 of implementing the features of the present disclosure. Also, the user device may contain at least one input means configured to receive an input from at least one of a transceiver unit, a processing unit, a storage unit, a detection unit and any other such unit(s) which are required to implement the features of the present disclosure.
[0038] As used herein, “storage unit” or “memory unit” refers to a machine or 25 computer-readable medium including any mechanism for storing information in a form readable by a computer or similar machine. For example, a computer-readable medium includes read-only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media. The storage unit stores at least the data
10

that may be required by one or more units of the system to perform their respective functions.
[0039] As used herein “interface” or “user interface” refers to a shared boundary across which two or more separate components of a system exchange information 5 or data. The interface may also be referred to a set of rules or protocols that define communication or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called.
[0040] All modules, units, components used herein, unless explicitly excluded 10 herein, may be software modules or hardware processors, the processors being a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array 15 circuits (FPGA), any other type of integrated circuits, etc.
[0041] As used herein the transceiver unit includes at least one receiver and at least one transmitter configured respectively for receiving and transmitting data, signals, information, or a combination thereof between units/components within the system and/or connected with the system.
20 [0042] As used herein, a command-line interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with the computer. Command-line interfaces are also called command-line user interfaces, console user interfaces and character user interfaces. CLIs accept as input commands that are entered by keyboard; the commands invoked at
25 the command prompt are then run by the computer.
[0043] As used herein, virtual network functions (VNFs) are virtualized network functions running on standard server hardware in a virtualized environment. This requires an advanced, firmware-defined infrastructure that allows multiple
11

virtual networks to be created on top of shared physical infrastructure. Virtual network functions (VNFs) may then be customized to comply with the needs of applications, services, devices, and customers.
[0044] As used herein, the container network function (CNF) refers to a network 5 function that act as portable container, which include all necessary configurations. CNFs offer increased portability, and scalability compared to traditional network functions.
[0045] As used herein, the container network function component (CNFC) refers to a subcomponent of a container network function (CNF) that performs a specific 10 task or set of tasks within the broader network function. CNFCs are deployed in containers, having same advantages as CNFs, which includes efficient resource management.
[0046] As used herein, virtual networking function component (VNFC) refers to the modular building blocks of Virtualized Network Functions (VNFs). VNFCs 15 represent specific functional components that collectively form a firmware-based network function running on virtualized infrastructure.
[0047] As discussed in the background section, the current known solutions have several shortcomings. The present disclosure aims to overcome the above-mentioned and other existing problems in this field of technology by providing a 20 method and a system for managing network function virtualization (NFV) platform data analytics (NPDA) operations.
[0048] FIG. 1 illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture, in accordance with exemplary implementation of the present disclosure. As shown in FIG. 1, the 5GC network 25 architecture [100] includes a user equipment (UE) [102], a radio access network (RAN) [104], an access and mobility management function (AMF) [106], a Session Management Function (SMF) [108], a Service Communication Proxy (SCP) [110], an Authentication Server Function (AUSF) [112], a Network Slice Specific
12

Authentication and Authorization Function (NSSAAF) [114], a Network Slice Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122], a Unified Data Management (UDM) [124], an application function (AF) [126], a 5 User Plane Function (UPF) [128], a data network (DN) [130], wherein all the components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present disclosure.
[0049] Radio Access Network (RAN) [104] is the part of a mobile telecommunications system that connects user equipment (UE) [102] to the core 10 network (CN) and provides access to different types of networks (e.g., 5G network). It consists of radio base stations and the radio access technologies that enable wireless communication.
[0050] Access and Mobility Management Function (AMF) [106] is a 5G core network function responsible for managing access and mobility aspects, such as UE 15 registration, connection, and reachability. It also handles mobility management procedures like handovers and paging.
[0051] Session Management Function (SMF) [108] is a 5G core network function responsible for managing session-related aspects, such as establishing, modifying, and releasing sessions. It coordinates with the User Plane Function (UPF) for data 20 forwarding and handles IP address allocation and QoS enforcement.
[0052] Service Communication Proxy (SCP) [110] is a network function in the 5G core network that facilitates communication between other network functions by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces.
25 [0053] Authentication Server Function (AUSF) [112] is a network function in the 5G core responsible for authenticating UEs during registration and providing security services. It generates and verifies authentication vectors and tokens.
13

[0054] Network Slice Specific Authentication and Authorization Function (NSSAAF) [114] is a network function that provides authentication and authorization services specific to network slices. It ensures that UEs can access only the slices for which they are authorized.
5 [0055] Network Slice Selection Function (NSSF) [116] is a network function responsible for selecting the appropriate network slice for a UE based on factors such as subscription, requested services, and network policies.
[0056] Network Exposure Function (NEF) [118] is a network function that exposes capabilities and services of the 5G network to external applications, enabling 10 integration with third-party services and applications.
[0057] Network Repository Function (NRF) [120] is a network function that acts as a central repository for information about available network functions and services. It facilitates the discovery and dynamic registration of network functions.
[0058] Policy Control Function (PCF) [122] is a network function responsible for 15 policy control decisions, such as QoS, charging, and access control, based on subscriber information and network policies.
[0059] Unified Data Management (UDM) [124] is a network function that centralizes the management of subscriber data, including authentication, authorization, and subscription information.
20 [0060] Application Function (AF) [126] is a network function that represents external applications interfacing with the 5G core network to access network capabilities and services.
[0061] User Plane Function (UPF) [128] is a network function responsible for handling user data traffic, including packet routing, forwarding, and QoS 25 enforcement.
14

[0062] Data Network (DN) [130] refers to a network that provides data services to user equipment (UE) in a telecommunications system. The data services may include but are not limited to Internet services, private data network related services.
[0063] FIG. 2 illustrates an exemplary block diagram of a computing device [200] 5 (also referred to herein as computer system [200]) upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure. In an implementation, the computing device [200] may also implement a method for managing network function virtualization (NFV) platform data analytics (NPDA) operations utilising the 10 system. In another implementation, the computing device [200] itself implements the method for managing network function virtualization (NFV) platform data analytics (NPDA) operations using one or more units configured within the computing device [200], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
15 [0064] The computing device [200] may include a bus [202] or other communication mechanism for communicating information, and a hardware processor [204] coupled with bus [202] for processing information. The hardware processor [204] may be, for example, a general-purpose microprocessor. The computing device [200] may also include a main memory [206], such as a random-20 access memory (RAM), or other dynamic storage device, coupled to the bus [202] for storing information and instructions to be executed by the processor [204]. The main memory [206] also may be used for storing temporary variables or other intermediate information during execution of the instructions to be executed by the processor [204]. Such instructions, when stored in non-transitory storage media 25 accessible to the processor [204], render the computing device [200] into a special-purpose machine that is customized to perform the operations specified in the instructions. The computing device [200] further includes a read only memory (ROM) [208] or other static storage device coupled to the bus [202] for storing static information and instructions for the processor [204].
15

[0065] A storage device [210], such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to the bus [202] for storing information and instructions. The computing device [200] may be coupled via the bus [1002] to a display [212], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), 5 Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for displaying information to a computer user. An input device [214], including alphanumeric and other keys, touch screen input means, etc. may be coupled to the bus [202] for communicating information and command selections to the processor [204]. Another type of user input device may be a cursor controller [216], such as 10 a mouse, a trackball, or cursor direction keys, for communicating direction information and command selections to the processor [204], and for controlling cursor movement on the display [212]. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
15 [0066] The computing device [200] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware, and/or program logic which in combination with the computing device [200] causes or programs the computing device [200] to be a special-purpose machine. According to one implementation, the techniques herein are performed by the
20 computing device [200] in response to the processor [204] executing one or more sequences of one or more instructions contained in the main memory [206]. Such instructions may be read into the main memory [206] from another storage medium, such as the storage device [210]. Execution of the sequences of instructions contained in the main memory [206] causes the processor [204] to perform the
25 process steps described herein. In alternative implementations of the present disclosure, hard-wired circuitry may be used in place of or in combination with software instructions.
[0067] The computing device [200] also may include a communication interface [218] coupled to the bus [202]. The communication interface [218] provides a two-30 way data communication coupling to a network link [220] that is connected to a
16

local network [222]. For example, the communication interface [218] may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, the communication interface [218] may be a 5 local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, the communication interface [218] sends and receives electrical, electromagnetic, or optical signals that carry digital data streams representing various types of information.
10 [0068] The computing device [200] can send messages and receive data, including program code, through the network(s), the network link [220] and the communication interface [218]. In the Internet example, a server [230] might transmit a requested code for an application program through the Internet [228], the ISP [226], the local network [222], a host [224] and the communication interface
15 [218]. The received code may be executed by the processor [204] as it is received, and/or stored in the storage device [210], or other non-volatile storage for later execution.
[0069] The computing device [200] encompasses a wide range of electronic devices capable of processing data and performing computations. Examples of
20 computing device [200] include, but are not limited only to, personal computers, laptops, tablets, smartphones, servers, and embedded systems. The devices may operate independently or as part of a network and can perform a variety of tasks such as data storage, retrieval, and analysis. Additionally, computing device [200] may include peripheral devices, such as monitors, keyboards, and printers, as well
25 as integrated components within larger electronic systems, showcasing their versatility in various technological applications.
[0070] Referring to FIG. 3, an exemplary block diagram of a system [300] for managing network function virtualization (NFV) platform data analytics (NPDA) operations is shown, in accordance with the exemplary implementations of the
17

present disclosure. The system [300] comprises at least one transceiver unit [302], at least one communication unit [304], at least one processing unit [306], at least one generating unit [308], at least one monitoring unit [310] and at least one displaying unit [312]. Also, all of the components/ units of the system [300] are 5 assumed to be connected to each other unless otherwise indicated below. As shown in the figures all units shown within the system should also be assumed to be connected to each other. Also, in FIG. 3 only a few units are shown, however, the system [300] may comprise multiple such units or the system [300] may comprise any such numbers of said units, as required to implement the features of the present 10 disclosure. Further, in an implementation, the system [300] may reside in a server or a network entity. In yet another implementation, the system [300] may reside partly in the server/ network entity and partly in the user device.
[0071] The system [300] is configured for managing network function virtualization (NFV) platform data analytics (NPDA) operations with the help of 15 the interconnection between the components/units of the system [300].
[0072] The system [300] comprises a transceiver unit [302] configured to receive from a communication unit [304], a request comprising one or more commands associated with one or more network functions, wherein the one or more commands are at least one of a register command, a deregister command and a set of 20 configuration commands. In an exemplary aspect, the one or more commands are received by the transceiver unit [302] from the communication unit [304] via a command line interface (CLI).
[0073] For example, when the transceiver unit [302] receives a register command, it initiates a process to enrol a new network function such as a Virtual Network 25 Function (VNF) or a Container Network Function (CNF) into the system for operation and management. Similarly, a deregister command instructs the system to remove or disable a network function, which could be useful during system maintenance or resource deallocation. The set of configuration commands allow
18

dynamic adjustments to the parameters or settings of a particular network function, such as modifying its performance thresholds, without affecting service continuity.
[0074] In an exemplary aspect, the one or more commands are at least one of a register command for adding a new network function to the system, a deregister 5 command removing a network function from the system and a set of configuration command for including commands to set up or modifying configurations for network functions. For example, the user issues one or more commands through the CLI. These commands may include actions such as registering, deregistering, or configuring network functions. The CLI sends these commands to the 10 communication unit [304] which forwards the commands to the transceiver unit [302]. For example, the user may send a command via a command line interface (CLI), which is then received by the transceiver unit [302], processed, and forwarded to the respective processing units for further actions based on the type of command received.
15 [0075] In an exemplary aspect, the one or more network functions is one of a virtual network functions (VNFs), a container network functions (CNFs), a container network functions component (CNFC), and a Virtual Networking Function Component (VNFC).
[0076] In an exemplary aspect, virtual network functions (VNFs) are virtualized 20 network functions running on standard server hardware in a virtualized environment. This requires an advanced, firmware-defined infrastructure that allows multiple virtual networks to be created on top of shared physical infrastructure. Virtual network functions (VNFs) may then be customized to comply with the needs of applications, services, devices, and customers.
25 [0077] In an exemplary aspect, the container network function (CNF) refers to a network function that act as portable container, which include all necessary configurations. CNFs offer increased portability, and scalability compared to traditional network functions.
19

[0078] In an exemplary aspect, the container network function component (CNFC) refers to a subcomponent of a container network function (CNF) that performs a specific task or set of tasks within the broader network function. CNFCs are deployed in containers, having same advantages as CNFs, which includes efficient 5 resource management.
[0079] In an exemplary aspect, virtual networking function component (VNFC) refers to the modular building blocks of Virtualized Network Functions (VNFs). VNFCs represent specific functional components that collectively form a firmware-based network function running on virtualized infrastructure.
10 [0080] The system [300] comprises a processing unit [306] configured to perform one or more operations on at least one of a set of configuration data, and a set of policy data associated with one or more network functions based on the one or more commands, wherein the one or more operations are at least one of a create operation, a modify operation, a delete operation, a view operation, an AND operation, and an
15 OR operation.
[0081] The processing unit [306] performs one or more operations on at least one of a set of configuration data, and a set of policy data associated with one or more network functions based on the one or more commands. The one or more operations are at least one of a create operation which adds new configuration or policy data, 20 a modify operation which updates existing configuration or policy data, a delete operation which removes configuration or policy data, a view operation which retrieves and displays configuration or policy data, AND operation which performs logical AND operations on data and the OR operation which performs logical OR operations on data.
25 [0082] For example, upon receiving a create operation command, the processing unit [306] may initiate the creation of new configuration data, such as defining performance thresholds for a Virtual Network Function (VNF) or setting policies for a Container Network Function (CNF). Similarly, a modify operation command allows the processing unit [306] to adjust existing configuration or policy data, such
20

as updating restoration policies or hysteresis thresholds based on real-time network conditions. The delete operation enables the removal of specific configuration or policy data, for instance, deregistering a function that is no longer required. The view operation allows the processing unit [306] to retrieve and display existing 5 configuration or policy data, which may include the current status of a VNF or CNF in the system. Additionally, the AND operation and OR operation facilitate complex logical operations, where the processing unit [306] can evaluate multiple conditions simultaneously. For example, the processing unit [306] may execute an AND operation to ensure that a network function meets both security and 10 performance policies before allowing it to scale. Alternatively, an OR operation may be employed to assess if either of two conditions is met, such as whether either fault management or performance management triggers require an action.
[0083] The system [300] comprises a generating unit [308] configured to generate dynamically at the NPDA, a response associated with the one or more network
15 functions based on the one or more operations. The response associated with one or more network functions based on the one or more operations is generated dynamically by the generating unit [308] in a predefined format. The term dynamic refers to the system's ability to generate responses or perform operations in real time, adapting immediately to the current state or outcome of the processes being
20 executed. Unlike static systems, where responses or operations might be pre¬defined and inflexible, dynamic systems generate results based on the actual conditions and inputs at the time of execution. For example, in the NPDA architecture, when a command is issued to modify or register a network function, the system does not rely on pre-configured responses. Instead, the generating unit
25 [308] dynamically creates a response based on the specific operation's result, taking into account any monitored data, system status, or execution success.
[0084] For example, when the processing unit [306] completes a create operation
for a new configuration or policy data associated with a Virtual Network Function
(VNF), the generating unit [308] dynamically generates a response indicating the
30 successful creation of the configuration. This response may include details such as
21

the new configuration's parameters, timestamps, and the associated network function. Similarly, in the case of a modify operation, the generating unit [308] generates a response that may specify the updated parameters, confirming the successful modification of the policy or configuration data. The response can also 5 provide error messages or alerts if the modification fails or if any inconsistencies are detected in the policy rules. When performing delete operations, the generating unit [308] dynamically creates a response confirming the removal of the configuration or policy data from the NPDA platform. Additionally, in scenarios where logical operations such as AND operations or OR operations are executed by 10 the processing unit [306], the generating unit [308] generates a detailed response reflecting the outcome of these operations, ensuring the system's conditions are met before proceeding with further actions.
[0085] The generating unit [308] dynamically generates the response associated with the one or more network functions based on the one or more operations at the 15 NPDA. The dynamic generation of the responses means responses are created in real-time. This ensures that the feedback is current and reflects the immediate result of the actions taken.
[0086] In an exemplary aspect, the responses are formatted according to the predefined format. The predefined format may include such as but not limited to 20 tables, charts, graphs etc. This standard predefined format ensures consistency and predictability in how the information is presented, making it easier for users to interpret.
[0087] In an exemplary aspect, the response is then sent back to the CLI, providing feedback about the success or failure of the operations, status updates, or other 25 relevant information.
[0088] The system [300] further comprises monitoring unit [310] configured to monitor at least fault, configuration, accounting, performance, and security (FCAPS) data of the NPDA during the performance of the one or more operations. For example, while the processing unit [306] executes operations such as modifying
22

configuration data for a Virtual Network Function (VNF), the monitoring unit [310] continuously tracks FCAPS data, such as fault alerts, network configuration changes, resource usage (accounting), performance metrics (e.g., throughput or latency), and any potential security breaches. For example, if the monitoring unit 5 [310] detects that a network function's performance is dropping below predefined thresholds, it can trigger actions to adjust the configuration in real-time to mitigate the issue.
[0089] The monitoring unit [310] monitors at least fault which is information about errors or failures, configuration which is information about current setup or 10 configuration details of the network functions, accounting which is information about records related to usage and billing, performance which is information about performance metrics related to the efficiency and effectiveness of network functions that may be in the form of key performance indicators (KPIs), and security which is information related to security measures and potential threats.
15 [0090] In an exemplary aspect, the processing unit [306] is further configured to allow one or more configuration changes at runtime based on the monitored FCAPS data. For example, if the monitoring unit [310] identifies a fault in a VNF's configuration or a security risk, the processing unit [306] can modify the network function's configuration parameters dynamically to address the issue without
20 service interruption.
[0091] The processing unit [306] uses the data collected by the monitoring unit [310] to make informed decisions. Based on the insights gained from the monitored FCAPS data by the monitoring unit [310], the processing unit [306] may allow modifications to configurations runtime. This means changes can be made without 25 stopping or disrupting ongoing operations, which enhances flexibility and responsiveness.
[0092] The system [300] further comprises a displaying unit [312] configured to display at the communication unit [304], the response associated with the request based on the one or more operations. For example, after the processing unit [306]
23

completes an operation, such as modifying the configuration of a Virtual Network Function (VNF), and the generating unit [308] dynamically generates a response, the displaying unit [312] presents the response to the user via the communication unit, which could be a command-line interface (CLI) or a graphical user interface 5 (GUI). The response may include information such as the success or failure of the operation, detailed logs of changes made to configuration or policy data, and any associated alerts or error messages. For instance, if the user performs a delete operation on a policy, the displaying unit [312] will show confirmation of the deletion along with a summary of the impacted configuration. In the case of more 10 complex operations involving logical conditions, like AND or OR operations, the displaying unit [312] can visually represent the results of those operations.
[0093] The displaying unit [312] displays at the communication unit [304], the response associated with the request based on the one or more operations. Once the response has been generated by the generating unit [308] based on the operations
15 performed (such as creating, modifying, or viewing configurations), the displaying unit [312] takes this response and shows it to the user. The response may include various information, such as status updates, results of operations, or data about network functions. In an exemplary aspect, the displaying unit [312] takes this response and presents it on the CLI interface or console. The user sees a message
20 like "Configuration updated successfully" or "Error: Invalid configuration," depending on the outcome.
[0094] Referring to FIG. 4, an exemplary method flow diagram [400] for managing network function virtualization (NFV) platform data analytics (NPDA) operations, in accordance with exemplary implementations of the present disclosure is shown. 25 In an implementation the method [400] is performed by the system [300]. Further, in an implementation, the system [300] may be present in a server device to implement the features of the present disclosure. Also, as shown in FIG. 4, the method [400] starts at step [402].
24

[0095] At step 404, the method [400] comprises receiving, by a transceiver unit [302] from a communication unit [304], a request comprising one or more commands associated with one or more network functions, wherein the one or more commands are at least one of a register command, a deregister command and a set 5 of configuration command. . In an exemplary aspect, the one or more commands are received by the transceiver unit [302] from the communication unit [304] via a command line interface (CLI).
[0096] For example, when the transceiver unit [302] receives a register command, it initiates a process to enrol a new network function such as a Virtual Network
10 Function (VNF) or a Container Network Function (CNF) into the system for operation and management. Similarly, a deregister command instructs the system to remove or disable a network function, which could be useful during system maintenance or resource deallocation. The set of configuration commands allow dynamic adjustments to the parameters or settings of a particular network function,
15 such as modifying its performance thresholds, without affecting service continuity.
[0097] In an exemplary aspect, the one or more commands are at least one of a register command for adding a new network function to the system, a deregister command removing a network function from the system and a set of configuration command for including commands to set up or modifying configurations for
20 network functions. For example, the user issues one or more commands through the CLI. These commands may include actions such as registering, deregistering, or configuring network functions. The CLI sends these commands to the communication unit [304] which forwards the commands to the transceiver unit [302]. For example, the user may send a command via a command line interface
25 (CLI), which is then received by the transceiver unit [302], processed, and forwarded to the respective processing units for further actions based on the type of command received.
[0098] In an exemplary aspect, the one or more network functions is one of a virtual network functions (VNFs), a container network functions (CNFs), a container
25

network functions component (CNFC), and a Virtual Networking Function Component (VNFC).
[0099] In an exemplary aspect, virtual network functions (VNFs) are virtualized network functions running on standard server hardware in a virtualized 5 environment. This requires an advanced, firmware-defined infrastructure that allows multiple virtual networks to be created on top of shared physical infrastructure. Virtual network functions (VNFs) may then be customized to comply with the needs of applications, services, devices, and customers.
[0100] In an exemplary aspect, the container network function (CNF) refers to a 10 network function that act as portable container, which include all necessary configurations. CNFs offer increased portability, and scalability compared to traditional network functions.
[0101] In an exemplary aspect, the container network function component (CNFC) refers to a subcomponent of a container network function (CNF) that performs a 15 specific task or set of tasks within the broader network function. CNFCs are deployed in containers, having same advantages as CNFs, which includes efficient resource management.
[0102] In an exemplary aspect, virtual networking function component (VNFC) refers to the modular building blocks of Virtualized Network Functions (VNFs). 20 VNFCs represent specific functional components that collectively form a firmware-based network function running on virtualized infrastructure.
[0103] At step 406, the method [400] comprises performing, by a processing unit [306], one or more operations on at least one of a set of configuration data, and a set of policy data associated with one or more network functions based on the one 25 or more commands, wherein the one or more operations are at least one of a create operation, a modify operation, a delete operation, a view operation, an AND operation, and an OR operation.
26

[0104] The processing unit [306] performs one or more operations on at least one of a set of configuration data, and a set of policy data associated with one or more network functions based on the one or more commands. The one or more operations are at least one of a create operation which adds new configuration or policy data, 5 a modify operation which updates existing configuration or policy data, a delete operation which removes configuration or policy data, a view operation which retrieves and displays configuration or policy data, AND operation which performs logical AND operations on data and the OR operation which performs logical OR operations on data.
10 [0105] For example, upon receiving a create operation command, the processing unit [306] may initiate the creation of new configuration data, such as defining performance thresholds for a Virtual Network Function (VNF) or setting policies for a Container Network Function (CNF). Similarly, a modify operation command allows the processing unit [306] to adjust existing configuration or policy data, such
15 as updating restoration policies or hysteresis thresholds based on real-time network conditions. The delete operation enables the removal of specific configuration or policy data, for instance, deregistering a function that is no longer required. The view operation allows the processing unit [306] to retrieve and display existing configuration or policy data, which may include the current status of a VNF or CNF
20 in the system. Additionally, the AND operation and OR operation facilitate complex logical operations, where the processing unit [306] can evaluate multiple conditions simultaneously. For example, the processing unit [306] may execute an AND operation to ensure that a network function meets both security and performance policies before allowing it to scale. Alternatively, an OR operation
25 may be employed to assess if either of two conditions is met, such as whether either fault management or performance management triggers require an action.
[0106] The method [400] further comprises monitoring, by a monitoring unit [310],
at least fault, configuration, accounting, performance, and security (FCAPS) data
of the NPDA during the performance of the one or more operations. For example,
30 while the processing unit [306] executes operations such as modifying
27

configuration data for a Virtual Network Function (VNF), the monitoring unit [310] continuously tracks FCAPS data, such as fault alerts, network configuration changes, resource usage (accounting), performance metrics (e.g., throughput or latency), and any potential security breaches. For example, if the monitoring unit 5 [310] detects that a network function's performance is dropping below predefined thresholds, it can trigger actions to adjust the configuration in real-time to mitigate the issue.
[0107] The monitoring unit [310] monitors at least fault which is information about errors or failures, configuration which is information about current setup or 10 configuration details of the network functions, accounting which is information about records related to usage and billing, performance which is information about performance metrics related to the efficiency and effectiveness of network functions that may be in the form of key performance indicators (KPIs), and security which is information related to security measures and potential threats.
15 [0108] In an exemplary aspect, the processing unit [306] is further configured to allow one or more configuration changes at runtime based on the monitored FCAPS data. For example, if the monitoring unit [310] identifies a fault in a VNF's configuration or a security risk, the processing unit [306] can modify the network function's configuration parameters dynamically to address the issue without
20 service interruption.
[0109] The processing unit [306] uses the data collected by the monitoring unit [310] to make informed decisions. Based on the insights gained from the monitored FCAPS data by the monitoring unit [310], the processing unit [306] may allow modifications to configurations runtime. This means changes can be made without 25 stopping or disrupting ongoing operations, which enhances flexibility and responsiveness.
[0110] At step 408, the method [400] comprises generating dynamically, by a generating unit [308] at the NPDA, a response associated with the one or more network functions based on the one or more operations. For example, when the
28

processing unit [306] completes a create operation for a new configuration or policy data associated with a Virtual Network Function (VNF), the generating unit [308] dynamically generates a response indicating the successful creation of the configuration. This response may include details such as the new configuration's 5 parameters, timestamps, and the associated network function. Similarly, in the case of a modify operation, the generating unit [308] generates a response that may specify the updated parameters, confirming the successful modification of the policy or configuration data. The response can also provide error messages or alerts if the modification fails or if any inconsistencies are detected in the policy rules.
10 When performing delete operations, the generating unit [308] dynamically creates a response confirming the removal of the configuration or policy data from the NPDA platform. Additionally, in scenarios where logical operations such as AND operations or OR operations are executed by the processing unit [306], the generating unit [308] generates a detailed response reflecting the outcome of these
15 operations, ensuring the system's conditions are met before proceeding with further actions.
[0111] The generating unit [308] dynamically generates the response associated with the one or more network functions based on the one or more operations at the NPDA. The dynamic generation of the responses means responses are created in 20 real-time. This ensures that the feedback is current and reflects the immediate result of the actions taken.
[0112] In an exemplary aspect, the responses are formatted according to the predefined format. The predefined format may include such as but not limited to tables, charts, graphs etc. This standard predefined format ensures consistency and 25 predictability in how the information is presented, making it easier for users to interpret.
[0113] In an exemplary aspect, the response is then sent back to the CLI, providing feedback about the success or failure of the operations, status updates, or other relevant information.
29

[0114] The method [400] further comprises displaying, by a displaying unit [312] at the communication unit [304], the response associated with the request based on the one or more operations. For example, after the processing unit [306] completes an operation, such as modifying the configuration of a Virtual Network Function 5 (VNF), and the generating unit [308] dynamically generates a response, the displaying unit [312] presents the response to the user via the communication unit, which could be a command-line interface (CLI) or a graphical user interface (GUI). The response may include information such as the success or failure of the operation, detailed logs of changes made to configuration or policy data, and any 10 associated alerts or error messages. For instance, if the user performs a delete operation on a policy, the displaying unit [312] will show confirmation of the deletion along with a summary of the impacted configuration. In the case of more complex operations involving logical conditions, like AND or OR operations, the displaying unit [312] can visually represent the results of those operations.
15 [0115] The displaying unit [312] displays at the communication unit [304], the response associated with the request based on the one or more operations. Once the response has been generated by the generating unit [308] based on the operations performed (such as creating, modifying, or viewing configurations), the displaying unit [312] takes this response and shows it to the user. The response may include
20 various information, such as status updates, results of operations, or data about network functions. In an exemplary aspect, the displaying unit [312] takes this response and presents it on the CLI interface or console. The user sees a message like "Configuration updated successfully" or "Error: Invalid configuration," depending on the outcome.
25 [0116] Referring to FIG. 5, an exemplary block diagram of a system architecture [500] for managing network function virtualization (NFV) platform data analytics (NPDA) operations is shown, in accordance with the exemplary implementations of the present disclosure. The system architecture [500] comprises at least one command line interface [502], at least one NPDA [504], and at least one database
30 [506].
30

[0117] The CLI [502] sends create/update events request to the NPDA [504] (also referred to herein as NPDA [504]) through a communication unit [304]. The NPDA [504] retrieves data from the database [506].
[0118] In an exemplary aspect, the transceiver unit [302] receives the request which 5 comprises one or more commands associated with one or more network functions from a communication unit [304]. The communication unit [304] acts as the bridge that transmits commands from the Command Line Interface (CLI) to the transceiver unit [302].
[0119] In an exemplary aspect, the one or more commands are at least one of a 10 register command for adding a new network function to the system, a deregister command removing a network function from the system and a set of configuration command for including commands to set up or modifying configurations for network functions.
[0120] For example, the user issues one or more commands through the CLI. These 15 commands may include actions such as registering, deregistering, or configuring network functions. The CLI sends these commands to the communication unit [304] which forwards the commands to the transceiver unit [302].
[0121] The CLI [502] sends query events again to check async event-based implementation to utilize interface efficiently. The CLI [502] requests fault
20 tolerance for any event failure, configuration, accounting, performance, and security (FCAPS) data. The NPDA [504] works in a high availability mode and if one NPDA [504] instance went down during request processing then the next available instance will take care of this request. In an exemplary aspect, the monitoring unit [310] monitors at least fault which is information about errors or
25 failures, configuration which is information about current setup or configuration details of the network functions, accounting which is information about records related to usage and billing, performance which is information about performance metrics related to the efficiency and effectiveness of network functions that may be
31

in the form of key performance indicators (KPIs), and security which is information related to security measures and potential threats.
[0122] An async event-based implementation is a technique where operations are executed asynchronously, meaning tasks are initiated without blocking the system 5 while waiting for them to complete. Instead of halting system functionality, operations run in the background, and once the required data is processed or an event is completed, an event handler triggers the appropriate response. The NPDA system can handle tasks like registering or deregistering network functions, and adjusting configurations efficiently, without delays. The technique enhances system
10 responsiveness, scalability, and fault tolerance, ensuring continuous service availability. In cases where an NPDA instance fails during request processing, another instance seamlessly takes over, providing high availability and allowing uninterrupted execution of commands. This approach simplifies complex workflows by handling operations in a non-blocking, dynamic manner,
15 significantly improving system performance and reliability.
[0123] The CLI [502] receives a response from the NPDA [504]. In an exemplary aspect, the generating unit [308] dynamically generates the response associated with the one or more network functions based on the one or more operations at the NPDA [504]. The dynamic generation of the responses means responses are created 20 in real-time. This ensures that the feedback is current and reflects the immediate result of the actions taken.
[0124] In an exemplary aspect, database [506] stores generated responses with the one or more network functions based on the one or more operations at the NPDA [504].
25 [0125] Referring to FIG. 6, an exemplary process [600] flow diagram for managing network function virtualization (NFV) platform data analytics (NPDA) operations, in accordance with exemplary implementations of the present disclosure is shown.
32

[0126] At step 602, the process [600] comprises sending, from the CLI [502], an event request to the NPDA [504]. In an exemplary aspect, the transceiver unit [302] receives the request which comprises one or more commands associated with one or more network functions from a communication unit [304]. The communication 5 unit [304] acts as the bridge that transmits commands from the Command Line Interface (CLI) [502] to the transceiver unit [302].
[0127] In an exemplary aspect, the one or more commands are at least one of a register command for adding a new network function to the system, a deregister command removing a network function from the system and a set of configuration 10 command for including commands to set up or modifying configurations for network functions.
[0128] For example, the user issues one or more commands through the CLI. These commands may include actions such as registering, deregistering, or configuring network functions. The CLI sends these commands to the communication unit [304] 15 which forwards the commands to the transceiver unit [302].
[0129] At step 604, the process [600] comprises receiving, at the CLI [502], an event response to the NPDA [504]. In an exemplary aspect, the generating unit [308] dynamically generates the response associated with the one or more network functions based on the one or more operations at the NPDA [504]. The dynamic 20 generation of the responses means responses are created in real-time. This ensures that the feedback is current and reflects the immediate result of the actions taken.
[0130] In an exemplary aspect, the responses are formatted according to the predefined format. The predefined format may include such as but not limited to tables, charts, graphs etc. This standard predefined format ensures consistency and 25 predictability in how the information is presented, making it easier for users to interpret.
33

[0131] In an exemplary aspect, the response is then sent back to the CLI [502], providing feedback about the success or failure of the operations, status updates, or other relevant information.
[0132] At step 606, the process [600] comprises the storing, at the database [508], 5 generated response with the one or more network functions based on the one or more operations at the NPDA [504]. In an exemplary aspect, the generating unit [308] dynamically generates the response associated with the one or more network functions based on the one or more operations at the NPDA [504]. The dynamic generation of the responses means responses are created in real-time. This ensures 10 that the feedback is current and reflects the immediate result of the actions taken.
[0133] At step 608, the process [600] comprises receiving, at the south bound system [600b], generated response with the one or more network functions based on the one or more operations at the NPDA [504]. In an exemplary, southbound system [600b] to the communication protocols, such as OpenFlow, that establish a 15 standard interface between the controller and forwarding devices in software-defined networking (SDN).
[0134] Referring to FIG. 7, an exemplary NPDA_CL interface [700] for managing network function virtualization (NFV) platform data analytics (NPDA) operations, in accordance with exemplary implementations of the present disclosure is shown.
20 [0135] The CLI [502] receives a response from the NPDA [504] via the NDPA_CL interface [702]. In an embodiment, the CLI [502] sends a request to the NPDA [504] via the NDPA_CL interface [702]. In an exemplary aspect, the generating unit [308] dynamically generates the response associated with the one or more network functions based on the one or more operations at the NPDA [504]. The dynamic
25 generation of the responses means responses are created in real-time. This ensures that the feedback is current and reflects the immediate result of the actions taken.
[0136] In an exemplary aspect, the responses are formatted according to the predefined format. The predefined format may include such as but not limited to
34

JSON format, XML format etc. The predefined format may include such as but not limited to tables, charts, graphs etc. This standard predefined format ensures consistency and predictability in how the information is presented, making it easier for users to interpret.
[0137] In an exemplary aspect, the response is then sent back to the CLI [502], providing feedback about the success or failure of the operations, status updates, or other relevant information.
[0138] The present disclosure further discloses a non-transitory computer readable storage medium storing instructions for managing network function virtualization (NFV) platform data analytics (NPDA) operations, the instructions include executable code which, when executed by one or more units of a system, causes a transceiver unit [302] to receive from a communication unit [304], a request comprising one or more commands associated with one or more network functions, wherein the one or more commands are at least one of a register command, a deregister command and a set of configuration command. The executable code when executed further causes a processing unit [306] to perform one or more operations on at least one of a set of configuration data, and a set of policy data associated with one or more network functions based on the one or more commands, wherein the one or more operations are at least one of a create operation, a modify operation, a delete operation, a view operation, an AND operation, and an OR operation. The executable code when executed further causes a generating unit [308] to generate dynamically at the NPDA, a response associated with the one or more network functions based on the one or more operations.
[0139] As is evident from the above, the present disclosure provides a technically advanced solution for managing network function virtualization (NFV) platform data analytics (NPDA) operations. The present solution for seamless operations is necessary to monitor fault, configuration, accounting, performance, and security (FCAPS) of NPDA and allow configuration changes that require changing at runtime using NPDA_CL.

[0140] Further, in accordance with the present disclosure, it is to be acknowledged that the functionality described for the various the components/units can be implemented interchangeably. While specific embodiments may disclose a particular functionality of these units for clarity, it is recognized that various configurations and combinations thereof are within the scope of the disclosure. The functionality of specific units as disclosed in the disclosure should not be construed as limiting the scope of the present disclosure. Consequently, alternative arrangements and substitutions of units, provided they achieve the intended functionality described herein, are considered to be encompassed within the scope of the present disclosure.
[0141] While considerable emphasis has been placed herein on the disclosed implementations, it will be appreciated that many implementations can be made and that many changes can be made to the implementations without departing from the principles of the present disclosure. These and other changes in the implementations of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.

We Claim:
1. A method for managing network function virtualization (NFV) platform data
analytics (NPDA) operations, the method comprising:
- receiving, by a transceiver unit [302] from a communication unit [304], a request comprising one or more commands associated with one or more network functions, wherein the one or more commands are at least one of a register command, a deregister command and a set of configuration command;
- performing, by a processing unit [306], one or more operations on at least one of a set of configuration data, and a set of policy data associated with one or more network functions based on the one or more commands, wherein the one or more operations are at least one of a create operation, a modify operation, a delete operation, a view operation, an AND operation, and an OR operation; and
- generating dynamically, by a generating unit [308] at the NPDA, a response associated with the one or more network functions based on the one or more operations.
2. The method as claimed in claim 1, wherein the method comprises:
- monitoring, by a monitoring unit [310], at least fault, configuration, accounting, performance, and security (FCAPS) data of the NPDA during the performance of the one or more operations; and
- allowing, by the processing unit [306], one or more configuration changes at runtime based on the monitored FCAPS data.

3. The method as claimed in claim 1, wherein the one or more commands are received, by the transceiver unit [302] from the communication unit, via a command line interface (CLI).
4. The method as claimed in claim 1, wherein the one or more network functions is one of a Virtual network function (VNFs), a container network functions

(CNFs), a container network function component (CNFC), and a Virtual Networking Function Component (VNFC).
5. The method as claimed in claim 1, wherein the response associated with the one or more network functions based on the one or more operations is generated dynamically by the generating unit in a predefined format.
6. The method as claimed in claim 1, wherein the method further comprises displaying, by a displaying unit [312] at the communication unit [304], the response associated with the request based on the one or more operations.
7. A system for managing network function virtualization (NFV) platform data analytics (NPDA) and a command line interface (CLI), the system comprises:

- a transceiver unit [302] configured to receive from a communication unit [304], a request comprising one or more commands associated with one or more network functions, wherein the one or more commands are at least one of a register command, a deregister command and a set of configuration command;
- a processing unit [306] configured to perform one or more operations on at least one of a set of configuration data, and a set of policy data associated with one or more network functions based on the one or more commands, wherein the one or more operations are at least one of a create operation, a modify operation, a delete operation, a view operation, an AND operation, and an OR operation; and
- a generating unit [308] configured to generate dynamically at the NPDA, a response associated with the one or more network functions based on the one or more operations.
8. The system as claimed in claim 7, wherein the system [300] further comprises:

- a monitoring unit [310] configured to monitor at least fault, configuration, accounting, performance, and security (FCAPS) data of the NPDA during the performance of the one or more operations; and
- the processing unit [306] further configured to allow one or more configuration changes at runtime based on the monitored FCAPS data.

9. The system as claimed in claim 7, wherein the one or more commands are received by the transceiver unit [302] from the communication unit via a command line interface (CLI).
10. The system as claimed in claim 7, wherein the one or more network functions is one of a Virtual network functions (VNFs), a container network functions (CNFs), a container network function component (CNFC), and a Virtual Networking Function Component (VNFC).
11. The system as claimed in claim 7, wherein the response associated with one or more network functions based on the one or more operations is generated dynamically by the processing unit in a predefined format.
12. The system as claimed in claim 7, wherein the system further comprises a displaying unit [312] configured to display at the communication unit [304], the response associated with the request based on the one or more operations.

Documents

Application Documents

# Name Date
1 202321061987-STATEMENT OF UNDERTAKING (FORM 3) [14-09-2023(online)].pdf 2023-09-14
2 202321061987-PROVISIONAL SPECIFICATION [14-09-2023(online)].pdf 2023-09-14
3 202321061987-POWER OF AUTHORITY [14-09-2023(online)].pdf 2023-09-14
4 202321061987-FORM 1 [14-09-2023(online)].pdf 2023-09-14
5 202321061987-FIGURE OF ABSTRACT [14-09-2023(online)].pdf 2023-09-14
6 202321061987-DRAWINGS [14-09-2023(online)].pdf 2023-09-14
7 202321061987-Proof of Right [11-01-2024(online)].pdf 2024-01-11
8 202321061987-FORM-5 [12-09-2024(online)].pdf 2024-09-12
9 202321061987-ENDORSEMENT BY INVENTORS [12-09-2024(online)].pdf 2024-09-12
10 202321061987-DRAWING [12-09-2024(online)].pdf 2024-09-12
11 202321061987-CORRESPONDENCE-OTHERS [12-09-2024(online)].pdf 2024-09-12
12 202321061987-COMPLETE SPECIFICATION [12-09-2024(online)].pdf 2024-09-12
13 202321061987-Request Letter-Correspondence [20-09-2024(online)].pdf 2024-09-20
14 202321061987-Power of Attorney [20-09-2024(online)].pdf 2024-09-20
15 202321061987-Form 1 (Submitted on date of filing) [20-09-2024(online)].pdf 2024-09-20
16 202321061987-Covering Letter [20-09-2024(online)].pdf 2024-09-20
17 202321061987-CERTIFIED COPIES TRANSMISSION TO IB [20-09-2024(online)].pdf 2024-09-20
18 202321061987-FORM 3 [07-10-2024(online)].pdf 2024-10-07
19 Abstract 1.jpg 2024-10-08
20 202321061987-ORIGINAL UR 6(1A) FORM 1 & 26-311224.pdf 2025-01-04