Sign In to Follow Application
View All Documents & Correspondence

Method And System For Automatically Upgrading A Target Network Cluster

Abstract: The present disclosure relates to a method and a system for automatically upgrading a target network cluster. The method comprises accessing, by a processing unit [302], a first container from a first set of containers associated with one or more network clusters. The method comprises initiating an upgrade procedure associated with the first container. The method comprises generating, by a generation unit [304], a modified set of container data in the first container based on the initiated upgrade procedure. The method comprises duplicating at the first container, the modified set of container data from the first container. The method comprises identifying, by an identification unit [306], the target network cluster from the one or more network clusters based on the upgrade procedure. The method comprises automatically upgrading the target network cluster by applying the duplicated modified container data to a second set of containers associated with the target network cluster. [FIG. 4]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
14 September 2023
Publication Number
12/2025
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Jio Platforms Limited
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Inventors

1. Aayush Bhatnagar
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
2. Birendra Singh Bisht
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
3. Harbinder Pal Singh
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
4. Nitin Warape
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
5. Monish Rode
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
6. Ankit M
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
7. Mayur Rane
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.

Specification

FORM 2
THE PATENTS ACT, 1970
(39 OF 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR AUTOMATICALLY UPGRADING A TARGET NETWORK CLUSTER”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is to be performed.

METHOD AND SYSTEM FOR AUTOMATICALLY UPGRADING A TARGET NETWORK CLUSTER
FIELD OF INVENTION
[0001] Embodiments of the present disclosure generally relate to network performance management systems. More particularly, embodiments of the present disclosure relate to automatically upgrading a target network cluster.
BACKGROUND
[0002] The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art.
[0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless

communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
[0004] The standard method for Network Function (NF) upgrade requires re-spawning of respective containers with updated image. Upgrading of NF Cluster from North bound Monitoring System (NMS) like nodes /Orchestrator Node, where these nodes co-ordinates firmware upgrade procedures and management, requires finite time to complete as per the count of containers and size of container image. Also, it adds burden to maintain container non-volume specific data inside container which is required to be preserved till container is deleted. This data is available in the container till the release of the lifecycle of NF. Furthermore, the current upgrade system needs to execute upgrade procedures on all nodes of cluster where cluster details are available at the node which is initiating upgrade process. Further, the current upgrade system is a manual procedure for upgrading network functions.
[0005] Thus, there exists an imperative need in the art to upgrade automatically all the containers in the set of containers of a cluster based on updating a single container, which the present disclosure aims to address.
SUMMARY
[0006] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0007] An aspect of the present disclosure may relate to a method for automatically upgrading a target network cluster. The method comprises accessing, by a processing unit, a first container from a first set of containers associated with one or more network clusters. The first container comprises a first set of container data.

The method further comprises initiating, by the processing unit, an upgrade procedure associated with the first container. Hereinafter, the method comprises generating, by a generation unit, a modified set of container data in the first container based on the initiated upgrade procedure. Further, the method comprises duplicating, by the processing unit at the first container, the modified set of container data from the first container. Furthermore, the method comprises identifying, by an identification unit, the target network cluster from the one or more network clusters based on the initiated upgrade procedure. Further, the method comprises automatically upgrading, by the processing unit, the target network cluster by applying the duplicated modified container data to a second set of containers associated with the target network cluster.
[0008] In an exemplary aspect of the present disclosure, the upgrade procedure is initiated by the processing unit based on a set of predefined upgrade commands.
[0009] In an exemplary aspect of the present disclosure, the set of predefined upgrade commands is executed by the processing unit in a predefined manner over a target connection mode. The target mode is at least one of an online connection mode and an offline connection mode.
[0010] In an exemplary aspect of the present disclosure, the target network cluster is identified by the identification unit based on at least one of metadata, configuration information, and network attributes within the first container.
[0011] Another aspect of the present disclosure may relate to a system for automatically upgrading a target network cluster. The system comprises at least a processing unit. The processing unit is configured to access a first container from a first set of containers associated with one or more network clusters. The first container comprises a first set of container data. The processing unit is further configured to initiate an upgrade procedure associated with the first container. The system further comprises a generation unit connected to at least the processing unit.

The generation unit is configured to generate a modified set of container data in the first container based on the initiated upgrade procedure. The processing unit is further configured to duplicate, at the first container, the modified set of container data from the first container. The system further comprises an identification unit connected to at least the generation unit. The identification unit is configured to identify the target network cluster from the one or more network clusters based on the initiated upgrade procedure. The processing unit is further configured to automatically upgrade the target network cluster by applying the duplicated modified container data to a second set of containers associated with the target network cluster.
[0012] Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instructions for automatically upgrading a target network cluster, the instructions include executable code which, when executed by one or more units of a system cause a processing unit, of the system, to access a first container from a first set of containers associated with one or more network clusters. The first container comprises a first set of container data. The instructions when executed by the system further causes the processing unit to initiate an upgrade procedure associated with the first container. The instructions when executed by the system further cause a generation unit, of the system, to generate a modified set of container data in the first container based on the initiated upgrade procedure. The instructions when executed by the system further cause the processing unit to duplicate, at the first container, the modified set of container data from the first container. The instructions when executed by the system further cause an identification unit of the system, to identify the target network cluster from the one or more network clusters based on the initiated upgrade procedure. The instructions when executed by the system further cause the processing unit to automatically upgrade the target network cluster by applying the duplicated modified container data to a second set of containers associated with the target network cluster.

OBJECTS OF THE INVENTION
[0013] Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below.
[0014] It is an object of the present disclosure to provide a system and a method for upgrading automatically all the containers in the set of containers of a cluster based on updating a single container.
[0015] It is another object of the present disclosure to provide a solution that automates the upgradation of all the containers into a single cluster.
[0016] It is yet another object of the present disclosure to provide a solution that reduces upgradation time of the containers in a cluster.
DESCRIPTION OF THE DRAWINGS
[0017] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Also, the embodiments shown in the figures are not to be construed as limiting the disclosure, but the possible variants of the method and system according to the disclosure are illustrated herein to highlight the advantages of the disclosure. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components or circuitry commonly used to implement such components.
[0018] FIG. 1 illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture.

[0019] FIG. 2 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure. 5
[0020] FIG. 3 illustrates an exemplary block diagram of a system for automatically upgrading a target network cluster, in accordance with exemplary implementations of the present disclosure.
10 [0021] FIG. 4 illustrates a method flow diagram for automatically upgrading a
target network cluster, in accordance with exemplary implementations of the present disclosure.
[0022] The foregoing shall be more apparent from the following more detailed
15 description of the disclosure.
DETAILED DESCRIPTION
[0023] In the following description, for the purposes of explanation, various
20 specific details are set forth in order to provide a thorough understanding of
embodiments of the present disclosure. It will be apparent, however, that
embodiments of the present disclosure may be practiced without these specific
details. Several features described hereafter may each be used independently of one
another or with any combination of other features. An individual feature may not
25 address any of the problems discussed above or might address only some of the
problems discussed above.
[0024] The ensuing description provides exemplary embodiments only, and is not
intended to limit the scope, applicability, or configuration of the disclosure. Rather,
30 the ensuing description of the exemplary embodiments will provide those skilled in
the art with an enabling description for implementing an exemplary embodiment.
7

It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
5 [0025] Specific details are given in the following description to provide a thorough
understanding of the embodiments. However, it will be understood by one of
ordinary skill in the art that the embodiments may be practiced without these
specific details. For example, circuits, systems, processes, and other components
may be shown as components in block diagram form in order not to obscure the
10 embodiments in unnecessary detail.
[0026] Also, it is noted that individual embodiments may be described as a process
which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure
diagram, or a block diagram. Although a flowchart may describe the operations as
15 a sequential process, many of the operations may be performed in parallel or
concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure.
20 [0027] The word “exemplary” and/or “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or
25 designs, nor is it meant to preclude equivalent exemplary structures and techniques
known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive—in a manner similar to the term “comprising” as an open transition word—without precluding
30 any additional or other elements.
8

[0028] As used herein, a “processing unit” or “processor” or “operating processor”
includes one or more processors, wherein processor refers to any logic circuitry for
processing instructions. A processor may be a general-purpose processor, a special
purpose processor, a conventional processor, a digital signal processor, a plurality
5 of microprocessors, one or more microprocessors in association with a (Digital
Signal Processing) DSP core, a controller, a microcontroller, Application Specific
Integrated Circuits, Field Programmable Gate Array circuits, any other type of
integrated circuits, etc. The processor may perform signal coding data processing,
input/output processing, and/or any other functionality that enables the working of
10 the system according to the present disclosure. More specifically, the processor or
processing unit is a hardware processor.
[0029] As used herein, “a user equipment”, “a user device”, “a smart-user-device”, “a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”,
15 “a wireless communication device”, “a mobile communication device”, “a
communication device” may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure. The user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant,
20 tablet computer, wearable device or any other computing device which is capable
of implementing the features of the present disclosure. Also, the user device may contain at least one input means configured to receive an input from at least one of a transceiver unit, a processing unit, a storage unit, a detection unit and any other such unit(s) which are required to implement the features of the present disclosure.
25
[0030] As used herein, “storage unit” or “memory unit” refers to a machine or computer-readable medium including any mechanism for storing information in a form readable by a computer or similar machine. For example, a computer-readable medium includes read-only memory (“ROM”), random access memory (“RAM”),
30 magnetic disk storage media, optical storage media, flash memory devices or other
types of machine-accessible storage media. The storage unit stores at least the data
9

that may be required by one or more units of the system to perform their respective functions.
[0031] As used herein “interface” or “user interface” refers to a shared boundary
5 across which two or more separate components of a system exchange information
or data. The interface may also be referred to a set of rules or protocols that define communication or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called.
10
[0032] All modules, units, components used herein, unless explicitly excluded herein, may be software modules or hardware processors, the processors being a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more
15 microprocessors in association with a DSP core, a controller, a microcontroller,
Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc.
[0033] As used herein the transceiver unit include at least one receiver and at least
20 one transmitter configured respectively for receiving and transmitting data, signals,
information or a combination thereof between units/components within the system and/or connected with the system.
[0034] As discussed in the background section, the current known solutions have
25 several shortcomings. The present disclosure aims to overcome the above-
mentioned and other existing problems in this field of technology by providing a method and a system for automatically upgrading a target network cluster.
[0035] FIG. 1 illustrates an exemplary block diagram representation of 5th
30 generation core (5GC) network architecture, in accordance with exemplary
implementation of the present disclosure. As shown in FIG. 1, the 5GC network
10

architecture [100] includes a user equipment (UE) [102], a radio access network
(RAN) [104], an access and mobility management function (AMF) [106], a Session
Management Function (SMF) [108], a Service Communication Proxy (SCP) [110],
an Authentication Server Function (AUSF) [112], a Network Slice Specific
5 Authentication and Authorization Function (NSSAAF) [114], a Network Slice
Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a
Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122],
a Unified Data Management (UDM) [124], an application function (AF) [126], a
User Plane Function (UPF) [128], a data network (DN) [130], wherein all the
10 components are assumed to be connected to each other in a manner as obvious to
the person skilled in the art for implementing features of the present disclosure.
[0036] The Radio Access Network (RAN) [104] is the part of a mobile
telecommunications system that connects user equipment (UE) [102] to the core
15 network (CN) and provides access to different types of networks (e.g., 5G network).
It consists of radio base stations and the radio access technologies that enable wireless communication.
[0037] The Access and Mobility Management Function (AMF) [106] is a 5G core
20 network function responsible for managing access and mobility aspects, such as UE
registration, connection, and reachability. It also handles mobility management procedures like handovers and paging.
[0038] The Session Management Function (SMF) [108] is a 5G core network
25 function responsible for managing session-related aspects, such as establishing,
modifying, and releasing sessions. It coordinates with the User Plane Function
(UPF) for data forwarding and handles IP address allocation and QoS enforcement.
[0039] The Service Communication Proxy (SCP) [110] is a network function in the
30 5G core network that facilitates communication between other network functions
11

by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces.
[0040] The Authentication Server Function (AUSF) [112] is a network function in
5 the 5G core responsible for authenticating UEs during registration and providing
security services. It generates and verifies authentication vectors and tokens.
[0041] The Network Slice Specific Authentication and Authorization Function
(NSSAAF) [114] is a network function that provides authentication and
10 authorization services specific to network slices. It ensures that UEs can access only
the slices for which they are authorized.
[0042] The Network Slice Selection Function (NSSF) [116] is a network function
responsible for selecting the appropriate network slice for a UE based on factors
15 such as subscription, requested services, and network policies.
[0043] The Network Exposure Function (NEF) [118] is a network function that exposes capabilities and services of the 5G network to external applications, enabling integration with third-party services and applications. 20
[0044] The Network Repository Function (NRF) [120] is a network function that acts as a central repository for information about available network functions and services. It facilitates the discovery and dynamic registration of network functions.
25 [0045] The Policy Control Function (PCF) [122] is a network function responsible
for policy control decisions, such as QoS, charging, and access control, based on subscriber information and network policies.
[0046] The Unified Data Management (UDM) [124] is a network function that
30 centralizes the management of subscriber data, including authentication,
authorization, and subscription information.
12

[0047] The Application Function (AF) [126] is a network function that represents external applications interfacing with the 5G core network to access network capabilities and services. 5
[0048] The User Plane Function (UPF) [128] is a network function responsible for handling user data traffic, including packet routing, forwarding, and QoS enforcement.
10 [0049] The Data Network (DN) [130] refers to a network that provides data
services to user equipment (UE) in a telecommunications system. The data services may include but are not limited to Internet services, private data network related services.
15 [0050] FIG. 2 illustrates an exemplary block diagram of a computing device [200]
upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure. In an implementation, the computing device [200] may also implement a method for automatically upgrading a target network cluster, utilising the system. In another
20 implementation, the computing device [200] itself implements the method for
automatically upgrading a target network cluster, using one or more units configured within the computing device [200], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
25 [0051] The computing device [200] encompasses a wide range of electronic
devices capable of processing data and performing computations. Examples of computing device [200] include, but are not limited only to, personal computers, laptops, tablets, smartphones, servers, and embedded systems. The devices may operate independently or as part of a network and can perform a variety of tasks
30 such as data storage, retrieval, and analysis. Additionally, computing device [200]
may include peripheral devices, such as monitors, keyboards, and printers, as well
13

as integrated components within larger electronic systems, showcasing their versatility in various technological applications.
[0052] The computing device [200] may include a bus [202] or other
5 communication mechanism for communicating information, and a hardware
processor [204] coupled with bus [202] for processing information. The hardware
processor [204] may be, for example, a general-purpose microprocessor. The
computing device [200] may also include a main memory [206], such as a random
access memory (RAM), or other dynamic storage device, coupled to the bus [202]
10 for storing information and instructions to be executed by the processor [204]. The
main memory [206] also may be used for storing temporary variables or other
intermediate information during execution of the instructions to be executed by the
processor [204]. Such instructions, when stored in non-transitory storage media
accessible to the processor [204], render the computing device [200] into a special-
15 purpose machine that is customized to perform the operations specified in the
instructions. The computing device [200] further includes a read only memory
(ROM) [208] or other static storage device coupled to the bus [202] for storing static
information and instructions for the processor [204].
20 [0053] A storage device [210], such as a magnetic disk, optical disk, or solid-state
drive is provided and coupled to the bus [202] for storing information and instructions. The computing device [200] may be coupled via the bus [202] to a display [212], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for
25 displaying information to a computer user. An input device [214], including
alphanumeric and other keys, touch screen input means, etc. may be coupled to the bus [202] for communicating information and command selections to the processor [204]. Another type of user input device may be a cursor controller [216], such as a mouse, a trackball, or cursor direction keys, for communicating direction
30 information and command selections to the processor [204], and for controlling
cursor movement on the display [212]. This input device typically has two degrees
14

of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
[0054] The computing device [200] may implement the techniques described
5 herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware
and/or program logic which in combination with the computing device [200] causes or programs the computing device [200] to be a special-purpose machine. According to one implementation, the techniques herein are performed by the computing device [200] in response to the processor [204] executing one or more
10 sequences of one or more instructions contained in the main memory [206]. Such
instructions may be read into the main memory [206] from another storage medium, such as the storage device [210]. Execution of the sequences of instructions contained in the main memory [206] causes the processor [204] to perform the process steps described herein. In alternative implementations of the present
15 disclosure, hard-wired circuitry may be used in place of or in combination with
software instructions.
[0055] The computing device [200] also may include a communication interface
[218] coupled to the bus [202]. The communication interface [218] provides a two-
20 way data communication coupling to a network link [220] that is connected to a
local network [222]. For example, the communication interface [218] may be an
integrated services digital network (ISDN) card, cable modem, satellite modem, or
a modem to provide a data communication connection to a corresponding type of
telephone line. As another example, the communication interface [218] may be a
25 local area network (LAN) card to provide a data communication connection to a
compatible LAN. Wireless links may also be implemented. In any such
implementation, the communication interface [218] sends and receives electrical,
electromagnetic or optical signals that carry digital data streams representing
various types of information.
30
15

[0056] The computing device [200] can send messages and receive data, including
program code, through the network(s), the network link [220] and the
communication interface [218]. In the Internet example, a server [230] might
transmit a requested code for an application program through the Internet [228], the
5 ISP [226], the local network [222], a host [224] and the communication interface
[218]. The received code may be executed by the processor [204] as it is received, and/or stored in the storage device [210], or other non-volatile storage for later execution.
10 [0057] The computing device [200] encompasses a wide range of electronic
devices capable of processing data and performing computations. Examples of computing device [200] include, but are not limited only to, personal computers, laptops, tablets, smartphones, servers, and embedded systems. The devices may operate independently or as part of a network and can perform a variety of tasks
15 such as data storage, retrieval, and analysis. Additionally, computing device [200]
may include peripheral devices, such as monitors, keyboards, and printers, as well as integrated components within larger electronic systems, showcasing their versatility in various technological applications.
20 [0058] The present disclosure is implemented by a system [300] (as shown in FIG.
3). In an implementation, the system [300] may include the computing device [200] (as shown in FIG. 2). It is further noted that the computing device [200] is able to perform the steps of a method [400] (as shown in FIG. 4).
25 [0059] Referring to FIG. 3, an exemplary block diagram of a system [300] for
automatically upgrading a target network cluster is shown, in accordance with the exemplary implementations of the present disclosure. The system [300] comprises at least one processing unit [302], at least one generation unit [304] and at least one identification unit [306]. Also, all of the components/ units of the system [300] are
30 assumed to be connected to each other unless otherwise indicated below. As shown
in the figures all units shown within the system should also be assumed to be
16

connected to each other. Also, in FIG. 3 only a few units are shown, however, the
system [300] may comprise multiple such units or the system [300] may comprise
any such numbers of said units, as required to implement the features of the present
disclosure. Further, in an implementation, the system [300] may be present in a user
5 device to implement the features of the present disclosure. The system [300] may
be a part of the user device / or may be independent of but in communication with
the user device (may also referred herein as a UE). In another implementation, the
system [300] may reside in a server or a network entity. In yet another
implementation, the system [300] may reside partly in the server/ network entity
10 and partly in the user device.
[0060] The system [300] is configured for automatically upgrading a target network
cluster, with the help of the interconnection between the components/units of the
system [300]. The target network cluster refers to an interconnection of nodes or
15 interconnection of devices in a network. In an implementation of the present
disclosure, the network is a 5th generation core network. In another implementation of the present disclosure, the network may be a 4th generation network, a 6th generation network, or any other future generations of network.
20 [0061] The system [300] includes at least a processing unit [302]. The processing
unit [302] is configured to access a first container from a first set of containers associated with one or more network clusters. The first container comprises a first set of container data. Each of the first containers is associated with a specific function or service within the network cluster and contains a set of data relevant to
25 its operation, such as a first set of container data. The first set of container data may
include operational metadata, configuration settings, or service-specific information required for the network function (NF) to run correctly. In one example, containers refers to a package that may contain instructions to upgrade the target network cluster. The first container may include instructions for upgrading
30 the target network cluster. The first container comprises a first set of container data.
For example, in a network management environment, a container might hold
17

configurations for managing a specific type of network traffic or executing a
software service such as load balancing. The processing unit [302], when accessing
the first container, retrieves this data to perform further operations such as initiating
an upgrade procedure. The first set of containers refers to a collection of such
5 containers that work together within one or more network clusters to execute
various network functions. For example, if the container is responsible for handling
network traffic routing, the upgrade procedure could include applying a new routing
algorithm or updating configuration rules to enhance network performance. The
upgrade procedure facilitates that the container remains operational during or after
10 the upgrade, depending on whether the procedure is conducted in an online or
offline mode.
[0062] The processing unit [302] is further configured to initiate an upgrade procedure associated with the first container. Upon accessing the first container
15 from the first set of containers, the processing unit [302] triggers the execution of a
predefined set of upgrade commands to modify or enhance the software, configuration, or services running within the container. The upgrade commands may include instructions to install new software versions, patch security vulnerabilities, or update operational parameters required for the container to
20 function optimally within the network cluster. The upgrade procedure is initiated
by the processing unit [302] based on a set of predefined upgrade commands. The set of predefined upgrade commands is executed by the processing unit [302] in a predefined manner over a target connection mode. In one example, the set of predefined upgrade commands refer to instructions that may be created to perform
25 an upgrade. The predefined upgrade commands may be defined by a system
operator. In another example, the predefined upgrade commands may be defined by a network operator. The predefined manner refers to a sequence defined by the system operator or the network operator. These commands might include steps to update software, firmware, or configurations. The target connection mode is at least
30 one of an online connection mode and an offline connection mode.
18

[0063] In an exemplary aspect, in an online mode, the processing unit [302] may
execute the upgrade without disrupting the container’s operations, allowing it to
continue providing services to the network cluster. In an offline mode, the container
may be temporarily suspended while the upgrade is performed. The upgrade
5 procedure initiated by the processing unit [302] facilitates maintaining and
improving container functionality such that the latest software or configuration updates are applied consistently across the system.
[0064] The system [300] further includes the generation unit [304]. The generation
10 unit [304] is configured to generate a modified set of container data in the first
container based on the initiated upgrade procedure. Once the upgrade procedure is
initiated by the processing unit [302], the generation unit [304] modifies the existing
container data within the first container to reflect the changes required by the
upgrade. The modifications may include updating software versions, applying
15 patches, adjusting configuration settings, or altering any other data that enables the
container's optimal performance post-upgrade. For example, if the first container is
running an outdated version of a network application, the generation unit [304]
would modify the container data by updating the application to a newer version,
replacing obsolete settings with new configurations, or adding new security
20 measures. The new set of container data represents the updated state of the container
such that it meets the requirements of the initiated upgrade.
[0065] The processing unit [302] is further configured to duplicate, at the first container, the modified set of container data from the first container. Once the
25 generation unit [304] has created the modified set of container data based on the
initiated upgrade procedure, the processing unit [302] duplicates the modified set of container data within the same container. The duplication process safeguards the integrity of the updated data, enabling it to be utilized for further operations, such as propagating the update to other containers or nodes in the network cluster. For
30 example, if the upgrade involves updating a software component or modifying a
configuration file in the first container, the processing unit [302] duplicates the
19

updated data so it can be consistently applied across additional containers in the same cluster or different clusters.
[0066] The system [300] further includes the identification unit [306]. The
5 identification unit [306] is configured to identify the target network cluster from the
one or more network clusters based on the initiated upgrade procedure. The target network cluster is identified by the identification unit [306] based on at least one of metadata, configuration information, and network attributes includes in the first container. When the upgrade procedure is initiated by the processing unit [302] and
10 the generation unit [304] modifies the container data, the identification unit [306]
determines which specific network cluster requires the upgrade. The identification process may involve analysing various parameters such as metadata, configuration information, or network attributes stored within the first container. For example, the identification unit [306] might look at cluster-specific data, including node
15 configurations, IP addresses, or service unit (SU) roles to determine which cluster
needs the upgrade. If the first container is part of a larger network handling telecommunications services, the identification unit [306] may recognize that this particular container belongs to a cluster managing high-traffic routing services, and thus, target this cluster for the upgrade. The identification unit [306] facilitates that
20 the correct network cluster is updated, avoiding unnecessary or erroneous upgrades
in other clusters. For example, if multiple clusters exist, each performing different functions such as handling storage, network security, or service routing, the identification unit [306] facilitates that only the relevant cluster receives the upgrade, based on the needs determined by the initiated upgrade procedure.
25
[0067] The processing unit [302] is further configured to automatically upgrade the target network cluster by applying the duplicated modified container data to a second set of containers associated with the target network cluster. In one example, the processing unit [302] may further invoke upgrade by applying the duplicated
30 modified container data to a third set of containers. The application of the duplicated
modifier container data from a single container facilitates that the upgrade is
20

released across all nodes of the target network cluster in very minimal time. Further,
the upgrade may not require re-creation of the container. After duplicating the
modified container data within the first container, the processing unit [302]
facilitates that the data is propagated to the second set of containers, which are part
5 of the identified target network cluster. The automated upgrade process facilitates
that the updated software, configurations, or other modifications are uniformly
applied across all relevant containers within the cluster without requiring manual
intervention. For example, if the target network cluster consists of multiple
containers responsible for handling specific network functions such as load
10 balancing, traffic management, or firewall services, the processing unit [302]
automatically applies the modified container data, such as a new software patch or updated configuration settings, to each container in the second set.
[0068] Referring to FIG. 4, an exemplary method flow diagram [400] for
15 automatically upgrading a target network cluster, in accordance with exemplary
implementations of the present disclosure is shown. In an implementation the method [400] is performed by the system [300]. Further, in an implementation, the system [300] may be present in a server device to implement the features of the present disclosure. Also, as shown in FIG. 4, the method [400] starts at step [402].
20
[0069] At step [404], the method includes accessing, by a processing unit [302], a first container from a first set of containers associated with one or more network clusters. The first container comprises a first set of container data. Each of the first containers is associated with a specific function or service within the network
25 cluster and contains a set of data relevant to its operation, such as a first set of
container data. The first set of container data may include operational metadata, configuration settings, or service-specific information required for the network function (NF) to run correctly. In one example, containers refers to a package that may contain instructions to upgrade the target network cluster. The first container
30 may include instructions for upgrading the target network cluster. The first
container comprises a first set of container data. For example, in a network
21

management environment, a container might hold configurations for managing a
specific type of network traffic or executing a software service such as load
balancing. The processing unit [302], when accessing the first container, retrieves
this data to perform further operations such as initiating an upgrade procedure. The
5 first set of containers refers to a collection of such containers that work together
within one or more network clusters to execute various network functions. For
example, if the container is responsible for handling network traffic routing, the
upgrade procedure could include applying a new routing algorithm or updating
configuration rules to enhance network performance. The upgrade procedure
10 facilitates that the container remains operational during or after the upgrade,
depending on whether the procedure is conducted in an online or offline mode.
[0070] At step [406], the method includes initiating, by the processing unit [302], an upgrade procedure associated with the first container. Upon accessing the first
15 container from the first set of containers, the processing unit [302] triggers the
execution of a predefined set of upgrade commands to modify or enhance the software, configuration, or services running within the container. The upgrade commands may include instructions to install new software versions, patch security vulnerabilities, or update operational parameters required for the container to
20 function optimally within the network cluster. The upgrade procedure is initiated
by the processing unit [302] based on a set of predefined upgrade commands. The set of predefined upgrade commands is executed by the processing unit [302] in a predefined manner over a target connection mode. In one example, the set of predefined upgrade commands refer to instructions that may be created to perform
25 an upgrade. The predefined upgrade commands may be defined by a system
operator. In another example, the predefined upgrade commands may be defined by a network operator. The predefined manner refers to a sequence defined by the system operator or the network operator. These commands might include steps to update software, firmware, or configurations. The target connection mode is at least
30 one of an online connection mode and an offline connection mode.
22

[0071] In an exemplary aspect, in an online mode, the processing unit [302] may
execute the upgrade without disrupting the container’s operations, allowing it to
continue providing services to the network cluster. In an offline mode, the container
may be temporarily suspended while the upgrade is performed. The upgrade
5 procedure initiated by the processing unit [302] facilitates maintaining and
improving container functionality such that the latest software or configuration updates are applied consistently across the system.
[0072] Further, at step [408], the method includes generating, by a generation unit
10 [304], a modified set of container data in the first container based on the initiated
upgrade procedure. Once the upgrade procedure is initiated by the processing unit
[302], the generation unit [304] modifies the existing container data within the first
container to reflect the changes required by the upgrade. The modifications may
include updating software versions, applying patches, adjusting configuration
15 settings, or altering any other data such that to facilitate that the container's optimal
performance post-upgrade. For example, if the first container is running an outdated
version of a network application, the generation unit [304] would modify the
container data by updating the application to a newer version, replacing obsolete
settings with new configurations, or adding new security measures. The new set of
20 container data represents the updated state of the container such that it meets the
requirements of the initiated upgrade.
[0073] Furthermore, at step [410], the method includes duplicating, by the processing unit [302] at the first container, the modified set of container data from
25 the first container. Once the generation unit [304] has created the modified set of
container data based on the initiated upgrade procedure, the processing unit [302] duplicates the modified set of container data within the same container. The duplication process safeguards the integrity of the updated data, enabling it to be utilized for further operations, such as propagating the update to other containers or
30 nodes in the network cluster. For example, if the upgrade involves updating a
software component or modifying a configuration file in the first container, the
23

processing unit [302] duplicates the updated data so it can be consistently applied across additional containers in the same cluster or different clusters.
[0074] Further, at step [412], the method includes identifying, by an identification
5 unit [306], the target network cluster from the one or more network clusters based
on the initiated upgrade procedure. The target network cluster is identified by the identification unit [306] based on at least one of metadata, configuration information, and network attributes includes in the first container. When the upgrade procedure is initiated by the processing unit [302] and the generation unit
10 [304] modifies the container data, the identification unit [306] determines which
specific network cluster requires the upgrade. The identification process may involve analysing various parameters such as metadata, configuration information, or network attributes stored within the first container. For example, the identification unit [306] might look at cluster-specific data, including node
15 configurations, IP addresses, or service unit (SU) roles to determine which cluster
needs the upgrade. If the first container is part of a larger network handling telecommunications services, the identification unit [306] may recognize that this particular container belongs to a cluster managing high-traffic routing services, and thus, target this cluster for the upgrade. The identification unit [306] facilitates that
20 the correct network cluster is updated, avoiding unnecessary or erroneous upgrades
in other clusters. For example, if multiple clusters exist, each performing different functions such as handling storage, network security, or service routing, the identification unit [306] facilitates that only the relevant cluster receives the upgrade, based on the needs determined by the initiated upgrade procedure.
25
[0075] Next, at step [414], the method includes automatically upgrading, by the processing unit [302], the target network cluster by applying the duplicated modified container data to a second set of containers associated with the target network cluster. In one example, the processing unit [302] may further invoke
30 upgrade by applying the duplicated modified container data to a third set of
containers. The application of the duplicated modifier container data from a single
24

container such that the upgrade is released across all nodes of the target network
cluster in very minimal time. Further, the upgrade may not require re-creation of
the container. After duplicating the modified container data within the first
container, the processing unit [302] such that the data is propagated to the second
5 set of containers, which are part of the identified target network cluster. The
automated upgrade process facilitates that the updated software, configurations, or
other modifications are uniformly applied across all relevant containers within the
cluster without requiring manual intervention. For example, if the target network
cluster consists of multiple containers responsible for handling specific network
10 functions such as load balancing, traffic management, or firewall services, the
processing unit [302] automatically applies the modified container data, such as a new software patch or updated configuration settings, to each container in the second set.
15 [0076] The method terminates at step [416].
[0077] The present disclosure further discloses a non-transitory computer readable storage medium storing instructions for automatically upgrading a target network cluster, the instructions include executable code which, when executed by one or
20 more units of a system [300], causes a processing unit [302] of the system [300] to
access a first container from a first set of containers associated with one or more network clusters. The first container comprises a first set of container data. The instructions when executed by the system [300] further causes the processing unit [302] to initiate an upgrade procedure associated with the first container. The
25 instructions when executed by the system [300] further cause a generation unit
[304] of the system [300], to generate a modified set of container data in the first container based on the initiated upgrade procedure. The instructions when executed by the system [300] further cause the processing unit [302] to duplicate, at the first container, the modified set of container data from the first container. The
30 instructions when executed by the system [300] further cause an identification unit
[306] of the system [300], to identify the target network cluster from the one or
25

more network clusters based on the initiated upgrade procedure. The instructions
when executed by the system [300] further cause the processing unit [302] to
automatically upgrade the target network cluster by applying the duplicated
modified container data to a second set of containers associated with the target
5 network cluster.
[0078] As is evident from the above, the present disclosure provides a technically
advanced solution for automatically upgrading a target network cluster. The present
solution provides a system and a method upgrading automatically all the containers
10 in the set of containers of a cluster based on updating a single container. The present
disclosure further provides a solution that automates the upgradation of all the containers in single cluster. The present disclosure further provides a solution that reduces upgradation time of the containers in a cluster.
15 [0079] It should be noted that the terms "first", "second", "primary", "secondary",
"target" and the like, herein do not denote any order, ranking, quantity, or importance, but rather are used to distinguish one element from another.
[0080] Further, in accordance with the present disclosure, it is to be acknowledged
20 that the functionality described for the various components/units can be
implemented interchangeably. While specific embodiments may disclose a
particular functionality of these units for clarity, it is recognized that various
configurations and combinations thereof are within the scope of the disclosure. The
functionality of specific units, as disclosed in the disclosure, should not be
25 construed as limiting the scope of the present disclosure. Consequently, alternative
arrangements and substitutions of units, provided they achieve the intended functionality described herein, are considered to be encompassed within the scope of the present disclosure.
30 [0081] While considerable emphasis has been placed herein on the disclosed
implementations, it will be appreciated that many implementations can be made and
26

that many changes can be made to the implementations without departing from the principles of the present disclosure. These and other changes in the implementations of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.

We Claim:
1. A method [400] for automatically upgrading a target network cluster, the
method [400] comprising:
- accessing, by a processing unit [302], a first container from a first set of containers associated with one or more network clusters, wherein the first container comprises a first set of container data;
- initiating, by the processing unit [302], an upgrade procedure associated with the first container;
- generating, by a generation unit [304], a modified set of container data in the first container based on the initiated upgrade procedure;
- duplicating, by the processing unit [302] at the first container, the modified set of container data from the first container;
- identifying, by an identification unit [306], the target network cluster from the one or more network clusters based on the initiated upgrade procedure; and
- automatically upgrading, by the processing unit [302], the target network cluster by applying the duplicated modified container data to a second set of containers associated with the target network cluster.

2. The method [400] as claimed in claim 1, wherein the upgrade procedure is initiated by the processing unit [302] based on a set of predefined upgrade commands.
3. The method [400] as claimed in claim 2, wherein the set of predefined upgrade commands is executed by the processing unit [302] in a predefined manner over a target connection mode, wherein the target connection mode is at least one of an online connection mode and an offline connection mode.

4. The method [400] as claimed in claim 1, wherein the target network cluster is identified by the identification unit [306] based on at least one of metadata, configuration information, and network attributes within the first container.
5. A system [300] for automatically upgrading a target network cluster, the system [300] comprises:
- at least a processing unit [302], wherein the processing unit [302] is
configured to:
• access a first container from a first set of containers associated with one or more network clusters, wherein the first container comprises a first set of container data, and
• initiate an upgrade procedure associated with the first container;
- a generation unit [304] connected to at least the processing unit [302],
wherein the generation unit [304] is configured to:
• generate a modified set of container data in the first container based on
the initiated upgrade procedure,
wherein the processing unit [302] is further configured to duplicate, at the first container, the modified set of container data from the first container; and
- an identification unit [306] connected to at least the generation unit [304],
wherein the identification unit [306] is configured to:
• identify the target network cluster from the one or more network clusters
based on the initiated upgrade procedure; and
wherein the processing unit [302] is further configured to automatically upgrade the target network cluster by applying the duplicated modified container data to a second set of containers associated with the target network cluster.

6. The system [300] as claimed in claim 5, wherein the upgrade procedure is initiated by the processing unit [302] based on a set of predefined upgrade commands.
7. The system [300] as claimed in claim 6, wherein the set of predefined upgrade commands is executed by the processing unit [302] in a predefined manner over a target connection mode, wherein the target connection mode is at least one of an online connection mode and an offline connection mode.
8. The system [300] as claimed in claim 5, wherein the target network cluster is identified by the identification unit [306] based on at least one of metadata, configuration information, and network attributes within the first container.

Documents

Application Documents

# Name Date
1 202321061989-STATEMENT OF UNDERTAKING (FORM 3) [14-09-2023(online)].pdf 2023-09-14
2 202321061989-PROVISIONAL SPECIFICATION [14-09-2023(online)].pdf 2023-09-14
3 202321061989-POWER OF AUTHORITY [14-09-2023(online)].pdf 2023-09-14
4 202321061989-FORM 1 [14-09-2023(online)].pdf 2023-09-14
5 202321061989-FIGURE OF ABSTRACT [14-09-2023(online)].pdf 2023-09-14
6 202321061989-DRAWINGS [14-09-2023(online)].pdf 2023-09-14
7 202321061989-Proof of Right [21-02-2024(online)].pdf 2024-02-21
8 202321061989-FORM-5 [11-09-2024(online)].pdf 2024-09-11
9 202321061989-ENDORSEMENT BY INVENTORS [11-09-2024(online)].pdf 2024-09-11
10 202321061989-DRAWING [11-09-2024(online)].pdf 2024-09-11
11 202321061989-CORRESPONDENCE-OTHERS [11-09-2024(online)].pdf 2024-09-11
12 202321061989-COMPLETE SPECIFICATION [11-09-2024(online)].pdf 2024-09-11
13 202321061989-Request Letter-Correspondence [18-09-2024(online)].pdf 2024-09-18
14 202321061989-Power of Attorney [18-09-2024(online)].pdf 2024-09-18
15 202321061989-Form 1 (Submitted on date of filing) [18-09-2024(online)].pdf 2024-09-18
16 202321061989-Covering Letter [18-09-2024(online)].pdf 2024-09-18
17 202321061989-CERTIFIED COPIES TRANSMISSION TO IB [18-09-2024(online)].pdf 2024-09-18
18 Abstract 1.jpg 2024-10-07
19 202321061989-FORM 3 [07-10-2024(online)].pdf 2024-10-07
20 202321061989-ORIGINAL UR 6(1A) FORM 1 & 26-200125.pdf 2025-01-24