Sign In to Follow Application
View All Documents & Correspondence

Method And System For Instantiation Of A Network Function

Abstract: The present disclosure relates to a method and a system for instantiation of at least one network function. The method comprises receiving, by a transceiver unit [302] at a policy execution engine (PEEGN) [104], from a lifecycle manager (LM) module, a request for fetching a set of resources required for instantiation of the at least one network function, based at least on a predetermined policy. The method comprises querying, by a processing unit [304] at the PEEGN [104], a physical virtual inventory manager (PVIM) module [106] for retrieving the set of resources, and a region data related to the at least one network function. The method comprises selecting, by the processing unit [304] at the PEEGN [104], at least one host for instantiation of the at least one network function, based on at least the retrieved set of resources and the predetermined policy. [FIG. 4]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
20 September 2023
Publication Number
14/2025
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Jio Platforms Limited
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Inventors

1. Aayush Bhatnagar
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
2. Ankit Murarka
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
3. Rizwan Ahmad
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
4. Kapil Gill
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
5. Arpit Jain
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
6. Shashank Bhushan
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
7. Jugal Kishore
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
8. Meenakshi Sarohi
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
9. Kumar Debashish
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
10. Supriya Kaushik De
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
11. Gaurav Kumar
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
12. Kishan Sahu
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
13. Gaurav Saxena
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
14. Vinay Gayki
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
15. Mohit Bhanwria
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
16. Durgesh Kumar
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
17. Rahul Kumar
Reliance Corporate Park, Thane- Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.

Specification

FORM 2
THE PATENTS ACT, 1970
(39 OF 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR INSTANTIATION OF A
NETWORK FUNCTION”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre
Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in
which it is to be performed.
2
METHOD AND SYSTEM FOR INSTANTIATION OF A NETWORK
FUNCTION
FIELD OF THE DISCLOSURE
5
[0001] Embodiments of the present disclosure generally relate to network
management systems. More particularly, embodiments of the present disclosure
relate to a method and system for instantiation of at least one network function.
10 BACKGROUND
[0002] The following description of the related art is intended to provide
background information pertaining to the field of the disclosure. This section may
include certain aspects of the art that may be related to various features of the
15 present disclosure. However, it should be appreciated that this section is used only
to enhance the understanding of the reader with respect to the present disclosure,
and not as admissions of the prior art.
[0003] Wireless communication technology has rapidly evolved over the past few
20 decades, with each generation bringing significant improvements and
advancements. The first generation of wireless communication technology was
based on analog technology and offered only voice services. However, with the
advent of the second-generation (2G) technology, digital communication and data
services became possible, and text messaging was introduced. 3G technology
25 marked the introduction of high-speed internet access, mobile video calling, and
location-based services. The fourth generation (4G) technology revolutionized
wireless communication with faster data speeds, better network coverage, and
improved security. Currently, the fifth generation (5G) technology is being
deployed, promising even faster data speeds, low latency, and the ability to connect
30 multiple devices simultaneously. With each generation, wireless communication
3
technology has become more advanced, sophisticated, and capable of delivering
more services to its users.
[0004] In order to instantiate a network node in the wireless communication
systems, a policy execution engine (PEEGN) microservice 5 needs to decide the host
in which container network function components (CNFCs) need to be instantiated
as per the defined policy. For this purpose, the PEEGN needs to get the details of
all the hosts present in particular site under the selected pod (i.e., a network of
computers). All these details need to be stored in an inventory. The fetching of the
10 details of the hosts from the inventory by the PEEGN is not easy or may involve
sending incorrect details of hosts in some cases.
[0005] Thus, there exists an imperative need in the art to provide a method and a
system for sharing correct information of hosts from an inventory to PEEGN, which
15 the present disclosure aims to address.
SUMMARY
[0006] This section is provided to introduce certain aspects of the present disclosure
20 in a simplified form that are further described below in the detailed description.
This summary is not intended to identify the key features or the scope of the claimed
subject matter.
[0007] An aspect of the present disclosure may relate to a method for instantiation
25 of at least one network function. The method comprises receiving, by a transceiver
unit at a policy execution engine (PEEGN), from a lifecycle manager (LM) module,
a request for fetching a set of resources required for instantiation of the at least one
network function, based at least on a predetermined policy. Further, the method
comprises querying, by a processing unit at the PEEGN, a physical virtual inventory
30 manager (PVIM) module for retrieving the set of resources, and a region data
related to the at least one network function. Furthermore, the method comprises
4
selecting, by the processing unit at the PEEGN, at least one host for instantiation of
the at least one network function, based on at least one of the retrieved set of
resources and the predetermined policy.
[0008] In an exemplary aspect 5 of the present disclosure, the at least one network
function comprises at least one of container network functions (CNFs), and virtual
network functions (VNFs).
[0009] In an exemplary aspect of the present disclosure, the LM module receives a
10 request for instantiation of the at least one network function from a user interface
(UI).
[0010] In an exemplary aspect of the present disclosure, the region data comprises
at least one of a site detail information, a pod detail information, a required
15 configuration information, a maximum number of instances information, and
combinations thereof.
[0011] Another aspect of the present disclosure may relate to a system for
instantiation of at least one network function. The system comprises a transceiver
20 unit configured to receive, at a policy execution engine (PEEGN), from a lifecycle
manager (LM) module, a request to fetch a set of resources required for instantiation
of the at least one network function based at least on a predetermined policy.
Further, the system comprises a processing unit configured to query, at the PEEGN,
a physical virtual inventory manager (PVIM) module to retrieve the set of
25 resources, and a region data related to the at least one network function. The
processing unit is further configured to select, at the PEEGN, at least one host for
instantiation of the at least one network function based on at least one of the
retrieved set of resources and the predetermined policy.
30 [0012] Yet another aspect of the present disclosure may relate to a non-transitory
computer readable storage medium storing instructions for instantiation of at least
5
one network function, the instructions include executable code which, when
executed by one or more units of a system causes a transceiver unit to receive, at a
policy execution engine (PEEGN), from a lifecycle manager (LM) module, a
request to fetch a set of resources required for instantiation of the at least one
network function based at least on a 5 predetermined policy. The instructions when
executed by the system further causes a processing unit to query, at the PEEGN, a
physical virtual inventory manager (PVIM) module to retrieve the set of resources,
and a region data related to the at least one network function. The instructions when
executed by the system further causes the processing unit to select, at the PEEGN,
10 at least one host for instantiation of the at least one network function based on at
least one of the retrieved set of resources and the predetermined policy.
OBJECTS OF THE INVENTION
15 [0013] Some of the objects of the present disclosure, which at least one
embodiment disclosed herein satisfies are listed herein below.
[0014] It is an object of the present disclosure to provide a method and system for
instantiation of at least one network function.
20
[0015] It is another object of the present disclosure to provide a solution for sharing
information of hosts from an inventory that helps in providing the proper hosts
information with required configuration.
25 [0016] It is another object of the present disclosure to provide a solution that helps
policy execution microservice to decide correctively about the hosts where CNFC’s
need to be instantiated.
6
DESCRIPTION OF THE DRAWINGS
[0017] The accompanying drawings, which are incorporated herein, and constitute
a part of this disclosure, illustrate exemplary embodiments of the disclosed methods
and systems in which like reference 5 numerals refer to the same parts throughout the
different drawings. Components in the drawings are not necessarily to scale,
emphasis instead being placed upon clearly illustrating the principles of the present
disclosure. Also, the embodiments shown in the figures are not to be construed as
limiting the disclosure, but the possible variants of the method and system
10 according to the disclosure are illustrated herein to highlight the advantages of the
disclosure. It will be appreciated by those skilled in the art that disclosure of such
drawings includes disclosure of electrical components or circuitry commonly used
to implement such components.
15 [0018] FIG. 1 illustrates an exemplary representation of a block diagram of a
resource architecture, in accordance with exemplary implementation of the present
disclosure.
[0019] FIG. 2 illustrates an exemplary block diagram of a computing device upon
20 which the features of the present disclosure may be implemented in accordance with
exemplary implementations of the present disclosure.
[0020] FIG. 3 illustrates an exemplary block diagram of a system for instantiation
of at least one network function, in accordance with exemplary implementations of
25 the present disclosure.
[0021] FIG. 4 illustrates a method flow diagram for instantiation of at least one
network function, in accordance with exemplary implementations of the present
disclosure.
30
7
[0022] FIG. 5 illustrates an exemplary flow diagram depicting the method for
instantiation of at least one network function, in accordance with exemplary
implementations of the present disclosure.
[0023] The foregoing shall be 5 more apparent from the following more detailed
description of the disclosure.
DETAILED DESCRIPTION
10 [0024] In the following description, for the purposes of explanation, various
specific details are set forth in order to provide a thorough understanding of
embodiments of the present disclosure. It will be apparent, however, that
embodiments of the present disclosure may be practiced without these specific
details. Several features described hereafter may each be used independently of one
15 another or with any combination of other features. An individual feature may not
address any of the problems discussed above or might address only some of the
problems discussed above.
[0025] The ensuing description provides exemplary embodiments only, and is not
20 intended to limit the scope, applicability, or configuration of the disclosure. Rather,
the ensuing description of the exemplary embodiments will provide those skilled in
the art with an enabling description for implementing an exemplary embodiment.
It should be understood that various changes may be made in the function and
arrangement of elements without departing from the spirit and scope of the
25 disclosure as set forth.
[0026] Specific details are given in the following description to provide a thorough
understanding of the embodiments. However, it will be understood by one of
ordinary skill in the art that the embodiments may be practiced without these
30 specific details. For example, circuits, systems, processes, and other components
8
may be shown as components in block diagram form in order not to obscure the
embodiments in unnecessary detail.
[0027] Also, it is noted that individual embodiments may be described as a process
which is depicted as a flowchart, a flow 5 diagram, a data flow diagram, a structure
diagram, or a block diagram. Although a flowchart may describe the operations as
a sequential process, many of the operations may be performed in parallel or
concurrently. In addition, the order of the operations may be re-arranged. A process
is terminated when its operations are completed but could have additional steps not
10 included in a figure.
[0028] The word “exemplary” and/or “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the
subject matter disclosed herein is not limited by such examples. In addition, any
15 aspect or design described herein as “exemplary” and/or “demonstrative” is not
necessarily to be construed as preferred or advantageous over other aspects or
designs, nor is it meant to preclude equivalent exemplary structures and techniques
known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes,” “has,” “contains,” and other similar words are used in either the detailed
20 description or the claims, such terms are intended to be inclusive—in a manner
similar to the term “comprising” as an open transition word—without precluding
any additional or other elements.
[0029] As used herein, a “processing unit” or “processor” or “operating processor”
25 includes one or more processors, wherein processor refers to any logic circuitry for
processing instructions. A processor may be a general-purpose processor, a special
purpose processor, a conventional processor, a digital signal processor, a plurality
of microprocessors, one or more microprocessors in association with a (Digital
Signal Processing) DSP core, a controller, a microcontroller, Application Specific
30 Integrated Circuits, Field Programmable Gate Array circuits, any other type of
integrated circuits, etc. The processor may perform signal coding data processing,
9
input/output processing, and/or any other functionality that enables the working of
the system according to the present disclosure. More specifically, the processor or
processing unit is a hardware processor.
[0030] As used herein, “a user equipment”, “a user device”, 5 “a smart-user-device”,
“a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”,
“a wireless communication device”, “a mobile communication device”, “a
communication device” may be any electrical, electronic and/or computing device
or equipment, capable of implementing the features of the present disclosure. The
10 user equipment/device may include, but is not limited to, a mobile phone, smart
phone, laptop, a general-purpose computer, desktop, personal digital assistant,
tablet computer, wearable device or any other computing device which is capable
of implementing the features of the present disclosure. Also, the user device may
contain at least one input means configured to receive an input from at least one of
15 a transceiver unit, a processing unit, a storage unit, a detection unit and any other
such unit(s) which are required to implement the features of the present disclosure.
[0031] As used herein, “storage unit” or “memory unit” refers to a machine or
computer-readable medium including any mechanism for storing information in a
20 form readable by a computer or similar machine. For example, a computer-readable
medium includes read-only memory (“ROM”), random access memory (“RAM”),
magnetic disk storage media, optical storage media, flash memory devices or other
types of machine-accessible storage media. The storage unit stores at least the data
that may be required by one or more units of the system to perform their respective
25 functions.
[0032] As used herein “interface” or “user interface” refers to a shared boundary
across which two or more separate components of a system exchange information
or data. The interface may also be referred to a set of rules or protocols that define
30 communication or interaction of one or more modules or one or more units with
10
each other, which also includes the methods, functions, or procedures that may be
called.
[0033] All modules, units, components used herein, unless explicitly excluded
herein, may be software modules 5 or hardware processors, the processors being a
general-purpose processor, a special purpose processor, a conventional processor,
a digital signal processor (DSP), a plurality of microprocessors, one or more
microprocessors in association with a DSP core, a controller, a microcontroller,
Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array
10 circuits (FPGA), any other type of integrated circuits, etc.
[0034] As used herein the transceiver unit include at least one receiver and at least
one transmitter configured respectively for receiving and transmitting data, signals,
information or a combination thereof between units/components within the system
15 and/or connected with the system.
[0035] As discussed in the background section, in order to instantiate a network
node in the wireless communication systems, a policy execution engine (PEEGN)
microservice needs to decide the host in which container network function
20 components (CNFCs) need to be instantiated as per the defined policy. For this
purpose, the PEEGN needs to get the details of all the hosts present in particular
site under the selected pod. All these details need to be stored in an inventory. The
fetching of the details of the hosts from the inventory by the PEEGN is not easy or
may involve sending incorrect details of hosts in some cases.
25
[0036] The present disclosure aims to overcome the above-mentioned and other
existing problems in this field of technology by providing a method and system for
instantiation of at least one network function.
30 [0037] FIG. 1 illustrates an exemplary representation of a block diagram of a
resource architecture [100], in accordance with exemplary implementation of the
11
present disclosure. As shown in FIG. 1, the resource architecture [100] comprises a
Lifecycle Manager (LM) module [102], a policy execution engine (PEEGN) [104],
a physical and virtual inventory manager (PVIM) [106] and a database [108],
wherein all the components are assumed to be connected to each other in a manner
as obvious to the person skilled in 5 the art for implementing features of the present
disclosure.
[0038] The LM module [102] comprises container network functions (CNFs) LM
module (CNFLM) [102-1] and a virtual network function (VNF) LM module
10 (VLM) [102-2].
[0039] The CNFLM module [102-1] is configured to create a CNF or individual
container network function components (CNFC) instances. The CNFLM module
[102-1] is configured to perform healing and scaling out of CNF’s or individual
15 CNFC’s.
[0040] The VLM [102-2] is a micro service. The VLM [102-2] is configured to
perform one of an instantiation, termination, or scaling in lifecycle management of
VNF instances.
20
[0041] The PEEGN [104] provides a network function virtualization (NFV) and
software defined network (SDN) platform functionality to support dynamic
requirements of resource management and network service orchestration in the
virtualized network. The NFV and SDN design function module [104] comprises a
25 VNF lifecycle manager (compute), a VNF catalogue, a network services catalogue,
a network slicing and service chaining manager, a physical and virtual resource
manager and a CNF lifecycle manager. The VNF lifecycle manager is responsible
for deciding on which server of the communication network, the microservice will
be instantiated. The VNF lifecycle manager may manage the overall flow of
30 incoming/outgoing requests during interaction with the user. The VNF lifecycle
12
manager is responsible for determining which sequence to be followed for
executing the process.
[0042] The PVIM module [106] is connected with the database [108] and one or
more resources associated with the 5 database [108]. Once the PVIM module [106]
receives the request from the PEEGN [104], the PVIM module [106] is configured
to add the resources consumed by the network function in used resources and
removing the resources from a free resource. The update is further sent to the
database [108].
10
[0043] In one implementation, the database [108] is a NoSQL database [108]. The
NoSQL database refers to a non-relational database. The non-relational database
stores data in a non-tabular form and is more flexible than a traditional, SQL-based
database structure. The database [108] is configured to store the consumed
15 resources and the free resources based on the update received from the PVIM
module [106].
[0044] FIG. 2 illustrates an exemplary block diagram of a computing device [200]
upon which the features of the present disclosure may be implemented in
20 accordance with exemplary implementation of the present disclosure. In an
implementation, the computing device [200] may also implement a method for
instantiation of at least one network function, utilising the system. In another
implementation, the computing device [200] itself implements the method for
instantiation of at least one network function, using one or more units configured
25 within the computing device [200], wherein said one or more units are capable of
implementing the features as disclosed in the present disclosure.
[0045] The computing device [200] may include a bus [202] or other
communication mechanism for communicating information, and a hardware
30 processor [204] coupled with bus [202] for processing information. The hardware
processor [204] may be, for example, a general-purpose microprocessor. The
13
computing device [200] may also include a main memory [206], such as a randomaccess
memory (RAM), or other dynamic storage device, coupled to the bus [202]
for storing information and instructions to be executed by the processor [204]. The
main memory [206] also may be used for storing temporary variables or other
intermediate information during execution 5 of the instructions to be executed by the
processor [204]. Such instructions, when stored in non-transitory storage media
accessible to the processor [204], render the computing device [200] into a specialpurpose
machine that is customized to perform the operations specified in the
instructions. The computing device [200] further includes a read only memory
10 (ROM) [208] or other static storage device coupled to the bus [202] for storing static
information and instructions for the processor [204].
[0046] A storage device [210], such as a magnetic disk, optical disk, or solid-state
drive is provided and coupled to the bus [202] for storing information and
15 instructions. The computing device [200] may be coupled via the bus [202] to a
display [212], such as a cathode ray tube (CRT), Liquid crystal Display (LCD),
Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for
displaying information to a computer user. An input device [214], including
alphanumeric and other keys, touch screen input means, etc. may be coupled to the
20 bus [202] for communicating information and command selections to the processor
[204]. Another type of user input device may be a cursor controller [216], such as
a mouse, a trackball, or cursor direction keys, for communicating direction
information and command selections to the processor [204], and for controlling
cursor movement on the display [212]. This input device typically has two degrees
25 of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow
the device to specify positions in a plane.
[0047] The computing device [200] may implement the techniques described
herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware
30 and/or program logic which in combination with the computing device [200] causes
or programs the computing device [200] to be a special-purpose machine.
14
According to one implementation, the techniques herein are performed by the
computing device [200] in response to the processor [204] executing one or more
sequences of one or more instructions contained in the main memory [206]. Such
instructions may be read into the main memory [206] from another storage medium,
such as the storage device [210]. Execution 5 of the sequences of instructions
contained in the main memory [206] causes the processor [204] to perform the
process steps described herein. In alternative implementations of the present
disclosure, hard-wired circuitry may be used in place of or in combination with
software instructions.
10
[0048] The computing device [200] also may include a communication interface
[218] coupled to the bus [202]. The communication interface [218] provides a twoway
data communication coupling to a network link [220] that is connected to a
local network [222]. For example, the communication interface [218] may be an
15 integrated services digital network (ISDN) card, cable modem, satellite modem, or
a modem to provide a data communication connection to a corresponding type of
telephone line. As another example, the communication interface [218] may be a
local area network (LAN) card to provide a data communication connection to a
compatible LAN. Wireless links may also be implemented. In any such
20 implementation, the communication interface [218] sends and receives electrical,
electromagnetic or optical signals that carry digital data streams representing
various types of information.
[0049] The computing device [200] can send messages and receive data, including
25 program code, through the network(s), the network link [220] and the
communication interface [218]. In the Internet example, a server [230] might
transmit a requested code for an application program through the Internet [228], the
ISP [226], the local network [222], the host [224] and the communication interface
[218]. The received code may be executed by the processor [204] as it is received,
30 and/or stored in the storage device [210], or other non-volatile storage for later
execution.
15
[0050] The present disclosure is implemented by a system [300] (as shown in FIG.
3). In an implementation, the system [300] may include the computing device [200]
(as shown in FIG. 2). It is further noted that the computing device [200] is able to
5 perform the steps of a method [400] (as shown in FIG. 4).
[0051] Referring to FIG. 3, an exemplary block diagram of a system [300] for
instantiation of at least one network function is shown, in accordance with the
exemplary implementations of the present disclosure. The system [300] comprises
10 at least one transceiver unit [302], at least one processing unit [304] and at least one
storage unit [306]. Also, all of the components/ units of the system [300] are
assumed to be connected to each other unless otherwise indicated below. As shown
in FIG. 3, all units shown within the system [300] should also be assumed to be
connected to each other. Also, in FIG. 3 only a few units are shown, however, the
15 system [300] may comprise multiple such units or the system [300] may comprise
any such numbers of said units, as required to implement the features of the present
disclosure. Further, in an implementation, the system [300] may be present in a user
device to implement the features of the present disclosure. The system [300] may
be a part of the user device / or may be independent of but in communication with
20 the user device (may also referred herein as a UE). In another implementation, the
system [300] may reside in a server or a network entity. In yet another
implementation, the system [300] may reside partly in the server/ network entity
and partly in the user device.
25 [0052] The system [300] is configured for instantiation of at least one network
function, with the help of the interconnection between the components/units of the
system [300]. The instantiation refers to a process of creation of an instance of the
at least one network function. The instance of the at least one network function
refers to an implementation of a network function. For example, in VNFs, the
30 instances are virtual and run on a virtual machine and not on a hardware.
16
[0053] The at least one network function comprises at least one of container
network functions (CNFs), and virtual network functions (VNFs). The CNFs refer
to cloud native network functions that operate in a container. The VNFs refer to a
virtualized form of tasks where the tasks may be earlier carried out by a dedicated
5 hardware.
[0054] In one implementation, the lifecycle manager (LM) module [102] sends a
request. The request is to fetch a set of resources required for the at least one
network function. In one example, the request is for instantiation of the CNF. In
10 another example, the request may be for instantiation of the VNF. The instantiation
may be based at least on a predetermined policy. The set of resources refer to
availability of resources for instantiation of the network function at a host. The set
of resources facilitate in determining if the hosts are available to instantiate the at
least one network function. The set of resources includes at least one free resource
15 and at least one used resource. The “free resource” herein refers to a resource
available to perform the instantiation of the at least one network function. The “used
resource” herein refers to a resource not available to perform the instantiation of the
at least one network function.
20 [0055] The predetermined policy is defined as a set of predefined rules to select an
appropriate resource from the set of resources where the instantiation of the network
function may be performed. The predetermined policy ensures that the selected
resource operates efficiently and does not interfere in the instantiation of the
network function. The predetermined policy includes but may not be limited to
25 checking a resource availability of each of the resource from the set of resources,
checking proximity of location of each of the resource, proper load balancing at
each of the resource from the set of resources, and the like. The resource availability
ensures that the selected resource has sufficient memory and storage to support the
at least one network function. The proximity of location refers to checking the
30 distance of each of the resources from the user, to select the resources that are
geographically closer to the user to reduce latency. The load balancing check refers
17
to checking if distribution of workload is even across the set of resources, so that
the selected resource does not become a bottleneck and interrupt with the
instantiation.
[0056] In one implementation, the 5 LM module [102] is configured to receive the
request from a user interface (UI). For example, a user may send the request via the
UI. The user may be one of a system operator or a network operator. If the request
is for the instantiation of the CNF, the transceiver unit [302] receives the request
from the CNFLM [102-1]. In another example, if the request is for the instantiation
10 of the VNF, the transceiver unit [102-2] receives the request from the VLM [102-
2].
[0057] In a nutshell, the transceiver unit [302] at the policy execution engine
(PEEGN) [104] is configured to receive the request from the LM module [102].
15
[0058] Based on the request received from the LM module [102], the processing
unit [304] is configured to query the physical virtual inventory manager (PVIM)
module [106] to retrieve the set of resources and a region data related to the at least
one network function. The region data herein refers to information that is specific
20 to a particular geographical area or region within a network. The region data
includes but may not be limited to one of a site detail information, a pod detail
information, a required configuration information, a maximum number of instances
information, and combinations thereof.
25 [0059] In one example, the set of resources and the region data to be retrieved from
the PVIM module [106] may be stored in the storage unit [306].
[0060] The site detail information herein refers to information about a physical or
virtual location where network resources are deployed. The site detail information
30 includes but may not be limited to geographical coordinates of the location in case
of physical location. The pod detail information herein refers to a set of computers
18
linked by one or more networks in a single unit. The required configuration
information herein may refer to specification and settings necessary for operation
of at least one network function. In one example, the required configuration
information includes internet protocol (IP) address, routing configuration, and the
like. The maximum number of instances 5 information herein includes an upper limit
of number of instances that can be deployed on the at least one network. In one
example, the PVIM module [106] is configured to store the set of resources and
region information.
10 [0061] The processing unit [304] at the PEEGN [104], is configured to select at
least one host for instantiation of the at least one network function. The selection is
performed based on at least one of the retrieved set of resources and the
predetermined policy. Based on the predefined policy (i.e., predetermined policy),
the processing unit [304] selects the appropriate host where the instantiation of the
15 at least one network function may be performed. The predefined policy includes
checking the resource availability of each of the resource from the set of resources,
proximity of location of each of the resource, proper load balancing at each of the
resource from the set of resources, and the like. The system [300] ensures that the
host is selected based on the requirements of the at least one network function and
20 based on accurate information of the set of hosts and configuration associated with
the set of hosts.
[0062] Referring to FIG. 4, an exemplary method flow diagram [400] for
instantiation of at least one network function, in accordance with exemplary
25 implementations of the present disclosure is shown. In an implementation, the
method [400] is performed by the system [300]. Further, in an implementation, the
system [300] may be present in a server device to implement the features of the
present disclosure. Also, as shown in FIG. 4, the method [400] starts at step [402].
30 [0063] The at least one network function comprises at least one of container
network functions (CNFs), and virtual network functions (VNFs). The CNFs refers
19
to cloud native network functions that operate in a container. The VNFs refers to a
virtualized form of tasks where the tasks may be earlier carried out by a dedicated
hardware.
[0064] At step [404], the method comprises receiving, 5 by the transceiver unit [302]
at the policy execution engine (PEEGN) [104], the request for fetching a set of
resources required for instantiation of the at least one network function based at
least on the predetermined policy. The request is received from the lifecycle
manager (LM) module [102].
10
[0065] In one example, the request is for instantiation of the CNF. In another
example, the request may be for instantiation of the VNF. The instantiation may be
based at least on a predetermined policy. The set of resources refers to availability
of resources for instantiation of the network function at a host. The set of resources
15 determine if the hosts are available to instantiate the at least one network function.
[0066] The predetermined policy includes but may not be limited checking a
resource availability of each of the resource from the set of resources, checking
proximity of location of each of the resource, proper load balancing at each of the
20 resource from the set of resources, and the like. The resource availability ensures
that the selected resource has sufficient memory and storage to support the at least
one network function. The proximity of location refers to checking each of the
resources to select the resources are geographically closer to the user to reduce
latency. The load balancing check refers to distributing workload evenly across the
25 set of resources to prevent a single resource from becoming a bottleneck.
[0067] In one example, the LM module [102] is configured to receive the request
generated from the user interface (UI). In an example, the UI is a Command Line
Interface (CLI). In another example, the UI is a Graphical User Interface (GUI).
30 The user may send the request via the UI. The user may be one of a system operator
or a network operator. If the request is for the instantiation of the CNF, the
20
transceiver unit [302] receives the request from the CNFLM [102-1]. In another
example, if the request is for the instantiation of the VNF, the transceiver unit [102-
2] receives the request from the VLM [102-2].
[0068] 5 At step [406], the method comprises querying, by the processing unit [304]
at the PEEGN [104], the physical virtual inventory manager (PVIM) module [106]
for retrieving the set of resources, and the region data related to the at least one
network function. The region data refers to information that is specific to a
particular geographical area or region within the network.
10
[0069] Next, at step [408], the method comprises selecting, by the processing unit
[304] at the PEEGN [104], at least one host for instantiation of the at least one
network function, based on at least one of the retrieved set of resources and the
predetermined policy. The processing unit [304] selects the appropriate host where
15 the instantiation of the at least one network function may be performed. The method
[400] ensures that the host is selected based on the requirements of the at least one
network function and based on accurate information of the set of hosts and
configuration associated with the set of hosts.
20 [0070] The method terminates at step [410].
[0071] Referring to FIG.5, an exemplary flow diagram depicting the method for
instantiation of at least one network function, in accordance with exemplary
implementations of the present disclosure, is shown. The method [500] starts at step
25 [502].
[0072] At step [504], the user may initiate a trigger and send the request via a user
interface (UI) [502], to fetch a set of resources required for instantiation of the at
least one network function. The instantiation refers to a process of creation of an
30 instance of the at least one network function. The at least one network function
comprises at least one of container network functions (CNFs), and virtual network
21
functions (VNFs). The request may be sent by the UI [502] to one of the CNFLM
[102-1] or the VLM [102-2]. In one example, if the instantiation of the CNF is
triggered, the UI [502] may send the request at the CNFLM [102-1]. In another
example, if the instantiation of the VNF is triggered, the UI [502] may send the
5 request at the VLM [102-2].
[0073] At step [504], the request to retrieve the set of resources and the region data
may be sent to the PEEGN [104] from one of the CNFLM [102-1] or the VLM
[102-2]. In one example, if the instantiation of the CNF is triggered, the CNFLM
10 [102-1] sends the request to the PEEGN [104]. In another example, if the
instantiation of the VNF is triggered, the VLM [102-2] sends the request to the
PEEGN [104].
[0074] Further, at step [506], the request is forwarded to the PVIM [106] to fetch
15 the set of resources and the region data. The region data includes but may not be
limited to one of the site detail information, the pod detail information, the required
configuration information, the maximum number of instances information, and
combinations thereof.
20 [0075] Further, at step [508], based on the request, the PVIM [106] may fetch the
set of resources and the region data stored in the database [108]. In one example,
the set of resources and the region data is stored at the database [108], where the
database [108] is communicably coupled with the PVIM [106]. The set of resources
includes at least one free resource and at least one used resource. The at least one
25 free resource refers to a resource available to perform an instantiation of the at least
one network function. The at least one used resource refers to a resource not
available to perform the instantiation of the at least one network function.
[0076] Further at step [510], the PEEGN [104] receives the set of resources and the
30 region data from the PVIM [106] as a response. Based on the predefined policy, the
PEEGN [104] selects the appropriate host where the instantiation of the at least one
22
network function may be performed. The predefined policy includes checking the
resource availability of each of the resource from the set of resources, proximity of
location of each of the resource, proper load balancing at each of the resource from
the set of resources, and the like. The implementation method [500] ensures that the
host is selected based on the requirements 5 of the at least one network function and
based on accurate information of the set of hosts and configuration associated with
the set of hosts.
[0077] The present disclosure further discloses a non-transitory computer readable
10 storage medium storing instructions for instantiation of at least one network
function, the instructions include executable code which, when executed by one or
more units of a system, cause a transceiver unit [302] to receive, at a policy
execution engine (PEEGN) [104], from a lifecycle manager (LM) module [102], a
request to fetch a set of resources required for instantiation of the at least one
15 network function based at least on a predetermined policy. The instructions when
executed by the system further cause a processing unit [304] to query, at the PEEGN
[104], a physical virtual inventory manager (PVIM) module [106] to retrieve the
set of resources, and a region data related to the at least one network function. The
instructions when executed by the system further cause the processing unit [304] to
20 select, at the PEEGN [104], at least one host for instantiation of the at least one
network function based on at least one of the retrieved set of resources and the
predetermined policy.
[0078] As is evident from the above, the present disclosure provides a technically
25 advanced solution for instantiation of at least one network function. The present
solution provides a method and system for instantiation of at least one network
function. The present disclosure further provides a system and a method for sharing
information of hosts from an inventory that helps providing the proper hosts
information with required configuration. Further, the present disclosure to provide
30 a solution that helps policy execution microservice to decide correctively about the
hosts where CNFC’s need to be instantiated.
23
[0079] While considerable emphasis has been placed herein on the disclosed
implementations, it will be appreciated that many implementations can be made and
that many changes can be made to the implementations without departing from the
principles of the present disclosure. 5 These and other changes in the implementations
of the present disclosure will be apparent to those skilled in the art, whereby it is to
be understood that the foregoing descriptive matter to be implemented is illustrative
and non-limiting.
10 [0080] Further, in accordance with the present disclosure, it is to be acknowledged
that the functionality described for the various components/units can be
implemented interchangeably. While specific embodiments may disclose a
particular functionality of these units for clarity, it is recognized that various
configurations and combinations thereof are within the scope of the disclosure. The
15 functionality of specific units as disclosed in the disclosure should not be construed
as limiting the scope of the present disclosure. Consequently, alternative
arrangements and substitutions of units, provided they achieve the intended
functionality described herein, are considered to be encompassed within the scope
of the present disclosure.
20
24
We Claim:
1. A method for instantiation of at least one network function, the method
comprising:
- receiving, by a transceiver unit 5 [302] at a policy execution engine
(PEEGN) [104], from a lifecycle manager (LM) module, a request for
fetching a set of resources required for instantiation of the at least one
network function, based at least on a predetermined policy;
- querying, by a processing unit [304] at the PEEGN [104], a physical
10 virtual inventory manager (PVIM) module [106] for retrieving the set of
resources, and a region data related to the at least one network function;
and
- selecting, by the processing unit [304] at the PEEGN [104], at least one
host for instantiation of the at least one network function, based on at
15 least one of the retrieved set of resources and the predetermined policy.
2. The method as claimed in claim 1, wherein the at least one network function
comprises at least one of container network functions (CNFs), and virtual
network functions (VNFs).
20
3. The method as claimed in claim 1, wherein the LM module [102] receives
a request for instantiation of the at least one network function from a user
interface (UI).
25 4. The method as claimed in claim 1, wherein the region data comprises at
least one of a site detail information, a pod detail information, a required
configuration information, a maximum number of instances information,
and combinations thereof.
25
5. A system for instantiating at least one network function, the system
comprising:
- a transceiver unit [302] configured to receive, at a policy execution
engine (PEEGN) [104], from a lifecycle manager (LM) module [102], a
request to fetch a set of resources 5 required for instantiation of the at least
one network function based at least on a predetermined policy; and
- a processing unit [304] configured to:
- query, at the PEEGN [104], a physical virtual inventory manager
(PVIM) module [106] to retrieve the set of resources, and a region
10 data related to the at least one network function; and
- select, at the PEEGN [104], at least one host for instantiation of the
at least one network function based on at least one of the retrieved
set of resources and the predetermined policy.
15 6. The system as claimed in claim 5, wherein the at least one network function
comprises at least one of container network functions (CNFs), and virtual
network functions (VNFs).
7. The system as claimed in claim 5, wherein the LM module [102] is
20 configured to receive a request for instantiation of at least the network
function from a user interface (UI).
8. The system as claimed in claim 5, wherein the region data comprises at least
one of a site detail information, a pod detail information, a required
25 configuration information, a maximum number of instances information,
and combinations thereof.

Documents

Application Documents

# Name Date
1 202321063289-STATEMENT OF UNDERTAKING (FORM 3) [20-09-2023(online)].pdf 2023-09-20
2 202321063289-PROVISIONAL SPECIFICATION [20-09-2023(online)].pdf 2023-09-20
3 202321063289-POWER OF AUTHORITY [20-09-2023(online)].pdf 2023-09-20
4 202321063289-FORM 1 [20-09-2023(online)].pdf 2023-09-20
5 202321063289-FIGURE OF ABSTRACT [20-09-2023(online)].pdf 2023-09-20
6 202321063289-DRAWINGS [20-09-2023(online)].pdf 2023-09-20
7 202321063289-Proof of Right [12-01-2024(online)].pdf 2024-01-12
8 202321063289-FORM-5 [20-09-2024(online)].pdf 2024-09-20
9 202321063289-ENDORSEMENT BY INVENTORS [20-09-2024(online)].pdf 2024-09-20
10 202321063289-DRAWING [20-09-2024(online)].pdf 2024-09-20
11 202321063289-CORRESPONDENCE-OTHERS [20-09-2024(online)].pdf 2024-09-20
12 202321063289-COMPLETE SPECIFICATION [20-09-2024(online)].pdf 2024-09-20
13 202321063289-Request Letter-Correspondence [08-10-2024(online)].pdf 2024-10-08
14 202321063289-Power of Attorney [08-10-2024(online)].pdf 2024-10-08
15 202321063289-FORM 3 [08-10-2024(online)].pdf 2024-10-08
16 202321063289-Form 1 (Submitted on date of filing) [08-10-2024(online)].pdf 2024-10-08
17 202321063289-Covering Letter [08-10-2024(online)].pdf 2024-10-08
18 202321063289-CERTIFIED COPIES TRANSMISSION TO IB [08-10-2024(online)].pdf 2024-10-08
19 Abstract.jpg 2024-10-18
20 202321063289-ORIGINAL UR 6(1A) FORM 1 & 26-070125.pdf 2025-01-14