Sign In to Follow Application
View All Documents & Correspondence

Method And System For Alarm Management In A Wireless Communication Network

Abstract: The present disclosure relates to a method and a system for alarm management in a wireless communication network. The method comprises determining, by a processing unit [302], a channel connectivity failure between a standby network function (SNF) and the ANF. The method comprises generating, by an alarm generating unit [304], an alarm for the determined channel connectivity failure. The method comprises re-establishing, by an establishing unit [306], a channel connectivity between the SNF and the ANF. The method comprises initiating, by the processing unit [302], a timer for a pre-defined time period based on the re-establishing of the channel connectivity. The method comprises clearing, by the alarm clearing unit [308] at the ANF, the generated alarm upon expiry of the pre-defined time period. [FIG. 4]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
25 September 2023
Publication Number
07/2025
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2025-10-17
Renewal Date

Applicants

Jio Platforms Limited
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Inventors

1. Aayush Bhatnagar
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
2. Mukta Bhaskar Shetty
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
3. Alok Bhaskar
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
4. Sanjeev Singh
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
5. Gaurav Narayan
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
6. Bakul Choudhary
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.

Specification

FORM 2
THE PATENTS ACT, 1970
(39 OF 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR ALARM MANAGEMENT IN A
WIRELESS COMMUNICATION NETWORK”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre Point,
Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is
to be performed.
2
METHOD AND SYSTEM FOR ALARM MANAGEMENT IN A WIRELESS
COMMUNICATION NETWORK
TECHNICAL FIELD
5
[0001] Embodiments of the present disclosure generally relate to network performance
management systems. More particularly, embodiments of the present disclosure relate to alarm
management in a wireless communication network.
10 BACKGROUND
[0002] The following description of the related art is intended to provide background
information pertaining to the field of the disclosure. This section may include certain aspects
of the art that may be related to various features of the present disclosure. However, it should
15 be appreciated that this section is used only to enhance the understanding of the reader with
respect to the present disclosure, and not as an admission of the prior art.
[0003] Wireless communication technology has rapidly evolved over the past few decades,
with each generation bringing significant improvements and advancements. The first
20 generation of wireless communication technology was based on analog technology and offered
only voice services. However, with the advent of the second-generation (2G) technology,
digital communication and data services became possible, and text messaging was introduced.
3G technology marked the introduction of high-speed internet access, mobile video calling,
and location-based services. The fourth-generation (4G) technology revolutionized wireless
25 communication with faster data speeds, better network coverage, and improved security.
Currently, the fifth-generation (5G) technology is being deployed, promising even faster data
speeds, low latency, and the ability to connect multiple devices simultaneously. With each
generation, wireless communication technology has become more advanced, sophisticated, and
capable of delivering more services to its users.
30
[0004] The 5G communication network deploys a Service-Based Architecture (hereinafter
called as SBA). Within the intricate fabric of 5G Network Functions (hereinafter called as NFs)
that encompass essential entities like the Policy Control Function (hereinafter called as PCF),
Charging Function (hereinafter called as CHF), Binding Support Function (hereinafter called
3
as BSF), Network Repository Function (hereinafter called as NRF), a sophisticated framework
is established to guarantee seamless data availability. This resilience is achieved through the
integration of Replication Channels (hereinafter called as RPC) within each of these NFs,
thereby ensuring the consistent presence of critical data across redundant instances.
5
[0005] Further, the RPCs facilitate communication between the active and standby instances
of the NFs. In scenarios where an RPC channel disrupts, the active NF initiates an alarm to
Network Management System (hereinafter called as NMS) to notify that the standby NF has
gone down. Upon the re-establishment of the connection between the active NF and standby
10 NF, the active NF clears the previously raised alarm that signifies the successful resolution of
the discontinuity of the RPC.
[0006] However, when the standby NF experiences frequent restarts, a cascading effect of
alarms invoked by the active NFs signifying disconnection of the RPCs could potentially flood
15 the system.
[0007] Thus, there exists an imperative need in the art to overcome the above-mentioned
scenario. This can be done by mitigating the alarm flooding with the help of a measured
approach to alarm generation by the active NF. Therefore, the present invention proposes a
20 system and method for alarm management by making the active NF wait for the pre-defined
period and refraining the active NF from invoking further fresh alarms till the pre-defined
period has passed.
SUMMARY
25
[0008] This section is provided to introduce certain aspects of the present disclosure in a
simplified form that are further described below in the detailed description. This summary is
not intended to identify the key features or the scope of the claimed subject matter.
30 [0009] An aspect of the present disclosure may relate to a method for alarm management in a
wireless communication network. The method comprises determining, by a processing unit at
an active network function (ANF), a channel connectivity failure between a standby network
function (SNF) and the ANF. Further, the method comprises generating, by an alarm generating
unit at the ANF, an alarm for the determined channel connectivity failure. Furthermore, the
4
method comprises re-establishing, by an establishing unit at the ANF, a channel connectivity
between the SNF and the ANF. Hereinafter, the method comprises initiating, by the processing
unit at the ANF, a timer for a pre-defined time period based on the re-establishing of the channel
connectivity. The method further comprises clearing, by the alarm clearing unit at the ANF,
5 the generated alarm upon expiry of the pre-defined time period.
[0010] In an exemplary aspect of the present disclosure, the method further comprises sending,
by a transmitting unit at the ANF, the alarm to notify a network management system (NMS)
about down time of the SNF.
10
[0011] In an exemplary aspect of the present disclosure, the alarm is cleared by the alarm
clearing unit at the ANF based on the channel connectivity between the SNF and the ANF.
[0012] In an exemplary aspect of the present disclosure, the alarm clearance comprises
15 sending, by the transmitting unit at the ANF, the cleared alarm to notify a network management
system (NMS) about establishment of channel connectivity between the ANF and the SNF.
[0013] In an exemplary aspect of the present disclosure, the channel connectivity failure
between the SNF and the ANF is based on an operational state of the SNF.
20
[0014] In an exemplary aspect of the present disclosure, a communication between the SNF
and the ANF is facilitated via a replication channel (RPC).
[0015] In an exemplary aspect of the present disclosure, during the pre-defined time period if
25 a subsequent channel connectivity failure is determined between the SNF and the ANF, the
method further comprises suppressing, by the processing unit at the ANF, the alarm for the
determined subsequent channel connectivity failure.
[0016] In an exemplary aspect of the present disclosure, after the pre-defined time period if the
30 subsequent channel connectivity failure is determined between the SNF and the ANF, the
method further comprises generating, by the alarm generating unit, the alarm.
[0017] Another aspect of the present disclosure may relate to a system for alarm management
in a wireless communication network. The system comprises an active network function
5
network (ANF). The ANF comprises a processing unit configured to determine a channel
connectivity failure between a standby network function (SNF) and the ANF. The ANF further
comprises an alarm generating unit configured to generate an alarm for the determined channel
connectivity failure. The ANF further comprises an establishing unit configured to re-establish
5 a channel connectivity between the SNF and the ANF. Further, the processing unit is
configured to initiate at the ANF a timer for a pre-defined time period. The ANF further
comprises an alarm clearing unit configured to clear the generated alarm based on the channel
connectivity upon expiry of the pre-defined time period.
10 [0018] Yet another aspect of the present disclosure may relate to a non-transitory computer
readable storage medium storing instructions for alarm management in a wireless
communication network, the instructions include executable code which, when executed by
one or more units of a system cause a processing unit to determine a channel connectivity
failure between a standby network function (SNF) and the ANF. The instructions when
15 executed by the system further cause an alarm generating unit to generate an alarm for the
determined channel connectivity failure. The instructions when executed by the system further
cause an establishing unit to re-establish a channel connectivity between the SNF and the ANF.
The instructions when executed by the system further cause the processing unit to initiate at
the ANF a timer for a pre-defined time period. The instructions when executed by the system
20 further cause an alarm clearing unit to clear the generated alarm based on the channel
connectivity upon expiry of the pre-defined time period.
OBJECTS OF THE INVENTION
25 [0019] Some of the objects of the present disclosure, which at least one embodiment disclosed
herein satisfies are listed herein below.
[0020] It is an object of the present disclosure to provide a system and method for alarm
management in a 5G communication network.
30
[0021] It is an object of the present disclosure to provide a system and method for handling
alarm flooding in a 5G communication network.
6
[0022] It is another object of the present disclosure for better integration of the RPCs in the
realm of modern network management.
[0023] It is yet another object of the present disclosure to address the problem of race around
5 condition and prevent alarm flooding.
[0024] It is yet another object of the present disclosure to provide a balanced approach for
optimized alarm generation to reflect genuine issues while curbing the risk of systematic alarm
flooding.
10
[0025] It is yet another object of the present disclosure to provide seamless data availability
enabled by replication channels within the 5G NFs thereby safeguarding critical data across
redundant instances.
15 DESCRIPTION OF THE DRAWINGS
[0026] The accompanying drawings, which are incorporated herein, and constitute a part of
this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in
which like reference numerals refer to the same parts throughout the different drawings.
20 Components in the drawings are not necessarily to scale, emphasis instead being placed upon
clearly illustrating the principles of the present disclosure. Also, the embodiments shown in the
figures are not to be construed as limiting the disclosure, but the possible variants of the method
and system according to the disclosure are illustrated herein to highlight the advantages of the
disclosure. It will be appreciated by those skilled in the art that disclosure of such drawings
25 includes disclosure of electrical components or circuitry commonly used to implement such
components.
[0027] FIG. 1 illustrates an exemplary block diagram representation of 5th generation core
(5GC) network architecture.
30
[0028] FIG. 2 illustrates an exemplary block diagram of a computing device upon which the
features of the present disclosure may be implemented in accordance with exemplary
implementation of the present disclosure.
7
[0029] FIG. 3 illustrates an exemplary block diagram of a system for alarm management in a
wireless communication network, in accordance with exemplary implementations of the
present disclosure.
5 [0030] FIG. 4 illustrates a method flow diagram for alarm management in a wireless
communication network, in accordance with exemplary implementations of the present
disclosure.
[0031] FIG. 5 illustrates a block diagram for implementation of an alarm management in a
10 wireless communication network, in accordance with exemplary implementations of the
present disclosure.
[0032] FIG. 6 illustrates an implementation of the method for alarm management in a wireless
communication network, in accordance with exemplary implementations of the present
15 disclosure.
[0033] The foregoing shall be more apparent from the following more detailed description of
the disclosure.
20 DETAILED DESCRIPTION
[0034] In the following description, for the purposes of explanation, various specific details
are set forth in order to provide a thorough understanding of embodiments of the present
disclosure. It will be apparent, however, that embodiments of the present disclosure may be
25 practiced without these specific details. Several features described hereafter may each be used
independently of one another or with any combination of other features. An individual feature
may not address any of the problems discussed above or might address only some of the
problems discussed above.
30 [0035] The ensuing description provides exemplary embodiments only, and is not intended to
limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description
of the exemplary embodiments will provide those skilled in the art with an enabling description
for implementing an exemplary embodiment. It should be understood that various changes may
8
be made in the function and arrangement of elements without departing from the spirit and
scope of the disclosure as set forth.
[0036] Specific details are given in the following description to provide a thorough
5 understanding of the embodiments. However, it will be understood by one of ordinary skills in
the art that the embodiments may be practiced without these specific details. For example,
circuits, systems, processes, and other components may be shown as components in block
diagram form in order not to obscure the embodiments in unnecessary detail.
10 [0037] Also, it is noted that individual embodiments may be described as a process which is
depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block
diagram. Although a flowchart may describe the operations as a sequential process, many of
the operations may be performed in parallel or concurrently. In addition, the order of the
operations may be re-arranged. A process is terminated when its operations are completed but
15 could have additional steps not included in a figure.
[0038] The word “exemplary” and/or “demonstrative” is used herein to mean serving as an
example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed
herein is not limited by such examples. In addition, any aspect or design described herein as
20 “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or
advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary
structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent
that the terms “includes,” “has,” “contains,” and other similar words are used in either the
detailed description or the claims, such terms are intended to be inclusive—in a manner similar
25 to the term “comprising” as an open transition word—without precluding any additional or
other elements.
[0039] As used herein, a “processing unit” or “processor” or “operating processor” includes
one or more processors, wherein processor refers to any logic circuitry for processing
30 instructions. A processor may be a general-purpose processor, a special purpose processor, a
conventional processor, a digital signal processor, a plurality of microprocessors, one or more
microprocessors in association with a (Digital Signal Processing) DSP core, a controller, a
microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array
circuits, any other type of integrated circuits, etc. The processor may perform signal coding
9
data processing, input/output processing, and/or any other functionality that enables the
working of the system according to the present disclosure. More specifically, the processor or
processing unit is a hardware processor.
5 [0040] As used herein, “a user equipment”, “a user device”, “a smart-user-device”, “a smartdevice”, “an electronic device”, “a mobile device”, “a handheld device”, “a wireless
communication device”, “a mobile communication device”, “a communication device” may
be any electrical, electronic and/or computing device or equipment, capable of implementing
the features of the present disclosure. The user equipment/device may include, but is not limited
10 to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital
assistant, tablet computer, wearable device or any other computing device which is capable of
implementing the features of the present disclosure. Also, the user device may contain at least
one input means configured to receive an input from at least one of a transceiver unit, a
processing unit, a storage unit, a detection unit and any other such unit(s) which are required
15 to implement the features of the present disclosure.
[0041] As used herein, “storage unit” or “memory unit” refers to a machine or computerreadable medium including any mechanism for storing information in a form readable by a
computer or similar machine. For example, a computer-readable medium includes read-only
20 memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical
storage media, flash memory devices or other types of machine-accessible storage media. The
storage unit stores at least the data that may be required by one or more units of the system to
perform their respective functions.
25 [0042] As used herein “interface” or “user interface” refers to a shared boundary across which
two or more separate components of a system exchange information or data. The interface may
also be referred to a set of rules or protocols that define communication or interaction of one
or more modules or one or more units with each other, which also includes the methods,
functions, or procedures that may be called.
30
[0043] All modules, units, components used herein, unless explicitly excluded herein, may be
software modules or hardware processors, the processors being a general-purpose processor, a
special purpose processor, a conventional processor, a digital signal processor (DSP), a
plurality of microprocessors, one or more microprocessors in association with a DSP core, a
10
controller, a microcontroller, Application Specific Integrated Circuits (ASIC), Field
Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc.
[0044] As used herein the transceiver unit includes at least one receiver and at least one
5 transmitter configured respectively for receiving and transmitting data, signals, information, or
a combination thereof between units/components within the system and/or connected with the
system.
[0045] As discussed in the background section, the current known solutions have several
10 shortcomings. The present disclosure aims to overcome the above-mentioned and other
existing problems in this field of technology by providing a method and system of alarm
management in a wireless communication network.
[0046] FIG. 1 illustrates an exemplary block diagram representation of 5th generation core
15 (5GC) network architecture, in accordance with exemplary implementation of the present
disclosure. As shown in FIG. 1, the 5GC network architecture [100] includes a user equipment
(UE) [102], a radio access network (RAN) [104], an access and mobility management function
(AMF) [106], a Session Management Function (SMF) [108], a Service Communication Proxy
(SCP) [110], an Authentication Server Function (AUSF) [112], a Network Slice Specific
20 Authentication and Authorization Function (NSSAAF) [114], a Network Slice Selection
Function (NSSF) [116], a Network Exposure Function (NEF) [118], a Network Repository
Function (NRF) [120], a Policy Control Function (PCF) [122], a Unified Data Management
(UDM) [124], an application function (AF) [126], a user plane function (UPF) [128], a data
network (DN) [130], wherein all the components are assumed to be connected to each other in
25 a manner as obvious to the person skilled in the art for implementing features of the present
disclosure.
[0047] The radio access network (RAN) [104] is the part of a mobile telecommunications
system that connects user equipment (UE) [102] to the core network (CN) and provides access
30 to different types of networks (e.g., 5G network). It consists of radio base stations and the radio
access technologies that enable wireless communication.
[0048] The Access and mobility management function (AMF) [106] is a 5G core network
function responsible for managing access and mobility aspects, such as UE registration,
11
connection, and reachability. It also handles mobility management procedures like handovers
and paging.
[0049] The Session Management Function (SMF) [108] is a 5G core network function
5 responsible for managing session-related aspects, such as establishing, modifying, and
releasing sessions. It coordinates with the User Plane Function (UPF) for data forwarding and
handles IP address allocation and QoS enforcement.
[0050] The Service Communication Proxy (SCP) [110] is a network function in the 5G core
10 network that facilitates communication between other network functions by providing a secure
and efficient messaging service. It acts as a mediator for service-based interfaces.
[0051] The Authentication Server Function (AUSF) [112] is a network function in the 5G core
responsible for authenticating UEs during registration and providing security services. It
15 generates and verifies authentication vectors and tokens.
[0052] The Network Slice Specific Authentication and Authorization Function (NSSAAF)
[114] is a network function that provides authentication and authorization services specific to
network slices. It ensures that UEs can access only the slices for which they are authorized.
20
[0053] The Network Slice Selection Function (NSSF) [116] is a network function responsible
for selecting the appropriate network slice for a UE based on factors such as subscription,
requested services, and network policies.
25 [0054] The Network Exposure Function (NEF) [118] is a network function that exposes
capabilities and services of the 5G network to external applications, enabling integration with
third-party services and applications.
[0055] The Network Repository Function (NRF) [120] is a network function that acts as a
30 central repository for information about available network functions and services. It facilitates
the discovery and dynamic registration of network functions.
12
[0056] The Policy Control Function (PCF) [122] is a network function responsible for policy
control decisions, such as QoS, charging, and access control, based on subscriber information
and network policies.
5 [0057] The Unified Data Management (UDM) [124] is a network function that centralizes the
management of subscriber data, including authentication, authorization, and subscription
information.
[0058] The application function (AF) [126] is a network function that represents external
10 applications interfacing with the 5G core network to access network capabilities and services.
[0059] The user plane function (UPF) [128] is a network function responsible for handling user
data traffic, including packet routing, forwarding, and QoS enforcement.
15 [0060] The data network (DN) [130] refers to a network that provides data services to user
equipment (UE) in a telecommunications system. The data services may include but are not
limited to Internet services, private data network related services.
[0061] FIG. 2 illustrates an exemplary block diagram of a computing device [200] upon which
20 the features of the present disclosure may be implemented in accordance with exemplary
implementation of the present disclosure. In an implementation, the computing device [200]
may also implement a method for alarm management in a wireless communication network
utilising the system. In another implementation, the computing device [200] itself implements
the method for alarm management in a wireless communication network, using one or more
25 units configured within the computing device [200], wherein said one or more units are capable
of implementing the features as disclosed in the present disclosure.
[0062] The computing device [200] may include a bus [202] or other communication
mechanism for communicating information, and a processor [204] coupled with the bus [202]
30 for processing information. The processor [204] may be, for example, a general-purpose
microprocessor. The computing device [200] may also include a main memory [206], such as
a random access memory (RAM), or other dynamic storage device, coupled to the bus [202]
for storing information and instructions to be executed by the processor [204]. The main
memory [206] also may be used for storing temporary variables or other intermediate
13
information during execution of the instructions to be executed by the processor [204]. Such
instructions, when stored in non-transitory storage media accessible to the processor [204],
render the computing device [200] into a special-purpose machine that is customized to
perform the operations specified in the instructions. The computing device [200] further
5 includes a read only memory (ROM) [208] or other static storage device coupled to the bus
[202] for storing static information and instructions for the processor [204].
[0063] A storage device [210], such as a magnetic disk, optical disk, or solid-state drive is
provided and coupled to the bus [202] for storing information and instructions. The computing
10 device [200] may be coupled via the bus [202] to a display [212], such as a cathode ray tube
(CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED
(OLED) display, etc. for displaying information to a computer user. An input device [214],
including alphanumeric and other keys, touch screen input means, etc. may be coupled to the
bus [202] for communicating information and command selections to the processor [204].
15 Another type of user input device may be a cursor controller [216], such as a mouse, a trackball,
or cursor direction keys, for communicating direction information and command selections to
the processor [204], and for controlling cursor movement on the display [212]. This input
device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis
(e.g., y), that allow the device to specify positions in a plane.
20
[0064] The computing device [200] may implement the techniques described herein using
customized hard-wired logic, one or more ASICs or FPGAs, firmware, and/or program logic
which in combination with the computing device [200] causes or programs the computing
device [200] to be a special-purpose machine. According to one implementation, the techniques
25 herein are performed by the computing device [200] in response to the processor [204]
executing one or more sequences of one or more instructions contained in the main memory
[206]. Such instructions may be read into the main memory [206] from another storage
medium, such as the storage device [210]. Execution of the sequences of instructions contained
in the main memory [206] causes the processor [204] to perform the process steps described
30 herein. In alternative implementations of the present disclosure, hard-wired circuitry may be
used in place of or in combination with software instructions.
[0065] The computing device [200] also may include a communication interface [218] coupled
to the bus [202]. The communication interface [218] provides a two-way data communication
14
coupling to a network link [220] that is connected to a local network [222]. For example, the
communication interface [218] may be an integrated services digital network (ISDN) card,
cable modem, satellite modem, or a modem to provide a data communication connection to a
corresponding type of telephone line. As another example, the communication interface [218]
5 may be a local area network (LAN) card to provide a data communication connection to a
compatible LAN. Wireless links may also be implemented. In any such implementation, the
communication interface [218] sends and receives electrical, electromagnetic, or optical signals
that carry digital data streams representing various types of information.
10 [0066] The computing device [200] can send messages and receive data, including program
code, through the network(s), the network link [220] and the communication interface [218].
In the Internet example, a server [230] might transmit a requested code for an application
program through the Internet [228], the ISP [226], the local network [222], the host [224] and
the communication interface [218]. The received code may be executed by the processor [204]
15 as it is received, and/or stored in the storage device [210], or other non-volatile storage for later
execution.
[0067] The present disclosure is implemented by a system [300] (as shown in FIG. 3). In an
implementation, the system [300] may include the computing device [200] (as shown in FIG.
20 2). It is further noted that the computing device [200] is able to perform the steps of a method
[400] (as shown in FIG. 4).
[0068] Referring to FIG. 3, an exemplary block diagram of a system [300] for alarm
management in a wireless communication network is shown, in accordance with the exemplary
25 implementations of the present disclosure. The system [300] comprises at least one processing
unit [302], at least one alarm generating unit [304], at least one establishing unit [306], at least
one alarm clearing unit [308] and at least one transmitting unit [310]. Also, all of the
components/ units of the system [300] are assumed to be connected to each other unless
otherwise indicated below. As shown in the figures all units shown within the system should
30 also be assumed to be connected to each other. Also, in FIG. 3 only a few units are shown,
however, the system [300] may comprise multiple such units or the system [300] may comprise
any such numbers of said units, as required to implement the features of the present disclosure.
Further, in an implementation, the system [300] may be present in a user device to implement
the features of the present disclosure. The system [300] may be a part of the user device / or
15
may be independent of but in communication with the user device (may also referred herein as
a UE). In another implementation, the system [300] may reside in a server or a network entity.
In yet another implementation, the system [300] may reside partly in the server/ network entity
and partly in the user device.
5
[0069] The system [300] is configured for alarm management in a wireless communication
network, with the help of the interconnection between the components/units of the system
[300]. In one example, the wireless communication network is the 5th generation core network.
In another example, the wireless communication network may be a 6th generation network or
10 any other future generations of network.
[0070] The system comprises an active network function network (ANF). The active network
function refers to a primary network function that actively handles network traffic and performs
the alarm management in the wireless communication network. In one example, the ANF may
15 be one of the UE [102], the RAN [104], the AMF [106], the SMF [108], the SCP [110], the
AUSF [112], the NSSAAF [114], the NSSF [116], the NEF [118], the UDM [124], the AF
[126] and the UPF [128].
[0071] The processing unit [302] may check the status of the ANF and a Standby NF (SNF).
20 The processing unit [302] is configured to determine a channel connectivity failure between
the standby network function (SNF) and the ANF. The SNF refers to a backup NF that remains
in a passive state and monitors the ANF.
[0072] In one example, the SNF is a replication of the ANF via a replication channel (RPC) to
25 ensure consistent presence of critical data across redundant instances. The RPC refers to a
channel via which critical data from the ANF is copied and transferred to the SNF to ensure
data consistency and availability across both the ANF and the SNF.
[0073] In case the ANF fails or becomes unavailable, the SNF takes over responsibilities of
30 the ANF to ensure continuation of service without interruption. The communication between
the SNF and the ANF is facilitated via the replication channel (RPC). The channel connectivity
failure between the SNF and the ANF may be determined based on an operational state of the
SNF. The operational state may be one of a positive operational state and a negative operational
state. The positive operational state refers to an up status of the SNF, indicating a non-failure
16
of the communication channel. The negative operational status refers to a down status of the
SNF, indicating the communication channel failure.
[0074] If the operational status of the SNF is the negative operational status, based on the
5 communication channel failure, the alarm generating unit [304] is configured to generate an
alarm for the determined channel connectivity failure or the operational status. In one example,
the alarm may be sent to the establishing unit [306] to take further action on the channel
connectivity.
10 [0075] The establishing unit [306] is configured to re-establish channel connectivity between
the SNF and the ANF. To re-establish the channel connectivity, the establishing unit [306] may
reconfigure the communication channel by updating routing between the ANF and the SNF.
Further, the establishing unit [306] may conduct diagnostic tests to verify the channel
connectivity between the ANF and the SNF.
15
[0076] The processing unit [302] is configured to initiate at the ANF a timer for a pre-defined
time period. The timer may be initiated after completion of the re-establishment of the
communication channel. The pre-defined time period may be defined by a user of the system
[300]. The user may be one of a system operator or a network administrator. In one example,
20 the pre-defined time period may be 180 seconds.
[0077] In an example of the present disclosure, the processing unit [302] may continuously
monitor the communication channel. During the pre-defined time period if a subsequent
channel connectivity failure is determined between the SNF and the ANF, the processing unit
25 [302] is configured to suppress the alarm for the determined subsequent channel connectivity
failure. The suppression of the alarm may correspond to generation of the alarm, but not
transmitting the alarm. In one example, the generated alarm may be stored at a database in the
alarm generation unit [304].
30 [0078] Upon expiry of the pre-defined time period of the timer, the alarm clearing unit [308]
is configured to clear the generated alarm based on the channel connectivity. The alarm is
cleared to avoid flooding of alarms generated at the alarm generation unit [304]. In one
example, if the alarm is not cleared, multiple alarms may be stored at the alarm generation unit
17
[304]. The alarm is cleared by the alarm clearing unit [308] based on the channel connectivity
between the SNF and the ANF.
[0079] If after the expiry of the pre-defined time period, the channel connectivity is established,
5 the alarm is cleared. The transmitting unit [310] is configured to perform the alarm clearance
by sending the cleared alarm to notify a network management system (NMS) about
establishment of channel connectivity between the ANF and the SNF. In one example, if the
channel connectivity is not established after the pre-defined period of time, the transmitting
unit [310] sends the alarm to the network management system (NMS) about down time of the
10 SNF.
[0080] In an exemplary aspect, the system further comprises a service manager (SM). The SM
is configured to raise an alarm and forward it to the NMS, where the alarms are stored for
monitoring. Additionally, the SM sends an HTTP post request to the NMS to raise the alarm.
15 The SM also serves requests related to the services provided by the network function (NF),
enabling integration with the NMS. Furthermore, the SM establishes connectivity with the
session data layer (SDL), which is responsible for storing and retrieving NF-specific data, and
it replicates the data on a standby SDL to maintain resilience and continuity.
20 [0081] After the expiry of a pre-defined time period, if a subsequent channel connectivity
failure is determined between the SNF and the ANF, the alarm generating unit [304] is further
configured to generate the alarm.
[0082] Referring to FIG. 4, an exemplary method [400] flow diagram for alarm management
25 in a wireless communication network, in accordance with exemplary implementations of the
present disclosure is shown. In an implementation the method [400] is performed by the system
[300]. Further, in an implementation, the system [300] may be present in a server device to
implement the features of the present disclosure. Also, as shown in FIG. 4, the method [400]
starts at step [402].
30
[0083] In one example, the wireless communication network is the 5th generation core network.
In another example, the wireless communication network may be a 6th generation network or
any other future generations of network.
18
[0084] The method is performed at an active network function network (ANF). The ANF refers
to a primary network function that actively handles network traffic and performs the alarm
management in the wireless communication network. In one example, the ANF may be one of
the UE [102], the RAN [104], the AMF [106], the SMF [108], the SCP [110], the AUSF [112],
5 the NSSAAF [114], the NSSF [116], the NEF [118], the UDM [124], the AF [126] and the
UPF [128].
[0085] At step [404], the method comprises determining, by a processing unit [302] at an active
network function (ANF), a channel connectivity failure between a standby network function
10 (SNF) and the ANF. A status of the ANF and a Standby NF (SNF) may be checked by the
processing unit [302] to determine the channel connectivity failure. The SNF refers to a backup
NF that remains in a passive state and monitors the ANF. The communication between the SNF
and the ANF is facilitated via a replication channel (RPC). In one example, the SNF is a
replication of the ANF via a replication channel (RPC) to ensure consistent presence of critical
15 data across redundant instances. The RPC refers to a channel via which critical data from the
ANF is copied and transferred to the SNF to ensure data consistency and availability across
both the ANF and the SNF.
[0086] In case the ANF fails or becomes unavailable, the SNF takes over responsibilities of
20 the ANF to ensure continuation of service without interruption. The channel connectivity
failure between the SNF and the ANF is based on an operational state of the SNF. The
operational state may be one of a positive operational state and a negative operational state.
The positive operational state refers to an up status of the SNF, indicating a non-failure of the
communication channel. The negative operational status refers to a down status of the SNF,
25 indicating the communication channel failure.
[0087] At step [406], the method comprises generating, by an alarm generating unit [304] at
the ANF, an alarm for the determined channel connectivity failure. In one example, the alarm
may be sent to the establishing unit [306] to take further action on the channel connectivity.
30
[0088] Next at step [408], the method comprises re-establishing, by an establishing unit [306]
at the ANF, a channel connectivity between the SNF and the ANF. The process of reestablishing the channel connectivity may involve reconfiguration of the communication
channel by updating routing between the ANF and the SNF by the establishing unit [306].
19
Further, the establishing unit [306] may conduct diagnostic tests to verify the channel
connectivity between the ANF and the SNF.
[0089] Next at step [410], the method further comprises initiating, by the processing unit [302]
5 at the ANF, a timer for a pre-defined time period based on the re-establishing of the channel
connectivity. The timer may be initiated after completion of the re-establishment of the
communication channel. The pre-defined time period may be defined by a user of the system
[300]. The user may be one of a system operator or a network administrator. In one example,
the pre-defined time period may be 120 seconds.
10
[0090] The communication channel may be continuously monitored by the processing unit
[302] during the pre-defined time period. If a subsequent channel connectivity failure is
determined between the SNF and the ANF during the pre-defined time period, the method
further comprises suppressing, by the processing unit [302] at the ANF, the alarm for the
15 determined subsequent channel connectivity failure. The suppression of the alarm may
correspond to generation of the alarm, but not initiating the alarm. In one example, the
generated alarm may be stored at a database in the alarm generation unit [304].
[0091] Further at step [412], the method comprises clearing, by the alarm clearing unit [308]
20 at the ANF, the generated alarm upon expiry of the pre-defined time period. The alarm is
cleared by the alarm clearing unit [308] at the ANF based on the channel connectivity between
the SNF and the ANF. The alarm is cleared to avoid flooding of alarms generated at the alarm
generation unit [304]. In one example, if the alarm is not cleared, multiple alarms may be stored
at the alarm generation unit [304]. The alarm clearance comprises sending, by the transmitting
25 unit [310] at the ANF, the cleared alarm to notify a network management system (NMS) about
establishment of channel connectivity between the ANF and the SNF.
[0092] If after the expiry of the pre-defined time period, the channel connectivity is established,
the alarm is cleared. The alarm clearance comprises sending, by the transmitting unit [310], the
30 cleared alarm to notify a network management system (NMS) about establishment of channel
connectivity between the ANF and the SNF. In one example, if the channel connectivity is not
established after the pre-defined period of time, the transmitting unit [310] sends the alarm to
the network management system (NMS) about down time of the SNF.
20
[0093] After the pre-defined time period if the subsequent channel connectivity failure is
determined between the SNF and the ANF, the method further comprises generating, by the
alarm generating unit [304], the alarm.
5 [0094] The method terminates at step [414].
[0095] Referring to FIG. 5, a block diagram [500] for implementation of an alarm management
in a wireless communication network, in accordance with exemplary implementations of the
present disclosure is shown.
10
[0096] The block diagram [500] comprises a binding support function (BSF) [502], a linuxTM
[524] and a hardware [528]. The BSF [502] further comprises a Fault, Configuration,
Accounting, and Performance (FCAP) management [504], a high availability [506], an
overload management [508], a diameter stack management [510], a binding function module
15 [512], a rule engine module [514], a modification module [516], a session management [518],
a hypertext transfer protocol (HTTP) stack management [520] and a network repository
function (NRF) client [522]. The linuxTM [524] comprises a linuxTM kernel [526]. The hardware
[528] comprises a network controller [530].
20 [0097] The BSF [502] tracks sessions that are located in the network but share common criteria
such as subscriber identifiers. The BSF [502] enables the PCF [122] to scale the 5G network.
For converged networks, the BSF [502] maintains session state between HTTP/2 and diameter.
[0098] The FCAP management [504] stands for Fault, Configuration, Accounting, and
25 Performance management. The FCAP management [504] oversees overall network
management to ensure the network operates smoothly and efficiently. The FCAP management
[504] also involves in alarm raise or alarm clear.
[0099] The high availability [506] refers to a component in the BSF [502] to ensure continuous
30 operation of the network. The high availability [506] includes mechanisms for failover and
redundancy to minimize downtime of the network. The high availability [506] unit manages
connection with standby instances of the network function to ensure continuous operation.
21
[0100] The overload management [508] refers to a module that prevents or manages excessive
load on the system. The overload management [508] ensures that the network handles high
traffic volumes without degradation in the network performance.
5 [0101] The diameter stack management [510] refers to a module to manage a diameter
protocol. The diameter protocol refers to a protocol to authenticate and authorize in the wireless
network communication.
[0102] The binding function module [512] refers to a module to link the network functions
10 together. The binding function module [512] ensures seamless integration and communication
between various network functions.
[0103] The rule engine module [514] processes and executes predefined rules for the network.
The rule engine module [514] ensures that data packets are handled according to the predefined
15 policies and rules to enhance the network.
[0104] The modification module [516] refers to a module responsible for updating or changing
configurations of the network. The modification module [516] allows for dynamic adjustments
to the network to ensure adaptation to changing requirements.
20
[0105] The session management [518] is a module that handles creation, maintenance, and
termination of sessions of a user. The session management [518] ensures that users can connect
to the network and maintain the connections.
25 [0106] The HTTP stack management [520] handles a HTTP protocol. The HTTP protocol is
essential for web-based communications and services and is managed by the module.
[0107] The NRF client [522] is responsible for interacting with the central repository for
network functions. The NRF client [522] ensures that network functions can access necessary
30 resources and information.
[0108] The linuxTM [524] is an operating system that provides a platform to run operations on
the network. The linuxTM [524] offers stability, security, and performance for performing the
network operations.
22
[0109] The linuxTM kernel [526] acts as an interface between the hardware [528] and the BSF
[502]. The linuxTM kernel [526] manages the resources at the BSF [502] efficiently.
5 [0110] The hardware [528] includes servers, routers, and other devices.
[0111] The network controller [530] in the hardware [528] manages network communication
for the hardware [528]. The network controller [530] handles tasks such as routing, switching,
and managing data flow across the network.
10
[0112] All the components work together to create a robust, efficient, and reliable networking
system. Each module has a specific role, contributing to the overall functionality and
performance of the network.
15 [0113] Referring to FIG. 6, an implementation of the method [600] for alarm management in
a wireless communication network, in accordance with exemplary implementations of the
present disclosure is shown. In the implementation method [600], the network function
managing the alarm is the PCF [122]. In another implementation, the NF managing the alarm
may be one of the UE [102], the RAN [104], the AMF [106], the SMF [108], the SCP [110],
20 the AUSF [112], the NSSAAF [114], the NSSF [116], the NEF [118], the UDM [124], the AF
[126] and the UPF [128].
[0114] At step [602], a standby PCF (SPCF) may send a heartbeat message to an active PCF
(APCF). The APCF may monitor the SPCF to check if the replication channel (RPC) is
25 operational or non-operational. If the heartbeat message stops, a failure of the RPC may be
determined by the APCF. Based on the failure of the RPC, the APCF determines non-operation
of the SPCF.
[0115] At step [604], the APCF raises the alarm for the determined failure of the RPC.
30
[0116] At step [606], based on the raised alarm, the RPC may be re-established to make the
SPCF operational.
23
[0117] Next at step [608], the APCF initiates the timer for the pre-defined time period of at
least two 2 minutes to clear the alarm. The timer avoids flooding of the alarm. Upon expiry of
the pre-defined time period of the timer, the generated alarm may be cleared based on the RPC
connectivity.
5
[0118] Next at step [610], if the RPC connection of the operational SPCF at step [606] fails
again, or the RPC connection fails within the pre-defined time period after the SPCF is
restarted, the implementation method [600] may proceed to step [612]. The APCF does not
raise the same raised alarm. If the RPC connection does not fail, the alarm may be cleared.
10
[0119] At step [612], after the expiry of the pre-defined time period, the APCF checks if the
RPC connection is established or not before clearing the alarm.
[0120] At step [614], if the RPC is not connected after expiry of the predefined time period of
15 the timer, the APCF will not clear the alarm.
[0121] At step [616], if the RPC is connected after expiry of the predefined time period of the
timer, the APCF will clear the alarm.
20 [0122] The present disclosure further discloses a non-transitory computer readable storage
medium storing instructions for alarm management in a wireless communication network, the
instructions include executable code which, when executed by one or more units of a system,
cause a processing unit [302] to determine a channel connectivity failure between a standby
network function (SNF) and the ANF. The instructions when executed by the system further
25 cause an alarm generating unit [304] to generate an alarm for the determined channel
connectivity failure. The instructions when executed by the system further cause an
establishing unit [306] to re-establish a channel connectivity between the SNF and the ANF.
The instructions when executed by the system further cause the processing unit [302] to initiate
at the ANF a timer for a pre-defined time period. The instructions when executed by the system
30 further cause an alarm clearing unit [308] to clear the generated alarm based on the channel
connectivity upon expiry of the pre-defined time period.
[0123] As is evident from the above, the present disclosure provides a technically advanced
solution for alarm management in a wireless communication network. The present solution
24
provides a system and method for alarm management in a 5G communication network. Further,
the present disclosure provides a system and method for handling alarm flooding in a 5G
communication network. The present disclosure provides for better integration of the RPCs in
the realm of modern network management. The present disclosure addresses the problem of
5 race around conditions and prevents alarm flooding. The present disclosure provides a balanced
approach for optimized alarm generation to reflect genuine issues while curbing the risk of
systematic alarm flooding. Further, the present disclosure provides seamless data availability
enabled by replication channels within the 5G NFs thereby safeguarding critical data across
redundant instances.
10
[0124] While considerable emphasis has been placed herein on the disclosed implementations,
it will be appreciated that many implementations can be made and that many changes can be
made to the implementations without departing from the principles of the present disclosure.
These and other changes in the implementations of the present disclosure will be apparent to
15 those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to
be implemented is illustrative and non-limiting.
[0125] Further, in accordance with the present disclosure, it is to be acknowledged that the
functionality described for the various components/units can be implemented interchangeably.
20 While specific embodiments may disclose a particular functionality of these units for clarity, it
is recognized that various configurations and combinations thereof are within the scope of the
disclosure. The functionality of specific units as disclosed in the disclosure should not be
construed as limiting the scope of the present disclosure. Consequently, alternative
arrangements and substitutions of units, provided they achieve the intended functionality
25 described herein, are considered to be encompassed within the scope of the present disclosure.
25
We Claim:
1. A method for alarm management in a wireless communication network, the method
comprising:
5 determining, by a processing unit [302] at an active network function (ANF), a
channel connectivity failure between a standby network function (SNF) and the ANF;
generating, by an alarm generating unit [304] at the ANF, an alarm for the
determined channel connectivity failure;
re-establishing, by an establishing unit [306] at the ANF, a channel connectivity
10 between the SNF and the ANF;
initiating, by the processing unit [302] at the ANF, a timer for a pre-defined time
period based on the re-establishing of the channel connectivity; and
clearing, by an alarm clearing unit [308] at the ANF, the generated alarm upon
expiry of the pre-defined time period.
15
2. The method as claimed in claim 1, further comprises sending, by a transmitting unit [310]
at the ANF, the alarm to notify a network management system (NMS) about down time
of the SNF.
20 3. The method as claimed in claim 1, wherein the alarm is cleared by the alarm clearing unit
[308] at the ANF based on the channel connectivity between the SNF and the ANF.
4. The method as claimed in claim 3, wherein the alarm clearance comprises sending, by a
transmitting unit [310] at the ANF, the cleared alarm to notify a network management
25 system (NMS) about establishment of channel connectivity between the ANF and the
SNF.
5. The method as claimed in claim 1, wherein the channel connectivity failure between the
SNF and the ANF is based on an operational state of the SNF.
30
6. The method as claimed in claim 1, wherein a communication between the SNF and the
ANF is facilitated via a replication channel (RPC).
26
7. The method as claimed in claim 1, wherein during the pre-defined time period if a
subsequent channel connectivity failure is determined between the SNF and the ANF,
the method further comprises suppressing, by the processing unit [302] at the ANF, the
alarm for the determined subsequent channel connectivity failure.
5
8. The method as claimed in claim 7, wherein after the pre-defined time period if the
subsequent channel connectivity failure is determined between the SNF and the ANF,
the method further comprises generating, by the alarm generating unit [304], the alarm.
10 9. A system for alarm management in a wireless communication network, the system
comprising:
an active network function network (ANF) comprising:
a processing unit [302] configured to determine a channel connectivity
failure between a standby network function (SNF) and the ANF;
15 an alarm generating unit [304] configured to generate an alarm for the
determined channel connectivity failure;
an establishing unit [306] configured to re-establish a channel connectivity
between the SNF and the ANF;
the processing unit [302] configured to initiate at the ANF a timer for a pre20 defined time period; and
an alarm clearing unit [308] configured to clear the generated alarm based on
the channel connectivity upon expiry of the pre-defined time period.
10. The system as claimed in claim 9, further comprising a transmitting unit [310] to send
25 the alarm to a network management system (NMS) about down time of the SNF.
11. The system as claimed in claim 9, wherein the alarm is cleared by the alarm clearing unit
[308] based on the channel connectivity between the SNF and the ANF.
30 12. The system as claimed in claim 11, wherein the alarm clearance comprises a transmitting
unit [310] at the ANF to send the cleared alarm to notify a network management system
(NMS) about establishment of channel connectivity between the ANF and the SNF.
27
13. The system as claimed in claim 9, wherein the channel connectivity failure between the
SNF and the ANF is further based on an operational state of the SNF.
14. The system as claimed in claim 9, wherein a communication between the SNF and the
5 ANF is facilitated via a replication channel (RPC).
15. The system as claimed in claim 9, wherein during the pre-defined time period if a
subsequent channel connectivity failure is determined between the SNF and the ANF,
the processing unit [302] is configured to suppress the alarm for the determined
10 subsequent channel connectivity failure.
16. The system as claimed in claim 15, wherein after the pre-defined time period if the
subsequent channel connectivity failure is determined between the SNF and the ANF,
the alarm generating unit [304] is further configured to generate the alarm.

Documents

Application Documents

# Name Date
1 202321064149-STATEMENT OF UNDERTAKING (FORM 3) [25-09-2023(online)].pdf 2023-09-25
2 202321064149-PROVISIONAL SPECIFICATION [25-09-2023(online)].pdf 2023-09-25
3 202321064149-POWER OF AUTHORITY [25-09-2023(online)].pdf 2023-09-25
4 202321064149-FORM 1 [25-09-2023(online)].pdf 2023-09-25
5 202321064149-FIGURE OF ABSTRACT [25-09-2023(online)].pdf 2023-09-25
6 202321064149-DRAWINGS [25-09-2023(online)].pdf 2023-09-25
7 202321064149-Proof of Right [22-01-2024(online)].pdf 2024-01-22
8 202321064149-FORM-5 [24-09-2024(online)].pdf 2024-09-24
9 202321064149-ENDORSEMENT BY INVENTORS [24-09-2024(online)].pdf 2024-09-24
10 202321064149-DRAWING [24-09-2024(online)].pdf 2024-09-24
11 202321064149-CORRESPONDENCE-OTHERS [24-09-2024(online)].pdf 2024-09-24
12 202321064149-COMPLETE SPECIFICATION [24-09-2024(online)].pdf 2024-09-24
13 202321064149-FORM 3 [07-10-2024(online)].pdf 2024-10-07
14 202321064149-Request Letter-Correspondence [09-10-2024(online)].pdf 2024-10-09
15 202321064149-Power of Attorney [09-10-2024(online)].pdf 2024-10-09
16 202321064149-Form 1 (Submitted on date of filing) [09-10-2024(online)].pdf 2024-10-09
17 202321064149-Covering Letter [09-10-2024(online)].pdf 2024-10-09
18 202321064149-CERTIFIED COPIES TRANSMISSION TO IB [09-10-2024(online)].pdf 2024-10-09
19 Abstract.jpg 2024-10-24
20 202321064149-FORM-9 [31-12-2024(online)].pdf 2024-12-31
21 202321064149-FORM 18A [31-12-2024(online)].pdf 2024-12-31
22 202321064149-ORIGINAL UR 6(1A) FORM 1 & 26-030125.pdf 2025-01-07
23 202321064149-FER.pdf 2025-03-28
24 202321064149-FER_SER_REPLY [16-05-2025(online)].pdf 2025-05-16
25 202321064149-PatentCertificate17-10-2025.pdf 2025-10-17
26 202321064149-IntimationOfGrant17-10-2025.pdf 2025-10-17

Search Strategy

1 202321064149_SearchStrategyNew_E_PCTIN2024051838E_28-03-2025.pdf

ERegister / Renewals