Sign In to Follow Application
View All Documents & Correspondence

Method And System For Managing Policies

Abstract: The present disclosure relates to a method and a system for managing policies. The method comprises receiving, by a transceiver unit [302] via a Capacity management platform (CMP) module [308], a request for managing one or more policies. Next, the method comprises generating, by a processing unit [304], at the CMP module [308], a dynamic query builder for managing the one or more policies based on the request and one or more policy parameters. Furthermore, the method comprises storing, by a storage unit [306] at the CMP module [308], the generated dynamic query builder in an elastic search database (ES) [310]. [FIG. 3]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
29 September 2023
Publication Number
20/2025
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Jio Platforms Limited
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Inventors

1. Aayush Bhatnagar
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
2. Ankit Murarka
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
3. Rizwan Ahmad
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
4. Kapil Gill
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
5. Arpit Jain
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
6. Shashank Bhushan
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
7. Jugal Kishore
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
8. Meenakshi Sarohi
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
9. Kumar Debashish
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
10. Supriya Kaushik De
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
11. Gaurav Kumar
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
12. Kishan Sahu
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
13. Gaurav Saxena
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
14. Vinay Gayki
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
15. Mohit Bhanwria
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
16. Durgesh Kumar
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India
17. Rahul Kumar
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India

Specification

FORM 2
THE PATENTS ACT, 1970
(39 OF 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR MANAGING POLICIES”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr.
Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in
which it is to be performed.
2
METHOD AND SYSTEM FOR MANAGING POLICIES
FIELD OF INVENTION
[0001] Embodiments of the present 5 disclosure generally relate to network
performance management systems. More particularly, embodiments of the present
disclosure relate to methods and systems for managing policies.
BACKGROUND
10
[0002] The following description of the related art is intended to provide
background information pertaining to the field of the disclosure. This section may
include certain aspects of the art that may be related to various features of the
present disclosure. However, it should be appreciated that this section is used only
15 to enhance the understanding of the reader with respect to the present disclosure,
and not as admissions of the prior art.
[0003] The policy management is an important aspect in various fields such as
including but not limited to in communication networks etc. as it provides
20 transparency and control over the consumption of various resources during realtime
or near-real time service delivery. Policy management is generally carried out
according to some defined policy rules for resource consumption. A policy or policy
rules may be defined based on user inputs or queries of the network systems.
25 [0004] Over the period various solutions have been developed to tackle the
requests such as user requests or system requests of policy management to deploy
adept policy management and enforcement. Furthermore, the primitive systems
lacked capabilities of seamless management of these queries.
30 [0005] Thus, there exists an imperative need in the art to tackle policy
management requests that allows seamless handling of system and/or user queries
3
at the time of policy creation/ modification/ deletion events for various system
constraints such as CPU/RAM/Storage, which the present disclosure aims to
address.
5 OBJECTS OF THE DISCLOSURE
[0006] Some of the objects of the present disclosure, which at least one
embodiment disclosed herein satisfies are listed herein below.
10 [0007] It is an object of the present disclosure to provide a system and a method
for managing policies.
[0008] It is another object of the present disclosure to provide a solution that
tackles user interface requests of policy management by disclosing a Capacity
15 Manager (referred herein as CMP) at an application level (alternatively referred to
herein as capacity management platform (CMP), capacity management manager
(CMM) and CP microservice).
[0009] It is another object of the present disclosure to provide a solution to
20 provide seamless handling of policy management queries based on user input at the
time of policy creation/ modification/ deletion events considering system constraint
such as CPU/ RAM/ Storage etc.
[0010] It is another object of the present disclosure to provide a time-efficient
25 dynamic query builder established according to system constraints at an initial
design phase of the system.
[0011] It is another object of the present disclosure to provide a time-efficient
dynamic query builder that needs minimal intervention for modifications in
30 subsequent design stages.
4
[0012] It is another object of the present disclosure to provide a dynamic query
builder that guarantees smooth scalability (both upscaling and downscaling) upon
instantiation.
[0013] It is yet another 5 object of the present disclosure to provide a dynamic
query builder that effectively prevents resource overload.
SUMMARY
10 [0014] This section is provided to introduce certain aspects of the present
disclosure in a simplified form that are further described below in the detailed
description. This summary is not intended to identify the key features or the scope
of the claimed subject matter.
15 [0015] An aspect of the present disclosure may relate to a method for managing
policies. The method comprises receiving, by a transceiver unit via a Capacity
management platform (CMP) module, a request for managing one or more policies.
Next, the method comprises generating, by a processing unit, at the CMP module,
a dynamic query builder for managing the one or more policies based on the request
20 and one or more policy parameters. Furthermore, the method comprises storing, by
a storage unit at the CMP module, the generated dynamic query builder in an elastic
search database (ES).
[0016] In an exemplary aspect of the present disclosure, the request comprise
25 at least the one or more policy parameters related to managing the one or more
policies.
[0017] In an exemplary aspect of the present disclosure, managing the one or
more policies comprises at least one of updating, creating, and deleting one or more
30 policies.
5
[0018] In an exemplary aspect of the present disclosure, the one or more policy
parameters comprise at least one of a policy name, a CPU usage information, a
RAM usage information, a storage requirement information and a hysteresis
information.
5
[0019] In an exemplary aspect of the present disclosure, the dynamic query
builder is configured to perform one or more operations on resources of a wireless
communication network, wherein the one or more operations is one of at least an
auto-scaling operation, an auditing operation and a load balancing operation.
10
[0020] In an exemplary aspect of the present disclosure, the dynamic query
builder is configured to generate one or more queries associated with the resources
for performing the one or more operations.
15 [0021] In an exemplary aspect of the present disclosure, the resources of the
wireless communication network are associated with one or more virtualized
network components, wherein the one virtualized network components is one of at
least a virtual network function (VNF), a container network function (CNF), a
container network function components (CNFCs), and a virtual network function
20 components (VNFCs).
[0022] In an exemplary aspect of the present disclosure, the interface is CP_UI
interface.
25 [0023] In an exemplary aspect of the present disclosure, the interface is at least
one of a graphical user interface (GUI), and a command line interface (CLI).
[0024] Another aspect of the present disclosure may relate to a system for
managing policies. The system comprises a transceiver unit configured to receive,
30 via a Capacity management platform (CMP) module, a request for managing one
or more policies. Further, the system comprises a processing unit configured to
6
generate, at the CMP module, a dynamic query builder for managing the one or
more policies based on the request and one or more policy parameters. Further, the
system comprises a storage unit configured to store, at the CMP module, the
generated dynamic query builder in an elastic search database (ES).
5
[0025] Yet another aspect of the present disclosure may relate to a nontransitory
computer readable storage medium storing instructions for managing
policies, the instructions include executable code which, when executed by one or
more units of a system, causes: a transceiver unit of the system to receive, via a
10 Capacity management platform (CMP) module, a request for managing one or more
policies. The executable code which, when executed by one or more units of a
system, causes a processing unit of the system to generate, at the CMP module, a
dynamic query builder for managing the one or more policies based on the request
and one or more policy parameters. The executable code which, when executed by
15 one or more units of a system, causes a storage unit of the system to store, at the
CMP module, the generated dynamic query builder in an elastic search database
(ES).
[0026] Yet another aspect of the present disclosure may relate to a user
20 equipment (UE) for managing policies. The UE comprises a system and a user
interface. Further, the user interface is configured to receive a request for managing
one or more policies. Next, the user interface is configured to receive, a dynamic
query builder for managing the one or more policies based on the request and one
or more policy parameters. Next, the user interface is configured to transmit an
25 input associated with the dynamic query builder, wherein the input is at least one
of updating, creating, and deleting one or more policies for managing the one or
more policies. Next, the user interface is configured to receive, an output based on
the input, wherein the output is generated based on performing one or more
operations on resources of a wireless communication network.
30
DESCRIPTION OF THE DRAWINGS
7
[0027] The accompanying drawings, which are incorporated herein, and
constitute a part of this disclosure, illustrate exemplary embodiments of the
disclosed methods and systems in which like reference numerals refer to the same
parts throughout the 5 different drawings. Components in the drawings are not
necessarily to scale, emphasis instead being placed upon clearly illustrating the
principles of the present disclosure. Also, the embodiments shown in the figures are
not to be construed as limiting the disclosure, but the possible variants of the method
and system according to the disclosure are illustrated herein to highlight the
10 advantages of the disclosure. It will be appreciated by those skilled in the art that
disclosure of such drawings includes disclosure of electrical components or
circuitry commonly used to implement such components.
[0028] FIG. 1 illustrates an exemplary block diagram of a management and
15 orchestration (MANO) architecture.
[0029] FIG. 2 illustrates an exemplary block diagram of a computing device
upon which the features of the present disclosure may be implemented in
accordance with exemplary implementation of the present disclosure.
20
[0030] FIG. 3 illustrates an exemplary block diagram of a system for managing
policies, in accordance with exemplary implementations of the present disclosure.
[0031] FIG. 4 illustrates an exemplary method flow diagram for managing
25 policies in accordance with exemplary implementations of the present disclosure.
[0032] FIG. 5 illustrates another exemplary block diagram of a system for
managing policies, in accordance with exemplary implementations of the present
disclosure.
30
8
[0033] FIG. 6 illustrates an exemplary process flow for managing policies in
accordance with exemplary implementations of the present disclosure.
[0034] The foregoing shall be more apparent from the following more detailed
5 description of the disclosure.
DETAILED DESCRIPTION
[0035] In the following description, for the purposes of explanation, various
10 specific details are set forth in order to provide a thorough understanding of
embodiments of the present disclosure. It will be apparent, however, that
embodiments of the present disclosure may be practiced without these specific
details. Several features described hereafter may each be used independently of one
another or with any combination of other features. An individual feature may not
15 address any of the problems discussed above or might address only some of the
problems discussed above.
[0036] The ensuing description provides exemplary embodiments only, and is
not intended to limit the scope, applicability, or configuration of the disclosure.
20 Rather, the ensuing description of the exemplary embodiments will provide those
skilled in the art with an enabling description for implementing an exemplary
embodiment. It should be understood that various changes may be made in the
function and arrangement of elements without departing from the spirit and scope
of the disclosure as set forth.
25
[0037] Specific details are given in the following description to provide a
thorough understanding of the embodiments. However, it will be understood by one
of ordinary skill in the art that the embodiments may be practiced without these
specific details. For example, circuits, systems, processes, and other components
30 may be shown as components in block diagram form in order not to obscure the
embodiments in unnecessary detail.
9
[0038] Also, it is noted that individual embodiments may be described as a
process which is depicted as a flowchart, a flow diagram, a data flow diagram, a
structure diagram, or a block diagram. Although a flowchart may describe the
operations as a sequential process, 5 many of the operations may be performed in
parallel or concurrently. In addition, the order of the operations may be re-arranged.
A process is terminated when its operations are completed but could have additional
steps not included in a figure.
10 [0039] The word “exemplary” and/or “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the
subject matter disclosed herein is not limited by such examples. In addition, any
aspect or design described herein as “exemplary” and/or “demonstrative” is not
necessarily to be construed as preferred or advantageous over other aspects or
15 designs, nor is it meant to preclude equivalent exemplary structures and techniques
known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes,” “has,” “contains,” and other similar words are used in either the detailed
description or the claims, such terms are intended to be inclusive—in a manner
similar to the term “comprising” as an open transition word—without precluding
20 any additional or other elements.
[0040] As used herein, a “processing unit” or “processor” or “operating
processor” includes one or more processors, wherein processor refers to any logic
circuitry for processing instructions. A processor may be a general-purpose
25 processor, a special purpose processor, a conventional processor, a digital signal
processor, a plurality of microprocessors, one or more microprocessors in
association with a Digital Signal Processing (DSP) core, a controller, a
microcontroller, Application Specific Integrated Circuits, Field Programmable
Gate Array circuits, any other type of integrated circuits, etc. The processor may
30 perform signal coding data processing, input/output processing, and/or any other
functionality that enables the working of the system according to the present
10
disclosure. More specifically, the processor or processing unit is a hardware
processor.
[0041] As used herein, “a user equipment”, “a user device”, “a smart-userdevice”,
“a smart-device”, “an electronic device”, 5 “a mobile device”, “a handheld
device”, “a wireless communication device”, “a mobile communication device”, “a
communication device” may be any electrical, electronic and/or computing device
or equipment, capable of implementing the features of the present disclosure. The
user equipment/device may include, but is not limited to, a mobile phone, smart
10 phone, laptop, a general-purpose computer, desktop, personal digital assistant,
tablet computer, wearable device or any other computing device which is capable
of implementing the features of the present disclosure. Also, the user device may
contain at least one input means configured to receive an input from unit(s) which
are required to implement the features of the present disclosure.
15
[0042] As used herein, “storage unit” or “memory unit” refers to a machine or
computer-readable medium including any mechanism for storing information in a
form readable by a computer or similar machine. For example, a computer-readable
medium includes read-only memory (“ROM”), random access memory (“RAM”),
20 magnetic disk storage media, optical storage media, flash memory devices or other
types of machine-accessible storage media. The storage unit stores at least the data
that may be required by one or more units of the system to perform their respective
functions.
25 [0043] As used herein “interface” or “user interface refers to a shared boundary
across which two or more separate components of a system exchange information
or data. The interface may also be referred to a set of rules or protocols that define
communication or interaction of one or more modules or one or more units with
each other, which also includes the methods, functions, or procedures that may be
30 called.
11
[0044] All modules, units, components used herein, unless explicitly excluded
herein, may be software modules or hardware processors, the processors being a
general-purpose processor, a special purpose processor, a conventional processor,
a digital signal processor (DSP), a plurality of microprocessors, one or more
microprocessors in association with a DSP 5 core, a controller, a microcontroller,
Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array
circuits (FPGA), any other type of integrated circuits, etc.
[0045] As used herein the transceiver unit include at least one receiver and at
10 least one transmitter configured respectively for receiving and transmitting data,
signals, information or a combination thereof between units/components within the
system and/or connected with the system.
[0046] As discussed in the background section, the current known solutions
15 have several shortcomings. The present disclosure aims to overcome the abovementioned
and other existing problems in this field of technology by providing
method and system of managing policies. The present disclosure relates to a system
and method for policy management via a user interface. Based on the
implementation of the features of the present disclosure the CMP validates design
20 policies that are sourced from the user interface, ensuring adherence to essential
system constraints for e.g., hysteresis. Once validated, it generates a dynamic query
builder based on the design constraints, saving it in the database for future use.
[0047] Particularly, the present disclosure aims to overcome the above25
mentioned and other existing problems in this field of technology by tackling the
user interface requests with the help of dynamic query builder. This dynamic query
builder is based on the system design constraints, which are saved in the database
for future use. This dynamic and adaptable query builder is modifiable based on
user requirements, thereby facilitating seamless autoscaling of resources, leading to
30 fluid transitions.
12
[0048] FIG. 1 illustrates an exemplary block diagram representation of a
management and orchestration (MANO) architecture/ platform [100], in
accordance with exemplary implementation of the present disclosure. The MANO
platform [100] may be developed for managing telecom cloud infrastructure
automatically, managing 5 design or deployment design, managing instantiation of
network node(s)/ service(s) etc. The MANO platform [100] deploys the network
node(s) in the form of Virtual Network Function (VNF) and Cloud-native/
Container Network Function (CNF). The system as provided by the present
disclosure may comprise one or more components of the MANO platform [100].
10 The MANO platform [100] may be used to auto-instantiate the VNFs into the
corresponding environment of the present disclosure so that it could help in
onboarding other vendor(s) CNFs and VNFs to the platform.
[0049] As shown in FIG. 1, the MANO platform [100] comprises a user
15 interface layer [102], a network function virtualization (NFV) and software defined
network (SDN) design function module [104], a platform foundation services
module [106], platforms core services module [108] and a platform resource
adapters and utilities module [112]. All the components are assumed to be
connected to each other in a manner as obvious to the person skilled in the art for
20 implementing features of the present disclosure.
[0050] The NFV and SDN design function module [104] comprises a VNF
lifecycle manager (compute) [1042], a VNF catalogue [1044], a network services
catalogue [1046], a network slicing and service chaining manager [1048], a physical
25 and virtual resource manager [1050] and a CNF lifecycle manager [1052]. The VNF
lifecycle manager (compute) [1042] may be responsible for deciding on which
server of the communication network the microservice will be instantiated. The
VNF lifecycle manager (compute) [1042] may manage the overall flow of
incoming/ outgoing requests during interaction with the user. The VNF lifecycle
30 manager (compute) [1042] may be responsible for determining which sequence to
be followed for executing the process. For e.g. in an AMF network function of the
13
communication network (such as a 5G network), sequence for execution of
processes P1 and P2 etc. The VNF catalogue [1044] stores the metadata of all the
VNFs (also CNFs in some cases). The network services catalogue [1046] stores the
information of the services that need to be run. The network slicing and service
chaining manager [1048] manages the slicing 5 (an ordered and connected sequence
of network service/ network functions (NFs)) that must be applied to a specific
networked data packet. The physical and virtual resource manager [1050] stores the
logical and physical inventory of the VNFs. Just like the VNF lifecycle manager
(compute) [1042], the CNF lifecycle manager [1052] may be used for the CNFs
10 lifecycle management.
[0051] The platforms foundation services module [106] comprises a
microservices edge load balancer [1062], an identity & access manager [1064], a
command line interface (CLI) [1066], a central logging manager [1068], and an
15 event routing manager (ERM) module [1070]. The microservices edge load
balancer [1062] may be used for maintaining the load balancing of the request for
the services. The identity & access manager [1064] may be used for logging
purposes. The command line interface (CLI) [1066] may be used to provide
commands to execute certain processes which require changes during the run time.
20 The central logging manager [1068] may be responsible for keeping the logs of
every service. These logs are generated by the MANO platform [100]. These logs
are used for debugging purposes. The event routing manager (ERM) module [1070]
may be responsible for routing the events i.e., the application programming
interface (API) hits to the corresponding services. The ERM module [1070]
25 manages the routing of requests between microservices in an event-driven system.
When one service (such as publisher) triggers an event, the request is directed by
the ERM module [1070] to the target microservice (such as subscriber). The ERM
module [1070] enables asynchronous communication, supports fault tolerance such
that the tasks are rerouted if a service fails, thus maintaining system reliability and
30 efficiency.
14
[0052] The platforms core services module [108] comprises NFV
infrastructure monitoring manager [1082], an assure manager [1084], a
performance manager [1086], a policy execution engine [1088], a capacity
monitoring manager (CMM) [1090], a release management (mgmt.) repository
[1092], a configuration 5 manager & GCT [1094], an NFV platform decision
analytics (NPDA) [1096], a platform NoSQL DB [1098]; a platform schedulers and
cron jobs [1100], a VNF backup & upgrade manager [1102], a microservice auditor
[1104], and a platform operations, administration and maintenance (OAM) module
[1106]. The NFV infrastructure monitoring manager [1082] monitors the
10 infrastructure part of the NFs. For e.g., any metrics such as CPU utilization by the
VNF. The assure manager [1084] may be responsible for supervising the alarms the
vendor may be generating. The performance manager [1086] may be responsible
for managing the performance counters. The policy execution engine (PEEGN)
[1088] may be responsible for managing all of the policies. The capacity monitoring
15 manager (CMM) [1090] (alternatively referred to herein as capacity management
platform (CMP) [1090] or CP microservice) may be responsible for sending the
request to the PEEGN [1088]. The release management (mgmt.) repository (RMR)
[1092] may be responsible for managing the releases and the images of all of the
vendor's network nodes. The configuration manager & (GCT) [1094] manages the
20 configuration and GCT of all the vendors. The NFV platform decision analytics
(NPDA) [1096] helps in deciding the priority of using the network resources. It may
be further noted that the policy execution engine (PEEGN) [1088], the
configuration manager & GCT [1094] and the NPDA [1096] work together. The
platform NoSQL DB [1098] may be a database for storing all the inventory (both
25 physical and logical) as well as the metadata of the VNFs and CNF. The platform
schedulers and cron jobs [1100] schedules and manages the tasks across various
microservices. The PSC [1100] facilitates in automating execution of jobs often
based on time interval or based on a triggering event. The PSC [1100] facilitates in
dispatching the requests to appropriate microservices, enabling efficient task
30 scheduling and execution.
15
[0053] The VNF backup & upgrade manager [1102] takes backup of the
images, binaries of the VNFs and the CNFs and produces those backup on demand
in case of server failure. The microservice auditor [1104] audits the microservices.
For e.g., in a hypothetical case, instances not being instantiated by the MANO
platform [100] may be using the network resources. 5 In such cases, the microservice
auditor [1104] audits and informs the same so that resources can be released for
services running in the MANO platform [100]. The audit assures that the services
only run on the MANO platform [100]. The platform operations, administration and
maintenance (OAM) module [1106] may be used for newer instances that are
10 spawning. The OAM module [1106] refers to a centralised system that manages the
scheduling, execution and monitoring of tasks across various microservices. The
OAM module [1106] facilitates efficient task distribution, automates scheduling
jobs, and handles administration by tracking task execution and system
performance. Additionally, the OAM module [1106] supports maintenance by
15 rerouting tasks in case of failures, enhancing the overall resilience and reliability of
the system.
[0054] The platform resource adapters and utilities module [112] further
comprises a platform external API adaptor and gateway [1122]; a generic decoder
20 and indexer (XML, CSV, JSON) [1124]; a docker service adaptor [1126]; an
OpenStack API adapter [1128]; and a NFV gateway [1130]. The Docker Service
Adapter (DSA) is a microservices-based system designed to deploy and manage
Container Network Functions (CNFs) and their components (CNFCs) across
Docker nodes. It offers REST endpoints for key operations, including uploading
25 container images to a Docker registry, terminating CNFC instances, and creating
Docker volumes and networks. CNFs, which are network functions packaged as
containers, may consist of multiple CNFCs. The DSA facilitates the deployment,
configuration, and management of these components by interacting with Docker's
API, ensuring proper setup and scalability within a containerized environment. This
30 approach provides a modular and flexible framework for handling network
functions in a virtualized network setup.
16
[0055] The platform external API adapter and gateway [1122] may be
responsible for handling the external services (to the MANO platform [100]) that
require the network resources. The generic decoder and indexer (XML, CSV,
JSON) [1124] gets directly t 5 he data of the vendor system in the XML, CSV, JSON
format. The docker service adaptor [1126] may be the interface provided between
the telecom cloud and the MANO platform [100] for communication. The
OpenStack API adapter [1128] may be used to connect with the virtual machines
(VMs). The NFV gateway [1130] may be responsible for providing the path to each
10 service going to/incoming from the MANO platform [100].
[0056] FIG. 2 illustrates an exemplary block diagram of a computing device
[200] (herein, also referred to as a computer system [200]) upon which one or more
features of the present disclosure may be implemented in accordance with an
15 exemplary implementation of the present disclosure. In an implementation, the
computing device [200] may also implement a method for managing policies,
utilising a system, or one or more sub-systems, provided in the network. In another
implementation, the computing device [200] itself implements the method for
managing policies, using one or more units configured within the computing device
20 [200], wherein said one or more units are capable of implementing the features as
disclosed in the present disclosure.
[0057] The computing device [200] may include a bus [202] or other
communication mechanism(s) for communicating information, and a hardware
25 processor [204] coupled with bus [202] for processing said information. The
hardware processor [204] may be, for example, a general-purpose microprocessor.
The computing device [200] may also include a main memory [206], such as a
random-access memory (RAM), or other dynamic storage device, coupled to the
bus [202], for storing information and instructions to be executed by the processor
30 [204]. The main memory [206] also may be used for storing temporary variables or
other intermediate information during execution of the instructions to be executed
17
by the processor [204]. Such instructions, when stored in a non-transitory storage
media accessible to the processor [204], render the computing device [200] into a
special purpose device that is customized to perform operations according to the
instructions. The computing device [200] further includes a read only memory
(ROM) [208] or other static 5 storage device coupled to the bus [202] for storing static
information and instructions for the processor [204].
[0058] A storage device [210], such as a magnetic disk, optical disk, or solidstate
drive is provided and coupled to the bus [202] for storing information and
10 instructions. The computing device [200] may be coupled via the bus [202] to a
display [212], such as a cathode ray tube (CRT), Liquid crystal Display (LCD),
Light Emitting Diode (LED) display, Organic LED (OLED) display, etc., for
displaying information to a user of the computing device [200]. An input device
[214], including alphanumeric and other keys, touch screen input means, etc. may
15 be coupled to the bus [202] for communicating information and command
selections to the processor [204]. Another type of user input device may be a cursor
controller [216], such as a mouse, a trackball, or cursor direction keys, for
communicating direction information and command selections to the processor
[204], and for controlling cursor movement on the display [212]. The cursor
20 controller [216] typically has two degrees of freedom in two axes, a first axis (e.g.,
x) and a second axis (e.g., y), that allows the cursor controller [216] to specify
positions in a plane.
[0059] The computing device [200] may implement the techniques described
25 herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware
and/or program logic which, in combination with the computing device [200],
causes or programs the computing device [200] to be a special-purpose device.
According to one implementation, the techniques herein are performed by the
computing device [200] in response to the processor [204] executing one or more
30 sequences of one or more instructions contained in the main memory [206]. The
one or more instructions may be read into the main memory [206] from another
18
storage medium, such as the storage device [210]. Execution of the one or more
sequences of the one or more instructions contained in the main memory [206]
causes the processor [204] to perform the process steps described herein. In
alternative implementations of the present disclosure, hard-wired circuitry may be
used in pl 5 ace of, or in combination with, software instructions.
[0060] The computing device [200] also may include a communication
interface [218] coupled to the bus [202]. The communication interface [218]
provides two-way data communication coupling to a network link [220] that is
10 connected to a local network [222]. For example, the communication interface
[218] may be an integrated services digital network (ISDN) card, cable modem,
satellite modem, or a modem to provide a data communication connection to a
corresponding type of telecommunication line. In another example, the
communication interface [218] may be a local area network (LAN) card to provide
15 a data communication connection to a compatible LAN. Wireless links may also be
implemented. In any such implementation, the communication interface [218]
sends and receives electrical, electromagnetic or optical signals that carry digital
data streams representing different types of information.
20 [0061] The computing device [200] can send and receive data, including
program code, messages, etc. through the network(s), the network link [220] and
the communication interface [218]. In an example, a server [230] might transmit a
requested code for an application program through the Internet [228], the ISP [226],
the local network [222], a host [224] and the communication interface [218]. The
25 received code may be executed by the processor [204] as it is received, and/or stored
in the storage device [210], or other non-volatile storage for later execution.
[0062] Referring to FIG. 3, an exemplary block diagram of a system [300] for
managing policies, is shown, in accordance with the exemplary implementations of
30 the present disclosure. The system [300] comprises at least one transceiver unit
[302], at least one processing unit [304], and at least one storage unit [306]. Also,
19
all of the components/ units of the system [300] are assumed to be connected to
each other unless otherwise indicated below. As shown in the figures all units
shown within the system [300] should also be assumed to be connected to each
other. Also, in FIG. 3 only a few units are shown, however, the system [300] may
comprise multiple such 5 units or the system [300] may comprise any such numbers
of said units, as required to implement the features of the present disclosure.
Further, in an implementation, the system [300] may be present in a user device/
user equipment to implement the features of the present disclosure. The system
[300] may be a part of the user device [102]/ or may be independent of but in
10 communication with the user device [102] (may also referred herein as a UE). In
another implementation, the system [300] may reside in a server or a network entity.
In yet another implementation, the system [300] may reside partly in the server/
network entity and partly in the user device.
15 [0063] The system [300] is configured for managing policies, with the help of
the interconnection between the components/units of the system [300].
[0064] Further, in accordance with the present disclosure, it is to be
acknowledged that the functionality described for the various the components/units
20 can be implemented interchangeably. While specific embodiments may disclose a
particular functionality of these units for clarity, it is recognized that various
configurations and combinations thereof are within the scope of the disclosure. The
functionality of specific units as disclosed in the disclosure should not be construed
as limiting the scope of the present disclosure. Consequently, alternative
25 arrangements and substitutions of units, provided they achieve the intended
functionality described herein, are considered to be encompassed within the scope
of the present disclosure.
[0065] The system [300] further comprises the transceiver unit [302]
30 configured to receive, via a capacity management platform (CMP) module [308], a
request for managing one or more policies through an interface. Herein, the CMP
20
module [308] is responsible for monitoring and managing the one or more policies
associated with one or more network entities (such as the UE) within the
communication network. Furthermore, the one or more policies may further
indicate that how one or more network resources are allocated or managed within
the communication ne 5 twork in such a manner to improve an overall efficiency and
performance of said communication network. In an exemplary aspect of the present
disclosure, the interface is CP_UI interface. In an exemplary aspect of the present
disclosure, the interface is at least one of a graphical user interface (GUI), and a
command line interface (CLI).
10
[0066] As used herein, the managing the one or more policies comprises at
least one of updating, creating, and deleting one or more policies.
[0067] In one aspect, updating one or more policies may refer to modifying an
15 existing policy to reflect changes in one or more resource allocations. In another
aspect, creating one or more policies may include adding one or more rules or policy
associated with said one or more resources allocation. In yet another aspect,
deleting one or more policies may refer to delete an outdated or one or more
unnecessary policies (that are no longer applicable for said one or more allocations).
20
[0068] Further, the request mentioned herein comprise at least the one or more
policy parameters related to managing the one or more policies. Moreover, the one
or more policy parameters comprise at least one of a policy name, a CPU usage
information, a RAM usage information, a storage requirement information and a
25 hysteresis information.
[0069] In an example, the policy name may refer to a unique identifier
associated with each policy of the one or more policies. For instance, a policy
(suppose policy X) with a policy name such as ‘high traffic policy’ may refer to the
30 policy utilized for handling network loads during peak hours.
21
[0070] In another example, the CPU usage information may refer to an amount
of CPU resources that is being currently used or is required within the
communication network for one or more conditions. For instance, a policy (suppose
policy X) may allocate 60% of CPU resources to a virtual network function (VNF),
in a condition where a 5 network load has increased a certain threshold.
[0071] In yet another example, the RAM usage information may refer to an
amount of memory allocated for one or more services within the communication
network.
10
[0072] In yet another example, the storage requirement information may refer
to details that the amount of memory required by the one or more network entities
for performing one or more services.
15 [0073] In yet another example, the hysteresis information may define a buffer
or threshold that may prevent frequent changes in allocation of the one or more
network resources. For instance, a policy (suppose policy X) may specify that CPU
resources are to be adjusted only if the CPU usage exceeds 80% for a sustained
period of time, which may further prevent any unnecessary network resource
20 reallocation during minor fluctuations within the CPU usage.
[0074] The system [300] further comprises the processing unit [304]
configured to generate, at the CMP module [308], a dynamic query builder for
managing the one or more policies based on the request and one or more policy
25 parameters. Herein, the dynamic query builder is configured to generate one or
more queries associated with the resources for performing the one or more
operations. The dynamic query builder may generate the one or more queries in a
dynamic manner. For example, the one or more queries are generated in an event,
whenever there is event task associated with the one or more policies is triggered
30 via a platform scheduler and cron jobs (PSC). Herein, the event task is associated
22
with the request mentioned above for managing one or more policies which may be
further utilized in an event of scaling in or out of the one or more resources.
[0075] It is to be noted that the dynamic nature of the query builder may allow
the processing unit [304] to adapt 5 with one or more changing demands at the
communication network. The dynamic query builder generates the one or more
queries dynamically that are based on the received request and the one or more
parameters mentioned within the received request. For instance, in an event, a VNF
performing a specific service (suppose service Y) may further require more RAM
10 due to a sudden increase in network load or said specific service is being performed
during peak hours, then in such event, the dynamic query builder may generate a
query to increase the RAM from 20 giga bytes (GB) to 30 GB.
[0076] In another event, similar to the previous event, the VNF is performing
15 a service (suppose service Z) during low throughput hours, which may not require
the pre-allocated RAM (such as 1 tera byte), then in such event, the dynamic query
builder may generate a query to reduce the allocated storage from 1 TB to 500 GB.
[0077] Further, the dynamic query builder is configured to perform one or
20 more operations on resources of a wireless communication network. Further, the
one or more operations is one of at least an auto-scaling operation, an auditing
operation and a load balancing operation. Herein, the one or more operations on the
resources of the wireless communication network is performed to improve an
overall efficiency and performance of said communication network.
25
[0078] Further, the one or more resources of the wireless communication
network are associated with one or more virtualized network components. Herein,
the one virtualized network components is one of at least a virtual network function
(VNF), a container network function (CNF), a container network function
30 components (CNFCs), and a virtual network function components (VNFCs).
23
[0079] The VNF may refer to a virtual router for handling network traffic
within the communication network. In an event, the one or more resources are
associated with the VNF, then the dynamic query builder may adjust the CPU or
memory allocated to said VNF based on real-time data traffic needs within said
communication network. Further, the 5 VNFC are subfunctions that are combined in
order to create a larger VNF.
[0080] The CNF herein may run within one or more containers to perform the
one or more services. Similar to the VNFC, the CNFC are subfunctions that are
10 combined in order to create a larger CNF.
[0081] In one example, the one or more operations is the auto-scaling
operation, which may refer to an automatic adjustment of the one or more network
resources in response to real-time demand of said one or more network resources.
15 The auto-scaling operation may further ensure, that the one or more network
resources are allocated dynamically based on said real-time demand in order to
prevent any underutilization or overloading of said one or more network resources.
[0082] For ease of understanding, the aforementioned para is explained with
20 the help of an exemplary scenario, in an event, during peak hour where there is a
dire need for additional resources for performing the one or more services, in such
event, the dynamic query builder may trigger the one or more queries to allocate
additional CPU or RAM to VNFs or CNFs. For instance, the query may request an
increase in CPU resources from 40% to 60% to handle the higher traffic demands
25 during the peak hour. Similarly, during low throughput time period, the dynamic
query builder may generate a query to reduce the allocation of the one or more
resources in view of increasing an overall efficiency of the communication network.
[0083] In another example, the one or more operations is the auditing
30 operation, which may involve monitoring the usage of the one or more network
24
resources in order to detect any anomalies or irregularities within the one or more
predefined policies.
[0084] For ease of understanding, the aforementioned para is explained with
the help of an exemplary scenario, 5 in an event, the dynamic query builder may
generate one or more queries to audit the usage of RAM and storage resources
within some specific VNFs or CNFs. Herein, the one or more queries may retrieve
data that may display a current CPU usage or a current memory usage. The retrieved
data herein is further to be utilized to detect overuse/ underuse of the one or more
10 network resource and may further identify any requirements of optimizing the one
or more policies within the communication network.
[0085] In yet another example, the one or more operations is the load balancing
operation, that may refer to process of distributing the network traffic evenly across
15 a plurality of network components to avoid overloading of the network traffic at a
specific network component.
[0086] For ease of understanding, the aforementioned para is explained with
the help of an exemplary scenario, in an event, a specific VNF is handling too much
20 network traffic, then in such event, the dynamic query builder may generate one or
more queries to shift some of the network traffic to other available VNFs or CNFs
associated with said specific VNF, in order to avoid bottlenecks over a specific
VNF and ensure smooth performance of all the network components within the
communication network.
25
[0087] The system [300] further comprises the storage unit [306] configured
to store, at the CMP module [308], the generated dynamic query builder in an elastic
search database (ES) [310]. Herein, the ES [310] is responsible for efficiently
storing, searching, and managing large volumes of data associated with the one or
30 more network components in real-time.
25
[0088] In an implementation of the present disclosure, the storage unit [306]
may store the one or more dynamically generated queries, created by the dynamic
query builder at the CMP module [308], at the ES [310]. The storage unit [306]
stores the one or more generated queries that are further utilized for future reference,
tracking of generated queries associated 5 with a specific policy from the one or more
policies, or auditing of the one or more policies.
[0089] Referring to FIG. 4, an exemplary method flow diagram [400] for
managing policies, in accordance with exemplary implementations of the present
10 disclosure is shown. In an implementation the method [400] is performed by the
system [300]. Further, in an implementation, the system [300] may be present in a
server device to implement the features of the present disclosure.
[0090] Also, as shown in FIG. 4, the method [400] initially starts at step [402].
15
[0091] At step [404], the method [400] comprises receiving, by the transceiver
unit [302] via the Capacity management platform (CMP) module [308], the request
for managing one or more policies. Further, managing the one or more policies
comprises at least one of updating, creating, and deleting one or more policies
20 through an interface. In an exemplary aspect of the present disclosure, the interface
is CP_UI interface. In an exemplary aspect of the present disclosure, the interface
is at least one of a graphical user interface (GUI), and a command line interface
(CLI).
25 [0092] The method [400] further explains that the request comprises at least
the one or more policy parameters related to managing the one or more policies.
Further, the one or more policy parameters comprise at least one of a policy name,
a CPU usage information, a RAM usage information, a storage requirement
information and a hysteresis information.
30
26
[0093] As used herein, the managing the one or more policies comprises at
least one of updating, creating, and deleting one or more policies.
[0094] In one aspect, updating one or more policies may refer to modifying an
existing policy to reflect changes in one 5 or more resource allocations. In another
aspect, creating one or more policies may include adding one or more rules or policy
associated with said one or more resources allocation. In yet another aspect,
deleting one or more policies may refer to delete an outdated or one or more
unnecessary policies (that are no longer applicable for said one or more allocations).
10
[0095] In an example, the policy name may refer to a unique identifier
associated with each policy of the one or more policies. For instance, a policy
(suppose policy X) with a policy name such as ‘high traffic policy’ may refer to the
policy utilized for handling network loads during peak hours.
15
[0096] In another example, the CPU usage information may refer to an amount
of CPU resources that is being currently used or is required within the
communication network for one or more conditions. For instance, a policy (suppose
policy X) may allocate 60% of CPU resources to a virtual network function (VNF),
20 in a condition where a network load has increased a certain threshold.
[0097] In yet another example, the RAM usage information may refer to an
amount of memory allocated for one or more services within the communication
network.
25
[0098] In yet another example, the storage requirement information may refer
to details that the amount of memory required by the one or more network entities
for performing one or more services.
30 [0099] In yet another example, the hysteresis information may define a buffer
or threshold that may prevent frequent changes in allocation of the one or more
27
network resources. For instance, a policy (suppose policy X) may specify that CPU
resources are to be adjusted only if the CPU usage exceeds 80% for a sustained
period of time, which may further prevent any unnecessary network resource
reallocation during minor fluctuations within the CPU usage.
5
[0100] At step [406], the method [400] comprises generating, by the processing
unit [304], at the CMP module [308], the dynamic query builder for managing the
one or more policies based on the request and one or more policy parameters.
Herein, the dynamic query builder is configured to generate one or more queries
10 associated with the resources for performing the one or more operations.
[0101] The method [400] further explains that the dynamic query builder is
configured to perform one or more operations on resources of a wireless
communication network. Herein, the one or more operations is one of at least an
15 auto-scaling operation, an auditing operation and a load balancing operation.
[0102] The method [400] further explains that the resources of the wireless
communication network are associated with one or more virtualized network
components. Further, the one virtualized network components is one of at least a
20 virtual network function (VNF), a container network function (CNF), a container
network function components (CNFCs), and a virtual network function components
(VNFCs).
[0103] The dynamic query builder may generate the one or more queries in a
25 dynamic manner. For example, the one or more queries are generated in an event,
whenever there is event task associated with the one or more policies is triggered
via a platform scheduler and cron jobs (PSC). Herein, the event task is associated
with the request mentioned above for managing one or more policies which may be
further utilized in an event of scaling in or out of the one or more resources.
30
28
[0104] It is to be noted that the dynamic nature of the query builder may allow
the processing unit [304] to adapt with one or more changing demands at the
communication network. The dynamic query builder generates the one or more
queries dynamically that are based on the received request and the one or more
parameters mentioned within the received request. For 5 instance, in an event, a VNF
performing a specific service (suppose service Y) may further require more RAM
due to a sudden increase in network load or said specific service is being performed
during peak hours, then in such event, the dynamic query builder may generate a
query to increase the RAM from 20 giga bytes (GB) to 30 GB.
10
[0105] In another event, similar to the previous event, the VNF is performing
a service (suppose service Z) during low throughput hours, which may not require
the pre-allocated RAM (such as 1 tera byte), then in such event, the dynamic query
builder may generate a query to reduce the allocated storage from 1 TB to 500 GB.
15
[0106] Further, the dynamic query builder is configured to perform one or
more operations on resources of a wireless communication network. Further, the
one or more operations is one of at least an auto-scaling operation, an auditing
operation and a load balancing operation. Herein, the one or more operations on the
20 resources of the wireless communication network is performed to improve an
overall efficiency and performance of said communication network.
[0107] The VNF may refer to a virtual router for handling network traffic
within the communication network. In an event, the one or more resources are
25 associated with the VNF, then the dynamic query builder may adjust the CPU or
memory allocated to said VNF based on real-time data traffic needs within said
communication network. Further, the VNFC are subfunctions that are combined in
order to create a larger VNF.
29
[0108] The CNF herein may run within one or more containers to perform the
one or more services. Similar to the VNFC, the CNFC are subfunctions that are
combined in order to create a larger CNF.
[0109] In one example, the one or more 5 operations is the auto-scaling
operation, which may refer to an automatic adjustment of the one or more network
resources in response to real-time demand of said one or more network resources.
The auto-scaling operation may further ensure, that the one or more network
resources are allocated dynamically based on said real-time demand in order to
10 prevent any underutilization or overloading of said one or more network resources.
[0110] For ease of understanding, the aforementioned para is explained with
the help of an exemplary scenario, in an event, during peak hour where there is a
dire need for additional resources for performing the one or more services, in such
15 event, the dynamic query builder may trigger the one or more queries to allocate
additional CPU or RAM to VNFs or CNFs. For instance, the query may request an
increase in CPU resources from 40% to 60% to handle the higher traffic demands
during the peak hour. Similarly, during low throughput time period, the dynamic
query builder may generate a query to reduce the allocation of the one or more
20 resources in view of increasing an overall efficiency of the communication network.
[0111] In another example, the one or more operations is the auditing
operation, which may involve monitoring the usage of the one or more network
resources in order to detect any anomalies or irregularities within the one or more
25 predefined policies.
[0112] For ease of understanding, the aforementioned para is explained with
the help of an exemplary scenario, in an event, the dynamic query builder may
generate one or more queries to audit the usage of RAM and storage resources
30 within some specific VNFs or CNFs. Herein, the one or more queries may retrieve
data that may display a current CPU usage or a current memory usage. The retrieved
30
data herein is further to be utilized to detect overuse/ underuse of the one or more
network resource and may further identify any requirements of optimizing the one
or more policies within the communication network.
[0113] In yet another example, the one 5 or more operations is the load balancing
operation, that may refer to process of distributing the network traffic evenly across
a plurality of network components to avoid overloading of the network traffic at a
specific network component.
10 [0114] For ease of understanding, the aforementioned para is explained with
the help of an exemplary scenario, in an event, a specific VNF is handling too much
network traffic, then in such event, the dynamic query builder may generate one or
more queries to shift some of the network traffic to other available VNFs or CNFs
associated with said specific VNF, in order to avoid bottlenecks over a specific
15 VNF and ensure smooth performance of all the network components within the
communication network.
[0115] At step [408], the method [400] comprises storing, by the storage unit
[306] at the CMP module [308], the generated dynamic query builder in an elastic
20 search database (ES) [310].
[0116] The method [400] herein terminates at step [410].
[0117] Referring to FIG. 5, another exemplary block diagram of a system
25 [500] for managing policies, is shown, in accordance with the exemplary
implementations of the present disclosure. The system [500] comprises a user
interface [502], a capacity monitoring and policy (CMP) module [504], and an
elastic search (ES) database [506]. Also, all of the components/ units of the system
[500] are assumed to be connected to each other unless otherwise indicated below.
30 As shown in the figures all units shown within the system [500] should also be
assumed to be connected to each other.
31
[0118] As shown in FIG. 5, The UI [502] serves may facilitate an interaction
for allowing users to input a request associated with one or more policies or data
related to network management. The request may include one or more parameters
such as policy names, CPU usage, 5 RAM usage, storage requirements, and other
related data.
[0119] Further, the CMP module [504] processes the input request received
from the UI [502]. The CMP module [504] may accept the one or more policies and
10 related data, such as the policy parameters, and may further initiate a process of
generating a dynamic query for managing the one or more policies.
[0120] The CMP module [504] may further evaluate the one or more policy
related data and uses this information to determine actions like auto-scaling,
15 auditing, or load balancing of network resources.
[0121] Furthermore, the Elastic Search (ES) database [506] stores the one or
more queries that were generated by the CMP module [504]. The ES database [506]
allows for efficient querying, retrieval, and auditing of stored information related
20 to the generated one or more dynamic policies and other network management
operations.
[0122] In an exemplary implementation, CP_UI interface communicatively
attaches the CMP module [504] and the UI [502]. CP_UI interface is used to route
25 all the incoming requests to CMP module [504] and all the outgoing requests from
CMP module towards the UI [502].
[0123] The CP_UI interface can comprise at least one of http and web-socket
based connection. In an embodiment, the CP_UI interface is configured to facilitate
30 exchange of information using hypertext transfer protocol (http) rest application
programming interface (API). In an embodiment, the http rest API is used in
32
conjunction with JSON and/or XML communication media. In another
embodiment, the CP_UI interface is configured to facilitate exchange of
information by establishing a web-socket connection between the CMP module
[504], and the UI [502]. A web-socket connection may involve establishing a
persistent connectivity between the 5 UI [502], and the CMP module [504]. An
example of the web-socket based communication includes, without limitation, a
transmission control protocol (TCP) connection. In such a connection, information,
such as operational status, health, etc. of different components may be exchanged
through the interface using a ping-pong based communication.
10
[0124] Referring to FIG. 6 an exemplary process [600] flow diagram for
managing policies, in accordance with exemplary implementations of the present
disclosure is shown. In an implementation the process [600] is performed by the
system [500].
15
[0125] The process [600] initially starts at step [602].
[0126] At step [604], the UI [502] may allow user to send request to either
create, update, or delete one or more policies to the CMP module [504]. The request
20 may further include one or more parameters such as CPU usage, RAM, storage
requirements, or hysteresis information.
[0127] At step [606], the CMP module [504] may receive the request from the
UI [502]. The CMP module [504] processes the data by analysing the one or more
25 policy parameters. Further, based on the analysing the one or more policy
parameters the CMP module [504] dynamically creates a query builder.
[0128] At step [608], the generated dynamic query builder is then stored in the
ES database [506]. Herein, the elastic search may be uses as the storage unit that
30 holds the one or more dynamic queries for future access, retrieval, and optimization.
33
[0129] The process [600] herein terminates at step [610].
[0130] The present disclosure further discloses a non-transitory computer
readable storage medium storing instructions for managing policies, the instructions
include executable code which, when executed 5 by one or more units of a system
[300], causes: a transceiver unit [302], of the system [300], to receive, via a
Capacity management platform (CMP) module [308], a request for managing one
or more policies. The executable code which, when executed by one or more units
of a system [300], causes a processing unit [304], of the system [300], to generate,
10 at the CMP module [308], a dynamic query builder for managing the one or more
policies based on the request and one or more policy parameters. The executable
code which, when executed by one or more units of a system [300], causes a storage
unit [306] of the system [300] to store, at the CMP module [308], the generated
dynamic query builder in an elastic search database (ES) [310].
15
[0131] The present disclosure further discloses a user equipment (UE) for
managing policies. The UE comprises a system [300] and a user interface. Further,
the user interface is configured to receive a request for managing one or more
policies. Next, the user interface is configured to receive, a dynamic query builder
20 for managing the one or more policies based on the request and one or more policy
parameters. Next, the user interface is configured to transmit an input associated
with the dynamic query builder, wherein the input is at least one of updating,
creating, and deleting one or more policies for managing the one or more policies.
Next, the user interface is configured to receive, an output based on the input,
25 wherein the output is generated based on performing one or more operations on
resources of a wireless communication network.
[0132] As is evident from the above, the present disclosure provides a
technically advanced solution for managing policies. The present solution for policy
30 management by creating a customized policy management system which provides
a dynamic query builder. The present invention ensures to tackle user interface
34
requests of policy management thereby allowing seamless creation, modification,
and deletion of policies i.e., customisation or management policies which are based
on user input(s)/ query request(s) at the time of policy creation/ modification/
deletion events for various system constraint such as CPU/ RAM/ Storage etc.
Additionally, the present invention 5 makes the policy management time efficient as
the dynamic policy management queries are handled during the initial design phase
thus minimizing manual intervention for modifications in subsequent design stages.
The present invention guarantees smooth scalability (both upscaling and
downscaling) upon instantiation in the data management. This effectively prevents
10 resource overload as a certain user query being stored in the dynamic query builder.
[0133] While considerable emphasis has been placed herein on the disclosed
implementations, it will be appreciated that many implementations can be made and
that many changes can be made to the implementations without departing from the
15 principles of the present disclosure. These and other changes in the implementations
of the present disclosure will be apparent to those skilled in the art, whereby it is to
be understood that the foregoing descriptive matter to be implemented is illustrative
and non-limiting.
20 [0134] Further, in accordance with the present disclosure, it is to be
acknowledged that the functionality described for the various components/units can
be implemented interchangeably. While specific embodiments may disclose a
particular functionality of these units for clarity, it is recognized that various
configurations and combinations thereof are within the scope of the disclosure. The
25 functionality of specific units as disclosed in the disclosure should not be construed
as limiting the scope of the present disclosure. Consequently, alternative
arrangements and substitutions of units, provided they achieve the intended
functionality described herein, are considered to be encompassed within the scope
of the present disclosure.
35
We Claim:
1. A method [400] for managing policies, the method [400] comprising:
- receiving, by a transceiver unit [302] via a Capacity management
platform (CMP) 5 module [308], a request for managing one or more
policies through an interface;
- generating, by a processing unit [304] at the CMP module [308], a
dynamic query builder for managing the one or more policies based
on the request and one or more policy parameters; and
10 - storing, by a storage unit [306] at the CMP module [308], the
generated dynamic query builder in an elastic search database (ES)
[310].
2. The method [400] as claimed in claim 1, wherein the request comprise at
15 least the one or more policy parameters related to managing the one or more
policies.
3. The method [400] as claimed in claim 1, wherein managing the one or more
policies comprises at least one of updating, creating, and deleting one or
20 more policies.
4. The method [400] as claimed in claim 1, wherein the one or more policy
parameters comprise at least one of a policy name, a CPU usage
information, a RAM usage information, a storage requirement information
25 and a hysteresis information.
5. The method [400] as claimed in claim 1, wherein the dynamic query builder
is configured to perform one or more operations on resources of a wireless
communication network, wherein the one or more operations is one of at
30 least an auto-scaling operation, an auditing operation and a load balancing
operation.
36
6. The method [400] as claimed in claim 5, wherein the dynamic query builder
is configured to generate one or more queries associated with the resources
for performing the one or more operations.
7. The method [400] as claimed in claim 5 5, wherein the resources of the
wireless communication network are associated with one or more
virtualized network components, wherein the one virtualized network
components is one of at least a virtual network function (VNF), a container
network function (CNF), a container network function components
10 (CNFCs), and a virtual network function components (VNFCs).
8. The method as claimed in claim 1, wherein the interface is CP_UI interface.
9. The method as claimed in claim 1, wherein the interface is at least one of a
15 graphical user interface (GUI), and a command line interface (CLI).
10. A system [300] for managing policies, the system [300] comprising:
a transceiver unit [302] configured to:
- receive, via a Capacity management platform (CMP) module
20 [308], a request for managing one or more policies through an
interface;
a processing unit [304] configured to:
- generate, at the CMP module [308], a dynamic query builder
for managing the one or more policies based on the request and
25 one or more policy parameters;
a storage unit [306] configured to: and
- store, at the CMP module [308], the generated dynamic query
builder in an elastic search database (ES) [310].
37
11. The system [300] as claimed in claim 10, wherein the request comprise at
least the one or more policy parameters related to managing the one or more
policies.
12. The system [300] as claimed in 5 claim 10, wherein managing the one or more
policies comprises at least one of updating, creating, and deleting one or
more policies.
13. The system [300] as claimed in claim 10, wherein the one or more policy
10 parameters comprise at least one of a policy name, a CPU usage
information, a RAM usage information, a storage requirement information
and a hysteresis information.
14. The system [300] as claimed in claim 10, wherein the dynamic query builder
15 is configured to perform one or more operations on resources of a wireless
communication network, wherein the one or more operations is one of at
least an auto-scaling operation, an auditing operation and a load balancing
operation.
20 15. The system [300] as claimed in claim 14, wherein the dynamic query builder
is configured to generate one or more queries associated with the resources
for performing the one or more operations.
16. The system [300] as claimed in claim 14, wherein the resources of the
25 wireless communication network are associated with one or more
virtualized network components, wherein the one virtualized network
components is one of at least a virtual network function (VNF), a container
network function (CNF), a container network function components
(CNFCs), and a virtual network function components (VNFCs).
30
17. The system as claimed in claim 10, wherein the interface is CP_UI interface.
38
18. The system as claimed in claim 10, wherein the interface is at least one of a
graphical user interface (GUI), and a command line interface (CLI).
19. A user equipment (UE) 5 for managing policies, the UE comprises a system
[300] and a user interface, wherein the user interface is configured to:
- receive a request for managing one or more policies through an
interface,
- receive, a dynamic query builder for managing the one or more policies
10 based on the request and one or more policy parameters,
- transmit, an input associated with the dynamic query builder, wherein
the input is at least one of updating, creating, and deleting one or more
policies for managing the one or more policies, and
- receive, an output based on the input, wherein the output is generated
15 based on performing one or more operations on resources of a wireless communication network.

Documents

Application Documents

# Name Date
1 202321065839-STATEMENT OF UNDERTAKING (FORM 3) [29-09-2023(online)].pdf 2023-09-29
2 202321065839-PROVISIONAL SPECIFICATION [29-09-2023(online)].pdf 2023-09-29
3 202321065839-POWER OF AUTHORITY [29-09-2023(online)].pdf 2023-09-29
4 202321065839-FORM 1 [29-09-2023(online)].pdf 2023-09-29
5 202321065839-FIGURE OF ABSTRACT [29-09-2023(online)].pdf 2023-09-29
6 202321065839-DRAWINGS [29-09-2023(online)].pdf 2023-09-29
7 202321065839-Proof of Right [06-02-2024(online)].pdf 2024-02-06
8 202321065839-FORM-5 [29-09-2024(online)].pdf 2024-09-29
9 202321065839-ENDORSEMENT BY INVENTORS [29-09-2024(online)].pdf 2024-09-29
10 202321065839-DRAWING [29-09-2024(online)].pdf 2024-09-29
11 202321065839-CORRESPONDENCE-OTHERS [29-09-2024(online)].pdf 2024-09-29
12 202321065839-COMPLETE SPECIFICATION [29-09-2024(online)].pdf 2024-09-29
13 202321065839-FORM 3 [07-10-2024(online)].pdf 2024-10-07
14 202321065839-Request Letter-Correspondence [11-10-2024(online)].pdf 2024-10-11
15 202321065839-Power of Attorney [11-10-2024(online)].pdf 2024-10-11
16 202321065839-Form 1 (Submitted on date of filing) [11-10-2024(online)].pdf 2024-10-11
17 202321065839-Covering Letter [11-10-2024(online)].pdf 2024-10-11
18 202321065839-CERTIFIED COPIES TRANSMISSION TO IB [11-10-2024(online)].pdf 2024-10-11
19 Abstract.jpg 2024-11-11
20 202321065839-ORIGINAL UR 6(1A) FORM 1 & 26-200125.pdf 2025-01-24