Abstract: A method (600) for managing network coverage holes in a network is disclosed. The method (600) includes identifying (602) a plurality of network coverage holes within a pre-defined coverage area associated with a first network and a second network. The method includes processing (604) the plurality of network coverage holes to assign a polygon boundary to each of the plurality of network coverage holes. The method includes performing (606) a check to identify an intersection between at least two polygon boundaries associated with at least two network coverage holes. The method includes performing (608) a check to determine whether the intersection between the at least two polygon boundaries is above a pre-defined threshold; and assigning (610) a unique polygon Identifier (ID) to the at least two network coverage holes based on the intersection of the at least two polygon boundaries, upon identifying the intersection to be above the pre-defined threshold. FIGURE.6
FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
THE PATENTS RULES, 2003
COMPLETE
SPECIFICATION
(See section 10; rule 13)
TITLE OF THE INVENTION
METHOD AND SYSTEM FOR MANAGING NETWORK COVERAGE HOLES IN A NETWORK
APPLICANT
JIO PLATFORMS LIMITED
of Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad -
380006, Gujarat, India; Nationality : India
The following specification particularly describes
the invention and the manner in which
it is to be performed
2
TECHNICAL FIELD
[0001] The present disclosure generally relates to the field of
telecommunication networks. More particularly, the present disclosure relates to a
method and a system for managing network coverage holes in a network.
5 DEFINITION
[0002] As used in the present disclosure, the following terms are generally
intended to have the meaning as set forth below, except to the extent that the context
in which they are used to indicate otherwise.
[0003] The expression ‘network coverage holes’ used hereinafter in the
10 specification refers to geographic areas where mobile network signals are weak or
unavailable, preventing reliable connectivity for network users (e.g., subscribers).
[0004] The expression ‘pre-defined network coverage area’ used hereinafter in
the specification refers to a specific geographical region or a set of boundaries that have
been established to be served by a given network, such as a Fourth Generation (4G)
15 network, a Fifth Generation (5G) network, a Sixth Generation (6G) network, and the
like.
[0005] The expression ‘polygon boundary’ used hereinafter in the specification
refers to a closed, multi-sided geometric shape that defines the outer edges of a network
coverage hole on a map or a spatial grid.
20 [0006] The expression ‘hybrid network coverage holes’ used hereinafter in the
specification refers to an overlapping network coverage hole including a combination
of two network coverage holes.
[0007] The expression ‘intersection’ used hereinafter in the specification refers
to an overlapping area formed by the two network coverage holes.
3
[0008] These definitions are in addition to those expressed in the art.
BACKGROUND
[0009] The following description of related art is intended to provide
background information pertaining to the field of the disclosure. This section may
5 include certain aspects of the art that may be related to various features of the present
disclosure. However, it should be appreciated that this section be used only to enhance
the reader's understanding with respect to the present disclosure, and not as admissions
of prior art.
[0010] With the rapid evolution of mobile communication technologies,
10 particularly the deployment of 4G and 5G networks, ensuring seamless and reliable
connectivity has become a core objective for telecom service providers. Modern mobile
users expect uninterrupted access to voice and data services, regardless of location.
However, network deployments frequently encounter network coverage holes that are
areas where mobile network signals are weak or unavailable. These network coverage
15 holes pose significant challenges, negatively impacting network user experience and
overall network performance. These encountered network coverage holes can result in
service disruptions, including dropped calls, interrupted data sessions, and total
connectivity loss. In such areas, network users (i.e., subscribers) are often unable to
access high-speed data services, which adversely affects the performance of
20 applications that depend on real-time or high-bandwidth data, such as video streaming,
cloud gaming, and large file transfers. Additionally, the transition between network
generations, e.g., from 4G to 5G, 5G to 6G, etc., may become inconsistent or unreliable
in these areas, leading to disrupted communications and degraded service continuity.
[0011] Further, voice services are also affected in these areas, with the network
25 users in the network coverage holes reporting increased instances of call drops, latency,
and poor audio quality. These issues contribute to a fragmented and unreliable network
4
user experience, eroding network user confidence in the network. From a commercial
perspective, unresolved coverage issues are a major source of customer dissatisfaction
and contribute significantly to subscriber churn in competitive telecom markets.
Dissatisfied subscribers may switch to alternative service providers offering more
5 reliable coverage, affecting customer retention and damaging the service provider’s
reputation.
[0012] Further, from an operational standpoint, the network coverage holes
reduce the efficiency of network resource utilization. Mobile devices in these areas
frequently initiate signal reselection and handover attempts, increasing signaling
10 overhead, draining battery life, and contributing to network congestion. Moreover,
these inefficiencies can exacerbate the complexity of network maintenance and
optimization. Existing solutions to address issues associated with the network coverage
holes often rely on manual site surveys, drive tests, or user-reported complaints. These
methods are time-consuming, resource-intensive, and lack real-time responsiveness,
15 making them inefficient for proactive detection and resolution of network issues.
Additionally, they may miss transient or location-specific anomalies.
[0013] There is, therefore, a need in the art to provide a method and a system
that can mitigate the disadvantages of the prior art.
OBJECTIVE
20 [0014] Some of the objectives of the present disclosure, which at least one
embodiment herein satisfies, are as follows:
[0015] An objective of the present disclosure is to provide a method and a
system for managing network coverage holes in a network.
[0016] An objective of the present disclosure is to ensure seamless connectivity
25 by facilitating smooth transitions between network coverage areas associated with
5
networks (e.g., 4G, 5G, and 6G, etc.), thereby minimizing service disruptions for
mobile users (i.e., network users or subscribers).
[0017] An objective of the present disclosure is to enhance data speeds by
enabling devices to utilize advanced network capabilities when available, thereby
5 supporting high-bandwidth applications such as video streaming, virtual reality, and
augmented reality.
[0018] An objective of the present invention is to improve overall network
capacity through effective utilization of overlapping network coverage areas,
particularly in densely populated or high-demand areas.
10 [0019] An objective of the present invention is to provide better service
coverage in diverse and challenging environments by leveraging the complementary
propagation characteristics of the networks.
[0020] An objective of the present invention is to support low-latency
communication by allowing devices to take advantage of high-speed networks (e.g.,
15 5G, 6G, and the like) reduced latency in areas with overlapping coverage, thereby
enhancing real-time application (e.g., a video calling application) performance.
[0021] Other objects and advantages of the present disclosure will be more
apparent from the following description, which is not intended to limit the scope of the
present disclosure.
20 SUMMARY
[0022] In an exemplary embodiment, a method for managing network coverage
holes in a network is described. The method includes identifying, by an identifying
unit, a plurality of network coverage holes within a pre-defined coverage area
associated with a first network and a second network based on data collected from a
6
plurality of data sources. The method includes processing, by a processing unit, the
plurality of network coverage holes to assign a polygon boundary to each of the
plurality of network coverage holes. The method includes performing, by the
processing unit, a check to identify an intersection between at least two polygon
5 boundaries associated with at least two network coverage holes of the plurality of
network coverage holes based on the polygon boundary assigned to each of the
plurality of network coverage holes. The method includes, upon identifying the
intersection between the at least two polygon boundaries associated with the at least
two network coverage holes, performing, by the processing unit, a check to determine
10 whether the intersection between the at least two polygon boundaries is above a predefined threshold. The method includes, upon identifying the intersection between the
at least two polygon boundaries to be above the pre-defined threshold, assigning, by an
assigning unit, a unique polygon Identifier (ID) to the at least two network coverage
holes based on the intersection of the at least two polygon boundaries.
15 [0023] In an embodiment, the method further includes collecting, by the
processing unit, the data associated with the pre-defined coverage area corresponding
to the first network and the second network, from the plurality of data sources. The
method further includes processing, by the identifying unit, the data to identify the
plurality of network coverage holes corresponding to the pre-defined coverage area
20 using a classification algorithm.
[0024] In an embodiment, the plurality of network coverage holes includes one
or more first network coverage holes associated with the first network, one or more
second network coverage holes associated with the second network, and one or more
hybrid network coverage holes associated with the first network and the second
25 network combined.
7
[0025] In an embodiment, each of the one or more hybrid network coverage
holes corresponds to an overlapping network coverage hole comprising a combination
of a first network coverage hole and a second network coverage hole.
[0026] In an embodiment, when the intersection between the at least two
5 polygon boundaries assigned to the at least two network coverage holes is determined
to be above the pre-defined threshold, the at least two network coverage holes is a
hybrid network coverage hole.
[0027] In an embodiment, the method further includes upon identifying the
intersection between the at least two polygon boundaries to be below the pre-defined
10 threshold, assigning, by the assigning unit, a unique polygon ID to each network
coverage hole of the at least two network coverage holes.
[0028] In an embodiment, when the intersection of the at least two polygon
boundaries assigned to the at least two network coverage holes is determined to be
below the pre-defined threshold, each network coverage hole of the at least two
15 network coverage holes is one of a first network coverage hole or a second network
coverage hole.
[0029] In another exemplary embodiment, a system for managing network
coverage holes in a network is disclosed. The system includes an identifying unit
configured to identify a plurality of network coverage holes within a pre-defined
20 coverage area associated with a first network and a second network based on data
collected from a plurality of data sources. The system includes a processing unit
configured to process the plurality of network coverage holes to assign a polygon
boundary to each of the plurality of network coverage holes. The processing unit is
further configured to perform a check to identify an intersection between at least two
25 polygon boundaries associated with at least two network coverage holes of the plurality
of network coverage holes based on the polygon boundary assigned to each of the
8
plurality of network coverage holes. The processing unit is further configured to
perform a check to determine whether the intersection between the at least two polygon
boundaries is above a pre-defined threshold, upon identifying the intersection between
the at least two polygon boundaries associated with the at least two network coverage
5 holes. The system includes an assigning unit configured to assign a unique polygon
Identifier (ID) to the at least two network coverage holes based on the intersection of
the at least two polygon boundaries upon identifying the intersection between the at
least two polygon boundaries to be above the pre-defined threshold.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWING
10 [0030] The accompanying drawings, which are incorporated herein, and
constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed
methods and systems in which, like reference numerals, refer to the same parts
throughout the different drawings. Components in the drawings are not necessarily to
scale emphasis instead being placed upon clearly illustrating the principles of the
15 present disclosure. Some drawings may indicate the components using block diagrams
and may not represent the internal circuitry of each component. It will be appreciated
by those skilled in the art that disclosure of such drawings includes disclosure of
electrical components, electronic components or circuitry commonly used to
implement such components.
20 [0031] FIG. 1 illustrates an exemplary network architecture for implementing
a system for managing network coverage holes in a network, in accordance with an
embodiment of the present disclosure.
[0032] FIG. 2 illustrates an exemplary block diagram of the system configured
for managing network coverage holes in the network, in accordance with an
25 embodiment of the present disclosure.
9
[0033] FIG. 3 illustrates an exemplary high-level architecture of the system and
external entities for managing network coverage holes in the network, in accordance
with an embodiment of the present disclosure.
[0034] FIG. 4 illustrates an exemplary flow diagram of a classification
5 algorithm for managing network coverage holes in the network, in accordance with an
embodiment of the present disclosure.
[0035] FIG. 5 illustrates an exemplary pictorial depiction representing network
coverage holes in the network, in accordance with an embodiment of the present
disclosure.
10 [0036] FIG. 6 illustrates an exemplary flow diagram of a method for managing
network coverage holes in the network, in accordance with an embodiment of the
present disclosure.
[0037] FIG. 7 illustrates an exemplary flowchart of a process of managing
network coverage holes in the network, in accordance with an embodiment of the
15 present disclosure.
[0038] FIG. 8 illustrates an exemplary computer system in which or with which
the embodiments of the present disclosure may be implemented.
[0039] The foregoing shall be more apparent from the following more detailed
description of the disclosure.
20 LIST OF REFERENCE NUMERALS
100 – Network architecture
102-1, 102-2…102-N – Plurality of Users
104-1, 104-2…104-N – Plurality of User Equipments
10
106 – Network
108 – System
200 – Block Diagram
202 - Memory
5 204 – Plurality of Interfaces
206 – Processing engine
208 – Identifying unit
210 – Processing unit
212 – Assigning unit
10 214 – Database
300 – High-level architecture
302 – Radio Frequency (RF) analytics system
304 – Master Database
306 – Work Order (WO) system
15 308 – Optimization team
310 – Coverage Platform (CP) – RF interface
312 – CP – Master Database (MDB) interface
314 – CP – Task Tracker (TT) microservice interface
400 – Flow diagram
11
500 – Pictorial representation
600 –Flow diagram
700 – Process flow diagram
800 – Computer System
5 810 - External Storage Device
820 – Bus
830 – Main Memory
840 – Read Only Memory
850 - Mass Storage Device
10 860 - Communication Port
870 – Processor
DETAILED DESCRIPTION
[0040] In the following description, for the purposes of explanation, various
specific details are set forth in order to provide a thorough understanding of
15 embodiments of the present disclosure. It will be apparent, however, that embodiments
of the present disclosure may be practiced without these specific details. Several
features described hereafter can each be used independently of one another or with any
combination of other features. An individual feature may not address any of the
problems discussed above or might address only some of the problems discussed
20 above. Some of the problems discussed above might not be fully addressed by any of
the features described herein. Example embodiments of the present disclosure are
12
described below, as illustrated in various drawings in which like reference numerals
refer to the same parts throughout the different drawings.
[0041] The ensuing description provides exemplary embodiments only and is
not intended to limit the scope, applicability, or configuration of the disclosure. Rather,
5 the ensuing description of the exemplary embodiments will provide those skilled in the
art with an enabling description for implementing an exemplary embodiment. It should
be understood that various changes may be made in the function and arrangement of
elements without departing from the spirit and scope of the disclosure as set forth.
[0042] Specific details are given in the following description to provide a
10 thorough understanding of the embodiments. However, it will be understood by one of
ordinary skill in the art that the embodiments may be practiced without these specific
details. For example, circuits, systems, networks, processes, and other components may
be shown as components in block diagram form in order not to obscure the
embodiments in unnecessary detail. In other instances, well-known circuits, processes,
15 algorithms, structures, and techniques may be shown without unnecessary detail in
order to avoid obscuring the embodiments.
[0043] Also, it is noted that individual embodiments may be described as a
process that is depicted as a flowchart, a flow diagram, a data flow diagram, a structure
diagram, or a block diagram. Although a flowchart may describe the operations as a
20 sequential process, many of the operations can be performed in parallel or concurrently.
In addition, the order of the operations may be re-arranged. A process is terminated
when its operations are completed but could have additional steps not included in a
figure. A process may correspond to a method, a function, a procedure, a subroutine, a
subprogram, etc. When a process corresponds to a function, its termination can
25 correspond to a return of the function to the calling function or the main function.
13
[0044] The word “exemplary” and/or “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the subject
matter disclosed herein is not limited by such examples. In addition, any aspect or
design described herein as “exemplary” and/or “demonstrative” is not necessarily to be
5 construed as preferred or advantageous over other aspects or designs, nor is it meant to
preclude equivalent exemplary structures and techniques known to those of ordinary
skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,”
and other similar words are used in either the detailed description or the claims, such
terms are intended to be inclusive like the term “comprising” as an open transition word
10 without precluding any additional or other elements.
[0045] Reference throughout this specification to “one embodiment” or “an
embodiment” or “an instance” or “one instance” means that a particular feature,
structure, or characteristic described in connection with the embodiment is included in
at least one embodiment of the present disclosure. Thus, the appearances of the phrases
15 “in one embodiment” or “in an embodiment” in various places throughout this
specification are not necessarily all referring to the same embodiment. Furthermore,
the particular features, structures, or characteristics may be combined in any suitable
manner in one or more embodiments.
[0046] The terminology used herein is to describe particular embodiments only
20 and is not intended to be limiting the disclosure. As used herein, the singular forms “a”,
“an”, and “the” are intended to include the plural forms as well, unless the context
indicates otherwise. It will be further understood that the terms “comprises” and/or
“comprising,” when used in this specification, specify the presence of stated features,
integers, steps, operations, elements, and/or components, but do not preclude the
25 presence or addition of one or more other features, integers, steps, operations, elements,
components, and/or groups thereof. As used herein, the term “and/or” includes any
combinations of one or more of the associated listed items. It should be noted that the
14
terms “mobile device”, “user equipment”, “user device”, “communication device”,
“device” and similar terms are used interchangeably for the purpose of describing the
invention. These terms are not intended to limit the scope of the invention or imply any
specific functionality or limitations on the described embodiments. The use of these
5 terms is solely for convenience and clarity of description. The invention is not limited
to any particular type of device or equipment, and it should be understood that other
equivalent terms or variations thereof may be used interchangeably without departing
from the scope of the invention as defined herein.
[0047] As used herein, an “electronic device”, or “portable electronic device”,
10 or “user device” or “communication device” or “user equipment” or “device” refers to
any electrical, electronic, electromechanical and computing device. The user device is
capable of receiving and/or transmitting one or parameters, performing
function/s, communicating with other user devices and transmitting data to the other
user devices. The user equipment may have a processor, a display, a memory, a battery
15 and an input-means such as a hard keypad and/or a soft keypad. The user equipment
may be capable of operating on any radio access technology including but not limited
to IP-enabled communication, Zig Bee, Bluetooth, Bluetooth Low Energy, Near Field
Communication, Z-Wave, Wi-Fi, Wi-Fi direct, etc. For instance, the user equipment
may include, but not limited to, a mobile phone, smartphone, virtual reality (VR)
20 devices, augmented reality (AR) devices, laptop, a general-purpose computer, desktop,
personal digital assistant, tablet computer, mainframe computer, or any other device as
may be obvious to a person skilled in the art for implementation of the features of the
present disclosure.
[0048] Further, the user device may also comprise a “processor” or “processing
25 unit” includes processing unit, wherein processor refers to any logic circuitry for
processing instructions. The processor may be a general-purpose processor, a special
purpose processor, a conventional processor, a digital signal processor, a plurality of
15
microprocessors, one or more microprocessors in association with a Digital Signal
Processing (DSP) core, a controller, a microcontroller, Application Specific Integrated
Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits,
etc. The processor may perform signal coding data processing, input/output processing,
5 and/or any other functionality that enables the working of the system according to the
present disclosure. More specifically, the processor is a hardware processor.
[0049] As portable electronic devices and wireless technologies continue to
improve and grow in popularity, the advancing wireless technologies for data transfer
are also expected to evolve and replace the older generations of technologies. In the
10 field of wireless data communications, the dynamic advancement of various
generations of cellular technology are also seen. The development, in this respect, has
been incremental in the order of second generation (2G), third generation (3G), fourth
generation (4G), and now fifth generation (5G), and more such generations are
expected to continue in the forthcoming time.
15 [0050] Radio Access Technology (RAT) refers to the technology used by
mobile devices/ User Equipment (UE) to connect to a cellular network. It refers to the
specific protocol and standards that govern the way devices communicate with base
stations, which are responsible for providing the wireless connection. Further, each
RAT has its own set of protocols and standards for communication, which define the
20 frequency bands, modulation techniques, and other parameters used for transmitting
and receiving data. Examples of RATs include a GSM (Global System for Mobile
Communications), a Code Division Multiple Access (CDMA), a Universal Mobile
Telecommunications System (UMTS), a Long-Term Evolution (LTE), a Fifth
Generation (5G) technology, and a Sixth Generation (6G) technology. The choice of
25 RAT depends on a variety of factors, including the network infrastructure, the available
spectrum, and the mobile device's/device's capabilities. Mobile devices often support
16
multiple RATs, allowing them to connect to different types of networks and provide
optimal performance based on the available network resources.
[0051] Wireless communication technology has rapidly evolved over the past
few decades. The first generation of wireless communication technology was analog,
5 offering only voice services. Further, text messaging and data services became possible
when a Second Generation (2G) technology was introduced. A Third Generation (3G)
technology marked the introduction of high-speed internet access, mobile video
calling, and location-based services. A Fourth Generation (4G) technology
revolutionized the wireless communication with faster data speeds, improved network
10 coverage, and security. Currently, the 5G technology is being deployed, offering
significantly faster data speeds, lower latency, and the ability to connect many devices
simultaneously. These advancements represent a significant leap forward from
previous generations, enabling enhanced mobile broadband, improved Internet of
Things (IoT) connectivity, and more efficient use of network resources. The 6G
15 technology promises to build upon these advancements, pushing the boundaries of
wireless communication even further. While the 5G technology is still being rolled out
globally, research and development into the 6G are rapidly evolving, with the aim of
revolutionizing the way of connecting and interacting with technology.
[0052] While considerable emphasis has been placed herein on the components
20 and component parts of the preferred embodiments, it will be appreciated that many
embodiments can be made and that many changes can be made in the preferred
embodiments without departing from the principles of the disclosure. These and other
changes in the preferred embodiment as well as other embodiments of the disclosure
will be apparent to those skilled in the art from the disclosure herein, whereby it is to
25 be distinctly understood that the foregoing descriptive matter is to be interpreted merely
as illustrative of the disclosure and not as a limitation.
17
[0053] Embodiments herein relate to a method for managing network coverage
holes in a network. The network, for example, may be the 4G network, the 5G network,
the 6G network, and the like. In particular, the method includes identifying a plurality
of network coverage holes within a pre-defined coverage area associated with a first
5 network and a second network based on data collected from a plurality of data sources.
Upon identifying the plurality of network coverage holes, process the plurality of
network coverage holes to assign a polygon boundary to each of the plurality of
network coverage holes. Once the polygon boundary is assigned, a check is performed
to identify an intersection between at least two polygon boundaries associated with at
10 least two network coverage holes of the plurality of network coverage holes based on
the polygon boundary assigned to each of the plurality of network coverage holes.
Upon identifying the intersection between the at least two polygon boundaries
associated with the at least two network coverage holes, performing a check to
determine whether the intersection between the at least two polygon boundaries is
15 above a pre-defined threshold. Further, based on performing the check, upon
identifying the intersection between the at least two polygon boundaries to be above
the pre-defined threshold, assigning a unique polygon Identifier (ID) to the at least two
network coverage holes based on the intersection of the at least two polygon
boundaries.
20 [0054] Hereinafter, exemplary embodiments of the present disclosure will be
described with reference to the accompanying drawings.
[0055] The various embodiments throughout the disclosure will be explained
in more detail with reference to FIG. 1- FIG. 8.
[0056] FIG. 1 illustrates an exemplary network architecture 100 for
25 implementing a system 108 for managing network coverage holes in a network, in
accordance with an embodiment of the present disclosure. The network may
18
correspond to a network 106. Examples of the network may include, the 4G network,
the 5G network, the 6G network, and the like.
[0057] As illustrated in FIG. 1, the network architecture 100 may include one
or more computing devices or User Equipments (UEs) 104-1, 104-2…104-N
5 associated with one or more users 102-1, 102-2…102-N in an environment. A person
of ordinary skill in the art will understand that one or more users 102-1, 102-2…102-
N may be individually referred to as the user 102 and collectively referred to as the
users 102. Similarly, a person of ordinary skill in the art will understand that one or
more UEs 104-1, 104-2…104-N may be individually referred to as the UE 104 and
10 collectively referred to as the UEs 104. A person of ordinary skill in the art will
appreciate that the terms “computing device(s)” and “user equipment” may be used
interchangeably throughout the disclosure. Although three UEs 104 are depicted in
FIG. 1, however, any number of the UEs 104 may be included without departing from
the scope of the ongoing description.
15 [0058] In an embodiment, the UE 104 may include smart devices operating in
a smart environment, for example, an Internet of Things (IoT) system. In such an
embodiment, the UE 104 may include, but is not limited to, smartphones, smart
watches, smart sensors (e.g., a mechanical sensor, a thermal sensor, an electrical sensor,
a magnetic sensor, etc.), networked appliances, networked peripheral devices,
20 networked lighting system, communication devices, networked vehicle accessories,
networked vehicular devices, smart accessories, tablets, smart televisions (TVs),
computers, smart security systems, smart home systems, other devices for monitoring
or interacting with or for the user 102 and/or entities, or any combination thereof. A
person of ordinary skill in the art will appreciate that the UE 104 may include, but is
25 not limited to, intelligent, multi-sensing, network-connected devices, that can integrate
seamlessly with each other and/or with a central server or a cloud-computing system
or any other device that is network-connected.
19
[0059] In an embodiment, the UE 104 may include, but is not limited to, a
handheld wireless communication device (e.g., a mobile phone, a smart phone, a
phablet device, and so on), a wearable computer device (e.g., a head-mounted display
computer device, a head-mounted camera device, a wristwatch computer device, and
5 so on), a Global Positioning System (GPS) device, a laptop computer, a tablet
computer, or another type of portable computer, a media playing device, a portable
gaming system, and/or any other type of computer device with wireless communication
capabilities, and the like. In an embodiment, the UE 104 may include, but is not limited
to, any electrical, electronic, electro-mechanical, or an equipment, or a combination of
10 one or more of the above devices such as virtual reality (VR) devices, augmented
reality (AR) devices, a laptop, a general-purpose computer, a desktop, a personal digital
assistant, a tablet computer, a mainframe computer, or any other computing device.
Further, the UE 104 may include one or more in-built or externally coupled accessories
including, but not limited to, a visual aid device such as a camera, an audio aid, a
15 microphone, a keyboard, and input devices for receiving input from the user 102 or an
entity such as a touch pad, a touch enabled screen, an electronic pen, and the like. A
person of ordinary skill in the art will appreciate that the UE 104 may not be restricted
to the mentioned devices and various other devices may be used.
[0060] In FIG. 1, the UE 104 may communicate with the system 108 through
20 the network 106. In particular, the UE 104 may be communicatively coupled with the
network 106. The coupling includes steps of receiving, by network 106, a connection
request from UE 104. Upon receiving the connection request, the coupling includes
steps of sending, by the network 106, an acknowledgment of the connection request to
the UE 104. Further, the coupling includes steps of transmitting a plurality of signals
25 in response to the connection request.
[0061] In an embodiment, the network 106 may include at least one of the 4G
network, the 5G network, the 6G network, or the like. The network 106 may enable the
20
UE 104 to communicate with other devices in the network architecture 100 and/or with
the system 108. The network 106 may include a wireless card or some other transceiver
connection to facilitate this communication. In another embodiment, the network 106
may be implemented as, or include any of a variety of different communication
5 technologies such as a wide area network (WAN), a local area network (LAN), a
wireless network, a mobile network, a Virtual Private Network (VPN), an internet, an
intranet, a public network, a private network, a packet-switched network, a circuitswitched network, an ad hoc network, an infrastructure network, a Public-Switched
Telephone Network (PSTN), a cable network, a cellular network, a satellite network, a
10 fiber optic network, or some combination thereof. In another embodiment, the network
106 includes, by way of example but not limitation, at least a portion of one or more
networks having one or more nodes that transmit, receive, forward, generate, buffer,
store, route, switch, process, or a combination thereof, etc. one or more messages,
packets, signals, waves, voltage or current levels, some combination thereof, or so
15 forth.
[0062] In another exemplary embodiment, the network architecture 100 may
include a centralized server (not shown) may include or comprise, by way of example
but not limitation, one or more of a stand-alone server, a server blade, a server rack, a
bank of servers, a server farm, a hardware supporting a part of a cloud service or a
20 system, a home server, a hardware running a virtualized server, one or more processors
executing code to function as a server, one or more machines performing server-side
functionality as described herein, at least a portion of any of the above, some
combination thereof.
[0063] Although FIG. 1 shows exemplary components of the network
25 architecture 100, in other embodiments, the network architecture 100 may include
fewer components, different components, differently arranged components, or
additional functional components than depicted in FIG. 1. Additionally, or
21
alternatively, one or more components of the network architecture 100 may perform
functions described as being performed by one or more other components of the
network architecture 100.
[0064] FIG. 2 illustrates an exemplary block diagram 200 of the system 108
5 configured for managing network coverage holes in the network (e.g., the network
106), in accordance with an embodiment of the disclosure. FIG. 2 is explained in
conjunction with FIG. 1.
[0065] In an embodiment, the network may be, for example, the 4G network,
the 5G network, the 6G network, and the like. In an embodiment, the network coverage
10 holes are geographic areas where mobile network signals are weak or entirely absent,
preventing reliable connectivity for network users (e.g., subscribers). These network
coverage holes can lead to dropped calls, slow data speeds, or complete service loss,
often caused by physical obstructions, suboptimal antenna placement, or configuration
issues.
15 [0066] In an embodiment, the system 108 may include a processing engine
206. The processing engine 206 may be implemented as one or more microprocessors,
microcomputers, microcontrollers, digital signal processors, central processing units,
logic circuitries, and/or any devices that process data based on operational instructions.
Among other capabilities, the processing engine 206 may be configured to fetch and
20 execute computer-readable instructions stored in a memory 202 of the system 108. The
memory 202 may be configured to store one or more computer-readable instructions
or routines in a non-transitory computer-readable storage medium, which may be
fetched and executed to manage the network coverage holes in the network. The
memory 202 may include any non-transitory storage device including, for example,
25 volatile memory such as a Random-Access Memory (RAM), or a non-volatile memory
such as an Erasable Programmable Read Only Memory (EPROM), a flash memory,
and the like.
22
[0067] In an embodiment, the system 108 may include an interface(s). The
interface(s) 204 may include a variety of interfaces, for example, interfaces for data
input and output devices (I/O), storage devices, and the like. The interface(s) 204 may
facilitate communication through the system 108. The interface(s) 204 may also
5 provide a communication pathway for one or more components of the system 108.
Examples of such components include, but are not limited to, the processing engine
206 and a database 214. The processing engine 206 further includes an identifying unit
208, a processing unit 210, and an assigning unit 212. In an embodiment, the
identifying unit 208, the processing unit 210, and the assigning unit 212 may be in
10 communication with each other.
[0068] In an embodiment, initially, the identifying unit 208 is configured to
identify a plurality of network coverage holes within a pre-defined coverage area. The
plurality of network coverage holes is associated with a first network and a second
network. The identifying unit 208 may identify the plurality of network coverage holes
15 based on data collected from a plurality of data sources. In an embodiment, the plurality
of network coverage areas is identified by analyzing the data collected from various
sources. In particular, based on the analysis of the data, an area where coverage (or
signal strength) is weak or unavailable for either the first network or the second
network is marked as a network coverage hole. In an embodiment, the first network
20 and the second network may correspond to one of a 4G network, a 5G network, a 6G
network, and the like. Further, the plurality of network coverage holes includes one or
more first network coverage holes associated with the first network, one or more
second network coverage holes associated with the second network, and one or more
hybrid network coverage holes associated with the first network and the second
25 network combined. In an embodiment, each of the one or more hybrid network
coverage holes corresponds to an overlapping network coverage hole including a
combination of a first network coverage hole and a second network coverage hole.
23
[0069] For example, when the first network is the 4G network, the one or more
first network coverage holes may correspond to 4G network coverage holes. Further,
when the second network is the 5G network, the one or more second network coverage
holes may correspond to 5G network coverage holes. Furthermore, when the first
5 network is the 4G network and the second network is the 5G network, the one or more
hybrid network coverage holes correspond to the combination of a 4G network
coverage hole (i.e., the first network coverage hole) and a 5G network coverage hole
(i.e., the second network coverage hole). In an embodiment, the pre-defined network
coverage area refers to a specific geographical region or a set of boundaries that have
10 been established to be served by a given network, such as the 4G network, the 5G
network, the 6G network, and the like. This pre-defined network coverage area is
typically defined during network planning and deployment stages based on expected
signal propagation, user density, and service requirements. The predefined coverage
area may include urban, suburban, or rural environments, and can be outlined using
15 geographical coordinates, grid-based mapping, or cellular sector boundaries. Further,
the data collected from the plurality of data sources that is used to identify the plurality
of network coverage holes may include, but are not limited to, network data (i.e.,
operation data), network user logs or feedback, crowdsourced data, mobility
management data, geospatial mapping data, and network performance data.
20 [0070] In order to identify the plurality of network coverage holes, the
processing unit 210 is configured to collect the data associated with the pre-defined
coverage area corresponding to the first network and the second network from the
plurality of data sources. Further, the processing unit 210 is configured to send the data
to the identifying unit 208. The identifying unit 208 is configured to process the data
25 to identify the plurality of network coverage holes corresponding to the pre-defined
coverage area using a classification algorithm. The classification algorithm may be a
convex hull algorithm or a gift-wrapping algorithm. The convex hull algorithm is used
to find the convex hull of a set of points in computational geometry. The convex hull
24
algorithm is used to determine the outer boundary of a set of network coverage data
points. Further, areas outside the convex hull can be considered as regions with
insufficient or no network coverage (i.e., network coverage holes). The gift-wrapping
algorithm is an algorithm for computing the convex hull of a given set of points. Similar
5 to the convex hull algorithm, the gift-wrapping algorithm can be used to form the
boundary around a set of network coverage points and identify the boundary (e.g., a
polygon boundary) of network coverage, which helps in identifying areas outside of
this boundary as the network coverage holes.
[0071] Once the plurality of network coverage holes is identified, the
10 identifying unit 208 is configured to send the details associated with the plurality of
network coverage holes to the processing unit 210. The details associated with the
plurality of network coverage holes may include, for example, geolocation coordinates,
i.e., latitude and longitude defining boundary points of each network coverage hole, an
associated network type (e.g., the 4G network, the 5G network, etc.), a signal strength
15 (e.g., weak signal, no signal, etc.), and the like. The processing unit 210 is configured
to process the plurality of network coverage holes to assign the polygon boundary to
each of the plurality of network coverage holes. The polygon boundary may be
assigned to each of the plurality of network coverage holes based on the classification
algorithm. In an embodiment, the polygon boundary refers to a closed, multi-sided
20 geometric shape that defines the outer edges of a network coverage hole on a map or
spatial grid. The polygon boundary is constructed using a set of connected coordinate
points that encapsulate the area (i.e., the network coverage hole) where network signal
is weak or absent. Further, the processing unit 210 is configured to perform a check to
identify an intersection between at least two polygon boundaries associated with at
25 least two network coverage holes of the plurality of network coverage holes based on
the polygon boundary assigned to each of the plurality of network coverage holes. In
other words, the processing unit 210 is configured to check if a polygon boundary
associated with any two network coverage holes of the plurality of network coverage
25
holes overlaps with one another. For example, the processing unit 210 may perform
the check to identify whether the polygon boundary of the one or more first network
coverage holes (e.g., the 4G network coverage holes) overlaps with the polygon
boundary of the one or more second network coverage hole (e.g., the 5G network
5 coverage holes).
[0072] In one embodiment, based on the check performed, upon identifying the
intersection between the at least two polygon boundaries associated with the at least
two network coverage holes, the processing unit 210 is configured to perform a check
to determine whether the intersection between the at least two polygon boundaries is
10 above (or equals to) a pre-defined threshold (e.g., 40%). The pre-defined threshold may
be configured by the user (e.g., the network operator) based on the requirements of the
pre-defined network coverage area while establishing the network. In an embodiment,
such requirements may include, but are not limited to, expected crowd, geographic
characteristics (e.g., urban vs. rural terrain), type of services to be supported (e.g., video
15 streaming, Internet of Things (IoT) communication, emergency services), network
traffic patterns, and performance standards such as minimum signal strength or data
rate expectations. For example, when the intersection is identified between the polygon
boundary of the 4G network coverage hole and the polygon boundary of the 5G
network coverage hole, the processing unit 210 performs the check to determine if the
20 intersection is above 40% or not. In an embodiment, when the intersection between the
at least two polygon boundaries assigned to the at least two network coverage holes is
determined to be above the pre-defined threshold, each of the at least two network
coverage holes is a hybrid network coverage hole. For example, when the intersection
identified between the polygon boundary of the 4G network coverage hole and the
25 polygon boundary of the 5G network coverage hole is determined to be above 40%,
then based on the intersection, the 4G network coverage hole and the 5G network
coverage hole is determined to be the hybrid network coverage hole, i.e., the
combination of the 4G network coverage hole and the 5G network coverage hole.
26
[0073] Upon determining the intersection between the at least two polygon
boundaries to be above the pre-defined threshold, the assigning unit 212 is configured
to assign a unique polygon Identifier (ID) to the at least two network coverage holes
based on the intersection of the at least two polygon boundaries. In other words, when
5 the intersection between the at least two polygon boundaries is determined to be above
the pre-defined threshold, the assigning unit 212 is configured to assign a single unique
polygon ID to the at least two network coverage holes. For example, when the
intersection identified between the polygon boundary of the 4G network coverage hole
and the polygon boundary of the 5G network coverage hole is determined to be above
10 40%. In this case, the 4G network coverage hole and the 5G network coverage hole are
determined to be the hybrid network coverage hole, i.e., the combination of the 4G
network coverage hole and the 5G network coverage hole. Further, the assigning unit
212 is configured to assign the single polygon ID (e.g., 123) to the hybrid network
coverage hole, i.e., the combination of the 4G network coverage hole and the 5G
15 network coverage hole.
[0074] In another embodiment, based on the check performed, when the
intersection between the at least two polygon boundaries assigned to the at least two
network coverage holes is below the pre-defined threshold, each network coverage hole
of the at least two network coverage holes is one of the first network coverage hole or
20 the second network coverage hole. For example, when the intersection identified
between the polygon boundary of the 4G network coverage hole and the polygon
boundary of the 5G network coverage hole is determined to be below 40%, then the
4G network coverage hole is a separate network coverage hole (i.e., the first network
coverage hole) and the 5G network coverage hole is another separate coverage hole
25 (i.e., second network coverage hole). In this embodiment, upon identifying the
intersection between the at least two polygon boundaries to be below the pre-defined
threshold, the assigning unit 212 is configured to assign a unique polygon ID to each
network coverage hole of the at least two network coverage holes. For example, when
27
the intersection identified between the polygon boundary of the 4G network coverage
hole and the polygon boundary of the 5G network coverage hole is determined to be
below 40%, then the 4G network coverage hole is assigned a separate unique polygon
ID (e.g., 456) and the 5G network coverage hole is assigned another separate unique
5 polygon ID (e.g., 789).
[0075] In an embodiment, the processing engine 206 may be implemented as a
combination of hardware and programming (for example, programmable instructions)
to implement one or more functionalities of the processing engine 206. In the examples
described herein, such combinations of hardware and programming may be
10 implemented in several different ways. For example, the programming for the
processing engine 206 may be processor-executable instructions stored on a nontransitory machine-readable storage medium and the hardware for the processing
engine 206 may comprise a processing resource (for example, one or more processors),
to execute such instructions. In the present examples, the machine-readable storage
15 medium may store instructions that, when executed by the processing resource,
implement the processing engine 206. In such examples, the system 108 may comprise
the machine-readable storage medium storing the instructions and the processing
resource to execute the instructions, or the machine-readable storage medium may be
separate but accessible to the system 108 and the processing resource. In other
20 examples, the processing engine 206 may be implemented by electronic circuitry.
[0076] In an embodiment, the database 214 includes data (e.g., the data
associated with a plurality of pre-defined coverage area, the plurality of network
coverage holes identified, the unique polygon ID to each network coverage hole, etc.)
that may be either stored or generated as a result of functionalities implemented by any
25 of the components of the processing engine 206.
[0077] FIG. 3 with reference to FIG. 2, illustrates an exemplary high-level
architecture 300 of the system 108 and external entities for managing network coverage
28
holes in the network (e.g., the network 106), in accordance with an embodiment of the
present disclosure. FIG. 3 is explained in conjunction with FIGS. 1 and 2. In an
embodiment, each step performed by the system 108 may be performed using various
units (i.e., the identifying unit 208, the processing unit 210, and the assigning unit 212)
5 present within the processing engine 206.
[0078] In order to manage network coverage holes in the network, the system
108 is configured to communicate with a Radio Frequency (RF) analytics system 302
via a Coverage Platform (CP)-RF interface 310 over the network 106. The RF analytics
system 302 is a specialized analytical platform designed to process and interpret RF
10 signal data for the networks. The RF analytics system 302 captures and stores RFrelated parameters such as signal power, operating frequency, and geolocation
information derived from transmitted and received RF signals. These RF-related
parameters are critical in assessing the quality of wireless communication and play a
vital role in monitoring network performance. In an embodiment, the RF analytics
15 system 302 may correspond to a data source of the plurality of data sources. The system
108 is configured to collect these RF-related parameters from the RF analytics system
302 to identify the plurality of network coverage holes within the network.
[0079] Further, the system 108 may be configured to communicate with a
master database 304 to collect the data associated with the pre-defined coverage area
20 corresponding to the first network and the second network. In an embodiment, the
system 108 may interact with the master database 304 via a CP – Master Database
(MDB) interface 312. The CP may correspond to the system 108. In other words, the
CP-MDB interface 312 is used to facilitate communication between the system 108
and the master database 304 over the network 106. In an embodiment, the master
25 database 304 may be periodically updated based on the data associated with the
plurality of pre-defined coverage areas. The data associated with the plurality of predefined coverage areas may be fetched from one or more of the plurality of data sources
29
in order to update the master database 304. In an embodiment, the data in the master
database 304 may be, for example, the network data (i.e., operation data), the network
user logs or feedback, the crowdsourced data, the mobility management data, the
geospatial mapping data, and the network performance data. The master database 304
5 may be updated based on the data from the one or more of plurality of data sources,
e.g., network management systems (NMS), mobile applications or customer service
portals, Mobility Management Entities (MMEs), Geographic Information System
(GIS), and the like.
[0080] Further, the system 108 is configured to communicate with a Work
10 Order (WO) system 306 via a CP – Task Tracker (TT) microservice interface over the
network 106. The WO system 306 is a platform used to manage and track maintenance,
upgrades, and corrective actions within the network. The WO system 306 receives
receive inputs, such as information associated with the plurality of network coverage
holes, the unique polygon ID assigned to the plurality of network coverage holes from
15 the system 108. Further, the WO system 306 is configured to generate work orders to
ensure that all network-related tasks are logged, assigned, monitored, and completed
efficiently, supporting better operational workflow and faster issue (e.g., the plurality
of network coverage holes) resolution.
[0081] Further, the WO system 306 is configured to communicate with an
20 external entity, e.g., an optimization team 308. In other words, the user (e.g., the
network operator) of the optimization team 308 can access the WO system 306 to
analyze the work orders and take appropriate corrective actions, such as site
reconfiguration, antenna adjustments, or deployment of additional resources. In an
embodiment, the work orders may include, for example, an antenna reorientation or a
25 tilt adjustment, a power level reconfiguration, network handover parameter
optimization, deployment of additional small cells, and the like. Further, the work order
generated by the WO system 306 may be used by members (e.g., the network operator)
30
of the optimization to implement work orders corresponding to the plurality of network
coverage holes to enhance the network users' (e.g., subscribers) experience and overall
network performance. For example, the network operator may be configured to reorient
the antenna or deploy a set of additional small cells to increase coverage of a
5 corresponding network.
[0082] FIG. 4 in reference to FIG. 2 illustrates an exemplary flow diagram 400
of a classification algorithm for managing network coverage holes in the network (e.g.,
the network 106), in accordance with an embodiment of the present disclosure. FIG. 4
is explained in conjunction with FIGS. 1, 2 and 3. Each step of the flow diagram 400
10 may be performed by various units (e.g., the identifying unit 208, the processing unit
210, and the assigning unit 212) present within the processing engine 206 of the system
108.
[0083] In an embodiment, the network coverage holes are geographic areas
where mobile network signals are weak or entirely absent, preventing reliable
15 connectivity for network users (e.g., subscribers). These network coverage holes can
lead to dropped calls, slow data speeds, or complete service loss, often caused by
physical obstructions, suboptimal antenna placement, or configuration issues. In an
embodiment, the classification algorithm may correspond to a classification algorithm
404. The classification algorithm 404 is configured to receive the data from the
20 plurality of data sources. The data may be associated with the pre-defined coverage
area corresponding to the first network and the second network. In an embodiment, the
first network and the second network may correspond to one of a 4G network, a 5G
network, a 6G network, and the like. Further, the pre-defined network coverage area
refers to the specific geographical region or the set of boundaries that have been
25 established to be served by the given network, such as the 4G network, the 5G network,
the 6G network, and the like. In an embodiment, the data collected from the plurality
of data sources may include, but are not limited to, the network data (i.e., operation
31
data), the network user logs or feedback, the crowdsourced data, the mobility
management data, the geospatial mapping data, and the network performance data. For
example, as depicted in the present FIG. 4, the data collected from the plurality of data
sources may be the start and end time of call, geo-located information, cell IDs, and
5 band information, etc.
[0084] Once this data is collected, this data is provided as an input 402 to the
classification algorithm 404. The classification algorithm 404 in conjunction with the
identifying unit 208 is configured to process the data to identify the plurality of network
coverage holes within the pre-defined coverage area associated with the first network
10 and the second network. The classification algorithm 404 may be the convex hull
algorithm or the gift-wrapping algorithm. The convex hull algorithm is used to find the
convex hull of the set of points in computational geometry. The convex hull algorithm
is used to determine the outer boundary of the set of network coverage data points.
Further, areas outside the convex hull can be considered as regions with insufficient or
15 no network coverage (i.e., network coverage holes). The gift-wrapping algorithm is an
algorithm for computing the convex hull of the given set of points. Similar to the
convex hull algorithm, the gift-wrapping algorithm can be used to form the boundary
around the set of network coverage points and identify the boundary of network
coverage, which helps in identifying areas outside of this boundary as the network
20 coverage holes.
[0085] In other words, the classification algorithm 404 is configured to process
the input 402 to generate an output 406. The output 406 of the classification algorithm
404 is the plurality of network coverage holes. In an embodiment, the plurality of
network coverage holes corresponds to the one or more first network coverage holes
25 associated with the first network, the one or more second network coverage holes
associated with the second network, and the one or more hybrid network coverage
holes associated with the first network and the second network combined. For example,
32
the one or more first network coverage holes may be the 4G network coverage holes,
the one or more second network coverage holes may be the 5G network coverage holes,
and the one or more hybrid network coverage holes may be the combination of the 4G
network coverage hole and the 5G network coverage hole. Further, once the output
5 406, i.e., the plurality of network coverage holes is generated using the classification
algorithm 404, the output 406 is provided to the processing unit 210 for further
processing. In an embodiment, the output 406 is rendered to the user, i.e., the network
operator.
[0086] FIG. 5 in reference to FIG. 2, illustrates an exemplary pictorial depiction
10 500 representing network coverage holes in the network (e.g., the network 106), in
accordance with an embodiment of the present disclosure. FIG. 5 is explained in
conjunction with FIGS. 1, 2, 3, and 4. In an embodiment, the network may be, for
example, the 4G network, the 5G network, the 6G network, and the like.
[0087] In particular, FIG. 5 represents the plurality of network coverage holes
15 identified with the pre-defined network coverage area that are associated with the first
network and the second network. As depicted in the FIG. 5, the first network may
correspond to the 4G network and the second network may correspond to the 5G
network. Further, the plurality of network coverage holes depicts a 4G network
coverage hole 502, a 4G network coverage hole 504 (i.e., the first network coverage
20 hole), a 5G network coverage hole 506 (i.e., the second network coverage hole. As
depicted in FIG. 5, the polygon boundary is assigned to each of the plurality of network
coverage holes. Further, based on the assigned polygon boundary, the check is
performed to identify the intersection between the at least two polygon boundaries
associated with the at least two network coverage holes.
25 [0088] For example, as depicted in FIG. 5, in the first case, the polygon
boundary assigned to the 4G network coverage hole 502 associated with the first
network (i.e., 4G network) does not intersect with any other polygon boundary of any
33
other coverage hole. In this case, a separate unique polygon ID may be assigned to the
4G network coverage hole 502. In the second case, based on the check performed, the
polygon boundary assigned to the 4G network coverage hole 504 is determined to
intersect with the polygon boundary assigned to the 5G network coverage hole 506. In
5 this case, the check may be performed to determine whether the intersection between
the polygon boundary of the 4G network coverage hole 504 and the polygon boundary
of the 5G network coverage hole 506 is above (or equals to) the pre-defined threshold
(e.g., 60%) or not. As depicted in FIG. 5, based on the check performed, upon
determining the intersection between the polygon boundary of the 4G network
10 coverage hole 504 and the polygon boundary of the 5G network coverage hole 506 to
be below the pre-defined threshold (e.g., 60%), a separate unique polygon ID may be
assigned to each of the 4G network coverage hole 504 and the 5G network coverage
hole 506.
[0089] FIG. 6 in reference to FIG. 2, illustrates an exemplary flow diagram of
15 a method 600 for managing network coverage holes in the network (i.e., the network
106), in accordance with an embodiment of the present disclosure. FIG. 6 is explained
in conjunction with FIGS. 1, 2, 3, 4, and 5. Each step of the method 600 may be
performed by various units (e.g., the identifying unit 208, the processing unit 210, and
the assigning unit 212) present within the processing engine 206 of the system 108.
20 [0090] In an embodiment, the network coverage holes are geographic areas
where mobile network signals are weak or entirely absent, preventing reliable
connectivity for network users (e.g., subscribers). These network coverage holes can
lead to dropped calls, slow data speeds, or complete service loss, often caused by
physical obstructions, suboptimal antenna placement, or configuration issues. In order
25 to manage the network coverage holes in the network, initially, the data associated with
the pre-defined coverage area corresponding to the first network and the second
network may be collected from the plurality of data sources. In an embodiment, the
34
data collected from the plurality of data sources may include, but are not limited to, the
network data (i.e., operation data), the network user logs or feedback, the crowdsourced
data, the mobility management data, the geospatial mapping data, and the network
performance data. Further, examples of the plurality of data sources may include the
5 RF analytics system 302 and the master database 304. The master database 304 may
be updated based on data from various sources, e.g., the NMS, mobile applications or
customer service portals, the MMEs, the GIS, and the like.
[0091] In an embodiment, the pre-defined network coverage area refers to the
specific geographical region or the set of boundaries that have been established to be
10 served by the given network, such as the 4G network, the 5G network, the 6G network,
and the like. This pre-defined network coverage area is typically defined during
network planning and deployment stages based on expected signal propagation, user
density, and service requirements. The pre-defined coverage area may include urban,
suburban, or rural environments, and can be outlined using geographical coordinates,
15 grid-based mapping, or cellular sector boundaries.
[0092] Once the data is collected, at step 602, the plurality of network coverage
holes within the pre-defined coverage area may be identified. In an embodiment, the
plurality of network coverage holes may be associated with the first network and the
second network. In an embodiment, the first network and the second network may
20 correspond to one of the 4G network, the 5G network, the 6G network, and the like.
Further, the plurality of network coverage holes includes the one or more first network
coverage holes associated with the first network, the one or more second network
coverage holes associated with the second network, and the one or more hybrid
network coverage holes associated with the first network and the second network
25 combined. In an embodiment, each of the one or more hybrid network coverage holes
corresponds to the overlapping network coverage hole, including the combination of
the first network coverage hole and the second network coverage hole. For example,
35
when the first network is the 5G network, the one or more first network coverage holes
may correspond to 5G network coverage holes. Further, when the second network is
the 6G network, the one or more second network coverage holes may correspond to
6G network coverage holes. Furthermore, when the first network is the 5G network
5 and the second network is the 6G network, the one or more hybrid network coverage
holes correspond to the combination of the 5G network coverage hole (i.e., the first
network coverage hole) and the 6G network coverage hole (i.e., the second network
coverage hole).
[0093] In an embodiment, the plurality of network coverage holes
10 corresponding to the pre-defined coverage area may be identified using the
classification algorithm. The classification algorithm may be the convex hull algorithm
or the gift-wrapping algorithm. In some embodiments, any other similar classification
algorithm, e.g., Graham’s scan algorithm, QuickHull algorithm, etc., may be utilized
to identify the plurality of network coverage holes corresponding to the pre-defined
15 coverage area. Once the plurality of network coverage holes is identified, at step 604,
the plurality of network coverage holes is processed to assign the polygon boundary to
each of the plurality of network coverage holes. In an embodiment, the polygon
boundary refers to the closed, multi-sided geometric shape that defines the outer edges
of a network coverage hole on a map or spatial grid. Upon assigning the polygon
20 boundary, at step 606, the check is performed to identify the intersection between the
at least two polygon boundaries associated with the at least two network coverage holes
of the plurality of network coverage holes based on the polygon boundary assigned to
each of the plurality of network coverage holes. In other words, the check is performed
to determine if the polygon boundary associated with any two network coverage holes
25 of the plurality of network coverage holes overlaps with one another. For example, the
check is performed to identify whether the polygon boundary of the first network
coverage hole (e.g., the 5G network coverage hole) overlaps with the polygon boundary
of the one or more second network coverage hole (e.g., the 6G network coverage hole).
36
[0094] In one embodiment, based on the check performed, upon identifying the
intersection between the at least two polygon boundaries associated with the at least
two network coverage holes, at step 608, the check is performed to determine whether
the intersection between the at least two polygon boundaries is above the pre-defined
5 threshold (e.g., 40%). The pre-defined threshold may be configured by the user (e.g.,
the network operator) based on the requirements of the pre-defined network coverage
area while establishing a corresponding network. In an embodiment, such requirements
may include, but are not limited to, expected crowd, geographic characteristics (e.g.,
urban vs. rural terrain), type of services to be supported (e.g., video streaming, IoT
10 communication, emergency services), network traffic patterns, and performance
standards such as minimum signal strength or data rate expectations.
[0095] By way of an example, when the intersection is identified between the
polygon boundary of the 5G network coverage hole and the polygon boundary of the
6G network coverage hole, the check is performed to determine if the intersection is
15 above or equals to 40% or not. In an embodiment, when the intersection between the
at least two polygon boundaries assigned to the at least two network coverage holes is
determined to be above (or equals to) the pre-defined threshold, the at least two network
coverage holes is the hybrid network coverage hole. For example, when the intersection
identified between the polygon boundary of the 5G network coverage hole and the
20 polygon boundary of the 6G network coverage hole is determined to be above 40%,
then based on the intersection, the 5G network coverage hole and the 6G network
coverage hole is determined to be the hybrid network coverage hole, i.e., the
combination of the 5G network coverage hole and the 6G network coverage hole.
[0096] Upon determining the intersection between the at least two polygon
25 boundaries to be above the pre-defined threshold, at step 610, the unique polygon ID
is assigned to the at least two network coverage holes based on the intersection of the
at least two polygon boundaries. In an embodiment, when the intersection between the
37
at least two polygon boundaries is determined to be above the pre-defined threshold, a
single unique polygon ID to the at least two network coverage holes. For example,
when the intersection identified between the polygon boundary of the 5G network
coverage hole and the polygon boundary of the 6G network coverage hole is
5 determined to be above 40%. In this case, the 5G network coverage hole and the 6G
network coverage hole are determined to be the hybrid network coverage hole, i.e., the
combination of the 5G network coverage hole and the 6G network coverage hole.
Further, the single polygon ID (e.g., P1) is assigned to the hybrid network coverage
hole, i.e., the combination of the 5G network coverage hole and the 6G network
10 coverage hole.
[0097] In another embodiment, based on the check performed, when the
intersection between the at least two polygon boundaries assigned to the at least two
network coverage holes is determined to be below the pre-defined threshold, each
network coverage hole of the at least two network coverage holes is one of the first
15 network coverage hole or the second network coverage hole. For example, when the
intersection identified between the polygon boundary of the 5G network coverage hole
and the polygon boundary of the 6G network coverage hole is determined to be below
40%, then the 5G network coverage hole is considered as a separate network coverage
hole (i.e., the first network coverage hole) and the 6G network coverage hole is
20 considered as an another separate coverage hole (i.e., second network coverage hole).
In this embodiment, upon identifying the intersection between the at least two polygon
boundaries to be below the pre-defined threshold, the unique polygon ID to each
network coverage hole of the at least two network coverage holes. For example, when
the intersection identified between the polygon boundary of the 5G network coverage
25 hole and the polygon boundary of the 6G network coverage hole is determined to be
below 40%, then the 5G network coverage hole is assigned a separate unique polygon
ID (e.g., P2) and the 6G network coverage hole is assigned another separate unique
polygon ID (e.g., P3).
38
[0098] FIG. 7 in reference to FIG. 2 and FIG. 6, illustrates an exemplary
flowchart of a process 700 of managing network coverage holes in the network (i.e.,
the network 106), in accordance with an embodiment of the present disclosure. FIG. 7
is explained in conjunction with FIGS. 1, 2, 3, 4, 5, and 6. Each step of the process 700
5 may be performed by various units (e.g., the identifying unit 208, the processing unit
210, and the assigning unit 212) present within the processing engine 206 of the system
108.
[0099] The process to manage the network coverage holes in the network starts
at step 702. Initially, the data associated with the pre-defined coverage area
10 corresponding to the first network and the second network may be collected from the
plurality of data sources. Once the data is collected, the plurality of network coverage
holes may be identified within the pre-defined coverage area. In an embodiment, the
plurality of network coverage holes may be associated with the first network and the
second network. In an embodiment, the first network and the second network may
15 correspond to one of the 4G network, the 5G network, the 6G network, and the like.
[00100] Once the plurality of network coverage holes is identified, at step 704,
the polygon boundaries may be assigned to the plurality of network coverage holes. In
an embodiment, the polygon boundary refers to the closed, multi-sided geometric
shape that defines the outer edges of a network coverage hole on a map or spatial grid.
20 Upon assigning the polygon boundary, at step 706, the check is performed to identify
the intersection between the at least two polygon boundaries associated with the at least
two network coverage holes of the plurality of network coverage holes based on the
polygon boundary assigned to each of the plurality of network coverage holes.
[00101] In an embodiment, based on the check performed, upon identifying the
25 intersection between the at least two polygon boundaries associated with the at least
two network coverage holes, at step 708, the check is performed to determine whether
the intersection between the at least two polygon boundaries is above the pre-defined
39
threshold (e.g., 50%). The pre-defined threshold may be configured by the user (e.g.,
the network operator) based on the requirements of the pre-defined network coverage
area while establishing the corresponding network. In one embodiment, based on the
check performed at step 708, upon determining the intersection between the at least
5 two polygon boundaries assigned to the at least two network coverage to be below the
pre-defined threshold, at step 710, each network coverage hole of the at least two
network coverage holes is assigned the unique polygon ID. In another embodiment,
based on then check performed at step 708, upon determining the intersection between
at least two polygon boundaries to be above (or equal to) the pre-defined threshold, at
10 step 712, the unique polygon ID is assigned to the at least two network coverage holes
based on the intersection of the at least two polygon boundaries. Once the unique
polygon ID is assigned to each of the plurality of network coverage holes, the process
700 ends at step 714.
[00102] FIG. 8 illustrates an exemplary computer system 800 in which or with
15 which embodiments of the present disclosure may be implemented. As shown in FIG.
8, the computer system 800 may include an external storage device 810, a bus 820, a
main memory 830, a read-only memory 840, a mass storage device 850,
communication port(s) 860, and a processor 870. A person skilled in the art will
appreciate that the computer system 800 may include more than one processor and
20 communication ports. The processor 870 may include various modules associated with
embodiments of the present disclosure. The communication port(s) 860 may be any of
an RS-232 port for use with a modem-based dialup connection, a 10/100 Ethernet port,
a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other
existing or future ports. The communication port(s) 860 may be chosen depending on
25 a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any
network to which the computer system 800 connects.
40
[00103] The main memory 830 may be Random-Access Memory (RAM), or any
other dynamic storage device commonly known in the art. The read-only memory 840
may be any static storage device(s) e.g., but not limited to, a Programmable Read Only
Memory (PROM) chips for storing static information e.g., start-up or Basic
5 Input/Output System (BIOS) instructions for the processor 870. The mass storage
device 850 may be any current or future mass storage solution, which can be used to
store information and/or instructions. The mass storage device 850 includes, but is not
limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced
Technology Attachment (SATA) hard disk drives or solid-state drives (internal or
10 external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), one or
more optical discs, a Redundant Array of Independent Disks (RAID) storage, e.g. an
array of disks.
[00104] The bus 820 communicatively couples the processor 870 with the other
memory, storage, and communication blocks. The bus 820 may be, e.g. a Peripheral
15 Component Interconnect (PCI)/PCI Extended (PCI-X) bus, Small Computer System
Interface (SCSI), Universal Serial Bus (USB), or the like, for connecting expansion
cards, drives, and other subsystems as well as other buses, such a front side bus (FSB),
which connects the processor 870 to the computer system 800.
[00105] Optionally, operator and administrative interfaces, e.g. a display,
20 keyboard, joystick, and a cursor control device, may also be coupled to the bus 820 to
support direct operator interaction with the computer system 800. Other operator and
administrative interfaces can be provided through network connections connected
through the communication port(s) 860. The components described above are meant
only to exemplify various possibilities. In no way should the aforementioned
25 exemplary computer system 800 limit the scope of the present disclosure.
[00106] In an exemplary embodiment, the system for managing network
coverage holes in the network is disclosed. The system includes the identifying unit
41
configured to identify the plurality of network coverage holes within the pre-defined
coverage area associated with the first network and the second network based on data
collected from the plurality of data sources. The system includes the processing unit
configured to process the plurality of network coverage holes to assign the polygon
5 boundary to each of the plurality of network coverage holes. The processing unit is
further configured to perform the check to identify the intersection between at least two
polygon boundaries associated with at least two network coverage holes of the plurality
of network coverage holes based on the polygon boundary assigned to each of the
plurality of network coverage holes. The processing unit is further configured to
10 perform the check to determine whether the intersection between the at least two
polygon boundaries is above the pre-defined threshold, upon identifying the
intersection between the at least two polygon boundaries associated with the at least
two network coverage holes. The system includes the assigning unit configured to
assign the unique polygon ID to the at least two network coverage holes based on the
15 intersection of the at least two polygon boundaries upon identifying the intersection
between the at least two polygon boundaries to be above the pre-defined threshold.
[00107] In another exemplary embodiment, the present disclosure discloses a
computer program product comprising a non-transitory computer-readable medium
comprising instructions that, when executed by one or more processors, cause the one
20 or more processors to perform the method for managing network coverage holes in the
network. The method includes identifying, by the identifying unit, the plurality of
network coverage holes within the pre-defined coverage area associated with the first
network and the second network based on data collected from the plurality of data
sources. The method includes processing, by the processing unit, the plurality of
25 network coverage holes to assign the polygon boundary to each of the plurality of
network coverage holes. The method includes performing, by the processing unit, the
check to identify the intersection between at least two polygon boundaries associated
with at least two network coverage holes of the plurality of network coverage holes
42
based on the polygon boundary assigned to each of the plurality of network coverage
holes. The method includes, upon identifying the intersection between the at least two
polygon boundaries associated with the at least two network coverage holes,
performing, by the processing unit, the check to determine whether the intersection
5 between the at least two polygon boundaries is above the pre-defined threshold. The
method includes, upon identifying the intersection between the at least two polygon
boundaries to be above the pre-defined threshold, assigning, by the assigning unit, the
unique polygon ID to the at least two network coverage holes based on the intersection
of the at least two polygon boundaries.
10 [00108] While the foregoing describes various embodiments of the invention,
other and further embodiments of the invention may be devised without departing from
the basic scope thereof. The scope of the invention is determined by the claims that
follow. The invention is not limited to the described embodiments, versions or
examples, which are included to enable a person having ordinary skill in the art to make
15 and use the invention when combined with information and knowledge available to the
person having ordinary skill in the art.
[00109] The method and system of the present disclosure may be implemented
in a number of ways. For example, the methods and systems of the present disclosure
may be implemented by software, hardware, firmware, or any combination of software,
20 hardware, and firmware. The above-described order for the steps of the method is for
illustration only, and the steps of the method of the present disclosure are not limited
to the order specifically described above unless specifically stated otherwise. Further,
in some embodiments, the present disclosure may also be embodied as programs
recorded in a recording medium, the programs including machine-readable instructions
25 for implementing the methods according to the present disclosure. Thus, the present
disclosure also covers a recording medium storing a program for executing the method
according to the present disclosure.
43
[00110] While considerable emphasis has been placed herein on the preferred
embodiments, it will be appreciated that many embodiments can be made and that
many changes can be made in the preferred embodiments without departing from the
principles of the disclosure. These and other changes in the preferred embodiments of
5 the disclosure will be apparent to those skilled in the art from the disclosure herein,
whereby it is to be distinctly understood that the foregoing descriptive matter is to be
implemented merely as illustrative of the disclosure and not as a limitation.
[00111] The present disclosure offers significant technical advancements for
managing network coverage holes in the network. These advancements overcome the
10 limitations of existing solutions by assigning unique polygon IDs to network coverage
holes based on the intersection between the polygon boundaries of the network
coverage holes. The present disclosure provides better service coverage in diverse and
challenging environments by leveraging the complementary propagation
characteristics of the networks. Further, the present disclosure ensures seamless
15 connectivity by facilitating smooth transitions between network coverage areas
associated with networks (e.g., the 4G network, the 5G network, the 6G network, etc.),
thereby minimizing service disruptions for mobile users (i.e., network users or
subscribers). Additionally, the present disclosure improves overall network capacity
through effective utilization of overlapping network coverage areas, particularly in
20 densely populated or high-demand areas.
ADVANTAGES OF THE PRESENT DISCLOSURE
[00112] The present disclosure provides a method and a system for managing
network coverage holes in a network.
[00113] The present disclosure ensures seamless connectivity by facilitating
25 smooth transitions between network coverage areas associated with networks (e.g., 4G,
44
5G, and 6G, etc.), thereby minimizing service disruptions for mobile users (i.e.,
network users or subscribers).
[00114] The present disclosure enhances data speeds by enabling devices to
utilize advanced network capabilities when available, thereby supporting high5 bandwidth applications such as video streaming, virtual reality, and augmented reality.
[00115] The present disclosure improves overall network capacity through
effective utilization of overlapping network coverage areas, particularly in densely
populated or high-demand areas.
[00116] The present disclosure provides better service coverage in diverse and
10 challenging environments by leveraging the complementary propagation
characteristics of the networks.
[00117] The present disclosure supports low-latency communication by
allowing devices to take advantage of high-speed networks (5G) reduced latency in
areas with overlapping coverage, thereby enhancing real-time application (e.g., a video
15 calling application) performance.
45
WE CLAIM:
1. A method (600) for managing network coverage holes in a network, the method
(600) comprising:
5 identifying (602), by an identifying unit (208), a plurality of network coverage
holes within a pre-defined coverage area associated with a first network and a second
network based on data collected from a plurality of data sources;
processing (604), by a processing unit (210), the plurality of network coverage
holes to assign a polygon boundary to each of the plurality of network coverage holes;
10 performing (606), by the processing unit (210), a check to identify an
intersection between at least two polygon boundaries associated with at least two
network coverage holes of the plurality of network coverage holes based on the
polygon boundary assigned to each of the plurality of network coverage holes;
upon identifying the intersection between the at least two polygon boundaries
15 associated with the at least two network coverage holes, performing (608), by the
processing unit (210), a check to determine whether the intersection between the at
least two polygon boundaries is above a pre-defined threshold; and
upon identifying the intersection between the at least two polygon boundaries
to be above the pre-defined threshold, assigning (610), by an assigning unit (212), a
20 unique polygon Identifier (ID) to the at least two network coverage holes based on the
intersection of the at least two polygon boundaries.
2. The method (600) as claimed in claim 1, further comprising:
collecting, by the processing unit (210), the data associated with the pre-defined
25 coverage area corresponding to the first network and the second network, from the
plurality of data sources; and
46
processing, by the identifying unit (208), the data to identify the plurality of
network coverage holes corresponding to the pre-defined coverage area using a
classification algorithm.
5 3. The method (600) as claimed in claim 2, wherein the plurality of network
coverage holes comprises one or more first network coverage holes associated with the
first network, one or more second network coverage holes associated with the second
network, and one or more hybrid network coverage holes associated with the first
network and the second network combined.
10
4. The method (600) as claimed in claim 3, wherein each of the one or more hybrid
network coverage holes corresponds to an overlapping network coverage hole
comprising a combination of a first network coverage hole and a second network
coverage hole.
15
5. The method (600) as claimed in claim 1, wherein when the intersection between
the at least two polygon boundaries assigned to the at least two network coverage holes
is determined to be above the pre-defined threshold, the at least two network coverage
holes is a hybrid network coverage hole.
20
6. The method (600) as claimed in claim 1, further comprising:
upon identifying the intersection between the at least two polygon boundaries
to be below the pre-defined threshold, assigning, by the assigning unit (212), a unique
polygon ID to each network coverage hole of the at least two network coverage holes.
25
7. The method (600) as claimed in claim 6, wherein when the intersection of the
at least two polygon boundaries assigned to the at least two network coverage holes is
determined to be below the pre-defined threshold, each network coverage hole of the
47
at least two network coverage holes is one of a first network coverage hole or a second
network coverage hole.
8. A system (108) for managing network coverage holes in a network, the system
5 (108) comprising:
an identifying unit (208) configured to identify (602) a plurality of
network coverage holes within a pre-defined coverage area associated with a
first network and a second network based on data collected from a plurality of
data sources;
10 a processing unit (210) configured to process (604) the plurality of
network coverage holes to assign a polygon boundary to each of the plurality
of network coverage holes;
the processing unit (210) is configured to perform (606) a check to
identify an intersection between at least two polygon boundaries associated
15 with at least two network coverage holes of the plurality of network coverage
holes based on the polygon boundary assigned to each of the plurality of
network coverage holes;
the processing unit (210) is configured to perform (606) a check to
determine whether the intersection between the at least two polygon boundaries
20 is above a pre-defined threshold, upon identifying the intersection between the
at least two polygon boundaries associated with the at least two network
coverage holes; and
an assigning unit (212) configured to assign (608) a unique polygon
Identifier (ID) to the at least two network coverage holes based on the
25 intersection of the at least two polygon boundaries upon identifying the
intersection between the at least two polygon boundaries to be above the predefined threshold.
48
9. The system (108) as claimed in claim 8, wherein:
the processing unit (210) is configured to collect the data associated with the
pre-defined coverage area corresponding to the first network and the second network,
from the plurality of data sources; and
5 the identifying unit (208) is configured to process the data to identify the
plurality of network coverage holes corresponding to the pre-defined coverage area
using a classification algorithm.
10. The system (108) as claimed in claim 9, wherein the plurality of network
10 coverage holes comprises one or more first network coverage holes associated with the
first network, one or more second network coverage holes associated with the second
network, and one or more hybrid network coverage holes associated with the first
network and the second network combined.
15 11. The system (108) as claimed in claim 10, wherein each of the one or more
hybrid network coverage holes corresponds to an overlapping network coverage hole
comprising a combination of a first network coverage hole and a second network
coverage hole.
20 12. The system (108) as claimed in claim 8, wherein when the intersection between
the at least two polygon boundaries assigned to the at least two network coverage holes
is determined to be above the pre-defined threshold, the at least two network coverage
holes is a hybrid network coverage hole.
25 13. The system (108) as claimed in claim 8, wherein the assigning unit (212) is
configured to:
assign a unique polygon ID to each network coverage hole of the at least two
network coverage holes, upon identifying the intersection between the at least two
polygon boundaries to be below the pre-defined threshold.
49
14. The system (108) as claimed in claim 13, wherein when the intersection of the
at least two polygon boundaries assigned to the at least two network coverage holes is
determined to be below the pre-defined threshold, each network coverage hole of the
5 at least two network coverage holes is one of a first network coverage hole or a second
network coverage hole.
Dated this 29 day of April 2025
~Digitally signed~
Arindam Paul
REG.NO:IN/PA-174
of De Penning & De Penning
Agent for the Applicants
50
ABSTRACT
METHOD AND SYSTEM FOR MANAGING NETWORK COVERAGE
HOLES IN A NETWORK
5 A method (600) for managing network coverage holes in a network is disclosed. The
method (600) includes identifying (602) a plurality of network coverage holes within
a pre-defined coverage area associated with a first network and a second network. The
method includes processing (604) the plurality of network coverage holes to assign a
polygon boundary to each of the plurality of network coverage holes. The method
10 includes performing (606) a check to identify an intersection between at least two
polygon boundaries associated with at least two network coverage holes. The method
includes performing (608) a check to determine whether the intersection between the
at least two polygon boundaries is above a pre-defined threshold; and assigning (610)
a unique polygon Identifier (ID) to the at least two network coverage holes based on
15 the intersection of the at least two polygon boundaries, upon identifying the intersection
to be above the pre-defined threshold.
| # | Name | Date |
|---|---|---|
| 1 | 202421034531-STATEMENT OF UNDERTAKING (FORM 3) [01-05-2024(online)].pdf | 2024-05-01 |
| 2 | 202421034531-PROVISIONAL SPECIFICATION [01-05-2024(online)].pdf | 2024-05-01 |
| 3 | 202421034531-FORM 1 [01-05-2024(online)].pdf | 2024-05-01 |
| 4 | 202421034531-FIGURE OF ABSTRACT [01-05-2024(online)].pdf | 2024-05-01 |
| 5 | 202421034531-DRAWINGS [01-05-2024(online)].pdf | 2024-05-01 |
| 6 | 202421034531-FORM-26 [11-06-2024(online)].pdf | 2024-06-11 |
| 7 | 202421034531-Proof of Right [04-07-2024(online)].pdf | 2024-07-04 |
| 8 | 202421034531-ORIGINAL UR 6(1A) FORM 26-080824.pdf | 2024-08-13 |
| 9 | 202421034531-ORIGINAL UR 6(1A) FORM 1-090824.pdf | 2024-08-17 |
| 10 | 202421034531-Power of Attorney [29-04-2025(online)].pdf | 2025-04-29 |
| 11 | 202421034531-FORM-5 [29-04-2025(online)].pdf | 2025-04-29 |
| 12 | 202421034531-DRAWING [29-04-2025(online)].pdf | 2025-04-29 |
| 13 | 202421034531-Covering Letter [29-04-2025(online)].pdf | 2025-04-29 |
| 14 | 202421034531-CORRESPONDENCE-OTHERS [29-04-2025(online)].pdf | 2025-04-29 |
| 15 | 202421034531-COMPLETE SPECIFICATION [29-04-2025(online)].pdf | 2025-04-29 |
| 16 | Abstract.jpg | 2025-05-28 |
| 17 | 202421034531-FORM 18 [19-08-2025(online)].pdf | 2025-08-19 |