WO2025057211A1 - Procédé et système de gestion de demandes de service dans un réseau - Google Patents
Procédé et système de gestion de demandes de service dans un réseau Download PDFInfo
- Publication number
- WO2025057211A1 WO2025057211A1 PCT/IN2024/051721 IN2024051721W WO2025057211A1 WO 2025057211 A1 WO2025057211 A1 WO 2025057211A1 IN 2024051721 W IN2024051721 W IN 2024051721W WO 2025057211 A1 WO2025057211 A1 WO 2025057211A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- nrf
- identity
- service request
- network
- sepp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/563—Data redirection of data network streams
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4588—Network directories; Name-to-address mapping containing mobile subscriber information, e.g. home subscriber server [HSS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
Definitions
- Embodiments of the present disclosure generally relate to network performance management systems. More particularly, embodiments of the present disclosure relate to methods and systems for managing service requests in a network.
- Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements.
- the first generation of wireless communication technology was based on analog technology and offered only voice services.
- 2G second-generation
- 3G technology marked the introduction of high-speed internet access, mobile video calling, and location-based services.
- 4G fourth generation
- the fourth generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security.
- 5G fifth generation
- wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
- the Network Slice Selection Function (NSSF) of the wireless communication networks can be used by the Access and Mobility Management Function (AMF) to assist with the selection of the Network Slice instances that will serve a particular device.
- AMF Access and Mobility Management Function
- the NSSF will determine the Allowed Network Slice Selection Assistance Information (NSSAI) that is supplied to the device.
- the NSSF may be used to allocate an appropriate AMF if the current AMF is not able to support all network slice instances for a given device.
- the NSSF facilitates AMF in retrieving Network Repository Function (NRF) related information.
- NRF Network Repository Function
- the provided NRF should be used for retrieving/subscribing network function (NF)/Service-related information for selected Network Slice instances.
- NRF doesn’t provide support for discovery/ subscribe/ access token parameters when supplied by NF without target PLMN provided, either in home network or external network. Further, the NRF may conventionally screen incoming requests from SEPP based on the presence of a header. Such an NRF may however be deployed only when the SEPP and the NRF are in a common network, or if the SEPP is in the same network as the NRF. Such a deployment further limits the scope of operation of the NRF with respect to other vendor NRF s or external network environments.
- SEPP security edge protection proxy
- PLMN Target Public Land Mobile Network
- An aspect of the present disclosure may relate to a method for managing service requests in a network.
- the method comprises receiving, by a transceiver unit at a network repository function (NRF), a service request from a network function (NF). Further, the method comprises determining, by a determining unit at the NRF, a set of attributes in the service request. Further, the method comprises determining, by a processing unit at the NRF, based on the set of attributes identifier, an identity of a target public land mobile network (PLMN) relating to the service request, where the identity of the target PLMN is one of a first identity, and a second identity. Further, the method comprises forwarding, by the transceiver unit at the NRF, based on the determined identity of the target PLMN, the service request towards a target network node associated with the target PLMN.
- NRF network repository function
- NF network function
- the set of attributes is at least one of hnrf-URI, hnrfURI, and hnrfAccessTokenURI, a Fully Qualified Domain Name (FQDN) format, and internet protocol (IP)v4 address, IPv6 address.
- the method further comprises extracting, by an extracting unit at the NRF, from the FQDN, at least one of a Mobile Country Code (MCC) and a Mobile Network Code (MNC) of the target PLMN.
- MCC Mobile Country Code
- MNC Mobile Network Code
- the method in response to the identity of the target PLMN being the first identity, comprises steps of transmitting, by the transceiver unit at the NRF, the service request to an NRF associated with the target PLMN. Further, the transmitted service request is further provided with an authority header set, and wherein the authority header set is based on at least one of the FQDN, a port, and a schema of the service request.
- the method in response to the identity of the target PLMN being the first identity, comprises steps of extracting, by the processing unit at the NRF, a uniform resource identifier (URI) from the received service request. Further, the method comprises steps of providing, by the processing unit at the NRF, a header to the service request, wherein the header comprises the URI. Further, the method comprises steps of transmitting, by the transceiver unit at the NRF, the service request to a service control point (SCP) associated with the target PLMN.
- SCP service control point
- the method in response to the identity of the target PLMN being the second identity, comprises steps of transmitting, by the transceiver unit at the NRF, the service request to a security edge protection proxy (SEPP) associated with the target PLMN. Further, the transmitted service request is further provided with application programming interface (API) details obtained from the service request.
- SEPP security edge protection proxy
- API application programming interface
- the system comprises a transceiver unit configured to receive, at a network repository function (NRF), a service request from a network function (NF). Further, the system comprises a determining unit configured to determine, at the NRF, a set of attributes in the service request. Further, the system comprises a processing unit configured to determine, at the NRF, based on the set of attributes, an identity of a target public land mobile network (PLMN) relating to the service request, where the identity of the target PLMN is one of a first identity, and a second identity. Further, the transceiver unit is configured to forward, at the NRF, based on the determined identity of the target PLMN, the service request towards a target network node associated with the target PLMN.
- NRF network repository function
- NF network function
- NF network function
- the system comprises a determining unit configured to determine, at the NRF, a set of attributes in the service request.
- the system comprises a processing unit configured to determine, at the NRF, based on
- Yet another aspect of the present disclosure may relate to a method for managing service requests in a network.
- the method comprises receiving, by a transceiver unit at the NRF, a service request from a security edge protection proxy (SEPP).
- SEPP security edge protection proxy
- the service request comprises at least a set of header data indicative of an identity of the SEPP.
- the identity is one of a first identity, and a second identity.
- the method further comprises determining, by the processing unit at the NRF, a SEPP identification capability indicative of a capacity of the NRF for determining the identity of the SEPP.
- the SEPP identification capability is one of active, and inactive.
- the method comprises determining, by the processing unit at the NRF, based on the set of header attributes, an identity of the SEPP.
- the method further comprises transmitting, by the transceiver unit at the NRF, the service request to a target node based on the determined identity of the SEPP.
- the method in response to the identity of the SEPP being the first identity, comprises transmitting by the transceiver unit at the NRF, the service request back to the SEPP.
- the method in response to the identity of the SEPP being the second identity, comprises determining, by the processing unit at the NRF, from the header attributes of the service request, a target public land mobile network (PLMN), and transmitting, by the transceiver unit, at the NRF, the service request to a network node associated with the target PLMN.
- PLMN public land mobile network
- the method comprises determining, by the processing unit, at the NRF, from the header attributes, a target network function (NF). Next, the method comprises determining, by the processing unit at the NRF, that a support parameter at the target NF is set to true. Thereafter, the method comprises transmitting, by the transceiver unit, at the NRF, the service request to the target NF via an NRF associated with the target PLMN.
- the target NF is a sessions management function (SMF).
- Yet another aspect of the present disclosure may relate to a system for managing service requests in a network.
- the system comprises a transceiver unit configured to receive, at the NRF, a service request from a security edge protection proxy (SEPP).
- SEPP security edge protection proxy
- the service request comprises at least a set of header data indicative of an identity of the SEPP.
- the identity is one of a first identity, and a second identity.
- the system further comprises a processing unit configured to determine, at the NRF, a SEPP identification capability indicative of a capacity of the NRF for determining the identity of the SEPP.
- the SEPP identification capability is one of active, and inactive.
- the processing unit is configured to determine, at the NRF, based on the set of header attributes, an identity of the SEPP. Further, the transceiver unit is configured to transmit, at the NRF, the service request to a target node based on the determined identity of the SEPP.
- Another aspect of the present disclosure may relate to a non-transitory computer- readable storage medium, storing instructions for managing service requests in a network, the storage medium comprising executable code which, when executed by one or more units of a system, causes: a transceiver unit to receive, at a network repository function (NRF), a service request from a network function (NF); a determining unit to determine, at the NRF, a set of attributes in the service request; a processing unit to determine, at the NRF, based on the set of attributes, an identity of a target public land mobile network (PLMN) relating to the service request, wherein the identity of the target PLMN is one of a first identity, and a second identity; and the transceiver unit to forward, at the NRF, based on the determined identity of the target PLMN, the service request towards a target network node associated with the target PLMN.
- NRF network repository function
- NF network function
- NF network function
- PLMN public land mobile network
- Yet another aspect of the present disclosure may relate to a non-transitory computer- readable storage medium, storing instructions for managing service requests in a network, the storage medium comprising executable code which, when executed by one or more units of a system, causes: a transceiver unit to receive, at a Network Repository Function (NRF), a service request from a security edge protection proxy (SEPP), wherein the service request comprises at least a set of header data indicative of an identity of the SEPP, and wherein the identity is one of a first identity, and a second identity; a processing unit to determine, at the NRF, a SEPP identification capability indicative of a capacity of the NRF for determining the identity of the SEPP, wherein the SEPP identification capability is one of active, and inactive, wherein, in response to the SEPP identification capability being active, further causes: the processing unit to determine, at the NRF, based on the set of header attributes, an identity of the SEPP; and the transceiver unit to transmit, at the NRF, the
- FIG.l illustrates an exemplary block diagram representation of 5 th generation core (5GC) network architecture.
- FIG. 2 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
- FIG. 3A illustrates an exemplary block diagram of a system for managing service requests in a network, in accordance with exemplary implementations of the present disclosure.
- FIG. 3B illustrates another exemplary block diagram of a system for managing service requests in a network, in accordance with exemplary implementations of the present disclosure.
- FIG. 4A illustrates a method flow diagram for managing service requests in a network in accordance with exemplary implementations of the present disclosure.
- FIG. 4B illustrates another method flow diagram for managing service requests in a network in accordance with exemplary implementations of the present disclosure.
- FIG. 5A illustrates a flow diagram for managing service requests in a network in accordance with exemplary implementations of the present disclosure.
- FIG. 5B illustrates another flow diagram for managing service requests in a network in accordance with exemplary implementations of the present disclosure.
- FIG. 5C illustrates yet another flow diagram for managing service requests in a network in accordance with exemplary implementations of the present disclosure.
- FIG. 6A illustrates a flow diagram for managing service requests in a network in accordance with exemplary implementations of the present disclosure.
- FIG. 6B illustrates another flow diagram for managing service requests in a network in accordance with exemplary implementations of the present disclosure.
- exemplary and/or “demonstrative” is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples.
- any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art.
- a “processing unit” or “processor” or “operating processor” includes one or more processors, wherein processor refers to any logic circuitry for processing instructions.
- a processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a Digital Signal Processing (DSP) core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc.
- DSP Digital Signal Processing
- the processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
- a user equipment may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure.
- the user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable of implementing the features of the present disclosure.
- the user device may contain at least one input means configured to receive an input from unit(s) which are required to implement the features of the present disclosure.
- storage unit or “memory unit” refers to a machine or computer- readable medium including any mechanism for storing information in a form readable by a computer or similar machine.
- a computer-readable medium includes read-only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media.
- the storage unit stores at least the data that may be required by one or more units of the system to perform their respective functions.
- interface refers to a shared boundary across which two or more separate components of a system exchange information or data.
- the interface may also refer to a set of rules or protocols that define communication or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called.
- All modules, units, components used herein, unless explicitly excluded herein, may be software modules or hardware processors, the processors being a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc.
- the transceiver unit includes at least one receiver and at least one transmitter configured respectively for receiving and transmitting data, signals, information, or a combination thereof between units/components within the system and/or connected with the system.
- the current known solutions have several shortcomings such as those related to providing hardcoded values of parameters for identifying header and value which will be used for identifying messages received from security edge protection proxy (SEPP).
- SEPP security edge protection proxy
- the present disclosure aims to overcome the above-mentioned and other existing problems in this field of technology by providing a method and a system of managing service requests in a network that provides parameters for identifying header and value which will be used for identifying messages received from SEPP rather than hardcoded values.
- FIG. 1 illustrates an exemplary block diagram representation of 5 th generation core (5GC) network architecture, in accordance with exemplary implementation of the present disclosure.
- the 5GC network architecture [100] includes a user equipment (UE) [102], a radio access network (RAN) [104], an access and mobility management function (AMF) [106], a Session Management Function (SMF) [108], a Service Communication Proxy (SCP) [110], an Authentication Server Function (AUSF) [112], a Network Slice Specific Authentication and Authorization Function (NSSAAF) [114], a Network Slice Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122], a Unified Data Management (UDM) [124], an application function (AF) [126], a User Plane Function (UPF) [128], a data network (DN) [130], wherein all the components are assumed to be
- UE user equipment
- the RAN [104] is the part of a mobile telecommunications system that connects user equipment (UE) [102] to the core network (CN) and provides access to different types of networks (e.g., 5G network). It consists of radio base stations and the radio access technologies that enable wireless communication.
- the AMF [106] is a 5G core network function responsible for managing access and mobility aspects, such as UE registration, connection, and reachability. It also handles mobility management procedures like handovers and paging.
- the SMF [108] is a 5G core network function responsible for managing session-related aspects, such as establishing, modifying, and releasing sessions. It coordinates with the User Plane Function (UPF) for data forwarding and handles IP address allocation and QoS enforcement.
- UPF User Plane Function
- the SCP [110] is a network function in the 5G core network that facilitates communication between other network functions by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces.
- the AUSF [112] is a network function in the 5G core responsible for authenticating UEs during registration and providing security services. It generates and verifies authentication vectors and tokens.
- the NSSAAF is a network function that provides authentication and authorization services specific to network slices. It ensures that UEs can access only the slices for which they are authorized.
- the NSSF [116] is a network function responsible for selecting the appropriate network slice for a UE based on factors such as subscription, requested services, and network policies.
- the NEF [118] is a network function that exposes capabilities and services of the 5G network to external applications, enabling integration with third-party services and applications.
- the NRF [120] is a network function that acts as a central repository for storing profile of available network functions and services. It facilitates the discovery and dynamic registration of network functions.
- the PCF [122] is a network function responsible for policy control decisions, such as QoS, charging, and access control, based on subscriber information and network policies.
- the UDM [124] is a network function that centralizes the management of subscriber data, including authentication, authorization, and subscription information.
- the AF [126] is a network function that represents external applications interfacing with the 5G core network to access network capabilities and services.
- the UPF [128] is a network function responsible for handling user data traffic, including packet routing, forwarding, and QoS enforcement.
- the DN refers to a network that provides data services to user equipment (UE) in a telecommunications system.
- the data services may include but are not limited to Internet services, private data network related services.
- the 5GC network architecture [100] also comprises a plurality of interfaces for connecting the network functions with a network entity for performing the network functions.
- the NSSF [116] is connected with the network entity via the interface denoted as (Nnssf) interface in the figure.
- the NEF [118] is connected with the network entity via the interface denoted as (Nnef) interface in the figure.
- the NRF [120] is connected with the network entity via the interface denoted as (Nmf) interface in the figure.
- the PCF [122] is connected with the network entity via the interface denoted as (Npcf) interface in the figure.
- the UDM [124] is connected with the network entity via the interface denoted as (Nudm) interface in the figure.
- the AF [126] is connected with the network entity via the interface denoted as (Naf) interface in the figure.
- the NSSAAF [114] is connected with the network entity via the interface denoted as (Nnssaaf) interface in the figure.
- the AUSF [112] is connected with the network entity via the interface denoted as (Nausf) interface in the figure.
- the AMF [106] is connected with the network entity via the interface denoted as (Namf) interface in the figure.
- the SMF [108] is connected with the network entity via the interface denoted as (Nsmf) interface in the figure.
- the SMF [108] is connected with the UPF [128] via the interface denoted as (N4) interface in the figure.
- the UPF [128] is connected with the RAN [104] via the interface denoted as (N3) interface in the figure.
- the UPF [128] is connected with the DN [130] via the interface denoted as (N6) interface in the figure.
- the RAN [104] is connected with the AMF [106] via the interface denoted as (N2).
- the AMF [106] is connected with the RAN [104] via the interface denoted as (Nl).
- the UPF [128] is connected with other UPF [128] via the interface denoted as (N9).
- the interfaces such as Nnssf, Nnef, Nmf, Npcf, Nudm, Naf, Nnssaaf, Nausf, Namf, N S mf, N9, N6, N4, N3, N2, and Nl can be referred to as a communication channel between one or more functions or modules for enabling exchange of data or information between such functions or modules, and network entities.
- FIG. 2 illustrates an exemplary block diagram of a computing device [200] (herein, also referred to as a computer system [200]) upon which one or more features of the present disclosure may be implemented in accordance with an exemplary implementation of the present disclosure.
- the computing device [200] may also implement a method for managing service requests in a network, utilising a system, or one or more sub-systems, provided in the network.
- the computing device [200] itself implements the method for managing service requests in a network, using one or more units configured within the computing device [200], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
- the computing device [200] may include a bus [202] or other communication mechanism(s) for communicating information, and a hardware processor [204] coupled with bus [202] for processing said information.
- the hardware processor [204] may be, for example, a general-purpose microprocessor.
- the computing device [200] may also include a main memory [206], such as a random-access memory (RAM), or other dynamic storage device, coupled to the bus [202], for storing information and instructions to be executed by the processor [204],
- the main memory [206] also may be used for storing temporary variables or other intermediate information during execution of the instructions to be executed by the processor [204], Such instructions, when stored in a non-transitory storage media accessible to the processor [204], render the computing device [200] into a special purpose device that is customized to perform operations according to the instructions.
- the computing device [200] further includes a read only memory (ROM) [208] or other static storage device coupled to the bus [202] for storing static information and instructions for the processor [204],
- ROM read only memory
- a storage device [210] such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to the bus [202] for storing information and instructions.
- the computing device [200] may be coupled via the bus [202] to a display [212], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc., for displaying information to a user of the computing device [200],
- An input device [214] including alphanumeric and other keys, touch screen input means, etc.
- cursor controller [216] may be coupled to the bus [202] for communicating information and command selections to the processor [204].
- cursor controller [216] such as a mouse, a trackball, or cursor direction keys, for communicating direction information and command selections to the processor [204], and for controlling cursor movement on the display [212].
- the cursor controller [216] typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the cursor controller [216] to specify positions in a plane.
- the computing device [200] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware, and/or program logic which, in combination with the computing device [200], causes or programs the computing device [200] to be a special-purpose device.
- the techniques herein are performed by the computing device [200] in response to the processor [204] executing one or more sequences of one or more instructions contained in the main memory [206], The one or more instructions may be read into the main memory [206] from another storage medium, such as the storage device [210], Execution of the one or more sequences of the one or more instructions contained in the main memory [206] causes the processor [204] to perform the process steps described herein.
- hard-wired circuitry may be used in place of, or in combination with, software instructions.
- the computing device [200] also may include a communication interface [218] coupled to the bus [202], The communication interface [218] provides two-way data communication coupling to a network link [220] that is connected to a local network [222],
- the communication interface [218] may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telecommunication line.
- the communication interface [218] may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
- LAN local area network
- Wireless links may also be implemented.
- the communication interface [218] sends and receives electrical, electromagnetic, or optical signals that carry digital data streams representing different types of information.
- the computing device [200] can send and receive data, including program code, messages, etc. through the network(s), the network link [220] and the communication interface [218],
- a server [230] might transmit a requested code for an application program through the Internet [228], the ISP [226], the local network [222], the host [224] and the communication interface [218],
- the received code may be executed by the processor [204] as it is received, and/or stored in the storage device [210], or other non-volatile storage for later execution.
- system [300a] may comprise multiple such units or the system [300a] may comprise any such numbers of said units, as required to implement the features of the present disclosure.
- the system [300a] may be present in a user device/ user equipment [102] to implement the features of the present disclosure.
- the system [300a] may be a part of the user device [102]/ or may be independent of but in communication with the user device [102] (may also referred herein as a UE).
- the system [300a] may reside in a server or a network entity or NRF [310],
- the system [300a] may reside partly in the server/ network entity /NRF and partly in the user device.
- the NRF [310] may store and update profiles of all available NF instances within the network.
- the mentioned profiles contain details about the network services offered by the NFs [330]
- the NRF [310] may maintain profiles of other NRFs, Service Control Point (SCP) and Security Edge Protection Proxy (SEPP) instances.
- SCP Service Control Point
- SEPP Security Edge Protection Proxy
- the mentioned profiles allow the NRF [310] to manage communication between different PLMNs or with external networks. It is to be noted that the NRF [310] is further utilized for managing and maintaining other one or more information associated with the NFs [330] and network services that are known to a person skilled in the art.
- the service request mentioned herein may refer to a request for utilizing one or more network services offered by the NRF [310].
- the one or more network service offered by the NRF [310] may correspond to a NnrfJNFDiscovery service, which allows an NF [330] or SCP instance to discover other NFs, SCP instances, or SEPPs and may obtain profiles (which may have similar internet protocol (IP) address) of the other NFs, SCP instances, or SEPPs.
- IP internet protocol
- the Nnrf NFDiscovery service also supports an inter-public land mobile network (PLMN) discovery, allowing the NFs [330] or SCPs to locate other NFs or SCPs instances across different PLMNs, such as a home public land mobile network (HPLMN) of UE.
- PLMN inter-public land mobile network
- the one or more network service offered by the NRF [310] may correspond to a NnrfJNFManagem ent service, which allows the NF [330], SCP, or SEPP instances to register, update, or deregister the profile of said NF [330], SCP, or SEPP instances in the NRF [310],
- the Nnrf NFManagement service further enables an NRF instance to communicate with another NRF instance within the same PLMN.
- the one or more network services offered by the NRF [310] may correspond to a Nnrf AccessToken service, which handles open authorization (OAuth2).
- an NF service consumer such as access and mobility management function (AMF)
- AMF access and mobility management function
- the NF service consumer is not limited to the AMF, and other NFs [330] in the 5G core network are also able to use NRF services.
- NRF [310] may further offer other one or more services that is not mentioned herein and is known to a person skilled in the art.
- the system [300a] comprises the determining unit [304] connected at least to the transceiver unit [302],
- the determining unit [304] is configured to determine, at the NRF [310], a set of attributes in the service request.
- the set of attributes mentioned herein may refer to one or more parameters that allows the NRF [310] to process the service request and further route said service request to the appropriate services.
- the set of attributes is at least one of hnrf-URI, hnrfURI, and hnrfAccessTokenURI, in a Fully Qualified Domain Name (FQDN) format having internet protocol (IP)v4 address, IPv6 address.
- FQDN Fully Qualified Domain Name
- the hnrf-URI attribute may contain an application programming interface uniform resource identifier (API URI) of the NFDiscovery Service of the home NRF.
- API URI application programming interface uniform resource identifier
- the hnrf-URI attribute is included in the service request if the requester NF has previously received this URI for service discovery.
- a NSSF Network Slice Selection Function
- a NSSF Network Slice Selection Function in the home PLMN may provide the API URI to be used by the requester NF for service discovery, enabling the requesting NF to discover other NFs based on the URI in the service request.
- the hnrfURI attribute contains the API URI of the NFManagement Service of the home NRF. Similar to hnrf-URI attribute, the hnrfURI attribute is included in the service request, if the NF Service Consumer (such as the AMF) has received said API URI from the NSSF in the home PLMN.
- the NFManagement service enables an NF [330] to register, update, or deregister their profile in the NRF [310], or enables the NF [330] to register themselves in another NRF within the same PLMN.
- the hnrfAccessTokenURI attribute contains the API URI for the Access Token Service of the home NRF. The hnrfAccessTokenURI is included in the service request if the service request involves obtaining an access token for an hSMF (session management function) during a home-routed roaming scenario.
- the FQDN may refer to a domain used to identify specific network functions (e.g., NRFs) within the PLMN
- an exemplary FQDN format to represent the NRF may represented as "nrfl.clusterl.net2.nrf.5gc.mnc012.mcc345.3gppnetwork.org".
- the nrfl.clusterl.net2 may represent the NRF name, where the mncol2 is a mobile network code (MNC) and mcc345 is a mobile country code (MCC) for specifying the location of said NRF within the network.
- MNC mobile network code
- MCC mobile country code
- the MCC is a 3-digit code used to identify the country of origin of the PLMN. Further, the MNC is a 2 or 3-digit code used to identify the specific network operator within a particular country.
- the IPv4 address and IPv6 address are two types of IP addresses used to uniquely identify NFs [330] within the network.
- the service request may associate with at least one of the IPv4 address and IPv6 address that is dependent on the network configuration.
- the NRF [310] may utilize the mentioned information to identify the corresponding NF [330] for further communication.
- the determining unit [304] may firstly check the hnrf-URI attribute, hnrfURI attribute, and hnrfAccessTokenURI attribute. Further, in an event, a target PLMN is absent in the service request, and a URI parameter is present in the service request, then in such event, the determining unit [304] extracts the FQDN value from the service request to determine the appropriate network functions or services to transfer the service request, based on the IPv4 or IPv6 address associated with the service request.
- the system [300a] further comprises the extracting unit [308] connected at least to the determination unit.
- the extracting unit [308] is configured to extract, at the NRF [310], from the FQDN, at least one of the MCC and the MNC of the target PLMN.
- the extraction unit at the NRF [310] is responsible for extracting one or more identifiers (such as the MCC and the MNC) from the FQDN in order to identify the target PLMN.
- the extraction unit may retrieve the MNC and the MCC codes from the FQDN to correctly route the service request to the appropriate target PLMN.
- the determining unit [304] is further configured to determine, at the NRF [310], based on at least one of the MCC and MNC of the target PLMN, the identity of the target PLMN. Further, determining unit [304] may utilize the MCC and the MNC codes to identify the target PLMN. The determination unit verifies the extracted MCC and MNC codes with MNC and MCC codes of an existing network that is stored in a database associated with the NRF [310],
- the extracting unit [308] is not able to extract the MNC codes or MCC codes, then in such event, the NRF [310] may determine the service request as a local internal message for a vendor or network similar to the PLMN associated with the NRF [310],
- the target PLMN may refer to one or more parameters associated with a target network.
- the one or more parameters may be selected based on required operation. Examples of the one or more parameters include, without limitations, PLMN identifier (plmnld), network identification (nid) (Subscribe) / target-plmn-list (Discovery) / targetplmn, etc.
- the system [300a] comprises the processing unit [306] connected at least with the determination unit.
- the processing unit [306] is configured to determine, at the NRF [310], based on the set of attributes, an identity of the target public land mobile network (PLMN) relating to the service request. Further, the processing unit [306] may utilize the information determined by the determining unit [304] to process the service request based on the identified target PLMN. Further, based on said information, the processing unit [306] may identify the identity of the target PLMN.
- PLMN public land mobile network
- the identity of the target PLMN is one of a first identity, and a second identity.
- the processing unit [306] may recognize that the service request is within the same network such as a home network or a partner network.
- the processing unit [306] may recognize that the target PLMN is an external PLMN (e.g., an external network).
- the transceiver unit [302] configured to forward, at the NRF [310], based on the determined identity of the target PLMN, the service request towards a target network node [312] associated with the target PLMN.
- the processing unit [306] is configured to extract, at the NRF [310], a uniform resource identifier (URI) from the received service request.
- URI uniform resource identifier
- the URI of the service request may assist the processing unit [306] in identifying a specific resource or network service mentioned in the service request.
- the URI may follow a specific format and may contain one or more parameters such as the service name, domain, and protocol (e.g., HTTP/HTTPS).
- the processing unit [306] is configured to provide, at the NRF [310], an authority header set to the service request, wherein the header comprises the URI.
- the processing unit [306] further provides the header within the service request.
- the authority header set comprises the URI, which contains details of the service being requested and may further assist in easy routing of the service request to the appropriate target network node [312],
- the transmitted service request is further provided with an authority header set, and wherein the header set is based on at least one of the FQDN, a port, and a schema of the service request.
- the authority header set may include the FQDN (for specifying the domain and service for the service request), a port (define the network port used to connect to the service within the target PLMN), and a schema (define the protocol or structure used in the service request).
- the transceiver unit [302] is configured to transmit, at the NRF [310], the service request to a service control point (SCP) associated with the target PLMN.
- SCP is a network entity within the PLMN that handles service-related queries and routing.
- the SCP is used to manage the flow of service requests within the target PLMN.
- the SCP is responsible for routing service requests based on the URI and other request attributes.
- the transceiver unit [302] sends the service request to the SCP associated with the target PLMN. Thereafter, the SCP processes and forwards the service request to the appropriate network elements within the PLMN.
- the transceiver unit [302] is configured to transmit, at the NRF [310], the service request to a security edge protection proxy (SEPP) [316] associated with the target PLMN.
- SEPP security edge protection proxy
- the SEPP [316] is a network function to provide secure and controlled communication at the edge of the network, particularly in inter-PLMN scenarios.
- the SEPP [316] is responsible for encrypting and authenticating communication between PLMNs, in order to ensure secure data exchange between different operators.
- the SEPP [316] is responsible for protecting the network edge by enforcing security policies and preventing unauthorized access or tampering with service requests.
- the SEPP [316] is responsible for routing the service request securely between the home and target PLMNs, ensuring that sensitive information is protected during transit of the service request.
- the service request is forwarded to the SEPP [316] associated with that PLMN. This ensures that the communication between the NRF [310] in the home PLMN and the target PLMN is secure and protected from external threats.
- the transmitted service request is further provided with application programming interface (API) details obtained from the service request.
- API application programming interface
- the API details may include one or more information associated with a facilitation of communication between different NFs [330].
- the API details in the service request may provide one or more information about the specific service or function that the requesting network function wants to access in the target PLMN.
- FIG. 3B an exemplary block diagram of a system [300b] for managing service requests in a network, is shown, in accordance with the exemplary implementations of the present disclosure.
- the system [300b] comprises at least one transceiver unit [352], and at least one at least one processing unit [354], Also, all of the components/ units of the system [300b] are assumed to be connected to each other unless otherwise indicated below. As shown in the figures all units shown within the system [300b] should also be assumed to be connected to each other. Also, in FIG.
- system [300b] may comprise multiple such units or the system [300b] may comprise any such numbers of said units, as required to implement the features of the present disclosure.
- the system [300b] may be present in a user device/ user equipment [102] to implement the features of the present disclosure.
- the system [300b] may be a part of the user device [102]/ or may be independent of but in communication with the user device [102] (may also referred herein as a UE).
- the system [300b] may reside in a server or a network entity.
- the system [300b] may reside partly in the server/ network entity and partly in the user device.
- the system [300b] is configured for managing service requests in a network, with the help of the interconnection between the components/units of the system [300b],
- the system [300b] comprises the transceiver unit [352] configured to receive, at the Network Repository Function (NRF) [358], a service request from a security edge protection proxy (SEPP) [370],
- NRF Network Repository Function
- SEPP security edge protection proxy
- the NRF [358] is a network entity in a 5G core network (5GC) that is responsible for maintaining and managing one or more information associated with other network functions (NFs) and network services within the network. It is noted that the NRF [358] mentioned herein is similar to the NRF [120] as disclosed in the FIG. 1.
- the NRF [358] may store and update profiles of all available NF instances within the network.
- the mentioned profiles contain details about the network services offered by the NFs [330]
- the NRF [358] may maintain profiles of Service Control Point (SCP) and Security Edge Protection Proxy (SEPP) instances.
- SCP Service Control Point
- SEPP Security Edge Protection Proxy
- the mentioned profiles allow the NRF [358] to manage communication between different PLMNs or with external networks. It is to be noted that the NRF [358] is further utilized for managing and maintaining other one or more information associated with the NFs [330] and network services that are known to a person skilled in the art.
- the NRF [358] may further offer other one or more services that is not mentioned herein and is known to a person skilled in the art.
- the SEPP [370] mentioned herein is a network function to facilitate communication between two public land mobile networks (PLMNs).
- the SEPP [370] is responsible for encrypting, decrypting, and verifying one or more information that is exchanged between PLMNs specially in roaming scenarios.
- the service request comprises at least a set of header data indicative of an identity of the SEPP [370],
- the set of header data may further include a detailed uniform resource locator (URI).
- URI uniform resource locator
- the detailed URI may include a schema (such as HTTP/ HTTPS) that may determine the type of protocol used in the service request.
- the detailed URI may include a hostname or an internet protocol (IP) address of the SEPP [370] that is sending the service request.
- the hostname may include a fully qualified domain name (FQDN) or an IP address.
- the detailed URI may include a port on which the SEPP [370] is communicating with the NRF [358],
- the detailed URI may include a path of the URI that is used to direct the service request to a specific resource or API endpoint on the NRF [358],
- the path of the URI may represent a specific network function (a target network function) or resource that the SEPP [370] is trying to reach or request services from.
- the detailed URI may further include additional parameters such as SEPP ID, authentication data and alike, that are utilized by the NRF [358] in distinguishing between different SEPPs of a plurality of networks.
- the identity is one of a first identity, and a second identity.
- the first identity may imply that the SEPP [370] is associated within the same network (same PLMN) of said NRF [358],
- the second identity may imply that the SEPP [370] is associated with a different network (different PLMN).
- the header attribute may include “SeppIdentificationHeader” type of a string. Such a header attribute may have a value “x-plmn-source-nf’. In another example, the header attribute may include “SeppIdentificationHeaderValue” type of a string. Such a header attribute may have a value “sepp”. It may be appreciated that the values provided above (such as, “plmn”) are exemplary, and are not to be construed as limiting. The values of the header attributes may include any identifier that may be indicative of identification of a network.
- the system [300b] comprises the processing unit [354] connected at least with the transceiver unit [352],
- the processing unit [354] is configured to determine, at the NRF [358], a SEPP [370] identification capability indicative of a capacity of the NRF [358] for determining the identity of the SEPP [370], Further, the SEPP [370] identification capability is one of active, and inactive.
- the SEPP identification capability is provided at the NRF [358]
- the SEPP identification capability at the NRF [358] may be represented as “SEPPIdentificationOn”. In an exemplary embodiment, when the SEPP identification capability is active, it may be represented at the NRF [358] as “SEPPIdentificationOn”.
- processing unit [354] may determine the identity of the SEPP [370] to be active (or true value), which further implies that the NRF [358] is actively engaged in determining the SEPP identity.
- processing unit [354] may determine the identity of the SEPP [370] to be inactive (or false), which further implies that the NRF [358] may lack the ability or may not be required to identify the SEPP identity.
- the processing unit [354] is configured to determine, at the NRF [358], based on the set of header attributes, an identity of the SEPP [370], Further, in an event, the identity of the SEPP [370] is determined to be active, then in such event, the processing unit [354] may perform a cross-verification process by comparing the set of header attributes with a set of prestored information stored in a database associated with the NRF [358],
- the transceiver unit [352] is configured to transmit, at the NRF [358], the service request to a target node based on the determined identity of the SEPP [370],
- the transceiver unit [352] is configured to transmit the service request based on the one or more processes associated with each type of identity of said SEPP [370], [0131]
- the transceiver unit [352] is configured to transmit, at the NRF [358], the service request back to the SEPP [370],
- the SEPP [370] is determined to be the first identity, implying that the SEPP [370] is associated within the same network (same PLMN) of said NRF [358], Further, in such cases, the NRF [358] may not be able to easily differentiate whether a message is coming from an internal entity (a
- the processing unit [354] is configured to determine, at the NRF [358], from the header attributes of the service request, a target public land mobile network (PLMN). Further, based on the set of header attributes present in the service request, the processing unit [354] may further identify the target PLMN associated with the service request.
- PLMN public land mobile network
- the transceiver unit [352] is configured to transmit, at the NRF [358], the service request to a network node associated with the target PLMN.
- the transceiver unit [352] is configured to transmit the service request to a network node that is associated with this target PLMN and is mentioned in the service request.
- the processing unit [354] is configured to determine, at the NRF [358], from the header attributes, a target network function (NF). Further, the processing unit [354] may further process the set of header attributes to determine the target network node [356] that needs to handle the service request.
- the target NF is a sessions management function (SMF).
- the processing unit [354] is configured to determine, at the NRF [358], that a support parameter at the target NF is set to true. Further, the processing unit [354] may verify the support parameter at the target network node [356] (i.e, the SMF).
- the support parameter may indicate whether the target network node [356] (i.e, the SMF) is able to execute one or more services mentioned in the service request.
- the support parameter may be represented as “vsmfSupportlnd”.
- the support parameter may indicate a true value, implying that the target network node [356] (i.e, the SMF) is able to execute one or more services mentioned in the service request.
- the support parameter may indicate a false value, implying that the target network node [356] (i.e, the SMF) is not able to execute one or more services mentioned in the service request.
- the support parameter may indicate no value or an empty value, implying that the target network node [356] (i.e, the SMF) may or may not be able to execute one or more services mentioned in the service request.
- the transceiver unit [352] is configured to transmit, at the NRF [358], the service request to the target NF via an NRF [358] associated with the target PLMN.
- the target network node [356] i.e, the SMF
- the transceiver unit [352] may further transmit the service request to the target network node [356] via the NRF [358] that is associated with said PLMN.
- the transceiver unit [352] may send the service request to the target network node [356], only in an event the support parameter may indicate the true value.
- FIG. 4A an exemplary method flow diagram [400a] for managing service requests in a network, in accordance with exemplary implementations of the present disclosure is shown.
- the method [400a] is performed by the system [300a]
- the system [300a] may be present in a server device to implement the features of the present disclosure.
- the method [400a] initially starts at step [402]
- the method [400a] comprises receiving, by the transceiver unit [302] at the network repository function (NRF) [310], a service request from the network function (NF) [330], [0143]
- the method [400a] comprises determining, by the determining unit [304] at the NRF [310], a set of attributes in the service request.
- the set of attributes is at least one of hnrf-URI, hnrfURI, and hnrfAccessTokenURI, a Fully Qualified Domain Name (FQDN) format, and internet protocol (IP)v4 address, IPv6 address.
- the method [400a] further explains extracting, by the extracting unit [308] at the NRF [310], from the FQDN, at least one of the Mobile Country Code (MCC) and the Mobile Network Code (MNC) of the target PLMN.
- MCC Mobile Country Code
- MNC Mobile Network Code
- the method [400a] further comprises determining, by the determining unit [304] at the NRF [310], based on at least one of the MCC and MNC of the target PLMN, the identity of the target PLMN.
- the method [400a] comprises determining, by the processing unit [306] at the NRF [310], based on the set of attributes identifier, an identity of the target public land mobile network (PLMN) relating to the service request.
- PLMN public land mobile network
- the identity of the target PLMN is one of the first identity, and the second identity.
- the method [400a] comprises forwarding, by the transceiver unit [302] at the NRF [310], based on the determined identity of the target PLMN, the service request towards the target network node [312] associated with the target PLMN.
- the method [400a] further explains that in response to the identity of the target PLMN being the first identity.
- the method [400a] comprises extracting, by the processing unit [306] at the NRF [310], a uniform resource identifier (URI) from the received service request.
- the method [400a] comprises providing, by the processing unit [306] at the NRF [310], the authority header set to the service request.
- the authority header set comprises the URI.
- the method [400a] comprises transmitting, by the transceiver unit [302] at the NRF [310], the service request to the service control point (SCP) associated with the target PLMN.
- SCP service control point
- the method [400a] further explains that in response to the identity of the target PLMN being the second identity, the method [400a] comprises transmitting, by the transceiver unit [302] at the NRF [310], the service request to a security edge protection proxy (SEPP) [316] associated with the target PLMN.
- SEPP security edge protection proxy
- the transmitted service request is further provided with application programming interface (API) details obtained from the service request.
- API application programming interface
- FIG. 4B an exemplary method flow diagram [400b] for managing service requests in a network, in accordance with exemplary implementations of the present disclosure is shown.
- the method [400b] is performed by the system [300b]
- the system [300b] may be present in a server device to implement the features of the present disclosure.
- the method [400b] comprises receiving, by the transceiver unit [352] at the NRF [358], a service request from the security edge protection proxy (SEPP) [370],
- the service request comprises at least a set of header attributes indicative of an identity of the SEPP [370]
- the identity is one of a first identity, and a second identity.
- the method [400b] comprises determining, by the processing unit [354] at the NRF [358], the SEPP [370] identification capability indicative of a capacity of the NRF [358] for determining the identity of the SEPP [370],
- the SEPP [370] identification capability is one of active, and inactive.
- the method [400b] comprise determining, by the processing unit [354] at the NRF [358], based on the set of header attributes, the identity of the SEPP [370],
- the method [400b] comprise transmitting, by the transceiver unit [352] at the NRF [358], the service request to the target node based on the determined identity of the SEPP [370], [0157]
- the method [400b] further explains that in response to the identity of the SEPP [370] being the first identity, the method [400b] comprises transmitting by the transceiver unit [352] at the NRF [358], the service request back to the SEPP [370],
- the method [400b] further explains that in response to the identity of the SEPP [370] being the second identity, the method [400b] comprises determining, by the processing unit [354] at the NRF [358], from the header attributes of the service request, a target public land mobile network (PLMN). Further, the method [400b] comprises transmitting, by the transceiver unit [352], at the NRF [358], the service request to a network node associated with the target PLMN.
- PLMN public land mobile network
- the method [400b] further explains that prior transmitting the service request to the target network node [356], the method [400b] comprise determining, by the processing unit [354], at the NRF [358], from the header attributes, a target network function (NF).
- the target NF is a sessions management function (SMF).
- the method [400b] comprises determining, by the processing unit [354] at the NRF [358], that a support parameter at the target NF is set to true.
- the method [400b] comprises transmitting, by the transceiver unit [352], at the NRF [358], the service request to the target NF via an NRF [358] associated with the target PLMN.
- FIG. 5A a flow diagram [500a] for managing service requests in a network in accordance with exemplary implementations of the present disclosure is shown.
- the flow diagram [500a] is performed by the system [300a],
- the Network Function (NF) [330] initiates the communication by sending the service request to the Network Repository Function (NRF) [310].
- the service request contains one or more attributes such as the hnrfURI/hnrf-URI, hnrfAccessTokenURI, and FQDN.
- the NRF [310] further extracts the Mobile Country Code (MCC) and Mobile Network Code (MNC) to identify the target Public Land Mobile Network (PLMN).
- MCC Mobile Country Code
- MNC Mobile Network Code
- the NRF [310] may further determine the target PLMN based on the extracted MCC and MCC codes and the set of attributes and accordingly classifies the target PLMN as the first identity implying that the service request is within the same network such as a home network or a partner network.
- the NRF [310] may forward the service request to the NRF [310] of the target PLMN.
- the Network Function (NF) [330] initiates the communication by sending the service request to the Network Repository Function (NRF) [310],
- the service request contains one or more attributes such as the hnrfURI/hnrf-URI, hmfAccessTokenURI, and FQDN.
- the NRF [0168]
- MCC Mobile Country Code
- MNC Mobile Network Code
- API application programming interface
- the NRF [310] may further determine the target PLMN based on the extracted MCC and MCC codes, the set of attributes and the API details and accordingly classifies the target PLMN as the second identity implying that the target PLMN is an external PLMN (e.g., an external network).
- an external PLMN e.g., an external network
- the NRF [310] may forward the service request to the SEPP [316] (Security Edge Protection Proxy) of the target PLMN.
- SEPP Security Edge Protection Proxy
- FIG. 5C yet another flow diagram [500c] for managing service requests in a network in accordance with exemplary implementations of the present disclosure is shown.
- the flow diagram [500c] is performed by the system [300a], [0172]
- the Network Function (NF) [330] initiates the communication by sending the service request to the Network Repository Function (NRF) [310],
- the service request contains one or more attributes such as the hnrfURI/hnrf-URI, hnrfAccessTokenURI, and FQDN.
- the NRF post receiving the service request, the NRF [310] further extracts the Mobile Country Code (MCC) and Mobile Network Code (MNC) and the application programming interface (API) details to identify the target PLMN and the required API for the service request.
- MCC Mobile Country Code
- MNC Mobile Network Code
- API application programming interface
- the NRF [310] may further determine the target PLMN based on the extracted MCC and MCC codes, the set of attributes and the API details and accordingly classifies the target PLMN as the second identity implying that the target PLMN is an external PLMN (e.g., an external network).
- an external PLMN e.g., an external network
- the NRF [310] may forward the service request along with the API details to the SEPP [316] (Security Edge Protection Proxy) of the target PLMN.
- SEPP Security Edge Protection Proxy
- FIG. 6A a flow diagram [600a] for managing service requests in a network in accordance with exemplary implementations of the present disclosure is shown.
- the flow diagram [600a] is performed by the system [300b],
- the security edge protection proxy (SEPP) [370] initiates the communication by sending the service request to the Network Repository Function (NRF) [358],
- the service request comprises the set of header data which may include detailed uniform resource locator (URI) such as a hostname or an internet protocol (IP) address of the SEPP [370], a path of the URI, SEPP ID, authentication data and similar known to a person skilled in the art.
- URI uniform resource locator
- IP internet protocol
- the NRF [358] may determine the SEPP [370] identification capability indicative of a capacity of the NRF [358] for determining the identity of the SEPP [370],
- the NRF [358] may further determine the identity of the SEPP [370] based on the set of header attributes. In case, the SEPP [370] identification capability is inactive, then in such case, the NRF [358] may halt any further transmission of the service request.
- the NRF [358] may further send the service request to the network node that is associated with this target PLMN.
- FIG. 6B another flow diagram [600b] for managing service requests in a network in accordance with exemplary implementations of the present disclosure is shown.
- the flow diagram [600b] is performed by the system [300b],
- the security edge protection proxy (SEPP) [370] initiates the communication by sending the service request to the Network Repository Function (NRF) [358],
- the service request comprises the set of header data which may include detailed uniform resource locator (URI) such as a hostname or an internet protocol (IP) address of the SEPP [370], a path of the URI, SEPP ID, authentication data and similar known to a person skilled in the art.
- URI uniform resource locator
- IP internet protocol
- the NRF [358] may determine the SEPP [370] identification capability indicative of a capacity of the NRF [358] for determining the identity of the SEPP [370],
- the NRF [358] may further determine the identity of the SEPP [370] based on the set of header attributes. In case, the SEPP [370] identification capability is inactive, then in such case, the NRF [358] may halt any further transmission of the service request.
- the NRF [358] may further transmit the service request back to the SEPP [370],
- the present disclosure provides a non-transitory computer-readable storage medium, storing instructions for managing service requests in a network, the storage medium comprising executable code which, when executed by one or more units of a system, causes: a transceiver unit [302] to receive, at a network repository function (NRF) [310], a service request from a network function (NF) [330]; a determining unit [304] to determine, at the NRF [310], a set of attributes in the service request; a processing unit [306] to determine, at the NRF [310], based on the set of attributes, an identity of a target public land mobile network (PLMN) relating to the service request, wherein the identity of the target PLMN is one of a first identity, and a second identity; and the transceiver unit [302] to forward, at the NRF [310], based on the determined identity of the target PLMN, the service request towards a target network node [312] associated with the target PLMN
- the present disclosure further provides a non-transitory computer-readable storage medium, storing instructions for managing service requests in a network, the storage medium comprising executable code which, when executed by one or more units of a system, causes: a transceiver unit [352] to receive, at a Network Repository Function (NRF) [358], a service request from a security edge protection proxy (SEPP) [370], wherein the service request comprises at least a set of header data indicative of an identity of the SEPP [370], and wherein the identity is one of a first identity, and a second identity; a processing unit [354] to determine, at the NRF [358], a SEPP [370] identification capability indicative of a capacity of the NRF [358] for determining the identity of the SEPP [370], wherein the SEPP [370] identification capability is one of active, and inactive, wherein, in response to the SEPP [370] identification capability being active, further causes: the processing unit [354] to determine, at the NRF
- the present disclosure provides a technically advanced solution for managing service requests in a network.
- the present solution provides a means for the NRF to identify service requests and determine if a target PLMN of the service request is part of a home network or an external network relative to the NRF. Based on such a determination, the NRF is adapted to accordingly forward the service request to a target node (such as, to another NRF, or to a SEPP).
- a target node such as, to another NRF, or to a SEPP.
- the present solution is further able to provide parameters for identifying header and value which will be used for identifying messages received from SEPP [316] rather than hardcoded values.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente invention concerne un procédé et un système de gestion de demandes de service dans un réseau. La présente invention comprend : une unité d'émission-réception [302] configurée pour recevoir, au niveau d'une fonction de dépôt de réseau (NRF) [310], une demande de service; une unité de détermination [304] configurée pour déterminer, au niveau de la NRF [310], un ensemble d'attributs/attributs d'en-tête dans la demande de service; une unité de traitement [306] configurée pour déterminer, au niveau de la NRF [310], sur la base de l'ensemble d'attributs/attributs d'en-tête, une identité d'un réseau mobile terrestre public (PLMN) cible relatif à la demande de service et/ou une identité d'une source de la demande de service; et l'unité d'émission-réception [302] est configurée pour acheminer, au niveau de la NRF [310], sur la base de l'identité déterminée du PLMN cible et/ou de la source de la demande de service, la demande de service vers un nœud de réseau cible.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN202321061425 | 2023-09-12 | ||
| IN202321061425 | 2023-09-12 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025057211A1 true WO2025057211A1 (fr) | 2025-03-20 |
Family
ID=95021782
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IN2024/051721 Pending WO2025057211A1 (fr) | 2023-09-12 | 2024-09-12 | Procédé et système de gestion de demandes de service dans un réseau |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2025057211A1 (fr) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190159115A1 (en) * | 2017-11-17 | 2019-05-23 | Blackberry Limited | PLMN Selection for Mission Critical Devices |
| US20230110286A1 (en) * | 2021-10-08 | 2023-04-13 | Oracle International Corporation | Methods, systems, and computer readable media for routing inter-public land mobile network (inter-plmn) messages related to existing subscriptions with network function (nf) repository function (nrf) using security edge protection proxy (sepp) |
| EP4193694A1 (fr) * | 2020-08-05 | 2023-06-14 | Nokia Solutions and Networks Oy | Appareil, procédé et programme informatique |
-
2024
- 2024-09-12 WO PCT/IN2024/051721 patent/WO2025057211A1/fr active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190159115A1 (en) * | 2017-11-17 | 2019-05-23 | Blackberry Limited | PLMN Selection for Mission Critical Devices |
| EP4193694A1 (fr) * | 2020-08-05 | 2023-06-14 | Nokia Solutions and Networks Oy | Appareil, procédé et programme informatique |
| US20230110286A1 (en) * | 2021-10-08 | 2023-04-13 | Oracle International Corporation | Methods, systems, and computer readable media for routing inter-public land mobile network (inter-plmn) messages related to existing subscriptions with network function (nf) repository function (nrf) using security edge protection proxy (sepp) |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20250274359A1 (en) | Communication method and communications device | |
| JP7748473B2 (ja) | サービス通信プロキシ(scp)における代行承認のための方法、システム、およびコンピュータ可読媒体 | |
| US11659621B2 (en) | Selection of IP version | |
| US10530659B2 (en) | Identifier-based resolution of identities | |
| US20220225095A1 (en) | External Authentication Method, Communication Apparatus, and Communication System | |
| RU2473184C2 (ru) | Способ и устройство для абонентской базы данных | |
| US20230099676A1 (en) | Methods, systems, and computer readable media for network function discovery using preferred-locality information | |
| US20250234187A1 (en) | Methods, systems, and computer readable media for detecting and processing inter-public land mobile network (plmn) service-based interface (sbi) messages without 3gpp-sbi-originating-network-id headers | |
| WO2025057211A1 (fr) | Procédé et système de gestion de demandes de service dans un réseau | |
| US12302091B2 (en) | Methods and nodes for deactivating server name indication, SNI, encryption in a telecommunication network | |
| WO2023216274A1 (fr) | Procédé et appareil de gestion de clé, dispositif et support de stockage | |
| US20240187860A1 (en) | Methods and means for providing access to external networks | |
| WO2025069063A1 (fr) | Procédé et système pour intégrer une fonction de référentiel de réseau à un proxy de protection de la périphérie du réseau | |
| WO2025013017A1 (fr) | Procédé et système permettant de transmettre une demande de protocole d'initiation de session à un serveur d'abonné domestique | |
| WO2025156496A1 (fr) | Procédé, dispositif et système de confidentialité de l'identité d'un ue dans des réseaux de communication | |
| WO2025052436A1 (fr) | Procédé et système de découverte d'une ou de plusieurs fonctions de réseau homologues | |
| WO2025052421A1 (fr) | Procédé et système de traitement des demandes de localisation dans un réseau de communication sans fil | |
| WO2025008978A1 (fr) | Procédé et système pour lister des dispositifs pour optimiser l'attribution d'adresses ipv4 et ipv6 | |
| WO2025037340A1 (fr) | Procédé et système pour fournir une connectivité à un équipement d'abonné dans environnement de réseau | |
| WO2025017686A1 (fr) | Procédé et système de fourniture d'informations de tranche dans un réseau de communication | |
| WO2025069062A1 (fr) | Procédé et système de continuité de service dans un réseau de communication | |
| WO2025012927A1 (fr) | Procédé et système de gestion de messages dans une unité bsf de fonction de support de liaison d'un réseau de communication | |
| WO2025017730A1 (fr) | Procédé et système de gestion de données de configuration de distribution de données non ip (nidd) | |
| WO2025057184A1 (fr) | Procédé et système de gestion de sessions de protocole de configuration dynamique d'hôte (dhcp) dans un réseau sans fil | |
| WO2025012972A1 (fr) | Procédé et système de fourniture d'informations de tranche dans un réseau de communication |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24864917 Country of ref document: EP Kind code of ref document: A1 |