[go: up one dir, main page]

WO2025008867A1 - Method and system for managing network slice selection in a telecommunications network - Google Patents

Method and system for managing network slice selection in a telecommunications network Download PDF

Info

Publication number
WO2025008867A1
WO2025008867A1 PCT/IN2024/050737 IN2024050737W WO2025008867A1 WO 2025008867 A1 WO2025008867 A1 WO 2025008867A1 IN 2024050737 W IN2024050737 W IN 2024050737W WO 2025008867 A1 WO2025008867 A1 WO 2025008867A1
Authority
WO
WIPO (PCT)
Prior art keywords
slice
network
amf
slices
list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/IN2024/050737
Other languages
French (fr)
Inventor
Adityakar Jha
Aayush Bhatnagar
Ankush KHANDELWAL
Hemant Singh
Meenakshi Rani
Santosh Kumar YADAV
Yog VASHISHTH
Anurag Sinha
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jio Platforms Ltd
Original Assignee
Jio Platforms Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jio Platforms Ltd filed Critical Jio Platforms Ltd
Publication of WO2025008867A1 publication Critical patent/WO2025008867A1/en
Pending legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Definitions

  • Embodiments of the present disclosure generally relate to network performance management systems. More particularly, embodiments of the present disclosure relate to managing network slice selection in a telecommunications network.
  • Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements.
  • the first generation of wireless communication technology was based on analog technology and offered only voice services.
  • 2G second-generation
  • 3G third-generation
  • 4G fourth-generation
  • the fourth-generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security.
  • 5G fifth-generation
  • wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
  • a number of functional modules are provided, for example an Access and Mobility Management Function (AMF), a Network Slice Selection Function (NSSF), and/or a Network Repository Function (NRF), etc., one or more of which interact with each other to implement multiple operations of the 5G communication system.
  • the NSSF is one of the key components of 5G communication system.
  • One such operation relates to assigning of a slice for a user equipment (UE) while doing 5G registration.
  • the AMF sends a slice selection request to the NSSF.
  • the 5G service-based architecture may adopt the web’s client-server model, where the client may be referred to as NF Service Consumer (for example, AMF) and the server may be referred to as NF Service Provider (for example, NSSF).
  • AMF NF Service Consumer
  • NSSF NF Service Provider
  • the NSSF is thereafter required to select the slice to the UE, as per the requirement of different UEs.
  • the 5G communication system can deploy multiple Network Slice Instances delivering exactly the same features for distinct groups of UEs.
  • the NSSF offers services to the AMF and the NSSF in a different PLMN via the NSSF service-based interface. Following are the key Network Slice Selection Function (NSSF) functionalities:
  • NSSAI Network Slice Selection Assistance Information
  • the AMF, the NSSF, and the NRF suitably communicate with each other, for assigning the slice for the UE.
  • the UE may be initially assigned with a default slice information.
  • the UE when the UE moves from one location to another or from a Home PLMN to the visited PLMN, the UE is required to be updated with a new slice information in the visited PLMN.
  • the UE sends 5G Registration request to the AMF of the visited PLMN.
  • the AMF further sends the slice selection request to the NSSF.
  • the NSSF is thus required to select the slice for the UE.
  • the NSSF includes a slice database storing a slice data of a number of tracking area identifier (TAI) representative of tracking area, and a number of slices authorized for each TAI.
  • TAI tracking area identifier
  • the NSSF sends a query to retrieve an AMF candidate list for the requested slice from the NRF. Thereafter, the NSSF searches the AMF instance in the retrieved AMF candidate list. In case of positive search, the NSSF sends an authorized response to the AMF, however, in case of negative search, the NSSF sends an error response to the AMF. Further, the AMF assigns the slice to the UE, upon receiving the authorization response.
  • TAI tracking area identifier
  • An aspect of the present disclosure may relate to a method for managing network slice selection in a telecommunications network, the method comprising receiving, by a transceiver unit, a slice selection request from an Access and Mobility Management Function (AMF), wherein the slice selection request comprises one or more network slices supported by the AMF in a tracking area within a Public Land Mobile Network (PLMN).
  • the method comprises verifying, by a verification unit, the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area.
  • the method comprises transmitting, by the transceiver unit, a response to the AMF based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
  • TAIs Tracking Area Identifiers
  • the method further comprises storing, by a storing unit, a mapping of the list of authorized network slices and the one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices in the slice database.
  • TAIs Tracking Area Identifiers
  • the method further comprises searching, by a searching unit, a requested slice of the slice selection request in the slice database and transmitting, by the transceiver unit, one of an authorized response or an unauthorized response to the AMF, wherein the authorized response is transmitted upon a positive search and the unauthorized response is transmitted upon a negative search.
  • the method further comprises receiving, by the transceiver unit, an availability request from the AMF, wherein the availability request comprises a list of network slices supported by the AMF for one or more tracking area identifiers in a PLMN and storing, by the storing unit, the list of network slices supported by the AMF for one or more tracking area identifiers in the PLMN in a slice database in run-time.
  • the method comprises verifying, by the verification unit, the requested slice based on the list of subscribed slices using the slice database to filter a set of valid slices querying, by a querying unit, the slice database for one or more AMF instances capable of serving the filtered set of valid slices and transmitting, by the transceiver unit, a response to the AMF with a list of AMF instances capable of serving the requested network slice.
  • NSF Network Slice Selection Function
  • Another aspect of the present disclosure may relate to a system for managing network slice selection in a telecommunications network, the system comprising a transceiver unit configured to receive a slice selection request from an Access and Mobility Management Function (AMF), wherein the slice selection request comprises one or more network slices supported by the AMF in a tracking area within a Public Land Mobile Network (PLMN).
  • the system comprising verification unit connected to at least the transceiver unit, wherein the verification unit configured to verify the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area.
  • the system comprising the transceiver unit configured to transmit a response to the AMF based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
  • TAIs Tracking Area Identifiers
  • Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instructions for managing network slice selection in a telecommunications network, the instructions include executable code which, when executed by a one or more units of a system, causes: a transceiver unit of the system to receive a slice selection request from an Access and Mobility Management Function (AMF), wherein the slice selection request comprises one or more network slices supported by the AMF in a tracking area within a Public Land Mobile Network (PLMN), a verification unit of the system to verify the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area, and the transceiver unit to transmit a response to the AMF based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
  • AMF Access and Mobility Management Function
  • PLMN Public Land Mobile Network
  • NSSF Network Slice Selection Function
  • UE user equipment
  • FIG. 1 illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture.
  • 5GC 5th generation core
  • FIG. 2 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
  • FIG. 3 illustrates an exemplary block diagram [300] of a system for managing network slice selection in a telecommunications network in accordance with exemplary implementations of the present disclosure.
  • FIG. 4 illustrates a method flow diagram [400] for managing network slice selection in a telecommunications network in accordance with exemplary implementations of the present disclosure.
  • FIG. 5 illustrates an exemplary scenario signal flow diagram for managing network slice selection in a telecommunications network in accordance with exemplary implementations of the present disclosure.
  • exemplary and/or “demonstrative” is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples.
  • any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art.
  • a “processing unit” or “processor” or “operating processor” includes one or more processors, wherein processor refers to any logic circuitry for processing instructions.
  • a processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a (Digital Signal Processing) DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc.
  • the processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
  • a user equipment may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure.
  • the user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable of implementing the features of the present disclosure.
  • the user device may contain at least one input means configured to receive an input from at least one of a transceiver unit, a processing unit, a storage unit, a detection unit and any other such unit(s) which are required to implement the features of the present disclosure.
  • storage unit or “memory unit” refers to a machine or computer- readable medium including any mechanism for storing information in a form readable by a computer or similar machine.
  • a computer-readable medium includes read-only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media.
  • the storage unit stores at least the data that may be required by one or more units of the system to perform their respective functions.
  • interface refers to a shared boundary across which two or more separate components of a system exchange information or data.
  • the interface may also be referred to a set of rules or protocols that define communication or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called.
  • All modules, units, components used herein, unless explicitly excluded herein, may be software modules or hardware processors, the processors being a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc.
  • DSP digital signal processor
  • ASIC Application Specific Integrated Circuits
  • FPGA Field Programmable Gate Array circuits
  • the transceiver unit include at least one receiver and at least one transmitter configured respectively for receiving and transmitting data, signals, information, or a combination thereof between units/components within the system and/or connected with the system.
  • the present disclosure aims to overcome the above-mentioned and other existing problems in this field of technology by providing method and system for managing network slice selection in a telecommunication network.
  • the present invention relates to a system and method for managing network slice selection in a telecommunications network.
  • the current known solutions tackles the challenge of slow slice assignment/reassignment by streamlining the process within the network infrastructure.
  • AMF Access and Mobility Management Function
  • the solution of the present disclosure as disclosed herein swiftly checks these slices against a stored list in a database to confirm their suitability for that area. Then, the solution of the present disclosure as disclosed herein sends back a response to the AMF with the approved slices and their corresponding area identifiers.
  • the solution also discloses storing this information in the database for future reference. Further, the solution of the present disclosure as disclosed herein searches for requested slices, give responses based on the search results, and manage subsequent requests efficiently. Implemented within the Network Slice Selection Function (NSSF), the solution of the present disclosure optimizes slice allocation and improves overall network performance.
  • NSF Network Slice Selection Function
  • the 5GC network architecture includes a user equipment (UE) [102], a radio access network (RAN) [104], an access and mobility management function (AMF) [106], a Session Management Function (SMF) [108], a Service Communication Proxy (SCP) [110], an Authentication Server Function (AUSF) [112], a Network Slice Specific Authentication and Authorization Function (NSSAAF) [114], a Network Slice Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122], a Unified Data Management (UDM) [124], an application function (AF) [126], a User Plane Function (UPF) [128], a data network (DN) [130], wherein all the components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present disclosure.
  • UE user equipment
  • RAN radio access network
  • AMF Access and mobility management
  • Radio Access Network (RAN) [101b] is the part of a mobile telecommunications system that connects user equipment (UE) [101a] to the core network (CN) and provides access to different types of networks (e.g., 5G network). It consists of radio base stations and the radio access technologies that enable wireless communication.
  • Access and Mobility Management Function (AMF) is a 5G core network function responsible for managing access and mobility aspects, such as UE registration, connection, and reachability. It also handles mobility management procedures like handovers and paging.
  • Session Management Function (SMF) [108] is a 5G core network function responsible for managing session-related aspects, such as establishing, modifying, and releasing sessions. It coordinates with the User Plane Function (UPF) for data forwarding and handles IP address allocation and QoS enforcement.
  • UPF User Plane Function
  • Service Communication Proxy (SCP) [110] is a network function in the 5 G core network that facilitates communication between other network functions by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces.
  • AUSF Authentication Server Function
  • NSSAAF Network Slice Specific Authentication and Authorization Function
  • Network Slice Selection Function (NSSF) [116] is a network function responsible for selecting the appropriate network slice for a UE based on factors such as subscription, requested services, and network policies.
  • Network Exposure Function [118] is a network function that exposes capabilities and services of the 5G network to external applications, enabling integration with third-party services and applications.
  • Network Repository Function (NRF) [120] is a network function that acts as a central repository for information about available network functions and services. It facilitates the discovery and dynamic registration of network functions.
  • PCF Policy Control Function
  • Unified Data Management [124] is a network function that centralizes the management of subscriber data, including authentication, authorization, and subscription information.
  • Application Function (AF) is a network function that represents external applications interfacing with the 5G core network to access network capabilities and services.
  • UPF User Plane Function
  • Data Network (DN) [130] refers to a network that provides data services to user equipment (UE) in a telecommunications system.
  • the data services may include but are not limited to Internet services, private data network related services.
  • Fig. 2 illustrates an exemplary block diagram of a computing device [1000] upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
  • the computing device [1000] may also implement a method for managing network slice selection in a telecommunications network utilising the system.
  • the computing device [1000] itself implements the method for managing network slice selection in the telecommunications network using one or more units configured within the computing device [1000], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
  • the computing device [1000] may include a bus [1002] or other communication mechanism for communicating information, and a hardware processor [1004] coupled with bus [1002] for processing information.
  • the hardware processor [1004] may be, for example, a general purpose microprocessor.
  • the computer system [1000] may also include a main memory [1006], such as a random access memory (RAM), or other dynamic storage device, coupled to the bus [1002] for storing information and instructions to be executed by the processor [1004],
  • the main memory [1006] also may be used for storing temporary variables or other intermediate information during execution of the instructions to be executed by the processor [1004], Such instructions, when stored in non-transitory storage media accessible to the processor [1004], render the computer system [1000] into a special-purpose machine that is customized to perform the operations specified in the instructions.
  • the computer system [1000] further includes a read only memory (ROM) [1008] or other static storage device coupled to the bus [1002] for storing static information and instructions for the processor [1004],
  • ROM read only memory
  • a storage device [1010], such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to the bus [1002] for storing information and instructions.
  • the computer system [1000] may be coupled via the bus [1002] to a display [1012], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for displaying information to a computer user.
  • a cursor control [1016] such as a mouse, a trackball, or cursor direction keys, for communicating direction information and command selections to the processor [1004], and for controlling cursor movement on the display [1012]
  • This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
  • the computer system [1000] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic which in combination with the computer system [1000] causes or programs the computer system [1000] to be a special-purpose machine.
  • the techniques herein are performed by the computer system [1000] in response to the processor [1004] executing one or more sequences of one or more instructions contained in the main memory [1006], Such instructions may be read into the main memory [1006] from another storage medium, such as the storage device [1010], Execution of the sequences of instructions contained in the main memory [1006] causes the processor [1004] to perform the process steps described herein.
  • hard-wired circuitry may be used in place of or in combination with software instructions.
  • the computer system [1000] also may include a communication interface [1018] coupled to the bus [1002],
  • the communication interface [1018] provides a two-way data communication coupling to a network link [1020] that is connected to a local network [1022].
  • the communication interface [1018] may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line.
  • the communication interface [1018] may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
  • LAN local area network
  • Wireless links may also be implemented.
  • the communication interface [1018] sends and receives electrical, electromagnetic, or optical signals that carry digital data streams representing various types of information.
  • the computer system [1000] can send messages and receive data, including program code, through the network(s), the network link [1020] and the communication interface [1018],
  • a server [1030] might transmit a requested code for an application program through the Internet [1028], the ISP [1026], the local network [1022] and the communication interface [1018],
  • the received code may be executed by the processor [1004] as it is received, and/or stored in the storage device [1010], or other non-volatile storage for later execution.
  • FIG. 3 an exemplary block diagram of a system [300] for managing network slice selection in a telecommunications network is shown, in accordance with the exemplary implementations of the present disclosure.
  • the system [300] comprises at least one transceiver unit [301], at least one verification unit [303], at least one storage unit [305], at least one searching unit [307] and at least one querying unit [309], Also, all of the components/ units of the system [300] are assumed to be connected to each other unless otherwise indicated below. As shown in the figures all units shown within the system should also be assumed to be connected to each other. Also, in Fig.
  • system [300] may comprise multiple such units or the system [300] may comprise any such numbers of said units, as required to implement the features ofthe present disclosure.
  • the system [300] may reside in a server or a network entity. In yet another implementation, the system [300] may reside partly in the server/ network entity.
  • the system [300] is configured for managing network slice selection in the telecommunications network with the help of the interconnection between the components/units ofthe system [300],
  • the system comprising a transceiver unit [301] configured to receive a slice selection request from an Access and Mobility Management Function (AMF) [106], wherein the slice selection request comprises one or more network slices supported by the AMF [ 106] in a tracking area within a Public Land Mobile Network (PLMN).
  • AMF Access and Mobility Management Function
  • PLMN Public Land Mobile Network
  • the present disclosure encompasses that the transceiver unit [301] is responsible for both transmitting and receiving signals within the telecommunications network wherein managing network slice selection is implemented at a Network Slice Selection Function (NSSF) [116],
  • the "slice selection request" contains information about the one or more network slices supported by the AMF [106] within a particular tracking area. Further, the tracking area, represents a geographical region within the Public Land Mobile Network (PLMN).
  • the AMF [106] is responsible for managing user mobility, manging network access, and communicates supported network slices within the tracking area to the NSSF [116] based on the slice selection request.
  • the verification unit [303] connected to at least the transceiver unit [301], wherein the verification unit [303] configured to verify the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area. Further, as disclosed by the present disclosure the verification unit [303] may check the suitability of one or more network slices based on a list of subscribed slices stored in a slice database. Further, according to the present disclosure, the verification unit [303] may checks if one or more network slices matches with the subscribed slices in the slice database to determine if the one or more network slices are permissible within the tracking area. It is to be noted that the term subscribed slices refer to customizable, virtualized network instances in accordance with user requirements within a network infrastructure.
  • the subscribed slices are the network slices that may be allocated to subscribers based on their service needs and to enable diverse functionalities such as differentiated quality of service (QoS), security, and resource allocation.
  • the subscribed slices are essentially isolated segments of the telecommunications network that are provisioned, managed, and optimized independently to meet the distinct demands of different users or applications.
  • a network slice may determine as a permissible network slice in an event said network slice is a predefined segments of the telecommunications network that adhere to a specified criteria, a predefined policies governing creation of said network slice, a configuration, and a usage.
  • the permissible network slice serves as predefined templates for deploying network services while ensuring adherence to predefined guidelines and regulations associated with the tracking area.
  • the verification unit [303] is configured to verify the requested slice based on the list of subscribed slices using the slice database to filter a set of valid slices . Further, as disclosed by the present disclosure, the verification of the requested slice may be performed by comparing the requested slice with the list of subscribed slices stored in the slice database. In an event, if the requested slice matches with any of the subscribed slice from the list of subscribed slices, it is considered as a valid slice and included in the filtered set of valid slices. Thereupon, the querying unit [309] is configured to query the slice database for one or more AMF instances capable of serving the filtered set of valid slices.
  • the querying unit [309] may query the slice database to identify the one or more AMF instances. These AMF instances are those that have necessary capabilities (such as user authentication, authorization) to handle the filtered set of valid slices.
  • the transceiver unit [301] is configured to transmit a response to the AMF [106] with a list of AMF instances capable of serving the requested network slice. This response assists the AMF [106] in determining which AMF instances that may be considered suitable for handling the requested network slice i.e., the list of AMF instances capable of serving the requested network slice.
  • the transceiver unit [301] is configured to transmit a response to the AMF [106] based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
  • TAIs Tracking Area Identifiers
  • the present disclosure encompasses that the transceiver unit [301] within the Network Slice Selection Function (NSSF) [116] transmits the response to the Access and Mobility Management Function (AMF) [106] based on the preceding verification process.
  • NSSF Network Slice Selection Function
  • AMF Access and Mobility Management Function
  • the response transmitted by the transceiver unit [301] to the AMF [106] serves communication between the NSSF [116] and the AMF [106], Further, within said response, the NSSF [116] communicates the list of authorized network slices that are deemed permissible for the specific tracking area in question. Additionally, the response includes the one or more Tracking Area Identifiers (TAIs), within the Public Land Mobile Network (PLMN).
  • TAIs are identifiers used within the telecommunications network to designate specific tracking areas. Further, the TAIs are associated with network slices and are included in the response transmitted by the NSSF [116] to the AMF [106],
  • the searching unit [307] may be configured to search a requested slice in the slice selection request in the slice database. Further, the searching unit [307] may locate the requested slice within the slice database to verify whether the “requested slice” that is part of the “network slice selection request” matches a slice that is already stored in the slice database. Further, upon searching the requested slice in the slice selection request in the slice database, the transceiver unit [301] may be configured to transmit one of an authorized response or an unauthorized response to the AMF [106], wherein the authorized response is transmitted upon a positive search and the unauthorized response is transmitted upon a negative search.
  • the transceiver unit [301] transmit a response to the AMF [106] based on the outcome of the search performed by the searching unit [307], Further, in a scenario the searching unit [307] finds the requested slice in the slice database then it is referred as the positive search, the transceiver unit [301] sends the authorized response to the AMF [106] and if the searching unit [307] fails to find the requested slice in the slice database i.e., the negative search, the transceiver unit [301] sends the unauthorized response to the AMF [106],
  • the storing unit [305] is configured to store a mapping of the list of authorized network slices and the one or more TAIs associated with the list of authorized network slices in the slice database.
  • the storing unit [305] is configured to maintain the mapping between the authorized network slices and their associated Tracking Area Identifiers (TAIs) within the slice database.
  • TAIs Tracking Area Identifiers
  • the transceiver unit [301] configured to receive an availability request from the AMF [106], wherein the availability request comprises a list of network slices supported by the AMF [106] for one or more tracking area identifiers in the PLMN.
  • the availability request contains information about network slices i.e., the list of network slices supported by the AMF [106] for specific tracking area identifiers within the PLMN and the storing unit [305] configured to store the list of network slices supported by the AMF [106] for one or more tracking area identifiers in the PLMN in a slice database in run-time.
  • the transceiver unit [301] Upon receiving the availability request from the AMF [106], the transceiver unit [301] forwards it to the storing unit [305], The storing unit [305] then updates the slice database with the list of network slices supported by the AMF [106] for the specified tracking area identifiers. This dynamic updating ensures that the slice database accurately reflects the available network slices for different tracking areas within the PLMN.
  • FIG. 4 an exemplary method flow diagram [400] for managing network slice selection in a telecommunications network in accordance with exemplary implementations of the present disclosure is shown.
  • the method [400] is performed by the system [300], Further, in an implementation, the system [300] may be present in a server device to implement the features of the present disclosure. Also, as shown in Figure 4, the method [400] starts at step [402] .
  • the method comprises receiving, by a transceiver unit [301], a slice selection request from an Access and Mobility Management Function (AMF) [106], wherein the slice selection request comprises one or more network slices supported by the AMF [106] in a tracking area within a Public Land Mobile Network (PLMN).
  • AMF Access and Mobility Management Function
  • the transceiver unit [301] is responsible for both transmitting and receiving signals within the telecommunications network wherein managing network slice selection is implemented at a Network Slice Selection Function (NSSF) [116],
  • the "slice selection request" contains information about the one or more network slices supported by the AMF [106] within a particular tracking area. Further, the tracking area, represents a geographical region within the Public Land Mobile Network (PLMN).
  • the AMF [106] is responsible for managing user mobility, manging network access, and communicates supported network slices within the tracking area to the NSSF based on the slice selection request.
  • the method comprises verifying, by a verification unit [303], the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area. Further, as disclosed by the present disclosure the verification unit [303] may check the suitability of one or more network slices based on a list of subscribed slices stored in a slice database. Further, according to the present disclosure, the verification unit [303] may checks if one or more network slices matches with the subscribed slices in the slice database to determine if the one or more network slices are permissible within the tracking area. It is to be noted that the term subscribed slices refer to customizable, virtualized network instances in accordance with user requirements within a network infrastructure.
  • the subscribed slices are the network slices that may be allocated to subscribers based on their service needs and to enable diverse functionalities such as differentiated quality of service (QoS), security, and resource allocation.
  • the subscribed slices are essentially isolated segments of the telecommunications network that are provisioned, managed, and optimized independently to meet the distinct demands of different users or applications.
  • a network slice may determine as a permissible network slice in an event said network slice is a predefined segments of the telecommunications network that adhere to a specified criteria, a predefined policies governing creation of said network slice, a configuration, and a usage.
  • the permissible network slice serve as predefined templates for deploying network services while ensuring adherence to predefined guidelines and regulations associated with the tracking area.
  • the method comprises verifying, by the verification unit [303], the requested slice based on the list of subscribed slices using the slice database to filter a set of valid slices. Further, as disclosed by the present disclosure, the verification of the requested slice may be performed by comparing the requested slice with the list of subscribed slices stored in the slice database. In an event, if the requested slice matches with any of the subscribed slice from the list of subscribed slices, it is considered as a valid slice and included in the filtered set of valid slices.
  • the querying by a querying unit [309], the slice database for one or more AMF instances capable of serving the filtered set of valid slices.
  • the querying unit [309] may query the slice database to identify the one or more AMF instances. These AMF instances are those that have necessary capabilities (such as user authentication, authorization) to handle the filtered set of valid slices.
  • the transmitting by the transceiver unit [301] , a response to the AMF [ 106] with a list of AMF instances capable of serving the requested network slice. This response assists the AMF [106] in determining which AMF instances are suitable for handling the requested network slice i.e., the list of AMF instances capable of serving the requested network slice.
  • the method comprises transmitting, by the transceiver unit [301], a response to the AMF [106] based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
  • TAIs Tracking Area Identifiers
  • the present disclosure encompasses that the transceiver unit [301] within the Network Slice Selection Function (NSSF) [116] transmits the response to the Access and Mobility Management Function (AMF) [106] based on the preceding verification process.
  • NSSF Network Slice Selection Function
  • AMF Access and Mobility Management Function
  • the response transmitted by the transceiver unit [301] to the AMF [106] serves communication between the NSSF [116] and the AMF [106], Further, within said response, the NSSF [116] communicates the list of authorized network slices that are deemed permissible for the specific tracking area in question. Additionally, the response includes the one or more Tracking Area Identifiers (TAIs), within the Public Land Mobile Network (PLMN).
  • TAIs are identifiers used within the telecommunications network to designate specific tracking areas. Further, the TAIs are associated with network slices and are included in the response transmitted by the NSSF [116] to the AMF [106],
  • searching by a searching unit [307] may be a requested slice of the slice selection request in the slice database. Further, the searching unit [307] may locate the requested slice within the slice database to verify whether the “requested slice” that is part of the “network slice selection request” matches a slice that is already stored in the slice database. Further, the transmitting, by the transceiver unit [301], may be one of an authorized response or an unauthorized response to the AMF [106], wherein the authorized response is transmitted upon a positive search and the unauthorized response is transmitted upon a negative search.
  • the transceiver unit [301] transmit a response to the AMF [106] based on the outcome of the search performed by the searching unit [307], Further, in a scenario the searching unit [307] finds the requested slice in the slice database then it is referred as the positive search, the transceiver unit [301] sends the authorized response to the AMF [106] and if the searching unit [307] fails to find the requested slice in the slice database i.e., the negative search, the transceiver unit [301] sends the unauthorized response to the AMF [106],
  • the present disclosure encompasses that storing, by a storing unit [305], a mapping of a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices in the slice database.
  • the storing unit [305] is configured to maintain the mapping between the authorized network slices and their associated Tracking Area Identifiers (TAIs) within the slice database.
  • the availability request contains information about network slices i.e., the list of network slices supported by the AMF [106] for specific tracking area identifiers within the PLMN and storing, by the storing unit, the list of network slices supported by the AMF [106] for one or more tracking area identifiers in the PLMN in a slice database in run-time.
  • the transceiver unit [301] forwards it to the storing unit [305].
  • the storing unit [305] updates the slice database with the list of network slices supported by the AMF [ 106] for the specified tracking area identifiers. This dynamic updating ensures that the slice database accurately reflects the available network slices for different tracking areas within the PLMN.
  • FIG. 5 an exemplary scenario signal flow [500] diagram for managing network slice selection in a telecommunications network is shown, in accordance with the exemplary implementations of the present disclosure.
  • a Network function (NF) service consumer e.g. an access and mobility management function (AMF)
  • AMF access and mobility management function
  • NSSAI Network Slice Selection Assistance Information
  • Availability information of the NF may include Network Slice Selection Assistance Information (NSSAI) Availability information of the NF.
  • NSSAI Network Slice Selection Assistance Information
  • the NF service consumer may send the PUT request to the NSSF.
  • the PUT method is a HTTP method of requests that the enclosed entity be stored under the supplied URI (Uniform Resource Identifier). If the URI refers to an already existing resource, it is modified and if the URI does not point to an existing resource, then the server can create the resource with that URI.
  • the PUT method is used by AMF while registering for first time in Network.
  • the PUT method may include NSSAI availability information of the NF.
  • NSSAI may refer to the set of parameters used to identify and describe a network slice.
  • NSSAI may include two key elements: [0087] • Slice Differentiator (SD): It is a globally unique identifier that distinguishes between different network slices within a 5G network. The SD is used to ensure that the UE selects the correct slice during communication.
  • SD Slice Differentiator
  • SST Slice Service Type
  • URLLC ultra-reliable communication
  • step S2 On success, "204 No content” shall be returned if Authorized NSSAI Availability is empty after the update; otherwise, "200 OK" shall be returned,
  • the NF Service consumer e.g. AMF
  • the request shall include query parameters.
  • step S4 On success, "200 OK" shall be returned when the NSSF is able to find authorized network slice information for the requested network slice selection information, 2b If no slice instances can be found for the requested slice selection information, then the NSSF shall return a 403 Forbidden response with the "ProblemDetails”.
  • the present disclosure further discloses a non-transitory computer readable storage medium storing instructions for managing network slice selection in a telecommunications network
  • the instructions include executable code which, when executed by a one or more units of a system, causes a transceiver unit [301] of the system to receive a slice selection request from an Access and Mobility Management Function (AMF) [106], wherein the slice selection request comprises one or more network slices supported by the AMF [106] in a tracking area within a Public Land Mobile Network (PLMN).
  • AMF Access and Mobility Management Function
  • the verification unit [303] of the system to verify the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area and transceiver unit [301] to transmit a response to the AMF [106] based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
  • TAIs Tracking Area Identifiers
  • the present disclosure provides a technically advanced solution for managing network slice selection in a telecommunications network.
  • the present disclosure provides the solution to the challenge of selecting slices for User Equipment (UE) in 5G communication systems.
  • the solution as disclosed in the present disclosure lies in an optimized solution that swiftly identifies the most suitable slice for each UE based on a range of parameters including network conditions, the UE requirements, and available resources. This solution significantly accelerates the slice selection process, ensuring rapid sendee provisioning.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present disclosure relates to a method and a system for managing network slice selection in a telecommunications network, The method comprises receiving, by a transceiver unit [301], a slice selection request from an Access and Mobility Management Function (AMF) [106], wherein the slice selection request comprises one or more network slices supported by the AMF [106] in a tracking area within a Public Land Mobile Network (PLMN); verifying, by a verification unit [303], the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area; and transmitting, by the transceiver unit [301], a response to the AMF [106] based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.

Description

METHOD AND SYSTEM FOR MANAGING NETWORK SLICE SELECTION INA TELECOMMUNICATIONS NETWORK
FIELD OF INVENTION
[0001] Embodiments of the present disclosure generally relate to network performance management systems. More particularly, embodiments of the present disclosure relate to managing network slice selection in a telecommunications network.
BACKGROUND
[0002] The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art.
[0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second-generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third- generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth-generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth-generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users. Further, reducing call drops and latency is of paramount importance in the telecommunications industry. Call drops can be frustrating for users, and they can also result in lost revenue for service providers. Latency, on the other hand, refers to the time it takes for data to travel from one device to another and can cause delays and disruptions in communication. The introduction of 5G technology promises to address these issues by delivering ultra-low latency and high-speed data transmission. With 5G, call drops are going to be minimized, and users are going to experience seamless, uninterrupted communication. Additionally, 5G technology may enable the development of new applications and services that require high-speed, low-latency communication, such as remote surgeries, autonomous vehicles, and virtual reality. The reduction of call drops and latency is crucial in ensuring that users have access to reliable and efficient communication services, and the 5G technology is a significant step towards achieving this goal.
[0004] In the 5G communication system, a number of functional modules are provided, for example an Access and Mobility Management Function (AMF), a Network Slice Selection Function (NSSF), and/or a Network Repository Function (NRF), etc., one or more of which interact with each other to implement multiple operations of the 5G communication system. The NSSF is one of the key components of 5G communication system. One such operation relates to assigning of a slice for a user equipment (UE) while doing 5G registration. For such operation, the AMF sends a slice selection request to the NSSF. As would be understood, the 5G service-based architecture may adopt the web’s client-server model, where the client may be referred to as NF Service Consumer (for example, AMF) and the server may be referred to as NF Service Provider (for example, NSSF).
[0005] The NSSF is thereafter required to select the slice to the UE, as per the requirement of different UEs. The 5G communication system can deploy multiple Network Slice Instances delivering exactly the same features for distinct groups of UEs. The NSSF offers services to the AMF and the NSSF in a different PLMN via the NSSF service-based interface. Following are the key Network Slice Selection Function (NSSF) functionalities:
• Authorize the set of network slice instances for an AMF Availability (registration).
• Determining a Network Slice Selection Assistance Information (NSSAI) allowed for selection of the slice.
• Determining the AMF Set /Candidate list to be used to serve the UE based on the AMF Availability (registration).
[0006] In other words, the AMF, the NSSF, and the NRF, suitably communicate with each other, for assigning the slice for the UE. In particular, the UE may be initially assigned with a default slice information. Whereas, when the UE moves from one location to another or from a Home PLMN to the visited PLMN, the UE is required to be updated with a new slice information in the visited PLMN. For such purposes, the UE sends 5G Registration request to the AMF of the visited PLMN. The AMF further sends the slice selection request to the NSSF. The NSSF is thus required to select the slice for the UE. It may be noted that the NSSF includes a slice database storing a slice data of a number of tracking area identifier (TAI) representative of tracking area, and a number of slices authorized for each TAI. For selection of the slice, the NSSF sends a query to retrieve an AMF candidate list for the requested slice from the NRF. Thereafter, the NSSF searches the AMF instance in the retrieved AMF candidate list. In case of positive search, the NSSF sends an authorized response to the AMF, however, in case of negative search, the NSSF sends an error response to the AMF. Further, the AMF assigns the slice to the UE, upon receiving the authorization response. However, such method of selecting the slice for the UE is a timeconsuming process and is required to be worked in a faster manner.
[0007] Thus, there exists an imperative need in the art to provide a faster and efficient system and method of selecting the slice for the UE, which the present disclosure aims to address.
SUMMARY
[0008] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0009] An aspect of the present disclosure may relate to a method for managing network slice selection in a telecommunications network, the method comprising receiving, by a transceiver unit, a slice selection request from an Access and Mobility Management Function (AMF), wherein the slice selection request comprises one or more network slices supported by the AMF in a tracking area within a Public Land Mobile Network (PLMN). The method comprises verifying, by a verification unit, the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area. The method comprises transmitting, by the transceiver unit, a response to the AMF based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
[0010] In an exemplary aspect of the present disclosure, the method further comprises storing, by a storing unit, a mapping of the list of authorized network slices and the one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices in the slice database.
[0011] In an exemplary aspect of the present disclosure, the method further comprises searching, by a searching unit, a requested slice of the slice selection request in the slice database and transmitting, by the transceiver unit, one of an authorized response or an unauthorized response to the AMF, wherein the authorized response is transmitted upon a positive search and the unauthorized response is transmitted upon a negative search.
[0012] In an exemplary aspect of the present disclosure, the method further comprises receiving, by the transceiver unit, an availability request from the AMF, wherein the availability request comprises a list of network slices supported by the AMF for one or more tracking area identifiers in a PLMN and storing, by the storing unit, the list of network slices supported by the AMF for one or more tracking area identifiers in the PLMN in a slice database in run-time.
[0013] In an exemplary aspect of the present disclosure, wherein upon receiving, from the AMF, a subsequent network slice selection request comprising a requested slice and a subscribed slice, the method comprises verifying, by the verification unit, the requested slice based on the list of subscribed slices using the slice database to filter a set of valid slices querying, by a querying unit, the slice database for one or more AMF instances capable of serving the filtered set of valid slices and transmitting, by the transceiver unit, a response to the AMF with a list of AMF instances capable of serving the requested network slice.
[0014] In an exemplary aspect of the present disclosure, wherein managing network slice selection is implemented at a Network Slice Selection Function (NSSF).
[0015] Another aspect of the present disclosure may relate to a system for managing network slice selection in a telecommunications network, the system comprising a transceiver unit configured to receive a slice selection request from an Access and Mobility Management Function (AMF), wherein the slice selection request comprises one or more network slices supported by the AMF in a tracking area within a Public Land Mobile Network (PLMN). The system comprising verification unit connected to at least the transceiver unit, wherein the verification unit configured to verify the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area. The system comprising the transceiver unit configured to transmit a response to the AMF based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
[0016] Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instructions for managing network slice selection in a telecommunications network, the instructions include executable code which, when executed by a one or more units of a system, causes: a transceiver unit of the system to receive a slice selection request from an Access and Mobility Management Function (AMF), wherein the slice selection request comprises one or more network slices supported by the AMF in a tracking area within a Public Land Mobile Network (PLMN), a verification unit of the system to verify the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area, and the transceiver unit to transmit a response to the AMF based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
OBJECTS OF THE INVENTION
[0017] Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below.
[0018] It is an object of the present disclosure to provide a system and a method for faster and efficiently assigning/reas signing the slice for the UE, by way of faster and efficient retrieval of the slice information by the AMF from the Network Slice Selection Function (NSSF).
[0019] It is another object of the present disclosure to provide a system and method for maintaining, on a NSSF storage unit of the NSSF, a slice data comprising of an AMF candidate list, TAIs mapped thereto to each of the AMF candidate, and the slices authorized to each of the AMF.
[0020] It is yet another object of the present disclosure to provide a system and method for determining the candidate AMF for the requested slice by the user equipment (UE).
DESCRIPTION OF THE DRAWINGS
[0021] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Also, the embodiments shown in the figures are not to be construed as limiting the disclosure, but the possible variants of the method and system according to the disclosure are illustrated herein to highlight the advantages of the disclosure. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components or circuitry commonly used to implement such components.
[0022] FIG. 1 illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture.
[0023] FIG. 2 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
[0024] Fig. 3 illustrates an exemplary block diagram [300] of a system for managing network slice selection in a telecommunications network in accordance with exemplary implementations of the present disclosure.
[0025] Fig. 4 illustrates a method flow diagram [400] for managing network slice selection in a telecommunications network in accordance with exemplary implementations of the present disclosure.
[0026] Fig. 5 illustrates an exemplary scenario signal flow diagram for managing network slice selection in a telecommunications network in accordance with exemplary implementations of the present disclosure.
[0027] The foregoing shall be more apparent from the following more detailed description of the disclosure.
DETAILED DESCRIPTION
[0028] In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter may each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above.
[0029] The ensuing description provides exemplary embodiments only, and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
[0030] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail.
[0031] Also, it is noted that individual embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations may be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure.
[0032] The word “exemplary” and/or “demonstrative” is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive — in a manner similar to the term “comprising” as an open transition word — without precluding any additional or other elements.
[0033] As used herein, a “processing unit” or “processor” or “operating processor” includes one or more processors, wherein processor refers to any logic circuitry for processing instructions. A processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a (Digital Signal Processing) DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
[0034] As used herein, “a user equipment”, “a user device”, “a smart-user-device”, “a smartdevice”, “an electronic device”, “a mobile device”, “a handheld device”, “a wireless communication device”, “a mobile communication device”, “a communication device” may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure. The user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable of implementing the features of the present disclosure. Also, the user device may contain at least one input means configured to receive an input from at least one of a transceiver unit, a processing unit, a storage unit, a detection unit and any other such unit(s) which are required to implement the features of the present disclosure.
[0035] As used herein, “storage unit” or “memory unit” refers to a machine or computer- readable medium including any mechanism for storing information in a form readable by a computer or similar machine. For example, a computer-readable medium includes read-only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media. The storage unit stores at least the data that may be required by one or more units of the system to perform their respective functions.
[0036] As used herein “interface” or “user interface refers to a shared boundary across which two or more separate components of a system exchange information or data. The interface may also be referred to a set of rules or protocols that define communication or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called. [0037] All modules, units, components used herein, unless explicitly excluded herein, may be software modules or hardware processors, the processors being a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc.
[0038] As used herein the transceiver unit include at least one receiver and at least one transmitter configured respectively for receiving and transmitting data, signals, information, or a combination thereof between units/components within the system and/or connected with the system.
[0039] As discussed in the background section, the current known solutions have several shortcomings. The present disclosure aims to overcome the above-mentioned and other existing problems in this field of technology by providing method and system for managing network slice selection in a telecommunication network.
[0040] The present invention relates to a system and method for managing network slice selection in a telecommunications network. As discussed in the background section, the current known solutions tackles the challenge of slow slice assignment/reassignment by streamlining the process within the network infrastructure. When the Access and Mobility Management Function (AMF) sends a request for a slice selection through a transceiver unit, it lists the available network slices for a specific area. Further, the solution of the present disclosure as disclosed herein swiftly checks these slices against a stored list in a database to confirm their suitability for that area. Then, the solution of the present disclosure as disclosed herein sends back a response to the AMF with the approved slices and their corresponding area identifiers. The solution also discloses storing this information in the database for future reference. Further, the solution of the present disclosure as disclosed herein searches for requested slices, give responses based on the search results, and manage subsequent requests efficiently. Implemented within the Network Slice Selection Function (NSSF), the solution of the present disclosure optimizes slice allocation and improves overall network performance.
[0041] Hereinafter, exemplary embodiments of the present disclosure will be described with reference to the accompanying drawings. [0042] FIG. 1 illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture, in accordance with exemplary implementation of the present disclosure. As shown in FIG. 1, the 5GC network architecture [100] includes a user equipment (UE) [102], a radio access network (RAN) [104], an access and mobility management function (AMF) [106], a Session Management Function (SMF) [108], a Service Communication Proxy (SCP) [110], an Authentication Server Function (AUSF) [112], a Network Slice Specific Authentication and Authorization Function (NSSAAF) [114], a Network Slice Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122], a Unified Data Management (UDM) [124], an application function (AF) [126], a User Plane Function (UPF) [128], a data network (DN) [130], wherein all the components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present disclosure.
[0043] Radio Access Network (RAN) [101b] is the part of a mobile telecommunications system that connects user equipment (UE) [101a] to the core network (CN) and provides access to different types of networks (e.g., 5G network). It consists of radio base stations and the radio access technologies that enable wireless communication.
[0044] Access and Mobility Management Function (AMF) [106] is a 5G core network function responsible for managing access and mobility aspects, such as UE registration, connection, and reachability. It also handles mobility management procedures like handovers and paging.
[0045] Session Management Function (SMF) [108] is a 5G core network function responsible for managing session-related aspects, such as establishing, modifying, and releasing sessions. It coordinates with the User Plane Function (UPF) for data forwarding and handles IP address allocation and QoS enforcement.
[0046] Service Communication Proxy (SCP) [110] is a network function in the 5 G core network that facilitates communication between other network functions by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces.
[0047] Authentication Server Function (AUSF) [112] is a network function in the 5G core responsible for authenticating UEs during registration and providing security services. It generates and verifies authentication vectors and tokens. [0048] Network Slice Specific Authentication and Authorization Function (NSSAAF) [114] is a network function that provides authentication and authorization services specific to network slices. It ensures that UEs can access only the slices for which they are authorized.
[0049] Network Slice Selection Function (NSSF) [116] is a network function responsible for selecting the appropriate network slice for a UE based on factors such as subscription, requested services, and network policies.
[0050] Network Exposure Function (NEF) [118] is a network function that exposes capabilities and services of the 5G network to external applications, enabling integration with third-party services and applications.
[0051] Network Repository Function (NRF) [120] is a network function that acts as a central repository for information about available network functions and services. It facilitates the discovery and dynamic registration of network functions.
[0052] Policy Control Function (PCF) [122] is a network function responsible for policy control decisions, such as QoS, charging, and access control, based on subscriber information and network policies.
[0053] Unified Data Management (UDM) [124] is a network function that centralizes the management of subscriber data, including authentication, authorization, and subscription information.
[0054] Application Function (AF) [126] is a network function that represents external applications interfacing with the 5G core network to access network capabilities and services.
[0055] User Plane Function (UPF) [128] is a network function responsible for handling user data traffic, including packet routing, forwarding, and QoS enforcement.
[0056] Data Network (DN) [130] refers to a network that provides data services to user equipment (UE) in a telecommunications system. The data services may include but are not limited to Internet services, private data network related services. [0057] Fig. 2 illustrates an exemplary block diagram of a computing device [1000] upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure. In an implementation, the computing device [1000] may also implement a method for managing network slice selection in a telecommunications network utilising the system. In another implementation, the computing device [1000] itself implements the method for managing network slice selection in the telecommunications network using one or more units configured within the computing device [1000], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
[0058] The computing device [1000] may include a bus [1002] or other communication mechanism for communicating information, and a hardware processor [1004] coupled with bus [1002] for processing information. The hardware processor [1004] may be, for example, a general purpose microprocessor. The computer system [1000] may also include a main memory [1006], such as a random access memory (RAM), or other dynamic storage device, coupled to the bus [1002] for storing information and instructions to be executed by the processor [1004], The main memory [1006] also may be used for storing temporary variables or other intermediate information during execution of the instructions to be executed by the processor [1004], Such instructions, when stored in non-transitory storage media accessible to the processor [1004], render the computer system [1000] into a special-purpose machine that is customized to perform the operations specified in the instructions. The computer system [1000] further includes a read only memory (ROM) [1008] or other static storage device coupled to the bus [1002] for storing static information and instructions for the processor [1004],
[0059] A storage device [1010], such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to the bus [1002] for storing information and instructions. The computer system [1000] may be coupled via the bus [1002] to a display [1012], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for displaying information to a computer user. An input device [1014], including alphanumeric and other keys, touch screen input means, etc. may be coupled to the bus [1002] for communicating information and command selections to the processor [1004], Another type of user input device may be a cursor control [1016], such as a mouse, a trackball, or cursor direction keys, for communicating direction information and command selections to the processor [1004], and for controlling cursor movement on the display [1012], This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane. [0060] The computer system [1000] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic which in combination with the computer system [1000] causes or programs the computer system [1000] to be a special-purpose machine. According to one implementation, the techniques herein are performed by the computer system [1000] in response to the processor [1004] executing one or more sequences of one or more instructions contained in the main memory [1006], Such instructions may be read into the main memory [1006] from another storage medium, such as the storage device [1010], Execution of the sequences of instructions contained in the main memory [1006] causes the processor [1004] to perform the process steps described herein. In alternative implementations of the present disclosure, hard-wired circuitry may be used in place of or in combination with software instructions.
[0061] The computer system [1000] also may include a communication interface [1018] coupled to the bus [1002], The communication interface [1018] provides a two-way data communication coupling to a network link [1020] that is connected to a local network [1022], For example, the communication interface [1018] may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, the communication interface [1018] may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, the communication interface [1018] sends and receives electrical, electromagnetic, or optical signals that carry digital data streams representing various types of information.
[0062] The computer system [1000] can send messages and receive data, including program code, through the network(s), the network link [1020] and the communication interface [1018], In the Internet example, a server [1030] might transmit a requested code for an application program through the Internet [1028], the ISP [1026], the local network [1022] and the communication interface [1018], The received code may be executed by the processor [1004] as it is received, and/or stored in the storage device [1010], or other non-volatile storage for later execution.
[0063] Referring to Figure 3, an exemplary block diagram of a system [300] for managing network slice selection in a telecommunications network is shown, in accordance with the exemplary implementations of the present disclosure. The system [300] comprises at least one transceiver unit [301], at least one verification unit [303], at least one storage unit [305], at least one searching unit [307] and at least one querying unit [309], Also, all of the components/ units of the system [300] are assumed to be connected to each other unless otherwise indicated below. As shown in the figures all units shown within the system should also be assumed to be connected to each other. Also, in Fig. 1 only a few units are shown, however, the system [300] may comprise multiple such units or the system [300] may comprise any such numbers of said units, as required to implement the features ofthe present disclosure. Further, in an implementation, the system [300] may reside in a server or a network entity. In yet another implementation, the system [300] may reside partly in the server/ network entity.
[0064] The system [300] is configured for managing network slice selection in the telecommunications network with the help of the interconnection between the components/units ofthe system [300],
[0065] The system comprising a transceiver unit [301] configured to receive a slice selection request from an Access and Mobility Management Function (AMF) [106], wherein the slice selection request comprises one or more network slices supported by the AMF [ 106] in a tracking area within a Public Land Mobile Network (PLMN). The present disclosure encompasses that the transceiver unit [301] is responsible for both transmitting and receiving signals within the telecommunications network wherein managing network slice selection is implemented at a Network Slice Selection Function (NSSF) [116], The "slice selection request" contains information about the one or more network slices supported by the AMF [106] within a particular tracking area. Further, the tracking area, represents a geographical region within the Public Land Mobile Network (PLMN). The AMF [106] is responsible for managing user mobility, manging network access, and communicates supported network slices within the tracking area to the NSSF [116] based on the slice selection request.
[0066] The verification unit [303] connected to at least the transceiver unit [301], wherein the verification unit [303] configured to verify the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area. Further, as disclosed by the present disclosure the verification unit [303] may check the suitability of one or more network slices based on a list of subscribed slices stored in a slice database. Further, according to the present disclosure, the verification unit [303] may checks if one or more network slices matches with the subscribed slices in the slice database to determine if the one or more network slices are permissible within the tracking area. It is to be noted that the term subscribed slices refer to customizable, virtualized network instances in accordance with user requirements within a network infrastructure.
[0067] Further, the subscribed slices are the network slices that may be allocated to subscribers based on their service needs and to enable diverse functionalities such as differentiated quality of service (QoS), security, and resource allocation. The subscribed slices are essentially isolated segments of the telecommunications network that are provisioned, managed, and optimized independently to meet the distinct demands of different users or applications. Further, it is to be noted that a network slice may determine as a permissible network slice in an event said network slice is a predefined segments of the telecommunications network that adhere to a specified criteria, a predefined policies governing creation of said network slice, a configuration, and a usage. The permissible network slice serves as predefined templates for deploying network services while ensuring adherence to predefined guidelines and regulations associated with the tracking area.
[0068] Further, upon receiving, from the AMF [106], a subsequent network slice selection request comprising a requested slice and a subscribed slice, the verification unit [303] is configured to verify the requested slice based on the list of subscribed slices using the slice database to filter a set of valid slices . Further, as disclosed by the present disclosure, the verification of the requested slice may be performed by comparing the requested slice with the list of subscribed slices stored in the slice database. In an event, if the requested slice matches with any of the subscribed slice from the list of subscribed slices, it is considered as a valid slice and included in the filtered set of valid slices. Thereupon, the querying unit [309] is configured to query the slice database for one or more AMF instances capable of serving the filtered set of valid slices. As disclosed herein, the querying unit [309] may query the slice database to identify the one or more AMF instances. These AMF instances are those that have necessary capabilities (such as user authentication, authorization) to handle the filtered set of valid slices. The transceiver unit [301] is configured to transmit a response to the AMF [106] with a list of AMF instances capable of serving the requested network slice. This response assists the AMF [106] in determining which AMF instances that may be considered suitable for handling the requested network slice i.e., the list of AMF instances capable of serving the requested network slice.
[0069] Further, the transceiver unit [301] is configured to transmit a response to the AMF [106] based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices. The present disclosure encompasses that the transceiver unit [301] within the Network Slice Selection Function (NSSF) [116] transmits the response to the Access and Mobility Management Function (AMF) [106] based on the preceding verification process. The response transmitted by the transceiver unit [301] to the AMF [106] serves communication between the NSSF [116] and the AMF [106], Further, within said response, the NSSF [116] communicates the list of authorized network slices that are deemed permissible for the specific tracking area in question. Additionally, the response includes the one or more Tracking Area Identifiers (TAIs), within the Public Land Mobile Network (PLMN). The TAIs are identifiers used within the telecommunications network to designate specific tracking areas. Further, the TAIs are associated with network slices and are included in the response transmitted by the NSSF [116] to the AMF [106],
[0070] Further, as disclosed by the present disclosure, the searching unit [307] may be configured to search a requested slice in the slice selection request in the slice database. Further, the searching unit [307] may locate the requested slice within the slice database to verify whether the “requested slice” that is part of the “network slice selection request” matches a slice that is already stored in the slice database. Further, upon searching the requested slice in the slice selection request in the slice database, the transceiver unit [301] may be configured to transmit one of an authorized response or an unauthorized response to the AMF [106], wherein the authorized response is transmitted upon a positive search and the unauthorized response is transmitted upon a negative search. The transceiver unit [301] transmit a response to the AMF [106] based on the outcome of the search performed by the searching unit [307], Further, in a scenario the searching unit [307] finds the requested slice in the slice database then it is referred as the positive search, the transceiver unit [301] sends the authorized response to the AMF [106] and if the searching unit [307] fails to find the requested slice in the slice database i.e., the negative search, the transceiver unit [301] sends the unauthorized response to the AMF [106],
[0071] The present disclosure encompasses that the storing unit [305] is configured to store a mapping of the list of authorized network slices and the one or more TAIs associated with the list of authorized network slices in the slice database. The storing unit [305] is configured to maintain the mapping between the authorized network slices and their associated Tracking Area Identifiers (TAIs) within the slice database.
[0072] Further, the transceiver unit [301] configured to receive an availability request from the AMF [106], wherein the availability request comprises a list of network slices supported by the AMF [106] for one or more tracking area identifiers in the PLMN. The availability request contains information about network slices i.e., the list of network slices supported by the AMF [106] for specific tracking area identifiers within the PLMN and the storing unit [305] configured to store the list of network slices supported by the AMF [106] for one or more tracking area identifiers in the PLMN in a slice database in run-time. Upon receiving the availability request from the AMF [106], the transceiver unit [301] forwards it to the storing unit [305], The storing unit [305] then updates the slice database with the list of network slices supported by the AMF [106] for the specified tracking area identifiers. This dynamic updating ensures that the slice database accurately reflects the available network slices for different tracking areas within the PLMN.
[0073] Referring to Figure 4, an exemplary method flow diagram [400] for managing network slice selection in a telecommunications network in accordance with exemplary implementations of the present disclosure is shown. In an implementation the method [400] is performed by the system [300], Further, in an implementation, the system [300] may be present in a server device to implement the features of the present disclosure. Also, as shown in Figure 4, the method [400] starts at step [402] .
[0074] At step 404, the method comprises receiving, by a transceiver unit [301], a slice selection request from an Access and Mobility Management Function (AMF) [106], wherein the slice selection request comprises one or more network slices supported by the AMF [106] in a tracking area within a Public Land Mobile Network (PLMN). The present disclosure encompasses that the transceiver unit [301] is responsible for both transmitting and receiving signals within the telecommunications network wherein managing network slice selection is implemented at a Network Slice Selection Function (NSSF) [116], The "slice selection request" contains information about the one or more network slices supported by the AMF [106] within a particular tracking area. Further, the tracking area, represents a geographical region within the Public Land Mobile Network (PLMN). The AMF [106] is responsible for managing user mobility, manging network access, and communicates supported network slices within the tracking area to the NSSF based on the slice selection request.
[0075] At step 406, the method comprises verifying, by a verification unit [303], the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area. Further, as disclosed by the present disclosure the verification unit [303] may check the suitability of one or more network slices based on a list of subscribed slices stored in a slice database. Further, according to the present disclosure, the verification unit [303] may checks if one or more network slices matches with the subscribed slices in the slice database to determine if the one or more network slices are permissible within the tracking area. It is to be noted that the term subscribed slices refer to customizable, virtualized network instances in accordance with user requirements within a network infrastructure.
[0076] Further, the subscribed slices are the network slices that may be allocated to subscribers based on their service needs and to enable diverse functionalities such as differentiated quality of service (QoS), security, and resource allocation. The subscribed slices are essentially isolated segments of the telecommunications network that are provisioned, managed, and optimized independently to meet the distinct demands of different users or applications. Further, it is to be noted that a network slice may determine as a permissible network slice in an event said network slice is a predefined segments of the telecommunications network that adhere to a specified criteria, a predefined policies governing creation of said network slice, a configuration, and a usage. The permissible network slice serve as predefined templates for deploying network services while ensuring adherence to predefined guidelines and regulations associated with the tracking area.
[0077] Further, upon receiving, from the AMF [106], a subsequent network slice selection request comprising a requested slice and a subscribed slice, the method comprises verifying, by the verification unit [303], the requested slice based on the list of subscribed slices using the slice database to filter a set of valid slices. Further, as disclosed by the present disclosure, the verification of the requested slice may be performed by comparing the requested slice with the list of subscribed slices stored in the slice database. In an event, if the requested slice matches with any of the subscribed slice from the list of subscribed slices, it is considered as a valid slice and included in the filtered set of valid slices. Thereupon, the querying, by a querying unit [309], the slice database for one or more AMF instances capable of serving the filtered set of valid slices. As disclosed herein, the querying unit [309] may query the slice database to identify the one or more AMF instances. These AMF instances are those that have necessary capabilities (such as user authentication, authorization) to handle the filtered set of valid slices. The transmitting, by the transceiver unit [301] , a response to the AMF [ 106] with a list of AMF instances capable of serving the requested network slice. This response assists the AMF [106] in determining which AMF instances are suitable for handling the requested network slice i.e., the list of AMF instances capable of serving the requested network slice. [0078] At step 408, the method comprises transmitting, by the transceiver unit [301], a response to the AMF [106] based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices. The present disclosure encompasses that the transceiver unit [301] within the Network Slice Selection Function (NSSF) [116] transmits the response to the Access and Mobility Management Function (AMF) [106] based on the preceding verification process. The response transmitted by the transceiver unit [301] to the AMF [106] serves communication between the NSSF [116] and the AMF [106], Further, within said response, the NSSF [116] communicates the list of authorized network slices that are deemed permissible for the specific tracking area in question. Additionally, the response includes the one or more Tracking Area Identifiers (TAIs), within the Public Land Mobile Network (PLMN). The TAIs are identifiers used within the telecommunications network to designate specific tracking areas. Further, the TAIs are associated with network slices and are included in the response transmitted by the NSSF [116] to the AMF [106],
[0079] The present disclosure encompasses that searching, by a searching unit [307], may be a requested slice of the slice selection request in the slice database. Further, the searching unit [307] may locate the requested slice within the slice database to verify whether the “requested slice” that is part of the “network slice selection request” matches a slice that is already stored in the slice database. Further, the transmitting, by the transceiver unit [301], may be one of an authorized response or an unauthorized response to the AMF [106], wherein the authorized response is transmitted upon a positive search and the unauthorized response is transmitted upon a negative search. The transceiver unit [301] transmit a response to the AMF [106] based on the outcome of the search performed by the searching unit [307], Further, in a scenario the searching unit [307] finds the requested slice in the slice database then it is referred as the positive search, the transceiver unit [301] sends the authorized response to the AMF [106] and if the searching unit [307] fails to find the requested slice in the slice database i.e., the negative search, the transceiver unit [301] sends the unauthorized response to the AMF [106],
[0080] The present disclosure encompasses that storing, by a storing unit [305], a mapping of a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices in the slice database. The storing unit [305] is configured to maintain the mapping between the authorized network slices and their associated Tracking Area Identifiers (TAIs) within the slice database. [0081] Further receiving, by the transceiver unit [301], an availability request from the AMF [106], wherein the availability request comprises a list of network slices supported by the AMF [106] for one or more tracking area identifiers in the PLMN. The availability request contains information about network slices i.e., the list of network slices supported by the AMF [106] for specific tracking area identifiers within the PLMN and storing, by the storing unit, the list of network slices supported by the AMF [106] for one or more tracking area identifiers in the PLMN in a slice database in run-time. Upon receiving the availability request from the AMF [106], the transceiver unit [301] forwards it to the storing unit [305], The storing unit [305] then updates the slice database with the list of network slices supported by the AMF [ 106] for the specified tracking area identifiers. This dynamic updating ensures that the slice database accurately reflects the available network slices for different tracking areas within the PLMN.
[0082] Thereafter, the method terminates at step 410.
[0083] Referring to Figure 5, an exemplary scenario signal flow [500] diagram for managing network slice selection in a telecommunications network is shown, in accordance with the exemplary implementations of the present disclosure.
[0084] At step SI: a Network function (NF) service consumer (e.g. an access and mobility management function (AMF)) may send a PUT request to a Network Slice Selection Function (NSSF). The PUT request may include Network Slice Selection Assistance Information (NSSAI) Availability information of the NF. As described previously, in a 5G service-based architecture, NF service consumer may be understood as a client, while the NSSF may be understood as the server.
[0085] The NF service consumer may send the PUT request to the NSSF. As would be understood, the PUT method is a HTTP method of requests that the enclosed entity be stored under the supplied URI (Uniform Resource Identifier). If the URI refers to an already existing resource, it is modified and if the URI does not point to an existing resource, then the server can create the resource with that URI. The PUT method is used by AMF while registering for first time in Network.
[0086] As described previously, the PUT method may include NSSAI availability information of the NF. “NSSAI” may refer to the set of parameters used to identify and describe a network slice. NSSAI may include two key elements: [0087] • Slice Differentiator (SD): It is a globally unique identifier that distinguishes between different network slices within a 5G network. The SD is used to ensure that the UE selects the correct slice during communication.
[0088] • Slice Service Type (SST): It indicates the specific service or application type associated with a network slice. The SST provides high-level information about the characteristics and requirements of a slice, such as low latency, high bandwidth, or ultra-reliable communication (URLLC).
[0089] At step S2: On success, "204 No content" shall be returned if Authorized NSSAI Availability is empty after the update; otherwise, "200 OK" shall be returned,
[0090] At step S3: The NF Service consumer (e.g. AMF) shall send a GET request to the NSSF. The request shall include query parameters.
[0091] At step S4: On success, "200 OK" shall be returned when the NSSF is able to find authorized network slice information for the requested network slice selection information, 2b If no slice instances can be found for the requested slice selection information, then the NSSF shall return a 403 Forbidden response with the "ProblemDetails”.
[0092] The present disclosure further discloses a non-transitory computer readable storage medium storing instructions for managing network slice selection in a telecommunications network the instructions include executable code which, when executed by a one or more units of a system, causes a transceiver unit [301] of the system to receive a slice selection request from an Access and Mobility Management Function (AMF) [106], wherein the slice selection request comprises one or more network slices supported by the AMF [106] in a tracking area within a Public Land Mobile Network (PLMN). The verification unit [303] of the system to verify the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area and transceiver unit [301] to transmit a response to the AMF [106] based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
[0093] As is evident from the above, the present disclosure provides a technically advanced solution for managing network slice selection in a telecommunications network. The present disclosure provides the solution to the challenge of selecting slices for User Equipment (UE) in 5G communication systems. The solution as disclosed in the present disclosure lies in an optimized solution that swiftly identifies the most suitable slice for each UE based on a range of parameters including network conditions, the UE requirements, and available resources. This solution significantly accelerates the slice selection process, ensuring rapid sendee provisioning.
[0094] While considerable emphasis has been placed herein on the disclosed implementations, it will be appreciated that many implementations can be made and that many changes can be made to the implementations without departing from the principles of the present disclosure. These and other changes in the implementations of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.
[0095] Further, in accordance with the present disclosure, it is to be acknowledged that the functionality described for the various the components/units can be implemented interchangeably. While specific embodiments may disclose a particular functionality of these units for clarity, it is recognized that various configurations and combinations thereof are within the scope of the disclosure. The functionality of specific units as disclosed in the disclosure should not be construed as limiting the scope of the present disclosure. Consequently, alternative arrangements and substitutions of units, provided they achieve the intended functionality described herein, are considered to be encompassed within the scope of the present disclosure.

Claims

We Claim:
1. A method for managing network slice selection in a telecommunications network, the method comprising: receiving, by a transceiver unit [301], a slice selection request from an Access and Mobility Management Function (AMF) [106], wherein the slice selection request comprises one or more network slices supported by the AMF [106] in a tracking area within a Public Land Mobile Network (PLMN); verifying, by a verification unit [303], the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area; and transmitting, by the transceiver unit [301], a response to the AMF [106] based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
2. The method as claimed in claim 1, wherein the method comprises storing, by a storing unit [305], a mapping of the list of authorized network slices and the one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices in the slice database.
3. The method as claimed in claim 2, the method further comprises: searching, by a searching unit [307], a requested slice of the slice selection request in the slice database; and transmitting, by the transceiver unit [301], one of an authorized response or an unauthorized response to the AMF [106], wherein the authorized response is transmitted upon a positive search and the unauthorized response is transmitted upon a negative search.
4. The method as claimed in claim 1, the method further comprises: receiving, by the transceiver unit [301], an availability request from the AMF [106], wherein the availability request comprises a list of network slices supported by the AMF [106] for one or more tracking area identifiers in the PLMN; and storing, by the storing unit, the list of network slices supported by the AMF [106] for one or more tracking area identifiers in the PLMN in a slice database in run-time.
5. The method as claimed in claim 1, wherein upon receiving, from the AMF [106], a subsequent network slice selection request comprising a requested slice and a subscribed slice, the method comprises: verifying, by the verification unit [303], the requested slice based on the list of subscribed slices using the slice database to filter a set of valid slices; querying, by a querying unit [309], the slice database for one or more AMF instances capable of serving the filtered set of valid slices; and transmitting, by the transceiver unit [301], a response to the AMF [106] with a list of AMF instances capable of serving the requested network slice.
6. The method as claimed in claim 1, wherein managing network slice selection is implemented at a Network Slice Selection Function (NSSF) [116],
7. A system for managing network slice selection in a telecommunications network, the system comprising: a transceiver unit [301] configured to receive a slice selection request from an Access and Mobility Management Function (AMF) [106], wherein the slice selection request comprises one or more network slices supported by the AMF [106] in a tracking area within a Public Land Mobile Network (PLMN); a verification unit [303] connected to at least the transceiver unit [301], wherein the verification unit [303] configured to verify the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area; and the transceiver unit [301] configured to transmit a response to the AMF [106] based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
8. The system as claimed in claim 7, wherein the system comprises a storing unit [305] configured to store a mapping of the list of authorized network slices and the one or more TAIs associated with the list of authorized network slices in the slice database.
9. The system as claimed in claim 8, comprises: a searching unit [307] configured to search a requested slice in the slice selection request in the slice database; and the transceiver unit [301] configured to transmit one of an authorized response or an unauthorized response to the AMF [106], wherein the authorized response is transmitted upon a positive search and the unauthorized response is transmitted upon a negative search.
10. The system as claimed in claim 7, comprises: the transceiver unit [301] configured to receive an availability request from the AMF [106], wherein the availability request comprises a list of network slices supported by the AMF [106] for one or more tracking area identifiers in the PLMN; and the storing unit [305] configured to store the list of network slices supported by the AMF [106] for one or more tracking area identifiers in the PLMN in a slice database in runtime.
11. The system as claimed in claim 7, wherein upon receiving, from the AMF [106], a subsequent network slice selection request comprising a requested slice and a subscribed slice: the verification unit [303] is configured to verify the requested slice based on the list of subscribed slices using the slice database to filter a set of valid slices; a querying unit [309] is configured to query the slice database for one or more AMF instances capable of serving the filtered set of valid slices; and the transceiver unit [301] is configured to transmit a response to the AMF [106] with a list of AMF instances capable of serving the requested network slice.
12. The system as claimed in claim 7, wherein managing network slice selection is implemented at a Network Slice Selection Function (NSSF) [116],
13. A non-transitory computer-readable storage medium storing instructions for managing network slice selection in a telecommunications network, the storage medium comprising executable code which, when executed by one or more units of a system, causes: a transceiver unit [301] to receive a slice selection request from an Access and Mobility Management Function (AMF) [106], wherein the slice selection request comprises one or more network slices supported by the AMF [106] in a tracking area within a Public Land Mobile Network (PLMN); a verification unit [303] to verify the one or more network slices based on a list of subscribed slices stored in a slice database to determine permissibility of each slice of the one or more slices within the tracking area; and the transceiver unit [301] to transmit a response to the AMF [106] based on the verification, the response comprising a list of authorized network slices and one or more Tracking Area Identifiers (TAIs) associated with the list of authorized network slices.
PCT/IN2024/050737 2023-07-03 2024-06-11 Method and system for managing network slice selection in a telecommunications network Pending WO2025008867A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202321044628 2023-07-03
IN202321044628 2023-07-03

Publications (1)

Publication Number Publication Date
WO2025008867A1 true WO2025008867A1 (en) 2025-01-09

Family

ID=94171302

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2024/050737 Pending WO2025008867A1 (en) 2023-07-03 2024-06-11 Method and system for managing network slice selection in a telecommunications network

Country Status (1)

Country Link
WO (1) WO2025008867A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190141606A1 (en) * 2017-11-08 2019-05-09 Weihua QIAO Location Based Coexistence Rules for Network Slices
WO2022214443A2 (en) * 2021-04-05 2022-10-13 Nokia Technologies Oy Methods, apparatuses, and computer program products for providing selection of cells serving network slices for an area
CN115314874A (en) * 2021-05-08 2022-11-08 华为技术有限公司 Slice selection method, device and related equipment
US20230180169A1 (en) * 2020-08-13 2023-06-08 Apple Inc. Network (nw) techniques for constraints on simultaneous use of network slices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190141606A1 (en) * 2017-11-08 2019-05-09 Weihua QIAO Location Based Coexistence Rules for Network Slices
US20230180169A1 (en) * 2020-08-13 2023-06-08 Apple Inc. Network (nw) techniques for constraints on simultaneous use of network slices
WO2022214443A2 (en) * 2021-04-05 2022-10-13 Nokia Technologies Oy Methods, apparatuses, and computer program products for providing selection of cells serving network slices for an area
CN115314874A (en) * 2021-05-08 2022-11-08 华为技术有限公司 Slice selection method, device and related equipment

Similar Documents

Publication Publication Date Title
WO2025008867A1 (en) Method and system for managing network slice selection in a telecommunications network
WO2025017686A1 (en) Method and system for provisioning slice information in a communication network
WO2025008915A1 (en) Method and system for providing a network slice instance information
WO2025012956A2 (en) Method and system for providing multimedia priority service in a communication network
WO2025052474A1 (en) Method and system for managing subscription of network functions
WO2025052421A1 (en) Method and system for handling location requests in a wireless communication network
WO2025012972A1 (en) Method and system for providing slice information in a communication network
WO2025017730A1 (en) Method and system for handling non-ip data delivery (nidd) configuration data
WO2025013048A1 (en) Method and system for updating parameters for one or more network nodes
WO2025008863A1 (en) Method and system for granting a data traffic access associated with a target network
WO2025008868A1 (en) METHOD AND SYSTEM FOR PROVISIONING SLICE INFORMATION TO NETWORK SLICE SELECTION FUNCTIONS (NSSFs)
WO2025052436A1 (en) Method and system for discovery of one or more peer network functions
WO2025069062A1 (en) Method and system for service continuity in a communication network
WO2025069063A1 (en) Method and system for integrating network repository function with a security edge protection proxy
WO2025052478A1 (en) Method and system for generating a pcf response in a telecommunications network
WO2025069097A1 (en) Method and system for managing one or more session policies in a network
WO2025062454A1 (en) Method and system for increasing throughput of data transactions by implementing a storage system
WO2025052399A1 (en) Method and system for registering a user equipment
WO2025008978A1 (en) Method and system for listing devices for optimizing allocation of ipv4 and ipv6 addresses
WO2025008881A1 (en) Method and system for assigning a slice to user equipment in a communication network
WO2025052460A1 (en) Method and system for managing access for a user equipment in a network
WO2025012980A1 (en) Method and system for performing a barring procedure in a pre-defined presence reporting area (pra)
WO2025012979A1 (en) Method and system for a configuration-based management of a procedure request
WO2025052439A1 (en) Method and system for registering a request at a gateway mobile location centre (gmlc)
WO2025012937A1 (en) Method and system for retrieving a target subscriber location

Legal Events

Date Code Title Description
DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 24834234

Country of ref document: EP

Kind code of ref document: A1