[go: up one dir, main page]

WO2025012943A1 - Method and system for creating a session management (sm) context in first and second network - Google Patents

Method and system for creating a session management (sm) context in first and second network Download PDF

Info

Publication number
WO2025012943A1
WO2025012943A1 PCT/IN2024/050827 IN2024050827W WO2025012943A1 WO 2025012943 A1 WO2025012943 A1 WO 2025012943A1 IN 2024050827 W IN2024050827 W IN 2024050827W WO 2025012943 A1 WO2025012943 A1 WO 2025012943A1
Authority
WO
WIPO (PCT)
Prior art keywords
network node
network
context
node
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/IN2024/050827
Other languages
French (fr)
Inventor
Sandeep Bisht
Aayush Bhatnagar
Nilesh Sanas
Mohd Rijvan Khan MOGIA
Nitesh GOUR
Kumar Gaurav SINGH
Amit Kumar Singh
Anurag Sinha
Hardik Navinbhai BAVISHI
Raghvendra Bhushan
Gaurav Jain
Mangesh Shantaram Kale
Supriya UPADHYE
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jio Platforms Ltd
Original Assignee
Jio Platforms Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jio Platforms Ltd filed Critical Jio Platforms Ltd
Publication of WO2025012943A1 publication Critical patent/WO2025012943A1/en
Pending legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/142Managing session states for stateless protocols; Signalling session states; State transitions; Keeping-state mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers

Definitions

  • Embodiments of the present disclosure generally relate to network performance management systems. More particularly, embodiments of the present disclosure relate to a session management (SM) context in a first and a second network.
  • SM session management
  • Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements.
  • the first generation of wireless communication technology was based on analog technology and offered only voice services.
  • 2G second-generation
  • 3G third-generation
  • 4G fourth-generation
  • the fourth-generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security.
  • 5G fifth-generation
  • wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
  • SM Session Management
  • UE User Equipment
  • AF Application Function
  • RAN Radio Access Network
  • An aspect of the present disclosure may relate to a method for creating a session management (SM) context in a first network.
  • a method for creating a session management (SM) context in a first network includes sending, by a first network node, a request to a second network node to obtain a first identifier. The method further encompasses receiving, at the first network node, a response to the request along with the obtained first identifier. Furthermore, the method includes sending, by the first network node, a request to a third network node for creation of the SM context. Further, the method includes receiving, at the first network node, a response from the third network node on the creation of the SM context, wherein the response comprises data associated with the SM context.
  • the method further comprises checking, by the third network node over Nesc interface, an existence of prestored SM context for the UE at a fourth network node.
  • the method further encompasses sending, by the third network node over the Nesc interface, a request to the fourth network node for deletion of the SM context based on a presence of the prestored SM context at the fourth network node, wherein the fourth network node is a Service Capability Exposure Function (SCEF).
  • SCEF Service Capability Exposure Function
  • the method includes receiving, at the third network node over the Nesc interface, a response to the request sent for the deletion of the prestored SM context.
  • the method further comprises the first network node is a Session Management Function (SMF) node, the second network node is a Unified Data Management (UDM) node, and the third network node is a Network Exposure Function (NEF) node, wherein the first network is a 5th Generation network.
  • SMF Session Management Function
  • UDM Unified Data Management
  • NEF Network Exposure Function
  • the first identifier is a Network Exposure Function ID (NEF-ID).
  • NEF-ID Network Exposure Function ID
  • the present disclosure may comprise a method for creating session management (SM) context in a second network.
  • the method includes sending, by a fifth network node, a request to a sixth network node to obtain a second identifier.
  • the method further encompasses receiving, at the fifth network node, a response to the request along with the obtained second identifier.
  • the method includes sending, by the fifth network node, a request to a fourth network node for creation of the SM context.
  • the method includes receiving, at the fifth network node, a response from the fourth network node on the creation of the SM context, wherein the response comprises data associated with the SM context.
  • the method further comprises sending, by the fourth network node over a Nesc interface, the SM context data to a third network node.
  • the method further includes receiving, at the fourth node over the Nesc interface, a response from the third network node of successful reception of the SM context data.
  • the third network node is a Network Exposure Function (NEF) node
  • the fifth network node is a Mobility Management Entity (MME) node
  • the sixth network node is a Home Subscriber Server (HSS) node
  • the second network is a 4th Generation network.
  • NEF Network Exposure Function
  • MME Mobility Management Entity
  • HSS Home Subscriber Server
  • sending, by the fourth network node over the Nesc interface, the SM context data to the third network node overwrites existing SM context data available at the third network node.
  • the second identifier is a Service Capabilities Exposure Function (SCEF-ID).
  • Another aspect of the present disclosure may relate to a system for creating a session management (SM) context in a first network.
  • the system comprising a first network node, configured to send a request to a second network node to obtain a first identifier.
  • the first network node is further configured to receive a response to the request along with the obtained first identifier.
  • the first network node is configured to send a request to a third network node for creation of the SM context and the first network node is further configured to receive a response from the third network node on the creation of the SM context, wherein the response comprises data associated with the SM context.
  • Another aspect of the present disclosure may relate to a system for creating a session management (SM) context in a second network.
  • the system comprising a fifth network node, configured to send a request to a sixth network node to obtain a second identifier.
  • the fifth network node is further configured to receive a response to the request along with the obtained second identifier.
  • the fifth network node is configured to send a request to a fourth network node for creation of the SM context.
  • the fifth network node is configured to receive a response from the fourth network node on the creation of the SM context, wherein the response comprises data associated with the SM context.
  • Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instruction for creating a session management (SM) context in a first network
  • the instructions include executable code which, when executed by a one or more units of a system, causes a first network node to send a request to a second network node to obtain a first identifier, receive a response to the request along with the obtained first identifier, sends a request to a third network node for creation of the SM context, and receives a response from the third network node on the creation of the SM context, wherein the response comprises data associated with the SM context.
  • SM session management
  • Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instruction for creating a session management (SM) context in a second network, when executed by one or more units of a system, causes a fifth network node to send a request to a sixth network node to obtain a second identifier, receive a response to the request along with the obtained second identifier, send a request to a fourth network node for creation of the SM context, and receive a response from the fourth network node on the creation of the SM context, wherein the response comprises data associated with the SM context.
  • SM session management
  • converged NEF common node or interface between 4G and 5G RAN
  • FIG. 1A illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture.
  • 5GC 5th generation core
  • FIG. IB illustrates an exemplary block diagram representation of 4th generation network architecture interworking with the 5th generation network.
  • FIG. 2 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
  • FIG. 3 illustrates a system diagram for creating a session management (SM) context in a first network and a second network, in accordance with exemplary implementations of the present disclosure.
  • SM session management
  • FIG. 4A illustrates an exemplary signal flow diagram for creating a session management (SM) context in a first network, in accordance with exemplary implementations of the present disclosure.
  • SM session management
  • FIG. 4B illustrates an exemplary signal flow diagram for creating session management (SM) context in a second network, in accordance with exemplary implementations of the present disclosure.
  • SM session management
  • FIG. 5A illustrates a method flow diagram for creating a session management (SM) context in a first network, in accordance with exemplary implementations of the present disclosure.
  • SM session management
  • FIG. 5B illustrates a method flow diagram for creating session management (SM) context in a second network, in accordance with exemplary implementations of the present disclosure.
  • SM session management
  • exemplary and/or “demonstrative” is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples.
  • any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art.
  • processor refers to any logic circuitry for processing instructions.
  • a processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a (Digital Signal Processing) DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc.
  • the processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
  • a user equipment may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure.
  • the user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable of implementing the features of the present disclosure.
  • the user device may contain at least one input means configured to receive an input from at least one of a transceiver unit, a processing unit, a storage unit, a detection unit and any other such unit(s) which are required to implement the features of the present disclosure.
  • storage unit or “memory unit” refers to a machine or computer-readable medium including any mechanism for storing information in a form readable by a computer or similar machine.
  • a computer-readable medium includes read-only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media.
  • the storage unit stores at least the data that may be required by one or more units of the system to perform their respective functions.
  • interface refers to a shared boundary across which two or more separate components of a system exchange information or data.
  • the interface may also be referred to a set of rules or protocols that define communication or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called.
  • All modules, units, components used herein, unless explicitly excluded herein, may be software modules or hardware processors, the processors being a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc.
  • DSP digital signal processor
  • ASIC Application Specific Integrated Circuits
  • FPGA Field Programmable Gate Array circuits
  • the transceiver unit include at least one receiver and at least one transmitter configured respectively for receiving and transmitting data, signals, information or a combination thereof between units/components within the system and/or connected with the system.
  • the present disclosure provides a solution for handling and tracking a session management context at network where a User equipment (UE) moves from one Radio Access Network (say 4G network) to another Radio Access Network (say 5G network) or vice-versa. Further, the present solution provides a solution for tracking of the SM context to avoid uncertainty at Application Function (AF) and also the present discloses that one or more operations such as “mobile terminated message”, “monitoring events”, “device triggering” etc. may be executed in a network where UE is not latched.
  • AF Application Function
  • the present disclosure aims to overcome the above-mentioned and other existing problems in this field of technology by providing a solution of creation and tracking of session management context considering the aspect related to switching of a fifth-generation (5G) to a fourth-generation (4G) network by the UE or vice versa, by a single proprietary interface, called as NeSc interface that is added to support SM Context operations in the network in case where UE gets attached to 4G.
  • the NeSc interface supports Hypertext Transfer Protocol 2 (HTTP 2) and Hypertext transfer Protocol 1.1 (HTTP 1.1).
  • FIG. 1A and FIG. IB illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture and 4th generation network architecture.
  • FIG. IB is an illustration of the interworking of the 4th and 5th generation network through a Nesc Interface. As shown in FIG.
  • the 5GC network architecture [100A] includes auser equipment (UE) [102], a radio access network (RAN) [104], an access and mobility management function (AMF) [106], a Session Management Function (SMF) [108], a Service Communication Proxy (SCP) [110], an Authentication Server Function (AUSF) [112], a Network Slice Specific Authentication and Authorization Function (NSSAAF) [114], a Network Slice Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122], a Unified Data Management (UDM) [124], an application function (AF) [126], a User Plane Function (UPF) [128], a data network (DN) [130], wherein all the components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present disclosure.
  • UE auser equipment
  • RAN radio access network
  • AMF
  • Radio Access Network (RAN) is the part of a mobile telecommunications system that connects user equipment (UE) [102] to the core network (CN) and provides access to different types of networks (e.g., 5G network). It consists of radio base stations and the radio access technologies that enable wireless communication.
  • Access and Mobility Management Function (AMF) is a 5G core network function responsible for managing access and mobility aspects, such as UE registration, connection, and reachability. It also handles mobility management procedures like handovers and paging.
  • Session Management Function (SMF) [108] is a 5G core network function responsible for managing session-related aspects, such as establishing, modifying, and releasing sessions. It coordinates with the User Plane Function (UPF) for data forwarding and handles IP address allocation and QoS enforcement.
  • UPF User Plane Function
  • Service Communication Proxy (SCP) [110] is a network function in the 5G core network that facilitates communication between other network functions by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces.
  • AUSF Authentication Server Function
  • 5G core responsible for authenticating UEs during registration and providing security services. It generates and verifies authentication vectors and tokens.
  • Network Slice Specific Authentication and Authorization Function [114] is a network function that provides authentication and authorization services specific to network slices. It ensures that UEs can access only the slices for which they are authorized.
  • Network Slice Selection Function (NSSF) [116] is a network function responsible for selecting the appropriate network slice for a UE based on factors such as subscription, requested services, and network policies.
  • Network Exposure Function [118] is a network function that exposes capabilities and services of the 5G network to external applications, enabling integration with third-party services and applications.
  • Network Repository Function (NRF) [120] is a network function that acts as a central repository for information about available network functions and services. It facilitates the discovery and dynamic registration of network functions.
  • PCF Policy Control Function
  • Unified Data Management [124] is a network function that centralizes the management of subscriber data, including authentication, authorization, and subscription information.
  • Application Function (AF) is a network function that represents external applications interfacing with the 5G core network to access network capabilities and services.
  • UPF User Plane Function
  • Data Network (DN) refers to a network that provides data services to user equipment (UE) in a telecommunications system.
  • the data services may include but are not limited to Internet services, private data network related services.
  • the 4G network architecture [100B] is in an interworking connection with the 5th Generation core network.
  • the system [100B] in addition to the above-mentioned components, further includes- [0064] A Binding Support Function (BSF) [132] enables binding an application function request to the PCF [122], The BSF [132] tracks sessions taking place in the network.
  • BSF Binding Support Function
  • SMS Short Message Service Function
  • SMSF Short Message Service Function
  • the SMSF checks the subscription and perform a relay function between the UE [102] and a Short Message Service Centre (SMSC).
  • SMSC Short Message Service Centre
  • a Security Edge Protection Proxy (SEPP) [136] is a network function that secures inter- PLMN (Public Land Mobile Network) traffic.
  • the SEPP [136] further ensures that signalling traffic between operators is encrypted and authenticated.
  • a Gateway Mobile Location Centre (GMLC) [138] is a network function to support the location services.
  • the GMLC [138] may be integrated with a location-based service to locate the UE [102] connected to the network at a specific time.
  • a Home Subscriber Service (HSS) [140] is a network function which provides details of the user to other network functions in the network.
  • the HSS [140] is an inclusive management database for user information.
  • a Mobile Management Entity (MME) [142] is a network function which handles the security, connectivity, mobility, inter-network communication, and the like in a network.
  • the MME [142] ensures the users have a consistent, secure, and efficient communication experience in the network.
  • a Policy and Charging Rules Function (PCRF) [144] is a network function which makes policy and charging rules based on factors like a user equipment’s usage, location, status roaming, and the like.
  • the PCRF [144] implements flexible policy control for mobile, fixed-line, and IMS (IP multimedia system).
  • a Short Message Service Centre (SMSC) [146] is a network function responsible for delivery of short messages.
  • the SMSC [146] stores the received short messages and sends back acknowledgement on receiving the short messages.
  • the SMSC [146] is responsible for finding the destination from the short messages and deliver it to the destination.
  • An Operations, Administration, and Maintenance (0AM) [150] is a network function which stores a set of functions and procedures which may be important for efficient management of a network architecture. The 0AM [150] ensures reliability, performance and overall health of the network.
  • a Supplementary DownLink (SDL) [152] is a network function to improve the utilization of network resources which may have been under-utilized in the communication network.
  • An Elastic Load Balancer (ELB) [154] is a network function responsible to distribute the requests received to a service across several backend servers.
  • the ELB ensures that the service maintains the same performance level at all times and prevents it from becoming overloaded or unavailable.
  • a Common API Framework [156] is a framework comprising common API aspects that are required to support service APIs.
  • the CAPIF [156] is places within PLMN operator network.
  • a Network Exposure Function Manager (NEF Manager) [158] is a network function which manages the exposure of network capabilities to external applications and services.
  • the NEF Manager [158] may act as intermediary between the network and the applications.
  • a Network Exposure Function Application (NEF Application) [160] refers to any external application or service that interacts with the network through the NEF.
  • the NEF application [160] are developed to enhance the user equipment’s capabilities by leveraging the communication network.
  • An Element Management System (EMS) [168] is a network function responsible to manage one or more network elements in a communication system.
  • Fig. 2 illustrates an exemplary block diagram of a computing device [1000] upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
  • the computing device [1000] may be implemented by a system [300] as shown in FIG. 3 further mentioned.
  • the computing device [1000] may also implement a method for creating a session management (SM) context in a first network utilising the system.
  • the computing device [1000] itself implements the method for creating the session management (SM) context in the first network using one or more units configured within the computing device [1000], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
  • SM session management
  • the computing device [1000] may include a bus [1002] or other communication mechanism for communicating information, and a hardware processor [1004] coupled with bus [ 1002] for processing information.
  • the hardware processor [ 1004] may be, for example, a general- purpose microprocessor.
  • the computing device [1000] may also include a main memory [1006], such as a random-access memory (RAM), or other dynamic storage device, coupled to the bus [1002] for storing information and instructions to be executed by the processor [1004],
  • the main memory [1006] also may be used for storing temporary variables or other intermediate information during execution of the instructions to be executed by the processor [1004], Such instructions, when stored in non-transitory storage media accessible to the processor [1004], render the computing device [1000] into a special-purpose machine that is customized to perform the operations specified in the instructions.
  • the computing device [1000] further includes a read only memory (ROM) [1008] or other static storage device coupled to the bus [1002] for storing static information and instructions for the processor [1004],
  • ROM read only memory
  • a storage device [1010], such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to the bus [1002] for storing information and instructions.
  • the computing device [1000] may be coupled via the bus [1002] to a display [1012], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for displaying information to a computer user.
  • a cursor controller [1016] such as a mouse, a trackball, or cursor direction keys, for communicating direction information and command selections to the processor [1004], and for controlling cursor movement on the display [1012].
  • This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
  • the computing device [1000] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic which in combination with the computing device [ 1000] causes or programs the computing device [ 1000] to be a special -purpose machine.
  • the techniques herein are performed by the computing device [1000] in response to the processor [1004] executing one or more sequences of one or more instructions contained in the main memory [1006], Such instructions may be read into the main memory [1006] from another storage medium, such as the storage device [1010], Execution of the sequences of instructions contained in the main memory [1006] causes the processor [1004] to perform the process steps described herein.
  • hard-wired circuitry may be used in place of or in combination with software instructions.
  • the computing device [1000] also may include a communication interface [1018] coupled to the bus [1002],
  • the communication interface [1018] provides a two-way data communication coupling to a network link [1020] that is connected to a local network [1022].
  • the communication interface [1018] may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line.
  • the communication interface [1018] may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
  • LAN local area network
  • Wireless links may also be implemented.
  • the communication interface [1018] sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • the computing device [1000] can send messages and receive data, including program code, through the network(s), the network link [1020] and the communication interface [1018],
  • a server [1030] might transmit a requested code for an application program through the Internet [1028], the ISP [1026], host [1024], the local network [1022] and the communication interface [1018],
  • the received code may be executed by the processor [1004] as it is received, and/or stored in the storage device [1010], or other non-volatile storage for later execution.
  • FIG. 3 illustrates an exemplary block diagram of a system for creating a session management (SM) context in a first network, in accordance with exemplary implementations of the present disclosure.
  • the system [300] comprises at least one first network node [302], at least one second network node [304], at least one third network node [306], at least fourth network node [308], at least one fifth network node [310], and at least one sixth network node [312], Also, all of the components/ units of the system [300] are assumed to be connected to each other unless otherwise indicated below. As shown in the figures all units shown within the system should also be assumed to be connected to each other. Also, in Fig.
  • system [300] may comprise multiple such units or the system [300] may comprise any such numbers of said units, as required to implement the features of the present disclosure.
  • the system [300] may reside in a server or a network entity.
  • the system [300] may reside partly in the server/ network entity and partly in the user device.
  • the first network node [302] of the system [300] is configured to send a request to the second network node [304] to obtain a first identifier.
  • the first identifier is a Network Exposure Function ID (NEF-ID).
  • the Network Exposure Function (NEF) provides interfaces that make it possible for a Network Application to interact with a network.
  • the NEF-ID is the identifier related to a specific network configuration which makes it possible for the Network Application to interact with the network.
  • the first network node [302] is further configured to receive a response to the request along with the obtained first identifier. Further the first network node [302] is configured to send a request to the third network node [306] for creation of the Session Management (SM) context.
  • the SMF sends the SM-context request to the SCEF.
  • the SM-context allows the NEF and the SCEF to interact with each other and keep a track of the UE’s serving network.
  • the Service Capability Exposure Function (SCEF) is the key entity to securely expose the services and capabilities provided by the 3GPP network interfaces.
  • the NEF Network Exposure Function
  • APIs Application Programming Interfaces
  • the NEF may provide interfaces for monitoring, provisioning and policy/charging functionalities in the 5G network.
  • the first network node [302] receive a response from the third network node [306] on the creation of the SM context, wherein the response comprises data associated with the SM context.
  • the first network node [302] is a Session Management Function (SMF) node
  • the second network node [304] is a Unified Data Management (UDM) node
  • the third network node [306] is a Network Exposure Function (NEF) node, wherein the first network is a 5th Generation network.
  • the third network node [306] is configured to check, over a Nesc interface, an existence of prestored SM context for the UE at the fourth network node [308]
  • the Nesc interface is a proprietary interface which is added to support SM Context operations in the network in cases where the UE attached in the 4G network.
  • the Nesc interface facilitates NEF to manage the SM-context related operations on both networks.
  • the third network node [306] is further configured to send, over the Nesc interface, a request to the fourth network node [308] for deletion of the SM context based on a presence of the prestored SM context at the fourth network node [308], wherein the fourth network node [308] is a Service Capability Exposure Function (SCEF).
  • SCEF Service Capability Exposure Function
  • the SCEF is used for the delivery ofnon-IP data over the control plane and provides an interface for network services (authentication and authorization, discovery and access network capabilities).
  • the SCEF is the key entity within the 3GPP architecture for service capability exposure that provides a means to expose the services and capabilities provided by 3GPP network interfaces securely to external entities to support loT applications.
  • the third network node [306] is further configured to receive, over the Nesc interface, a response to the request sent for the deletion of the prestored SM context.
  • system [300] is further configured for creating a session management (SM) context in a second network, in accordance with exemplary implementations of the present disclosure.
  • SM session management
  • system [300] is configured for creating the session management (SM) context in the second network, with the help of the interconnection between the components/units of the system [300],
  • the fifth network node [310] of the system [300] is configured to send a request to the sixth network node [312] to obtain a second identifier.
  • the second identifier is a Service Capabilities Exposure Function (SCEF-ID).
  • SCEF Service Capabilities Exposure Function
  • the SCEF is used for the delivery of non-IP data over the control plane and provides an interface for network services (authentication and authorization, discovery and access network capabilities).
  • the SCEF is the key entity within the 3GPP architecture for service capability exposure that provides a means to expose the services and capabilities provided by the 3GPP network interfaces securely to external entities to support Internet of Things (loT) applications.
  • the fifth network node [310] is further configured to receive a response to the request along with the obtained second identifier.
  • the fifth network node [310] is configured to send a request to the fourth network node [308] for creation of the SM context, where the request includes a User Identity, a Packet data Unit (PDU) session ID, a Non Ip data Delivery (NIDD) information, a Single Network Slice Selection Assistance Information (S-NSSAI) and a data Network Name (DNN). Further, the fifth network node [310] receives a response from the fourth network node [308] on the creation of the SM context, wherein the response comprises data associated with the SM context.
  • PDU Packet data Unit
  • NIDD Non Ip data Delivery
  • S-NSSAI Single Network Slice Selection Assistance Information
  • DNN data Network Name
  • the response includes comprises the data associated with the SM context such as a User Identity, a Packet data Unit (PDU) session ID, a Non Ip data Delivery (NIDD) information, a Single Network Slice Selection Assistance Information (S-NSSAI) and a data Network Name (DNN).
  • the SM-context is created to allow the NEF and the SCEF to interact with each other and keep a track of the UE’s serving network.
  • the fourth network node [308] sends the SM context data to the third network node [306] to overwrite existing SM context data available at the third network node [306] .
  • the third network node [306] may perform the process to overwrite the existing SM context data based on the user identity, the PDU session ID, the NIDD information, the S-NSSAI and the DNN. The process to overwrite may assist in sending the SM context data to the SCEF accurately.
  • the third network node [306] is a Network Exposure Function (NEF) node
  • the fifth network node [310] is a Mobility Management Entity (MME) node
  • the sixth network node [312] is a Home Subscriber Server (HSS) node
  • the second network is a 4th Generation network.
  • NEF Network Exposure Function
  • MME Mobility Management Entity
  • HSS Home Subscriber Server
  • Mobility Management Entity MME exists in the core network. MME is responsible for core network control functionality. The control plane protocols terminate at the MME and MME manages the mobility contexts of the UEs.
  • HSS Home Subscriber Server
  • IMS IP Multimedia Subsystem
  • the fourth network node [308] is further configured to send, over a Nesc interface, the SM context data to the third network node [306] and receive, over the Nesc interface, a response from the third network node [306] of successful reception of the SM context data.
  • FIG. 4A illustrates an exemplary signal flow diagram for creating a session management (SM) context in a first network, in accordance with exemplary implementations of the present disclosure.
  • SM session management
  • FIG. 4B illustrates an exemplary signal flow diagram for creating session management (SM) context in a second network, in accordance with exemplary implementations of the present disclosure.
  • SM session management
  • one or more units configured to implement the solution of the present disclosure comprises is at least one User Equipment (UE) [402], at least one Session Management Function (SMF) [404], at least one Mobile Management Entity (MME) [406], at least one Unified Data Management (UDM) [408], at least one Home Subscriber Server (HSS) [410], at least one Network Exposure Function (NEF/ converged NEF) [412] and at least one Service Capability Exposure Function (SCEF) [414],
  • UE User Equipment
  • SMF Session Management Function
  • MME Mobile Management Entity
  • UDM Unified Data Management
  • HSS Home Subscriber Server
  • NEF Network Exposure Function
  • SCEF Service Capability Exposure Function
  • Mobility Management Entity MME is responsible for core network control functionality.
  • the control plane protocols terminate at the MME and the MME manages the mobility contexts of the UEs.
  • HSS Home Subscriber Server
  • IMS IP Multimedia Subsystem
  • the UE [402] attaches in a 5G Core Network with PDU (Packet Data Unit) session type as “UNSTRUCTURED” and NEF ID in subscription information of PDN request, with the SMF [404],
  • PDU Packet Data Unit
  • the SMF [404] send a NEF-ID Request to the UDM [408].
  • the NEF-ID request may be ‘Nudm_UECM_Get service operation’.
  • the NEF-ID request may include an NF ID and a UE ID.
  • NEF-ID is the identifier related to a specific network configuration which makes it possible for the Network exposure function to interact with the network.
  • the NEF-ID is the identifier for the 5G network exposure function.
  • a converged NEF instance may be used.
  • the converged NEF instance includes but may not be limited to the NEF and the SCEF.
  • the NEF (third network node) and SCEF (fourth network node) may be used in combination.
  • the SMF Session Management Function
  • the SMF [404] sends an “SM-Context create request” towards the Converged NEF [412],
  • the request includes a User Identity, a Packet data Unit (PDU) session ID, a Non Ip data Delivery (NIDD) information, a Single Network Slice Selection Assistance Information (S- NSSAI) and a data Network Name (DNN).
  • PDU Packet data Unit
  • NIDD Non Ip data Delivery
  • S- NSSAI Single Network Slice Selection Assistance Information
  • DNN data Network Name
  • the NEF [412] may optionally also share an “SM-Context Delete Request” to the SCEF [414] and the SCEF [414] may at S6, share a response for the same to the NEF [412],
  • the SCEF is the key entity within the 3GPP architecture for service capability exposure that provides a means to expose the services and capabilities provided by 3GPP network interfaces securely to external entities to support loT applications.
  • the NEF [412] sends a “SM-Context Create Response”, where the where the response includes a User Identity, a Packet data Unit (PDU) session ID, a Non Ip data Delivery (NIDD) information, a Single Network Slice Selection Assistance Information (S-NSSAI) and a data Network Name (DNN), and further creates a SM Context and associates it with User Identity and a PDU session ID and shares the information to the SMF [404] .
  • the SM-context allows the NEF [412] and the SCEF to interact with each other and keep a track of the UE’s [402] serving network.
  • the NEF [412] checks if any previous SM context exists for the UE created by the SCEF.
  • NeSc interface is the medium between NEF and SCEF to communicate messages related to SM-Context. If it exists, then NEF [412] initiates a delete SM-Context to SCEF over the NeSc interface.
  • the Nesc interface is an interface which is added to support SM Context operations in the network in cases where UE attached in 4G. The Nesc interface facilitates NEF to manage SM- context related operations on both networks.
  • FIG. 4B illustrates-
  • NEF-ID is the identifier related to a specific network configuration which makes it possible for the Network Application to interact with the network.
  • the NEF-ID is the identifier related to the network configuration between the UE [402] and the 4G network.
  • the HSS [410] sends back the NEF-ID response to the MME [406],
  • the MME [406] send a SM- context create Request to the SCEF [414], wherein at step 12, the SCEF [414] sends back the SM-context create response to the MME [406],
  • the response includes a User Identity, a Packet data Unit (PDU) session ID, a Non Ip data Delivery (NIDD) information, a Single Network Slice Selection Assistance Information (S-NSSAI) and a data Network Name (DNN).
  • PDU Packet data Unit
  • NIDD Non Ip data Delivery
  • S-NSSAI Single Network Slice Selection Assistance Information
  • DNN data Network Name
  • the NEF [412] will overwrite the new SM-context in its database, then he SM- context will help the NEF [412] to forward Mobile Terminated (MT) messages to correct the SCEF [414],
  • MT Mobile Terminated
  • FIG. 5A an exemplary method flow diagram [500a] for creating a session management (SM) context in a first network, in accordance with exemplary implementations of the present disclosure is shown.
  • the method [500a] is performed by the system [300], Further, in an implementation, the system [300] may be present in a server device to implement the features ofthe present disclosure.
  • the method [500a] starts at step [502a].
  • the method includes sending, by a first network node [302], a request to a second network node [304] to obtain a first identifier.
  • the first identifier is a Network Exposure Function ID (NEF -ID).
  • NEF -ID Network Exposure Function ID
  • the method encompasses receiving, at the first network node [302], a response to the request along with the obtained first identifier.
  • step [506a] sending, by the first network node [302], a request to a third network node [306] for creation of the SM context.
  • the first network node [302] is a Session Management Function (SMF) node
  • the second network node [304] is a Unified Data Management (UDM) node
  • the third network node [306] is a Network Exposure Function (NEF) node, wherein the first network is a 5th Generation network.
  • SMF Session Management Function
  • UDM Unified Data Management
  • NEF Network Exposure Function
  • the method at step [508a] further encompasses receiving, at the first network node [302], a response from the third network node [306] on the creation of the SM context, wherein the response comprises data associated with the SM context.
  • the SM-context allows the NEF and the SCEF to interact with each other and keep a track of the UE’s serving network.
  • the method further includes checking, by the third network node [306] overNesc interface, an existence of prestored SM context for the UE at a fourth network node [308], Nesc interface is a proprietary interface which is added to support SM Context operations in the network in cases where UE attached in 4G. The Nesc interface facilitates NEF to manage SM-context related operations on both networks.
  • the method further comprises sending, by the third network node [306] over the Nesc interface, a request to the fourth network node [308] for deletion of the SM context based on a presence of the prestored SM context at the fourth network node [308], wherein the fourth network node [308] is a Service Capability Exposure Function (SCEF).
  • SCEF Service Capability Exposure Function
  • FIG. 5B an exemplary method flow diagram [500b] for creating a session management (SM) context in a second network, in accordance with exemplary implementations of the present disclosure is shown.
  • the method [500b] is performed by the system [300], Further, in an implementation, the system [300] may be present in a server device to implementthe features ofthe present disclosure. Also, as shown in Figure 5B, the method [500b] starts at step [502b].
  • the method includes sending, by a fifth network node [310], a request to a sixth network [312] node to obtain a second identifier.
  • the second identifier is a Service Capabilities Exposure Function (SCEF-ID).
  • SCEF is used for the delivery of non-IP data over the control plane and provides an interface for network services (authentication and authorization, discovery and access network capabilities).
  • the SCEF is the key entity within the 3GPP architecture for service capability exposure that provides a means to expose the services and capabilities provided by 3GPP network interfaces securely to external entities to support loT applications.
  • the method includes receiving, at the fifth network node [310], a response to the request along with the obtained second identifier.
  • the method encompasses sending, by the fifth network node [310], a request to a fourth network node [308] for creation of the SM context.
  • the request includes a User Identity, a Packet data Unit (PDU) session ID, a Non Ip data Delivery (NIDD) information, a Single Network Slice Selection Assistance Information (S-NSSAI) and a data Network Name (DNN).
  • the third network node [306] is a Network Exposure Function (NEF) node
  • the fifth network node [310] is a Mobility Management Entity (MME) node
  • the sixth network node [312] is a Home Subscriber Server (HSS) node
  • the second network is a 4th Generation network.
  • Mobility Management Entity MME is responsible for core network control functionality.
  • the control plane protocols terminate at the MME and MME manages the mobility contexts of the UEs.
  • HSS Home Subscriber Server
  • IMS IP Multimedia Subsystem
  • the method includes receiving, at the fifth network node [310], a response from the fourth network node [308] on the creation of the SM context, wherein the response comprises data associated with the SM context.
  • the method further encompasses sending, by the fourth network node [308] over a Nesc interface, the SM context data to a third network node [306], Further, the method may comprises receiving, at the fourth network node [308] over the Nesc interface, a response from the third network node [306] of successful reception of the SM context data.
  • the method further includes sending, by the fourth network node [308] over the Nesc interface, the SM context data to the third network node [306], overwrites existing SM context data available at the third network node [306],
  • step [0138] At step [512b], the method comes to an end.
  • the present disclosure further discloses a non-transitory computer readable storage medium storing instructions for creating a session management (SM) context in a first and second network, the instructions include executable code which, when executed by a one or more units of a system, causes: a first network node [302] of the system to send a request to a second network node [304] to obtain a first identifier, receive a response to the request along with the obtained first identifier, send a request to a third network node [306] for creation of the SM context and receive a response from the third network node [306] on the creation of the SM context, wherein the response comprises data associated with the SM context.
  • SM session management
  • Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instruction for creating a session management (SM) context in a second network, when executed by one or more units of a system causes a fifth network node [310] of the system to send a request to a sixth network node [312] to obtain a second identifier, receive a response to the request along with the obtained second identifier, send a request to a fourth network node [308] for creation of the SM context and receive a response from the fourth network node [308] on the creation of the SM context, wherein the response comprises data associated with the SM context.
  • SM session management
  • the present disclosure provides a technically advanced solution for methods and systems for creating a session management (SM) context in a first and second network.
  • the present solution provides methods and systems for creation of session management context in a first and second network.
  • the present disclosure provides a technically advanced solution by disclosing a single interface or common interface to serve SM (Session Management) context operations which increases the reliability.
  • the solution further handles SM- Context on a single node or interface for both Radio Access Network i.e., 4G and 5G network.
  • the solution also provides a solution to track UE’s current network with only one node i.e., converged NEF (common node or interface between 4G and 5G RAN) and the operations like sending “mobile terminated” messages can be executed by Converged NEF after validating SM- Context source network.
  • converged NEF common node or interface between 4G and 5G RAN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present disclosure relates to methods and systems for creating session management (SM) context in first and second network. The method in a first network includes sending request to a second network node [304] to obtain a first identifier; receiving response to request along with the obtained first identifier; sending a request to a third network node [306] for creation of SM context and receiving response from third network node [306] on creation of SM context, wherein the response comprises data associated with SM context. The method in a second network includes sending a request to a sixth network [312] node to obtain second identifier; receiving response to the request along with the obtained second identifier; sending a request to a fourth network node [308] for creation of the SM context and receiving a response from the fourth network node [308] on the creation of the SM context.

Description

METHOD AND SYSTEM FOR CREATING A SESSION MANAGEMENT (SM) CONTEXT IN FIRST AND SECOND NETWORK
TECHNICAL FIELD
[0001] Embodiments of the present disclosure generally relate to network performance management systems. More particularly, embodiments of the present disclosure relate to a session management (SM) context in a first and a second network.
BACKGROUND
[0002] The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art.
[0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second-generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third- generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth-generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth-generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
[0004] Nowadays, telecom operators are working hard to enhance network capabilities and to efficiently handle a handover scenario or switching conditions from a low generation network (say 4G) to a high generation network (say 5G) or vice versa. [0005] In particular, a Session Management (SM)-context is created in 4G and 5G network during interworking scenarios and the SM-context is tracked to fetch a User Equipment’s (UE) current network and perform operations on the UE. However, non-tracking of the SM context leads to uncertainty at an Application Function (AF) and may also lead to uncertainty of one or more operations such as “mobile terminated message”, “monitoring events”, “device triggering” etc. may be executed in a network where UE is not latched. Thus, overall performance of a Radio Access Network (RAN) gets affected due to non-tracking or inefficient tracking of the Session Management (SM) context at the first network and the second network.
[0006] Hence, in view of these and other existing limitations, there arises an imperative need to provide an efficient solution to overcome the above-mentioned limitations and to provide a method and system to allow efficient creation, tracking and management of session management context in the Radio Access Network such as the 4G network and the 5G network.
SUMMARY
[0007] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0008] An aspect of the present disclosure may relate to a method for creating a session management (SM) context in a first network. A method for creating a session management (SM) context in a first network includes sending, by a first network node, a request to a second network node to obtain a first identifier. The method further encompasses receiving, at the first network node, a response to the request along with the obtained first identifier. Furthermore, the method includes sending, by the first network node, a request to a third network node for creation of the SM context. Further, the method includes receiving, at the first network node, a response from the third network node on the creation of the SM context, wherein the response comprises data associated with the SM context.
[0009] In an exemplary aspect of the present disclosure, the method further comprises checking, by the third network node over Nesc interface, an existence of prestored SM context for the UE at a fourth network node. The method further encompasses sending, by the third network node over the Nesc interface, a request to the fourth network node for deletion of the SM context based on a presence of the prestored SM context at the fourth network node, wherein the fourth network node is a Service Capability Exposure Function (SCEF). Further, the method includes receiving, at the third network node over the Nesc interface, a response to the request sent for the deletion of the prestored SM context.
[0010] In an exemplary aspect of the present disclosure, the method further comprises the first network node is a Session Management Function (SMF) node, the second network node is a Unified Data Management (UDM) node, and the third network node is a Network Exposure Function (NEF) node, wherein the first network is a 5th Generation network.
[0011] In an exemplary aspect of the present disclosure, the first identifier is a Network Exposure Function ID (NEF-ID).
[0012] In another aspect of the present disclosure, the present disclosure may comprise a method for creating session management (SM) context in a second network. The method includes sending, by a fifth network node, a request to a sixth network node to obtain a second identifier. The method further encompasses receiving, at the fifth network node, a response to the request along with the obtained second identifier. Furthermore, the method includes sending, by the fifth network node, a request to a fourth network node for creation of the SM context. Further, the method includes receiving, at the fifth network node, a response from the fourth network node on the creation of the SM context, wherein the response comprises data associated with the SM context.
[0013] In an aspect of the present disclosure, the method further comprises sending, by the fourth network node over a Nesc interface, the SM context data to a third network node. The method further includes receiving, at the fourth node over the Nesc interface, a response from the third network node of successful reception of the SM context data.
[0014] In an aspect of the present disclosure, the third network node is a Network Exposure Function (NEF) node, the fifth network node is a Mobility Management Entity (MME) node, the sixth network node is a Home Subscriber Server (HSS) node, wherein the second network is a 4th Generation network.
[0015] In an aspect of the present disclosure, sending, by the fourth network node over the Nesc interface, the SM context data to the third network node, overwrites existing SM context data available at the third network node. [0016] In an aspect of the present disclosure, the second identifier is a Service Capabilities Exposure Function (SCEF-ID).
[0017] Another aspect of the present disclosure may relate to a system for creating a session management (SM) context in a first network. The system comprising a first network node, configured to send a request to a second network node to obtain a first identifier. The first network node is further configured to receive a response to the request along with the obtained first identifier. Further the first network node is configured to send a request to a third network node for creation of the SM context and the first network node is further configured to receive a response from the third network node on the creation of the SM context, wherein the response comprises data associated with the SM context.
[0018] Another aspect of the present disclosure may relate to a system for creating a session management (SM) context in a second network. The system comprising a fifth network node, configured to send a request to a sixth network node to obtain a second identifier. The fifth network node is further configured to receive a response to the request along with the obtained second identifier. Furthermore, the fifth network node is configured to send a request to a fourth network node for creation of the SM context. Further, the fifth network node is configured to receive a response from the fourth network node on the creation of the SM context, wherein the response comprises data associated with the SM context.
[0019] Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instruction for creating a session management (SM) context in a first network, the instructions include executable code which, when executed by a one or more units of a system, causes a first network node to send a request to a second network node to obtain a first identifier, receive a response to the request along with the obtained first identifier, sends a request to a third network node for creation of the SM context, and receives a response from the third network node on the creation of the SM context, wherein the response comprises data associated with the SM context.
[0020] Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instruction for creating a session management (SM) context in a second network, when executed by one or more units of a system, causes a fifth network node to send a request to a sixth network node to obtain a second identifier, receive a response to the request along with the obtained second identifier, send a request to a fourth network node for creation of the SM context, and receive a response from the fourth network node on the creation of the SM context, wherein the response comprises data associated with the SM context.
OBJECTS OF THE INVENTION
[0021] Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below.
[0022] It is an object of the present disclosure to provide a methods and systems for creation of session management context.
[0023] It is another objection of the present disclosure to provide a single interface or common interface to serve SM (Session Management) context operations which increases the reliability.
[0024] It is yet another object of the present disclosure to handle SM-Context on a single node or interface for both Radio Access Network i.e., 4G and 5G network.
[0025] It is yet another object of the present disclosure to provide a solution to track UE’s current network with only one node i.e., converged NEF (common node or interface between 4G and 5G RAN) and the operations like sending “mobile terminated” messages can be executed by Converged NEF after validating SM-Context source network.
DESCRIPTION OF THE DRAWINGS
[0026] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Also, the embodiments shown in the figures are not to be construed as limiting the disclosure, but the possible variants of the method and system according to the disclosure are illustrated herein to highlight the advantages of the disclosure. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components or circuitry commonly used to implement such components. [0027] FIG. 1A illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture.
[0028] FIG. IB illustrates an exemplary block diagram representation of 4th generation network architecture interworking with the 5th generation network.
[0029] FIG. 2 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
[0030] FIG. 3 illustrates a system diagram for creating a session management (SM) context in a first network and a second network, in accordance with exemplary implementations of the present disclosure.
[0031] FIG. 4A illustrates an exemplary signal flow diagram for creating a session management (SM) context in a first network, in accordance with exemplary implementations of the present disclosure.
[0032] FIG. 4B illustrates an exemplary signal flow diagram for creating session management (SM) context in a second network, in accordance with exemplary implementations of the present disclosure.
[0033] FIG. 5A illustrates a method flow diagram for creating a session management (SM) context in a first network, in accordance with exemplary implementations of the present disclosure.
[0034] FIG. 5B illustrates a method flow diagram for creating session management (SM) context in a second network, in accordance with exemplary implementations of the present disclosure.
[0035] The foregoing shall be more apparent from the following more detailed description of the disclosure.
DETAILED DESCRIPTION
[0036] In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter may each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above.
[0037] The ensuing description provides exemplary embodiments only, and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
[0038] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail.
[0039] Also, it is noted that individual embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations may be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure.
[0040] The word “exemplary” and/or “demonstrative” is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive — in a manner similar to the term “comprising” as an open transition word — without precluding any additional or other elements. [0041] As used herein, a “processing unit” or “processor” or “operating processor” includes one or more processors, wherein processor refers to any logic circuitry for processing instructions. A processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a (Digital Signal Processing) DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
[0042] As used herein, “a user equipment”, “a user device”, “a smart-user-device”, “a smartdevice”, “an electronic device”, “a mobile device”, “a handheld device”, “a wireless communication device”, “a mobile communication device”, “a communication device” may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure. The user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable of implementing the features of the present disclosure. Also, the user device may contain at least one input means configured to receive an input from at least one of a transceiver unit, a processing unit, a storage unit, a detection unit and any other such unit(s) which are required to implement the features of the present disclosure.
[0043] As used herein, “storage unit” or “memory unit” refers to a machine or computer-readable medium including any mechanism for storing information in a form readable by a computer or similar machine. For example, a computer-readable medium includes read-only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media. The storage unit stores at least the data that may be required by one or more units of the system to perform their respective functions.
[0044] As used herein “interface” or “user interface refers to a shared boundary across which two or more separate components of a system exchange information or data. The interface may also be referred to a set of rules or protocols that define communication or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called. [0045] All modules, units, components used herein, unless explicitly excluded herein, may be software modules or hardware processors, the processors being a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc.
[0046] As used herein the transceiver unit include at least one receiver and at least one transmitter configured respectively for receiving and transmitting data, signals, information or a combination thereof between units/components within the system and/or connected with the system.
[0047] As discussed in the background section, the current known solutions have several shortcomings. The present disclosure provides a solution for handling and tracking a session management context at network where a User equipment (UE) moves from one Radio Access Network (say 4G network) to another Radio Access Network (say 5G network) or vice-versa. Further, the present solution provides a solution for tracking of the SM context to avoid uncertainty at Application Function (AF) and also the present discloses that one or more operations such as “mobile terminated message”, “monitoring events”, “device triggering” etc. may be executed in a network where UE is not latched. Thus, overall performance of the Radio Access Network does not get affected due to non-tracking or inefficient tracking of the SM context at the network, Therefore, the present disclosure aims to overcome the above-mentioned and other existing problems in this field of technology by providing a solution of creation and tracking of session management context considering the aspect related to switching of a fifth-generation (5G) to a fourth-generation (4G) network by the UE or vice versa, by a single proprietary interface, called as NeSc interface that is added to support SM Context operations in the network in case where UE gets attached to 4G. The NeSc interface supports Hypertext Transfer Protocol 2 (HTTP 2) and Hypertext transfer Protocol 1.1 (HTTP 1.1).
[0048] FIG. 1A and FIG. IB illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture and 4th generation network architecture. FIG. IB is an illustration of the interworking of the 4th and 5th generation network through a Nesc Interface. As shown in FIG. 1A, the 5GC network architecture [100A] includes auser equipment (UE) [102], a radio access network (RAN) [104], an access and mobility management function (AMF) [106], a Session Management Function (SMF) [108], a Service Communication Proxy (SCP) [110], an Authentication Server Function (AUSF) [112], a Network Slice Specific Authentication and Authorization Function (NSSAAF) [114], a Network Slice Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122], a Unified Data Management (UDM) [124], an application function (AF) [126], a User Plane Function (UPF) [128], a data network (DN) [130], wherein all the components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present disclosure.
[0049] Radio Access Network (RAN) [104] is the part of a mobile telecommunications system that connects user equipment (UE) [102] to the core network (CN) and provides access to different types of networks (e.g., 5G network). It consists of radio base stations and the radio access technologies that enable wireless communication.
[0050] Access and Mobility Management Function (AMF) [106] is a 5G core network function responsible for managing access and mobility aspects, such as UE registration, connection, and reachability. It also handles mobility management procedures like handovers and paging.
[0051] Session Management Function (SMF) [108] is a 5G core network function responsible for managing session-related aspects, such as establishing, modifying, and releasing sessions. It coordinates with the User Plane Function (UPF) for data forwarding and handles IP address allocation and QoS enforcement.
[0052] Service Communication Proxy (SCP) [110] is a network function in the 5G core network that facilitates communication between other network functions by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces.
[0053] Authentication Server Function (AUSF) [112] is a network function in the 5G core responsible for authenticating UEs during registration and providing security services. It generates and verifies authentication vectors and tokens.
[0054] Network Slice Specific Authentication and Authorization Function (NSSAAF) [114] is a network function that provides authentication and authorization services specific to network slices. It ensures that UEs can access only the slices for which they are authorized. [0055] Network Slice Selection Function (NSSF) [116] is a network function responsible for selecting the appropriate network slice for a UE based on factors such as subscription, requested services, and network policies.
[0056] Network Exposure Function (NEF) [118] is a network function that exposes capabilities and services of the 5G network to external applications, enabling integration with third-party services and applications.
[0057] Network Repository Function (NRF) [120] is a network function that acts as a central repository for information about available network functions and services. It facilitates the discovery and dynamic registration of network functions.
[0058] Policy Control Function (PCF) [122] is a network function responsible for policy control decisions, such as QoS, charging, and access control, based on subscriber information and network policies.
[0059] Unified Data Management (UDM) [124] is a network function that centralizes the management of subscriber data, including authentication, authorization, and subscription information.
[0060] Application Function (AF) [126] is a network function that represents external applications interfacing with the 5G core network to access network capabilities and services.
[0061] User Plane Function (UPF) [128] is a network function responsible for handling user data traffic, including packet routing, forwarding, and QoS enforcement.
[0062] Data Network (DN) [130] refers to a network that provides data services to user equipment (UE) in a telecommunications system. The data services may include but are not limited to Internet services, private data network related services.
[0063] As shown in FIG. IB, the 4G network architecture [100B] is in an interworking connection with the 5th Generation core network. The system [100B], in addition to the above-mentioned components, further includes- [0064] A Binding Support Function (BSF) [132] enables binding an application function request to the PCF [122], The BSF [132] tracks sessions taking place in the network.
[0065] A Short Message Service Function (SMSF) [134] supports transfer of Short Message Service (SMS). The SMSF [134] checks the subscription and perform a relay function between the UE [102] and a Short Message Service Centre (SMSC).
[0066] A Security Edge Protection Proxy (SEPP) [136] is a network function that secures inter- PLMN (Public Land Mobile Network) traffic. The SEPP [136] further ensures that signalling traffic between operators is encrypted and authenticated.
[0067] A Gateway Mobile Location Centre (GMLC) [138] is a network function to support the location services. The GMLC [138] may be integrated with a location-based service to locate the UE [102] connected to the network at a specific time.
[0068] A Home Subscriber Service (HSS) [140] is a network function which provides details of the user to other network functions in the network. The HSS [140] is an inclusive management database for user information.
[0069] A Mobile Management Entity (MME) [142] is a network function which handles the security, connectivity, mobility, inter-network communication, and the like in a network. The MME [142] ensures the users have a consistent, secure, and efficient communication experience in the network.
[0070] A Policy and Charging Rules Function (PCRF) [144] is a network function which makes policy and charging rules based on factors like a user equipment’s usage, location, status roaming, and the like. The PCRF [144] implements flexible policy control for mobile, fixed-line, and IMS (IP multimedia system).
[0071] A Short Message Service Centre (SMSC) [146] is a network function responsible for delivery of short messages. The SMSC [146] stores the received short messages and sends back acknowledgement on receiving the short messages. The SMSC [146] is responsible for finding the destination from the short messages and deliver it to the destination. [0072] An Operations, Administration, and Maintenance (0AM) [150] is a network function which stores a set of functions and procedures which may be important for efficient management of a network architecture. The 0AM [150] ensures reliability, performance and overall health of the network.
[0073] A Supplementary DownLink (SDL) [152] is a network function to improve the utilization of network resources which may have been under-utilized in the communication network.
[0074] An Elastic Load Balancer (ELB) [154] is a network function responsible to distribute the requests received to a service across several backend servers. The ELB [154] ensures that the service maintains the same performance level at all times and prevents it from becoming overloaded or unavailable.
[0075] A Common API Framework (CAPIF) [156] is a framework comprising common API aspects that are required to support service APIs. The CAPIF [156] is places within PLMN operator network.
[0076] A Network Exposure Function Manager (NEF Manager) [158] is a network function which manages the exposure of network capabilities to external applications and services. The NEF Manager [158] may act as intermediary between the network and the applications.
[0077] A Network Exposure Function Application (NEF Application) [160] refers to any external application or service that interacts with the network through the NEF. The NEF application [160] are developed to enhance the user equipment’s capabilities by leveraging the communication network.
[0078] An Element Management System (EMS) [168] is a network function responsible to manage one or more network elements in a communication system.
[0079] The 4th and the 5th Generation networks are working together through the Nesc interface.
[0080] Fig. 2 illustrates an exemplary block diagram of a computing device [1000] upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure. The computing device [1000] may be implemented by a system [300] as shown in FIG. 3 further mentioned. In an implementation, the computing device [1000] may also implement a method for creating a session management (SM) context in a first network utilising the system. In another implementation, the computing device [1000] itself implements the method for creating the session management (SM) context in the first network using one or more units configured within the computing device [1000], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
[0081] The computing device [1000] may include a bus [1002] or other communication mechanism for communicating information, and a hardware processor [1004] coupled with bus [ 1002] for processing information. The hardware processor [ 1004] may be, for example, a general- purpose microprocessor. The computing device [1000] may also include a main memory [1006], such as a random-access memory (RAM), or other dynamic storage device, coupled to the bus [1002] for storing information and instructions to be executed by the processor [1004], The main memory [1006] also may be used for storing temporary variables or other intermediate information during execution of the instructions to be executed by the processor [1004], Such instructions, when stored in non-transitory storage media accessible to the processor [1004], render the computing device [1000] into a special-purpose machine that is customized to perform the operations specified in the instructions. The computing device [1000] further includes a read only memory (ROM) [1008] or other static storage device coupled to the bus [1002] for storing static information and instructions for the processor [1004],
[0082] A storage device [1010], such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to the bus [1002] for storing information and instructions. The computing device [1000] may be coupled via the bus [1002] to a display [1012], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for displaying information to a computer user. An input device [1014], including alphanumeric and other keys, touch screen input means, etc. may be coupled to the bus [1002] for communicating information and command selections to the processor [1004], Another type of user input device may be a cursor controller [1016], such as a mouse, a trackball, or cursor direction keys, for communicating direction information and command selections to the processor [1004], and for controlling cursor movement on the display [1012], This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
[0083] The computing device [1000] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic which in combination with the computing device [ 1000] causes or programs the computing device [ 1000] to be a special -purpose machine. According to one implementation, the techniques herein are performed by the computing device [1000] in response to the processor [1004] executing one or more sequences of one or more instructions contained in the main memory [1006], Such instructions may be read into the main memory [1006] from another storage medium, such as the storage device [1010], Execution of the sequences of instructions contained in the main memory [1006] causes the processor [1004] to perform the process steps described herein. In alternative implementations of the present disclosure, hard-wired circuitry may be used in place of or in combination with software instructions.
[0084] The computing device [1000] also may include a communication interface [1018] coupled to the bus [1002], The communication interface [1018] provides a two-way data communication coupling to a network link [1020] that is connected to a local network [1022], For example, the communication interface [1018] may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, the communication interface [1018] may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, the communication interface [1018] sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
[0085] The computing device [1000] can send messages and receive data, including program code, through the network(s), the network link [1020] and the communication interface [1018], In the Internet example, a server [1030] might transmit a requested code for an application program through the Internet [1028], the ISP [1026], host [1024], the local network [1022] and the communication interface [1018], The received code may be executed by the processor [1004] as it is received, and/or stored in the storage device [1010], or other non-volatile storage for later execution.
[0086] FIG. 3 illustrates an exemplary block diagram of a system for creating a session management (SM) context in a first network, in accordance with exemplary implementations of the present disclosure. The system [300] comprises at least one first network node [302], at least one second network node [304], at least one third network node [306], at least fourth network node [308], at least one fifth network node [310], and at least one sixth network node [312], Also, all of the components/ units of the system [300] are assumed to be connected to each other unless otherwise indicated below. As shown in the figures all units shown within the system should also be assumed to be connected to each other. Also, in Fig. 3 only a few units are shown, however, the system [300] may comprise multiple such units or the system [300] may comprise any such numbers of said units, as required to implement the features of the present disclosure. In another implementation, the system [300] may reside in a server or a network entity. In yet another implementation, the system [300] may reside partly in the server/ network entity and partly in the user device.
[0087] The first network node [302] of the system [300] is configured to send a request to the second network node [304] to obtain a first identifier. The first identifier is a Network Exposure Function ID (NEF-ID). The Network Exposure Function (NEF) provides interfaces that make it possible for a Network Application to interact with a network. Further, the NEF-ID is the identifier related to a specific network configuration which makes it possible for the Network Application to interact with the network.
[0088] The first network node [302] is further configured to receive a response to the request along with the obtained first identifier. Further the first network node [302] is configured to send a request to the third network node [306] for creation of the Session Management (SM) context. The SMF sends the SM-context request to the SCEF. The SM-context allows the NEF and the SCEF to interact with each other and keep a track of the UE’s serving network. The Service Capability Exposure Function (SCEF) is the key entity to securely expose the services and capabilities provided by the 3GPP network interfaces. The NEF (Network Exposure Function) may expose unified Application Programming Interfaces (APIs) to other external applications for interaction with the 5th Generation core network functions. The NEF may provide interfaces for monitoring, provisioning and policy/charging functionalities in the 5G network.
[0089] Thereafter, the first network node [302] receive a response from the third network node [306] on the creation of the SM context, wherein the response comprises data associated with the SM context.
[0090] The first network node [302] is a Session Management Function (SMF) node, the second network node [304] is a Unified Data Management (UDM) node, and the third network node [306] is a Network Exposure Function (NEF) node, wherein the first network is a 5th Generation network. [0091] In the system [300], the third network node [306] is configured to check, over a Nesc interface, an existence of prestored SM context for the UE at the fourth network node [308], The Nesc interface is a proprietary interface which is added to support SM Context operations in the network in cases where the UE attached in the 4G network. The Nesc interface facilitates NEF to manage the SM-context related operations on both networks.
[0092] The third network node [306] is further configured to send, over the Nesc interface, a request to the fourth network node [308] for deletion of the SM context based on a presence of the prestored SM context at the fourth network node [308], wherein the fourth network node [308] is a Service Capability Exposure Function (SCEF). The SCEF is used for the delivery ofnon-IP data over the control plane and provides an interface for network services (authentication and authorization, discovery and access network capabilities). The SCEF is the key entity within the 3GPP architecture for service capability exposure that provides a means to expose the services and capabilities provided by 3GPP network interfaces securely to external entities to support loT applications.
[0093] The third network node [306] is further configured to receive, over the Nesc interface, a response to the request sent for the deletion of the prestored SM context.
[0094] Further, as disclosed by the present disclosure the system [300] is further configured for creating a session management (SM) context in a second network, in accordance with exemplary implementations of the present disclosure.
[0095] Further, the system [300] is configured for creating the session management (SM) context in the second network, with the help of the interconnection between the components/units of the system [300],
[0096] The fifth network node [310] of the system [300] is configured to send a request to the sixth network node [312] to obtain a second identifier. The second identifier is a Service Capabilities Exposure Function (SCEF-ID). The SCEF is used for the delivery of non-IP data over the control plane and provides an interface for network services (authentication and authorization, discovery and access network capabilities). The SCEF is the key entity within the 3GPP architecture for service capability exposure that provides a means to expose the services and capabilities provided by the 3GPP network interfaces securely to external entities to support Internet of Things (loT) applications. [0097] The fifth network node [310] is further configured to receive a response to the request along with the obtained second identifier. Further, the fifth network node [310] is configured to send a request to the fourth network node [308] for creation of the SM context, where the request includes a User Identity, a Packet data Unit (PDU) session ID, a Non Ip data Delivery (NIDD) information, a Single Network Slice Selection Assistance Information (S-NSSAI) and a data Network Name (DNN). Further, the fifth network node [310] receives a response from the fourth network node [308] on the creation of the SM context, wherein the response comprises data associated with the SM context. The response includes comprises the data associated with the SM context such as a User Identity, a Packet data Unit (PDU) session ID, a Non Ip data Delivery (NIDD) information, a Single Network Slice Selection Assistance Information (S-NSSAI) and a data Network Name (DNN). The SM-context is created to allow the NEF and the SCEF to interact with each other and keep a track of the UE’s serving network.
[0098] The fourth network node [308] sends the SM context data to the third network node [306] to overwrite existing SM context data available at the third network node [306] . The third network node [306] may perform the process to overwrite the existing SM context data based on the user identity, the PDU session ID, the NIDD information, the S-NSSAI and the DNN. The process to overwrite may assist in sending the SM context data to the SCEF accurately.
[0099] The third network node [306] is a Network Exposure Function (NEF) node, the fifth network node [310] is a Mobility Management Entity (MME) node, the sixth network node [312] is a Home Subscriber Server (HSS) node, wherein the second network is a 4th Generation network.
[0100] Mobility Management Entity (MME): MME exists in the core network. MME is responsible for core network control functionality. The control plane protocols terminate at the MME and MME manages the mobility contexts of the UEs.
[0101] Home Subscriber Server (HSS): It is the main subscriber database used in the IP Multimedia Subsystem (IMS) which is responsible to provide details of the subscribers to other entities within the network.
[0102] In the system [300], the fourth network node [308] is further configured to send, over a Nesc interface, the SM context data to the third network node [306] and receive, over the Nesc interface, a response from the third network node [306] of successful reception of the SM context data.
[0103] FIG. 4A illustrates an exemplary signal flow diagram for creating a session management (SM) context in a first network, in accordance with exemplary implementations of the present disclosure.
[0104] FIG. 4B illustrates an exemplary signal flow diagram for creating session management (SM) context in a second network, in accordance with exemplary implementations of the present disclosure.
[0105] As depicted in FIG. 4A and FIG. 4B one or more units configured to implement the solution of the present disclosure comprises is at least one User Equipment (UE) [402], at least one Session Management Function (SMF) [404], at least one Mobile Management Entity (MME) [406], at least one Unified Data Management (UDM) [408], at least one Home Subscriber Server (HSS) [410], at least one Network Exposure Function (NEF/ converged NEF) [412] and at least one Service Capability Exposure Function (SCEF) [414],
[0106] Mobility Management Entity (MME): MME is responsible for core network control functionality. The control plane protocols terminate at the MME and the MME manages the mobility contexts of the UEs.
[0107] Home Subscriber Server (HSS): It is the main subscriber database used in the IP Multimedia Subsystem (IMS) which is responsible to provide details of the user to other entities within the network.
[0108] At SI, the UE [402] attaches in a 5G Core Network with PDU (Packet Data Unit) session type as “UNSTRUCTURED” and NEF ID in subscription information of PDN request, with the SMF [404],
[0109] At S2, the SMF [404] send a NEF-ID Request to the UDM [408], The NEF-ID request may be ‘Nudm_UECM_Get service operation’. The NEF-ID request may include an NF ID and a UE ID. NEF-ID is the identifier related to a specific network configuration which makes it possible for the Network exposure function to interact with the network. Here, the NEF-ID is the identifier for the 5G network exposure function. In an implementation of the present disclosure, a converged NEF instance may be used. The converged NEF instance includes but may not be limited to the NEF and the SCEF. In an embodiment, the NEF (third network node) and SCEF (fourth network node) may be used in combination.
[0110] At S3, if the UE [402] request contains the NEF-ID, the SMF (Session Management Function) [404] initiates SMF [404] -NEF [412] connection establishment procedure to corresponding the converged NEF [412] instance or else the SMF [404] fetches the NEF-ID response from the UDM [408] .
[0111] At S4, the SMF [404] sends an “SM-Context create request” towards the Converged NEF [412], The request includes a User Identity, a Packet data Unit (PDU) session ID, a Non Ip data Delivery (NIDD) information, a Single Network Slice Selection Assistance Information (S- NSSAI) and a data Network Name (DNN).
[0112] Next, at S5, the NEF [412] may optionally also share an “SM-Context Delete Request” to the SCEF [414] and the SCEF [414] may at S6, share a response for the same to the NEF [412], The SCEF is the key entity within the 3GPP architecture for service capability exposure that provides a means to expose the services and capabilities provided by 3GPP network interfaces securely to external entities to support loT applications.
[0113] Next at S7, the NEF [412] sends a “SM-Context Create Response”, where the where the response includes a User Identity, a Packet data Unit (PDU) session ID, a Non Ip data Delivery (NIDD) information, a Single Network Slice Selection Assistance Information (S-NSSAI) and a data Network Name (DNN), and further creates a SM Context and associates it with User Identity and a PDU session ID and shares the information to the SMF [404] . The SM-context allows the NEF [412] and the SCEF to interact with each other and keep a track of the UE’s [402] serving network.
[0114] Further, in order to handle a 4G to a 5G handover scenario, the NEF [412] checks if any previous SM context exists for the UE created by the SCEF.
[0115] NeSc interface is the medium between NEF and SCEF to communicate messages related to SM-Context. If it exists, then NEF [412] initiates a delete SM-Context to SCEF over the NeSc interface. The Nesc interface is an interface which is added to support SM Context operations in the network in cases where UE attached in 4G. The Nesc interface facilitates NEF to manage SM- context related operations on both networks.
[0116] Now, referring to FIG. 4B illustrates-
[0117] At S8, in case the UE [402] attaches in a 4G EPC, the UE [402] gets connected to the MME [406],
[0118] At S9, the MME [406] sends the NEF-ID request to the HSS [410], NEF-ID is the identifier related to a specific network configuration which makes it possible for the Network Application to interact with the network. Here, the NEF-ID is the identifier related to the network configuration between the UE [402] and the 4G network.
[0119] Further at SI 0, the HSS [410] sends back the NEF-ID response to the MME [406],
[0120] Further at Si l, the MME [406] send a SM- context create Request to the SCEF [414], wherein at step 12, the SCEF [414] sends back the SM-context create response to the MME [406], The response includes a User Identity, a Packet data Unit (PDU) session ID, a Non Ip data Delivery (NIDD) information, a Single Network Slice Selection Assistance Information (S-NSSAI) and a data Network Name (DNN).
[0121] Next at S 13, the SCEF [414] will forward the SM-context create response to the NEF [412] internally over the NeSc interface.
[0122] At S14, the NEF [412] will overwrite the new SM-context in its database, then he SM- context will help the NEF [412] to forward Mobile Terminated (MT) messages to correct the SCEF [414],
[0123] Referring to Figure 5A, an exemplary method flow diagram [500a] for creating a session management (SM) context in a first network, in accordance with exemplary implementations of the present disclosure is shown. In an implementation the method [500a] is performed by the system [300], Further, in an implementation, the system [300] may be present in a server device to implement the features ofthe present disclosure. Also, as shown in Figure 5A, the method [500a] starts at step [502a]. [0124] At [502a], the method includes sending, by a first network node [302], a request to a second network node [304] to obtain a first identifier. The first identifier is a Network Exposure Function ID (NEF -ID).
[0125] Further, at step [504a], the method encompasses receiving, at the first network node [302], a response to the request along with the obtained first identifier.
[0126] Further at step [506a], sending, by the first network node [302], a request to a third network node [306] for creation of the SM context. The first network node [302] is a Session Management Function (SMF) node, the second network node [304] is a Unified Data Management (UDM) node, and the third network node [306] is a Network Exposure Function (NEF) node, wherein the first network is a 5th Generation network.
[0127] The method at step [508a] further encompasses receiving, at the first network node [302], a response from the third network node [306] on the creation of the SM context, wherein the response comprises data associated with the SM context. The SM-context allows the NEF and the SCEF to interact with each other and keep a track of the UE’s serving network.
[0128] The method further includes checking, by the third network node [306] overNesc interface, an existence of prestored SM context for the UE at a fourth network node [308], Nesc interface is a proprietary interface which is added to support SM Context operations in the network in cases where UE attached in 4G. The Nesc interface facilitates NEF to manage SM-context related operations on both networks.
[0129] The method further comprises sending, by the third network node [306] over the Nesc interface, a request to the fourth network node [308] for deletion of the SM context based on a presence of the prestored SM context at the fourth network node [308], wherein the fourth network node [308] is a Service Capability Exposure Function (SCEF). Thereafter, the method comprises receiving, at the third network node [306] over the Nesc interface, a response to the request sent for the deletion of the prestored SM context.
[0130] The method comes to an end at step [510a].
[0131] Referring to Figure 5B, an exemplary method flow diagram [500b] for creating a session management (SM) context in a second network, in accordance with exemplary implementations of the present disclosure is shown. In an implementation the method [500b] is performed by the system [300], Further, in an implementation, the system [300] may be present in a server device to implementthe features ofthe present disclosure. Also, as shown in Figure 5B, the method [500b] starts at step [502b].
[0132] At step [502b], the method includes sending, by a fifth network node [310], a request to a sixth network [312] node to obtain a second identifier. The second identifier is a Service Capabilities Exposure Function (SCEF-ID). The SCEF is used for the delivery of non-IP data over the control plane and provides an interface for network services (authentication and authorization, discovery and access network capabilities). The SCEF is the key entity within the 3GPP architecture for service capability exposure that provides a means to expose the services and capabilities provided by 3GPP network interfaces securely to external entities to support loT applications.
[0133] Next, at step [506b], the method includes receiving, at the fifth network node [310], a response to the request along with the obtained second identifier.
[0134] At step [508b], the method encompasses sending, by the fifth network node [310], a request to a fourth network node [308] for creation of the SM context. The request includes a User Identity, a Packet data Unit (PDU) session ID, a Non Ip data Delivery (NIDD) information, a Single Network Slice Selection Assistance Information (S-NSSAI) and a data Network Name (DNN). The third network node [306] is a Network Exposure Function (NEF) node, the fifth network node [310] is a Mobility Management Entity (MME) node, the sixth network node [312] is a Home Subscriber Server (HSS) node, wherein the second network is a 4th Generation network.
[0135] Mobility Management Entity (MME): MME is responsible for core network control functionality. The control plane protocols terminate at the MME and MME manages the mobility contexts of the UEs.
[0136] Home Subscriber Server (HSS): It is the main subscriber database used in the IP Multimedia Subsystem (IMS) which is responsible to provide details of the subscribers to other entities within the network.
[0137] Further at step [510b], the method includes receiving, at the fifth network node [310], a response from the fourth network node [308] on the creation of the SM context, wherein the response comprises data associated with the SM context. The method further encompasses sending, by the fourth network node [308] over a Nesc interface, the SM context data to a third network node [306], Further, the method may comprises receiving, at the fourth network node [308] over the Nesc interface, a response from the third network node [306] of successful reception of the SM context data. The method further includes sending, by the fourth network node [308] over the Nesc interface, the SM context data to the third network node [306], overwrites existing SM context data available at the third network node [306],
[0138] At step [512b], the method comes to an end.
[0139] The present disclosure further discloses a non-transitory computer readable storage medium storing instructions for creating a session management (SM) context in a first and second network, the instructions include executable code which, when executed by a one or more units of a system, causes: a first network node [302] of the system to send a request to a second network node [304] to obtain a first identifier, receive a response to the request along with the obtained first identifier, send a request to a third network node [306] for creation of the SM context and receive a response from the third network node [306] on the creation of the SM context, wherein the response comprises data associated with the SM context.
[0140] Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instruction for creating a session management (SM) context in a second network, when executed by one or more units of a system causes a fifth network node [310] of the system to send a request to a sixth network node [312] to obtain a second identifier, receive a response to the request along with the obtained second identifier, send a request to a fourth network node [308] for creation of the SM context and receive a response from the fourth network node [308] on the creation of the SM context, wherein the response comprises data associated with the SM context.
[0141] As is evident from the above, the present disclosure provides a technically advanced solution for methods and systems for creating a session management (SM) context in a first and second network. The present solution provides methods and systems for creation of session management context in a first and second network. The present disclosure provides a technically advanced solution by disclosing a single interface or common interface to serve SM (Session Management) context operations which increases the reliability. The solution further handles SM- Context on a single node or interface for both Radio Access Network i.e., 4G and 5G network. The solution also provides a solution to track UE’s current network with only one node i.e., converged NEF (common node or interface between 4G and 5G RAN) and the operations like sending “mobile terminated” messages can be executed by Converged NEF after validating SM- Context source network.
[0142] While considerable emphasis has been placed herein on the disclosed implementations, it will be appreciated that many implementations can be made and that many changes can be made to the implementations without departing from the principles of the present disclosure. These and other changes in the implementations of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.
[0143] Further, in accordance with the present disclosure, it is to be acknowledged that the functionality described for the various the components/units can be implemented interchangeably. While specific embodiments may disclose a particular functionality of these units for clarity, it is recognized that various configurations and combinations thereof are within the scope of the disclosure. The functionality of specific units as disclosed in the disclosure should not be construed as limiting the scope of the present disclosure. Consequently, alternative arrangements and substitutions of units, provided they achieve the intended functionality described herein, are considered to be encompassed within the scope of the present disclosure.

Claims

We Claim:
1. A method for creating a session management (SM) context in a first network, the method comprising: sending, by a first network node [302], a request to a second network node [304] to obtain a first identifier; receiving, at the first network node [302], a response to the request along with the obtained first identifier; sending, by the first network node [302], a request to a third network node [306] for creation of the SM context; and receiving, at the first network node [302], a response from the third network node [306] on the creation of the SM context, wherein the response comprises data associated with the SM context.
2. The method as claimed in claim 1, further comprises: checking, by the third network node [306] over Nesc interface, an existence of prestored SM context for a User Equipment (UE) at a fourth network node [308]; sending, by the third network node [306] over the Nesc interface, a request to the fourth network node [308] for deletion of the SM context based on a presence of the prestored SM context at the fourth network node [308], wherein the fourth network node [308] is a Service Capability Exposure Function (SCEF); and receiving, at the third network node [306] over the Nesc interface, a response to the request sent for the deletion of the prestored SM context.
3. The method as claimed in claim 1, wherein the first network node [302] is a Session Management Function (SMF) node, the second network node [304] is a Unified Data Management (UDM) node, and the third network node [306] is a Network Exposure Function (NEF) node, wherein the first network is a 5th Generation network.
4. The method as claimed in claim 1 , wherein the first identifier is a Network Exposure Function ID (NEF -ID).
5. A method for creating session management (SM) context in a second network, the method comprising: sending, by a fifth network node [310], a request to a sixth network [312] node to obtain a second identifier; receiving, at the fifth network node [310], a response to the request along with the obtained second identifier; sending, by the fifth network node [310], a request to a fourth network node [308] for creation of the SM context; and receiving, at the fifth network node [310], a response from the fourth network node [308] on the creation of the SM context, wherein the response comprises data associated with the SM context.
6. The method as claimed in claim 5, further comprises: sending, by the fourth network node [308] over a Nesc interface, the SM context data to a third network node [306]; and receiving, at the fourth network node [308] overthe Nesc interface, a response from the third network node [306] of successful reception of the SM context data.
7. The method as claimed in claim 6, wherein the third network node [306] is a Network Exposure Function (NEF) node, the fifth network node [310] is a Mobility Management Entity (MME) node, the sixth network node [312] is a Home Subscriber Server (HSS) node, wherein the second network is a 4th Generation network.
8. The method as claimed in claim 6, wherein sending, by the fourth network node [308] over the Nesc interface, the SM context data to the third network node [306], overwrites existing SM context data available at the third network node [306],
9. The method as claimed in claim 5, wherein the second identifier is a Service Capabilities Exposure Function (SCEF-ID).
10. A system [300] for creating a session management (SM) context in a first network, the system [300] comprising: a first network node [302] configured to: send a request to a second network node [304] to obtain a first identifier; receive a response to the request along with the obtained first identifier; send a request to a third network node [306] for creation of the SM context; and receive a response from the third network node [306] on the creation of the SM context, wherein the response comprises data associated with the SM context.
11. The system [300] as claimed in claim 10, wherein the third network node [306] is configured to: check, over a Nesc interface, an existence of prestored SM context for a User Equipment (UE) at a fourth network node [308]; send, over the Nesc interface, a request to the fourth network node [308] for deletion of the SM context based on a presence of the prestored SM context at the fourth network node [308], wherein the fourth network node [308] is a Service Capability Exposure Function (SCEF); receive, over the Nesc interface, a response to the request sent for the deletion of the prestored SM context.
12. The system [300] as claimed in claim 10, wherein the first network node [302] is a Session Management Function (SMF) node, the second network node [304] is a Unified Data Management (UDM) node, and the third network node [306] is a Network Exposure Function (NEF) node, wherein the first network is a 5th Generation network.
13. The system [300] as claimed in claim 10, wherein the first identifier is a Network Exposure Function ID (NEF-ID).
14. A system [300] for creating a session management (SM) context in a second network, the system comprising: a fifth network node [310] configured to: send a request to a sixth network node [312] to obtain a second identifier; receive a response to the request along with the obtained second identifier; send a request to a fourth network node [308] for creation of the SM context; and receive a response from the fourth network node [308] on the creation of the SM context, wherein the response comprises data associated with the SM context.
15. The system [300] as claimed in claim 14, wherein the fourth network node [3006] is further configured to: send, over a Nesc interface, the SM context data to a third network node [306]; and receive, over the Nesc interface, a response from the third network node [306] of successful reception of the SM context data.
16. The system [300] as claimed in claim 15, wherein the third network node [306] is a Network Exposure Function (NEF) node, the fifth network node [310] is a Mobility Management Entity (MME) node, the sixth network node [312] is a Home Subscriber Server (HSS) node, wherein the second network is a 4th Generation network.
17. The system [300] as claimed in claim 15, wherein the fourth network node [308] sends the SM context data to the third network node [306] to overwrite existing SM context data available at the third network node [306],
18. The system [300] as claimed in claim 14, wherein the second identifier is a Service Capabilities Exposure Function (SCEF-ID).
19. A non-transitory computer-readable storage medium storing for performing a lawful interception provisioning, the storage medium comprising executable code which, when executed by one or more units of a system, causes: a first network node [302] to:
• send a request to a second network node [304] to obtain a first identifier;
• receive a response to the request along with the obtained first identifier;
• send a request to a third network node [306] for creation of the SM context; and
• receive a response from the third network node [306] on the creation of the SM context, wherein the response comprises data associated with the SM context.
PCT/IN2024/050827 2023-07-08 2024-06-14 Method and system for creating a session management (sm) context in first and second network Pending WO2025012943A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202321046045 2023-07-08
IN202321046045 2023-07-08

Publications (1)

Publication Number Publication Date
WO2025012943A1 true WO2025012943A1 (en) 2025-01-16

Family

ID=94214948

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2024/050827 Pending WO2025012943A1 (en) 2023-07-08 2024-06-14 Method and system for creating a session management (sm) context in first and second network

Country Status (1)

Country Link
WO (1) WO2025012943A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3607773A1 (en) * 2018-06-25 2020-02-12 Telefonaktiebolaget LM Ericsson (publ) Network function handling in the context of inter-management function mobility
US20200260233A1 (en) * 2017-10-24 2020-08-13 Huawei Technologies Co., Ltd. Communications system, communication method, and apparatus thereof
CN115915220A (en) * 2021-09-30 2023-04-04 中国移动通信有限公司研究院 An exception handling method, device and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200260233A1 (en) * 2017-10-24 2020-08-13 Huawei Technologies Co., Ltd. Communications system, communication method, and apparatus thereof
EP3607773A1 (en) * 2018-06-25 2020-02-12 Telefonaktiebolaget LM Ericsson (publ) Network function handling in the context of inter-management function mobility
CN115915220A (en) * 2021-09-30 2023-04-04 中国移动通信有限公司研究院 An exception handling method, device and storage medium

Similar Documents

Publication Publication Date Title
WO2025008895A1 (en) Method and system for performing handover from wlan to new radio (nr) in a wireless network
WO2025012943A1 (en) Method and system for creating a session management (sm) context in first and second network
WO2025012980A1 (en) Method and system for performing a barring procedure in a pre-defined presence reporting area (pra)
WO2025008929A1 (en) Method and system for selecting a domain for terminating a message
WO2025052460A1 (en) Method and system for managing access for a user equipment in a network
WO2025017730A1 (en) Method and system for handling non-ip data delivery (nidd) configuration data
WO2025052439A1 (en) Method and system for registering a request at a gateway mobile location centre (gmlc)
WO2025062443A1 (en) Method and system for handling a race condition in a wireless communication network
WO2025012964A1 (en) Method and system for message routing management
WO2025017618A1 (en) System and method for determining a location information of a user
WO2025008875A1 (en) Method and system for configuring and managing proxy registrations in a network
WO2025052436A1 (en) Method and system for discovery of one or more peer network functions
WO2025052404A1 (en) Method and system for facilitating routing in a network
WO2025013072A1 (en) Method and system for managing a graceful shutdown of a converged telephony application server
WO2025062413A1 (en) Method and system for maintaining session for authentication authorization requests (aar)
WO2025008894A1 (en) Method and system for maintaining call continuity for a user device
WO2025069097A1 (en) Method and system for managing one or more session policies in a network
WO2025012948A1 (en) Method and system for transmitting a message to a target user
WO2025008936A1 (en) Method and system for establishing pdu session with upf
WO2025008915A1 (en) Method and system for providing a network slice instance information
WO2025052474A1 (en) Method and system for managing subscription of network functions
WO2025069062A1 (en) Method and system for service continuity in a communication network
WO2025012991A1 (en) Method and system for controlling one or more application servers in a network
WO2025008953A1 (en) Method and system for an activation of one or more communication services
WO2025008903A1 (en) Method and system for automatically diverting a network traffic to a time efficient path

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 24839059

Country of ref document: EP

Kind code of ref document: A1