EP-4740682-A1 - METHOD AND SYSTEM FOR CREATING A SESSION MANAGEMENT (SM) CONTEXT IN FIRST AND SECOND NETWORK
Abstract
The present disclosure relates to methods and systems for creating session management (SM) context in first and second network. The method in a first network includes sending request to a second network node [304] to obtain a first identifier; receiving response to request along with the obtained first identifier; sending a request to a third network node [306] for creation of SM context and receiving response from third network node [306] on creation of SM context, wherein the response comprises data associated with SM context. The method in a second network includes sending a request to a sixth network [312] node to obtain second identifier; receiving response to the request along with the obtained second identifier; sending a request to a fourth network node [308] for creation of the SM context and receiving a response from the fourth network node [308] on the creation of the SM context.
Inventors
- BISHT, SANDEEP
- Bhushan, Raghvendra
- JAIN, GAURAV
- Kale, Mangesh Shantaram
- UPADHYE, Supriya
- BHATNAGAR, AAYUSH
- Sanas, Nilesh
- MOGIA, Mohd Rijvan Khan
- GOUR, Nitesh
- SINGH, Kumar Gaurav
- SINGH, AMIT KUMAR
- SINHA, ANURAG
- BAVISHI, Hardik Navinbhai
Assignees
- Jio Platforms Limited
Dates
- Publication Date
- 20260513
- Application Date
- 20240614
Claims (19)
- 1. A method for creating a session management (SM) context in a first network, the method comprising: sending, by a first network node [302], a request to a second network node [304] to obtain a first identifier; receiving, at the first network node [302], a response to the request along with the obtained first identifier; sending, by the first network node [302], a request to a third network node [306] for creation of the SM context; and receiving, at the first network node [302], a response from the third network node [306] on the creation of the SM context, wherein the response comprises data associated with the SM context.
- 2. The method as claimed in claim 1, further comprises: checking, by the third network node [306] over Nesc interface, an existence of prestored SM context for a User Equipment (UE) at a fourth network node [308]; sending, by the third network node [306] over the Nesc interface, a request to the fourth network node [308] for deletion of the SM context based on a presence of the prestored SM context at the fourth network node [308], wherein the fourth network node [308] is a Service Capability Exposure Function (SCEF); and receiving, at the third network node [306] over the Nesc interface, a response to the request sent for the deletion of the prestored SM context.
- 3. The method as claimed in claim 1, wherein the first network node [302] is a Session Management Function (SMF) node, the second network node [304] is a Unified Data Management (UDM) node, and the third network node [306] is a Network Exposure Function (NEF) node, wherein the first network is a 5 th Generation network.
- 4. The method as claimed in claim 1 , wherein the first identifier is a Network Exposure Function ID (NEF -ID).
- 5. A method for creating session management (SM) context in a second network, the method comprising: sending, by a fifth network node [310], a request to a sixth network [312] node to obtain a second identifier; receiving, at the fifth network node [310], a response to the request along with the obtained second identifier; sending, by the fifth network node [310], a request to a fourth network node [308] for creation of the SM context; and receiving, at the fifth network node [310], a response from the fourth network node [308] on the creation of the SM context, wherein the response comprises data associated with the SM context.
- 6. The method as claimed in claim 5, further comprises: sending, by the fourth network node [308] over a Nesc interface, the SM context data to a third network node [306]; and receiving, at the fourth network node [308] overthe Nesc interface, a response from the third network node [306] of successful reception of the SM context data.
- 7. The method as claimed in claim 6, wherein the third network node [306] is a Network Exposure Function (NEF) node, the fifth network node [310] is a Mobility Management Entity (MME) node, the sixth network node [312] is a Home Subscriber Server (HSS) node, wherein the second network is a 4 th Generation network.
- 8. The method as claimed in claim 6, wherein sending, by the fourth network node [308] over the Nesc interface, the SM context data to the third network node [306], overwrites existing SM context data available at the third network node [306],
- 9. The method as claimed in claim 5, wherein the second identifier is a Service Capabilities Exposure Function (SCEF-ID).
- 10. A system [300] for creating a session management (SM) context in a first network, the system [300] comprising: a first network node [302] configured to: send a request to a second network node [304] to obtain a first identifier; receive a response to the request along with the obtained first identifier; send a request to a third network node [306] for creation of the SM context; and receive a response from the third network node [306] on the creation of the SM context, wherein the response comprises data associated with the SM context.
- 11. The system [300] as claimed in claim 10, wherein the third network node [306] is configured to: check, over a Nesc interface, an existence of prestored SM context for a User Equipment (UE) at a fourth network node [308]; send, over the Nesc interface, a request to the fourth network node [308] for deletion of the SM context based on a presence of the prestored SM context at the fourth network node [308], wherein the fourth network node [308] is a Service Capability Exposure Function (SCEF); receive, over the Nesc interface, a response to the request sent for the deletion of the prestored SM context.
- 12. The system [300] as claimed in claim 10, wherein the first network node [302] is a Session Management Function (SMF) node, the second network node [304] is a Unified Data Management (UDM) node, and the third network node [306] is a Network Exposure Function (NEF) node, wherein the first network is a 5 th Generation network.
- 13. The system [300] as claimed in claim 10, wherein the first identifier is a Network Exposure Function ID (NEF-ID).
- 14. A system [300] for creating a session management (SM) context in a second network, the system comprising: a fifth network node [310] configured to: send a request to a sixth network node [312] to obtain a second identifier; receive a response to the request along with the obtained second identifier; send a request to a fourth network node [308] for creation of the SM context; and receive a response from the fourth network node [308] on the creation of the SM context, wherein the response comprises data associated with the SM context.
- 15. The system [300] as claimed in claim 14, wherein the fourth network node [3006] is further configured to: send, over a Nesc interface, the SM context data to a third network node [306]; and receive, over the Nesc interface, a response from the third network node [306] of successful reception of the SM context data.
- 16. The system [300] as claimed in claim 15, wherein the third network node [306] is a Network Exposure Function (NEF) node, the fifth network node [310] is a Mobility Management Entity (MME) node, the sixth network node [312] is a Home Subscriber Server (HSS) node, wherein the second network is a 4 th Generation network.
- 17. The system [300] as claimed in claim 15, wherein the fourth network node [308] sends the SM context data to the third network node [306] to overwrite existing SM context data available at the third network node [306],
- 18. The system [300] as claimed in claim 14, wherein the second identifier is a Service Capabilities Exposure Function (SCEF-ID).
- 19. A non-transitory computer-readable storage medium storing for performing a lawful interception provisioning, the storage medium comprising executable code which, when executed by one or more units of a system, causes: a first network node [302] to: • send a request to a second network node [304] to obtain a first identifier; • receive a response to the request along with the obtained first identifier; • send a request to a third network node [306] for creation of the SM context; and • receive a response from the third network node [306] on the creation of the SM context, wherein the response comprises data associated with the SM context.
Description
METHOD AND SYSTEM FOR CREATING A SESSION MANAGEMENT (SM) CONTEXT IN FIRST AND SECOND NETWORK TECHNICAL FIELD [0001] Embodiments of the present disclosure generally relate to network performance management systems. More particularly, embodiments of the present disclosure relate to a session management (SM) context in a first and a second network. BACKGROUND [0002] The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art. [0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second-generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third- generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth-generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth-generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users. [0004] Nowadays, telecom operators are working hard to enhance network capabilities and to efficiently handle a handover scenario or switching conditions from a low generation network (say 4G) to a high generation network (say 5G) or vice versa. [0005] In particular, a Session Management (SM)-context is created in 4G and 5G network during interworking scenarios and the SM-context is tracked to fetch a User Equipment’s (UE) current network and perform operations on the UE. However, non-tracking of the SM context leads to uncertainty at an Application Function (AF) and may also lead to uncertainty of one or more operations such as “mobile terminated message”, “monitoring events”, “device triggering” etc. may be executed in a network where UE is not latched. Thus, overall performance of a Radio Access Network (RAN) gets affected due to non-tracking or inefficient tracking of the Session Management (SM) context at the first network and the second network. [0006] Hence, in view of these and other existing limitations, there arises an imperative need to provide an efficient solution to overcome the above-mentioned limitations and to provide a method and system to allow efficient creation, tracking and management of session management context in the Radio Access Network such as the 4G network and the 5G network. SUMMARY [0007] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter. [0008] An aspect of the present disclosure may relate to a method for creating a session management (SM) context in a first network. A method for creating a session management (SM) context in a first network includes sending, by a first network node, a request to a second network node to obtain a first identifier. The method further encompasses receiving, at the first network node, a response to the request along with the obtained first identifier. Furthermore, the method includes sending, by the first network node, a request to a third network node for creation of the SM context. Further, the method includes receiving, at the first network node, a response from the third network node on the creation of the SM context, wherein the response comprises data associated with the SM context. [0009] In an exemplary aspect of the present disclosure, the method further comprises checking, by the third network node over Nesc interface, an existence of prestored SM context for the UE at a fourth network node. The method further encompasses sending, by the third network node over the Nesc interface, a request to the fourth network node for deletion of the SM context based on a presence of the prestored SM context at the fourth network node, wherein the fourth network node is a Service Capability Exposure Function (SCEF). Further, the method includes receiving, at the third network node over the Nesc interface, a response to the request sent for the deletion of the prestored SM context. [0010] In an exemplary