18284808. SERVICE FLOW PROCESSING METHOD simplified abstract (BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

SERVICE FLOW PROCESSING METHOD

Organization Name

BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.

Inventor(s)

Wei Hong of Beijing (CN)

SERVICE FLOW PROCESSING METHOD - A simplified explanation of the abstract

This abstract first appeared for US patent application 18284808 titled 'SERVICE FLOW PROCESSING METHOD

Simplified Explanation

The abstract describes a method for processing traffic flow using a Network Exposure Function (NEF) and a Session Management Function (SMF) in a network environment.

  • The NEF receives a traffic flow steering policy request from an Application Function (AF) to provide traffic flow steering policy information.
  • The SMF receives traffic flow steering policy information from the NEF based on an application identifier, and performs operations such as adding, deleting, or modifying the traffic flow steering policy on an application program.

Potential Applications

This technology can be applied in telecommunications networks, data centers, and cloud computing environments to optimize traffic flow management and improve network performance.

Problems Solved

1. Efficient traffic flow steering policy management. 2. Streamlining network operations and enhancing network efficiency.

Benefits

1. Enhanced network performance. 2. Improved quality of service for applications. 3. Simplified traffic flow management.

Potential Commercial Applications

Optimizing network traffic flow in 5G networks, enhancing cloud computing services, and improving data center efficiency.

Possible Prior Art

Prior art in the field of network traffic management systems and methods, such as software-defined networking (SDN) solutions and network function virtualization (NFV) technologies, may be relevant to this innovation.

Unanswered Questions

How does this method handle security considerations in traffic flow management?

This article does not delve into the specific security measures implemented in the traffic flow processing method. It would be beneficial to explore how this technology ensures secure traffic flow management.

What are the scalability limitations of this method in large-scale network environments?

The scalability of this method in handling traffic flow management in extensive network infrastructures is not addressed in the article. Understanding the potential limitations in scalability would provide valuable insights for implementing this technology in various network settings.


Original Abstract Submitted

A traffic flow processing method by a network exposure function (NEF) network element includes receiving a traffic flow steering policy request sent by an application function (AF), wherein the traffic flow steering policy request is configured for the AF to provide traffic flow steering policy information to the NEF. A traffic flow processing method by a session management function (SMF) network element includes receiving traffic flow steering policy information sent by a network exposure function (NEF), wherein the traffic flow steering policy information is traffic flow steering policy information retrieved based on an application identifier, and performing one or more operations of adding, deleting, and modifying the traffic flow steering policy on an application program corresponding to the traffic flow steering policy information, based on the traffic flow steering policy information.