The invention refers to the method to control the load of services selectively by session on the telecommunications charging system. Specifically, the method serves to solve the problem of telecommunications charging to ensure charging system's stability when the load exceeds the charging system's capacity.
The telecommunications charging system communicates with external systems to receive and process two types of requests:
For session-based charging requests, the telecommunications charging system processes them through the following steps:
In the process of accepting or bypassing incoming charging messages in step 1, the system must accurately handle the following issues:
The method of controlling the service load selectively by session in the telecommunications charging system mentioned in the invention helps to solve the above problems.
The method of controlling the load of selective service by session in the telecommunications charging system includes the following steps:
When the system is overloaded, charging requests will be accepted or bypassed based on the unique session identifiers and the state of the session. Specifically:
In this invention, the following definitions are mentioned:
In which:
Each session has only one Terminate request.
The method of controlling the load of selective service by session in the telecommunications charging system includes the following steps:
In addition, the telecommunications charging system uses a programming language to store variable parameters in the period CALCULATION INTERVAL as follows:
The process of determining the overload status of the system using a set of fixed parameters and variable parameters is described in detail in two steps as follows:
The end of step 1.1 obtains the values of the variable parameters at a time, which are the input for the next processing steps.
The f function takes these input parameters:
In which:
Rulei: compare the values of the elements in ListOfStatei with 1.
The function f returns the result as the product of StatePrevious and the Rulei. This product takes either a value of 0 or 1. From the result of the f function, update the state of the system accordingly via parameter STATE.
Subsequently, further rules are applied as follows:
Second example: suppose the charging system uses a set of parameters:
The charging system's TPS for the period from 15:02:00 to 15:02:19 is calculated as follows
From 15:02:00 to 15:02:04, there are three instances out of five when TPS exceeded the threshold of 5000. Therefore, at 15:02:04, the charging system will update the overload status to STATE=1.
From 15:02:10 to 15:02:19 there are ten consecutive instances where TPS is below the threshold of 4000. Therefore, at 15:02:19, the charging system will update the status back to normal, STATE=0.
At the end of step 1.2 specifically and step 1 in general, we can determine whether the charging system is in a normal or overloaded state at the measurement time. (Refer to
The previous step mentioned the input load parameters from core network systems and the mechanism for checking input overload. However, the charging system consists of many applications, each with its own load capacity. Therefore, sensible overload protection must take into account both internal load and input load from external systems.
The charging system defines through a programming language variable parameters in the following CALCULATION INTERVAL period:
Based on the above variable parameters, the process of bypassing or accepting a charging request is described in detail in the following steps:
After storing, move to step 2.5.
At the end of step 2, we have established which charging messages are processed and which are bypassed. The charging system stores the bypassed charging messages for reprocessing in step 3. (Refer to
The f function takes the input parameters:
In which:
If there is
return result 1
Otherwise, Rulei returns 0 results
The function f returns the result as the product of Rulei. This product takes either a value of 0 or 1. From the result of function f:
Subsequently, further rules are applied as follows:
the result returns 1.
the result returns 0.
Check the REQUEST_TYPE attribute of the message:
At the end of step 3, the charging system has evaluated the internal overload status. If the system is confirmed to be in the normal state, the system reprocesses the charging request that have been saved. (Refer to
Number | Date | Country | Kind |
---|---|---|---|
1-2023-06882 | Oct 2023 | VN | national |