CALL PROTECTING METHOD AND DEVICE FOR PERSONALIZED RING BACK TONE IN AN INTELLIGENT NETWORK
    44.
    发明公开
    CALL PROTECTING METHOD AND DEVICE FOR PERSONALIZED RING BACK TONE IN AN INTELLIGENT NETWORK 审中-公开
    打扰对个性化回铃音的方法和设备以智能网络

    公开(公告)号:EP1830587A4

    公开(公告)日:2010-04-21

    申请号:EP04797390

    申请日:2004-11-30

    申请人: ZTE CORP

    发明人: KONG DECHUN

    摘要: The present invention relates to a call protecting method for the coloring ring back tones in an intelligent network, wherein said intelligent network includes an intelligent network service control point (SCP), a service switch point (SSP) and an intelligent peripheral (IP). The method includes the following steps: an IP-state detecting module is added to the IP for detecting whether the IP is available; the IP-state detecting module sends a state-query request to the IP for checking whether the IP is available; if the IP returns a result of availability, the SCP will direct the SSP to connect the call to the IP; if IP returns a result of unavailability, or returns no IP-state detecting result on time, then the SCP will direct the SSP to connect to the called directly rather than to the IP. In the invention, the call-releasing phenomenon due to the IP state is avoided, the call completing ratio of the coloring ring back tone system is increased, and thus the problem that the subscriber can not receive the call due to the use of the coloring ring back tone is mitigated.

    SYSTEM AND METHOD FOR OVERLOAD CONTROL IN A NEXT GENERATION NETWORK
    45.
    发明公开
    SYSTEM AND METHOD FOR OVERLOAD CONTROL IN A NEXT GENERATION NETWORK 审中-公开
    EINEM NETZWERK DERNÄCHSTENGENERATION系统VERFAHREN ZURÜBERLASTSTEUERUNG

    公开(公告)号:EP2062417A2

    公开(公告)日:2009-05-27

    申请号:EP07825084.2

    申请日:2007-09-10

    发明人: SZABO, Istvàn

    IPC分类号: H04L29/06 H04M7/00

    摘要: A Call Server in a network is able to monitor an offered rate of incoming calls per Access Gateway (AGW). A calculated GlobalLeakRate can be distributed between the AGWs in proportion to the traffic rate they offer. A leak rate calculation method is used to calculate the GlobalLeakRate control parameter of the ETSI_NR restrictor at an overloaded Control Server. The leak rate calculation is based on the POTS call rejection rate. In one particular embodiment of the present invention, the calculation is based on bringing the call reject rate close to a configurable low target reject level. An MGC is able to identify the end of an overload event with a greater degree of confidence and an AGW is able respond appropriately if the AGW is prematurely instructed to stop the control.

    摘要翻译: 网络中的呼叫服务器能够监视每个接入网关(AGW)提供的呼入速率。 计算的GlobalLeakRate可以在AGW之间按照它们提供的流量比率分配。 泄漏率计算方法用于在重载的控制服务器上计算ETSI NR限制器的GlobalLeakRate控制参数。 泄漏率计算基于POTS呼叫拒绝率。 在本发明的一个具体实施例中,该计算是基于使呼叫拒绝率接近可配置的低目标拒绝级别。 MGC能够以更大的置信度来识别过载事件的结束,并且如果AGW过早地被指示停止控制,则AGW能够适当地响应。

    VERFAHREN ZUR ÜBERLASTERKENNUNG BEI VERMITTLUNGSSYSTEMEN
    46.
    发明公开
    VERFAHREN ZUR ÜBERLASTERKENNUNG BEI VERMITTLUNGSSYSTEMEN 审中-公开
    方法过载检测系统切换

    公开(公告)号:EP1911296A1

    公开(公告)日:2008-04-16

    申请号:EP06763313.1

    申请日:2006-05-29

    IPC分类号: H04Q3/545 H04M3/36

    摘要: The invention relates to a method for recognising overload in a switching system (VS) with a platform system (PS), which allows multistation and multiprogramme operation. In said method, an application (AW1) running on the switching system (VS) is registered (1, 2) with a central monitoring unit (UW). The central monitoring unit (UW) continuously measures (3) and evaluates (4) in an application-specific manner system parameters such as processor usage, memory requirements and load on the connections. If a defined threshold value is exceeded by the measured system parameters, the registered application (AW1) is informed (5) of the situation by the central monitoring unit (UW) and overload protection measures are introduced (6) by the registered application (AW1). The main concept of the solutions proposed by the invention is that of a central monitoring unit (UW), which is familiar with all relevant applications (AW1, AW2, AW3, AW4) and which easily recognises an overload situation with relatively little outlay and no significant loss in performance.