摘要:
A method has been disclosed for automatically installing an application or service on a CPE, which comprises lifecycle management operations, by means of an associated ACS, according to the TR-069 specification of the Broadband Forum, the method comprising the step of dependency checking during the process of installation of the application or service on the CPE, wherein the method further comprises checking for dependency information for the application or service, to be installed on the CPE, by the ACS before installing the application on the CPE. Also a corresponding client premises equipments, auto configuration server and module have been disclosed.
摘要:
A method for associating name information to a sensor device in a local network, the local network being connected to an access network by means of a service gateway, and the service gateway being adapted for communicating with the sensor device, comprising performing at the service gateway: - receiving sensor identification information for the sensor device; - forwarding the sensor identification information to a mobile device of a user, through a wireless telecommunication network; - receiving naming information for the sensor device from the mobile device through the telecommunication network; - storing the naming information for the sensor device; a service gateway, and a remote management server.
摘要:
Method for remote configuration of a device via a network by means of a remote autoconfiguration server (ACS), wherein the configuration comprises creating new data, or modifying or deleting writeable data of the device, wherein preferably the TR-069 CPE WAN management protocol is used for communicating between the ACS and the device, said remote management protocol using sessions consisting of transactions, a transaction being a single request followed by a single response, wherein within a session, when writeable data has to be created, modified or deleted by the ACS, at least the writeable data to be created, deleted or modified are write-locked for other management agents at the transaction level, and wherein the write-lock is released within said session, after a successful configuration and/or after a failure.
摘要:
A path information module to impose update of path information for use in a home network segment comprising a plurality of devices. The path information module comprises a device detector module for detecting a new device in the home network segment and for triggering a reachability bundle module by means of an informing message. The path information module further comprises the reachability bundle module for sending a polling invocation message to a polling action module of the new device. The polling action module is sending, upon reception of the polling invocation message, a polling action message to other devices in the home network segment to impose thereby update of its path information. Optionally, the reachability bundle module is extended for sending a similar polling invocation message, at predetermined time moments, to one of the devices, whereby this device transmits a similar polling action message to other devices in the home network segment to impose thereby update of path information at the other devices. ( Figure 1 ).
摘要:
Embodiments relates to a method for encoding a video (V S ) to be transmitted to a destination device (5), executed by a video encoding device (2), comprising: - obtaining a current value of at least one transmission parameter (P trans ) representative of characteristics of a transmission channel (4) to the destination device (5), - determining at least one encoding parameter in function of said current value, and - encoding said video according to said at least one encoding parameter (P Enc ), wherein said method comprises determining a predicted value of at least one transmission parameter (P trans ), said at least one encoding parameter being determined in function of said current value and said predicted value.
摘要:
Method for compressing image data, said method comprising - receiving said image data in a color space (R ij ,G ij ,B ij ) - transforming the individual components (R ij ,G ij ,B ij ) of said color space into respective values of chrominance (U ij , V ij ,), and luminance (Y ij) ) components, thereby obtaining transformed image data - compressing said transformed image data by selecting and re-arranging said transformed image data into a Bayer pattern image. A method for decompressing as well as devices for compressing and decompressing image data are disclosed as well.
摘要:
A method to control legacy devices located in home networks is provided and whereof a plurality of the legacy devices communicates according to a predefined legacy protocol, is provided. The method comprises the steps of - associating by a legacy proxy in a home network to a newly connected legacy device of the legacy devices an Internet Protocol address and storing a generated association in a memory; and - forwarding by the legacy proxy the associated Internet Protocol address to a legacy controller in an Internet Protocol network; and in order to support communication between the legacy controller and the legacy device : - upon reception by the legacy proxy (LP1) of a legacy protocol packet according to the legacy protocol, first transforming by first transforming means, the legacy protocol packet into an Internet Protocol packet being destined for the legacy controller, and comprising the associated Internet Protocol address being determined according to the above mentioned association; and - upon reception by the legacy proxy of an Internet protocol packet, second transforming by second transforming means, the Internet Protocol packet into a legacy protocol packet being destined for the legacy device and therefore comprising a legacy address of the legacy device.
摘要:
A method and system for placing a user application on a host among a plurality of hosts, said hosts being grouped into a plurality of host types, each host comprising a plurality of different resources, which comprises a benchmarking process and a determination of relative weights of resources between host types and relative weights of resource for an application, and uses these weights in searching for a host on which to place of the user application. A database is populated with these weights and other data about hosts, their currently available resources, applications, the performance of applications on certain hosts, and/or which applications are running on which hosts, and this database may be updated when a user application is executed on a host type, thus providing a dynamic system where placement may improve over time.
摘要:
According to a first aspect, the invention relates to a networking device (100) for adapting quality of video bitstreaming over a network (400). The device (100) comprises an analyser (200) configured to detect one or more low priority regions and/or one or more high priority regions in video frames of a video bitstream. The analyser (200) is configured to determine one or more low priority video sub-bitstreams corresponding to the one or more detected low priority regions and/or configured to determine one or more high priority video sub-bitstreams corresponding to the one or more detected high priority regions. The device (100) further comprises a quality controller (203) configured to detect network congestion and configured to decrease or increase quality of the one or more low priority video sub-bitstreams depending on respectively degrading or improved network congestion. The device (100) further comprises a network interface (350) for sending the one or more high priority video sub-bitstreams and/or the one or more low priority video sub-bitstreams via one or more network paths over a network (400) to a receiver.
摘要:
The present invention relates to a method, system and related devices for a first call party reporting abuse of a communication session by a second call party, where said first call party is involved in said communications session established between said first call party associated with a first communications device and at least said second call party associated with a second communications device. The first communications device and the second communications device are being coupled over a communications network. The method comprises the steps of collecting information on said second call party making abuse for inclusion in an abuse report at detecting an abuse attempt by said second call party, creating a report including said information collected and reporting abuse of said communication session to an authorized organization. Subsequently such authorized organization, based on said reporting of abuse may intercept said communication session and optionally the authorized organization, may take at least one further action.