摘要:
In one embodiment, a packet filter (or “trap”) is installed on one or more interfaces of a router, switch (intermediary) or other node in an IP network that identifies multimedia packets for a particular media stream. A packet replicator (or “cloner”) duplicates the identified packets allowing the original packets to continue through the IP network. A forwarder (“tunneler”) encapsulates and sends the cloned media packets to a central facility where the tunneled media stream is further analyzed.
摘要:
An upstream error controller monitors a media stream at a location upstream from an associated set of receivers receiving the media stream. The upstream error controller sends out suppression notices for any media packets lost upstream causing the receivers to suppress sending lost packet notices. In another embodiment, a repair point joins a primary multicast group with multiple receivers for receiving a native media stream. The repair point also joins a second multicast group receiving multicast backup data for retransmitting or repairing the native media stream that does not include an associated set of receivers. In yet another embodiment, the upstream error controller is used in combination with a hybrid packet repair scheme for adaptively switching among unicast retransmission, multicast retransmission, and Forward Error Correction (FEC).
摘要:
A system assigns network traffic flows to appropriate queues and/or queue servicing algorithms based upon one or more flow parameters contained in reservation requests associated with the traffic flows. The system may be disposed at an intermediate network device within a computer network. The intermediate network device includes a reservation engine, a packet classification engine, an admission control entity, a traffic scheduler, and a flow analyzer. The flow analyzer includes or has access to a memory that is preprogrammed with one or more heuristic sets for use in evaluating the flow parameters of reservation requests. When a reservation request that includes one or more flow parameters characterizing the bandwidth and/or forwarding requirements of the anticipated traffic flow is received, the flow analyzer applies the heuristic sets. Depending on which set of heuristics, if any, the parameters satisfy, the flow analyzer selects the appropriate queue and/or queue servicing algorithm for the flow.
摘要:
A call adaptation system tracks adaptation schemes used for transmitting audio packets in a Voice Over IP call. A user response to the Voice Over IP (VoIP) call is monitored. The call adaptation system then dynamically varies the adaptation schemes used for transmitting the audio packets according to the monitored user response.
摘要:
Providing data security involves receiving a request message at an intermediate network node. The request message is associated with a number of data packets from a communication device. The intermediate network node determines whether the request message has a satisfactory security hint. If the request message does not have a satisfactory security hint, the intermediate network node performs a security procedure on the data packets. If the request message has a satisfactory security hint, the intermediate network node relies on a security transform present in the data packets and routes the data packets without performing the security procedure.
摘要:
Voice and data streams transmitted from a conventional DSVD modem are interfaced directly to a network access server through a modified DSVD modem according to the invention. The voice and data is formatted into network data packets that are then routed directly to different endpoints through the network access server. The modified DSVD modem includes a packet framer that removes conventionally transmitted V.76 DSVD framing formats and stuffs bytes into the voice and data to form network packets. The network access server then routes the voice and data packets to the different endpoints identified in a packet header. Since the voice and data are output from the DSVD modem in data packets, the voice and data can be routed more efficiently to different network endpoints.
摘要:
A dial string is received from a session application that interfaces with a packet-based or circuit-switched system such as VoIP, PSTN, PBX, etc. Regular expression match patterns are compared with the input dial string. The dial plan mapper identifies one of the match patterns providing a longest match with the dial string and outputs call configuration information associated with the identified match pattern. The configuration information contains call parameters necessary for establishing the telephone call with the call destination. The configuration information format allows the dial plan mapper to specify any one of the wide variety of different session protocols that may be associated with a particular call destination.
摘要:
Voice packets are redirected in packet telephony applications to a codec proxy system that makes voice endpoints involved in an end-to-end call appear to be using the voice codec required of it by the other endpoint, even if the endpoints do not possess the required codec capability. The codec proxy system acts as a broker during initial capability negotiations, and as a real-time transcoding facility between disparate codec capabilities once voice traffic begins. The resulting system allows non-standard, cost-optimized and/or feature specific packet voice endpoints to interoperate in a standards-based network.
摘要:
A method and apparatus for inter-domain routing of calls in a network, where the network represents a first wide area network. A routing node of the network advertises its access to a range of addresses in a second wide area network and a cost for access to the range of addresses to all adjacent nodes in the network. Each of the adjacent nodes inserts an entry in its own routing table associating access to the range of addresses in the second wide area network with the network address of the routing node and the cost for access. Each adjacent node then modifies the cost for access by adding its own cost and advertises its access to the range of addresses in the second wide area network and the modified cost for access to all of its adjacent nodes. When a call addressed to a destination address in the range of address in the second wide area network is received at each node of the network, then the node searches for the entry in its routing table corresponding to the range of addresses in the second wide area network having the lowest cost for access and connects the call to the adjacent node associated with the entry having the lowest cost. The routing node can also advertise one or more protocol types which it can support, where the protocol types are associated with the routing node in the routing table in each adjacent node and a call having a given protocol type is also routed at each node of the network based upon its protocol type.
摘要:
A method and apparatus are disclosed for interconnecting a circuit-switched telephone network and a packet-switched data network for communication among them. A signaling trunk of a circuit-switched telephone network is coupled to a signaling access server that is also coupled to a signaling, management and control network. One or more voice trunks of the telephone network are coupled to one or more network access servers, which are also coupled to the control network to thereby receive instructions from the signaling access server. The network access servers are also coupled to a packet-switched data network, such as the global packet-switched network known as Internet. The signaling access server can receive call setup messages and other messages in standard telephone network protocol formats and convert them into call setup messages in a special protocol for communications between the signaling access server and the network access servers. The signaling access server can instruct the network access servers to establish a call, containing voiceband information such as modem-based data calls, from the voice trunks to the data network. Accordingly, the public switched telephone network and the Internet may be interconnected and may inter-communicate without modifying the protocols of either one.