Abstract:
A system and method for separating clock recovery for a pseudowire communication. An incoming signal is received for a pseudowire communication. The incoming signal is separated into a first signal and a second signal. Packets within the first signal are ordered in a first register. A clock signal is extracted from the second signal in a second register to generate a modified clock signal. A delay is incurred during generating of the modified clock signal. The first signal is communicated utilizing the modified clock signal.
Abstract:
The disclosed embodiments include system and method for routing communications over a communications network. In one embodiment, a determination is made as to whether to establish a communication along a communication path based on network performance information. The disclosed embodiments provide several alternatives for establishing the communication and improving communications along the communication path in response to a determination that at least one network node along the communication path is impaired or congested.
Abstract:
A system, method, and handheld wireless device for improving a connection to a wireless device. Performance information is measured for the connection to the wireless device. One or more trends in one or more averages associated with the performance information are determined. The one or more trends and the one or more averages are displayed to user. Recommendations are generated for the user to implement a user action in response to the one or more trends and the one or more averages to improve the connection to the wireless device. The recommendations are displayed to the user to improve the connection in real-time.
Abstract:
A system and method for communicating alarms. Packets are communicated through multiple maintenance entities in one or more networks. A determination is made that there is a failure between or at one of the multiple maintenance entities in the one or more networks. An alarm is generated at a maintenance entity nearest the failure in response to determining there is a failure. The alarm indicates a location of the failure and an identification of a communications service provider associated with the failure. The alarm is communicated back through one or more of the multiple maintenance entities to a maintenance end point. The alarm is routed to at least a communications service provider determined to be associated with the failure.
Abstract:
A system and method for communicating through a host repeater. Data is received from a remote repeater communicating with a wireless device. The host repeater registers as the wireless device on a wireless network. The data is reformatted for transmission between the wireless devices and the wireless network.
Abstract:
A system and method for controlling maximum throughput for communications. A frame size of each packet communicated to a server is determined. A maximum throughput is determined by converting the determined frame size of each packed communicated to the server to an effective throughput rate. Frames per second are measured at the server. An amount of loss at the server is determined. A message indicating the maximum throughput, the amount of loss, and the frames per second is communicated in response to determining there is loss at the server.
Abstract:
The disclosed embodiments include a computer implemented method for routing data packets. In one embodiment, the method includes storing network usage information of a packet network managed by a communications carrier including network usage information associated with communications by subscribers of other communications carrier that communicate data packets over the packet network, the network usage information distinguishing between data packets associated with a first service and data packets associated with a second service; determining pricing information for communicating the data packets via a plurality of networks, wherein each network is associated with a different communications carrier; and selecting one of the plurality of networks for routing the data packets based on cost, wherein the cost includes a first cost for communicating the data packets that are associated with the first service and a second cost for communicating the data packets that are associated with the second service.
Abstract:
A system and method for managing control of a network interface device. Permissions for management of a NID are established. The permissions enable a user to deny a third party access to one or more portions of the NID. Access for the third party to the one or more portions of the NID are granted in response to receiving an authorized override command from the third party. Activities performed by the third party are logged by the one or more portions of the mid-in response to receiving the authorized override command from the third party.
Abstract:
A system and method for controlling communications networks. Network performance information is gathered from a first communications network using performance information packet data packets. A network operator of the first communications network is controlled from a secondary communications network using the performance information packet data packets. Changes to the network operator are implemented based on instructions included in the performance information packet data packets.
Abstract:
Novel tools and techniques are provided for implementing customer resource telemetry and use as a service. In various embodiments, a computing system might receive, from a user, a request to access at least one network-accessible resource associated with a customer of a service provider, the user being unassociated and unrelated with the customer; might identify at least one of a user identification, a company, or a class of user associated with the user; might determine whether at least one resource record associated with the customer indicates that the user has permission to access the at least one network-accessible resource, based on the identification. If so, the computing system might provide the user with access to the at least one network-accessible resource associated with the customer. If not, the computing system might deny, to the user, access to the at least one network-accessible resource associated with the customer.