Abstract:
An example method stores a nomadic service designator and an operating mode designator in association with a public user identifier. The nomadic service designator indicates whether an IP device is allowed to access VoIP services from different network locations. The public user identifier facilitates establishing a call with the IP device. The operating mode designator indicates when the IP device is in a suspended operating mode and an unrestricted mode. The suspended operating mode restricts the IP device to a subset of communication services associated with a service subscription of the IP device, and to a 911 service. The unrestricted operating mode is based on a registered geographic location associated with the IP device being a current geographic location of the IP device, and is based on a service provider being able to provide an E911 service including a location-identification service at the current geographic location of the IP device.
Abstract:
Virtual machines may have external interfaces (E-VMs) and VMs with internal interfaces (I-VMs). A control system may automatically scale the quantity of I-VMs based on traffic demand, among other things.
Abstract:
Methods and apparatus to provide voice communication inoperative condition notifications are disclosed. An apparatus includes an error capture to: transmit a request to a voice over internet protocol processor that serves a first voice over internet protocol user and a second voice over internet protocol user, the request indicating that the error capture is to be subscribed to receive voice over internet protocol notifications from the voice over internet protocol processor; and a notifier to: determine a voice over internet protocol user identifier associated with a first notification; determine a video distribution system user identifier associated with the voice over internet protocol user identifier; and transmit a third notification to the video distribution system, the third notification instructing the video distribution system to cause an indication of the first notification to be presented on a video presentation device associated with the video distribution system user identifier.
Abstract:
When a virtualized service platform encounters a catastrophic fault, an orchestrator may instantiate new virtual machines instances to deploy additional capacity in other cloud locations to handle failover storms. After the network fault is fixed and service returns to normal condition, these additional VM instances may be removed from the platform and cloud resources may be released. The system may minimize the resource over-provisioning and may continue to support geographical redundancy or dynamic scaling in a large-scale service network.
Abstract:
Concepts and technologies are disclosed herein for message flow management for virtual networks. A processor can identify a target virtual network function instance that is to be taken offline. The processor can change a status associated with the target virtual network function instance to indicate it being taken offline. The processor can start a graceful shutdown timer to trigger shutdown of the target virtual network function instance. The processor can identify external interfaces and a peer network function that identifies the target virtual network function instance as a next hop. The processor can obtain, for the target virtual network function instance and the peer network function instance, a snapshot that identifies configuration data for the target virtual network function instance and the peer network function instance and can generate a command to trigger a shutdown of the target virtual network function instance.
Abstract:
A method and apparatus for controlling a call volume for an office that serves as a protecting site for another office in a packet network are disclosed. For example, the method collects one or more customer registration counts from one or more session border controllers located in a first office, determines if the one or more customer registration counts have reached or exceeded a threshold. The method directs all of said one or more session border controllers located in said first office to enact one or more throttling rules if the one or more customer registration counts have reached or exceeded the threshold.
Abstract:
A method and apparatus for controlling a call volume for an office that serves as a protecting site for another office in a packet network are disclosed. For example, the method collects one or more customer registration counts from one or more session border controllers located in a first office, determines if the one or more customer registration counts have reached or exceeded a threshold. The method directs all of said one or more session border controllers located in said first office to enact one or more throttling rules if the one or more customer registration counts have reached or exceeded the threshold.
Abstract:
An example method stores a nomadic service designator and an operating mode designator in association with a public user identifier. The nomadic service designator indicates whether an IP device is allowed to access VoIP services from different network locations. The public user identifier facilitates establishing a call with the IP device. The operating mode designator indicates when the IP device is in a suspended operating mode and an unrestricted mode. The suspended operating mode restricts the IP device to a subset of communication services associated with a service subscription of the IP device, and to a 911 service. The unrestricted operating mode is based on a registered geographic location associated with the IP device being a current geographic location of the IP device, and is based on a service provider being able to provide an E911 service including a location-identification service at the current geographic location of the IP device.
Abstract:
Example methods disclosed herein include, in response to receiving a first message associated with a first registration request for a device, determining whether the device is currently assigned to a first call processor and performing a load balancing procedure to reassign the device to one of a plurality of call processors including the first call processor, the load balancing procedure to bias reassignment to the first call processor in response to the device being determined to be currently assigned to the first call processor. Such example methods further include, in response to receiving a second message associated with a second registration request for the device, causing the first call processor to de-register the device in response to determining that the second message is associated with a pending reassignment of the device from the first call processor to a second call processor included in the plurality of call processors.
Abstract:
A method and apparatus for managing an overload condition in a network are disclosed. For example, the method monitors the network for a traffic overload condition, and determines whether a more severe traffic overload condition or a less severe traffic overload condition is detected by using a network monitor and controller. The method then selects using a network monitor and controller agent in response to a command from the network monitor and controller, a different bandwidth preservation scheme if the more severe traffic overload condition or the less severe traffic overload condition is detected, wherein the different bandwidth preservation scheme is based on a selection of a codec type and is applied to a portion of the traffic.