Abstract:
A technique is discloses that enables a first telecommunications terminal, wireless or otherwise, to report to its user whether a second, wireless telecommunications terminal is receiving the first terminal's packet stream transmissions at a satisfactory quality level. The second terminal receives the packet stream that conveys the media waveform transmitted by the first terminal. The media waveform can be that of the speech signal of the first terminal's user. The second terminal measures a trait of the received signal and encodes the measurement data into the packet stream that the second terminal is already transmitting to the first terminal. The first terminal then decodes the measurement data from the received second stream and presents, to its user, a quality indication that is based on the measurement data. In doing so, the first terminal provides its user with a better idea of whether the second terminal has reliably received the user's communication.
Abstract:
A global identifier is generated based on the initiation of a communication session in a network. The global identifier is sent during the initiation of the communication session. For example, in a Session Initiation Protocol (SIP) INVITE, the global identifier is passed as the communication session progresses across the network. The communication session is logged based on the global identifier in a communication log. A map of the communication session is built from the session log based on the global identifier. The map includes all the elements that were involved with the communication session.In another embodiment, the global identifier is used to for a communication session that is sent across multiple disparate networks. The global identifier is passed in-band during the establishment of the communication session across the disparate networks.
Abstract:
Disclosed herein are systems, methods, and computer-readable storage media for managing a packet network to deal with a problem of dropped audio packets. A triggering event signal indicates that audio marked packet traffic in the packet network has exceeded a capacity limit. Upon receiving the triggering event signal, a transmitting device transmits audio packets marked as non-audio packets through the packet network. The transmitting device, for example, is a VoIP telephone. The triggering event signal, for example, is generated when the audio marked packet traffic exceeds a dropped packet threshold, or when monitoring of audio marked packet traffic indicates that audio marked packet traffic approaches a committed data rate (CDR) threshold.
Abstract:
A global identifier is generated based on the initiation of a communication session in a network. The global identifier is sent during the initiation of the communication session. For example, in a Session Initiation Protocol (SIP) INVITE, the global identifier is passed as the communication session progresses across the network. The communication session is logged based on the global identifier in a communication log. A map of the communication session is built from the session log based on the global identifier. The map includes all the elements that were involved with the communication session. In another embodiment, the global identifier is used to for a communication session that is sent across multiple disparate networks. The global identifier is passed in-band during the establishment of the communication session across the disparate networks.
Abstract:
Disclosed herein are systems, methods, and computer-readable storage media for managing a packet network to deal with rogue applications that produce non-audio packets marked as audio packets. The system analyzes packet flow through the network to identify an unauthorized source of non-audio packets marked as audio packets, and upon identifying the unauthorized source, the system stops subsequent unauthorized transmission of non-audio packets marked as audio packets from the identified unauthorized source. For example, such an unauthorized source is identified by finding that an audio marked packet has a source address that is not found on a list of authorized sources, or by detecting atypical patterns of audio queue utilization, or by determining whether audio marked packets from a source exceed a threshold value related to transmission of audio marked packets.