Abstract:
Methods and apparatus to provide data network services to a non-registering endpoint are disclosed herein. A disclosed method includes, transmitting, by executing an instruction with a processor, information identifying the non-registering endpoint and a first list identifying a plurality of proxy-call session control functions to a plurality of serving-call session control functions, the plurality of proxy-call session control functions being statically assigned to process calls to the non-registering endpoint when selected by any of the plurality of serving-call session control functions. In the disclosed example method, the non-registering endpoint is unable to register with any data network. The first list can be provided to the plurality of serving-call session control functions in response to an event. Methods also include providing the data network service to the non-registering endpoint via one of the plurality of serving-call session control functions and a selected one of the plurality of proxy-call session control functions.
Abstract:
A separate domain selection function is utilized as the first function in a communication path for a communication that is to be connected to a user device registered in a first network or a second network. If a result of the domain selection function indicates call control should be maintained by first network (e.g., user device is registered with first network or a network with which first network has a control relationship), call control of the communication remains with first network. If the result of the domain selection function indicates the user device is registered with second network, call control is suspended by the first network, which allows the communication to bypass the first network.
Abstract:
A separate domain selection function is utilized as the first function in a communication path for a communication that is to be connected to a user device registered in a first network or a second network. If a result of the domain selection function indicates call control should be maintained by first network (e.g., user device is registered with first network or a network with which first network has a control relationship), call control of the communication remains with first network. If the result of the domain selection function indicates the user device is registered with second network, call control is suspended by the first network, which allows the communication to bypass the first network.
Abstract:
Efficient processing and/or routing of emergency calls in an IMS (IP Multimedia Subsystem) for VoIP (Voice over IP) subscribers can be enabled. In one aspect, an E911 profile is generated, for example, by an application server, for each VoIP subscriber based in part on current location information associated with the subscriber, such as, the subscriber's IP address. The E911 profile is pushed to the HSS (Home Subscriber Server) of the IMS. The E911 profile can then be stored in the HSS and can be queried by an E-CSCF (Emergency Call Session Control Function) during emergency call processing. Moreover, when an emergency call is received from the subscriber, the E-CSCF can retrieve the E911 profile associated with the subscriber from the HSS and route the call to an appropriate PSAP (Public Safety Answering Point) based on an analysis of the information in the E911 profile.
Abstract:
A method for determining an amount of time required to download a data file to a wireless device includes receiving information indicating a first amount of wireless bandwidth allocated for the download of the data file, calculating a first length of time required to download the data file to the wireless device based on the first amount of wireless bandwidth allocated, and comparing the first length of time required to a predetermined amount of time. If the first length of time required is less than the predetermined amount of time, the download begins. If the first length of time required is more than the predetermined amount of time, information indicating the first length of time required is sent to the wireless device, a start download signal is received from the wireless device, and download of the data file to the wireless device begins in response to the start download signal.
Abstract:
Aspects of the subject disclosure may include, for example, generating prioritized lists of OTT applications for end user devices, exchanging or otherwise providing the prioritized list(s) to enable analysis and comparison resulting in a selection of an OTT application, and establishing a communication service via the selected OTT application between the end user devices. Other embodiments are disclosed.
Abstract:
A method for bundling network functions as a single microservice in a cloud environment. A service deployment manager may acquire subscriber location information associated with a subscriber or a subscriber profile associated with the subscriber. Moreover, the service deployment manager may utilize the subscriber location information or the subscriber profile to select a cloud location. For example, the cloud location may be based on load, geographical proximity, service profile, etc.
Abstract:
A method for bundling network functions as a single microservice in a cloud environment. A service deployment manager may acquire subscriber location information associated with a subscriber or a subscriber profile associated with the subscriber. Moreover, the service deployment manager may utilize the subscriber location information or the subscriber profile to select a cloud location. For example, the cloud location may be based on load, geographical proximity, service profile, etc.
Abstract:
A system that incorporates teachings of the subject disclosure may include, for example, capturing images that are associated with a video conference communication session, obtaining a video conference policy associated with the video conference communication session, applying object pattern recognition to the images to detect an object in the images, and retrieve first replacement image content according to the video conference policy. The images can be adjusted by replacing a first portion of the images other than the detected object with the first replacement image content to generate first adjusted video content. The first adjusted video content can be provided to the first recipient communication device via the video conference communication session. Non-adjusted video content can be provided according to the video conference policy to the second recipient communication device via the video conference communication session. Other embodiments are disclosed.
Abstract:
A system that incorporates teachings of the subject disclosure may include, for example, capturing images that are associated with a video conference communication session, obtaining a video conference policy associated with the video conference communication session, applying object pattern recognition to the images to detect an object in the images, and retrieve first replacement image content according to the video conference policy. The images can be adjusted by replacing a first portion of the images other than the detected object with the first replacement image content to generate first adjusted video content. The first adjusted video content can be provided to the first recipient communication device via the video conference communication session. Non-adjusted video content can be provided according to the video conference policy to the second recipient communication device via the video conference communication session. Other embodiments are disclosed.