摘要:
An apparatus and method are disclosed that enable a terminal such as a computer-based softphone to retrieve and handle, transparently for its user, the voicemail that has been left by calling parties who called the user's cell-phone number. Furthermore, the softphone is able to integrate the presentation to its user of the voicemail associated with the cell phone with the voicemail that has been left by calling parties who called the softphone itself. The softphone features both i) a personal area network interface that is used to communicate directly with the cell phone and ii) a local area network interface that is used to retrieve the cell-phone voicemail from a voicemail system. Once the softphone is paired with the cell phone, the softphone is able to retrieve signals directly from the cell phone and, based on those signals, retrieves the voicemail from the cell phone's voicemail system.
摘要:
A system is disclosed that enables the estimation of the location of a wireless terminal in a wireless network. The illustrative embodiment works without requiring modifications to be made to the wireless terminal. Furthermore, the hardware of some embodiments of the present invention can be inexpensively deployed indoors. Some embodiments of the present invention are, therefore, ideally suited for use with legacy indoor systems. The system of the illustrative embodiment of the present invention, in some embodiments, uses an offline process and an online process for location estimation. The described system, however, can be used with other techniques for location estimation.
摘要:
A technique is disclosed that attempts to improve the evaluation of a network path's signal quality, as well as the selection of a network path for transmission purposes, without some of the costs and disadvantages of doing so in the prior art. In accordance with the illustrative embodiment, a node with access to the packet network, such as a VoIP telephone endpoint, evaluates the quality of service that is associated with each of multiple network paths. The evaluation process is iterative, in which the number of candidate paths is successively reduced from one iteration of the technique to the next. The multiple paths that remain as candidates in any given iteration are evaluated concurrently and at an evaluation bit rate that i) is less than the full transmission rate of the real-time traffic (VoIP) packets to be sent and ii) varies as a function of the number of candidate paths remaining under consideration.
摘要:
A method and apparatus are disclosed that seek to improve the quality of service that is experienced during the transmission of a stream of packets across one or more paths. In particular, a transmitting node encodes a source stream of data (e.g., audio, video, etc.) into one or more sub-streams, and distributes those sub-streams onto multiple network transmission paths. In accordance with the illustrative embodiment of the present invention, the transmitting node evaluates the quality of service of a first network path that fails to provide a quality-of-service guarantee. When the quality of service of the first network path becomes unsatisfactory, the coding of one or more sub-streams that are being transmitted on a second network path is adjusted. In other words, the coding on a second channel is adjusted in response to the changing conditions on a first channel.
摘要:
A method that seeks to provide a satisfactory quality of service for a stream of packets through a network. The illustrative embodiment of the present invention seeks to provide a satisfactory quality of service for a stream of packets by periodically or sporadically evaluating one or more alternative paths through the network and by sending the packets through a path with an acceptable quality of service. Normally, neither the source node nor any other node in a packet's path controls its route after it has left the node. In contrast, the illustrative embodiment of the present invention has the capability to affect the packet's path through the network by sending the packet to an intermediate or “ricochet” node in the network, which forwards the packet to the destination node. In effect, the source node can, if it deems appropriate, ricochet the packet off of the intermediate node rather than allowing the packet to take its normal direct path through the network.
摘要:
A method and apparatus are disclosed for estimating the location of a wireless terminal across multiple building floors. The illustrative embodiment determines the floor where the wireless terminal is presently located by using a majority logic-based heuristic. A plurality of signal monitors measure signals from the wireless terminal and provide those signal strength measurements to a location estimation server. Alternatively, the wireless terminal measures signals that are transmitted by a plurality of transmitting signal devices and provides those signal strength measurements to a location estimation server. The location estimation server determines the floor of the wireless terminal in accordance with the illustrative embodiment of the present invention.
摘要:
A method and apparatus are disclosed for redirecting traffic associated with an application so that the traffic advantageously traverses (or “hairpins”) through an application-layer gateway. Because the present invention advantageously redirects traffic without any participation by routers, no changes to or replacement of routers in a network is required. The illustrative embodiment is disclosed in the context of Internet telephony, but is also applicable to other kinds of applications and types of communication (e.g., Internet Protocol Television [IPTV], instant messaging [IM], videoconferencing, etc.)
摘要:
A method and apparatus are provided for obtaining a signal strength model for an access point at an arbitrary location, q, at a site. Signal strength measurements are obtained for each of n sampling points; the signal strength received at the arbitrary location, q, is computed from each of the sampling points (for example, using reciprocity principles); signal strength estimates corresponding to the signal received at the sampling points from the arbitrary location are computed; and a signal strength model is determined for an access point positioned at the arbitrary location, q.
摘要:
A method and apparatus are provided for authenticating the contents of a device requesting access to a first network, such as an enterprise network. If a device has connected to at least one other network then the content of the device is evaluated prior to obtaining access. The scope of the content evaluation may be based, for example, on properties of the other network or on one or more defined content authentication rules. If a device attempts to access a network, the content of the device is evaluated and the device may be restricted to accessing only one or more restoration services if the content fails to satisfy one or more predefined criteria, such as a content item that is out of date or a determination that the device connected to one or more external networks. The restoration service(s) can update a content item that is out of date, reinstall one or more programs or return configuration settings to default values.
摘要:
A technique is disclosed that enables telecommunications endpoints to conveniently share the addressing information—that is, the Uniform Resource Identifiers (URI)—of documents that are available on the World Wide Web. In particular, a server is used to provide a bookmark service. The server acts as a repository of tag-URI pairs, in which each tag functions as a shorthand label for the corresponding URI. In the disclosed technique, a first user creates the tag for the intended URI by assigning a keyword to represent the URI as part of a bookmark tag-URI pair that the server stores. The created tag is presumably shorter than the URI that it represents, making the tag more convenient to use. A second user is then able to retrieve and use the URI by specifying the tag to the bookmark server. In essence, the technique of the illustrative embodiment enables the sharing of Web documents by sharing the bookmarks to those documents.