Abstract:
A method is disclosed that enables the transmission of a digital message along with a corresponding media information signal, such as audio or video. A telecommunications device that is processing the information signal from its user, such as a speech signal, encodes the information signal by using a model-based compression coder. One such device is a telecommunications endpoint. Then, based on an evaluation of the perceptual significance of each encoded bit, or on some other meaningful characteristic of the signal, the endpoint's processor: (i) determines which encoded bits can be overwritten; and (ii) intersperses the digital message bits throughout the encoded signal in place of the overwritten bits. The endpoint then transmits those digital message bits as part of the encoded information signal. In this way, no additional bits are appended to the packet to be transmitted, thereby addressing the issue of compatibility with existing protocols and firewalls.
Abstract:
An evaluation of an external course may be based on course-to-requirement mappings that have been previously established for the target institution. As a result of the evaluation, the external course may be mapped to a particular program requirement for a particular student, which allows the external course to fulfill the particular program requirement at the institution for the particular student. The course evaluation may be automatic or may be performed by a human evaluator. Course-to-requirement mappings may be globally-established, and applicable to all students and applicants of the target institution, or may be applicant-specific, and only applicable to the student for which the mapping was established. Information about both globally-established and applicant-specific course-to-requirement mappings that have been previously established for the institution may be used to evaluate an external course for a particular student.
Abstract:
An apparatus and method for detecting potentially-improper call behavior (e.g., SPIT, etc.) are disclosed. The illustrative embodiment of the present invention is based on finite-state machines (FSMs) that represent the legal states and state transitions of a communications protocol at a node during a Voice over Internet Protocol (VoIP) call. In accordance with the illustrative embodiment, a library of FSM execution profiles associated with improper call behavior is maintained. When there is a match between the behavior of a finite-state machine during a call and an execution profile in the library, an alert is generated.
Abstract:
A method is disclosed that enables the screening of unwanted telephone calls, such as voice or video calls, for one or more called parties. In accordance with the illustrative embodiment of the present invention, an anti-SPAM system receives signaling information for one or more telephone calls made to one or more called parties by a calling party. Although the calling party can be a human caller, in a SPAM-over-Internet-Telephony context the calling party can alternatively be a server or other network element that originates SPAM voice calls for advertising purposes; both possibilities are accounted for in the illustrative embodiment. The anti-SPAM system then observes the behavior of the called party or parties that is exhibited in response to receiving the telephone calls. Based on the observed behavior, the anti-SPAM system then updates one or more rules for handling future telephone calls made to the protected called parties.
Abstract:
A technique is disclosed that enables the run-time behavior of a data-processing system to be analyzed and, in many cases, to be predicted. In particular, the illustrative embodiment of the present invention comprises i) transforming the messages that constitute an unstructured log into a numerical series and ii) applying a time-series analysis on the resultant series for the purpose of pattern detection. Indeed, it is recognized in the illustrative embodiment that the problem really is to detect patterns that depict aspects of system behavior, regardless of the textual content of the individual log messages. In other words, by analyzing the totality of the messages in the log or logs—as opposed to looking for pre-defined patterns of the individual messages—system behavior can be mapped and understood. The mapping helps in characterizing the system for the purposes of predicting failure, determining the time required to reach stability during failure recovery, and so forth.
Abstract:
A method is disclosed that enables the avoidance of a processor overload of a telecommunications endpoint device that is susceptible to traffic floods. An enhanced network switch sets the speed on one of its data ports as a specific function of the speeds of the devices that are connected to one or more of its other data ports. This behavior is different from that of network switches in the prior art, in which the data rate of a port in the prior art is auto-negotiated to the highest speed that can be supported by the network elements at either end of the port's connection, regardless of the other devices present. By considering the specific devices that are connected, the enhanced network switch is able to limit the amount of traffic that is directed by an upstream device, such as a router, towards a device with limited processor capability, such as a packet-based phone.
Abstract:
The “what” and “how” of policy-based management is integrated in a single framework that enables a system administrator to specify service-level quality of service (QoS) goals for automatic enforcement. Automatic enforcement of the specified “high-level” QoS goals is realized through the execution of “low-level” rule-based or procedural logic, without the client having to specify the low level logic. Specifically, one embodiment of the invention employs a management server including a graphical interface that allows a user, e.g. a system administrator, to easily specify parameters for service-level QoS goals. A QoS goal is defined by the administrator selecting a client, a service and a QoS expression that specifies the desired service-level QoS. The state of the network is monitored and one or more defined QoS goals are selected for evaluation in a continuous process. The QoS delivered for the selected goal is determined and compared to the desired QoS for the selected QoS goal. Then, prescribed actions are taken or not depending whether the delivered QoS is equal to the selected QoS goal. If not, and the delivered QoS exceeds the selected QoS goal, a set of actions is determined and executed to reduce network resources assigned to the client and service of the selected goal. Similarly, if the delivered QoS is worse than the selected QoS goal, a set of actions is determined and executed to increase network resources assigned to the client and service of the selected goal.
Abstract:
A technique for lessening the likelihood of congestion in a congestible node is disclosed. In the illustrative embodiment, the proxy node resides in the path of the protocol data units en route to a congestible node and the proxy node decides whether to drop protocol data units en route to the congestible node. In some embodiments of the present invention, the proxy node comprises a larger queue for the protocol data units than does the congestible node. The illustrative embodiment of the present invention is useful because it enables the manufacture of “lightweight” nodes without large queues and without the horsepower needed to run an algorithm, such as the Random Early Detection algorithm, for deciding which protocol data units to drop. Furthermore, the illustrative embodiment is useful because it can lessen the likelihood of congestion in legacy nodes.
Abstract:
A technique for lessening the likelihood of congestion in a congestible node is disclosed. In accordance with the illustrative embodiments of the present invention, one node—a proxy node—drops protocol data units to lessen the likelihood of congestion in the congestible node. In some embodiments of the present invention, the proxy node receives a metric of a queue at a congestible node and, based on the metric, decides whether to drop protocol data units en route to the congestible node. In some other embodiments of the present invention, the proxy node estimates a metric of a queue at a congestible node and, based on the metric, decides whether to drop protocol data units en route to the congestible node.
Abstract:
A distributed computing system includes a number of computers, workstations or other computing machines interconnected by a network. A non-interactive process arriving in a host machine of the system is migrated for execution to at least two remote machines. For example, first and second executions of the process may be started on respective first and second remote machines. One of the first and second executions of the process is then used to provide an on-demand checkpoint for the other execution of the process in the event the other execution is terminated, such that an additional execution of the process can be started from the on-demand checkpoint. This on-demand checkpointing is augmented with periodic checkpointing performed on at least one of the multiple executions of the process. The period of the periodic checkpointing for a given execution of the process may be fixed without regard to the status of the on-demand checkpointing for that execution, or alternatively may be reset each time an on-demand checkpoint is taken for that execution.