摘要:
A method enables a participant in a conference call to monitor, as he is speaking, whether his speech is getting through to the other participants. A teleconference bridge receives audio signals from a group of telecommunications endpoints that are involved in a conference call. The bridge generates audio signals to be transmitted, which are based on one or more of the received audio signals. During the ongoing process of minimizing the presence of acoustic echo, the bridge might exclude one or more of the received audio signals from the transmitted audio signals. When this occurs, particularly when an active talker is being excluded, the bridge transmits an indication to one or more of the endpoints as part of one of the transmitted audio signals. The indication can be audible such as a tone or a voice, visual such as a flashing light, or tactile such as vibration.
摘要:
A network condition capture and reproduction technique captures measurement data characterizing network conditions at a given time between first and second endpoint devices of a network, and utilizes the captured measurement data in a network impairment device to reproduce the network conditions at a later time and possibly in a different place.
摘要:
Disclosed herein are systems, methods, and computer-readable storage media for managing a packet network to deal with a problem of dropped audio packets. A triggering event signal indicates that audio marked packet traffic in the packet network has exceeded a capacity limit. Upon receiving the triggering event signal, a transmitting device transmits audio packets marked as non-audio packets through the packet network. The transmitting device, for example, is a VoIP telephone. The triggering event signal, for example, is generated when the audio marked packet traffic exceeds a dropped packet threshold, or when monitoring of audio marked packet traffic indicates that audio marked packet traffic approaches a committed data rate (CDR) threshold.
摘要:
A technique for ensuring that a node that carries high-priority protocol data units and low-priority protocol data units is properly configured to accord the high-level protocol data units priority treatment is described. In accordance with the illustrative embodiment, two streams of protocol data units are transmitted through a node to be tested. One stream comprises high-priority protocol data units, and the second stream comprises low-priority protocol data units. The processing capabilities of the node are then burdened by increasing the frequency of protocol data units transmitted to it, so that the node is compelled to treat the two streams differently, if, in fact, it is properly configured to treat them differently. If the node treats the two streams differently and accords the high-priority stream higher priority, then the node is properly configured. Otherwise, the node is re-configured to accord the high-priority stream higher priority.
摘要:
A network analyzer gets configuration information, usually in the form of a configuration packet sent from a network monitor. The configuration information comprises a second device network address and a third device network address. The second device network address is that of the network monitor and the third device network address is that of a communication device that is to be monitored.When the network analyzer sees packets from the monitored communication device, it can send the results to the network monitor for analysis without having to be configured with a unique network address. The network analyzer sends an original packet using the network address of the communication device as the source address and using the network address of the network monitor as the destination address.
摘要:
A system for monitoring traffic on a network first discovers the network so as to map the various devices and links in the network. Statistics are then gathered from various points in the network relating to quality of service, and especially loads on the network devices. Synthetic calls are generated at selected points of the network while monitoring the network. This data is then stored and displayed in a manner that is easy for the operator to analyze, with more detailed displays being available through the use of a mouse or keystrokes.
摘要:
A technique is disclosed that enables telecommunications endpoints to conveniently share the addressing information—that is, the Uniform Resource Identifiers (URI)—of documents that are available on the World Wide Web. In particular, a server is used to provide a bookmark service. The server acts as a repository of tag-URI pairs, in which each tag functions as a shorthand label for the corresponding URI. In the disclosed technique, a first user creates the tag for the intended URI by assigning a keyword to represent the URI as part of a bookmark tag-URI pair that the server stores. The created tag is presumably shorter than the URI that it represents, making the tag more convenient to use. A second user is then able to retrieve and use the URI by specifying the tag to the bookmark server. In essence, the technique of the illustrative embodiment enables the sharing of Web documents by sharing the bookmarks to those documents.
摘要:
Systems and methods for constructing and maintaining a peer-to-peer overlay graph are disclosed herein. The systems and methods include adding a node to the overlay graph. Adding the node includes choosing an edge that is not connected to the node, breaking the edge and connecting the node to broken edge nodes previously connected to the edge. The process is repeating if additional connections are need and node addition data is stored for the node.
摘要:
Techniques are disclosed for improved monitoring and analysis of VoIP communications, multimedia communications or other types of network traffic in a network-based communication system. In accordance with one aspect of the invention, an endpoint device of the system includes an integrated call synthesis capability. More particularly, the endpoint device is configurable into at least a first mode of operation in which the device responds to one or more commands from a testing server of the system directing the device to participate in a synthetic call or other test communication within the system, and a second mode of operation in which the device is utilizable by a system user to establish an actual communication. Other aspects of the invention relating to kernel timestamping and timestamp post-processing provide improved accuracy for measurements such as jitter, loss and delay.
摘要:
Techniques are disclosed for improved monitoring and analysis of VoIP communications, multimedia communications or other types of network traffic in a network-based communication system. In accordance with one aspect of the invention, endpoint devices of the network-based communication system are configurable so as to collectively implement a distributed monitoring and analysis system which does not require a centralized testing server or other centralized controller. Distributed test units associated with the endpoint devices may be utilized in implementing the distributed monitoring and analysis system, and are preferably configured to support a web-based user interface providing access to measurement data. The endpoint devices may be advantageously organized into a hierarchy comprising a plurality of zones, with each of the endpoint devices belonging to at least one zone. For each zone, one of the endpoint devices may be designated as a zone leader for controlling the periodic generation of communications between selected endpoint devices that belong to subzones of that zone in the hierarchy.