Abstract:
Network servers in a session initiation protocol (SIP) telecommunication network implement playback of announcements to end-users by embedding programming scripts defining how the announcements are to be played in a SIP message. In particular, the scripts may define the sequence in which a series of announcements are to be played, duration information relating to a playback length of the announcements, and repetition information defining how many times an announcement is to be repeated. By including a script in a single message, announcement instructions may be efficiently communicated in the network.
Abstract:
A network architecture includes a communication network that supports one or more network-based Virtual Private Networks (VPNs). The communication network includes a plurality of boundary routers that are connected by access links to CPE edge routers belonging to the one or more VPNs. To prevent traffic from outside a customer's VPN (e.g., traffic from other VPNs or the Internet at large) from degrading the QoS provided to traffic from within the customer's VPN, the present invention gives precedence to intra-VPN traffic over extra-VPN traffic on each customer's access link through access link prioritization or access link capacity allocation, such that extra-VPN traffic cannot interfere with inter-VPN traffic. Granting precedence to intra-VPN traffic over extra-VPN traffic in this manner entails partitioning between intra-VPN and extra-VPN traffic on the physical access link using layer 2 multiplexing and configuration of routing protocols to achieve logical traffic separation between intra-VPN traffic and extra-VPN traffic at the VPN boundary routers and CPE edge routers. By configuring the access networks, the VPN boundary routers and CPE edge routers, and the routing protocols of the edge and boundary routers in this manner, the high-level service of DoS attack prevention is achieved.
Abstract:
In one embodiment of the invention, a network system includes a boundary router, a second router, and an upstream link of the second router coupled between to the output port of the boundary router and an input port of the second router. The second router includes an admission control function and a data plane. In response to a request to reserve resources for a flow through the second router, the admission control function performs admission control for both the upstream link and its downstream link. In a preferred embodiment, the second router performs admission control for the upstream link only if the second router is a receiving edge router for the flow. Because the second router performs admission control for its upstream link, the boundary router transmits the request toward an upstream router without performing admission control for the link.
Abstract:
In one embodiment, a network system of the present invention includes at least a first router and a second router coupled to an upstream link to permit data flow from the first router to the second router across the upstream link. The second router includes a control plane and a data plane having an input port coupled to the upstream link and an output port connectable to a downstream link. The control plane includes a virtual pool having a capacity corresponding to a resource capacity of the first router and an admission control function. In response to a request to reserve resources for a flow through the data plane from the input port to the output port, the admission control function performs admission control for the upstream link by reference to resource availability within the virtual pool. In one embodiment, the request is a request to reserve resources for an Integrated Services flow, and the capacity of the virtual pool corresponds to a resource capacity of a Integrated Services service class supported by the first router.
Abstract:
In the context of a communications system, means are disclosed for ensuring that invocation of redirect features, such as call forwarding, do not circumvent call blocking settings. User profile information associated with a party controls the invocation of features for the party and controls the screening of redirect contacts resulting from feature invocation. The behavior of feature-associated contact screening for the party is configurable independently of the originating calling permissions of the party.
Abstract:
An intelligent telephone set is disclosed that includes a caller-ID circuit that extracts a call identifier from an incoming call. A call processing circuit in communication with the caller-ID circuit assigns the incoming call to a caller category associated with the call identifier. Subsequently, it selects a call processing action corresponding to the caller category and processes the incoming call using the selected call processing action. The intelligent telephone set allows users to set criteria for receiving and processing calls based on CID data. One such call processing action is to use CID data to forward an incoming call to a predetermined location.
Abstract:
A virtual private network includes an internet protocol (IP) network and a public switched telephone network (PSTN). An enterprise gateway is operably connected to the IP network. The enterprise gateway is operably connected to a switch of the PSTN through a direct access line (DAL). The set-up signaling for virtual private network calls and the calls themselves are transported across the internet protocol network and the public switched telephone network through the direct access line.