Abstract:
A system that incorporates teachings of the present disclosure may utilize, for example, a method involving receiving from a first communication device a service request while providing back-up services to an out-of-service network element, detecting a deficiency in call state information to process the service request, transmitting to the first communication device an error message that prevents termination of an active Internet Protocol (IP) communication path between the first communication device and a second communication device, and receiving from the first communication device a request for an alternate IP communication path for communicating between the first and second communication devices which resolves the deficiency in call state information. Additional embodiments are disclosed.
Abstract:
Methods and apparatus for intrusion protection in systems that monitor for improper network usage are disclosed. An example method to protect a service platform comprises detecting responses from the service platform indicative of questionable signaling protocol transactions. The example method further comprises storing transaction records corresponding to questionable signaling protocol transaction records with at least one of the transaction records identifying a signaling protocol message including an associated originating device address corresponding to a respective questionable transaction record. Additionally, the method comprises determining whether the originating device address is associated with an improper intrusion of the service platform based on at least one on the transaction records corresponding to the originating device address.
Abstract:
A mechanism is provided for recovering from a catastrophic failure that results in a large number of user endpoints attempting to come on line simultaneously after an NGN is restored. In an enhanced DNS load balancer, DNS queries from the user end points relating to a particular NGN edge device are selectively dropped if a rate of queries for the particular edge device suddenly increases or exceeds a threshold. The query dropping may also be based in part on the class of service assigned to the user endpoint.
Abstract:
A method that incorporates teachings of the present disclosure may include, for example, receiving an assignment to provide communication services to a communication device, supplying a first telephone number mapping system of a first internet protocol multimedia subsystem communication system with contact information of the communication device and a serving call session control function operating in the first internet protocol multimedia subsystem communication system, supplying a second telephone number mapping system of a second internet protocol multimedia subsystem communication system with contact information of the communication device and the serving call session control function, and receiving a session initiation protocol INVITE from an originating serving call session control function of the second internet protocol multimedia subsystem communication system for establishing communications with the communication device. Additional embodiments are disclosed.
Abstract:
Methods, systems, and computer-readable media for ensuring data integrity during data synchronization are provided. According to one method, a number of originating requests from a plurality of user endpoints are monitored across a network. A determination is made whether the number of originating requests is below a first threshold. Responsive to determining that the number of originating requests is below the first threshold, probe messages are transmitted to at least a portion of the plurality of user endpoints across the network. A number of the user endpoints that return probe replies in response to the probe messages are monitored. A determination is made whether the number of the user endpoints is below a second threshold. Responsive to determining that the number of the user endpoints is below the second threshold, a report is made to a database that the network is unavailable, thereby causing the database to stop updating time stamps.
Abstract:
A system for improving operations in an Internet Protocol Multimedia Subsystem (IMS) network is provided. A system that incorporates teachings of the present disclosure may include, for example, a Telephone Number Mapping (ENUM) system having a controller element to receive from a terminating Serving Call Session Control Function (S-CSCF) first contact information for a communication device and second contact information for the terminating S-CSCF. Additional embodiments are disclosed.
Abstract:
A method of monitoring a network is disclosed and includes receiving an enrollment message at a heartbeat manager from a heartbeat agent associated with a first application stored at a first network entity. The method also includes automatically associating a heartbeat interval with the first application based at least partially on the enrollment message. In another embodiment, a system of monitoring a network is disclosed and includes a network entity having processing logic and memory accessible to the processing logic. The memory stores an application including a heartbeat agent portion having instructions executable by the processing logic to enroll with a heartbeat management server communicating with the network entity and including a heartbeat monitor including instructions to subscribe to notifications indicating an operational status of an application residing at a second network entity.
Abstract:
System(s) and method(s) are provided for regulating interaction amongst an application layer and a control layer in a packet-based core network. A data structure is provisioned in a centralized repository; the data structure includes (i) at least one procedure for regulating interaction amongst a session control component within the control layer and application server within the application layer, and (ii) an identification (ID) field attribute that uniquely identifies the data structure. To regulate such interaction, the session control component acquires a set of provisioned data structures; acquisition is automatic and can be dictated, in part, by generation of a data structure, or modification of an existing data structure or an ID field attribute. Based at least on an ID field attribute retained in a subscriber service profile, the session control component references a data structure identified by the ID field attribute and implements one or more procedures retained in such data structure. Implementation of the one or more procedure regulates the interaction between the session control component and the application server.
Abstract:
A system and methodology that facilitates improving performance of a Home Subscriber Server (HSS) during overload conditions, by embedding a unique Application Session Identifier (app session ID) within multiple requests associated with a single call processing session is provided. Moreover, the system includes an overload protection component that identifies whether an incoming request is associated with previously processed requests based in part of the app session ID embedded within the incoming request. When the HSS is overloaded, the incoming requests that initiate a new call processing session and are not associated with previously processed requests are rejected/dropped before incoming requests that are associated with requests that have been previously processed.
Abstract:
A mechanism controls global synchronization, or registration floods, that may result when a large number of endpoints in a Voice over Internet Protocol (VoIP) network such as an Internet Protocol Multimedia Subsystem (IMS) come online simultaneously after a catastrophic failure. The mechanism allows the Domain Name System (DNS) infrastructure to efficiently control the overload condition by registering user end points with backup border elements, and by staggering and by randomizing the time-to-live (TTL) parameter in registrations with backup border elements.