Abstract:
Concepts and technologies are disclosed herein for message flow management for virtual networks. A processor can identify a target virtual network function instance that is to be taken offline. The processor can change a status associated with the target virtual network function instance to indicate it being taken offline. The processor can start a graceful shutdown timer to trigger shutdown of the target virtual network function instance. The processor can identify external interfaces and a peer network function that identifies the target virtual network function instance as a next hop. The processor can obtain, for the target virtual network function instance and the peer network function instance, a snapshot that identifies configuration data for the target virtual network function instance and the peer network function instance and can generate a command to trigger a shutdown of the target virtual network function instance.
Abstract:
A method and apparatus for controlling a call volume for an office that serves as a protecting site for another office in a packet network are disclosed. For example, the method collects one or more customer registration counts from one or more session border controllers located in a first office, determines if the one or more customer registration counts have reached or exceeded a threshold. The method directs all of said one or more session border controllers located in said first office to enact one or more throttling rules if the one or more customer registration counts have reached or exceeded the threshold.
Abstract:
Methods and apparatus to provide voice communication inoperative condition notifications are disclosed. An apparatus includes an error capture to: access first and second notifications received from a voice over internet protocol processor, the first notification associated with a first voice over internet protocol user and the second notification associated with a second first voice over internet protocol user and a notifier to: determine a voice over internet protocol user identifier associated with a first notification; determine a video distribution system user identifier associated with the voice over internet protocol user identifier; and transmit a third notification to the video distribution system, the third notification instructing the video distribution system to cause an indication of the first notification to be presented on a video presentation device associated with the video distribution system user identifier.
Abstract:
Concepts and technologies are disclosed herein for message flow management for virtual networks. A processor can identify a target virtual network function instance that is to be taken offline. The processor can change a status associated with the target virtual network function instance to indicate it being taken offline. The processor can start a graceful shutdown timer to trigger shutdown of the target virtual network function instance. The processor can identify external interfaces and a peer network function that identifies the target virtual network function instance as a next hop. The processor can obtain, for the target virtual network function instance and the peer network function instance, a snapshot that identifies configuration data for the target virtual network function instance and the peer network function instance and can generate a command to trigger a shutdown of the target virtual network function instance.
Abstract:
Methods and apparatus to provide voice communication inoperative condition notifications are disclosed. An apparatus includes an error capture to: transmit a request to a voice over internet protocol processor that serves a first voice over internet protocol user and a second voice over internet protocol user, the request indicating that the error capture is to be subscribed to receive voice over internet protocol notifications from the voice over internet protocol processor; and a notifier to: determine a voice over internet protocol user identifier associated with a first notification; determine a video distribution system user identifier associated with the voice over internet protocol user identifier; and transmit a third notification to the video distribution system, the third notification instructing the video distribution system to cause an indication of the first notification to be presented on a video presentation device associated with the video distribution system user identifier.
Abstract:
An example apparatus includes a memory and a call session controller. The memory is to store a first public user identifier in association with a first nomadic service designator and a first operating mode designator, and to store a second public user identifier in association with a second nomadic service designator and a second operating mode designator. The call session controller is to determine whether a first call using the first public user identifier is eligible to be established based on the first nomadic service designator and the first operating mode designator, and determine whether a second call using the second public user identifier is eligible to be established based on the second nomadic service designator and based on the second operating mode designator.
Abstract:
A method and apparatus for managing an overload condition in a network are disclosed. For example, the method monitors the network for a traffic overload condition, and determines whether a more severe traffic overload condition or a less severe traffic overload condition is detected by using a network monitor and controller. The method then selects using a network monitor and controller agent in response to a command from the network monitor and controller, a different bandwidth preservation scheme if the more severe traffic overload condition or the less severe traffic overload condition is detected, wherein the different bandwidth preservation scheme is based on a selection of a codec type and is applied to a portion of the traffic.
Abstract:
A method and apparatus for controlling a call volume for an office that serves as a protecting site for another office in a packet network are disclosed. For example, the method collects one or more customer registration counts from one or more session border controllers located in a first office, determines if the one or more customer registration counts have reached or exceeded a threshold. The method directs all of said one or more session border controllers located in said first office to enact one or more throttling rules if the one or more customer registration counts have reached or exceeded the threshold.
Abstract:
Example methods disclosed herein include, in response to receiving a first message associated with a first registration request for a device, determining whether the device is currently assigned to a first call processor and performing a load balancing procedure to reassign the device to one of a plurality of call processors including the first call processor, the load balancing procedure to bias reassignment to the first call processor in response to the device being determined to be currently assigned to the first call processor. Such example methods further include, in response to receiving a second message associated with a second registration request for the device, causing the first call processor to de-register the device in response to determining that the second message is associated with a pending reassignment of the device from the first call processor to a second call processor included in the plurality of call processors.
Abstract:
Concepts and technologies are disclosed herein for message flow management for virtual networks. A processor can identify a target virtual network function instance that is to be taken offline. The processor can change a status associated with the target virtual network function instance to indicate it being taken offline. The processor can start a graceful shutdown timer to trigger shutdown of the target virtual network function instance. The processor can identify external interfaces and a peer network function that identifies the target virtual network function instance as a next hop. The processor can obtain, for the target virtual network function instance and the peer network function instance, a snapshot that identifies configuration data for the target virtual network function instance and the peer network function instance and can generate a command to trigger a shutdown of the target virtual network function instance.