摘要:
Session initiation protocol (SIP) control traffic routing decisions, such as rapid failure detection and recovery mechanisms, are based on detection of events and/or conditions that may result in suboptimal performance. The disclosed approach ensures that the SIP traffic is routed or rerouted on an optimal basis. Sample inputs to the SIP routing decisions, include integration with BFD, system metrics and other criteria to determine network and systems conditions, for dynamic decisions on where to optimally route SIP traffic. Examples leverage the B2BUA model, which maintains call state and participates in call processing, however, the examples introduce an improved routing model that is able to not only reroute SIP traffic based on failures but also upon the detection of other suboptimal conditions, e.g. excessive cost. The exemplary techniques provide significant savings by ensuring SIP peering decisions are automatically performed considering costs of peering arrangements, congestion and/or other criteria.
摘要:
Session initiation protocol (SIP) control traffic routing decisions, such as rapid failure detection and recovery mechanisms, are based on detection of events and/or conditions that may result in suboptimal performance. The disclosed approach ensures that the SIP traffic is routed or rerouted on an optimal basis. Sample inputs to the SIP routing decisions, include integration with BFD, system metrics and other criteria to determine network and systems conditions, for dynamic decisions on where to optimally route SIP traffic. Examples leverage the B2BUA model, which maintains call state and participates in call processing, however, the examples introduce an improved routing model that is able to not only reroute SIP traffic based on failures but also upon the detection of other suboptimal conditions, e.g. excessive cost. The exemplary techniques provide significant savings by ensuring SIP peering decisions are automatically performed considering costs of peering arrangements, congestion and/or other criteria.
摘要:
A data call between at least two internetworked computers is established using a central server. Once the data call is in place, prerecorded motion video is shared between the two computers by creating a streaming video server on one user's computer for streaming the prerecorded motion video simultaneously to both users as clients of the streaming server. Either user can pause, rewind, or fast forward the streamed video as it is viewed by both users.
摘要:
A method for enabling security on a mobile terminal having a communication link with a circuit switched network against suspicious activities is provided. Activities performed at the mobile terminal are performed according to a security policy provided from the circuit switched network. Detection of a suspicious activity is alerted to the circuit switched network when the suspicious activity is detected. A policy manager server of the circuit switched network changes the security policy to cure the suspicious activity on the mobile terminal. Call traffic delivered to/sent from the mobile terminal is filtered out, which causes the suspicious activity according to the security policy. The mobile terminal enforces a security measure on a suspicious activity according to the security policy.
摘要:
Methods and systems for allocating computer-network resources among a group of network users calculate, for each network user, a worth of that network user based at least on a usage fee paid by that network user and a cost of that network user based at least on a network bandwidth consumed by that network user. For each network user, a worth-to-cost ratio based on the worth and cost of that network user may be computed. A group of high-value network users and a group of low-value network users may be identified such that each high-value network user has a higher worth-to-cost ratio than that of each low-value network user. Preferential access to a network resource is provided to the group of high-value network users relative to an access provided to the group of low-value network users.
摘要:
A method and system for compensating for offsets when measuring parameters of a phase-locked loop (PLL). In one embodiment, a proportional path in the PLL is temporarily shut off, a measurement is made of a real time-to-zero crossing in the PLL to measure a defined parameter of the PLL, the proportional path is switched on, and the defined loop parameter is adjusted based on this measurement. In one embodiment, the real time-to-zero crossing is measured after introducing a phase step into the PLL between a reference signal and an output signal of the PLL. In an embodiment, two phase steps, having opposite polarities, are successively introduced into the PLL, and the time-to-crossing measurements resulting from these two phase steps may be averaged, and this average is used to determine a loop parameter.
摘要:
A method and system for compensating for offsets when measuring parameters of a phase-locked loop (PLL). In one embodiment, a proportional path in the PLL is temporarily shut off, a measurement is made of a real time-to-zero crossing in the PLL to measure a defined parameter of the PLL, the proportional path is switched on, and the defined loop parameter is adjusted based on this measurement. In one embodiment, the real time-to-zero crossing is measured after introducing a phase step into the PLL between a reference signal and an output signal of the PLL. In an embodiment, two phase steps, having opposite polarities, are successively introduced into the PLL, and the time-to-crossing measurements resulting from these two phase steps may be averaged, and this average is used to determine a loop parameter.
摘要:
A phase adjustment apparatus and method adjusts phase or timing bias of a sample clock in a data receiver system by determining a time adjustment value as a function of equalizer feedback. The time adjustment value is then applied to a device capable of adjusting a timing bias of a sample clock.
摘要:
A method for enabling security on a mobile terminal having a communication link with a circuit switched network against suspicious activities is provided. Activities performed at the mobile terminal are performed according to a security policy provided from the circuit switched network. Detection of a suspicious activity is alerted to the circuit switched network when the suspicious activity is detected. A policy manager server of the circuit switched network changes the security policy to cure the suspicious activity on the mobile terminal. Call traffic delivered to/sent from the mobile terminal is filtered out, which causes the suspicious activity according to the security policy. The mobile terminal enforces a security measure on a suspicious activity according to the security policy.
摘要:
Clock synchronization and data recovery techniques are disclosed. For example, a technique for synchronizing a clock for use in recovering received data comprises the following steps/operations. A first clock (e.g., a data clock) is set for a first sampling cycle to a first phase position within a given unit interval in the received data. A second clock (e.g., a sweep clock) is swept through other phase positions with respect to the first phase position such that a transition from the given unit interval to another unit interval in the received data is determined. A sampling point is determined based on measurements at the phase positions associated with the second clock. The second clock is set to the phase position corresponding to the sampling point such that data may be recovered at that sampling point. Further, for a next sampling cycle, the first clock may be used to sweep through phase positions with respect to the set phase position of the second clock corresponding to the sampling point in the first sampling cycle such that a next sampling point may be determined.