摘要:
The present invention is directed to a secondary communication server 216 for assuming control of a communication formerly controlled by a primary communication server 212 in the event of a failure, comprising:(a) an input operable to (i) receive, from a first communication node 204a, first communication information, wherein the first communication information is associated with the communication and comprises a first node identifier 236a and/or a communication identifier 240a, the first node identifier 236a is associated with a second communication node 204b, the communication identifier is associated with the communication, and the second communication node 204b comprises second communication information associated with the communication and (ii) thereafter receive, from the second communication node 204b, the second communication information; and(b) a reconstruction agent 228 operable to identify the second communication information based on the first node identifier 236a and/or communication identifier 240a.
摘要:
The present invention is directed to a secondary communication server 216 for assuming control of a communication formerly controlled by a primary communication server 212 in the event of a failure, comprising: (a) an input operable to (i) receive, from a first communication node 204a, first communication information, wherein the first communication information is associated with the communication and comprises a first node identifier 236a and/or a communication identifier 240a, the first node identifier 236a is associated with a second communication node 204b, the communication identifier is associated with the communication, and the second communication node 204b comprises second communication information associated with the communication and (ii) thereafter receive, from the second communication node 204b, the second communication information; and (b) a reconstruction agent 228 operable to identify the second communication information based on the first node identifier 236a and/or communication identifier 240a.
摘要:
The present invention is directed to a secondary communication server 216 for assuming control of a communication formerly controlled by a primary communication server 212 in the event of a failure, comprising: (a) an input operable to (i) receive, from a first communication node 204a, first communication information, wherein the first communication information is associated with the communication and comprises a first node identifier 236a and/or a communication identifier 240a, the first node identifier 236a is associated with a second communication node 204b, the communication identifier is associated with the communication, and the second communication node 204b comprises second communication information associated with the communication and (ii) thereafter receive, from the second communication node 204b, the second communication information; and (b) a reconstruction agent 228 operable to identify the second communication information based on the first node identifier 236a and/or communication identifier 240a.
摘要:
The present invention is directed to a secondary communication server 216 for assuming control of a communication formerly controlled by a primary communication server 212 in the event of a failure, comprising: (a) an input operable to (i) receive, from a first communication node 204a, first communication information, wherein the first communication information is associated with the communication and comprises a first node identifier 236a and/or a communication identifier 240a, the first node identifier 236a is associated with a second communication node 204b, the communication identifier is associated with the communication, and the second communication node 204b comprises second communication information associated with the communication and (ii) thereafter receive, from the second communication node 204b, the second communication information; and (b) a reconstruction agent 228 operable to identify the second communication information based on the first node identifier 236a and/or communication identifier 240a.
摘要:
The present invention is directed to the maintenance of call signaling information in connection with realtime communications established using a packet data network. According to the present invention, call state information related to a realtime communication is provided by a call controller to an interconnected client. The client stores the call state information. In the event of a failure of a call signaling channel between the call controller and the client or in the event of a failure of the call controller, the client may establish contact with an alternate call controller, and may provide the call state information that has been stored on the client to the alternate call controller. The alternate call controller may then restore call features associated with the realtime communication.
摘要:
The present invention is directed to the maintenance of call signaling information in connection with realtime communications established using a packet data network. According to the present invention, call state information related to a realtime communication is provided by a call controller to an interconnected client. The client stores the call state information. In the event of a failure of a call signaling channel between the call controller and the client or in the event of a failure of the call controller, the client may establish contact with an alternate call controller, and may provide the call state information that has been stored on the client to the alternate call controller. The alternate call controller may then restore call features associated with the realtime communication.
摘要:
The present invention provides methods and systems for providing high availability voice applications. More specifically, one or more applications may share an extension of a switch among each other. This allows each application to receive data from the switch without occupying additional extensions of the switch. A first application sharing the extension with a second application may be provided as a backup to the second application in case the second application fails. Thus, the second application does not represent a single point of failure for the overall system.
摘要:
In a communications system where a plurality of endpoints share a virtual address, all of the endpoints are involved in a communication with one of them, but only one has its talk path enabled at any one time. Each endpoint has an actuator that, when actuated, enables that endpoint's talk path and disables the other endpoints' talk paths. Preferably, one of the endpoints is either an announcement facility or a teletypewriter, while another one of the endpoints is a telephone.
摘要:
High availability (HA) protection is provided for an executing virtual machine. A standby server provides a disk buffer that stores disk writes associated with a virtual machine executing on an active server. At a checkpoint in the HA process, the active server suspends the virtual machine; the standby server creates a checkpoint barrier at the last disk write received in the disk buffer; and the active server copies dirty memory pages to a buffer. After the completion of these steps, the active server resumes execution of the virtual machine; the buffered dirty memory pages are sent to and stored by the standby server. Then, the standby server flushes the disk writes up to the checkpoint barrier into disk storage and writes newly received disk writes into the disk buffer after the checkpoint barrier.
摘要:
High availability (HA) protection is provided for an executing virtual machine. A standby server provides a disk buffer that stores disk writes associated with a virtual machine executing on an active server. At a checkpoint in the HA process, the active server suspends the virtual machine; the standby server creates a checkpoint barrier at the last disk write received in the disk buffer; and the active server copies dirty memory pages to a buffer. After the completion of these steps, the active server resumes execution of the virtual machine; the buffered dirty memory pages are sent to and stored by the standby server. Then, the standby server flushes the disk writes up to the checkpoint barrier into disk storage and writes newly received disk writes into the disk buffer after the checkpoint barrier.