摘要:
A method includes a network originating a QoS reservation message and communicating the network-originated QoS message through a radio access network (RAN) from an access gateway (AGW) to an access terminal (AT). The network-originated reservation message does not cause any network resource reservation by itself, but causes the AT to initiate a network resource reservation according to one or more parameters in the network-originated QoS reservation message. Accordingly, an existing network infrastructure supporting AT-originated QoS reservation may support network-originated QoS reservation (or proxied QoS) without any updates to an access-network infrastructure, such as the RAN. The method includes, in response to the network-initiated QoS reservation message, communicating a reservation confirmation through the RAN from the AT to the AGW. The reservation confirmation whether that the QoS reservation was successful.
摘要:
In one embodiment, a method includes receiving a first message from a first manager. The first message includes a first element of a request for policy authorization. The request for policy authorization attempts to reserve particular network resources for a particular application context. The method includes, in response to the first message, establishing a policy rendezvous state at a policy manager for a policy decision on the request for policy authorization. The method includes receiving a second message from a second manager subsequent to the first message. The second message includes a second element of the request for policy authorization, and the second element completes the request for policy authorization. The method includes, in response to the second message, making the policy decision based on the first and second elements of the request for policy authorization. The method includes, if the policy decision grants the request for policy authorization, generating a complete policy facet and communicating the complete policy facet to the first manager or the second manager to authorize use of the particular resources for the particular application context.
摘要:
Establishing one or more facets of a policy includes facilitating a communication session for an access terminal at a visited network. The access terminal is associated with a home network having a home policy server. The policy is received at a visited policy server of the visited network. The policy comprises the facets. If the facets are unacceptable, the facets are negotiated until a stopping point is reached. The negotiation includes adjusting by the visited policy server at least one facet of the one or more facets, and notifying the home policy server of the adjustment. The facets are established in accordance with the negotiation.
摘要:
A system for enforcing policy in a communication network includes a policy server which is operable to receive a request to invoke an application, receive a policy profile for a network user, and decide a proper allocation of network users based on the policy profile, the application, and available network resources. The policy server is further operable to communicate with a non-SIP application. The system also includes a network resource manager operably associated with the policy server and operable to monitor available network in the resources in the communication network. In addition, the network resource manager is functional to allocate network resource amongst a plurality of network users. The system also contains an application control point which is operably associated with the policy server and operable to communicate with a SIP application. The system is operable to use policy peering between the home and visited network to enable user-specific policies to be enforced while roaming.
摘要:
Methods, apparatuses and systems directed to a distributed bootstrapping mechanism for peer-to-peer networks. In particular implementations, the de-centralized bootstrapping mechanism utilizes an allocated set of anycast addresses from the public IP space. Routing nodes or peer nodes corresponding to respective autonomous systems select an anycast address by computing a hash of an Autonomous System (AS) number (or other string) and mapping the hash value, or a portion of the hash value, to one of the anycast addresses in the allocated set. Other mechanisms for selecting anycast addresses (such as random selection) can be used. One or more of the routing nodes of the autonomous system may advertise a host route identifying the selected anycast address. When a new peer node is added to the P2P network, it may, upon initialization, transmit discovery messages using the anycast addresses from the allocated set, which may be ultimately routed to one of the peers in the P2P network. One of the responding peers in the P2P network may then be used by the newly initialized peer as a bootstrap resource to join the P2P network.
摘要:
Among other things, one or more techniques and/or systems are disclosed for selecting source imagery for a planar panorama comprising a curved path. The curved path can be identified in a block of source imagery, where the source imagery comprises inside-curve source imagery for an inside curve of the curved path. Image data from a first source image from the inside-curve source imagery can be compared with image data from a second source image from the inside-curve source imagery. If image data of the first source image sufficiently overlaps image data of the second source image the first source image can selected for inclusion in a set of images to be used for the planar panorama, while the second source image may not be so selected (e.g., to mitigate artifacts, object overlap, repeated objects, etc. in the planar panorama).
摘要:
A system for verifying caller ID information in received VoIP calls. In particular implementations, a method includes receiving a caller identification (ID) identifying a calling party telephone number in a call initiation message transmitted from a VoIP call agent; determining the identity of the VoIP call agent; verifying that a public switched telephone network (PSTN) call to the calling party telephone number would arrive at a VoIP call agent having the determined identity; and applying, responsive to the call initiation message, one or more rules based at least in part on the verifying step.
摘要:
A system for verifying VoIP call routing information. In particular implementations, a method includes verifying one or more Voice-over-Internet-Protocol (VoIP) call agents for respective destination telephone numbers based on demonstrated knowledge of previous public switched telephone network (PSTN) calls to the respective destination telephone numbers; receiving a call initiation message identifying a destination telephone number; and conditionally initiating a call over a VoIP network to a target VoIP call agent, or over a circuit switched network, based on whether the target VoIP call agent has been verified for the destination telephone number identified in the call initiation message.
摘要:
A VoIP call routing information registry including a hash access mechanism. In particular implementations, a method includes receiving a telephone number; computing a hash of the telephone number; accessing a registry wherein the registry comprises a plurality of entries, and wherein each entry comprises a hash of a telephone number and data associated with that telephone number, or a prefix and data associated with that prefix; searching the registry for a matching entry; and until a matching entry is found or the telephone number has been stripped down to a minimum number of digits, stripping the last digit of the telephone number, re-computing a hash of the stripped-down telephone number, and re-searching the registry for a matching entry.
摘要:
A system for verifying VoIP call routing information. In particular implementations, a method includes verifying one or more Voice-over-Internet-Protocol (VoIP) call agents for respective destination telephone numbers based on demonstrated knowledge of previous public switched telephone network (PSTN) calls to the respective destination telephone numbers; receiving a call initiation message identifying a destination telephone number; and conditionally initiating a call over a VoIP network to a target VoIP call agent, or over a circuit switched network, based on whether the target VoIP call agent has been verified for the destination telephone number identified in the call initiation message.