摘要:
An architecture for a switching node of a communication network includes a dedicated hardware Layer 1 processing portion and a Layer 2 and 3 processing portion based on multiple programmed general purpose processors. An array of such processors are used with an arbitration scheme for selecting which of the processors is to be used for any given Layer 2 or Layer 3 process. The architecture allows the node's capacity to be expanded by simply adding more processors to handle increased traffic.
摘要:
An architecture for a switching node of a communication network includes a dedicated hardware Layer 1 processing portion and a Layer 2 and 3 processing portion based on multiple programmed general purpose processors. An array of such processors are used with an arbitration scheme for selecting which of the processors is to be used for any given Layer 2 or Layer 3 process. The architecture allows the node's capacity to be expanded by simply adding more processors to handle increased traffic.
摘要:
A method for routing bearer traffic (70′) between 3G networks (32, 42) and 2G networks (12, 22) and vice versa uses voice signaling gateways (VSGW)(14, 24, 34, 44). The method determines a VSGW nearest the calling party (11). The nearest VSGW directly routes (86) the bearer traffic through the inter-network (50) to the called party (31) and avoids the “tromboning” effect of always sending bearer traffic to the called party's home location.
摘要:
A method of creating an email usage record is provided. An input signal is received. An email usage record is created in response to the received input signal. An event jacket is created. The event jacket is associated with the email usage record. A command to send an email message is received. A confirmation signal is received after the email message has been sent. Finally, an email leg jacket is created. The email leg jacket includes at least one record. The at least one record includes information relating to the email message.
摘要:
Apparatus and method of controlling a telephone network to establish connections between calling and called telephone stations in accordance with dialed telephone numbers identified by ones of a plurality of calling party credit cards. The apparatus responds to the receipt of a telephone number and a credit card number from a calling telephone by identifying a company having issued the credit card assigned the received credit card number. A data link connection is established with a data base maintained by the identified company and the received credit card number is transmitted to the identified company during the call sequence for a determination of the validity of the received credit card number. The apparatus controls the telephone network to establish a network connection between the calling telephone and a telephone identified by the called telephone number upon receiving validation of the validity of the credit card and to establish a network connection between the calling telephone and an announcement circuit stating that the identified credit card cannot be used for telephone calls upon receiving non-validation of the credit card or upon identifying the credit card as fraudulent.
摘要:
In accordance with the exemplary embodiments of the invention there is at least a method, apparatus to perform operations including collecting metrics from one or more network devices of the wireless communication network, and using the collected metrics to enable one of establishment and modification of a Bearer in the wireless communication network to provision a service in accordance with specified characteristics.
摘要:
A method (300) and a system (100) for providing device capability information. The method can include receiving from a first communication device (106) at least a first identifier (110) that indicates functional capabilities of the first communication device, and automatically associating in an address book (112) the functional capabilities of the first communication device with a contact with whom the first device is associated. The method further can include determining whether a first communication device is authorized to receive a first identifier that indicates functional capabilities of a second communication device (104) in response to an event. The first identifier can be automatically communicated to the first communication device in response to determining that the first communication device is authorized to receive the first identifier.
摘要:
A method of creating a call usage record is provided. An input signal is received. A call usage record is created in response to the received input signal. An event jacket is created. The event jacket is associated with the call usage record. A command to place a call is received. A confirmation signal is received after the call has been placed. Finally, a call leg jacket is created. The call leg jacket includes at least one record. The at least one record includes information relating to the call.
摘要:
An end-to-end ubiquitous payload delivery system and method transfers a payload using multiple communication method following rules established by a sender. The payload transfer is attempted using a preferred media until the parameters of the transfer are exceeded (i.e., a certain number of attempts in a given duration of time), after which one or more alternative media are used until the payload transfer is completed. Prior to the completion of the transfer, the sender has the capability of querying the payload delivery system to determine the status of the payload. Upon completion of the delivery, the sender receives notification.
摘要:
An improved method of providing transparent packet access to a D-channel of an ISDN, includes the step of providing a user packet including an Address field, a Control field and an Information field, for transporting to an ISDN; Extracting the Address, Control and Information fields from the the user packet; and inserting the extracted fields into an Information field of an ISDN format LAPD packet. Preferably X.25 packets are provided access to the network, and the X.25 LAPB Address, Control and Information fields are inserted into the LAPD information field. This method provides independence of protocols and reduces complexity.