摘要:
A method, system, and computer program product for network device congestion relief are provided. The method includes receiving a level of congestion for a network device, receiving a data packet including a codec list, and determining a filter policy based on the level of congestion. The method further includes applying the filter policy to the data packet to remove at least one codec from the codec list when a filter policy condition is met, resulting in a filtered data packet, and outputting the filtered data packet.
摘要:
A method, system, and computer program product are provided for selectively discarding packets in a network device. The method includes receiving an upstream bandwidth saturation indicator for a queue in the network device, and identifying one or more codecs employed in packets in the queue when the upstream bandwidth saturation indicator indicates saturation. The method further includes determining a packet discarding policy based on the one or more codecs, and discarding packets in accordance with the packet discarding policy.
摘要:
A method, system, and computer program product are provided for selectively discarding packets in a network device. The method includes receiving an upstream bandwidth saturation indicator for a queue in the network device, and identifying one or more codecs employed in packets in the queue when the upstream bandwidth saturation indicator indicates saturation. The method further includes determining a packet discarding policy based on the one or more codecs, and discarding packets in accordance with the packet discarding policy.
摘要:
A device for transmitting TTY communications includes an input for receiving analog tones from a TTY device, a first output for connecting to a public telephone switch network (PSTN) and a second output for connecting to digital communications network. The device is configured to operate in a first mode and a second mode. In the first mode the device receives the analog tones at the input and transmits the analog tones over the PSTN through the first output. In the second mode, the device receives the analog tones at the input, converts the analog tones into transmission control protocol (TCP) packets and transmits the TCP packets over a digital communications network through the second output.
摘要:
A method for placing a telephone call using a Voice over Internet Protocol (VoIP), the method including using a foreign exchange office (FXO) of a first VoIP system, making a public switching telephone network (PSTN) connection with an FXO of a second VoIP system; exchanging at least an Internet telephone address between the FXOs; terminating the PSTN connection; and placing the telephone call from the first VoIP system to the second VolP system over the Internet using the Internet telephone address.
摘要:
Systems and methods are disclosed for authenticating caller identification in VoIP communication. A VoIP device receives an incoming call from an originating calling device; wherein the incoming call includes (1) a caller identification and (2) a unique identifier associated with the originating calling device. The VoIP device verifies that the caller identification in the received incoming call matches an entry in a trusted directory, wherein the trusted directory includes one or more entries of previously verified caller identifications. Upon verifying that the caller identification in the received incoming call matches a caller identification entry in the trusted directory, the VoIP device sends an inquiry to a unique locator associated with the matching caller identification in the trusted directory.
摘要:
A method of distributing applications between a plurality of machines forming a client system. The method includes determining that applications should be distributed to maximize hardware utilization of each or the plurality of machines; determining a plurality of possible configurations of applications among the plurality of machines; creating a list of all possible configurations; comparing the list of all possible configurations to a database of state information; removing configurations from the list if the configuration is the same as a state previously determined to be non-functional to create a pruned list; generating a score for each configuration on the pruned list by comparing each configuration with states information in the database; selecting the configurations with the highest score, the number of configurations equaling the number of machines; and deploying the selected configurations on the plurality of machines.
摘要:
Systems and methods are disclosed for authenticating caller identification in VoIP communication. A VoIP device receives an incoming call from an originating calling device; wherein the incoming call includes (1) a caller identification and (2) a unique identifier associated with the originating calling device. The VoIP device verifies that the caller identification in the received incoming call matches an entry in a trusted directory, wherein the trusted directory includes one or more entries of previously verified caller identifications. Upon verifying that the caller identification in the received incoming call matches a caller identification entry in the trusted directory, the VoIP device sends an inquiry to a unique locator associated with the matching caller identification in the trusted directory.
摘要:
A method and apparatus for installing an application on a computer are disclosed. Following receipt of a request to install an application, a software state, comprising the new application and several of the applications installed on the computer, is derived. Then, the method determines whether the software state can be implemented on the computer. If the software state cannot be implemented on the computer, then the method derives another software state. This is repeated until the derived software state can be implemented on the computer system, or until determining that no software state exists which can be implemented on the computer system.
摘要:
Techniques are described for distributed placement of a request on one of a plurality of deployment nodes. Embodiments receive a request specifying resource requirements for instantiating the request, and transmit at least an indication of the resource requirements to the plurality of deployment nodes. An indication of suitability is then received from at least two of the plurality of deployment nodes, the indication of suitability describing a suitability of the respective deployment node for instantiating the request. Embodiments select one of the at least two deployment nodes based on the indications of suitability, and transmit the request to the selected deployment node for instantiation.