摘要:
Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides network-layer protection to hosts of a private network against unauthorized access by hosts of an external network by performing network address translation (NAT) processing of Internet Protocol (IP) addresses. The firewall also provides application-layer protection on behalf of the hosts and supports Voice over IP (VoIP) services by processing signaling protocols associated with VoIP sessions. An external VoIP interface of the firewall receives incoming VoIP packets each associated with a VoIP port of the external interface. The packets are directed to an appropriate host by the firewall performing port address forwarding based on a mapping of VoIP ports to private addresses of the hosts.
摘要:
In a method for addressing messages in a computer network in which two different types of address are used, wherein at least one first network element (4, 5, 6, 7, 8) uses exclusively a first type of address, at least one second network element (14, 15, 16, 17, 18) uses exclusively a second type of address and at least one third network element (9, 10, 11, 12, 13, 14) uses both types of address, at least one third network element (9) is a communication terminal which, besides its function as a communication terminal, also performs a function as an address converter for messages for which said communication terminal is neither the original sender nor an ultimate recipient.
摘要:
A system for determining dynamically any given registered wireless device VoIP location, whereby the dynamic method reports the VoIP address return path as being the VoIP Location into a database. Applications of the system can access the database to contact each individual, specific, fixed or wireless device by VoIP for any data exchange.
摘要:
A method of operating a communication system comprises registering a plurality of communication devices with a peer-to-peer network as a plurality of enterprise nodes using a plurality of network handles that identify positions in an enterprise hierarchy. The method further comprises receiving a request to establish a session with a participant node and an enterprise node of the plurality of enterprise nodes using a first network handle of the plurality of network handles that identifies a first position in the enterprise hierarchy. In response to the request, the method provides identifying a routing identifier associated with the enterprise node and exchanging user communications for the session with a communication device of the plurality of communication devices registered as the enterprise node using the routing identifier.
摘要:
In a communications system having at least one service entity and a plurality of endpoints each including a logical entity and a terminal, a method facilitates a session between at least two of the endpoints in the system. The method includes: receiving a first message having information that includes a request for a session between a first endpoint that includes a non-dispatch terminal and at least one other endpoint; detecting that the first endpoint includes a non-dispatch terminal as a function of the first endpoint being unable to perform at least one function; and causing the at least one function to be performed on behalf of the first endpoint by the at least one service entity to facilitate the session between the first endpoint and the at least one other endpoint.
摘要:
Disclosed herein is a contact destination information registration method employed in a network system including nodes and employing a distributed hash table. When registering contact destination information corresponding to a predetermined node address in the table, the node first performs a first operation of looking up a value associated with a key corresponding to the node address in the table, and, if no such value is found, registering provisional contact destination information in the table so as to be associated with the key and acquiring a registration time of the provisional information, but, if any such value is found, acquiring a registration time of that value, and then performs a second operation of registering the true contact destination information in the table, if the registration time of the value associated with the key in the table coincides with the registration time acquired by the first operation.
摘要:
Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides network-layer protection to internal hosts against unauthorized access by hosts of an external network by performing network address translation (NAT) processing of Internet Protocol (IP) addresses. The firewall changes data in headers of VoIP packets and corresponding data contents of the VoIP packets, to enable bi-directional VoIP communications. An external VoIP interface of the firewall receives incoming VoIP packets having a user alias (e.g., an email address) and an indication regarding a VoIP port of external interface. The packets are directed to an appropriate internal host by the firewall performing port address forwarding based on the port indication to a Media Gateway Control Protocol (MGCP) media gateway within the internal network that maintains a mapping of user aliases to private addresses of the internal hosts.
摘要:
An operational support system includes a data collection unit and a number of network devices that are associated with various telecommunications services. The data collection unit retrieves raw data records from the network elements and identifies information in the raw data records that is relevant for billing purposes. The data collection unit normalizes the raw data records to create a billable record. The billable record may then be passed to a rating or billing unit that determines the charges associated with a customer's use of the telecommunications services.
摘要:
A method for communicating video data between at least a first host and a second host comprises: identifying, at a server, an address of the first host, to which the second host may communicate video data, and a sequence number expected by a network security system coupled between the first host and the server; and communicating, from the second host to the first host, video data using the address of the first host and the sequence number expected. The method may further comprise: identifying, at the server, an address of the second host, to which the first host may communicate video data, and a second sequence number expected by a network security system coupled between the second host and the server; and communicating, from the first host to the second host, video data using the address of the second host and the second expected sequence number. The second host may be adapted to perform the act of communicating without use of an intermediate server. The method may also further comprise communicating periodically, from the first host to the server, through the network security system, so as to maintain an open communication channel through the network security system to the first host at the address of the first host. The address of the first host may include address information and port information.