摘要:
A call management system, comprising: a call monitor operable to identify an attempt, in use, by a user to call a predetermined number attributed to a first entity; a processor, configured to derive at least one alternative number, attributed to another entity, based on the predetermined number attributed to the first entity; and a router to provide a user with an opportunity to route a or the call to at least one of the derived at least one alternative numbers.
摘要:
The present invention provides methods, apparatuses, and computer media for re-routing outgoing calls from a communications terminal. A call routing module selects a set of re-routing plug-ins. One of plug-ins determines re-routing information for an outgoing call based on call information in accordance with a priority list. A priority order for offering a call event to a re-routing plug-in is determined from at least preference list. A preference list may be configured by a subscriber through a user interface. Also, preference lists and re-routing plug-ins may be downloaded over a communications channels. Another re-routing plug-in is offered a call event if a first re-routing plug-in is not able to re-route an outgoing call. One of a plurality of communications systems is selected for re-routing an outgoing call. A communications systems supporting a close-proximity technology may be selected when a communications terminal is sufficiently near the communications system.
摘要:
Embodiments of the present invention provide a security protection method and apparatus for performing security protection during service interruption occurring in a switch network. In an embodiment of the present invention, a transmitting-end device selects each sub-route from a plurality of sub-routes one by one to transmit a call to an opposite-end device; when a trunk device receives the call, it analyzes a route condition from the current selected sub-route to au opposite-end device; the trunk device determines whether to transmit the call to the opposite-end device or report a blocking message to the transmitting-end device according to the route condition; if the transmitting-end device receives the blocking message, then the transmitting-end device excludes the current selected sub-route, judges whether all the sub-routes are excluded, and determines whether to continue selecting a next sub-route or end selecting the sub-routes according to the judgment result.
摘要:
A wireless communications device attempts to originate an emergency E911 call on a first system. If the system sends a global service redirection message (GSRM), including a redirect list, then the device scans alternate systems from the redirect list. if the redirect systems are not available, the device and again attempts to originate the E911 call on the first system. If the origination is not accepted on the first system, then the device scans an E911 list. If the device fails to acquire a system on the E911 list, the device returns to the first system to reattempt origination if the first system has directed the device to “return if failure”. If origination is not honored on the first system, the device enters an emergency silent redial scan mode and continues attempts at origination until accepted by the first system. After the wireless communication device has completed an E911 call to a Public Safety Answering Point (PSAP), it enters an emergency call back mode and idles on the system network so that it can receive emergency call backs from the PSAP. If the system sends a GSRM message, the device will scan the redirect list sent to the device in the GSRM message. However, if the systems of the redirect list are not available, the device will not scan an E911 list. Instead, the device will return to the redirecting system and ignore the GSRM messages and wait in the emergency call back mode.
摘要:
A Private Network-Network Interface (PNNI) network including interconnected nodes is defined as a single rerouting domain (“global domain”) and the global domain is further defined by multiple divided domains (“local domains”). Each of the local domains is defined to include multiple nodes that are included in the network. Connection recovery and path optimization in the global domain (the entire PNNI network) are performed in accordance with a global rerouting protocol. The global rerouting protocol is a modification of the standard Domain-Based Rerouting (DBR) protocol, by adding information elements of domain identifier, rerouting for the global domain. The DBR protocol does not support the connection recovery from a link failure between local domains (“inter-domains”) and the global path optimization. The global rerouting method is capable of connection recovery and path optimization outside of any rerouting local domains. The global rerouting provides double fault recovery within the rerouting domain (“intra-domain”) as covered by the DBR and outside of the domains (“inter-domain”) or when the initial fault recovery within the domain has failed. Also, the global rerouting method provides maximum path optimization across all domains and within the rerouting local domain.
摘要:
An architecture for stacking DSLAMs employs a master DSLAM having a control circuit and an uplink communication circuit to a central office and two LVDS circuits for communication with two DSLAM boxes in adjacent circuit interconnection to the master DSLAM. Multiple slave DSLAMs each having a programmable control circuit and two LVDS circuits for communication with two DSLAM boxes immediately adjacent on either side in the circuit are connected in a ring or split stack arrangement. A control circuit in the master selectively programs the control circuits in each slave DSLAM to control the direction of communication in the LVDS circuits as round robin in a first selected mode and a split in a second selected mode to accommodate the desired structure.
摘要:
A method and system enable optimization of trunk group design in a public switched telephone network (PSTN). A community of interest, including two end offices connected by a direct trunk and at least one tandem switch, is identified using out-of band signaling data collected from the PSTN. An application server interfaced to the PSTN determines whether traffic in the community of interest passes through the tandem switch during a predetermined time period. When traffic passes through the tandem switch, the application server further determines whether the direct trunk between the end offices experienced an overflow condition during the same predetermined time period. When the direct trunk did not experience an overflow condition, an exchange code associated with the traffic passing through the tandem switch is designated as a misrouted code. The misrouted code is flagged so that associated traffic is redirected through the direct trunk.
摘要:
This invention relates to the partitioning of a communications network. The idea of the invention is to divide the logical connections of a communication network into several partitions, each partition representing a certain type of transmission traffic, such as access or regional traffic. The partitioning is based on simple criteria: capacity of an endpoint of a logical connection, representing a node; distance between a pair of endpoints, and traffic category representing the stability of the traffic. By using the partitioning, it is possible to separate a certain type of traffic (a certain type of logical connections) from the whole traffic picture of the network
摘要:
A method for increasing the capability of the network to provide intelligent services can be accessed by any flow and allows the flow to install the services specific features to the flow. The present invention allows the software agents to be dynamically loaded into the network component to provide the services desired by the user. The present invention provides a detector in a switch in the network processing the flow that detects the presence of a predetermined control packet in the flow, and upon detection of this control packet, the detector loads a particular software object from a library of objects into the switch or router, which software object is then immediately executed by the switch to process the flow. This enables the user of the switch to request additional service from the switch after the data flow has been initiated, or to modify the flow parameters in a seamless manner.
摘要:
Signaling messages are exchanged for a call between a calling party to a called party. A setup message for the call is exchanged through at least one gate controller. Network resources are reserved for the call based on the exchanged setup messages. An end-to-end message for the call is exchanged without the end-to-end message being routed through the at least one gate controller.