摘要:
A system and method for managing a telecommunications network. The system and method employs a network management architecture that provides an overlay in which network management functions are performed. The network management architecture includes a workstation function that provides a graphical user interface (GUI) for a user to interact with an object model of the physical telecommunications network, a telecommunications network management subsystem that provides an object model of the network including object models of network equipment and connectivity between the equipment, a database subsystem that stores "current" and "future" views of the network, and an object request broker that translates objects from a first object-oriented paradigm to a second object-oriented paradigm for use by the GUI. The network management architecture facilitates network design by determining network performance metrics. The network architecture can also be used to assess the performance of a given network configuration by virtue of simulation. The network architecture can also be used to initialize switchover logic for network restoration.
摘要:
Data incorporated in call detail records (CDR), obtained from network switches, are subjected to processing by a statistics engine which maintains separate counts for CDR events relating to certain calls, such as 800 number and 900 number calls. Such events, such as attempted calls, completed calls, and duration, form statistics for network users. Compilation of statistics may be done for different services, such as total summary counts and counts by originating area code. In case of 800 numbers, the statistical counts for the various services are compiled in accordance with the 800 number or 900 number called. When a network user decides to change the statistical services required, this is easily accomplished by changing the rules for interrogating the CDR data, as opposed to the prior art approach of changing programming coding.
摘要:
To estimate an optimal amount of spare capacity for a network so that efficient distributed restoration of the network can take place in the event of a network failure, parameter assumptions and network design guidelines are provided to a network modeling tool to generate a desirable amount of spare links for the network. The spare links are allocated to the different nodes of the network. After a failure in the network, the result of the restoration of the network due to the failure is reported to the controller of the system. If necessary, the parameter assumptions and network design guidelines are updated and fed back to the network modeling tool for further refining the spare capacity of the network. An optimal amount of spare capacity is thus achieved by a continuous redeployment of the spare capacity output provided by the network modeling tool. Simulated failures and subsequent restorations of the network are provided to an exerciser periodically. Results from the exerciser further enhance the operations of the network modeling tool to provide an optimal amount of spare capacity for the telecommunications network.
摘要:
A locking system comprising a locking fastener having tamper-resistant features, and a special key having a bit at one end for engaging a socket in the head of the locking fastener to rotate the latter. The internal configuration of the socket corresponds to an external configuration of the bit, and the corresponding contour of the socket prevents the fastener from being turned by tools other than the special key. The fastener may have left-handed threads on its shaft and its head may be recessed in a counterbore in a closure part to prevent gripping tools from gripping an external surface of the head. The configurations of both the socket and the key may readily be made by economical metal working techniques.
摘要:
A system and method for multi-wavelength modulated optical communication uses the same optical fiber without the use of multiple tuned lasers. A transmitter includes an optical comb generator and a digital modulator. The optical comb generator generates a broad spectrum of wavelengths using a white noise generator. A Fabry-Perot cavity filters the wavelengths to form a set of equally spaced resonances lambda-1 . . . lambda-n. The comb generator is locked to a particular wave length by comparing each carrier or the composite mean of the carriers to an optical reference. An error signal is generated and fed back into the into comb generator. The resonances are split into n-channels using a tree splitter. Each channel is modulated in the digital modulator. The channels are summed as an optical signal and amplified to ensure proper power levels prior to being fed to an optical fiber.
摘要:
A plurality of release action tables are maintained in the switching nodes of a telecommunication network, e.g SS7, ISDN, one table for each trunk group. The table indicates desired actions or treatments to be taken for failed calls, each identified by a cause condition. Upon receiving a cause condition expressed as a code at a switching node, a release action table index is accessed to identify the release action table for the trunk group experiencing the cause condition. The cause code is compared against entries in the release action table by a control program included in the switching node. Based upon such comparison, the table indicates to the network the corrective action to be taken to remedy the failed call condition. Changes to the network for failed call conditions are accomplished by altering the data in the release action table rather than changing network.
摘要:
The present invention telecommunications system provides validation of authorization codes input by a user for placing a call from a service area of a first telecommunications service provider with a calling card issued by another telecommunications service provider. The present invention allows the subscriber to place a special service call irrespective of whether the signaling protocol of the first service provider is different from the service provider to which the subscriber is a customer of. If the protocol of one telecommunications service provider is indeed different from the other service provider, a gateway residing in an intelligent service network node would convert the signaling protocol of the first service provider into a signaling protocol that is compatible with the other service provider. Consequently, the first service provider can quickly validate the authorization code provided by the subscriber by sending a query to the service provider that issued the calling card to the caller by referencing the LIDB database of the latter service provider. To achieve the conversion of one protocol to another, a system that includes an ISN node having gateways, file servers, a monitoring system, and mainframes is used. The gateway inside the ISN node has a client application program interface (API) component, a translate/convert component, a transaction capabilities part (TCAP) component and a SS7 API component. These various components, together with other controlling and interface components, are able to convert a first signaling protocol, for example a SS7 protocol, into a second protocol, for example a network information distributed service (NIDS) sequenced packet protocol.
摘要:
A card for tonal entry of PIN codes into a telephone is provided. The keys of a key entry device are contacted in a proscribed sequence to enter a number into the card with each use of the card. The keyed in number is compared with a number stored in the card. If the numbers are the same, an acknowledgement tone is sent. Upon obtaining of the acknowledgement tone, the annunciator in the card is held to the telephone mouthpiece and activated by the user to produce a tonal representation of the PIN number. If an improper number sequence is keyed in by the user, the card produces a warning signal requiring reentry of a number. After three or four successive failures of the user to enter the correct number, the card is disabled and a new one has to be obtained by the cardholder.
摘要:
Call records are generated from various network elements processing a call. A consolidation feed acts as a concentrator for the various records. However, since the concentrator receives the call records at different times, the invention provides a concentrator with a count of the various types of network elements which have processed the call. This allows the concentrator to match and merge the records once all the records, indicated by the final count, have been received. In order to update the count as a call progresses from network element to network element, the originating network element creates a buffer which is carried through the network, from element to element. As each element is affected, it adds a count to the buffer.
摘要:
A system and method for restoring communications between a pair of nodes, between which communications have been broken, in a network. The method comprises the steps of designating one of the nodes a SENDER node and the other a CHOOSER node, where the SENDER and CHOOSER nodes each have a working port connected to a link bearing the interrupted communications; creating a forward restoration signature having a unique priority; selectively transmitting the forward restoration signal from the SENDER node based on its priority; upon receipt of a forward restoration signature at a TANDEM node, modifying and selectively transmitting the forward restoration signature based on its priority; upon receipt of a forward restoration signature at a spare port on the CHOOSER node, choosing the restoration path indicated by the received forward restoration signature, connecting the working port to the spare port, and transmitting a reverse restoration signature having the same priority as the forward restoration signature; upon receipt of a reverse restoration signature at a TANDEM node, based on the priority of the reverse restoration signature, modifying and selectively transmitting the reverse restoration signature, and connecting the port on which the reverse restoration signal was received to the port on which the corresponding forward restoration signature was originally received; and on receipt of a reverse restoration signature at a spare port on the SENDER node, connecting the spare port to the working port, thereby restoring communications between the pair of nodes.