摘要:
A method of installing forwarding state in a link state protocol controlled network node having a topology database representing a known topology of the network, and at least two ports for communication with corresponding peers of the network node. A unicast path is computed from the node to a second node in the network, using the topology database, and unicast forwarding state associated with the computed unicast path installed in a filtering database (FDB) of the node. Multicast forwarding state is removed for multicast trees originating at the second node if an unsafe condition is detected. Subsequently, a “safe” indication signal is advertised to each of the peers of the network node. The “safe” indication signal comprises a digest of the topology database. A multicast path is then computed from the network node to at least one destination node of a multicast tree originating at the second node. Finally, multicast forwarding state associated with the computed multicast path is installed in the filtering database (FDB) of the network node, when predetermined safe condition is satisfied.
摘要:
An apparatus, method, and computer program manage communication sessions that include a plurality of portions. Different processors handle each portion of a communication session. The apparatus, method, and computer program transfer the communication session from one of the processors to another of the processors during the different portions of the communication session.
摘要:
The present invention facilitates identification and control of peer-to-peer sessions via an access concentration point (ACP). The ACP will monitor packets routed therethrough and detect access messages intended for known peer-to-peer access services. The access messages sent from a communication client to the peer-to-peer access service, which will respond by sending an access reply message back to the communication client. The ACP will monitor the packets being routed to identify the access reply message, which will include routing addresses that may be associated with potential remote communication clients. With these addresses, the ACP can monitor packets to identify when an attempt to initiate a peer-to-peer communication session is being made to or through an entity associated with one or more of these addresses. Upon detecting a session initiation message to or through an identified address, the ACP may take any number of actions, depending on how the ACP is configured.
摘要:
The present invention supports a method for transmitting information packets across network firewalls. A trusted entity is provisioned with an address designation for a pinhole through the firewall during setup of a communication session between two communication devices. This pinhole address is used throughout the communication session between the two communication devices to transmit information packets onto and out of the communication network.Information packets addressed to the communication device inside the firewall are received by the trusted entity, which replaces address header information in the information packet with the address for the pinhole. The information packet is routed to the pinhole where it passes onto the network for routing to the communication device inside the firewall. Information packets transmitted from the network are also routed to the trusted entity for routing toward the communication device outside the firewall.
摘要:
A set of critical nodes or links is identified on the network through which most of the shortest paths on the network occur. Each node compares their distance to end points on the network with a distance between the end points and each of the distinct critical nodes. Where the distance between the end points and the critical nodes is shorter than the distance between the end points and the node, the node is not on the shortest path and does not install forwarding state. Where the distance between the end points and the critical node is larger than or equal to the distance between the end points and the node, the node may be on the shortest path between the pair of end nodes and installs forwarding state. Installation of forwarding state may cause packet duplication, but determining forwarding state is dramatically simplified.
摘要:
The two types of virtual local area networks (VLANs) may be defined: p-bits-Inferred-scheduling class VLAN (p-VLAN); and VLAN-10-Only-Inferred-scheduling class VLANs (v-VLAN). As such, upon receipt of an Ethernet frame, the type of VLAN associated with the Ethernet frame may be determined. The type of VLAN provides the receiving node with an indication of a method of determining a scheduling class. A p-VLAN supports multiple scheduling classes. For a p-VLAN, the scheduling class and drop precedence for the received Ethernet frame may be determined based on a “service map” that describes the relationship between the p-bits and forwarding treatment. A v-VLAN supports a single scheduling class. As such, the scheduling class for a received Ethernet frame may be determined based on the VLAN-10 of the received Ethernet frame. The described VLAN QoS information may be configured or signaled across the network. Advantageously, the methods may be applied in connectionless, connection-oriented and path-oriented Ethernet networks.
摘要:
Provided is a method and apparatus for objectively and non-intrusively measuring voice quality on live calls without disrupting the call session or the network. A communication system includes plural communities each including a switch that controls access to a packet-based data network for call sessions. Each of the communities is coupled to the data network by respective packet-based trunks. Quality of service (QoS) monitoring devices are coupled to the respective packet-based trunks to monitor quality levels of routes between any two given communities. Each QoS monitoring device receives packets containing streaming data (which may be actual packets or test packets). From the received packets, the QoS monitoring device can derive QoS parameters, particularly for audio and speech signals on live calls without disrupting the call session.
摘要:
This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlates the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user.
摘要:
In a bearer-independent core network, the switching and transport of the bearer streams is separated from the processing of call sessions that control the bearer streams. The switching and transport of the bearer streams is executed by media gateways and packet switches in the switching and transport layer of the network. The processing of calls sessions that control the bearer streams is executed by call servers in the call control layer of the network. The switching and transport layer of the network may be implemented using ATM or IP technology. In order to redirect the signaling links to a backup call server, a signaling gateway is used. Each media gateway includes a signaling gateway function. The signaling gateways redirect the signaling links by encapsulating each signaling message in a new packet in one embodiment.
摘要:
A service for searching for unsolicited communications is provided. For example, the service may inspect e-mail messages, instant messaging messages, facsimile transmissions, voice communications, and video telephony, and analyze these communications to determine whether an intended communication is unsolicited. In connection with voice and video telephony, a voice sample may be obtained from the caller and voice recognition may be performed on the sample to determine an identity of the person or the voice. The voice sample may also be used to determine the type of voice—i.e., if the voice is live, machine generated, or prerecorded. Where the call is a video telephony call, image recognition may be used to inspect an image of the person. The information obtained from voice recognition, voice type recognition, and image recognition may be used to detect whether the messages if from a known source of unsolicited communications.