摘要:
A virtual private network (VPN) service is provided through a shared network infrastructure comprising interconnected provider edge (PE) devices having customer edge (CE) interfaces. Some of the CE interfaces are allocated to a VPN supporting virtual LANs. A correspondence between a CE interface and a virtual LAN is learnt on the basis of tagged frames received at this CE interface and including an identifier of this virtual LAN. The learning process permits the detection of pairs of CE interfaces which correspond to a common virtual LAN. Upon such detection, a virtual circuit is established in the shared network infrastructure between the PE devices having these CE interfaces, and subsequently used for forwarding frames including the identifier of the common virtual VLAN.
摘要:
Contacts are managed within a contact centre by representing each contact as a software object which contains skillset and priority identifiers. Contact objects are queued relative to one another by means of references to and/or from the object(s) immediately ahead of and behind each contact. In this way a conventional queue can be dispensed with. Queries can be made to a plurality of contact centres across a network to identify objects matching certain criteria at the top of each local queue. In this way a set of local queues substitutes for a network queue providing increased resilience in the case of the failure of any individual component of the network or of the network itself.
摘要:
A cellular wireless network employs a method of allocating radio resources to femtocells so that the transmissions from femtocells do not occupy the same radio resource blocks as those used by a macrocell for signalling.
摘要:
Provided are system and method for performing access screening in a CDMA network. In one embodiment, the method comprises comparing a strength of a reference pilot specified in an origination message (“ORM”) received from the mobile unit to at least one of an upper pilot strength threshold (“UPST”) and a lower pilot strength threshold (“LPST”); responsive to the reference pilot strength failing to exceed the LPST, redirecting the mobile unit; responsive to the reference pilot strength exceeding the LPST but failing to exceed the UPST, determining whether an additional pilot is reported having a strength greater than that of the reference pilot; and responsive to a determination that no additional pilot is reported having a strength greater than that of the reference pilot, redirecting the mobile unit.
摘要:
The present invention presents a method, arrangement and computer program product for clocking exploiting the relative behavior of clocks of individual receiving stations as well as a corresponding modeling to derive a time difference of arrival of a signal from a user device which can be used to correct the time difference of arrival based on the modeled clock behavior and leads to a correct clocking of received user signals without the need of synchronization of the clocks in the various receiving stations. This principle is applicable to a plurality of pairs of receiving stations and beacon signals transmitted amongst them and allows for a correct location estimation of a user device.
摘要:
A commuter groups service (CGS) allows commuters to join commuter groups so that they are able to socialize while commuting. Through the commuter groups, the users may share commuting routes, traffic updates, road conditions, and other information. Group members may arrange car pools, short term riding arrangements, and may anonymously or directly contact each other. The CGS may collect group member position information, e.g. GPS information, to enable the CGS to calculate traffic conditions and to select location specific information for group members. The system may include an on-line service accessible through a computer or wireless networking device. The user may log into the CGS, create or modify a user profile, and join groups of their choosing. Groups may be associated with specific events or with getting to/from work. Commuter groups may be formed for commuters that use private vehicles and/or public transportation.
摘要:
A method and apparatus for allowing telephony or other types of media communications and services to be provided for a device (24) having a private network address that resides behind a firewall and network address and port translation (NAPT) module (which is unaware of the underlying protocol for the communications and services). Examples of the underlying protocol includes the Session Initiation Protocol (SIP) and Real-Time Protocol (RTP). A path through the firewall and NAPT module is defined by use of keep-alive messages communicated through the firewall and NAPT module. Addresses that are allocated by the firewall and NAPT module are associated with the device (24) for both signaling and media communications. A feature of the firewall that enables the provision of telephony and media communications through the firewall that is protocol-unaware is that the firewall allows responses to messages initiated by the device back through the firewall.
摘要:
Each equal cost path is assigned a path ID created by concatenating an ordered set of link IDs which form the path through the network. The link IDs are created from the node IDs on either set of the link. The link IDs are sorted from lowest to highest to facilitate ranking of the paths. The low and high ranked paths are selected from this ranked list as the first set of diverse paths through the network. Each of the link IDs on each of the paths is then renamed, for example by inverting either all of the high node IDs or low node IDs. After re-naming the links, new path IDs are created by concatenating an ordered set of renamed link IDs. The paths are then re-ranked and the low and high re-ranked paths are selected from this re-ranked list as the second set of diverse paths.
摘要:
A shared (proxy) OAM session is performed in a packet-based network on behalf of a plurality of connections. First and second connections are each routed between respective nodes of the network for carrying data traffic. The second connection shares a portion of the routing of the first connection. The shared OAM session is performed along a path which is co-routed with at least part of the shared portion of the routing of the first connection and the second connection. Failure notification signalling is propagated to an endpoint node of each of the first and second connections when the shared OAM session indicates a failure has occurred. The use of a shared OAM session reduces processing at nodes and reduces OAM traffic. Each connection can be a trunk, such as a PBT/PBB-TE trunk, or a service carried within a trunk.
摘要:
A device for use in a system with multiple receiving units, and multiple intermediate units each configured to communicate with the device and at least some of the multiple receiving units, includes a communication module configured to send information toward and receive information from the receiving units and the intermediate units, a memory, and a processor coupled to the memory and the communication module. The processor is configured to: cause the communication module to send information toward each of the receiving units sufficient for the receiving units to obtain a key chain corresponding to that receiving unit, each key chain containing a plurality of keys, each key in each key chain being related to other keys in the respective key chains by at least one inverse of a one-way function; select a key from a key chain associated with a particular receiving unit and stored in the memory; and cause the communication module to send the selected key, and an indication of which receiving unit the selected key is associated with, toward the intermediate unit associated with the particular receiving unit.