Abstract:
A push-to-talk conference call is conducted over a packet switched network. Participants send a request and receive approval before being allowed to talk during the conference call. In one implementation, only one of the participants is enabled to transmit audio packets while other participants are only allowed to receive audio packets.
Abstract:
An insulation package comprising a layer of material having a cellular structure disposed between a first layer of high-strength polymeric fabric and a second layer of high-strength polymeric fabric. The insulation provides protection for critical fluid systems, such as fuel, hydraulic, electrical, pneumatic, thermal, and mechanical systems from high-energy projectiles such as fragments from the disintegration of high-speed turbines and engines.
Abstract:
A method for a client to receive streaming media over a network includes receiving data having the streaming media encoded therein and storing the received data in a de-jitter buffer thereby increasing a fullness of the de-jitter buffer. The method further includes, when the fullness reaches a fill level, initiating play out of the stored data from the de-jitter buffer, and changing the fill level while playing out the stored data.
Abstract:
A method for channeling network traffic is described, which includes identifying, with an agent disposed within a client computer of the network, a portion of the network traffic associated with the client computer that has compliance related interest. The identified compliance interesting traffic portion is encapsulated with a header. Apart from the encapsulated traffic portion, the network traffic is routed according to its designated destination. The interesting traffic portion however is diverted on the basis of the encapsulating header. The diverted traffic portion is channeled for compliance related processing. Upon being channeled, the traffic portion is processed according to a compliance related policy. The processing is performed remotely from the client computer.
Abstract:
Anchoring a communication session for a target mobile phone includes identifying a current access node operable to provide the target mobile phone access to a first network of a first network type. Potential access nodes operable to provide a mobile phone access to a second network of a second network type are identified. Whether the communication session can be handed off to a potential access node of the one or more potential access nodes is established. Anchoring of the communication session is initiated in the second network only if the communication session can be handed off to a potential access node of the one or more potential access nodes.
Abstract:
Devices, softwares and methods are provided for redundantly encoding a data stream into frames for network transmission as packets. A main encoder encodes a data stream into main frames, while a redundant encoder encodes it into redundant frames. The redundant frames have a redundant-coding delay from the main frames that is adjustable to accommodate many different sets of network conditions.
Abstract:
Wideband telephones, gateways, adapters, software, and methods are provided for implementing wideband telephony over a network. A WB IP telephone has a WB telephone, a codec for encoding voice into voice data bits, and a packetizer for encoding groups of the voice data bits in intermediate packets. An adapter for an analog WB telephone has a digital to analog converter, a codec and a packetizer. The intermediate packets are generally not in form that would be ready for network transmission. The WB IP telephone also includes a modem for connecting to the network over a telephone line. A voice gateway receives the encoded voice, and adds packet headers to it, to make it suitable for transmission through the network to a cooperating gateway. The cooperating gateway in turn strips the headers for the receiving WB IP telephone. The WB IP telephones can thus be connected to the network using only PSTN lines.
Abstract:
Devices, software, and methods quantify a burstiness quality of the packet loss in the node of a path. The quantified burstiness becomes a metric for determining the Quality of Service (QoS) offered by a node in retransmitting data through a network. Network routing and rerouting decisions are made according to the improved QoS. The burstiness statistic is determined by counting lengths of episodes of sequentially discarded packets at the node. The burstiness statistic is incorporated as a metric with the other metrics of the QoS of the node.
Abstract:
A mobile station includes a first wireless interface that can couple to a first wireless network, a second wireless interface that can couple to a second wireless network, and a controller. The controller can negotiate a first wireless link with the first wireless network using the first wireless interface and establish a communication session with a remote device using the first wireless link. The controller can also detect a session handoff trigger, negotiate a second wireless link with the second wireless network using the second wireless interface in response to the session handoff trigger, and invoke a private branch exchange feature to transfer the communication session from the first wireless link to the second wireless link.