摘要:
The performance of a scalable computing environment in a telecommunication network may be improved by configuring a server computing system to monitor a level of traffic throughput within the telecommunication network to determine whether an increase in throughput capacity is needed or a decrease in throughput capacity is acceptable, and increasing a throughput capacity of the telecommunication network when an increase in throughput capacity is needed by adding a logical scalable unit to the telecommunication network. The logical scalable unit may including a minimum combination of logical components required to provide in a single multiprocessor system a complete set of telecommunication functionalities for a subset of users in the telecommunication network.
摘要:
Methods, devices and systems enable restoring a database system more efficiently. A server computing device may be configured to determine a recovery time interval for a session store database system so as to allow a large number of sessions (e.g., ninety percent of sessions, etc.) to start and finish within that interval, periodically review database records to identify a database record that has not been updated within a most recent recovery time interval, add the identified database record to a journaling log, and update the identified database record to include information identifying a time at which the database record was last added to the journaling log. After detecting a failure event, the server computing device may perform the database operations identified in the journaling log to restore the database system.
摘要:
A network server may be configured to generate, modify, augment, communicate, and/or manage the triggers and signaling communications so that they may be processed and communicated in a more intelligent, efficient, and/or cost effective manner than that which is available via conventional solutions. The network server may receive a trigger communication message that includes trigger parameters and information suitable for causing a destination device to automatically initiate an operation, determining a criterion for sending the trigger communication message to the destination device based on the trigger parameters included in the trigger communication message, monitoring a condition to determine whether the criterion has been satisfied, and send the trigger communication message to the destination device when it is determined that the criterion has been satisfied.
摘要:
Methods, servers and systems for communicating signaling information in a telecommunications signaling network implement methods that include receiving a first message encoding signaling information from a source component and processing the message using a fixed pipeline having a plurality of modules, each module having at least one procedure for performing a specific set of tasks. Application level routing operations may be performed to identify a suitable destination component. Information contained in the first message may be used to generate a second message encoding signaling information, which is sent to the identified destination component.
摘要:
A combination of an independent key routing (IKR) method and a data proxy architecture (DPA) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a plurality of keys for a plurality of message types, identify a first logical scalable unit (LSU) that includes a first memory that stores a first type of data via a database API and a first key, identify a second LSU that includes a second memory that stores a second type of data relating to the subscriber via the database API and a second key of the plurality of keys, store the first communication message and the first key in the first database memory, and store the first key in the second database memory.
摘要:
The various embodiments include methods, computing devices and communication systems for controlling services in a communications network. A communications server may be configured to receive bounding information from a first server, decision making information from a second server, and a request to generate a decision from any of a number of different systems or components. The communications server may define bounds for generating the decision based on the received bounding information, and generate the decision based on the received decision making information and defined bounds. The communication server may send the generated decision to a third server implementing a functional system, such as a server in policy management system, policy enforcement system, charging system, or mobile application server system.
摘要:
A system and method for telecommunications operators to enable group based dynamic policy controls for both pre-paid and post-paid subscribers, who are typically not managed in an Online Charging System (OCS), but rather in an Charging System or a Billing System. Examples of policy controls that may be enabled by this invention include tracking spending for post-paid subscribers, managing subscriber usage across fixed-line and mobile networks, and so on. This is achieved by introducing a new component called the Enhanced Charging System (ECS) and creating a new reference point and interface between the Policy Management System and the ECS.
摘要:
Methods, devices and systems enable restoring a database system more efficiently. A server computing device may be configured to determine a recovery time interval, periodically review database records to identify a database record that has not been updated within a most recent recovery time interval, add the identified database record to a journaling log, and update the identified database record to include information identifying a time at which the database record was last added to the journaling log. After detecting a failure event, the server computing device may perform the database operations identified in the journaling log to restore the database system.
摘要:
A combination of a common key routing (CKR) method and data proxy architecture (DPA) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor in a multiprocessor computing system may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a common key based on the subscriber identifiers, identify a first logical scalable unit that includes a first database memory that stores subscriber data relating to the subscriber via a database application programming interface (API) and the common key, store the first communication message in the first database memory included in the first logical scalable unit, and receive a second communication message in response to storing the first communication message in the first database memory and routing the second communication message to another component the telecommunication network.
摘要:
The system and methods of the various embodiments enable the efficient management and distribution of application filters or packet flow descriptions within a telecommunications network. A policy management system may be configured to receive a request message from a charging and enforcement (CaE) component, determine application identifiers for a data communication based on information included in the received request message, and determine policy rules. The policy management system may send a stimulus message that includes the determined application identifiers to a filter management system component so as to cause the filter management system to preemptively provision the charging and enforcement component with application filters. The policy management system may also send a response message that includes the determined policy rules to the CaE component. The charging and enforcement component may use the application filters to identify a data communication and implement the received policy rules for the identified data communication.