BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY Patent applications |
Patent application number | Title | Published |
20160139938 | ENFORCING SOFTWARE COMPLIANCE - An apparatus for enforcing a compliance requirement for a software application in execution in a virtualised computing environment, the apparatus comprising: an identifier component operable to identify a resource instantiated for execution of the application; a retriever component operable to retrieve a compliance characteristic for the application, the compliance characteristic being retrieved based on the identified resource and having associated a compliance criterion based on a formal parameter, the compliance criterion defining a set of compliant resource states; a first selector component operable to select a software component for providing an actual parameter corresponding to the formal parameter, the actual parameter being based on data concerning the resource; an evaluator component operable to evaluate the compliance criterion using the actual parameter; an application modifier component operable to, in response to a determination that the resource is outside the set of compliant resource states, the determination being based on the evaluation of the compliance criterion, modify the software application to a modified software application having associated a resource with a state belonging to the set of compliant resource states; and a detector component operable to detect a change to one or more of the resources, wherein the identifier component, selector component and evaluator component are operable in response to a determination by the detector component that one or more resources is changed, and wherein the selector selects the software component based on an identification of one or more data items that the software component is operable to provide. | 05-19-2016 |
20160134944 | CONTENT DISTRIBUTION SYSTEM AND METHOD - There are described methods and systems for distributing content in a network, in particular a multicast network. One method includes delivering content from a source to a destination in a content delivery network. A request for an item of content is received and a first multicast stream is identified or established, the first multicast stream comprising a first copy of the content. At least one second multicast stream is also identified or established, the second stream comprising a second copy of the content. The second copy of the content is time-shifted by a time, M, from corresponding portions of the first copy of the content. The content is then delivered to the destination using both the first and the second multicast streams. | 05-12-2016 |
20160066227 | ACCESS POINT SELECTION IN A WIRELESS NETWORK - In a wireless network such as Wi-Fi, a wireless access point connected to a client device monitors the quality of the link to the client device. When the client device sends probe frames indicative of the link to the connected access point being too low for continued data connectivity, the access points forwards connection data to a management server. When other access points receive the probe requests, they consult the management server to obtain the low channel quality data and use it as a threshold for determining whether to respond to the client device's probe request. | 03-03-2016 |
20160057290 | INITIATING A CALL IN A COMMUNICATIONS SYSTEM - A method for initiating a call in a communications system comprising a mobile communications device connected in a mobile communications network. The mobile communications device is allocated a mobile identifier for a first, mobile communications service provided by a mobile communications service provider and is allocated a second identifier for a second communications service provided by a second communications service provider that is different from the first, mobile communications service. The method comprises receiving over a data connection, at a switch, a request from the mobile communications device, comprising the second identifier, to initiate a call using the second communications service and adding, at the switch, the mobile identifier to the request and forwarding via a further network, the request comprising both the second identifier and the mobile identifier. | 02-25-2016 |
20160057249 | CONTENT DISTRIBUTION SYSTEM AND METHOD - There are described methods and systems for distributing content in a network, in particular a multicast network. One method includes delivering content from a source to a destination in a content delivery network. A request for an item of content is received and a first multicast stream is identified or established, the first multicast stream comprising a first copy of the content. At least one second multicast stream is also identified or established, the second stream comprising a second copy of the content. The second copy of the content is time-shifted by a time, M, from corresponding portions of the first copy of the content. The content is then delivered to the destination using both the first and the second multicast streams. | 02-25-2016 |
20160044685 | CHANNEL SELECTION IN A WIRELESS NETWORK - An adaptive channel selection method is disclosed, performed by an autonomous communications node for selecting one of a plurality of possible channels in an unlicensed spectrum band. The method comprises: (a) for each channel: (i) determining a first interference measure U | 02-11-2016 |
20150358397 | DISTRIBUTED SYSTEM - A distributed system is disclosed in which one or more servers respond to requests for content including hyperlinks. Hyperlinks provide an interactive visual manifestation of an underlying reference to a resource. By using a graphical user interface provided by the device, a user is able to select a hyperlink, and thereby control the device to obtain the resource to which the underlying reference refers. However, if a user selects a hyperlink and the device is unable to follow the underlying reference to obtain the resource, user disappointment results. By arranging the server, on providing visual content including one or more hyperlinks, to attempt ( | 12-10-2015 |
20150349842 | FAULT IDENTIFICATION USING LINE ATTENUATIONS - The present invention presents a method of identifying faults in a DSL line using upstream and downstream attenuation measurements, which can be obtained directly from the DSLAM or CPE, thus requiring no specialist test equipment nor disrupting service. A downstream over upstream attenuation ratio is calculated for a line, with calculations repeated over a population of lines. The distribution of ratios, as well as upper and lower thresholds, is determined based on the population. A line is identified as being potentially faulty if it has an attenuation ratio above the upper threshold or below the lower threshold. Specifically, an attenuation ratio below the lower threshold is identified as having a high resistance joint fault (caused by an imperfect connection or corrosion at a joint in at least one of the pairs of a line), and a ratio above the upper threshold as a shunt (caused by degradation of the insulation between the pairs of a line, and often coupled with water ingress). | 12-03-2015 |
20150347215 | DETECTION OF DATA CONNECTION LOSS - A method of detecting loss of data connection in a plurality of links between an exchange and one or more of a plurality of network terminals arising during presence of a user at an intervention point node on the links between the exchange and the network terminals, comprising: receiving connection information about a loss of data connection on any one of the links; receiving duration information about a duration of the user presence at the intervention point node; determining if the loss of data connection occurred within the user presence duration; causing line tests to be conducted on each of the links for which loss of data connection is determined to have occurred within the user presence duration; receiving results of the line tests including a number of links being determined, by the line test, to exhibit a fault; and determining if the number of links determined to exhibit a fault exceeds a predetermined threshold number. | 12-03-2015 |
20150244866 | SHARED VOICEMAIL SYSTEM - A shared voicemail system and method of operation in which the system comprises a computer processor configured in use to store a voice message received from a third party; in which the stored voice message is accessible to each user of a plurality of users of the shared voicemail system. The computer processor also configured in use to provide a copy of the stored message to a first user of the plurality of users, receive an indication from the first user that the message is intended to be accessed by a second user of the plurality of users and to provide a notification prompting the second user to access the message. In an embodiment, the voice message received from the third party is part of a call redirected to the shared voicemail system from a phone line shared by the plurality of users. | 08-27-2015 |
20150229562 | APPLICATION LAYER SESSION ROUTING - A method and server system for providing application layer session routing based on network element availability. A server system ( | 08-13-2015 |
20150067330 | METHOD AND SYSTEM FOR NETWORK DATA ACCESS - Embodiments of the invention provide a method and system which allow for ready revocation of end user access rights by virtue of storing data in an encrypted form in a network environment, and using a trusted proxy server to re-encrypt the data itself to permit eventual decryption of the data by an authorised end user. However, if the end user's access rights are revoked then the trusted proxy does not perform the re-encryption of the data, and the end user is not then able to subsequently decrypt data stored in the network environment, even if it is able to access the data, without permission. Embodiments therefore have advantages that access control is decoupled from data confidentiality to provide scalability, and revocation of user access rights can be accomplished without requiring re-encryption of the stored data. | 03-05-2015 |
20150036539 | METHOD AND SYSTEM FOR PREVENTING THE PROPAGATION OF AD-HOC NETWORKS - A network management system ( | 02-05-2015 |
20150029887 | SIGNALLING CONGESTION - Methods and apparatus are disclosed for signalling congestion being caused by data items such as packets, received at a network element such as a router, in a communications network such as the Internet, or being caused by items otherwise requiring service or capacity from a shared resource. Preferred embodiments of the method involve identifying whether or not received data items received at a network element are capable of carrying congestion indications such as ECN marks, and for those that are capable, assigning congestion indications to the data items in dependence on a queue length characterisation based on a substantially current, instantaneous measurement of the length of the queue, whereas for those that are not capable, a sanction such as dropping may be applied in dependence on a different queue length characterisation based on a weighted moving average of current, recent, and less recent measurements of the length of the queue. | 01-29-2015 |
20150012468 | RECOMMENDER CONTROL SYSTEM, APPARATUS, METHOD AND RELATED ASPECTS - A recommender system ( | 01-08-2015 |
20140347562 | ASSESSING PACKET LOSS VISIBILITY IN VIDEO - The invention presents a new NR-H method for assessment of packet loss visibility measure for a video sequence, where the measure is indicative of the effect on the perceptual quality of the video. Packet loss can occur as a result of the video being transmitted over an imperfect network. The invention combines dynamic modelling of temporal and spatial properties of the decoded pictures with bitstream information revealing location, extent and propagation of any errors. Analysis is performed on blocks of pixels, and preferably the macroblocks defined in the particular video encoding scheme. Knowledge of the error extent from the bitstream information is used to target spatial analysis around the specific error locations. Perceptual impact is estimated by utilising spatio-temporal modelling to predict the properties of a missing block, and comparing those predictions with the actual properties of the missing block. | 11-27-2014 |
20140344908 | DATA RETRIEVAL REDIRECTION - An asset location request redirection system ( | 11-20-2014 |
20140325021 | DISCOVERING DATA NETWORK INFRASTRUCTURE SERVICES - A method and apparatus for providing services that are adapted to the access networks of end users ( | 10-30-2014 |
20140297811 | MANAGING STREAMED COMMUNICATION - Methods, apparatus and systems are disclosed for managing streamed communication (such as video, audio, or audio-visual communication) between client devices and remote devices via a digital data communication network in situations where the data communication network comprises one or more routers operable to receive streamed data from one or more client devices and/or from one or more other routers, and to forward such streamed data to one or more remote devices and/or to one or more other routers such as to enable the client device and potentially-varying subsets of the one or more remote devices to participate in a communication session. | 10-02-2014 |
20140289864 | METHOD AND APPARATUS FOR SECURING A COMPUTER - A computer system ( | 09-25-2014 |
20140282919 | CONTROLLED ACCESS - User access to a protected resource is controlled by: intercepting a request from a client browser ( | 09-18-2014 |
20140254574 | FIREWALL ACCESS FOR INBOUND VOIP CALLS - A method and a system for providing firewall access to inbound calls in a Voice over Internet Protocol (VoIP) communication session. The server, after receiving a message for an incoming call, sends a PUSH alert notification to the destination device via a cellular network which lacks firewalls to stimulate creation of a new pin hole through the firewall by a renewed registration from the destination device of a Session Initiation Protocol (SIP) application. | 09-11-2014 |
20140200043 | GROUP SUBSCRIBER NUMBER MANAGEMENT SYSTEM FOR A GROUP MESSAGING SERVICE - A method for managing group subscriber numbers in a group messaging device reduces the required number of group subscriber numbers used by the messaging service. The required number of group subscriber numbers is equal to the total number of groups in which a user is permitted to be a member and not the total number of groups of users in the system. | 07-17-2014 |
20140198667 | MEASUREMENT METHOD - The performance of a test apparatus for a communications network may be inferred by analyzing a set of performance data results measured on a number of different lines in the network. Once a sample of sufficient size for a particular test apparatus has been created then it is possible to infer the performance of the test apparatus based on the ratio of passes to fails recorded. | 07-17-2014 |
20140173687 | DISTRIBUTED COMPUTING SYSTEM - A Policy Enforcement Point (PEP) enforcement module ( | 06-19-2014 |
20140173622 | DATA ANALYSIS SYSTEM - The present invention, provides a method of data analysis in which data subscriptions are defined and data for that subscription be collected for analytical purposes. Supplemental queries based on new information received can be generated automatically and old queries can be eliminated automatically on the basis that they are rendered obsolete in. terms of not providing novel information in comparison to other queries and their results not being used. | 06-19-2014 |
20140140695 | COMMUNICATIONS NETWORK - A communications network wherein first and second optical signals can be launched into an optical fiber in respective first and second regions of a transmission window such that controllable filters can be used to selectively recover the first and second optical signals. This partitioning of the transmission window allows two incompatible optical signals to coexist in the same optical fiber. | 05-22-2014 |
20140140234 | DETERMINING PATH CONGESTION MEASURES - Methods and apparatus for determining measures indicative of downstream path congestion in respect of a node via which a plurality of data units are traversing an end-to-end path from a sender to a receiver, each data unit having a first indication settable in dependence on information from the receiver to each of at least two states whereby to indicate different levels of congestion experienced on the end-to-end path by data units previously received by the receiver; and a second indication settable to an initial state and to at least one updated state indicative of congestion experienced by data units on their path from the sender to said node; the method comprising receiving a plurality of said data units at said node, and determining said downstream path congestion measure in dependence on an inflation factor itself dependent on the proportion of a set of said data units whose second indication on receipt at said node is in said initial state. | 05-22-2014 |
20140025698 | TEXTUAL ANALYSIS SYSTEM - The present invention provides a method, and an associated apparatus configured to implement such a method, for analysing mark-up language text content, such as might be found on a website or within online user generated content. The method comprises a training phase, in which plurality of schemas are automatically generated from a specified text and a final schema is compiled. This final schema can then be used to compare with other online text content such that content which matched the final schema can be identified, for example for further analysis and comparison. | 01-23-2014 |
20130339529 | SERVICE SESSION RESOURCE MANAGEMENT - A service session resource manager ( | 12-19-2013 |
20130329739 | OBTAINING INFORMATION FROM DATA ITEMS - Methods and apparatus are disclosed for obtaining information from a predetermined portion of a header of a data item such as an IP packet transmitted via a communication network such as a packet network, the portion carrying a codepoint selected from a first set of codepoints each of which has a pre-defined meaning according to a first pre-defined communication protocol. The method comprises: receiving the data item (s | 12-12-2013 |
20130322522 | COMPACT CUMULATIVE BIT CURVES - Embodiments of the present invention provide a compact representation of a cumulative bit curve formed from piece-wise straight line approximations between upper and lower bounds about an actual cumulative bit curve (CBC). In one embodiment the lower bounds are found by applying a constraint such that if a delivery rate was to be calculated using the count at the lower bound it would result in a delivery rate which was greater than the delivery rate that would be calculated using the actual CBC data by a particular amount, for example 10%. The actual CBC data is then used as an upper bound. As a result, the approximated CBC will lie for each GoP between the actual CBC value and the lower bound, with the result that one can be certain that any data rate that is calculated using the approximation will be at least as high as a data rate that is calculated using the actual CBC data. In terms of line-fitting algorithms that are used, several different algorithms may be used of differing complexities, with the intention of trying to minimise the number of end-points required of within the piecewise approximation. | 12-05-2013 |
20130311626 | COMMUNICATIONS NETWORK MANAGEMENT - The present invention provides a communications network comprising a plurality of routers and a plurality of communications links which interconnect the routers and a global network management module. The global network management module is in communication with a number of diverse information sources, such as television listings, social networking sites, user preferences, historical data relating to the accessing of content, etc. such that the global network management module can make a prediction as to the likelihood that a particular network traffic event will occur and the demands that such a traffic event will place on the network. If the global network management module decides that the traffic event will occur then it will pre-configure the communications network such that the traffic generated by the event can be carried across the network within pre-defined quality thresholds and without unnecessarily effecting other traffic being carried on the network. | 11-21-2013 |
20130308451 | MULTIPLE ACCESS COMMUNICATION - The application concerns interference mitigation in a CSMA/CA system (e.g. WLAN/WIFI); a distinction is made between two kinds of interference, namely “noise” and “congestion/collision”; a measure of congestion is determined as follows: if packets are queued waiting for transmission, a timer is started and the clear channel assessment (CCA) function is initiated. Periodically a check is made to determine whether a channel is available and when a channel becomes available the first queued packet is transmitted and the timer is stopped. The value recorded by the timer is used to indicate a measure of congestion. | 11-21-2013 |
20130297818 | VIDEO STREAMING OVER DATA NETWORKS - A client device receives streamed encoded content data, such as encoded video data, which has been encoded at a constant perceptual quality. Several different versions of the content are available to be streamed to the device, at different perceptual quality levels. In order to decide which quality level to request from a content server at intervals the device calculates the delivery rates that would be required for each level of quality. The delivery rates are calculated in dependence on so-called critical points, which are points at which a piecewise constant bit rate delivery schedule is just equal to the decoding schedule. There are two classes of critical points, being a first class of critical points, referred to herein as “additional critical points”, which are points on the decoding schedule where, for any particular other point on the decoding schedule before an additional critical point, and assuming that a minimum threshold amount of data is buffered when delivery occurs from the particular point, a constant bit rate delivery schedule that is calculated for the particular point taking into account the buffered minimum amount of data and of such a rate such that buffer underflow does not occur is substantially equal to the decoding schedule. A second class of critical points, referred to herein as “downstairs critical points”, is also defined, which are derived from the decoding schedule as a whole, and which are the points at which a piecewise monotonically decreasing constant bit rate delivery schedule (the so-called “downstairs” schedule), which is calculated such that when delivering the encoded content data from the start buffer underflow does not occur, is substantially equal to the decoding schedule of the encoded content data. When the actual delivery rate received is ahead of the so-called “downstairs” schedule, then the delivery rate required for a particular quality level can be calculated from the second class of critical points. However, when the actual delivery rate received is behind the downstairs schedule, then the delivery rate required is calculated from the first class of critical points. | 11-07-2013 |
20130291032 | METHOD FOR DELIVERING VIDEO CONTENT ENCODED AT ONE OR MORE QUALITY LEVELS OVER A DATA NETWORK - A client device receives streamed encoded content data, such as encoded video data, which has been encoded at a constant perceptual quality. Several different versions of the content are available to be streamed to the device, at different perceptual quality levels. In order to decide which quality level to request from a content server at intervals the device calculates the delivery rates that would be required for each level of quality. The calculation of the delivery levels is made in dependence on whether the actual delivery rate that has been received so far is greater than or less than a constant bit rate delivery schedule that decreases monotonically but which guarantees to deliver the encoded data in a timely manner such that no buffer underflow and interruption of reproduction takes place. The monotonically decreasing bit rate schedule is defined by one or more “critical points”, which are the points at which the bit rates are decreased, and correspond to the points where the delivery schedule is just equal to the decoding schedule of the encoded data. At such points there would be no encoded data in a buffer at the client. If the delivery rate has been greater than the constant bit rate schedule for a quality then the delivery rate required going forward for a particular quality level can be calculated from the critical point information, and no more complicated calculation is required. | 10-31-2013 |
20130290338 | METHOD AND APPARATUS FOR PROCESSING ELECTRONIC DATA | 10-31-2013 |
20130279565 | VIDEO CODING - Methods and apparatus for video coding are disclosed, particularly for use in relation to video compression. Many commercially available video encoders support constant bit-rate encoding but not constant quality encoding. Aspects of the present invention are concerned with methods and apparatus for video coding, the methods involving the determination of bit-rates at which a constant bit-rate encoder may be operated such that segments of video can be chosen from files encoded at the bit-rates so-determined in order to produce an output bitstream in which the quality is nearly constant. Bit-stream segments may be chosen from a low bit-rate bitstream for easy-to-compress scenes, and from a high bit-rate bitstream for hard-to-compress scenes. | 10-24-2013 |
20130275589 | COMMUNICATIONS NETWORK MANAGEMENT - The present invention provides a communications network which is divided into a plurality of segments, with each segment comprising one or more routers and one or more communications links that connect the routers. Quality of service (QoS) thresholds can be defined for each of the segments and if it is predicted that one of these thresholds is to be breached in one of the segments, for example due to a communications link or a router being overloaded, then a segment management module associated with that segment will re-route the traffic. | 10-17-2013 |
20130275567 | COMMUNICATIONS NETWORK MANAGEMENT - The present invention provides a segmented network in which each segment comprises one or more routers, one or more communications links to provide connectivity between the router(s) and a segment management module. The segment management module uses operational data to predict the future performance of each element. If the predicted performance will breach a threshold value then a data flow may be re-routed. Re-routing between different segments can lead to network management problems and so the present invention discloses methods by which: segments can expand to acquire a router from another segment; segments can subdivide; and segments can merge together, particularly if a segment comprises too few routers. | 10-17-2013 |
20130270004 | BORING RAM - A ram for boring through soil, comprising an elongate body terminating at one end in a head, wherein during use the head is separated from the body to form a channel therebetween for the soil to pass through from one side of the ram to another side of the ram. | 10-17-2013 |
20130259467 | COMMUNICATIONS NETWORK - A passive optical network is provided which uses existing GPON OAM functionality and standard routing protocol messages to solve the downstream routing problem between an access service provider and one or more other communication provider networks. | 10-03-2013 |
20130216029 | SPEECH COMPARISON - Fraudulent callers that masquerade as legitimate callers in order to discover details of bank accounts or other accounts are an increasing problem. In order to detect possible fraudsters and preventing them from obtaining such details a method and system is proposed that transform the recorded speech of a batch of incoming calls to strings of phonemes or text. Thereafter similar speech patterns, such as distinct similar phrases or wording, in the recorded speech are determined and calls having similar speech patterns, and preferably also similar acoustic properties, are grouped together and identified as being from the same fraudulent caller. Transactions initiated by the fraudulent caller can as a result be stopped and preferably a voiceprint of the fraudulent caller's speech is generated and stored in a database for further use. | 08-22-2013 |
20130215773 | DATA COMMUNICATION - A management device is used in an access network including a plurality of data connections between end user devices and an aggregation transceiver device where the connections are aggregated for onward connection through the access network. The access network stores a plurality of different profiles, each of which specifies a set of values for a plurality of parameters associated with each data connection. The device applies one of the stored profiles to each connection, and receives a notification in the event of one of a predetermined set of notifiable events occurring on the connection. It is determined if more than a predetermined number of notifications are received within a predetermined period for a respective connection and, in the event of such a determination being made, a different one of the profiles is caused to be applied to the connection. | 08-22-2013 |
20130208942 | DIGITAL VIDEO FINGERPRINTING - A digitally encoded video fingerprinting system for generating and comparing/matching finger-prints from digitally encoded video which has been encoded according to an encoding method which involves the generation of residual macroblocks of pixels and the generation of quantized transform coefficients of the residual macroblocks, or of portions of the residual macroblocks, comprises a fingerprint database ( | 08-15-2013 |
20130201836 | DATA COMMUNICATION - A method of operating an access network including a plurality of data connections ( | 08-08-2013 |
20130185399 | CONTENT DELIVERY - A method for providing equitable media streaming between an HTTP server and a number of receivers via shared network. The streaming data is processed to split the data across a number of sub-streams. Each sub-stream contains non-contiguous data. A receiver requesting the streaming media establishes a number of TCP sessions, one for each sub-stream and the received sub-stream data is reassembled at the receiver so that the streaming media can be presented. | 07-18-2013 |
20130182603 | METHOD OF DETERMINING LOCATION - A method for determining a location of a mobile apparatus based on the presence of wireless access point signals. The received wireless signal strength from a plurality of observed wireless access points is compared with profiles each relevant to a different user context and containing a plurality of previously registered wireless access point signal strengths around a previously registered location. The location of the mobile apparatus is determined based on the profile most closely matching the collection of observed wireless access points. Wireless access points present in the profile but not observed are ignoring during the matching process. | 07-18-2013 |
20130182573 | MULTI-CLASS DATA TRANSPORT - Methods and apparatus for controlling the forwarding of a flow ( | 07-18-2013 |
20130170384 | NETWORK TECHNOLOGY SELECTION - A system for assisting the installation of a communications service at a customer premises ( | 07-04-2013 |
20130163732 | SYSTEM FOR PROVIDING TELEPHONY AND DATA SERVICES - A system to provide telephony and data services includes a termination unit having a connector portion to a corresponding termination unit to modem connector containing at least three conductors. The termination unit provides a good electrical connection between two conductors that carry data signals between the access network and a user modem, and insulates the other conductor or conductors from the incoming pair of conductors. A user modem connects to the termination unit to modem connector and is operable to transmit data signals onto and to receive data signals from the data carrying conductors as well as telephony signals onto and from a pair of modem-side telephony signal carrying conductors. A cross-connection unit has a connection portion that connects with a telephone connector. | 06-27-2013 |
20130111060 | VIDEO STREAMING | 05-02-2013 |
20130103833 | METHOD AND APPARATUS FOR A MOBILE NODE TO CONNECT DIFFERENT ACCESS ROUTERS WHILE MAINTAINING A CONSISTENT NETWORK ADDRESS - In a Proxy Mobile IPv6 (PMIP) network, a mobile node can roam between different access networks while maintaining a consistent IP address for session continuity. To provide access to a user's home LAN resources, even when the user's mobile node is not directly attached to the home LAN, a local mobility anchor and mobility access gateway are configured to authenticate the mobile node credentials and if authorised, to provide access to the user's LAN resources by via data tunnels and routing table reconfigurations. | 04-25-2013 |
20130088997 | MONITORING PATH CHARACTERISATION INFORMATION - Methods and an associated traffic management module and system are disclosed for monitoring, at a traffic management module ( | 04-11-2013 |
20130070908 | NETWORK TESTING - The present invention provides a method of testing a transmission line from a copper access network. The transmission line is tested to generate values for a plurality of network parameters. Using previously determined test results, it is possible to calculate an estimate of the length of the transmission line based on the values of each of the measured parameters. These estimates of the transmission line length can then be used to compute a weighted average of the transmission line length. An inference of the condition of the transmission line can be made by comparing the estimates of the length of the transmission line with the weighted average length. | 03-21-2013 |
20130031615 | SYSTEM AND METHOD FOR WLAN ROAMING TRAFFIC AUTHENTICATION - A system and method for recognising traffic generated from an authenticated a device roaming in a wireless local area network and related aspects are provided. An authentication server is arranged to authorise communications traffic originating from a wireless access point to use a roaming service, the traffic comprising an NAT translated IP address. The server first authorises a WLAN roaming device, and then processes a meta-data message received from a WLAN access point in which the source address of the message comprises the source address of the roaming device at the WLAN access point. The server then determines, from the information provided in the meta-data message when it is received by the authentication server, which includes at this point a NAT translated source address in the meta-data message what the NAT translated source address of traffic from said NAT translated source address. In this way, all traffic generated by the roaming device whilst that NAT translated IP address is valid is automatically authorised to use a roaming service to access the internet. | 01-31-2013 |
20130031251 | COMPLEX EVENT PROCESSING SYSTEM AND METHOD - A complex event processing system comprises a complex event processing engine ( | 01-31-2013 |
20130031157 | DISTRIBUTED SYSTEM - A computing node in a distributed system comprising a processor and associated memory, said memory storing: software component code executable to provide a service to software components running on other computers in said distributed system; component monitoring code executable to generate an event message for distribution in said distributed system in response to the occurrence of an event pertaining to the performance of said software component; action request assembly code executable to store an assemblage of action requests received from other computers in said distributed system in reaction to the distribution of said event message in said memory; action request assemblage processing code executable to order and/or filter said assemblage of action request to generate a processed set of action requests for execution by said software component. | 01-31-2013 |
20130028392 | DATA COLLECTION IN AN ACCESS NETWORK - A telecommunications access network includes a plurality of telecommunications lines ( | 01-31-2013 |
20130028252 | COMPUTER TELEPHONY - Computer-telephony events are initiated by a user operating a computer terminal to control, through a computer-telephony controller, operation of a communications terminal. The computer-telephony controller receives from a first computer terminal a request for a first computer-telephony event; in which the request for the first computer-telephony event comprises a label value. The computer-telephony controller refers to a mapping between the label value and an identifier of a communications terminal; and initiates the requested first computer-telephony event controlling operation of the communications terminal. The computer-telephony controller then receives, from second computer terminal | 01-31-2013 |
20130024567 | NETWORK MONITOR - A computer network monitoring controller for monitoring the performance of a plurality of virtual machines in a cloud computing environment, each virtual machine being a set of resources hosted on a hardware platform and arranged to appear as a real hardware to a client, the virtual machines being allocated and generated by a management system, the monitoring controller comprising: a plurality of interfaces, each one connected to a monitoring system having links to at least one of the virtual machines, and each monitoring system being arranged to capturing event messages relating to the status of the virtual machine and outputting these event messages in a monitoring system specific format; an data store for storing event messages received from each of the monitoring systems via the interfaces; a receiver for receiving monitoring requests from said management system, each request specifying monitoring requirements relating to at least one of the virtual machines; a converter for converting the messages from the monitoring systems into a common format for storage in the event log; a processor for processing the received requests and matching the requirements to event messages received from the plurality of virtual machines; and a sender for sending matched event messages to the management system in the common format. | 01-24-2013 |
20130024453 | CONTEXT SYSTEM - The present invention provides an extended context map that can be used in the prioritisation of content which is displayed to a user. The extended context map contains a hierarchical arrangement of contexts, which are associated with a hierarchical arrangement of topics and sub-topics. | 01-24-2013 |
20130024407 | TEXT CLASSIFIER SYSTEM - The present invention provides a method, and a system, for analysing a textual passage and classifying it against a number of predetermined categories. In the event that the text passage under analysis is not sufficiently similar to any of the predetermined categories then it will be classified as belonging to a further category. | 01-24-2013 |
20130019298 | METHOD AND SYSTEM FOR AUTHENTICATING A POINT OF ACCESSAANM Jover Segura; XavierAACI LondonAACO GBAAGP Jover Segura; Xavier London GBAANM El-Moussa; FadiAACI LondonAACO GBAAGP El-Moussa; Fadi London GB - Rogue or malicious access points pose a threat to wireless networks ( | 01-17-2013 |
20130019163 | SYSTEMAANM Thompson; Simon GAACI WoodbridgeAACO GBAAGP Thompson; Simon G Woodbridge GBAANM Nguyen; Duong TAACI LondonAACO GBAAGP Nguyen; Duong T London GBAANM Thint; Marcus AlfredAACI RestonAAST VAAACO USAAGP Thint; Marcus Alfred Reston VA USAANM Gharib; HamidAACI IpswichAACO GBAAGP Gharib; Hamid Ipswich GB - The present invention provides a system which is able to detect similar web page elements which are described in mark-up language, such that the content of those elements can be captured. Text content may then be sent to a text classifier for further analysis. | 01-17-2013 |
20130019111 | SECURE DATA RECORDERAANM Martin; ThomasAACI SharjahAACO AEAAGP Martin; Thomas Sharjah AE - A method and apparatus for securely encrypting data is disclosed. Conventional protections against the loss or theft of sensitive data such as full disk encryption are not effective if the device is, or has recently been, running when captured or found because the keys used for full disk encryption will still be in memory and can be used to decrypt the data stored on the disk. Some devices, such as devices which gather sensitive data in use, must run in environments in which they might be captured by a person seeking access to the sensitive data already recorded by the device. An encryption method is proposed in which files on a recorder's persistent memory are initialised with pseudo-random masking data whilst the recorder is in a relatively secure environment. One or more parameters which can be used to re-create the pseudo-random masking data are encrypted with a public key using a public-key encryption algorithm and stored on the recorder. The device's memory is then purged to remove the one or more parameters. Later, when miming in a relatively insecure environment, the sensitive data is encrypted ( | 01-17-2013 |
20130016224 | SYSTEM FOR VIDEO QUALITY PREDICTION AND RELATED ASPECTSAANM Davis; Andrew GAACI WoodbridgeAACO GBAAGP Davis; Andrew G Woodbridge GB - A method of generating a measure of quality for a video signal representative of a plurality of frames, the video signal having: an original form; an encoded form in which the video signal has been encoded using a compression algorithm utilising a variable quantiser step size such that the encoded signal has a quantiser step size parameter associated therewith and utilising differential coding such that the encoded signal contains representations of the prediction residual of the signal; and a decoded form in which the encoded video signal has been at least in part reconverted to the original form, the method comprising: a) generating a first quality measure which is dependant on said quantiser step size parameter according to a predetermined relationship; b) generating a masking measure, the masking measure being dependant on the spatial complexity of at least part of the frames represented by the video signal in the decoded form according to a first predetermined relationship; and c) generating a combined measure, the combined measure being dependant upon both the first measure and the masking measure according to a predetermined relationship, wherein, the method also includes: generating an first measure which is dependant on the prediction residual of the signal according to a first predetermined relationship; and identifying one or more regions of the picture for which the first measure exceeds a threshold, wherein the masking measure is dependant on the spatial complexity of the identified region(s) according to a predetermined relationship; and further comprises: generating a background measure which is dependant on the prediction residual of the signal according to a second predetermined relationship; and identifying one or more other regions of the picture for which the background measure is below a threshold, wherein the masking measure is dependent on the spatial complexity of the identified other region(s) according to a predetermined relationship. | 01-17-2013 |
20120124623 | COMMUNICATIONS SYSTEM - Supplementary data associated with a broadcast transmission ( | 05-17-2012 |
20120099424 | DYNAMIC LINE MANAGEMENT - A Digital Subscriber Line Access Multiplexor (DSLAM) for operation within an access network includes a plurality of digital subscriber line modems for terminating a plurality of corresponding digital subscriber lines and aggregating them for onward connection through the access network. The DSLAM is operable, each time a data connection is established or re-established over one of the digital subscriber lines, to generate line data about the data connection at the DSLAM, to store the line data, to wait a predetermined period of time, to determine if the data connection is still operating successfully since the establishment of the connection without having suffered loss of connection during the predetermined period and then to transmit the line data to a management device | 04-26-2012 |
20120034813 | APPARATUS FOR REPAIRING WIRING - A crimp for joining copper wires in a telecommunications exchange, the crimp including a cylindrical wall of material comprising an alloy containing copper, iron, nickel, and manganese, and in an embodiment having a composition conforming to BS CN102. | 02-09-2012 |
20120029846 | PASSIVE REMOTE DETECTION OF GAS FLOW AND CABLE ARRIVAL - A system for use in installation of blown fiber for detecting a signal indicative of presence of at least one of a gas flow or an optical fiber at a remote location, comprising a gas vibration detector configured to acoustically couple with an installation duct through which the signal can travel after its generation at the remote location, and a processor arranged to receive an input from the vibration detector and to process the input to identify the signal present within the input; and a sensor for generating the signal upon sensing the presence of at least one of the gas flow or the optical fiber at the remote location. The signal can be provided by a whistle mounted on the remote end of the installation duct. The vibration sensor is typically a microphone. | 02-02-2012 |
20120027631 | AIR COMPRESSOR - A compressor including an oil separator connected to a supply of compressed air, the oil separator including a chamber having a wall defining a cavity within the chamber, and a vent within the wall, wherein the vent is in communication with the supply of compressed air at a first end, and in communication with the cavity via a second aperture, and extends substantially parallel to an externally-facing surface of the wall. | 02-02-2012 |
20120027187 | TELECOMMUNCIATIONS FILTER DEVICE - Embodiments relate to a filtering device that filters a telecommunications signal and outputs to a telephone and a data port depending on whether a data plug has been inserted into the data port. A micro switch at the data port is activated and brings filtering components in-line when a data plug is inserted, and the filtering components filter the combined telecommunications signal and outputs filtered telephony only signals to the telephone port, and data only signals to the data port. When no data plug is present in the data port, the micro switch is not activated, and the filter is bypassed, thereby presenting unfiltered telephone and data signals to the telephone port as well as any extension sockets connected thereto, but no signals to the data port. | 02-02-2012 |
20120023723 | BLOWN CABLE APPARATUS - Apparatus for installing a cable into a tube with the assistance of a fluid drag acting on the cable within the tube, the apparatus including: driving means comprising a driving surface arranged to contact the cable substantially along the full driving surface length, for driving the cable into the tube, first measurement means for obtaining a first value indicative of a rate at which the installation means is driving the cable into the tube, second measurement means for obtaining a second value indicative of a rate at which the cable is travelling through the apparatus, a processor for detecting when the first value exceeds the second value, and for reducing the rate at which the installation means is driving the cable into the tube for the duration when the first value exceeds the second value. | 02-02-2012 |
20120016986 | POLICING IN DATA NETWORKS - Apparatus and methods for policing flows of data units ( | 01-19-2012 |
20120003983 | DEVICE DETERMINATION - A method of operating a server for determining the model of a mobile device and for delivering configuration parameters to the mobile device ( | 01-05-2012 |
20110283292 | ALLOCATION OF PROCESSING TASKS - Methods and systems for allocating processing tasks between a plurality of processing resources ( | 11-17-2011 |
20110274500 | TRENCHLESS DUCTING APPARATUS FRAME - An apparatus for moving an elongate component within or through one of a plurality of sidewalls of a pit, including a gripping arrangement for releasably gripping the elongate component, a lever arm comprising a handle at a first end and the gripping arrangement at the second end, and a frame to which the lever arm is attached, wherein during use the frame is positioned substantially above the pit, and the gripping arrangement hangs downwardly from the frame into the pit. | 11-10-2011 |
20110274499 | TRENCHLESS DUCTING APPARATUS FRAME - An apparatus for moving an elongate component within or through a sidewall of a pit, including a lever arm having a handle at a first end and a gripping arrangement for gripping the elongate component at a second end, the lever arm being pivotably attached to a frame via a sleeve and arranged in use to be pivoted about a pivot point by moving the first, handle, end through an arc, and movement translation means for translating the pivoting movement of the lever arm at the first end into a substantially linear movement at the second, gripping, end. | 11-10-2011 |
20110274101 | TELECOMMUNICATIONS CONNECTIONS MANAGEMENT - A management system for controlling a digital subscriber loop telecommunications network identifies radio frequencies used by wireless transmitters in the vicinity of each electrical connection, and controls transmission frequencies carried over the respective digital subscriber loops to prevent transmission on frequencies in which nearby radio transmitters are operating. | 11-10-2011 |
20110274009 | MANAGEMENT OF TELECOMMUNICATIONS CONNECTIONS - A network distribution, point ( | 11-10-2011 |
20110272652 | TRENCHLESS DUCTING APPARATUS FRAME - An apparatus for moving an elongate component within or through a sidewall of a pit, including a frame, a lever arm pivotably attached to the frame and comprising a handle at a first end, a gripping arrangement pivotably attached to the lever arm at a second end at a gripping pivot point, allowing the gripping arrangement to pivot about the gripping pivot point to assume a first and a second installation position, wherein in a first installation position during use the gripping arrangement grips the elongate component as the lever arm pivots in a first direction and releases the elongate component as the lever arm pivots in a second, opposite, direction, and wherein in a second installation position during use the gripping arrangement releases the elongate component as the lever arm pivots in a first direction and grips the elongate component as the lever arm pivots in a second, opposite, direction. | 11-10-2011 |
20110270990 | COMMUNICATION NETWORK METHOD AND APPARATUS HAVING INTELLIGENT PERIPHERAL RESOURCE PLATFORM WITH VARIABLE NUMBER OF PORTS ASSIGNED TO CONCURRENT DIFFERENT SERVICES - A service platform in a communications network connects callers to a service resource platform when implementing services requiring specialised resources. A number of different services use a common service resource platform. The service platform is programmed with respective maximum values for the number of calls originating from each service that may be connected to the service resource platform at one time and allows the call to be connected to the service resource platform at one time and allows the call to be connected to the service resource platform only when the count value for the respective service is less than the maximum count value. The service resource platform may have a single network address and a common range of ports that are freely allocated to calls generated by the different services running on the service platform. | 11-03-2011 |
20110191472 | DYNAMIC LINE MANAGEMENT - A management device for use in an access network including a plurality of data connections between end user devices and an aggregation transceiver device where the connections are aggregated for onward connection through the access network, the access network storing in association with each data connection a Dynamic Line Management, DLM, profile which specifies a set of values for a plurality of parameters associated with the respective data connection, together with a stability level specifying a desired level of stability for the data connection. The device includes means for receiving monitoring data specifying the stability of each respective data connection over a predetermined period of time; means for selecting a DLM profile to be applied to the connection in dependence on both the monitoring data and the stored stability level associated with the data connection; and means for requesting an OSS system of the access network to apply the selected profile to the data connection. The DLM profile selection means disregards any resynchronizations or errors estimated to have occurred as a result of an area wide event such as a thunderstorm. It performs this estimation by detecting a large number of retrains and or errors occurring within a predetermined short test period. | 08-04-2011 |
20110182194 | MEASURING NETWORK METRICS - Methods and systems for determining origin-specific network metrics in respect of a data network having at least one ingress node, the method comprising: receiving data items from outside the network; forwarding the data items with headers comprising fields for carrying origin information relating to the origin of the data item, and path metric information indicative of a characteristic being monitored; causing the data items to traverse the network; updating the fields carrying path metric information as the data items traverse the network; determining the origin information and path metric information after the data items have traversed the network and deriving in dependence thereon an origin-specific path metric relating to the characteristic in respect of the relevant portion of a path across the network; and combining origin-specific path metrics derived in respect of different data items if they relate to characteristics in respect of data items having a common origin. Also, methods and systems for determining target-specific network metrics in respect of a data network having at least one egress node. | 07-28-2011 |
20110178713 | CABLE INSTALLATION APPARATUS - A device for detecting a flow of air from an exit end of a tube fed into an entrance end of the tube, including a bore having a first section with a first size bore size and a second section with a second bore size, an obstruction located within the bore between the first section and the second section, the obstruction configured to obstruct air flowing from the first section to the second section, and fixing means to fix the device to the tube so that the bore communicates with the exit end of the tube, wherein in use, an air pressure sensor is used to compare air pressure within the first bore section and air pressure within the second bore section, so that a pressure differential is indicative of an air flow within the bore. | 07-21-2011 |
20110135267 | EXCHANGE CABLING METHOD AND APPARATUS - A method of providing an interconnection between a network and service equipment, comprising:
| 06-09-2011 |
20110128975 | MULTIPLE CARRIER COMPRESSION SCHEME - A method of reducing the bandwidth required to send a plurality of client traffic frames over a plurality of carrier communications networks. Each carrier network is arranged to provide a carrier service to the client traffic frames, each client frame comprising client header information and client payload, the method comprising at an ingress node of a second carrier network: receiving a frame of traffic from a first carrier network; determining first compression information is present in the frame which has replaced redundant header information not used for forwarding the frames in the first carrier network; generating second compression information to replace the header information used for forwarding the frames in the first carrier network; replacing the header information used to forward client payloads in the first carrier network with the second compression information; and appending header information to the client payload to enable forwarding of the received frame of traffic in the second carrier network, wherein the second compression information is stored in association with the replaced first header information and the first compression information. | 06-02-2011 |
20110122893 | HEADER COMPRESSION SCHEME - A method of reducing the bandwidth required to send traffic comprising a payload and a header originating in a first communications network over another communications network. The traffic is characterized by having header information from which a path from its source to destination can be predetermined, the method comprising: determining redundant header information which is not used for forwarding the traffic in the other network; replacing at least part or all of the redundant header information with compression information having a smaller bandwidth than the replaced header information; appending header information to the traffic to enable forwarding along the path in the other network to an egress node; at the egress node, processing the traffic to remove the appended header information and restore the replaced header information by removing the compression information and using the compression information to perform a look-up operation which retrieves the replaced redundant header information from a data store, wherein the same compression information is used to replace the same redundant header information for all the traffic having the same predetermined path; compression information comprising a dummy header data structure which conforms to a communications protocol arranged to be identifiable by traffic type in a carrier frame. | 05-26-2011 |
20110110501 | CROSSOVER FAULTS DETECTION IN TWO-WIRES NETWORK - A system and method for detecting crossover faults in a telecommunications access network having a plurality of access lines. Each access line includes a pair of wires for connection to a user terminal, e.g. a telephone handset. The system includes a monitor for monitoring each of the access lines to detect the presence of an off-hook state; a current sensor for each of the access lines for determining a fault condition on an access line for which an off-hook state has been detected when a imbalance is detected between currents in the wires of the access line; a controller for generating a report of each fault condition determined on an access line, in which each report comprises a time record relating to the time of generation of the report; and a crossover fault detector for recording a possible crossover fault involving two access lines upon the reporting within a set time period of one or more fault condition on each of the two access lines. | 05-12-2011 |
20110102601 | VIDEO QUALITY MEASUREMENT - This invention is concerned with a video quality measurement method, in particular where the video signal having: an original form; an encoded form in which video signal has been encoded using a compression algorithm utilising a variable quantiser step size such that the encoded signal includes a quantiser step size parameter; and, a decoded form in which the encoded video signal has been at least in part reconverted to the original form. The method comprises the steps of: a) generating a first quality measure which is a function of said quantiser step size parameter; b) generating a masking measure and c) combining the first and second measures. The masking measure is which is a function of the spatial complexity of parts of the frames represented by the video signal in the decoded form, these parts being selected by generating a second measure which is a function of the prediction residual and identifying one or more regions of the picture for which the second measure exceeds a threshold. | 05-05-2011 |
20110084244 | CABLE INSTALLATION USING OPTICAL DETECTION - A device for use with a conduit having a first conduit end and a conduit second end, into which conduit a cable can be installed using a flow of air into the first conduit end, the device being suitable for confirming that the flow of air is exiting the second conduit end, the device including a housing, means to enable connection of the device to the second conduit end, a light source, a detector arranged to detect a presence or absence of a light signal, and a light shield, wherein in use, the flow of air entering the device causes the light shield and at least one of the light source or the detector, to move to and to stay at a position relative to the other, permitting the detector to detect detections including one or more of a presence or absence of the light signal, an intensity level of the light signal, a change in the presence or absence of the light signal, or a change in the intensity level of the light signal. | 04-14-2011 |
20110081125 | EXCHANGE CABLING STORAGE APPARATUS - Please substitute the following amended Abstract for the Abstract as currently pending (deleted matter is shown by strikethrough and added matter is shown by underlining): | 04-07-2011 |
20110064212 | POWER BACKUP SYSTEM - An electrically powered node of a telecommunications system has a battery power backup associated with its power control unit. Under normal conditions it is maintained fully charged by means of trickle currents from the mains power feeds to each of a number of mains—connected customer equipments, by way of the “final drop” to the distribution point. These trickle currents are controlled by the respective power control units to prevent overcharging. Using an electrical copper connection provided in parallel with the fibre connection, a battery backup can also be maintained in nodes further towards the exchange. The feeds are reversible, so that if a power outage removes the power supply from the customer premises, a “lifeline” plain telephone service between the exchange and the telephone handset is maintained using the local battery backup in the remote nodes. By limiting the service to simple telephony, the battery power can be sufficient to maintain the service for a reasonable duration. The power management systems can be used to transfer charge from one battery to another over the network according to the usage, or remaining life, of each battery. | 03-17-2011 |
20110047268 | Switching system - An Ethernet access connection connects a user access point to an access node in the network. The access connection comprises a passive coupler, by means of which a further access connection can be provided between the user access point and a second access node, such that data can be exchanged over each access connection between the user access point and the network. This duplication ensures that communication is not severed if the access connection is breached. To avoid interference at the destination terminal between the two resulting identical data streams, the access nodes giving access to the destination terminal are controlled such that only one of them forwards data to the destination access point, with the capability to switch to the other one in the event of a loss of connection between the access node and user access point. | 02-24-2011 |
20110026934 | TRANSMISSION OF BROADBAND SIGNALS - The invention is concerned with the transmission of broadband signals onto to a telephony connection having constraint profile limiting the maximum allowed power as a function of frequency. As a result, broadband signals can be delivered using low power equipment to a telephony line whilst respecting the constraint profile associated with that line. | 02-03-2011 |
20110026399 | ADMISSION CONTROL AND ROUTING IN A PACKET NETWORK - Embodiments of the invention provide a network management sub-system which is preferably logically separate from the routing nodes (including gateway nodes) of a network. The network management sub-system receives load information relating to present packet flows on existing predetermined paths in the network, and when a request for admittance of a new packet flow is received, is able to make a decision as to whether the new flow should be both: i) admitted to the network; and ii) on to which path; in substantially the same process step. This is possible because the admission control and routing algorithms are integrated into a single process, the result of which provides both an admission control decision as well as a routing decision at the same time. By performing such an operation in a management sub-system which is separate from the routing nodes, there is no need for such functionality to be duplicated in nodes across the network, and instead the routing nodes are relieved of the burden of having to make such decision themselves. As a consequence, the network nodes can be kept simpler, and network control can be retained by the network operator in the management sub-system. | 02-03-2011 |
20110025468 | TAGGED CABLE - A method of forming a cable having an elongate core, including positioning a records component proximate to the elongate core, and covering the records component with a cable covering which directly or indirectly urges the records component against the elongate core. | 02-03-2011 |
20110019594 | FEATURE-BASED SERVICE CONFIGURATION - A method of configuring a feature subscription having the steps of: a) retrieving a feature subscription, the feature subscription comprising one or more features; b) configuring the feature subscription; c) determining one or more consistent solutions of the feature subscription configured in step b); and d) selecting a consistent solution from the one or more consistent solutions determined in step c). | 01-27-2011 |
20110006786 | CABLE INSTALLATION USING INDUCTION - A device for use with a conduit having a first conduit end and a conduit second end, into which conduit a cable can be installed using a flow of air into the first conduit end, the device being suitable for confirming that the air is flowing out from the second conduit end. In an embodiment, the device includes a housing, means to enable connection of the device to the second conduit end, a detector arranged to detect an electrical property change, and an actuator for causing an electrical property change detectable by the detector, wherein in use, the air flowing into the device causes the detector and the actuator to move relative to each other, causing an electrical property change detectable by the detector. | 01-13-2011 |
20100316257 | MOVABLE OBJECT STATUS DETERMINATION - Embodiments of the present invention relate to automated methods and systems for determining a degree of presence of a movable object in a physical space. Video images are used to define a region of interest ( | 12-16-2010 |
20100247098 | COMMUNICATIONS NETWORK - A PON in which parallel optical fibre paths are provided between dual OLTs and the ONTs, one of the optical fibre paths providing an active connection and the other optical fibre path providing a standby connection. Respective VLANs may be formed over the parallel optical fibre paths. If performance indicators, for example Ethernet continuity check messages, indicate that an ONT is no longer in communication with the OLT then data may be sent via the VLAN associated with the standby connection. | 09-30-2010 |
20100205147 | DATA COMMUNICATIONS SYSTEM - For each of a number of users ( | 08-12-2010 |
20100192057 | METHOD AND APPARATUS FOR GENERATING AN INTEGRATED VIEW OF MULTIPLE DATABASES - A computer system | 07-29-2010 |
20100150012 | TELECOMMUNICATIONS ROUTING - A telecommunications network termination device has the capability to connect to a network access point using a primary fixed line address by a first route and also, using a second network address, by a backup routing to a shared wireless access point. Connection status messages are transmitted over the primary routing. If these are not detected by the network, it causes traffic to the user device to be diverted over the backup routing to the second network address. It also transmits instructions to the user device to route outgoing traffic by the same secondary route. The secondary route is identified from network tolopogy data stored by the network control server. | 06-17-2010 |
20100115085 | COMPUTER NETWORK - A peer-to-peer network operating in accordance with a service-oriented architecture is disclosed. The peers in the network request services from one another and each keeps a record of the quality of service they receive from the other peers. The peers share quality of service information with one another in order to take advantage of the improvement in the overall efficiency of the use of resources in the network offered by such information sharing. However, the invention provides a further improvement in that peers do not report the quality of service offered by the peers they have received the best quality of service from. This is found to increase the overall level of service still further since it prevents the peers converging on a favourite service provider and thereby overloading it. The invention finds particular application in distributed applications which dynamically select a Web Service to perform a function at run-time. | 05-06-2010 |
20100085947 | METHOD OF TRANSMITTING DATA TO A MOBILE DEVICE - A system for transmitting data via a core portion of a computer network to a mobile device is described. The network includes a plurality of access points wherein each access point includes a memory where data for onward transmission to the mobile device may be cached and is operable to communicate with the mobile device over a short-range wireless connection, when the mobile device is in range thereof, and with the core portion of the network over a backhaul connection on a substantially continuous basis. The system comprises: a location collection server for receiving location data from the mobile device; an access point prediction engine for generating predictions of one or more of the access points which the mobile device is considered likely to come in range of in the future based on recent location data received at the location collection server; and a content delivery server for transmitting the data or a portion thereof to the one or more predicted access points via the backhaul connection for caching at the access points and for onward transmission to the mobile device in the event that the mobile device comes into range of the access point, or one or more of the access points where data is transmitted to more than one predicted access point. | 04-08-2010 |
20100064133 | SECURE NETWORK ARCHITECTURE - The present invention provides a star-connected network (C | 03-11-2010 |
20090320045 | SERVER COMPUTER COMPONENT - An interface for interfacing between a receiving component of a server application and a remote application, the receiving component being operable to receive serialised objects from the remote application via the interface, the interface comprising: means for ascertaining if a piece of code associated with the received object is locally stored and directly available to the server application; and means for locally storing the associated piece of code in the event that it is not already locally stored and directly available to the server application. | 12-24-2009 |
20090276716 | Content Adaptation - A web page content adaptation process and system which prioritizes requested web page content for adaptation in accordance with a user's level of interest in the web page content is described. The requested web page content is grouped to form multiple content clusters and a priority value is assigned to each of the content clusters based on the user's browser history. The requested web page content is then adapted in order of the priority value assigned to each of the content clusters to provide a useful version of the original web page content. | 11-05-2009 |
20090276541 | GRAPHICAL DATA PROCESSING - A method and system | 11-05-2009 |
20090268614 | METHOD AND SYSTEM FOR CONGESTION MARKING - The present invention provides a method and system wherein congestion information is taken from a lower level in the protocol stack and used for congestion marking in a higher layer. In particular, the method and system of the invention from a first aspect provide for congestion information in the lower layer to be generated downstream at a congested node, and to be fed back upstream to a source node. The source node then passes the congestion information, or information derived therefrom, up to the corresponding network element responsible for higher layer functions in the protocol stack, where higher level congestion marking can then be performed in dependence on the received lower level congestion information. Thus, congestion information from the lower layer which can typically be generated earlier before significant congestion occurs can be used in higher layer congestion control functions. Preferably the lower layer is the data link layer, and the higher layer is the network layer. | 10-29-2009 |
20090265775 | Proximity Based Authentication Using Tokens - The present invention relates to authenticating a mobile device using location information associated with the device. The present invention provides a mechanism for authenticating a mobile device based on location related information or a “logical location”, but without requiring an actual location. The mobile user device gathers tokens such as SIM data from other wireless devices using wireless communication between the user device and the other devices. A server determines whether these tokens match predetermined reference information, and if so authenticates the user device. | 10-22-2009 |
20090263132 | METHOD OF INTRODUCING AN OUTSTATION INTO AN OPTICAL NETWORK AND OUTSTATION THEREFOR - The present invention relates to the introduction of an outstation into an optical network. The optical network has a central station, and a plurality of previously introduced outstations which are optically connected to the central station. The network is operable in: a normal operating state in which data traffic is received from previously introduced outstations at a normal data rate; and, a set-up state in which the transmission of data traffic from the previously introduced outstations is restricted relative to the normal state, the method including the step of: when the network is in the set-up state, performing a set-up operation for introducing the outstation into the optical network, the set-up operation involving the transmission of set-up data from the outstation being introduced, wherein the set-up data is transmitted at a reduced rate relative to the normal operating rate. | 10-22-2009 |
20090262759 | COMMUNICATION - The present invention relates to communication, in particular to communication involving analogue-like signals that are multiplexed together. There is provided a method of communicating with a plurality of devices, each of which of which provides a signal whose amplitude varies in an analogue fashion, the method including the steps of: temporally interleaving the signals from the devices so as to form a multiplexed signal having a plurality of sequential pulses, which pulses can, in an analogue fashion, each have an amplitude within a continuous range, each pulse originating from a respective device, and each pulse having a plurality of temporal portions; and, forming a synchronisation signal within the multiplexed signal for demultiplexing the multiplexed signal, the synchronisation signal being formed by reducing the amplitude within a temporal portion of at least some of the pulses. | 10-22-2009 |
20090262647 | Method and Apparatus for Communication Data Over a Data Network - A Digital Subscriber Line Access Multiplexer (DSLAM) is modified to monitor when a line synchronizes (i.e. sets up a DSL connection) and to automatically generate a notification to be sent to a management device of the access network if the rate has changed from the last time the line synchronized. | 10-22-2009 |
20090248488 | Risk assessment forecasting in a supply chain - A supply chain forecasting system enabling integrated risk assessment and forecasting of the impact of events on a supply chain comprising a processor adapted to receive, process and output data for a forecast, and a user interface adapted to enable a user to input parameters to facilitate processing of a forecast, wherein the user interface provides a user the ability to select an event which is likely to have an impact on an aspect of a supply chain and to view a visual representation of different types of impact over time of an event thereby enabling a user readily to understand the nature of the impact of an event on a supply chain and hence to select the most appropriate type of impact over time for an event. | 10-01-2009 |
20090240644 | DATA PROCESSING METHOD FOR CONTROLLING A NETWORK - The present invention relates to identifying patterns of change in system operating parameters which may be used to identify unexpected operational conditions and to trigger an appropriate alert or action. The present invention provides a method ( | 09-24-2009 |
20090209242 | Access control to communication facility - To allow a user to break out of a conference and rejoin it, multiple accessions within a predetermined period (such as one day) may be counted as a single accession in counting towards the predetermined number of accessions. Different users may be validated for use of the same resources for different durations. To encourage responsible use of the reservation facilities, allocation of resources may be prioritized for users having the most restricted duration of access. A telecommunications conferencing facility may include a provisioning facility for allocating resources to a user and a validation processor for creating validation information. The provisioning facility and validation processor control access to the resources such that a user is permitted access to the resources for a predetermined duration. A timer and/or counter may be employed to disable access after elapse of a predetermined period or number of accessions. | 08-20-2009 |
20090161538 | Client/server adaptation scheme for communications traffic - A communications system in which carrier Ethernet conveys a plurality of differing types of client signals encapsulated with a generic framing procedure adaptation layer. The client signals are adapted for encapsulation within the carrier Ethernet frames by mapping said client signal within an generic framing procedure adaptation layer signal and then by mapping said generic framing procedure adaptation layer signal into said carrier Ethernet signal, whereby said client signal is identified within said generic framing procedure signal. | 06-25-2009 |
20090153435 | Presentation System - A presentation system comprises a personal computer (PC) ( | 06-18-2009 |
20090097845 | NETWORK TERMINATION APPARATUS - Apparatus for connecting telecommunications equipment of premises to a telecommunications network, the apparatus comprising a first module associated with the telecommunications equipment, a second module associated with the telecommunications network, the first module connectable to the second module by a telecommunications link, and access means permitting access to only one of either the first module or the second module. | 04-16-2009 |
20090052531 | VIDEO CODING - A video encoder using inter-frame differential coding has a store ( | 02-26-2009 |
20090037566 | Computer Network - In a network of computers, e.g. the internet, each computer records the information sources it accesses, and these records are used to identify computers whose users share common interests, as indicated by the sources they access. A virtual network is created linking computers whose users have been identified as sharing similar interests data on what sources have been accessed by each user are shared with neighbouring computers, a defined by the virtual network. Computers can also pass on information on sources accessed received from one neighbour to other neighbours. | 02-05-2009 |
20090014634 | EVALUATING THE POSITION OF A DISTURBANCE - The present invention relates to a method of and apparatus for evaluating the position of a disturbance, in particular using a waveguide having a plurality of overlap regions. A position sensor is provided including: an optical waveguide; a transmission stage for launching a sensing signal into the waveguide; a receiving stage arranged to receive a returned sensing signals which returned sensing signal is a time distributed signal derived from backscattered components of the sensing signal, the waveguide being arranged along a path having a plurality of overlap regions such that a disturbance in an overlap region causes a first disturbance feature and a second disturbance feature in the returned sensing signal; and, monitoring means for monitoring the returned signal, such that a respective time of return can be associated with the first and second disturbance feature. Both return features can then be used to evaluate the position of the disturbance so as to enhance the resolution of the position sensor. | 01-15-2009 |
20080304413 | Control of Data Flow in a Network - Methods and apparatus for encoding a number of small dynamic values over an n-bit field. Also methods and apparatus allowing for the stateless extraction of separate sequences from repetitions of a single field whereby to communicate more than one signal at once. | 12-11-2008 |
20080285859 | Method and System for Processing Video Data - In an intelligent video surveillance system, video processing software performs a number of operations on video data received from a camera, including foreground extraction, shadow removal and object tracking. The foreground extraction stage classifies each pixel of a received frame as representing either foreground or background. Since shadow regions can be wrongly classified as foreground, a two-branch shadow removal operation is employed, comprising weak shadow removal ( | 11-20-2008 |
20080278711 | Distributed Backscattering - The present invention relates to a method for detecting or inferring a physical disturbances on a communications link, in particular by using distributed backscattering. The method includes the steps of: transmitting test signals onto a link; receiving test signals returned from a remote portion of the link; performing a function on the returned test signals; and in dependence on at least one characteristic of the combination signal, inferring the presence of a disturbance. The test signal are returned by a process Rayleigh backscattering along the fibre, so existing fibre installations can be used without requiring a mirror to be specifically introduced. | 11-13-2008 |
20080253645 | Adaptive Classifier, and Method of Creation of Classification Parameters Therefor - A method of generating classifier parameters from a plurality of multivariate sample data, for use in subsequent classification, said classifier parameters relating to a plurality of intervals on each of the variables, said intervals being associated with classes, comprising: inputting said sample data; calculating a plurality of boundaries for each of said variables from said sample data, and deriving parameters defining said intervals from said boundaries. | 10-16-2008 |
20080250393 | Service assembly architecture - A multi-user communications service is configured by: setting up a choreography linking a plurality of user process control flows and a multi-user service configuration process; receiving via the choreography at the multi-user service configuration process requests from the plurality of user process control flows for access to the multi-user communications service and granting access to the multi-user communications service to selected users; in which the choreography provides a fixed interface supporting the independent reconfiguration of the user process control flows and the multi-user service configuration process. | 10-09-2008 |
20080247421 | Service assembly architecture - A method for effecting communication between devices in a communications network, the method comprising managing a communications process control flow; providing a plurality of re-usable components of the process control flow in which each component comprises a process control activity between two of the devices; aggregating the plurality of re-usable components into a sequence of the communications process control flow; in which each re-usable component is arranged to process a data structure; in which the data structure is the same for each re-usable component of the communications process control flow. | 10-09-2008 |
20080222289 | Resource Allocation - In order to satisfy requests for a connection path having a specified capacity between two specified terminations ( | 09-11-2008 |
20080221988 | Wireless Network - An 802.11 wireless network is disclosed which operates as an asymmetric two-hop cellular network. Relaying from one wireless node ( | 09-11-2008 |