ALCATEL-LUCENT CANADA, INC. Patent applications |
Patent application number | Title | Published |
20160142368 | Routing to Multiple Diameter Peers with the Same Identity - Various exemplary embodiments relate to a method performed by a Diameter Routing Agent (DRA) for processing a Diameter message, the method including: providing alias Diameter identifiers (IDs) to peers with the same Diameter IDs; receiving a Diameter message at the DRA associated with one of the peers with the same Diameter ID; determining a correct peer of the peers with the same Diameter ID associated with the received Diameter message; setting the destination host of the received Diameter message to the aliased ID of the correct peer; and transmitting the Diameter message to the correct peer. | 05-19-2016 |
20160142324 | Diameter Message Throttling - Various exemplary embodiments relate to a method performed by a Diameter Routing Agent (DRA) for managing a Diameter queue, the method comprising: identifying throttling rules which dictate the rate at which a message in the Diameter queue will be transmitted; determining throttling rules that are applicable to the message; applying the determined throttling rules to the message; and determining an action to take based upon the applied throttling rules. | 05-19-2016 |
20160135288 | BACKDRILL RELIABILITY ANCHORS - Disclosed is a printed circuit board (PCB) having backdrill reliability anchors comprising nonfunctional pads to provide mechanical reinforcement for signal pads on backdrilled plated through hole (PTH) vias, as well as associated method and machine readable storage medium. | 05-12-2016 |
20160094482 | MINIMIZING NETWORK BANDWIDTH FOR VOICE SERVICES OVER TDM CES - A method and system are provided for reducing bandwidth usage in TDM CES systems conveying analog data, such as voice data. A transmitting router receiving TDM frames for packetization monitors the digitized analog data in the TDM frames. If the analog data has not changed beyond a configured threshold for a configured length of time, the transmitting router signals the receiving router at the far end of a TDM Pseudowire that no packets for the TDM Pseudowire will be sent. The transmitting router does not send any packets over the TDM Pseudowire, not even packets with empty payloads. The receiving router a receiving such a signal starts to generate its own packets for placing in its jitter buffer. Valid data already within the jitter buffer is played out to the access port, but once this runs out dummy packets placed in the jitter buffer by the receiving router are played out. In this way the jitter buffer maintains its fill level even when no packets are being sent across the TDM Pseudowire. The transmitting router continues to monitor the received digitized analog data, and only when it determines that the analog data has changed beyond the threshold does the transmitting router signal the receiving router, and begins sending packets once again. The method and system thereby reduce the bandwidth usage in TDM CES systems conveying analog data by refraining from needlessly sending packets over the TDM-Pseudowire when the analog data is not changing. | 03-31-2016 |
20160094441 | MINIMIZING NETWORK BANDWIDTH FOR TDM CES - A method and system are provided for reducing bandwidth usage in TDM CES systems. When a transmitting router receives a signal that the status of the access circuit is other than “normal”, and that therefore any TDM data arriving over the access circuit is not valid, the transmitting router signals a receiving router at the far end of a TDM Pseudowire that no packets for the TDM Pseudowire will be sent, and does not send any packets over the TDM Pseudowire, not even packets with empty payloads. When the receiving router receives such a signal, it starts to generate its own packets for placing in its jitter buffer. Valid packets already within the jitter buffer are played out to the access port, but once this runs out dummy packets placed in the jitter buffer by the router are played out. In this way, the jitter buffer maintains its fill level even when no packets are being sent across the TDM Pseudowire. Only when the transmitting router receives notification that the status of its access circuit has returned to normal does the transmitting router signal the receiving router that status has returned to normal, and begins sending packets once again. The method and system thereby reduce the bandwidth usage in TDM CES systems by refraining from needlessly sending meaningless packets over the TDM-Pseudowire. | 03-31-2016 |
20160094335 | DISTRIBUTION OF DYNAMIC ACCURACY INFORMATION IN A NETWORK OF IEEE 1588 CLOCKS - An intermediate clock, either a boundary clock or a transparent clock, may have to adjust its local clock to match that of a grandmaster clock. If such adjustment is frequent or large, then the intermediate clock may not have much confidence in the reliability of the timing information it passes to a downstream clock in an IEEE 1588 Announce message even if the quality of its local clock is high. The intermediate clock determines a measure of the reliability of its timing information. The intermediate clock inserts an indication of the reliability of the timing information in a transmitted IEEE 1588 Announce message. The intermediate clock may consider an indication of reliability found in an Announce message it receives when inserting an indication of the reliability of timing information into an Announce message which it transmits. | 03-31-2016 |
20160080278 | LOW PROFILE APPROXIMATIVE RATE LIMITER - Various exemplary embodiments relate to a method for detecting that messages are incoming to a networked device above a target rate, the method including recording a timestamp for at least three representative samples of messages arriving at the networked device; calculating the duration of a focus group including one or more of the representative samples, wherein the target rate is a number r messages over a number m seconds and the focus group represents r/2 messages; and determining the duration of the focus group is less than m seconds. | 03-17-2016 |
20160080137 | SELF-LEARNING RESYNCHRONIZATION OF NETWORK ELEMENTS - Various exemplary embodiments relate to a method of timing the delay of a resynchronization at a network management device, the method including defining an interval length; determining that a resynchronization is required; starting a first timer; determining the number of incoming event messages over a period of time the length of the interval; determining the number of incoming event messages exceeds a threshold amount; starting a second timer; and repeating the step of determining the number of incoming event messages over a period of time until the number of incoming event messages is less than the threshold amount. | 03-17-2016 |
20160072767 | EFFICIENT METHOD OF NAT WITHOUT REASSEMLING IPV4 FRAGMENTS - A method, apparatus, and machine readable storage medium is disclosed for performing network address translation (NAT) on fragments of a Internet Protocol (IP) packet, comprising: receiving a packet fragment of the packet; calculating a hash key based on a subset of header information in the fragment; if the packet fragment is the first fragment of the packet; initiating a NAT session for the packet; storing the NAT session identifier at an entry in the linked list indexed by the hash key; and if the packet fragment is not the first fragment of the packet, then: retrieving a NAT session identifier, if available, at an entry in said linked list indexed by said hash key; and performing NAT on the fragment using the NAT session identified by the NAT session identifier. The hash key is a subset of a CRC32 calculation performed on: IPv4 source address; IPv4 destination address; and IP Identifier of the fragment. If the indexed entry in the linked list is not available, accessing a second dimension of the linked list. | 03-10-2016 |
20160006746 | PRIORITY BASED RADIUS AUTHENTICATION - An apparatus, method and machine readable storage medium, for an authentication server such as a RADIUS server, for authenticating a subscriber are disclosed. The method comprises: receiving at the authentication server, a request message including a plurality of attributes having respective attribute names and respective attribute values; retrieving from a profile storage, an authentication profile object; identifying a plurality of authentication attributes to use for authentication, including a respective associated priority value, from the authentication profile object; extracting attribute values from the request message, corresponding to each authentication attribute; and attempting to authenticate the request message based on each of the extracted attribute value in order of a respective associated priority value until the authentication attempt is successful. | 01-07-2016 |
20150341328 | Enhanced Multi-Level Authentication For Network Service Delivery - One embodiment of an apparatus, e.g. a RADIUS server, includes a processor and a processor-readable storage medium. The memory contains instructions that when executed configure the processor to 1) authenticate a user for access to network services based on user-specific account credentials; and 2) authenticate the user for access to network services based on at least one parameter specific to at least one physical network component used to provide the network services to the user. | 11-26-2015 |
20150324558 | FLEXIBLE AUTHENTICATION USING MULTIPLE RADIUS AVPS - An apparatus, method and machine readable storage medium, for an authentication server such as a RADIUS server, for authenticating a subscriber are disclosed. The method comprises: receiving a request message including a plurality of attributes such as attribute value pairs (AVPs) having respective attribute names and respective attribute values; retrieving an authentication profile object; identifying a plurality of authentication attributes to use for authentication from the authentication profile object; extracting the plurality of authentication attribute values from the message; pre-processing one or more of the extracted attribute values; and authenticating the request message based on the pre-processed extracted attribute values. | 11-12-2015 |
20150312761 | ENHANCED AUTHENTICATION FOR PROVISION OF MOBILE SERVICES - Various exemplary embodiments relate to a method, network node, and non-transitory machine-readable storage medium including one or more of the following: instructions for obtaining, by a session establishment device, a subscriber record associated with a subscriber based on the session establishment device receiving a request message for establishment of a session with respect to a user device, wherein the request message includes a received subscriber identifier associated with the subscriber and a received equipment identifier associated with the user device, and wherein the subscriber record stores a stored subscriber identifier and a stored equipment identifier; instructions for comparing the received equipment identifier to the stored equipment identifier to determine whether the user equipment is associated with the subscriber in the subscriber record; and instructions for conditionally rejecting establishment of the session based on the determination of whether the user equipment is associated with the subscriber in the subscriber record. | 10-29-2015 |
20150304743 | OPERATIONS ADMINISTRATION AND MANAGEMENT SERVICE FOR AN OPTICAL LAYER OF A COMMUNICATION NETWORK - We disclose a network element having one or more OAM components that enable the network element to send and receive in-band service messages without disrupting the flow of user data on the wavelength channel(s) used for the transmission of said in-band service messages. When deployed in a transport plane of a communications network, a plurality of such network elements can advantageously be used to perform various OAM functions that support a link-fault-management mechanism in a manner that complements and strengthens the existing OAM capabilities, particularly at various intermediate points within the optical network path(s). | 10-22-2015 |
20150304427 | EFFICIENT INTERNET PROTOCOL SECURITY AND NETWORK ADDRESS TRANSLATION - Various exemplary embodiments relate to a method performed by a network processing device for creating a NAT session with a tunnel between two nodes, the method comprising: receiving a packet; determining the packet does not have a Security Association; establishing a Security Association associated with a tunnel; generating a tunnel identifier for the tunnel; creating a NAT session information; and storing the NAT session information and the tunnel identifier. | 10-22-2015 |
20150304219 | METHOD AND APPARATUS FOR SELECTING A NEXT HOP - Various exemplary embodiments relate to a device for routing an incoming packet to a destination, the device comprising a processor associated with a storage, in communication with a network interface, the processor being configured to receive the incoming packet; access from the storage a plurality of at least two server bits, each server bit representing a possible next hop to the destination, where if the quantity of possible next hops to the destination is less than a power of two then the quantity of server bits is equal to the next highest power of two, and wherein a quantity n is equal to the exponent of the next highest power of two; determine one or more hash bits calculated from a hash value derived from a source address, a destination address, a source port, and a destination port of the packet, wherein the quantity of hash bits is half the number of server bits; and repeatedly, for n repetitions, determine one or more output bits from a plurality of at least two inputs bits and the one or more hash bits, each input bit representing a server bit in the first repetition, the output bits representing half of the remaining possible next hops to the destination, the output bits becoming final output bits in the nth repetition or input bits to a next repetition after the first repetition. | 10-22-2015 |
20150304208 | TOPOLOGY-AWARE PACKET FORWARDING IN A COMMUNICATION NETWORK - A method includes forwarding one or more packets from a first addressable computing element to at least a second addressable computing element based on a topology-aware address assigned to the second addressable computing element. The topology-aware address includes a set of identifiers representing one or more topology attributes associated with the second addressable computing element. | 10-22-2015 |
20150296089 | METHOD OF PACING BULK OPERATIONS BASED ON AVAILABLE SYSTEM RESOURCES - Various exemplary embodiments relate to a method performed by a network node, the method including: calculating a number of accounts allowed for reset (NAAR) in a schedule interval based upon a usage reset scheduler rate (URSR) and a schedule interval (SI); receiving a list of accounts to be reset; determining if a spot in the reset queue is available; and processing an account reset when a spot in the reset queue is available further including: queuing a reset request for the account; and calculating the expected number of resets (ER). | 10-15-2015 |
20150281465 | QOS CONTROL IN PCRF BASED ON USAGE AND TIME OF DAY - Embodiments of the invention provide a Policy and Charging Rules Function (PCRF) node and a method for authorizing a Quality of Service (QoS) for a wireless subscriber based on subscriber usage and time-of-day for a 3GPP-compliant packet data network | 10-01-2015 |
20150280572 | NON-RESONANT ZERO CURRENT MULTIPLE-OUTPUT POWER CONVERTER - Various exemplary embodiments relate to a power conversion device, including an input configured to receive input power, a first-stage circuit connected to the input configured to provide galvanic isolation between the input and a second-stage circuit, wherein the first-stage circuit comprises at least one first-stage power conversion unit, each first-stage power conversion unit including at least two primary switches, at least two secondary transistor switches, and an isolation transformer including a primary winding and a secondary winding, the second-stage circuit connected to an output of the first-stage circuit, the second-stage circuit comprising at least one second-stage power conversion unit configured to regulate the voltage to at least one output connected to a load, each at least one second-stage power conversion unit comprising a controller, a master circuit connected to the at least one controller, the master circuit configured to synchronize switching in the at least one second-stage power conversion unit, and where the master circuit is configured to drive the primary switches and the secondary transistor switches in the at least one first-stage power conversion unit. | 10-01-2015 |
20150237069 | SEAMLESS SWITCHER FOR ANTI-REPLAY CONNECTIONS IN MULITPLE NETWORK PROCESSOR SYSTEMS - Various exemplary embodiments relate to a method, network node, and non-transitory machine-readable storage medium including one or more of the following: receiving, at the network device, an ownership indication that a first network processor is currently serving an anti-replay connection; and in response to receiving the ownership indication, effecting a presetting in a second network processor of a current sequence number (SN) for the anti-replay connection to a first value that is greater than or equal to a re-key threshold value, wherein the network device includes at least one of the first network processor and the second network processor wherein the re-key threshold value is a value beyond which an SN triggers re-keying of the anti-replay connection, and wherein the second network processor utilizes the current sequence number upon beginning to serve the anti-replay connection. | 08-20-2015 |
20150236966 | CONTROL OF CONGESTION WINDOW SIZE OF AN INFORMATION TRANSMISSION CONNECTION - A capability for controlling a size of a congestion window of an information transmission connection (ITC) is provided. The size of the congestion window of the ITC may be controlled based on a threshold, which may be based on an ideal bandwidth-delay product (IBDP) value. The IBDP value may be based on a product of an information transmission rate measure and a time measure. The information transmission rate measure may be based on a target information transmission rate for the ITC. The time measure may be based on a round-trip time measured between a sender of the ITC and a receiver of the ITC. The threshold may be a cap threshold where the size of the congestion window is prevented from exceeding the cap threshold. The threshold may be a reset threshold which may be used to control a reduction of the size of the congestion window. | 08-20-2015 |
20150208326 | PRIORITIZATION OF ACCESS POINTS BY AN ANDSF SERVER - Various exemplary embodiments relate to a method, network node, and non-transitory machine-readable storage medium including one or more of the following: identifying, by an ANDSF server, a location associated with a UE in communication with the ANDSF server via an S14 session over a first access network; determining a plurality of access points for use by the UE to utilize at least one access network other than the first access network; calculating a first score for a first access point; calculating a second score for a second access point; generating a policy identifying the first access point associated with a first priority and the second access point associated with a second priority, wherein the first priority is set higher than the second priority based on a comparison of the first score to the second score; and transmitting the policy to the UE. | 07-23-2015 |
20150200631 | DUAL-BAND DOHERTY COMBINER/IMPEDANCE TRANSFORMER CIRCUIT AND DOHERTY POWER AMPLIFIER INCLUDING THE SAME - A dual band Doherty component circuit of a dual band Doherty amplifier, which is configured to operate at first and second operating frequencies, includes a Doherty combiner circuit, the Doherty combiner circuit including, a first input node configured to receive a first output, a combining node configured to receive a second output and combine the first output with the second output, the first output being an output of a main amplifier stage of the Doherty amplifier, the second output being an output of a peak amplifier stage of the Doherty amplifier; and a broadband impedance transformer circuit including, first, second, and third lines, the first and second lines being electrically coupled to one another, the first and third lines being connected to an input of the impedance transformer circuit, the second line being connected to an output of the impedance transformer circuit. | 07-16-2015 |
20150189009 | DISTRIBUTED MULTI-LEVEL STATELESS LOAD BALANCING - A capability is provided for performing distributed multi-level stateless load balancing. The stateless load balancing may be performed for load balancing of connections of a stateful-connection protocol (e.g., Transmission Control Protocol (TCP) connections, Stream Control Transmission Protocol (SCTP) connections, or the like). The stateless load balancing may be distributed across multiple hierarchical levels. The multiple hierarchical levels may be distributed across multiple network locations, geographic locations, or the like. | 07-02-2015 |
20150186580 | SYSTEM AND METHOD FOR AMPLIFIER DESIGN - At least one example embodiment discloses a method of generating parameters of an amplifier. The method includes displaying, by a processor, a graphical user interface on a display, the graphical user interface associated with input and output parameters of the amplifier, receiving input parameter values for the amplifier, generating output parameter values for the amplifier based on the obtained input parameter values and displaying the generated output values on the display. | 07-02-2015 |
20150180910 | COMMUNICATION NETWORK WITH LOW LATENCY CALL SIGNALING FUNCTIONALITY - A method includes sending substantially simultaneously two or more session requests from a first processing device respectively to two or more groups of virtual resources of a communication network, wherein the two or more groups of virtual resources represent two or more paths to a second processing device, such that a single session can be established between a first user and a second user based on one of the two or more session requests. | 06-25-2015 |
20150180871 | FLEXIBLE AND GENERALIZED AUTHENTICATION - Various exemplary embodiments relate to a method, network node, and non-transitory machine-readable storage medium including one or more of the following: receiving, at an authentication server, a request message including a plurality of attributes having respective attribute names and respective attribute values; retrieving a profile object that identifies a first attribute name; reading a first attribute value from a first attribute of the plurality of attribute values, wherein the first attribute carries the first attribute name; generating a first subscription identifier that carries the first attribute value; identifying a first subscriber profile that stores the first subscription identifier; and authenticating the request message based on the first subscriber profile. | 06-25-2015 |
20150109058 | Doherty Amplifier With Peak Branch RF Conditioning - In one embodiment, a Doherty amplifier having a main amplifier branch and one or more peak amplifier branches, where at least one peak amplifier branch has RF conditioning applied to its peak branch input signal such that the peak amplifier branch is active only when the peak branch input signal is greater than a specified threshold level. In one implementation, a reverse-biased diode is configured between the peak branch input signal and a peak amplifier device, where the bias signal applied to the diode establishes the specified threshold level. Depending on the implementation, the bias signal may be static or dynamic, and multiple peak amplifier branches may have diodes with independently or dependently generated bias signals applied. | 04-23-2015 |
20150092373 | MOUNTING SOLUTION FOR COMPONENTS ON A VERY FINE PITCH ARRAY - Various exemplary embodiments relate to a printed circuit board (PCB) comprising a ball grid array (BGA) of BGA pads on one side of the PCB, arranged in a grid pattern; through-hole vias, including a via pad, arranged in said grid pattern electrically connected to said BGA pads; a solder mask covering the via pad with an opening; a solder pad within said opening electrically connected to said via pad; and a two-lead component attached to said solder pad. | 04-02-2015 |
20150089594 | RESIDENTIAL GATEWAY BASED POLICY - Various exemplary embodiments relate to a method performed by a policy server in a communication network. The method includes receiving an access request message including a residential gateway identifier and a subscriber identifier; evaluating a policy rule based on the residential gateway identifier, the policy rule including a condition referencing the residential gateway identifier; and responding to the access request message based on evaluation of the policy rule and the subscriber identifier. The method may further include: receiving an IP address of the residential gateway; storing the IP address in association with the residential gateway identifier; receiving, from a service portal, a request for identification of a residential gateway associated with an IP address; sending the stored residential gateway identifier to the portal; receiving new subscriber information; and changing the authorization of the residential gateway based on the new subscriber information. | 03-26-2015 |
20150085756 | SERVICE PROVIDER CERTIFIED DEVICE POLICY MANAGEMENT - Various exemplary embodiments relate to a method performed by a policy server. The method includes: receiving a request for service, the request including an identification of user equipment; determining a user equipment type (TAC); evaluating a policy rule based on the user equipment type, the policy rule including a condition referencing at least one user equipment type; and responding to the request for service based on evaluation of the policy rule. | 03-26-2015 |
20150078405 | MONITORING CLOCK ACCURACY IN ASYNCHRONOUS TRAFFIC ENVIRONMENTS - Various exemplary embodiments relate to a method and related network system including one or more of the following: a first network device comprising a first clock; and a second network device comprising a second clock, wherein the first network device and the second network device are configured to employ a frequency distribution scheme to attempt to set the second clock to operate at the same frequency as the first clock; the first network device is configured to generate and transmit a synchronous stream of timing packets to the second network device, wherein the timing packets are periodically transmitted based on the first clock; and the second network device is configured to receive the synchronous stream of timing packets and determine, based on comparing the synchronous stream of timing packets to the second clock, whether the second clock is out of sync with the first clock. | 03-19-2015 |
20150063363 | COMMUNICATION NETWORK WITH DISTRIBUTED NETWORK ADDRESS TRANSLATION FUNCTIONALITY - In one embodiment, a first network device is configured for communication with at least a second network device, and implements a gateway. The gateway may comprise, for example, a software gateway. The gateway is configured to receive a packet in a format of a first protocol and to determine if the packet includes an identifier of the gateway, for example, encoded within a destination address of the received packet. If the received packet does not include the gateway identifier, the packet is forwarded in the format of the first protocol. If the received packet does include the gateway identifier, a network address translation operation is applied to reconfigure the packet in a format of a second protocol different than the first protocol, and the reconfigured packet is forwarded in the format of the second protocol. The first and second protocols may comprise Internet protocols such as IPv6 and IPv4, respectively. | 03-05-2015 |
20150063130 | CUSTOMIZED DIAMETER PERFORMANCE METRICS - Various exemplary embodiments relate to a method performed by a Diameter node, the method including: receiving a Diameter message at the Diameter node; evaluating a custom metric rule to identify a metric to be collected; and collecting the metric related to the received Diameter message based upon the evaluation of the custom metric rule. | 03-05-2015 |
20150058414 | DIAMETER INTEROPERABILITY FACILITATION - Various exemplary embodiments relate to a method and related network node including one or more of the following: obtaining a Diameter message to be transmitted to a client device, wherein the Diameter message includes a first Diameter identity; determining, based on a configuration of the Diameter device, that an alternate identity is to be presented to the client device; replacing the first Diameter identity with a second Diameter identity that is different from the first Diameter identity, based on the determination that an alternate identity is to be presented to the client device; and transmitting the Diameter message to the client device. | 02-26-2015 |
20150056950 | SESSION BINDING USING SUBSCRIBER IDENTIFICATION - Various exemplary embodiments relate to a method and related network node and machine-readable storage medium including a policy and charging rules node (PCRN) receiving a plurality of related service requests from different devices. The PCRN may establish a Session Binding Identifier (SBI) for each message received. The SBI may include one or more subscriber IDs. Upon receipt of a message, the PCRN may compare the included subscriber IDs against information included in a subscriber database to match with a specific subscriber profile. The PCRN may use the subscriber profile to determine whether existing established sessions are associated with the same subscriber profile, and may bind the sessions together when they are associated with a common subscriber profile. | 02-26-2015 |
20150049643 | METHOD AND APPARATUS FOR PROVIDING DEFAULT SERVICES TO PROSPECTIVE SUBSCRIBERS IN A COMMUNICATION NETWORK - In one embodiment, a subscriber services controller comprises at least one processing device having a processor coupled to a memory. The subscriber services controller is configured to associate at least one default profile with an access node of a communication network, to detect an access attempt by a prospective subscriber via the access node, and responsive to the detected access attempt, to provide default services to the prospective subscriber via the access node in accordance with the default profile. The default profile may be provided to a broadband service aggregator associated with the access node in a set of authorization parameters. As a more particular example, the set of authorization parameters may be sent to the broadband service aggregator in a RADIUS-ACCESS-ACCEPT message from a RADIUS server, responsive to a successful authentication process performed in the RADIUS server. | 02-19-2015 |
20150049605 | RULES-BASED OVERLOAD PROTECTION OF A DIAMETER DEVICE - Various exemplary embodiments relate to a method performed by a Diameter Routing Agent (DRA) for processing a Diameter message, the method including: receiving a Diameter message at the DRA; evaluating an overload state of the DRA; evaluating a shedding rule based upon the overload state of the DRA; and shedding the received Diameter message based upon the evaluation of the shedding rule. | 02-19-2015 |
20150049603 | APN-AMBR AUTHORIZATION IN GPRS MOBILE NETWORK - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method including: receiving a credit control request (CCR) message from a packet data network gateway (PGW) based upon a general radio packet service (GPRS) internet protocol connectivity access network (IP-CAN) session request; determining that an operator policy rule specifies an aggregate maximum bit rate (APN-AMBR) value; determining that the CCR message includes an APN-AMBR value; setting an APN-AMBR value for the GPRS IP-CAN session to the APN-AMBR value specified by the operator policy rule; setting a GPRS IP-CAN session maximum bit rate download/upload (MBR DL/UL) value to the lowest of the APN-AMBR value specified by the operator policy rule and a subscriber MBR DL/UL value; and sending a credit control answer (CCA) message to the PGW with the selected APN-AMBR and MBR DL/UL values. | 02-19-2015 |
20150046826 | Visual Rendering of Diameter Network Topology - Various exemplary embodiments relate to a method of displaying a Diameter network having a local node, a peer connected to the local node, and a realm contactable by the local node via the peer. The method includes drawing the local node as a vertex of a graph; drawing a peer that has been configured for communication with the local node as a second vertex of the graph; drawing a first connection status between the local node and the peer as an edge of the graph; determining, for a Diameter route to a realm, that the local node does not have a peer for the realm; drawing the realm as a third vertex of the graph; determining that messages to the realm should be routed to the peer; and drawing a second connection status for the Diameter route as an edge between the realm and the peer. | 02-12-2015 |
20150039774 | DRA DESTINATION MAPPING BASED ON DIAMETER ANSWER MESSAGE - Various exemplary embodiments relate to a method of routing Diameter requests. The method includes: receiving an initial request from a client, the initial request including a session identifier, an initial destination realm, and request content; determining a Diameter route for the initial request based on the destination realm and the request content; forwarding the initial request according to the Diameter route; receiving a response to the initial request; extracting an origin realm or host from the response; and storing the origin realm or host in association with the session identifier. Various exemplary embodiments relate a Diameter Routing Agent (DRA) configured to perform the above method. Various exemplary embodiments relate to a non-transitory machine-readable storage medium encoded with instructions for performing the method. | 02-05-2015 |
20150039749 | DETECTING TRAFFIC ANOMALIES BASED ON APPLICATION-AWARE ROLLING BASELINE AGGREGATES - Various exemplary embodiments relate to a method of detecting anomalies in network traffic. The method includes: receiving a plurality of accounting reports from an application assurance device, the accounting reports indicating a metric of network performance; aggregating the metric from a plurality of accounting reports to determine a plurality of aggregated metrics corresponding to a plurality of intervals; storing the aggregated metrics in a database in association with the corresponding plurality of intervals; determining a rolling baseline for a current time period based on metrics of intervals corresponding to a primary partition and a sub-partition; comparing a metric for a current time period to the rolling baseline; and determining that an anomaly is occurring if the metric for the current time period differs from the rolling baseline by more than a pre-defined threshold. | 02-05-2015 |
20150038155 | METHODS AND APPARATUSES FOR ESTABLISHING RRC CONNECTION THROUGH DRIFT RNC - In a method for establishing a radio resource control connection between a user equipment and a serving radio network controller through a drift radio network controller, the drift network controller receives an indication of a forward access channel capability of the user equipment from the serving radio network controller, and transmits a signaling message to the user equipment according to the forward access channel capability of the user equipment to establish the radio resource control connection. | 02-05-2015 |
20150032907 | UNIVERSAL ADAPTER WITH CONTEXT-BOUND TRANSLATION FOR APPLICATION ADAPTATION LAYER - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a first object to be translated, wherein the first object has a first type; obtaining a second object having a second type that is different from the first type; identifying a first property of the first object, wherein the first property is associated with a first location within a hierarchy of the first object; identifying a second property of the second object; setting a value of the second property based on a value of the first property when: a name of the first property matches a name of the second property, and the first location matches a second location of the second property within a hierarchy of the second object; and making the second object available to a receiving device. | 01-29-2015 |
20150032798 | Method And Apparatus For Providing Redundant Data Access - Various embodiments provide a method and apparatus for providing redundant data access. In particular, a response to a client request for a data item includes selecting the data segments of the data item to be provided to the client by each of a corresponding select plurality of servers. In particular, the data segments are smaller in size as compared to the data item and are configured such that the data item may be constructed using a proper subset of the transmitted data segments. | 01-29-2015 |
20150022270 | DUAL-BAND HIGH EFFICIENCY DOHERTY AMPLIFIERS WITH HYBRID PACKAGED POWER DEVICES - An amplifying structure includes a main amplifier configured to amplify a first signal; and a peak amplifier configured to amplify a second signal, each of the main amplifier and the peak amplifier including, respectively, a hybrid power device, the hybrid power device including, a first power transistor die configured to amplify signals of a first frequency, and a second power transistor die configured to amplify signals of a second frequency different than the first frequency. | 01-22-2015 |
20150010152 | SECURE SERVICE MANAGEMENT IN A COMMUNICATION NETWORK - In one embodiment, a tunnel to be affected by configuration of a service in a network is identified and key information for the identified tunnel is obtained from a corresponding router. The tunnel is assigned to a key group based on the key information, and provisioning information associated with the tunnel on the router is updated based on the assigned key group in conjunction with configuration of the service. The updating of the provisioning information may comprise altering the key information on the router to include a key associated with the assigned key group. Also, one or more keys not associated with the assigned key group may be deleted from the router and from a management entity of the network. | 01-08-2015 |
20140348278 | USING MULTIPLE OSCILLATORS ACROSS A SUB-NETWORK FOR IMPROVED HOLDOVER - A method and system are provided for improving maintenance of timing information when a node enters holdover due to a lost connection between a sub-network and a reference clock. Each node within the sub-network sends information concerning the drift of its local oscillator to a single node, and the single node uses this information to determine timing information for the entire sub-network. The single node may also use knowledge of the characteristics of the local oscillators. In this way, drift from the reference clock can be minimized without incurring significant added hardware costs. | 11-27-2014 |
20140342693 | SD PEER SELECTION AND ROUTING - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method including: receiving a RADIUS accounting request (ACR) start message; applying rules by a rules engine in the PCRN to information in the ACR start message to determine a traffic detection function (TDF) to be updated; determining application detection and control (ADC) rules to be applied to the TDF; and transmitting the determined ADC rules to the determined TDF. | 11-20-2014 |
20140342690 | BINDING OF SD MESSAGES WITH RADIUS MESSAGES - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method including: receiving a RADIUS accounting request (ACR) start message from a network access server (NAS); establishing a RADIUS session with the NAS; applying rules by a rules engine to information in the ACR start message to determine a traffic detection function (TDF) to be updated; establishing a Sd session with the TDF; and binding the Sd session to the RADIUS session. | 11-20-2014 |
20140337464 | SYSTEM AND METHOD FOR INLINE HTTP NOTIFICATION - Various exemplary embodiments relate to method performed by a router. The method may include: receiving a HTTP GET request from a user device; forwarding the HTTP GET request; receiving a response to the HTTP GET request; determining whether to intercept the response based on flow selection criteria; and replacing the response with a modified response. Various exemplary embodiments relate to a router including a plurality of line cards interconnected by a backplane, the plurality of line cards receiving communication packets; and an application assurance card connected to the backplane and configured to detect application traffic flows among the communication packets, identify a HTTP session including a HTTP GET request and a matching response from among the packets; determine whether the HTTP session meets selection criteria; and modify the response to include a command to execute a script located on a notification server responsive to the HTTP session meeting the criteria. | 11-13-2014 |
20140335842 | CUSTOMIZABLE TASK EXECUTION FLOW - Various exemplary embodiments relate to a method performed by a subscriber interface node of providing a service to a subscriber. The method may include: defining a service having an execution flow comprising a plurality of predefined operations; defining a plurality of tasks, each task occurring within one of the predefined operations and comprising a service call to a role of a plug-in representing an external service provider; and executing the operations in the predefined order according to the defined tasks. | 11-13-2014 |
20140334311 | SYMMETRICAL LATENCY WITH TDM CIRCUIT EMULATED SERVICE - A method and system are provided for allowing time-alignment of teleprotection measurements of power signals. Teleprotection observations are communicated between teleprotection ends through a packet switched network. At each end of a teleprotection segment, a teleprotection device communicates with the network through a router providing CES and located at the edge of the network. Clocks within the two routers are synchronized using IEEE 1588v2 signals. Using this synchronization, accurate one-way latency of data through the network between the two routers in each direction can be determined. The router at the incoming end of the faster path delays playout of packets by the difference between the two one-way latencies, thereby ensuring time-alignment of observations as they are sent from the routers to the teleprotection devices. | 11-13-2014 |
20140334303 | PCC QOS AUTHORIZATION BASED ON RULE SPLIT AND FLOW DIRECTION - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN) of updating a policy and charging control (PCC) rule. The method includes: receiving a filter update request comprising a new filter and a reference filter; matching the reference filter with a previously requested PCC rule; determining a set of filters associated with the service data flow; determining whether any filter of the set of filters is removed; and authorizing quality of service (QoS) information based on the remaining filters of the set of filters. Various exemplary embodiments relate to a non-transitory machine-readable storage medium encoded with instructions executable by a processor for performing the method. | 11-13-2014 |
20140280866 | SCALABLE LOAD BALANCING - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, by a load balancer, a plurality of metric values from a plurality of servers; calculating an average metric value based on the plurality of metric values; calculating a first error value based on the average metric value and a first metric value of the plurality of metric values; generating a first integral value by incorporating the first error value into a first previous integral value; and generating a first preference value for a first server of the plurality of servers based on the first integral value. | 09-18-2014 |
20140269538 | Methods And Systems For Transmitting Data Frames From a Cloud-Based System - Audio and video data streams are transmitted from cloud-based system to one or more base transceiver stations without losing data frames by substantially ensuring that each data frame is not transmitted when it cannot be received within a reception window. Those data frames that may eligible for transmission, but are withheld from transmission, may be transmitted during a future, scheduled time interval provided the data frame can be received within a future reception window. | 09-18-2014 |
20140269533 | METHOD AND APPARATUS FOR PROCESSING GPRS TUNNELING PROTOCOL USER PLANE TRAFFIC IN A CLOUD-BASED MOBILE NETWORK - An exemplary method of providing network address translation (NAT) for GPRS tunneling protocol user plane (or GTP-U) traffic on a data center server supporting multiple radio bearers in a mobile network is disclosed. The method includes: receiving packets from a source node via a GTP-U tunnel; filtering ingress GTP-U packets from other types of packets; forwarding a respective ingress GTP-U packet with a public destination IP address to a first queue if a destination IP address matches a defined GTP-U public IP address for the destination node; extracting one or more ingress GTP-U packets and forwarding the packets to a user-land operating system process for inspection; performing NAT of the destination IP address; placing ingress GTP-U packets that have an internal IP address that identifies with a particular radio bearer into a second queue; and forwarding the ingress GTP-U packets via a radio bearer within a network for processing. | 09-18-2014 |
20140241204 | TRANSIT SERVICES IN ETHERNET RINGS WITH PROTECTION - Various exemplary embodiments relate to a method for transmitting data packets in a cellular network to a user equipment using a first distributed access gateway, including: receiving a first tunnel request from a second distributed access gateway; establishing a first tunnel with the second distributed access gateway; receiving a first data packet destined to the user equipment from a native packet transport network; and transmitting the first data packet to the user equipment via the first tunnel to the second distributed access gateway. | 08-28-2014 |
20140208099 | SERVICE PLANE ENCRYPTION IN IP/MPLS NETWORKS - A method for providing service plane encryption in IP/MPLS and GRE networks is disclosed. The method for providing service plane encryption in IP/MPLS and GRE networks includes receiving a first Security Parameter Index with associated first encryption key and associated first authentication key at a first network element supporting the first Service Distribution Point; receiving an instruction at the first network element to encrypt data entering the first Service Distribution point with the first encryption key; receiving an instruction at the first network element to associate a data communication service provided at the first network element to the first Service Distribution Point; providing an encryption label; and providing data associated with the first communication service to the first Service Distribution Point for transmission to the second Service Distribution Point. The method for providing service plane encryption in IP/MPLS and GRE networks provides encryption advantages over systems known in the art by providing capability for selectively encrypting services connected via a data tunnel. | 07-24-2014 |
20140208094 | CONTROL PLANE ENCRYPTION IN IP/MPLS NETWORKS - A method for providing control plane encryption in layer 3 networks is disclosed. The method for providing control plane encryption in layer 3 networks includes for a network having a subset of network elements forming a secured domain; the steps of at a network element which is in the secured domain, encrypting all unencrypted Layer 3 packets as they egress an encryption enable egress interface; unencrypting all encrypted Layer 3 packets as they egress an egress interface is not enabled for encryption; and leaving encrypted all encrypted Layer 3 packets as they egress an encryption enable egress interface. A system and machine readable storage media are also disclosed. | 07-24-2014 |
20140192561 | CONTROL CIRCUIT FOR SWITCHING POWER CONVERTERS WITH SYNCHRONOUS RECTIFIERS - A control circuit for switching power converters with synchronous rectifiers is disclosed for providing start-up and shut-down protection. The control circuit for switching power converters with synchronous rectifiers includes a means for blocking the driving signals to the synchronous rectifiers, a voltage sampling circuit, a reference voltage, and a comparator. The comparator compares a sample voltage to a reference voltage to determine when to block and when to admit driving signals to the synchronous rectifiers. The control circuit for switching power converters with synchronous rectifiers is particularly useful for minimizing component damage due to start-up and shut-down transients as compared to converters known in the art. | 07-10-2014 |
20140177533 | HANDLING OF NRS AND BCM IN PCRF AND GW - A method, apparatus, and machine readable storage medium is disclosed for handling Network-Request-Support (NRS) and Bearer Control Mode (BCM) at a Policy and Charging Rules Node (PCRN) and a Evolved Packet Core (EPC) gateway node. Embodiments maintain corresponding buffers for NRS values at the PCRN and the gateway and maintain synchronization between them. A gateway sends a credit control request (CCR) message to a PCRN and updates a local NRS buffer at the gateway when a successful credit control acknowledgement (CCA) response is received from the PCRN. Similarly, the PCRN updates a local NRS buffer at the PCRN when a successful credit control acknowledgement (CCA) response is sent to the gateway. | 06-26-2014 |
20140169384 | HIERARCHICAL PROFILED SCHEDULING AND SHAPING - Various exemplary embodiments relate to a method and related network node including one or more of the following: determining, by the network node, that a port of the network node is ready to receive a packet; identifying a packet having a highest packet priority among a plurality of packets received via a plurality of interfaces, wherein the step of identifying includes, for each of a plurality of components at a first hierarchy level: identifying a first level highest priority packet among a plurality of packets available to the component, based on a packet priority associated with each of the plurality of packets available to the component, sharing the packet priority of the first level highest priority packet with at least one component at a second hierarchy level; and transmitting the packet having the highest priority to the port. | 06-19-2014 |
20140159808 | Design and Analysis of Doherty Amplifiers - An analysis technique for (Doherty) amplifiers having a main amplifier branch and at least one peak amplifier branch. For a given input power level and assumed amplifier impedance levels, an output power level and phase response are obtained for each active device using appropriate load-pull data based on the impedance levels. The performance of the amplifier is analyzed based on the impedance levels, output power levels, and phase responses to generate updated impedance levels. The analysis is repeated until the updated impedance levels converge on steady state values. The analysis can be repeated for different input power levels. Main and peak output matching networks for the amplifier can be designed by iteratively adjusting impedance levels for the networks using appropriate load-pull contours. For the design and analysis phases, the load-pull contours include Class-AB data for the main amplifier device and Class-C data for the peak amplifier device. | 06-12-2014 |
20140148205 | PUSH SERVICE WITHOUT PERSISTENT TCP CONNECTION IN A MOBILE NETWORK - Methods, systems, and articles of manufacture for non-TCP push service in a mobile network comprise receiving, at a push server, registration information for a mobile device from a push client via a first internal interface without persistent TCP connection. The registration information includes a private IP address for the mobile device and a mobile device session identifier associated with an instance of an application client on the mobile device. A push trigger associated with an event of an application server is received at the push server via a second interface exposed outside of a service provider firewall. The push trigger includes a push trigger session identifier. When the push trigger session identifier matches the mobile device session identifier, the push trigger is determined to be associated with the instance of the application client on the mobile device and is transmitted to the push client without persistent TCP connection. | 05-29-2014 |
20140112159 | CIRCUIT EMULATION SERVICE FOR CARRYING TIME DIVISION MULTIPLEXED SCADA TRAFFIC - Embodiments of the invention employ specially adapted P2MP and MP2P transmission techniques to communicate traffic of a TDM based SCADA system over an IP/MPLS based network. Advantageously, by specially adapting P2MP and MP2P transmission techniques to carry TDM based SCADA traffic over an IP/MPLS network, an existing TDM based SCADA system can be migrated to an IP/MPLS network and operated in an easy to manage and bandwidth efficient manner as compared to a solution that employs point-to-point connections between a SCADA master node and subsystems over an IP/MPLS network. Furthermore, since TDM based SCADA equipment would not need to be replaced with IP based SCADA equipment in such a migration, significant equipment and installation costs associated with such replacement can be avoided. | 04-24-2014 |
20140095902 | Power Saving Traffic Management Policies - A method and system are provided for reducing power usage in a telecommunications network. Policies are applied during traffic management of packets, the policies taking into account the power cost of transmitting a packet onward, including over a network. Embodiments are provided in which such policies are used during classification, scheduling, and traffic shaping of packets. | 04-03-2014 |
20140092739 | FLOW FILTER MAPPING SCHEME WITH PCC FLOW-DIRECTION AVP - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN) device for implementing a PCC procedure with SDF inputs, the method including: receiving a PCC request with a SDF input; determining if the PCC request is from a user equipment (UE); mapping flow direction information from the SDF input request into a unified flow-direction record stored in the PCRN; generating PCC, ADC, and/or QoS rules based upon the unified flow-direction record; determining if flow direction is defined on an output interface; mapping the unified flow-direction record into a flow-information AVP associated with the generated PCC, ADC, and/or QoS rules. | 04-03-2014 |
20140075217 | Power Saving Network Controller - A method and system are provided for reducing power usage in a telecommunications network. An intelligent network manager within a network operations center determines whether to change the power usage of the network, such as reducing power usage at limes of low network activity. The network operations center is in communication with the network elements of the network, and using the communication channels between the network operations center and the network elements the intelligent network manager instructs various ones of the network elements to operate at a lower capacity or even not at all. | 03-13-2014 |
20140071890 | DIAMETER PROTOCOL VERSION SPANS - Embodiments of the invention provide a method and apparatus for managing feature support requirements for a communication protocol with major-minor version spans having temporal constraints on feature definitions using a flexible Diameter command dictionary wherein context-specific definitions are defined to apply to different versions and releases. | 03-13-2014 |
20140068748 | DIAMETER FIREWALL USING RECEPTION IP ADDRESS OR PEER IDENTITY - Various exemplary embodiments relate to a method performed by a DIAMETER network node, the method including: receiving a first DIAMETER message; determining that the first DIAMETER message is not trusted; and rejecting the first DIAMETER message. | 03-06-2014 |
20140068102 | RULE ENGINE EVALUATION OF CONTEXT OBJECTS - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a Diameter message at the DRA from an origin device; establishing a context object in response to receiving the Diameter message; evaluating a rule that includes a context object reference, wherein the evaluation includes accessing the context object based on the context object reference; and transmitting a message based on the evaluation of the rule. | 03-06-2014 |
20140068101 | RECEIVED MESSAGE CONTEXT OBJECTS - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a Diameter message at the DRA from an origin device; determining a message type of the Diameter message; establishing a message context object based on the message type, wherein the message context object provides access to the Diameter message; processing the Diameter message, wherein processing includes accessing the message context object; and transmitting a message based on the processing. | 03-06-2014 |
20140068100 | INVERSE MESSAGE CONTEXT OBJECTS - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a Diameter message at the DRA from an origin device; determining a received message type of the received Diameter message; determining an inverse message type based on the received message type; establishing an inverse message context object based on the inverse message type, wherein the inverse message context object provides access to a related Diameter message of the received Diameter message; processing the received Diameter message, wherein processing includes accessing the inverse message context object; and transmitting a message based on the processing. | 03-06-2014 |
20140067941 | MULTIPLE FORM ENUMERATED ATTRIBUTES - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, via a user interface of the DRA, a request to define a rule; retrieving metadata associated with a context object; determining that a component specified by the metadata is an enumerated type component; presenting, via the user interface, a first displayed component for the enumerated type component, wherein the first displayed component is associated with a numeric value; presenting, via the user interface, a second displayed component for the enumerated type component, wherein the second displayed component is associated with an alphanumeric value; and receiving, via the user interface, a rule definition, wherein receiving the rule definition comprises receiving a selection of at least one of the first displayed component and the second displayed component. | 03-06-2014 |
20140066004 | HANDLING OF OCS COUNTER INFORMATION - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method including: sending a first Sy spending limit request (SLR) to an online charging system (OCS); receiving from the OCS a first spending limit answer (SLA) including policy counters and associated status reports for a subscriber; creating an Sy session; storing policy counter data in the Sy session; and making a policy decision based upon policy counter statuses associated with the Sy session. | 03-06-2014 |
20140064183 | FAST ACCEPTANCE OF DIAMETER PEER FAILOVER - Various exemplary embodiments relate to a method performed by a network node, the method including: receiving a connection request from a peer network node including a peer identifier; determining that the received peer identifier matches an identifier of an existing peer; sending a verification message to the existing peer; setting a timer; when a response the verification message is received before the timer expires: cancelling the timer; and rejecting the received connection request; when the timer expires: closing a connection to the existing peer; and accepting the new connection from the new peer. | 03-06-2014 |
20140064151 | SY SESSION CREATION AND RECOVERING FROM INCONSISTENT SESSION STATE BETWEEN PCRF AND OCS - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method including: sending a first Sy spending limit request (SLR) to an online charging system (OCS) without specifying any policy counters; receiving from the OCS a first spending limit answer (SLA) including policy counters and associated status reports for a subscriber; creating an Sy session; determining required policy counters based upon the policy counter statuses; sending a second Sy SLR to the OCS for the required policy counters; and receiving a second SLA including status reports for the required policy counters. | 03-06-2014 |
20140062601 | DOHERTY AMPLIFIER HAVING COMPACT OUTPUT MATCHING AND COMBINING NETWORKS - A Doherty amplifier having a main amplifier branch and one or more peak amplifier branches, where the functionality and structure of the cascade of the main output matching network, the main offset line, and the quarter-wave transformer of the main amplifier branch of a conventional Doherty amplifier are subsumed into the main output matching network of the main amplifier branch, and the functionality and structure of each cascade of the peak output matching network and the peak offset line of each peak amplifier branch of a conventional Doherty amplifier are subsumed into the peak output matching network of the corresponding peak amplifier branch. Furthermore, the output quarter-wave transformer can be replaced by a wideband node matching network that does not have to perform frequency inversion. | 03-06-2014 |
20140059201 | PER FLOW DYNAMIC METERING SELECTION - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the PCRN, a request for establishment of a new service data flow (SDF) for a subscriber; generating a policy and charging control (PCC) rule based on the request; identifying a first metering object of a plurality of metering objects as currently applicable to the subscriber, wherein the first metering object includes a first monitoring key; and transmitting the PCC rule and the first monitoring key to the PCEN for installation. Various embodiments additionally include, after transmitting the PCC rule and the first monitoring key. identifying a second metering object of the plurality of metering objects as currently applicable to the subscriber, wherein the second metering object includes a second monitoring key; and transmitting the second monitoring key to the PCEN for installation in association with the PCC rule. | 02-27-2014 |
20140056216 | SUBSCRIBER RECORD CONTEXT OBJECTS - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a Diameter message at the DRA from an origin device, wherein the Diameter message is associated with a subscriber; establishing a subscriber record context object in response to receiving the Diameter message, wherein the subscriber record context object is associated with a subscriber record of the subscriber; evaluating a rule that includes a context object reference, wherein the evaluation includes accessing the subscriber record. context object based on the context object reference; and transmitting a message based on the evaluation of the rule. | 02-27-2014 |
20140056214 | MESSAGE HANDLING EXTENSION USING CONTEXT ARTIFACTS - Various exemplary embodiments relate to a method and related network node including one or more of the following: identifying a context artifact, wherein the context artifact defines a context object type for use by the DRA; receiving a Diameter message at the DRA from an origin device; establishing a context object of the context object type defined by the context artifact; evaluating a rule that includes a context object reference, wherein the evaluation includes accessing the context object based on the context object reference; and transmitting a message based on the evaluation of the rule. | 02-27-2014 |
20140051384 | OUT OF CREDIT FINAL-UNIT-ACTION RESTRICT_ACCESS HANDLING - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method including: receiving an event trigger and a restriction filter rule associated with a first set of policy and charging control (PCC) rules from a policy and charging enforcement node (PCEN) indicating that a subscriber is out of credit; producing a second set of PCC rules to implement the restriction filter to handle the out of credit status of the subscriber; installing the second set of PCC rules; receiving an indication that the subscriber has received a reallocation of credit; and uninstalling the second set of PCC rules after receiving an indication that the subscriber has completed the reallocation of credit operation. | 02-20-2014 |
20140050098 | HANDLING SESSION LINKING STATUS IN GXX UPDATE - Various exemplary embodiments relate to a method of linking sessions at a Policy and Rules Charging Node (PCRN). The method may include: receiving a gateway control session establishment request from a first gateway, the establishment request indicating a first session linking status; establishing a gateway control session between the gateway and the PCRN; receiving a second message from the first gateway for the established gateway control session including a Session-Linking-Indicator AVP indicating a second session linking status; determining whether the PCRN has linked the gateway control session to an IP-CAN session; if the PCRN has not linked the gateway control session to an IP-CAN session, replacing the first session linking status with the second session linking status for the established gateway control session; and linking the gateway control session with an IP-CAN session according to the second session linking status. | 02-20-2014 |
20140040920 | STRATEGY BASED EVENT NOTIFICATION CHAIN - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the event bus from a sender, an indication of an event; identifying a plurality of listeners to which event notifications should be pushed based on the event; determining a sorted order for the plurality of listeners; and pushing, by the event bus, event notifications to the plurality of listeners in an order specified by the sorted order. | 02-06-2014 |
20140038634 | NETWORK MAP FOR LOCATION-BASED MOBILITY DECISIONS - The exemplary embodiment uses geographical location information to assist the selection of the target cell during reconfiguration, handover and redirection procedures. This process involves defining a network geographical grid and building an associated database of captured data from the user equipment, such as radio measurements, and calculated KPI statistics per geographical location, and then using such data for making mobility and load-balancing decisions. | 02-06-2014 |
20140038547 | METERED SERVICES - Various exemplary embodiments relate to a method and related network node including one or more of the following: determining that a service should be configured for a subscriber; identifying a metering object that is currently applicable to the subscriber, wherein the metering object includes a metering limit and a plurality of actions; selecting a first action of the plurality of actions, wherein the first action includes a first parameter; configuring the service on the PCEN according to the first parameter, wherein configuring the service comprises instructing the PCEN to report usage of the service; and applying the metering limit to usage reported by the PCEN. | 02-06-2014 |
20140006640 | STICKY IP PRIORITIZATION BASED ON IP POOL AND SUBNET BY DHCP | 01-02-2014 |
20140006595 | USER-SELECTABLE IEEE 1588 CLOCK CLASS AND QUALITY LEVEL MAPPING | 01-02-2014 |
20140006575 | SUBNET PRIORITIZATION FOR IP ADDRESS ALLOCATION FROM A DHCP SERVER | 01-02-2014 |
20140006568 | PRIORITIZATION BASED ON IP POOL AND SUBNET BY DHCP | 01-02-2014 |
20140003774 | INCREASED CONNECTOR PORT DENSITY VIA EXTENDING FACEPLATE | 01-02-2014 |
20140003225 | DYNAMIC REACTION TO DIAMETER ROUTING FAILURES | 01-02-2014 |
20130329566 | OAM Power Packet - A method and apparatus are provided for determining the power cost of transmitting packets along a specified path. A particular type of OAM packet is transmitted along the path by a first node, and each node along the path adds its power cost of transmitting packets to the OAM packet. Upon reaching the end of the path, the OAM packet is returned to the first node where the power cost of the total path is determined and stored in association with the path. | 12-12-2013 |
20130326085 | CUSTOM DIAMETER ATTRIBUTE IMPLEMENTERS - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a Diameter message at the DRA from an origin device, wherein the Diameter message includes an attribute-value pair (AVP) having a first value represented according to a first data type; establishing a context object in response to receiving the Diameter message; establishing, within the context object, a custom attribute object that corresponds to the AVP and provides access to at least a portion of the first value represented according to a second data type, wherein the second data type is different from the first data type; evaluating a rule that includes a context object reference, wherein the evaluation includes accessing the custom attribute object based on the context object reference; and transmitting a message based on the evaluation of the rule. | 12-05-2013 |
20130326076 | PER FLOW AND PER SESSION METERING LIMIT APPLICATION - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method including: receiving a metering limit associated with a user; defining a session key associated with the metering limit; defining a flow key associated with the metering limit; dynamically selecting the session key; commanding a policy and charging enforcement node to apply the dynamically selected session key to a session of the user; dynamically selecting the flow key; and commanding a policy and charging enforcement node to uninstall the session key and to apply the dynamically selected flow key to a flow of the user. | 12-05-2013 |
20130326034 | PCRF RULE ROLLBACK DUE TO INSUFFICIENT RESOURCES ON A DOWNSTREAM NODE - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN) device. The method may include: establishing a first service data flow for an application function having a first Policy and Control Charging (PCC) rule including a first parameter within a session; receiving a request to upgrade the first parameter of the service data flow; generating a second PCC rule including an upgraded parameter; storing the first PCC rule in a cache; sending the second PCC rule to a Policy and Charging Enforcement Node (PCEN); receiving acknowledgement that the second PCC rule has been installed at the PCEN; receiving an indication that the second PCC rule failed at a downstream node; and sending the first PCC rule stored in the cache to the PCEN. | 12-05-2013 |
20130326001 | GENERIC PERSISTENCE IN A DIAMETER ROUTING AGENT - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a first Diameter message at the DRA; evaluating a first rule, including accessing data from a generic binding context object including: locating a record associated with a key specified by the first rule, and retrieving the data from the record; and transmitting a message based on the evaluation of the first rule. Various embodiments additionally relate to receiving a second Diameter message at the DRA; and evaluating a second rule, including accessing the generic binding context object, including storing the data in the record associated with the key. | 12-05-2013 |
20130325941 | ROUTING DECISION CONTEXT OBJECTS - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a first Diameter message at the DRA from a first origin device; determining a first message type associated with the first Diameter message; identifying a first set of rules of a plurality of sets of rules as being associated with the first message type; evaluating a first rule of the first set of rules; and transmitting a message based on the evaluation of the first rule. | 12-05-2013 |
20130324078 | TEMPORARILY DISABLE OUT-OF-CREDIT PCC RULE - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method comprising: receiving an event trigger from a policy and charging enforcement node (PCEN) indicating that a subscriber is out of credit; installing temporary PCC rules to handle the out of credit status of the subscriber; receiving an indication that the subscriber has completed a reallocation of credit action; uninstalling the temporary PCC rules and restoring the original PCC rules after receiving an indication of reallocation of credit. | 12-05-2013 |
20130322448 | DIAMETER MESSAGE MIRRORING AND SPOOFING - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a Diameter message at the DRA from an origin device, wherein the Diameter message includes a first destination address; establishing a context object based on receiving the Diameter message, wherein the context object is associated with a copy of the Diameter message; evaluating at least one rule, comprising modifying, based on a first reference to the context object, the copy to include a second destination address, and transmitting the copy to another device based on the second destination address. | 12-05-2013 |
20130322430 | DIAMETER ROUTING AGENT LOAD BALANCING - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a Diameter message at the DRA from an origin device; encountering an instruction to perform load balancing; locating an applicable load balancing pool of a plurality of load balancing pools for the Diameter message; identifying a pool host from the applicable load balancing pool to receive the Diameter message; modifying a destination address of the Diameter message to include an address of the identified pool host; and transmitting the Diameter message based on the modified destination address. | 12-05-2013 |
20130322429 | METHOD AND APPARATUS FOR MANIPULATING AVPS IN A DIAMETER ROUTING AGENT - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a Diameter message at the DRA from an origin device; establishing a message context object in response to receiving the Diameter message, wherein the message context object includes a first collection of child objects; evaluating at least one rule, including: modifying, based on a first instruction, a first index value associated with the first collection of child objects, accessing, based on a second instruction and from the first collection of child objects, a child object corresponding to the first index value; and transmitting a message based on the evaluation of the at least one rule. | 12-05-2013 |
20130322327 | ROUTING DECISION CONTEXT OBJECTS - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a Diameter message at the DRA from an origin device; establishing a routing decision context object in response to receiving the Diameter message, wherein the routing decision context object is associated with a destination device chosen to receive a previous message; evaluating a rule that includes a context object reference, wherein the evaluation includes accessing the routing decision context object based on the context object reference; and transmitting a message based on the evaluation of the rule. | 12-05-2013 |
20130322230 | AUTOMATIC CONNECTION RECOVERY - Various exemplary embodiments relate to a method and related network node including one or more of the following: selecting a connection of a plurality of connections; testing the selected connection to determine whether the selected connection is usable; and based on a determination that the selected connection is not usable: closing the selected connection and at least one additional connection of the plurality of connections, and reestablishing the selected connection and the at least one additional connection. | 12-05-2013 |
20130308454 | METHOD AND APPARATUS FOR IMPROVING HTTP ADAPTIVE STREAMING PERFORMANCE USING TCP MODIFICATIONS AT CONTENT SOURCE - A method of sending hypertext transfer protocol (HTTP) adaptive streaming (HAS) content from a content source to a client over a transmission control protocol (TCP) connection between the content source and the client may include receiving a request for one or more first HAS data chunks from the client; sending the one or more first HAS data chunks to the client; generating idle delay values indicating an amount of delay in the TCP connection during an idle time period, the idle time period being a time period over which no HAS data chunks are being sent from the content source to the client; receiving a request for a second HAS data chunk from the client; setting the size of a starting TCP congestion window based on the idle delay values; and sending the second HAS chunk to the client using the starting TCP congestion window. | 11-21-2013 |
20130304983 | DYNAMIC ALLOCATION OF RECORDS TO CLUSTERS IN A TERNARY CONTENT ADDRESSABLE MEMORY - Embodiments of the invention are directed to a TCAM for longest prefix matching in a routing system. The TCAM comprises a plurality of records of which a portion are configured into one or more address clusters each such cluster corresponding to a respective IP address prefix length and another portion of which are configured into a free cluster not corresponding to any IP address prefix length. | 11-14-2013 |
20130304921 | PCRF TRIGGERED RULES CLEAN-UP - Various embodiments relate to a system and related method of handling a plurality of user messages originating from a user device in a communications network. Various embodiments relate to a Policy Charging and Rules Node (PCRN) receiving an initial message from a first device, while anticipating a complementary message from a second device. Upon receipt of the complementary message, the PCRN may pair the messages and generate a rule from the paired message. If the PCRN does not receive the complementary message, the PCRN may generate the rule from only the initially-received message or may ignore the message. The PCRN may treat each received message independent from each other so that lack of receipt of a complementary message does not affect the creation of rules from another paired message. | 11-14-2013 |
20130283175 | SYNCHRONIZATION MANAGEMENT GROUPS - Various exemplary embodiments relate to a method and related network node including one or more of the following: displaying, by the network management system, a first representation of a synchronization topology, wherein the synchronization topology includes a set of network elements and a set of peers; receiving a selection of at least one selected network element of the set of network elements; identifying at least one identified peer of the set of peers associated with the at least one selected network element; adding the at least one identified peer of the set of peers to a first synchronization group; and displaying a second representation of the synchronization topology, wherein the second representation includes a representation of the first synchronization group. | 10-24-2013 |
20130283174 | SYNCHRONIZATION TOPOLOGY AND ROUTE ANALYTICS INTEGRATION - Various exemplary embodiments relate to a method and related network node including one or more of the following: displaying, by the network management system, a first representation of a synchronization topology, wherein the synchronization topology includes a set of network elements and a set of peers; identifying a set of peers to be monitored; receiving an indication that a network path associated with a peer of the set of peers to be monitored has changed; and displaying an alarm indication. | 10-24-2013 |
20130260731 | MULTIPLE MAJOR VERSION SIGNALING ON SESSION INITIATION - Embodiments of the invention provide an improved major release negotiation mechanism between an initiating node and a receiving node during Diameter session establishment in a 3GPP network. | 10-03-2013 |
20130259601 | Low Profile Standoff With Tool Stop - A low profile standoff with tool stop is disclosed for attaching surfaces in fixed proximity to each other. The low profile standoff with tool stop includes a main body having a threaded bore, a threaded stem for threading a nut, and an intermediate section of narrower cross section than the main body that admits a portion of the threaded bore. The intermediate section extends within the thickness of the mounting surface while the main body stays on one side and the threaded stem extends wholly through to the opposite side of the surface. Some embodiments further comprise a tool stop on the exterior of the main body. Other embodiments dispense with the threaded stem. The low profile standoff with tool stop is particularly useful for overcoming the strength disadvantages of reduced height standoffs known in the art, and of minimizing tool head damage to the mounting surface. | 10-03-2013 |
20130237232 | HANDLING OF EVENT TRIGGER REGISTRATIONS ON BBERF DURING HAND-OVER - Various exemplary embodiments relate to a method performed by a policy and charging rules node of provisioning event triggers. The method may include: receiving, from a requesting node, a request to provision a set of event triggers on a primary gateway; forwarding, to the primary gateway, the set of event triggers; storing the set of event triggers in association with a session; detecting a handover of the session; determining a new primary gateway; and forwarding, to the new primary gateway, the set of event triggers. The method may further include: receiving a message; determining whether the message includes the same set of event triggers; if the message includes the same set of event triggers, refraining from sending the set of event triggers to the primary gateway; and if the message includes a different set of event triggers, forwarding the different set of event triggers to the primary gateway. | 09-12-2013 |
20130194911 | REDUNDANT NETWORK CONNECTIONS - Various exemplary embodiments relate to a method and related network node including one or more of the following: performing an active gateway election to determine whether the provider edge device will be an active gateway for a connection; if the provider edge device will be the active gateway for the connection, indicating to a customer edge device that no fault is currently associated with a link between the customer edge device and the provider edge device; and if the provider edge device will not be the active gateway for the connection, indicating to the customer edge device that a fault is currently associated with the link between the customer edge device and the provider edge device. | 08-01-2013 |
20130188483 | Resource Threshold Overload Protection - Various exemplary embodiments relate to a method of protecting against resource overload. The method may include: setting a resource critical threshold level of usage for a monitored resource; setting an overload rejection level for a plurality of operations; measuring a level of usage; determining an overload usage state based on the level of usage; shedding an operation if the overload usage state equals or exceeds the overload rejection level for the operation; determining whether the level of usage exceeds the resource critical threshold level; and if the level of usage exceeds the resource critical threshold level: changing the overload usage state to a resource critical overload usage state, and shedding an operation unless the overload rejection level indicates that the operation should never be shed. Various exemplary embodiments relate to a network element including: a monitored resource; a rejection level mapping; a status monitor; and an overload manager. | 07-25-2013 |
20130179782 | Apparatus And Method For Embedding Links - In one embodiment, the apparatus for embedding links includes a reproducing unit configured to receive a data stream and display at least one object of the data stream on a display screen of a device. The apparatus further includes a processing unit configured to activate a link associated with a displayed object based on linking information. The linking information includes activation information and destination information. The activation information indicates a period of time when the link is activated. The destination information includes at least one of address information that points to additional information on a remote server and launch information that specifies an application to be launched on the device. The processing unit is configured to display the additional information on the display screen or launch the application upon user selection of the activated link. | 07-11-2013 |
20130174212 | Indication of Authorized and Unauthorized PCC Rules - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving the set of PCC rules at the network device from a partner device; determining that the set of PCC rules includes an unauthorized PCC rule, wherein the unauthorized PCC rule fails an authorization; determining that the set of PCC rules includes an authorized PCC rule, wherein the authorized PCC rule passes the authorization; generating an unauthorized rules list including an indication of the unauthorized PCC rule; generating an authorized rules list including an indication of the authorized PCC rule; transmitting the unauthorized rules list and the authorized rules list to the partner device. | 07-04-2013 |
20130173823 | DIAMETER ROUTE LEARNING - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a message at the network device; constructing a route key based on the message, wherein the route key comprises at least one value carried by the message; determining whether the network device stores a previous route record associated with the route key; and if the network device does not store a previous route record associated with the route key, generating a new route record based on the route key, and provisioning a new route based on the new route record into a routing table of the network device. | 07-04-2013 |
20130173733 | CONFIGURABLE WEB SERVICE NOTIFICATION WITH TEMPLATES - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN) of generating a notification message. The method may include: defining a notification server profile; defining a notification template including a message body and a variable; defining an action rule including a condition; evaluating the condition of the action rule; determining a result set including an attribute; placing the attribute in the variable to form a notification message; and sending the notification message to the notification server. Various exemplary embodiments relate to a PCRN. The PCRN may include: a context information module; a notification server profile storage; a notification template including a message body and a variable; a rules engine configured to evaluate rules using context information; and an action manager configured to: connect to a server, generate a notification message by placing an attribute in the variable, and send the notification message to the server. | 07-04-2013 |
20130173717 | METHOD OF ENFORCING METERED DATA USAGE - A method and system for enforcing metered data usage is disclosed for automatically providing top-ups to a cumulative user data quota. The method for enforcing metered data includes determining cumulative data usage associated to a customer, comparing the cumulated data usage to a quota threshold, and in the event that the cumulated data usage exceeds the threshold, to automatically apply a quota top-up if one is provided for in an associated customer plan. This allows the customer data transfers to continue without requiring manual intervention on the part of the service provider in the event that quota is exceeded. The method and system for enforcing metered data usage also provides for expressing cumulative data usage in terms of a percentage of base quota, thereby facilitating determination if an increase in base quota should be arranged. | 07-04-2013 |
20130171988 | IMSI MCC-MNC BEST MATCHING SEARCHING - Various exemplary embodiments relate to a method of matching a user roaming request with the users home network, the method comprising: receiving a user request that includes an international mobile subscriber identification (IMSI); extracting mobile country code (MCC) from the IMSI; extracting the next M digits from the IMSI as the mobile network code (MNC); searching a MCC-MNC database for the extracted MCC-MNC; if the extracted MCC-MNC is found in the MCC-MNC database, then associate the user request with an identified roaming partner. | 07-04-2013 |
20130170431 | Subscriber Assignment - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the network device from an entity, a request for a serving device assigned to a subscriber; attempting to locate an assignment record associated with the subscriber; in response to locating the assignment record associated with the subscriber, identifying an assigned serving device of the multiple serving devices indicated by the assignment record as being assigned to the subscriber; and transmitting a response to the entity, wherein the response identifies the assigned serving device. | 07-04-2013 |
20130113067 | THERMAL WARP COMPENSATION IC PACKAGE - An apparatus and method for temperature induced warpage compensation in an integrated circuit package is disclosed. The apparatus consists of bonded layers of material having different thermal coefficients of expansion. The bonded layers are bonded to the top of the integrated circuit package. By appropriate choice of temperature coefficients the layers of material can compensate for either convex or concave warpage. In some embodiments, the layers of material have apertures therein allowing compensation for more complex warpages. As well, in some embodiments the top layer of material does not have a planar cross-section. A method is also disclosed for manufacturing an integrated circuit package assembly. The apparatus and method provide an alternative to methods of dealing with IC package warpage known in the art. | 05-09-2013 |
20130097326 | VISITED PCRF S9 SESSION ID GENERATION - Various exemplary embodiments relate to a method performed by a network node for generating a S9 session ID, the method including: receiving, at the network node, an attachment request from a user equipment (UE); creating a DIAMETER session ID; attaching a timestamp and UE ID to the DIAMETER session ID resulting in a S9 session ID; and initiating a S9 session with a home PCRN using the S9 session ID. | 04-18-2013 |
20130097325 | PCRN SESSION ARCHITECTURE FOR ROAMING - Various exemplary embodiments relate to a method performed by a node for creating a virtual IP-CAN session, the method including: receiving, at the network node, a S9 message; creating a S9 session; creating a virtual IP-CAN session associated with the S9 session; persisting the S9 session; and transmitting an answer S9 message. | 04-18-2013 |
20130095827 | ROAMING SESSION TERMINATION TRIGGERED BY ROAMING AGREEMENT/PARTNER DELETION - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN) for processing a change in a status of a roaming partner, the method including: receiving, at the PCRN, a message indicating a change in a status of the roaming partner; identifying roaming subscriber sessions associated with the roaming partner; determining home based roaming subscriber sessions among the identified subscriber sessions; marking the determined home based roaming subscriber sessions for termination; and sending a termination message to a policy and charging enforcement node for the determined home based roaming subscriber sessions. | 04-18-2013 |
20130095826 | PCRN ROAMING AGREEMENT - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN) for managing a session for a roaming subscriber. The method may include: defining a roaming agreement associated with at least one roaming partner and including at least one limitation; receiving a session establishment request; extracting a subscription identifier; determining an active roaming partner by comparing the subscription identifier to the roaming partner profile; selecting the roaming agreement including the active roaming partner; and enforcing the at least one limitation when processing the session establishment request. The PCRN may include: a roaming agreement storage; a first interface configured to receive a session establishment request for a roaming subscriber; a roaming manager configured to identify a roaming partner associated with the roaming subscriber and a roaming agreement associated with the roaming partner; and a second interface configured to communicate session information with a roaming partner PCRN. | 04-18-2013 |
20130095825 | ORGANIZATION OF ROAMING PARTNER REALMS INTO PRIMARY AND SECONDARY - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN) of communicating with a roaming partner. The method may include: defining a roaming partner profile including a network identifier and a primary realm; receiving a session establishment request at the PCRN; extracting a subscription identifier from the session establishment request; determining an active roaming partner by comparing the subscription identifier to the network identifier; and establishing an S9 session with the primary realm of the active roaming partner. Another method may include: defining a roaming partner profile including a primary realm and at least one secondary realm; receiving an S9 session establishment request; extracting an origin realm from the S9 session establishment request; determining an active roaming partner by comparing the origin realm to the primary realm and the secondary realms of the roaming partner profile; and responding to the S9 session establishment request. | 04-18-2013 |
20130095824 | INTEGRATION OF ROAMING AND NON-ROAMING MESSAGE PROCESSING - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a message at the network device from a partner device; translating the message to generate a translated message formed according to a non-roaming protocol; processing the translated message to generate a response message; translating the response message to generate a translated response message formed according to a roaming protocol; transmitting the response message by the network device to the partner device. | 04-18-2013 |
20130095812 | SUPPORTED FEATURE OVERRIDE - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the network device, a message; determining, in response to receiving the message, that a set of supported features should be transmitted to a partner device; determining, based on the partner device, whether a default set of features should be overridden; if the default set of supported features should be overridden, transmitting an alternative set of features to the partner device; and if the default set of supported features should not be overridden, transmitting a standard set of features based on the default set of features to the partner device. | 04-18-2013 |
20130094521 | NAI SUBSCRIPTION-ID HINT DIGIT HANDLING - Various exemplary embodiments relate to a method of identifying a subscriber at a network node. The method may include: receiving a message including a network access identifier (NAI); removing the first digit from the NAI to form a stripped NAI; determining whether the stripped NAI corresponds to a subscriber; determining whether the NAI corresponds to a subscriber; adding a hint digit to form an extended NAI, and determining whether the extended NAI corresponds to a subscriber; and if any of the NAIs correspond to a subscriber, using the corresponding NAI to identify the subscriber. Various exemplary embodiments relate to a policy and charging rules node including: a subscriber cache including a subscriber identifier; an interface configured to receive a NAI; a NAI modifier configured to form an extended NAI and a stripped NAI; and a subscriber identification module configured to determine whether a NAI is stored in the subscriber cache. | 04-18-2013 |
20130094520 | PROCESSING MESSAGES CORRELATED TO MULTIPLE POTENTIAL ENTITIES - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a message; determining whether the network device should identify an entity associated with the message using a plurality of entity records, wherein each entity record of the plurality of entity records corresponds to an entity; if the network device should identify an entity associated with the message using the plurality of entity records: extracting at least one identification value; identifying a set of entity records as matching the at least one identification value; determining whether the set of entity records includes more than one entity record; and if the set of entity records includes more than one entity record: identifying a most current entity record that has been most recently modified, and processing the message as being associated with the entity to which the most current entity record corresponds. | 04-18-2013 |
20130094519 | PROCESSING MESSAGES WITH INCOMPLETE PRIMARY IDENTIFICATION INFORMATION - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the network device, a message associated with an entity; determining that the message lacks at least one primary identification value used to identify the entity associated with the message; extracting at least one secondary identification value from the message; selecting a correlation rule of a plurality of correlation rules that matches the at least one secondary identification value, wherein each correlation rule of the plurality of correlation rules identifies a mapping between secondary identification values and primary identification values; identifying the at least one primary identification value based on the selected correlation; identifying the entity based on the at least one primary identification value. | 04-18-2013 |
20130094436 | LTE SUBSCRIBER IDENTITY CORRELATION SERVICE - Various exemplary embodiments relate to a method performed by a network node for correlating subscriber IDs in a communication network, the method including: receiving a message from another network node that relates to an application function containing information related to a subscriber of the application function; extracting subscriber identification information for the message; determining if the extracted subscriber identification information is found in a correlation object in a correlation object database; if the extracted subscriber identification information is found, then adding the extracted subscriber identification information to the correlation object found in the correlation object database. | 04-18-2013 |
20130094405 | PCRN HOME NETWORK IDENTITY - Various exemplary embodiments relate to a method of determining by a network node whether a session establishment request is for a subscriber of a home network. The method may include: defining a home network identity including a network identifier and an emergency access point name (APN); receiving a session establishment request; comparing a called station ID of the session establishment request with the emergency APN; comparing a subscription ID of the session establishment request with the network identifier; and if either the called station ID matches an emergency APN or the subscription ID matches a network identifier: determining that the subscriber is a subscriber of the home network, and fulfilling the session establishment request. Various exemplary embodiments relate to a system for determining the home network of a subscriber. The system may include a policy and charging rules node (PCRN) configured to process a session establishment request. | 04-18-2013 |
20130086253 | HIERARCHICAL METERING POLICY ATTRIBUTES - Various exemplary embodiments relate to a method performed by a policy and charging rules node for managing usage of a subscriber. The method may include: defining a primary metering policy having a first applicability condition and a first quota; defining a secondary metering policy having attributes including a second applicability condition and at least one inherited attribute that references an attribute of the primary metering policy; determining that the second metering policy is applicable when the first applicability condition and the second applicability condition are true; selecting the secondary metering policy as an active metering policy; and managing subscriber usage according to the attributes of the secondary metering policy. In various alternative embodiments, the step of managing subscriber usage includes: measuring subscriber usage according to a rating factor of the secondary metering policy; and charging the measured subscriber usage to both the primary metering policy and the secondary metering policy. | 04-04-2013 |
20130086252 | FLEXIBLE RULE BASED USAGE METERING POLICIES - Various exemplary embodiments relate to a method of managing usage of a service. The method may include: defining a plurality of metering policies associated with the service; assigning an applicability condition to each of the plurality of metering policies; assigning a quota to each of the plurality of metering policies; selecting an applicable first metering policy for a subscriber session based on the applicability condition; measuring usage of the service according to the first metering policy; comparing the usage against the quota of the first metering policy; and selecting an applicable second metering policy for the subscriber session based on the applicability condition assigned to the second metering policy if the usage exceeds the quota of the first metering policy. Various exemplary embodiments relate to a network node for managing subscriber usage. The network node may include: a metering policy storage; a limit selector; an interface; and a processor. | 04-04-2013 |
20130086237 | RULES ENGINE EVALUATION FOR POLICY DECISIONS - Various exemplary embodiments relate to a method performed by a network policy node. The method may include: translating a policy into a plurality of rule objects, the policy including an applicability condition and one or more action rules; generating a selection rule table based on the applicability condition of one or more policies; generating an action rule table from the one or more action rules of an applicable policy, an action rule including an action condition and an action path; determining a set of applicable policies by evaluating the selection rule table using a rules engine; and selecting an action path by evaluating the action rule table using the rules engine. Various exemplary embodiments relate to a network policy node including a scanner that generates rules objects and rule tables based on one or more policies, a context information storage, and a rules engine that evaluates rule tables. | 04-04-2013 |
20130086144 | ADAPTIVE PERIOD NETWORK SESSION RESERVATION - The invention is directed to providing communications session management using an adaptive keep-alive reservation technique responsive to network conditions. | 04-04-2013 |
20130085909 | SY BASED INTEGRATED POLICY AND CHARGING CONTROL - Various exemplary embodiments relate to a method for managing subscriber usage in a mobile network by a policy and charging rules function (PCRF) including: receiving a credit control request (CCR) message from a policy and enforcement rules function (PCEF) for an application; determining if a Sy connection to an online charging system (OCS) is necessary to implement the CCR; determining if a Sy session is present; sending an application authorization request (AAR) message to the OCS; binding a counter to the application; determining a policy to apply based upon the application; and sending a credit control answer (CCA) message to the PCEF to effect the policy. | 04-04-2013 |
20130084826 | USAGE SHARING ACROSS FIXED LINE AND MOBILE SUBSCRIBERS - Various exemplary embodiments relate to a method for determining the usage of a subscriber to mobile and fixed line services including: receiving subscriber usage information from a fixed line network; receiving subscriber usage information from a mobile network; computing a usage metric based upon the received subscriber usage information from the fixed line network and the mobile network and rating factor information; comparing the usage metric to a predetermined usage threshold; determining a usage policy action; and transmitting a usage policy action message. | 04-04-2013 |
20130063222 | RADIO-FREQUENCY TRANSMITTER, SUCH AS FOR BROADCASTING AND CELLULAR BASE STATIONS - An RF circuit having a transcoupler, a multifunctional RF-circuit element that can operate both as an impedance inverter and as a signal coupler. When connected to a fixed load impedance, the transcoupler can also operate as an impedance transformer. The impedance-transformer/inverter functionality of the transcoupler can be used, e.g., to modulate the load of a power amplifier. The signal coupler functionality of the transcoupler can be used, e.g., to generate a corresponding feedback signal indicative of phase and/or amplitude distortions in the amplifier. The use of various embodiments of the transcoupler in an RF circuit can be advantageous, for example, because the transcoupler has a lower insertion loss than a cascade consisting of a prior-art impedance inverter and a prior-art directional coupler, occupies a relatively small area on the printed circuit board, and helps to reduce the per-unit fabrication and operating costs. | 03-14-2013 |
20130063208 | RADIO-FREQUENCY TRANSMITTER, SUCH AS FOR BROADCASTING AND CELLULAR BASE STATIONS - A transmitter that uses a digital pre-distortion (DPD) circuit to mitigate the effects of nonlinearity of a multistage or multi-branch power amplifier. The DPD circuit relies on two or more feedback signals received from an RF-output circuit of the transmitter to generate individually pre-distorted signals for the individual stages/branches of the power amplifier. The use of these individually pre-distorted signals advantageously enables the transmitter to achieve a more efficient suppression of inter-modulation-distortion products than that typically achieved with a comparable prior-art transmitter. | 03-14-2013 |
20130062763 | DE-POP ON-DEVICE DECOUPLING FOR BGA - Embodiments of the invention place surface-mount devices such as decoupling capacitors, resistors or other devices directly on the underside of a ball grid array (BGA) electronic integrated circuit (EIC) package, in place of de-populated BGA pads. | 03-14-2013 |
20130062762 | IN-GRID ON-DEVICE DECOUPLING FOR BGA - Embodiments of the invention place surface-mount such as decoupling capacitors, resistors or other devices directly on the underside of a ball grid array (BGA) electronic integrated circuit (EIC) package, between BGA pads. | 03-14-2013 |
20130061072 | POWER SAVING NODE CONTROLLER - A method and apparatus are provided which allow telecommunication equipment to adjust its power consumption. A controller within a telecommunication node uses data to determine whether to reduce the power consumption of components within the node. The data can be real-time data fed to the node or controller, or data read from storage, or both, depending on the particular implementation. Various examples of data and decision-making are given. | 03-07-2013 |
20130054778 | SIGNALING PLANE DELAY KPI MONITORING IN LIVE NETWORK - Embodiments of the invention are directed to providing a method for measuring signaling plane delay in a communication network using a probe session indicator to trigger logging of timestamps at network elements for centralized analysis at a network monitor system. | 02-28-2013 |
20130042125 | SYSTEM AND METHOD FOR REDUCING POWER CONSUMPTION IN TELECOMMUNICATION SYSTEMS - Various exemplary embodiments relate to a method for controlling power consumption in a telecom system. The method includes selecting a power profile command based upon a desired power consumption and performance characteristic, translating the power profile command into at least one subcommand, and initiating at least one power reduction technique in a telecom component based upon the at least one subcommand. | 02-14-2013 |
20130039481 | SYSTEM AND METHOD FOR POWERING REDUNDANT COMPONENTS - Various exemplary embodiments relate to a telecom system. The telecom system may include at least one actively operating telecom component and at least one redundant telecom component. The redundant telecom component may be placed in a low power state based upon a first criteria, and in a high power state based upon a second criteria. | 02-14-2013 |
20130039443 | SYSTEM AND METHOD FOR POWER REDUCTION IN REDUNDANT COMPONENTS - Various exemplary embodiments relate to a telecommunications system. The telecommunications system may include at least one actively operating component and at least one redundant component. The redundant component may include a first subcircuitry for receiving synchronization information and at least one second subcircuitry. The first subcircuitry may be activated independently of the second subcircuitry. | 02-14-2013 |
20130031387 | CLOSED-LOOP EFFICIENCY MODULATION FOR USE IN NETWORK POWERED APPLICATIONS - Methods for reducing power dissipation from an input power source in a telecommunications system are disclosed. In one embodiment the method includes: utilizing a first I2C device to monitor an input voltage and input current to a remote unit; providing the input voltage and input current to a main microprocessor for calculating an input power; utilizing a second I2C device to monitor an output voltage and output current from the remote unit; providing the output voltage and output current to the main microprocessor for calculating an output power; calculating a power efficiency of the remote unit at the main microprocessor based on the input power and the output power; utilizing a third I2C device to provide the power efficiency of the remote unit to a digital power manager; and utilizing the digital power manager to control the DA trim output to a DC/DC converter. | 01-31-2013 |
20130024483 | DISTRIBUTION OF DATA WITHIN A DATABASE - Various exemplary embodiments relate to a method and related network node including one or more of the following: retrieving, by the database controller, a record to be stored; identifying a record type associated with the record; identifying at least one storage device of the plurality of storage devices that stores records of the identified record type; and storing the record in a storage device of the plurality of storage devices other than the at least one storage device identified as storing records of the identified record type. Various embodiments additionally include one or more of the following: identifying a record type associated with the record by identifying a record type of at least one other record upon which the record depends. | 01-24-2013 |
20120324297 | FRAMEWORK FOR MANAGING FAILURES IN OUTBOUND MESSAGES - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at a policy and charging rules node (PCRN), a request from a requesting node for an establishment of a first service data flow (SDF); generating a first rule set for implementing the first SDF in response to the request; transmitting a first rule of the rule set to a first node for installation of the first rule; waiting for a period of time for a response from the first node; determining from the response whether installation of the first rule at the first node failed or succeeded; and if installation of the first rule succeeded, transmitting a second rule of the first rule set to a second node for installation of the second rule. | 12-20-2012 |
20120322406 | PCRF-OCS INTERACTION IN WIRELESS-WIRELINE CONVERGENCE - Various embodiments relate to a system and related method for charging an actual subscriber using a single subscriber profile. A Policy and Charging Rules Node (PCRN) may receive a message including a service request and may refer to a subscriber profile to add at least one subscriber identifier (ID) to the message. An Online Charging System (OCS) may thereafter receive a translated message originating from the PCRN and use the at least one subscriber ID included in the translated message to find charging information for the actual subscriber. The OCS may include the charging information in a charged message. A device providing service may then use the charged information to charge the actual subscriber for the requested service. | 12-20-2012 |
20120317270 | INTELLIGENT PRESENCE COST MANAGEMENT BASED UPON CONGESTION STATUS AND SUBSCRIBER PROFILE - Various exemplary embodiments relate to a method performed by a network platform, the method comprising: receiving a subscriber ID and associated base station ID and application IDs from a user equipment; receiving network congestion information from a network monitor; identifying an application affected by the network congestion; calculating a cost to the identified application due to the network congestion; and notifying the identified application of the calculated cost. | 12-13-2012 |
20120317269 | INTELLIGENT NETWORK MANAGEMENT OF NETWORK-RELATED EVENTS - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the network node, an indication of an event from a network monitor, the event associated with a network element; identifying an applicable rule of a plurality of rules based on the event, the applicable rule specifying at least one action; initiating performance of the at least one action with respect to at least one session associated with the network element. Various embodiments additionally include one or more of the following: identifying a group of sessions associated with the network element; and wherein the steps of identifying an applicable rule and initiating performance of the at least one action are performed for each session of the group of sessions. | 12-13-2012 |
20120315893 | INTELLIGENT NETWORK MANAGEMENT OF SUBSCRIBER-RELATED EVENTS - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the network node, an indication of an event from a network monitor, the event associated with a subscriber; identifying, based on the event, an applicable rule of a plurality of rules, the applicable rule specifying at least one action; and initiating performance of the at least one action with respect to at least one session associated with the subscriber. Various embodiments additionally include one or more of the following: identifying a group of sessions associated with the subscriber, wherein the steps of identifying an applicable rule and initiating performance of the at least one action are performed for each session of the group of sessions. | 12-13-2012 |
20120315879 | INTELLIGENT PRESENCE NOTIFICATION SERVICE - Various exemplary embodiments relate to a method performed by a messaging server in a wireless network, the method including: establishing a messaging connection with an intelligent presence server; establishing a messaging connection with a user equipment; receiving a message from the intelligent presence server; and pushing the message to the user equipment. | 12-13-2012 |
20120311205 | MESSAGE FLOW REROUTING FOR SELF-DISRUPTING NETWORK ELEMENT - A method, apparatus, and machine readable storage medium is disclosed for establishing a test protocol processor which intercepts success path protocol messages at a network element port buffer and substitutes a failure path message to simulate the introduction of unexpected protocol messages into the protocol message flow from an external source to the network element under test. The disclosed self disrupting network element is particularly useful for providing a means to perform in situ field testing of a network element. | 12-06-2012 |
20120311178 | SELF-DISRUPTING NETWORK ELEMENT - A method, apparatus, and machine readable storage medium is disclosed for establishing a test protocol processor which identifies and removes messages from a network element port buffer. Subsequent to removal the test protocol processor may perform one of several actions including allowing the message to drop, replacing the message after a delay, replacing the message after altering the payload of the message, and replacing the message after altering the message type. The disclosed self disrupting network element is particularly useful for providing a means to perform in situ field testing of network performance indicators. | 12-06-2012 |
20120309320 | MESSAGE FLOW REROUTING FOR AUTONOMOUS SELF-DISRUPTING NETWORK ELEMENT - A method, apparatus, and machine readable storage medium is disclosed for establishing a test protocol processor which autonomously intercepts success path protocol messages at a network element port buffer and substitutes a corresponding failure path messages to simulate the introduction of unexpected protocol messages into the protocol message flow from an external source to the network element under test. Subsequent to intercepting messages, the test protocol processor may perform one or more of several actions according to the results of statistical calculations. These actions include allowing the message to drop, replacing the message after a delay, replacing the message after altering the payload of the message, and replacing the message after altering the message type. The disclosed autonomous self disrupting network element is particularly useful for providing a means to perform in situ field testing of network performance indicators under desired statistical conditions. | 12-06-2012 |
20120307643 | FIELD DEPLOYABLE MESSAGE COMPROMISER - A method and apparatus are disclosed for establishing a field deployable message compromiser which is connected between two network elements and identifies and removes predetermined messages from an incoming message stream. Subsequent to removal the test protocol processor may perform one or more of several actions according to the results of statistical calculations. These actions include allowing the message to drop, replacing the message after a delay, replacing the message after altering the payload of the message, and replacing the message after altering the message type. The disclosed field deployable message compromiser is particularly useful for providing a means to perform in situ field testing of network performance indicators under desired statistical conditions. | 12-06-2012 |
20120307642 | AUTONOMOUS SELF-DISRUPTING NETWORK ELEMENT - A method, apparatus, and machine readable storage medium is disclosed for establishing a test protocol processor which identifies and removes predetermined messages from a network element port buffer. Subsequent to removal the test protocol processor may perform one or more of several actions according to the results of statistical calculations. These actions include allowing the message to drop, replacing the message after a delay, replacing the message after altering the payload of the message, and replacing the message after altering the message type. The disclosed autonomous self disrupting network element is particularly useful for providing a means to perform in situ field testing of network performance indicators under desired statistical conditions. | 12-06-2012 |
20120307626 | FIELD-DEPLOYABLE PROTOCOL MESSAGE INTERCEPTOR - A method and apparatus is disclosed for a field-deployable protocol message interceptor for insertion between network elements, to autonomously intercept success path protocol messages from a first network element and substitute corresponding failure path messages for transmission to a second network element, to simulate the introduction of unexpected protocol messages into the protocol message flow from the first network element to the second network. Subsequent to intercepting messages, the test protocol processor may perform one or more of several actions according to the results of statistical calculations. These actions include allowing the message to drop, replacing the message after a delay, replacing the message after altering the payload of the message, and replacing the message after altering the message type. The disclosed field-deployable protocol message interceptor is particularly useful for providing a means to perform in situ field testing of network performance indicators under desired statistical conditions. | 12-06-2012 |
20120297074 | PERFORMANCE OPTIMIZATION IN SCHEDULED TASK PERFORMANCE - Various exemplary embodiments relate to a method and related network node including one or more of the following: determining, by the session management node, a next task time for a session; storing the next task time; waiting for a period of time; after waiting, determining whether a task should be performed with respect to the session based on the next task time; and if the task should be performed with respect to the session, sending a message to at least one other node in the subscriber network including an indication that the task should be performed with respect to the session. | 11-22-2012 |
20120290713 | MID-SESSION CHANGE SUPPORT IN USAGE MONITORING - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at a session management node, a usage monitoring report from a usage monitoring node, the usage monitoring report including a reported usage amount for a first monitoring key; updating a current usage amount based upon the reported usage amount; identifying a current monitoring key; and requesting additional monitoring from the usage monitoring node for the current monitoring key. Various exemplary embodiments additionally relate to a method and related network node including one or more of the following: taking a policy action based on the current usage amount; determining a next threshold based on the current usage amount; determining a second usage amount associated with a second monitoring key; and adding the current usage amount to at least the second usage amount to determine a total usage amount. | 11-15-2012 |
20120278472 | USAGE MONITORING AFTER ROLLOVER - Various exemplary embodiments relate to a method and related network node including one or more of the following: determining a session to roll over; determining whether usage monitoring at a usage monitoring node is currently disabled for the session; and if usage monitoring at the usage monitoring node is currently disabled for the session, sending a message from the session management node to the usage monitoring node, wherein the message includes an instruction to enable usage monitoring for the session. Various alternative embodiments additionally include one or more of the following: waiting for a length of time to receive a usage report at the session management node from the usage monitoring node; wherein the step of sending a message from the session management node to the usage monitoring node is only performed when a usage report is not received during the length of time. | 11-01-2012 |
20120275304 | HIERARCHICAL PROFILED SCHEDULING AND SHAPING - Various exemplary embodiments relate to a method and related network node including one or more of the following: determining, by the network node, that a port of the network node is ready to receive a packet; identifying a packet having a highest packet priority among a plurality of packets received via a plurality of interfaces, wherein the step of identifying includes, for each of a plurality of components at a first hierarchy level: identifying a first level highest priority packet among a plurality of packets available to the component, based on a packet priority associated with each of the plurality of packets available to the component, sharing the packet priority of the first level highest priority packet with at least one component at a second hierarchy level; and transmitting the packet having the highest priority to the port. | 11-01-2012 |
20120263074 | TIME OF DAY RULE SCHEDULER - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN) for scheduling the operation of the PCRN, the method including: selecting a type of PCRN action to carry out; determining an update time; determining an applicable PCRN action based upon the update time and a timeframe associated with the applicable PCRN action; and performing the applicable PCRN action. | 10-18-2012 |
20120257628 | MAPPING PRIVATE AND PUBLIC ADDRESSES - Various exemplary embodiments relate to a method and related network node including one or more of the following: identifying, at the network node, a packet associated with a first address; determining, at the network node, that an alternate address mapping is unknown to the network node for the first address; generating a request message based on at least a portion of the packet; transmitting the request message to a different node; receiving a response message, the response message including a second address, wherein the second address is an alternative address for the first address; and storing the first address and the second address together as an alternate address mapping. | 10-11-2012 |
20120257503 | INTELLIGENT PRESENCE CONGESTION NOTIFICATION SERVICE - Various exemplary embodiments relate to a method performed by a network platform, the method including: receiving a subscriber ID and associated base station ID for a user equipment; receiving a congestion alert event message; identifying a user equipment on a congested base station; and notifying the user equipment on the congested base station. | 10-11-2012 |
20120250613 | RULES SYSTEM VERSION CLONING - A rules systems version cloning method is disclosed for exporting a rules system version from a first PCRN and importing the rules system version on a second PCRN. The plain text export format is jointly suitable both for review on a display terminal and for data transfer. The rules systems version cloning method is particularly useful for providing a means to propagate a rules system version from a test environment to a working environment, and from a standalone environment to a distributed environment. | 10-04-2012 |
20120250573 | RULES SYSTEM VERSIONS - A rules systems version coordination method is disclosed for the initiation of a rules system version and the coordination of the rules system version with other rules system versions which may be available. Particularly, the rules system versions are coordinated so that one-and-only-one is in the Active State i.e. the state in which the Policy and Charging Rules Node (PCRN) is deriving its set of policies; rules system versions may only be promoted to the Active State from a Release State; and rules system versions may only be modified when in a Draft State, from which they may be promoted to the Release State. The rules systems version coordination method is particularly useful for providing a buffer state between rules system versions undergoing modification and the rules system version currently in service. | 10-04-2012 |
20120250536 | ETHERNET-DUAL-ENDED LOSS MEASUREMENT CALCULATION - The invention is directed to a method of preserving accuracy in dual-ended frame loss measurement system between a first node and a second node in a packet switching network, especially by Ethernet routers, switches and bridges supporting ITU-T Y.1731 dual-ended LM functionality by enhancing the behavior of dual-ended frame loss measurement to permit enabling and disabling the loss measurement at each node separately without incurring erroneous errors. | 10-04-2012 |
20120233335 | AUXILIARY HOST AND SESSIONS - A method for establishing a session between a policy and charging rules node (PCRN) and an auxiliary host, includes: receiving, at the PCRN, an application session request message from a packet data network gateway (PGW); establishing an access session with the packet data network gateway; receiving, at the PCRN, an auxiliary session request message from the auxiliary host; and establishing an auxiliary access session with the auxiliary host corresponding to the access session with the packet data network gateway. | 09-13-2012 |
20120224495 | IN-SERVICE THROUGHPUT TESTING IN DISTRIBUTED ROUTER/SWITCH ARCHITECTURES - Various embodiments relate to a system and related method of measuring at least one transport link's performance in a communications network. An originating device controlled by a customer may generate testing frames that are transported to a receiving device also controlled by the customer through the at least one transport link that connects the two devices. In some embodiments, the transport links may transfer the testing frames while the transport links are transporting other data traffic. The receiving device may parse incoming frames and, upon identifying the testing frames, may generate echoing response frames. In some embodiments, the echoing response frames may be placed in one of a series of priority-based service queues. The originating device may then receive the response frames through the transport links and may measure the stream of incoming frames to measure and analyze the transport links' performance. | 09-06-2012 |
20120221723 | TRANSIENT SUBSCRIPTION RECORDS - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the session management node, an initial request message, the initial request message including at least one subscription identifier; determining that the session management node does not have access to a subscription record associated with the at least one subscription identifier; generating a transient subscription record based on the initial request message; and processing the initial request message based on the initial request message and the transient subscription record. | 08-30-2012 |
20120218888 | GPRS DEFAULT BEARER TRACKING - The invention is directed to providing a method and apparatus for managing and tracking default bearers in an Internet Protocol Connectivity Access Network (IP-CAN) session of a General Packet Radio Service (GPRS) network while observing the requirements of the GPRS specifications. | 08-30-2012 |
20120213226 | PROCESSING DATA PACKET TRAFFIC IN A DISTRIBUTED ROUTER ARCHITECTURE - Embodiments of the invention are directed to efficiently processing packet traffic in a system such as a switch or router having a distributed architecture. An internal header is appended to an ingress packet by an ingress packet processing device before the packet is forwarded to a fabric switch of the system. The internal header corresponds to a configuration of an ingress interface over which the packet was received. An egress packet processing device, upon receiving the packet from the switch, processes the packet based on the internal header and a configuration of an egress interface associated with the egress device. Advantageously, some packet tag manipulation operations are performed only at the egress packet processing device; thereby somewhat freeing up ingress packet processing resources. | 08-23-2012 |
20120213223 | EFFICIENT MULTICASTING IN A DISTRIBUTED SYSTEM ARCHITECTURE - Embodiments of the invention are directed to multicasting packets in a system such as a data packet switch or router having a distributed architecture. A first device such as a line card receiving a packet that requires multicasting forwards the packet to a fabric switch where the packet is replicated to obtain one respective packet for each line card of the system. Each line card receives its respective packet from the fabric switch and further duplicates the packet to obtain a duplicate packet for each egress endpoint of a service associated with the packet that is eligible to receive such a duplicate packet. Replication and duplication of packets requiring multicasting performed in this manner efficiently uses bandwidth of the fabric switch and links connecting it to the line cards. | 08-23-2012 |
20120213182 | PRIMARY SERVING GATEWAY RESOLUTION - Various embodiments relate to a system and related method for handling requests from a user device in a wireless communications network. Various embodiments relate to a Policy and Charging Rules Node (PCRN) attempting to bind an IP-CAN session established in a Packet Data Network gateway (PGW) with a gateway control session established in a serving gateway (SGW). In instances when the IP-CAN session and gateway control session no longer match, the PCRN may wait to receive a subsequent message from the PGW and/or SGW. When the PCRN does not receive the subsequent message containing a matching session, the PCRN may terminate the sessions in all the relevant gateways. This may cause the system to reestablish a new, matching connection instead of remaining in a hanging state. | 08-23-2012 |
20120213064 | MONITORING RESOURCE CONGESTION IN A NETWORK PROCESSOR - Embodiments of the invention are directed to monitoring resources of a network processor to detect a condition of exhaustion in one or more of the resources over a predetermined time interval and to provide an indication of the condition. Some embodiments periodically sample various resources of a network processor and from the samples calculate utilization of the network processor's memory bus and core processor, and determine if an interworking FIFO packet queue error has occurred. Such information may help network operators and/or support engineers to quickly zero in on the root cause and take corrective actions for network failures which previously could have been attributed to many different causes and that would have required significant time and effort to troubleshoot. | 08-23-2012 |
20120210006 | SESSION BASED SUPPORT OF MULIPLE 3GPP STANDARDS VERSIONS - Embodiments are disclosed that enable a device such as a policy and charging rules function (PCRF) node to operate with other nodes in a long term evolution (LTE) network that are operating at different respective major-minor release combinations of the 3 | 08-16-2012 |
20120207170 | VIRTUAL PRIVATE LAN SERVICE PACKET PROCESSING - Embodiments of the invention are directed to processing Virtual Private LAN Service (VPLS) packets. Each VPLS packet is processed in two stages. In a first stage Layer 2 and Layer 3 headers are parsed from the packet to obtain an Ethernet frame and Traffic management characteristics are determined according to the L3 header. In a second stage a type of Ethernet frame is determined, as either one requiring replication or not, and the Ethernet frame is forwarded in accordance with the TM characteristics based on the determined frame type. This approach allows for a modular implementation which provides enables high performance and efficient utilization of processing resources. | 08-16-2012 |
20120207086 | SIMULTANEOUSLY SUPPORTING MULIPLE 3GPP STANDARD VERSIONS - Embodiments are disclosed that enable a device such as a policy and charging rules function (PCRF) node to operate with other nodes in a long term evolution (LTE) network that are operating at different respective major-minor release combinations of the 3 | 08-16-2012 |
20120177028 | RADIUS GATEWAY ON POLICY CHARGING AND RULES FUNCTION (PCRF) FOR WIRELINE/WIRELESS CONVERGED SOLUTION - A method and apparatus are provided for allowing a single platform to recognize and process both Diameter messages and Radius messages. A gateway is provided for translating Radius messages received from a wireline device into NASReq messages. A Diameter Proxy Agent receives both Diameter messages from a wireless device and the NASReq messages from the gateway. The Diameter Proxy Agent selects a PCRF to which to pass a NASReq message, and upon receipt of a NASReq message the PCRF either creates or updates a NASReq session object. By recognizing and processing Radius messages, wireline services can be offered at the same time as wireless services without requiring the use of a second platform. In addition, use of the PCRF server to support wireline services offers much better scalability than that offered by traditional AAA servers. | 07-12-2012 |
20120173889 | Power Saving Hardware - A method and apparatus are provided which allow telecommunication equipment to adjust its power consumption. By replicating the functionality of a standard component for processing traffic on a general purpose CPU, traffic can be routed within the equipment to the general purpose CPU for processing instead of the component under certain conditions. If the maximum bandwidth supported by the functionality on the general purpose CPU is less than the maximum bandwidth supported by the component, then the component can be powered down during times of low traffic and the traffic routed to the general purpose CPU instead. Since the maximum bandwidth supported by the functionality on the general purpose CPU is less than the maximum bandwidth supported by the component, less power is necessary to operate the telecommunication equipment and hence cost is reduced. | 07-05-2012 |
20120173660 | Real-Time Power Cost Feed - A method and apparatus are provided in which a new input to a telecommunications node is provided, namely the real-time cost of power. By providing this information, the node may make more informed decisions as to power cost of various options. For example, the node may alter its operating parameters based on the current cost of power to implement various features. The real-time cost of power is provided to the node by the power provider. The real-time cost of the power is provided to the node using any method, such as by packets through a dedicated interface of the node, packets through a UDP port, or as packets over the electricity grid. The telecommunications node is just one example of end user equipment, and the real-time cost of power may be provided to any power-consuming equipment. | 07-05-2012 |
20120168216 | 0201 LAND PATTERN FOR 1.0 mm AND .08 mm PITCH ARRAYS - A land pattern for 1 mm and 0.8 mm pitch arrays has been disclosed for placing two port devices. The land pattern includes a ball grid array (BGA) of BGA pads each connected to a respective through hole via, and a pair of rectangular conductive pads electrically connected to a an adjacent pair of through hole vias, wherein each rectangular pad extends out from its via towards the other via of the pair along a line connecting the centers of said adjacent pair vias. A solder mask is located on the rectangular pad side and has apertures over each rectangular conductive pad. The land pattern is particularly useful for locating two port devices directly underneath a BGA device while minimizing the distance from a BGA ball to the two port device lead. | 07-05-2012 |
20120166014 | ADAPTIVE COOLING USING SYSTEM CONFIGURATION INFORMATION - A method and system is disclosed for controlling cooling unit operational settings according to a desired useful life target. The method and system includes an adaptive cooling controller which uses system configuration information to associate a particular cooling unit with particular sub-equipment locations, and further uses configuration information to associate cooling unit activity with respective sensors. At a given cooling unit setting, the adaptive cooling controller determines from sensor readings in the associated sub-equipment whether a cooling unit setting change is required according to the configuration information for the sub-equipment in conjunction with a useful life target. The method and system is particularly useful for overcoming the difficulty with accommodating sub-equipment changes of cooling unit controllers known in the art. | 06-28-2012 |
20120165100 | CROWD MOBILE SYNCHRONIZATION - The invention is directed to a system and method for providing a synchronized game display to a plurality of mobile communications devices which can be grouped according to one or more attributes. Game display messages are specific to each grouping and comprise dance moves, song lyrics or other instructions to users of the mobile communication devices. A synchronization mechanism is provided to synchronize the displays the groups of mobile devices. | 06-28-2012 |
20120160444 | ADAPTIVE COOLING USING SELECTABLE TARGET USEFUL LIFE - A method and system is disclosed for controlling cooling unit operational settings according to a desired useful life target. The method and system includes an adaptive cooling controller which uses system configuration information to associate a particular cooling unit with particular sub-equipment locations, and further uses configuration information to associate cooling unit activity with respective sensors. At a given cooling unit setting, the adaptive cooling controller determines from sensor readings in the associated sub-equipment whether a cooling unit setting change is required according to the configuration information for the sub-equipment in conjunction with a useful life target. The method and system is particularly useful for overcoming the difficulty with accommodating sub-equipment changes of cooling unit controllers known in the art. | 06-28-2012 |
20120137295 | METHOD FOR DISPLAYING CPU UTILIZATION IN A MULTI-PROCESSING SYSTEM - Various exemplary embodiments relate to a method of measuring CPU utilization. The method may include: executing at least one task on a multi-processing system having at least two processors; determining that a task is blocked because a resource is unavailable; starting a first timer for the task that measures the time the task is blocked; determining that the resource is available; resuming processing the task; stopping the first timer for the task; and storing the time interval that the task was blocked. The method may determine that a task is blocked when the task requires access to a resource, and a semaphore indicates that the resource is in use. The method may also include measuring the utilization time of each task, an idle time for each processor, and an interrupt request time for each processor. Various exemplary embodiments relate the above method encoded as instructions on a machine-readable medium. | 05-31-2012 |
20120137257 | HUMAN READABLE ICONIC DISPLAY - The invention is directed to providing a method for managing a human-readable icon associated with a user for displaying the human-readable icon on one or more target displays in response to a request for a service from the user. A user-operable device is used to transmit a request for the service and additionally to validate a unique human readable icon. The publicly-viewable human-readable icon can provide confirmation to the user for a request for service while providing a level of anonymity. | 05-31-2012 |
20120137256 | HUMAN READABLE ICONIC DISPLAY SERVER - The invention is directed to providing a method for managing a human-readable icon associated with a user for displaying the human-readable icon on one or more target displays in response to a request for a service from the user. An icon server is used to manage and validate a unique human readable icon. The publicly-viewable human-readable icon can provide confirmation to the user for a request for service while providing a level of anonymity. | 05-31-2012 |
20120106951 | IN-BAND OPTICAL SIGNAL-TO-NOISE RATIO MEASUREMENT - Various embodiments relate to an in-band measurement of the optical signal-to-noise ratio (OSNR) of an optical signal in an optically-amplified transmission system. A demodulation device may tap a transmission fiber to receive an optical signal containing a low-frequency signal. A filter may implement first and second passbands to filter portions of an optical channel in the optical signal. Once the filtered channel is converted to first and second target electrical signals, a measurement circuit may take measurements of DC and AC components for each of the target electrical signals. Based on measurements of the two target electrical signals, the demodulation device may calculate the OSNR as a function of the DC and AC components, or as a function of the adjustment factors between first and second passbands of the optical channel represented by the first and second target electrical signals. | 05-03-2012 |
20120106567 | MLPPP OCCUPANCY BASED ROUND ROBIN - Embodiments of the invention are directed to providing a method for selecting a link for transmitting a data packet, from links of a Multi-Link Point-to-Point Protocol (MLPPP) bundle, by compiling a list of links having a minimum queue depth and selecting the link in a round robin manner from the list. Some embodiments of the invention further provide for a flag to indicate if the selected link has been assigned to a transmitter so that an appropriate link will be selected even if link queue depth status is not current. | 05-03-2012 |
20120087402 | IN-SYSTEM METHOD FOR MEASUREMENT OF CLOCK RECOVERY AND OSCILLATOR DRIFT - Various embodiments relate to an in-system measurement of clock signals in a communications circuit. A circuit may include a central processing unit and at least one phase error counter (PEC) that uses a measurement clock to determine the accuracy of a target signal. In some embodiments, the PEC may include a counter that compares a clock signal produced by a reference oscillator with the signal of the measurement clock by generating an oscillator phase error based the measured difference during a target period. In some embodiments, the PEC may measure the performance of a clock recovery module by measuring a difference between a produced recovered clock signal and the measurement clock signal, which may be the clock recovery phase error between the two signals. The CPU may also use the measured phase errors to determine other values related to the target signal(s). | 04-12-2012 |
20120084307 | EFFICIENT DATABASE SEARCH FOR UNIQUE INDENTIFIERS - The invention is directed to providing an improved method of determining available identifiers (IDs) in a database, especially in the context of using available IDs for provisioning services in a telecommunications system. The method performs a database query for a range of IDs and stores candidate IDs in a local pre-fetch ID set. | 04-05-2012 |