This application is related to the following commonly owned and assigned applications: application Ser. No. 11/343,211, “Method and Apparatus for Partitioning Resources within a Session-Over-Internet-Protocol (SoIP) Session Controller,” filed herewith; and application Ser. No. 11/343,218, “Session Data Records (SDRs) and Related Alarming within a Session Over Internet Protocol (SoIP) Network,” filed herewith; each of which is incorporated herein by reference in its entirety.
The present invention relates to Session over Internet Protocol (SoIP) networks, and in particular, but not by way of limitation, the present invention relates to systems and methods for modifying a route within a SoIP network.
Voice telecommunications has traditionally been conducted via dedicated telephone networks utilizing telephone switching offices and either wired or wireless connections for transmitting the voice signal between users' telephones. Such telecommunications, which used the public switched telephone network (PSTN), may be referred to as circuit committed communications. Because of the circuit based nature of the PSTN, modifying a connection by setting up a circuit and implementing a routing change can be a relatively slow process that often requires manual intervention. If considered in the context of the open system interconnection (OSI) model, PSTN modifications generally occur on layers one, two, and three.
Session over Internet Protocol (SoIP), also referred to as Media over Internet Protocol (MoIP), provides an alternative communication means that uses discrete Internet Protocol (IP) packets of digitized information to transmit media content such as voice content, video content and/or data, over the internet or within an intranet via wired and/or wireless connections. SoIP technology includes Voice over Internet Protocol (VoIP) technology, which is used primarily to transmit voice signals over an IP network. Because SoIP technology is based on IP packet switching, SoIP connections and routes can be created and managed quickly using session aware components. Current session aware components, however, do not provide the routing appropriate for SoIP technology. For example, current session aware components do not use adaptive feedback to dynamically route based on full-cycle alarms, priorities associated with routes or endpoints, or connection-limits associated with routes or endpoints. Thus, a need exists for a method and apparatus for modifying SoIP network routes based on various types of feedback.
A method includes receiving an instruction associated with a definition of an alarm condition and modifying a session controller associated with a Session over Internet Protocol (SoIP) network based on the alarm condition. The session controller can be modified when the alarm condition, which is defined based on session data, is changed from satisfied to unsatisfied or unsatisfied to satisfied. The modifying of the session controller is associated with a set of connections that includes more than zero connections.
SoIP technology, also referred to as Media over Internet Protocol (MoIP), can be used to transmit many forms of communication such as voice (via Voice over Internet Protocol (VoIP)), video, video conferencing, digital data transfer, etc. A Session over Internet Protocol (SoIP) network can be dynamically modified based on a rule (e.g., a business policy) associated with the SoIP network. The rule can promote, for example, a modification of the SoIP network to meet the needs of, for example, customers using SoIP routes and/or service providers who manage the SoIP network. The rule can be enforced by monitoring session data with reference to an alarm condition and dynamically modifying the SoIP network based on the session data. This process of monitoring session data and dynamically modifying the SoIP network based on the session data can be referred to, for example, as adaptive feedback. A SoIP network modification can include, for example, the modification of a system resource, a route, a property associated with an endpoint, and/or a priority associated with a route.
The SoIP network modifications can be implemented using a session controller (SC) that stores session data in session-data-records (SDRs) associated with connections established within a SoIP network and provided to an SC-network controller. An SC can be part of a route between a source endpoint and a destination endpoint within a SoIP network, and can collect the session data about the respective SoIP connection. This session data can be stored within an SDR that is provided to the SC-network controller. The SDR can include values for one or more session layer parameters and/or extrinsic parameters. Upon receiving the SDR and other SDRs, the SC-network controller can trigger a feedback signal to the SC in response to an alarm condition that changes from satisfied to unsatisfied or vice versa. The alarm conditions can be based on any combination of the extrinsic parameters and session layer parameters using boolean logic or mathematics that will promote enforcement of the rule. Multiple alarm conditions can be tested simultaneously using alarm threads executing in parallel in an alarm pool.
The detailed description focuses on modifications involving a route within the SoIP network for illustrative purposes. In practice, the alarm flow can trigger any modification of the SoIP network that will promote the enforcement of a rule (e.g., business policy). For example, the SoIP modification can be the modification of a system resource such as a media routing or transcoding resource within an SC or a property associated with an endpoint.
Referring now to the drawings,
The SBCs 120 establish and control connections between the endpoints 180 based on routing information that includes, for example, routing logic, endpoint information, connection-limits, and route priority information. A route can be modified by, but is not limited to, changes in the routing information. The routing information can be individually associated with a given virtual routing partitions established on the SBC 120 or can be a commonly owned set of routing information that is managed on more than one SBC 120. More details regarding virtual partitions within an SBC are set forth in co-pending application Ser. No. 11/343,211, “Method and Apparatus for Partitioning Resources within a Session-Over-Internet-Protocol (SoIP) Session Controller,” which is incorporated herein by reference.
Upon termination of a connection between endpoints 180, the SBCs 120 generate an SDR, also referred to as a session-detail-record, which contains session data about the connection. The session data can be stored in a record other than an SDR and includes, but is not limited to, session layer parameters and extrinsic parameters. The session layer parameters include, for example, a call duration indicator, start and end time indicators, and source and destination endpoint indicators as well as quality-of-service (QoS) information such as a delay indicator, a media quality indicator, a packet loss indicator, a packet delay variance (jitter) indicator, and a ratings factor (r-factor). An r-factor is a value derived from metrics, such as latency, jitter, and packet loss, for assessing the quality of VoIP calls. Extrinsic parameters include, for example, variables such as a time-of-day indicator, a day-of-the-week indicator, a number-of-calls indicator, or route cost parameters.
The SBC-network controller 100, which includes an SDR-receptor manager 104 and an alarm manager 108, processes session data with reference to an alarm condition based on a rule to determine whether a route should be modified when the alarm condition is either satisfied or unsatisfied. The alarm condition is based on, but is not limited to, the session data in the multiple SDRs, each of which includes the session layer parameters and the extrinsic parameters. The SDR-receptor manager 104 receives and stores the session data contained in the SDRs transmitted from the SBCs 120. The alarm manager 108 executes alarm threads that process session data relevant to alarm conditions.
The alarm manager 108 also determines, based on the processed session data and with reference to the alarm conditions, whether or not to generate a feedback signal that will result in the modification of a route. When the alarm condition changes from either satisfied to unsatisfied or vice versa, the alarm manager 108 sends one or more indicators that trigger the modification of one or more routes established, controlled, or monitored by the SBCs 120. The indicator can be a signal that triggers a routing change or a signal that contains a set of instructions with detailed information for modifying the routing information on at least one SBC 120. The indicator can also directly modify routing information, for example, by rewriting a file (e.g. a text file) stored on an SBC 120 and/or the SBC-network controller 100. In general, the functionality of the components within the SBC-network controller 100 can be implemented in software, firmware, custom hardware, or any combination thereof.
In this illustrative embodiment, the endpoints 180 include but are not limited to a public switched telephone network (PSTN) 120, broadband network 130 that can provide network access to consumers 140, enterprise network 150, H.323 network 160, session initiation protocol (SIP) softswitch network 170, or a SIP network (not shown). An endpoint 180 could also be an individual phone/computer terminal (not shown) or an access point to another SoIP network (not shown). Each of the endpoints 180 is an endpoint from the perspective of the individual SBC 120 that is connected to the endpoint 180.
The SDRs are typically received by the SBC-network controller 100 when the connection is terminated. In some embodiments, however, they can also be received by the SBC-network controller 100 in a batch mode at specified time intervals or upon request by the SBC-network controller 100. In some embodiments, SDRs or portions of SDRs can be received by the SBC-network controller before a connection has terminated as the portions become available.
Although the SBC-network controller 100 is centralized in the illustrative embodiment of
The SBC 230 establishes the connection via one of the destination endpoints 214, 216, and 218 based on a feedback signal from the alarm manager 208 in the SBC-network controller 200. For example, the SBC 230 may typically establish connections from source endpoint 212 to the destination terminal adapter 240 via destination endpoint 214. Connection can typically be established through destination endpoint 214, because based on SDR session data and with reference to an alarm condition, destination endpoint 214 may be the preferred access point. As connections are terminated and additional SDR session data is collected and processed, the SBC-network controller 200 may determine based on an alarm condition that destination endpoint 216 should be used as the preferred endpoint rather than destination endpoint 214. This change in destination endpoint preferences can be implemented by modifying the routing information on SBC 230 according to a feedback signal (not shown) from SBC-network controller 200 to SBC 230.
A route can be modified using one or more methods. For example, a route can be modified by increasing or decreasing the connections allowed on at least one of the destination endpoints 214, 216, and 218. If the number of connections allowed on destination endpoints 214 and 216 are decreased to zero while the number of connections allowed on destination endpoint 218 is maintained at a non-zero number (e.g. 100), destination endpoint 218 will be the preferred access point into provider network 280. Because the connections limits associated with destination endpoints 214 and 216 are zero, the routes through destination endpoints 214 and 216 are effectively blocked.
Rather than decreasing the connection-limit associated with a particular destination endpoint to a number such as zero, effectively blocking that destination endpoint, the destination endpoint can instead continue to be monitored by trickling connections through the destination endpoint. If a destination endpoint is totally blocked by decreasing the connection-limit to zero, an SBC-network controller typically cannot dynamically determine whether the delay associated with connections through a destination endpoint will subside over time or over a change of conditions because no connections are allowed. For example, instead of decreasing the connection-limit on destination endpoint 218 from a limit of 1000 to zero when an alarm condition is satisfied (e.g. an alarm condition associated with a delay threshold), the connection-limit on destination endpoint 218 can be decreased, for example, to five. The SDRs for the few connections established through destination endpoint 218 can be processed with reference to the alarm condition. If the delay associated with the connections improves below the alarm condition threshold, the connection-limit can be increased from five to a normal connection-limit. The connection-limit, however, does not necessarily have to be increased to the previous connection-limit of 1000, but rather in some embodiments to an intermediate value.
A route can also be modified by changing the priority of a route relative to other routes controlled by one or more SCs. For example, the route including destination endpoint 214 can be associated with a priority level that is higher than that of the routes including destination endpoints 216 and 218. By modifying the priority level for one or more routes, the number of connections through the destination endpoints 214, 216, and 218 will not be limited to specific connection-limits, but will instead be controlled by respective priority values.
In some embodiments, a route modification can be a combination of more than one modifications. For example, based on the satisfying of an alarm condition, both priority information and connection-limit information contained within routing information can be modified. Also, in some embodiments, an action in addition to a route change can be triggered when an alarm condition is changed from either satisfied to unsatisfied to vice versa. For example, a notification e-mail can be sent to a SoIP network manager notifying the network manager that a route change has taken place.
The alarm condition can be a single threshold limit associated with a session layer parameter such as a QoS parameter or can be a complex condition that incorporates more than one session layer parameter in any mathematical or logical combination with any type or number of threshold values or limits. For example, the alarm condition can be an alarm condition that incorporates a boolean condition that is only satisfied when a jitter parameter exceeds a specified threshold value and when a delay parameter exceeds a different specified threshold value.
In some embodiments, rather than being a boolean type alarm condition, the alarm condition can be defined such that the alarm condition is satisfied when the multiplication or addition of two QoS parameters is less than a certain value or even between specified limits. In some embodiments, the alarm condition can be based on the most recently received SDRs. Alternatively, the alarm condition can be defined such that the alarm condition is only satisfied when a certain volume of data, when averaged over time, exceeds a threshold value. This type of averaging of historical data as a moving average can also be termed a moving-window average.
The alarm conditions can also be defined in terms of extrinsic parameters such as time-of-day, day of the week, numbers of calls, or route cost parameters. A extrinsic-parameter values can be included in or associated with one or more SDRs. For example, an alarm condition can be configured such that a route is modified at a certain time of day and day of the week or modified based on a certain number of calls that are connected using the route. The extrinsic parameters can also be used, for example, in any alarm condition in combination with a QoS-based condition. For example, an alarm condition can be defined such that a QoS-based condition associated with a particular alarm condition is not considered for an SBC if the total number of SDRs or total number of connections processed by the SBC are above or below a threshold limit during a specified period of time. This kind of conditional limit within an alarm condition can be referred to as a system load filter.
Route cost parameters such as the cost of a connection can also be included in an SDR to allow for alarming and route modification based on cost. This information can be used in conjunction with an alarm condition that is configured to identify, for example, a least cost route or a maximum-profit route. If an alarm condition is defined so that the priority of several routes on one or more SCs are modified to maximize profits, the average cost of connections on various routes can be calculated with reference to the profit-maximizing alarm condition and routing adjustments can be made to maximize profits. Alternatively, if an alarm condition is defined so that the priority of several routes on one or more SCs are modified to minimize costs, the average cost of connections on various routes can be calculated with reference to the low-cost alarm condition and routing adjustments can be made to minimize costs. The route cost parameters can be included as relative values that are not tied to a specific currency.
In some alternative embodiments, the alarm conditions can be based on data that can be collected from partially loaded SDRs before a call has been terminated. For example, an alarm condition can trigger the termination of a connection through the adjustment of a route if a connection exceeds a specified time limit.
After the alarm conditions have been defined at 300, session data relevant to the alarm conditions is processed at 310. Information such as a specific value of a QoS parameter, if relevant to the alarm condition, can be extracted from at least one SDR generated by one or more SCs. Likewise, a value of an extrinsic parameter such as the time-of-day, if relevant to the alarm condition can be obtained. If the alarm condition is related to a combination of parameters in the SDR such as the extrinsic parameters and session layer parameters, values of the relevant parameters can be retrieved and processed to determine the state of the alarm condition.
The flowchart shows that the relevant data is repeatedly processed with reference to the alarm condition at 310, as indicated by the looping arrow, until the alarm condition is satisfied at 320. When the alarm condition is satisfied, the alarm-state changes from an unsatisfied alarm-state to a satisfied alarm-state. The frequency with which the data is processed and compared with the alarm condition in the unsatisfied alarm-state can be varied depending upon variables such as the volume of data being processed, the frequency in which data is received or updated, and the types of alarm conditions that are being monitored.
The alarm condition and the instructions for extracting relevant session data can be contained in an alarm thread that is executed by, for example, an alarm manager (e.g. alarm manager 208 in
An alarm thread, which can also be an alarm function, can be programmed to accommodate complex alarm conditions and can be programmed to filter and process data for those alarm conditions. For example, if the alarm condition is based on an average of a specified quantity of data or a specified interval of data, the alarm thread can process historical data to create moving averages or a moving-window average. The alarm thread can be programmed to remove statistically invalid points when processing the data and calculating averages that are compared with alarm conditions.
An alarm thread can be executed in parallel with multiple other alarm threads each of which contain alarm conditions that are separately monitored based on session layer parameters and extrinsic data. Because the alarm threads can contain alarm conditions and/or instructions for route changes that overlap, conflicts between alarm threads can be resolved by assigning priorities to the alarm conditions, alarm threads, and/or route changes. The alarm threads and their associated conditions can also be analyzed and combined based on their overlap. For example, a new alarm thread can be instantiated if alarm conditions within two or more alarm threads overlap in a manner such that a single alarm thread could equivalently cover the two or more alarm threads.
When the alarm condition is satisfied and the alarm-state changes from unsatisfied to satisfied a route change is triggered at 330. The route change can be triggered by an indicator that, for example, directly modifies a route or triggers the sending of detailed instructions that are received by an SC. The indicator itself can also contain detailed instructions that can be processed by an SC to modify routing information. The type of indictor and information contained in the indicator can be specified in an alarm condition or generated by an alarm thread programmed to specify the information contained in the indicator.
The flowchart shows that the alarm conditions are defined 300 before relevant data is processed and compared with the alarm condition 310, but the definition of an alarm condition and even the configuration of an alarm thread that executes the processing of data with reference to an alarm condition can be modified at any point in the flow. For example, if a first alarm condition in a first alarm thread is in conflict with a newly defined second alarm condition in a second alarm thread, the first alarm thread that may already be processing data can be modified based on the conflicting second alarm condition.
Although the flowchart shows that the alarm conditions are defined at 400 before relevant data is processed with reference to the alarm condition at 410, the definition of an alarm condition and even the configuration of an alarm thread that executes the processing of data with reference to an alarm condition can be modified at any point in the flow. For example, the alarm condition can be defined initially in a satisfied alarm-state rather than in an unsatisfied alarm-state.
The graph shows that alarm-state starts in an unsatisfied alarm-state 540. During the unsatisfied alarm-state 540, QoS data is processed with reference to the alarm condition threshold 510. The alarm-state is in an unsatisfied alarm-state 540 until the moving-average data point 520 is calculated at the measurement time of thirty-three minutes. At this point, the alarm condition 510 is satisfied and the alarm-state changes from an unsatisfied alarm-state 540 to a satisfied alarm-state 550. While in the satisfied alarm-state 550, QoS data continues to be processed with reference to the alarm condition threshold 510 until the moving average data point 530 is calculated at measurement time fifty-one. At this point, the alarm condition 510 is no longer satisfied and the alarm-state changes from a satisfied alarm-state 550 to an unsatisfied alarm-state 560.
In some embodiments, a first route change that is triggered at point 520 when the alarm-state changes from an unsatisfied alarm-state 540 to a satisfied alarm-state 550 can be different than a second route change that is triggered at point 530 when the alarm-state changes from the satisfied alarm-state 550 to the unsatisfied alarm-state 560. Also, in an alternative embodiment, the first alarm condition that triggers a change from a satisfied alarm-state 540 to an unsatisfied alarm-state 550 can be different than a second alarm condition that triggers a change from the unsatisfied alarm-state 550 back to the satisfied alarm-state 560.
In conclusion, among other things, a method for modifying a route based on an alarm condition is described. While various embodiments of the invention have been described above, it should be understood that they have been presented by way of example only, and various changes in form and details may be made. For example, an alarm condition within an alarm thread can be defined such that an alarm flow includes a third alarm-state.
Number | Name | Date | Kind |
---|---|---|---|
5796424 | Ely et al. | Aug 1998 | A |
6738813 | Reichman | May 2004 | B1 |
6775269 | Kaczmarczyk et al. | Aug 2004 | B1 |
6775280 | Ma et al. | Aug 2004 | B1 |
6895429 | Banga et al. | May 2005 | B2 |
6904017 | Meempat et al. | Jun 2005 | B1 |
6944678 | Lu et al. | Sep 2005 | B2 |
6980526 | Jang et al. | Dec 2005 | B2 |
7002973 | MeLampy et al. | Feb 2006 | B2 |
7028092 | MeLampy et al. | Apr 2006 | B2 |
7031311 | MeLampy et al. | Apr 2006 | B2 |
7058974 | Maher, III et al. | Jun 2006 | B1 |
7072303 | MeLampy et al. | Jul 2006 | B2 |
7133923 | MeLampy et al. | Nov 2006 | B2 |
7142532 | Penfield et al. | Nov 2006 | B2 |
7151781 | MeLampy et al. | Dec 2006 | B2 |
7193996 | Dobbins et al. | Mar 2007 | B2 |
7260085 | Dobbins et al. | Aug 2007 | B2 |
7362707 | MeLampy et al. | Apr 2008 | B2 |
7376731 | Khan et al. | May 2008 | B2 |
7433315 | Bhatia et al. | Oct 2008 | B2 |
7447160 | Croak et al. | Nov 2008 | B1 |
7466710 | Clemm et al. | Dec 2008 | B1 |
7483380 | Metke | Jan 2009 | B2 |
20010033551 | Busuioc et al. | Oct 2001 | A1 |
20020024954 | Cunetto et al. | Feb 2002 | A1 |
20020087689 | Chen | Jul 2002 | A1 |
20020087721 | Sato et al. | Jul 2002 | A1 |
20030005152 | Diwan et al. | Jan 2003 | A1 |
20030072271 | Simmons et al. | Apr 2003 | A1 |
20030161310 | Dobbins et al. | Aug 2003 | A1 |
20030186702 | McConnell et al. | Oct 2003 | A1 |
20030225893 | Roese et al. | Dec 2003 | A1 |
20040015583 | Barrett et al. | Jan 2004 | A1 |
20040025186 | Jennings et al. | Feb 2004 | A1 |
20040044871 | Weber et al. | Mar 2004 | A1 |
20040066782 | Nassar | Apr 2004 | A1 |
20040086093 | Schranz | May 2004 | A1 |
20040109541 | Celi et al. | Jun 2004 | A1 |
20040117624 | Brandt et al. | Jun 2004 | A1 |
20040128201 | Ofir et al. | Jul 2004 | A1 |
20040213210 | Dube et al. | Oct 2004 | A1 |
20040218614 | Yokomitsu et al. | Nov 2004 | A1 |
20040250114 | Parekh et al. | Dec 2004 | A1 |
20050111382 | Le et al. | May 2005 | A1 |
20050111455 | Nozue et al. | May 2005 | A1 |
20050147031 | Bhatia et al. | Jul 2005 | A1 |
20050213591 | Nakazawa et al. | Sep 2005 | A1 |
20050265231 | Gunther et al. | Dec 2005 | A1 |
20060088025 | Barkley et al. | Apr 2006 | A1 |
20060098577 | MeLampy et al. | May 2006 | A1 |
20060126664 | Horton | Jun 2006 | A1 |
20060147013 | Baumeister et al. | Jul 2006 | A1 |
20060187927 | MeLampy et al. | Aug 2006 | A1 |
20060187942 | Mizutani et al. | Aug 2006 | A1 |
20060215683 | Sukkar et al. | Sep 2006 | A1 |
20060245574 | Phelps et al. | Nov 2006 | A1 |
20070019619 | Foster et al. | Jan 2007 | A1 |
20070036151 | Baeder | Feb 2007 | A1 |
20070058639 | Khan | Mar 2007 | A1 |
20070076591 | Khan | Apr 2007 | A1 |
20070076594 | Khan et al. | Apr 2007 | A1 |
20070076603 | MeLampy et al. | Apr 2007 | A1 |
20070076710 | Khan | Apr 2007 | A1 |
20071007685 | MeLampy et al. | Apr 2007 | |
20070104105 | MeLampy et al. | May 2007 | A1 |
20070116043 | MeLampy et al. | May 2007 | A1 |
20070180124 | Mallesan et al. | Aug 2007 | A1 |
20070180142 | Small et al. | Aug 2007 | A1 |
20070201472 | Bhatia et al. | Aug 2007 | A1 |
20070201473 | Bhatia et al. | Aug 2007 | A1 |
20070201481 | Bhatia et al. | Aug 2007 | A1 |
20070201494 | Lou et al. | Aug 2007 | A1 |
20071018008 | Mallesan et al. | Aug 2007 | |
20070263660 | Mitsumori | Nov 2007 | A1 |
20080101343 | Monette et al. | May 2008 | A1 |
20080159294 | Irish et al. | Jul 2008 | A1 |
20080285569 | Stademann et al. | Nov 2008 | A1 |
20090046720 | Streijl et al. | Feb 2009 | A1 |
20090086728 | Gulati et al. | Apr 2009 | A1 |
Number | Date | Country |
---|---|---|
1 043 648 | Oct 2000 | EP |
2004193845 | Jul 2004 | JP |
WO 0249279 | Jun 2002 | WO |
WO 0249315 | Jun 2002 | WO |
WO 0249316 | Jun 2002 | WO |
WO 02058349 | Jul 2002 | WO |
WO 02060116 | Aug 2002 | WO |
Number | Date | Country | |
---|---|---|---|
20070180141 A1 | Aug 2007 | US |