Method of and system for extending internet telephony over virtual private network direct access lines

Information

  • Patent Grant
  • 6879680
  • Patent Number
    6,879,680
  • Date Filed
    Friday, January 11, 2002
    23 years ago
  • Date Issued
    Tuesday, April 12, 2005
    20 years ago
Abstract
A virtual private network includes an internet protocol (IP) network and a public switched telephone network (PSTN). An enterprise gateway is operably connected to the IP network. The enterprise gateway is operably connected to a switch of the PSTN through a direct access line (DAL). The set-up signaling for virtual private network calls and the calls themselves are transported across the internet protocol network and the public switched telephone network through the direct access line.
Description
BACKGROUND

The present invention relates generally to the field of virtual private networks, and more particularly to a method of and system for providing a virtual private network in which a portion of each call is transported through an internet protocol network.


DESCRIPTION OF THE PRIOR ART

Some larger organizations with far-flung sites and locations use virtual private networks (VPNs) as an alternative to traditional long distance services for their intra-organizational telephone communications. Virtual private networks are created within the public switched telephone system but they provide a communication system that appears from the users prospective to be private.


Referring to FIG. 1, there is shown a simplified block diagram of a virtual private network. An intra-location telephone system includes a plurality of telephones 11 operably connected to a private branch exchange (PBX) 13. As is well known to those skilled in the art, several or even hundreds of telephones may be operably connected to PBX 13.


PBX 13 provides intra-site communication between telephone and other telephones at the site. Additionally, a user of a telephone 11 may make a local or long distance call outside of the location by entering a digit, such as “9”, to obtain an outside line. Additionally, a user of telephone 11 may make a VPN call by entering another digit, such as “8”, to reach a member of the organization at another location. The other location may be in a separate city, state, or even country. Typically, VPN numbers have the appearance of local seven digit telephone numbers. A three digit prefix number identifies a location and the remaining four digits identify a telephone within the location.


In the example of FIG. 1, a user of telephone 11 at a location located in, for example, California, wishes to place a VPN call to a telephone 15 located at a site of the organization in, for example, New York. The telephones 15 of the site in New York are operably connected to a PBX 17 that services the site. For purposes of illustration, the VPN number associated with telephone 15 is 555-1234. To initiate the call, a user takes telephone 11 off hook and receives a dial tone from PBX 13. The user enters “8” to identify the call as a VPN call and receives another dial tone. Then, the user enters the digits 555-1234. PBX 13 forwards the call to a switch 19 of a public switched telephone network (PSTN) 21 over a direct access line (DAL 23). Switch 19 is identified in PSTN 21 by a unique originating switch identifier (OSID). DAL 23 is identified by an originating trunk group (OTG) identifier. When switch 19 receives the dialed digits on the DAL 23, it must consult a service control point (SCP) 25 for routing instructions. SCP 25 uses the OSID and the OTG to determine the identity of the VPN customer and provides routing instructions to switch 19 based on the customer identification and the dialed digits. Switch 19 routes the call through PSTN 21 to an appropriate terminating switch 27. Switch 27 is operably connected to PBX 17 to complete the call to telephone 15.


One of the problems with VPN service is that the public switched telephone network does not extend reliably to all parts of the world. Because of the unreliability of the PSTN in certain parts of the world, certain locations of organizations particularly, those located in developing nations, are unable to use VPN services.


Recently, organizations have begun to build and use packet switched data networks, such as private intranets and the Internet itself, for mission critical communications. Even in regions without reliable access to the public switched telephone system, organizations have built or have gained access to robust high speed data networks for the transfer of data and electronic communications, such as e-mail, between locations.


It is an object of the present invention to provide a system that extends VPN services through data networks, such as private intranets and the Internet.


SUMMARY

The present invention provides a virtual private network (VPN) that includes an internet protocol (IP) network and a public switched telephone network (PSTN). An egress enterprise gateway is operably connected to the IP network. The egress enterprise gateway is operably connected to a switch of the PSTN through a direct access line (DAL). The set-up signaling for virtual private network calls and the calls themselves are transported across the IP network and the PSTN through the DAL. An intelligent layer in the IP network has the ability to route IP network originated calls to a traditional PSTN DAL.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram illustrating a virtual private network of the prior art.



FIG. 2 is a block diagram illustrating a virtual private network according to the present invention.



FIG. 3 is a block diagram illustrating the operation of enterprise gateways according to the present invention.





DETAILED DESCRIPTION

Referring now to FIG. 2, a VPN according to the present invention is designated generally by the numeral 31. A portion of VPN 31 is implemented in a traditional PSTN environment. The PSTN part of network 31 includes a switch 33 that is served by a SCP 35. Switch 33 is operably connected to a PSTN 37, which in turn is operably connected to a switch 39. Switch 39 is operably connected to a PBX 41 at a location of an organization through a DAL 45. PBX 41 is operably connected to a plurality of telephones, even though only one is shown as telephone 43.


According to the present invention, a portion of VPN 31 is also implemented in an IP network environment. The IP network environment of VPN 31 includes an IP network, which is generally designated by the numeral 47. IP network 47 may comprise a private intranet, the Internet, or a combination of a private intranet and the Internet. IP network 47 provides traditional Internet and web-based services, as well as IP telephony services.


A local organization's telephone system includes a PBX 51 and a plurality of telephones, even though only one is shown as telephone 53. Telephone 53 operates in the normal way. A user can use telephone 53 to call other telephone extensions within PBX 51. PBX 51 can also provide a telephone 53 with an outside line on which the user of telephone 53 can make local and long distance calls.


According to the present invention, a user can use telephone 53 and PBX 51 to make VPN calls. PBX 51 is operably connected to an ingress enterprise gateway (EG) 55. Although gateway 55 is labeled as an “ingress” EG, it is a bidirectional EG and the label “ingress” is only for identification relative to the call flow from telephone 53 to telephone 43. Referring to FIG. 3, EG 55 includes a signaling gateway 57 and a media gateway 59. Signaling gateway 57 provides bi-directional protocol translation from a telephony signaling protocol, such as SS7, ISDN, or channel associated signaling (CAS), depending upon the signaling protocol used by PBX 51, to an Internet telephony signaling protocol, such as session initiation protocol (SIP) or H.323. The preferred embodiment of the present invention is based upon the SIP signaling protocol. However, other embodiments are contemplated based on other protocol, such as H.323. Media gateway 59 provides bi-directional protocol translation between traditional telephony time division multiplexed voice circuits to an IP transport protocol such as real-time transport protocol (RTP). In the case of ISDN or SS7 signaling, signaling gateway 57 is connected to PBX 59 by a signaling link, which is either an SS7 signaling link or an ISDN D-channel. In the case of CAS signaling, signaling gateway 57 receives signaling information from media gateway 59.


SIP and RTP packets are transported across IP network 47 to an egress enterprise gateway EG 61. Although gateway 55 is labeled as an “ingress” EG, it is a bidirectional EG and the label “ingress” is only for identification relative to the call flow from telephone 53 to telephone 43. EG 61 includes a signaling gateway 63 and a media gateway 65. Signaling gateway 63 and media gateway 65 perform bidirectional protocol translations in the manner described with respect to signaling gateway 57 and media gateway 59, respectively. Referring again to FIG. 2, EG 61 is connected to switch 33 of PSTN 27 by DAL 23.


Referring again to FIG. 2, a VPN call can be placed from telephone 53, located for example in Malaysia, to a telephone 43, located for example in New York. A user takes telephone 53 off hook and dials a VPN number in the normal way. For example, the user dials 8-777-4321. PBX 51 sends a normal set up message with the dialed digits 777-4321 to EG 55. EG 55 performs a protocol translation and formulates a SIP invite message of the form:

    • INVITE:7774321@xyzus.com
    • FROM:5551234@xyzmalaysia.com
    • TO:7774321@xyzus.com


      In the preferred embodiment, SIP URLs are of the form “telephone_number@gateway.” Thus, EG 55 is identified as xyzmalaysia.com and EG 61 is identified at xyzus.com. The SIP invite message is transported across IP network 47 to EG 61. EG 61 performs a protocol translation and sends set up message for VPN number 777-4321 to switch 33 over DAL 23. Switch 33 recognizes the call as a VPN call and consults SCP 35 for routing instructions. SCP 35 uses the dialed digits, the OSID of switch 33, and the OTG of DAL 23 to provide routing instructions to switch 33. Based upon the instructions received from SCP 35, the call is set up across PSTN 37 to telephone 43 using normal telephony signaling. During call setup, egress enterprise gateway 61 passes IP telephony signaling through IP network 47 back to ingress enterprise gateway 55.


The system of the present invention also provides VPN services initiated from telephones 43 served by PSTN 37 to telephones 53 served by IP network 47. A user takes telephone 43 off hook and dials a VPN number, for example, the user dials 8-555-1234. PBX 51 sends a set up message with the dialed digits 555-1234 to switch 39 over DAL 45. Switch 39 recognizes the call as a VPN call and consults a SCP 63 for routing instructions. SCP 63 uses the dialed digits, the OSID of switch 39, and the OTG of DAL 45 to provide routing instructions to switch 39.


Based upon the instructions received from SCP 63, switch 39 sends an SS7 initial address message (IAM) to 33. Switch 33 sends a setup message to EG 61. EG 61 performs a protocol translation and formulates a SIP invite message of the form:

    • INVITE:5551234@xyzmalaysia.com
    • FROM:7774321@xyzus.com
    • TO:5551234@xyzmalaysia.com


      The SIP invite message is transported across IP network 47 to egress enterprise gateway 55. EG 55 performs a protocol translation and sends set up message for VPN number 555-1234 to PBX 51.


From the foregoing, it may be seen that the present invention uses IP telephony to extend the architecture and infrastructure of virtual private networks to areas with unreliable access to the PSTN. A portion of the call is setup and transported across an IP network using a layer of intelligence that routes the call and its signaling to an appropriate enterprise gateway. A portion of the call is setup and transported across the PSTN using traditional VPN infrastructure. Additionally, the present invention may be used to provide virtual private network services to Internet devices and appliances, such as IP phones 65 and IP telephony enabled personal computers 67.


The present invention has been illustrated and described with respect to a presently preferred embodiment. Those skilled in the art will recognize alternative embodiments given the benefit of the foregoing disclosure. Accordingly, the foregoing disclosure is for purposes of illustration and not of limitation.


Thus, having fully described the present invention by way of example with reference to attached drawings figures, it will be readily appreciated that many changes and modifications may be made to the invention and to any of the exemplary embodiments shown and/or described herein without departing from the spirit or scope of the invention, which is defined in the appended claims.

Claims
  • 1. An apparatus for providing virtual private network services, comprising: an enterprise gateway configured to translate between virtual private network internet telephony signal protocol signals and virtual private network telephony signaling protocol signals between virtual private network internet protocol transport signals and virtual private network telephony time division multiplexed signals; a direct access line operably connected to the enterprise gateway; and a switch of a public switched telephone network operably connected to the direct access line.
  • 2. The apparatus of claim 1, wherein the enterprise gateway includes a packet switched network interface.
  • 3. The apparatus of claim 1, wherein the enterprise gateway comprises: a signaling gateway; and a media gateway.
  • 4. The apparatus of claim 3, wherein the signaling gateway comprises means for converting internet protocol call set-up messages to telephone call set-up messages.
  • 5. The apparatus of claim 3, wherein the signaling gateway comprises means for converting internet session initiation protocol messages to telephone call set-up messages.
  • 6. The apparatus of claim 1, comprising: a second enterprise gateway operably connected to an internet protocol network; and, an originating private branch exchange operably connected to the second enterprise gateway.
  • 7. The apparatus of claim 6, wherein the second enterprise gateway comprises: a signaling gateway; and a media gateway.
  • 8. The apparatus of claim 7, wherein the signaling gateway of the second enterprise gateway comprises means for converting telephone call set-up messages to internet protocol call set-up messages.
  • 9. The apparatus of claim 7, wherein the signaling gateway of the second enterprise gateway comprises means for converting telephone call set-up messages to internet session initiation protocol messages.
  • 10. The apparatus of claim 1, comprising: a terminating private branch exchange operably connected to the public switched telephone network.
  • 11. A virtual private network apparatus for providing virtual private network services between a public switched telephone network and an internet protocol network, comprising: a signaling gateway configured to receive telephony signaling protocol signals, the telephony signaling protocol signals providing call signaling for a virtual private network call initiated by a caller, the signaling gateway being configured to convert the telephony signaling protocol signals to internet telephony signaling protocol signals, the signaling gateway being further configured to receive internet telephony signaling protocol signals and convert the received internet telephony signaling protocol signals to telephony signaling protocol signals; and a media gateway coupled to the signaling gateway, the media gateway configured to translate between telephony time division multiplexed signals and internet protocol transport signals.
  • 12. The apparatus of claim 11, wherein the telephony signaling protocol signals are signaling system 7 signals.
  • 13. The apparatus of claim 11, wherein the telephony signaling protocol signals are ISDN signals.
  • 14. The apparatus of claim 11, wherein the telephony signaling protocol signals are channel associated signaling signals.
  • 15. The apparatus of claim 11, wherein the internet telephony signaling protocol signals are session initiation protocol signals.
  • 16. The apparatus of claim 11, wherein the internet telephony signaling protocol signals are H.323 signals.
  • 17. The apparatus of claim 11, wherein the internet protocol transport signals are real-time transport protocol signals.
  • 18. The apparatus of claim 11, wherein the signaling gateway comprises means for converting internet protocol call set-up messages to telephone call set-up messages.
  • 19. The apparatus of claim 11, wherein the signaling gateway comprises means for converting internet session initiation protocol messages to telephone call set-up messages.
  • 20. The apparatus of claim 11, wherein the signaling gateway is also configured to convert telephone call set-up messages to internet protocol call set-up messages.
  • 21. The apparatus of claim 11, wherein the signaling gateway is also configured to convert telephone call set-up messages to internet session initiation protocol messages.
  • 22. A virtual private network apparatus for providing virtual private network services between a public switched telephone network and an internet protocol (IP) network, comprising: a signaling gateway configured to receive internet telephony signal protocol signals, the internet telephony signal protocol signals providing call signaling for a virtual private network call initiated by a caller, the signaling gateway being configured to convert the internet telephony signal protocol signals to telephony signaling protocol signals; and a media gateway coupled to the signaling gateway, the media gateway being configured to translate between internet protocol transport signals and telephony time division multiplexed signals.
  • 23. The apparatus of claim 22, wherein the telephony signaling protocol signals are signaling system 7 signals.
  • 24. The apparatus of claim 22, wherein the telephony signaling protocol signals are ISDN signals.
  • 25. The apparatus of claim 22, wherein the telephony signaling protocol signals are channel associated signaling signals.
  • 26. The apparatus of claim 22, wherein the internet telephony signaling protocol signals are session initiation protocol signals.
  • 27. The apparatus of claim 22, wherein the internet telephony signaling protocol signals are H.323 signals.
  • 28. The apparatus of claim 22, wherein the internet protocol transport signals are real-time transport protocol signals.
  • 29. The apparatus of claim 22, wherein the signaling gateway comprises means for converting internet protocol call set-up messages to telephone call set-up messages.
  • 30. The apparatus of claim 22, wherein the signaling gateway comprises means for converting internet session initiation protocol messages to telephone call set-up messages.
  • 31. The apparatus of claim 22, wherein the signaling gateway is also configured to convert telephone call set-up messages to internet protocol call set-up messages.
  • 32. The apparatus of claim 22, wherein the signaling gateway is also configured to convert telephone call set-up messages to internet session initiation protocol messages.
  • 33. A method for providing virtual private network (VPN) services in a virtual private network that includes a public switched telephone network (PSTN) and an Internet Protocol (IP) network, the method comprising: receiving a first call setup message from a first device for establishing a VPN call to a second device, the first call setup message including a VPN number; translating the first call setup message to an IP protocol message, the IP protocol message including the VPN number; transmitting the IP protocol message across the IP network; translating the IP protocol message to a second call setup message, the second call setup message including the VPN number; and establishing the VPN call with the second device through the PSTN using the second call setup message.
  • 34. The method of claim 33, wherein the first call setup message is received from a private branch exchange.
  • 35. The method of claim 33, wherein the IP protocol message includes a session initiation protocol (SIP) invite message.
  • 36. The method of claim 33, wherein the establishing the VPN call includes: transmitting the second call setup message to a switch associated with the PSTN via a direct access line.
  • 37. The method of claim 36, wherein the establishing the VPN call further includes: obtaining routing instructions based on the VPN number, an identifier associated with the switch, and an identifier of the direct access line.
  • 38. A method for providing virtual private network (VPN) services in a virtual private network that includes a public switched telephone network (PSTN) and an Internet Protocol (IP) network, the method comprising: receiving a first call setup message from a first device for establishing a VPN call to a second device, the first call setup message being received from the PSTN and icluding a VPN number; translating the first call setup message to an IP protocol message, the IP protocol message including the VPN number; transmitting the IP protocol message across the IP network; translating the IP protocol message to a second call setup message, the second call setup message including the VPN number; and establishing the VPN call with the second device using the second call setup message.
  • 39. The method of claim 38 wherein the first call setup message is received from a switch associated with the PSTN via a direct access line.
  • 40. The method of claim 38 wherein the IP protocol message includes a session initiation protocol (SIP) invite message.
  • 41. The method of claim 38 wherein the establishing the VPN call includes: transmitting the second call setup message to a private branch exchange associated with the second device.
CROSS REFERENCE TO RELATED PATENTS

This application is a Continuation of Ser. No. 09/364,536, U.S. Pat. No. 6,453,034 B1, filed Jul. 29, 1999, entitled “METHOD OF AND SYSTEM FOR EXTENDING INTERNET TELEPHONY OVER VIRTUAL PRIVATE NETWORK DIRECT ACCESS LINES.”

US Referenced Citations (75)
Number Name Date Kind
5303286 Wiedeman Apr 1994 A
5434907 Hurst et al. Jul 1995 A
5634012 Logston et al. May 1997 A
5664009 Hurst et al. Sep 1997 A
5680116 Hashimoto et al. Oct 1997 A
5699359 Suga Dec 1997 A
5732219 Blumer et al. Mar 1998 A
5742763 Jones Apr 1998 A
5745556 Ronen Apr 1998 A
5794039 Guck Aug 1998 A
5802510 Jones Sep 1998 A
5826039 Jones Oct 1998 A
5832221 Jones Nov 1998 A
5859898 Checco Jan 1999 A
5864610 Ronen Jan 1999 A
5867494 Krishnaswamy et al. Feb 1999 A
5867495 Elliott et al. Feb 1999 A
5883894 Patel et al. Mar 1999 A
5889774 Mirashrafi et al. Mar 1999 A
5907547 Foladtre et al. May 1999 A
5913176 Barabash Jun 1999 A
5923659 Curry et al. Jul 1999 A
5930348 Légnier et al. Jul 1999 A
5951638 Hoss et al. Sep 1999 A
5953504 Sokal et al. Sep 1999 A
5956391 Melen et al. Sep 1999 A
5958005 Thorne et al. Sep 1999 A
5960416 Block Sep 1999 A
5999525 Krishnaswamy et al. Dec 1999 A
6064653 Farris et al. May 2000 A
6069890 White et al. May 2000 A
6073160 Grantham et al. Jun 2000 A
6078583 Takahara et al. Jun 2000 A
6081518 Bowman-Amuah Jun 2000 A
6084952 Beerman, Jr. et al. Jul 2000 A
6094525 Perleman et al. Jul 2000 A
6118864 Chang et al. Sep 2000 A
6134235 Goldman et al. Oct 2000 A
6137869 Voit et al. Oct 2000 A
6144667 Doshi et al. Nov 2000 A
6147975 Bowman-Amuah Nov 2000 A
6151390 Volftsun et al. Nov 2000 A
6151629 Trewitt Nov 2000 A
6157648 Voit et al. Dec 2000 A
6161008 Lee et al. Dec 2000 A
6163536 Dunn et al. Dec 2000 A
6167042 Garland et al. Dec 2000 A
6178181 Gritho Jan 2001 B1
6188760 Oran et al. Feb 2001 B1
6195697 Bowman-Amuah Feb 2001 B1
6201858 Sundhar Mar 2001 B1
6202081 Naudus Mar 2001 B1
6215858 Bartholomew et al. Apr 2001 B1
6226289 Williams et al. May 2001 B1
6233318 Picard et al. May 2001 B1
6240391 Ball et al. May 2001 B1
6253249 Belzile Jun 2001 B1
6282270 Porter Aug 2001 B1
6292479 Bartholomew et al. Sep 2001 B1
6301609 Aravamudan et al. Oct 2001 B1
6333931 LaPier et al. Dec 2001 B1
6335927 Elliott et al. Jan 2002 B1
6335968 Malik Jan 2002 B1
6339594 Civanlar et al. Jan 2002 B1
6381316 Joyce et al. Apr 2002 B2
6411705 Oran et al. Jun 2002 B2
6453034 Donovan et al. Sep 2002 B1
6463053 Chen Oct 2002 B1
6507647 Mandalia Jan 2003 B1
6515997 Feltner et al. Feb 2003 B1
6519242 Emery et al. Feb 2003 B1
6529499 Doshi et al. Mar 2003 B1
6567399 Schuster et al. May 2003 B1
6570869 Shankar et al. May 2003 B1
6633571 Sakamoto et al. Oct 2003 B1
Foreign Referenced Citations (6)
Number Date Country
0794650 Sep 1997 EP
0123456 Jan 2000 EP
9716007 May 1997 WO
WO9722209 Jun 1997 WO
9722210 Jun 1997 WO
WO9722209 Feb 1999 WO
Related Publications (1)
Number Date Country
20020057786 A1 May 2002 US
Continuations (1)
Number Date Country
Parent 09364536 Jul 1999 US
Child 10045880 US