US20050193123A9 - Multi-user applications in multimedia networks - Google Patents
Multi-user applications in multimedia networks Download PDFInfo
- Publication number
- US20050193123A9 US20050193123A9 US10/037,487 US3748702A US2005193123A9 US 20050193123 A9 US20050193123 A9 US 20050193123A9 US 3748702 A US3748702 A US 3748702A US 2005193123 A9 US2005193123 A9 US 2005193123A9
- Authority
- US
- United States
- Prior art keywords
- client
- server
- call control
- application
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/131—Protocols for games, networked simulations or virtual reality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Definitions
- the invention relates to the field of multi-user applications in systems of networked computers, and more particular to a multi-user computer system, method and arrangement employing multimedia call control, for alleviating problems of operation and administration of multi-user or real-time application programs in systems of networked computers.
- Each multi-user application can be said to belong to one of the following two groups:
- Typical examples of applications that belong to the first group are multimedia conferencing applications and multi-player games, while multi-user white boarding and word processors with document sharing are typical examples of applications belonging to the second group.
- the users When enabling more than one user to interact with the same application, typically, the users are each provided with parts of the application, hereinafter referred to collectively as clients.
- the clients then communicate with the remaining parts of the application, hereinafter referred to collectively as the server.
- the physical location of the server can be a computer shared with one of the participating clients, which typically is the case for word processor sharing and games, or it can be a separate computer such as a dedicated server computer. Use of a separate computer is quite common when the shared application needs more resources than what is available at the location of any of the clients.
- a protocol is used for information exchange between the client and the server. Although several standard protocols exist, customised protocols that are optimised for each type of application are commonly employed. The reason for this is that each type of application has its own, specific needs. A typical shared real-time application will often make use of small data packets to increase transfer speed, while non-real time applications will often make use of larger data packets to decrease the use of communication channel bandwidth for the information exchange.
- Network games can be, as mentioned earlier, typical examples of multi-user applications with real-time requirements.
- each client runs most of the application locally. This means that the clients send only information to the server about the positions in the game and the current status of their respective players (the type of information, sent and received, is of course dependent upon the type of game).
- the server then co-ordinates and combines the information received from all clients and sends co-ordinated and combined information back to the respective clients. If only a small number of users, say, less than ten, is supported, then the server is often located with one of the clients. If, on the other hand, a large number of concurrent users are allowed, then the need for computer resources would be greater, and the server in such cases are often assigned separate hardware.
- administration is defined as:
- UDP User Datagram Protocol
- Another problem related to using one of the standard call control protocols for multi-user server communication is that the existing means for transporting information, hence not session initiation information, in current solutions are based on codecs that are optimised for voice, video or other non real-time data transfer. For transport of real-time data, these codecs are not suitable.
- One suggested solution to the problem of administration is to implement separate support for administration of each type of application.
- the major problem with this method is, firstly, that for each new supported multi-user application the administration has to implement a new set of administration mechanisms, and secondly, that the administrator has to integrate the new set of administration mechanisms with existing administration for other multi-user applications.
- HTTP Hyper-Text Transfer Protocol
- the present invention provides a system recited in the accompanying independent claim 1, a method recited in the accompanying independent claims 2, 8, 9 and 10, and an arrangement recited in the accompanying independent claim 7.
- Other advantageous features of the invention are recited in the accompanying dependent claims 3-6 and 11-14.
- the present invention proposes a solution to solve the problem of administration of different multi-user applications by means of the H.323 standard according to ITU-T Recommendation H.323, 02/98 “Packet-based multimedia communications system”, which is the standard mostly used for systems providing multi-media traffic today.
- Establishing and administrating connections between clients and their respective servers by means of H.323, according to the invention provides the advantage of allowing a system that includes application specific protocols as well as one common standard protocol, namely the H.323.
- FIG. 1 is a block diagram representation of a simplified H.323 network example, illustrating client registration and authorisation.
- FIG. 2 is a block diagram representation of a simplified H.323 network illustrating set-up of a H.323 client-to-server network call and extended functions.
- FIG. 3 is a block diagram representation of a simplified H.323 network illustrating client-server information exchange according to the invention through a firewall.
- FIG. 4 is a schematic representation of an embodiment of a user data packet structure of the invention.
- FIG. 5 is a schematic representation of an embodiment of a control data packet structure of the invention.
- FIG. 6 is a sequence diagram illustrating an example of information exchange between server and client in an exemplary embodiment of a solution according to the invention.
- FIG. 7 is a sequence diagram illustrating an example of information exchange between server and client in another exemplary embodiment of a solution according to the invention.
- the client when the client is started, it first uses a known registration process of H.323 version 2 to be registered and authorised in the network.
- the server is already registered in the H.323 network.
- the client side of the application and the server side of the application must both support the H.323 stack.
- the server must be running all the time.
- the user is authorised (authorisation is new in version 2 of H.323). This means that the operator can decide who is allowed to contact the server. Up to this point, conventions and interactions in the network are according to the known steps of the H.323 version 2.
- the gatekeeper when the client initiates a call with the gaming server as the destination, the gatekeeper will check in the users profile, which is received from a User Handling Database (UHD), to see if the users is allowed to use the gaming server, denoted by Gaming Server Info in FIG. 1 . In order to fetch this data and to perform the evaluation, new functionality is added to a normal H.323 Gatekeeper. If the user is found to be allowed to “call” the gaming server, then the gatekeeper informs the client that he is allowed to make the call set-up as is typically done according to H.323.
- UHD User Handling Database
- H.323 the client starts the data channel of H.323 towards the server.
- H.323 the procedure usually employed is to start voice and video channels.
- the H.323 protocol is extended to support a new codec. This is shown below:
- H.323 and H.323 names and terms will be employed extensively.
- a new codec that is specialised for real-time data transfer has to be developed.
- the new codec has to be identified in the ASN.1 syntax as described below:
- DataApplicationCapability :: SEQUENCE ⁇ application CHOICE ⁇ nonStandard NonStandardParameter, t120 DataProtocolCapability, dsm-cc DataProtocolCapability, userData DataProtocolCapability, t84 SEQUENCE ⁇ t84Protocol DataProtocolCapability, t84Profile T84Profile ⁇ , t434 DataProtocolCapability, h224 DataProtocolCapability, nlpid SEQUENCE ⁇ nlpidProtocol DataProtocolCapability, nlpidData OCTET STRING ⁇ , dsvdControl NULL, h222DataPart
- the new codec is designed in a simple fashion, meaning that it requires little overhead. In the following, some of the characteristics of the new codec are given:
- time-stamps and sequence numbers is not part of the codec messages, because this information typically can be obtained from the RTP header.
- FIGS. 6 and 7 generally show examples of the communication sequence between a client and a server.
- the client initiates the communication by sending a “setup” message according to the standard call control protocol which has been selected; that is, generally, H.323 or SIP.
- the server signals accept of the incoming “setup” by sending an accept message according to the selected call control protocol.
- the call control part of the client then sends a suggested media set and address, including the new codec.
- the suggested media set is accepted by the server by a message that also includes the media destination address to which the client is to send the media.
- the address is sent from the Call control towards the application part in both the server and the client, in which case it is the application on the client that sends the media using the new codec directly towards the application on the server.
- This first possibility is illustrated by the further parts of the sequence shown in FIG. 6 .
- the other possibility is that the Call control on both the server and client sends a “start” message, or a similar kind of information, indicating that communication is now established between the server and the client.
- media sent in the new codec is first transmitted from the application towards the Call control and then from the Call control on one side over to the other Call control, and then on to the application.
- This other possibility is illustrated by the further parts of the sequence shown in FIG. 6 .
- the client send a “close” message.
- closing can also be initiated by the server. The entity receiving the “close” message informs the application that the session is over, and responds to the “close” message by sending back an “accept” message.
- the sever can first send a control message including information specifying the rate at which data is to be be sent form the client to the server, and possibly also information about the data type.
- the client sends data to the server at the specified rate and of the specified type, according to the scheme specified in the control message.
- control messages can be sent at any time during a session, in order for the server to specify different data rates and data types according to the needs of the application associated with the session.
- FIGS. 6 and 7 also can be mixed or combined, in such a way that either the server party or the client party follows one of the sequences, while the other party follows the other sequence.
- H.323 networks with gatekeepers all signalling must go through the gatekeeper.
- the gatekeeper When the gatekeeper allows set-up and operation of a call, it can, according to known H.323 architecture and implementations, inform the normal charging system of that usage has started.
- a charging system can be added to a system, such as the system depicted in FIG. 1 , in a number of different ways.
- a simple and effective way of accomplishing charging is that the gatekeeper writes information related to call-setup and stop to an ASCII-file.
- a program can process this file by manual or automatic means at a later stage in time.
- a more advanced solution is to send Call Detail Records (CDR) to an external system.
- CDRs can include information about call start time, call stop time, activity, resources used, etc. The external system can then be made to automatically interpret these records and produce a cost of use (charging) to the end-user directly.
- CDR Call Detail Records
- the client when seen in conjunction with the messages describe with reference to FIGS. 4 and 5 , when establishing the data channel, the client informs the server of which protocol to use for the data communication. For a system according to invention, this is to be the new codec as described above. This means that the applications themselves can use whichever protocol they desire, as long as it maps into the new codec type.
- both the client and the server also inform each other of ports on which they want to receive data, and of which transport protocol is to be used, such as e.g. whether they use TCP (Transmission Control Protocol) or UDP (User Datagram Protocol).
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- FIG. 3 an example is shown, wherein two clients communicate with the server. They use both the H.323 protocol, which is sent via the gatekeeper, and the chosen data protocol directly. When the data channel is established, the client informs the server of which protocol to use for the data communication. This means that the applications can use any preferred protocol.
- a firewall is also shown together with a H.323 proxy. The reason for including the proxy functionality is two fold. Firstly, it is quite common to have a firewall at every enterprise and ISP to protect their respective areas. Secondly, NAT (Network Address Translation) is often used by enterprises for sharing one single IP-address, and for not giving away information about IP-address for nodes located inside the domain of the enterprise. H.323 does not include support for NAT and proxies in itself, but by using the H.323 proxy, the IPT solution alleviates the limitations of the H.323 v2 standard related to communicating with endpoints located behind firewalls.
- NAT Network Address Translation
- the H.323 Proxy contains the following functions:
- the chosen data protocol can be sent through a firewall when using a H.323 proxy.
- the procedure of authenticating H.323 end-user in H.323 systems is specified in H.323. However, it is only specified how the user name and password can be sent from an end-user to the gatekeeper. To obtain true authentication, a means for checking the username against the password must be added to the system. On way of allowing this check to be accomplished is, as illustrated in the accompanying FIGS. 1, 2 and 3 , to add a database to the gatekeeper.
- This database will at least include a record for each user containing a username and a password.
- the gatekeeper will then check if the end-user exist in the database. If the end-user exists in the database, then the gatekeeper obtains the password of the user and checks to see if it matches the password received by the end-user.
- the database and its associated logic is in this solution referred to as the User Handling.
- the data that determines if the user is to be allowed to make a call can be added to the user record stored for each user in the database described above.
- the client and the server also both inform each other of on which ports they want to receive data and of whether they are using the Transmission Control Protocol (TCP) or UDP.
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- the respective client and server use the chosen protocol that is optimised for their needs to transfer data to each other.
- the client closes the connections and informs the gatekeeper.
- the gatekeeper then informs the charging system that the usage of the server has stopped. If a client should become inoperable or a network failure should occur, then the system can also detect this because H.323 requires regular updates of the status of the “call”. A correct record of time of usage is therefore guaranteed.
- H.323 network Although only a simple H.323 network is shown in the FIGS. 1, 2 and 3 to simplify the drawings for the purpose of explaining the invention, the solution provided by the present invention will also work in large-scale H.323 networks or in networks having an architecture and/or operating according to similar call control protocols, such as for example the SIP protocol.
- the client When using H.323, the client does not need to know the IP(Internet Protocol)-address of the server, as the H.323 supports more advanced address schemes like E-164 numbers, e-mail addresses or aliases.
- ITU H.323 ITU-T Recommendation “Packet-based multimedia communications system”, 02/98, specifies signalling and transport for multimedia traffic over a packet switched network.
- a family of ASN.1 encoded protocols defining message formats, encoding standards and call state sequences of multimedia conferences on an Internet protocol infrastructure.
- ITU H.450 A suite of ASN.1 standards defining service control protocols to be used for service control in an H.323 network. The H.450 messages are being carried within H.225.0 messages.
- ITU Q.931 Telephony standard for call control that defines call control messages, encoding standards and call-state sequences.
Abstract
Description
- The invention relates to the field of multi-user applications in systems of networked computers, and more particular to a multi-user computer system, method and arrangement employing multimedia call control, for alleviating problems of operation and administration of multi-user or real-time application programs in systems of networked computers.
- In systems with networked computers, it is often desirable to allow more than one user to interact with a single application at the same time (concurrently). Such applications are often called multi-user applications. Each multi-user application can be said to belong to one of the following two groups:
- 1) Multi-user applications with real time requirements; and,
- 2) Multi-user applications without real-time requirements.
- Typical examples of applications that belong to the first group are multimedia conferencing applications and multi-player games, while multi-user white boarding and word processors with document sharing are typical examples of applications belonging to the second group.
- When enabling more than one user to interact with the same application, typically, the users are each provided with parts of the application, hereinafter referred to collectively as clients. The clients then communicate with the remaining parts of the application, hereinafter referred to collectively as the server. The physical location of the server can be a computer shared with one of the participating clients, which typically is the case for word processor sharing and games, or it can be a separate computer such as a dedicated server computer. Use of a separate computer is quite common when the shared application needs more resources than what is available at the location of any of the clients.
- A protocol is used for information exchange between the client and the server. Although several standard protocols exist, customised protocols that are optimised for each type of application are commonly employed. The reason for this is that each type of application has its own, specific needs. A typical shared real-time application will often make use of small data packets to increase transfer speed, while non-real time applications will often make use of larger data packets to decrease the use of communication channel bandwidth for the information exchange.
- Network games can be, as mentioned earlier, typical examples of multi-user applications with real-time requirements. In network games, each client runs most of the application locally. This means that the clients send only information to the server about the positions in the game and the current status of their respective players (the type of information, sent and received, is of course dependent upon the type of game). The server then co-ordinates and combines the information received from all clients and sends co-ordinated and combined information back to the respective clients. If only a small number of users, say, less than ten, is supported, then the server is often located with one of the clients. If, on the other hand, a large number of concurrent users are allowed, then the need for computer resources would be greater, and the server in such cases are often assigned separate hardware.
- When, in a networked system, each such multi-user application is using its own protocol, this represents a significant problem to the administrator of these protocols, as it is difficult, and sometimes even impossible, for the administrator to perform common administration of the supported multi-user applications. In this context, administration is defined as:
-
- Methods for access control of who is allowed to communicate with the server
- Trace logs of usage
- Fault handling
- Administration of addresses and users
- All the needed logic to perform user billing of usage of the server
- Other types of administration
- Yet another problem encountered in such situations is to enable the different multi-user application protocols to pass through a firewall. This is especially difficult with multi-user applications with real-time requirements, because such applications often use the User Datagram Protocol (UDP) as a transport protocol. Due to the connectionless nature of UDP, it is difficult to allow UDP based traffic to pass through a firewall and at the same time obtain good protection by the firewall.
- Another problem related to using one of the standard call control protocols for multi-user server communication is that the existing means for transporting information, hence not session initiation information, in current solutions are based on codecs that are optimised for voice, video or other non real-time data transfer. For transport of real-time data, these codecs are not suitable.
- Furthermore, it would be beneficial if all multi-user applications that operate in one domain could use the same communication protocol. If they all make use of the same communication protocol, administration problems (e.g. access control, trace logs, etc.) and communication problems (e.g. enable communication through a firewall) could be solved for the common protocol, and hence be used by all multi-user application servers.
- One suggested solution to the problem of administration is to implement separate support for administration of each type of application. The major problem with this method is, firstly, that for each new supported multi-user application the administration has to implement a new set of administration mechanisms, and secondly, that the administrator has to integrate the new set of administration mechanisms with existing administration for other multi-user applications.
- Another suggested solution to the same problem is to support only multi-user applications that use a standardised protocol such as for example the Hyper-Text Transfer Protocol (HTTP). This, however, leads to other problems, as use of a single protocol will make it very difficult to make multi-user applications work in the network because of their different nature and their different resource requirements.
- It is, therefore, an object of the invention to provide a solution to the problems outlined above, and which overcome the problems of the known solutions.
- The present invention provides a system recited in the accompanying independent claim 1, a method recited in the accompanying independent claims 2, 8, 9 and 10, and an arrangement recited in the accompanying independent claim 7. Other advantageous features of the invention are recited in the accompanying dependent claims 3-6 and 11-14.
- The present invention proposes a solution to solve the problem of administration of different multi-user applications by means of the H.323 standard according to ITU-T Recommendation H.323, 02/98 “Packet-based multimedia communications system”, which is the standard mostly used for systems providing multi-media traffic today. Establishing and administrating connections between clients and their respective servers by means of H.323, according to the invention, provides the advantage of allowing a system that includes application specific protocols as well as one common standard protocol, namely the H.323.
-
FIG. 1 is a block diagram representation of a simplified H.323 network example, illustrating client registration and authorisation. -
FIG. 2 is a block diagram representation of a simplified H.323 network illustrating set-up of a H.323 client-to-server network call and extended functions. -
FIG. 3 is a block diagram representation of a simplified H.323 network illustrating client-server information exchange according to the invention through a firewall. -
FIG. 4 is a schematic representation of an embodiment of a user data packet structure of the invention. -
FIG. 5 is a schematic representation of an embodiment of a control data packet structure of the invention. -
FIG. 6 is a sequence diagram illustrating an example of information exchange between server and client in an exemplary embodiment of a solution according to the invention. -
FIG. 7 is a sequence diagram illustrating an example of information exchange between server and client in another exemplary embodiment of a solution according to the invention. - In the following, the present invention will be described by way of example and with reference to the accompanying drawings.
- Referring to
FIG. 1 , when the client is started, it first uses a known registration process of H.323 version 2 to be registered and authorised in the network. It should also be noted that, in the situation illustrated inFIG. 1 , the server is already registered in the H.323 network. When using H.323, the client side of the application and the server side of the application must both support the H.323 stack. Further, to have full service, the server must be running all the time. Through the registration process, the user is authorised (authorisation is new in version 2 of H.323). This means that the operator can decide who is allowed to contact the server. Up to this point, conventions and interactions in the network are according to the known steps of the H.323 version 2. - Now, referring to
FIG. 2 , when the client initiates a call with the gaming server as the destination, the gatekeeper will check in the users profile, which is received from a User Handling Database (UHD), to see if the users is allowed to use the gaming server, denoted by Gaming Server Info inFIG. 1 . In order to fetch this data and to perform the evaluation, new functionality is added to a normal H.323 Gatekeeper. If the user is found to be allowed to “call” the gaming server, then the gatekeeper informs the client that he is allowed to make the call set-up as is typically done according to H.323. - Then the client starts the data channel of H.323 towards the server. This is allowed according to H.323, although it is not usually done this way as the procedure usually employed is to start voice and video channels. According to invention, the H.323 protocol is extended to support a new codec. This is shown below:
- For the purpose of simplifying the explanation of the solution of the invention by way of example, in the following, H.323 and H.323 names and terms will be employed extensively. A new codec that is specialised for real-time data transfer has to be developed. In H.323 the new codec has to be identified in the ASN.1 syntax as described below:
DataApplicationCapability ::=SEQUENCE { application CHOICE { nonStandard NonStandardParameter, t120 DataProtocolCapability, dsm-cc DataProtocolCapability, userData DataProtocolCapability, t84 SEQUENCE { t84Protocol DataProtocolCapability, t84Profile T84Profile }, t434 DataProtocolCapability, h224 DataProtocolCapability, nlpid SEQUENCE { nlpidProtocol DataProtocolCapability, nlpidData OCTET STRING }, dsvdControl NULL, h222DataPartitioning DataProtocolCapability, ..., t30fax DataProtocolCapability, t140 DataProtocolCapability A new codec type DataProtocolCapability }, maxBitRate INTEGER (0..4294967295), -- units 100 bit/s ... } - This basis for the ASN.1 code shown above is described in ITU-T Recommendation H.245, 02/98 “Control protocol for multimedia communication”. The code above, being an amended code applicable to solutions according to H.245, shows how the Data Application field of the H.245 protocol is extended to accommodate the invention. In system operating according to the invention, such adaptation of H.245 is included in all clients, servers, and gatekeepers that has registered gaming servers to them (if the gatekeeper is routing h.245). In this context, the particular name of the new codec is not relevant, just that it is a new one. Any requirements for more than one new codec in a particular system will depend on the requirements defined for the communication between the client and the different types of gaming servers. What is important, though, is that a game server and all of its connected clients must provide support for the same codec type.
- The new codec is designed in a simple fashion, meaning that it requires little overhead. In the following, some of the characteristics of the new codec are given:
-
- The codec uses RTP (Real-time transport Protocol) over UDP (User Datagram Protocol) to obtain real-time transport
- The codec includes mainly to types of messages: a) a data message, and b) a control message.
- The data message can be sent from the client or from the server. The control message is only sent from the server.
- Referring to
FIG. 4 , an example of a data packet of the new codec will now be explained: -
- In the Type field is an identifier defining the type of message is (e.g. 1=data message, 2=control message); which in this case is a data message.
- In the Protocol field is an identifier defining how the data in the rest of the message shall be interpreted. Note that there has to be a common understanding of the data format among client and server.
- In the Data field is included the data that is sent from the client or from the server
- Referring now to
FIG. 5 , an example of a control packet of the new codec will be explained: -
- In the Type field is an identifier defining the type of message is (e.g. 1=data message, 2=control message); which in this case is a control message.
- In the Protocol field is an identifier defining how the Control information in the rest of the message shall be interpreted. Note that there has to be a common understanding of the control format among client and server.
- In the Data field is included the control information that is sent from the server towards the clients. Examples of control information are how often data messages shall be sent from the client towards the server, and how often the server will send data messages towards the client.
- Note that time-stamps and sequence numbers is not part of the codec messages, because this information typically can be obtained from the RTP header.
- Now, with reference to the accompanying
FIGS. 6 and 7 , and by way of example, information exchange in a client-server configuration in an embodiment of the invention will be explained. The referencedFIGS. 6 and 7 generally show examples of the communication sequence between a client and a server. In the sequence examples shown, there are some common steps. The client initiates the communication by sending a “setup” message according to the standard call control protocol which has been selected; that is, generally, H.323 or SIP. Then the server signals accept of the incoming “setup” by sending an accept message according to the selected call control protocol. The call control part of the client then sends a suggested media set and address, including the new codec. Further, as shown in the examples, the suggested media set is accepted by the server by a message that also includes the media destination address to which the client is to send the media. At this point in the sequence, two different possibilities are available. One possibility is that the address is sent from the Call control towards the application part in both the server and the client, in which case it is the application on the client that sends the media using the new codec directly towards the application on the server. This first possibility is illustrated by the further parts of the sequence shown inFIG. 6 . The other possibility is that the Call control on both the server and client sends a “start” message, or a similar kind of information, indicating that communication is now established between the server and the client. In this latter case, media sent in the new codec is first transmitted from the application towards the Call control and then from the Call control on one side over to the other Call control, and then on to the application. This other possibility is illustrated by the further parts of the sequence shown inFIG. 6 . At the termination of a session, the client send a “close” message. However, closing can also be initiated by the server. The entity receiving the “close” message informs the application that the session is over, and responds to the “close” message by sending back an “accept” message. - Now, with reference to
FIGS. 4, 5 , 6 and 7, the message types and their use will be explained by way of example. In accordance with a sequence as described above, the sever can first send a control message including information specifying the rate at which data is to be be sent form the client to the server, and possibly also information about the data type. In turn, the client sends data to the server at the specified rate and of the specified type, according to the scheme specified in the control message. Such control messages can be sent at any time during a session, in order for the server to specify different data rates and data types according to the needs of the application associated with the session. - With reference to the sequences explained above, it should be noted that the different possibilities illustrated by
FIGS. 6 and 7 also can be mixed or combined, in such a way that either the server party or the client party follows one of the sequences, while the other party follows the other sequence. - In H.323 networks with gatekeepers, all signalling must go through the gatekeeper. When the gatekeeper allows set-up and operation of a call, it can, according to known H.323 architecture and implementations, inform the normal charging system of that usage has started. A charging system can be added to a system, such as the system depicted in
FIG. 1 , in a number of different ways. A simple and effective way of accomplishing charging, is that the gatekeeper writes information related to call-setup and stop to an ASCII-file. A program can process this file by manual or automatic means at a later stage in time. A more advanced solution is to send Call Detail Records (CDR) to an external system. CDRs can include information about call start time, call stop time, activity, resources used, etc. The external system can then be made to automatically interpret these records and produce a cost of use (charging) to the end-user directly. - Further, as illustrated in
FIGS. 6 and 7 , when seen in conjunction with the messages describe with reference toFIGS. 4 and 5 , when establishing the data channel, the client informs the server of which protocol to use for the data communication. For a system according to invention, this is to be the new codec as described above. This means that the applications themselves can use whichever protocol they desire, as long as it maps into the new codec type. During the H.323 set-up phase, both the client and the server also inform each other of ports on which they want to receive data, and of which transport protocol is to be used, such as e.g. whether they use TCP (Transmission Control Protocol) or UDP (User Datagram Protocol). This information can further be used by a H.323 Proxy to enable the chosen data protocol to be transferred through a firewall, as illustrated inFIG. 3 . If an H.323 proxy is used, it also will be updated with the enhanced H.323 protocol. - Referring to
FIG. 3 , an example is shown, wherein two clients communicate with the server. They use both the H.323 protocol, which is sent via the gatekeeper, and the chosen data protocol directly. When the data channel is established, the client informs the server of which protocol to use for the data communication. This means that the applications can use any preferred protocol. InFIG. 3 a firewall is also shown together with a H.323 proxy. The reason for including the proxy functionality is two fold. Firstly, it is quite common to have a firewall at every enterprise and ISP to protect their respective areas. Secondly, NAT (Network Address Translation) is often used by enterprises for sharing one single IP-address, and for not giving away information about IP-address for nodes located inside the domain of the enterprise. H.323 does not include support for NAT and proxies in itself, but by using the H.323 proxy, the IPT solution alleviates the limitations of the H.323 v2 standard related to communicating with endpoints located behind firewalls. - In accordance with the above, the H.323 Proxy contains the following functions:
-
- The H.323 proxies the RAS signalling (registration and admission), and replaces the internal IP addresses of the enterprise in the RAS messages with public IP addresses (NAT-Network Address Translation).
- The H.323 proxies the Q.931 signalling (call set-up), and replaces the enterprise internal IP addresses in the Q.931 message with public IP addresses.
- The H.323 proxies the H.245 signalling (media channel set-up), and replaces the enterprise internal IP address in the H.245 messages with public IP addresses. If the endpoint uses H.245 in a separate channel the H.323 proxy transforms this to a tunnelled H.245 since the IPT system always uses tunnelled H.245.
- The H.323 proxy controls the media streams that are set-up as a result of the H.245 signalling, and proxies the media streams (media stream NAT).
- From the example described above, and as illustrated by
FIG. 3 , it should be noted that the chosen data protocol can be sent through a firewall when using a H.323 proxy. - The procedure of authenticating H.323 end-user in H.323 systems is specified in H.323. However, it is only specified how the user name and password can be sent from an end-user to the gatekeeper. To obtain true authentication, a means for checking the username against the password must be added to the system. On way of allowing this check to be accomplished is, as illustrated in the accompanying
FIGS. 1, 2 and 3, to add a database to the gatekeeper. This database will at least include a record for each user containing a username and a password. The gatekeeper will then check if the end-user exist in the database. If the end-user exists in the database, then the gatekeeper obtains the password of the user and checks to see if it matches the password received by the end-user. The database and its associated logic is in this solution referred to as the User Handling. The data that determines if the user is to be allowed to make a call can be added to the user record stored for each user in the database described above. - During the H.323 set-up phase, the client and the server also both inform each other of on which ports they want to receive data and of whether they are using the Transmission Control Protocol (TCP) or UDP. This information can be used by a H.323 Proxy to enable the chosen data protocol to be transferred through a firewall.
- When the set-up phase is over, the respective client and server use the chosen protocol that is optimised for their needs to transfer data to each other.
- When the session is over, the client closes the connections and informs the gatekeeper. The gatekeeper then informs the charging system that the usage of the server has stopped. If a client should become inoperable or a network failure should occur, then the system can also detect this because H.323 requires regular updates of the status of the “call”. A correct record of time of usage is therefore guaranteed.
- Although only a simple H.323 network is shown in the
FIGS. 1, 2 and 3 to simplify the drawings for the purpose of explaining the invention, the solution provided by the present invention will also work in large-scale H.323 networks or in networks having an architecture and/or operating according to similar call control protocols, such as for example the SIP protocol. - By using H.323, the applications can easily be integrated with voice and video if they do not already have this support. This will give some application a new dimension without the need for making large changes the application required otherwise.
- When using H.323, the client does not need to know the IP(Internet Protocol)-address of the server, as the H.323 supports more advanced address schemes like E-164 numbers, e-mail addresses or aliases.
-
ANSI American National Standardisation Institute API Application Programming Interface ASCII American Standard Code for Information Interchange ASN. 1 Abstract Syntax Notation Number 1 (a formal data structure definition language) Codec Coder/Decoder E-164 A standard numbering scheme ETSI European Telecommunication Standards Institute GK Gatekeeper HTTP Hyper Text Transport Protocol IP Internet Protocol IPT Internet Telephony ISDN Integrated Services Digital Network ISP Internat Service Provider ITU H.225.0 A subset of the H.323 standards suite being based on Q.931 and defining call control messages, encoding standards and call-state sequences. ITU H.245 ITU-T Recommendation, “Control protocol for multimedia communication”, 02/98. ITU H.323 ITU-T Recommendation, “Packet-based multimedia communications system”, 02/98, specifies signalling and transport for multimedia traffic over a packet switched network. (A family of ASN.1 encoded protocols defining message formats, encoding standards and call state sequences of multimedia conferences on an Internet protocol infrastructure.) ITU H.450 A suite of ASN.1 standards defining service control protocols to be used for service control in an H.323 network. The H.450 messages are being carried within H.225.0 messages. ITU Q.931 Telephony standard for call control that defines call control messages, encoding standards and call-state sequences. ITU-T International Telecommunication Union - Telecommunications sector NAT Network Address Translation RAS Registration, Admission and Status RTP Real Time Protocol SIP “SIP, Session Initiation Protocol”, Internet Engineering Task Force, RFC 2543, March 1999, (Handley, M., Schulzrinne, H., Schooler B., Rosenberg J) TCP Transmission Control Protocol UDP User Datagram Protocol
Claims (14)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NO20010069A NO20010069L (en) | 2001-01-05 | 2001-01-05 | Multi-user applications in multimedia networks |
NO20010069 | 2001-01-05 |
Publications (3)
Publication Number | Publication Date |
---|---|
US20020156903A1 US20020156903A1 (en) | 2002-10-24 |
US20050193123A9 true US20050193123A9 (en) | 2005-09-01 |
US7231420B2 US7231420B2 (en) | 2007-06-12 |
Family
ID=19911978
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/037,487 Expired - Lifetime US7231420B2 (en) | 2001-01-05 | 2002-01-04 | Multi-user applications in multimedia networks |
Country Status (6)
Country | Link |
---|---|
US (1) | US7231420B2 (en) |
EP (1) | EP1354460B1 (en) |
AT (1) | ATE341888T1 (en) |
DE (1) | DE60215117T2 (en) |
NO (1) | NO20010069L (en) |
WO (1) | WO2002054706A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030154244A1 (en) * | 2002-02-13 | 2003-08-14 | Zellers Mark H. | Method and system to provide flexible HTTP tunnelling |
US20040097188A1 (en) * | 2002-11-19 | 2004-05-20 | Murata Kikai Kabushiki Kaisha | Communication terminal device, communication method and electronic mail server |
US20040114575A1 (en) * | 2002-12-17 | 2004-06-17 | Junichi Morita | Exchange system |
US20040133772A1 (en) * | 2003-01-07 | 2004-07-08 | Battelle Memorial Institute | Firewall apparatus and method for voice over internet protocol |
US20040258238A1 (en) * | 2003-06-05 | 2004-12-23 | Johnny Wong | Apparatus and method for developing applications with telephony functionality |
US20060235939A1 (en) * | 2005-04-18 | 2006-10-19 | Wai Yim | Apparatus and methods for tunneling a media streaming application through a firewall |
US20070014292A1 (en) * | 2005-07-14 | 2007-01-18 | Hitoshi Obata | Protocol optimization for wireless networks |
Families Citing this family (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7076529B2 (en) * | 2001-09-27 | 2006-07-11 | Bellsouth Intellectual Property Corporation | Systems and methods for notification of electronic mail receipt in a shared computer environment via advanced intelligent network systems |
US7808924B2 (en) * | 2002-05-24 | 2010-10-05 | Cisco Technology, Inc. | Apparatus and method for preventing disruption of fibre channel fabrics caused by ReConfigure Fabric (RCF) messages |
US7418492B1 (en) * | 2002-06-20 | 2008-08-26 | P-Cube Ltd. | System and a method for testing network communication devices |
US20040028080A1 (en) * | 2002-08-06 | 2004-02-12 | Harish Samarasinghe | Method of defining a SIP message body for communications between core network elements |
US7254643B1 (en) | 2002-08-08 | 2007-08-07 | At&T Corp. | System and method for providing multi-media services to communication devices over a communications network |
US7255645B2 (en) * | 2002-08-21 | 2007-08-14 | Progressive Gaming International Corporation | Equalizing different jackpot games with frequent pays |
US7185098B2 (en) * | 2002-09-30 | 2007-02-27 | Microsoft Corporation | Conferencing using flexible connection ports |
US7369567B2 (en) * | 2002-12-31 | 2008-05-06 | Motorola, Inc. | Methods for affiliating endpoints with a group and determining common communication capabilities for the affiliated endpoints |
US7023813B2 (en) | 2002-12-31 | 2006-04-04 | Motorola, Inc. | Methods for managing a pool of multicast addresses and allocating addresses in a communications system |
US6798755B2 (en) * | 2002-12-31 | 2004-09-28 | Motorola, Inc. | Apparatus and method for controlling and managing individual directed sessions in a communications system |
US7894377B2 (en) | 2002-12-31 | 2011-02-22 | Motorola Solutions, Inc. | Method and system for group communications |
US7366780B2 (en) * | 2002-12-31 | 2008-04-29 | Motorola, Inc. | System and method for controlling and managing sessions between endpoints in a communications system |
US7180912B1 (en) | 2003-01-06 | 2007-02-20 | At&T Corp. | System and method for providing a plurality of multi-media services using a number of media servers to form a preliminary interactive communication relationship with a calling communication device |
ATE389291T1 (en) * | 2003-01-09 | 2008-03-15 | Ericsson Telefon Ab L M | METHOD AND DEVICE FOR CODEC SELECTION |
US7508923B1 (en) * | 2003-02-27 | 2009-03-24 | At&T Corp. | Call control element constructing a session initiation protocol (SIP) message including provisions for incorporating address related information of public switched telephone network (PSTN) based devices |
KR100924162B1 (en) | 2003-04-25 | 2009-10-28 | 엘지전자 주식회사 | Control Method of Media Channel at SIP Server and The Communication System with Said Method |
KR100926230B1 (en) | 2003-06-30 | 2009-11-09 | 주식회사 케이티 | Data communicating method using Proxy server in an IP network |
US7886348B2 (en) | 2003-10-03 | 2011-02-08 | Verizon Services Corp. | Security management system for monitoring firewall operation |
US7406533B2 (en) | 2003-10-08 | 2008-07-29 | Seiko Epson Corporation | Method and apparatus for tunneling data through a single port |
US7263071B2 (en) * | 2003-10-08 | 2007-08-28 | Seiko Epson Corporation | Connectionless TCP/IP data exchange |
US7574736B2 (en) * | 2004-03-03 | 2009-08-11 | Microsoft Corporation | System and method for efficiently transferring media across firewalls |
CN100484016C (en) * | 2004-06-23 | 2009-04-29 | 华为技术有限公司 | Multi-media network security system and method thereof |
US8396973B2 (en) * | 2004-10-22 | 2013-03-12 | Microsoft Corporation | Distributed speech service |
US7392323B2 (en) * | 2004-11-16 | 2008-06-24 | Seiko Epson Corporation | Method and apparatus for tunneling data using a single simulated stateful TCP connection |
US20060200517A1 (en) * | 2005-03-03 | 2006-09-07 | Steve Nelson | Method and apparatus for real time multi-party conference document copier |
AU2010201379B2 (en) * | 2010-04-07 | 2012-02-23 | Limelight Networks, Inc. | System and method for delivery of content objects |
US7768998B1 (en) | 2005-06-13 | 2010-08-03 | Sprint Spectrum L.P. | Dynamic VoIP codec selection based on link attributes at call setup |
US8588210B2 (en) * | 2005-07-22 | 2013-11-19 | Motorola Solutions, Inc. | Method and apparatus for floor control in a communication system |
US8027251B2 (en) * | 2005-11-08 | 2011-09-27 | Verizon Services Corp. | Systems and methods for implementing protocol-aware network firewall |
US9374342B2 (en) | 2005-11-08 | 2016-06-21 | Verizon Patent And Licensing Inc. | System and method for testing network firewall using fine granularity measurements |
US20070136441A1 (en) * | 2005-12-08 | 2007-06-14 | Su-Yuan Chang | Multimedia user interaction over IP network |
US20070285501A1 (en) * | 2006-06-09 | 2007-12-13 | Wai Yim | Videoconference System Clustering |
US20080075096A1 (en) * | 2006-09-22 | 2008-03-27 | Enthenergy, Llc | Remote access to secure network devices |
US8966619B2 (en) * | 2006-11-08 | 2015-02-24 | Verizon Patent And Licensing Inc. | Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using return routability check filtering |
US9473529B2 (en) | 2006-11-08 | 2016-10-18 | Verizon Patent And Licensing Inc. | Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using method vulnerability filtering |
US8302186B2 (en) | 2007-06-29 | 2012-10-30 | Verizon Patent And Licensing Inc. | System and method for testing network firewall for denial-of-service (DOS) detection and prevention in signaling channel |
JP5169362B2 (en) * | 2008-03-24 | 2013-03-27 | 富士通株式会社 | Session information replication method, call control server for executing the method, and program for the method |
US8887249B1 (en) * | 2008-05-28 | 2014-11-11 | Zscaler, Inc. | Protecting against denial of service attacks using guard tables |
US10038760B2 (en) | 2009-06-01 | 2018-07-31 | International Business Machines Corporation | System and method to support codec delivery models for IMS networks |
US8244874B1 (en) | 2011-09-26 | 2012-08-14 | Limelight Networks, Inc. | Edge-based resource spin-up for cloud computing |
JP6157223B2 (en) * | 2012-05-31 | 2017-07-05 | 韓國電子通信研究院Electronics and Telecommunications Research Institute | Online game packet generation method and apparatus for detecting effective unauthorized users |
KR102381377B1 (en) * | 2015-10-07 | 2022-03-31 | 삼성전자주식회사 | Method and apparatus for providing a profile remotely in a communication system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020075880A1 (en) * | 2000-12-20 | 2002-06-20 | Larry Dolinar | Method and apparatus for monitoring calls over a session initiation protocol network |
US6502131B1 (en) * | 1997-05-27 | 2002-12-31 | Novell, Inc. | Directory enabled policy management tool for intelligent traffic management |
US6732177B1 (en) * | 1999-09-16 | 2004-05-04 | At&T Corp. | Intelligent signaling scheme for computer-readable medium for H.323 mobility architecture |
US6775255B1 (en) * | 1999-09-16 | 2004-08-10 | At&T Corp. | H.323 mobility architecture for terminal, user and service mobility |
US6829243B1 (en) * | 1999-05-26 | 2004-12-07 | Nortel Networks Limited | Directory assistance for IP telephone subscribers |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5224098A (en) * | 1991-07-17 | 1993-06-29 | International Business Machines Corporation | Compensation for mismatched transport protocols in a data communications network |
EP0967764A3 (en) * | 1998-06-25 | 2002-05-15 | Siemens Information and Communication Networks, Inc. | Improved apparatus and methods to realize H.323 proxy services |
US6625141B1 (en) * | 1999-06-18 | 2003-09-23 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for providing value-added services (VAS) in an integrated telecommunications network using session initiation protocol (SIP) |
-
2001
- 2001-01-05 NO NO20010069A patent/NO20010069L/en not_active Application Discontinuation
-
2002
- 2002-01-04 AT AT02727023T patent/ATE341888T1/en not_active IP Right Cessation
- 2002-01-04 EP EP02727023A patent/EP1354460B1/en not_active Expired - Lifetime
- 2002-01-04 DE DE60215117T patent/DE60215117T2/en not_active Expired - Lifetime
- 2002-01-04 US US10/037,487 patent/US7231420B2/en not_active Expired - Lifetime
- 2002-01-04 WO PCT/NO2002/000003 patent/WO2002054706A1/en active IP Right Grant
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6502131B1 (en) * | 1997-05-27 | 2002-12-31 | Novell, Inc. | Directory enabled policy management tool for intelligent traffic management |
US6829243B1 (en) * | 1999-05-26 | 2004-12-07 | Nortel Networks Limited | Directory assistance for IP telephone subscribers |
US6732177B1 (en) * | 1999-09-16 | 2004-05-04 | At&T Corp. | Intelligent signaling scheme for computer-readable medium for H.323 mobility architecture |
US6775255B1 (en) * | 1999-09-16 | 2004-08-10 | At&T Corp. | H.323 mobility architecture for terminal, user and service mobility |
US20020075880A1 (en) * | 2000-12-20 | 2002-06-20 | Larry Dolinar | Method and apparatus for monitoring calls over a session initiation protocol network |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030154244A1 (en) * | 2002-02-13 | 2003-08-14 | Zellers Mark H. | Method and system to provide flexible HTTP tunnelling |
US20040097188A1 (en) * | 2002-11-19 | 2004-05-20 | Murata Kikai Kabushiki Kaisha | Communication terminal device, communication method and electronic mail server |
US20080200115A1 (en) * | 2002-11-19 | 2008-08-21 | Murata Kikai Kabushiki Kaisha | Communication terminal device, communication method and electronic mail server |
US7480287B2 (en) * | 2002-11-19 | 2009-01-20 | Murata Kikai Kabushiki Kaisha | Communication terminal device, communication method and electronic mail server |
US7948970B2 (en) * | 2002-11-19 | 2011-05-24 | Murata Kikai Kabushiki Kaisha | Communication terminal device, communication method and electronic mail server |
US20040114575A1 (en) * | 2002-12-17 | 2004-06-17 | Junichi Morita | Exchange system |
US20040133772A1 (en) * | 2003-01-07 | 2004-07-08 | Battelle Memorial Institute | Firewall apparatus and method for voice over internet protocol |
US20040258238A1 (en) * | 2003-06-05 | 2004-12-23 | Johnny Wong | Apparatus and method for developing applications with telephony functionality |
US7330899B2 (en) * | 2003-06-05 | 2008-02-12 | Oracle International Corporation | Apparatus and method for developing applications with telephony functionality |
US20060235939A1 (en) * | 2005-04-18 | 2006-10-19 | Wai Yim | Apparatus and methods for tunneling a media streaming application through a firewall |
US20070014292A1 (en) * | 2005-07-14 | 2007-01-18 | Hitoshi Obata | Protocol optimization for wireless networks |
US7640297B2 (en) * | 2005-07-14 | 2009-12-29 | Gemini Mobile Technologies, Inc. | Protocol optimization for wireless networks |
Also Published As
Publication number | Publication date |
---|---|
EP1354460A1 (en) | 2003-10-22 |
WO2002054706A1 (en) | 2002-07-11 |
ATE341888T1 (en) | 2006-10-15 |
DE60215117T2 (en) | 2007-03-08 |
NO20010069D0 (en) | 2001-01-05 |
US7231420B2 (en) | 2007-06-12 |
DE60215117D1 (en) | 2006-11-16 |
EP1354460B1 (en) | 2006-10-04 |
US20020156903A1 (en) | 2002-10-24 |
NO20010069L (en) | 2002-07-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1354460B1 (en) | Multi-user applications in multimedia networks | |
US9871829B2 (en) | Voice over IP (VoIP) network infrastructure components and method | |
US7496107B1 (en) | Mechanism for implementing voice over IP telephony behind network firewalls | |
US7058714B2 (en) | Special gateway for multimedia networks | |
US7330470B2 (en) | Router and sip server | |
US20070291734A1 (en) | Methods and Apparatus for Multistage Routing of Packets Using Call Templates | |
US20020120760A1 (en) | Communications protocol | |
US8437254B2 (en) | Dynamic configuration of VoIP trunks | |
US7408926B1 (en) | Method and apparatus for accessing voice over internet protocol connection | |
US6904041B1 (en) | System and method for communication domains and subdomains in zones of real time communication systems | |
Cumming | Sip Market Overview | |
Burger | A new interprovider interconnect technology for multimedia networks | |
Peräläinen | Overall picture of IP telephony | |
Ott et al. | ESA Project Report |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), SWEDEN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BACH CORNELIUSSEN, KNUT SNORRE;REEL/FRAME:012743/0919 Effective date: 20020103 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |