Broadband communication system

 

(57) Abstract:

The invention relates to ATM systems, which use cross-BAR linkage to provide virtual connections. The technical result of this system is to provide a virtual connection through the ATM multiplexer that provides Internet sharing mode from call to call. This is achieved by the fact that the processor alarm accept alarm to call and selects a virtual connection for the call. The processor generates a new alarm the alarm, which identifies the selection and transfer of new signaling to the ATM multiplexer that provides firewall currency, which has made the connection access for the call. The multiplexer converts the user information from the connection access in ATM data elements for transmission over the virtual connection in accordance with the new alarm. 8 C. and 53 C.p. f-crystals, 1 tab., 12 Il.

Prior

Currently, the technology is asynchronous transfer mode (ATM Asynchronous Transfer Mode) is designed to provide functionality broadband switching. Some ATM systems use ATM cross-connection to ensure VIR is possible alarms are messages, used telecommunication networks to establish or disconnect calls. Thus, the ATM cross-connection does not provide connectivity on the basis of "from call to call." As a result, a connection through a system of cross-connections shall be provided in advance. They provide a relatively hard switching structure. Due to this limitation, the ATM cross-connection is mainly used for specialized compounds, such as long-term virtual circuit (DVC) and long-term virtual routes (DBL). But they do not provide ATM switching mode from call to call, as required to provide switched virtual circuits (ECC) or switched virtual paths (CME). Specialists in the art are well aware of the advantages provided by the use of ECC and KVM compared to DVC and DBL.

ATM switches were used to provide DWC and DBL. Because DVC and DBL is not installed mode from call to call, the ATM switch is forced to use their funds call or alarm. ATM switches require the use of funds as signalizaciyi mode from call to call, developed ATM switches that can handle the call in response to the alarm system to provide virtual connections for each call. Such systems create problems because they must be very difficult to maintain today's networks. Such ATM switches must handle large volumes of calls and services in transitional regimes inherited from the existing networks. An example would be an ATM switch that can handle large number of calls to traditional phone systems, such as POTS, 800 and VPN. This generation is complicated ATM switches have not yet reached a high level and is associated with high costs.

Currently being developed ATM multiplexers that can convert traffic in the ATM elements and multiplexing these items for transporting them to the ATM network. An example of the application of these multiplexers is providing transportation to the T1 format in the ATM connection. Traffic leaving the switch in the T1 format is multiplexed with conversion elements for ATM transport over high-speed connection. Before these items made another switch, they are converted back to T1. Such obrazovania virtual connections from call to call. Unfortunately, it is not known telecommunication system, which could provide ATM switching mode from call to call, not based on the mass of call processing and signaling ATM switch.

The invention

The invention relates to a method of communications, ensuring implementation of the call with the virtual connection. The method is intended for use when a user places a call, sending a message of alarm call in the communication system and transmitting user information in a communication system for a specific connection. The system contains ATM multiplexer that provides firewall currency, and the processor signaling associated with the ATM multiplexer that provides firewall currency. The method includes receiving notification of the call processor signaling, the signaling to select a virtual connection, the generation of a new system to identify a particular connection and the selected virtual connection and then transfer the new alarm to the ATM multiplexer that provides firewall currency. The method also includes receiving user information for the call from a specific connection in the ATM multiplexer, to provide the selected virtual connection in response to new alarms, and the transmission of ATM elements on the selected virtual connection. Alarm call can be a message call setup, for example, the message source address Signaling System #7 (SS7). The method may also include the use of digital signal processing of the call in the multiplexer in accordance with the requirements of digital signal processing, by the selected processor alarm. Requirements of digital signal processing may include control of the echo signals or encryption.

The invention also relates to a communication system for providing call with the virtual connection in response to the alarm call. The system contains a processor alarm, intended for receiving and processing the signaling to select a virtual connection for the call and for generating and transmitting a new alarm that identifies the selected virtual connection. The system includes an ATM multiplexer, providing firewall currency, for receiving user information from the connection, the conversion of user information into ATM elements that identify the selected virtual connection and transmission of ATM elements on the selected virtual seehim firewall currency, and configured to provide multiple virtual connections ATM multiplexer that provides firewall currency.

The invention also relates to an ATM multiplexer, providing firewall currency, to ensure that calls with a virtual connection in response to the alarm for each call. The multiplexer includes an interface for receiving user information for each call from a particular connection. It also contains a control interface for receiving signaling for each call that identifies a particular connection and a virtual connection for this call. It also contains ATM processor adapted to convert the user data from a particular connection for each call in ATM elements that identify a virtual connection for this call. The multiplexer also contains ATM interface for ATM transfer elements for each call for applications of digital signal processing user information for each call. The processing may include control of the echo signals and encryption.

In various embodiments, implementation of the invention provides for receiving calls placed posredstvennye connections can be provided for narrowband traffic mode from call to call, but without processing the call signaling to the ATM switch.

Brief description of drawings

Fig. 1 is a block diagram of a variant of implementation of the present invention.

Fig. 2 is a block diagram of a variant of implementation of the present invention.

Fig. 3 is a block diagram of a variant of implementation of the present invention.

Fig. 4 is a block diagram of a variant of implementation of the present invention.

Fig. 5 is a block diagram of a variant of implementation of the present invention.

Fig. 6 is a logical diagram of a variant embodiment of the invention.

Fig. 7 is a logical diagram of a variant embodiment of the invention.

Fig. 8 is a logical diagram of a variant embodiment of the invention.

Fig. 9 is a logical diagram of a variant embodiment of the invention.

Fig. 10 is a block diagram of a sequence of operations corresponding to the variant embodiment of the invention.

Fig. 11 is a block diagram of a sequence of operations corresponding to the variant embodiment of the invention.

Fig. 12 is a block diagram of a sequence of operations corresponding to the variant embodiment of the invention.

Detailed description

In Fig. 1 shows a variant implementation of the present invention. The following diagram shows a communication system 100, the user 110 and user 120. Communication system 100 includes an ATM multiplexer 130, which provides firewall, exchange, multiplexer 140, which provides firewall, exchange, ATM cross-connection 150, the processing system alarm 160. The user 110 is connected to the multiplexer 130 via connection 180. The multiplexers 130 and 140 are connected through a system of cross-connection 150 connection 181. The multiplexer 140 is connected to the user 120 connection 182. The processing system alarm 160 associated with the user 110 line 190, multiplexer 130 line 191, multiplexer 140 line 192, the user 120 line 193.

Specialists in the art it should be clear that large networks can contain a lot more components than shown on the drawing. For example, in a typical case, there will be many virtual connections through the ATM cross-connection 150. the for large networks.

The user 110 and user 120 may represent any community that supplies telecommunications traffic in the network 100. Some of these examples can be switch channel local PBX equipment at the customer premises. In a typical case, the user traffic will be fed into the system 100 in the format of a DS3, DS1 or OC-3, which have built-in circuit DS0 and VT 1.5. Connections 180 and 182 represent any connection that can be used by the user 120 to access the system 100, and should include formats such as E1, E3 and DS2. As such, these compounds are sometimes referred to as compounds of access. Connections 180 and 182 in a typical case, there must be a DS0 connections. built-in DS3 connection, however, the invention is compatible with other compounds, examples of which can be fractional DS1, free DS3 or even SONET OC-3. Channels 190 and 193 are any line capable of transmitting messages of alarm, such as line signaling System #7 (SS7). ATM cross-connection 150 is a system that provides multiple virtual connections. Such a system may consist of individual ATM devices cross-connections connected between Soboh is t to serve NEC Model 10. Compound 181 may be any virtual connection. In a typical scenario, the virtual connection will use the DS3 or SONET data transfer. ATM cross-connection 150 can provide a number of virtual connections in the system, cross-connection, and a virtual connection 181 represents one of these compounds. Because the virtual connections are logical routes, many physical routes can be used on the basis of pre-specified ATM cross-connection 150. Lines 191 and 192 can be any of the channels, ensuring the message forwarding data. Examples of such lines can serve as SS7 or UDP/IP. Components described in this section are well known in the art.

The processing system alarm 160 is any processing system that can receive and process the signaling to select a virtual connection, and then generate and transmit an alarm to identify a choice. Various forms of signaling may be used in the invention, including SS7, C7 and signaling interface user/network (UNT). The preferred implementation of the processor clock is for, providing user location information received in connection 180, a virtual connection is selected by the processing system alarm 160. In a typical case, this involves receiving alarm messages from the processing system alarm 160, which identifies the virtual connection connection access mode from call to call. The multiplexer must convert the user traffic from the connection access 180 in ATM elements that identify the selected virtual connection. The multiplexer 140 is similar to the multiplexer 130. The preferred implementation of such multiplexers are also described in detail below.

When calling from user 110 to the user 120, the system works as follows. The user 110 will transmit the alarm message line 190 in the system 100, initiates the call. The processing system alarm 160 will process this message. This treatment will include validation, rejection, broadcast, route selection, control of the echo signals, network management, signaling and billing. In particular, will be selected virtual connection through the ATM cross-connection ately 120. Although there are many different compounds shown only the selected connection connection 181 and the connection 182. In the General case, the choice is based on the dial, but the treatment can be associated with many other factors, including network load and user commands routing. The processing system alarm 160 will then send an alarm reflecting the choices made, the multiplexers 130 and 140.

The user 110 will also establish a connection with the system 100. This connection represented by the connection 180 to the multiplexer 130. Although, for clarity, shows only one connection, however, it is clear that there are different connections. The selected connection will be identified in signaling from the user 110 to the system 100. The processing system alarm 160 will include the identification of this compound in its signal to the multiplexer 130.

If required, the user 120 will take the alarm system to facilitate completion of the call. Alarm system alarm processing 160 will show that the system 100 is connected to the user 120 via connection 182. In a typical scenario, the user 120 will Khujand Prov./P> The multiplexer 130 will receive the alarm from the processing system alarm 160 that identifies the connection 180 as connection access and connection 181 as the selected virtual connection through the ATM cross-connection 150. The multiplexer 130 to convert the user information from the connection 180 in ATM data elements. The multiplexer 130 will indicate the connection 181 header data elements. Compound 181 should be provided through the ATM cross-connection 150 from the multiplexer 130 to the multiplexer 140.

The multiplexer 140 should take alarm from the processing system alarm 160 that identifies the connection 181 as the selected virtual connection and the connection 182 as the selected connection access to the user 120. The multiplexer 140 converts the data elements of the incoming connection 182, the user information corresponding to the connection 182 to the user 120. Although the above example uses two multiplexer, however, can be used and one multiplexer for calls that come into the system 100 and leave through the same multiplexer. In this case, the system ATM Dol is its discussion obviously, what many virtual connections can be pre-provided in the ATM system of cross-ties to secure mutual connection ATM multiplexers, providing firewall currency. If a user places a call, one of the virtual connections is selected by the signal processing system for this call and is identified for the respective multiplexers. Multiplexers convert the user information into data elements that identify the selected connection. As such, the user information can be switched by ATM equipment in mode from call to call. The system does not require processing of the call or alarm for ATM switch (although ATM switch can be used to provide virtual connections without the use of its functions call processing and signaling). The system can also implement advanced services, such as NOO and virtual private network (VPN).

In Fig. 2 shows another variant embodiment of the invention. In this embodiment, the user information from the connection of access can be multiplexed at the DS0 level, but it is not required in other embodiments, is to be used and other alarm systems, for example, 7 or UNI.

In Fig. 2 shows the DS0 interface 210, level ATM adaptation 220, ATM interface 230, assigning DS0 - virtual connection 240, the administrator of the call/connection 250 and point forward signal 260. Also shows the connections 280-283 and lines 290-292.

Connection 280 may be any compound from the group of compounds that contain information that must be converted to the DS0 format. Examples of such compounds are compounds OC-3, VT1.5, DS3, DS1. The DS0 interface 210 provides the conversion of user information in these formats in the DS0 format. Level ATM adaptation 220 contains both convergence sublayer, and the level of segmentation and re-Assembly. Level ATM adaptation 220 provides reception of the user information in the format DS0 from DS0 interface 210 and converts the data into ATM data elements. The levels of ATM adaptation is well known in the art, in particular, information about the level of ATM adaptation is contained in document 1.363.1 International telecommunications Union (ITU). Level ATM adaptation for speech signals is also described in the application 08/395745 dated February 28, 1995 on "the Processing of data elements for transmission of speech signals". ATM interface 230 provides the receive ATM data elements and transmission of ATM data elements. Connection 281 provides data format DS0, and the connection 282 - transmission of ATM data elements.

It is obvious that the communication route is formed by the compounds 280-283, can be set for the transfer of user information. Although the communication route is described from the connection 280 to 283 connection, however, the invention is obviously applicable to perform a reverse handle in the opposite direction. If the communication route is bidirectional, then the user information in the ATM elements, the incoming connection 283 will be processed for issuance in connection 280 in the appropriate format. Specialists in the art it should be clear that a single compound can also be installed in each direction, or may have only one connection for one direction of data transfer. These components and how they work is known from the prior art. Line alarm 290 and 291 are a line of standard SS7.

Line 292 is a data line, for example, an ethernet connection, use file transfer Protocol UDP/IP. Click forward signal 260 is a device that Mar the VA/connection 250 is identified by its own code point alarm. Click send signals 260 to route alarm messages destined for that code point, the administrator of the call/connection 250. In some embodiments, the implementation point of sending signals 260 can also convert other codes of the items in the item code for the administrator of the call/connection 250, so these alarm messages are also routed to the administrator of the call/connection 250. While converting the code point is not essential, however it facilitates the transition from network to the system corresponding to the invention. The transformation may be implemented using a mapping table between level 2 and level 3 functions of the message transfer point forward signals 260. The conversion table must translate the destination of the message in the administrator code call/connection 250, so that the routing function of the layer 3 forwarding messages to send messages to the administrator of the call/connection 250. Converting the code point can be based on many factors. As examples code destination line alarm code identification circuit, the message type and various combinations of these and other fattoumi combinations OPC/DPC (source code/code of the addressee) can be transformed relative to the DPC in the item code administrator call/connection 250. These messages alarm will then be routed to the administrator of the call/connection 250 through the point of sending signals 260. Option a suitable point messaging disclosed in application for U.S. patent on "Telecommunications device, system and method with improved item sending signals" filed concurrently with this application by the same applicant.

The administrator of the call/connection is a CPU alarm, which operates as described above. The preferred option of the administrator, the call/connection 250 will be described below. In this embodiment, the administrator of the call/connection 250 should provide reception and processing of messages signaling system SS7 to select compounds for the generation and transmission of alarm, identifying the adopted choice.

The destination block 240 is a control interface that receives messages from the administrator of the call/connection 250. In particular, the destination block 240 identifies the DS0 assignment/virtual connection messages from line 292. These assignments are given on the level of ATM adaptation 220 for sale. As such, the level of ATM adaptation gets identificaton ATM adaptation 220 also receives the identification DS0 for each call (or DS0 for N x 64 calls). Level ATM adaptation 220 then converts the user information identified between DS0 and identified ATM virtual connection. Confirm that the destination has been implemented, can be transmitted back to the administrator of the call/connection 250, if necessary.

In the process, calls are handled as follows. Message signaling for calls received on lines 290 and routed point forward signal 260 to the administrator of the call/connection 250. Connection access in a typical case are installed simultaneously with the alarm. All these connections are represented by a connection 280. The DS0 interface 210 converts the traffic in connection 280 in the DS0 format and outputs the converted data format DS0 level ATM adaptation 220 connection 281.

Alarm, adopted by the administrator of the call/connection 250, will identify connections access for calls (i.e., specific DS0 in connection 280), and contain call information, such as dialed number. The administrator of the call/connection 250 will handle the alarm and select the connection for the call. Because many virtual connections previously provided from the ATM interface 230 to other the and selection can be performed by means of conversion tables. For example, a table can be used to convert part of the dialed number in the identifier of the virtual route. The identity of the virtual channel can be selected on the basis of available identifiers of virtual channels for the selected identifier of the virtual route. The combination of the identifier of the virtual routing and virtual channel identifier should correspond uniquely to the particular virtual connection, previously provided from the ATM interface 230 to the appropriate destination network. Choices are assigning DS0 - a virtual connection, which are issued to the destination block 240 on line 292.

The destination block 240 receives assign DS0 - virtual connection and displays them on the level of ATM adaptation 220. When the ATM adaptation 220 receives a specific purpose, it converts the user information from the specified DS0 elements that identify the specified identifier of the virtual routing and virtual channel identifier. These items are served on the ATM interface 230 connection 282. The ATM interface 230 receives the data elements and presents them in a format forwarding to connect 283. Elements tx2">

Calls going through the connection 280. In this case, the administrators of the call/connection points callers select the virtual connection to the ATM interface 230. Administrators call/connection callers also transmit alarm messages to the administrator of the call/connection 250. Messages alarm identify recipients of calls and select the virtual connection. The administrator of the call/connection 250 should have a list of available connections access to identified recipients. The administrator of the call/connection 250 will select connections access to the destination from the specified list. For example, the compound selected by the administrator of the call/connection 250 may be a DS0, built-in DS3, United channel of the local PBX. Virtual connection in the connection 283 and the selected connection access in connection 280 is issued in the destination block 240 on line 292. The destination block 240 generates these appointments at the level of the ATM adaptation 220.

The ATM interface 230 will demultiplex the data elements coming from the compound 283, and give them to the level of ATM adaptation 220. Level ATM adaptation 220 converts user information into data elements in forlini compounds are given in the assigned DS0 connection in the connection 281. The DS0 interface is to convert the data to DS0 format of the connection 281 in the appropriate format, such as DS3, for connection 280. Specialists in the art known methods of multiplexing and transport of signals DS0 format.

From the above description it follows that the user information for call can be transmitted from the connection 280 to 283 connection in the opposite direction from the connection 283 connection 280. The DS0 interface 210 and the ATM interface 230 enables the transmission of user information in appropriate formats to the level of ATM adaptation 220. Level ATM adaptation 220 converts the user information from the DS0 format in the ATM format based on assignments from the destination block 240. The administrator of the call/connection 250 may choose destination DS0-a virtual connection, which ensure the implementation of procedures.

ATM multiplexer that provides firewall currency

In Fig. 3 shows a variant implementation of the multiplexer, which is suitable for use with the present invention, however, there are other options multiplexers, which correspond to the present invention. In Fig. 3 shows the control interface 300, interface optionscom terveys digital signal level 0 (DS0) 320, the block of digital signal processing 325, level ATM adaptation 330 and interface OC-12 335.

Interface OC-3 305 receives the data format OC-3 and performs conversion into the format of a DS3. The DS3 interface 310 receives the data format DS3 and performs conversion into a format DS1. The DS3 interface 310 may receive data format DS3 interface-OC-3 305 and external connections. The DS1 interface 315 receives the data format DS1 and performs conversion to the DS0 format. The DS1 interface 315 may receive data format from DS1 DS3 interface 310 or from an external connection.

The DS0 interface 320 receives the data of the DS0 format and provides interfacing with the unit digital signal processing 325. The DS0 interface 320 is associated with a block of digital signal processing (DSP) 325. Block CSO 325 performs the manipulation of user information to improve transmission quality. The CSO includes mainly the compensation of the echo signals, but may include other operations. As is known, the compensation of the echo signals may be required for voice calls. Block CSO 325 transmits data format DS0 through the joints of the echo signal. These compensators echo should be disabled for calls that do not require control of the echo signals. Calls using on the challenges of using data for to disable the echo canceller signals. The administrator of the call/connection is to send a message to management through the management interface 300 on the block CSO 325 indicating that a particular compensator echo should be disabled. The administrator of the call/connection selects the compensator of the echo signal based on the identifying code of the channel contained in the data signaling that he accepts from the user. After the data call to the administrator of the call/connection transmits a message, which enables the particular compensator echo signal for subsequent call using a voice signal. This method of control of the echo signals is preferred, but can also use other tools that implement the commands control the echo signals from the administrator of the call/connection.

In addition to the control of the echo signals, the administrator of the call/connection, and the multiplexer may provide in its work, other DSP modes on the basis from call to call. Can be used in compression algorithms, or universal, or for each call. Level in decibels can be adjusted for calls from specific sources or for specific destinations. Can ipli number of the recipient. Various DSP modes can be associated with various call parameters and implemented by the administrator of the call/connection block CSO 325.

Block CSO 325 is connected with the level of ATM adaptation 330. Level ATM adaptation 330 operates as described above. Received from the control interface 300 destination DS0-a virtual connection are implemented level ATM adaptation 330 by converting from DS0 format in the ATM format.

Calls with a bit rate greater than 64 kbit/s, is defined as N x 64 calls. If necessary, the level of ATM adaptation 330 may receive control messages through the control interface 300 from the administrator of the call/connection for N x 64 calls. The administrator of the call/connection is to issue commands to level ATM adaptation 330 for grouping data format DS0 to call.

ATM cross-connection

In Fig. 4 shows a virtual connection provided by the ATM cross-connection, according to a possible variant embodiment of the invention, although specialists in this field of technology can be offered to various other methods for providing virtual connections that are compatible with the invention. In Fig. 4 shows vitkalov A, B and C using the cross-links Y and z Virtual connection is provided between each multiplexer. Each multiplexer must have a virtual route to the system cross-connection that is specified for each multiplexer possible recipient. Virtual route AB contains a virtual connection 412 from A multiplexer to multiplexer B. For calls that originate and end in the same multiplexer, for this purpose is provided by the virtual connection 410, 416 and 420. Virtual connection 414 and 418 connected multiplexers A/C and B/C, respectively. Different routes for different virtual connections may be provided between the same two multiplexers.

Each virtual route contains thousands of virtual channels (not shown). Virtual connection is provided by means of cross-linkage combinations of the identity of the virtual route (IVM)/virtual channel identifier (CPI) in the cross-connection Y and Z. If the call is A multiplexer and should be completed in the multiplexer B, the administrator of the call/connection, select the virtual route AB. The selection may be based on the transformation saranagathy channel. This choice can be based on existing CPI in specific IVM. In this way previously provided virtual connection can be selected in the mode from call to call.

In a typical scenario, the challenges require bidirectional voice connection. For this purpose, a virtual connection is to convey the user information in both directions. Virtual connections can be provided so that the multiplexer at the other end of the communication channel may use the same IVM/CPI for data items that can be transported in the opposite direction. The administrator of the call/connection on the remote end of the link can also convert IVM/CPI source in other IVM/CPI provided for the opposite direction and to provide these IVM/CPI for multiplexer at the other end of the link.

In addition, the number of active virtual connections between cross-links can be monitored. Virtual route YZ connects the cross-connection Y-and z-Throughput virtual route K can be determined in accordance with the requirements of the network, however, if there is an overload, the administrator of the call/connection m is dstable variant of the invention, the corresponding specific scenario telecommunications network, although the invention is not limited to this particular scenario. In Fig. 5 shows the communication system 500, the user 512, 514, 516, points forward signals 518, 520, 522, 524, multiplexers 526, 528, 530, 532. administrators call/connection 534, 536, 538, 540, ATM cross-device link 542, 544, 546. For ease of connection and line alarms are not numbered. All of these components are described, and the administrators of the call/connection is also discussed below.

In the process, the user 510 may send a call to the standard 800 in the system 500. The user 510 may connect to the multiplexer 526 via a DS3 connection. Call 800 will take the DS0 connection, built-in DS3, coupled with the multiplexer 526. The user 510 to send a message to the source address of the system through SS7 point forward signal 518 to the system 500. Click send signals 520 is configured to route the message to the source address of the administrator of the call/connection 534. Message source address contains information such as dialed number, the calling user, the identification code circuit. The code identification circuit identifies the DS0 connection used polres and identifies the call as a call system 800.

The administrator of the call/connection is to convert the dialed number based routing plan for subscribers of the system 800, or using your own database or by access control service (not shown). For example, the call format 800 from the user 510 can be routed to the user 512 during working hours, to the user at night, and user-516 - weekend. If the call is placed from the user 512 at the weekend, the call will be routed to the user 516. The administrator of the call/connection 534 will select a pre-prescribed virtual connection from the multiplexer over ATM device crosstalk 542 and ATM cross-device link 544 to the multiplexer 530. The administrator of the call/connection 534 will send a message to the source address of the administrator of the call/connection 538 through the forward signals 520 and click send signals 522. Message source address will indicate that the call should be routed to the user 516 and will identify the selected virtual connection to be used to achieve the multiplexer 530.

In a typical case Mulet to select the DS0 connection, built-in DS3, and will transmit the message to the source address of the user 516 through sending signals 522 and 524. The identification code of the message channel source address will indicate that the call should be routed to the user 516 through the selected DS0 connection. The user 516 will transmit a response message by the administrator of the call/connection 524 back into the system 500.

The administrator of the call/connection 534 will also pass the message to the UDP/IP to the multiplexer 526, containing for his team to build custom information in the DS0 connection from the user 510 in ATM data elements with a header that identifies the selected virtual connection. The administrator of the call/connection 538 will pass the message to the UDP/IP to the multiplexer 530, containing for his team to decompensate ATM elements of the selected virtual connection and produce output user information in the selected DS0 connection to the user 516. ATM cross-device link 542 will route ATM elements of multiplexer 526 to the ATM device crosstalk 544, based on the header of the data item. Similarly, LSM device PE data item. As such, the user information of the call will be transmitted from the user 510 to 516 user to connect DS0 from the user 510, the virtual connection is selected by the administrator of the call/connection 534, and the DS0 connection to the user 516, selected by the administrator of the call/connection 538. The multiplexers to implement the selection of administrators call/connection.

The challenge requires that the speech channel was made available in both directions. As such, the DS0 connection and virtual connections must be bidirectional. Transfer the receive channel (from the user 516 to the user 510) happens after completing the address the message will be accepted by the system 500. The transmission through the transmission channel (from the user 510 to the user 516) happens after the response message will be accepted by the system 500. This can be done, not allowing the multiplexer 530 to release any data items to call up until the response message will not be accepted by the system 500.

If the user 510 places a call in the night time, the administrator of the call/connection 534 determines that the destination is the user 514. Accordingly, for the call is as crosstalk 542 and 546 to the multiplexer 528. The administrator of the call/connection is to select the DS0 for the user 514.

If the user 510 placed the call in the daytime, the administrator of the call/connection would determine that the destination is the user 512. Accordingly, for this call would be selected virtual connection from the multiplexer 526 through the ATM connection device 542 and back to the multiplexer 526. The administrator of the call/connection 534 would also provide the choice DS0 connection to the user 512.

The administrator of the call/connection

Fig. 6-12 relate to a preferred variant implementation of the processor alarms, also known as the administrator of the call/connection, but can be used with any processor that supports the requirements set forth for the invention. In Fig. 6 presents the CPU alarm, suitable for use in accordance with the invention. CPU alarm 510 in a typical case will be separated from the multiplexer, however, specialists in the art it is clear that they can be placed together. In addition, the processor signaling may support one multiplexer or more multiplexers.

CPU alarm se physical and electrical characteristics of the line alarm. Level 2 STS 615 is above level 1, and supports reliable transportation along the line alarm system by control status and perform error checking. Jointly levels 1 - 2 oops provide reliable transport of data on individual communication channel. The device requires functionality levels 1-2 STS for each communication channel that it uses. Level 3 STS 620 is above level 2 and provides routing functionality and control for the alarm system as a whole. Level 3 620 oops sends messages to the proper channel signaling (really on level 2 STS for this channel). Level 3 STS 620 sends messages to application programs using levels oops to access the alarm system. Level 3 STS 620 also has a control function, providing monitoring the status of the alarm system and the adoption of appropriate measures to restore service in the system. Levels 1-3 oops correspond to levels 1-3 basic reference model of open system interconnection (OSIBRF). How oops 1-3 and model OSIBRF well known in the art.

CPU alarm system 610 also shows the ethernet interface 635 processor platform 640, the message handler a forwards messages alarm level 3 STS to hook platform 640. In addition, if communication with the multiplexer uses UDP/IP, ethernet interface 635 will allow communication with multiplexers. Specialists in the art it should be clear that other protocols and interfaces that support these functions can also be used in accordance with the invention.

In accordance with the present invention the logical tools interface alarm (specified positions 612, 615, 620 and 635) will provide the selected routing message of the ISUP Protocol to the processor platform 640. The method to accomplish the above. Preferably, the interface SS7 handler platform 640 can be performed using commercially available software system SS7. An example of such software is the software interface SS7 provided by Trillium, Inc.

Processor platform 640 is a system that takes messages ISUP protocols and the B-ISUP interface ethernet 635 and routes them to the message handler 645. Preferably, the processor platform 640 is configured to route messages to a specific processor messages to the traveler exchanges alarm handler platform 640 and controls connection requirements and switching for calls. He may choose to implement services and to initiate control of the echo signals. He also performs conversion of signaling between the formats, protocols ISUP and B-ISUP. The data processor 650 is a set of logical tools associated with the message handler 645, processing service requests, and providing the data to the message processor 645. The data processor 650 also controls the joints of the echo signals and generates a record of the accounts for the call.

In the following description, the term ISUP applies to B-ISUP. In the process, the message of the ISUP Protocol, which satisfy the relevant criteria are routed through the site messaging (COC) and/or ATM interface 615, level 3 STS 620 and ethernet interface 635 to the processor platform 640. Processor platform 640 will route the message of the ISUP Protocol to the message handler 645. Message handler 645 will process the information ISUP Protocol. This may include verification, rejection, determine whether you need additional information to process the call. If necessary, the data processor 650 will be called and provide a message handler 645 appropriate data to obrabotannie ISUP Protocol to make the call and pass the signals on the processor platform 640 for transmission to the specified network elements.

Presents the distribution of functional elements between the message handler 645 and a data processor 650. These functional elements are well known in the art. Message handler 645 includes at least a function call control (qualification development Department) and the function switching service (PCF). Function call management establishes and disconnects the connection on call, and the function switching service recognizes the trigger signal during processing of the call by qualification development Department and provides an interface between qualification development Department and function management service (USF). Function management service identifies the types of service and receives data for maintenance. In some embodiments, the implementation of the message handler 645 may include the USF and function data service (FDO).

Function data service provides data services in real time for service management. Thus, the message handler 645 has the opportunity at least to manage connections and to recognize the trigger signal. In some embodiments, the implementation of the message handler 645 may also identify the types of services to get data for these services and who may provide alarm internetworking (e.g., from the ISUP Protocol to Protocol B-ISUP), manage connections, select the type of service and the implementation of the service in a logically integrated package, which mates with the network through conventional means.

The data processor 650 includes at least a function to control the maintenance and function of these services. In some embodiments, the implementation of the message handler 645 and the data processor 650 contain both the control function and service function of the data service and ongoing maintenance is divided between the functional elements. For the data processor shown two other features that are not standardized functional elements. Function block calculations generates records of accounts, the compensator of the echo signals compensates for the echoes. In a typical case, the compensator of the echo signals is disabled for calls using the data and is included after the call for subsequent voice calls, but are equally applicable to other methods.

Function call management (qualification development Department) does most of the processing for calls until the function switching service does not recognize the trigger signal and will not cause the function management service is authorized from the function data service (FDO) for the implementation of a particular service. The USF processes the data received from the faculty, and provides the data to the call control via the function of the switching service. Then the control function call establishes a connection using conventional alarm switching points of service. (FFP). FFP must be connected to a communication routes and make connections. In a typical case, the switching point of service is a switch. In addition, the joints of the echo signals can be controlled in the process of the call, and the call can generate the invoice record for the service.

Specialists in the art should be aware of the various hardware that can support the requirements of the invention. For example, the processor platform, the message handler and the data processor can be performed in each individual station 20, based on scalable processor architecture SPARC.

Processor platform

In Fig. 7 shows a possible variant of the processor platform. Processor platform 710, shown in Fig. 7, contains the handler point forward signals (PPP) 712, a control program (supervisor) 714 and processor Administrat the alarm (position 312, 315, 320 and 335) and from this interface. Handler PPP 712 provides the interface ethernet TCP/IP. Handler PPP 712 provides buffering decompose incoming packets for ABC and buffering and layout of outgoing packets. Handler PPP 712 may also verify messages to the main thread. Any method of transferring signalling messages to the handler platform 710 may be used in the invention.

Supervisor 714 provides management and control operations administrator call/connection (ABC). Among these operations, startup and shutdown ABC, logon and logoff different modules ABC, handling of administrative emails (for example, error, warning, status, etc) from modules ABC, processing messages from the network operations, such as ordering in a queue, commands, configuration, updating the data. Connection for network operations is a man-machine interface that allows the administrator of the call/connection is managed and controlled as a remote and a local operator. Supervisor 714 performs processing involving retrieving configuration data from the internal tables and configuring ABC. Modules ABC also have inside the data handler PPP 712 and handler ABC 716. Handler ABC 716 communicates ISUP Protocol handler PPP 712.

Handler ABC 716 also exchanges messages ISUP Protocol and control messages ABC with the message handler. The connection between the handler ABC 716 and the message handler may be a local area network of the ethernet Protocol transmitting these messages are encapsulated in packets, the TCP/IP Protocol, however, can be used, and other known methods. Handler ABC 716 will provide interface ethernet TCP/IP. Handler ABC 716 provides buffering and decompose incoming packets from the message handler and buffering and layout of outgoing packets to the message handler. Handler ABC 716 may also verify messages to the underlying stream.

Inside the event handler for the platform 710 is equipped with a bidirectional channels that enable the exchange of information between the processor PPP 712, supervisor 714 and handler ABC 716. The channels between the handler ABC 712, handler ABC 716 and supervisor 712 forward control and administrative information. The channel between the processor PPP 712 and handler ABC 716 sends the information message of the ISUP Protocol.

Processor platform 710 receives, euromarche messages before forwarding them to the message handler. If more than one message handler connected to the processor platform 710, the message of the ISUP Protocol can be distributed among message handlers on the basis of a code channel selection signal (VCS) specific message of the ISUP Protocol. Handler ABC 716 receives commands routing from the message handler to route certain messages ISUP Protocol to implement specific processing in the message handler. Processor platform 710 also provides the function of a supervisor and the human-machine interface for the administrator of the call/connection.

Message handler

In Fig. 8 presents the message handler. Message handler 820 shown in Fig. 8, contains the call center 821, administrator training 822, the administrator complete 823, the administrator of the detection point 828, administrator sign 824, ancillary administrator 825, the administrator of the switching 826 and local resource 827. The main function of the message handler 820 is processing messages ISUP Protocol.

The call center 821 implements a procedure that accepts messages call set-up from the processor platform. Installation wet instance handling procedures administrator training data, determined by the information in the SIA. Administrator training 822 represents any processing administrator training, generated by the call center 821. Handler ABC receives a command of a new instance of processing, so that subsequent messages ISUP Protocol associated with the call may be transferred directly to the appropriate instance of processing administrator training 822 via processor platforms.

Administrator training 822 sets a block of memory called source control block call. The control unit provides information call the archive for information specific to the call. For example, the source control block call can identify the following: the control block call, administrator training, message handler, the original channel local PBX trunk circuit channel local PBX, ATM virtual circuit ATM virtual channel, caller ID, dialed number, converted dialed number information of the original line class of service of automatic identification numbers, the selected route, the number of the selected route, the choice of signaling path, the source code item code item destination, indium blocks call control. In addition, the control unit of the call will also contain different points in time, when the accepted message alarm, such as completing the address message, the response message, the suspended message summary message, the message of separation. Specialists in the art of famous and other data that can be used.

Administrator training 822 performs call processing in accordance with the Basic Model Call Status (BCSM), recommended by the International Union of telecommunications, but with some exceptions. Administrator training 822 processes the message source addresses that pass through every point in the call, until it finds the point of detection. When it is detected, the administrator of the detection point 828 receives the message and administrator preparation 822 is suspended until the administrator of the detection point 828 will not respond. An example of a detection point for administrator preparation 822 would permit an attempt at training.

The administrator of the detection point 828 accepts messages from administrator training 822, due to the detection point detected in the process of education is tion.

Active detection point has certain criteria that, if satisfied, may affect call processing. If detection is not enabled, the administrator of the detection point 828 will transmit a continuous signal back to administrator preparation 822. This message instructs the administrator training 822 to continue processing the call until the next detection point. If the detection point is activated, the administrator of the detection point 828 will check, satisfied the criteria for discovery. If the administrator of the detection point 828 requires assistance in the processing of activated detection point, it will send a message to administrator sign 824.

Administrator sign 824 will accept messages from the administrator point detection 828 and will send the message or helper administrator 825, or the administrator of the switching 826. Messages with specific traits will be directed to the subsidiary administrator 825 that will handle these signs call. In a typical case, it's not a sign-IN, such as managing the echo signals or the billing in the traditional telephone system (POTS). An example is ministrator characteristic 824 will send information back to the administrator of the detection point 828 (then administrator preparation 822), when she is taken from the auxiliary administrator 825 or from the administrator of the switching 826.

Administrator switching 826 will determine whether the request should be processed by the local resource 827 or data processor. Local resource 827 will be structured to ensure that the data stored in the message handler 820. Examples of such data include table validation automatic identification numbers, which checks the number of the caller, the conversion table dialled numbers to number conversion system POTS in command routing, or conversion tables N00 for converting numbers 800 in command routing. Examples of commands routing provided by the tables is a particular connection or access a virtual connection. Example of data in the data processor are routing table virtual private network or comprehensive plans 800 routing.

In a typical case, the administrator training 822 performs processing related to the call to indicate that the installation is allowed. At this point, the administrator training 822 will transmit a command to the call center 821 for POPs which of these administrators complete. Administrator training 822 will carry a message to the source address of the administrator of the complete 823.

Administrator certification 823 sets a block of memory called the final unit management challenge. The control unit call provides an archive for storing information specific to the call, and are similar in construction with the source control block call.

The administrator complete 823 also operates in accordance with the model BCSM, but with some exceptions. The administrator complete 823 continues processing the call, passing through his own points in the call, will not be detected points detection. When a point is found, the administrator of the detection point 828 receives the message and processing the administrator complete 823 shall be suspended until the administrator of the detection point 828 will not respond. An example of a detection point for the administrator complete 823 would permit completion, followed by the permission to install call administrator training 822. Message from the administrator complete 823 administrator of the detection point 828 processed as described above for messages with ADMINISTRATSII for transmission via processor platform 410 to the corresponding multiplexers and perhaps users. Message handler 820 communicates with the data processor using the transfer Protocol. Examples of such protocols can be UDP/IP Protocol application programs intelligent network (INAP), which is contained in the sublevel components Section of the Application programs of the functionality of the transaction (TCAP).

The data processor

In Fig. 9 shows a variant implementation of the data processor. The data processor 930 shown in Fig. 9, contains the control center service 931, the choice of maintenance 932, centre for logic service 933, handling signs 934, data center maintenance 935, data Manager service 936, the control of the echo signals, calculation tools 938. The data processor 930 receives a request message service message handler. These messages due to the activated points detection, triggering message handler to access the data processor 930. Messages are also due to the characteristics realized by the subsidiary administrator. The control center service 931, centre for logic service 933 and data center services are static handling procedures, sozdavaemym mode from call to call. The control center service 931 notifies the administrator about switching routing subsequent messages requesting service for this call to the appropriate administrator, select the type of service. The administrator select the type of service 932 represents any of the administrators select the service created by the control center service 931.

The administrator select the type of service 932 performs the service part of the call. The administrator select the type of service 932 identifies the different types of services associated with each message, and implements a service via message center service logic 933. The Central logic of the service 933 receives messages from the administrator selecting the type of service 932 and creates instances of the specific processing required for the identified services. Examples of such processing are N00, sending messages, the mobile subscriber terminal, a virtual private network. Handling procedures represent program logic services that implement the required services for the call. Procedure 934 is one of the procedures of the processing is output, required to implement the service. This is due to the implementation of independent service units (NSS). The NSS is a set of functions. An example of a function is the extraction of the target number of message signaling. NSS are combined to form the service. Example NSS is the transformation of the called number.

Specialists in the art known for the above services, although they were never executed by the system corresponding to the invention. Services type N00 represent, for example, call 800, 900, or 500 - type, in which the dialed number is used to access the call is processed and the logic of payments for the service defined by the served subscriber. Message forwarding causes the connection of the caller to the service of voice messages. For example, the message receiving end due to employment will constitute the start signal is recognized by the message handler. In response, the message handler will create an instance of a procedure of processing for sending messages determined if the call is directed to a specific dialed number will require platform forwarding voice message is About) about connecting the caller to the platform forwarding voice messages. Mode mobile subscriber/terminal includes recognizing that the dialed number belongs to a mobile subscriber that requires conversion using the database to determine the current number. The database is updated when the called party changes its location. Virtual private network (VPN) is a personal dialing plan. It is used for calls from specific specialized lines, with a specific cause of rooms or a specific dialed numbers. Calls are routed as specified in this particular plan.

When performing service independent block (SNB) to ensure the maintenance procedure 934 accesses the data center service 935 to create an instance of the data Manager service 936. Data Manager service 936 accesses a network databases that provide data required for maintenance. Access can be facilitated with the help of message forwarding-level TCAP-to-point service management (FCU). Data Manager service 936 represents any of the administrators of the service, created by data center maintenance 935. After to rocedure processing provides for the implementation of the completion of the call, information service is sent back to the message handler and, ultimately, the source administrator or administrator with the completion of the call.

After the disconnection message connection on call requests for payment will be sent to the unit calculations 938, which will use the block call control to establish a record of invoices. The control block call will include information from the message of the ISUP Protocol to call and processing administrator of the call/connection. From the message of the final address of the control block call will include a label routing code identification circuit, the message type and indicators of reasons. From the response message, the control unit will be a challenge to include label routing identification code circuit type messages and indicators callback. From the message source address control block call will include a label routing identification code circuit type messages and indicators direct call information service user, the called party's number, calling number, carrier identification information of the selection of the carrier, the account number, primary e-mail address information of the source line, the original called number, p is the identification code circuit, the message type and indicators of reasons. From the suspended messages or missed message control block call will include a label routing code identification circuit, the message type. Specialists in the art of famous and other information that can be used to record invoices. In addition, it is clear that some of the above types of information can be omitted.

For calls to traditional telephone system (POTS) request invoice will be held from the administrators of the source and the completion of the call through the secondary administrator. For calls in the intelligent network (IN) the request will come from the block select the type of service 932. Unit calculations 938 will generate the invoice record on payment of the control blocks call. Record invoices will be sent to the settlement system through its interface. An example of the interface of the payment system can be Protocol I. E. E. E. 802.3 FTAM.

At some point in the installation process, call the administrator of the source of the call, the administrator complete or even processing procedure of the detection point will be to check the data information of the service user and the information source Laridae data the data processor 930 sent the message. More specifically, the message is routed through the secondary administrator administrator control echo 937 in the data processor 930. Based on the code identification circuit, the administrator controls the echo signals 937 can choose which canceller echo signals and circuit DS0 require disconnection. To implement this produces a message transmitted over a standard data line to the corresponding compensator echo signal or the control system of the echo signal. As described above, the control of the echo signals may be implemented by a multiplexer. Once the call is received the message of separation, the compensator echo back on. For a typical call to this procedure is repeated twice. Once for the compensator of the echo signals on the side and once for the compensator of the echo signals on the remote side. The administrator of the call/connection, which processes the message source address for a particular segment of the challenge will be to manage the particular joints of the echo signals for a given segment.

Call for a message source address

Before describing treatment is nalizatsii SS7 well known in the art. Message Protocol ISUP SS7 contain different information fields. Each message is labeled routing code destination code point of origin, the choice of signaling path, which are used mainly for routing messages. Each message contains a code identification circuit that identifies the circuit to which the message belongs. Each message contains a message type, which is used to recognize the message. The message of the ISUP Protocol also contain mandatory part, filled with data of a fixed length and variable-length data, in addition to the part allocated for additional data. These parts vary from one message type to another depending on the required information.

Message source address initiating the call and contains information call setup, for example, a dialed number. The message source address is sent in the direction of the call for call set-up. When carrying out this procedure, the message level TCAP can be transmitted to access remote data and processing. When the message source address is reached target network element, the message of the final address is sent in obramleno. If the called party has answered, then in the opposite direction sends a reply message indicating that the connection is on call can be used. If the caller leaves the phone is switched on ("hangs"), sent a message of separation, indicating that the connection is not used and can be interrupted. If the called party hangs, then the message is sent to the suspension, and if the caller restores the connection, the message recovery support line open, but if there is no connection retry, the message is sent to a separation. If the connection is free, then sent messages full end to indicate that the connection can be re-used for another call. Specialists in the art should be aware of other messages ISUP Protocol, the above are only basic. From the above it follows that the message source address sets the call.

In a preferred embodiment, the call processing differs from the basic model call recommended by the ITU, although in other embodiments can be ensured full compliance with this model. In Fig. 10-12 shows a preferred variant of OA on stage 1010 creates an instance of the source administrator.

Source administrator starts the processing of the call by transmitting a message permissions to the administrator of the detection point. The administrator of the detection point checks the information of the message source address, including dialed number, code identification circuit and information of the original line to perform on stage 1015 definition of service. This is done to confirm, does the requested service to confirm access rights on the stage 1020. Advanced system call processing and model BCSM ITU involve checking permissions before you can perform the determination of the service. An important advantage of the preferred variant of the invention in comparison with known methods of call is to check the information of the message source address, before deciding on a checking access rights, even if such verification is required. For example, the caller may not pay the bill for the call. The called party pays the bill for 800 calls, and the confirmation of the right of access may not be necessary. If at step 1020 it is determined that the test for confirmation of the right of access is not required, then the call processing continues directly to B. the Advantage of this procedure is Nay part of the call.

If at step 1020 it is determined that authentication is required, then at step 1025 checks on the table confirm access rights. This check makes sure whether to be provided with the call, and solves possible problems with pay per call. For example, calls from the ID numbers for automatic communication that are overdue on payments, causing problems with the payment of accounts and cannot be verified for access. Verification confirm access rights may require sending messages from the administrator point of discovery through the administrator handling procedures and administrator of switching to local resources for accessing tables. A table can contain lists of approved or disapproved ID numbers for automatic connection, or both. If at step 1030 decides that the call is not allowed, then at step 1035 is an appropriate treatment for the call routing to the operator or sending messages).

If at step 1030, the call is allowed, the types of services that you identified in step 1015, checked at the step 1040 to determine whether to be routed call. This is usually done DL the maintenance is not required, the dialed number is converted in the route command at step 1045. Command routing may be a particular virtual connection and/or connection access. Then, the processing procedure proceeds to A. If at step 1040 require additional services, then processing proceeds to B.

In Fig. 11 shows processing in B after the route is selected. At step 1115 is created, the administrator complete. The administrator has complete responsibility for processing in accordance with the model BCSM ITU. However, in some embodiments, the implementation of the procedure may be slightly different from this model. For example, the points of detection, such as the choice of the means of processing and verification of access rights to call it, can be omitted.

Features of the channel are analyzed at step 1110 to determine whether the call is a call with data transmission. This analysis can be carried out in another place during processing of the call (for example, by an administrator of the source after the route is selected). If at step 1115 is determined that the call with the transfer of data, then at step 1120, the data processor sends a control message to the echo signals. The team is ova, which requires control of the echo signals. This message can be passed to the control system of the echo signals in a conventional data transmission channel from the administrator of the call/connection control system of the echo signals. If the control of the echo signals is implemented as multiplexers, the control message echo signals may be included in the command message routing.

Once on stage 1115 determined that the call is not a call, data transmission, or after the processing at step 1125, related to the control of the echo signals, at step 1135 message is generated the alarm. This new alarm message identifies the connection and access the virtual connection for the call. The new alarm message can also contain commands to control the echo signals. A new alarm message is passed to the handler platform at step 1140.

In Fig. 12 presents the processing in B. By this time are already known various information related to the call, in particular the resolution of the call, and maintenance requirements. Information of the call is then parsed at step 1205, as necessary to provide service on call. If the data processor is not required at step 1210, the service implementation is but implemented by the administrator of the source or using a local resource. For example, a particular 800 - conversion or profiles service number dialed (for example, the direction of the call) may be stored in the local resource. In this case, the routing may be performed by a local resource, after the information is analyzed to identify the correct record in the database of the local resource. If you use a local resource, messages must be routed from the processor point of discovery through the administrator of the processing procedures and the administrator of switching to a local resource.

If at step 1210 it is determined that the data processor you want to call, then the message is transmitted to the data processor at step 1220. Forwarding messages in a typical case, the processor of the detection point to the administrator of the procedures for detecting and administrator switching to the data processor. After receiving the message handler data center service management at step 1225 creates an instance of a processing procedure for selection of service. Procedure for selection of service parses the message from the processor of the detection point and to the stage 1230 selects the procedure to call. For example, a call from the calls the tea will be generated processing procedure for virtual private network and service personal communication.

Each processing stage is to determine whether the data. For example, a processing procedure for a mobile subscriber will require access to the database to determine the current phone number of the called party. If at step 1240 is determined that data is required, then at step 1245, the data center service administrator creates a data service. Data Manager at step 1250 controls the session and provides access to the relevant database. Once the data is received (or not required), at step 1255 implemented appropriate service using established procedures. For some procedures, such as 800 service-type, this can be a choice of route. The results of the processing procedure is returned to the source administrator for appropriate use. If the procedure does not require routing, the source administrator must choose the route with the use of a local resource or other handling procedures.

Message source address itself contains multiple fields of information. The table below represents the elements of a message source address taking into account the information content of different addresses described above. Professionals in this field should be clear, as other messages SS7 signaling can be introduced into the processing procedure in accordance with the present invention. For example, the time when the accepted message to the terminating address is registered in the control unit by calling for accounts and services. Start-up time can also be based on subsequent messages, such as messages of the final address. Procedure for response message is largely the same.

End-to-end transmission is determined by the point in time when the user has the ability to transmit information over the connection for the call from end to end. Message from the administrator of the call/connection to the relevant network elements necessary to ensure end-to-end transmission of the call. In a typical case of a connection on call include both the transmitting channel from the calling subscriber and the receiving channel to the caller, and end-to-end transmission is provided in the receiving channel after a message was received final address, and transmitting the channel after it is accepted response message.

After receiving the message, hang up the administrator of the call/connection will record the time for zoobentosa). In addition, any disabled canceller the echo signal can be re-enabled, and the control unit call can be used to create a record of the invoices. Upon receipt of a message is complete, hang up the administrator of the call/connection is used to send messages indicating the elimination of the route of the call. It will provide treatment specific procedures for call processing and reuse of connections on call for subsequent calls.

In addition, messages suspension and message transfer can be processed by the administrator of the call/connection. The suspension message indicates that the called party has disconnected, and the message of the retreat will follow, if the callee has not resumed connection after a certain period of time. Message transfer is simply a message that is passed between the alarm system, which can contain any information and be used for a variety of purposes.

The invention also provides the possibility of switching from the use of funds ATM mode from call to call. This ensures the effective use of virtual connections high throughput. An advantage of the present invention aflatouni means of processing the call in the ATM switch. This allows ATM switching network without the use of complex ATM switches that support large volumes of calls. In result, you do not need the high cost associated with such switches. The invention fully supports voice traffic and nonverbal traffic. The invention supports service type NOO, using a virtual private network, mobile users/terminals, voice messages, without requiring facilities in the ATM switch. Use the ATM means a cross-connection provides advantages because ATM means of cross-communication has evolved more than the ATM switches. In addition, crosstalk require less organizational support.

Specialists in the art it should be clear that within the framework of the invention, there are various modifications of the specific options outlined above. The invention is not limited to these specific choices, and should be defined by the claims.

1. The method of operation of a communication system in which a user places a call by transmitting signaling to call in the communication system and transmitting user inform the ides, wherein the receive signaling for the call processor signaling associated with asynchronous multiplexer that provides firewall, exchange, process the signaling for the call processor signaling to select a virtual identifier, generate a new alarm in the signaling process to identify specific compounds and the selected virtual identifier, transmit a new alarm to asynchronous multiplexer that provides firewall, exchange, convert user information from a particular connection in asynchronous data with the selected virtual identifier in asynchronous multiplexer that provides firewall currency, in response to new alarms and transmit asynchronous data from the multiplexer, providing firewall, exchange, using the selected virtual identifier.

2. The method according to p. 1, characterized in that when receiving the signaling for the call accept message call setup.

3. The method according to p. 1, characterized in that when receiving the signaling for the call accept message to the source address of the signaling system # 7.

4. The method according to p. 1, characterized in that when the pickup is from the connection of the digital signal level zero (DSO).

5. The method according to p. 1, characterized in that when receiving the user information for call accept speech information.

6. The method according to p. 1, wherein selecting the virtual connection, select the virtual connection based on the number dialed.

7. The method according to p. 1, wherein selecting the virtual connection, select the virtual connection based on the call processing NOO.

8. The method according to p. 1, characterized in that the selection of compounds identified by virtual identifier that is carried out on the basis of processing a call to a virtual private network.

9. The method according to p. 1, characterized in that the selection of compounds identified by virtual identifier that is carried out on the basis of processing of the call, providing service to a mobile subscriber terminal.

10. The method according to p. 1, wherein the asynchronous data transmit connection standard for synchronous optical network (SONET).

11. The method according to p. 1, characterized in that the processing of the signaling for the call processor advanced alarm process alarm to determine the requirements of digital signal processing (DSP) call preziraet requirements of the CSO to call, the method further includes the implementation of the requirements of the CSO to call in an asynchronous multiplexer that provides firewall currency, in response to new alarms.

12. The method according to p. 11, characterized in that the implementation of the requirements of the CSO control includes the echo signals for the call.

13. The method according to p. 11, characterized in that the implementation of the requirements of the CSO enables encryption of the call.

14. The method according to p. 11, characterized in that the implementation of the requirements of the CSO enables the adjustment of the level in decibels for the call.

15. The method according to p. 1, characterized in that the said particular connection and the connection is identified by a virtual identifier, are bidirectional and other user information is transmitted in an asynchronous data connection identified by the virtual identifier to the asynchronous multiplexer that provides firewall currency, for transmission to a user, the method further includes receiving asynchronous data to the call of the compounds identified by virtual identifier in asynchronous multiplexer that provides firewall, exchange, conversion of other user-defined information in asynchronous farmacii of asynchronous multiplexer, providing firewall currency, specific connection.

16. The method of operation of a communication system in which a user places a call by transmitting signaling to call in a communication system providing processing of the call by transmitting user information in the asynchronous data with the virtual ID, and asynchronous multiplexer that provides firewall, exchange, receives asynchronous data call, wherein the receive signaling for the call processor signaling associated with asynchronous multiplexer that provides firewall, exchange, process the signaling for the call processor signaling to select a narrowband connection, generate a new alarm processor alarm to identify the selected narrowband connection, transmit a new alarm to asynchronous multiplexer, providing firewall, exchange, convert asynchronous data with the virtual identifier in the user information in narrowband format in asynchronous multiplexer that provides firewall currency, in response to new alarms, and transmit the user information from the asin is

17. The method of operation of a communication system for providing call using the virtual connection in which the user places the call by transmitting signaling to call in a communication system and transmission of user data connection access for the call, the system contains many compounds of access, many multiplexers asynchronous transfer mode (ATM), which provides firewall currency, United with access connections, a system for processing alarms related to ATM multiplexers, providing firewall, exchange, and ATM cross-connection, connected to the ATM multiplexer that provides firewall, exchange, and implemented to provide multiple virtual connections between the ATM multiplexer that provides firewall currency, characterized in that provide the user with a first connection access to the first ATM multiplexer, providing firewall, exchange, receive signaling for call processing system alarms, process the signaling for call processing system signaling to select a virtual connection from the first ATM multiplexer, providing firewall, exchange, pore the WMD connection access to the second ATM multiplexer, providing firewall, exchange, generate a system alarm first new signal for the call that identifies the first connection and access the selected virtual connection and the second new signal for the call that identifies the selected virtual connection and the second connection access, transmit the first signal to the first ATM multiplexer that provides firewall currency, and a new second signal to the second ATM multiplexer, providing firewall, exchange, accept user information for the call from the first connection of access to the ATM multiplexer that provides firewall, exchange, convert the user information of the first connection access in ATM data elements, to identify the selected virtual connection, in the first of the ATM multiplexer that provides firewall currency, in response to the first signal, and transmit ATM data elements from the first ATM multiplexer that provides firewall currency, through the ATM cross-connection on the selected virtual connection to the second ATM multiplexer, providing firewall, exchange, convert ATM data elements that identify the selected virtual is Especiales firewall currency, in response to the second new signal, transmit the user information from the second ATM multiplexer, providing firewall, exchange, on the second connection access.

18. The method according to p. 17, wherein when receiving the signaling for the call accept message call setup.

19. The method according to p. 17, wherein when receiving the signaling for the call accept message to the source address of the signaling system # 7.

20. The method according to p. 17, wherein when receiving the user information for the call from the first connection access accept user information from the connection of the digital signal level zero (DSO).

21. The method according to p. 17, wherein when receiving the user information for call accept speech information.

22. The method according to p. 17, wherein the virtual connection is chosen based on the number dialed.

23. The method according to p. 17, wherein the virtual connection is chosen on the basis of the call type NOO.

24. The method according to p. 17, wherein the virtual connection is chosen on the basis of processing a call to a virtual private network.

25. The method according to p. 17, otlichayushiesya subscriber/terminal.

26. The method of operation of a communication system for providing call using the virtual connection in which the user places the call by transmitting signaling to call in a communication system and transmission of user information in a communication system for connection access for the call, the system contains many compounds of access, plenty of ATM multiplexers, providing firewall currency, United with access connections, multiple processors alarm associated with each other and with ATM multiplexers, providing firewall, exchange, and ATM cross-connection, connected to the ATM multiplexer that provides firewall, exchange, and implemented to provide multiple virtual connections between the ATM multiplexer that provides firewall currency, characterized in that provide the user with a first connection access to the first ATM multiplexer, providing firewall, exchange, accept the first signal to call in the first processor signaling, to process the first signal to the first processor signaling to select a virtual connection for the call from the first ATM multiplexer, providing firewall, exchange, and to select for the call connected to the second ATM multiplexer, providing firewall, exchange, generate a second signal in the first processor signaling that identifies the selected virtual connection and the above-mentioned paragraph, transmit the second signal to the second processor signaling, to process the second signal in the second processor signal for selecting the second connection access for the call from the second ATM multiplexer that provides firewall currency, the said item, generate a third signal in the first processor signaling that identifies the first connection and access the selected virtual connection, transmit a third signal to the first ATM multiplexer, providing firewall, exchange, generate a fourth signal in the second processor signaling that identifies the selected virtual connection and the second connection access, transmit a fourth signal to the second ATM multiplexer, providing firewall, exchange, accept user information for the call from the first connection access in the first of the ATM multiplexer that provides firewall, exchange, convert the user information of the first connection, access the e, providing firewall currency, in response to the third signal, transmit ATM elements from the first ATM multiplexer that provides firewall currency, through the ATM cross-connection on the selected virtual connection to the second ATM multiplexer, providing firewall, exchange, convert ATM data elements that identify the selected virtual connection, the user information corresponding to the second connection of the access, the second of the ATM multiplexer that provides firewall currency, in response to the fourth signal, and transmit the user information from the second ATM multiplexer, providing firewall, exchange, on the second connection to access this item.

27. The method according to p. 26, wherein when receiving the first signal for a call accept message call setup.

28. The method according to p. 26, wherein when receiving the first signal for a call accept message to the source address of the signaling system # 7.

29. The method according to p. 26, characterized in that when receiving the user information for the call from the first connection access accept user information from the connection of the digital signal zero FA receive speech information.

31. The method according to p. 26, wherein selecting the virtual connection, select the virtual connection based on the number dialed.

32. The method according to p. 26, wherein the virtual connection is chosen on the basis of the call type NOO.

33. The method according to p. 26, wherein the virtual connection is chosen on the basis of processing a call to a virtual private network.

34. The method according to p. 26, wherein the virtual connection is chosen on the basis of processing of the call, providing service to a mobile subscriber terminal.

35. Communication system for providing call that contains the processor alarm and asynchronous multiplexer that provides firewall currency, and the processor alarm ensures the reception of the signaling for the call from the user, and asynchronous multiplexer that provides firewall currency; receiving user information from a specific connection from a user, wherein the processor of the alarm system is configured to process the signaling for the call to select a virtual identifier for the call and for generating and transmitting a new alarm that identifier the firewall currency, to convert user information in the asynchronous data from the selected virtual identifier, in response to new alarms and to transmit asynchronous data from asynchronous multiplexer that provides firewall currency, using the selected virtual identifier, and the communication link between the processor alarm and asynchronous multiplexer that provides firewall currency, to transfer new alarm processor alarm to asynchronous multiplexer that provides firewall currency.

36. System p. 35, characterized in that it contains ATM cross-connection connected with asynchronous multiplexer that provides firewall, exchange, and executed to provide multiple virtual connections with asynchronous multiplexer that provides firewall currency.

37. Asynchronous multiplexer that provides firewall, exchange, containing the access interface for receiving user information for each call from a particular connection for this call, the processor asynchronous adaptation associated with the access interface, to convert the user data from a particular connection dlis, associated with the processor asynchronous adaptation for transmission of asynchronous data for each call using a virtual identifier for this call, characterized in that it contains a control interface for receiving signaling for each call that identifies a particular connection and the virtual identifier for this call, the processor asynchronous adaptation associated with the management interface, and the conversion of user information from a specific connection for each call in the asynchronous data is carried out in response to the alarm for this call.

38. The multiplexer under item 37, wherein the access interface comprises an interface digital signal level zero (DSO).

39. The multiplexer under item 37, wherein the access interface comprises an interface digital signal of the first level (DS1).

40. The multiplexer under item 37, wherein the access interface comprises an interface digital signal of the third level (DS3).

41. The multiplexer under item 37, wherein the access interface comprises an interface of the optical channel of the third level (OS-3).

42. The multiplexer on p. 37, characterized t is on p. 37, wherein the access interface comprises an interface of the first level of multiplexing (E1).

44. The multiplexer under item 37, wherein the access interface comprises an interface of the third level of multiplexing (E3).

45. The multiplexer under item 37, wherein the alarm for each call identifies the specific connection of a digital signal level zero (DSO) for this call.

46. The multiplexer under item 37, wherein the asynchronous interface includes interface optical channel of the third level (OS-3).

47. The multiplexer under item 37, wherein the asynchronous interface includes interface fibre channel level 12 (OC-12).

48. The multiplexer on p. 37, characterized in that the said particular connection and the connection is identified by a virtual identifier for each call are bi-directional and asynchronous interface provides asynchronous reception data containing user information from the connection identified by the virtual identifier for each call, the processor asynchronous adaptation converts the asynchronous data from the connection, identifiy for each call, and the access interface provides transmission of user information from the connection identified by the virtual identifier for each call on a specific connection for this call.

49. Asynchronous multiplexer that provides firewall, exchange, containing the access interface for receiving user information for each call from a particular connection for this call, the asynchronous processor adapted to convert the user data from a particular connection for each call in the asynchronous data with a virtual identifier for this call and an asynchronous interface associated with the processor asynchronous adaptation for transmission of asynchronous data for each call using a virtual identifier for this call, characterized in that it contains a control interface for receiving signaling for each call that identifies a particular connection, the virtual identifier and the requirements of the CSO for this call, the digital signal processor associated with the access interface and the management interface, providing digital processing of user information for each call the signals, and the control interface, moreover, the conversion of user information from a specific connection for each call in the asynchronous data is performed in response to the alarm for this call.

50. The multiplexer on p. 49, wherein the digital signal processor provides control of the echo signals.

51. The multiplexer on p. 49, wherein the digital signal processor provides encryption.

52. The multiplexer on p. 49, wherein the digital signal processor provides the compressed digital speech signal.

53. The multiplexer on p. 49, wherein the digital signal processor provides adjustment of the level in decibels for calls.

54. Communication system for transmitting user information for call that contains a lot of connections access for transmission and reception of user information, many asynchronous multiplexers, providing firewall currency, United with access and connections for the transmission and reception of the user information to access connections and the transmission and reception of asynchronous data using multiple virtual identifiers, system asynchronous routing, congesta virtual identity between asynchronous multiplexers, providing firewall currency, and the means of processing the signaling to receive the first signal for the call, wherein the said alarm means provides a first signal to call for the identification of the first connection access, used to call, to identify the first asynchronous multiplexer that provides firewall currency connected with the first connection access, to select a virtual identifier for the call from the first asynchronous multiplexer that provides firewall currency, to the second asynchronous multiplexer that provides firewall, exchange, and for selecting the second connection access, connected to the second asynchronous multiplexer that provides firewall, exchange, the system further comprises a means of generating alarms associated with means for processing the signaling to generate a second signal for transmission to the first asynchronous multiplexer that provides firewall currency, which identifies the first connection access and virtual identifier, and to generate a third signal for transmission to the second asynchronous multiplexer providing magnetemarelli for sending a second signal to the first asynchronous multiplexer, providing firewall, exchange, and for sending a third signal to the second asynchronous multiplexer that provides firewall currency, first means for adaptation in the first asynchronous multiplexer that provides firewall currency, for receiving the second signal and in response to the conversion of user information of the first connection access in the asynchronous data with the virtual identifier and converting the asynchronous data in the user information corresponding to the first connection and the second tool of adaptation in the second asynchronous multiplexer that provides firewall currency, for receiving the third signal and in response to converting the asynchronous data in the user information corresponding to the second connection access and to convert the user data from the second connection access in the asynchronous data that identifies the virtual identifier.

55. The system under item 54, wherein the first signal is a message source address signaling system # 7.

56. The system according to p. 54, characterized in that the first connection access is a digital connection C is dstanley a speech information.

58. The system under item 54, wherein the virtual connection is selected based on the number dialed.

59. The system under item 54, wherein the virtual connection is selected on the basis of the call type NOO.

60. The system under item 54, wherein the virtual connection is selected on the basis of processing a call to a virtual private network.

61. The system under item 54, wherein the virtual connection is selected on the basis of processing of the call, providing service to a mobile subscriber terminal.

 

Same patents:

The invention relates to telecommunications systems and can be used in systems for receiving digital data broadcasting systems

The invention relates to a method of simultaneous transmission of signals, which can prevent the reduction of the rate of admission due to the phase difference signal generated by dispersing time of data transmission from the base station in the overlap of signals between the main stations in a paging system with many main stations

The invention relates to the field of digital technology and can be used for softening and kaylamichaely digital streams at various levels of the hierarchical seal

The invention relates to a method for switching a mobile station from the first working channel of the base station on the second channel the other intended for further work - base station comprising a mobile communication system

The invention relates to communication systems and can be used when sending messages through the channel with variable timing characteristics

The invention relates to digital communication systems and can be used in communication networks, in particular in apparatus for the formation and separation of digital streams

The invention relates to a multi-channel communication system constructed according to the principle of "each other, and can be used in systems synchronization of such systems

The invention relates to a multi-channel communication system constructed according to the principle of "each other, and can be used in systems synchronization of such systems

The invention relates to the field of telecommunication and can be used in devices multi-channel communication systems with asynchronous operation of terminal equipment

The invention relates to telecommunication and can be applied to organizational duplex two-wire digital subscriber lines while maintaining the telephone in tonal frequency range

The invention relates to a device for determining time delay in multipath propagation of the signal in the demodulation mode signal communication channel return line mobile systems using the method of multiple access, code-division

FIELD: electronic mailing technologies.

SUBSTANCE: method for notification of user about receipt of electronic mail message by mail center, wherein information is stored, related to mail accounts, assigned to identifiers of decoder receivers, enables transfer of notification message in broadcast signal, while notification message includes at least additional portion of text of electronic mail message and identifier of decoder receiver targeted as destination for current notification message. Described transmission is realized by appropriate devices and decoder receivers.

EFFECT: decreased load of addressed transmission channel.

3 cl, 7 dwg

FIELD: information technologies.

SUBSTANCE: cooperative server-based invocation is run by e-mail. When user creates e-mail message with attachments, web-site for cooperative invocation is provided. Web-site for cooperative invocation allows to message receivers for cooperative attachment invocation. Thus user scores both advantage of cooperative e-mail attachment invocation usability, and advantages of server for cooperative invocation.

EFFECT: simplified system and cooperative server control method.

42 cl, 3 dwg

FIELD: information technology.

SUBSTANCE: invention relates to reliable message exchange systems. The software model allows for independent configuring warranties and features for transfer of messages. Configurable warranties can be chosen from message delivery at least once, biggest message delivery once, message delivery on request and life cycle of the message.

EFFECT: provision for a single software model for accessing several different means of transferring messages when designing one or more applications for delivering messages between two terminal points.

47 cl, 4 dwg

FIELD: information technology.

SUBSTANCE: invention discloses a method and a machine-readable medium for previewing and performing operations on e-mail attachments. A first window area containing a list of e-mail messages and information which identifies any e-mail attachments is displayed. When an attachment is selected, a preview is generated and displayed for that attachment in a second window area adjacent to the first window area. Operations which can be performed on the attachments are also identified and made available. One provided operation enables fast creation of a replay message to an e-mail message which includes an altered version of the initial attachment.

EFFECT: performing operations on e-mail attachments.

9 cl, 5 dwg

FIELD: information technology.

SUBSTANCE: single-chip computer includes at least one first processor core and at least one second processor core constructed on a common chip. The at least one first and the at least one second processor cores are interconnected via a processor interface. Data can be read via a separate or common memory interface from a separate or common data memory respectively and/or stored in said data memory. The single-chip computer includes an encryption and decryption unit which is assigned to the at least one second processor core and which is constructed and functionally arranged between the at least one second processor core and the memory interface in such a way that data which can be exchanged between the at least one second processor core and the data memory can be encrypted and decrypted by the encryption and decryption unit.

EFFECT: data protection through physical and logical separation of processor cores on the chip.

4 cl, 1 dwg

FIELD: information technology.

SUBSTANCE: mobile telephone (12) requests information from a remote source (104), wherein the request includes the amount of available memory (20) in the mobile telephone (12) and if needed, may include user preferences. The request is sent from the mobile telephone (12) to the remote source (104). In response based on the request, the mobile telephone (12) receives content, where said content corresponds to a predetermined area of the available memory and is stored in the memory (20). The memory (20) is dynamically updated when the user writes content as user information into the memory in order to account for conversion of said at least one content element into user information so that memory available for loading content decreases with increase in memory for writing user information, so that the updated amount of available memory is accounted for in the amount of available memory which must be reported in the next content request.

EFFECT: providing users with a method of selecting new products, services or adding multimedia content into the memory of a mobile telephone with minimal interaction.

12 cl, 14 dwg

FIELD: information technologies.

SUBSTANCE: system for rendering of multimedia content made up into many sets of ordered multimedia samples, comprising the following: a dispatcher of multimedia content, arranged as capable of rendering the first set of multimedia samples from the first source of multimedia and rendering the second sent of multimedia samples from the second source of multimedia; a dispatcher of representation, arranged as capable of communication with the dispatcher of multimedia content and possibility to identify, when the first multimedia sample from the first set must be prepared through rendering simultaneously with the second multimedia sample from the second set; and a dispatcher of memory distribution, reacting at actions of the multimedia content dispatcher and the representation dispatcher, besides, the memory distribution dispatcher controls the jointly used memory pool.

EFFECT: efficient dynamic highlighting of jointly used memory with simultaneous processing of data.

20 cl, 7 dwg

FIELD: information technologies.

SUBSTANCE: messages filtered on a mail server and recognised as a virus and spam are not only marked, moved to a different mail box or deleted, but also copies of such letters are returned to a sender, as a result its mailbox is overfilled and blocked, and sending of unauthorised bulk e-mail from this address stops. Mailboxes of e-mail servers must be adjusted so that in case of overfilling they become blocked, interrupting mailing.

EFFECT: provision of high extent of protection of information resources of a computer network against unauthorised access of users of a global information network as e-mail messages are exchanged.

2 cl

Up!