Abstract:
A precautionary measure against wireline-device triggered bombs is described that restricts call terminations within a designated security risk area without shutting down an entire telephone office switch serving the affected area. Embodiments described herein provide for restricting wireline call terminations directed to a designated security risk area that are originated from non-privileged users, i.e., the general public, yet authorizing call terminations directed to the security risk area that are originated from privileged government users (e.g., GETS/WPS users). Call originations are permitted within the security risk area from both privileged and non-privileged users.
Abstract:
A precautionary measure against cell-phone triggered bombs is described that restricts call terminations within a designated security risk area without shutting down the entire network. Embodiments described herein provide for restricting call terminations directed to a designated security risk area that are originated from non-privileged users, i.e., the general public, yet authorizing call terminations directed to the security risk area that are originated from privileged government users (e.g., GETS/WPS users). Call originations are permitted within the security risk area from both privileged and non-privileged users.
Abstract:
A precautionary measure against wireline-device triggered bombs is described that restricts call terminations within a designated security risk area without shutting down an entire telephone office switch serving the affected area. Embodiments described herein provide for restricting wireline call terminations directed to a designated security risk area that are originated from non-privileged users, i.e., the general public, yet authorizing call terminations directed to the security risk area that are originated from privileged government users (e.g., GETS/WPS users). Call originations are permitted within the security risk area from both privileged and non-privileged users.
Abstract:
A precautionary measure against cell-phone triggered bombs is described that restricts call terminations within a designated security risk area without shutting down the entire network. Embodiments described herein provide for restricting call terminations directed to a designated security risk area that are originated from non-privileged users, i.e., the general public, yet authorizing call terminations directed to the security risk area that are originated from privileged government users (e.g., GETS/WPS users). Call originations are permitted within the security risk area from both privileged and non-privileged users.
Abstract:
A network is provided that includes: a central node (30) and a plurality of other nodes (32); a plurality of first communication links (34) interconnecting the central node (30) to the plurality of other nodes (32) to form a star network topology; and, a plurality of second communication links (36) interconnecting the plurality of other nodes (32) to form a mesh network topology.
Abstract:
A method for regulating a call placement rate (CPR) of an autodialer (AD) (100) includes: measuring a time delay between a first event and a second event; and, adjusting the CPR of the AD (100) in response to the measured time delay.
Abstract:
A precautionary measure against wireline-device triggered bombs is described that restricts call terminations within a designated security risk area without shutting down an entire telephone office switch serving the affected area. Embodiments described herein provide for restricting wireline call terminations directed to a designated security risk area that are originated from non-privileged users, i.e., the general public, yet authorizing call terminations directed to the security risk area that are originated from privileged government users (e.g., GETSAVPS users). Call originations are permitted within the security risk area from both privileged and non- privileged users.
Abstract:
A precautionary measure against wireline-device triggered bombs is described that restricts call terminations within a designated security risk area without shutting down an entire telephone office switch serving the affected area. Embodiments described herein provide for restricting wireline call terminations directed to a designated security risk area that are originated from non-privileged users, i.e., the general public, yet authorizing call terminations directed to the security risk area that are originated from privileged government users (e.g., GETSAVPS users). Call originations are permitted within the security risk area from both privileged and non- privileged users.
Abstract:
The application relates priority services such as the Government Emergency Telecommunication Service GETS or the Wireless Priority Service WPS which provide priority service to National Security/Emergency Preparedness personnel. In times of emergency or crisis or because of natural or other catastrophes, telecommunication networks can become congested. Throttling mechanisms such as call gapping are employed to limit the number of priority call/session requests accepted from a give source and/or handled by a given network node. However, present mechanisms rely on historical traffic levels rather than adapting to actual traffic level. This problem is solved in that parameters of the call gapping function are dynamically regulated. The method includes: monitoring a rate at which priority service requests are received at a node of the network; comparing the rate to a threshold; disabling a gapping function for priority service traffic when the rate is less than the threshold; enabling the gapping function for priority service traffic when the rate is not less than the threshold, and, dynamically regulating a parameter of the gapping function when the gapping function is enabled.
Abstract:
A precautionary measure against cell-phone triggered bombs is described that restricts call terminations within a designated security risk area without shutting down the entire network. Embodiments described herein provide for restricting call terminations directed to a designated security risk area that are originated from non- privileged users, i.e., the general public, yet authorizing call terminations directed to the security risk area that are originated from privileged government users (e.g., GETS/WPS users). Call originations are permitted within the security risk area from both privileged and non-privileged users.