H04L65/1036

DOHERTY AMPLIFIER CIRCUITS

A Doherty amplifier circuit comprising: a splitter having: a splitter-input-terminal for receiving an input signal; a main-splitter-output-terminal; and a peaking-splitter-output-terminal; a main-power-amplifier having a main-power-input-terminal and a main-power-output-terminal, wherein; the main-power-input-terminal is connected to the main-splitter-output-terminal; and the main-power-output-terminal is configured to provide a main-power-amplifier-output-signal; a peaking-power-amplifier having a peaking-power-input-terminal and a peaking-power-output-terminal, wherein: the peaking-power-input-terminal is connected to the peaking-splitter-output-terminal; and the peaking-power-output-terminal is configured to provide a peaking-power-amplifier-output-signal. The splitter, the main-power-amplifier and the peaking-power-amplifier are provided by means of an integrated circuit.

REALM TRANSLATION IN AN IMS NETWORK
20180007533 · 2018-01-04 ·

Various embodiments of the present technology allow multi-realm support at US-CSCF to IMS by the same I/S-CSCF nodes. Some embodiments allow for a registration message to be received from an IMS client. The registration message can be used to establish, through an Internet Protocol Multimedia Subsystem (IMS) core network, a service between a first endpoint associated with a first realm and a second endpoint associated with a second, different realm. The registration message can be translated so that the second endpoint believes the first endpoint is associated with the second realm before being transmitted to the second endpoint. Upon receiving a successful IMS registration message from the IMS core network, a binding can be created between the first endpoint and the second endpoint.

Technique for enabling signaling message correlation

A technique for enabling signaling message correlation in a telecommunication network is disclosed. A method implementation of the technique is performed by a network node in the telecommunication network and includes receiving a first signaling message as part of a signaling procedure among a plurality of network nodes in the telecommunication network, the first signaling message being transmitted using a first signaling protocol and including a correlation identifier being propagated along a message flow of the signaling procedure, and triggering transmitting a second signaling message as part of the signaling procedure using a second signaling protocol different from the first signaling protocol, wherein the correlation identifier of the first signaling message is incorporated into the second signaling message for further propagation.

Obtaining services through a local network

One or more endpoints may be registered with a gateway at a premises. The gateway may include local physical interfaces for communicating with a first subset of the endpoints. The gateway may further include Session Initiation Protocol (SIP) proxy servers for communicating with a second subset of the endpoints. Incoming communications to the premises may be routed by the gateway to one or more of the endpoints via the local physical interfaces or the SIP proxy servers. One or more endpoints may initiate outgoing communications via the local physical interfaces or the SIP proxy servers.

Context based firewall service for agentless machines

A system and method for performing firewall operations on an edge service gateway virtual machine that monitors traffic for a network. The method includes detecting, from a directory service executing on a computing device, a login event on the computing device, obtaining, from the detected login event, login event information comprising an identifier that identifies a user associated with the login event, storing the login event information as one or more context attributes in an attribute table, and applying a firewall rule to a data message that corresponds to the one or more context attributes.

Trust management mechanisms

Systems, methods, and computer-readable media are provided for managing mutual and transitive trust relationships between resources, such as Fog/Edge nodes, autonomous devices (e.g., IoT devices), and/or analog/biological resources to provide collaborative, trusted communication over a network for service delivery. Disclosed embodiments include a subject resource configured to assign an observed resource to a trust zone based on situational and contextual information. The situational information may indicate a vector of the observed resource with respect to the subject resource. The contextual information may be based in part on whether a relationship exists between the subject resource and the observed resource. The subject resource is configured to determine a trust level of the observed resource based on the determined trust zone. Other embodiments are disclosed and/or claimed.

Methods and apparatus for efficient load balancing among microservices and/or processing entities

The present invention is directed to communications methods and apparatus for efficiently distributing traffic to processing entities. An exemplary method includes the steps of: receiving, at a first Session Initiation Protocol (SIP) load balancer (SLB), a first SIP INVITE message; selecting, at the first SLB, which Session Border Controller (SBC) in a first cluster of SBCs to send the first SIP invite message based on a message allocation weight determined based on message loss information corresponding to different SBCs in the first cluster of SBCs, the selecting including allocating a portion of incoming received SIP INVITE messages to an individual SBC based on a message loss rate corresponding to the individual SBC and the message allocation rate, said selecting including selecting a first SBC from the first cluster of SBCs to send said first SIP INVITE message, and sending the first SIP INVITE message to the first SBC.

METHOD FOR IMPLEMENTING GRE TUNNEL, ACCESS POINT AND GATEWAY

A method for implementing a generic routing encapsulation (GRE) tunnel, an access point (AP), and a network system. The method includes establishing a Control And Provisioning of Wireless Access Points (CAPWAP) tunnel with an access controller (AC), receiving addresses of at least two gateways, establishing at least two GRE tunnels coupled to the gateways respectively according to the addresses of the at least two gateways, and selecting one of the at least two GRE tunnels to transmit data.

Media interaction method in DECT network cluster

The present application discloses a media interaction method in a Digital Enhanced Cordless Telecommunications (DECT) network cluster. Communication with a DECT host is established through a DECT network cluster constructed in advance, to obtain first account information allocated by the DECT host, and information of a first call request to call a second account is sent to the DECT host, so as to make a call to the second account in a first communication manner. If no Real-time Transport Protocol (RTP) from the second account is received, information of a second call request to call the second account is sent to the DECT host, so as to make a call to the second account in a second communication manner. Embodiments of the present disclosure can solve the technical problem of a communication failure and reduce a waiting time for communication, thereby achieving optimal Voice over Internet Protocol (VOIP) call experience.

CONTROL APPARATUS, CONTROL METHOD AND PROGRAM
20220360611 · 2022-11-10 ·

A control device 1 includes a storage unit 13 that stores an upper limit value of the number of calls that can be processed in a predetermined time using a session boarder controller (SBC) and an upper limit value of the number of signal conversion rules that can be processed using the SBC, and an arithmetic operation unit 11 that allocates, to the SBC, an operator the number of calls of which is maximum from among a plurality of operators using the number of calls and the number of signal conversion rules for each operator and determines a combination of operators to be allocated to the SBC from among remaining operators such that an unused resource related to the number of calls and the number of signal conversion rules in the SBC becomes minimum, using the upper limit value of the number of calls and the upper limit value of the number of signal conversion rules read from the storage unit 13.