Patent classifications
H04Q2213/13399
Virtualization Method and Apparatus
Provided are a virtualization method and apparatus. The virtualization method applied to a main control board includes that: a resource of a line card board is allocated to a slice of a virtualization system of the main control board, wherein the slice includes: a management slice and/or an ordinary slice; and cross-board communication between the virtualization system of the main control board and a virtualization system of the line card board is implemented by means of communication between the management slice of the main control board and a management slice of the line card board.
Virtual switch fabrics in converged networks
A Fibre Channel over Ethernet (FCoE) network can be inexpensively extended by additional switches (220x) that do not have a full FCoE functionality, e.g. do not have full E-port functionality. The additional switches may or may not have unique Domain IDs. A virtual switch fabric can be extended by such additional switches.
VIRTUAL SWITCH FABRICS IN CONVERGED NETWORKS
A Fibre Channel over Ethernet (FCoE) network can be inexpensively extended by additional switches (220x) that do not have a full FCoE functionality, e.g. do not have full E-port functionality. The additional switches may or may not have unique Domain IDs. A virtual switch fabric can be extended by such additional switches.
Virtual switch fabrics in converged networks
A Fibre Channel over Ethernet (FCoE) network can be inexpensively extended by additional switches (220x) that do not have a full FCoE functionality, e.g. do not have full E-port functionality. The additional switches may or may not have unique Domain IDs. A virtual switch fabric can be extended by such additional switches.
Virtual numbers for intelligence operations
Systems, methods, and computer readable storage mediums are configured for implementing virtual numbers (VN) for intelligence operations involving source-handler communications in support of an agency. Example embodiments implementing virtual numbers eschew the requirement of the agency to maintain and configure dedicated hardware switches that contain SIM card pairs to manage the transfer of source-handler calls in a compliant fashion. Rather than maintaining physical SIMs for each handler and each source with dedicated hardware, each source and each handler are assigned a virtual number for communicating in a compliant fashion. A source communicates with the handler through the handler VN and the hander communicates with the source through the source VN, and communications completed through the VNs are logged for compliance. Communications between a handler and a source may be permitted only when an association of their VNs exists in a mapping table to prevent unauthorized contact through the VNs.
VIRTUAL SWITCH FABRICS IN CONVERGED NETWORKS
A Fibre Channel over Ethernet (FCoE) network can be inexpensively extended by additional switches (220x) that do not have a full FCoE functionality, e.g. do not have full E-port functionality. The additional switches may or may not have unique Domain IDs. A virtual switch fabric can be extended by such additional switches.
Virtual Numbers for Intelligence Operations
Systems, methods, and computer readable storage mediums are configured for implementing virtual numbers (VN) for intelligence operations involving source-handler communications in support of an agency. Example embodiments implementing virtual numbers eschew the requirement of the agency to maintain and configure dedicated hardware switches that contain SIM card pairs to manage the transfer of source-handler calls in a compliant fashion. Rather than maintaining physical SIMs for each handler and each source with dedicated hardware, each source and each handler are assigned a virtual number for communicating in a compliant fashion. A source communicates with the handler through the handler VN and the hander communicates with the source through the source VN, and communications completed through the VNs are logged for compliance. Communications between a handler and a source may be permitted only when an association of their VNs exists in a mapping table to prevent unauthorized contact through the VNs.
Virtual Numbers for Intelligence Operations
Systems, methods, and computer readable storage mediums are configured for implementing virtual numbers (VN) for intelligence operations involving source-handler communications in support of an agency. Example embodiments implementing virtual numbers eschew the requirement of the agency to maintain and configure dedicated hardware switches that contain SIM card pairs to manage the transfer of source-handler calls in a compliant fashion. Rather than maintaining physical SIMs for each handler and each source with dedicated hardware, each source and each handler are assigned a virtual number for communicating in a compliant fashion. A source communicates with the handler through the handler VN and the hander communicates with the source through the source VN, and communications completed through the VNs are logged for compliance. Communications between a handler and a source may be permitted only when an association of their VNs exists in a mapping table to prevent unauthorized contact through the VNs.
Virtual numbers for intelligence operations
Systems, methods, and computer readable storage mediums are configured for implementing virtual numbers (VN) for intelligence operations involving source-handler communications in support of an agency. Example embodiments implementing virtual numbers eschew the requirement of the agency to maintain and configure dedicated hardware switches that contain SIM card pairs to manage the transfer of source-handler calls in a compliant fashion. Rather than maintaining physical SIMs for each handler and each source with dedicated hardware, each source and each handler are assigned a virtual number for communicating in a compliant fashion. A source communicates with the handler through the handler VN and the hander communicates with the source through the source VN, and communications completed through the VNs are logged for compliance. Communications between a handler and a source may be permitted only when an association of their VNs exists in a mapping table to prevent unauthorized contact through the VNs.
MULTIPLE SUBSCRIBER VIDEOCONFERENCING SYSTEM
A system, method, and device for use in videoconferencing. The method typically includes installing a videoconferencing services switch at an access point to an IP network, and registering a plurality of subscribers for videoconferencing services. Each subscriber typically has a plurality of endpoints. The method further includes receiving subscriber-specific settings to be applied to multiple videoconferencing calls from the plurality of endpoints associated with each subscriber. The method further includes storing the subscriber-specific settings at a location accessible to the switch, and configuring the switch to connect calls from the plurality of endpoints at each subscriber based on the corresponding subscriber-specific settings.