Voice over IP (VoIP) network infrastructure components and method
First Claim
1. A method, comprising:
- receiving a registration indicating an endpoint is utilizing a first network layer address;
processing a communication on behalf of the endpoint, wherein the communication is processed using a call peer that is bound to the first network layer address;
applying a first topology hiding policy to the communication;
receiving an updated registration indicating the endpoint is utilizing a second network layer address;
binding the call peer to the second network layer address; and
applying a second topology hiding policy to the communication.
15 Assignments
0 Petitions
Accused Products
Abstract
A voice over Internet protocol communication system and method provides infrastructure components as intermediaries between networks, the components include multi-protocol session controllers and a multi-protocol signaling switch as well as a management system. The session controllers process calls and participate in the calls that flow through it. The session controllers process calls that are either at the edge of the network or at the core of the voice over Internet protocol network. The session controllers associate calls with one another in call peers for incoming calls as ingress call peers and for outgoing calls as egress call peers. A centralized database of call routing policies is provided to the session controllers. The session controllers provide cost management, topology hiding, and inter-working, or conversion, of calls from SIP networks to H.323 networks for both voice and video.
128 Citations
19 Claims
-
1. A method, comprising:
-
receiving a registration indicating an endpoint is utilizing a first network layer address; processing a communication on behalf of the endpoint, wherein the communication is processed using a call peer that is bound to the first network layer address; applying a first topology hiding policy to the communication; receiving an updated registration indicating the endpoint is utilizing a second network layer address; binding the call peer to the second network layer address; and applying a second topology hiding policy to the communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable storage device having program instructions stored thereon that, upon execution by a processor of a session border controller, cause the session border controller to:
-
receive a registration indicating an endpoint is utilizing a first network layer address; process a Voice over Internet Protocol (VoIP) call on behalf of the endpoint wherein the VoIP call is processed using a call peer that is bound to the first network layer address; apply a first topology hiding policy to the VoIP call; receive an updated registration indicating the endpoint is utilizing a second network layer address; bind the call peer to the second network layer address; and apply a second topology hiding policy to the VoIP call. - View Dependent Claims (13, 14, 15)
-
-
16. A Border Session Controller, comprising:
-
a processor; and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the Border Session Controller to; receive a registration indicating an endpoint is utilizing a first network layer address; process a Voice over Internet Protocol (VoIP) call on behalf of the endpoint, wherein the VoIP call is processed using a call peer that is bound to the first network layer address; apply a first topology hiding policy to the VoIP call; receive an updated registration indicating the endpoint is utilizing a second network layer address; binding the call peer to the second network layer address; and applying a second topology hiding policy to the VoIP. - View Dependent Claims (17, 18, 19)
-
Specification