会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 26. 发明申请
    • REDUNDANCY ACTIVATION FOR VOICE OVER INTERNET TRANSMISSIONS
    • 通过互联网传输进行冗余活动
    • WO2007089183A1
    • 2007-08-09
    • PCT/SE2006/050118
    • 2006-05-12
    • TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    • HANNU, HansERICSON, MårtenWÄNSTEDT, Stefan
    • H04L1/18H04L29/06H04L12/26H04L12/56
    • H04L47/14H04L1/0009H04L1/0014H04L1/0015H04L1/0025H04L1/08H04L12/6418H04L43/026H04L43/0852H04L43/087H04L43/16H04L47/10H04L47/11H04L47/18H04L47/2416H04L47/2441H04L47/25H04L47/263H04L47/283H04L47/29H04L47/30H04L47/32H04L47/33H04L47/38H04W28/12
    • Adaptive redundancy is implemented (either switched on or off) for a voice over internet protocol (VoIP) packet connection by a basic two step approach. A first step of adaptive redundancy implementation involves monitoring relevant sources or indicators to determine when the need for redundancy (e.g., redundancy coding) may arise. The monitored sources can be one or more of a transmission buffer(s); a receiving buffer(s): sender and/or receiver statistics. An example of such statistics are the statistics which can be obtained from RTCP protocol, e.g., number of packets/data bytes sent, number of packets/data bytes lost, jitter, etc. A second step of adaptive redundancy implementation involves the triggering of redundancy implementation events when the monitored sources reach or obtain certain threshold value(s) (threshold). Examples of such thresholds (one or more of which may be utilized) include: a number of packets (or bytes of data) in an transmission buffer; a number of lost packets (or bytes of data) calculated from a reception buffer; and, requisite sender and receiver statistics (such as number of packets/data bytes sent and/or being lost has reached a maximum/minimum amount). Examples of the second step implementation events thusly triggered include one or more of the following: ( 1 ) dropping or removing a number of packets (or bytes of data) in the transmission buffer, and (2) triggering a signaling message to the sending client and/or receiving client to switch on/off redundancy coding. The first and second steps of redundancy implementation can be repeated as needed. Scenarios of adaptive redundancy implementation include both network-initiated implementations (e.g.. implementations initiated by a radio access network (RAN)) and mobile-initiated implementations (e.g.. implementations initiated by a wireless station).
    • 通过基本的两步法,通过互联网协议(VoIP)数据包连接实现自适应冗余(打开或关闭)。 自适应冗余实现的第一步包括监视相关源或指示符,以确定何时可能出现冗余需求(例如,冗余编码)。 所监视的源可以是传输缓冲器中的一个或多个; 接收缓冲区:发送者和/或接收者统计信息。 这种统计的一个例子是可以从RTCP协议获得的统计数据,例如发送的数据包/数据字节数,丢包数/数据字节数,抖动等。自适应冗余实现的第二步包括触发冗余 监控源达到或获得某个阈值(阈值)时的实施事件。 这种阈值(其一个或多个可以被利用)的示例包括:发送缓冲器中的数量的数据包(或数据字节) 从接收缓冲器计算的许多丢失分组(或数据字节); 并且所需的发送方和接收方统计信息(例如发送和/或丢失的数据包数目/数据字节数达到最大/最小数量)。 因此触发的第二步骤实施事件的示例包括以下一个或多个:(1)删除或删除发送缓冲器中的多个分组(或数据字节),以及(2)向发送客户端触发信令消息 和/或接收客户端以开/关冗余编码。 可以根据需要重复冗余实现的第一和第二步骤。 自适应冗余实现的情况包括网络发起的实现(例如,由无线电接入网络(RAN)发起的实现)和移动发起的实现(例如由无线站发起的实现)。