Patent application number | Description | Published |
20090030693 | AUTOMATED NEAR-END DISTORTION DETECTION FOR VOICE COMMUNICATION SYSTEMS - In one embodiment, a method for providing voice quality assurance is provided. The method determines voice information for an end point in a voice communication system. The voice information may be from an ingress microphone. The method determines if the voice quality is considered degraded based on an analysis of the voice information. For example, the voice information may indicate that it is distorted, too loud, too soft, is subject to an external noise, etc. Feedback information is determined if the voice quality is considered degraded where the feedback information designed to improve voice quality at an ingress point for a user speaking. The feedback information is then outputted at the end point to the user using the end point. | 01-29-2009 |
20090074012 | BUFFERING A MEDIA STREAM - An apparatus and method of buffering a media stream is provided. The method may comprise receiving a plurality of IP packets of the media stream, each packet providing a fragment of a portion of the media stream. Thereafter, the portion of media stream may be buffered in a jitter buffer using the fragments provided by the received packets. Further, the portion of the media stream may be buffered in a replay buffer using the fragments provided by the received packets. The replay buffer may be larger than the jitter buffer and a first received fragment and a second received fragment may be combined. The second received fragment may have been discarded by the jitter buffer. A media stream may then be played back using media from the replay and/or jitter buffer. | 03-19-2009 |
20100135481 | ECHO MITIGATION IN A CONFERENCE CALL - In an example embodiment, an example method is provided for echo mitigation in a conference call. In this method, a test audio signal is transmitted to a conference endpoint and as a result, an echo associated with the transmittal of the test audio signal is received. One or more parameters of the echo are then identified and an echo mitigation process is selected from multiple echo mitigation processes based on the identified parameters. The selected echo mitigation process is then applied. | 06-03-2010 |
20110090798 | SYSTEM AND METHOD FOR PROVIDING TROUBLESHOOTING IN A NETWORK ENVIRONMENT - An example method is provided and includes identifying a change in header information within a packet of a communication flow. The change in header information reflects a predetermined type of header change that signifies a degradation condition for the communication flow. The method also includes changing a header field within an outgoing frame to initiate a trace through a network path. Diagnostic data associated with the communication flow can be collected. In more particular embodiments, the changing of the header field includes changing an Ethernet header field for a layer two frame, or changing an Internet Protocol (IP) header field for a layer three frame. Changing of the header field can also include changing a field within an outgoing layer three header to identify an IP socket associated with the communication flow. The change to the header field can be propagated by network elements along the network path. | 04-21-2011 |
20120063332 | SYSTEM AND METHOD FOR DETERMINING AND CONTROLLING LOOPBACK POINTS IN A NETWORK ENVIRONMENT - A method is provided in one example and includes establishing a path for a media session between a first network element and a second network element. A third network element is detected along the path. A response is received from the third network element indicating that it is capable of performing a loopback activity that involves the first network element. A test packet is communicated from the first network element to the third network element in order to evaluate characteristics associated with the media session. In more specific implementations, the response includes an indication as to a proximity of the third network element in relation to the first network element. The first network element can receive additional responses from a plurality of network elements such that the first network element generates a list of available network elements for performing loopback activities. | 03-15-2012 |
20130095799 | Voicemail System with Quality Assurance - In one embodiment, a method for ensuring quality of a media message is provided. The method includes receiving information for a media message. At least a portion of the media is analyzed to determine a media quality for the media message. The method then determines if the media quality is acceptable. If the media quality is not acceptable, then an alert may be sent regarding the media quality of the media message. For example, a caller may be prompted to re-record a media message. | 04-18-2013 |
20130230152 | ECHO MITIGATION IN A CONFERENCE CALL - In an example embodiment, an example method is provided for echo mitigation in a conference call. In this method, a test audio signal is transmitted to a conference endpoint and as a result, an echo associated with the transmittal of the test audio signal is received. One or more parameters of the echo are then identified and an echo mitigation process is selected from multiple echo mitigation processes based on the identified parameters. The selected echo mitigation process is then applied. | 09-05-2013 |
20150063158 | Wireless Network Flow Monitoring - Techniques are presented herein for enabling performance monitoring of flows within a management and provisioning tunnel used for communicating packets between a wireless controller and wireless access point devices. A wireless controller that is configured to communicate with at least one wireless access point obtains a packet to be sent to the wireless access point for wireless transmission in a wireless network by the wireless access point. The wireless controller identifies, based on the packet, traffic session flow information associated with the packet. The wireless controller encapsulates the packet with a tunneling header that comprises the traffic session flow information and sends the encapsulated packet to the wireless access point. The tunneling header may also comprise an application identifier (ID) associated with the packet. | 03-05-2015 |