共查询到20条相似文献,搜索用时 140 毫秒
1.
在软交换应用服务器的各种实现方案中;基于业务逻辑描述清晰,实现简单,以及同样在开放第三方业务支持上的便捷的考虑,本文提出了对基于CPL脚本语言的应用服务器的研究。用CPL脚本实现的应用可以达到业务逻辑可以和呼叫控制相分离的目的,为满足应用服务器频繁的业务逻辑修改以及丰富的新业务开发提供了最大便利,也为服务器的可靠性提供了很大的支持。 相似文献
2.
提出了一种以软交换为核心完全遵循下一代网络分层结构特点的多媒体会议系统模型,实现了控制、业务与承载相分离。会议应用由业务层的应用服务器、Web服务器和媒体服务器实现,呼叫控制功能由软交换完成,业务媒体流由IP网络承载。实现的原型系统由基于Tomcat开发的Web服务器、基于MOBICENTS开发的会议服务器、支持MSCML(Media Server Control Markup Language)协议的媒体服务器及软交换组成。经测试说明了系统架构设计的合理性和稳定性。 相似文献
3.
本文讨论了如何在 MSCS的基础之上 ,利用 MSCS的某些特性来帮助实现应用服务器的动态负载平衡 ,并实现对会话的支持 . 相似文献
4.
基于SIP的软交换系统中的应用服务器的研究与实现 总被引:2,自引:0,他引:2
NGN现在是通信领域的一大热门话题,在下一代网络的组成元素中,软交换是一个重要组件,是新老网络实现融合的枢纽。文章讨论了SIP协议对呼叫的处理,并详细介绍了软交换系统中应用服务器的具体实现。 相似文献
5.
智能业务和软交换互通的设计与实现 总被引:1,自引:0,他引:1
电信业的快速发展及下一代网络的全面建设促进智能业务与软交换实现互通。文中首先介绍了互通的种类和方案,并重点讲述了智能网和软交换互通过程中模型的重要部分——软交换侧的SSP。在此基础上,提出了智能网和软交换互通的实现方案,并且以智能用的典型业务FPH为例简明分析了方案,对利用业务服务器实现软交换中的智能业务进行了插述和分析。 相似文献
6.
给出了免打扰业务(DND)的定义和使用方法,介绍了软交换技术体系下业务提供的相关技术:软交换系统的层次划分及业务层与控制层的关系,以及智能网技术下智能网能力集2(INAPCS-2)中业务的提供方式和业务触发机制。描述了免打扰业务的功能结构,给出了免打扰业务的设计实现方案,在该方案中主要说明了业务的触发机制、业务的控制指令、业务的总体处理流程以及业务的激活、去活和呼叫拦截的处理流程。 相似文献
7.
我们可以利用监听器(Listener)来实现更准确的在线人数统计。对每一个正在访问的用户,J2EE应用服务器会为其建立一个对应的HttpSession对象。当一个浏览器第一次访问网站的时候,J2EE应用服务器会新建一个HttpSession对象,并触发HttpSession创建事件,如果注册了HttpSessionListener事件监听器,则会调用HttpSessionListener事件监听器的sessionCreated方法;相反,当这个浏览器访问结束超时的时候,J2EE应用服务器会销毁相应的HttpSession对象,触发HttpSession销毁事件,同时调用所注册HttpSessionListener事件监听器的sessionDestroyed方法。 相似文献
8.
9.
10.
在半呼叫模型中,要很好地协调业务控制功能SCF和呼叫控制功能CCF,始终是业务交换功能SSF的难点.本文提出一个SSF模型的建立方案.该模型以单点控制为核心,独立区分上下两层功能单元的命令,灵活满足独立业务的需求,解决多业务的冲突问题,并实现多业务的触发.建立触发检出表EDP、事件检出表TDP和业务冲突表CDP是实现上述功能的重要手段,并结合了会话功能SESSION实现业务的映射,从而建立一个高效的SSF模型. 相似文献
11.
随着软交换网络的不断发展和大规模应用,如何在其上实现录音功能,成为研究的重要课题。分析了传统网协(IP)录音实现方案的原理和缺陷。依据软交换网络的特点,提出了软交换与IP录音服务器之间的接口设计。采用媒体旁路路由的方法,讨论了IP录音在软交换网络中的设计方案,描述了录音的运行流程。利用计算机模拟IP录音服务器的功能,对设计进行了测试,测试结果证明了设计的可行性。 相似文献
12.
基于软交换的视频监控系统设计 总被引:1,自引:0,他引:1
在比较目前各种视频监控系统技术优点的基础上,设计了基于软交换网络的视频监控系统。系统基于VOCAL协议栈设计开发了包括视频监控前端、视频监控用户终端、视频传输方案的整体方案。实现了标准软交换控制器与视频监控用户终端、视频监控前端之间的SIP通信和视频传输。并基于标准软交换服务器实现和验证了该设计方案。使视频监控系统能够在网络融合的大背景下,实现监控业务的融合。 相似文献
13.
14.
15.
基于SIP的软交换在集群通信系统中的设计与实现 总被引:1,自引:0,他引:1
通过对SIP协议的分析和研究,设计一个基于SIP的软交换的解决方案,用以实现在集群通信系统中基站间的联网交换,并且进行相应的SIP用户代理、SIP代理服务器的开发、NAT穿透问题的解决,在公安专网环境下对该系统进行了验证。 相似文献
16.
Suntae Kim Author Vitae Dae-Kyoo Kim Author Vitae 《Journal of Systems and Software》2009,82(8):1211-1231
This paper presents a quality-driven approach to embodying non-functional requirements (NFRs) into software architecture using architectural tactics. Architectural tactics are reusable architectural building blocks, providing general architectural solutions for common issues pertaining to quality attributes. In this approach, architectural tactics are represented as feature models, and their semantics is defined using the Role-Based Metamodeling Language (RBML) which is a UML-based pattern specification notation. Given a set of NFRs, architectural tactics are selected and composed, and the composed tactic is used to instantiate an initial architecture for the application. The proposed approach addresses both the structural and behavioral aspects of architecture. We describe the approach using tactics for performance, availability and security to develop an architecture for a stock trading system. We demonstrate tool support for instantiating a composed tactic to generate an initial architecture of the stock trading system. 相似文献
17.
18.
This study investigated, with the help of log file traces (f = 172), how 20 elementary school students used study tactics when studying science within the gStudy learning environment and examined how tactic use contributed to the students’ achievement. The analysis of this study is divided into two parts. First, at the situational level, the focus is on capturing the tactics that were used in different gStudy sessions, classifying the gStudy sessions based on the tactic use, and illustrating the patterned use of tactics during these sessions. Second, at the individual level, the focus is on examining individual students’ typical methods of using tactics, which helps to illustrate how tactic use contributes to the students’ achievement. The gStudy sessions were classified into three categories on the basis of tactic use: rare, moderate, and frequent. Findings indicate that frequent tactic use did not contribute to deep learning. Moderate tactic use was fairly effective for learning, but rare tactic use contributed to deep learning. The results did not show that the use of many study tactics improves learning; rather, they suggest that the distinguishing feature in strategic learning is not the tactic use itself but the way the tactic is performed. 相似文献
19.
Various redundancy tactics can be modeled at the design stage of safety-critical systems thereby providing a set of fault-tolerance guidelines for subsequent development activities. However, existing approaches usually interweave redundancy tactics into the functional models making them complex and cluttered; the maintenance of such models is time-consuming and error-prone. To address this problem, we provide a modeling approach to separate the redundancy tactics from the base functional models using aspect-oriented modeling. More specifically, the conceptual models of the redundancy tactics and their semantic constraints are first defined for deriving the relevant aspects. Subsequently, a UML profile is proposed to specify the tactic aspects followed by mapping these concepts to the corresponding concepts of aspect-oriented modeling based on pre-defined principles. In accordance with our proposed profile, reuse directives are applied to handle the overlap of structural features between redundancy tactics and other kinds of tactic. Based on our tactic aspects and their configured attributes, a weaving algorithm is proposed to associate the tactic aspects with the base functional models. The proposed approach is compared with a traditional tactic modeling approach using two safety-critical systems, revealing that: 1) our approach significantly reduces the number of extra model elements needed in the tactic design stage; 2) our approach can largely avoid the impact of changing of the base functional model as the model evolves. 相似文献
20.
软交换作为下一代网络的核心技术,受到业界的普遍关注。文章首先提出了软交换的概念,然后从软交换的体系结构、软交换协议、软交换设备的功能特点三个方面介绍了软交换技术。最后,指出了软交换待研究的问题。这对当前网络向下一代网络的演进具有一定的影响。 相似文献