Charles R. Kalmanek is Vice President of Research, which supports organizations throughout AT&T as a Center of Excellence for network design and performance analysis. He joined AT&T Bell Labs in 1980 bringing extensive experience in network architecture, protocols and distributed systems. His research background spans IP network management, access network architectures, wireless networks, voice over IP, multimedia streaming, content distribution networks, storage networks, as well as packet switch and host interface design.
Chuck received his undergraduate degree from Cornell University, and M.S. degrees in Electrical Engineering and Computer Science from Columbia University and New York University, respectively. Chuck is an IEEE Fellow and a recipient of AT&T's Strategic Patent and Strategic Standards Awards. He is a former co-chair of the IEEE Internet Technical Committee and is a co-editor of Guide to Reliable Internet Services and Applications, published by Springer in 2010.
The Essential Elements of Successful Innovation Charles Kalmanek
ACM Sigcomm Communication Review,
2012.
[PDF][BIB]
ACM Copyright
(c) ACM, 2012. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in 2012 , Volume 42, Issue 2, 2012-04-01.
{Today's metro networks have evolved from the need to support traditional voice and private line services. However, the tremendous growth in access to Frame Relay, ATM, IP and Ethernet services, coupled with the desire of enterprise customers to interconnect via Ethernet interfaces, suggests the need for a new approach. This paper proposes a new architecture for Packet-Aware technologies to provide efficient aggregation and switching of packet traffic in metro networks. The PATN has the potential to provide significant cost savings to carriers by reducing the number of network elements, reducing transport costs through statistical multiplexing, and eliminating the need for redundant multiplexing operations. HB8420000-040104-01TM This is an abstract of the previous version. }
Copyright (1992-2009) IEEE. The IEEE owns the copyright to material that is published by the IEEE. Personal use of this material is permitted. However, permission to reprint / republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Please read the full IEEE copyright policy.
Copyright (1992-2009) IEEE. The IEEE owns the copyright to material that is published by the IEEE. Personal use of this material is permitted. However, permission to reprint / republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Please read the full IEEE copyright policy.
Copyright (1992-2009) Elsevier B.V. Articles published by Elsevier may be downloaded for personal use only and commercial use is forbidden. Any other use requires prior permission of the author and Elsevier. Please read the full Elsevier copyright policy.
Copyright (1992-2009) IEEE. The IEEE owns the copyright to material that is published by the IEEE. Personal use of this material is permitted. However, permission to reprint / republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Please read the full IEEE copyright policy.
Copyright (1992-2009) IEEE. The IEEE owns the copyright to material that is published by the IEEE. Personal use of this material is permitted. However, permission to reprint / republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Please read the full IEEE copyright policy.
Method For Performing Gate Coordination On A Per-Call Basis,
Tue Aug 21 12:53:19 EDT 2012
Network resources for a call between a calling party and a called party are allocated. The network resources for the call are reserved based on a reservation request. The network resources are reserved before any one network resource from the reserved network resources is committed. The reserved network resources for the call are committed when a called party indicates acceptance for the call.
System And Method For Distributed Content Transformation,
Tue Mar 27 12:51:12 EDT 2012
A distributed transformation network provides delivery of content from a content publisher to a content recipient. Content from the content publisher is received at an entry node of the distributed transformation network and transmitted to a transformation node in the distributed transformation network. The content is transformed according to publisher, recipient or network administrator specifications and transmitting to delivery nodes which deliver the transformed content to the content recipient. The published content may be in an XML-based format and transformed into an XML-related format or any other structured language format as desired in the provided specification.
Method And System For Telephony And High Speed Data Access On A Broadband Access Network,
Tue Jan 31 12:50:20 EST 2012
A system and method for providing telephony and high-speed data access over a broadband access network, comprising a network interface unit (NIU) coupled to a backup local exchange carrier (LEC) line, the broadband access network coupled to the NIU, an intermediate point-of-presence (IPOP) coupled to the broadband access network, and at least one external access network coupled to the IPOP. The system also provides for a fail-safe mode in which the NIU supports the LEC line for lifeline services.
Method And Apparatus For Generating A Set Of Aggregates,
Tue Mar 08 16:04:39 EST 2011
A method and apparatus for generating at least one aggregate (e.g., a set of aggregates) for a given area of a network such that the number of aggregates is minimized subject to a maximum acceptable path selection error are disclosed. One operational benefit of the present method is that network administrators can select aggregates for an area based solely on the topology of the area without worrying about remaining areas of the OSPF network. Another benefit is that the present method enables trade-offs between the number of aggregates and the bound on the path selection error.
Methods For Determining Non-Broadcast Multiple Access (NBMA) Connectivity For Routers Having Multiple Local NBMA Interfaces,
Tue Oct 05 15:04:51 EDT 2010
The present invention discloses an efficient architecture for routing in a very large autonomous system where many of the layer 3 routers are attached to a common connection-oriented layer 2 subnetwork, such as an ATM network. In a preferred embodiment of the invention, a permanent topology of routers coupled to the subnetwork is connected by permanent virtual circuits. The routers can further take advantage of both intra-area and inter-area shortcuts through the layer 2 network to improve network performance. The routers pre-calculate shortcuts using information from link state packets broadcast by other routers and store the shortcuts to a given destination in a forwarding table, along with corresponding entries for a next hop along the permanent topology. The present invention allows the network to continue to operate correctly if layer 2 resource limitations preclude the setup of additional shortcuts.
Method And Apparatus For Coordinating A Change In Service Provider Between A Client And A Server
With Identity Based Service Access Management,
Tue Sep 21 15:04:47 EDT 2010
A method of configuring a network access device connected to an access network connected to a plurality of service networks, the network device having a first network address allocated to a subscriber of services of a first service provider provided by a first service network, with a new network address allocated to a second subscriber of services of either the first service provider, or a second service provider provided by a second service network. The method comprises the steps of: sending a request from the network access device to the access network with user credentials for the second subscriber requesting access to the first service provider or a change to the second service provider; receiving a response from the access network; and initiating a network address change request using a configuration protocol. In this manner, a second network address allocated to the second subscriber of services of either the first or second service providers is assigned to the network access device to enable the network access device to communicate data packets to the service network providing the selected service.
Method For Unidirectional And Bidirectional Label Switched Path Setup In A Label Switched Network,
Tue Aug 24 15:04:28 EDT 2010
Label contention in a label switched network is resolved by applying a contention resolution scheme that reconciles policies for handling unidirectional and bidirectional label switched path setup.
Method For Performing Gate Coordination On A Per-Call Basis,
Tue Aug 17 15:04:25 EDT 2010
Network resources for a call between a calling party and a called party are allocated. The network resources for the call are reserved based on a reservation request. The network resources are reserved before any one network resource from the reserved network resources is committed. The reserved network resources for the call are committed when a called party indicates acceptance for the call.
Method For Performing Segmented Resource Reservation,
Tue Jun 22 15:04:07 EDT 2010
Segmented resource reservation is performed for at least one call. network resources associated with a first network are reserved according to that network's own reservation policy and based on an indication from a calling party. For the at least one call, network resources associated with a second network are reserved according to its own reservation policy and based on an indication from a called party. The second network is coupled to the first network.
Method For Call Forwarding Without Hairpinning And With Split Billing,
Tue May 04 15:03:46 EDT 2010
A call is forwarded by connecting the call between an originating location and a forwarding location without connecting the call through a terminating location. The originating location is associated with a calling party. The terminating location is associated with a dialed number. The terminating location and the forwarding location is associated with the called party. A bill for the call is apportioned between the calling party and the called party. The bill portion for the calling party is a function of the originating location and the terminating location. The bill portion for the called party is a function of the terminating location and the forwarding location.
Method For Selecting A Restoration Path In A Mesh Network,
Tue Mar 30 15:03:40 EDT 2010
A method of selecting a restoration path in a mesh telecommunication network is disclosed that advantageously is practical and flexible and may be pre-computed along with a service connection path during the setup of the connection. The information used to select the restoration path can be advantageously distributed among nodes in the network.
Method For Restoration And Normalization In A Mesh Network,
Tue Jan 26 15:03:16 EST 2010
The present invention is directed to methods for signaling that enable bandwidth reservation, path restoration, path normalization, and path removal in a mesh network that supports shared mesh restoration.
Method For Allocating Network Resources,
Tue Feb 17 16:07:17 EST 2009
Network resources for a call between a calling party and a called party are allocated. The network resources for the call are reserved based on a reservation request. In particular, the network resources for the call are reserved based on a reservation request. Prior to the reservation request being made, one or more operational parameters for the call are established by a gate controller and sent to a network edge device or other routing entity associated with one of the parties. An identifier, illustratively a so-called gate identification, is sent to that party. Thereafter the routing entity receives the identifier from the associated party in, for example, the aforementioned resource reservation request. The routing entity is able to use the identifier to determine the one or more parameters established for the call and to thereupon cause the call to be established--including the reserving of resources--in a way that is consistent with the one or more parameters.
Method for selecting restoration path in a mesh network,
Tue Nov 11 18:13:08 EST 2008
A method of selecting a restoration path in a mesh telecommunication network is disclosed that advantageously is practical and flexible and may be pre-computed along with a service connection path during the setup of the connection. The information used to select the restoration path can be advantageously distributed among nodes in the network.
Method for exchanging signaling messages in two phases,
Tue Dec 04 18:12:29 EST 2007
Signaling messages are exchanged for a call between a calling party to a called party. A setup message for the call is exchanged through at least one gate controller. Network resources are reserved for the call based on the exchanged setup messages. An end-to-end message for the call is exchanged without the end-to-end message being routed through the at least one gate controller.
Method for unidirectional and bidirectional label switched path setup in a label switched network,
Tue Nov 20 18:12:27 EST 2007
Label contention in a label switched network is resolved by applying a contention resolution scheme that reconciles policies for handling unidirectional and bidirectional label switched path setup.
Method for performing gate coordination on a per-call basis,
Tue Oct 30 18:12:20 EDT 2007
Gates for a call between a calling party and a called party are coordinated. A timer associated with a first gate opened at an originating network edge device is initiated. A first gate open message is sent from the originating network edge device to the terminating network edge device. The first gate at the originating network edge device is released if the timer expires before at least one from the group of: (1) an acknowledgment based on the sent first gate open message is received from the terminating network edge device, and (2) a second gate open message is received at the originating network edge device from the terminating network edge device after the terminating network edge device has opened a second gate associated with the called party.
Segmented resource reservation is performed for at least one call. Network resources associated with a first network are reserved according to that network's own reservation policy and based on an indication from a calling party. For the at least one call, network resources associated with a second network are reserved according to its own reservation policy and based on an indication from a called party. The second network is coupled to the first network.
Method for performing gate coordination on a per-call basis,
Tue Jul 17 18:12:08 EDT 2007
Gates a call between a calling party and a called party are coordinated. A timer associated with a first opened at an originating network edge device is initiated. A first gate open message is sent from the originating network edge device to the terminating network edge device. The first gate at the originating network edge device is released if the timer expires before at least one from the group of: (1) an acknowledgment based on the sent first gate open message is received from the terminating network edge device, and (2) a second gate open message is received at the originating network edge device from the terminating network edge device after the terminating network edge device has opened a second gate associated with the called party.
Network resources for a call between a calling party and a called party are allocated. The network resources for the call are reserved based on a reservation request. In particular, the network resources for the call are reserved based on a reservation request. Prior to the reservation request being made, one or more operational parameters for the call are established by a gate controller and sent to a network edge device or other routing entity associated with one of the parties. An identifier, illustratively a so-called gate identification, is sent to that party. Thereafter the routing entity receives the identifier from the associated party in, for example, the aforementioned resource reservation request. The routing entity is able is able to use the identifier to determine the one or more parameters established for the call and to thereupon cause the call to be established--including the reserving of resources--in a way that is consistent with the one or more parameters.
Method for selecting a restoration path in a mesh network,
Tue Feb 20 18:11:54 EST 2007
A method of selecting a restoration path in a mesh telecommunication network is disclosed that advantageously is practical and flexible and may be pre-computed along with a service connection path during the setup of the connection. The information used to select the restoration path can be advantageously distributed among nodes in the network.
Method for performing lawfully-authorized electronic surveillance,
Tue Dec 19 18:11:46 EST 2006
Lawfully-authorized electronic surveillance is performed. A call associated with a first party to be surveilled is verified, on a per-call basis. Packets associated with the call are multicast to a second party and to a surveillance receiver.
Method and apparatus for coordinating a change in service provider between a client and a server,
Tue Jun 27 18:11:22 EDT 2006
A method of configuring a network access device having a first network address allocated to a subscriber of services of a first service provider provided by a first service network, with a new network address allocated to a subscriber of services of a second service provider provided by a second service network, wherein the network access device is connected to an access network connected to a plurality of service networks. The method comprises the steps of: sending a request from the network access device to the access network requesting a change to a second service provider; receiving a response from the access network; and initiating a network address change request using a configuration protocol. In this manner, a second network address allocated to the subscriber of services of the second service provider is assigned to the network access device to enable the network access device to communicate data packets to the service network providing the selected service. In one preferred embodiment of the invention, the subscriber is authenticated by a service activation system coupled to the access network prior to initiating the configuration protocol. Accordingly, the request to the access network includes an authentication request for the subscriber. The response received from the access network therefore includes an authentication status for the subscriber from the second service provider. If the subscriber is authenticated, the client initiates the network address change request.
Service selection in a shared access network using policy routing,
Tue Jun 20 18:11:18 EDT 2006
It is an object of the invention to enable multiple services or service providers to share the facilities of an access network infrastructure providing physical connectivity to subscribers. A network access device advantageously may be used in communication network services with a service or service provider that is separate from the operator of the access network infrastructure.
Method and apparatus for enhanced security in a broadband telephony network,
Tue Apr 25 18:11:07 EDT 2006
The broadband telephony interface is provisioned by receiving information authenticating a provisioning server, establishing a communication channel between the user and the provisioning server over which is transmitted authorization information from the user to the provisioning server, and encrypting and transmitting a cryptographic key associated with the user to the provisioning server. The cryptographic key can be a symmetric key or a public key corresponding to a private key stored in the broadband telephony interface. The cryptographic key can be utilized to generate other keys which are utilized to secure communication channels for the telephony service. The broadband telephony interface advantageously can be implemented as untrusted hardware or software that is installed by a customer.
Method for exchanging signaling messages in two phases,
Tue Apr 11 18:11:05 EDT 2006
Signaling messages are exchanged for a call between a calling party to a called party. A setup message for the call is exchanged through at least one gate controller. Network resources are reserved for the call based on the exchanged setup messages. An end-to-end message for the call is exchanged without the end-to-end message being routed through the at least one gate controller.
Method and apparatus for coordinating a change in service provider between a client and a server with identity based service access management,
Tue Apr 11 18:11:03 EDT 2006
A method of configuring a network access device connected to an access network connected to a plurality of service networks, the network device having a first network address allocated to a subscriber of services of a first service provider provided by a first service network, with a new network address allocated to a second subscriber of services of either the first service provider, or a second service provider provided by a second service network. The method comprises the steps of: sending a request from the network access device to the access network with user credentials for the second subscriber requesting access to the first service provider or a change to the second service provider; receiving a response from the access network; and initiating a network address change request using a configuration protocol. In this manner, a second network address allocated to the second subscriber of services of either the first or second service providers is assigned to the network access device to enable the network access device to communicate data packets to the service network providing the selected service.
Method for call forwarding without hairpinning and with split billing,
Tue Jan 03 18:10:46 EST 2006
A call is forwarded by connecting the call between an originating location and a forwarding location without connecting the call through a terminating location. The originating location is associated with a calling party. The terminating location is associated with a dialed number. The terminating location and the forwarding location is associated with the called party. A bill for the call is apportioned between the calling party and the called party. The bill portion for the calling party is a function of the originating location and the terminating location. The bill portion for the called party is a function of the terminating location and the forwarding location.
Method for selecting a restoration path in a mesh network,
Tue Jan 03 18:10:45 EST 2006
A method of selecting a restoration path in a mesh telecommunication network is disclosed that advantageously is practical and flexible and may be pre-computed along with a service connection path during the setup of the connection. The information used to select the restoration path can be advantageously distributed among nodes in the network.
Method For Content-Aware Redirection And Content Renaming,
Tue Oct 11 17:08:40 EDT 2005
The present invention is directed to mechanisms for content-aware redirection and content exchange/content discovery that permit a request for content to be redirected to a particular advantageous server that can serve the content.
Method For Establishing Call State Information Without Maintaining State Information At Gate Controllers,
Tue Jul 05 18:10:26 EDT 2005
State information for a call between a calling party and a called party is established without maintaining the state information at a gate controller. A setup request for the call is received at an originating gate controller. The originating gate controller is connected to a trusted network. The calling party is associated with an originating interface unit coupled to an untrusted network. The setup request for the call is authorized. The authorized setup request is sent to the called party. State information for the call is formatted based on a setup acknowledgment message received from the calling party. The state information for the call is sent from the originating gate controller to the originating interface unit without maintaining the state information at the originating gate controller.
Method for providing privacy by network address translation,
Tue Mar 22 18:10:20 EST 2005
A call between a first network associated with a calling party and a second network associated with a called party is connected. The source address for packets associated with the call arc translated. The packets are sent from the calling party to the called party without the called party receiving the source address that indicates at least one from the group of a logical identity of the calling party and a geographical identity of the calling party.
Method For Allocating Network,
Tue Nov 23 18:10:11 EST 2004
Network resources for a call between a calling party and a called party are allocated. The network resources for the call are reserved based on a reservation request. The network resources are reserved before any one network resource from the reserved network resources is committed. The reserved network resources for the call are committed when a called party indicates acceptance for the call.
Method for performing gate coordination on a per-call basis,
Tue Jun 29 18:09:55 EDT 2004
Gates for a call between a calling party and a called party are coordinated. A timer associated with a first gate opened at an originating network edge device is initiated. A first gate open message is sent from the originating network edge device to the terminating network edge device. The first gate at the originating network edge device is released if the timer expires before at least one from the group of: (1) an acknowledgment based on the sent first gate open message is received from the terminating network edge device, and (2) a second gate open message is received at the originating network edge device from the terminating network edge device after the terminating network edge device has opened a second gate associated with the called party.
Method and apparatus for dynamically displaying brand information in a user interface,
Tue Jun 22 18:09:53 EDT 2004
Client software may be used in conjunction with services offered by several entities such as network service providers. A user interface of the client software presents brand indicia relating to the network service provider that is currently being used by the software. The software is configured by selecting entities with which the software will be used. Once the entities are selected, an instruction server is queried to determine the location of branding data to be presented to the user, and a branding data server is queried to retrieve the branding data. The brand indicia are presented to the user according to the branding data each time the corresponding entity is accessed.
Method for allocating network resources,
Tue Jun 08 18:09:47 EDT 2004
Network resources for a call between a calling party and a called party are allocated. The network resources for the call are reserved based on a reservation request. The network resources are reserved before any one network resource from the reserved network resources is committed. The reserved network resources for the call are committed when a called party indicates acceptance for the call.
Routing over large clouds,
Tue Mar 23 18:09:41 EST 2004
The present invention discloses an efficient architecture for routing in a very large autonomous system where many of the layer 3 routers are attached to a common connection-oriented layer 2 subnetwork, such as an ATM network. In a preferred embodiment of the invention, a permanent topology of routers coupled to the subnetwork is connected by permanent virtual circuits. The routers can further take advantage of both intra-area and inter-area shortcuts through the layer 2 network to improve network performance. The routers pre-calculate shortcuts using information from link state packets broadcast by other routers and store the shortcuts to a given destination in a forwarding table, along with corresponding entries for a next hop along the permanent topology. The present invention allows the network to continue to operate correctly if layer 2 resource limitations preclude the setup of additional shortcuts.
Method for establishing call state information without maintaining state information at gate controllers,
Tue Feb 17 18:09:04 EST 2004
State information for a call between a calling party and a called party is established without maintaining the state information at a gate controller. A setup request for the call is received at an originating gate controller. The originating gate controller is connected to a trusted network. The calling party is associated with an originating interface unit coupled to an untrusted network. The setup request for the call is authorized. The authorized setup request is sent to the called party. State information for the call is formatted based on a setup acknowledgment message received from the calling party. The state information for the call is sent from the originating gate controller to the originating interface unit without maintaining the state information at the originating gate controller.
Method and system for telephony and high speed data access on a broadband access network,
Tue Dec 16 18:08:57 EST 2003
A system and method for providing telephony and high speed data access over a broadband access network, comprising a network interface unit (NIU) coupled to a backup local exchange carrier (LEC) line, the broadband access network coupled to the NIU, an intermediate point-of-presence (IPOP) coupled to the broadband access network, and at least one external access network coupled to the IPOP. The system also provides for a fail-safe mode in which the NIU supports the LEC line for lifeline services.
Method For Call Forwarding Without Hairpinning And With Split Billing,
Tue Jun 10 18:08:44 EDT 2003
A call is forwarded by connecting the call between an originating location and a forwarding location without connecting the call through a terminating location. The originating location is associated with a calling party. The terminating location is associated with a dialed number. The terminating location and the forwarding location is associated with the called party. A bill for the call is apportioned between the calling party and the called party. The bill portion for the calling party is a function of the originating location and the terminating location. The bill portion for the called party is a function of the terminating location and the forwarding location.
Method For Simulating A Ring Back For A Call Between Parties In Different Communication Networks,
Tue Jun 03 18:08:43 EDT 2003
A ring back signal for a call between a calling party and a called party can be simulated. A ring back message associated with the call is received. The calling party is associated with a first network. The called party is associated with a second network. A prestored ring back signal is selected from a set of prestored ring back signals based on the ring back message and/or a called number for the call. The selected prestored ring back signal is associated with the second network and is different from a second prestored ring back signal associated with the first network. The prestored ring back signal is sent to the calling party.
Method and apparatus for communication services on a network,
Tue Dec 24 18:08:35 EST 2002
A method for performing communications over a network comprises receiving a user record for a first user, receiving a query from a second user with regard to the first user, and sending, to the second user, as a response to the query, a call-handling profile.
Method for allocating network resources,
Tue Nov 19 18:08:32 EST 2002
Network resources for a call between a calling party and a called party are allocated. The network resources for the call are reserved based on a reservation request. The network resources are reserved before any one network resource from the reserved network resources is committed. The reserved network resources for the call are committed when a called party indicates acceptance for the call.
Method for exchanging signaling messages in two phases,
Tue Nov 27 18:07:17 EST 2001
Signaling messages are exchanged for a call between a calling party to a called party. A setup message for the call is exchanged through at least one gate controller. Network resources are reserved for the call based on the exchanged setup messages. An end-to-end message for the call is exchanged without the end-to-end message being routed through the at least one gate controller
Mobile host roaming ATM virtual circuit rerouting method and apparatus,
Tue Jul 25 18:05:35 EDT 2000
A virtual circuit rerouting method and apparatus provide for rerouting virtual circuits in an ATM-based network having mobile devices. Included are protocols for ensuring hand-off of the mobile device from a first basestation to a second basestation, identification of a rebuild switch and connection of the mobile device to the rebuild switch prior to data being transferred from the mobile device to the network. The rerouting method minimizes loss of data by ensuring that the mobile device is incapable of transferring data to the network before the virtual circuit rerouting procedure is completed. The method includes an aggregate registration request, or 3-phase handshake, and a Connect Confirm command. The virtual circuit rerouting protocols are further adapted to operate on most common virtual circuit rerouting strategies, including rebuild, partial rebuild and extension with loop removal.
Awards
IEEE Fellow, 2011.
For leadership in advancing architecture, design and management of communications networks and services.