Methods, systems, and products for providing communications services

ABSTRACT

Methods, systems, and products are disclosed for providing communications services. A request for data is processed, and a data stream is received to fulfill the request. A determination is made that a subcontracted processing service is required. At least a portion of the data stream is subcontracted to a different service provider to receive the subcontracted processing service. A result of the subcontracted processing service is received.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No. 10/720,800, filed Nov. 24, 2003, now issued as U.S. Pat. No. 7,509,373, and incorporated herein by reference in its entirety.

NOTICE OF COPYRIGHT PROTECTION

A portion of the disclosure of this patent document and its figures contain material subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, but otherwise reserves all copyrights whatsoever.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention generally relates to computers and to communications and, more particularly, to processing data in a communications network.

2. Description of the Related Art

Manipulation of electronic data is important in computer networking and in communications. Often times electronic data must be manipulated for presentation at a client communications device. That is, the electronic data must be changed, formatted, or altered to suit the display characteristics, processing abilities, and/or storage capabilities of the client communications device. A handheld personal data assistant, for example, often requires that bandwidth-intensive electronic data, such as on-demand video, be scaled, color corrected, and/or otherwise manipulated for optimum presentation on the small display of the handheld personal data assistant. Heretofore, however, manipulation of electronic data was usually the responsibility of the client communications device—that is, the client communications device stores and utilizes one or more computer programs to manipulate incoming electronic data for presentation on the client communications device.

Locally manipulating electronic data, however, poses problems. As the electronic data is received, the client communications device must store the electronic data, process/manipulate the electronic data, and present the manipulated electronic data to the user. This process of storing, manipulating, and/or presenting the electronic data, however, often taxes the limited processing and storage capabilities of the client communications device. As both those skilled and unskilled recognize, when the processing and/or storage capabilities of the client communications device are overwhelmed, the audio/video presentation may “stumble” and degrade the user experience. Sometimes the client communications device even experiences a fault or failure when the processing and/or storage capabilities are overwhelmed. There is, accordingly, a need in the art for methods and systems of manipulating electronic data that reduce the need for locally-stored computer programs and that reduce the need for local processing requirements.

BRIEF SUMMARY OF THE INVENTION

The aforementioned problems, and other problems, are reduced by a Analysis Module. This Analysis Module comprises methods, computer systems, computer programs, and computer program products that provide communications services to subscribers. Each time a subscriber requests communications service, the Analysis Module on-demand, dynamically, and in real-time, assesses the subscriber's communications needs and the real-time state of one or more communications networks. The Analysis Module then ascertains the best or preferred scenario for providing that communications service. The subscriber might even have a Service Level Agreement, so this invention ascertains how to utilize the available network routing and bandwidth to satisfy the Service Level Agreement. This invention ascertains the best or preferred scenario for segmentation of data, how that segmented data should be processed, and how the segmented and processed data should be reassembled, again according to the subscriber's Service Level Agreement.

This invention discloses methods, systems, and products for providing communications services. One of the embodiments describes a method for providing communications services. This method receives a request for electronic data, and the request for electronic data originating from a client communications device. The availability of network routing is assessed in real-time to fulfill the request. The availability of network bandwidth is assessed in real-time to fulfill the request. A preferred scenario of segmentation, dispersion, and assemblage of electronic data is ascertained to fulfill the request. Electronic data fulfilling the request is communicated to the client communications device, with the electronic data formatted according to the preferred scenario

Other embodiments of this invention describes another method for providing communications services. Here a first data stream is received at a computer, and the first data stream includes packets of data packetized according to a packet protocol. The first data stream is segmented into segments according to a Service Level Agreement. The Service Level Agreement being an agreement defining parameters for communications service for the subscriber. At least one segment is dispersed via a network for a subsequent processing service. A result of the processing service is received. A second data stream is assembled, and the second data stream includes at least one of i) the result of the processing service and ii) another segment. The second data stream is then communicated via the network.

Other embodiments of this invention describe a system for providing communications services. The system includes a Analysis Module stored in a memory device, and a processor communicates with the memory device. The Analysis Module receives a first data stream at a computer, and the first data stream comprises packets of data packetized according to a packet protocol. The Analysis Module segments the first data stream into segments according to a Service Level Agreement. The Service Level Agreement being an agreement defining parameters for communications service for the subscriber. The Analysis Module disperses at least one segment via a network for a subsequent processing service, and the Analysis Module receives a result of the processing service. The Analysis Module assembles a second data stream, and the second data stream includes at least one of i) the result of the processing service and ii) another segment. The Analysis Module then communicates the second data stream via the network.

Other embodiments of this invention describe a computer program product. A computer-readable medium stores a Analysis Module. The Analysis Module receives a first data stream at a computer, and the first data stream includes packets of data packetized according to a packet protocol. The Analysis Module segments the first data stream into segments according to a Service Level Agreement. The Service Level Agreement being an agreement defining parameters for communications service for the subscriber. The Analysis Module disperses at least one segment via a network for a subsequent processing service, and the Analysis Module receives a result of the processing service. The Analysis Module then assembles a second data stream comprising at least one of i) the result of the processing service and ii) another segment, and the Analysis Module communicates the second data stream via the network.

Other systems, methods, and/or computer program products according to embodiments will be or become apparent to one with skill in the art upon review of the following drawings and detailed description. It is intended that all such additional systems, methods, and/or computer program products be included within this description, be within the scope of the present invention, and be protected by the accompanying claims.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

These and other features, aspects, and advantages of the embodiments of the present invention are better understood when the following Detailed Description of the Invention is read with reference to the accompanying drawings, wherein:

FIG. 1 is a schematic illustrating a Analysis Module operating within an intelligently-controlled communications network, according to one of the embodiments of this invention;

FIGS. 2 and 3 are schematics illustrating the Analysis Module on-demand, dynamically, and in real-time assessing an availability of routing and bandwidth within the communications network, according to more embodiments of this invention;

FIG. 4 is a schematic illustrating ascertainment of a preferred scenario of segmentation, dispersion, and assemblage of electronic data, according to still more embodiments of this invention;

FIG. 5 is a schematic illustrating fulfillment of formatted data according to the preferred scenario determined in FIG. 4;

FIGS. 6-10 are schematics illustrating the Analysis Module accessing a Service Level Agreement according to another of the embodiments of this invention;

FIG. 11 is a schematic illustrating one or more assertions that indicate the requirements of the Service Level Agreement were satisfied according to more embodiments of this invention; and

FIGS. 12-14 are flowcharts illustrating methods of providing communications services according to still more embodiments of this invention.

DETAILED DESCRIPTION OF THE INVENTION

This invention now will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this disclosure will be thorough and complete and will fully convey the scope of the invention to those of ordinary skill in the art. Moreover, all statements herein reciting embodiments of the invention, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).

Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named manufacturer.

FIGS. 1-4 are schematics illustrating one of the embodiments of this invention. FIG. 1 shows a Analysis Module 20 operating within an intelligently-controlled communications network 22. This communications network 22 represents just one of the possible operating environments for the Analysis Module 20. The Analysis Module 20 comprises methods, computer systems, computer programs, and computer program products that provide communications services to subscribers. Each time a subscriber requests communications service, the Analysis Module 20 dynamically, and in real-time, assesses the subscriber's communications needs and the real-time state of the communications network 22. The Analysis Module 20 then determines the best or preferred scenario for providing that requested communications service. If the subscriber has a Service Level Agreement, the Analysis Module 20 determines how to utilize the available network routing/bandwidth to satisfy the Service Level Agreement. As this patent will explain, the Analysis Module 20 assesses the highest quality scenario, the most reliable scenario, the most efficient scenario, the most profitable scenario, or, in general terms, the “preferred scenario” for providing the subscriber's requested communications service that also satisfies the Service Level Agreement.

FIG. 1 shows the Analysis Module 20 operating within the communications network 22. The communications network 22 includes a communications switch 24 of a Public Switched Telephone Network 26. The communications switch 24 interfaces with an application server 28. The Analysis Module 20 is stored within the memory of the application server 28. The application server 28 controls many features of the communications switch 24. The application server 28, for example, may include Advanced Intelligent Network (AIN) componentry (not shown for simplicity). The application server 28 additionally or alternatively may include and/or voice service protocols, triggers, and/or operations for a “softswitch” packet-network architecture. The communications switch 24 and the application server 28 interface with the Public Switched Telephone Network 26 and a data network 30. Because the application server 28 communicates with Public Switched Telephone Network 26 and the data network 30, the Analysis Module 20 receives data via either network 26, 30. The signaling between the communications switch 24, the Public Switched Telephone Network 26, the application server 28, and the data network 30, however, is well understood in the art and will not be further described. If a reader desires a more detailed explanation, the reader is directed to U.S. Pat. No. 5,430,719 issued to Weisser (Jul. 4, 1995), with the “Summary of the Invention” and the “Detailed Description of the Preferred Embodiment” sections incorporated herein by reference. The reader is also directed to U.S. Pat. No. 5,917,817 issued to Dunn et al. (Jun. 29, 1999), with the “Summary of the Invention” and the “Detailed Description” sections incorporated herein by reference.

FIG. 1 also shows the Analysis Module 20 receiving a request 32 for data. The term “data” includes electronic information, such as, for example, facsimile, electronic mail (e-mail), text, video, audio, and/or voice in a variety of formats, such as dual tone multi-frequency, digital, analog, and/or others. Additionally, the data may include: (1) executable programs, such as a software application, (2) an address, location, and/or other identifier of the storage location for the data, (3) integrated or otherwise combined files, and/or (4) profiles associated with configuration, authenticity, security, and others. The request 32 for data originates from a client communications device 34. The client communications device 34 may include any computer/communications device utilizing a microprocessor and/or a digital signal processor. The client communications device 34 may include, for example, a computer (laptop, desktop, tablet, server, and other computer systems), a personal digital assistant (PDA), a Global Positioning System (GPS) device, an interactive television, an Internet Protocol (IP) phone, a pager, and/or a cellular/satellite phone. The client communications device 34 may issue the request 32 for data using the communications switch 24, the Public Switched Telephone Network 26, the application server 28, and/or the data network 30. The request 32 for data is communicated via the communications network 22 (e.g., the communications switch 24, the Public Switched Telephone Network 26, and/or the data network 30) to the Analysis Module 20 operating within the application server 28.

The embodiments of this invention continue with FIG. 2. When the application server 28 receives the request for data (shown as reference numeral 32 in FIG. 1), the Analysis Module 20 analyzes the request for data and determines what data is requested. The Analysis Module 20 then dynamically, and in real-time, assesses an availability of routing within the communications network 22 to fulfill the request for data. The Analysis Module 20 also dynamically, and in real-time, assesses an availability of bandwidth to fulfill the request for data. That is, each time the client communications device (shown as reference numeral 34 in FIG. 1) requests data, the Analysis Module 20 “on demand” determines the available routing and bandwidth. Because computer/servers and network routes have varying packet capacities, and because some computers/servers experience more congestion than others, the Analysis Module 20 tries to determine the best or preferred scenario for fulfilling the request for data.

FIG. 2 shows various commands, queries, tactics, and instructions for assessing the availability of routing and bandwidth. The Analysis Module 20, for example, may “ping” various computer devices communicating with the application server 28. That is, the Analysis Module 20 sends an addressable “ping” packet 36 to other computer devices communicating with the application server 28. The Analysis Module 20 then measures the elapsed travel time for the “ping” packet 36 to return to the application server 28. The Analysis Module 20 uses the elapsed travel time to determine response times, network congestion, and/or bandwidth. Although FIG. 2 shows the Analysis Module 20 utilizing the “ping” packet 36 via the Public Switched Telephone Network 26, the Analysis Module 20 may also utilize the data network 30 to communicate the “ping” packet 36. The Analysis Module 20 may also issue one or more interrogations 38. Each interrogation 38 is addressed to a particular computer device, and each interrogation asks the particular computer device to assess its activity level. The Analysis Module 20 would then receive an interrogation response 40, and the Analysis Module 20 uses the interrogation response 40 to determine response times, network congestion, and/or bandwidth. Although FIG. 2 also shows the Analysis Module 20 utilizing the interrogation 38 via the data network 30, the Analysis Module 20 may also utilize the Public Switched Telephone Network 26 to communicate the interrogation 38.

FIG. 3 shows more commands, queries, tactics, and instructions for assessing the availability of routing and bandwidth. The Analysis Module 20 may utilize UNIX/LINUX “trace” commands 42 or tracing features to monitor packet activity within a computer device communicating with the application server 28. The Analysis Module 20 may also utilize administrative (“Admin”) commands 44, instruction commands 46, and/or other UNIX/LINUX commands 48 to assess activity within a computer device, within a network path within the communications network 22, and/or within a series of paths within the communications network 22. Although FIG. 3 shows the Analysis Module 20 utilizing either the Public Switched Telephone Network 26 or the data network 30 to communicate the “trace” command 42, the administrative command 44, the instruction command 46, and/or the other UNIX/LINUX command 48, those of ordinary skill in the art understands that the Analysis Module 20 m may use one, or both, networks to communicate each command. FIG. 3 also shows the Analysis Module 20 utilizing a software routine 50 to help assess the availability of routing and bandwidth. The software routine 50 autonomously monitors activity within specified path(s), regions, computer devices, and/or the entire communications network 22. The Analysis Module 20 may also utilize allocation tables and/or routines 52 to help assess the availability of routing and bandwidth. These allocation tables and/or routines 52 would contain relationships, preferences, and/or designations for various network routing paths and/or various computer devices. The allocation tables and/or routines 52 would identify, or even mandate, circumstances when certain routings or certain computer devices are required. If, for example, a subscriber wishes to download a large video file, the allocation tables and/or routines 52 may require that a particular network routing, having capacity to communicate the large video file, be utilized. Although the software routine 50, and the allocation tables and/or routines 52, are shown operating as subroutines/subcomponents of the Analysis Module 20, those of ordinary skill in the art now recognize that each may be remotely installed on any computer device communicating with the application server 28.

Once the Analysis Module 20 assesses the communications network 22, the Analysis Module 20 then determines the best or preferred scenario for fulfilling the request for data. As FIG. 4 shows, the Analysis Module 20 analyzes the request 32 for data, determines what data is requested, and compares the requested data with the on demand, real-time availability of routing and bandwidth within the communications network 22. The Analysis Module 20 then ascertains a preferred scenario of segmentation, dispersion, and assemblage of electronic data to fulfill the request for data. That is, the Analysis Module 20 assesses the highest quality scenario, the most reliable scenario, the most efficient scenario, the most profitable scenario, or, in general terms, the “preferred scenario” for fulfilling the request for data. If, for example, the subscriber requires the highest-possible quality of presentation, the Analysis Module 20 selects a combination of segmentation, dispersion, and assemblage of segments that achieves the highest possible quality of presentation. If, however, the subscriber requires the lowest cost when receiving requested data, the Analysis Module 20 selects a combination of segmentation, dispersion, and assemblage of segments that achieves the lowest possible cost to the subscriber, perhaps despite a degraded quality of transmission (e.g., the subscriber might tolerate “lost” packets of data, delayed delivery of packets, and/or a lesser Quality of Presentation).

As FIG. 4 also shows, the Analysis Module 20 issues one or more reservations 52. Once the Analysis Module 20 assesses the preferred scenario of segmentation, dispersion, and assemblage, the Analysis Module 20 may then “reserve” routing paths and/or computer devices. The Analysis Module 20 issues one or more addressable reservations 52 to help ensure the preferred scenario is accomplished. Each reservation 52 instructs a networked computer device to anticipate, and perhaps only accept, packets of data destined for the reserved paths and/or computer devices. Each reservation 52 may instruct networked computer devices to anticipate, and perhaps only accept, packets having recognized header information and/or packet content. Each reservation 52 may also include a chronology component that specifies a “window” within which the reserved packets must be received, processed, and/or communicated. Packets arriving outside this window may not receive preferential access/routing and would be queued according to more conventional strategies (e.g., sequential, first in-first out, chronological). Because the Analysis Module 20 issues one or more of the addressable reservations 52, the Analysis Module 20 is able to reduce/avoid packet infighting for the “best” path.

Now that the preferred scenario is ascertained, FIG. 5 shows the fulfillment of the request. The Analysis Module 20 has analyzed the request for data (shown as reference numeral 32 in FIG. 1), determined what data is requested, and compared the requested data with the real-time availability of routing and bandwidth within the communications network 22. The Analysis Module 20 then ascertained a preferred scenario of segmentation, dispersion, and assemblage of electronic data to fulfill the request for data. The Analysis Module 20 now communicates to the client communications device 34 the electronic data 54 fulfilling the request. Because the electronic data 54 has been at least one of segmented, dispersed for subsequent processing, and then assembled as a data stream, the electronic data 54 has been formatted according to the preferred scenario.

FIGS. 6-10 are schematics illustrating another of the embodiments of this invention. FIG. 6 shows the Analysis Module 20 accessing a Service Level Agreement 56. The Service Level Agreement 56 is an agreement defining one or more parameters for the communications service(s) provided on behalf of the subscriber. The Service Level Agreement 56 may be an agreement by and between the subscriber and a communications service provider. The Service Level Agreement 56 defines how the subscriber wishes to receive electronic data, in what format that electronic data is delivered, when the electronic data is delivered, and to what device (or along what network path) that electronic data is delivered. The Service Level Agreement 56 might define pricing for various bandwidth needs, network utilization, delivery times, and processing charges. Because Service Level Agreements are, in general, known in the art, and because the content of the Service Level Agreement 56 may greatly vary, this patent will not further explain the Service Level Agreement 56.

FIGS. 6 and 7 also illustrate the Analysis Module 20 accessing the Service Level Agreement 56. FIG. 6 shows that an electronic version of the Service Level Agreement 56 may be stored/maintained in a database 58 of Service Level Agreements. The database 58 of Service Level Agreements stores multiple Service Level Agreements for multiple subscribers; each Service Level Agreement corresponds to at least one subscriber. While the database 58 of Service Level Agreements may be stored/maintained on any computer device communicating with the Public Switched Telephone Network 26 and/or the data network 30, FIG. 6 shows the database 58 of Service Level Agreements stored/maintained within memory of the application server 28. FIG. 7 illustrates that the Service Level Agreement 56 may be locally stored in memory on the client communications device 34. When the Analysis Module 20 accesses the Service Level Agreement 56, the Analysis Module 20 may initiate wired and/or wireless communication with the client communications device 34 via the Public Switched Telephone Network 26 and/or the data network 30.

FIG. 8 shows the Analysis Module 20 assessing the availability of routing and bandwidth. The Analysis Module 20 receives the request 32 for data from the client communications device 34. As this patent earlier explained, the Analysis Module 20 may utilize the “ping” packet 36, the interrogation 38, the UNIX/LINUX “trace” command 42, the administrative (“Admin”) command 44, the instruction command 46, and/or other UNIX/LINUX commands 48 to assess activity within a computer device, within a network path within the communications network 22, and/or within a series of paths within the communications network 22. The Analysis Module 20 may also utilize the software routine 50 and allocation tables and/or routines 52 to help assess the availability of routing and bandwidth.

FIG. 9 shows the Analysis Module 20 formatting data according to the Service Level Agreement 56. The Analysis Module 20 receives a first stream 60 of data via the Public Switched Telephone network 28 and/or via the data network 30. The first stream 60 of data typically includes individual packets 62 of information. The Analysis Module 20 acts upon the first stream 60 of data by segmenting the individual packets 62 into segments 64 according to the Service Level Agreement 56. Once a segment 64 is created, if the segment 64 requires subsequent processing, the Analysis Module 20 then disperses that segment 64 for a subsequent processing service. The Analysis Module 20 routes the segment 64 to other devices and/or locations via the Public Switched Telephone network 28 and/or via the data network 30, and the subsequent processing service is performed. If the Service Level Agreement 56 specifies how the segment 64 should be dispersed, or where that segment 64 should be routed, the Analysis Module 20 routes the segment 64 according to the Service Level Agreement 56.

As FIG. 10 shows, the Analysis Module 20 receives the results 66 of the subsequent processing services. When the subsequent processing service is complete, the Analysis Module 20 aggregates the result(s) 66 of the subsequent processing service(s). The Analysis Module 20 may also access the Service Level Agreement 56 to determine how the subscriber wants the results 66 assembled, formatted, and/or communicated. The Analysis Module 20 then assembles those results 66, and any unprocessed segments 64, into a second data stream 68. As FIG. 10 shows, the second data stream 68 is typically communicated via the Public Switched Telephone network 28 and/or via the data network 30 to another destination. That is, the second data stream 68 may be communicated to another computer device, and/or the second data stream 68 may be communicated to a client communications device (not shown for simplicity). The client communications device may then view/execute/present the second data stream 68. Because the Analysis Module 20 consulted the Service Level Agreement 56, the second data stream 68 has been substantially formatted, assembled, and communicated to the requirements/desires of the subscriber. That is, the second data stream 68 has been segmented, dispersed, formatted, transformed, encrypted, scaled, compressed, manipulated, assembled, and/or communicated to suit the subscriber's needs, as specified in the Service Level Agreement 56.

FIG. 11 is a schematic illustrating still more embodiments of this invention. FIG. 11 shows one or more assertions 70. These assertions 70 indicate that the requirements of the Service Level Agreement 56 were satisfied. When the Analysis Module 20 segments, disperses, and assembles data, each assertion 70 confirms that the segmentation, dispersion, and assemblage were performed according to the requirements of the Service Level Agreement 56. The assertions 70 may be sent and received amongst “tier one” service providers and lesser tiered service providers. A first tier service provider, for example, may subcontract some aspect of subsequently processing the segment (shown as reference numeral 64 in FIG. 9). When the subcontractor correctly processed the segment according to the requirements of the Service Level Agreement 56, the first tier service provider would then issue the assertion 70. The subcontractor could then utilize the assertion 70 in advertising, in marketing, and in other efforts to show their commitment to service, performance, and customer requirements.

FIG. 11 also shows a certified assertion 72. The certified assertion 72 still confirms that the requirements of the Service Level Agreement 56 were satisfied. The certified assertion 72, however, is encrypted, digitally “watermarked,” keyed, or otherwise secured to reduce the incidence of fraudulent assertions. Because the concept of assertions may be important to winning, and maintaining, service contracts, some service providers will inevitably attempt to copy, imitate, or even forge assertions. The certified assertion 72, then, would include security capabilities to reduce, or even prevent, the instances of copied, imitated, or, in general, “forged” assertions. The certified assertion 72 could even be used to confirm the identity of the subscriber and the subscriber's ability to pay (e.g., account balance, payment history, accumulation of assertions).

FIG. 11 also shows a subscriber assertion 74. The subscriber assertion 74 is communicated from the client communications device. The subscriber assertion 74 again confirms that the requirements of the Service Level Agreement 56 were satisfied. Here, however, the subscriber assertion 74 is provided by the subscriber. The subscriber assertion 74 acts as “feedback” from the subscriber and, again, may be used in advertising, in marketing, and in other efforts to show a commitment to service, performance, and customer requirements. As many subscribers provide more and more subscriber assertions 74, the volume of subscriber assertions 74 acts as an indication of trust. The more subscriber assertions 74 a service provider acquires, the more “trusted” is the service provider to satisfy whatever a subscriber's Service Level Agreement may require.

The subscriber may be required to provide the subscriber assertion 74. Because the subscriber assertion 74 may act as “feedback,” and thus may be very useful for advertising and marketing efforts, a service provider may require that all subscribers provide the subscriber assertion 74. If the service provider satisfies the subscriber's Service Level Agreement, the subscriber is required to communicate the subscriber assertion 74. The subscriber may be required to communicate the subscriber assertion 74 to the tier one service provider. The subscriber may also be required to communicate the subscriber assertion 74 to each lesser-tiered service provider. A service provider may even deny service for any subscriber or user that will not provide the subscriber assertion 74. Because the subscriber assertion 74 may even be used to confirm the identity of the subscriber and the subscriber's ability to pay, the service provider may further deny service for any subscriber not providing the subscriber assertion 74. The service provider may refuse to provide service when the service provider cannot confirm the identity of the requester and/or an ability to pay.

FIG. 12 is a flowchart illustrating a method of providing communications services. A request for data is received (Block 76), and the request for data originates from a client communications device. The real-time availability of network routing is assessed to fulfill the request (Block 78). The real-time availability of network bandwidth is also assessed to fulfill the request (Block 80). A preferred scenario of segmentation, dispersion, and assemblage of electronic data is ascertained to fulfill the request (Block 82). A routing identified in the preferred scenario is reserved (Block 84). Electronic data fulfilling the request is then communicated to the client communications device (Block 86), and the electronic data is formatted according to the preferred scenario.

FIG. 13 is a flowchart illustrating another method of providing communications services. A request for electronic data is received (Block 88). The request originates from a client communications device. A query is communicated via a network for a first data stream (Block 90). The first data stream is received at a computer, and the first data stream includes packets of data packetized according to a packet protocol (Block 92). The on-demand, real-time availability of network routing is assessed (Block 94), and the on-demand, real-time availability of network bandwidth is also assessed (Block 96). A preferred scenario of segmentation, dispersion, and assemblage of electronic data is ascertained according to the Service Level Agreement (Block 98). A routing identified in the preferred scenario is reserved (Block 100). The first data stream is then segmented into segments according to the Service Level Agreement (SLA) (Block 102). The Service Level Agreement is an agreement defining parameters for communications service for the subscriber. At least one segment is dispersed via the network for a subsequent processing service, perhaps according to the Service Level Agreement (Block 104).

The flowchart continues with FIG. 14. A result of the processing service is received (Block 106) and assembled as a second data stream, perhaps according to the Service Level Agreement (Block 108). The second data stream includes at least one of i) the result of the processing service and ii) another segment. The second data stream is then communicated via the network (Block 110) to a client communications device, perhaps according to the Service Level Agreement. An assertion may be provided to a communications service provider, and the assertion indicates that the Service Level Agreement was satisfied (Block 112). The assertion may be certified to reduce the incidence of fraudulent assertions (Block 114). The subscriber may also provide the assertion (Block 116).

The Analysis Module (shown as reference numeral 20 in FIGS. 1-11) may be physically embodied on or in a non-transitory computer-readable medium. This computer-readable medium may include CD-ROM, DVD, tape, cassette, floppy disk, memory card, and large-capacity disk (such as IOMEGA®, ZIP®, JAZZ®, and other large-capacity memory products (IOMEGA®, ZIP®, and JAZZ® are registered trademarks of Iomega Corporation, 1821 W. Iomega Way, Roy, Utah 84067, 801.332.1000, www.iomega.com). This computer-readable medium, or media, could be distributed to end-users, licensees, and assignees. These types of computer-readable media, and other types not mention here but considered within the scope of the present invention, allow the Analysis Module to be easily disseminated. A computer program product for providing communications services includes the Analysis Module stored on the computer-readable medium. The Analysis Module segments a first data stream into segments according to a Service Level Agreement. The Analysis Module disperses at least one segment via a network for a subsequent processing service, and the Analysis Module receives a result of the processing service. The Analysis Module assembles a second data stream, and the second data stream includes at least one of i) the result of the processing service and ii) another segment. The Analysis Module then communicates the second data stream via the network.

The Analysis Module may also be physically embodied on or in any addressable (e.g., HTTP, I.E.E.E. 802.11, Wireless Application Protocol (WAP)) wireless device capable of presenting an IP address. Examples could include a computer, a wireless personal digital assistant (PDA), an Internet Protocol mobile phone, or a wireless pager.

While the present invention has been described with respect to various features, aspects, and embodiments, those skilled and unskilled in the art will recognize the invention is not so limited. Other variations, modifications, and alternative embodiments may be made without departing from the spirit and scope of the present invention. 

1. A method of providing communications services, comprising: processing a request for data by a processor; receiving a data stream to fulfill the request for data; storing the data stream in memory communicating with the processor; determining by the processor that a subcontracted processing service is required; subcontracting at least a portion of the data stream to a different service provider to receive the subcontracted processing service; receiving a result of the subcontracted processing service; and storing the result in the memory.
 2. The method according to claim 1, further comprising assembling the result of the subcontracted processing service with a remaining portion of the data stream to produce an assembled result.
 3. The method according to claim 1, further comprising communicating the assembled result to fulfill the request.
 4. The method according to claim 1, further comprising assessing an availability of network routing to fulfill the request for data.
 5. The method according to claim 4, further comprising sending a reservation to reserve a routing path.
 6. The method according to claim 5, further comprising providing an instruction to only accept packets of data destined for the routing path.
 7. The method according to claim 6, further comprising specifying a window of time in which the packets of data must be received.
 8. The method according to claim 1, further comprising assessing an availability of network bandwidth to fulfill the request for data.
 9. The method according to claim 1, further comprising ascertaining a preferred scenario of segmentation, dispersion, and assemblage of the data to fulfill the request for data.
 10. The method according to claim 9, further comprising assessing a highest quality scenario that achieves a highest quality of presentation.
 11. The method according to claim 9, further comprising assessing a lowest cost scenario that achieves a lowest cost.
 12. The method according to claim 9, further comprising ascertaining a most profitable scenario that achieves a highest profit.
 13. The method according to claim 1, further comprising issuing an assertion to the different service provider that the subcontracted processing service was correctly performed.
 14. The method according to claim 1, further comprising issuing an assertion to the different service provider that the subcontracted processing service was correctly performed according to a service level agreement.
 15. The method according to claim 1, further comprising receiving an assertion from a subscriber that the subcontracted processing service was correctly performed.
 16. The method according to claim 1, further comprising denying the request for data when a subscriber fails to provide an assertion that a previously subcontracted processing service was correctly performed.
 17. A system for providing communications services, comprising: a processor executing code stored in memory, the code causing the processor to: receive a request for data; receive a data stream to fulfill the request for data; store the data stream in the memory; determine that a subcontracted processing service is required; subcontract at least a portion of the data stream to a different service provider to receive the subcontracted processing service; receive a result of the subcontracted processing service; and store the result in the memory.
 18. The system according to claim 17, wherein the code further causes the processor to assemble the result of the subcontracted processing service with a remaining portion of the data stream.
 19. A non-transitory computer program product comprising computer readable medium storing processor executable instructions for performing a method of providing communications services, the method comprising: processing a request for data by a processor; receiving a data stream to fulfill the request for data; storing the data stream in memory communicating with the processor; determining by the processor that a subcontracted processing service is required; subcontracting at least a portion of the data stream to a different service provider to receive the subcontracted processing service; receiving a result of the subcontracted processing service; and storing the result in the memory.
 20. The non-transitory computer program product according to claim 19, further comprising processor executable instructions for assembling the result of the subcontracted processing service with a remaining portion of the data stream. 