Methods and systems for enabling end-user equipment at an end-user premise to effect communications when an ability of the end-user to communicate via a communication link connecting the end-user equipment to a communications network is disrupted

ABSTRACT

A method for effecting communications, such as telephone calls, accesses to data network sites, alarm system communications, and/or other communications, over a communications network. The method comprises: determining that an ability of first end-user equipment at a first end-user premise to communicate via a first communication link connecting the first end-user equipment to the communications network is disrupted; establishing a wireless communication link between the first end-user equipment and second end-user equipment at a second end-user premise; and causing information transmitted by or destined for the first end-user equipment to be exchanged over the communications network via the wireless communication link and a second communication link connecting the second end-user equipment to the communications network. Also provided are apparatus and computer-readable media containing a program element executable by a computing system to perform such a method.

CROSS REFERENCE TO RELATED APPLICATIONS

This is the U.S. National Stage of International Application No.PCT/CA2008/002282, filed Dec. 23, 2008, which was published in Englishunder PCT Article 21(2).

FIELD OF THE INVENTION

The invention relates generally to telecommunications and, moreparticularly, to methods and systems for enabling end-user equipment atan end-user premise to effect communications when an ability of theend-user equipment to communicate via a communication link connectingthe end-user equipment to a communications network is disrupted.

BACKGROUND

End-user premises such as residences or other buildings (or partsthereof) can be equipped with various pieces of equipment, includingphones, computers, alarm system devices and/or other devices (e.g.,television units), which can be used to effect telephone calls, accessesto data network sites (e.g., websites), alarm system communications,and/or other communications (e.g., television signals, etc.).

Communications effected by end-user equipment at a given end-userpremise take place over a communication link, such as a metallictwisted-pair cable, a coaxial cable, an optic fiber cable, or a wirelesslink, which reaches the given end-user premise and connects the end-userequipment to a communications network. In some situations, an ability ofthe end-user equipment to communicate via the communication link can bedisrupted. For example, in some cases, the communication link can bedisrupted, for instance, due to a cut or other physical damage inflicted(accidentally or maliciously) to the communication link or to any othercondition preventing the communication link from operating normally. Inother cases, software and/or hardware (e.g., a modem) of the end-userequipment used by the end-user equipment to effect communications viathe communication link can be disrupted, for instance, due to adefective or inoperative component. In such situations, it may no longerbe possible for the end-user equipment to effect telephone calls,accesses to data network sites, alarm system communications, and/orother communications via the communication link.

Accordingly, there exists a need for solutions enabling end-userequipment at an end-user premise to effect telephone calls, accesses todata network sites, alarm system communications, and/or othercommunications when an ability of the end-user equipment to communicatevia a communication link connecting the end-user equipment to acommunications network is disrupted.

SUMMARY OF THE INVENTION

According to a first broad aspect, the invention provides a method foreffecting communications over a communications network. The methodcomprises: determining that an ability of first end-user equipment at afirst end-user premise to communicate via a first communication linkconnecting the first end-user equipment to the communications network isdisrupted; establishing a wireless communication link between the firstend-user equipment and second end-user equipment at a second end-userpremise; and causing information transmitted by or destined for thefirst end-user equipment to be exchanged over the communications networkvia the wireless communication link and a second communication linkconnecting the second end-user equipment to the communications network.

According to a second broad aspect, the invention provides apparatus foreffecting communications over a communications network. The apparatuscomprises a processing entity configured to determine that an ability offirst end-user equipment at a first end-user premise to communicate viaa first communication link connecting the first end-user equipment tothe communications network is disrupted. The apparatus also comprises arouting entity configured to: establish a wireless communication linkbetween the first end-user equipment and second end-user equipment at asecond end-user premise; and cause information transmitted by ordestined for the first end-user equipment to be exchanged over thecommunications network via the wireless communication link and a secondcommunication link connecting the second end-user equipment to thecommunications network.

According to a third broad aspect, the invention providescomputer-readable media containing a program element executable by acomputing system to perform a method for effecting communications over acommunications network. The program element comprises: program code forcausing the computing system to determine that an ability of firstend-user equipment at a first end-user premise to communicate via afirst communication link connecting the first end-user equipment to thecommunications network is disrupted; program code for causing thecomputing system to establish a wireless communication link between thefirst end-user equipment and second end-user equipment at a secondend-user premise; and program code for causing the computing system tocause information transmitted by or destined for the first end-userequipment to be exchanged over the communications network via thewireless communication link and a second communication link connectingthe second end-user equipment to the communications network.

These and other aspects of the invention will become apparent to thoseof ordinary skill in the art upon review of the following description ofexample embodiments of the invention in conjunction with theaccompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

A detailed description of certain embodiments of the invention isprovided herein below, by way of example only, with reference to theaccompanying drawings, in which:

FIG. 1 shows an example of an architecture comprising a communicationsnetwork allowing end-user equipment located at respective end-userpremises to effect various communications, in accordance with anembodiment of the invention;

FIG. 2 shows an example of potential contents of a database of acommunication apparatus of the communications network shown in FIG. 1;

FIG. 3 shows a communication apparatus of the end-user equipment locatedat one of the end-user premises shown in FIG. 1;

FIG. 4 shows an example of potential contents of a database of thecommunication apparatus shown in FIG. 3;

FIGS. 5A and 5B show an example in which a wireless communication linkis established between the end-user equipment at a first one of theend-user premises and the end-user equipment at a second one of theend-user premises in order to allow information pertaining to acommunication effected using the end-user equipment at the first one ofthe end-user premises to be exchanged over the communications network,when an ability of the end-user equipment at the first one of theend-user premises to communicate via a communication link connecting theend-user equipment at the first one of the end-user premises to thecommunications network is disrupted; and

FIGS. 6A and 6B show a variant to the example considered in FIGS. 5A and5B.

It is to be expressly understood that the description and drawings areonly for the purpose of illustration of example embodiments of theinvention and are an aid for understanding. They are not intended to bea definition of the limits of the invention.

DETAILED DESCRIPTION OF EMBODIMENTS

FIG. 1 shows an example of an architecture comprising a communicationsnetwork 12 allowing end-user equipment 10 ₁-10 _(N) located atrespective end-user premises 18 ₁-18 _(N) to effect variouscommunications, including telephone calls, accesses to data networksites (e.g., websites), alarm system communications, and/or othercommunications (e.g., television signals), in accordance with anembodiment of the invention. Each of the end-user premises 18 ₁-18 _(N)may be a residence (such as a house or an apartment) or other building(or a part thereof).

The end-user equipment 10 _(x) (1≦x≦N) at the end-user premise 18 _(x)is connected to the communications network 12 via a respective one of aplurality of communication links 21 ₁-21 _(N) that reach correspondingones of the end-user premises 18 ₁-18 _(N). In this embodiment, thecommunication links 21 ₁-21 _(N) are part of an access network 13 thatis provided by a service provider providing communication services tothe end-user premises 18 ₁-18 _(N). The access network 13 leads to acore network 30 provided by the service provider to enable the end-userequipment 10 ₁-10 _(N) at the end-user premises 18 ₁-18 _(N) to effectcommunications over various networks of the communications network 12,including a packet-switched network 32 (e.g., the Internet), acircuit-switched network 34 (e.g., the Public Switched Telephone Network(PSTN)) and a mobile network 36 (e.g., a Global System for MobileCommunications (GSM) network or other cellular network).

More particularly, in this embodiment, each of the communication links21 ₁-21 _(N) comprises a metallic twisted-pair cable (e.g., a coppertwisted-pair cable) or a coaxial cable that is connected to a networkelement 31 of the access network 13. Also, in this embodiment, theaccess network 13 is based on a fiber-to-the-node or -neighborhood(FTTN) infrastructure such that the network element 31 comprises a FTTNplatform (e.g., an Alcatel 7330 Intelligent Services Access Manager(ISAM) Fiber to the Node (FTTN) platform) which, in addition to beingconnected to the communication links 21 ₁-21 _(N), is connected tooptical fiber cabling of the access network 13. The optical fibercabling is connected to other components of the access network 13 (e.g.,one or more routers or switches, an optical Ethernet network, etc.) thatinterface with the core network 30.

The access network 13 and the communication links 21 ₁-21 _(N) may beimplemented in various other ways in other embodiments. For example, insome embodiments, the access network 13 may be based on afiber-to-the-curb (FTTC) infrastructure and the network element 31 maybe a FTTC platform. In other embodiments, the network element 31 may beomitted depending on the nature of the access network 13. For example,in some embodiments, the access network 13 may be based on afiber-to-the-premises (FTTP) infrastructure (e.g., fiber-to-the-building(FTTB) or fiber-to-the-house (FTTH) infrastructures) in which case thecommunication links 21 ₁-21 _(N) may comprise optical fiber cablesleading to optical network terminals (ONTs) that may be part of theend-user equipment 10 ₁-10 _(N) at the end-user premises 18 ₁-18 _(N).In yet other embodiments, the communication links 21 ₁-21 _(N) maycomprise a wireless link portion (e.g., a WiMAX link, a satellite-basedlink, etc.).

The core network 30 comprises a communication apparatus 40 configured toperform various operations when a communication, such as a telephonecall or an access to a data network site, is originated by, destinedfor, in progress at certain end-user equipment (such as any of theend-user equipment 10 ₁-10 _(N)). The communication apparatus 40comprises suitable hardware, firmware, software or a combination thereoffor implementing a plurality of functional entities, including aprocessing entity 42, a routing entity 44 and a database 48.

The processing entity 42 implements a processing logic to processcommunications originated by, destined for, or in progress at end-userequipment (such as any of the end-user equipment 10 ₁-10 _(N)). Theprocessing logic may be defined by a sequence of decisions to be takenwith respect to a given communication, which may lead to one or moreactions being performed based on those decisions. Each decision takenwith respect to the given communication may be based on one or morefactors. One example of such a factor is an origin of the givencommunication which, for instance, may be specified by: a telephonenumber, an Internet Protocol (IP) address, a Uniform Resource Identifier(URI) (e.g., a Session Initiation Protocol (SIP) URI), and/or anotheridentifier identifying a device that originated the given communication;a name or other identifier of a party that originated the givencommunication; a time at which the given communication was originated(e.g., a day, hour, minute, etc.); and/or a location (e.g., a civicaddress) where the given communication was originated. Another exampleof such a factor is a destination of the given communication which, forinstance, may be specified by: a telephone number, an IP address, a URI(e.g., a SIP URI), and/or another identifier identifying a device forwhich the given communication is destined; a name or other identifier ofa party for which the given communication is destined; and/or a location(e.g., a civic address) for which the given communication is destined.In some cases, a factor on which may be based a decision to be takenwith respect to the given communication may also be defined in terms ofcertain information included in the database 48 that may be accessed bythe processing entity 42 (e.g., where the given communication is atelephone call, certain information in the database 48 on how to processcalls involving a party having originated the telephone call or forwhich the telephone call is destined may be used by the processingentity 42).

FIG. 2 shows an example of potential contents of the database 48. Inthis example, the database 48 stores a plurality of records 200 ₁-200_(N), where each of these records is associated with a subscription tocommunication services provided by the service provider to a respectiveone of the end-user premises 18 ₁-18 _(N). In other words, each of theend-user premises 18 ₁-18 _(N) is associated with a different subscriber(i.e., a person or a group of persons) to which the service providerprovides communication services. The database 48 may store other recordsassociated with other subscriptions associated with other end-userpremises which are served by the service provider.

The record 200 _(x) is associated with the subscriber to whichcommunication services are provided at the end-user premise 18 _(x) andincludes various types of information. More particularly, in thisexample, the record 200 _(x) includes:

-   -   subscriber identification information 19 identifying the        subscriber. For example, the subscriber identification        information 19 may include an account number (e.g., a phone        number) and/or another subscriber identifier (e.g., a name);    -   location information 23 indicating a physical location of the        end-user premise 18 _(x). For example, the location information        23 may include a civic address, a set of geo-coordinates, and/or        any other information that indicates the physical location of        the end-user premise 18 _(x);    -   end-user equipment information 27 regarding the end-user        equipment 10 _(x) at the end-user premises 18 _(x), which        includes information regarding each of one or more pieces of        equipment of the end-user equipment 10 _(x). For example, the        information regarding a given piece of equipment of the end-user        equipment 10 _(x) may include an identifier of the given piece        of equipment, such as: a Media Access Control (MAC) address, an        Ethernet hardware address (EHA), or another hardware identifier        of the given piece of equipment; an IP address assigned to the        given piece of equipment; a URI (e.g., a SIP URI) identifying        the given piece of equipment; or any other information that        identifies the given piece of equipment. The end-user equipment        information 27 may also include additional information that        concerns the end-user equipment 10 _(x) at the end-user premise        18 _(x), examples of which will be discussed later on; and    -   service information 25 regarding one or more communication        services provided to the subscriber by the service provider. For        example, the service information 25 may comprise call processing        information that is related to processing of calls destined for        or originated by the subscriber and that is used by the        communication apparatus 40 to process such calls. In some cases,        the call processing information may relate to one or more        telephony features (e.g., call forwarding, call waiting, calling        line identification (CLID) display, etc.) that may be subscribed        to by the subscriber.

While this example illustrates certain information that can be includedin the records 200 ₁-200 _(N) of the database 48, various otherinformation may be included in these records in other embodiments. Inaddition, while it is depicted in FIG. 1 as being one component, thedatabase 48 may be distributed in nature. For example, in someembodiments, the database 48 can have portions of its content stored indifferent data storage media possibly located in different components ofthe communication apparatus 40 that are linked by one or more physical(i.e., wired or wireless) links.

The routing entity 44 is operative to cause one or more actions to beperformed based on one or more decisions taken by the processing entity42 with respect to a given communication, such as route informationconveyed by the given communication to a certain piece of equipmentwhich may be, for instance, a certain end-user device or a certainnetwork element (e.g., a router). For example, the routing entity 44 maycause information conveyed by the given communication to be routed viathe packet-switched network 32, the circuit-switched network 34, or themobile network 36. To that end, the routing entity 44 may interact withone or more gateways interfacing with the packet-switched network 32,the circuit-switched network 34, and the mobile network 36

In some embodiments, the processing entity 42, the routing entity 44 andthe database 48 may be implemented by a common network component. Forexample, in some embodiments, the processing entity 42, the routingentity 44 and the database 48 may be implemented by a softswitch orother computer platform. Alternatively, in other embodiments, theprocessing entity 42, the routing entity 44 and the database 48 may beimplemented by two or more different network components that are linkedby one or more physical (i.e., wired or wireless) links. For example, insome embodiments, the processing entity 42, the routing entity 44 andthe database 48 may be implemented by two or more softswitches or othercomputer platforms.

The end-user equipment 10 _(x) at the end-user premise 18 _(x) comprisesvarious pieces of equipment that can be used to effect communications,including telephone calls, accesses to data network sites, alarm systemcommunications, and/or other communications (e.g., television signals).More particularly, the end-user equipment 10 _(x) at the end-userpremise 18 _(x) comprises one or more end-user devices configured toeffect communications, such as: one or more telephones, each of whichmay be, for instance, a wired Plain Old Telephony System (POTS) phone(including a cordless phone), a Voice-over-Internet Protocol (VoIP)phone, a POTS phone equipped with an analog terminal adapter (ATA), asoftphone (i.e., a computer equipped with telephony software), or atelephony-enabled television unit (e.g., a set-top box connected to atelevision and a remote control); one or more computers, each of whichmay comprise, for instance, a desktop computer, a laptop computer oranother personal computer (PC); one or more alarm system devices of analarm system (sometimes also referred to as a “security system”), eachof which may comprise, for instance, a door or window opening detector,a smoke detector, a motion detector, a glass break detector and/oranother detector, a controller, and/or another piece of equipment of thealarm system; and/or one or more other end-user devices (e.g., atelevision unit).

Also, in this embodiment, the end-user equipment 10 _(x) at the end-userpremise 18 _(x) comprises a communication apparatus 20 _(x) that isconnected to the one or more end-user devices at the end-user premise 18_(x) and to the communication link 21 _(x) reaching the end-user premise18 _(x) in order to allow these one or more end-user devices tocommunicate over the communications network 12 via the communicationlink 21 _(x). The communication apparatus 20 _(x) at the end-userpremise 18 _(x) can thus be viewed as a communications center or hubthrough which communications originated by, destined for, or in progressat the one or more end-user devices at the end-user premise 18 _(x) areeffected via the communication link 21 _(x) reaching the end-userpremise 18 _(x).

In some situations, an ability of the end-user equipment 10 _(x) tocommunicate via the communication link 21 _(x) can be disrupted (i.e.,not normal). For example, in some cases, the communication link 21 _(x)can be disrupted, for instance, due to a cut or other physical damageinflicted (accidentally or maliciously) to the communication link 21_(x) (e.g., to a metallic twisted-pair or coaxial cable thereof), adefective or inoperative port of the network element 31 to which thecommunication link 21 _(x) is connected, or any other conditionpreventing the communication link 21 _(x) from operating normally. Inother cases, software and/or hardware (e.g., a modem) of the end-userequipment 10 _(x) used by the end-user equipment 10 _(x) to effectcommunications via the communication link 21 _(x) can be disrupted, forinstance, due to a defective or inoperative component. In suchsituations, it may no longer be possible for the end-user equipment 10_(x) to effect telephone calls, accesses to data network sites, alarmsystem communications, and/or other communications via the communicationlink 21 _(x) reaching the end-user premise 18 _(x).

In accordance with an embodiment of the invention, and as furtherdiscussed below, when an ability of the end-user equipment 10 _(x) tocommunicate via the communication link 21 _(x) reaching the end-userpremise 18 _(x) is determined to be disrupted, the communicationapparatus 20 _(x) of the end-user equipment 10 _(x) at the end-userpremise 18 _(x) can cause a wireless communication link to beestablished between the end-user equipment 10 _(x) and the end-userequipment 10 _(y) (1≦y≦N; y≠x) at the end-user premise 18 _(y) in orderto allow the end-user equipment 10 _(x) to effect communications overthe communications network 12 via this wireless communication link andthe communication link 21 _(y) reaching the end-user premise 18 _(y).This provides a failover mechanism that enables the end-user equipment10 _(x) at the end-user premise 18 _(x) to continue to be able to effecttelephone calls, accesses to data network sites, alarm systemcommunications, and/or other communications over the communicationsnetwork 12 despite its ability to communicate via the communication link21 _(x) being disrupted. In other words, despite the ability of theend-user equipment 10 _(x) to communicate via the communication link 21_(x) being disrupted, the end-user equipment 10 _(x) at the end-userpremise 18 _(x) continues to be able to effect telephone calls, accessesto data network sites, alarm system communications, and/or othercommunications over the communications network 12 by “piggybacking” onthe communication link 21 _(y) reaching the end-user premise 18 _(y).

With additional reference to FIG. 3, the communication apparatus 20 _(x)of the end-user equipment 10 _(x) at the end-user premise 18 _(x)comprises suitable hardware, firmware, software or a combination thereoffor implementing a plurality of functional entities, including, in thisembodiment, a network interface 50, a plurality of connectors 52 ₁-52_(M), a wireless interface 80, a wireless interface 70, a processingentity 54, a routing entity 62, a database 66, and a power supply 56. Insome embodiments, these entities of the communication apparatus 20 _(x)may be integrated into a terminal installed at a suitable location(e.g., a basement or other location) at the end-user premise 18 _(x). Inother embodiments, these entities of the communication apparatus 20 _(x)may be part of two or more devices interconnected to one another via oneor more physical links.

The network interface 50 is connected to the communication link 21 _(x)reaching the end-user premise 18 _(x) in order to provide an interfacebetween the end-user equipment 10 _(x) and the communications network12. For example, in some embodiments, the network interface 50 may beimplemented by a network interface device (NID) and a channel serviceunit/data service unit (CSU/DSU). In other embodiments, the networkinterface 50 may be implemented in various other manners depending onthe nature of the communication link 21 _(x).

The connectors 52 ₁-52 _(M) enable connection of one or more end-userdevices of the end-user equipment 10 _(x) to the communication apparatus20 _(x). For example, individual ones of the connectors 52 ₁-52 _(M) maybe an RJ11 connector (e.g., for connecting a wired POTS phone), an RJ45connector (e.g., for connecting a computer or a VoIP phone) or any othertype of connector (e.g., a connector for connecting to a televisionset-top box, a connector for connecting to an alarm system device,etc.).

The wireless interface 80 is configured to wirelessly exchangeinformation with one or more end-user devices of the end-user equipment10 _(x) at that end-user premise 18 _(x). More particularly, thewireless interface 80 comprises a wireless transmitter and a wirelessreceiver to wirelessly exchange information with one or more end-userdevices of the end-user equipment 10 _(x). For example, in someembodiments, the wireless interface 80 may be implemented by a wirelessrouter based on WiFi (IEEE 802.11) technology or other wirelesscommunication technologies.

The wireless interface 70 is configured to establish a wirelesscommunication link between the end-user equipment 10 _(x) at theend-user premise 18 _(x) and the end-user equipment 10 _(y) at theend-user premise 18 _(y), when the ability of the end-user equipment 10_(x) to communicate via the communication link 21 _(x) reaching theend-user premise 18 _(x) is determined to be disrupted. Moreparticularly, the wireless interface 70 comprises a wireless transmitterand a wireless receiver to wirelessly exchange information with theend-user equipment 10 _(y) at the end-user premise 18 _(y), For example,in some embodiments, the wireless interface 70 may be based on WiFitechnology or other wireless communication technologies.

The processing entity 54 is configured to receive requests forcommunications originated by one or more end-user devices of theend-user equipment 10 _(x). For example, the processing entity 54 mayreceive a request for a telephone call originated by a telephone of theend-user equipment 10 _(x), a request for an access to a data networksite originated by a computer of the end-user equipment 10 _(x), arequest for an alarm system communication originated by an alarm systemdevice, and/or a request for another type of communication originated byanother end-user device of the end-user equipment 10 _(x).

The processing entity 54 is also configured to process informationpertaining to communications effected by the end-user equipment 10 _(x).More particularly, in this embodiment, the processing entity 54comprises a modem 60 and an analog telephony adapter (ATA) 64. The modem60 is configured to modulate an analog carrier signal to encode digitalinformation for transmission via the network interface 50 and todemodulate an analog carrier signal received via the network interface50 to decode information it conveys. For example, in some embodiments,the modem 60 may be a digital subscriber line (DSL) modem or a cablemodem, depending on the nature of the communication link 21 _(x). TheATA 64 is configured to convert analog telephony signals from any wiredPOTS phone that may be part of the end-user equipment 10 _(x) andconnected to one of the connectors 52 ₁-52 _(M) into digital informationto be processed by the routing entity 62 and the modem 60, and viceversa.

The processing entity 54 is also configured to determine whether theability of the end-user equipment 10 _(x) to communicate via thecommunication link 21 _(x) is disrupted. For example, in thisembodiment, the processing entity 54 may monitor the network interface50 to detect a disruption of the communication link 21 _(x) (e.g.,detect that no signal is received or transmittable by the networkinterface 50 via the communication link 21 _(x) or detect that a signalreceived via the communication link 21 _(x) at the network interface 50fails to meet certain quality-of-service criteria). The processingentity 54 may also monitor software and/or hardware of the communicationapparatus 20 _(x) to detect a defective or inoperative component (e.g.,detect that the modem 60 is not operating normally). In otherembodiments, the processing entity 54 may determine that the ability ofthe end-user equipment 10 _(x) to communicate via the communication link21 _(x) is disrupted in various other ways, such as based on informationreceived from a source external to the communication apparatus 20 _(x)and indicative of a disruption of the ability of the end-user equipment10 _(x) to communicate via the communication link 21 _(x) (e.g., thecommunication apparatus 40 in the core network 30 may determine that thecommunication link 21 _(x) is disrupted and cause the end-user equipment10 _(y) at the end-user premise 18 _(y) to transmit information receivedvia the wireless interface 70 of the communication apparatus 20 _(x) atthe end-user premise 18 _(x) and indicative of a disruption of thecommunication link 21 _(x)).

The routing entity 62 is configured to cause information transmitted byor destined for the end-user equipment 10 _(x) to be exchanged over thecommunications network 12. More particularly, in this embodiment, whenthe ability of the end-user equipment 10 _(x) to communicate via thecommunication link 21 _(x) is normal (i.e., is not disrupted), therouting entity 62 routes information received via the connectors 52 ₁-52_(M) and/or the wireless interface 80 towards the modem 60 fortransmission via the network interface 50 and routes informationreceived from the modem 60 towards the connectors 52 ₁-52 _(M) and/orthe wireless interface 80 for transmission to one or more end-userdevices of the end-user equipment 10 _(x). However, when the ability ofthe end-user equipment 10 _(x) to communicate via the communication link21 _(x) is determined to be disrupted (i.e., not normal), the routingentity 62 can cause the wireless interface 70 to establish a wirelesscommunication link with the end-user equipment 10 _(y) at the end-userpremise 18 _(y). The routing entity 62 can proceed to route informationreceived via the connectors 52 ₁-52 _(M) and/or the wireless interface80 towards the wireless interface 70 such that it is conveyed via theestablished wireless communication link, and to route informationconveyed via the established wireless communication link and receivedvia the wireless interface 70 towards the connectors 52 ₁-52 _(M) and/orthe wireless interface 80 for transmission to one or more end-userdevices of the end-user equipment 10 _(x).

The database 66 stores information that can be used by the communicationapparatus 20 _(x) in operation. FIG. 4 shows an example of potentialcontents of the database 66.

In this example, the database 66 stores end-user equipment information41 regarding the end-user equipment 10 _(x), which includes informationregarding each of one or more pieces of equipment of the end-userequipment 10 _(x) (e.g., the communication apparatus 20 _(x) and the oneor more end-user devices at the end-user premise 18 _(x)). Moreparticularly, in this example, the information regarding a given pieceof equipment of the end-user equipment 10 _(x) may include:

-   -   an identifier of the given piece of equipment, such as a MAC        address, EHA, or other hardware identifier of that piece of        equipment, an IP address assigned to that piece of equipment, a        URI (e.g., a SIP URI) identifying that piece of equipment, or        any other information that identifies that piece of equipment;        and    -   depending on the nature of the given piece of equipment, access        information to be provided to the given piece of equipment in        order to access (i.e., make use of) that piece of equipment. For        example, the access information for the given piece of equipment        may comprise a code, such as a password or a wireless network        key (e.g., a Wi-Fi Protected Access (WPA) key).

In addition, in this example, the database 66 stores end-user equipmentinformation 43 regarding end-user equipment at one or more other ones ofthe end-user premises 18 ₁-18 _(N) that is within wireless range of theend-user equipment 10 _(x) at the end-user premise 18 _(x). For example,if the end-user equipment 10 _(z) (1≦z≦N; z≠x) at the end-user premise18 _(z) is within wireless range of the end-user equipment 10 _(x) atthe end-user premise 18 _(x), the end-user equipment information 43 mayinclude information regarding each of one or more pieces of equipment ofthe end-user equipment 10 _(z) (e.g., the communication apparatus 20_(z) and the one or more end-user devices at the end-user premise 18_(z)). For instance, the information regarding a given piece ofequipment of the end-user equipment 10 _(z) may include: an identifierof the given piece of equipment such as a MAC address, EHA, or otherhardware identifier of that piece of equipment, an IP address assignedto that piece of equipment, or any other information that identifiesthat piece of equipment; and, depending on the nature of the given pieceof equipment, access information to be provided to the given piece ofequipment in order to make use of that piece of equipment (e.g., apassword or a wireless network key).

The end-user equipment information 41 regarding the end-user equipment10 _(x) may be provided in the database 66 in various ways. For example,in some cases, the identifier of and/or access information for any pieceof equipment of the end-user equipment 10 _(x) may be provided in thedatabase 66 by a user at the end-user premise 18 _(x) when setting upthat piece of equipment. In other cases, the identifier of and/or accessinformation for any piece of equipment of the end-user equipment 10 _(x)may be provided in the database 66 by the service provider, for example,by the communication apparatus 40 transmitting this information via thecommunication link 21 _(x).

Similarly, the end-user equipment information 43 regarding end-userequipment at one or more other ones of the end-user premises 18 ₁-18_(N) that is within wireless range of the end-user equipment 10 _(x) atthe end-user premise 18 _(x) may be provided in the database 66 invarious ways. For example, in some cases, the end-user equipmentinformation 43 may be provided in the database 66 by the serviceprovider, for example, by the communication apparatus 40 transmittingthis information via the communication link 21 _(x). In other cases, theend-user equipment information 43 may be provided in the database 66during a provisioning phase (e.g., when the communication apparatus 20_(x) is initially set up at the end-user premise 18 _(x)) using anexchange of information between the communication apparatus 20 _(x) atthe end-user premise 18 _(x) and the communication apparatus at each ofthese one or more other ones of the end-user premises 18 ₁-18 _(N) thatis within wireless range of the end-user equipment 10 _(x) at theend-user premise 18 _(x).

While this example illustrates certain information that can be includedin the database 66, other information may be included in that databasein other embodiments. Also, while it is depicted in FIG. 3 as being onecomponent, the database 66 may be distributed in nature. For example, insome embodiments, the database 66 can have portions of its contentstored in different data storage media of the communication apparatus 20_(x).

The power supply 56 is configured to power the communication apparatus20 _(x), using electrical power from an electrical network of theend-user premise 18 _(x). In addition, the power supply 56 is capable ofpowering the communication apparatus 20 _(x) in cases where theelectrical network of the end-user premise 18 _(x) does not providesufficient electrical power (including no electrical power at all) foroperation of the communication apparatus 20 _(x) (e.g., due to a poweroutage or a malfunction in the electrical network). For example, thepower supply 56 may comprise one or more batteries capable of poweringthe communication apparatus 20 _(x) for a prolonged period of time(e.g., several hours or a few days) before being depleted. The powersupply 56 may also comprise charging circuitry for recharging the one ormore batteries using electrical power from the electrical network of theend-user premise 18 _(x).

While they are shown as distinct entities, different ones of thefunctional entities of the communication apparatus 20 _(x) may beimplemented by a common device. For example, the wireless interface 70and the wireless interface 80 may be implemented by a common wirelessrouter (e.g., a WiFi router). As another example, one or more of theconnectors 52 ₁-52 _(M) and the ATA 64 may be implemented by a commonATA device. As yet another example, the modem 60 and the networkinterface 50 may be implemented by a common network interface device. Asyet another example, the processing entity 54 and the routing entity 62may be implemented by a common processing platform. As yet anotherexample, the wireless interface 70, the wireless interface 80, theprocessing entity 54 and the routing entity 62 may be implemented by acommon routing device.

Also, while the communication apparatus 20 _(x) is configured in aparticular manner in this embodiment, the communication apparatus 20_(x) may be configured in various manners in other embodiments. Forexample, in some embodiments, the ATA 64 may be omitted in cases wherethe end-user equipment 10 _(x) at the end-user premise 18 _(x) does notcomprise any POTS phone.

Turning to FIGS. 5A and 5B, an example illustrating how the end-userequipment 10 _(j) at the end-user premise 18 _(j) continues to be ableto effect telephone calls, accesses to data network sites, alarm systemcommunications, and/or other communications over the communicationsnetwork 12 when its ability to communicate via the communication link 21_(j) reaching the end-user premise 18 _(j) is disrupted, will now beconsidered.

In this example, the end-user equipment 10 _(j) comprises, in additionto the communication apparatus 20 _(j), a plurality of end-user devices,including a computer 14 _(j), a VoIP phone 15 _(j), a POTS phone 16_(j), and alarm system devices (e.g., detectors, a controller) of analarm system 17 _(j), which are connected to the communication apparatus20 _(j) via its connectors 52 ₁-52 _(M) and/or its wireless interface80.

At one point in time, a telephone call, an access to a data networksite, an alarm system communication, and/or another communication is tobe effected by the end-user equipment 10 _(j). The communication isdestined for communication equipment 55, which, depending on the natureof the communication, may comprise a telephone, a computer and/oranother communication device. More particularly, for purposes of thisexample, it is assumed that a user 11 at the end-user premise 18 _(j)initiates a telephone call using the VoIP phone 15 _(j). It is furtherassumed that the communication equipment 55 comprises a telephone forwhich the telephone call is destined.

As shown in FIG. 5A, the communication apparatus 20 _(j) receivesinformation 200 from the VoIP phone 15 _(j) when the user 11 uses thisphone to initiate a telephone call. The information 200 conveys arequest for the telephone call being made using the VoIP phone 15 _(j)and is indicative of a destination of the telephone call. For example,the information 200 may include a phone number, SIP data and/or otherinformation that identifies the telephone of the communication equipment55 for which the telephone call is destined.

The processing entity 54 of the communication apparatus 20 _(j) verifiesthe ability of the end-user equipment 10 _(j) to communicate via thecommunication link 21 _(j) to assess whether it is normal or disrupted(i.e., not normal). This verification may be performed in variousmanners.

For example, in this embodiment, the processing entity 54 of thecommunication apparatus 20 _(j) verifies a state of the communicationlink 21 _(j) to assess whether it is operating normally or is disrupted(i.e., not operating normally). The state of the communication link 21_(j) may be verified in various ways. For instance, in this embodiment,the state of the communication link 21 _(j) may be verified using anexchange of signals along the communication link 21 _(j) between thecommunication apparatus 20 _(j) and one or more components of thecommunications network 12, such as the network element 31 of the accessnetwork 13 or the core network 30. The communication apparatus 20 _(j)may repeatedly (e.g., periodically) transmit signals along thecommunication link 21 _(j) to one or more components of thecommunications network 12 and expect receipt of a given acknowledgementsignal from the communications network 12.

Such an exchange of signals can allow the communication apparatus 20_(j) to verify the state of the communication link 21 _(j) usingcriteria that determine whether the communication link 21 _(j) isoperating normally or is disrupted. In some cases, the criteria mayinclude one or more of the following factors: timeliness (e.g., signalshave to be received and/or acknowledged within a particular timeframe);acknowledgement (e.g., a signal received by a component has to beacknowledged by the receiving component with a return signal);quality-of-service (e.g., the receiving component assesses a quality ofthe received signals to ensure that it conforms with a particularquality of service level). In other cases, the criteria may includeother factors.

The state of the communication link 21 _(j) may thus be assessed bydetermining whether the signals exchanged between the communicationapparatus 205 and the communications network 12 via this link satisfythe criteria. For example, the state of the communication link 21 _(j)may be deemed to be normal if the following criteria are met: theexchange of signals is completed within the expected timeframe (e.g.,five (5) seconds); a component having transmitted a signal receives areturn signal acknowledging the receipt of the transmitted signal;and/or the exchange of signals is completed within the expectedquality-of-service level. In contrast, the state of the communicationlink 21 _(j) may be deemed to be disrupted based on an exchange wheresignals are late or missing, signals are unacknowledged by one or morecomponents, and/or the quality of signals exchanged falls below theexpected quality-of-service.

While in this embodiment the processing entity 54 of the communicationapparatus 20 _(j) verifies the state of the communication link 21 _(j)based on an exchange of signals along the communication link 21 _(j)between the communication apparatus 20 _(j) and one or more componentsof the communications network 12, processing entity 54 may assess thestate of the communication link 21 _(j) in various other ways in otherembodiments. For example, in some embodiments, processing entity 54 maydetermine that the communication link 21 _(j) is disrupted based oninformation received from a source external to the communicationapparatus 20 _(j) and indicative of a disruption of the communicationlink 21 _(j) (e.g., the communication apparatus 40 in the core network30 may determine that the communication link 21 _(j) is disrupted andcause the end-user equipment 10 _(i) at the end-user premise 18 _(i) totransmit information received via the wireless interface 70 of thecommunication apparatus 20 _(j) and indicative of a disruption of thecommunication link 21 _(j)).

Also, in this embodiment, in addition to verifying the state of thecommunication link 21 _(j), processing entity 54 of the communicationapparatus 20 _(j) verifies a state of one or more software and/orhardware components (e.g., the modem 60, the network interface 50) ofthe end-user equipment 10 _(j) that are used to effect communicationsvia the communication link 21 _(j) in order to assess whether they areoperating normally or are disrupted (i.e., not operating normally). Forexample, processing entity 54 may verify the state of the modem 60 toassess whether it is operating normally or not (e.g., by verifyingwhether the modem 60 has issued any error code indicative of amalfunction).

For purposes of this example, assume that the ability of the end-userequipment 10 _(j) to communicate via the communication link 21 _(j) isdisrupted. Specifically, in this example, assume that the communicationlink 21 _(j) is disrupted, for instance, due to a cut or other physicaldamage inflicted to it, and thus cannot be used to reliably exchangeinformation between the end-user equipment 10 _(j) and thecommunications network 12.

Thus, in this embodiment, upon determining that the communication link21 _(j) is disrupted, the processing entity 54 of the communicationapparatus 20 _(j) attempts to find another way to effect the telephonecall being initiated by the user 11 using the VoIP phone 15 _(j) overthe communications network 12. More particularly, the communicationapparatus 20 _(j) attempts to implement a failover mechanism in which itattempts to establish a wireless communication link allowing it toeffect the telephone call by routing the call to the communicationsnetwork 12 via this wireless communication link and another one of thecommunications links 21 ₁-21 _(N).

The processing entity 54 of the communication apparatus 20 _(j) accessesthe database 66 of the communication apparatus 20 _(j) to obtain theend-user equipment information 43 regarding end-user equipment at one ormore other ones of the end-user premises 18 ₁-18 _(N) that is withinwireless range of the end-user equipment 10 _(j) at the end-user premise18 _(j).

In this example, it is assumed that the end-user equipment information43 in the database 66 of the communication apparatus 20 _(j) includesend-user equipment information regarding the end-user equipment 10 _(i)at the end-user premise 18 _(i), which is within wireless range of theend-user equipment 10 _(j) at the end-user premise 18 _(j). The end-userequipment 10 _(i) comprises, in addition to the communication apparatus20 _(i), a plurality of end-user devices, including a computer 14 _(i),a VoIP phone 15 _(i), another VoIP phone 16 _(i), and a television unit29 _(i), which are connected to the communication apparatus 20 _(i) viaits connectors 52 ₁-52 _(M) and/or its wireless interface 80. It is alsoassumed in this example that the end-user equipment information 43included in the database 66 of the communication apparatus 20 _(j) atthe end-user premise 20 _(j) includes an identifier of the communicationapparatus 20 _(i) (e.g., a MAC address, EHA, or other hardwareidentifier of the communication apparatus 20 _(i), an IP addressassigned to communication apparatus 20 _(i), or any other informationthat identifies the communication apparatus 20 _(i)) and accessinformation to be provided to the communication apparatus 20 _(i) inorder to make use of the communication apparatus 20 _(i) (e.g., apassword or a wireless network key).

While in this example the end-user equipment information 43 in thedatabase 66 pertains only to the end-user equipment 10 _(i) at theend-user premise 18 _(i), in other examples, the end-user equipmentinformation 43 in the database 66 may include identifiers and accessinformation for end-user equipment at other ones of the end-userpremises 18 ₁-18 _(N). In such a case, the processing entity 54 ofcommunication apparatus 20 _(j) may use a selection process to selectone or more of the communication apparatuses 20 ₁-20 _(N) listed in thedatabase 66 with which it may attempt to establish a wirelesscommunication link. For example, the selection process may define one ormore “preferred” ones of the communication apparatuses 20 ₁-20 _(N)listed in the database 66 that are predetermined by one or morecomponents of the communications network 12, such as the communicationapparatus 40 of the core network 30. As another example, the selectionprocess may allow the processing entity 54 of the communicationapparatus 20 _(j) to decide with which of the other ones of thecommunication apparatuses 20 ₁-20 _(N) listed in the database 66 itshould attempt to establish a wireless communication link. For instance,the processing entity 54 may evaluate the other ones of thecommunication apparatuses 20 ₁-20 _(N) listed in the database 66 basedon criteria such as their physical proximity, wireless signal strengthand/or reported network traffic load, and/or other factors. This mayallow the communication apparatus 20 _(j) to choose to establish awireless communication link with a different one of the communicationapparatuses 20 ₁-20 _(N) listed in the database 66 every time thefailover mechanism is initiated based on an evaluation of current signalstrength and network traffic load.

Upon retrieving the identifier and access information of thecommunication apparatus 20 _(i) the processing entity 54 of thecommunication apparatus 20 _(j) causes the routing entity 62 of thecommunication apparatus 20 _(j) to attempt to establish a wirelesscommunication link between the communication apparatus 20 _(j) and thecommunication apparatus 20 _(i). More particularly, the processingentity 54 causes the routing entity 62 to wirelessly transmitinformation 210 to the communication apparatus 20 _(i) via the wirelessinterface 70 of the communication apparatus 20 _(j). The information 210can be viewed as a request to access the communication apparatus 20_(i). In this example, the information 210 includes the identifier andaccess information of the communication apparatus 20 _(i), as well asthe identifier and access information of the communication apparatus 20_(j), which the processing entity 54 retrieved from the end-userequipment information 41 included in the database 66 of thecommunication apparatus 20 _(j).

When it receives the information 210, the communication apparatus 20_(i) attempts to validate the identifier and access information of thecommunication apparatus 20 _(i) that are included in the information210. More particularly, the processing entity 54 of the communicationapparatus 20 _(i) verifies whether the identifier and access informationof the communication apparatus 20 _(i) that are included in theinformation 210 correspond to the identifier and access information ofthe communication apparatus 20 _(i) that are included in the end-userequipment information 41 in the database 66 of the communicationapparatus 20 _(i). If not, the communication apparatus 20 _(i) may denythe request of the communication apparatus 20 _(j) to access thecommunication apparatus 20 _(i) and may take some other action. Forinstance, the communication apparatus 20 _(i) may send information backto the communication apparatus 20 _(j) indicating that access to thecommunication apparatus 20 _(i) is denied, and/or may send informationto the communication apparatus 40 of the core network 30 to indicatethat a failed connection attempt has occurred due to invalidcredentials.

In this example, it is assumed that the identifier and accessinformation of the communication apparatus 20 _(i) that are included inthe information 210 indeed correspond to the identifier and accessinformation of the communication apparatus 20 _(i) that are included inthe end-user equipment information 41 in the database 66 of thecommunication apparatus 20 _(i). Therefore, as shown in FIG. 5B, thecommunication apparatus 20 _(i) grants access to the communicationapparatus 20 _(j), resulting in establishment of a wirelesscommunication link 85 between the communication apparatus 20 _(j) andthe communication apparatus 20 _(i).

With the wireless communication link 85 being established, thecommunication apparatus 20 _(j) may proceed to effect the telephone callrequested by the user 11 using the VoIP phone 15 _(j) over thecommunications network 12 despite the disruption of the communicationslink 21 _(j).

More particularly, the routing entity 62 of the communication apparatus20 _(j) transmits information 240 pertaining to the telephone call tothe communications network 12 via the wireless communication link 85,the communication apparatus 20 _(i) and the communication link 21 _(i).The information 240 includes the telephone number, SIP data or otherinformation identifying the telephone of the communication equipment 55.In this example, the information 240 also includes the identifier of thecommunication apparatus 20 _(j) and the identifier of the VoIP phone 15_(j) from which the telephone call originates. The information 240 mayalso include other call control information that may be needed toestablish the telephone call.

The communication apparatus 40 of the core network 30 receives theinformation 240. The processing entity 42 of the communication apparatus40 determines, based on the telephone number, SIP data or otherinformation included in the information 240, that the telephone call isto be established with the telephone of the communication equipment 55.The processing entity 42 proceeds to cause the routing entity 44 of thecommunication apparatus 40 to transmit information 250 to thecommunication equipment 55 to establish the telephone call between theVoIP phone 15 _(j) and the telephone of the communication equipment 55.

Once the information 250 is received by the communication equipment 55,a person or automated system (e.g., a voicemail system, an automatedvoice response system) associated with the communication equipment 55can answer the telephone call initiated by the user 11. Informationpertaining to the telephone call may then be exchanged between the VoIPphone 15 _(j) and the communication equipment 55.

More particularly, the routing entity 62 of communication apparatus 20_(j) transmits information 220 pertaining to the telephone call over thecommunications network 12 via the wireless communication link 85, thecommunication apparatus 20 _(i) and the communication link 21 _(i). Theinformation 220 can include information transmitted by the VoIP phone 15_(j), which may include voice information provided by the user 11 duringthe call, and possibly call control information to maintain the call inprogress.

In the other direction, information 230 pertaining to the telephone calland arriving over the communications network 12 may be routed to thecommunication apparatus 20 _(j) via the communication link 21 _(i), thecommunication apparatus 20 _(i) and the wireless communication link 85.For example, the information 230 may include call control informationtransmitted by the communications network 12 to establish and/ormaintain the call in progress, and/or voice information provided by theperson or automated system associated with the communication equipment55 during the call.

Thus, information pertaining to the telephone call (such as theinformation 240, 220, 230) can be exchanged between the communicationsnetwork 12 and the communication apparatus 20 _(j) by “piggybacking”this information on the communications link 21 _(i). In this way, thetelephone call can still be effected by the user 11 despite thedisruption of the communication link 21 _(j). This is generally veryuseful, in particular if the telephone call that the user 11 wants tomake is an important call or an emergency call (such as an emergency“911” call) to police, fire and/or ambulance services in an emergencysituation.

In some embodiments, the wireless communication link 85 may remainestablished between the communication apparatus 20 _(j) and thecommunication apparatus 20 _(i) until the telephone call is terminated.Upon determining that the telephone call is terminated, the processingentity 54 of the communication apparatus 20 _(j) may cause the routingentity 62 of the communication apparatus 20 _(j) to wirelessly transmitinformation to the communication apparatus 20 _(i) via the wirelessinterface 70 of the communication apparatus 20 _(j) in order todisestablish the wireless communication link 85.

In other embodiments, the wireless communication link 85 may remainestablished between the communication apparatus 20 _(j) and thecommunication apparatus 20 _(i) until the disruption to thecommunication link 21 _(j) is resolved. In other words, the wirelesscommunication link 85 may remain established even after the terminationof the telephone call placed by the user 11 (e.g., to allow the end-userequipment 20 _(j) to make other telephone calls and/or othercommunications, and/or to allow incoming calls and/or other incomingcommunications to reach the end-user premise 18 _(j)). When thedisruption to the communication link 21 _(j) is resolved, the wirelesscommunication link 85 becomes unnecessary and may be disestablished(i.e., terminated). To determine when the communication link 21 _(j) isno longer disrupted (i.e., is operating normally once again), thecommunication apparatus 20 _(j) may verify the state of thecommunication link 21 _(j). For example, this verification may becarried out periodically by the communication apparatus 20 _(j),possibly more frequently while the communication link 21 _(j) isdisrupted, in order to detect when the communication link 21 _(j) is nolonger disrupted. As mentioned above, the state of the communicationlink 21 _(j) may be verified using an exchange of signals between thecommunication apparatus 20 _(j) and the communications network 12. Whensuch an exchange of signals results in the proper criteria being met,the communication apparatus 20 _(j) can deem the state of thecommunication link 21 _(j) as being normal (i.e., non-disrupted) onceagain. Upon concluding that the state of the communication link 21 _(j)is once again normal, the processing entity 54 of the communicationapparatus 20 _(j) may cause the routing entity 62 of the communicationapparatus 20 _(j) to wirelessly transmit information to thecommunication apparatus 20 _(i) via the wireless interface 70 of thecommunication apparatus 20 _(j) in order to disestablish the wirelesscommunication link 85.

While in the example presented above the ability of the end-userequipment 10 _(j) to communicate via the communication link 21 _(j) isdisrupted due to a disruption to the communication link 21 _(j) itself,similar operations may occur when the ability of the end-user equipment10 _(j) to communicate via the communication link 21 _(j) is disrupteddue to some other reason, such as a defective or inoperative software orhardware component of the end-user equipment 10 _(j) (e.g., the modem60) normally used to effect communications over the communication link21 _(j).

Also, while the example presented above involved a telephone callinitiated by the user 11 using the VoIP phone 15 _(j), similaroperations may occur for other types of communications effected usingthe end-user equipment 10 _(j) at the end-user premise 18 _(j). Forexample, if the user 11 uses the computer 14 _(j) to access one or moredata network sites (e.g., web sites) while the ability of the end-userequipment 10 _(j) to communicate via the communication link 21 _(j) isdisrupted, information pertaining to such data network site accesses(e.g., hypertext markup language (HTML) requests and responses) can betransmitted to and from the packet-switched network 32 of thecommunications network 12 via the communication apparatus 20 _(j), thewireless communication link 85, the communication apparatus 20 _(i) andthe communication link 21 _(i). Other types of communications, suchalarm system communications, can be effected in a similar manner.

It will thus be appreciated that, in this embodiment, interactionbetween the communication apparatus 20 _(j) at the end-user premise 18_(j) and the communication apparatus 20 _(i) at the end-user premise 18_(i) provides a failover mechanism enabling the end-user equipment 10_(j) at the end-user premise 18 _(j) to continue to be able to effecttelephone calls, accesses to data network sites, alarm systemcommunications, and/or other communications over the communicationsnetwork 12, despite the ability of the end-user equipment 10 _(j) tocommunicate via the communication link 21 _(j) being disrupted, by“piggybacking” on the communication link 21 _(i) reaching the end-userpremise 18 _(i). In this way, telephone, data network (e.g., Internet),alarm system, television and/or other communication services maycontinue to be provided to the subscriber associated with the end-userpremise 18 _(j) in an uninterrupted fashion, regardless of the abilityof the end-user equipment 10 _(j) to communicate via the communicationlink 21 _(j) reaching the end-user premise 18 _(j).

The failover mechanism contemplated herein may be implemented in variousother ways in other embodiments.

For example, in some embodiments, one or more end-user devices of theend-user equipment 10 _(x) at the end-user premise 18 _(x) may havewireless capabilities that can be exploited to implement the failovermechanism contemplated herein.

With reference to FIG. 6A, a variant to the example considered abovewill be discussed in which it is assumed that the VoIP phone 15 _(j)used by the user 11 to place the telephone call is a wireless VoIPphone.

As in the example considered above, when the user 11 initiates thetelephone call using the VoIP phone 15 _(j), the communication apparatus20 _(j) receives the information 200 from the VoIP phone 15 _(j)conveying the request for the telephone call and including the telephonenumber, SIP data or other information identifying the telephone of thecommunication equipment 55 for which the telephone call is destined.Also as in the example considered above, the communication apparatus 20_(j), upon verifying the state of the communication link 21 _(j),determines that the communication link 21 _(j) is disrupted (i.e., notoperating normally).

Upon determining that the communication link 21 _(j) is disrupted, theprocessing entity 54 of the communication apparatus 20 _(j) attempts tofind another way to effect the telephone call being initiated by theuser 11 using the VoIP phone 15 _(j) over the communications network 12.More particularly, the communication apparatus 20 _(j) attempts toimplement a failover mechanism in which it attempts to establish awireless communication link allowing it to effect the telephone call byrouting the call to the communications network 12 via this wirelesscommunication link and another one of the communications links 21 ₁-21_(N).

The processing entity 54 of the communication apparatus 20 _(j) accessesthe database 66 of the communication apparatus 20 _(j) to obtain theend-user equipment information 43 regarding end-user equipment at one ormore other ones of the end-user premises 18 ₁-18 _(N) that is withinwireless range of the end-user equipment 10 _(j) at the end-user premise18 _(j).

As in the example considered above, in this variant example, it isassumed that the end-user equipment information 43 in the database 66 ofthe communication apparatus 20 _(j) includes an identifier of thecommunication apparatus 20 _(i) (e.g., a MAC address, EHA, or otherhardware identifier of the communication apparatus 20 _(i), an IPaddress assigned to the communication apparatus 20 _(i), or any otherinformation that identifies the communication apparatus 20 _(i)) andaccess information to be provided to the communication apparatus 20 _(i)in order to make use of the communication apparatus 20 _(i) (e.g., apassword or a wireless network key).

The processing entity 54 of the communication apparatus 20 _(j)retrieves the identifier and access information of the communicationapparatus 20 _(i). In the embodiment considered above, the communicationapparatus 20 _(j) uses this identifier and access information toestablish the wireless communication link 85 between itself and thecommunication apparatus 20 _(i). In this variant, however, thecommunication apparatus 20 _(j) attempts to cause establishment of awireless communication link between the VoIP phone 15 _(j) and thecommunication apparatus 20 _(i) instead.

More particularly, the routing entity 62 of the communication apparatus20 _(j) transmits information 205 to the VoIP phone 15 _(j). Theinformation 205 includes the identifier and access information for thecommunication apparatus 20 _(i) retrieved from the database 66 as wellas an indication to establish a wireless communication link betweenitself, i.e., the VoIP phone 15 _(j), and the communication apparatus 20_(i).

Upon receipt of the information 205, the VoIP phone 15 _(j) wirelesslysends information 211 to the communication apparatus 20 _(i). Theinformation 211 includes the identifier and access information of thecommunication apparatus 20 _(i) that was retrieved from the database 66by the communication apparatus 20 _(j). In this example, the information211 also includes an identifier of the VoIP phone 15 _(j) (e.g., a MACaddress, EHA, or other hardware identifier of the VoIP phone 15 _(j), anIP address assigned to the VoIP phone 15 _(j), or any other informationthat identifies the VoIP phone 15 _(j)) and may also include accessinformation to be provided to the VoIP phone 15 _(j) in order to makeuse of the VoIP phone 15 _(j) (e.g., a password or a wireless networkkey).

When it receives the information 211, the communication apparatus 20_(i) attempts to validate the identifier and access information of thecommunication apparatus 20 _(i) that are included in the information211. More particularly, the processing entity 54 of the communicationapparatus 20 _(i) verifies whether the identifier and access informationof the communication apparatus 20 _(i) that are included in theinformation 211 correspond to the identifier and access information ofthe communication apparatus 20 _(i) that are included in the end-userequipment information 41 in the database 66 of the communicationapparatus 20 _(i). If not, the communication apparatus 20 _(i) may denythe request of the VoIP phone 15 _(j) to access the communicationapparatus 20 _(i) and may take some other action. For instance, thecommunication apparatus 20 _(i) may send information back to the VoIPphone 15 _(j) indicating that access to the communication apparatus 20_(i) is denied, and/or may send information to the communicationapparatus 40 of the core network 30 to indicate that a failed connectionattempt has occurred due to invalid credentials.

In this example, it is assumed that the identifier and accessinformation of the communication apparatus 20 _(i) that are included inthe information 211 indeed correspond to the identifier and accessinformation of the communication apparatus 20 _(i) that are included inthe end-user equipment information 41 in the database 66 of thecommunication apparatus 20 _(i). Therefore, as shown in FIG. 6B, thecommunication apparatus 20 _(i) grants access to the VoIP phone 15 _(j),resulting in establishment of a wireless communication link 87 betweenthe VoIP phone 15 _(j) and the communication apparatus 20 _(i).

With the wireless communication link 87 being established, the VoIPphone 15 _(j) may proceed to effect the telephone call requested by theuser 11 using the VoIP phone 15 _(j) over the communications network 12despite the disruption to the communications link 21 _(j).

More particularly, the VoIP phone 15 _(j) transmits information 240′pertaining to the telephone call to the communications network 12 viathe wireless communication link 87, the communication apparatus 20 _(i)and the communication link 21 _(i). The information 240′ includes thetelephone number, SIP data or other information identifying thetelephone of the communication equipment 55. In this example, theinformation 240 also includes the identifier of the identifier of theVoIP phone 15 _(j) from which the telephone call originates. Theinformation 240′ may also include other call control information thatmay be needed to establish the telephone call.

The communication apparatus 40 of the core network 30 receives theinformation 240′. The processing entity 42 of the communicationapparatus 40 determines, based on the telephone number, SIP data orother information included in the information 240′, that the telephonecall is to be established with the telephone of the communicationequipment 55. The processing entity 42 proceeds to cause the routingentity 44 of the communication apparatus 40 to transmit information 250′to the communication equipment 55 to establish the telephone callbetween the VoIP phone 15 _(j) and the telephone of the communicationequipment 55.

Once the information 250′ is received by the communication equipment 55,a person or automated system (e.g., a voicemail system, an automatedvoice response system) associated with the communication equipment 55can answer the telephone call initiated by the user 11. Informationpertaining to the telephone call may then be exchanged between the VoIPphone 15 _(j) and the communication equipment 55.

More particularly, the VoIP phone 15 _(j) transmits information 220′pertaining to the telephone call over the communications network 12 viathe wireless communication link 87, the communication apparatus 20 _(i)and the communication link 21 _(i). The information 220′ may includevoice information provided by the user 11 during the call and possiblycall control information to maintain the call in progress.

In the other direction, information 230′ pertaining to the telephonecall and arriving over the communications network 12 may be routed tothe VoIP phone 15 _(j) via the communication link 21 _(i), thecommunication apparatus 20 _(i) and the wireless communication link 87.For example, the information 230′ may include call control informationtransmitted by the communications network 12 to establish and/ormaintain the call in progress, and/or voice information provided by theperson or automated system associated with the communication equipment55 during the call.

Thus, information pertaining to the telephone call (such as theinformation 240′, 220′, 230′) can be exchanged between thecommunications network 12 and the VoIP phone 15 _(j) by “piggybacking”this information on the communications link 21 _(i). In this way, thetelephone call can still be effected by the user 11 despite thedisruption of the communication link 21 _(j).

While this embodiment illustrates one way in which the failovermechanism contemplated herein may be implemented using wirelesscapabilities of one or more end-user devices of the end-user equipment10 _(x) at the end-user premise 18 _(x), such wireless capabilities maybe exploited in other ways in other embodiments to implement thefailover mechanism.

For example, in some embodiments, when the ability of the end-userequipment 10 _(x) to communicate via the communication link 21 _(x)reaching the end-user premise 18 _(x) is determined to be disrupted, thecommunication apparatus 20 _(x) at the end-user premise 18 _(x) mayestablish a wireless communication link with a wireless-enabled end-userdevice that is part of the end-user equipment 10 _(y) at the end-userpremise 18 _(y) rather than with the communication apparatus 20 _(y)directly. For instance, in the example considered above, thecommunication apparatus 20 _(j) at the end-user premise 18 _(j) mayestablish a wireless communication link between itself and the computer14 _(i), the VoIP phone 15 _(i), or the VoIP phone 16 _(i) (using anidentifier and possibly access information for that end-user deviceretrieved from the database 66 of the communication apparatus 20 _(j)),such that information pertaining to the telephone call requested by theuser 11 using the VoIP phone 15 _(j) may be exchanged between the VoIPphone 15 _(j) and the communication network 12 via this wirelesscommunication link, the communication apparatus 20 _(i) and thecommunication link 21 _(i).

As another example, in some embodiments, when the ability of theend-user equipment 10 _(x) to communicate via the communication link 21_(x) reaching the end-user premise 18 _(x) is determined to bedisrupted, the communication apparatus 20 _(x) at the end-user premise18 _(x) may establish a wireless communication link between awireless-enabled end-user device that is part of the end-user equipment10 _(x) and a wireless-enabled end-user device that is part of theend-user equipment 10 _(y) at the end-user premise 18 _(y). Forinstance, in the example considered above, the communication apparatus20 _(j) at the end-user premise 18 _(j) may establish a wirelesscommunication link between the VoIP phone 15 _(j) and the computer 14_(i), the VoIP phone 15 _(i), or the VoIP phone 16 _(i) (using anidentifier and possibly access information for that end-user deviceretrieved from the database 66 of the communication apparatus 20 _(j)),such that information pertaining to the telephone call requested by theuser 11 using the VoIP phone 15 _(j) may be exchanged between the VoIPphone 15 _(j) and the communication network 12 via this wirelesscommunication link, the communication apparatus 20 _(i) and thecommunication link 21 _(i).

Although the embodiments considered above relate to telephone calls,accesses to date network sites, alarm system communications, and/orother communications that originate from the end-user equipment 10 _(x),it will be appreciated that the failover mechanism contemplated hereinmay also apply to communications (e.g., incoming telephone calls) thatoriginate elsewhere, arrive over the communications network 12 and aredestined for the end-user equipment 10 _(x). In particular, in someembodiments, the communication apparatus 20 _(x) may repeatedly verifythe ability of the end-user equipment 10 _(x) to communicate via thecommunication link 21 _(x) to assess whether it is normal or disrupted(i.e., not normal), and not only when a request for a communication ismade using the end-user equipment 10 _(x), in order to detect adisruption of this ability as soon as possible after it occurs. Suchrapid detection can allow the failover mechanism to be invoked as soonas possible after the disruption of the ability of the end-userequipment 10 _(x) to communicate via the communication link 21 _(x),thus allowing incoming communications to reach the end-user equipment 10_(x) in an uninterrupted fashion.

In the embodiments considered above, the communication apparatus 20 _(x)at the end-user premise 18 _(x) determines that the ability of theend-user equipment 10 _(x) to communicate via the communication link 21_(x) reaching the end-user premise 18 _(x) is disrupted (i.e., notnormal) and proceeds to establish a wireless communication link betweenthe end-user equipment 10 _(x) at the end-user premise 18 _(x) and theend-user equipment 10 _(y) at the end-user premise 18 _(y). In otherembodiments, such functions may be implemented by other pieces ofequipment of the end-user equipment 10 _(x) at the end-user premise 18_(x) and/or of the communications network 12.

For example, in some embodiments, a given end-user device (e.g., aphone, computer, or alarm system device) at the end-user premise 18 _(x)may itself determine that the ability of the end-user equipment 10 _(x)to communicate via the communication link 21 _(x) is disrupted (i.e.,not normal) and proceed to implement the failover mechanism contemplatedherein. In such embodiments, the given end-user device constitutes anapparatus implementing a processing entity and a routing entityoperating in a manner similar to the processing entity 54 and therouting entity 62 of the communication apparatus 20 _(x) in connectionwith the failover mechanism contemplated herein. For instance, in avariant to the example considered above, the wireless VoIP phone 15 _(j)may determine that the communication apparatus 20 _(j) is inoperative ormalfunctioning or that the communication link 21 _(j) is down (e.g.,based on signals or lack of signals between the VoIP phone 15 _(j) andthe communication apparatus 20 _(j)). In such a variant, the wirelessVoIP phone 15 _(j) may store the identifier and access information ofthe communication apparatus 20 _(i) in memory or request them from thedatabase 66 of the communication apparatus 20 _(j) and may use thisinformation to establish a wireless communication link (such as thewireless communication link 87) in a manner similar to that describedabove.

As another example, in some embodiments, a disruption of the ability ofthe end-user equipment 10 _(x) to communicate via the communication link21 _(x) may be determined by an apparatus of the communication network12 (such as the communication apparatus 40 or the network element 31).

For instance, in one embodiment, the communications network 12 (and moreparticularly, the access network 13 or the core network 30) sends“heartbeat” signals to each of the communication apparatuses 20 ₁-20_(N) via the communication links 21 ₁-21 _(N). When the communicationlink 21 _(x) reaching the end-user premise 18 _(x) and the communicationapparatus 20 _(x) at the end-user premise 18 _(x) are operatingnormally, the communication apparatus 20 _(x) receives a heartbeatsignal from the communications network 12 and acknowledges its receiptby replying with a similar signal.

Because the communications network 12 sends the heartbeat signals toeach of the communications apparatuses 20 ₁-20 _(N) via thecommunication links 21 ₁-21 _(N), the communications network 12 is ableto identify potential disruptions to the respective abilities of theend-user equipment 10 ₁-10 _(N) to communicate via these communicationlinks by looking for certain ones of these communications apparatusesthat have not replied to these heartbeat signals. Such a disruption maybe determined by one or more components of the communications network12, such as the network element 31 or another apparatus of the accessnetwork 13 and/or the communication apparatus 40 or another apparatus ofthe core network 30.

For instance, consider a variant to the example considered previously inwhich it is assumed that the communications network 12, and moreparticularly, the communication apparatus 40, identifies the disruptionof the communication link 21 _(j) reaching the end-user premise 18 _(j)because “heartbeat” signals sent to the communication apparatus 20 _(j)go unacknowledged. Further assume that the communication apparatus 20_(j) does not determine that the link 21 _(j) is disrupted.

This results in a situation where the end-user equipment 10 _(j) may notbe able to effect telephone calls, accesses to data network sites, alarmsystem communications and/or other communications since thecommunication apparatus 20 _(j) has not determined that thecommunication link 21 _(j) is disrupted. In particular, this may presentrisks, especially if the user 11 or someone else at the end-user premise18 _(j) needs to effect an important or emergency (e.g., 911) call toalert civic services (such as fire, police and ambulance services) or ifthe alarm system 17 _(j) needs to effect an alarm system communicationpotentially indicative of an undesirable event (e.g., an intrusion or afire at the end-user premise 18 _(x)). Also, the end-user equipment 10_(j) may be unable to receive incoming calls and/or other incomingcommunications.

To address this situation, in this embodiment, the communicationapparatus 40 can try to alert the communication apparatus 20 _(j) to thedisruption of the communication link 21 _(j) using the failovermechanism contemplated herein. For example, the communication apparatus40 may try to contact the communication apparatus 20 _(j) using thecommunication apparatus 20 _(i) at the end-user premise 18 _(i).

More particularly, in this embodiment, the processing entity 42 of thecommunication apparatus 40 retrieves the identifier and accessinformation of the communication apparatus 20 _(j) from the database 48(which, in this embodiment, includes this access information). Once theprocessing entity 42 has performed this retrieval, the routing entity 44of the communication apparatus 40 causes information including theidentifier and access information of the communication apparatus 20 _(j)to be transmitted to the communication apparatus 20 _(i) via thecommunication link 21 _(i). Alternatively, the processing entity 42 maycause the routing entity 44 to transmit to the communication apparatus20 _(i) via the communication link 21 _(i) information instructing theprocessing entity 54 of the communication apparatus 20 _(i) to retrievethe identifier and access information of the communication apparatus 20_(j) from the database 66 of the communication apparatus 20 _(i). In anyevent, the information transmitted to the communication apparatus 20_(i) also includes an indication for the communication apparatus 20 _(i)to establish a wireless communication link between itself and thecommunication apparatus 20 _(j).

Upon receiving the information, the communication apparatus 20 _(i)proceeds to establish a wireless communication link between itself andthe communication apparatus 20 _(i) using the identifier and accessinformation of the communication apparatus 20 _(j). With this wirelesscommunication link being established, when incoming and/or outgoingtelephone calls, accesses to data network sites, alarm systemcommunications, and/or other communications are to be effected using theend-user equipment 10 _(j) at the end-user premise 18 _(j), thecommunication apparatus 20 _(j) proceeds to exchange informationpertaining to these communications over the communications network 12via the established wireless communication link, the communicationapparatus 20 _(i) and the communications link 21 _(i) in a mannersimilar to that described previously herein.

Thus, an apparatus of the communications network 12 (such as thecommunication apparatus 40 or the network element 31) may be able toidentify disruptions of the respective abilities of the end-userequipment 10 ₁-10 _(N) to communicate via the communications links 21₁-21 _(N) and implement failover operations to allow the end-userequipment 10 ₁-10 _(N) at the end-user premises 18 ₁-18 _(N) to continueto be used to effect communications despite these disruptions.

Also, by having the communications network 12 manage certain aspects ofthe failover mechanism contemplated herein, the communications network12 may use other information at its disposal to manage these aspects.For example, when the ability of the end-user equipment 10 _(x) tocommunicate via the communication link 21 _(x) reaching the end-userpremise 18 _(x) is determined to be disrupted, the communicationsnetwork 12 may evaluate the current network traffic load beingexperienced by individual ones of the communication apparatuses 20 ₁-20_(N) within the particular geographic area around the end-user premise18 _(x). This evaluation may allow the communications network 12 toidentify opportunities arising from “piggybacking” information onto oneor more of the communications links 21 ₁-21 _(N) that are currentlyexperiencing low network traffic loads and therefore have more availableresources than those links experiencing high network traffic loads. Thismay allow the failover mechanism to be used more efficiently among thecommunications apparatuses 20 ₁-20 _(N) within a geographic area,possibly ensuring a higher and more consistent level of service to allusers within this area. For instance, assume that the communicationnetwork 12 identifies the communication apparatuses 20 _(y) and 20 _(z)as two (2) apparatuses with acceptable signal strength proximate to thecommunication apparatus 20 _(x) of the end-user equipment 10 _(x) whoseability to communicate via the communication link 21 _(x) is determinedto be disrupted, with the communication apparatus 20 _(y) currentlyexperiencing a high network traffic load due to several ongoingcommunications made by the end-user equipment 10 _(y) at the end-userpremises 18 _(y) while the communication apparatus 20 _(z) isexperiencing a very low traffic load since few or no communications arebeing made by the end-user equipment 10 _(z) at the end-user premise 18_(z). In such a case, the communications network 12 may direct thecommunication apparatus 20 _(z) to establish a wireless communicationlink with the communication apparatus 20 _(x) since the communicationapparatus 20 _(z) and thus the communication link 21 _(z) provides agreater capacity. In addition to or alternatively to considering networktraffic loads, other factors may be taken into consideration by thecommunications network 12 to determine with which of the end-userequipment 10 ₁-10 _(N) the end-user equipment 10 _(x) is to establish awireless communication link, such as reported signals strengths ofsignals exchanged between the end-user equipment 10 ₁-10 _(N).

In some embodiments, the end-user equipment 10 _(x) at the end-userpremise 18 _(x) may use a private network address space for one or moreend-user devices of the end-user equipment 10 _(x), while thecommunication apparatus 20 _(x) may communicate via the communicationlink 21 _(x) using a public network address space. For example, thecommunication apparatus 20 _(x) may be assigned a public IP address bythe communications network 12 (e.g., by the communication apparatus 40of the core network 30) and the one or more end-user devices of theend-user equipment 10 _(x) may be assigned private IP addresses by thecommunication apparatus 20 _(x). In such embodiments, the routing entity62 of the communication apparatus 20 _(x) performs a network addresstranslation (NAT) process on data packets passing therethrough totranslate their addresses from the private network address space to thepublic network address space, and vice versa.

When the failover mechanism contemplated herein is invoked in theseembodiments, in cases where a wireless communication link is establishedbetween the communication apparatus 20 _(x) at the end-user premise 18_(x) and the communication apparatus 20 _(y), at the end-user premise 18_(y), the NAT process performed by the communication apparatus 20 _(x)and, if applicable, the NAT process performed by the communicationapparatus 20 _(y) can take into account the establishment of thewireless communication link in order to avoid potential private networkaddress clashes.

For example, considering the previous example discussed in connectionwith FIGS. 5A and 5B where the wireless communication link 85 isestablished between the communication apparatus 20 _(j) at the end-userpremise 18 _(j) and the communication apparatus 20 _(i) at the end-userpremise 18 _(i) upon the user 11 initiating the telephone call while thecommunication link 21 _(j) is disrupted, it is assumed that (prior tothe wireless communication link 85 being established) the computer 14_(j), the VoIP phone 15 _(j), an ATA associated with the POTS phone 16_(j), and the alarm system devices of the alarm system 17 _(j) areassigned private IP addresses by the communication apparatus 20 _(j)which is itself assigned a public IP address by the communicationsnetwork 12, and that the computer 14 _(i), the VoIP phone 15 _(i), theVoIP phone 16 _(i) and the television unit 29 _(i) are assigned privateIP addresses by the communication apparatus 20 _(i) which is itselfassigned a public IP address by the communications network 12. Moreparticularly, for purposes of this example, assume that the public IPaddress assigned to the communication apparatus 20 _(j) is “122.1.17.6”,the private IP address assigned to the VoIP phone 15 _(j) is “10.2.2.9”,and the public IP address assigned to the communication apparatus 20_(i) is “122.28.5.18”.

In establishing the wireless communication link 85, the routing entity62 of the communication apparatus 20 _(i) assigns a private IP addressto the communication apparatus 20 _(j), say “10.50.50.3” for purposes ofthis example. In other words, the communication apparatus 20 _(j) can beviewed as becoming part of the private network address space used by theend-user equipment 10 _(i) at the end-user premise 18 _(i). The routingentity 62 of the communication apparatus 20 _(j) takes note of theprivate IP address “10.50.50.3” assigned to it by the communicationapparatus 20 _(i).

Upon receiving data packets transmitted by the VoIP phone 15 _(j) whichhave the private IP address “10.2.2.9” as their source address, therouting entity 62 of the communication apparatus 20 _(j) performs theNAT process on these data packets. As part of the NAT process, therouting entity 62 notes destination addresses and possibly destinationports of the data packets in a database (e.g., a connection state table)and sends to the communication apparatus 20 _(i) modified versions ofthe data packets such that they have the private IP address “10.50.50.3”as their source address.

The routing entity 62 of the communication apparatus 20 _(i) receivesthe data packets transmitted by the communication apparatus 20 _(j)which have the private IP address “10.50.50.3” as their source addressand proceeds to perform the NAT process on these data packets. As partof the NAT process, the routing entity 62 notes destination addressesand possibly destination ports of the data packets in a database (e.g.,a connection state table) and sends over the communications network 12via the communication link 21 _(i) modified versions of the data packetssuch that they have the public IP address “122.28.5.18” as their sourceaddress.

In the reverse direction, when the communication apparatus 20 _(i)receives via the communication link 21 _(i) data packets pertaining tothe telephone call which have the public IP address “122.28.5.18” astheir destination address, the routing entity 62 of the communicationapparatus 20 _(i) performs the NAT process on these data packets byconsulting the aforementioned database (e.g., connection state table)based on their source addresses and optionally source ports and sends tothe communication apparatus 20 _(j) modified versions of these datapackets such that they have the private IP address “10.50.50.3” as theirdestination address.

The routing entity 62 of the communication apparatus 20 _(j) receivesthe data packets transmitted by the communication apparatus 20 _(i)which have the private IP address “10.50.50.3” as their destinationaddress and proceeds to perform the NAT process on these data packets byconsulting the aforementioned database (e.g., connection state table)based on their source addresses and optionally source ports. Thisresults in the routing entity 62 sending to the VoIP phone 15 _(j)modified versions of the data packets such that they have the private IPaddress “10.10.2.9” as their destination address.

While the embodiment considered above illustrates one way in which NATmay be taken into account in implementing the failover mechanismcontemplated herein, NAT may be taken into account in various other waysin other embodiments. Also, in some embodiments, NAT may not be neededand/or may not be performed (e.g., in cases where an IPv6 addressingscheme is used).

Those skilled in the art will appreciate that, in some embodiments,certain functionality of a given element described herein (e.g., thecommunication apparatus 40, any piece of equipment of the end-userequipment 10 _(x) such as the communication apparatus 20 _(x)) may beimplemented as pre-programmed hardware or firmware components (e.g.,application specific integrated circuits (ASICs), electrically erasableprogrammable read-only memories (EEPROMs), etc.) or other relatedcomponents. In other embodiments, a given element described herein(e.g., the communication apparatus 40, any piece of equipment of theend-user equipment 10 _(x) such as the communication apparatus 20 _(x))may comprise a processor having access to a memory which stores programinstructions for execution by the processor to implement certainfunctionality of that given element. The program instructions may bestored on data storage media that is fixed, tangible, and readabledirectly by the processor. The data storage media may store dataoptically (e.g., an optical disk such as a CD-ROM or a DVD),magnetically (e.g., a hard disk drive, a removable diskette),electrically (e.g., semiconductor memory, floating-gate transistormemory, etc.), and/or in various other ways. Alternatively, the programinstructions may be stored remotely but transmittable to the givenelement via a modem or other interface device connected to a networkover a transmission medium. The transmission medium may be either atangible medium (e.g., optical or analog communications lines) or amedium implemented using wireless techniques (e.g., microwave, infraredor other wireless transmission schemes).

Although various embodiments of the invention have been described andillustrated, it will be apparent to those skilled in the art thatnumerous modifications and variations can be made without departing fromthe scope of the invention, which is defined in the appended claims.

The invention claimed is:
 1. A method for effecting a communication overa communications network, said method comprising: determining that anability of first end-user equipment at a first end-user premise tocommunicate via a first communication link connecting the first end-userequipment to the communications network is disrupted; establishing awireless communication link between the first end-user equipment andsecond end-user equipment at a second end-user premise upon the abilityof the first end-user equipment to communicate via the firstcommunication link being determined to be disrupted; and causinginformation pertaining to the communication to be exchanged between thefirst end-user equipment and the communications network via the wirelesscommunication link and a second communication link connecting the secondend-user equipment to the communications network.
 2. A method as claimedin claim 1, said determining comprising verifying the ability of thefirst end-user equipment to communicate via the first communicationlink.
 3. A method as claimed in claim 2, said verifying comprising:performing a verification of a state of the first communication linkbased on a signal conveyable via the first communication link; anddetermining that the first communication link is disrupted based on aresult of the verification.
 4. A method as claimed in claim 3, saiddetermining that the first communication link is disrupted based on aresult of the verification comprising determining that the signal is notreceived within a period of time or does not satisfy aquality-of-service condition.
 5. A method as claimed in claim 2, saidverifying comprising: performing a verification of a state of a softwareor hardware component of the first end-user equipment; and determiningthat the software or hardware component of the first end-user equipmentis disrupted based on a result of the verification.
 6. A method asclaimed in claim 1, said determining comprising receiving informationindicative of a disruption of the ability of the first end-userequipment to communicate via the first communication link.
 7. A methodas claimed in claim 6, the information indicative of a disruption of theability of the first end-user equipment to communicate via the firstcommunication link comprising information indicative of a disruption ofthe first communication link.
 8. A method as claimed in claim 1, saidestablishing comprising causing a first one of the first end-userequipment and the second end-user equipment to wirelessly transmitcertain information to a second one of the first end-user equipment andthe second end-user equipment to establish the wireless communicationlink.
 9. A method as claimed in claim 8, the certain informationcomprising an identifier of the second end-user equipment.
 10. A methodas claimed in claim 9, the identifier of the second end-user equipmentcomprising at least one of a hardware identifier and an IP address. 11.A method as claimed in claim 10, the hardware identifier comprising atleast one of a MAC address and an Ethernet hardware address.
 12. Amethod as claimed in claim 9, the certain information comprising accessinformation for the second end-user equipment.
 13. A method as claimedin claim 12, the access information for the second end-user equipmentcomprising at least one of a password and a wireless network key.
 14. Amethod as claimed in claim 12, the certain information comprising anidentifier of the first end-user equipment.
 15. A method as claimed inclaim 14, each of the identifier of the first end-user equipment and theidentifier of the second end-user equipment comprising at least one of ahardware identifier and an IP address.
 16. A method as claimed in claim15, the hardware identifier comprising at least one of a MAC address andan Ethernet hardware address.
 17. A method as claimed in claim 14, thecertain information comprising access information for the first end-userequipment.
 18. A method as claimed in claim 17, each of the accessinformation for the first end-user equipment and the access informationfor the second end-user equipment comprising at least one of a passwordand a wireless network key.
 19. A method as claimed in claim 1, thefirst-end user equipment comprising a communication apparatus connectedto the first communication link and to an end-user device at the firstend-user premise, said method being performed by the communicationapparatus.
 20. A method as claimed in claim 19, said establishingcomprising wirelessly transmitting certain information to the secondend-user equipment to establish the wireless communication link betweenthe communication apparatus and the second end-user equipment.
 21. Amethod as claimed in claim 20, the second end-user equipment comprisinga communication apparatus connected to the second communication link andto an end-user device at the second end-user premise, said wirelesslytransmitting comprising wirelessly transmitting the certain informationto the communication apparatus of the second end-user equipment toestablish the wireless communication link between the communicationapparatus of the first end-user equipment and the communicationapparatus of the second end-user equipment.
 22. A method as claimed inclaim 20, the second end-user equipment comprising a communicationapparatus connected to the second communication link and to an end-userdevice at the second end-user premise, said wirelessly transmittingcomprising wirelessly transmitting the certain information to theend-user device at the second end-user premise to establish the wirelesscommunication link between the communication apparatus of the firstend-user equipment and the end-user device at the second end-userpremise.
 23. A method as claimed in claim 19, said establishingcomprising causing the end-user device at the first end-user premise towirelessly transmit certain information to the second end-user equipmentto establish the wireless communication link between the end-user deviceat the first end-user premise and the second end-user equipment.
 24. Amethod as claimed in claim 19, comprising, prior to said determining,receiving a request for the communication to be effected over thecommunications network from the end-user device.
 25. A method as claimedin claim 1, said method being performed by an apparatus residing in thecommunications network.
 26. A method as claimed in claim 1, thecommunication being one of a telephone call effected using the firstend-user equipment, an access to a data network site effected using thefirst end-user equipment, and an alarm system communication effectedusing the first end-user equipment.
 27. Apparatus for effecting acommunication over a communications network, said apparatus comprising:a processing entity configured to determine that an ability of firstend-user equipment at a first end-user premise to communicate via afirst communication link connecting the first end-user equipment to thecommunications network is disrupted; and a routing entity configured to:establish a wireless communication link between the first end-userequipment and second end-user equipment at a second end-user premiseupon the ability of the first end-user equipment to communicate via thefirst communication link being determined to be disrupted; and causeinformation pertaining to the communication to be exchanged between thefirst end-user equipment and the communications network via the wirelesscommunication link and a second communication link connecting the secondend-user equipment to the communications network.
 28. A non-transitorycomputer-readable media containing a program element executable by acomputing system to perform a method for effecting a communication overa communications network, said program element comprising: program codefor causing the computing system to determine that an ability of firstend-user equipment at a first end-user premise to communicate via afirst communication link connecting the first end-user equipment to thecommunications network is disrupted; program code for causing thecomputing system to establish a wireless communication link between thefirst end-user equipment and second end-user equipment at a secondend-user premise upon the ability of the first end-user equipment tocommunicate via the first communication link being determined to bedisrupted; and program code for causing the computing system to causeinformation pertaining to the communication to be exchanged between thefirst end-user equipment and the communications network via the wirelesscommunication link and a second communication link connecting the secondend-user equipment to the communications network.
 29. A method asclaimed in claim 1, the communication being a telephone call and theinformation pertaining to the telephone call including voice informationprovided during the telephone call.
 30. Apparatus as claimed in claim27, the communication being a telephone call and the informationpertaining to the telephone call including voice information providedduring the telephone call.
 31. A method as claimed in claim 1, anidentity of the second end-user equipment being determined prior to thedetermination that the ability of the first end-user equipment tocommunicate via the first communication link connecting the firstend-user equipment to the communication network is disrupted. 32.Apparatus as claimed in claim 27, an identity of the second end-userequipment being determined prior to the determination that the abilityof the first end-user equipment to communicate via the firstcommunication link connecting the first end-user equipment to thecommunication network is disrupted.
 33. The non-transitorycomputer-readable media as claimed in claim 28, an identity of thesecond end-user equipment being determined prior to the determinationthat the ability of the first end-user equipment to communicate via thefirst communication link connecting the first end-user equipment to thecommunication network is disrupted.