Adaptive signaling for network performance measurement, access, and control

ABSTRACT

Systems and methods are provided for initiation, use, access, and control of functionality of a network. In one aspect, the systems and methods can be utilized to generate information defining signaling or control performance and operational characteristics associated with the functionality in a variety of network environments. In another aspect, based on such information, adaptive signaling can be utilized to monitor, analyze and detect specific signaling signatures associated with the functionality. Managing signaling or control messages in response to information collected by monitoring and analyzing the adaptive signaling permits originating or requesting the functionality without conventional operation of a network component.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. Utility application Ser. No.13/437,910, filed on Apr. 2, 2012, which in turn claims priority toProvisional Patent Application No. 61/470,693, filed on Apr. 1, 2011,all of which are incorporated herein by reference in their entireties.

SUMMARY

The disclosure relates, in one aspect, to accessing, using, andcontrolling attached functions, features, services and networkinfrastructure provided by such communication network elements on behalfof the party originating the communication session. One or moreembodiments provide systems and methods that enable initiation, use,access and control to the attached functions, features, services andnetwork infrastructure of a network is described. These methods andsystems can be utilized to define signaling or control performance andoperational characteristics in a variety of network environments. Inaddition or in the alternative, signaling signatures can be extractedfrom measurements of signaling information (e.g., timing metrics, typeof messages, request processing time, etc.). The methods and systemsdescribed herein can utilize the signaling signatures in combinationwith adaptive signaling to monitor, analyze and detect the signalingsignatures of networks and their network elements. Implementation ofadaptive signaling can apply intelligence regarding the signaling orcontrol message types, the timing of signaling or control messages, thetiming between two or more signaling or control messages, the durationof and the sequence of signaling or control messages flowing in anetwork to produce a desired outcome. By managing signaling or controlmessages as described herein, the methods and systems permit originatingor requesting attached function (a user, device, application, and onforth) to measure the performance of a signaling network or to access,use, or control other attached functions, features, services and networkinfrastructure in new and different ways.

In one aspect, the subject disclosure comprises a method forestablishing the signaling or control message parameters of a network, anetwork element or of a signaling or control network associated with anetwork by which measuring the performance of a signaling network orobtaining access to, or the use or control of, attached functions,features, services or network infrastructure associated with a networkis achieved via one or more network signaling events (NSEs).

In another aspect, the method can comprise establishing NSEs todetermine the signaling or control performance and operationalcharacteristics of a network, a network element or of a signaling orcontrol network associated with the network.

In another aspect, the method can comprise establishing signaling orcontrol timing requirements, metrics and performance baselines, such asthe request processing duration of signaling or control messages,replies and other responses; the network transit time of signaling orcontrol messages, replies and other responses; the timing betweensignaling or control messages, replies and other responses; the minimumtiming of signaling or control messages, replies and other responses;the minimum timing between signaling or control messages, replies andother responses; the maximum timing of signaling or control messages,replies and other responses; and/or the maximum timing between signalingor control messages, replies and other responses.

In another aspect, the method can comprise establishing the operationalcharacteristics of the signaling or control messages, requests andresponses of a network, a network element or of a signaling or controlnetwork associated with the network including the types and the sequenceof such messages, including the presence or absence of signaling orcontrol messages, requests and responses.

In another aspect, the method can comprise identifying or developing NSEpatterns intended to measure the performance of a signaling network orto access, use, or control, the desired attached functions, features,services or network infrastructure associated with a network. Suchpatterns being derived from the current and historical performance andoperational characteristics, or other network status, data ordescriptive information regarding the network, network element or thesignaling or control network associated with the network.

In another aspect, the method can comprise developing the sequence andtiming of NSE patterns to be initiated or utilized to measure theperformance of a signaling network or to access, use or control, thedesired attached functions, features, services or network infrastructureassociated with a network.

In another aspect, the disclosure can include a method comprisingmeasuring the performance of accessing, using or controlling, attachedfunctions, features, services or network infrastructure associated witha network by initiating network signaling events (NSEs) in a network ornetwork element and managing NSEs, NSE patterns, signaling or controlmessages or the flow of signaling or control messages associated withthe initiation, operation or utilization of network signaling events.The method can comprise one or more of: (A) measuring and analyzingsignaling or control message performance; (B) initiating and managingone or more NSEs or NSE patterns; (C) monitoring the signaling orcontrol messages, the flow of signaling or control messages and otherinformation related to such messages, flows and events such monitoringcan include monitoring request processing duration of signaling orcontrol messages, replies and other responses; the network transit timeof signaling or control messages, replies and other responses; thetiming between signaling or control messages, replies and otherresponses; the minimum timing of signaling or control messages, repliesand other responses; the minimum timing between signaling or controlmessages, replies and other responses; the maximum timing of signalingor control messages, replies and other responses; and/or the maximumtiming between signaling or control messages, replies and otherresponses); (D) togging and analyzing signaling or control messages, theflow of signaling or control message and other information related tosuch messages, flows and events; (E) identifying any appropriateresponse(s), replies or NSE modifications to signaling or controlmessages, the flow of signaling or control message and other informationrelated to such messages, flows and events; and (F) initiating, managingor modifying NSEs or NSE patterns to implement the appropriateresponse(s) replies or NSE modifications.

In another aspect, the method can comprise initiating network signalingevents (NSEs) in a network or network element to measure the signalingor control performance and/or behavior of one or more of a network, anetwork element, or a signaling or control network associated with thenetwork, or to measure the flow of signaling or control messages. Suchmeasurements comprising one or more signaling or control timing metricsor performance metrics, such as the request processing duration; thenetwork transit time of the elapsed time between; the minimum elapsedtime of; the minimum elapsed time between; the maximum elapsed time of;and the maximum elapsed time between NSEs, NSE patterns, signaling orcontrol messages, and any associated NSE or signaling or control messagereplies and responses. In addition or in the alternative, such metricscan comprise monitoring request processing duration of signaling orcontrol messages, replies and other responses; the network transit timeof signaling or control messages, replies and other responses; thetiming between signaling or control messages, replies and otherresponses; the minimum timing of signaling or control messages, repliesand other responses; the minimum timing between signaling or controlmessages, replies and other responses; the maximum timing of signalingor control messages, replies and other responses; and/or the maximumtiming between signaling or control messages, replies and otherresponses.

In another aspect, the method can comprise logging and analyzingsignaling or control timing metrics and/or performance metrics (such asconventional or customized key performance indicators (KPIs)) todetermine the signaling or control performance of a network, a networkelement or of a signaling or control network associated with thenetwork, or to determine any desirable NSEs or NSE patterns, responses,replies, modifications or other NSF actions desirable for accessing,using or controlling attached functions, features, services or networkinfrastructure associated with a network. For example, such logging andanalysis can comprise generating and analyzing records of requestprocessing, sequences of signaling events and responses including thepresence or absence of NSEs or responses, the repetition of NSEs, theduration of signaling or control messages, replies and other responses;network transit time of signaling or control messages, replies and otherresponses; timing between signaling or control messages, replies andother responses; the minimum timing of signaling or control messages,replies and other responses; the minimum timing between signaling orcontrol messages, replies and other responses; the maximum timing ofsignaling or control messages, replies and other responses; and/or themaximum timing between signaling or control messages, replies and otherresponses.

In another aspect, the method can comprise initiating and managing oneor more NSEs or NSE patterns, responses, replies, modifications or otherNSE actions desirable for accessing, using or controlling, attachedfunctions, features, services or network infrastructure associated witha network.

In another aspect, in certain embodiments, the timing of NSE initiations(e.g., Inter-NSF timing), responses, replies and requests can becontrolled in order to elicit the desired behavior from the signaling orcontrol system, or from the attached functions, features, services ornetwork infrastructure elements associated with a network.

In another aspect, the duration of NSEs may be controlled in order toelicit the desired behavior from signaling or control network elements,the attached functions, features, services or network infrastructureassociated with a network.

In another aspect, the disclosed steps of monitoring, logging, analysisand response identification to NSEs, NSE patterns, signaling or controlmessages, the flow of signaling or control messages and otherinformation related to such messages, flows and events can includeinformation such as signaling and control message types; sequence (e.g.,presence or absence of message(s), order of transmitted and/or receivedmessages, or the like); timing requirements; timing metrics; performance(which can include timing performance); operational characteristics; orother descriptive information regarding a network, the network elementor the signaling or a control network associated with the network. Agroup of signaling or control messages and related performance andtiming information can be referred to as the signaling or controlmessage flow.

In another aspect, certain disclosed methods (e.g., exemplary method800) can comprise monitoring, logging, and analysis of, and any responseidentification to the signaling or control messages, the flow ofsignaling or control messages and other information related to suchmessages, flows and events which, in certain scenarios, can includesignaling information, such as the signaling or control messagesthemselves, NSEs, NSE patterns, signaling or control message responsesor replies, message type information and corresponding information suchas timestamps, expiry and other timers and logic rules.

In another aspect, the various analyzing actions disclosed herein caninclude, in addition or as an alternative, analyzing other non-signalinginformation (Local Exchange Routing Guide (LERG) records, local numberportability (LNP) database records and changes thereof, LNP dips, etc.)in addition to signaling or control events.

In another aspect, disclosed methods can comprise identifying NSEs oridentifying modifications to NSEs or to NSE patterns can be based, incertain scenarios, at least on analysis which can include modificationssuch as the initiation of additional NSEs or the purging of existingNSEs, the modification of NSE patterns, NSE flow, or NSE signaling orcontrol responses including NSE information, such as the type, sequence,and timing and/or duration of an NSE.

In one aspect, the subject disclosure provides an adaptive signaling(ASIG) system for managing and controlling one or more Network SignalingEvents (NSEs) utilizing network signaling or control messages to access,use, or control attached functions, features, services or networkinfrastructure associated with a network or network element, the networkincluding one or more attached functions, features, services or networkinfrastructure devices. The ASIG system comprising: (a) an adaptivesignaling control (ASIG-C) subsystem for initiating, managing andoperating one or more network signaling events utilizing networksignaling or control messages; and (b) an adaptive signaling Monitoring(ASIG-MA) subsystem for monitoring, measuring performance, establishingoperational characteristics, logging, analyzing and subsequentlydetermining appropriate responses to signaling or control messages, theflow of signaling or control messages associated with providing accessto, or the use or control of, attached functions, features, services ornetwork infrastructure associated with a network or network element.

In another aspect, in one embodiment, the ASIG-C system also cancomprise (1) a NSE generation function for initiating one or morenetwork signaling events (NSEs) network signaling or control messages;and (2) a signaling network performance function for measuring networksignaling or control performance, establishing performance metrics andidentifying network or network element operational characteristics.

In another aspect, in the ASIG-C system, the NSE generation function caninclude a timing sub-function for measuring and controlling NSEs ortriggering additional NSEs or signaling or control message actions atspecified time points.

In another aspect, in the ASIG-C system, the timing sub-function cancontrol the timing between NSE initiations (the inter-NSE timing).

In another aspect, in the ASIG-C system, the NSE generation function mayestablish or control the duration of NSEs.

In another aspect, in the ASIG-C system, the NSE generation function cangenerate multiple NSEs at specified times and with various durationsbased at least on information such as logic, models, and/or the statusof other discrete or concurrent NSEs

In another aspect, in the ASIG-C system, the NSE generation function caninclude a Signaling Signature sub-function for generating patterns ofone or more NSEs with specified timing and durations based at least oninformation such as logic, models, and/or the current status of otherdiscrete or concurrent NSEs.

In another aspect, in the ASIG-C system, the signaling signaturesub-function can generate alternate Signaling Signature patternscomprising one or more NSEs with specified timing and durations based atleast on information such as logic, models or the current status ofother discrete or concurrent NSEs.

In another aspect, in the ASIG-C system, the Signaling NetworkPerformance Function signaling or control performance metrics caninclude information comprising one or more of, for example, NSE orrequest processing duration; the network transit time of signaling orcontrol messages, requests and responses; the timing between signalingor control messages, requests and responses; the minimum timing ofsignaling or control messages, requests and responses; the minimumtiming between signaling or control messages, requests and responses;the maximum timing of signaling or control messages, requests andresponses; and/or the maximum timing between signaling or controlmessages, requests and responses.

In another aspect, in the ASIG-C System, the Signaling NetworkPerformance Function can include and can utilize other network statusinformation, other data or descriptive information, in addition to theperformance metrics described herein, such alternative informationincluding timing based information and historical information.

In another aspect, in the ASIG-C system, the NSE Generation Function canestablish or control modification and/or purging of NSEs based at leaston information such as logic, models, and/or status of other discrete orconcurrent NSEs

In another aspect, in the ASIG-C System, the NSE Generation Function andthe Signaling Network Performance Functions and their sub-functions areembodied in a plurality of network and computing devices, the ASIG-CSystem further comprising means for the plurality of devices tocommunicate.

In another aspect, in one embodiment, the ASIG-MA system referred toherein also can comprise: (a) a monitoring function for monitoring thenetwork signaling or control messages and signaling or control messageflows; and (b) an analysis function for logging (e.g., generating and/orupdating records) and performing analysis on the signaling or controlmessages, the signaling or control messages flows, the signaling orcontrol message logs and any signaling or control network generatedresponses and other information in order to identify responses to anysignaling or control messages, flows or events determined to require aresponse.

In another aspect, in the ASIG-MA system, the monitoring function canmonitor signaling or control messages and signaling or control messageflows for the types, content, sequence, or timing of signaling orcontrol messages; signaling or control message flows; responses orreplies to generation and/or utilization of NSEs, the responses orreplies received from the network, signaling or control networkassociated with the network, and/or one or more of the network elements.

In another aspect, in the ASIG-MA system, the analysis function furthercomprises the step of logging signaling or control messages, the flow ofsignaling or control messages and other information related to suchmessages, flows and events which may include the signaling or controlmessages themselves, signaling or control message responses or replies,message type information, message content information, and correspondinginformation such as timestamps, expiry and other timers.

In another aspect, in the ASIG-MA system, the analysis function canperform analysis on signaling or control messages, the flow of signalingor control messages and other information related to such messages,flows and events which may include: the signaling or control messagesthemselves; signaling or control message responses or replies; signalingor control message type information; message content information;corresponding signaling or control message information such as hopcounts, counters, origin and destination information, timestamps, expiryand other timers; signaling or control message sequence, timing,performance, operational characteristics, logic rules or otherdescriptive information regarding the network, the network element orthe signaling or control network associated with the network ofsignaling or control messages.

In another aspect, in the ASIG-MA system, the analysis function canidentify any necessary signaling or control responses, including themodification of NSE signaling or control responses, NSE signaling orcontrol messages, NSE patterns, NSE flow events, NSE timing, thesequence of NSE messages, or other changes in operation deemed desirableas a system response.

In another aspect, in the ASIG-MA system, the identified response mayinclude initiation of additional NSEs or the purging of existing NSEs.

In yet another aspect, in the ASIG-MA system, the monitoring functionand the analysis functions and their sub-functions are embodied in aplurality of network and computing devices, the ASIG-MA system furthercomprising means for the plurality of devices to communicate.

One embodiment of the subject disclosure includes methods and relatedsystems for accessing, using, or controlling, attached functions,features, services or network infrastructure associated with a networkthrough the management of signaling or control protocols associated withthe network. Access to, or the use or control of, these attachedfunctions, features, services or network infrastructure elements isinitiated by the attached function originating the session. Theembodiment operates on the session that is being established, monitored,controlled or otherwise operated on while the remainder of the networkis not affected.

The embodiment takes advantage of the manner in which network signalingor control protocols are deployed by the various network elements thatcomprise a network. While international standards typically definenetwork signaling or control protocols, many aspects of these protocolsare designated as optional or left to the network equipment manufacturerto deploy as deemed appropriate. Furthermore, in general, the methodsand practices used by software developers to codify signaling or controlprotocol standards into actual software executing within a networkelement typically are empirical rather than based on first principles.This gives rise to certain patterns (referred to herein as operationalcharacteristics) that can be detected in the operation of networksignaling or control protocols. In other words, one manufacturer canimplement a protocol one way, whereas another manufacturer can implementthe same protocol in a slightly different way. Both are within theprotocol standards, but the way they were enabled in the softwarevaries. Such variations can be detected and made useful by an embodimentof the subject disclosure.

Typical protocol tools, systems and technologies focus on the actualcontents of network signaling or control packets and their packet headerinformation. Some embodiments of the disclosure differ from conventionalsolutions in that such embodiments can derive one or more patterns ofsignaling, or “signaling signatures,” from variations in protocolimplementations or operational characteristics described above. Suchsignaling signatures can be based at least on message types, sequencing,and/or the timing of and between of signaling or control messages in anetwork or network elements.

An exemplary system of the subject disclosure is referred to as adaptivesignaling (ASIG) System (see, e.g., FIG. 4). The ASIG system caninitiate, monitor, manage, analyze, and operate one or more networksignaling events (NSEs) by utilizing, at least in part, networksignaling or control messages. In one embodiment, the ASIG system cancomprise two subsystems, one for initiating and managing NSEs and theother for monitoring and analyzing signaling or control messages. Atleast one or each subsystem can have functions and sub-functionsdesigned to carry out specific tasks and functions which are describedin greater detail herein.

In one aspect, a method is provided that comprises establishing thesignaling or control message parameters of a network, a network elementor of a signaling or control network associated with a network. Thesteps can comprise: (1) establishing NSEs to determine signaling orcontrol performance and operational characteristics; (2) establishingsignaling or control timing requirements, metrics and performancebaselines; (3) establishing the operational characteristics of signalingor control messages, requests and responses; (4) identifying ordeveloping NSE patterns intended to access, use, or control the desiredattached functions, features, services or network infrastructureassociated with a network; (5) developing the sequence of NSE patternsto be initiated or utilized to access, use, or control the desiredattached functions, features, services or network infrastructureassociated with a network.

In another aspect, the method can include one or more of the followingsteps, all or a portion of which can be utilized for measuring theperformance of a signaling network or for accessing, using, orcontrolling attached functions, features, services or networkinfrastructure associated with a network. Such steps can comprise: (1)initiating and managing NSEs in a network or network element to measurethe signaling or control performance; (2) togging and analyzingsignaling or control timing metrics to determine the signaling orcontrol performance; (3) initiating and managing one or more NSEs or NSEpatterns, responses, replies, modifications or other NSE actions; (4)monitoring the signaling or control messages or the flow of signaling orcontrol messages associated with the initiation, operation orutilization of Network Signaling Events (NSEs); (5) logging andanalyzing the performance, timing, sequence and correspondinginformation of signaling or control messages or the signaling or controlmessage flows; (6) identifying any desired responses to the signaling orcontrol messages; and (7) generating any desired signaling or controlmodifications, responses, or NSEs.

In yet another aspect of the subject disclosure, an article ofmanufacture comprising a machine-readable storage medium that retainsmachine-executable instructions (e.g., computer-executable instructions)can cause a machine to perform the method(s) described herein inresponse to execution of such machine-executable instructions by atleast one processor.

Additional aspects, features, or advantages of the subject disclosurewill be set forth in part in the description which follows, and in partwill be obvious from the description, or may be learned by practice ofthe subject disclosure. The advantages of the subject disclosure will berealized and attained by means of the elements and combinationsparticularly pointed out in the appended claims. It is to be understoodthat both the foregoing general description and the following detaileddescription are exemplary and explanatory only and are not restrictiveof the subject disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings are incorporated and illustrate exemplaryembodiment(s) of the subject disclosure and together with thedescription and claims appended hereto serve to explain variousprinciples, features, or aspects of the subject disclosure.

FIG. 1 illustrates an exemplary network environment that can operate inaccordance with one or more aspects of the disclosure.

FIGS. 2A-2D illustrate exemplary signaling structure of a networksignaling event, a pattern of NSEs, and sequences of NSEs in accordancewith one or more aspects of the disclosure.

FIG. 3 illustrates a high-level block diagram of exemplaryinterconnection of network infrastructure devices and attached functionsin accordance with one or more aspects of the disclosure.

FIG. 4 illustrates an exemplary embodiment of an adaptive signalingsystem, related sub-systems, functions, and sub-functions in accordancewith one or more aspects of the disclosure.

FIG. 5 illustrates a computing environment that enables various aspectsof accessing, using, or controlling attached functions, features,services and network infrastructure in accordance with one or moreaspects of the disclosure.

FIGS. 6-8 illustrate exemplary method in accordance with one or moreaspects of the subject disclosure.

FIGS. 9A-9B illustrate an exemplary method for accessing, using, orcontrolling attached functions, features, services and networkinfrastructure in accordance with one or more aspects of the disclosure.

DETAILED DESCRIPTION

The subject disclosure may be understood more readily by reference tothe following detailed description of exemplary embodiments of thesubject disclosure and to the Figures and their previous and followingdescription.

Before the present compounds, compositions, articles, devices, and/ormethods are disclosed and described, it is to be understood that thesubject disclosure is not limited to specific systems and methods foraccessing attached functions, features, services and networkinfrastructure provided by such communication network elements on behalfof the party originating the communication session. It is also to beunderstood that the terminology used herein is for the purpose ofdescribing particular embodiments only and is not intended to belimiting.

As utilized in the specification and the appended claims, the singularforms “a,” “an” and “the” include plural referents unless the contextclearly dictates otherwise. In addition, as utilized in the subjectdisclosure, an “attached function” can refer to a user connected to anetwork through a computing device, a network interface device, anattached device connected to the network, a function using the servicesof or providing services to the network, or an application associatedwith an attached device. Also, as utilized in the subject disclosure,“network infrastructure” can refer to a network computing device, anetwork interface device, an attached device connected to the network, afunction using the services of or providing services to the network, oran application associated with an attached device, Such infrastructurecan include software retained computer-readable storage media, hardware,or firmware or various combinations of hardware and software. Moreover,a “Network Signaling Event” (NSE) generally refers to a signaling orcontrol message delivered to a network, to a network element associatedor functionally coupled to the network, or to the signaling or controlnetwork of the network.

Ranges may be expressed herein as from “about” one particular value,and/or to “about” another particular value. When such a range isexpressed, another embodiment includes from the one particular valueand/or to the other particular value. Similarly, when values areexpressed as approximations, by use of the antecedent “about,” it willbe understood that the particular value forms another embodiment. Itwill be further understood that the endpoints of each of the ranges aresignificant both in relation to the other endpoint, and independently ofthe other endpoint.

In the subject specification and in the claims which follow, referencemay be made to a number of terms which shall be defined to have thefollowing meanings: “Optional” or “optionally” means that thesubsequently described event or circumstance may or may not occur, andthat the description includes instances where said event or circumstanceoccurs and instances where it does not.

As employed in this specification and annexed drawings, the terms“unit,” “component,” “interface,” “function,” “sub-function,” “system,”“sub-system,” “platform,” and the like are intended to include acomputer-related entity or an entity related to an operational apparatuswith one or more specific functionalities, wherein the computer-relatedentity or the entity related to the operational apparatus can be eitherhardware, a combination of hardware and software, software, or softwarein execution. One or more of such entities are also referred to as“functional elements.” As an example, a unit may be, but is not limitedto being, a process running on a processor, a processor, an object, anexecutable computer program, a thread of execution, a program, a memory(e.g., a hard disc drive), and/or a computer. As another example, a unitcan be an apparatus with specific functionality provided by mechanicalparts operated by electric or electronic circuitry which is operated bya software or a firmware application executed by a processor, whereinthe processor can be internal or external to the apparatus and executesat least a part of the software or firmware application. In addition orin the alternative, a unit can provide specific functionality based onphysical structure or specific arrangement of hardware elements. As yetanother example, a unit can be an apparatus that provides specificfunctionality through electronic functional elements without mechanicalparts, the electronic functional elements can include a processortherein to execute software or firmware that provides at least in partthe functionality of the electronic functional elements. An illustrationof such apparatus can be control circuitry, such as a programmable logiccontroller. The foregoing example and related illustrations are but afew examples and are not intended to be limiting. Moreover, while suchillustrations are presented for a unit, the foregoing examples alsoapply to a component, a system, a platform, and the like. It is notedthat in certain embodiments, or in connection with certain aspects orfeatures thereof, the terms “unit,” “component,” “system,” “interface,”“platform” can be utilized interchangeably. Certain functional elementsof the disclosure can be implemented (e.g., performed) by software,hardware, or a combination of software and hardware.

Throughout the description and claims of this specification, the word“comprise” and variations of the word, such as “comprising” and“comprises,” means “including but not limited to,” and is not intendedto exclude, for example, other additives, components, integers or steps.“Exemplary” means “an example of” and is not intended to convey anindication of a preferred or ideal embodiment. “Such as” is not used ina restrictive sense, but for explanatory purposes.

Reference will now be made in detail to the various embodiment(s),aspects, and features of the subject disclosure, example(s) of which areillustrated in the accompanying drawings. Wherever possible, the samereference numbers are used throughout the drawings to refer to the sameor like parts.

As described in greater detail below, the subject disclosure relates tomeasuring the performance of a signaling network and to accessing,using, or controlling attached functions, features, services or networkinfrastructure associated with a network through the management ofsignaling or control protocols in the network. Generally, in variousaspects, the disclosure provides a method for permitting the originatorof a session to measure the performance of a signaling network or toaccess, use, or control an attached function in a destination network.In one or more embodiments, a user serves as the origination source andintends to access, use, or control an attached function in thedestination network, in this example a voicemail server, in order todeliver a voicemail message without ringing the recipient's phone.

As an illustration, in one exemplary embodiment, adaptive signalingtechnology can be exploited to enable a caller to deliver a messagedirectly into the voice mailbox of a mobile telephone subscriber withoutcalling the mobile user's phone or establishing a call to the mobilehandset. Calling Party A wishes to leave Called Party B a voice messagevia voicemail, a common communications service in the United States.However, if Calling Party A does not wish to disturb Called Party B bycalling their phone, Calling Party A really has no option to deliver thevoice message directly to Called Party B's voice mailbox. Instead,because voicemail was established by the communications companies as asubtending or fallback service to a regular phone call, Calling Party Ahas no choice other than to place a telephone call to Called Party B,and ring Called Party B's telephone—thus disturbing Called Party B.Then, perhaps the call can transfer to voicemail, or perhaps CalledParty B can pick up. Thus, in conventional systems, the outcome of thecommunications is not controllable by the Calling party.

It is possible to modify the outcome of the foregoing exemplaryembodiment to send Calling Party A's call straight to the voice mailboxof Called Party B by using the telephone signaling or control networkdescribed herein. An exemplary implementation can be the case of acelebrity who wishes to communicate with her fan club using a voicebased service. Now, the celebrity can drop her recorded message rightinto the voice mailboxes of her fan club members without ringing theirphones and intruding on the fan's day, or risking the fans picking upand answering the call. Through the use of network signaling event (NSE)patterns that operate under specific timing constraints and bymonitoring and analyzing the signaling or control message flow, then byresponding adaptively to the signaling flow of the network, access to,or the use or control of, attached functions, features and services(such as voicemail) provided by those network elements can be reliablyaccessed, used, or controlled on behalf of the user or attachedfunction.

In additional or alternative embodiments, adaptive signaling technologycan be exploited to determine whether a telephone number assigned to amobile or cellular telephone service is a working number or not.Conventional techniques can be applied to determine whether a telephonenumber is assigned to a mobile telephony provider versus a landlinetelephony provider. Yet, it generally is significantly more difficult todetermine whether a number assigned to a mobile provider is assigned toa working subscriber or not. In certain scenarios, over 20% of mobiletelephone numbers that are assigned to a wireless carrier can beactually non-working numbers that are not assigned to a workingsubscriber service. Unassigned mobile telephone numbers may be held ininventory by the mobile provider for future use by new mobilesubscribers, or such numbers can be held as non-working numbers forextended periods of time after a subscriber cancels their mobiletelephone service. For entities or organizations that wish to maintainaccurate contact lists of mobile telephone numbers, inability toascertain whether a mobile phone number is in or out of service (e.g., aworking number) can be disruptive to their operations. For example, inthe debt collection commercial space, the fact that a person's mobilephone has recently gone out of service can be predictive that the personmay not pay their next debt installment on time. However, becausecollections companies are limited by U.S. law as to the number ofcommunications they can make to collect a debt, collections companiesmay prefer not to call the mobile number directly to determine whetherit is working or not. For such organizations, having a mechanism(system, method, system and method, etc.) of validating if a mobilenumber is still working that does not “count against them” as acollections contact appears to be a potential source of efficiency incases in which such organizations intend to utilize the predictivenature of the working status of a mobile number while remaining inregulatory compliance with their debt collection practices.

In such exemplary embodiment, adaptive signaling can be exploited toaccess the mobile number to determine whether the mobile number exhibitsthe signaling signatures associated with a working mobile telephoneservice or the signaling signatures associated with a Central OfficeRecording (thus indicating it is no longer in service). Accordingly, thedebt collections agency may be able to determine the status of a mobiletelephone number without actually calling subscriber's mobile telephonenumber. Such technique, enabled by embodiments described herein, canafford collections companies to exploit the predictive nature of knowingthe working status of a mobile telephone number without intruding on thesubscriber linked to the mobile telephone number, or violating debtcollection policies and regulations.

The exemplary embodiments described herein can utilize this adaptivesignaling approach in novel ways in order to generate access to, or theuse or control of, functions, features, services and networkinfrastructure provided by networks and network elements.

Beyond peering inside the message packet, the various embodiments of thesubject disclosure can analyze the flow of messages with respect to thesequence of message types, the timing of various types of messages andtiming between various types of messages (or inter message timing), andthe presence or absence and type of message response from the signalingor control network. It should be appreciated that this is significantlyless intrusive and less computational intensive process than commonlyutilized by Intrusion Detection Systems (IDSs) that operate in thesignaling or control plane of a network, often for the purpose ofproviding network security. Furthermore, instead of being focused onnetwork security, in one exemplary application, the subject disclosureis directed to providing access to, or the use or control of, attachedfunctions, features, services or network infrastructure elements.

In one aspect, the disclosure, and related embodiments, can exploitadaptive signaling to monitor, analyze and detect the signalingsignatures of networks and their network elements. In addition, adaptivesignaling applies intelligence regarding the signaling or controlmessage types, the signaling or control message content, the timing ofand between signaling or control messages, the duration of and thesequence of signaling or control messages flowing in a network.Application of such intelligence can permit to generate access to, or touse, or control attached functions, features, services and networkinfrastructure provided by networks and network elements as desired bythe originating or requesting party.

Referring to the drawings, FIG. 1 is a block diagram of an exemplarynetwork environment 100 that can operate in accordance with one or moreaspects of the disclosure. In the illustrated embodiment, the adaptivesignaling platform 110 can be coupled to the signaling network 140 vialink(s) 128, which can comprise one or more of wireless link(s),wireline reference link(s) or the like. The adaptive signaling platform110 can comprise one or more servers 114, referred to as ASIG server(s)114, which can generate signaling that can be transmitted to one or morenetwork elements 134 in the service network 130 (e.g., atelecommunication network, a cable network, a wide area network, anindustrial network, or the like). The ASIG server(s) 114 also canreceive signaling from network element(s) 134. In another aspect, theASIG server(s) 114 can transmit signaling to the one or more networkelement(s) 144 in signaling network 140. The service network 130 canexchange signaling with the signaling network 140. The one or morenetwork elements 134 and the one or more network elements 144 cancomprise switches, routers, and/or special purpose computing devices(e.g., servers) that can exchange traffic and signaling according to asignaling protocol (e.g., a control protocol).

As illustrated, the one or more ASIG servers 114 can be external to theservice network 130. Accordingly, the type of signaling that can betransmitted to a network element (e.g., one of network clement(s) 134)in the service network 130 can be a specific subset of one or morecontrol messages of a plurality of control messages available in asignaling protocol utilized by the service network 130 for networkadministration and to provide specific functionality, such as callsessions (including data sessions and voice sessions), voicemailservices, data services (e.g., cloud storage and management), data orinformation service services (e.g., video streaming service,video-on-demand services, or the like). The plurality of controlmessages can be available to an administrator (e.g., an owner or lesseeor the service network 130) for intra-network operation oradministration of the service network 140 and to provide service.Similarly, the one or more ASIG servers 114 can be external to thesignaling network 140 (e.g., a signaling system 7 network) and,therefore, the type of signaling that an ASIG server can transmit to anetwork element (e.g., one of network element(s) 144) of the signalingnetwork 140 can be a specific subset of one or more control messages ofa plurality of control messages available in a signaling protocolutilized by the signaling network 140 to provide specific functionality,such as call establishment, call tear down, call retry, call busysignaling or other exception handling messaging, and the like.

It should be appreciated that a signaling protocol utilized by theservice network 130 and/or the signaling network 140 can be astandardized signaling protocol such as session initiation protocol(SIP), signaling system 7 (SS7), point to point protocol over Ethernet(PPPoE), transmission control protocol/internet protocol (TCP/IP),Internet Protocol (IP), such as IPv4, International TelecommunicationUnion (ITU) standard H.323, realtime transport protocol (RIP), real timestreaming protocol (RTSP), and the like. In a scenario in which thesignaling protocol is SIP, the adaptive signaling platform 110 can bepermitted to transmit and/or receive the following group of controlmessages: an INVITE, which is a request for creation of a SIP session;an ACK, which is an acknowledgement message typically transmitted by adevice in the service network 130 and/or the signaling network 140 (suchdevice can be referred to as a third party device) in response to anINVITE; a CANCEL, which is control message that cancels a pendingrequest; a BYE, which terminates a SIP session; a PRACK, which is aprovisional acknowledgement message; and an UPDATE, which is a controlmessage that enables a client (or client device) to update one or moreparameters of an established SIP session. It should be appreciated thatother SIP control messages, such as SIP responses (or, more generally,signaling response) including SIP 18X (SIP 182, SIP 183, etc.), SIP 487,and SIP 200:0K, can be received at the one or more ASIG server(s) 114.In certain embodiments, a device within the signaling network 140 can bea mobile telephone; a computer, either tethered or wireless, avoice-over-IP (VoIP) telephone (or softphone), etc.

For a specific functionality (e.g., call session establishment, orvoicemail service), a network element of the one or more networkelements 134 can implement signaling in a particular manner to providethe specific functionality, while the signaling remains compliant with asignaling protocol (e.g., SIP) utilized for communication (e.g.,transmission and reception) of such signaling. In one aspect, specificfeatures of implementation (e.g., configuration and performance) of suchsignaling, which can be referred to as signaling protocol, can yield aparticular pattern of signaling. In one aspect, the particular patternof signaling can be unique to the network element and related specificfunctionality and, therefore, can be referred to as a signalingsignature. The pattern of signaling can include specific control messagetypes, specific sequencing of control messages, specific timing ofcommunication, e.g., transmission and reception, of control messages,and specific timing between control messages.

In one aspect, for the specific functionality, an ASIG server of the onemore ASIG servers 114 can monitor signaling (e.g., control messages)transmitted to and received from one or more network elements in theservice network 130 and/or signaling network 140. Monitoring suchsignaling can produce a wealth of signaling information that the ASIGserver can record (for example, in a database) and analyze. In oneaspect, as part of the analysis performed by the ASIG server, one ormore patterns of signaling, or signaling signatures, can be determined(see, e.g., FIG. 2B). One or more of such signaling signatures can beretained in a repository 118 in one or more memory elements 120,represented as logic rule(s) 122. Each memory element of the one or morememory elements can be embodied in a register, a memory page, a file, adatabase, or the like. Certain signaling signatures can be utilized foraccessing attached functions, features, services, or networkinfrastructure associated with the service network 130, whereas othersignaling signatures can be utilized fir monitoring and/or ensuring thataccess to a desired attached function, feature, service, or networkinfrastructure can be achieved. In another aspect, as part of theanalysis of signaling information, the ASIG server can generate a set ofone or more logic rules representative of the one or more signalingsignatures. The set of one or more logic rules can be retained in therepository 118 in one or more memory elements 122, represented assignaling signature(s) 120. Each memory element of the one or morememory elements can be embodied in a register, a memory page, a file, adatabase, or the like. Application of at least one (e.g., one, two, morethan two, or each) of the logic rules in the set can adapt signalingtransmitted to service network 130 and/or the signaling network 140 tooperational behavior of the signaling network 140. Accordingly,signaling transmitted to one or more of the service network 130 or thesignaling network 140 in accordance with one or more of the logic rulescan be referred to as “adaptive signaling.”

In certain embodiments, the adaptive signaling platform 110, via an ASIGserver of the one or more ASIG severs 114, can utilize the signalingsignatures to determine a network signaling event and inject signalingassociated with the NSE into the service network 130 and/or thesignaling network 140. In one aspect, through injection of one or moreNSEs at specific times during a service session (e.g., a call session)the signaling performance of a network element (e.g., one of networkelement(s) 134 or one of network element(s) 144) can be measured, or aspecific functionality of the service network 130 can be accessed. Asdescribed herein, the specific times can be adapted to current networkconditions.

In one aspect, for a signaling protocol based on a request-responsetransaction model, the adaptive signaling platform 110 can inject (e.g.,transmit to a network) one or more NSEs based on signaling flow dictatedby one or more signaling signatures rather than transmitting a requestand awaiting for a specific response to the request. Such signaling flowcan comprise timing of control messages; timing between each type ofcontrol messages; time elapsed between signaling in a NSE or othersignaling transaction, such as time elapsed between transmission of afirst NSE and a second NSE; sequence of signaling messages in asignaling signature or control flow associated with specificfunctionality (e.g., voicemail service); and/or presence or absence ofcertain control messages.

FIGS. 2A-2D illustrate exemplary signaling structure of a networksignaling event, a pattern of NSEs, and sequences of NSEs in accordancewith one or more aspects of the disclosure. As illustrated, an exemplarynetwork signaling event (NSE) 200 comprises two control messages, CM1and CM2, which are delivered at specific times, t and t′, respectively.In certain implementations, CM1 and CM2 can be delivered to a networkelement (e.g., a local switch, a session border controller, or the like)of a service network or a signaling network. In one aspect, CM1 can be arequest message according to a specific signaling protocol, and CM2 canbe a control message that terminates such request message. For instance,CM1 can be a SIP INVITE message and CM2 can be a SIP CANCEL or CM1 canbe a Signaling System 7 Initial Address Message (IAM) and CM2 can be aSignaling System 7 Release (REL) message. It should be appreciated thatthe time span t-t′ of the NSE 200 is divided into two intervals: a delayδt and a NSE duration Δt. The delay is the time interval elapsed frominitiation (e.g., configuration) of the first control message CM1 andtransmission thereof to a network element. The magnitude of the timeinterval can be determined, in one aspect, by processing time incurredat one or more functional elements (e.g., a processor, a bus or otherlink(s), and the like) that generate, configure for transmission, andtransmit the first control message CM1.

A plurality of NSEs can form a pattern of NSEs. Such pattern can bereferred to as a signaling iteration. In certain embodiments, a singlepattern of NSEs can be utilized to measure signaling performance of anetwork element (e.g., one of network element(s) 134 or one of networkelement(s) 144). In one aspect, each one of the plurality of NSEs canhave the signaling structure of exemplary NSE 200 and a specific timespan (delay and duration). The time span of the pattern of NSEs can bedetermined by the time a request control message is initiated in thefirst NSE in the pattern of NSEs and a termination control message istransmitted in the last NSE in the pattern of NSEs. In another aspect,in the pattern of NSEs, two or more NSEs can be concurrent, e.g., arequest control message of a first NSE may be “active” or non-terminatedwhile a second NSE is initiated. As illustrated in FIG. 2B, theexemplary pattern 220 comprises four NSEs (NSE1, NSE2, NSE3, and NSE4)and has three pairs of concurrent NSEs: NSE1 and NSE2, NSE2 and NSE3,and NSE3 and NSE4.

Two or more patterns of NSEs can be combined to form a sequence ofpatterns that can be utilized to access attached functions, features,services or network infrastructure (e.g., a voicemail server) associatedwith a network, such as service network 130. The sequence of patternscan be referred to as a signaling signature. FIG. 2C illustrates anexemplary sequence of patterns of NSEs 240 having four patterns (pattern0, pattern 1, pattern 2, and pattern 3) spanning a time interval t₀-t₄.In certain embodiments, an initial pattern (e.g., pattern 0) in asequence of patterns can be transmitted to measure signaling performanceof a network element.

Specific signaling signatures in a sequence can establish a NSE model.FIG. 2D illustrates a portion of an exemplary NSE model 260. In suchmodel, Pattern 0 can be utilized to measure signaling performance of anetwork element and Pattern 1 can be utilized to access specificuser-plane functionality (e.g., voicemail service) and related networkinfrastructure. As described herein, two or more NSEs can be concurrent,which is illustrated as grey blocks in timeline of Pattern 1. In oneaspect, inter-NSE logic rules can be applied to such concurrent NSEs. Inanother aspect, in portions of time during the time span of a pattern ofNSEs in which an NSE is transmitted without concurrency, intra-NSE logicrules can be applied. Inter-NSE logic rule(s) and intra-NSE logicrule(s) can be applied as part of accessing a specific attachedfunction, feature, or service of a network.

FIG. 3 illustrates a high-level block diagram of exemplaryinterconnection of network infrastructure devices and attached functionsin accordance with aspects of the subject disclosure. In FIG. 3, a setof one or more origination source(s) 1000 are depicted representing avariety of possible types of Attached Functions. These AttachedFunctions generally represent one or more of users, applications, orequipment that attempts to originate a session with another AttachedFunction located in a destination network 2000. Origination source(s)1000 also includes a network infrastructure 1001 and one or moreattached functions connected to or connectable to a networkinfrastructure 1001 by way of connection points (e.g., 1002 a-c).

In one aspect, functional elements illustrated in FIG. 3 can be deployedas a hosted service in which exemplary attached functions (e.g.,functions 1020 a, 1020 b, and 1020 c) are remotely connected to the ASIGApplication Server 1050 (e.g., an ASIG server of the one or more ASIGserver(s) 114) which can connect to the network infrastructure 1001through connection point 1002 c. In an embodiment, the ASIG ApplicationServer 1050 can provide various functional features of the subjectdisclosure, and the remotely attached functions (e.g., functions 1020 a,1020 b, and 1020 c) can utilize the services (e.g., functionality) ofthe ASIG Application Server 1050 in order to access, use, or control thefunctionality of method(s) and system(s) of the disclosure. In certainembodiments, ASIG Application Server 1050 can employ both hardware andsoftware (e.g., a function embodied in an application executing on ASIGApplication Server 1050) to provide functionality in accordance withaspects of the subject disclosure as part of this type of hosted serviceembodiment.

As an example, additional attached functions are depicted including aSmartphone user 1020 d which is remotely connected to the ASIGapplication Server 1050, wherein the such server provides the Smartphoneuser the functionality afforded by the various embodiments of thesubject disclosure described herein. Additional exemplary originationsources can include attached functions such as an attached function User1010 a and an Attached Function Service 1010 b in which a localizedimplementation is depicted. In a localized implementation, such as thoseof functions 1010 a and 1010 b, the functionality of the subjectdisclosure can be locally deployed within the attached function itself;for instance, in such implementation, at least one (e.g., one, two, morethan two, or all) the functions provided herein can reside in a singledevice.

Network infrastructure 1001 can include multiple switching devices,routing devices, firewalls, access points (APs), metropolitan accessnetworks (MANs), wide area networks (WANs), virtual private networks(VPNs), telephony switches, feature and communications servers,application servers, internet connectivity, or other network orcommunication components that can be functionally coupled to theattached functions through connection points (e.g., 1002 a-c).

Destination network 2000 can contain a variety of attached functions(e.g., functions 2020 a-f) including users, services, switches,voicemail platforms, application servers, internet connectivity, etc. Inaddition or in the alternative, destination network 2000 can contain avariety of network elements (components, units, servers, platforms,switches, routers, functions, etc.), such as network elements 2010 a-c.In one or more embodiments, such network elements (e.g., networkelements 2010 a-c) can comprise devices such as switching devices,routing devices, firewalls, access points, MANs, WANs, VPNs, telephonyswitches, feature and communications servers, application servers,interact connectivity, or other network or communication components. Inone aspect, such network elements (e.g., network elements 2010 a-c) can,individually and independently or in conjunction with attached functions(e.g., functions 2020 a-f), provide services such as telephone calls,voicemail services, database services, video or other data orinformation services. In another aspect, such network elements (e.g.,network elements 2010 a-c) and the attached functions (e.g., functions2020 a-f) typically communicate with each other through signaling paths2050 signaling paths are represented by dashed lines in FIG. 3. Suchsignaling paths are typically logical paths, yet in some scenarios suchpaths also can be or can include physical paths, that enable thecommunication between network elements (e.g., 2010 a-c), betweenattached functions (e.g., 2020 a-f), and between attached functions(e.g., 2020 a-f) and network elements (e.g., 2010 a-c). In anotheraspect, as described herein, such communications typically use industrystandard signaling or control protocols such as session initiationprotocol (SIP), signaling system 7 (SS7), point to point protocol overEthernet (PPPoE), transmission control protocol/internet protocol(TCP/IP), International Telecommunication Union (ITU) standard H.323,realtime transport protocol (RTP), real time streaming protocol (RTSP),and the like.

FIG. 4 illustrates a hierarchical block-diagram representation of anexemplary system 400 in accordance with one or more aspects of thedisclosure. In one embodiment, the exemplary system 400 can be embodiedin a plurality of computer-executable instructions stored in a memory(e.g., repository 118), which can be included in an ASIG server orfunctionally coupled thereto. In another embodiment, one or morefunctional elements of the exemplary system 400 can be embodied infunctionality specific hardware. In yet another embodiment, one or morefunctional elements of the exemplary system 400 can be hardware havingsoftware (e.g., computer-executable instructions) that, in response toexecution by a processor, provide the functionality of the one or morefunctional elements in accordance with aspects described herein. Incertain implementation at least one ASIG server of the one or more ASIGservers 114 can comprise (e.g., retained in memory or as part ofhardware) the exemplary system 400. As illustrated, the exemplary system400 comprises an adaptive signaling (ASIG) system 410, relatedsub-systems, functions, and sub-functions. The adaptive signaling system410, subsystems, functions and sub-functions of the illustratedexemplary system 400 are depicted as a hierarchical block diagram. Theadaptive signaling system 410 can comprise at least two subsystems: Theadaptive signaling control (ASIG-C) sub-system 420 and the adaptivesignaling monitoring and analysis (ASIG-MA) sub-system 470. It can beappreciated that the ASIG sub-system 420 also is illustrated in ahierarchical block diagram. Such ASIG sub-system 420 can be an adaptivesignaling control (ASIG-C) subsystem that can comprise a set offunctions and sub-functions that can be utilized to control thegeneration and operation of network signaling events (NSEs) inaccordance with one or more aspects described herein.

In one aspect, a NSE generation function 430 can produce the signalingor control messages that can form a NSE (e.g., NSE 200 in FIG. 2A). Inanother aspect, the NSE generation function 430 can maintain a sessionstate, and can implement appropriate signaling or control protocolreplies and/or responses. It should be appreciated that commerciallyavailable and opensource computer programs, such as signaling “stacks,”can be available to provide such NSE generation capability. In theillustrated embodiment, NSE generation function 430 can include a timingsub-function 440 that controls the timing and duration of NSEs, and asignaling signature sub-function 450 that can manage a pattern (alsoreferred to as a “signaling signature”) of NSEs that can be generated bythe NSE generation function 430.

It should be appreciated that precision of the timing sub-function 440can be an important aspect of the exemplary system 400. In view thatsignaling or control messages can transpire quickly and theirimplementation with respect to timing across various network elementsand associated functions may not be applied uniformly, temporalresolution of the timing sub-function 440 is generally desired to beprecise. In one aspect, a timer function can be associated with anoperating system (OS) being executed in a computing environment. Itshould be appreciated that operating systems (OSs) that can operate at amicro-second capability timers are available from a variety ofcommercially available and opensource resources.

In one aspect, the resolution of time values produced by the timer canbe important (and even critical in certain embodiments). A lack ofprecision in the timing of signaling messages injected into adestination network (e.g., signaling network 140) can lead to unintendedconsequences or not being able to access a specific service of attachedfunction of a network. Certain aspects of a suitable timer include: (i)Resolution. A suitable timer can measure time at the minute and secondlevel, at the millisecond level or even at the microsecond level. Atimer suitable for operation of the adaptive signaling platform 110 cana minimum of millisecond resolution, which can be afforded by certainoperating systems, such as the Ubuntu Operating System. (ii)Stabilization Interval. Once initiated, a time interval elapsed beforethe timer can stabilize and achieve an optimal or nearly-optimal levelof accuracy. In one embodiment, an ASIG system (e.g., exemplary system400) based on the Ubuntu OS can provide timers that stabilize afterabout 20 milliseconds. Such timing constraints can prevent or makedifficult certain implementation with opensource operating systemshaving excessive overhead to maintain accurate timing. In oneembodiment, an ASIG-server of the one or more ASIG server(s) 114 can beor can comprise a SIP stack (or stack computer) utilizing Ubuntu'sprecision timers.

In one or more embodiments, the signaling signature sub-function 450 canbe implemented as a configuration file retained in memory, wherein theNSE generation function 430 can access (e.g., read) the configurationfile. The signaling signature sub-function 450 can retain the pattern ofNSEs that can be used to measure signaling network performance or toaccess, use, or control the desired attached function, feature, service,or network infrastructure. The pattern, or Signaling Signature, cancomprise the type and the number of NSEs to be initiated, managed andmonitored, the timing of NSE initiation, or the duration of NSEs. In oneaspect, transmitting a series of NSEs at specific times to one or morenetwork elements and measuring the performance of a signaling network inresponse to such NSEs can be used to ascertain the current performanceand operational characteristics of the signaling network. Furthermore,transmitting a series of specifically timed network signaling events tothe destination switch may cause the call processing program of thedestination switch to automatically establish a call directly to thevoicemail server that is attached to the destination switch (e.g., atelephone switch). In such one or more embodiments, advantage can betaken of the fact that the manner in which various telephone switchmanufacturers typically deploy a call handling protocol associated with,for example, sending a call to voicemail has distinct patterns that canvary among switch manufacturers. In one aspect, by selecting a SignalingSignature that has one or more NSEs transmitted to a telephone switch atspecific intervals, with specific durations, and by applying adaptivesignaling logic associated with the timing of signaling or controlmessage responses or replies from the network, the timing betweensignaling or control message responses or replies from the network, thepresence or absence of certain signaling or control message responses orreplies from the network, and content of signaling or control messageresponses or replies from the network, the intended effect of accessinga specific functionality of the network can be achieved. For example,sending a call straight to voicemail without calling a telephoneassociated with the voicemail service can be achieved in accordance withone or more aspects described herein. It should be appreciated that incertain embodiments of the disclosure, an ASIG server of the one or moreASIG servers 114 can implement a machine-learning stage in whichsignaling signatures, timing, sequence of NSEs, and the like, can belearned for most any switch manufacturer or vendor. To at least suchend, the ASIG server can implement various artificial intelligencetechniques executed on signaling information collected in accordancewith aspects of the disclosure.

Table 1 presents an exemplary Signaling Signatures in accordance withone or more aspects of the disclosure. In one aspect, the SignalingSignature can be utilized for determining the performance of a signalingnetwork. As an example, the exemplary signaling signatures can beutilized to determine whether a current performance characteristic ofthe signaling network can be suitable to fulfill specific (e.g.,precise) timing requirements of subsequent Signaling Signatures whichcan be used to access a specific functionality (e.g., an attachedfunction or service) of a destination network. In one embodiment, thesignaling signature referred to as Performance Measurement SignalingConfiguration in Table 1 can be transmitted via the signaling networkand can be monitored and analyzed (e.g., via ASIG-MA sub-system 470) todetermine the performance of the signaling network. In such embodiment,NSE1 can be utilized to determine whether a network element (e.g.,element 2010 b) utilized to access the destination network (e.g.,network 2000) exhibits current performance characteristics suitable forprocessing subsequent signaling signatures. In one aspect, suitableperformance characteristics can include one or more of responseprocessing time to NSE1 or the presence of signaling messages indicativeof an overload condition on the network element (ex. SIP 486 or SIP 503messages). In addition or in the alternative, in such embodiment, NSE4can be utilized to determine a current performance characteristic of asignaling network functionally coupled to the destination network for anattached function (e.g., attached function 2020 a, attached function2020 b, attached function 2020 c, attached function 2020 d, attachedfunction 2020 e, or attached function 2020 f, or a combination thereof)in the destination network (e.g., network 2000). In such embodiment, forexample, the interval between the initiation of NSE4 (as illustrated inTable 1) and the elapsed time of a response from the destination networkor a network element thereof to NSE4 can be extracted.

TABLE 1 Exemplary signaling signatures for measurement of performance ofa signaling or control network. NSE1 NSE1 NSE2 NSE2 NSE3 NSE3 NSE4 NSE 418X 200 Delay Duration Delay Duration Delay Duration Delay DurationTimeout Timeout Iteration (ms) (ms) (ms) (ms) (ms) (ms) (ms) (ms) (ms)(ms) 1 130 500 −1 0 152 500 165 2700 2500 40

Table 2 presents two exemplary signaling signature configuration filesin accordance with one or more aspects of the disclosure. In one aspect,such configuration files can be utilized to access a voicemail server,in order to deliver a voicemail message without calling the recipient'sphone. More generally, signaling signature configuration files having asimilar data structure as the files illustrated at Table 2 can beutilized to access specific functionality of a destination network(e.g., service network 130). It should be appreciated that while theexemplary signaling signatures utilized to access voicemail service andillustrated at Table 2 can comprise two or more NSEs in each iterationor pattern of NSEs, other end-user functionality in other types ofnetworks (such as a TCP/IP network) can be accessed, for example, basedon the timing of a single NSE, such timing comprising, for example, aset of two or more instants at which control messages are transmittedand the duration of the single NSE. In one embodiment, upon or aftertransmitting the signaling signature utilized for performancemeasurement (see, e.g., Table 1), as an initial iteration (e.g.,Iteration 1) of the configuration file, subsequent signaling signatures(conveyed in subsequent iterations), such as those illustrated in Table2, can be attempted. In one embodiment, a signaling signatureconfiguration file (e.g., 3XX model) can be attempted. In constructing asignaling signature to be utilized, an actual performance value derivedfrom NSE4 of the performance measurement signaling signature can beadded to the 18X timeout (TO) value of the signaling signaturesillustrated in Table 2 to adapt the signaling signature to the currentperformance of a signaling network or network element associated with anetwork that provides an attached function (e.g., user-planefunctionality) that is to be accessed.

In one scenario, if an iteration of the attempted configuration filesee, e.g., Table 2) does not access the attached function (e.g.,voicemail functionality) as intended, and if subsequent attempts are notoverridden by logic rules that can be managed by the adaptive signalingmonitoring and analysis (ASIG-MA) sub-system 470, then additionaliterations can be attempted until such iterations (which can reside in afile in a memory at ASIG application server, for example) are exhausted.If the ASIG-MA sub-system 470 determines that the NSE pattern is unableto access the intended attached function (e.g., voicemailfunctionality), an alternative Signaling Signature configuration file(e.g., PXX model) can be attempted.

TABLE 2 Exemplary signaling signatures configuration files for directvoicemail access in accordance with one or more aspects of thedisclosure. NSE1 NSE1 NSE2 NSE2 NSE3 NSE3 NSE4 NSE 4 18X 200 DelayDuration Delay Duration Delay Duration Delay Duration Timeout TimeoutIteration (ms) (ms) (ms) (ms) (ms) (ms) (ms) (ms) (ms) (ms) 3XX Model 1130 1600 152 1600 158 1750 165 3300 2000 1000 2 130 1600 152 1600 1731800 178 3300 2000 1300 PPX Model 1 100 1750 −1 0 140 5000 160 6000 50001500 2 100 1750 −1 0 140 5500 160 6000 5000 1500

TABLE 3 Exemplary Signaling Signatures configuration files for directvoicemail access in accordance with one or more aspects of thedisclosure. NSE1 NSE1 NSE2 NSE2 NSE3 NSE3 NSE4 NSE 4 18X 200 DelayDuration Delay Duration Delay Duration Delay Duration Timeout TimeoutIteration (ms) (ms) (ms) (ms) (ms) (ms) (ms) (ms) (ms) (ms) 3XX0 Model 1100 700 152 800 158 950 175 1100 1250 40 2 100 1700 152 1800 158 1950175 3800 3200 2500 3 4100 1800 4152 1950 4158 1950 175 4000 3300 2750 4100 700 152 1950 173 1950 175 3800 600 2750 PXX0 Model 1 100 300 −1 0173 1700 175 5000 3100 3500 2 4100 300 4152 1800 4173 1800 4175 51003500 3600 3 100 300 1152 1750 1173 1750 1175 5250 1000 3750

In Tables 1-3, “NSE Delay” fields indicate the delay from an initialinstant (e.g., t=0) at which a control message in the NSE is initiatedto the time the control message is transmitted, and “NSE Duration”fields indicated the total duration of the NSE. In the illustratedembodiment, the “18X Timeout” field represents the amount of timeallowed from NSE Initiation to the receipt of a signaling response inthe SIP 18X series (e.g. 180, 181, 183, and so forth). The “200 Timeout”field indicates the portion of time permitted to elapse from receipt ofa signaling response in the SIP 18X series (e.g., 180, 181, 183, and soforth) series signaling response to receipt of a SIP 200:0K signalingresponse message.

Another function associated with the adaptive signaling control (ASIG-C)subsystem is the signaling network performance function 460. Suchfunction can measure the current performance characteristics of thesignaling network and can intervene in the operation of the NSEGeneration Function 430 in response to detecting that the currentperformance of the signaling or control network is not satisfactory tosupport the precision of timing required or intended by the timingsub-function 440 or the signaling signature sub-function 450.

The second ASIG Subsystem is an adaptive signaling monitoring andanalysis (ASIG-MA) Subsystem 470. The ASIG-MA Subsystem is responsiblefor monitoring, analyzing and determining appropriate responses tosignaling or control messages or the flow of signaling or controlmessages generated or operated upon by the previously described adaptivesignaling Control (ASIG-C) Subsystem. Like the ASIG-C Control Subsystem,the ASIG-MA Monitoring Subsystem includes a set of Functions.

The first ASIG-MA function is the monitoring function 480 which can beused for monitoring signaling or control messages and signaling orcontrol message flows. It monitors the types of signaling or controlmessages, the sequence and the timing of such signaling or controlmessages as well as the state of various timers and operationsassociated with the logic managed by an analysis function 490.Monitoring function 480 information is typically passed to the analysisfunction 490 in this example embodiment.

In one aspect, the analysis function 490 is responsible for loggingcertain signaling or control messages, the signaling or control messagesflows, any signaling or control network generated responses associatedwith the NSEs and other information that can be Obtained from themonitoring function 480. The analysis function 490 is also responsiblefor performing certain analyses and identifying proper responses or NSEoperations that may be deemed necessary or desirable. The desiredresponses are then passed back up to the NSE generation function 430 forexecution.

Table 4 presents exemplary logic rules in accordance with one or moreaspects of the disclosure. One or more of such rules can be applied tosignaling information and/or signaling or control messages monitored bythe and an ASIG server of the one or more ASIG servers 114 via, forexample, the analysis function 490 of the ASIG-MA subsystem 470. Otherlogic statements and/or rules can be defined and/or utilized.

As illustrated, Table 4 conveys an exemplary set of Intra-NSE logicrules and an exemplary set of Inter-NSE logic rules. In one aspect,intra-NSE rules can apply to signaling or control messages, responses,replies or other events that can occur within a single network signalingevent. In another aspect, intra-NSE rules may not be associated (e.g.,correlated, tied, or the like) to a signaling event of other NSE(s) andcan be independent of state of the other NSE(s). With respect tointer-NSE rules, in one aspect, such rules can apply to signaling orcontrol messages, responses, replies or other events that can occuracross one or more NSEs. In another aspect, inter-NSE can be associatedwith a signaling event of other NSE(s) and can be dependent on state ofthe other NSE(s).

TABLE 4 Exemplary NSE Logic Rules in accordance with one or more aspectsof the disclosure. Rule Type No. Description Intra-NSE 1 The “18XCeiling” Rule. If the first 18X event is not followed by another 18Xevent within 3000 milliseconds, cancel NSE4 Intra-NSE 2 The “183-180Sequence” Rule. If a 183 event is followed by a 180 event, cancel NSE4.Intra-NSE 3 The “Intra 18X Floor” Rule. If any two SIP 18X events arriveless than 50 milliseconds apart, cancel NSE 4. Intra-NSE 4 The “Intra18X Ceiling” Rule. If the first SIP 18X event is not followed by anotherSIP 18X event within 1500 milliseconds, cancel NSE 4. Intra-NSE 5 The“18X Floor” Rule. If the first 18X event arrives less than 1500milliseconds after the C4 INVITE, cancel NSE 4. Intra-NSE 6 The “Fast183” Rule. If NSE4 receives a SIP 183 event less than 1000 millisecondsafter the NSE4 INVITE, cancel NSE4. Intra-NSE 7 The “Canary” Rule. IfNSE1 receives a SIP 487 event more than 106 milliseconds after the NSE1BYE, cancel NSE3 and NSE4. Inter-NSE 1 The “486” Rule. For anyIteration, in any section, if a SIP 486 is returned from the network,then all NSEs should be cancelled immediately. Inter-NSE 2 The “BlastThru - No Response” Rule. If all Network Signaling Events receive noresponse from the network other than a SIP 487 (which is in response toasig canceling the event) the result is deemed a “Blast Thru” in whichall NSE timing expired with no response from the network. Inter-NSE 3The “Blast Thru with C4 Response” Rule, If NSE1, NSE2 and NSE3 signalingreceive no network response other than a SIP 487, and if NSE4 receives aSIP 18X but NSE4 does not receive a SIP 200 within 1700 msec after theSIP 18X, then all NSEs should be cancelled immediately Inter-NSE 4 The“183” Rule. If any two (2) signaling events in NSE1, NSE2, NSE3 or NSE4return a SIP 183, and if NSE4 does not receive a SIP 200 within 2600milliseconds after it receives its 183, then all NSEs should hecancelled immediately. ASIG-MA 1 If no 18X is received on any NSE,continue to iteration 2, else continue to iteration 3, and so forth.

FIG. 5 illustrates a block diagram of an exemplary operating environment500 that enables various features of the subject disclosure andperformance of the various methods disclosed herein. In one aspect,computer 501 can embody a network element or a function or both. Thisexemplary operating environment is only an example of an operatingenvironment and is not intended to suggest any limitation as to thescope of use or functionality of operating environment architecture.Neither should the operating environment be interpreted as having anydependency or requirement relating to any one or combination ofcomponents illustrated in the exemplary operating environment.

The various embodiments of the subject disclosure can be operationalwith numerous other general purpose or special purpose computing systemenvironments or configurations. Examples of well-known computingsystems, environments, and/or configurations that can be suitable foruse with the systems and methods comprise, but are not limited to,personal computers, server computers, laptop devices or handhelddevices, and multiprocessor systems. Additional examples comprisewearable devices, mobile devices, set top boxes, programmable consumerelectronics, network PCs, minicomputers, mainframe computers,distributed computing environments that comprise any of the abovesystems or devices, and the like.

The processing effected in the disclosed systems and methods can beperformed by software components executed by a computing device via aprocessor therein or attached thereto. The disclosed systems and methodscan be described in the general context of computer-executableinstructions, such as program modules, being executed by one or morecomputers or other computing devices. Generally, program modulescomprise computer code, routines, programs, objects, components, datastructures, etc. that perform particular tasks or implement particularabstract data types. The disclosed methods also can be practiced ingrid-based and distributed computing environments where tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote computer storage mediaincluding memory storage devices.

Further, it can be appreciated that the systems and methods disclosedherein can be implemented via a general-purpose computing device in theform of a computer 501. The components of the computer 501 can comprise,but are not limited to, one or more processors 503, or processing units503 (a central processing unit, a graphics processing unit, etc.), asystem memory 512, and a system bus 513 that couples various systemcomponents including the processor 503 to the system memory 512. In thecase of multiple processing units 503, the system can utilize parallelcomputing.

In general, a processor 503 or a processing unit 503 refers to anycomputing processing unit or processing device comprising, but notlimited to, single-core processors; single-processors with softwaremultithread execution capability; multi-core processors; multi-coreprocessors with software multithread execution capability; multi-coreprocessors with hardware multithread technology; parallel platforms; andparallel platforms with distributed shared memory. Additionally oralternatively, a processor 503 or processing unit 503 can refer to anintegrated circuit, an application specific integrated circuit (ASIG), adigital signal processor (DSP), a field programmable gate array (FPGA),a programmable logic controller (PLC), a complex programmable logicdevice (CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Processors or processing units referred to herein canexploit nano-scale architectures such as, molecular and quantum-dotbased transistors, switches and gates, in order to optimize space usageor enhance performance of the computing devices that can implement thevarious aspects of the subject disclosure. Processor 503 or processingunit 503 also can be implemented as a combination of computingprocessing units.

The system bus 513 represents one or more of several possible types ofbus structures, including a memory bus or memory controller, aperipheral bus, an accelerated graphics port, and a processor or localbus using any of a variety of bus architectures. By way of example, sucharchitectures can comprise an Industry Standard Architecture (ISA) bus,a Micro Channel Architecture (MCA) bus, an Enhanced ISA (EISA) bus, aVideo Electronics Standards Association (VESA) local bus, an AcceleratedGraphics Port (AGP) bus, and a Peripheral Component Interconnects (PCI),a PCI-Express bus, a Personal Computer Memory Card Industry Association(PCMCIA), Universal Serial Bus (USB) and the like. The bus 513, andbuses specified in this description also can be implemented over a wiredor wireless network connection and each of the subsystems, including theprocessor 503, a mass storage device 504, an operating system 505,access protocol software 506, access protocol data 507, a networkadapter 508, system memory 512, an Input/Output Interface 510, a displayadapter 509, a display device 511, and a human machine interface 502,can be contained within one or more remote computing devices 514 a,b,cat physically separate locations, connected through buses of this form,in effect implementing a fully distributed system. In one aspect, accessprotocol software code 506 can comprise an adaptive signaling system(ASIG) and related sub-systems (see, e.g., FIG. 1 or FIG. 2); such ASIGand related sub-systems can be embodied in code instructions andexecuted by processing unit 503.

The computer 501 typically comprises a variety of computer readablemedia. Exemplary readable media can be any available media that isaccessible by the computer 501 and comprises, for example and not meantto be limiting, both volatile and non-volatile media, removable andnon-removable media. The system memory 512 comprises computer readablemedia in the form of volatile memory, such as random access memory(RAM), and/or non-volatile memory, such as read only memory (ROM). Thesystem memory 512 typically contains data (such as a group of tokensemployed for code buffers) and/or program modules such as operatingsystem 505 and access protocol software 506 that are immediatelyaccessible to and/or are presently operated on by the processing unit503. Operating system 505 can comprise OSs such as Windows operatingsystem, Unix, Linux, Symbian, Android, iOS, Chromium, and substantiallyany operating system for wireless computing devices or tetheredcomputing devices.

In another aspect, the computer 501 also can comprise otherremovable/non-removable, volatile/non-volatile computer storage media.By way of example, FIG. 5 illustrates a mass storage device 504 whichcan provide non-volatile storage of computer code, computer readableinstructions, data structures, program modules, and other data for thecomputer 501. For example and not meant to be limiting, a mass storagedevice 504 can be a hard disk, a removable magnetic disk, a removableoptical disk, magnetic cassettes or other magnetic storage devices,flash memory cards, CD-ROM, digital versatile disks (DVD) or otheroptical storage, random access memories (RAM), read only memories (ROM),electrically erasable programmable read-only memory (EEPROM), and thelike.

Optionally, any number of program modules can be stored on the massstorage device 504, including by way of example, an operating system505, and access protocol software 506. Each of the operating system 505and access protocol software 506 (or some combination thereof) cancomprise elements of the programming and the access protocol software506. Data and code (e.g., computer-executable instruction(s)) can beretained as part of access protocol software 506 and can be stored onthe mass storage device 504. Access protocol software 506, and relateddata and code, can be stored in any of one or more databases know in theart. Examples of such databases comprise, DB2®, Microsoft® Access,Microsoft® n SQL Server, Oracle®, mySQL, PostgreSQL, and the like.Further examples include membase databases and flat file databases. Thedatabases can be centralized or distributed across multiple systems.

In another aspect, the user can enter commands and information into thecomputer 501 via an input device (not shown). Examples of such inputdevices comprise, but are not limited to, a camera; a keyboard; apointing device (e.g., a “mouse”); a microphone; a joystick; a scanner(e.g., barcode scanner); a reader device such as a radiofrequencyidentification (REID) readers or magnetic stripe readers; gesture-basedinput devices such as tactile input devices (e.g., touch screens, glovesand other body coverings or wearable devices), speech recognitiondevices, or natural interfaces; and the like. These and other inputdevices can be connected to the processing unit 503 via a human machineinterface 502 that is coupled to the system bus 513, but can beconnected by other interface and bus structures, such as a parallelport, game port, an IEEE 1394 Port (also known as a Firewire port), aserial port, or a universal serial bus (USB).

In yet another aspect, a display device 511 also can be connected to thesystem bus 513 via an interface, such as a display adapter 509. It iscontemplated that the computer 501 can have more than one displayadapter 509 and the computer 501 can have more than one display device511. For example, a display device can be a monitor, an LCD (LiquidCrystal Display), or a projector. In addition to the display device 511,other output peripheral devices can comprise components such as speakers(not shown) and a printer (not shown) which can be connected to thecomputer 501 via Input/Output Interface 510. Any step and/or result ofthe methods can be output in any form to an output device. Such outputcan be any form of visual representation, including, hut not limited to,textual, graphical, animation, audio, tactile, and the like.

The computer 501 can operate in a networked environment using logicalconnections to one or more remote computing devices 514 a,b,c. By way ofexample, a remote computing device can be a personal computer, portablecomputer, a mobile telephone, a server, a router, a network computer, apeer device or other common network node, and so on. Logical connectionsbetween the computer 501 and a remote computing device 514 a,b,c can bemade via a local area network (LAN) and a general wide area network(WAN). Such network connections can be through a network adapter 508. Anetwork adapter 508 can be implemented in both wired and wirelessenvironments. Such networking environments are conventional andcommonplace in offices, enterprise-wide computer networks, intranets,and the Internet 515. Networking environments generally can be embodiedin wireline networks or wireless networks (e.g., cellular networks, suchas Third Generation (3G) and Fourth Generation (4G) cellular networks,facility-based networks (femtocell, picocell, Wi-Fi networks, etc.).

As an illustration, application programs and other executable programcomponents such as the operating system 505 are illustrated herein asdiscrete blocks, although it is recognized that such programs andcomponents reside at various times in different storage components ofthe computing device 501, and are executed by the data processor(s) ofthe computer. An implementation of access protocol software 506 can bestored on or transmitted across some form of computer readable media.Any of the disclosed methods can be performed by computer readableinstructions embodied on computer readable media. Computer readablemedia can be any available media that can be accessed by a computer. Byway of example and not meant to be limiting, computer-readable media cancomprise “computer storage media,” or “computer-readable storage media,”and “communications media,” “Computer storage media” comprise volatileand non-volatile, removable and non-removable media implemented in anymethods or technology for storage of information such as computerreadable instructions, data structures, program modules, or other data.Exemplary computer storage media comprises, but is not limited to, RAM,ROM, EEPROM, flash memory or other memory technology, CD-ROM, digitalversatile disks (DVD) or other optical storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by a computer.

In certain implementations, the computer 501 can embody an ASIG of theone or more ASIG servers 114. In such implementations, in one aspect,the access protocol software 506 can comprise computer-accessible, e.g.,computer-readable or computer-executable instructions, that embody theexemplary adaptive signaling system 410 and associated subsystems andfunctions in accordance with one or more aspects described herein.Accordingly, in one aspect, such computer-accessible instructions canconfigure the processor 503 to perform the functionality of theexemplary adaptive signaling system 410 and associated subsystems andfunctions in response to execution (e.g., by processor 503) of at leasta portion of such instructions. Accordingly, in one of suchimplementations, the computer 501 can embody or comprise an apparatuscomprising a memory (e.g., system memory 512) having computer-executableinstructions encoded thereon; and a processor functionally coupled tothe memory. The processor can be configured, by the computer-executableinstructions, to evaluate signaling performance of a network elementfunctionally coupled to one of a service network that provides, at leastin part, an end-user network functionality or a signaling networkfunctionally coupled to the network; to transmit a first pattern of oneor more network signaling events (NSEs) associated with the end-usernetwork functionality; to monitor signaling associated with at least oneof the end-user network functionality or the first pattern of networksignaling events; and in response to an adaptation logic rule beingtriggered, to modify the first pattern of network signaling events, totransmit the modified first pattern of network signaling events, and tomonitor signaling associated with the end-user network functionality andthe modified first pattern of network signaling events.

In one aspect, the processor can be further configured to determinewhether a connection logic rule is triggered in response to theadaptation logic rule not being triggered. In another aspect, theprocessor can be further configured to connect to a network element thatprovides, at least in part, the end-user functionality.

In one aspect, to monitor the signaling associated with at least one ofthe end-user network functionality or the first pattern of one or moreNSEs, the processor can be further configured to collect informationassociated with timing metrics associated with one or more signalingpackets associated with at least one NSE of the first pattern of one ormore NSEs. In another aspect, the processor can be further configured toanalyze the information associated with the timing metrics associatedwith the one or more signaling packets. In yet another aspect, tomonitor the signaling associated with at least one of the end-usernetwork functionality or the modified first pattern of one or more NSEs,the processor can be further configured to collect informationassociated with timing metrics associated with one or more signalingpackets associated with at least one NSE of the modified first patternof NSEs.

In one aspect, in the foregoing apparatus, the processor can be furtherconfigured to analyze the information associated with the timing metricsassociated with the one or more signaling packets. In another aspect, tomodify the first pattern of one or more NSEs, the processor can befurther configured to perform one or more of initiation of at least oneNSE of the addition to one or more NSEs in the first pattern of NSEs,removal of at least one NSE of the first pattern of NSEs, modificationof a type of at least one NSE of the first pattern of NSEs, modificationof content of at least one NSE of the first pattern of NSEs, ormodification of a timing sequence of the first pattern of NSEs.

In another aspect, to transmit the first pattern of one or more NSEs,the processor can be further configured to transmit each NSE of thefirst pattern of NSEs according to a timing sequence configured to causeone of a network or an attached function thereof to operate in aspecific state, the network providing the end-user networkfunctionality. In yet another aspect, to transmit the modified firstpattern of NSEs, the processor can be configured to transmit each NSE ofthe modified first pattern of NSEs according to a modified timingsequence based at least in part on the adaptation logic rule, andwherein the adaptation logic rule is one of an intra-NSE logic rule oran inter-NSE logic rule. In still another aspect, to transmit each NSEof the modified first pattern of NSEs according to the modifiedsequence, the processor can be further configured to control timing ofinitiation of at least one NSE of the modified first pattern of one ormore NSEs, the timing of the at least one NSE being suitable to cause anetwork element or an attached function of a network to operate in aspecific state.

In another aspect, to transmit each NSE of the modified first pattern ofone or more NSEs according to the modified sequence, the processor canbe further configured to control duration of at least one NSE of themodified first pattern of NSEs, the duration of the at least one NSEbeing suitable to cause a network element or an attached function of anetwork to operate in a specific state. In yet another aspect, theprocessor can be further configured to utilize non-signaling informationassociated with the end-user network functionality. In still anotheraspect, to utilize the non-signaling information, the processor can befurther configured to analyze the non-signaling information. In yetanother aspect, the processor can be further configured to transmit asecond pattern of one or more NSEs associated with the end-user networkfunctionality in response to the connection logic rule not beingtriggered.

In view of the aspects described herein, several exemplary methods thatcan be implemented in accordance with the disclosed subject matter canbe better appreciated with reference to the flowcharts in FIG. 6 throughFIG. 9B. For purposes of simplicity of explanation, the exemplary methoddisclosed herein is presented and described as a series of acts;however, it is to be understood and appreciated that the claimed subjectmatter is not limited by the order of acts, as some acts may occur indifferent orders and/or concurrently with other acts from that shown anddescribed herein. For example, the various methods or processes of thesubject disclosure can alternatively be represented as a series ofinterrelated states or events, such as in a state diagram. Moreover,when disparate functional elements implement disparate portions of themethods or processes in the subject disclosure, an interaction diagramor a state flow can represent such methods or processes. Furthermore,not all illustrated acts may be required to implement a method inaccordance with the subject disclosure. Further yet, two or more of thedisclosed methods or processes can be implemented in combination witheach other, to accomplish one or more features or advantages hereindescribed. It should be further appreciated that the exemplary methodsdisclosed throughout the subject specification can be stored on anarticle of manufacture, or computer-readable medium, to enabletransporting and transferring such methods to computers for execution,and thus implementation, by a processor or for storage in a memory.

FIG. 6 is a flowchart of an exemplary method 600 for generatingsequences of NSEs in accordance with one or more aspects of the subjectdisclosure. In one aspect, one of the generated sequences can beutilized for measuring performance of a signaling network (e.g.,signaling network 140). In another aspect, another one of the generatedsequences can be utilized for accessing, at least in part, a specificend-user functionality of a network, such as service network 130,functionally coupled to the signaling network.

At block 610, a first plurality of control messages associated with apre-determined functionality of a network is transmitted. At block 620,a second plurality of control messages associated with the predeterminedfunctionality is received. In one aspect, each one of the secondplurality of control messages can be responsive to a control message ofthe first plurality of control messages. At block 630, transmissionperformance of each one of the first plurality of control messages ismonitored. Block 630 can be referred to as a monitoring action and, inone aspect, can comprise monitoring processing duration of each one ofthe first plurality of control messages. As described herein, each ofsuch control messages are specific to a signaling protocol (e.g., SIP,RTP, TCP/IP, or the like) and can produce a specific response, such as aspecific control message, from the network (e.g., service network 130).Accordingly, processing duration can be determined, at least in part, bya time interval between transmission of a control message and anassociated response (e.g., a response control message). In one scenario,monitoring the processing duration can comprise monitoring the durationof each one of the first plurality of control messages and identifyingone or more of a minimum processing duration or a maximum processingduration. In one aspect, monitoring the transmission performance of eachone of the first plurality of control messages comprises monitoring timeoffset between a first control message of the first plurality of controlmessages and a second control message of the first plurality of controlmessages. In certain implementations, monitoring the time offset betweena first control message of the first plurality of control messages and asecond control message of the first plurality of control messagescomprises identifying one or more of a minimum time offset or a maximumtime offset.

In certain embodiments, information other than the foregoing timinginformation can be acquired as part of the monitoring action. In oneaspect, monitoring the transmission performance of each one of the firstplurality of control messages can comprise collecting informationassociated with type of each one of the first plurality of controlmessages. In addition or in the alternative, monitoring the transmissionperformance of each one of the first plurality of control messages cancomprise collecting information associated with type of a messagesequence of at least a portion of the first plurality of controlmessages.

At block 640, transmission performance of each one of the secondplurality of control messages is monitored. In one aspect, monitoringsuch transmission performance can comprise monitoring processingduration of each one of the second plurality of control messages. Incertain implementations, monitoring the duration of each one of thesecond plurality of control messages can comprise identifying one ormore of a minimum processing duration or a maximum processing duration.In another aspect, monitoring the transmission performance of each oneof the second plurality of control messages can comprise monitoring timeoffset between a first control message of the second plurality ofcontrol messages and a second control message of the second plurality ofcontrol messages. In yet another aspect, monitoring the time offsetbetween a first control message of the second plurality of controlmessages and a second control message of the second plurality of controlmessages can comprise identifying one or more of a minimum time offsetor a maximum time offset.

Similarly to monitoring performance of one or more of the firstplurality of control messages, information in addition to timinginformation can be collected as part of monitoring performance of one ormore of the second plurality of control messages. Accordingly, in oneaspect, monitoring transmission performance of each one of the secondplurality of control messages can comprise collecting informationassociated with type of each one of the second plurality of controlmessages and/or type of a message sequence of at least a portion of thesecond plurality of control messages.

At block 650, operational information (or operational characteristics)associated with a signaling network is determined based at least on anoutcome of monitoring the transmission performance of each one of theplurality of control messages and at least an outcome of monitoring thetransmission performance of each one of the second plurality of controlmessages. In one aspect, the signaling network is coupled to the networkand can provide signaling functionality associated with thepredetermined functionality(e.g., voicemail functionality) of thenetwork.

At block 660, a message sequence of the first plurality of controlmessages is selected based at least on the operational information. Inone implementation, the message sequence can be suitable to measureperformance of the signaling network. For example, such message sequencecan have a single pattern of NSEs, as illustrated in Table 1. In anotherimplementation, the message sequence can be suitable to access apredetermined end-user functionality of the network. For anotherexample, the message sequence can have at least two patterns of NSEs, asillustrated in Tables 2-3.

FIG. 7 is a flowchart of exemplary method 700 for measuring signalingperformance of a network element in accordance with one or more aspectsof the disclosure. In one embodiment, a computing device such as an ASIGserver of the one or more ASIG servers 114 can implement (e.g., execute)the exemplary method 700 or one or more blocks (also referred to asactions or steps) thereof in accordance with one or more aspectsdescribed herein. In another embodiment, a computing device comprisingthe exemplary system 400 can implement (e.g., execute) the exemplarymethod 700 or more blocks thereof in accordance with one or more aspectsdescribed herein. It should be appreciated that a processor contained inthe computing device or functionally coupled thereto also can implement(e.g., execute) the exemplary embodiment 700 or one or more blocksthereof. At block 710, a pattern of network signaling events isgenerated. In one aspect, the pattern can be specific to a signalingfunctionality of a network (e.g., service network 130 or signalingnetwork 140) and can be suitable to assess performance, such assignaling performance, of a network element (e.g., a router, a switch, aspecial purpose server such as a session border controller, a bordergateway controller, or the like) functionally coupled to the network. Asdescribed herein, in one aspect, each one of the network signalingevents can comprise communication of one or more control messages (see,e.g., FIG. 2A) at one or more specific times. In addition, each one ofthe network signaling events can span a specific time interval orduration, e.g., Δt (as illustrated in FIG. 2A). At block 720, thepattern of network signaling events is transmitted.

At block 730, signaling associated with the pattern of network signalingevents is monitored. Block 730 can be referred to as a monitoring act(or step) and, in one aspect, can comprise monitoring one or more ofprocessing duration of a signaling packet indicative of a query, ornetwork transit time of the signaling packet. In another aspect, themonitoring at block 730 can comprise monitoring a time offset betweencommunication of a first signaling packet and communication of a secondsignaling packet, the second signaling packet being associated with thefirst signaling packet.

In an additional or alternative aspect, the monitoring at block 730 cancomprise monitoring one or more of a minimum time offset between a thirdsignaling packet and a fourth signaling packet, or a maximum time offsetbetween the third signaling packet and the fourth signaling packet. Inanother aspect, the monitoring can comprise monitoring one or more of aminimum time for communication of a fifth signaling packet and sixthsignaling packet, or maximum timing between the first signaling packetand the second signaling packet, the fifth signaling packet associatedwith the sixth signaling packet.

In another aspect, the monitoring act, or step, can comprise collectinginformation associated with types of signaling packets in the secondpattern of network signaling events. In yet another aspect, themonitoring at block 730 can comprise collecting information associatedwith a sequence of control messages in the second pattern of networksignaling events, the information being indicative, at least in part, ofpresence or absence of a specific type of signaling message in thesequence.

In certain embodiments, the exemplary method 700 also can comprisegenerating timing information for at least one pattern of a sequence offirst patterns of one or more network signaling events. In otherembodiments, the exemplary method 700 also can comprise collectinginformation associated with historical performance of the signalingnetwork for the signaling functionality.

As described herein, monitoring signaling can comprise monitoring one ormore signaling or control timing metrics or performance metrics, such asthe request processing duration; the network transit time of; theelapsed time between; the minimum elapsed time of; the minimum elapsedtime between; the maximum elapsed time of; and the maximum elapsed timebetween NSEs, NSE patterns, signaling or control messages, and anyassociated NSE or signaling or control message replies and responses. Inaddition or in the alternative, such metrics can comprise monitoringrequest processing duration of signaling or control messages, repliesand other responses; the network transit time of signaling or controlmessages, replies and other responses; the timing between signaling orcontrol messages, replies and other responses; the minimum timing ofsignaling or control messages, replies and other responses; the minimumtiming between signaling or control messages, replies and otherresponses; the maximum timing of signaling or control messages, repliesand other responses; and/or the maximum timing between signaling orcontrol messages, replies and other responses.

FIG. 8 is a flowchart of exemplary method 800 for accessing a specificfunctionality, such as end-user functionality, of a network inaccordance with one or more aspects of the disclosure. In oneembodiment, a computing platform or one or more components therein orfunctionally coupled thereto can implement the exemplary method 800. Inanother embodiment, a computing device such as an ASIG server of the oneor more ASIG servers 114 can implement (e.g., execute) the exemplarymethod 800 or one or more blocks (also referred to as actions or steps)thereof in accordance with one or more aspects described herein. Inanother embodiment, a computing device comprising the exemplary system400 can implement (e.g., execute) the exemplary method 800 or moreblocks thereof in accordance with one or more aspects described herein.It should be appreciated that a processor contained in the computingdevice or functionally coupled thereto also can implement (e.g.,execute) the exemplary embodiment 800 or one or more blocks thereof. Atblock 810, a first pattern of one or more network signaling eventsassociated with an end-user network functionality is transmitted. In oneaspect, the end-user network functionality can be a service provided bya network or an attached function functionally coupled to the network,the service and/or the attached function can be consumed or utilized byan end-user or an end-user device. In one aspect, transmitting the firstpattern of one or more NSEs can comprise transmitting each NSE of thefirst pattern of one or more NSEs according to a timing sequenceconfigured to cause one of a network element or an attached functionthereof to operate in a specific state, wherein the network can providethe end-user network functionality.

At block 820, signaling associated with one or more (or at least one) ofthe end-user network functionality or the first pattern of one or morenetwork signaling events is monitored. Block 820 can be referred to as amonitoring action. In one aspect, the signaling can comprise controlmessages, such as requests and associated responses. In another aspect,monitoring the signaling associated with at least one of the end-usernetwork functionality or the first pattern of NSEs comprises collectinginformation associated with timing metrics associated with one or moresignaling packets associated with at least one NSE of the first patternof NSEs. In certain implementations, the monitoring block 820 cancomprise analyzing the information associated with the timing metricsassociated with the one or more signaling packets. In yet anotheraspect, monitoring signaling associated with one or more of the end-usernetwork functionality or the first pattern of NSEs further comprisesanalyzing the information associated with the timing metrics associatedwith the one or more signaling packets.

At block 830, it is determined if an adaptation logic rule (e.g., anintra-NSE rule or an inter-NSE rule) is triggered. Triggering of theadaptation rule can occur in response to applying the adaptation rule toinformation e.g., signaling timing information, signaling typeinformation, historical performance information, network status, dataassociated with the network, and the like collected at least in partthrough the monitoring action (or step). In a scenario in which theadaptation logic rule is triggered, flow is directed to act 840 in whichthe first pattern of one or more network signaling events is modified.Modifying the first pattern can comprise adjusting timing oftransmission of NSEs in the first pattern and/or removal of one or moreNSEs in such pattern. In one aspect, modifying the first pattern of oneor more NSEs can comprise one or more of initiating at least one NSE inaddition to one or more NSEs in the first pattern of NSEs; purging atleast one NSF of the first pattern of NSEs; modifying a type of at leastone NSE of the first pattern of NSEs; modifying the content of at leastone NSE of the first pattern of NSEs or modifying a timing sequence ofthe first pattern of NSEs. It should be appreciated that in scenarios inwhich signaling is communicated according to SIP, parameters of a callsession can be renegotiated by communication of suitable SIP requests(e.g., SIP INVITE messages).

In addition or in the alternative, at block 850, the modified firstpattern of one or more network signaling events is transmitted. In oneaspect, transmitting the modified first pattern of one or more NSEs cancomprise transmitting each NSE of the modified first pattern of one ormore NSEs according to a modified timing sequence based at least in parton the adaptation logic rule (see, e.g., Table 4), and wherein theadaptation logic rule can be one of an intra-NSE logic rule or aninter-NSE logic rule. In another aspect, transmitting each NSE of themodified first pattern of one or more NSEs according to the modifiedsequence can comprise controlling timing of initiation of at least oneNSE of the modified first pattern of NSEs, the timing of the at leastone NSE being suitable to cause a network element or an attachedfunction to operate in a specific state. In certain implementations,transmitting each NSE of the modified first pattern of one or more NSEsaccording to the modified sequence can comprise controlling duration ofat least one NSE of the modified first pattern of one or more NSEs,wherein the duration of the at least one NSE can be suitable to cause anetwork element or an attached function of a network to operate in aspecific state. Table 2 illustrates one or more durations of respectiveNSE that can be suitable to cause the network or the attached functionof the network to operate in a particular state.

Moreover or as another alternative, a block 860, signaling associatedwith one or more of the end-user network functionality or the modifiedfirst pattern of one or more network signaling events can be monitored.Upon or after implementation of block 860, flow can be directed to block830. In one aspect, monitoring the signaling associated with one or moreof the end-user network functionality or the modified first pattern ofone or more NSEs can comprise collecting information associated withtiming metrics associated with one or more signaling packets associatedwith at least one NSE of the modified first pattern of one or more NSEs.

In certain implementations of blocks 820 and 860, the respectivemonitoring actions can comprise generating records and/or analyzingsignaling information, such as the signaling or control messagesthemselves, NSEs, NSE patterns, signaling or control message responsesor replies, message type information and corresponding information suchas timestamps, expiry and other timers and logic rules.

In the alternative, when the adaptation rule is not triggered, flow isdirected to block 870 in which it is determined if a connection logicrule (e.g., ASIG-MA logic rule presented in Table 4) is triggered. Inone aspect, the connection logic rule can be applied to signalinginformation collected as part of the monitoring act 820. In theaffirmative case, flow is directed to block 860 in which the computingplatform that implements the exemplary method 800 can connect to theend-user network functionality at block 880. In one aspect, connectingto the end-user functionality can comprise connecting to a networkelement that provides, at least in part, the end-user functionality.Yet, in the negative case, flow is directed to block 810 to reiteratethe exemplary method 800. It should be appreciated that in response tothe connection logic rule not being triggered, another pattern ofsignaling events (e.g., Iteration 2 in the PPX model at Table 2) can betransmitted. For example, a second pattern of one or more NSEsassociated with the end-user network functionality can be transmitted inresponse to the connection logic rule not being triggered.

In certain embodiments, the exemplary method 800 can comprisingevaluating signaling performance of a network element prior totransmitting the first pattern of NSEs, wherein the network element canbe functionally coupled to one of a service network. (e.g., servicenetwork 140) that provides, at least in part, the end-user networkfunctionality or a signaling network (e.g., service network 130)functionally coupled to the network. In one implementation, measuringsignaling performance can be accomplished by performing the exemplarymethod 700. In other embodiments, the exemplary method 800 can compriseutilizing one or more of non-signaling information associated with theend-user functionality, current or historical information associatedwith performance of a network that provide the end-user functionality,network status, data or descriptive information associated such networkor a network element thereof or a signaling network coupled to thenetwork (e.g., service network 130). In one aspect, utilizing thenon-signaling information comprises analyzing the non-signalinginformation.

FIGS. 9A-9B illustrates an exemplary method 900 for accessing, using, orcontrolling attached functions, features, services, and/or networkinfrastructure in accordance with one or more aspects of the subjectdisclosure. At block 905, an NSE generation function (e.g., 430) canaccess a sequence of signaling patterns. In one aspect, reading thesequence of signaling patterns can comprise reading a configurationfile. In one aspect, accessing the sequence of signaling patterns (e.g.,the configuration file) can permit generation of a single NSE flow 910a. In one aspect, when the sequence of signaling patterns is accessed byreading a configuration file, the NSE generation function or a computingdevice functionally coupled thereto can process the configuration fileand such processing can enable the NSE generation function or thecomputing device to generate a single NSE Flow 910 a. In addition or inthe alternative, the configuration file, when processed by the NSEgeneration function or the computing device functionally coupledthereto, can enable the NSE generation function to generate one or moreNSE flows, depicted by numeral 910 x. For the sake simplicity, andwithout intent to limit the disclosure, a single additional NSE Flow isdescribed herein. The various aspects and features described inconnection with NSE flow processing for the NSE flow 910 a areapplicable to any NSE flow of the disclosure, such as flow 910 x.

At block 915 a, in response to accessing the sequence of signalingevents, e.g., reading the configuration file, the NSE generationfunction or the computing device functionally coupled thereto cangenerate at least one NSE based on a first signaling pattern of thesequence of signaling patterns, the at least one NSE can be utilized formeasuring the current performance of a signaling or control network(e.g., signaling network 140) according to the one or more parameters(e.g., timing of NSE(s), timing between NSE(s), duration of NSE(s), orthe like) contained in the configuration file. In certain embodiments,the at least one NSE can be transmitted to a control plane of a network(e.g., service network 130) functionally coupled (e.g., communicativelycoupled) with the signaling or control network. In one embodiment, thefirst signaling pattern of NSEs containing the at least one NSE can bethe performance measurement signaling signature shown in Table 1. Atblock 920 a, at least one thread fur monitoring signaling performancecan be generated. In one embodiment, a signaling network performancefunction (e.g., function 460) or a computational device functionallycoupled thereto can generate (e.g., configure and execute) the at leastone thread. At block 925 a, signaling performance can be evaluated. Inone aspect, the at least one NSE can be monitored, logged, and/oranalyzed by the signaling network performance function or thecomputational device functionally coupled thereto in order to ascertainthe performance of the signaling or control network. In one exemplaryscenario in which the at least one NSE includes a plurality of NSEs thatcontained in the first signaling pattern 915 a (as illustrated in Table1), in one aspect, the performance of the signaling or control networkcan include one or more of response processing time to NSE1 or thepresence of signaling messages indicative of an overload condition (suchas a SIP 486 message or a SIP 503 message) at a network element (e.g.,element 2010 b or one of the network element(s) 134) that can beutilized to access a destination network (e.g., service network 130). Insuch exemplary scenario, in another aspect, NSE4 can be utilized todetermine a current performance characteristic of the signaling orcontrol network for an attached function (e.g., one or more of theattached functions 2020 a through 2020 f) in the destination network. Atblock 930 a, it is determined if the signaling performance or controlnetwork performance is unsatisfactory. In one embodiment, the signalingnetwork performance function or the computing device functionallycoupled thereto that can implement (e.g., execute) block 920 a canperform the analysis associated with such determination. In one aspect,the exemplary method 900 can be halted in response to an outcome ofblock 930 a being indicative of unacceptable or unsatisfactoryperformance. Other additional or alternative exception handling can beimplemented in response to unsatisfactory performance. In anotheraspect, if the signaling or control network performance is deemedacceptable, additional NSE(s) can be generated at block 950 a accordingto the parameters of the configuration file. As illustrated at block 950a, at least one NSE can be generated based on a second signaling patternof the sequence of signaling patterns. The NSE generation function orthe computational device functionally coupled thereto can generate theadditional NSE(s), e.g., the at least one NSE based on the secondsignaling pattern. The additional NSE(s) can be transmitted to thecontrol plane of the network functionally coupled to the signalingnetwork or control network. In certain embodiments, the additionalNSE(s) or the second signaling pattern can be Iteration 2 on one of themodels shown in Table 2, or one or more of the signaling signatures(e.g., Iterations 2 or 3 in the 3XX0 model or Iterations 2, 3, or 4 ofthe 3PXX0 model) shown at Table 3. In such embodiments, as describedherein, one or more actual measured performance characteristics derivedfrom the monitoring and analysis of a performance measurement signalingsignature see, e.g., Table 1) can be utilized to adapt the signalingsignature illustrated at Table 2. In one implementation, a time intervalderived from a previous performance measurement signaling signaturerelated to the elapsed time of a response from the destination networkor a network element to NSE4 can be extracted and added to the 18X TOvalue of the signaling signatures illustrated in Table 2 to adapt thesignaling signature to a current performance of the signaling network ornetwork element functionally coupled to the network.

At block 940 a, at least one thread for monitoring network functionalityperformance can be generated. As described herein, in one embodiment, asignaling network performance function (e.g., function 460) can beutilized to monitor the at least network signaling event based on thefirst signaling pattern of the sequence of signaling patterns and/or anyother active NSE(s). In the illustrated embodiment, at block 945 a,network functionality performance can be evaluated at block 945 a. Inone scenario, at least one (e.g., one, two, three, . . . , all) activeNSE can be monitored at block 945 a. In one embodiment, a monitoringfunction of the ASIG-MA subsystem 470, as previously described in FIG. 4can implement (e.g., execute) block 945 a. As an example, a set of threedecision points, represented by block 950 a, block 955 a, and block 960a, are illustrated in FIG. 9B, each decision point representing aprimary category of logic rules applied, in one embodiment, by ananalysis function 490 of the ASIG-MA subsystem 470. In one aspect, atblock 950 a, an Intra-NSE logic rule outlined in Table 4 can be appliedto signaling information collected at block 945 a, for example, and itcan be determined whether such rule is triggered. In yet another aspect,at block 955 a, an Inter-NSE logic rule outlined in Table 4 can beapplied to signaling information collected at block 945 a, for example,and it can be determined is such rule is triggered. In still anotheraspect, at block 960 a, an ASIG-MA logic rule outlined in Table 4 can beapplied to signaling information collected at block 945 a, for example,and it can be determined whether such rule is triggered. In scenarios inwhich application of any of these rules results in one of such rulesbeing triggered (e.g., a “Yes” pathway in FIG. 9B), in one embodiment,the analysis function 490 of the ASIG-MA subsystem 470 can determine anappropriate response and, at block 935 a, the NSE generation function(e.g., function 430) can generate a required or intended NSE response,reply, or modification. In alternative scenarios in which none of therules applied at blocks 950 a, 955 a, or 960 a are triggered, theprocess flow of the subject exemplary method 900 continues until aconnection to the attached function, feature, service, or networkinfrastructure can be achieved. After being achieved, such connectioncan maintained until an initiated session is ended by a disconnectsignal or control message, as illustrated at block 965 a.

In one aspect, as illustrated in FIG. 9B, an inter-NSE monitoringprocess can be implemented (depicted by dashed-line rectangle) inscenarios in which more than one NSE flows are generated in response toaccessing the sequence of signaling patterns at 905. Such monitoring canbe enabled, at least in part, by one or more monitoring threadsgenerated at blocks 940 a and 940 x, wherein signaling informationassociated with two or more NSE flows can be collected from the one ormore monitoring threads. In one implementation, such inter-NSEmonitoring processes can comprise a set of one or more Inter-NSE logicrules, which can interact on multiple NSE flows as depicted by thedotted line box outlining the Inter-NSE Logic Rule Trigger decisionpoints implemented at steps 955 a through step 955 x.

It should be appreciated that in the exemplary method 900, blocks 915 x,920 x, 925 x, 930 x, 935 x, 940 x, 945 x, 950 x, 955 x, 960 x, and 955 xcan be implemented in substantially the same manner as respective blocks915 a, 920 a, 925 a, 930 a, 935 a, 940 a, 945 a, 950 a, 955 a, 960 a,and 955 a.

When compared to conventional solutions, various advantages emerge fromthe features or aspects described herein. For example, an ASIG server ofthe adaptive signaling platform 110, when implementing (e.g., executing)the exemplary system 400, a device that is accessed according to thesignaling signatures described does not ring. Such a device can be adomestic telephone (mobile or otherwise) or a non-domestic telephone. Inaddition, the device can be a pre-paid telephone. For another example,the signaling signatures can be carrier (e.g., network operator)specific. Thus, the adaptive signaling platform 110, via the exemplarysystem 400, can operate, e.g., access a specific service, functionality,or attached function, for any carrier for which signaling signatures areavailable. For yet another example, the signaling signatures utilized tomeasure signaling performance of access a service or functionality of anetwork or an attached function thereof may not rely (or require) oninspection of signaling packets and content (e.g., payload) thereof. Forstill another example, the signaling signatures described herein do notrely on specific codes associated with the service or functionality thatis intended to be accessed.

In various embodiments, the systems and methods of the subjectdisclosure regarding adaptive signaling for accessing, using, andcontrolling network attached functions, services, and features canemploy artificial intelligence (AI) techniques such as machine learningand iterative learning. Examples of such techniques include, but are notlimited to, expert systems, case based reasoning, Bayesian networks,behavior based AI, neural networks, fuzzy systems, evolutionarycomputation (e.g., genetic algorithms), swarm intelligence (e.g., antalgorithms), and hybrid intelligent systems (e.g., Expert inferencerules generated through a neural network or production rules fromstatistical learning).

While the systems, devices, apparatuses, protocols, processes, andmethods have been described in connection with exemplary embodiments andspecific illustrations, it is not intended that the scope be limited tothe particular embodiments set forth, as the embodiments herein areintended in all respects to be illustrative rather than restrictive.

Unless otherwise expressly stated, it is in no way intended that anyprotocol, procedure, process, or method set forth herein be construed asrequiring that its acts or steps be performed in a specific order.Accordingly, in the subject specification, where description of aprocess or method does not actually recite an order to be followed byits acts or steps or it is not otherwise specifically recited in theclaims or descriptions of the subject disclosure that the steps are tobe limited to a specific order, it is no way intended that an order beinferred, in any respect. This holds for any possible non-express basisfor interpretation, including: matters of logic with respect toarrangement of steps or operational flow; plain meaning derived fromgrammatical organization or punctuation; the number or type ofembodiments described in the specification or annexed drawings, or thelike.

It will be apparent to those skilled in the art that variousmodifications and variations can be made in the subject disclosurewithout departing from the scope or spirit of the subject disclosure.Other embodiments of the subject disclosure will be apparent to thoseskilled in the art from consideration of the specification and practiceof the subject disclosure as disclosed herein. It is intended that thespecification and examples be considered as non-limiting illustrationsonly, with a true scope and spirit of the subject disclosure set forthherein.

What is claimed is:
 1. A method for generating a message sequence,comprising: transmitting a first plurality of control messagesassociated with a pre-determined functionality of a network; receiving asecond plurality of control messages associated with the predeterminedfunctionality of the network; monitoring transmission performance of thefirst plurality of control messages and the second plurality of controlmessages; determining operational information associated with asignaling network based at least on an outcome of monitoring thetransmission performance of the first plurality of control messages andthe second plurality of control messages; and selecting a messagesequence of the first plurality of control messages based at least onthe operational information.
 2. The method of claim 1, wherein receivinga second plurality of control messages associated with the predeterminedfunctionality is responsive to transmitting a control message of thefirst plurality of control messages.
 3. The method of claim 1, whereinmonitoring transmission performance of the first plurality of controlmessages and the second plurality of control messages, comprisesmonitoring processing duration of each one of the first plurality ofcontrol messages and each one of the second plurality of controlmessages.
 4. The method of claim 3, wherein monitoring the processingduration of each one of the first plurality of control messages and eachone of the second plurality of control messages comprises: determiningthe processing duration of each one of the first plurality of controlmessages and each one of the second plurality of control messages; andidentifying one or more of a minimum processing duration or a maximumprocessing duration.
 5. The method of claim 1, wherein monitoringtransmission performance of the first plurality of control messages,comprises: determining a time offset between a first control message anda second control message of the first plurality of control messages; andidentifying one or more of a minimum time offset or a maximum timeoffset.
 6. The method of claim 1, wherein monitoring transmissionperformance of the second plurality of control messages, comprises:determining a time offset between a first control message and a secondcontrol message of the second plurality of control messages; andidentifying one or more of a minimum time offset or a maximum timeoffset.
 7. The method of claim 1, wherein the signaling network iscoupled to the network and the signaling network provides signalingfunctionality associated with the (predetermined functionality of thenetwork.
 8. The method of claim 1, wherein the message sequence isconfigured to measure performance of the signaling network.
 9. Themethod of claim 1, wherein the message sequence is configured to accessa predetermined end-user functionality of the network.
 10. The method ofclaim 1, wherein the message sequence comprises one or more patternscomprising one or more network signaling events (NSEs).
 11. A method,comprising: transmitting a first pattern of one or more networksignaling events (NSEs), the first pattern being specific to a signalingfunctionality of a network and suitable to assess performance of anetwork element functionally coupled to the network, each one of thenetwork signaling events comprising communication of one or more controlmessages at one or more specific times; and monitoring signalingassociated with the first pattern of one or more NSEs.
 12. The method ofclaim 11, further comprising generating timing information for at leastone pattern of a sequence of first patterns of one or more networksignaling events.
 13. The method of claim 11, further comprisingcollecting information associated with historical performance of thesignaling network for the signaling functionality.
 14. The method ofclaim 11, wherein monitoring signaling associated with the first patternof one or more NSEs, comprises monitoring one or more of processingduration of a signaling packet indicative of a query, or network transittime of the signaling packet.
 15. The method of claim 11, whereinmonitoring signaling associated with the first pattern of one or moreNSEs, comprises monitoring a time offset between communication of afirst signaling packet and communication of a second signaling packet,the second signaling packet being associated with the first signalingpacket.
 16. The method of claim 15, wherein monitoring signalingassociated with the first pattern of one or more NSEs, comprisesmonitoring one or more of a minimum time offset between a thirdsignaling packet and a fourth signaling packet, or a maximum time offsetbetween the third signaling packet and the fourth signaling packet. 17.The method of claim 16, wherein monitoring signaling associated with thefirst pattern of one or more NSEs, comprises monitoring one or more of aminimum time for communication of a fifth signaling packet and sixthsignaling packet, or maximum timing between the first signaling packetand the second signaling packet, the fifth signaling packet associatedwith the sixth signaling packet.
 18. The method of claim 11, whereinmonitoring signaling associated with the first pattern of one or moreNSEs, comprises collecting information associated with types ofsignaling packets in the first pattern of network signaling events. 19.The method of claim 11, wherein monitoring signaling associated with thefirst pattern of one or more NSEs, comprises collecting informationassociated with a sequence of control messages in the first pattern ofnetwork signaling events, the information being indicative, at least inpart, of a presence or an absence of a specific type of signalingmessage in the sequence.