Communication between call controllers by amending call processing messages

ABSTRACT

Call Control entities in a network communicate between themselves by amending call processing messages to include encrypted network information. As such, a call may be established whose path through the network is dependent on the paths of other calls. Information of a scope larger than a Call Controller normally possesses can, as a result of this communication, be made available to Call Controllers for constraining call establishment. This information could relate to other calls and connections associated with those other calls. The information may also relate to gateways in and to adjacent networks and the Call Controllers in the adjacent networks that are related to the current Call Controller.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to and is a divisional of U.S. patentapplication Ser. No. 10/170,701 filed Jun. 14, 2002, the content ofwhich is hereby incorporated herein by reference.

FIELD OF THE INVENTION

The present invention relates to call controllers in communicationnetworks and, more particularly, communication between call controllersby amending call processing messages.

BACKGROUND

Users of connection-oriented communications networks, of the typetypically used to connect telephones or computers, communicate by firstestablishing a “call”. A call represents an agreement to communicateover a particular path, where a path is a series of links betweennetwork entities. From a network management perspective, each call is abillable entity. Call establishment and teardown is typicallyimplemented through the use of a “call” protocol that is used forcommunication between an entity representative of a user and an entityrepresentative of a network through which the call is to be established.The call protocol may also be used for communication between entitieswithin networks and between entities in separate networks. A“connection” may be considered the actual “pipe” over which usercommunication flows. Once a call is established or while a call is beingestablished, a connection may be established and associated with thatcall. In general, there may be zero or more connections associated witha single call. One of the important functions of the call protocols isthe initiation and management of “connection establishment” protocols.

A Call Controller is a call control entity that is used to initiate,terminate and transit call actions. The Call Controller enables theestablishment, release, modification and maintenance of individual callsor sets of calls. When in use by a user, the Call Controller is known asa “Client” Call Controller. When in use at a network edge and a borderbetween networks, the Call Controller is known as a “Network” CallController. Many Call Controllers are involved in a single call. TheCall Controllers that are involved in the same call communicate witheach other, using a predetermined protocol, to control and maintain theconnections associated with the call. Typically, call control entitiesthat are not involved in the same call do not communicate with eachother in connection-oriented networks.

To establish a call, a Client Call Controller communicates with aNetwork Call Controller (a source network entity) to indicate arequirement for a call and a destination for the required call. Thisrequirement is often indicated through the use of a “call request”message, which is part of a protocol that defines standard callprocessing messages. In typical connection-oriented networks withdistributed call and connection control, such as described above, a pathis computed, by the Network Call Controller that received the callrequest message from the Client Call Controller, for the required callwithout consideration of information relating to other, previouslyestablished, calls in the network. While information relating to callsthat originate from a given Network Call Controller is available to thegiven Network Call Controller while calculating a path for a new call,information relating to calls that originate from other Network CallControllers is not available to the given Network Call Controller.

It has been suggested that additional information, of a scope largerthan the given Network Call Controller normally processes, should bemade available to the given Network Call Controller in order toconstrain call establishment. Where properly constrained calls areestablished, it is suggested that the connection-oriented networkinvolved will operate more efficiently.

This additional information could include information relating to othercalls and the connections associated with those other calls. Theadditional information could also include information relating togateways to adjacent networks and the call controllers in adjacentnetworks that may be associated with specific Client Call Controllers.

One approach for providing additional information involves allowing aClient Call Controller to query a first Network Call Controller forinformation relating to a first call established through communicationwith the first Network Call Controller. It would then be expected thatthe first Network Call Controller would release this information to thequerying Client Call Controller. The information may then be used by theClient Call Controller when sending a call request message, for a secondcall, to a second Network Call Controller. The Client Call Controllermay pass the information to the second Network Call Controller in orderthat the second call may be constrained by the information passed aboutthe first call.

The problem with this approach is that the first Network Call Controllercould disclose, to the Client Call Controller, some network informationthat should remain confidential. Typically, the relationship betweenusers (Client Call Controllers) and networks (Network Call Controllers)is considered to be an “untrusted” relationship. In this approach,wherein a Client Call Controller can learn network information about acall through a query, the untrusted nature of the user-networkrelationship is broken. That is, a first entity is sending informationto a second entity that the first entity would not normally send, due tothe nature of the relationship between the two entities.

A second approach involves the introduction of a global call identifierthat can be accessed by more than one source network entities, that is,Network Call Controllers that will be establishing calls in the future.Where a source Client Call Controller has requested, of a first NetworkCall Controller, that a first call be established to a destination, theestablished call is given a global call identifier, which is disclosedto the source Client Call Controller. Further, network information aboutthe first call may be maintained at a central entity in the network. Thesource Client Call Controller may then use the global call identifier ofthe first call when requesting, of a second Network Call Controller,that a second call be established to the same destination, where thepath of the second call is to be diverse from the path of the firstcall. A path may be considered diverse relative to another path if thetwo paths do not have any path segments in common. Additionally, a pathmay be considered diverse relative to another path if the two paths donot have any intermediate path segment end points (nodes) in common.However, this approach is not always efficient. A path for the secondcall might never be found, since availability of alternate paths is notconsidered at the time of establishment of the first call. Furthermore,the central entity may be required to retain information relating tocalls and connections associated with those calls in a network andbetween networks. Without a centralized call/connection database, pathcomputation may occur without information relating to path segments orintermediate path segment end points to avoid. Only when the pathcomputation process encounters a node acting as an end of a path segmentin use by a call having the global call identifier of the first call,can path computation know to try a path that does not include that pathsegment or intermediate point. Unfortunately, neither approach, i.e.,the centralized call/connection database approach and the approachwithout a database, may be performed with speed sufficient to meetvarious path computation guidelines, even in a single network.

A third approach involves creating a separate method, strictly forinter-Call Controller communication. However, inter-Call Controllercommunication usually piggybacks on connection control communication andit is preferred that Call Controllers be able to communicate with eachother in the absence of previously established calls. Additionally, CallControllers in different networks may have difficulty communicatinggiven that there may be no shared signaling network between thosenetworks.

Clearly, a need exists for Call Controllers to communicate in a mannerthat provides the Call Controllers with additional network information,yet avoids revealing network information to the user and avoids use ofdirect communications between Call Controllers that is separate fromexisting communications.

SUMMARY

Call Control entities in a network communicate between themselves byamending call processing messages to include network information. Assuch, a call may be established whose path through the network isdependent on the paths of other calls. Information of a scope largerthan a Call Controller normally possesses can, as a result of thiscommunication, be made available to Call Controllers for constrainingcall establishment. This information could relate to other calls andconnections associated with those other calls. The information may alsorelate to gateways in adjacent networks and the Call Controllers in theadjacent networks that are related to the current Call Controller.

Advantageously, in preferred aspects of the present invention, trustednetwork information is not disclosed to entities outside of the networkas a result of the communication between the Call Controllers. In oneaspect of the present invention, disclosure of trusted networkinformation is avoided through the use of encryption. Furthermore, aseparate method for inter-Call Controller communication is avoided.

In accordance with an aspect of the present invention there is provided,in a connection-oriented network including a plurality of interconnectedcall controllers, a method of optimally establishing multiple callsbetween a source client call controller and a destination client callcontroller. The method includes receiving a call processing message,amending the call processing message to include encrypted networkinformation, resulting in an amended call processing message and sendingthe amended call processing message to one of the plurality ofinterconnected call controllers. In other aspects of the invention, acall controller is provided adapted to perform this method and acomputer readable medium is provided to allow a general purpose computerto perform this method.

In accordance with another aspect of the present invention there isprovided a method of, at a client call controller, requesting theestablishment of a second call from a source to a destination, where apath for the second call uses path segments distinct from path segmentsused in a previously determined path for a first call. The methodincludes, responsive to receiving a call processing message, where thecall processing message includes encrypted network information, sendinga message, to a network call controller, requesting establishment of thesecond call, where the message includes the encrypted networkinformation. In other aspects of the invention, a client call controlleris provided adapted to perform this method and a computer readablemedium is provided to allow a general purpose computer to perform thismethod.

In accordance with a further aspect of the present invention there isprovided, at a source client call controller connected to aconnection-oriented network including a plurality of interconnectednetwork call controllers, a method of requesting the establishment of agiven call to a destination client call controller. The method includesreceiving a notification, from a first network call controller, that afirst call request message has been rejected, where the notificationincludes encrypted network information related to a path to be used bythe given call and non-encrypted network information, selecting a secondnetwork call controller based on the non-encrypted network informationand, responsive to the receiving the notification, sending a second callrequest message, to the second network call controller, requestingestablishment of the given call, where the second call request messageincludes the encrypted network information. In other aspects of theinvention, a client call controller is provided adapted to perform thismethod and a computer readable medium is provided to allow a generalpurpose computer to perform this method.

In accordance with an again further aspect of the present inventionthere is provided a network call controller in a connection-orientednetwork including a plurality of interconnected network callcontrollers, a method of call processing. The method includes a step forreceiving a call request message requesting establishment of a givencall to a specified destination, a step for, responsive to thereceiving, determining a path to a client call controller connected tothe specified destination and a step for amending the call requestmessage to include encrypted information relating to the path to resultin an amended call request message. In other aspects of the invention, anetwork call controller is provided adapted to perform this method and acomputer readable medium is provided to allow a general purpose computerto perform this method.

In accordance with still another aspect of the present invention thereis provided, at a network call controller in a connection-orientednetwork including a plurality of interconnected network callcontrollers, a method of call processing. The method includes receivinga call request message requesting establishment of a given call to aspecified destination, responsive to the receiving, determining a pathto a client call controller connected to the specified destination andamending the call request message to include encrypted informationrelating to the path to result in an amended call request message. Inother aspects of the invention, a network call controller is providedadapted to perform this method and a computer readable medium isprovided to allow a general purpose computer to perform this method.

In accordance with an even further aspect of the present invention thereis provided, in a connection-oriented network including a plurality ofinterconnected network call controllers, a method of call processing ata network call controller. The method includes receiving a call requestmessage requesting establishment of a given call to a specifieddestination, responsive to the receiving, determining a path to anetwork call controller that acts as a gateway to a network having aconnection to the specified destination and amending the call requestmessage to include information relating to the path to result in anamended call request message. In other aspects of the invention, anetwork call controller is provided adapted to perform this method and acomputer readable medium is provided to allow a general purpose computerto perform this method.

In accordance with a still further aspect of the present invention thereis provided, at a network call controller in a connection-orientednetwork including a plurality of interconnected network callcontrollers, a method of call processing. The method includes receivinga call request message requesting establishment of a given call to aspecified destination, responsive to the receiving, decrypting call pathinformation included in the call request message and further processingthe given call based on the decrypted call path information. In otheraspects of the invention, a network call controller is provided adaptedto perform this method and a computer readable medium is provided toallow a general purpose computer to perform this method.

In accordance with a still further aspect of the present invention thereis provided, at a client call controller connected to aconnection-oriented network including a plurality of interconnectednetwork call controllers, a method of using information about a firstcall when requesting a second call. The method includes sending a queryto a network call controller, the query requesting information about thefirst call, receiving the information in encrypted form and sending acall request message for the second call to a network call controller,where the call request message includes the encrypted information. Inother aspects of the invention, a client call controller is providedadapted to perform this method and a computer readable medium isprovided to allow a general purpose computer to perform this method.

In accordance with a still further aspect of the present invention thereis provided, at a network call controller in a connection-orientednetwork including a plurality of interconnected network callcontrollers, a method of message processing. The method includesreceiving a query that requests information about a first call andsending the information, to a source of the query, in encrypted form. Inother aspects of the invention, a network call controller is providedadapted to perform this method and a computer readable medium isprovided to allow a general purpose computer to perform this method.

In accordance with a still further aspect of the present invention thereis provided, at a client call controller connected to aconnection-oriented network including a plurality of interconnectednetwork call controllers, a method of requesting a call. The methodincludes sending a call request message to a network call controller inthe connection-oriented network over a first user to network interfaceand including, in the call request message, an identifier of a seconduser to network interface connecting the client call controller to theconnection-oriented network.

Other aspects and features of the present invention will become apparentto those of ordinary skill in the art upon review of the followingdescription of specific embodiments of the invention in conjunction withthe accompanying figures.

BRIEF DESCRIPTION OF THE DRAWINGS

In the figures which illustrate example embodiments of this invention:

FIG. 1 illustrates a connection-oriented network connecting a source toa destination and typical signal flow associated with a basic procedureto establish a call from the source to the destination;

FIG. 2 illustrates two connection-oriented networks connecting a sourceto a destination and may be used for a discussion of network referencepoints;

FIG. 3 illustrates a connection-oriented network connecting a source toa destination and may be used for a discussion of an “Optimal Path”implementation of dual homing;

FIG. 4 illustrates a connection-oriented network connecting a source toa destination and may be used for a discussion of a “Diverse Path”implementation of dual homing;

FIG. 5 illustrates two connection-oriented networks connecting a sourceto a destination and may be used for a discussion of a “E-NNI DiversePath” implementation of dual homing;

FIG. 6 illustrates five connection-oriented networks connecting a sourceto a destination and may be used for a discussion of a “Multi-NetworkDiverse Path” implementation of dual homing;

FIG. 7 illustrates a generic call controller for use in theconnection-oriented networks of FIGS. 1-6 according to an embodiment ofthe present invention.

DETAILED DESCRIPTION

FIG. 1 illustrates typical signal flow associated with a basic callestablishment procedure. A connection-oriented network 102 is shown toinclude a source Network Call Controller 104A and a destination NetworkCall Controller 104B. In communication with the source Network CallController 104A is a source Client Call Controller 106A. Incommunication with the destination Network Call Controller 104B is adestination Client Call Controller 106B. The internal connectivitywithin the connection-oriented network 102 is not shown.

The call establishment procedure may be initiated when a call requestmessage is sent from the source Client Call Controller 106A to thesource Network Call Controller 104A at the “calling edge” of theconnection-oriented network 102. The source Network Call Controller 104Acomputes a path through the connection-oriented network 102 to thedestination Network Call Controller 104B at the “called edge” of theconnection-oriented network 102. A call may then be established, usingthe computed path, through the connection-oriented network 102 from thesource Network Call Controller 104A to the destination Network CallController 104B at the “called edge” of the connection-oriented network102. A connection may be established at the same time. Finally, the callrequest message may be sent from the destination Network Call Controller104B to the destination Client Call Controller 106B. Provided that thedestination Client Call Controller 106B accepts the call request messageafter validation, a “call accept” message may be sent to the destinationNetwork Call Controller 104B, from which the call accept message may besent, using the established connection over the computed path, to thesource Network Call Controller 104A. Lastly, the call accept message maybe sent from the source Network Call Controller 104A to the sourceClient Call Controller 106A to confirm the connection from theconnection-oriented network 102 to the source Client Call Controller106A and also to indicate the completion of call establishment. Thereare similar procedures for call release and call modification.

A processor (see FIG. 7) in the source Client Call Controller 106A and aprocessor (see FIG. 7) in the source Network Call Controller 104A may beloaded with a call processing software for executing methods exemplaryof this invention from a software medium 112 and a software medium 114,respectively. The software medium 112 and the software medium 114 maytake the form of disk, tape, chip or random access memory containing afile downloaded from a remote source.

Within a connection-oriented network, there may be three referencepoints, namely a User-Network Interface (UNI), an InternalNetwork-Network Interface (I-NNI) and an External Network-NetworkInterface (E-NNI). Information flows for various call processingfunctions occur over these reference points. These call processingfunctions include call control, connection control and routing.Standards for UNI, I-NNI and E-NNI are defined in InternationalTelecommunication Union Telecommunication Standardization Sector (ITU-T)Recommendation G.8080/Y.1304 (11/01) “Architecture for the AutomaticallySwitched Optical Network (ASON)”.

The three reference points may be considered in view of FIG. 2. A sourceClient Call Controller 206A communicates with a source Network CallController 204A over a source UNI 208A. At the source UNI 208A referencepoint, information flows between the source Client Call Controller 206Aand the source Network Call Controller 204A. Additionally, a destinationClient Call Controller 206B communicates with a destination Network CallController 204B over a destination UNI 208B. However, the source NetworkCall Controller 204A is part of a source connection-oriented network202Y and the destination Network Call Controller 204B is part of adestination connection-oriented network 202Z. Consequently, the sourceNetwork Call Controller 204A must communicate with an egress gatewayNetwork Call Controller 204C. Within the source connection-orientednetwork 202Y, the source Network Call Controller 204A may communicatewith the egress gateway Network Call Controller 204C using an I-NNI. Theinternal connectivity within the source connection-oriented network 202Yis not shown. The egress gateway Network Call Controller 204Ccommunicates with an ingress gateway Network Call Controller 204D, whichis part of the destination connection-oriented network 202Z, over anE-NNI 210. An E-NNI is used between networks, and there may be multipleE-NNIs between a given pair of networks. At the E-NNI 210, informationflows between the egress gateway Network Call Controller 204C and theingress gateway Network Call Controller 204D. The ingress gatewayNetwork Call Controller 204D may then communicate with the destinationNetwork Call Controller 204B using an I-NNI. The internal connectivitywithin the destination connection-oriented network 202Z is not shown.

Rather than computing a path to the destination Network Call Controller204B upon receipt of a call request message from the source Client CallController 206A that specifies the destination Client Call Controller206B, the source Network Call Controller 204A computes a path to theegress gateway Network Call Controller 204C. It is the ingress gatewayNetwork Call Controller 204D that computes a path to the destinationNetwork Call Controller 204B.

In general, the source Client Call Controller 206A should have anawareness of the identifiers of the local UNIs (as there may be morethan one) connected to itself and the remote UNIs connected to thedestination Client Call Controller 206B. The above-mentioned“identifier” of UNI may be a public network address, e.g., a TransportNetwork Assigned (TNA) address as suggested by the OpticalInternetworking Forum (OIF) in the “User Network Interface (UNI) 1.0Signaling Specification”. In the OIF specification, each TNA address isa globally unique address assigned by a transport network to one or moredata bearing links.

Additionally, each Network Call Controller in a given network shouldmaintain a record of the identifiers of the E-NNI gateways located inthe given network, or at least have a capability to learn theidentifiers from a network entity that maintains such information.Further, E-NNI gateways (e.g., egress gateway Network Call Controller204C, ingress gateway Network Call Controller 204D) should maintain arecord of the identifiers of peer gateways that are located in neighbornetworks, or at least have a capability to learn the identifiers from anetwork entity that maintains such information. The identifier of anE-NNI gateway is a public network address. Each Network Call Controllerin a given network should also maintain a record of the identifiers ofany neighbor networks, or at least have a capability to learn theidentifiers from a network entity that maintains such information. Theidentifier of a network is a public network identity such as a carrierID or an Autonomous System (AS) number. As well, each Network CallController in a given network should support address resolution capableof translating the various public addresses to switch addresses that areinternal to the given network.

An individual Client Call Controller may connect to the sameconnection-oriented network over more than one UNI and this is known as“dual homing”. An individual Client Call Controller could also connectover UNIs to two different connection-oriented networks. This is also aform of dual homing. Dual homing may be used to increase the reliabilityof a client's service to a network. Despite the name, dual homing mayinvolve more than two UNIs to different edge Network Call Controllers.Between networks, multiple E-NNIs may also be used to increasereliability.

FIG. 3 illustrates an example of dual homing. In the “Optimal Path”example of FIG. 3, a source Client Call Controller 306A may communicatewith a connection-oriented network 302 over any one of three UNIs 308E,308F, 308G to a corresponding Network Call Controller 304E, 304F, 304G(referenced herein individually or collectively as 304). On thedestination end, a destination Client Call Controller 306B maycommunicate with the connection-oriented network 302 over one of twoUNIs 308H, 308J to a corresponding Network Call Controller 304H, 304J.The source Client Call Controller 306A sends a call request message tothe connection-oriented network 302 requesting the establishment of callover an optimal path to the destination Client Call Controller 306B.

FIG. 4 illustrates another example of dual homing. In the “Diverse Path”example of FIG. 4, a source Client Call Controller 406A may communicatewith a connection-oriented network 402 over one of two UNIs 408E, 408Gto a corresponding Network Call Controller 404E, 404G. On thedestination end, a destination Client Call Controller 406B maycommunicate with the connection-oriented network 402 over one of twoUNIs 408H, 408J to a corresponding Network Call Controller 404H, 404J.The source Client Call Controller 406A sends a call request message tothe connection-oriented network 402 requesting the establishment of afirst call between the source Client Call Controller 406A and thedestination Client Call Controller 406B. The call request messageindicates that a further call request message will follow, requestingthe establishment of a second call between the source Client CallController 406A and the destination Client Call Controller 406B, wherethe path for the second call is diverse from the path for the firstcall.

Another scenario exists in which a first call has been establishedbetween the source Client Call Controller 406A and the destinationClient Call Controller 406B, say, over the source UNI 408E, and thesource Client Call Controller 406A requires a second path setup to thedestination Client Call Controller 406B that is diverse from the firstconnection. The source Client Call Controller 406A sends a query messageto the connection-oriented network 402 requesting information about thefirst call. A query response message from the connection-orientednetwork 402 contains encrypted information about the first call. Thesource Client Call Controller 406A may then send a call request messageover the alternative source UNI 408G with the received, encryptedinformation about the first call so that the network can attempt tocompute a path for a second call that is diverse from the path for thefirst call.

FIG. 5 illustrates a further example of dual homing. In the “E-NNIDiverse Path” example of FIG. 5, a source Client Call Controller (CCC)506A may communicate with a source connection-oriented network 502Y overone of two UNIs 508E, 508G to a corresponding Network Call Controller504E, 504G. On the destination end, a destination Client Call Controller(CCC) 506B may communicate with a destination connection-orientednetwork 502Z over one of two UNIs 508V, 508X to a corresponding NetworkCall Controller 504V, 504X. The source Client Call Controller 506A sendsa call request message to the source connection-oriented network 502Y,requesting the establishment of a first call between the source ClientCall Controller 506A and the destination Client Call Controller 506B.The call request message indicates that a further call request messagewill follow, requesting the establishment of a second call between thesource Client Call Controller 506A and the destination Client CallController 506B, where the path for the second call is diverse from thepath for the first call.

To reach the destination connection-oriented network 502Z, the sourceNetwork Call Controllers 504E, 504G of the source connection-orientednetwork 502Y make use of egress gateway Network Call Controllers 504R,504S that are also in the source connection-oriented network 502Y. Theinternal connectivity within the source connection-oriented network 502Yis not shown. The egress gateway Network Call Controllers 504R, 504Sconnect to ingress gateway Network Call Controllers 504T, 504U in thedestination connection-oriented network 502Z over corresponding E-NNIs510T, 510U (referenced herein individually or collectively as 510). Toprovide an E-NNI Diverse Path, the source Network Call Controllers 504E,504G determine paths to the destination Client Call Controller 506B thateach utilize a distinct E-NNI 510. Notably, the source Client CallController 506A need not be aware of the use of diverse E-NNIs 510.

FIG. 6 illustrates a further example of dual homing. In the“Multi-Network Diverse Path” example of FIG. 6, a source Client CallController (CCC) 606A may communicate with a first sourceconnection-oriented network 602Y1 over a first UNI 608E to a firstsource Network Call Controller 604E and with a second sourceconnection-oriented network 602Y2 over a second UNI 608Q to a secondNetwork Call Controller 604Q. On the destination end, a destinationClient Call Controller (CCC) 606B may communicate with a firstdestination connection-oriented network 602Z1 over a first UNI 608V to afirst destination Network Call Controller 604V and with a seconddestination connection-oriented network 602Z2 over a second UNI 608L toa second destination Network Call Controller 604L. The first sourceconnection-oriented network 602Y1 and the second sourceconnection-oriented network 602Y2 inter-connect to an intermediateconnection-oriented network 602P.

The source Client Call Controller 606A sends a call request message tothe source connection-oriented networks 602Y1, 602Y2 requesting theestablishment of a first call between the source Client Call Controller606A and the destination Client Call Controller 606B. The call requestmessage indicates that a further call request message will follow,requesting the establishment of a second call between the source ClientCall Controller 606A and the destination Client Call Controller 606B,where the path for the second call is to be diverse from the path forthe first call.

To reach the intermediate connection-oriented network 602P on the way toa first destination connection-oriented network 602Z1, the first sourceNetwork Call Controller 604E makes use of an egress gateway Network CallController 604R in the first source connection-oriented network 602Y1.The internal connectivity within the first source connection-orientednetwork 602Y1 is not shown. The egress gateway Network Call Controller604R connects to an ingress gateway Network Call Controller 604PR in theintermediate connection-oriented network 602P over an E-NNI 610R1. Toreach the first destination connection-oriented network 602Z1, theingress gateway Network Call Controller 604PR in the intermediateconnection-oriented network 602P makes use of an egress gateway NetworkCall Controller 604PT to the first destination connection-orientednetwork 602Z1, which connects to an ingress gateway Network CallController 604T in the first destination connection-oriented network602Z1 over an E-NNI 610T. Within the first destinationconnection-oriented network 602Z1, the ingress gateway Network CallController 604T connects to the first destination Network CallController 604V from which the first UNI 608V connects to thedestination Client Call Controller (CCC) 606B.

Similarly, to reach the intermediate connection-oriented network 602P onthe way to a second destination connection-oriented network 602Z2, thesecond source Network Call Controller 604Q makes use of an egressgateway Network Call Controller 604K in the second sourceconnection-oriented network 602Y2. The internal connectivity within thesecond source connection-oriented network 602Y2 is not shown. The egressgateway Network Call Controller 604K connects to an ingress gatewayNetwork Call Controller 604PK in the intermediate connection-orientednetwork 602P over an E-NNI 610K. To reach the second destinationconnection-oriented network 602Z2, the ingress gateway Network CallController 604PK in the intermediate connection-oriented network 602Pmakes use of an egress gateway Network Call Controller 604PM to thesecond destination connection-oriented network 602Z2, which connects toan ingress gateway Network Call Controller 604M in the seconddestination connection-oriented network 602Z2 over an E-NNI 610M1.Within the second destination connection-oriented network 602Z2, theingress gateway Network Call Controller 604M connects to the seconddestination Network Call Controller 604L from which the second UNI 608Lconnects to the destination Client Call Controller (CCC) 606B.

To provide a Multi-Network Diverse Path, the ingress gateway NetworkCall Controller 604PR and the ingress gateway Network Call Controller604PK are required to communicate through the intermediateconnection-oriented network 602P to respective egress gateway NetworkCall Controllers 604PT, 604PM over diverse paths. Notably, the sourceClient Call Controller 606A need not be aware of the use of theintermediate connection-oriented network 602P.

In the examples described in conjunction with FIGS. 4, 5 and 6,computing a path that meets specific constraints requires a pathcomputation method that considers the existence, or future existence, ofother paths. “Path information”, or context, is required by the NetworkCall Controllers involved in initiating such a path computation, wherethis path information relates to paths in use by existing calls.

FIG. 7 illustrates a generic call controller 700 for use, as either aClient call Controller or a Network Call Controller, in theconnection-oriented networks of FIGS. 1-6. The call controller 700includes a processor 704 in communication with a memory 708, an inputnetwork interface 702 and an output network interface 706. The inputnetwork interface 702 receives call processing messages and othernetwork traffic while the output network interface 706 transmits callprocessing messages and other network traffic. As will be apparent to aperson skilled in the art, the input network interface 702 and theoutput network interface 706 may co-exist in a bi-directional networkinterface.

In overview, aspects of the present invention allow two Network CallControllers to communicate with each other by amending call processingmessages. Such call processing messages include, for example, callaccept messages and call request messages. For instance, informationabout a path used by a first call may be communicated in a call acceptmessage generated at a Network Call Controller. This information maythen be included in a subsequent call request message generated at aClient Call Controller so that one Network Call Controller can avoidpath segments used in a path established by another Network CallController. That is, the communication may provide the Network CallControllers with the path information necessary to compute a path thatmeets constraints specified in a call request message.

As a result of the communication of path and other locally knowninformation between two or more Network Call Controllers, those NetworkCall Controllers possess additional network context. This enables theNetwork Call Controllers to make path computations that includedependencies on the local information known by other Network CallControllers. For example, calls may be setup that are dependent on othercalls.

Preferably, an encryption/decryption scheme is employed by all NetworkCall Controllers in a given network. So that, for example, a NetworkCall Controller connected to one UNI can encrypt information that may bedecrypted by another Network Call Controller connected to a differentUNI.

Returning to FIG. 3, the source Client Call Controller 306A initiates acall by sending a call request message to the source Network CallController 304F in the connection oriented network 302. The call requestmessage may include identifiers of the local UNIs 308E, 308F, 308Gconnected to the source Client Call Controller 306A and the remote UNIs308H, 308J connected to the destination Client Call Controller 306B. Fordescriptive purposes, the client side of a UNI 308 may be called a“UNI-C” and the network side of a UNI 308 may be called a “UNI-N”.

The UNI-N of the source Network Call Controller 304F may be genericallycalled the “call control entity” that receives the call request messagefrom the UNI-C of the source Client Call Controller 306A. The UNI-N ofthe source Network Call Controller 304F processes the call inside theconnection oriented network 302. As the call is in a single network, thesource Network Call Controller 304F selects a UNI-N 308J connected tothe destination Client Call Controller 306B. The source Network CallController 304F then computes a path, perhaps with intermediate pathsegment end points (i.e., network entities along the computed path fromthe source Network Call Controller 304F to the destination Network CallController 304J), to the destination Network Call Controller 304Jassociated with the selected UNI-N 308J. The source Network CallController 304F then establishes a call over the computed path to thedestination Network Call Controller 304J. A connection may beestablished at the same time.

A single Network Call Controller could simultaneously compute themultiple paths that are in the same network, where the multiple pathsstart and end at different Network Call Controllers. Additionally, afterhaving computed one path to a destination Network Call Controller, thesource Network Call Controller could also consider alternative paths tothe destination Network Call Controller as well as alternative paths toother Network Call Controllers, where all of the alternative paths areconstrained to not use path segments, where the path segments aredefined by path segment end points, used in previous paths.

Certain information about the established connection and the call usedby the established connection may be retained at the UNI-N of the sourceNetwork Call Controller. This information may be passed from the UNI-Nof the source Network Call Controller back to the UNI-C of the sourceClient Call Controller along with a call accept message or a call rejectmessage. The information that is not public may be encrypted by theUNI-N of the source Network Call Controller before being passed.Additionally, the information may include information from all of theintermediate path segment end points in the computed path used by thecall and connection.

Information within the scope of each network participating in the calland connection may be separately encrypted. Preferably, the encryptionkey is network specific. That is, the encryption may be only decryptedby other call control entities in the network in which the informationoriginated. In a preferred scenario, each network has its own encryptionkey, so that the information encrypted by call control entities in onenetwork will not be decrypted by call control entities in othernetworks.

The source Client Call Controller 306A stores the encrypted call andconnection information. The encrypted call and connection informationmay then be provided along with a subsequent call request message to theconnection oriented network 302. When a Network Call Controller in theconnection oriented network 302 receives this call request message, theNetwork Call Controller may decrypt information about other calls andconnections and use the decrypted information to establish the requestedcall. This encrypted information may be included in the signalingmessages that normally travel over a UNI.

As discussed hereinbefore, a call may be required to be establishedacross multiple networks, as shown in FIGS. 5 and 6. Specifically, inthe network shown in FIG. 5, the UNI-C of the source Client CallController 506A may send a call request message to the UNI-N of thesource Network Call Controller 504E, where the call request messagespecifies the UNI-N of the destination Network Call Controller 504V thatconnects to the destination Client Call Controller 506B. The UNI-N ofthe source Network Call Controller 504E processes the call inside thesource connection oriented network 502Y. In particular, the sourceNetwork Call Controller 504E determines, through a review of maintainednetwork topology, that Network Call Controllers in the destinationconnection oriented network 502Z can reach the destination UNI 508V or508X. As a result of this determination, the source Network CallController 504E selects the egress gateway Network Call Controller 504Rto connect to the destination connection oriented network 502Z. Thesource Network Call Controller 504E then computes a path to the egressgateway Network Call Controller 504R and uses the computed path toestablish a call and associated connection to the egress gateway NetworkCall Controller 504R.

The egress gateway Network Call Controller 504R then selects the ingressgateway Network Call Controller 504T in the neighbor network. Note that,even though E-NNIs to other ingress gateway Network Call Controllers inthe destination connection-oriented network 502Z are not shown, theremay be multiple such ingress gateway Network Call Controllers and theegress gateway Network Call Controller 504R may be faced with a choice.

The ingress gateway Network Call Controller 504T then computes a path,perhaps with intermediate path segment end points, to the destinationNetwork Call Controller 504V associated with the selected UNI 508V. Theingress gateway Network Call Controller 504T then establishes a callover the computed path and further establishes a connection that usesthe established call.

Again, certain information about the established connection and the callused by the established connection may be retained at the UNI-N of thesource Network Call Controller 504E. This information may be passed fromthe UNI-N of the source Network Call Controller 504E back to the UNI-Cof the source Client Call Controller 506A along with a call acceptmessage that confirms that the call is established. The information thatis not public may be encrypted by the UNI-N of the source Network CallController 504E before being passed. Included in the information passedby the UNI-N of the source Network Call Controller 504E may beinformation related to the call, and the connection using the call, thatis specific to the destination connection-oriented network 502Z. Theinformation that is specific to the destination connection-orientednetwork 502Z may pass, encrypted, from the ingress gateway Network CallController 504T to the egress gateway Network Call Controller 504R overthe E-NNI 510T used by the call.

The source Client Call Controller 506A stores the encrypted call andconnection information. The encrypted call and connection informationmay then be provided along with a subsequent call request message to thesource connection oriented network 502Y. When a Network Call Controllerin the source connection oriented network 502Y receives this callrequest message, the Network Call Controller may decrypt informationabout other calls and connections and use the decrypted information toestablish the requested call. This encrypted information may be includedin the signaling messages that normally travel over an E-NNI, as well asthose previously mentioned signaling messages that normally travel overa UNI.

The specific implementation of the above broadly described method ofcommunicating call and connection information between Network CallController varies according to the application.

In the Optimal Path application, the proposed method uses a “callreject” message to carry a path result including an identification of asource UNI, a destination UNI and, maybe, encrypted information about aconnection. With reference to FIG. 3, a possible sequence of eventsbegins when the source Client Call Controller 306A sends a call requestmessage to a source Network Call Controller 304 using one of theavailable local UNIs 308, say local UNI 308F. The source Client CallController 306A may pass identifiers for alternative local UNIs 308E,308G, connected to the source Client Call Controller 306A, andidentifiers for alternative remote UNIs 308H, 308J, connected to thedestination, in the call request message.

The source Network Call Controller 304F computes and examines possiblepaths and selects the optimal one. If this optimal path should startfrom the source UNI 308F, the source Network Call Controller 304Festablishes a call over the optimal path. Otherwise, the source NetworkCall Controller 304F rejects the call by sending a call reject messageto the source Client Call Controller 306A. The source Network CallController 304F includes a special error code in the call rejectmessage. Additional information in the call reject message may include,in encrypted form, an identifier of a local UNI 308 and a remote UNI 308to act as the source UNI and the destination UNI for the optimal pathand, possibly, information about intermediate path segment end pointsalong the optimal path.

The source Client Call Controller 306A then selects the source UNI, sayUNI 308G, of the optimal path identified in the call reject message andsends a new call request message over the selected UNI 308G. The newcall request message includes the optimal path information received inthe call reject message. When the source Network Call Controller 304G onnetwork side of the selected UNI 308G receives the call request message,the source Network Call Controller 304G learns the destination UNI ofthe optimal path from the call request message. The source Network CallController 304G may also decrypt the optimal path information and,thereby, learn how to establish a call to obtain an optimal path.

In the Diverse Path application, the goal is to establish two calls,where the two calls have diverse paths between the source Client CallController and the destination Client Call Controller, where each ClientCall Controller has two reference points of attachment to a sharednetwork. That is, each Client Call Controller has, at least, two UNIs tothe same network. In one embodiment of the present invention, a callaccept message is used to carry a path result including anidentification of a source UNI, a destination UNI and encryptedinformation about an established call. While, in another embodiment, thesource Client Call Controller may query the shared network forinformation about a previously established call.

With reference to FIG. 4, a possible sequence of events begins when thesource Client Call Controller 406A initiates a call to the destinationClient Call Controller 406B by sending a call request message, whichidentifies the source UNI 408E and the destination UNI 408H, over thesource UNI 408E. The call request message requests a first call to thedestination Client Call Controller 406B and indicates that a second callrequest will follow, for a second call to the destination Client CallController 406B. To provide the source Network Call Controller 404E withinformation related to the second call, the call request message alsocontains the identity of the alternate source UNI 408G as well as theidentity of the alternate destination UNI 408J. A constraint isindicated for the second call, requiring that the second call has a pathdiverse from the path for the first call.

The source Network Call Controller 404E computes a path between thesource UNI 408E and the destination UNI 408H and may also compute apath, for the second call, between the alternate source UNI 408G and thealternate destination UNI 408J, where the path for the second call isdiverse from the path for the first call.

The source Network Call Controller 404E then establishes the firstrequested call over the path computed for the first call to destinationNetwork Call Controller 404H, and may establish a connection for thatcall. The call request message is then sent over the destination UNI408H to the destination Client Call Controller 406B. The destinationClient Call Controller 406B accepts the call by sending a call acceptmessage to the destination Network Call Controller 404H over thedestination UNI 408H. The call accept message includes an identity ofthe destination UNI 408J that is not used by the first one of therequested calls. Note that this destination UNI identity need not beencrypted. The destination Network Call Controller 404H passes the callaccept message to the source Network Call Controller 404E and the sourceNetwork Call Controller 404E passes the call accept message to thesource Client Call Controller 406A. By the time the call accept messageis sent to the source Client Call Controller 406A, the call acceptmessage may also include detailed information about the path computedfor the first requested call and, perhaps, the path computed for thesecond requested call. This path information should be encrypted.

The source Client Call Controller 406A receives the call accept messageover the source UNI 408E and initiates the second call by sending a callrequest message over the alternative source UNI 408G. The call requestmessage, including the path information, received in the call acceptmessage, such as the identity of the destination UNI 408J for the secondcall, is received by the alternative source Network Call Controller404G.

The alternative source Network Call Controller 404G computes a path forthe second call, taking into account received encrypted informationabout the path of the first call that was included in the call requestmessage. Alternatively, where the source Network Call Controller 404Ehas already computed a path for the second call that is diverse from thepath for the first call, the alternative source Network Call Controller404G may simply decrypt, from the information included in the callrequest message, a description of the computed path for the second call.

Independent of whether the path for the second call is computed ormerely decrypted, the alternative source Network Call Controller 404Gmay then establish the second call, over the path for the second call,to the destination Network Call Controller 404J associated with thedestination UNI 408J. A connection may be established along with thesecond call. The destination Network Call Controller 404J then employsthe destination UNI 408J to send the call request message to thedestination Client Call Controller 406B.

In the above example, a first call request message requests a first callto the destination Client Call Controller 406B and indicates that asecond call request will follow, for a second call to the destinationClient Call Controller 406B. It may be the case, however, that a firstcall has been established without specifying that a second call wouldfollow. It may subsequently be decided that a second call is requiredand that the second call should have a path diverse from the path forthe first call.

Consider that a first call exists between the source Client CallController 406A and the destination Client Call Controller 406B and thatthe first call uses the source UNI 408E, the source Network CallController 404E, the destination Network Call Controller 404H and thedestination UNI 408H. Further, consider that the source Client CallController 406A has established the first call as a single call withoutknowledge of any future desired calls. Subsequently, the source ClientCall Controller 406A requires a second call to the destination ClientCall Controller 406B with a constraint that the path for the second callshould be diverse from the path for the first call.

Before sending a call request message, the source Client Call Controller406A sends a query message to the source Network Call Controller 404E torequest information about the first connection. The source Network CallController 404E responds with a query response message that includesencrypted details about the first call.

The source Client Call Controller 406A may then include the encrypteddetails about the first call in a call request message for the secondcall. The call request message for the second call is then sent, by thesource Client Call Controller 406A, to the alternative source NetworkCall Controller 404G over the alternative source UNI 408G.Alternatively, the call request message for the second call may be sentto the source Network Call Controller 404E.

The alternative source Network Call Controller 404G receives the callrequest message for the second call and attempts to compute a path tothe destination Client Call Controller 406B, where the computed path forthe second call is diverse from the path already in use for the firstcall. If successful, the alternative source Network Call Controller 404Gmay establish the second call, over the computed path for the secondcall, to the destination Network Call Controller 404J associated withthe destination UNI 408J. A connection may be established along with thesecond call. The destination Network Call Controller 404J then employsthe destination UNI 408J to send the call request message to thedestination Client Call Controller 406B.

In the E-NNI Diverse Path application, the proposed method uses callaccept messages to pass information about the gateway Network CallControllers used in establishing paths. Since the identifiers forgateway Network Call Controllers are public addresses, the informationabout the gateway Network Call Controllers need not be encrypted. Withreference to FIG. 5, a possible sequence of events begins when thesource Client Call Controller 506A sends a call request message to asource Network Call Controller 504 using one of the available UNIs 508,say UNI 508E. The call request message requests a first call, to thedestination Client Call Controller 506B, but indicates that a requestfor a second call, to the destination Client Call Controller 506B, willbe requested. The second call is requested to have a path diverse fromthe path of the first call. The first call request message may includethe identity of the possible destination UNIs 508V, 508X as well as theidentity of the other source UNI 508G for the second call.

As will be apparent to a person skilled in the art, the source ClientCall Controller 506A may not be aware of the identities of the possibledestination UNIs 508V, 508X, but should have a capability to learn theseidentities through a query to a network entity (not shown) thatmaintains a mapping of Client Call Controllers 506 to identities of UNIs508. The Domain Name Service of the present-day Internet serves such apurpose.

The source Network Call Controller 504E determines that the possibledestination UNIs 508V, 508X are in the destination connection-orientednetwork 502Z and selects one of the egress gateway Network CallControllers 504R, 504S that connect the source connection orientednetwork 502Y to the destination connection-oriented network 502Z.

Where it is considered that the source Network Call Controller 504E hasselected the egress gateway Network Call Controller 504R to reach thedestination connection-oriented network 502Z, the source Network CallController 504E calculates a path to the egress gateway Network CallController 504R and establishes a call over the calculated path. Aconnection may be established along with the first call. The sourceNetwork Call Controller 504E may also select the other egress gatewayNetwork Call Controller 504S for use by the second requested call. Wherethe source Network Call Controller 504E has selected the other egressgateway Network Call Controller 504S for use by the second requestedcall, the source Network Call Controller 504E may also calculate a pathfor the second requested call.

A call request message, for the first call, may then be sent to theegress gateway Network Call Controller 504R. Where the egress gatewayNetwork Call Controller 504R selects the ingress gateway Network CallController 504T, the call request message is forwarded over the E-NNI510T to the selected ingress gateway Network Call Controller 504T.Included in the call request message sent to the selected ingressgateway Network Call Controller 504T is an non-encrypted indication ofthe other egress gateway Network Call Controller 504S for use by thesecond requested call. Furthermore, in an encrypted form, the callrequest message may include information about the intermediate pathsegment end points in the source connection oriented network 502Y usedin the path for the first call. Additionally, the call request messagemay include encrypted information about the intermediate path segmentend points in the source connection oriented network 502Y in thecalculated path for the second call.

The selected ingress gateway Network Call Controller 504T, uponreceiving the call request message, may note that, in future, a secondcall request message will be arriving, at the destinationconnection-oriented network 502Z, from the other egress gateway NetworkCall Controller 504S. Responsive to noting the second call requestmessage, the selected ingress gateway Network Call Controller 504T mayselect an other ingress gateway Network Call Controller 504U for thesecond call. The selection of the other ingress gateway Network CallController 504U for the second call may then be recorded in the callrequest message. The selected ingress gateway Network Call Controller504T then selects one of the destination Network Call Controllers 504V,504X, say the destination Network Call Controller 504V, and calculates apath to the selected destination Network Call Controller 504V. Theselected ingress gateway Network Call Controller 504T may also calculatea path for the second call from the other ingress gateway Network CallController 504U to the other destination Network Call Controller 504X.

A connection may be established along with the call. The call requestmessage may then be passed from the selected destination Network CallController 504V to the destination Client Call Controller 506B over theUNI 508V that connects the Call Controllers.

Where the destination Client Call Controller 506B accepts the call, thecall accept message directed to the source Client Call Controller 506Amay include information identifying the other egress gateway NetworkCall Controller 504S for the second call, which does not need to beencrypted. The call accept message may also include the encryptedinformation about the path from the source Network Call Controller 504Eto the egress gateway Network Call Controller 504R and the encryptedinformation about the path from the other source Network Call Controller504G to the other egress gateway Network Call Controller 504S, if such apath was calculated. Additionally, the call accept message may includethe identity of the other ingress gateway Network Call Controller 504Ufor the second call, which does not need to be encrypted. The callaccept message may include an indication of the identity of the otherdestination Network Call Controller 504X, for the second call.Furthermore, the call accept message may include encrypted informationidentifying intermediate path segment end points in the path, for thefirst call, from the ingress gateway Network Call Controller 504U to thedestination Network Call Controller 504X and intermediate path segmentend points in the path, for the second call, from the other ingressgateway Network Call Controller 504U to the other destination NetworkCall Controller 504X, if the latter path was calculated.

The source Client Call Controller 506A receives the call accept messageover the initially selected UNI 508E and initiates the second call bysending a call request message over the other source UNI 508G. When theother source Network Call Controller 504G receives the call requestmessage, the information included in the call request message mayindicate to the other source Network Call Controller 504G that the otheregress gateway Network Call Controller 504S should be used to reach thedestination connection-oriented network 502Z. The information includedin the call request message may also indicate, preferably in encryptedform, a diverse path for a call between the other source Network CallController 504G and the other egress gateway Network Call Controller504S. The other source Network Call Controller 504G may then establishthe second call over a path to the other egress gateway Network CallController 504S, whether that path was supplied in the call requestmessage or calculated independently, with awareness of the decryptedinformation relating to the path for the first call.

When the call request message is received by the other egress gatewayNetwork Call Controller 504S, indications included within the callrequest message allow the call request message to be forwarded over theE-NNI 510U to the other ingress gateway Network Call Controller 504U.

When the other ingress gateway Network Call Controller 504U receives thecall request message, information included within the call requestmessage may allow the other ingress gateway Network Call Controller 504Uto use the other destination Network Call Controller 504X as adestination for a path for the second call. The call request message mayalso include encrypted information providing a path from the otheringress gateway Network Call Controller 504U to the other destinationNetwork Call Controller 504X. The other ingress gateway Network CallController 504U may then establish a call to the other destinationNetwork Call Controller 504X and establish a connection over theestablished call.

At the other destination Network Call Controller 504X, the call requestmessage is forwarded to the destination Client Call Controller 506B overthe UNI 508X that connects the two Call Controllers.

Assuming the destination Client Call Controller 506B accepts the callrequest message, the two end-to-end diverse paths are composed by threediverse elements: 1) a path in the source connection-oriented network502Y; 2) an E-NNI 510 connecting the source connection-oriented network502Y to the destination connection-oriented network 502Z; and 3) a pathin the destination connection-oriented network 502Z.

In the Multi-Network Diverse Path application, the proposed methodincludes identifiers of networks, instead of identifiers of UNIs, in thecall processing signaling messages. With reference to FIG. 6, a possiblesequence of events begins when the source Client Call Controller 606Asends a call request message to a source Network Call Controller 604using one of the available UNIs 608, say UNI 608E.

The call request message requests a first call, to the destinationClient Call Controller 606B, but indicates that a request for a secondcall, to the same destination Client Call Controller 606B, will berequested. The second call is requested to have a path diverse from thepath of the first call. The first call request message includes theidentity of the possible destination UNIs 608V, 608L as well as theidentity of the second source connection-oriented network 602Y2 to beused by the second call.

The first source Network Call Controller 604E in the first sourceconnection-oriented network 602Y1, given that the second call is to beestablished in a different network, selects the egress gateway NetworkCall Controller 604R and calculates a path for the first call withoutconsideration of a need for a diverse path for a second call. Aconnection between first source Network Call Controller 604E and theegress gateway Network Call Controller 604R may be established alongwith the call.

When the egress gateway Network Call Controller 604R receives the callrequest message, the egress gateway Network Call Controller 604R selectsan ingress gateway Network Call Controller in the intermediateconnection-oriented network 602P. In particular, the ingress gatewayNetwork Call Controller 604PR is selected while taking intoconsideration that an ingress gateway Network Call Controller in theintermediate connection-oriented network 602P may be selected, for thesecond call, by an egress gateway Network Call Controller in the secondsource connection-oriented network 602Y2.

When the ingress gateway Network Call Controller 604PR receives a callrequest, the ingress gateway Network Call Controller 604PR may, inconsideration of the second call, select the ingress gateway NetworkCall Controller 604PK for the second call. The identity of the ingressgateway Network Call Controller 604PK for the second call may then beincluded in the call request message as the message is furtherpropagated.

Where the ingress gateway Network Call Controller 604PR has an awarenessthat the egress gateway Network Call Controller 604PT can be used toconnect to the first destination connection-oriented network 602Z1 overthe E-NNI 610T and can be used to connect to the second destinationconnection-oriented network 602Z2 over the E-NNI 610M2, the ingressgateway Network Call Controller 604PR may also have awareness that theegress gateway Network Call Controller 604PM can be used to connect tothe second destination connection-oriented network 602Z2 over the E-NNI610M1. Given this awareness, the ingress gateway Network Call Controller604PR may select the egress gateway Network Call Controller 604PT forthe first call and the egress gateway Network Call Controller 604PM forthe second call. The identity of the E-NNI 610M1 for use by the secondcall may be recorded in the call request message.

The ingress gateway Network Call Controller 604PR may then proceed tocalculate a path to the selected egress gateway Network Call Controller604PT for the first call, establish a call over that path and establisha connection for that call. The ingress gateway Network Call Controller604PR may also calculate a path from the ingress gateway Network CallController 604PK to the egress gateway Network Call Controller 604PM forthe second call, where the path for the second call is diverse from thepath for the first call.

When the call request message is received by the selected egress gatewayNetwork Call Controller 604PT, the call request message may include theidentity of the ingress gateway Network Call Controller 604PK for thesecond call (without encryption), the identity of the egress gatewayNetwork Call Controller 604PM for the second call (without encryption)and information relating to the intermediate path segment end points,within the intermediate connection-oriented network 602P, used in thepath for the first call. The received call request message may alsoinclude information relating to the intermediate path segment end pointsfor use in the path calculated for the second call.

The egress gateway Network Call Controller 604PT then selects theingress gateway Network Call Controller 604T in the first destinationconnection-oriented network 602Z1 and passes the call request messageover the E-NNI 610T to the ingress gateway Network Call Controller 604T.Given that the second call will be making use of the second destinationconnection-oriented network 602Z2 (an indication of which being includedin the call request message), the ingress gateway Network CallController 604T may calculate a path to the first destination NetworkCall Controller 604V without consideration of the second call. Theingress gateway Network Call Controller 604T may then establish a callover the calculated path and establish a connection for that call. Thefirst destination Network Call Controller 604V may then pass the callrequest message to the destination Client Call Controller 606B over thecorresponding UNI 608V.

The destination Client Call Controller 606B, upon receiving the callrequest message may generate a call accept message and send the callaccept message back to the source Client Call Controller 606A.

The source Client Call Controller 606A, upon receiving the call acceptmessage, may initiate the second call by sending a call request messageto the second source Network Call Controller 604Q over the UNI 608Q.

As described hereinbefore, when the call request message is received bythe second source Network Call Controller 604Q, the call request messagemay include the identity of the ingress gateway Network Call Controller604PK for the second call (without encryption), the identity of theegress gateway Network Call Controller 604PM for the second call(without encryption). The received call request message may also includeinformation relating to the intermediate path segment end points for usein the path calculated for the second call.

The second source Network Call Controller 604Q, aware that the egressgateway Network Call Controller 604K connects to the ingress gatewayNetwork Call Controller 604PK, may calculate a path to the egressgateway Network Call Controller 604K, establish a call over thecalculated path and establish a connection for that call.

Upon receiving the call request message, the egress gateway Network CallController 604K may learn from the call request message that the ingressgateway Network Call Controller 604PK is to be the next recipient of thecall request message.

The ingress gateway Network Call Controller 604PK, upon reviewing thereceived call request message, may be made aware of the identity of theegress gateway Network Call Controller 604PM for the second call and,perhaps, even the intermediate path segment end points for use in thepath already calculated for the second call. The information relating tothese intermediate path segment end points is preferably encrypted insuch a way that the information may only be decrypted by a Network CallController in the intermediate connection-oriented network 602P. Theingress gateway Network Call Controller 604PK may then establish a callover the already calculated path or over a path calculated withawareness of the intermediate path segment end point used by the pathfor the first call. A connection may be established along with the call.

When the call request message is received by the egress gateway NetworkCall Controller 604PM, the egress gateway Network Call Controller 604PMmay learn from the call request message that the ingress gateway NetworkCall Controller 604M is to be the next recipient of the call requestmessage.

The ingress gateway Network Call Controller 604M, upon receipt of thecall request message, calculates a path to the second destinationNetwork Call Controller 604L and establishes a call and connection basedon the calculated path.

The call request message, once received by the second destinationNetwork Call Controller 604L, may then be passed on to the destinationClient Call Controller 606B. The destination Client Call Controller606B, upon receiving the call request message for the second call, maygenerate a call accept message and send the call accept message back tothe source Client Call Controller 606A.

To incorporate aspects of the present invention into existing networkpractices, some changes may be required. For instance, an indicationthat a second call (on a diverse path) is to be established may beconsidered when performing path computation for a first path. As well,existing network practices do not typically include a provision for aquery message from a Client Call Controller to a Network Call Controllerand a query response message back to the Client Call Controller from theNetwork Call Controller. Recall that the response message containsencrypted network information. Additionally, the protocol used on anE-NNI should support the exchange of such information as an identifierof a gateway Network Call Controller and identifier of a network.

Aspects of the present invention require the encryption of call andconnection information in a call request message when the call requestmessage is sent over a UNI by a source Client Call Controller, when thecall request message is sent over a UNI to a destination Client CallController and when the call request message is sent from an egressgateway Network Call Controller to an ingress gateway Network CallController over an E-NNI. Encrypted call and connection information mayalso be included in a call accept message passed from a destinationClient Call Controller to a source Client Call Controller and in a callreject message passed from a source Network Call Controller to sourceClient Call Controller. Aspects of the present invention may alsorequire the indication, in a call request message, of UNIs, E-NNIs andnetworks to be used by a second call. Since the identifier of a UNI or aE-NNI is a public address, and the public knows the identifier ofnetwork, this information does not need to be encrypted. Aspects of thepresent invention may further require the use of a new error code incall reject messages. The new error code would be used to indicateinformation about the call and connection being rejected.

Call processing in networks adapted to employ aspects of the presentinvention may be required to have an ability to support connectionseparation when a call is across multiple networks. A gateway NetworkCall Controller is required for both the network egress and networkingress side of an E-NNI. Additionally, call processing in networksadapted to employ aspects of the present invention may be required tohave an ability to amend signaling messages to include encryptedinformation and, conversely, have an ability to strip decryptedinformation from signaling messages.

According to aspects of the present invention, each network is requiredto manage an encryption key and the encryption key for a given networkis required to be distributed to all of the Network Call Controllers inthe given network.

In a given network operating according to aspects of the presentinvention, a Network Call Controller may receive a call request messageincluding information, such as that relating to a path for a first call,that is encrypted with an encryption key particular to the givennetwork. However, if the Network Call Controller is, for some reason,unaware of the encryption key then the Network Call Controller mayproceed to calculate a path for the requested call without the benefitof the encrypted information. In such instance, there is no guarantee ofdiversity between the calculated path and the path whose description wasencrypted.

A Client Call Controller in a network practicing aspects of the presentinvention should be able to send a call request message responsive toreceiving a call accept message for another call. Additionally, a ClientCall Controller in a network practicing aspects of the present inventionshould be able to send a call request message responsive to receiving acall reject message related to another call.

It has been stated throughout the above that call processing messagesare sent over connections that have been established over calls (in-bandsignaling). As will be apparent to a person skilled in the art, thenetwork entities may communicate with one another, for instance, toexchange call processing messages, using a secondary network(out-of-band signaling). Such a secondary network is exemplified in thewell-known Common Channel Signaling (i.e., CCS 7) communication scheme.

In summary, information relating to paths for established calls or pathsfor yet to be established calls can be included in call establishmentsignaling, such that the information reaches those Network CallControllers that can use the information. Advantageously, those CallControllers that cannot use the information, i.e., those Network CallControllers in other networks and Client Call Controllers are barredfrom accessing the information by use of an encryption key that is onlyknown within the network to which the encrypted information relates.

It should be apparent to a person skilled in the art the use of diversepaths through the various networks described herein above may allow forprotection switching. That is, where a connection between Client CallControllers is setup using a first call and a path segment in the firstcall experiences a fault, the connection may be set up using apreviously established second call. Where the path of the second call isdiverse from the path of the first call, it is unlikely that the faultin the first call will affect the operability of the second call.

Any suitable form of encryption may be used. Since the encryption occursin the network entitled the information, conveniently, data may beencrypted with a secret key known only in the network. Which key mayalso be used in the network to later decrypt the data in this regard,for example, a DES encryption key may be used as the secret key.

Other modifications will be apparent to those skilled in the art and,therefore, the invention is defined in the claims.

1. A method of, at a client call controller interfaced to a connection-oriented network, requesting the establishment of a second call from a source to a destination on the connection-oriented network, where a path for said second call uses path segments distinct from path segments used in a previously determined path for a first call on the connection-oriented network, said method comprising the steps of: receiving a call processing message including encrypted network information at the client call controller from one of a plurality of network call controllers on the connection-oriented network; and sending a call request message to one of the plurality of network call controllers on the connection-oriented network requesting establishment of said second call, where said call request message includes said encrypted network information, wherein said first call represents an agreement to communicate over a first path through the connection-oriented network from the source to the destination, the first path being implemented on the connection-oriented network using a first series of links interconnecting the source and the destination, and wherein said second call represents an agreement to communicate over a second path through the connection-oriented network from the source to the destination different than the first path, the second path being implemented on the connection-oriented network using a second series of links interconnecting the source and the destination different than the first set of links.
 2. The method of claim 1, wherein said encrypted network information comprises an identity of an end point for one of said path segments to be used in said path for said second call on the connection-oriented network.
 3. The method of claim 1, wherein said encrypted network information comprises an identity of an end point for one of said path segments used in said previously determined path for said first call on the connection-oriented network.
 4. The method of claim 1, wherein said message additionally includes non-encrypted network information.
 5. The method of claim 4, wherein said destination is connected to a second network and said non-encrypted network information comprises an identity of an external network to network interface to said second network.
 6. In a connection-oriented network including a plurality of interconnected call controllers, a client call controller comprising: an input network interface adapted to receive a call processing message including encrypted network information about a call path of a first call on the connection-oriented network; a processor adapted to include said encrypted network information in a call request message, said call request message requesting establishment of a second call on the connection-oriented network; and an output network interface adapted to send said call request message to a network call controller on the connection-oriented network; wherein said first call represents an agreement to communicate over a first path through the connection-oriented network from a source to a destination, the first path being implemented on the connection-oriented network using a first series of links interconnecting the source and the destination, and wherein said second call represents an agreement to communicate over a second path through the connection-oriented network from the source to the destination different than the first path, the second path being implemented on the connection-oriented network using a second series of links interconnecting the source and the destination different than the first set of links.
 7. The client call controller of claim 6, wherein said processor is further adapted to include non-encrypted network information in said call request message.
 8. The client call controller of claim 7, wherein said non-encrypted network information comprises an identity of an external network to network interface.
 9. The client call controller of claim 7, wherein said non-encrypted network information comprises an identity of a network call controller on the connection-oriented network from which said call processing message was received.
 10. The client call controller of claim 6, wherein said network information comprises an identity of a network.
 11. The client call controller of claim 6, wherein said network information comprises an identity of an ingress call controller on the connection-oriented network.
 12. In a connection-oriented network including a plurality of interconnected call controllers, a client call controller comprising: means for receiving a call processing message, where said call processing message includes encrypted network information relevant to a first call on the connection-oriented network; means for including said encrypted network information relevant to the first call on the connection-oriented network in a call request message, said call request message requesting establishment of a second call on the connection-oriented network; and means for sending said call request message to a network call controller on the connection-oriented network; wherein said first call represents an agreement to communicate over a first path through the connection-oriented network from a source to a destination, the first path being implemented on the connection-oriented network using a first series of links interconnecting the source and the destination, and wherein said second call represents an agreement to communicate over a second path through the connection-oriented network from the source to the destination different than the first path, the second path being implemented on the connection-oriented network using a second series of links interconnecting the source and the destination different than the first set of links.
 13. A computer readable medium containing computer-executable instructions which, when performed by processor in a call controller in a connection-oriented network including a plurality of interconnected call controllers, cause the processor to perform the method of claim
 1. 14. A method of call processing at a network call controller in a connection-oriented network including a plurality of interconnected network call controllers, the method comprising the steps of: receiving a call request message requesting establishment of a second call to a destination over the connection-oriented network; decrypting call path information included in said call request message relating to a first call to the destination; and further processing said given call based on said decrypted call path information; wherein said first call represents an agreement to communicate over a first path through the connection-oriented network from a source to the destination, the first path being implemented on the connection-oriented network using a first series of links interconnecting the source and the destination, and wherein said second call represents an agreement to communicate over a second path through the connection-oriented network from the source to the destination different than the first path, the second path being implemented on the connection-oriented network using a second series of links interconnecting the source and the destination different than the first set of links.
 15. The method of claim 14 wherein said further processing comprises determining a path for said second call over the connection-oriented network.
 16. In a connection-oriented network including a plurality of interconnected network call controllers, a network call controller comprising: an input network interface adapted to receive a call request message requesting establishment of a second call to a destination over the connection-oriented network; a processor adapted to: decrypt call path information relating to a first call on the connection-oriented network included in said call request message; and further process said second call based on said decrypted call path information; wherein said first call represents an agreement to communicate over a first path through the connection-oriented network from the source to the destination, the first path being implemented on the connection-oriented network using a first series of links interconnecting the source and the destination, and wherein said second call represents an agreement to communicate over a second path through the connection-oriented network from the source to the destination different than the first path, the second path being implemented on the connection-oriented network using a second series of links interconnecting the source and the destination different than the first set of links.
 17. A computer readable medium containing computer-executable instructions which, when performed by processor in a network call controller in a connection-oriented network including a plurality of interconnected network call controllers, cause the processor to perform the method of claim
 14. 18. A method of using information about a first call on a connection-oriented network when requesting a second call on the connection-oriented network, the connection-oriented network including a plurality of interconnected network call controllers, the method comprising the steps of: sending a query to one of the network call controllers on the connection-oriented network, said query requesting information about said first call on the connection-oriented network; receiving said information in encrypted form; and sending a call request message for said second call to one of the network call controllers on the connection-oriented network, where said call request message includes said encrypted information; wherein said first call represents an agreement to communicate over a first path through the connection-oriented network from a source to a destination, the first path being implemented on the connection-oriented network using a first series of links interconnecting the source and the destination, and wherein said second call represents an agreement to communicate over a second path through the connection-oriented network from the source to the destination different than the first path, the second path being implemented on the connection-oriented network using a second series of links interconnecting the source and the destination different than the first set of links.
 19. A client call controller connected to a connection-oriented network including a plurality of interconnected network call controllers, said client call controller comprising: an input network interface adapted to: send a query to one of the network call controllers on the connection-oriented network, said query requesting information about a first call; receive said information in encrypted form; and send a call request message for a second call to one of the network call controllers on the connection-oriented network; a processor adapted to include said encrypted information in said call request message; wherein said first call represents an agreement to communicate over a first path through the connection-oriented network from a source to a destination, the first path being implemented on the connection-oriented network using a first series of links interconnecting the source and the destination, and wherein said second call represents an agreement to communicate over a second path through the connection-oriented network from the source to the destination different than the first path, the second path being implemented on the connection-oriented network using a second series of links interconnecting the source and the destination different than the first set of links.
 20. A computer readable medium containing computer-executable instructions which, when performed by processor in a client call controller connected to a connection-oriented network including a plurality of interconnected network call controllers, cause the processor to perform the method of claim
 18. 21. The method of claim 1, wherein the connection-oriented network is an Automatically Switched Optical Network (ASON).
 22. The method of claim 1, wherein the client call controller is dual-homed to the connection-oriented network.
 23. The method of claim 1, wherein the connection-oriented network includes multiple interconnected connection-oriented networks, and wherein at least two of the interconnected connection-oriented networks are able to decrypt different portions of the encrypted network information.
 24. The method of claim 1, wherein the connection-oriented network includes a first connection-oriented network portion and a second connection-oriented network portion interconnected with the first connection-oriented network portion, wherein the encrypted network information contains a first encrypted portion able to be decrypted by the first connection-oriented network portion and not the second connection-oriented network portion, and contains a second encrypted portion able to be decrypted by the second connection-oriented network portion and not the first connection-oriented network portion.
 25. A method of establishing a second call related to a first call, the method comprising the steps of: receiving a first message including encrypted information related to the first call from a first entity on a connection-oriented network; and transmitting a second message to request establishment of the second call onto the connection-oriented network, the second message containing at least a part of the encrypted information related to the first call; wherein said first call represents an agreement to communicate over a first path through the connection-oriented network from the source to the destination, the first path being implemented on the connection-oriented network using a first series of links interconnecting the source and the destination, and wherein said second call represents an agreement to communicate over a second path through the connection-oriented network from the source to the destination different than the first path, the second path being implemented on the connection-oriented network using a second series of links interconnecting the source and the destination different than the first set of links.
 26. The method of claim 25, wherein the first entity is a first call control entity.
 27. The method of claim 25, wherein the connection-oriented network comprises multiple interconnected connection-oriented network portions, and wherein the step of receiving occurs from a first entity in a first connection-oriented network portion, and wherein the step of transmitting occurs to a second entity in a second connection-oriented network portion.
 28. The method of claim 25, wherein the method is performed by a client entity, and wherein the encrypted information is not able to be decrypted by the client entity. 