Appeal 2007-1410 Application 09/811,038 4. Should sufficient network capacity be determined, a virtual connection is established from the ingress node to the egress node (Br. 3:5- 7). Kalmanek 5. Kalmanek relates to reserving and committing network resources based on an authorized quality of service (col. 1, ll. 23-25). 6. A service provider may verify the specified quality of service for a call. For example, a calling party transferring data may subscribe for a service with a quality of service having a large bandwidth and small latency; in such an example, a service provider can verify the service subscription for the particular quality of service associated with the call for that particular calling party (col. 9, ll. 25-34). 7. Gate controllers can authenticate signaling messages and authorize requests for service so that communication services and certain service features are only provided to authorized subscribers. Upon receiving a setup request message from a calling party, the gate controller can authenticate the identity of the calling party and authorize the service sought by the calling party (col. 6, ll. 56-62). 8. Kalmanek recognizes that network resource management may be necessary, because some network edge devices in the communications network may not have sufficient processing capacity to process a large number of reservation messages typical for high volume call traffic (col. 10, ll. 47-56). 9. Resource management may be performed on a per-call basis. When an originating telephony interface unit sends a reservation request to a 5Page: Previous 1 2 3 4 5 6 7 8 9 Next
Last modified: September 9, 2013