Browse Prior Art Database

Routing Incoming Calls to X25 Applications

IP.com Disclosure Number: IPCOM000036299D
Original Publication Date: 1989-Sep-01
Included in the Prior Art Database: 2005-Jan-28
Document File: 2 page(s) / 13K

Publishing Venue

IBM

Related People

Geise, DM: AUTHOR [+4]

Abstract

This disclosure allows unsolicited incoming X.25 virtual calls to be automatically routed to the correct application program in an X.25 DTE Computer System (which may have multiple application programs executing concurrently), without requiring user programming or application program knowledge of the routing mechanism. This computer system may have physical links connected to the DCEs of one or more X.25 networks.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 55% of the total text.

Page 1 of 2

Routing Incoming Calls to X25 Applications

This disclosure allows unsolicited incoming X.25 virtual calls to be automatically routed to the correct application program in an X.25 DTE Computer System (which may have multiple application programs executing concurrently), without requiring user programming or application program knowledge of the routing mechanism. This computer system may have physical links connected to the DCEs of one or more X.25 networks.

Two new computer system components have been defined: a "Router" and a "Routing Table".

The Router examines each incoming call packet and extracts the values of the following fields: + Called address field;

+ Calling address field;

+ Called address extension facility field;

+ Calling address extension facility field;

+ Call user data (protocol id).

The values of these fields, together with an identifier representing the particular DTE to DCE link from which the call was received, constitute the routing data. The Router compares this routing data with the information stored in the Routing Table to determine which application should receive the call.

The Routing Table is interactively created by the user as part of the configuration of the computer system. Each entry in this table contains the following fields: + Called address field;

+ Calling address field;

+ Called address extension facility field;

+ Calling address extension facility field;

+ Call user data (protocol id);

+ Link identifier;

+ Extension Name.

The "Extension Name" represents the entity to which the call is routed if the other fields in the table entry match the routing data. Each application program may "listen" to one or more Extension Names, thereby selecting the incoming calls it will receive. This approach frees the application program from needing to know any details of how calls are routed.

The Router keeps track o...