Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND APPARATUS FOR MIGRATING BETWEEN TERMINALS
Document Type and Number:
WIPO Patent Application WO/2007/140106
Kind Code:
A2
Abstract:
An apparatus and method are disclosed for migrating between terminals. An apparatus that incorporates teachings of the present disclosure may include, for example, a network proxy (102) having a controller (108) that manages a communications interface (104) in a communication system. The controller (108) can be programmed to receive a request to migrate a first terminal to a third terminal while active communications are taking place on a first voice channel connecting the first terminal to a second terminal, establish a second voice channel with the third terminal, connect the first and second voice channels, and terminate without action of an end user of the first terminal a connection between the first terminal and the first voice channel. Additional embodiments are disclosed.

Inventors:
SCHNEIDER MARCO (US)
ZHANG YI (US)
Application Number:
PCT/US2007/068843
Publication Date:
December 06, 2007
Filing Date:
May 14, 2007
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
AT & T KNOWLEDGE VENTURES LP (US)
SCHNEIDER MARCO (US)
ZHANG YI (US)
International Classes:
H04L29/06; H04M7/00; H04W4/16
Other References:
None
Attorney, Agent or Firm:
GUNTIN, Ed (P.O. Box 3188West Palm Beach, FL, US)
Download PDF:
Claims:
CLAIMS

What is claimed is:

1. A network proxy, comprising a controller that manages a communications interface in a communication system, wherein the controller is programmed to: receive a request to migrate a first terminal to a third terminal while active communications are taking place on a first voice channel connecting the first terminal to a second terminal; establish a second voice channel with the third terminal; connect the first and second voice channels; and terminate without action of an end user of the first terminal a connection between the first terminal and the first voice channel.

2. The network proxy of claim 1, wherein the controller is programmed to receive the request from the first terminal by way of the first voice channel.

3. The network proxy of claim 1, wherein the controller is programmed to receive the request from the third terminal.

4. The network proxy of claim 1, wherein the controller is programmed to receive the request from an over-the-air message transmitted by one among the first and third terminals.

5. The network proxy of claim 1, wherein the request comprises an Internet message generated by an Internet server directed by an end user of one among the first and third terminals.

6. The network proxy of claim 1, wherein the request comprises one or more Dual Tone Multi Frequency (DTMF) signals generated by one among the first and third terminals over the first voice channel.

7. The network proxy of claim 1, wherein the request comprises at least one among a voice message and one or more DTMF signals processed by an interactive voice response system (IVR) managed by the controller.

8. The network proxy of claim 1, wherein the network proxy comprises an Internet protocol Multimedia Subsystem (IMS).

9. The network proxy of claim 1, wherein the controller is programmed to transmit a completion signal to the third terminal indicating that the third terminal can engage in communications with the second terminal.

10. The network proxy of claim 1, wherein the controller is programmed to: receive a conferencing request to connect a fourth terminal to the first voice channel; establish a third voice channel with the fourth terminal; and connect the first and third voice channels.

11. The network proxy of claim 10, wherein the controller is programmed to receive the conferencing request from one among the second, third and fourth terminals.

12. The network proxy of claim 1, wherein the request conforms to one among a group of protocols comprising signaling system 7 (SS7), session initiation protocol (SIP), and H.323.

13. A computer-readable storage medium in a network proxy, comprising computer instructions for migrating a first terminal, engaged in active communications over a first voice channel with a second terminal, to a third terminal by connecting the third terminal to the first voice channel and terminating a connection between the first terminal and the first voice channel.

14. The storage medium of claim 13, comprising computer instructions for receiving a request to migrate the first terminal to the third terminal.

15. The storage medium of claim 14, comprising computer instructions for receiving the request from the first terminal by way of the first voice channel.

16. The storage medium of claim 14, comprising computer instructions for receiving the request from the third terminal.

17. The storage medium of claim 14, comprising computer instructions for receiving the request from a group of sources comprising an over-the-air message transmitted by one among the first and third terminals, an Internet message generated by an Internet server as directed by an end user of one among the first and third terminals, and one or more Dual Tone Multi Frequency (DTMF) signals generated by one among the first and third terminals over the first voice channel.

18. The storage medium of claim 13, comprising computer instructions for: receiving a conferencing request to connect a fourth terminal to the first voice channel; transmitting to one among the second and third terminals a signal corresponding to the conferencing request for connecting the fourth terminal to the first voice channel; and connecting the fourth terminal to the first voice channel upon receiving a conference acceptance signal from one among the second and third terminals.

19. The storage medium of claim 18, comprising computer instructions for receiving the conferencing request from one among the second and third terminals by way of the first voice channel.

20. The storage medium of claim 13, comprising computer instructions for: transmitting a network originating call to the third terminal; connecting the third terminal to the first voice channel upon detecting an acceptance of the network originating call by the third terminal.

21. A computer-readable storage medium in a first terminal, comprising computer instructions for transmitting to a network proxy a request to migrate the first terminal, engaged in active communications over a first communications channel with a second terminal, to a third terminal by connecting the third terminal to the first communications channel and terminating a connection between the first terminal and the first communications channel upon completing the connection to the third terminal.

22. The storage medium of claim 21, wherein the first terminal comprises one among a plain old telephone service (POTS) communication device, a voice over Internet protocol (VoIP) communication device, a wireless communication device.

23. The storage medium of claim 21, comprising computer instructions for transmitting the request to the network proxy in response to detecting a presence of the third terminal.

24. The storage medium of claim 23, wherein the first terminal comprises a wireless receiver and the third terminal comprises a wireless transmitter to signal the first terminal of its presence.

25. The storage medium of claim 23, wherein the first and second terminals each comprise a radio frequency identification (RFID) device for detecting each other's presence.

26. The storage medium of claim 21, comprising computer instructions for: detecting a presence of the third terminal; submitting a notice to an end user of the first terminal in response to detecting the presence of the third terminal; receiving an acceptance signal from the end user indicating a desire to migrate to the third terminal; and transmitting to the network proxy the request to migrate to the third terminal in response to detecting said acceptance signal.

27. The storage medium of claim 21, comprising computer instructions for: presenting to an end user of the first terminal a notice received from the network proxy indicating that migration is ready to be executed; receiving a migration acceptance message from the end user; and transmitting the migration acceptance message to the network proxy directing the network proxy to complete the migration from the first to the third terminal.

Description:

METHOD AND APPARATUS FOR MIGRATING BETWEEN TERMINALS

Inventors

Marco Schneider

Yi Zhang

FIELD OF THE DISCLOSURE

[0001] The present disclosure relates generally to communication techniques, and more specifically to a method and apparatus for migrating between terminals.

BACKGROUND

[0002] Many consumers today have the choice of wired and wireless communication services. While in transit wireless communication services tends to be the preferred choice. While for those situated in a residence or commercial enterprise, wired communication services can be less expensive and generally offers better voice quality and/or data transmission throughput.

[0003] Transitioning between services during an active communication session can be awkward. For instance, in order for an end user to transition from a landline phone to a cell phone, the user needs to hang up the landline phone and originate a call on his cell phone with the same party. The same is true of the end user entering his residence while communicating on his cell phone and desiring to migrate to a landline phone.

[0004] A need therefore arises for a method and apparatus to migrate between terminals.

BRIEF DESCRIPTION OF THE DRAWINGS

[0005] FIG. 1 depicts an exemplary embodiment of terminal devices communicating by way of wired and wireless access points (WAPs) with other terminal devices and/or a network proxy which collectively operate in a communication system; [0006] FIG. 2 depicts exemplary embodiments of the terminal device;

[0007] FIG. 3 depicts an exemplary method operating in portions of the communication system; and

[0008] FIG. 4 depicts an exemplary diagrammatic representation of a machine in the form of a computer system within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies disclosed herein.

DETAILED DESCRIPTION OF THE DRAWINGS

[0009] Embodiments in accordance with the present disclosure provide a method and apparatus for migrating between terminals.

[00010] In a first embodiment of the present disclosure, a network proxy can have a controller that manages a communications interface in a communication system. The controller can be programmed to receive a request to migrate a first terminal to a third terminal while active communications are taking place on a first voice channel connecting the first terminal to a second terminal, establish a second voice channel with the third terminal, connect the first and second voice channels, and terminate without action of an end user of the first terminal a connection between the first terminal and the first voice channel.

[00011] In a second embodiment of the present disclosure, a computer-readable storage medium in a network proxy can have computer instructions for migrating a first terminal, engaged in active communications over a first voice channel with a second terminal, to a third terminal by connecting the third terminal to the first voice channel and automatically terminating a connection between the first terminal and the first voice channel.

[00012] In a third embodiment of the present disclosure, a computer-readable storage medium in a first terminal can have computer instructions for transmitting to a network proxy a request to migrate the first terminal, engaged in active communications over a first voice channel with a second terminal, to a third terminal by connecting the third terminal to the first voice channel and automatically terminating a connection between the first terminal and the first voice channel upon completing the connection with the third terminal.

[00013] FIG. 1 depicts an exemplary embodiment of terminal devices 116 communicating by way of wired and wireless access points (WAPs) with other terminal devices and/or a network proxy 102 which collectively operate in a communication system 100. The communication system 100 comprises an IP (Internet Protocol) network 101 coupled to the network proxy 102, a cellular network 103 and network elements located in a building 105 representing an enterprise or residence. The IP network 101 utilizes technology for transporting Internet traffic. For an enterprise setting, the building 105 can include a PBX 114 that provides voice and/or video connectivity services between terminal devices 116 of enterprise personnel such as a POTS (Plain Old Telephone Service) phone terminal, a Voice over IP (VoIP) phone terminal, or video phone terminal.

[00014] Similarly, in a residential setting, the building 105 can include POTS, VoIP or video terminal phone terminals coupled to a central office 113 utilizing conventional telephonic switches for processing calls with third parties. The network proxy 102 can be used to control operations of a media gateway 109, the central office 113 and the PBX 114. Communications between the network proxy 102, terminal devices 116 and other network elements of the communication system 100 can conform to any number of signaling protocols such as signaling system 7 (SS7), session initiation protocol (SIP), or H.323.

[00015] The network proxy 102 can comprise a communications interface 104 that utilizes common technology for communicating over an IP interface with the IP network 101, the media gateway 109, or the cellular network 103. By way of the communications interface 104, the network proxy 102 can direct by common means any of the foregoing network elements to establish circuit switched and/or packet switched connections between terminals 116 distributed throughout the communication system 100. The network proxy 102 further comprises a memory 106 (such as a high capacity storage medium) embodied in this illustration as a database, and a controller 108 that makes use of computing technology such as a desktop computer, or scalable server for controlling operations of the network proxy 102. The network proxy 102 can operate as an IP Multimedia Subsystem (IMS) conforming in

part to protocols defined by standards bodies such as 3GPP (Third Generation Partnership Protocol).

[00016] Under the control of the network proxy 102, the media gateway 109 can link packet- switched and circuit-switched technologies such as the cellular network 103 (or central office 113) and the IP network 101, respectively. The media gateway 109 can conform to a proprietary media gateway control protocol (MGCP) or an open standard such as H.248 defined in the Internet Engineering Task Force (IETF). This protocol can handle signaling and session management needed during a multimedia conference. The protocol defines a means of communication between the media gateway 109, which converts data from the format required for a circuit- switched network to that required for a packet- switched network. MGCP can therefore be used to set up, maintain, and terminate calls between multiple disparate network elements of the communication system 100. The media gateway 109 to support hybrid communication environments such as VoIP to POTS and vice-versa. [00017] The cellular network 103 can support voice and data services such as GSM-GPRS, EDGE, CDMA-IX, UMTS, and other known technologies. The cellular network 103 is coupled to base stations 107 under a frequency-reuse environment for communicating over-the-air with roaming terminal devices 116. [00018] FIG. 2 depicts exemplary embodiments of the terminal device 116. In one embodiment, the terminal device 116 can be embodied in an immobile device (e.g., a wireline phone such as a POTS, VoIP or video terminal). In another embodiment, the terminal device 116 can include short range communications technology (e.g., a cordless phone, Bluetooth or WiFi) to support mobility within a small area such as the end user's residence. Alternatively, the terminal device 116 can represent a mobile terminal device utilizing a wireless transceiver 202 that supports long-range wireless communications such as supported by the cellular network 103. The wireless transceiver 202 of terminal device 116 utilizes technology for exchanging voice and data messages with the base stations 107, which in turn relays said messages to targeted end user terminals 116. In a multimode embodiment, the terminal device 116 can utilize a transceiver 202 that supports the aforementioned wireless and wireline access technologies (e.g., POTS, WiFi, Bluetoothâ„¢, cordless, and cellular).

[00019] Each of these embodiments of the terminal device 116 can further utilize a memory 204, an audio system 206, a radio frequency identification (RFID) device 207, and a controller 208. The memory 204 can comprise storage devices such as RAM, SRAM, DRAM, and/or Flash memories. The memory 204 can be an integral part of the controller 208. The audio system 206 can comprise a low volume speaker for listening to messages near the end user's ear and an associated microphone for exchanging messages with calling parties. The audio system 206 can further utilize a loud speaker for listening to announcements at a distance substantially away from the end user's ear, and as a speakerphone feature. The RFID device 207 can represent a passive or active RFID for short-range communications that serve the purpose of identifying the presence of another terminal having a similar device and conveying to said terminal its presence and identification.

[00020] The controller 208 can manage the foregoing components with computing technology such as a microprocessor and/or digital signal processor. The terminal devices 116 can further include a display 210 for conveying images to the end user, a keypad 212 for manipulating operations of the communication device, and a portable power supply 213. The audio system 206, display 210, and the keypad 212 can singly or in combination represent a user interface (UI) for interfacing with the end user. [00021] FIG. 3 depicts an exemplary method 300 operating in portions of the communication system 100. Method 300 begins with step 302 in which an end user submits a request to the network proxy 102 to migrate from a first terminal (e.g., a cell phone) to a third terminal (e.g., a landline phone) while active communications (e.g., a VoIP or circuit switch voice call) is taking place between the first terminal and second terminal. The request can be submitted to the network proxy 102 any number of ways.

[00022] For example, the end user can browse a website associated with the network proxy 102 by way of the first or third terminal 116 or some other computing device. At this website, the end user can request a migration between the aforementioned first and third terminals by selecting options in a UI presented by said website. In response to selecting a migration request, an Internet server supporting the website generates an Internet message corresponding to the request and transmits said

message to the network proxy 102. Alternatively, the website can be integrally managed by the network proxy 102 in which case it can take direct action on the request without a message transmission step.

[00023] Alternatively, the end user can send the migration request to the network proxy 102 as an over-the-air message (e.g., a short message service (SMS) message) utilizing common functions of the first or third terminal 116. In yet another embodiment, the end user can depress one or more keys on the first or third terminal thereby submitting a sequence of Dual Tone Multi Frequency (DTMF) signals to the network proxy 102 which can represent the request (e.g., *8 to request a migration from cell phone to landline, or landline to cell phone depending on which terminal the network proxy 102 detects is submitting the request). The network proxy 102 can be programmed with any DTMF code to engage any number of desired migrations (cell phone to home, cell phone to office, cell phone to computer, home to cell phone, office to cell phone, computer to cell phone, and so on). In yet another embodiment, the end user of the first terminal 116 can interact with an interactive voice response system (IVR) managed or integrated into the network proxy 102 to specify by way of DTMF and/or voice signals a desired migration.

[00024] In yet another embodiment, the first and third terminals 116 can include a wireless transmitter in one terminal and a wireless receiver in the other (such as an RFID transmitter and RFID receiver) providing the terminal with the receiver a means to detect a presence of the other terminal. When such detection occurs, the receiving terminal 116 can automatically transmit the migration request to the network proxy 102 over a SS7, SIP or H.323 protocol. For example, in the case where the first terminal 116 is a cell phone, it can have a receiver to detect a signal transmitted by the third terminal (a landline).

[00025] In another embodiment, each of the first and third terminals 116 can include the RFID devices 207 mentioned earlier for mutual detection and identification. The first and third terminals 116 can decide amongst themselves which should send the migration request, or one of said terminals can be programmed to be the one that always submits said request. In yet another embodiment, the first or second terminal 116 can provide its end user a notice such as by way of a user

interface (UI) presented at the display 210 informing said user of its detection of the other terminal. The UI can further include a prompt suggesting a migration between terminals by way of selection buttons (e.g., "Accept" or "Reject"). [00026] It would be evident to an artisan with ordinary skill in the art from the aforementioned examples that there innumerable embodiments for submitting a request to the network proxy 102.

[00027] Upon receiving the request from step 302, the network proxy 102 can be programmed in step 304 to direct one or more network elements (e.g., the media gateway 109, the central office 113, the PBX 114, the IP network 101, and/or the cellular network 103) of the communication system 100 to establish a voice channel with the third terminal. This step can represent the initiation of a network origination call to the third terminal 116 in which the end user hears a ringing alert at the third terminal prompting the end user to activate the terminal by removing it from its base or selecting a call acceptance button (e.g., a "Talk" button). Alternatively, if the request submitted to the network proxy 102 originated at the third terminal 116 by way of, for example, a DTMF signal (e.g. *8) initiated by the end user, the network proxy 102 can be programmed in step 304 to direct the communication system 100 to establish a voice channel with the third terminal without all the steps required in a network origination call.

[00028] In step 306, the network proxy 102 can be programmed to connect or bridge the voice channel of the third terminal 116 to the active voice channel connecting the first and second terminals 116. The network proxy 102 can be programmed in step 308 to contemporaneously terminate without action of the end user of the first terminal 116 a connection between the first terminal and the active voice channel resulting in a voice channel connection between the second and third terminals 116 only. At this point, the migration from the first terminal 116 to the third terminal without requiring either party to terminate the active voice channel and initiate a network origination call from the third terminal to the second terminal (or vice-versa) as is required by prior art systems today.

[00029] In an alternative embodiment, the network proxy 102 can be programmed in step 303 to send a notice to the end user requesting the migration at either the first

or third terminal 116 indicating the migration step is ready to be executed. The end user can then decide to reject, or accept the migration by submitting a migration acceptance message by way of DTMF signals or an IVR interaction in step 305. Once accepted, the network proxy 102 can proceed with steps 306-308 as previously described. In another embodiment, the network proxy 102 can be programmed in step 309 to transmit a completion signal to the third terminal 116 indicating to an end user of said terminal that s/he can engage in communications with the second terminal. The completion signal can be an audible signal such as a double beep conveyed by the audio system 206, a text signal presentable on the display 210, or some other form of notification technique suitable to the present disclosure. Without step 309, the end user of the third terminal 116 can assume this transition has occurred by attempting communications with the end user of the second terminal 116 and detecting a response.

[00030] In yet another embodiment, the network proxy 102 can be programmed in step 310 to receive a conferencing request from one of the end users of the second or third terminal 116, or from a third party requesting by way of a fourth terminal to be added to the active call between the second and third terminals. Alternatively, the third party's request can be directed in step 311 to one among the end users of the second or third terminal 116 by way of a call waiting function. The targeted end user can in turn reject or accept the call for conferencing purposes. If accepted, the terminal 116 of the targeted end user can be programmed in step 312 to submit the request to network proxy 102 to add the fourth terminal to the active call. [00031] Step 310 accordingly does not represent a request for migration, but rather a request to conference third parties. Upon receiving the conferencing request, the network proxy 102 in steps 313-314 directs the communication system 100 to establish a voice channel with the fourth terminal and connects said voice channel to the active channel between the second and third terminals. Like in step 304, step 313 can represent a network origination call to the fourth terminal or a voice channel connection to the fourth terminal if it is actively engaged by the end user of said terminal.

[00032] It would be apparent to an artisan with ordinary skill in the art that the aforementioned embodiments can be modified, reduced, or enhanced without departing from the scope and spirit of the claims described below. For example, method 300 can be modified to perform migration and third party conferencing functions described above for data communications without a voice function. The symbol (S) connecting to step 310 can denote an embodiment in which steps 310-312 can be performed by the network proxy 102 and terminal devices 116 independent of the migration steps 302-308, thereby providing a means for inclusion of third parties for conferencing purposes. These are but a few examples of modifications that can be applied to the present disclosure. The reader is therefore directed to the claims below for a fuller understanding of the breadth and scope of the present disclosure. [00033] FIG. 4 depicts an exemplary diagrammatic representation of a machine in the form of a computer system 400 within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies discussed above. In some embodiments, the machine operates as a standalone device. In some embodiments, the machine may be connected (e.g., using a network) to other machines. In a networked deployment, the machine may operate in the capacity of a server or a client user machine in server-client user network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. [00034] The machine may comprise a server computer, a client user computer, a personal computer (PC), a tablet PC, a laptop computer, a desktop computer, a control system, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. It will be understood that a device of the present disclosure includes broadly any electronic device that provides voice, video or data communication. Further, while a single machine is illustrated, the term "machine" shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein. [00035] The computer system 400 may include a processor 402 (e.g., a central processing unit (CPU), a graphics processing unit (GPU, or both), a main memory 404 and a static memory 406, which communicate with each other via a bus 408. The

computer system 400 may further include a video display unit 410 (e.g., a liquid crystal display (LCD), a flat panel, a solid state display, or a cathode ray tube (CRT)). The computer system 400 may include an input device 412 (e.g., a keyboard), a cursor control device 414 (e.g., a mouse), a disk drive unit 416, a signal generation device 418 (e.g., a speaker or remote control) and a network interface device 420. [00036] The disk drive unit 416 may include a machine-readable medium 422 on which is stored one or more sets of instructions (e.g., software 424) embodying any one or more of the methodologies or functions described herein, including those methods illustrated above. The instructions 424 may also reside, completely or at least partially, within the main memory 404, the static memory 406, and/or within the processor 402 during execution thereof by the computer system 400. The main memory 404 and the processor 402 also may constitute machine-readable media. [00037] Dedicated hardware implementations including, but not limited to, application specific integrated circuits, programmable logic arrays and other hardware devices can likewise be constructed to implement the methods described herein. Applications that may include the apparatus and systems of various embodiments broadly include a variety of electronic and computer systems. Some embodiments implement functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application- specific integrated circuit. Thus, the example system is applicable to software, firmware, and hardware implementations. [00038] In accordance with various embodiments of the present disclosure, the methods described herein are intended for operation as software programs running on a computer processor. Furthermore, software implementations can include, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.

[00039] The present disclosure contemplates a machine readable medium containing instructions 424, or that which receives and executes instructions 424 from a propagated signal so that a device connected to a network environment 426 can send or receive voice, video or data, and to communicate over the network 426 using the

instructions 424. The instructions 424 may further be transmitted or received over a network 426 via the network interface device 420.

[00040] While the machine-readable medium 422 is shown in an example embodiment to be a single medium, the term "machine-readable medium" should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term "machine-readable medium" shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure.

[00041] The term "machine-readable medium" shall accordingly be taken to include, but not be limited to: solid-state memories such as a memory card or other package that houses one or more read-only (non-volatile) memories, random access memories, or other re-writable (volatile) memories; magneto-optical or optical medium such as a disk or tape; and carrier wave signals such as a signal embodying computer instructions in a transmission medium; and/or a digital file attachment to e- mail or other self-contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium. Accordingly, the disclosure is considered to include any one or more of a machine-readable medium or a distribution medium, as listed herein and including art-recognized equivalents and successor media, in which the software implementations herein are stored. [00042] Although the present specification describes components and functions implemented in the embodiments with reference to particular standards and protocols, the disclosure is not limited to such standards and protocols. Each of the standards for Internet and other packet switched network transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) represent examples of the state of the art. Such standards are periodically superseded by faster or more efficient equivalents having essentially the same functions. Accordingly, replacement standards and protocols having the same functions are considered equivalents.

[00043] The illustrations of embodiments described herein are intended to provide a general understanding of the structure of various embodiments, and they are not

intended to serve as a complete description of all the elements and features of apparatus and systems that might make use of the structures described herein. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description. Other embodiments may be utilized and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. Figures are also merely representational and may not be drawn to scale. Certain proportions thereof may be exaggerated, while others may be minimized. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.

[00044] Such embodiments of the inventive subject matter may be referred to herein, individually and/or collectively, by the term "invention" merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed. Thus, although specific embodiments have been illustrated and described herein, it should be appreciated that any arrangement calculated to achieve the same purpose may be substituted for the specific embodiments shown. This disclosure is intended to cover any and all adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent to those of skill in the art upon reviewing the above description. [00045] The Abstract of the Disclosure is provided to comply with 47 C.F.R. §1.72(b), requiring an abstract that will allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.