US20170142627A1 - Systems and methods for managing offload from one radio access network to another - Google Patents

Systems and methods for managing offload from one radio access network to another Download PDF

Info

Publication number
US20170142627A1
US20170142627A1 US15/406,010 US201715406010A US2017142627A1 US 20170142627 A1 US20170142627 A1 US 20170142627A1 US 201715406010 A US201715406010 A US 201715406010A US 2017142627 A1 US2017142627 A1 US 2017142627A1
Authority
US
United States
Prior art keywords
cellular
network
offload
sector
alternative
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/406,010
Inventor
Pertti Juhani Visuri
Randy Salo
Christian van Hamersveld
Johanna Katariina Visuri
Dan Zagursky
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bandwidthx Inc
Original Assignee
Bandwidthx Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bandwidthx Inc filed Critical Bandwidthx Inc
Priority to US15/406,010 priority Critical patent/US20170142627A1/en
Assigned to BANDWIDTHX INC. reassignment BANDWIDTHX INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VISURI, Pertti Juhani, VAN HAMERSVELD, CHRISTIAN, VISURI, Johanna Katariina, ZAGURSKY, Dan, SALO, RANDY
Publication of US20170142627A1 publication Critical patent/US20170142627A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/80Rating or billing plans; Tariff determination aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/16Performing reselection for specific purposes
    • H04W36/22Performing reselection for specific purposes for handling the traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1442Charging, metering or billing arrangements for data wireline or wireless communications at network operator level
    • H04L12/145Charging, metering or billing arrangements for data wireline or wireless communications at network operator level trading network capacity or selecting route based on tariff
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0896Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/49Connection to several service providers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/70Administration or customization aspects; Counter-checking correct charges
    • H04M15/785Reserving amount on the account
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/80Rating or billing plans; Tariff determination aspects
    • H04M15/8044Least cost routing
    • H04M15/805Bidding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • H04W36/144Reselecting a network or an air interface over a different radio air interface technology
    • H04W36/1446Reselecting a network or an air interface over a different radio air interface technology wherein at least one of the networks is unlicensed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/30Reselection being triggered by specific parameters by measured or perceived connection quality data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/32Reselection being triggered by specific parameters by location or mobility data, e.g. speed data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/32Reselection being triggered by specific parameters by location or mobility data, e.g. speed data
    • H04W36/322Reselection being triggered by specific parameters by location or mobility data, e.g. speed data by location data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/50Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP for cross-charging network operators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/15Setup of multiple wireless link connections
    • H04W76/16Involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals

Definitions

  • the subject matter discussed herein relates generally to wireless service to mobile devices and, more particularly, to managing the traffic on radio access networks that can be used to service mobile devices.
  • Mobile devices generally rely on wireless service provided by a service provider using cellular communications that utilize radio frequency communication.
  • Data communications to mobile devices can also be provided over other types of radio access networks.
  • Wi-Fi access points connected to broadband networks provide data to mobile devices.
  • the choice of whether data communication takes place over a cellular network or a Wi-Fi connection is normally left to the end user of the device. If the end user has entered all necessary passwords and access credentials to the mobile device memory and the Wi-Fi radio is on, in many cases the connection to Wi-Fi is preferred automatically by the mobile device.
  • the terms and conditions for utilizing access to alternative networks often depend on the expected or the actual load on the primary network managed by the service provider for the device. For example, if the primary network access takes place through the cellular network system owned by the service provider for the device, it is likely that the service provider first wants to utilize all of the capacity in its own network before seeking to use capacity from an alternative network. This is especially the case if there is a cost associated with using the alternative network access.
  • FIG. 1 is an illustration of a conventional layout of cellular sectors in an urban environment
  • FIG. 2 illustrates locations of Wi-Fi access points in the urban environment illustrated in FIG. 1 ;
  • FIG. 3 illustrates an example of how conventional cellular sectors and Wi-Fi access point locations are related to one another
  • FIG. 4 illustrates a density of access points in an urban environment based on a field test result
  • FIG. 5 is a closer view of a density of access points in an urban environment based on a field test result
  • FIG. 6 illustrates a schematic example of how mobile devices are distributed within a cellular sector according to various embodiments
  • FIG. 7 illustrates a typical variation of data usage during the hours of a day in a cellular sector during business days in a downtown business district according to various embodiments
  • FIG. 8 is an illustration of an example of a non-uniformity of data demand across several towers of a single mobile network operator in and around an urban area;
  • FIG. 9 is an illustration of the projected data traffic load during the hours of a day in the sector depicted in FIG. 7 six months later than the situation in FIG. 7 ;
  • FIG. 10 illustrates the anticipated hourly data traffic offload need profile of the mobile network operator in case of the projected load illustrated in FIG. 9 ;
  • FIG. 11 illustrates an example of the components of an exemplary system for managing data traffic offload to alternative network access points according to various embodiments
  • FIG. 12 illustrates an example of the process of determining to which access point a particular mobile device shall connect during the operation of data communication according to various embodiments
  • FIG. 13 illustrates an example of the operations in authentication and authorization for managing data traffic offload to an alternative network according to various embodiments
  • FIG. 14 is a functional flow diagram of an example process of managing the appropriate amount of data traffic offload from the primary to the alternative network according to various embodiments.
  • FIG. 15 is a functional flow diagram of an example process for managing data traffic offload in case the profile is defined in terms of data capacity need from alternative network access according to various embodiments.
  • Each of the radio systems may be used to connect to one or more wireless networks based on the system protocols.
  • Examples of such systems are a cellular radio system that may be utilizing a GSM, CDMA or LTE standard for encoding the signal and a Wi-Fi system that utilizes a well-known IEEE 802.11 standard for communication.
  • Another example may be a WiMAX system that is based on the IEEE standard 802.16.
  • each of the radios may have different characteristics.
  • the cellular system may be designed to connect to cell towers that are further apart and use a higher power signal than the Wi-Fi radio system uses. Since the Wi-Fi standard is utilizing unlicensed spectrum, the power of the transmitter may be limited by regulation and consequently the distance over which the communication can effectively take place may be shorter than the effective communication distance in the case of a cellular connection.
  • the different characteristic of the radio systems may result in a topology of coverage in the environment that is very different for each radio access network.
  • a single radio may be covering an area ranging from hundreds of meters across to a few kilometers, with typically one square kilometer or more of surface area for a cellular sector.
  • a Wi-Fi system that is based on using unlicensed radio bands and therefore limited in the power of the signal may cover only an area of 50 meters to 100 meters across.
  • a cellular radio access network is normally engineered for ubiquitous coverage. This means that cell sites are placed at distances where the coverage of each sector slightly overlaps with the coverage area of the adjacent sector.
  • FIG. 1 is an illustration of a conventional layout of cellular sectors in an urban environment. This is a simplification of the actual situation in many cellular access networks. Often, in addition to macro cell sites and their associated sectors, there may be small cells with shorter range. These shorter range cells may also have sectored radio systems. However, in the aggregate, cellular systems are engineered for ubiquitous coverage.
  • Wi-Fi access points are typically deployed to meet the needs of the subscriber to the broadband connection to which the access point is connected. There are also Wi-Fi access point deployments that are intended for third parties or the general public. These are often called hotspots. In either case, the Wi-Fi access points that may be available for offloading data traffic are located in various places throughout the environment and their coverage may or may not be ubiquitous. These access points may constitute the example alternative network access discussed in this document.
  • FIG. 2 illustrates locations of Wi-Fi access points in the urban environment illustrated in FIG. 1 .
  • FIG. 2 An example of the distribution of Wi-Fi access points (represented by the dark circles) in an urban environment is shown in FIG. 2 .
  • FIG. 3 illustrates an example of how conventional cellular sectors and Wi-Fi access point locations are related to one another.
  • FIG. 4 illustrates a density of access points in an urban environment based on a field test result.
  • FIG. 5 is a closer view of a density of access points in an urban environment based on a field test result.
  • the density of access points and Wi-Fi signals in the urban environment are represented by the spheres.
  • Wi-Fi access point signals are ubiquitous in many environments, they are also most of the time not being used. The nature of the need for accessing the Internet is typically quite intermittent. However, at the time of the access is required, it is desirable to have high data transfer speeds available. Because of the desired high data transfer speeds, most broadband connections are capable of speeds of several megabits per second. The typical average speeds are also growing rapidly as further investments into more sophisticated data transfer systems are made by the broadband service providers.
  • Mobile devices may be anywhere in the environment and are, true to their name, moving around in relation to the stationary radio access networks as their end-users move during the course of the day.
  • a typical cellular macro sector may serve several hundred mobile devices. Only a small portion of these mobile devices is active and an even smaller portion may be downloading or uploading data at any given instant.
  • FIG. 6 illustrates a schematic example of how mobile devices are distributed within a cellular sector. Some mobile devices are within range of selected Wi-Fi access points (represented as ovals with an access point graphically represented near their center); others are not within range of Wi-Fi access points.
  • FIG. 7 illustrates a typical variation of data usage in a cellular sector during the hours of a business day in a downtown business district.
  • the light gray area represents demand that is beyond the existing cellular network capacity. Because of the variation of usage during different hours of the day, the gradually increasing demand in each cellular sector or small cell initially exceeds capacity only during a relatively short period at the peak demand time. An example of such peak demand exceeding the cellular network capacity is shown in FIG. 7 .
  • FIG. 9 is an illustration of the projected data traffic load during the hours of a day in the sector depicted in FIG. 7 six months later than the situation in FIG. 7 .
  • Cellular network operators accumulate large amounts of information of usage patterns in their networks. This information is normally used to plan for network expansions in order to keep up with the growing demand. For example, by analyzing the collected information about use of cellular data in a particular sector represented by FIG. 7 and applying straightforward trend extrapolation and other forecasting methods, a cellular operator may conclude that within six months data usage in the same sector will look like a pattern shown in FIG. 9 . Again, the light gray area represents demand that is beyond the existing cellular network capacity.
  • FIG. 10 illustrates the anticipated hourly data traffic offload need profile of the mobile network operator in case of the projected load illustrated in FIG. 9 .
  • An example of a solution for managing data traffic offload to meet the objectives of the mobile network operator can determine which network access each of the mobile devices uses at various times. The parameters for this determination are quite complex and dynamic.
  • Certain access points for alternative network access may be located within a particular cellular sector or small cell; however, there may be overlap between cellular sectors. For example, a Wi-Fi access point in some cases may be within the footprint of several cell sectors. Adding small cells into the mix further complicates the task of determining to which cellular radio systems specific Wi-Fi access points may provide alternative network access.
  • the mobile operators have deployed network load management systems, which dynamically allocate mobile devices to various cellular radio connections to balance network traffic.
  • the solution for managing data traffic offload to alternative access may consist of, for example, but not limited to, three kinds of components:
  • a software module (for example, an application) operating on each of the mobile devices participating in the system;
  • a cloud-based server system including software that communicates with the application on their mobile devices;
  • FIG. 11 illustrates an example of the components of an exemplary system for managing data traffic offload to alternative network access points according to various embodiments.
  • FIG. 12 illustrates an example of the process of determining to which access point a particular mobile device shall connect during the operation of data communication according to various embodiments.
  • the application on the mobile device may turn the Wi-Fi radio off in order to conserve battery power. If the user of the mobile device activates the mobile device so that it comes out of the sleep mode, the application may turn on the Wi-Fi radio and scan for available Wi-Fi access points in its environment. For example, the application may immediately turn on the Wi-Fi radio and scan Wi-Fi access points when the mobile device comes out of the sleep mode. Even during sleep mode the application may turn on the Wi-Fi radio and scan for available access points at predetermined intervals.
  • the results of the scan are transmitted to the cloud-based server system.
  • Information about the identification of the cellular sector to which the mobile device is connected as well as the latitude and longitude of the mobile device at the time of the scan may be included in the scan information.
  • the server may utilize information in the scan about the observed access points, the signal strengths of the observed access points, the identification of the cell sector to which the mobile device is connected together with information provided by the mobile network operator and information about the owner of the access points that may provide alternative network access. Based on all this information, the server determines whether the mobile device should transfer its connection from the cellular network to one of the Wi-Fi access points that have a sufficiently strong signal as indicated by the scan results.
  • the server may send information to the mobile device that includes the identification of the access point to which the mobile device should associate (if any).
  • the server may send a rank ordered list of access points that would be possible providers of alternative network access in order to provide several alternatives for the mobile device.
  • Wi-Fi access points In most cases access to the Internet through Wi-Fi access points is controlled by some kind of security and access control system. Therefore the mobile device may need credentials and instructions about how to obtain access to the Internet. Terms and conditions for access set by the alternative network access provider may include payments that depend on the amount of data traffic. There may also be limits to how much data can be used in any session before re-authorization or termination of the session. Accordingly, there may also be a need to keep track of how much data traffic to the mobile device each access point provides.
  • FIG. 13 illustrates an example of the operations in authentication and authorization for managing data traffic offload to an alternative network according to various embodiments.
  • Every communication between the app on the mobile device and the cloud-based server system may be encrypted and authenticated.
  • the server system may further confirm the authorization status of the mobile device using standard protocols, for example, but not limited to, the RADIUS protocol.
  • a connection to the RADIUS server system of the mobile network operator serving the mobile device may be made at whatever frequency mobile network operator has specified.
  • the server system may send the required credentials and instructions on how to use the credentials to the application on the mobile device.
  • the credentials may be in an encrypted form and only the application on the mobile device may receive the credentials and be able to decrypt and use them.
  • the end user of the device may not have access to the credentials, and the operating system in the device may not retain any information about them after the connection is made.
  • the mobile device uses the credentials to make the connection to (i.e., associate with) the access point.
  • the quality of the signal of the access point for alternative network access is monitored by the mobile device using an appropriate parameter, for example, but not limited to, the relative signal strength (RSSI), the encoding method selected by the mobile device and the access point, etc., or any other indicator of the ability of the signal to provide a good quality broadband connection. If the quality indicator is below a set threshold or drops below a set threshold during the connection the system automatically disassociates from the access point and transfers the connection to the primary cellular network access (e.g., cellular network access).
  • RSSI relative signal strength
  • the quality indicator is below a set threshold or drops below a set threshold during the connection the system automatically disassociates from the access point and transfers the connection to the primary cellular network access (e.g., cellular network access).
  • connection to the Internet is also frequently monitored, for example by pinging a known server.
  • the system may allow a set time interval for reaching the Internet at the beginning of a connection and a different time interval during the connection.
  • the access control system on the access point may cause the mobile device access to the Internet to expire. Upon expiration of access, the mobile device may again follow the access instructions from the server to extend the session. If the access instructions fail, the connection may be automatically terminated and/or control may be sent to the end use for the user to take specific action.
  • the system may be monitoring the latency of the connection. This may be done by pinging a specified server, for example, but not limited to, a voice over IP (VOIP) connection server.
  • VOIP voice over IP
  • Another signal quality test that the system may perform is a speed test for the connection. This may be done by passively monitoring the speed of the traffic that the device is generating in normal use. If the speed is of the passive test is not adequate, the system may perform an active speed test. In an active test several simultaneous download streams may be initiated from a single server or from multiple servers and speed may be monitored only during a part of the download process.
  • the action taken by the system based on the results of the various signal quality checks may include transferring the connection automatically to the primary network access (e.g., cellular network access) or informing the end user about the test result and letting the user decide on the specific action to take.
  • the primary network access e.g., cellular network access
  • a high latency tests result may lead the system to recommend that the user selects conventional cellular voice connection instead of a VOIP call application for making a voice call.
  • the application on the mobile device may begin recording the data use of the mobile device.
  • the number of bytes used may be recorded at regular intervals and/or at the end of each connection, and the usage results may be sent to the cloud based server system for billing and reconciliation purposes.
  • the transfer of this information may be done at a later point to optimize performance of the system for cost and data speed.
  • the information transfer may also be done within a specific time interval in order to help the system manage data traffic offload to the specific offload profile specified by the mobile network operator.
  • the key to managing the data traffic offload to alternative network access in order to achieve the ideal offload profile may be in how the server system utilizes the information provided to it by the mobile devices and the information about the need for data traffic offload and the availability of access points for data traffic offload.
  • the mobile network operator may input (e.g., to the cloud based server system via a buyer console illustrated in FIG. 11 ) the desired offload profile for each cellular sector that, based on the analysis of usage data and its forecasts, will experience a shortage of capacity at specific hours of the day.
  • This offload profile may be provided by the mobile network operator in advance (e.g., months in advance) as a part of the normal network planning process.
  • the necessary data traffic offload capacity may be reserved for the operator by the alternative network access provider based on the offload profile. The mechanisms for allocating capacity and making such reservations are discussed in a separate document. In the following discussion, it is assumed that the desired offload profile is accepted by the offload management service provider and used as the target offload profile for managing alternative network access.
  • the offload profile may be in the form of specific data capacity (e.g., in Mbits/s) during various times, or it may be in the form of a specific number of active devices utilizing alternative network access at specific times.
  • the offload profile provides precise control for the operator about where in terms of the mobile network topology the alternative network access is utilized (see FIG. 8 ). Since the mobile network operator may specify at what times data traffic offload to alternative network access shall be used, the mechanism provides control about when data traffic offload is utilized (see FIGS. 7, 9, and 10 ).
  • the offload management system may also provide the ability to specify different amounts of data traffic offload for each sector at different times in the offload profile. This way, the mobile network operator can control how much alternative network access capacity is used in each cell sector at each time (see FIG. 10 ).
  • the cloud-based server system for managing data traffic offload may take the offload profiles specified by the mobile operators as an input for managing connections in each sector. From the communications of the scan results from mobile devices, the cloud-based server system knows how many mobile devices are connected to each cellular sector and which of the mobile devices are in active versus sleep mode. As indicated above, the scan results may include an identification of the cellular sector to which each mobile device is connected.
  • the cloud-based server system From the reports of the accounting function in the application on the mobile devices the cloud-based server system also knows how much data each of the mobile devices has consumed from the alternative network access points during a specified interval.
  • the mobile devices may also report to the cloud-based server system the amount of cellular data they are consuming during the times when it is necessary to manage the data traffic offload to alternative network access to further assist in management of the data traffic offload.
  • the reports of the accounting system may also include the identification of the cellular sector to which the device is connected.
  • the cloud-based server system can issue instructions to the appropriate number of mobile devices connected to each cellular sector to achieve the offload profile specified for each sector. These instructions may cause a mobile device to transfer its connection to alternative network access (e.g., for a specified amount of time or specified amount of data traffic) or cause a specific mobile device to transfer the data connection from alternative network access back to the primary network access (e.g., cellular network access) depending on the relation of the actual data traffic offloading to the specified offload profile.
  • alternative network access e.g., for a specified amount of time or specified amount of data traffic
  • the primary network access e.g., cellular network access
  • FIG. 14 is a functional flow diagram of an example process of managing the appropriate amount of data traffic offload from the primary to the alternative network according to various embodiments.
  • the headings above the flow diagram indicate which parts of the system can perform each step.
  • FIG. 15 is a functional flow diagram of an example process for managing data traffic offload in case the profile is defined in terms of data capacity need from alternative network access according to various embodiments. Also, in FIG. 15 the headings above the flow diagram indicate which parts of the system can perform each step.
  • processors such as a general purpose processor, a multi-core processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • a general-purpose processor can be a microprocessor, but in the alternative, the processor can be any processor, controller, microcontroller, or state machine.
  • a processor can also be implemented as a combination of computing devices, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
  • a software module can reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium.
  • An exemplary storage medium can be coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium can be integral to the processor.
  • the processor and the storage medium can reside in an ASIC.
  • device, blocks, or modules that are described as coupled may be coupled via intermediary device, blocks, or modules.
  • a first device may be described a transmitting data to (or receiving from) a second device when there are intermediary devices that couple the first and second device and also when the first device is unaware of the ultimate destination of the data.

Abstract

A method of managing data traffic offload from a radio access network may include: determining a location of a mobile device; and identifying, based on data traffic offload requirements of a network operator and capabilities of alternative network providers, one or more alternative networks configured to be accessed by the mobile device at the determined location.

Description

    CROSS-REFERENCE TO RELATED APPLICATION(S)
  • This application is a continuation of U.S. patent application Ser. No. 14/586,837, filed Dec. 30, 2014, which claims the benefit of U.S. Provisional App. No. 61/922,396, filed Dec. 31, 2013, U.S. Provisional Application No. 61/922,382, filed Dec. 31, 2013, and U.S. Provisional Application No. 61/922,376, filed Dec. 31, 2013, the entireties of all of which are hereby incorporated herein by reference.
  • BACKGROUND
  • Field
  • The subject matter discussed herein relates generally to wireless service to mobile devices and, more particularly, to managing the traffic on radio access networks that can be used to service mobile devices.
  • Related Art
  • Mobile devices generally rely on wireless service provided by a service provider using cellular communications that utilize radio frequency communication.
  • Data communications to mobile devices can also be provided over other types of radio access networks. For example, Wi-Fi access points connected to broadband networks provide data to mobile devices. The choice of whether data communication takes place over a cellular network or a Wi-Fi connection is normally left to the end user of the device. If the end user has entered all necessary passwords and access credentials to the mobile device memory and the Wi-Fi radio is on, in many cases the connection to Wi-Fi is preferred automatically by the mobile device.
  • In U.S. patent applications Ser. Nos. 13/684,044 (filed Nov. 21, 2012), Ser. No. 13/684,048 (filed Nov. 21, 2012), Ser. No. 13/684,049 (filed Nov. 21, 2012), 61/805,473 (filed Mar. 26, 2012), 61/805,476 (filed Mar. 26, 2012) and 61/877,178 (filed Sep. 12, 2013) methods are described for alternative network access (ANA) based on methods and systems for selecting the radio access network to provide Internet or other network access based on terms and conditions for allowing access and terms and conditions for utilizing access to the alternative network. Each of those applications is hereby incorporated by reference in their entirety.
  • In practice, the terms and conditions for utilizing access to alternative networks often depend on the expected or the actual load on the primary network managed by the service provider for the device. For example, if the primary network access takes place through the cellular network system owned by the service provider for the device, it is likely that the service provider first wants to utilize all of the capacity in its own network before seeking to use capacity from an alternative network. This is especially the case if there is a cost associated with using the alternative network access.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Aspects and features of the present inventive concept will be more apparent by describing example embodiments with reference to the accompanying drawings, in which:
  • FIG. 1 is an illustration of a conventional layout of cellular sectors in an urban environment;
  • FIG. 2 illustrates locations of Wi-Fi access points in the urban environment illustrated in FIG. 1;
  • FIG. 3 illustrates an example of how conventional cellular sectors and Wi-Fi access point locations are related to one another;
  • FIG. 4 illustrates a density of access points in an urban environment based on a field test result;
  • FIG. 5 is a closer view of a density of access points in an urban environment based on a field test result;
  • FIG. 6 illustrates a schematic example of how mobile devices are distributed within a cellular sector according to various embodiments;
  • FIG. 7 illustrates a typical variation of data usage during the hours of a day in a cellular sector during business days in a downtown business district according to various embodiments;
  • FIG. 8 is an illustration of an example of a non-uniformity of data demand across several towers of a single mobile network operator in and around an urban area;
  • FIG. 9 is an illustration of the projected data traffic load during the hours of a day in the sector depicted in FIG. 7 six months later than the situation in FIG. 7;
  • FIG. 10 illustrates the anticipated hourly data traffic offload need profile of the mobile network operator in case of the projected load illustrated in FIG. 9;
  • FIG. 11 illustrates an example of the components of an exemplary system for managing data traffic offload to alternative network access points according to various embodiments;
  • FIG. 12 illustrates an example of the process of determining to which access point a particular mobile device shall connect during the operation of data communication according to various embodiments;
  • FIG. 13 illustrates an example of the operations in authentication and authorization for managing data traffic offload to an alternative network according to various embodiments;
  • FIG. 14 is a functional flow diagram of an example process of managing the appropriate amount of data traffic offload from the primary to the alternative network according to various embodiments; and
  • FIG. 15 is a functional flow diagram of an example process for managing data traffic offload in case the profile is defined in terms of data capacity need from alternative network access according to various embodiments.
  • DETAILED DESCRIPTION
  • The subject matter described herein is taught by way of example implementations. Various details have been omitted for the sake of clarity and to avoid obscuring the subject matter. The examples shown below are directed to structures and functions for implementing systems and methods for establishing wireless connections based on access conditions. Other features and advantages of the subject matter should be apparent from the following description.
  • As communication needs of various wireless and mobile devices have grown, many of them have been equipped with more than one radio system. Each of the radio systems may be used to connect to one or more wireless networks based on the system protocols. Examples of such systems are a cellular radio system that may be utilizing a GSM, CDMA or LTE standard for encoding the signal and a Wi-Fi system that utilizes a well-known IEEE 802.11 standard for communication. Another example may be a WiMAX system that is based on the IEEE standard 802.16.
  • Structure and Operational Characteristics of Cellular and Wi-Fi Networks
  • In a communication device that has multiple radio systems, each of the radios may have different characteristics. For example, the cellular system may be designed to connect to cell towers that are further apart and use a higher power signal than the Wi-Fi radio system uses. Since the Wi-Fi standard is utilizing unlicensed spectrum, the power of the transmitter may be limited by regulation and consequently the distance over which the communication can effectively take place may be shorter than the effective communication distance in the case of a cellular connection.
  • The different characteristic of the radio systems may result in a topology of coverage in the environment that is very different for each radio access network. For example, in the cellular system a single radio may be covering an area ranging from hundreds of meters across to a few kilometers, with typically one square kilometer or more of surface area for a cellular sector. In comparison, a Wi-Fi system that is based on using unlicensed radio bands and therefore limited in the power of the signal may cover only an area of 50 meters to 100 meters across.
  • A cellular radio access network is normally engineered for ubiquitous coverage. This means that cell sites are placed at distances where the coverage of each sector slightly overlaps with the coverage area of the adjacent sector. FIG. 1 is an illustration of a conventional layout of cellular sectors in an urban environment. This is a simplification of the actual situation in many cellular access networks. Often, in addition to macro cell sites and their associated sectors, there may be small cells with shorter range. These shorter range cells may also have sectored radio systems. However, in the aggregate, cellular systems are engineered for ubiquitous coverage.
  • Wi-Fi access points are typically deployed to meet the needs of the subscriber to the broadband connection to which the access point is connected. There are also Wi-Fi access point deployments that are intended for third parties or the general public. These are often called hotspots. In either case, the Wi-Fi access points that may be available for offloading data traffic are located in various places throughout the environment and their coverage may or may not be ubiquitous. These access points may constitute the example alternative network access discussed in this document. FIG. 2 illustrates locations of Wi-Fi access points in the urban environment illustrated in FIG. 1.
  • Typically there are several access points that can provide alternative network access within the area of each cellular sector. An example of the distribution of Wi-Fi access points (represented by the dark circles) in an urban environment is shown in FIG. 2. FIG. 3 illustrates an example of how conventional cellular sectors and Wi-Fi access point locations are related to one another.
  • It may be noted that, in most urban environments with reasonable penetration of broadband connections, the Wi-Fi access points in the aggregate provide signals that are sufficient to provide much more than ubiquitous coverage. In fact, in most urban environments a mobile device with Wi-Fi access typically receives a strong enough signal for good broadband connection from several, in many cases from dozens of Wi-Fi access points. However, all of these access points may not be available for alternative network access. FIG. 4 illustrates a density of access points in an urban environment based on a field test result. FIG. 5 is a closer view of a density of access points in an urban environment based on a field test result. In FIGS. 4 and 5, the density of access points and Wi-Fi signals in the urban environment are represented by the spheres.
  • Not only are Wi-Fi access point signals ubiquitous in many environments, they are also most of the time not being used. The nature of the need for accessing the Internet is typically quite intermittent. However, at the time of the access is required, it is desirable to have high data transfer speeds available. Because of the desired high data transfer speeds, most broadband connections are capable of speeds of several megabits per second. The typical average speeds are also growing rapidly as further investments into more sophisticated data transfer systems are made by the broadband service providers.
  • The end result of the relatively high penetration of broadband access, high prevalence of Wi-Fi access points in the termination points on broadband connections, and the intermittent use of these Internet connections is that there is tremendous unused wireless network access capacity available in most urban and suburban areas. This capacity is owned and controlled by broadband service providers. In most cases these broadband service providers are different companies than the mobile network operators. Therefore, in most cases the access points are not available for alternative network access to the mobile devices that primarily use cellular networks for accessing the Internet.
  • Mobile devices may be anywhere in the environment and are, true to their name, moving around in relation to the stationary radio access networks as their end-users move during the course of the day. At any given time a typical cellular macro sector may serve several hundred mobile devices. Only a small portion of these mobile devices is active and an even smaller portion may be downloading or uploading data at any given instant. FIG. 6 illustrates a schematic example of how mobile devices are distributed within a cellular sector. Some mobile devices are within range of selected Wi-Fi access points (represented as ovals with an access point graphically represented near their center); others are not within range of Wi-Fi access points.
  • As the overall usage of data by mobile devices continues to grow, more devices, connected to a particular cell sector radio will attempt to use more data at higher frequencies. Over time, this means that the maximum capacity of data traffic at the cellular radio will be reached. Initially, this may happen only during peak usage times. These peak times are typically very regular and occur during business days during the same hours every day. The actual pattern of usage may be different at different locations. For example, in downtown business districts the peak usage may take place during the morning and evening commute hours and during lunchtime. In suburban residential areas, the highest usage normally occurs during the evening hours.
  • FIG. 7 illustrates a typical variation of data usage in a cellular sector during the hours of a business day in a downtown business district. The light gray area represents demand that is beyond the existing cellular network capacity. Because of the variation of usage during different hours of the day, the gradually increasing demand in each cellular sector or small cell initially exceeds capacity only during a relatively short period at the peak demand time. An example of such peak demand exceeding the cellular network capacity is shown in FIG. 7.
    • The cellular network system of a mobile network operator typically includes thousands, perhaps tens of thousands of cellular sectors and small cells. The distribution of data demand is typically quite uneven across the various cell sites and cellular sectors. FIG. 8 is an illustration of an example of the non-uniformity of data demand across several towers of a single mobile network operator in and around an urban area. The size of the dots (small circles) indicates the total data traffic during the busiest hour of the day at each cell site.
  • As can be seen from the dots, at the time of the measurement only a few cell sites had very high demand (the largest dots) and would have benefited from additional capacity. During normal operation, typically only a few percent of the cell sites are in need of additional capacity. Mobile network operators normally address the capacity shortages by investing in additional equipment, taking on rental costs, and paying for additional backhaul for routing the traffic to the Internet or the cellular operator's network system. By always expanding capacity at the locations most in need of expansion the operators keep up with demand. As a result, those are the locations where additional capacity would need to be shifted around in the network.
  • FIG. 9 is an illustration of the projected data traffic load during the hours of a day in the sector depicted in FIG. 7 six months later than the situation in FIG. 7. Cellular network operators accumulate large amounts of information of usage patterns in their networks. This information is normally used to plan for network expansions in order to keep up with the growing demand. For example, by analyzing the collected information about use of cellular data in a particular sector represented by FIG. 7 and applying straightforward trend extrapolation and other forecasting methods, a cellular operator may conclude that within six months data usage in the same sector will look like a pattern shown in FIG. 9. Again, the light gray area represents demand that is beyond the existing cellular network capacity.
  • Assuming that the network operator has not increased the capacity of the cellular network, it would be desirable for the mobile network operator to gain access to alternative network capacity for mobile devices within this cellular sector to make up for the shortfall in capacity.
  • In most cases, the need for alternative network capacity in each sector would vary by the hours of the day. In an ideal case, the mobile network operator would offload data traffic during each hour (or other shorter time period) of the day exactly in the amount needed to make up the difference between the existing cellular network capacity and the data capacity demand during each hour. FIG. 10 illustrates the anticipated hourly data traffic offload need profile of the mobile network operator in case of the projected load illustrated in FIG. 9.
  • The following system description explains a method and system to enable managing data traffic offload to an alternative network in order to achieve the offload profile described in the previous paragraph.
  • Method and System for Managing Data Traffic Offload
  • An example of a solution for managing data traffic offload to meet the objectives of the mobile network operator can determine which network access each of the mobile devices uses at various times. The parameters for this determination are quite complex and dynamic.
  • Certain access points for alternative network access may be located within a particular cellular sector or small cell; however, there may be overlap between cellular sectors. For example, a Wi-Fi access point in some cases may be within the footprint of several cell sectors. Adding small cells into the mix further complicates the task of determining to which cellular radio systems specific Wi-Fi access points may provide alternative network access. In addition the mobile operators have deployed network load management systems, which dynamically allocate mobile devices to various cellular radio connections to balance network traffic.
  • Because mobile devices move around in the environment, the available choices of network access for each of the devices may vary over time. In addition each of the mobile devices may need data capacity at different times depending on their use. In various embodiments, to deal with the complexity and dynamic nature of the need for alternative network access, the solution for managing data traffic offload to alternative access may consist of, for example, but not limited to, three kinds of components:
  • 1) A software module (for example, an application) operating on each of the mobile devices participating in the system;
  • 2) A cloud-based server system including software that communicates with the application on their mobile devices; and.
  • 3) Interfaces for mobile network operators and for providers of alternative network access to enter information about their needs and about their willingness to provide alternative network access and the terms and conditions associated with such access.
  • FIG. 11 illustrates an example of the components of an exemplary system for managing data traffic offload to alternative network access points according to various embodiments. FIG. 12 illustrates an example of the process of determining to which access point a particular mobile device shall connect during the operation of data communication according to various embodiments.
  • The functioning of all the components as a system for managing data traffic offload to alternative network access is illustrated in FIG. 12 and explained in the following. When the mobile device is in sleep mode and there is no Internet access available through a Wi-Fi connection, the application on the mobile device may turn the Wi-Fi radio off in order to conserve battery power. If the user of the mobile device activates the mobile device so that it comes out of the sleep mode, the application may turn on the Wi-Fi radio and scan for available Wi-Fi access points in its environment. For example, the application may immediately turn on the Wi-Fi radio and scan Wi-Fi access points when the mobile device comes out of the sleep mode. Even during sleep mode the application may turn on the Wi-Fi radio and scan for available access points at predetermined intervals.
  • The results of the scan, including the signal strength of each access point, are transmitted to the cloud-based server system. Information about the identification of the cellular sector to which the mobile device is connected as well as the latitude and longitude of the mobile device at the time of the scan may be included in the scan information.
  • The server may utilize information in the scan about the observed access points, the signal strengths of the observed access points, the identification of the cell sector to which the mobile device is connected together with information provided by the mobile network operator and information about the owner of the access points that may provide alternative network access. Based on all this information, the server determines whether the mobile device should transfer its connection from the cellular network to one of the Wi-Fi access points that have a sufficiently strong signal as indicated by the scan results.
  • Based on a determination by the server, the server may send information to the mobile device that includes the identification of the access point to which the mobile device should associate (if any). The server may send a rank ordered list of access points that would be possible providers of alternative network access in order to provide several alternatives for the mobile device.
  • In most cases access to the Internet through Wi-Fi access points is controlled by some kind of security and access control system. Therefore the mobile device may need credentials and instructions about how to obtain access to the Internet. Terms and conditions for access set by the alternative network access provider may include payments that depend on the amount of data traffic. There may also be limits to how much data can be used in any session before re-authorization or termination of the session. Accordingly, there may also be a need to keep track of how much data traffic to the mobile device each access point provides.
  • FIG. 13 illustrates an example of the operations in authentication and authorization for managing data traffic offload to an alternative network according to various embodiments. Every communication between the app on the mobile device and the cloud-based server system may be encrypted and authenticated. There may be a shared secret between the two software systems (i.e., the application and the server) and the application may have access to the identification information of the mobile device and its service provider. The server system may further confirm the authorization status of the mobile device using standard protocols, for example, but not limited to, the RADIUS protocol. A connection to the RADIUS server system of the mobile network operator serving the mobile device may be made at whatever frequency mobile network operator has specified.
  • Once the authorization is confirmed and the server system has made the determination that the data connection of the mobile device should be transferred to a specific access point, the server system may send the required credentials and instructions on how to use the credentials to the application on the mobile device. The credentials may be in an encrypted form and only the application on the mobile device may receive the credentials and be able to decrypt and use them. The end user of the device may not have access to the credentials, and the operating system in the device may not retain any information about them after the connection is made. The mobile device uses the credentials to make the connection to (i.e., associate with) the access point.
  • The quality of the signal of the access point for alternative network access is monitored by the mobile device using an appropriate parameter, for example, but not limited to, the relative signal strength (RSSI), the encoding method selected by the mobile device and the access point, etc., or any other indicator of the ability of the signal to provide a good quality broadband connection. If the quality indicator is below a set threshold or drops below a set threshold during the connection the system automatically disassociates from the access point and transfers the connection to the primary cellular network access (e.g., cellular network access).
  • The availability of a connection to the Internet is also frequently monitored, for example by pinging a known server. The system may allow a set time interval for reaching the Internet at the beginning of a connection and a different time interval during the connection. Also, the access control system on the access point may cause the mobile device access to the Internet to expire. Upon expiration of access, the mobile device may again follow the access instructions from the server to extend the session. If the access instructions fail, the connection may be automatically terminated and/or control may be sent to the end use for the user to take specific action.
  • Other parameters may also be included in the monitoring and testing of the connection quality. For example, the system may be monitoring the latency of the connection. This may be done by pinging a specified server, for example, but not limited to, a voice over IP (VOIP) connection server.
  • Another signal quality test that the system may perform is a speed test for the connection. This may be done by passively monitoring the speed of the traffic that the device is generating in normal use. If the speed is of the passive test is not adequate, the system may perform an active speed test. In an active test several simultaneous download streams may be initiated from a single server or from multiple servers and speed may be monitored only during a part of the download process.
  • The action taken by the system based on the results of the various signal quality checks may include transferring the connection automatically to the primary network access (e.g., cellular network access) or informing the end user about the test result and letting the user decide on the specific action to take. For example, a high latency tests result may lead the system to recommend that the user selects conventional cellular voice connection instead of a VOIP call application for making a voice call.
  • Once the signal quality has been determined, assuming the mobile device is still using the alternative network access, the application on the mobile device may begin recording the data use of the mobile device. The number of bytes used may be recorded at regular intervals and/or at the end of each connection, and the usage results may be sent to the cloud based server system for billing and reconciliation purposes. The transfer of this information may be done at a later point to optimize performance of the system for cost and data speed. The information transfer may also be done within a specific time interval in order to help the system manage data traffic offload to the specific offload profile specified by the mobile network operator.
  • In various embodiments the key to managing the data traffic offload to alternative network access in order to achieve the ideal offload profile may be in how the server system utilizes the information provided to it by the mobile devices and the information about the need for data traffic offload and the availability of access points for data traffic offload.
  • For example, the mobile network operator may input (e.g., to the cloud based server system via a buyer console illustrated in FIG. 11) the desired offload profile for each cellular sector that, based on the analysis of usage data and its forecasts, will experience a shortage of capacity at specific hours of the day. This offload profile may be provided by the mobile network operator in advance (e.g., months in advance) as a part of the normal network planning process. The necessary data traffic offload capacity may be reserved for the operator by the alternative network access provider based on the offload profile. The mechanisms for allocating capacity and making such reservations are discussed in a separate document. In the following discussion, it is assumed that the desired offload profile is accepted by the offload management service provider and used as the target offload profile for managing alternative network access.
  • The offload profile may be in the form of specific data capacity (e.g., in Mbits/s) during various times, or it may be in the form of a specific number of active devices utilizing alternative network access at specific times.
  • Since the mobile network operator may input the offload profile individually for each cellular sector or small cell, the offload profile provides precise control for the operator about where in terms of the mobile network topology the alternative network access is utilized (see FIG. 8). Since the mobile network operator may specify at what times data traffic offload to alternative network access shall be used, the mechanism provides control about when data traffic offload is utilized (see FIGS. 7, 9, and 10).
  • As the need for additional capacity may vary during different hours of the day and between different days, the offload management system may also provide the ability to specify different amounts of data traffic offload for each sector at different times in the offload profile. This way, the mobile network operator can control how much alternative network access capacity is used in each cell sector at each time (see FIG. 10).
  • The cloud-based server system for managing data traffic offload may take the offload profiles specified by the mobile operators as an input for managing connections in each sector. From the communications of the scan results from mobile devices, the cloud-based server system knows how many mobile devices are connected to each cellular sector and which of the mobile devices are in active versus sleep mode. As indicated above, the scan results may include an identification of the cellular sector to which each mobile device is connected.
  • From the reports of the accounting function in the application on the mobile devices the cloud-based server system also knows how much data each of the mobile devices has consumed from the alternative network access points during a specified interval. The mobile devices may also report to the cloud-based server system the amount of cellular data they are consuming during the times when it is necessary to manage the data traffic offload to alternative network access to further assist in management of the data traffic offload. The reports of the accounting system may also include the identification of the cellular sector to which the device is connected.
  • Utilizing the information from the offload profile and the scan result reports and the feedback from the accounting reports the cloud-based server system can issue instructions to the appropriate number of mobile devices connected to each cellular sector to achieve the offload profile specified for each sector. These instructions may cause a mobile device to transfer its connection to alternative network access (e.g., for a specified amount of time or specified amount of data traffic) or cause a specific mobile device to transfer the data connection from alternative network access back to the primary network access (e.g., cellular network access) depending on the relation of the actual data traffic offloading to the specified offload profile.
  • FIG. 14 is a functional flow diagram of an example process of managing the appropriate amount of data traffic offload from the primary to the alternative network according to various embodiments. In FIG. 14 the headings above the flow diagram indicate which parts of the system can perform each step. FIG. 15 is a functional flow diagram of an example process for managing data traffic offload in case the profile is defined in terms of data capacity need from alternative network access according to various embodiments. Also, in FIG. 15 the headings above the flow diagram indicate which parts of the system can perform each step.
  • The foregoing systems and methods and associated devices and modules are susceptible to many variations. Additionally, for clarity and concision, many descriptions of the systems and methods have been simplified. For example, the figures generally illustrate one of each type of network device, but a network system may have many of each type of device.
  • As described in this specification, various systems and methods are described as working to optimize particular parameters, functions, or operations. This use of the term optimize does not necessarily mean optimize in an abstract theoretical or global sense. Rather, the systems and methods may work to improve performance using algorithms that are expected to improve performance in at least many common cases. For example, the systems and methods may work to optimize performance judged by particular functions or criteria. Similar terms like minimize or maximize are used in a like manner.
  • Those of skill will appreciate that the various illustrative logical blocks, modules, units, and algorithm steps described in connection with the embodiments disclosed herein can often be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular constraints imposed on the overall system. Skilled persons can implement the described functionality in varying ways for each particular system, but such implementation decisions should not be interpreted as causing a departure from the scope of the invention. In addition, the grouping of functions within a unit, module, block, or step is for ease of description. Specific functions or steps can be moved from one unit, module, or block without departing from the invention.
  • The various illustrative logical blocks, units, steps and modules described in connection with the embodiments disclosed herein can be implemented or performed with a processor, such as a general purpose processor, a multi-core processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor can be a microprocessor, but in the alternative, the processor can be any processor, controller, microcontroller, or state machine. A processor can also be implemented as a combination of computing devices, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
  • The steps of a method or algorithm and the processes of a block or module described in connection with the embodiments disclosed herein can be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module can reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium. An exemplary storage medium can be coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium can be integral to the processor. The processor and the storage medium can reside in an ASIC. Additionally, device, blocks, or modules that are described as coupled may be coupled via intermediary device, blocks, or modules. Similarly, a first device may be described a transmitting data to (or receiving from) a second device when there are intermediary devices that couple the first and second device and also when the first device is unaware of the ultimate destination of the data.
  • The above description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles described herein can be applied to other embodiments without departing from the spirit or scope of the invention. Thus, it is to be understood that the description and drawings presented herein represent a presently preferred embodiment of the invention and are therefore representative of the subject matter that is broadly contemplated by the present invention. It is further understood that the scope of the present invention fully encompasses other embodiments that may become obvious to those skilled in the art.

Claims (30)

What is claimed is:
1. A method of managing data traffic offload from a radio access network, the method comprising using at least one hardware processor of a server to:
obtain an offload profile for at least one cellular sector in a cellular network, wherein the offload profile indicates, for the at least one cellular sector, a traffic offload, needed from an alternative network; and,
issue an instruction, to at least one mobile device within the at least one cellular sector, to either transfer a connection from the cellular network to the alternative network or transfer a connection from the alternative network to the cellular network.
2. The method of claim 1, wherein issuance of the instruction is based on a signal quality within the at least one cellular sector.
3. The method of claim 1, wherein issuance of the instruction is based on peak hours for the at least one cellular sector.
4. The method of claim 1, wherein issuance of the instruction is based on traffic load within the at least one cellular sector.
5. The method of claim 1, wherein the at least one cellular sector comprises a plurality of cellular sectors, and wherein the offload profile comprises, for each of the plurality of cellular sectors, a traffic offload, needed from the alternative network.
6. The method of claim 1, wherein the alternative network comprises a wireless network.
7. The method of claim 6, wherein the wireless network comprises a Wi-Fi network.
8. The method of claim 6, wherein the wireless network comprises another cellular network.
9. The method of claim 1, wherein the offload profile comprises a traffic pattern representing a predicted amount of traffic for the at least one cellular sector during at least one time period.
10. The method of claim 1, further comprising using the at least one hardware processor of the server to, for the at least one mobile device that is instructed to transfer a connection from the cellular network to the alternative network, collect a measure of data consumed through the alternative network from the mobile device.
11. A system for managing data traffic offload from a radio access network, the system comprising:
at least one hardware processor; and
one or more software modules configured to, when executed by the at least one hardware processor,
obtain an offload profile for at least one cellular sector in a cellular network, wherein the offload profile indicates, for the at least one cellular sector, a traffic offload, needed from an alternative network, and,
issue an instruction, to at least one mobile device within the at least one cellular sector, to either transfer a connection from the cellular network to the alternative network or transfer a connection from the alternative network to the cellular network.
12. The system of claim 11, wherein issuance of the instruction is based on a signal quality within the at least one cellular sector.
13. The system of claim 11, wherein issuance of the instruction is based on peak hours for the at least one cellular sector.
14. The system of claim 11, wherein issuance of the instruction is based on traffic load within the at least one cellular sector.
15. The system of claim 11, wherein the at least one cellular sector comprises a plurality of cellular sectors, and wherein the offload profile comprises, for each of the plurality of cellular sectors, a traffic offload, needed from the alternative network.
16. The system of claim 11, wherein the alternative network comprises a wireless network.
17. The system of claim 16, wherein the wireless network comprises a Wi-Fi network.
18. The system of claim 16, wherein the wireless network comprises another cellular network.
19. The system of claim 11, wherein the offload profile comprises a traffic pattern representing a predicted amount of traffic for the at least one cellular sector during at least one time period.
20. The system of claim 11, wherein the one or more software modules are further configured to, for the at least one mobile device that is instructed to transfer a connection from the cellular network to the alternative network, collect a measure of data consumed through the alternative network from the mobile device.
21. A non-transitory computer-readable medium having instructions stored thereon, wherein the instructions, when executed by a processor, cause the processor to:
obtain an offload profile for at least one cellular sector in a cellular network, wherein the offload profile indicates, for the at least one cellular sector, a traffic offload, needed from an alternative network; and,
issue an instruction, to at least one mobile device within the at least one cellular sector, to either transfer a connection from the cellular network to the alternative network or transfer a connection from the alternative network to the cellular network.
22. The non-transitory computer-readable medium of claim 21, wherein issuance of the instruction is based on a signal quality within the at least one cellular sector.
23. The non-transitory computer-readable medium of claim 21, wherein issuance of the instruction is based on peak hours for the at least one cellular sector.
24. The non-transitory computer-readable medium of claim 21, wherein issuance of the instruction is based on traffic load within the at least one cellular sector.
25. The non-transitory computer-readable medium of claim 21, wherein the at least one cellular sector comprises a plurality of cellular sectors, and wherein the offload profile comprises, for each of the plurality of cellular sectors, a traffic offload, needed from the alternative network.
26. The non-transitory computer-readable medium of claim 21, wherein the alternative network comprises a wireless network.
27. The non-transitory computer-readable medium of claim 26, wherein the wireless network comprises a Wi-Fi network.
28. The non-transitory computer-readable medium of claim 26, wherein the wireless network comprises another cellular network.
29. The non-transitory computer-readable medium of claim 21, wherein the offload profile comprises a traffic pattern representing a predicted amount of traffic for the at least one cellular sector during at least one time period.
30. The non-transitory computer-readable medium of claim 21, wherein the instructions further cause the processor to, for the at least one mobile device that is instructed to transfer a connection from the cellular network to the alternative network, collect a measure of data consumed through the alternative network from the mobile device.
US15/406,010 2013-12-31 2017-01-13 Systems and methods for managing offload from one radio access network to another Abandoned US20170142627A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/406,010 US20170142627A1 (en) 2013-12-31 2017-01-13 Systems and methods for managing offload from one radio access network to another

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201361922382P 2013-12-31 2013-12-31
US201361922396P 2013-12-31 2013-12-31
US201361922376P 2013-12-31 2013-12-31
US14/586,837 US9549082B2 (en) 2013-12-31 2014-12-30 Systems and methods for managing offload from one radio access network to another
US15/406,010 US20170142627A1 (en) 2013-12-31 2017-01-13 Systems and methods for managing offload from one radio access network to another

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/586,837 Continuation US9549082B2 (en) 2013-12-31 2014-12-30 Systems and methods for managing offload from one radio access network to another

Publications (1)

Publication Number Publication Date
US20170142627A1 true US20170142627A1 (en) 2017-05-18

Family

ID=53483324

Family Applications (6)

Application Number Title Priority Date Filing Date
US14/586,851 Expired - Fee Related US10009481B2 (en) 2013-12-31 2014-12-30 Systems and methods for allocating alternative network access resources
US14/586,837 Expired - Fee Related US9549082B2 (en) 2013-12-31 2014-12-30 Systems and methods for managing offload from one radio access network to another
US14/587,662 Expired - Fee Related US9781277B2 (en) 2013-12-31 2014-12-31 Systems and methods for allocating and pricing alternative network access resources with reserve prices
US15/406,010 Abandoned US20170142627A1 (en) 2013-12-31 2017-01-13 Systems and methods for managing offload from one radio access network to another
US15/691,566 Expired - Fee Related US9900445B2 (en) 2013-12-31 2017-08-30 Systems and methods for allocating and pricing alternative network access resources with reserve prices
US15/872,878 Expired - Fee Related US10129413B2 (en) 2013-12-31 2018-01-16 Systems and methods for allocating and pricing alternative network access resources with reserve prices

Family Applications Before (3)

Application Number Title Priority Date Filing Date
US14/586,851 Expired - Fee Related US10009481B2 (en) 2013-12-31 2014-12-30 Systems and methods for allocating alternative network access resources
US14/586,837 Expired - Fee Related US9549082B2 (en) 2013-12-31 2014-12-30 Systems and methods for managing offload from one radio access network to another
US14/587,662 Expired - Fee Related US9781277B2 (en) 2013-12-31 2014-12-31 Systems and methods for allocating and pricing alternative network access resources with reserve prices

Family Applications After (2)

Application Number Title Priority Date Filing Date
US15/691,566 Expired - Fee Related US9900445B2 (en) 2013-12-31 2017-08-30 Systems and methods for allocating and pricing alternative network access resources with reserve prices
US15/872,878 Expired - Fee Related US10129413B2 (en) 2013-12-31 2018-01-16 Systems and methods for allocating and pricing alternative network access resources with reserve prices

Country Status (4)

Country Link
US (6) US10009481B2 (en)
EP (3) EP3090510A4 (en)
CN (3) CN105917696A (en)
WO (3) WO2015103322A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105247819B (en) 2013-04-17 2019-07-16 希斯泰克公司 The gateway of communication for the Machine To Machine using dual cellular interface
US9942762B2 (en) * 2014-03-28 2018-04-10 Qualcomm Incorporated Provisioning credentials in wireless communications
WO2016109742A1 (en) * 2014-12-31 2016-07-07 Bandwidthx Inc. Systems and methods for optimizing mobile device radio management for user experience
US10187821B2 (en) * 2015-09-14 2019-01-22 Teleste Oyj Method for wireless data offload
EP3556131A4 (en) * 2016-12-19 2020-07-15 Bandwidthx Inc. Optimized offloading of wireless devices to alternative wireless networks
MX2019010026A (en) 2017-02-23 2020-02-07 John Mezzalingua Ass Llc System and method for adaptively tracking and allocating capacity in a broadly-dispersed wireless network.
CN109104743B (en) * 2018-07-09 2021-08-03 南京邮电大学 Pricing-based data unloading method in heterogeneous wireless network
US10904791B2 (en) * 2018-10-04 2021-01-26 Saankhya Labs Pvt. Ltd. System and method for offloading data and video traffic to a supplemental downlink overlay network
RU2740299C2 (en) * 2020-05-22 2021-01-13 Общество с ограниченной ответственностью "КьюЛабс" Method of subscribers connection and device for implementation thereof
US20240089321A1 (en) * 2022-09-09 2024-03-14 International Business Machines Corporation Accessing vehicles by edge collaboration

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100145161A1 (en) * 2008-10-03 2010-06-10 Dusit Niyato System and method for remote and mobile patient monitoring service using heterogeneous wireless access networks
US20120230191A1 (en) * 2011-03-08 2012-09-13 Yang Lit Fang Method and system for data offloading in mobile communications
US20130311778A1 (en) * 2012-05-16 2013-11-21 Cisco Technology, Inc. System and method for secure cloud service delivery with prioritized services in a network environment
US20130324104A1 (en) * 2012-06-01 2013-12-05 At&T Intellectual Property I, L.P. Traffic backfilling
US20140031029A1 (en) * 2012-07-20 2014-01-30 Tekelec, Inc. Methods, systems and computer readable media for distributing policy rules to the mobile edge
US8743696B2 (en) * 2009-08-07 2014-06-03 Cisco Technology, Inc. Mobile transport solution for offloading to an alternate network
US8750123B1 (en) * 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
US20140341109A1 (en) * 2011-06-02 2014-11-20 Interdigital Patent Holdings, Inc. Methods, Apparatus and Systems for Managing Converged Gateway Communications
US9001787B1 (en) * 2011-09-20 2015-04-07 Trilliant Networks Inc. System and method for implementing handover of a hybrid communications module
US20150215816A1 (en) * 2012-08-14 2015-07-30 Ahmed Abou-Elkheir System and method for efficient use of network bandwidth based on user profiles and other data
US9110661B2 (en) * 2012-12-28 2015-08-18 International Business Machines Corporation Mobile device offloading task to a peer device and receiving a completed task when energy level is below a threshold level
US9232434B2 (en) * 2012-11-07 2016-01-05 Futurewei Technologies, Inc. System and method for WiFi offload
US9325621B1 (en) * 2013-11-27 2016-04-26 Sprint Communications Company L.P. Wireless device offload

Family Cites Families (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5426674A (en) 1990-02-06 1995-06-20 Nemirovsky; Paul Method and computer system for selecting and evaluating data routes and arranging a distributed data communication network
US6396816B1 (en) * 1994-12-20 2002-05-28 Intel Corporation Method and apparatus for multiple applications on a single ISDN line
US7054938B2 (en) 2000-02-10 2006-05-30 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for network service reservations over wireless access networks
US7043225B1 (en) * 2000-02-25 2006-05-09 Cisco Technology, Inc. Method and system for brokering bandwidth in a wireless communications network
ATE480958T1 (en) * 2001-04-18 2010-09-15 Ibm METHOD AND APPARATUS FOR CALCULATING A PRICE FOR THE USE OF A SPECIFIC CONNECTION IN A NETWORK
AU2003230389A1 (en) 2002-05-13 2003-11-11 Thomson Licensing S.A. Seamless public wireless local area network user authentication
US7636324B2 (en) 2003-02-25 2009-12-22 Ayman Esam Nassar System and method for automated provisioning of inter-provider internet protocol telecommunication services
US7756042B2 (en) * 2003-02-26 2010-07-13 Alcatel-Lucent Usa Inc. Bandwidth guaranteed provisioning in network-based mobile virtual private network (VPN) services
US7620027B2 (en) 2003-03-14 2009-11-17 Canon Kabushiki Kaisha Communication system, information processing device, connection device, and connection device designation method for designating connection device for communication device to connect to
US7257560B2 (en) 2003-07-31 2007-08-14 Cisco Technology, Inc. Cost minimization of services provided by multiple service providers
US7366509B2 (en) 2004-03-18 2008-04-29 Utstarcom, Inc. Method and system for identifying an access point into a wireless network
US20060031444A1 (en) * 2004-05-28 2006-02-09 Drew Julie W Method for assigning network resources to applications for optimizing performance goals
US7590589B2 (en) 2004-09-10 2009-09-15 Hoffberg Steven M Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference
US7627510B2 (en) * 2005-03-23 2009-12-01 The Regents Of The University Of California System and method for conducting combinatorial exchanges
US20070026866A1 (en) * 2005-05-27 2007-02-01 Govindarajan Krishnamurthi Mobile node, method and computer program product for handing off from one type of network to another type of network
US8644828B2 (en) * 2007-02-05 2014-02-04 Wefi Inc. Method and system for selecting a wireless network
CN101141782B (en) 2006-09-07 2012-08-29 日电(中国)有限公司 Access point auxiliary fast handover method, equipment and system
EP2118845A4 (en) 2007-03-06 2015-04-08 Spectrum Bridge Inc System and method for spectrum management
US20080279147A1 (en) 2007-05-08 2008-11-13 Microsoft Corporation Spectrum auction and sharing on wireless clients
CN101374336B (en) * 2007-08-23 2013-04-24 华为技术有限公司 System, apparatus and method for updating user equipment position
EP2245901A2 (en) 2008-02-20 2010-11-03 Microchip Technology Incorporated Wireless access point device
US7778893B2 (en) 2008-05-21 2010-08-17 At&T Intellectual Property Ii, L.P. Access network optimization methodology for leased switched and dedicated facilities
US8635335B2 (en) * 2009-01-28 2014-01-21 Headwater Partners I Llc System and method for wireless network offloading
US8639239B2 (en) 2008-09-22 2014-01-28 Sharp Kabushiki Kaisha Base station apparatus, mobile station apparatus, mobile communication system and communication method having selectable inter-frequency measurement methods
US8990397B2 (en) 2009-07-31 2015-03-24 Ntt Docomo, Inc. Resource allocation protocol for a virtualized infrastructure with reliability guarantees
CN102714871A (en) * 2010-01-22 2012-10-03 西门子公司 Method for associating time slots with links between network nodes of a wireless interconnected network
US8570993B2 (en) * 2010-05-20 2013-10-29 At&T Mobility Ii Llc Wi-Fi intelligent selection engine
US8812001B2 (en) 2010-05-25 2014-08-19 Electronics And Telecommunications Research Institute Dual mode terminal for supporting access in different network, network apparatus and operation method thereof
WO2011161896A1 (en) * 2010-06-21 2011-12-29 パナソニック株式会社 Wireless communication apparatus, allocated resource notifying method and data allocating method
US9088989B2 (en) * 2010-07-15 2015-07-21 Rivada Networks, Llc Methods and systems for managing dynamic spectrum arbitrage based on usage of network resources
US8711721B2 (en) * 2010-07-15 2014-04-29 Rivada Networks Llc Methods and systems for dynamic spectrum arbitrage
US8635269B2 (en) 2011-05-27 2014-01-21 General Electric Company Systems and methods to provide access to a network
CN102918922B (en) * 2011-05-31 2016-12-07 华为技术有限公司 Data transmission method, separation point device, subscriber equipment and system
US8495714B2 (en) 2011-07-20 2013-07-23 Bridgewater Systems Corp. Systems and methods for authenticating users accessing unsecured wifi access points
EP3544219A1 (en) * 2011-08-12 2019-09-25 InterDigital Patent Holdings, Inc. Flexible bandwidth operation in wireless systems
US8797875B2 (en) 2011-09-16 2014-08-05 Telefonaktiebolaget Lm Ericsson (Publ) Policy controlled offloading among neighboring networks
US8966601B2 (en) 2011-09-23 2015-02-24 Hewlett-Packard Development Company, L.P. Connection of peripheral devices to wireless networks
WO2013044958A1 (en) 2011-09-29 2013-04-04 Nokia Siemens Networks Oy Dynamically extending mobile coverage and capacity by offloading
WO2013078408A1 (en) 2011-11-25 2013-05-30 Bandwidthx Inc. System for providing intelligent network access selection for a mobile wireless device
US8732801B2 (en) 2011-12-09 2014-05-20 Verizon Patent And Licensing Inc. Wireless connection method and device
KR101645524B1 (en) * 2012-02-25 2016-08-04 인텔 코포레이션 Method and apparatus for managing dynamic sharing of spectrum services
US9532269B2 (en) * 2012-04-11 2016-12-27 Broadcom Corporation Method and apparatus for offloading data
US9066251B2 (en) 2012-08-06 2015-06-23 Wildfire.Exchange, Inc. Global and local optimization of Wi-Fi access points
WO2014112468A1 (en) 2013-01-18 2014-07-24 京セラ株式会社 Communication control method, cellular base station and user terminal
US20140295825A1 (en) 2013-03-29 2014-10-02 Acer Incorporated Network diversity based error reporting method and user equipment using the same
EP3028404A1 (en) 2013-08-02 2016-06-08 Nokia Solutions and Networks Oy Methods and apparatuses for load balancing in a self-organising network
WO2015042189A1 (en) 2013-09-17 2015-03-26 Interdigital Patent Holdings, Inc. Connectivity augmented services architecture, discovery and connection
EP3148258B1 (en) * 2014-05-23 2019-10-02 Huawei Technologies Co., Ltd. Neighboring cell configuring method, neighboring cell information reporting method, apparatus and device
US9538441B2 (en) * 2014-12-18 2017-01-03 At&T Mobility Ii Llc System and method for offload of wireless network
US10264457B2 (en) 2015-03-30 2019-04-16 Lenovo (Singapore) Pte. Ltd. Wireless network access for social network connections
KR20170109466A (en) * 2016-03-21 2017-09-29 삼성전자주식회사 Method and Apparatus for providing Smart Network Connection Management

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100145161A1 (en) * 2008-10-03 2010-06-10 Dusit Niyato System and method for remote and mobile patient monitoring service using heterogeneous wireless access networks
US8743696B2 (en) * 2009-08-07 2014-06-03 Cisco Technology, Inc. Mobile transport solution for offloading to an alternate network
US20120230191A1 (en) * 2011-03-08 2012-09-13 Yang Lit Fang Method and system for data offloading in mobile communications
US20140341109A1 (en) * 2011-06-02 2014-11-20 Interdigital Patent Holdings, Inc. Methods, Apparatus and Systems for Managing Converged Gateway Communications
US9001787B1 (en) * 2011-09-20 2015-04-07 Trilliant Networks Inc. System and method for implementing handover of a hybrid communications module
US20130311778A1 (en) * 2012-05-16 2013-11-21 Cisco Technology, Inc. System and method for secure cloud service delivery with prioritized services in a network environment
US20130324104A1 (en) * 2012-06-01 2013-12-05 At&T Intellectual Property I, L.P. Traffic backfilling
US20140031029A1 (en) * 2012-07-20 2014-01-30 Tekelec, Inc. Methods, systems and computer readable media for distributing policy rules to the mobile edge
US20150215816A1 (en) * 2012-08-14 2015-07-30 Ahmed Abou-Elkheir System and method for efficient use of network bandwidth based on user profiles and other data
US9232434B2 (en) * 2012-11-07 2016-01-05 Futurewei Technologies, Inc. System and method for WiFi offload
US9110661B2 (en) * 2012-12-28 2015-08-18 International Business Machines Corporation Mobile device offloading task to a peer device and receiving a completed task when energy level is below a threshold level
US8750123B1 (en) * 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
US9325621B1 (en) * 2013-11-27 2016-04-26 Sprint Communications Company L.P. Wireless device offload

Also Published As

Publication number Publication date
US10009481B2 (en) 2018-06-26
WO2015103322A1 (en) 2015-07-09
US9781277B2 (en) 2017-10-03
US9900445B2 (en) 2018-02-20
WO2015103323A1 (en) 2015-07-09
EP3090510A4 (en) 2017-11-29
WO2015103393A1 (en) 2015-07-09
US20150189569A1 (en) 2015-07-02
CN106416348A (en) 2017-02-15
EP3090590A4 (en) 2017-08-23
US20150189580A1 (en) 2015-07-02
US10129413B2 (en) 2018-11-13
CN105917696A (en) 2016-08-31
EP3090590B1 (en) 2018-09-19
CN106416138A (en) 2017-02-15
US20180146100A1 (en) 2018-05-24
US9549082B2 (en) 2017-01-17
EP3090510A1 (en) 2016-11-09
US20150189098A1 (en) 2015-07-02
EP3090591A1 (en) 2016-11-09
US20170366681A1 (en) 2017-12-21
EP3090590A1 (en) 2016-11-09
EP3090591A4 (en) 2017-11-29

Similar Documents

Publication Publication Date Title
US9549082B2 (en) Systems and methods for managing offload from one radio access network to another
Ding et al. Enabling energy-aware collaborative mobile data offloading for smartphones
US9756529B2 (en) Method and system for wireless networking using coordinated dynamic spectrum access
US8644828B2 (en) Method and system for selecting a wireless network
US8543121B2 (en) Systems and methods for usage-based radio resource management of self-optimizing cells
EP2813104B1 (en) Full and partial resource access in ran sharing
US8676211B2 (en) Systems and methods for selective communications network access
EP2643996B1 (en) Automatic remote access to ieee 802.11 networks
US11856411B2 (en) Method and apparatus for determining spectrum availability and allocating spectrum in a spectrum controlled network
US20080039089A1 (en) System and Method for Providing Dynamically Configurable Wireless Communication Network
US20210282021A1 (en) Method and Apparatus for Handling Channel Termination Orders in a Spectrum Controlled Network
US8264978B1 (en) System and method for operating a wireless communication system to process packet payloads to determine RF signal adjustments
US8478272B2 (en) Systems and methods for real time allocation of bandwidth at a femtocell
Rahman et al. Proof of sharing in inter-operator spectrum sharing markets
US9591562B2 (en) Provisioning access point bandwidth based on predetermined events
US20210385665A1 (en) Method and Apparatus for Pre-Registering and Deploying Base Stations/Access Points in a Private Network
WO2021008270A1 (en) Data processing method, apparatus and system
US20170142638A1 (en) Access point for facilitating connection of one or more wireless user devices to a communications channel
KR101429955B1 (en) Method and apparatus for providing cloud storage service, cloud stroage service server
CA2931856C (en) System and method for wireless user equipment access
Baftiu et al. Business Efficiency in Implementation of Wi-Fi Data Offloading Technique in Mobile Networks
US20170215077A1 (en) Wireless access system
KR101065477B1 (en) System for renting resource in in a wireless communication system
US20240114352A1 (en) Domain Proxy Channel Reallocation Feature
Wang et al. Wigroup: A lightweight cellular-assisted device-to-device network formation framework

Legal Events

Date Code Title Description
AS Assignment

Owner name: BANDWIDTHX INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VISURI, PERTTI JUHANI;SALO, RANDY;VAN HAMERSVELD, CHRISTIAN;AND OTHERS;SIGNING DATES FROM 20150126 TO 20150209;REEL/FRAME:041836/0742

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION