Selection of a radio access technology resource based on radio access technology resource historical information

ABSTRACT

The disclosed subject matter provides for selecting a radio access technology resource based on historical data related to the radio access technology resource. Location information can be employed to determine a radio access technology resource. Historical information related to the radio access technology resource can then be employed to determine the suitability of the radio access technology resource. A set of radio access technology resources can be ordered or ranked to allow selection of a suitable radio access technology resource from the set. Incorporation of historical information can provide for additional metrics in the selection of a radio access technology resource over simple contemporaneous radio access technology resource information. In some embodiments timed fingerprint location (TFL) information can be employed to determine a location.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of, and claims priority to, U.S.patent application Ser. No. 13/188,300 (now U.S. Pat. No. 8,897,802),filed on 21 Jul. 2011, and entitled “SELECTION OF A RADIO ACCESSTECHNOLOGY RESOURCE BASED ON RADIO ACCESS TECHNOLOGY RESOURCE HISTORICALINFORMATION,” the entirety of which is incorporated herein by reference.

TECHNICAL FIELD

The disclosed subject matter relates to selection of bearer resourcetechnologies and, more particularly, to bearer resource technologyselection through analysis of historical data associated with a bearertechnology resource.

BACKGROUND

Conventionally, radio access technology (RAT) selection for userequipment (UE) can be based on the detection of an available RATresource. RAT resources can be represented by different communicationstechnologies as contrasted with radio access bearer resources which canbe different communications channels that can employ the same radioaccess technology. For example, a radio access bearer resource can be afirst or second channel on Universal Mobile Telecommunications System(UMTS) radio access technology, while in contrast a radio accesstechnology can be a UMTS technology, a Wi-Fi technology (e.g., IEEE802.11 standard), a TDMS technology, etc. Radio access bearer handovercan occur in conjunction with RAT selection such that connecting to anew bearer can additionally occur on a different radio accesstechnology. RAT selection can thus be characterized by UEs scanning foravailable RAT resources. Scanning for RAT resources can require thatcorresponding radios in a UE be active to determine the presence of aRAT. Having a radio active in a UE can affect power consumption, andthus battery life, in a UE.

The conventional RAT selection process is also typically ignorant ofhistorical information related to a RAT that can illuminate particularcharacteristics of potential RATs. For example, a UE can be activelyscanning for a Bluetooth technology throughout the day, reducing thebattery life of the UE, and can detect an available Bluetooth technologyresource. The UE can then select the Bluetooth technology and beginconnecting to the Bluetooth resource ignorant of historical informationassociated with the Bluetooth resource as being, for example, associatedwith particularly high radio interference that impedes effective use ofthe resource, the resource being associated with packet sniffingsecurity intrusions experience by other users of the resource, etc.

The above-described deficiencies of conventional selection or RATresources are merely intended to provide an overview of some of problemsof current technology, and are not intended to be exhaustive. Otherproblems with the state of the art, and corresponding benefits of someof the various non-limiting embodiments described herein, may becomefurther apparent upon review of the following detailed description.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is an illustration of a system that facilitates selection of aradio access technology resource based on historic information relatedto the radio access technology resource in accordance with aspects ofthe subject disclosure.

FIG. 2 is a depiction of a system that facilitates selection of a radioaccess technology resource based on historic information related to theradio access technology resource in accordance with aspects of thesubject disclosure.

FIG. 3 illustrates a system that facilitates selection of a radio accesstechnology resource based on historic information related to the radioaccess technology resource in accordance with aspects of the subjectdisclosure.

FIG. 4 is a depiction of a system that facilitates selection of a radioaccess technology resource based on historic information related to theradio access technology resource by employing timed fingerprint locationinformation in accordance with aspects of the subject disclosure.

FIG. 5 illustrates a non-limiting exemplary system facilitatingselection of a radio access technology resource based on historicinformation related to the radio access technology resource by employingtimed fingerprint location information in accordance with aspects of thesubject disclosure.

FIG. 6 illustrates a method facilitating selection of a radio accesstechnology resource based on historic information related to the radioaccess technology resource in accordance with aspects of the subjectdisclosure.

FIG. 7 illustrates a method for facilitating selection of a radio accesstechnology resource based on historic information related to the radioaccess technology resource in accordance with aspects of the subjectdisclosure.

FIG. 8 illustrates a method for facilitating selection of a radio accesstechnology resource based on historic information related to the radioaccess technology resource by employing timed fingerprint locationinformation in accordance with aspects of the subject disclosure.

FIG. 9 is a block diagram of an exemplary embodiment of a mobile networkplatform to implement and exploit various features or aspects of thesubject disclosure.

FIG. 10 illustrates a block diagram of an exemplary embodiment of anaccess point to implement and exploit one or more features or aspects ofthe subject disclosure.

FIG. 11 illustrates a block diagram of a computing system operable toexecute the disclosed systems and methods in accordance with anembodiment.

DETAILED DESCRIPTION

In contrast to conventional radio access technology (RAT) resourceselection techniques or systems, the presently disclosed subjectillustrates selection of a radio access technology resource based onhistoric information related to the radio access technology resource.Thus, wherein conventional RAT selection is typically ignorant ofnon-contemporaneous parameters, the disclosed subject matter canincorporate the history of a RAT resource in determining if that RATresource is to be selected. For example, where two RAT resources areavailable for RAT selection, historical information for both RATresources can be employed in the selection process according to thepresently disclosed subject matter. As such, continuing this example,where historical information indicates that prior selection of the firstof the two RAT resources frequently is followed by a loss of connectionwith the UE, and no such history is indicated for the second of the twoRAT resources, the historical information can influence the RAT resourceselection process such that the second RAT resource can be selected. Ofnote, the instant disclosure includes multiple RAT (mRAT) resourceselection as a subset of RAT resource selection, such that selection ofmore than one RAT resource during RAT selection is within the scope ofthe present disclosure for selection of a RAT resource.

A radio access technology resource, can be a radio connection technologybetween a UE and a Radio Network Controller (RNC) or other Access Point(AP), such as a femto-cell, 802.11 radio, etc. For example, RATs caninclude, but are not limited to, broadcast technologies (e.g., sub-Hz,ELF, VLF, LF, MF, HF, VHF, UHF, SHF, THz broadcasts, etc.); femto-celltechnology; Wi-Fi; Worldwide Interoperability for Microwave Access(WiMAX); Enhanced General Packet Radio Service (Enhanced GPRS); ThirdGeneration Partnership Project (3GPP or 3G) Long Term Evolution (LTE);3GPP Universal Mobile Telecommunications System (UMTS) or 3GPP UMTS;Third Generation Partnership Project 2 (3GPP2) Ultra Mobile Broadband(UMB); High Speed Packet Access (HSPA); High Speed Downlink PacketAccess (HSDPA); High Speed Uplink Packet Access (HSUPA); GSM EnhancedData Rates for GSM Evolution (EDGE) Radio Access Network (RAN) or GERAN;UMTS Terrestrial Radio Access Network (UTRAN); or LTE Advanced, etc. Ofnote, the instant disclosure expressly includes RAT resources paralleledin other current and/or future radio standards, particularly whererelated to communications with mobile devices.

Often, RAT characteristics (e.g., data rates, Quality of Service (QoS),etc.) can set by a wireless network provider or resource administrator,e.g., based on subscription parameters or requirements of mediaemploying the RAT. The RAT configuration can influence RAT resourceusage. For example, a RAT resource requiring credentials to access theresource, e.g., a password protected Wi-Fi access point or a MAC addressfiltered femto-cell, can be unusable by non-credentialed UEs and, assuch, should be ignored by non-credentialed UEs. As a second example, aNodeB can provide a RAT resource which can have bandwidth limits forstreaming media, these limits set by a carrier owner. These bandwidthlimits can be considered in determining the selection of the RATresource by a UE in accordance with the present disclosure.

In an aspect, location information for a UE can be employed tofacilitate access to historic information related to RAT resources.Historical information can expressly include correlation of a RATresource to a location. Historical information can further includehistorical performance information for a RAT resource or otherhistorical information associated with the RAT resource. For example,historic information for a period of time can be accessed for a locationto indicate the potential presence of a RAT resource based on thehistorical presence of the RAT resource in the location. The historicalinformation can be historical information from one or more UEs, e.g., asingle UE history or the agglomerated history of multiple UEs. Further,historical information can be based on non-UE sources, such as awireless carrier explicitly designating a location for a RAT resource ina RAT historical information database, etc. Location information can bebased on nearly any form of location technology, including, globalpositioning system (GPS), enhanced GPS (eGPS), triangulation,multilateration, proximity sensing, timed fingerprint location (TFL, asdisclosed more fully in the application incorporated herein byreference), inertial sensing, dead reckoning, etc.

The subject disclosure is now described with reference to the drawings,wherein like reference numerals are used to refer to like elementsthroughout. In the following description, for purposes of explanation,numerous specific details are set forth in order to provide a thoroughunderstanding of the subject disclosure. It may be evident, however,that the subject disclosure may be practiced without these specificdetails. In other instances, well-known structures and devices are shownin block diagram form in order to facilitate describing the subjectdisclosure.

Various embodiments relate to selecting a radio access technologyresource. In one example embodiment, a system comprises a locationdetermination component to determine a location, the locationfacilitating receiving historical information related to a radio accesstechnology resource associated with the location. The exemplary systemfurther comprises a radio access technology analysis component todesignate a value to a radio access technology resource. This value canbe designated based on the radio access technology resource satisfying apredetermined condition relating to the historical information. Thedesignated value can be employed to rank or order radio accesstechnology resources.

In another example embodiment, a method comprises receiving locationinformation for a user equipment. The example method further comprisesselecting a radio access technology resource from a radio accesstechnology resource covering the location. The selection can be based onhistorical information associated with the radio access technologyresource.

In another example embodiment, a computing device comprises a processconfigured to receive location information for a user equipment. Theprocessor can further process the location information to determinehistorical information related to a radio access technology resource.Moreover, the processor can be configured to designate a value to theradio access technology resource based on the historical informationsatisfying a predetermined condition. The designated value can beemployed to select a radio access technology resource.

To the accomplishment of the foregoing and related ends, the disclosedsubject matter, then, comprises one or more of the features hereinaftermore fully described. The following description and the annexed drawingsset forth in detail certain illustrative aspects of the subject matter.However, these aspects are indicative of but a few of the various waysin which the principles of the subject matter can be employed. Otheraspects, advantages, and novel features of the disclosed subject matterwill become apparent from the following detailed description whenconsidered in conjunction with the drawings.

FIG. 1 is an illustration of a system 100, which facilitates selectionof a radio access technology resource based on historic informationrelated to the radio access technology resource in accordance withaspects of the subject disclosure. System 100 can include locationdetermination component 110. Location determination component 110 canfacilitate access to location information. Location information can bebased on nearly any form of location technology, including, GPS,enhanced GPS (eGPS), triangulation, multilateration, proximity sensing,TFL, inertial sensing, etc. For example, a location can be determinedfrom a GPS component of a UE. As a second example, a TFL component of aUE can provide a location.

System 100 can further include radio access technology (RAT) analysiscomponent 120. RAT analysis component 120 can be communicatively coupledto location determination component 110. RAT analysis component 120 canfacilitate the analysis of one or more RAT resources. In an aspect, aRAT resource can be analyzed based on location information, e.g.,location information from location determination component 110. Forexample, a location can be determined by location determinationcomponent 110. This location can be correlated with a RAT resource. RATanalysis component 120 can analyze the RAT resource correlated with thelocation determined by location determination component 110. Continuingthe present example, the analysis can include the determination of thecontemporaneous characteristics (e.g., bandwidth, QoS, etc.) of thecorrelated RAT resource and historical information related to the RATresource. Historical information related to the RAT resource can benearly any type of data and can include, historical characteristicinformation, historical performance information, historical repairinformation, historical performance of devices bound to the RATresource, e.g., performance of a channel on the RAT resource, etc., ornearly any other type of information cataloged and correlated with theRAT resource.

RAT analysis component 120 can determine what RAT resources can beavailable for a location given the historical availability of RATresources in the location. This can allow a UE to predetermine whichradios can be turned on to scan for a RAT resource in an area and canresult in longer battery life between charges. Where a UE can have aradio turned off, power does not need to be expended on that radio whilethe radio is off. As such, where RAT analysis component 120 indicatesthat a RAT resource has historically been available in the location, andthe RAT is satisfies predetermined selection conditions, the UE can turnon the appropriate radio to scan for the RAT resource and attempt toconnect to the selection. This allows the UE to turn the radio on afterthe RAT analysis component 120 predetermines a likelihood of the RATresource being suitable and/or available in the location. Where a UE caninclude a plurality of radios, the battery saving effect of‘anticipating the availability of a RAT resource’, e.g., keeping a radiooff until a likely resource is available, can be even more beneficial.

RAT analysis component 120 can analyze a RAT resource to facilitatedetermining the suitability of selecting a RAT resource. RAT selectionevents, including selecting mRATs, can include determining thesuitability of a radio access technology to bear data. Typically,selection of a RAT can include determining satisfactory levels ofavailability, accessibility, bandwidth, quality, etc. As such,consideration of these contemporaneous characteristics of a RAT resourcecan be included in analysis of a RAT resource. However, historicalinformation can also be employed in the analysis. As such, even where aRAT resource can satisfy contemporaneous characteristics for selectionof a RAT, where the past performance of the RAT resource indicates otherparameters, the RAT resource can be determined to be more or lesssuitable than other RAT resources. For example, where a first RATresource historically has higher throughput than a second RAT resource,the first RAT resource can be selected as the more suitable. However,where historic performance of the first RAT resource indicates that dataconnections are frequently lost, this factor can be considered in ananalysis by RAT analysis component 120, such that the second RATresource is ranked as more suitable that the first RAT resource despitehaving historically lower throughput.

As a non-limiting example, assume that bandwidth from a WiFi accesspoint connection are much higher than for an 800 MHz cellularconnection. A subscriber with a data connection on a UE can allow the UEto select a RAT for continued data transmission. Further, assume theWiFi connection is historically associated with frequent radiointerference. Analysis of the WiFi with higher bandwidth and historicinterference against the lower bandwidth cellular connection can beconducted. Selection of the WiFi RAT can be effected where, for example,the data transmission is tolerant of connectivity faults, e.g.,resending lost packets for intermittent interruption of the RF link canbe more easily tolerated for downloading web pages than for streamingvideo or voice over internet protocol (VoIP). In contrast, the lowerbandwidth cellular connection can be selected where more reliablecommunications at a slower rate are more tolerable than faster butintermittent service. As such, selection of a RAT resource RAT analysiscomponent 120 can benefit from access to historical information relatedto the RAT resources as compared to simply selecting a RAT based oncontemporaneous information.

In an embodiment, RAT analysis component 120 can also take into accountthe classifications of data for transmission. Data classification caninclude, for example, voice classification, data classification, VoIPdata classification, streaming data classification, etc., whichclassifications can be considered in determinations of risk related todata loss. For example, loss of voice data can be ranked as lessacceptable than loss of streaming data class or data in a buffered datastream class, etc. Analysis of RAT resources, by RAT analysis component120, to weigh the risks of, for example, a voice or data session failingduring handover against, for example, not selecting a RAT resource toprevent the handover associated with corresponding buffering or loss ofdata can be performed. Where RAT resources can be associated with somepotential for data loss, the historical information for a RAT resourcecan provide for quantification of said data loss potential. As such,historical information related to RAT resources can be employed inbalancing acceptable data loss parameters against selection of a RATresource for a potential handover event.

In some embodiments, RAT analysis component 120 can employ one or morerules in analyzing a RAT resource. A rule can be an algorithm or otherlogic employed in analysis of a RAT resource, such as selecting a RATresource from a set of RAT resources. As a non-limiting example, a rulecan be employed to rank or order a set of RAT resources such that asubset of the RAT resources includes RAT resources ranked or ordered by,for instance, reliability, risk of data loss, bandwidth, success ofaccess, sustainability of access, QoS, etc. Thus, a RAT resource can beanalyzed and ranked based on both a contemporaneous characteristicand/or historical information associated with the RAT resource. Rankedsubsets of RAT resources can facilitate selection of a RAT resource,e.g., selection of the highest ranked RAT resource. For example, a RATresource with a history of sustained accessibility, e.g., a connectionthat remains stable for at least a predetermined period of time, can beselected where it is ranked higher than a RAT resource indicating ahistory of less sustained access. It is noteworthy that a nearlylimitless number of other exemplary permutations can be presented toillustrate the benefits of analysis of historical information associatedwith RAT resources in the selection of a RAT resource, but furtherenumeration of examples are truncated simply for brevity and clarity,though all other permutations are to be considered within the scope ofthe present disclosure.

FIG. 2 is a depiction of a system 200 that can facilitate selection of aradio access technology resource based on historic information relatedto the radio access technology resource in accordance with aspects ofthe subject disclosure. System 200 can include location determinationcomponent 210. Location determination component 210 can facilitateaccess to location information. Location information can be based onnearly any form of location technology, including, GPS, enhanced GPS(eGPS), triangulation, multilateration, proximity sensing, TFL, inertialsensing, etc.

System 200 can further include RAT analysis component 220. RAT analysiscomponent 220 can be communicatively coupled to location determinationcomponent 210. RAT analysis component 220 can facilitate the analysis ofone or more RAT resources. In an aspect, a RAT resource can be analyzedbased on location information, e.g., location information from locationdetermination component 210. Further, RAT analysis component 220 cananalyze contemporaneous information related to a RAT, historicalinformation related to a RAT resource, or combinations thereof. RATanalysis component 220 can include decision engine component 230.

Decision engine component 230 of system 200 can facilitate formingdeterminations relating to RAT resources. Determinations can includeanticipating the availability of a RAT resource, selection of a RATresource, ranking RAT resources, designating that a suitable RATresource is not available, or combinations thereof. For example, wherelocation information is employed to receive information relating to aplurality of RAT resources for a given region, said RAT resources can beranked in order of highest to lowest suitability for a RAT resource fora particular data class, ranked in order of longest to shortesthistorically sustained access, e.g., ranking which RAT, in the past,resulted in the most sustained data connections and which resulted inpoorest data connections that dropped quickly, designation of a specificRAT resource from the plurality that is the most suitable for a datastream, designation that no RAT resource from the plurality isappropriate, etc.

In an aspect, decision engine component 230 can include rule component240 to facilitate forming determinations related to a RAT resource. Rulecomponent 240 can facilitate employing one or more rules, such as rulesfor selecting a RAT resource, ranking a RAT resource, rules forincluding a RAT resource in a subset of RAT resources, etc. In anembodiment, rule component 240 can be a rule engine that allows theapplication of logical determinations to be embodied in one or morealgorithms related to the analysis of a RAT resource. As a non-limitingexample, rule component 240 can generate a rule that alters a ranking ofa RAT resource based on a historical information related to the RATresource, such as increasing a ranking score where the RAT resourcehistorically is associated with highly sustained access or decreasing aranking score where the RAT resource historically is associated withinterrupted data connections. As a second non-limiting example, rulecomponent 240 can generate a rule that alters a ranking of a RATresource based on a historical information related to the RAT resource,such as conditionally decrementing a ranking during a peak usage periodbased on historic overload of said RAT resource during peak usage hours,e.g., where the RAT resource historically is overloaded and the use ofsaid RAT resource can be associated with lower levels of bearerfunctionality during the peak period.

In other embodiments, rule component 240 can directly applypredetermined rules to selection of a RAT resource. For example, rulecomponent 240 can apply a location-forecasting rule that projects thefuture location of a UE based on the present or historic locationinformation associated with the UE. The exemplary location-forecastingrule can, for instance, indicate that a UE will be at a certain locationat a certain time based on the current location and rate of speed of theUE based on the present location of the UE and the recent historicallocations of the UE. More specifically, in this non-limiting example,where a UE is determined to be traveling at 60 miles per hour (MPH)along a freeway and is further determined to be 1 mile from the nextexit ramp along that freeway, a forecast can be determined that the UEwill be at or near the next exit in 60 seconds. In contrast, where theUE is determined to be at the same location but only traveling at 40MPH, the forecast time to the next exit ramp could be computed asbetween 90 seconds. Where a RAT resource is associated with the futurelocation, e.g., anticipated to be available at or near the next exit,the forecast location of the UE can be valuable in proactively selectinga RAT resource and timing when the appropriate radio in the UE should beturned on to scan for the anticipated RAT resource. Continuing theexample, where the UE is traveling at 60 MPH, it can be determined thatturning on a UE radio after 90 seconds is excessive (the UE may havepassed the RAT resource) while waiting 45 seconds is not (the UE wouldlikely still be approaching the RAT resource). In contrast, where the UEis traveling at 40 MPH, turning on the radio at 45 seconds can wastevaluable battery life and it can be determined to wait 75 seconds beforeturning on the radio to scan for the RAT resource. Further explicitexamples are not provided for brevity but all such examples are to beconsidered within the scope of the present disclosure.

System 200 can further include RAT historic information component 250.RAT historic information component 250 can facilitate receivinghistorical information related to a RAT resource. RAT historicinformation component 250 can include local, remote, or distributed datastores including RAT resource data and other historical informationrelated to a RAT resource. For example, RAT historic informationcomponent 250 can facilitate access to historic RAT resourcecharacteristic information, e.g., bandwidth, QoS, power levels foruplink and downlink, min/max/average data channel link times, etc. As asecond example, RAT historic information component 250 can facilitateaccess to data relating to a RAT resource, such as, locations correlatedwith access to the RAT resource, prior ranking of the RAT resource,proximity of a RAT resource to other RAT resources, maintenance recordsfor systems supporting the RAT resource, etc. RAT historic informationcomponent 250 can be communicatively coupled to decision enginecomponent 230 of RAT analysis component 220 to facilitate the selectionof a RAT resource based on historical information related to the RATresource.

FIG. 3 illustrates a system 300 that facilitates selection of a radioaccess technology resource based on historic information related to theradio access technology resource in accordance with aspects of thesubject disclosure. System 300 can include location determinationcomponent 310. Location determination component 310 can facilitateaccess to location information. Location determination component 310 canbe communicatively coupled to RAT analysis component 320. RAT analysiscomponent 320 can facilitate the analysis of one or more RAT resources.In an aspect, a RAT resource can be analyzed based on locationinformation, e.g., location information from location determinationcomponent 310. Further, RAT analysis component 320 can analyzecontemporaneous information related to a RAT, historical informationrelated to a RAT resource, or combinations thereof.

RAT analysis component 320 can include decision engine component 330that can facilitate forming determinations relating to RAT resources.Decision engine component 330 can include rule component 340 tofacilitate forming determinations related to a RAT resource. Further,decision engine 330 can be communicatively coupled to RAT historicinformation component 350. RAT historic information component 350 canfacilitate receiving historical information related to a RAT resource.RAT historic information component 350 can include local, remote, ordistributed data stores including RAT resource data and other historicalinformation related to a RAT resource.

System 300 can further include RAT condition component 360. RATcondition component 360 can facilitate access to contemporaneousinformation related to a RAT resource. Contemporaneous informationrelated to a RAT resource can include contemporaneous informationrelated to a currently employed RAT resource, e.g., where a RAT resourceis being employed by a UE to transmit data, contemporaneous informationrelated to that RAT resource can be received by way of RAT conditioncomponent 360. Contemporaneous information related to a RAT resource canalso include contemporaneous information related to a RAT resource thatcan be potentially employed by a UE, e.g., where a RAT resource isavailable for use by a UE, contemporaneous information related to thatRAT resource can be received by way of RAT condition component 360. Inan aspect, RAT condition component 360 can function to gathercontemporaneous data, e.g., at a UE, rather than looking upcontemporaneous data. For example, contemporaneous data on a RATresourced can be accessed through RAT historic information component 350from other UEs in the area while RAT contemporaneous data can bemeasured and reported from the instant UE by RAT condition component360. RAT condition component 360 can function in conjunction withlocation determination component 310. In a further embodiment, locationcomponent 310 can determine a UE location, which location informationcan be received by RAT condition component 360. Based on the locationinformation, RAT condition component 360 can receive the presentcharacteristics of RAT resources in, or near, the determined location.For example, a determination that a UE is located at an office tower,can be received by RAT condition component 360, which, in turn, canaccess current RAT characteristics for RAT resources at, or near, theoffice tower. This can facilitate inclusion of contemporaneous aspectsof a RAT resource in selection of a RAT resource based on historicalinformation related to the RAT resource as facilitated by RAT analysiscomponent 320.

System 300 can also include RAT selection component 370. RAT selectioncomponent 370 can select a RAT based on the analysis of a RAT resourcefrom RAT analysis component 320. As such, in system 300, locationinformation can facilitate determining a RAT resource and both currentand past information relating to the RAT resource can be accessed andincluded in an analysis of the RAT resource. The analysis can, asdisclosed herein, relate to indication of a particular RAT resource, toranking or ordering of RAT resources, or to indication of no acceptableRAT resource. RAT selection component 370 can select a RAT resourcebased on the analysis, e.g., selecting a particular RAT resource,selection of a ranked RAT resource, or selection of no RAT resource.

FIG. 4 is a depiction of a system 400 that facilitates selection of aradio access bearer resource based on historic information related tothe radio access bearer resource by employing timed fingerprint locationinformation in accordance with aspects of the subject disclosure. System400 can include TFL location information component 410. TFL locationinformation component 410 can facilitate receiving TFL information. TFLlocation information component 410 can be communicatively coupled to RATanalysis component 420. RAT analysis component 420 can facilitate theanalysis of one or more RAT resources. In an aspect, a RAT resource canbe analyzed based on location information, e.g., location informationfrom TFL location information component 410. Further, RAT analysiscomponent 420 can analyze contemporaneous information related to a RAT,historical information related to a RAT resource, or combinationsthereof.

RAT analysis component 420 can include decision engine component 430that can facilitate forming determinations relating to RAT resources.Decision engine component 430 can include rule component 440 tofacilitate forming determinations related to a RAT resource. Further,decision engine 430 can be communicatively coupled to RAT historicinformation component 450. RAT historic information component 450 canfacilitate receiving historical information related to a RAT resource.RAT historic information component 450 can include local, remote, ordistributed data stores including RAT resource data and other historicalinformation related to a RAT resource.

In an aspect TFL location information component 410 can facilitateaccess to TFL information. TFL information can be a source of locationinformation for UEs. Moreover, TFL information can be employed atvarious levels of granularity. Further, TFL information can be employedwith little to no additional power consumption. TFL information canprovide advantages over GPS-type techniques, near field communicationtechniques, or proximity sensor techniques and is distinct from theseother forms of location determination.

TFL information can include location or timing information as disclosedin more detail in U.S. Ser. No. 12/712,424 filed Feb. 25, 2010, whichapplication is hereby incorporated by reference in its entirety. Assuch, TFL component 110 can facilitate access to location informationfor a UE and TFL information can be information from systems in a timedfingerprint location wireless environment, such as a TFL component of awireless telecommunications carrier. As a non-limiting example, a mobiledevice, including mobile devices not equipped with a GPS-type system,can be located by looking up timing information associated with themobile device from a TFL information reference.

In an aspect, TFL information can include information to determine adifferential value for a NodeB site pair and a bin grid frame, asdisclosed in more detail in incorporated U.S. Ser. No. 12/712,424. Acentroid region (possible locations between any site pair) for anobserved time value associated with any NodeB site pair (NBSP) can becalculated and is related to the determined value (in units of chip)from any pair of NodeBs. When UE time data is accessed, a value look-upcan be initiated (e.g., a lookup for “DV(?,X)” as disclosed in moredetail in the application incorporated herein by reference). RelevantNBSPs can be prioritized as part of the look-up. Further, the relevantpairs can be employed as an index to lookup a first primary set. As anexample, time data for a UE can be accessed in relation to a locatingevent in a TFL wireless carrier environment. In this example, it can bedetermined that a NBSP, with a first reference frame, be used forprimary set lookup with the computed DV(?,X) value as the index. Thiscan for example return a set of bin grid frame locations forming ahyperbola between the NodeBs of the NBSP. A second lookup can then beperformed for an additional relevant NBSP, with a second referenceframe, using the same value DV(?,X), as an index into the data set.Continuing the example, the returned set for the look up with secondNBSP can return a second set of bin grid frames. Thus, the UE is likelylocated in both sets of bin grid frames. Therefore, where the UE islikely in both sets, it is probable that the location for the UE is atan intersection of the two sets. Additional NBSPs can be included tofurther narrow the possible locations of the UE by providing additionalintersections among relevant bin grid sets. As such, employing TFLinformation for location determination is demonstrably different fromconventional location determination techniques or systems such as GPS,eGPS, triangulation or multilateration in wireless carrier environments,near field techniques, or proximity sensors.

As such, TFL location information component 410 can be employed todetermine a UE location and such location can be further employed indetermining RAT resources. Where the location of a UE is determined, theRAT resources for that area can be accessed based on historicalinformation including the presence of a RAT resource in a location. Assuch, contemporaneous and historical information relating to the RATresource near a location can be accessed and analyzed to determine ifthe RAT resource meets predetermined criteria for selection of the RATresource.

FIG. 5 illustrates a non-limiting exemplary system 500 facilitatingselection of a radio access technology resource based on historicinformation related to the radio access technology resource by employingtimed fingerprint location information in accordance with aspects of thesubject disclosure. System 500 can include UE 582 that can include TFLinformation component 510, RAT analysis component 520, and RAT selectioncomponent 570. TFL information component 510 can facilitate determiningthe location of UE 582 based on TFL information as disclosed herein. RATanalysis component 520 can facilitate analysis of a RAT resources basedon historical information related to the RAT resource as disclosedherein. RAT selection component 570 can facilitate selection of a RATresource based on the analysis of the RAT resource by RAT analysiscomponent 520, as disclosed herein. UE 582 can be traveling from T(0) toT(1) as illustrated.

System 500 can further include NodeBs 590, 592, and 594, and accesspoint 596. Each of these NodeBs and/or access point can facilitate acommunications link (e.g., RAT resource 591, 593, 595, and 597respectively) with UE 582 as illustrated. As such, at T(0), UE 582 canbe far enough from NodeB 590 that links on RAT 591 are weakening andaccess to another RAT resource is increasingly desirable to maintaincontinuity of data transmission. Of note, NodeB 592 and related RATresource 593 can be located too far from the area 584 around UE 582 atT(0) to effect a communicative coupling, as illustrated.

At T(1), TFL location information can be accessed at 510 to determinethe location of UE 582 at T(1). The location of UE 582 at T(1) can beemployed to anticipate the availability of RAT resource 595 and 597. Assuch, an analysis of the historical information related to each of RATresource 595 and 597 can be conducted to determine compliance with apredetermined condition. This historical information can be combinedwith contemporaneous information to generate a result of the analysis,e.g., a ranking of the RAT resources 595 and 597 by RAT analysiscomponent 520. At 570, RAT selection component 570 can cause a selectionof a RAT resource.

As an example, RAT resource 597 can be historically a very reliable andhigh bandwidth RAT resource. However, use of RAT 596 can require thattwo radios be turned on in UE 582 at T(1), e.g., a cellular radio foraccess of RAT 595 on NodeB 594 and a WiFi radio for access to RATresource 597 on access point 596. As such, the additional battery drainto run two radios can be considered as more significant than theincrease in bandwidth available to UE 582 at T(1). Therefore, RATselection component 570 can select RAT resource 595 for the lower powerconsumption and satisfactory bandwidth. However, where a high bandwidthneed arises on UE 582 at T(1), RAT selection component 570 can selectRAT 587 from access point 596 despite the increased battery consumptionto accommodate the higher bandwidth needs.

FIG. 5 is presented only to better illustrate some of the benefits ofthe presently disclosed subject matter and is explicitly not intended tolimit the scope of the disclosure to the various aspects particular tothe presently illustrated non-limiting example. In some embodiments, theuse of GPS or other location technology can be included as complimentaryto TFL information without departing from the scope of the presentdisclosure. It is noteworthy that GPS or other location information froma UE is not required to determine TFL information as disclosed in therelated application. Thus, even where legacy UEs, e.g., UEs without GPSor eGPS capabilities, are in system 500, the timing information fromthose legacy devices can be employed in TFL location informationdeterminations and similarly in selection of RAT resources based onhistorical information related to the RAT resources. This can beparticularly useful in regions that have limited distribution of GPSenabled UEs or where GPS functions poorly due to environmental factorssuch as urban cores, mountainous regions, etc.

In view of the example system(s) described above, example method(s) thatcan be implemented in accordance with the disclosed subject matter canbe better appreciated with reference to flowcharts in FIG. 6-FIG. 8. Forpurposes of simplicity of explanation, example methods disclosed hereinare presented and described as a series of acts; however, it is to beunderstood and appreciated that the claimed subject matter is notlimited by the order of acts, as some acts may occur in different ordersand/or concurrently with other acts from that shown and describedherein. For example, one or more example methods disclosed herein couldalternatively be represented as a series of interrelated states orevents, such as in a state diagram. Moreover, interaction diagram(s) mayrepresent methods in accordance with the disclosed subject matter whendisparate entities enact disparate portions of the methodologies.Furthermore, not all illustrated acts may be required to implement adescribed example method in accordance with the subject specification.Further yet, two or more of the disclosed example methods can beimplemented in combination with each other, to accomplish one or moreaspects herein described. It should be further appreciated that theexample methods disclosed throughout the subject specification arecapable of being stored on an article of manufacture (e.g., acomputer-readable medium) to allow transporting and transferring suchmethods to computers for execution, and thus implementation, by aprocessor or for storage in a memory.

FIG. 6 illustrates aspects of a method 600 facilitating selection of aradio access technology resource based on historic information relatedto the radio access technology resource in accordance with aspects ofthe subject disclosure. At 610, method 600 can receive locationinformation. Location information can be received from nearly any formof location technology, including, GPS, enhanced GPS (eGPS),triangulation, multilateration, proximity sensing, TFL, inertialsensing, etc. For example, location information can be received from aGPS component of a UE. As a second example, location information can bereceived from a TFL component.

In an aspect, location information for a UE can be employed tofacilitate access to historic information related to RAT resources. Forexample, historic information for a period can be accessed for a regionwhen a UE is determined to be in or near said region. As such, RAThistories for RAT resources in a region around a mobile device can bereceived. For example, a location can be used to anticipate theavailability of a RAT resource in, or near, the location. Further, RAThistories for RAT resources in a region in which a mobile device ispresent can be received. Moreover, RAT histories for RAT resources in aregion in which a mobile device is expected to enter can be received.

At 620, method 600 can select a RAT resource based on the locationinformation received in 610. At this point, method 600 can end.Selection of a RAT resource can be based directly on the location of aUE. Further, selection of a RAT resource at 620 can includeconsideration of historical information relating the RAT resource basedon the location information received. For example, location informationreceived at 610 can be employed to determine that historically, a set ofRAT resources have been previously detected at the location and thus canbe considered as an initial set or RAT resources available forconsideration.

Further, the set of RAT resources can be associated with historicalcharacteristics, parameters, and performance metrics that can also beaccessed and employed in selecting a RAT resource. For example, a RATresource with a history of well-sustained access can be more highlyranked, e.g., more likely selected, than a RAT resource that has ahistory of rapidly dropped links. Of note, the historical set caninclude RAT resources that are no longer available, but these RATresources can be quickly removed from the set, e.g., by scanning for theRAT resource where said resource meets conditions for selection of thatresource for a handover event. Moreover, additional RAT resources can beavailable at a location than are included in the historical set for avariety of reasons, e.g., a RAT resource can be newer than the mostrecent historical event in the set, etc. These additional RAT resourcescan also be considered in selecting a RAT resource at 620, although theycan lack historical information that can be considered for RAT resourcesassociated with the historical set of RAT resources. As such, theselection of a RAT resource from the additional RAT resources can bebased on a more minimal information set, e.g., that may not considerhistorical information associated with a RAT resource.

In an embodiment, location information can be associated withpredetermined rankings of RAT resources based on the historicalinformation associated with the RAT resources in an area at, or near,the location. By preprocessing and ranking the RAT resources, a UE canrapidly select a RAT resource, for example, by employing a lookup tablebased on location. Further, access to RAT resource rankings by locationcan supplement contemporaneous measurements of RAT resources at the UEfor selection of a RAT resource. This has the advantage that minimaladditional processing is needed to significantly augment theconventional RAT selection process with historical informationassociated with a RAT resource. Numerous other advantages are notexplicitly disclosed for clarity and brevity but are considered withinthe scope of the present subject matter with regard to incorporation ofhistorical information related to a RAT resource in selecting a RATresource.

FIG. 7 illustrates a method 700 that facilitates selection of a radioaccess technology resource based on historic information related to theradio access technology resource in accordance with aspects of thesubject disclosure. At 710, method 700 can receive location information.At 720, location information from 710 can be employed to facilitateaccess to historic information related to RAT resources.

At 730, RAT resource condition information can be received. RATcondition information can include contemporaneous information for RATresources associated with the location information, e.g., from 710.Further, RAT condition information can include contemporaneousinformation for RAT resources not associated with a particular location,e.g., a RAT resource can be newer than a set of RAT resources returnedfor a lookup for a particular location, etc. This contemporaneousinformation for RAT resources can be include RAT characteristics, suchas, bandwidth, QoS, uplink and downlink power, frequency, etc., and canreflect the current conditions for potential RAT links on those RATresources.

At 740, method 700 can select a RAT resource based on the historicalinformation related to a RAT resource form 720 and contemporaneous RATresource conditions from 730. At this point, method 700 can end.Selection of a RAT resource can include consideration of historicalinformation relating the RAT resource received at 720. For example,historically a set of RAT resources can be associated with a particularlocation. As a second example, historically a RAT resource can beassociated with particularly desirable or undesirable performancecharacteristics, which can serve as a predictor of future RAT resourceperformance. These historical characteristics, parameters, andperformance metrics can be accessed and employed in selecting a RATresource at 740. Access and employment of historical data from 720 canbe considered in light of contemporaneous RAT condition informationreceived at 730. For example, a RAT resource with a history ofwell-sustained handover events can be selected over a RAT resource thathas a higher contemporaneous bandwidth. As a second example, a RATresource with a high contemporaneous QoS can be selected from two RATresources both having histories of well-sustained access.

As previously noted, a historical set can include RAT resources that areno longer available, but these RAT resources can be quickly removed fromthe set, e.g., by way of a simple radio scan for the resources at thelocation. Also as previously noted, additional RAT resources can beavailable at a location. These additional RAT resources can also beconsidered in selecting a RAT resource at 740, although they can lackhistorical information. Further, in some embodiments, locationinformation can be associated with predetermined rankings of RATresources based on the historical information associated with the RATresources in a region at, or near, a location, which can significantlyaugment the conventional RAT selection process with historicalinformation associated with a RAT resource.

FIG. 8 illustrates a method 800 that facilitates selection of a radioaccess bearer resource based on historic information related to theradio access bearer resource by employing timed fingerprint locationinformation in accordance with aspects of the subject disclosure. At810, method 800 can receive timed fingerprint location (TFL)information. TFL information can include location information asdisclosed in more detail in U.S. Ser. No. 12/712,424 filed Feb. 25,2010, which application, as previously stated, is hereby incorporated byreference in its entirety. As such, TFL information can include locationinformation for a UE based on timing information. As a non-limitingexample, a mobile device, including mobile devices not equipped with aGPS-type system, can be located by looking up timing informationassociated with the mobile device from a TFL information reference. Assuch, the exemplary mobile device can be located using TFL informationwithout employing GPS-type techniques. In an aspect, TFL information caninclude information to determine a DV(?,X). The centroid region(possible locations between any site pair) for an observed time valueassociated with any NodeB site pair (NBSP) can be calculated and isrelated to the determined value (in units of chip) from any pair ofNodeBs. When UE time data is accessed, a DV(?,X) look-up can beinitiated. Relevant NBSPs can be prioritized as part of the look-up.Further, the relevant pairs can be employed as an index to lookup afirst primary set. As an example, time data for a UE can be accessed inrelation to a locating event in a TFL wireless carrier environment. Inthis example, it can be determined that a NBSP, with a first referenceframe, be used for primary set lookup with the computed DV(?,X) value asthe index. This can for example return a set of bin grid frameslocations forming a hyperbola between the NodeBs of the NBSP. A secondlookup can then be performed for an additional relevant NBSP, with asecond reference frame, using the same value DV(?,X), as an index intothe data set. Continuing the example, the returned set for the look upwith second NBSP can return a second set of bin grid frames. Thus, theUE is likely located in both sets of bin grid frames. Therefore, wherethe UE is most likely in both sets, it is probable that the location forthe UE is at the intersection of the two sets. Additional NBSPs can beincluded to further narrow the possible locations of the UE. EmployingTFL information for location determination is demonstrably differentfrom conventional location determination techniques or systems such asGPS, eGPS, triangulation or multilateration in wireless carrierenvironments, near field techniques, or proximity sensors.

At 820, TFL information from 810 can be employed to facilitate access tohistoric information related to RAT resources. For example, TFLinformation received at 810 can be employed to determine thathistorically, a set of RAT resources have been previously detected atthe location and thus can be considered as an initial set of RATresources. The set of RAT resources can also be associated withhistorical characteristics, parameters, and performance metrics that canalso be accessed and employed in selecting a RAT resource. For example,a RAT resource with a history of poorly sustained access can be removedfrom a set of selectable RAT resources. Of note, the historical set caninclude RAT resources that are no longer available, but these RATresources can be quickly removed from the set, as previously disclosed.

At 830, RAT resource condition information can be received. RATcondition information can include contemporaneous information for RATresources associated with the TFL information, e.g., from 810. Further,RAT condition information can include contemporaneous information forRAT resources not associated with a particular location, e.g., a RATresource can be newer than a set of RAT resources returned for a lookupfor a particular location, etc. This contemporaneous information for RATresources can be include RAT characteristics, such as, bandwidth, QoS,uplink and downlink power, frequency, etc., and can reflect the currentconditions for potential RAT links on those RAT resources. At 840,method 800 can select a RAT resource based on the historical informationrelated to a RAT resource form 820 and contemporaneous RAT resourceconditions from 830. At this point, method 800 can end.

As previously noted, a historical set can include RAT resources that areno longer available, but these RAT resources can be quickly removed fromthe set. Also as previously noted, additional RAT resources can beavailable at a location. These additional RAT resources can also beconsidered in selecting a RAT resource at 840, although they can lackhistorical information. Further, in some embodiments, locationinformation can be associated with predetermined rankings of RATresources based on the historical information associated with the RATresources in a region at, or near, a location, which can significantlyaugment the conventional RAT selection process with historicalinformation associated with a RAT resource.

FIG. 9 presents an example embodiment 900 of a mobile network platform910 that can implement and exploit one or more aspects of the subjectinnovation described herein. Generally, wireless network platform 910can include components, e.g., nodes, gateways, interfaces, servers, ordisparate platforms, that facilitate both packet-switched (PS) (e.g.,internet protocol (IP), frame relay, asynchronous transfer mode (ATM))and circuit-switched (CS) traffic (e.g., voice and data), as well ascontrol generation for networked wireless telecommunication. As anon-limiting example, wireless network platform 910 can be included aspart of a telecommunications carrier network, includingtelecommunications carrier networks employing timed fingerprint locationenvironments. Mobile network platform 910 includes CS gateway node(s)912 which can interface CS traffic received from legacy networks liketelephony network(s) 940 (e.g., public switched telephone network(PSTN), or public land mobile network (PLMN)) or a signaling system #7(SS7) network 970. Circuit switched gateway node(s) 912 can authorizeand authenticate traffic (e.g., voice) arising from such networks.Additionally, CS gateway node(s) 912 can access mobility, or roaming,data generated through SS7 network 970; for instance, mobility datastored in a visited location register (VLR), which can reside in memory930. Moreover, CS gateway node(s) 912 interfaces CS-based traffic andsignaling and PS gateway node(s) 918. As an example, in a 3GPP UMTSnetwork, CS gateway node(s) 912 can be realized at least in part ingateway GPRS support node(s) (GGSN). It should be appreciated thatfunctionality and specific operation of CS gateway node(s) 912, PSgateway node(s) 918, and serving node(s) 916, is provided and dictatedby radio technology(ies) utilized by mobile network platform 910 fortelecommunication.

In addition to receiving and processing CS-switched traffic andsignaling, PS gateway node(s) 918 can authorize and authenticatePS-based data sessions with served mobile devices. Data sessions caninclude traffic, or content(s), exchanged with networks external to thewireless network platform 910, like wide area network(s) (WANs) 950,enterprise network(s) 970, and service network(s) 980, which can beembodied in local area network(s) (LANs), can also be interfaced withmobile network platform 910 through PS gateway node(s) 918. It is to benoted that WANs 950 and enterprise network(s) 960 can embody, at leastin part, a service network(s) like IP multimedia subsystem (IMS). Basedon radio technology layer(s) available in technology resource(s) 917,packet-switched gateway node(s) 918 can generate packet data protocolcontexts when a data session is established; other data structures thatfacilitate routing of packetized data also can be generated. To thatend, in an aspect, PS gateway node(s) 918 can include a tunnel interface(e.g., tunnel termination gateway (TTG) in 3GPP UMTS network(s) (notshown)) which can facilitate packetized communication with disparatewireless network(s), such as Wi-Fi networks.

In embodiment 900, wireless network platform 910 also includes servingnode(s) 916 that, based upon available radio technology layer(s) withintechnology resource(s) 917, convey the various packetized flows of datastreams received through PS gateway node(s) 918. It is to be noted thatfor technology resource(s) 917 that rely primarily on CS communication,server node(s) can deliver traffic without reliance on PS gatewaynode(s) 918; for example, server node(s) can embody at least in part amobile switching center. As an example, in a 3GPP UMTS network, servingnode(s) 916 can be embodied in serving GPRS support node(s) (SGSN).

For radio technologies that exploit packetized communication, server(s)914 in wireless network platform 910 can execute numerous applicationsthat can generate multiple disparate packetized data streams or flows,and manage (e.g., schedule, queue, format . . . ) such flows, includingselection of RAT resources for communicating data, wherein selectionincludes the consideration of historical information relating to the RATresources. Such application(s) can include add-on features to standardservices (for example, provisioning, billing, customer support . . . )provided by wireless network platform 910. Data streams (e.g.,content(s) that are part of a voice call or data session) can beconveyed to PS gateway node(s) 918 for authorization/authentication andinitiation of a data session, and to serving node(s) 916 forcommunication thereafter. In addition to application server, server(s)914 can include utility server(s), a utility server can include aprovisioning server, an operations and maintenance server, a securityserver that can implement at least in part a certificate authority andfirewalls as well as other security mechanisms, and the like. In anaspect, security server(s) secure communication served through wirelessnetwork platform 910 to ensure network's operation and data integrity inaddition to authorization and authentication procedures that CS gatewaynode(s) 912 and PS gateway node(s) 918 can enact. Moreover, provisioningserver(s) can provision services from external network(s) like networksoperated by a disparate service provider; for instance, WAN 950 orGlobal Positioning System (GPS) network(s) (not shown). Provisioningserver(s) can also provision coverage through networks associated towireless network platform 910 (e.g., deployed and operated by the sameservice provider), such as femto-cell network(s) (not shown) thatenhance wireless service coverage within indoor confined spaces andoffload RAN resources in order to enhance subscriber service experiencewithin a home or business environment.

It is to be noted that server(s) 914 can include one or more processorsconfigured to confer at least in part the functionality of macro networkplatform 910. To that end, the one or more processor can execute codeinstructions stored in memory 930, for example. It is should beappreciated that server(s) 914 can include a content manager 915, whichoperates in substantially the same manner as described hereinbefore.

In example embodiment 900, memory 930 can store information related tooperation of wireless network platform 910. Other operationalinformation can include provisioning information of mobile devicesserved through wireless platform network 910, subscriber databases;application intelligence, pricing schemes, e.g., promotional rates,flat-rate programs, couponing campaigns; technical specification(s)consistent with telecommunication protocols for operation of disparateradio, or wireless, technology layers; and so forth. Memory 930 can alsostore information from at least one of telephony network(s) 940, WAN950, enterprise network(s) 960, or SS7 network 970. In an aspect, memory930 can be, for example, accessed as part of a data store component oras a remotely connected memory store.

FIG. 10 illustrates a block diagram of an example embodiment of anaccess point to implement and exploit one or more features or aspects ofthe subject innovation. Access point 1000 can be part of acommunications framework, for example, a femtocell (e.g., 508, 608), amicrocell, a picocell, a router, a wireless router, etc. In embodiment1000, AP 1005 can receive and transmit signal(s) (e.g., attachmentsignaling) from and to wireless devices like femtocell access points,access terminals, wireless ports and routers, or the like, through a setof antennas 1020 ₁-1020 _(N) (N is a positive integer). It can be notedthat antennas 1020 ₁-1020 _(N) can be part of communication platform1015, which comprises electronic components and associated circuitrythat provides for processing and manipulation of receivedelectromagnetic signal(s) and electromagnetic signal(s) to betransmitted. Such electronic components and circuitry embody, at leastin part, can comprise signaling and traffic components within acommunication framework. In some embodiments, communication platform1015 can include a receiver/transmitter 1016 that can convert signalfrom analog to digital upon reception, and from digital to analog upontransmission. In addition, receiver/transmitter 1016 can divide a singledata stream into multiple, parallel data streams, or perform thereciprocal operation. Coupled to receiver/transmitter 1016 is amultiplexer/demultiplexer 1017 that facilitates manipulation of signalin time and frequency space. Electronic component 1017 can multiplexinformation (data/traffic and control/signaling) according to variousmultiplexing schemes such as time division multiplexing (TDM), frequencydivision multiplexing (FDM), orthogonal frequency division multiplexing(OFDM), code division multiplexing (CDM), space division multiplexing(SDM). In addition, mux/demux component 1017 can scramble and spreadinformation (e.g., codes) according to substantially any code known inthe art; e.g., Hadamard-Walsh codes, Baker codes, Kasami codes,polyphase codes, and so on. A modulator/demodulator 1018 is also a partof communication platform 1015, and can modulate information accordingto multiple modulation techniques, such as frequency modulation,amplitude modulation (e.g., M-ary quadrature amplitude modulation (QAM),with M a positive integer), phase-shift keying (PSK), and the like.Communication platform 1015 also includes a coder/decoder (codec)component 1019 that facilitates decoding received signal(s), and codingsignal(s) to convey.

Access point 1005 can also include a processor 1035 configured to conferfunctionality, at least in part, to substantially any electroniccomponent in AP 1005. Power supply 1025 can attach to a power grid andinclude one or more transformers to achieve a power level that canoperate AP 1005 components and circuitry. Additionally, power supply1025 can include a rechargeable power component to ensure operation whenAP 1005 is disconnected from the power grid, or in instances, the powergrid is not operating.

Processor 1035 also is functionally connected to communication platform1015 and can facilitate operations on data (e.g., symbols, bits, orchips) for multiplexing/demultiplexing, such as effecting direct andinverse fast Fourier transforms, selection of modulation rates,selection of data packet formats, inter-packet times, etc. Moreover,processor 1035 is functionally connected, via a data or system bus, tocalibration platform 1012 and other components (not shown) to confer, atleast in part functionality to each of such components.

In AP 1005, memory 1045 can store data structures, code instructions andprogram modules, system or device information, code sequences forscrambling, spreading and pilot transmission, location intelligencestorage, determined delay offset(s), over-the-air propagation models,and so on. Processor 1035 is coupled to the memory 1045 in order tostore and retrieve information necessary to operate and/or conferfunctionality to communication platform 1015, calibration platform 1012,and other components (not shown) of access point 1005.

In order to provide a context for the various aspects of the disclosedsubject matter, FIG. 11, and the following discussion, are intended toprovide a brief, general description of a suitable environment in whichthe various aspects of the disclosed subject matter can be implemented.While the subject matter has been described above in the general contextof computer-executable instructions of a computer program that runs on acomputer and/or computers, those skilled in the art will recognize thatthe subject innovation also can be implemented in combination with otherprogram modules. Generally, program modules include routines, programs,components, data structures, etc. that perform particular tasks and/orimplement particular abstract data types.

In the subject specification, terms such as “store,” “storage,” “datastore,” data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory.

By way of illustration, and not limitation, nonvolatile memory, forexample, can be included in volatile memory 1120, non-volatile memory1122 (see below), disk storage 1124 (see below), and memory storage 1146(see below). Further, nonvolatile memory can be included in read onlymemory (ROM), programmable ROM (PROM), electrically programmable ROM(EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatilememory can include random access memory (RAM), which acts as externalcache memory. By way of illustration and not limitation, RAM isavailable in many forms such as synchronous RAM (SRAM), dynamic RAM(DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM),enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM(DRRAM). Additionally, the disclosed memory components of systems ormethods herein are intended to comprise, without being limited tocomprising, these and any other suitable types of memory.

Moreover, it will be noted that the disclosed subject matter can bepracticed with other computer system configurations, includingsingle-processor or multiprocessor computer systems, mini-computingdevices, mainframe computers, as well as personal computers, hand-heldcomputing devices (e.g., PDA, phone, watch, tablet computers, . . . ),microprocessor-based or programmable consumer or industrial electronics,and the like. The illustrated aspects can also be practiced indistributed computing environments where tasks are performed by remoteprocessing devices that are linked through a communications network;however, some if not all aspects of the subject disclosure can bepracticed on stand-alone computers. In a distributed computingenvironment, program modules can be located in both local and remotememory storage devices.

FIG. 11 illustrates a block diagram of a computing system 1100 operableto execute the disclosed systems and methods in accordance with anembodiment. Computer 1112, which can be, for example, part of thehardware of a RAT selection component or timed fingerprint locationcomponent, includes a processing unit 1114, a system memory 1116, and asystem bus 1118. System bus 1118 couples system components including,but not limited to, system memory 1116 to processing unit 1114.Processing unit 1114 can be any of various available processors. Dualmicroprocessors and other multiprocessor architectures also can beemployed as processing unit 1114.

System bus 1118 can be any of several types of bus structure(s)including a memory bus or a memory controller, a peripheral bus or anexternal bus, and/or a local bus using any variety of available busarchitectures including, but not limited to, Industrial StandardArchitecture (ISA), Micro-Channel Architecture (MSA), Extended ISA(EISA), Intelligent Drive Electronics, VESA Local Bus (VLB), PeripheralComponent Interconnect (PCI), Card Bus, Universal Serial Bus (USB),Advanced Graphics Port (AGP), Personal Computer Memory CardInternational Association bus (PCMCIA), Firewire (IEEE 1194), and SmallComputer Systems Interface (SCSI).

System memory 1116 includes volatile memory 1120 and nonvolatile memory1122. A basic input/output system (BIOS), containing routines totransfer information between elements within computer 1112, such asduring start-up, can be stored in nonvolatile memory 1122. By way ofillustration, and not limitation, nonvolatile memory 1122 can includeROM, PROM, EPROM, EEPROM, or flash memory. Volatile memory 1120 includesRAM, which acts as external cache memory. By way of illustration and notlimitation, RAM is available in many forms such as SRAM, dynamic RAM(DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM),enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), Rambus direct RAM(RDRAM), direct Rambus dynamic RAM (DRDRAM), and Rambus dynamic RAM(RDRAM).

Computer 1112 also includes removable/non-removable,volatile/non-volatile computer storage media. FIG. 11 illustrates, forexample, disk storage 1124. Disk storage 1124 includes, but is notlimited to, devices like a magnetic disk drive, floppy disk drive, tapedrive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memorystick. In addition, disk storage 1124 can include storage mediaseparately or in combination with other storage media including, but notlimited to, an optical disk drive such as a compact disk ROM device(CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RWDrive) or a digital versatile disk ROM drive (DVD-ROM). To facilitateconnection of the disk storage devices 1124 to system bus 1118, aremovable or non-removable interface is typically used, such asinterface 1126. For example, disk storage 1124 can store one or more TFLlookup tables facilitating lookup of location information based on NodeBsite pairs and time values, historical information associated with a RATresource, contemporaneous RAT resource parameters, RAT resourceselection rules or algorithms, etc.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disk (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or other tangible and/or non-transitorymedia which can be used to store desired information. Computer-readablestorage media can be accessed by one or more local or remote computingdevices, e.g., via access requests, queries or other data retrievalprotocols, for a variety of operations with respect to the informationstored by the medium.

Communications media typically embody computer-readable instructions,data structures, program modules, or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

It can be noted that FIG. 11 describes software that acts as anintermediary between users and computer resources described in suitableoperating environment 1100. Such software includes an operating system1128 (e.g., OS component(s) 312, etc.) Operating system 1128, which canbe stored on disk storage 1124, acts to control and allocate resourcesof computer system 1112. System applications 1130 take advantage of themanagement of resources by operating system 1128 through program modules1132 and program data 1134 stored either in system memory 1116 or ondisk storage 1124. It is to be noted that the disclosed subject mattercan be implemented with various operating systems or combinations ofoperating systems.

A user can enter commands or information into computer 1111 throughinput device(s) 1136. Input devices 1136 include, but are not limitedto, a pointing device such as a mouse, trackball, stylus, touch pad,keyboard, microphone, joystick, game pad, satellite dish, scanner, TVtuner card, digital camera, digital video camera, web camera, cellphone, smartphone, tablet computer, etc. These and other input devicesconnect to processing unit 1114 through system bus 1118 by way ofinterface port(s) 1138. Interface port(s) 1138 include, for example, aserial port, a parallel port, a game port, a universal serial bus (USB),an infrared port, a Bluetooth port, an IP port, or a logical portassociated with a wireless service, etc. Output device(s) 1140 use someof the same type of ports as input device(s) 1136.

Thus, for example, a USB port can be used to provide input to computer1112 and to output information from computer 1112 to an output device1140. Output adapter 1142 is provided to illustrate that there are someoutput devices 1140 like monitors, speakers, and printers, among otheroutput devices 1140, which use special adapters. Output adapters 1142include, by way of illustration and not limitation, video and soundcards that provide means of connection between output device 1140 andsystem bus 1118. It should be noted that other devices and/or systems ofdevices provide both input and output capabilities such as remotecomputer(s) 1144.

Computer 1112 can operate in a networked environment using logicalconnections to one or more remote computers, such as remote computer(s)1144. Remote computer(s) 1144 can be a personal computer, a server, arouter, a network PC, a workstation, a microprocessor based appliance, apeer device, or other common network node and the like, and typicallyincludes many or all of the elements described relative to computer1112.

For purposes of brevity, only a memory storage device 1146 isillustrated with remote computer(s) 1144. Remote computer(s) 1144 islogically connected to computer 1112 through a network interface 1148and then physically connected by way of communication connection 1150.Network interface 1148 encompasses wire and/or wireless communicationnetworks such as local-area networks (LAN) and wide-area networks (WAN).LAN technologies include Fiber Distributed Data Interface (FDDI), CopperDistributed Data Interface (CDDI), Ethernet, Token Ring and the like.WAN technologies include, but are not limited to, point-to-point links,circuit switching networks like Integrated Services Digital Networks(ISDN) and variations thereon, packet switching networks, and DigitalSubscriber Lines (DSL). As noted below, wireless technologies may beused in addition to or in place of the foregoing.

Communication connection(s) 1150 refer(s) to hardware/software employedto connect network interface 1148 to bus 1118. While communicationconnection 1150 is shown for illustrative clarity inside computer 1112,it can also be external to computer 1112. The hardware/software forconnection to network interface 1148 can include, for example, internaland external technologies such as modems, including regular telephonegrade modems, cable modems and DSL modems, ISDN adapters, and Ethernetcards.

The above description of illustrated embodiments of the subjectdisclosure, including what is described in the Abstract, is not intendedto be exhaustive or to limit the disclosed embodiments to the preciseforms disclosed. While specific embodiments and examples are describedherein for illustrative purposes, various modifications are possiblethat are considered within the scope of such embodiments and examples,as those skilled in the relevant art can recognize.

In this regard, while the disclosed subject matter has been described inconnection with various embodiments and corresponding Figures, whereapplicable, it is to be understood that other similar embodiments can beused or modifications and additions can be made to the describedembodiments for performing the same, similar, alternative, or substitutefunction of the disclosed subject matter without deviating therefrom.Therefore, the disclosed subject matter should not be limited to anysingle embodiment described herein, but rather should be construed inbreadth and scope in accordance with the appended claims below.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising, but not limited to comprising, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Processors can exploit nano-scale architectures suchas, but not limited to, molecular and quantum-dot based transistors,switches, and gates, in order to optimize space usage or enhanceperformance of user equipment. A processor may also be implemented as acombination of computing processing units.

In the subject specification, terms such as “store,” “storage,” “datastore,” data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory.

As used in this application, the terms “component,” “system,”“platform,” “layer,” “selector,” “interface,” and the like are intendedto refer to a computer-related entity or an entity related to anoperational apparatus with one or more specific functionalities, whereinthe entity can be either hardware, a combination of hardware andsoftware, software, or software in execution. As an example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. By way of illustration and not limitation, both anapplication running on a server and the server can be a component. Oneor more components may reside within a process and/or thread ofexecution and a component may be localized on one computer and/ordistributed between two or more computers. In addition, these componentscan execute from various computer readable media having various datastructures stored thereon. The components may communicate via localand/or remote processes such as in accordance with a signal having oneor more data packets (e.g., data from one component interacting withanother component in a local system, distributed system, and/or across anetwork such as the Internet with other systems via the signal). Asanother example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry, which is operated by a software or firmwareapplication executed by a processor, wherein the processor can beinternal or external to the apparatus and executes at least a part ofthe software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can include a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components.

In addition, the term “or” is intended to mean an inclusive “or” ratherthan an exclusive “or.” That is, unless specified otherwise, or clearfrom context, “X employs A or B” is intended to mean any of the naturalinclusive permutations. That is, if X employs A; X employs B; or Xemploys both A and B, then “X employs A or B” is satisfied under any ofthe foregoing instances. Moreover, articles “a” and “an” as used in thesubject specification and annexed drawings should generally be construedto mean “one or more” unless specified otherwise or clear from contextto be directed to a singular form.

Moreover, terms like “user equipment (UE),” “mobile station,” “mobile,”subscriber station,” “subscriber equipment,” “access terminal,”“terminal,” “handset,” and similar terminology, refer to a wirelessdevice utilized by a subscriber or user of a wireless communicationservice to receive or convey data, control, voice, video, sound, gaming,or substantially any data-stream or signaling-stream. The foregoingterms are utilized interchangeably in the subject specification andrelated drawings. Likewise, the terms “access point (AP),” “basestation,” “Node B,” “evolved Node B (eNode B),” “home Node B (HNB),”“home access point (HAP),” and the like, are utilized interchangeably inthe subject application, and refer to a wireless network component orappliance that serves and receives data, control, voice, video, sound,gaming, or substantially any data-stream or signaling-stream to and froma set of subscriber stations or provider enabled devices. Data andsignaling streams can include packetized or frame-based flows.

Additionally, the term “core-network”, “core”, “core carrier network”,or similar terms can refer to components of a telecommunications networkthat typically providing some or all of aggregation, authentication,call control and switching, charging, service invocation, or gateways.Aggregation can refer to the highest level of aggregation in a serviceprovider network wherein the next level in the hierarchy under the corenodes is the distribution networks and then the edge networks. UEs donot normally connect directly to the core networks of a large serviceprovider but can be routed to the core by way of a switch or radio areanetwork. Authentication can refer to determinations regarding whetherthe user requesting a service from the telecom network is authorized todo so within this network or not. Call control and switching can referdeterminations related to the future course of a call stream acrosscarrier equipment based on the call signal processing. Charging can berelated to the collation and processing of charging data generated byvarious network nodes. Two common types of charging mechanisms found inpresent day networks can be prepaid charging and postpaid charging.Service invocation can occur based on some explicit action (e.g. calltransfer) or implicitly (e.g., call waiting). It is to be noted thatservice “execution” may or may not be a core network functionality asthird party network/nodes may take part in actual service execution. Agateway can be present in the core network to access other networks.Gateway functionality can be dependent on the type of the interface withanother network.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,”“prosumer,” “agent,” and the like are employed interchangeablythroughout the subject specification, unless context warrants particulardistinction(s) among the terms. It should be appreciated that such termscan refer to human entities or automated components (e.g., supportedthrough artificial intelligence, as through a capacity to makeinferences based on complex mathematical formalisms), that can providesimulated vision, sound recognition and so forth.

Aspects, features, or advantages of the subject matter can be exploitedin substantially any, or any, wired, broadcast, wirelesstelecommunication, radio technology or network, or combinations thereof.Non-limiting examples of such technologies or networks include Geocasttechnology; broadcast technologies (e.g., sub-Hz, ELF, VLF, LF, MF, HF,VHF, UHF, SHF, THz broadcasts, etc.); Ethernet; X.25; powerline-typenetworking (e.g., PowerLine AV Ethernet, etc.); femto-cell technology;Wi-Fi; Worldwide Interoperability for Microwave Access (WiMAX); EnhancedGeneral Packet Radio Service (Enhanced GPRS); Third GenerationPartnership Project (3GPP or 3G) Long Term Evolution (LTE); 3GPPUniversal Mobile Telecommunications System (UMTS) or 3GPP UMTS; ThirdGeneration Partnership Project 2 (3GPP2) Ultra Mobile Broadband (UMB);High Speed Packet Access (HSPA); High Speed Downlink Packet Access(HSDPA); High Speed Uplink Packet Access (HSUPA); GSM Enhanced DataRates for GSM Evolution (EDGE) Radio Access Network (RAN) or GERAN; UMTSTerrestrial Radio Access Network (UTRAN); or LTE Advanced.

What has been described above includes examples of systems and methodsillustrative of the disclosed subject matter. It is, of course, notpossible to describe every combination of components or methodologieshere. One of ordinary skill in the art may recognize that many furthercombinations and permutations of the claimed subject matter arepossible. Furthermore, to the extent that the terms “includes,” “has,”“possesses,” and the like are used in the detailed description, claims,appendices and drawings such terms are intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim.

What is claimed is:
 1. A network device, comprising: a processor; and amemory that stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising:determining, by a radio access technology (RAT) analysis component ofthe executable instructions of the network device, that a first radioaccess resource and a second radio access resource provide wirelesscoverage to a location of a user equipment, wherein the first radioaccess resource employs a different radio access technology than thesecond radio access resource; determining, by the RAT analysis componentof the executable instructions of the network device, a first rankingvalue for the first radio access resource based on first past wirelessperformance information associated with the first radio access resource;determining, by the RAT analysis component of the executableinstructions of the network device, a second ranking value for thesecond radio access resource based on second past wireless performanceinformation associated with the second radio access resource; andfacilitating, by a RAT selection component of the executableinstructions of the network device, formation of a wireless link betweenthe user equipment and the first radio access resource based on thefirst ranking value and the second ranking value.
 2. The network deviceof claim 1, wherein the determining that the first radio access resourceand the second radio access resource provide the wireless coveragecomprises determining a motion of the user equipment.
 3. The networkdevice of claim 2, wherein the determining the motion of the userequipment comprises determining a direction of travel and a speed oftravel of the user equipment.
 4. The network device of claim 2, whereinthe determining that the first radio access resource and the secondradio access resource provide the wireless coverage comprisesdetermining that the first radio access resource and the second radioaccess resource provide the wireless coverage to a future location ofthe user equipment inferred from a historical motion of the userequipment.
 5. The network device of claim 4, wherein the future locationis associated with a temporal window of the wireless coverage based onthe historical motion of the user equipment.
 6. The network device ofclaim 5, wherein the temporal window of the wireless coverage comprisesan entry time associated with a first inferred time that the userequipment is predicted to enter a joint wireless coverage area of thefirst radio access resource and the second radio access resource for thefuture location, and an exit time associated with a second inferred timethat the user equipment is predicted to exit the joint wireless coveragearea.
 7. The network device of claim 1, wherein the determining thefirst ranking value is further based on information related to a use ofthe user equipment, and the determining the second ranking value isfurther based on the information related to the use of the userequipment.
 8. The network device of claim 7, wherein the informationrelated to the use of the user equipment comprises an indication of apreference for wireless link stability for a RAT resource over anotherRAT resource having lower wireless link stability relating to the use ofthe user equipment.
 9. The network device of claim 7, wherein theinformation related to the use of the user equipment comprises anindication of a preference for wireless link bandwidth for a RATresource over another RAT resource having lower wireless link bandwidthrelating to the use of the user equipment.
 10. The network device ofclaim 1, wherein the determining that the first radio access resourceand the second radio access resource provide the wireless coveragecomprises using timed fingerprint location information received by thenetwork device related to the location of the user equipment.
 11. Amethod, comprising: determining, by a radio access technology (RAT)analysis component of a network device utilizing a processor, a locationof a user equipment; determining, by the RAT component of the networkdevice, a first radio access resource and a second radio access resourcethat provide wireless coverage to the location of the user equipment,wherein the first radio access resource is associated with a differentradio access technology than the second radio access resource;determining, by the RAT component of the network device, rank orderinformation for the first radio access resource and the second radioaccess resource based on first past wireless performance informationassociated with the first radio access resource and second past wirelessperformance information associated with the second radio accessresource; and initiating, by a RAT selection component of the networkdevice utilizing the processor, a wireless link between the userequipment and the first radio access resource based on the rank orderinformation.
 12. The method of claim 11, wherein the determining thelocation of the user equipment is based on timed fingerprint locationinformation related to the location of the user equipment.
 13. Themethod of claim 11, wherein the location of the user equipment is afuture location, and wherein the determining the future locationcomprises inferring the future location from historical motioninformation associated with the user equipment.
 14. The method of claim13, wherein the future location is associated with a time value relatedto a predicted entry of the user equipment into a wireless coverage areaof the first radio resource.
 15. The method of claim 13, wherein thefuture location is associated with a time value related to a predictedduration that the user equipment will remain in a wireless coverage areaof the first radio resource.
 16. The method of claim 13, wherein thefuture location is associated with a time value related to a predictedexit of the user equipment from a wireless coverage area of the firstradio resource.
 17. The method of claim 11, wherein the determining therank order information is further based on a characteristic of the userequipment in relation to the wireless link.
 18. A mobile device,comprising: a processor; and a memory that stores executableinstructions that, when executed by the processor, facilitateperformance of operations, comprising: determining a location of themobile device; determining a set of radio access resources that providewireless coverage to the location of the mobile device, wherein the setcomprises a first radio access resource and a second radio accessresource and wherein the first radio access resource establisheswireless links via a different radio access technology than the secondradio access resource; determining rank information for the set of radioaccess resources, comprising ranking the first radio access resource andthe second radio access resource based on first past wirelessperformance information associated with the first radio access resourceand second past wireless performance information associated with thesecond radio access resource; and participating in a wireless linkbetween the mobile device and the first radio access resource based onthe rank information.
 19. The mobile device of claim 18, wherein thedetermining the location comprises inferring a future location based onhistorical user equipment travel information.
 20. The mobile device ofclaim 18, wherein the determining the rank information is further basedon preference information related to a first selectable preference for atarget quality of service maintainable by the wireless link between themobile device and the first radio access resource, and a secondselectable preference for a target stability maintainable by thewireless link between the mobile device and the first radio accessresource for at least a predetermined period of time.