Systems, devices and methods of distributing telecommunications functionality across multiple heterogeneous domains

ABSTRACT

The various embodiments include methods, computers and communication systems for distributing telecommunications functionality across multiple heterogeneous domains within a telecommunications system, which may include determining policy-charging capabilities of a first telecommunications domain, determining policy-charging capabilities of a second telecommunications domain, determining policy-charging requirements required for a communication, partitioning the policy-charging requirements into a first group and a second group based on the determined policy-charging capabilities of the first and second telecommunications domains, sending a first message including the first group of policy-charging requirements to a public interface of the first domain, and sending a second message including the second group of policy-charging requirements to a public interface of the second domain.

RELATED APPLICATIONS

This application claims the benefit of priority to U.S. ProvisionalApplication No. 61/479,136, titled “Mobile Application Server thatEnables Users to Directly Access Telecommunications Operator Services”filed Apr. 26, 2011; U.S. Provisional Application No. 61/537,419, titled“Mobile Application Server that Enables Users to Directly AccessTelecommunications Operator Services” filed Sep. 21, 2011; U.S.Provisional Application No. 61/546,818, titled “Mobile ApplicationServer that Enables Users to Directly Access Telecommunications OperatorServices” filed Oct. 13, 2011; and U.S. Provisional Application No.61/617,005, titled “Systems and Methods for Controlling Charging andPolicy Management in A Multi-Access Environment” filed Mar. 28, 2012;the entire contents of all of which are hereby incorporated byreference.

This application is also related to U.S. patent application Ser. No.13/452,670 entitled “Systems, Devices and Methods of OrchestratingResources and Services Across Multiple Heterogeneous Domains”; U.S.patent application Ser. No. 13/452,682 entitled “Systems, Devices andMethods of Decomposing Service Requests into Domain-Specific ServiceRequests”; U.S. patent application Ser. No. 13/452,688 entitled“Systems, Devices and Methods of Establishing a Closed Feedback ControlLoop Across Multiple Domains”; U.S. patent application Ser. No.13/452,696 entitled “Systems, Devices and Methods of Crowd-sourcingAcross Multiple Domains”; and U.S. patent application Ser. No.13/452,717 entitled “Systems, Devices and Methods of SynchronizingInformation Across Multiple Heterogeneous Networks”, all of which arefiled concurrently herewith and incorporated herein by reference for thesubject matter disclosed in their respective claims.

BACKGROUND

Wireline and wireless communication technologies have seen dramaticimprovements over the past few years. Service providers now offer usersa wide array of services, higher usage limits, and attractivesubscription plans. Wireless dongles and embedded wireless modem cardsallow users to use tablet computers, netbooks and laptops to accesswireless Internet protocol (IP) and data services through wirelessnetworks. Internet-enabled smart phones, tablets, televisions, andgaming consoles have become essential personal accessories, connectingusers to friends, work, leisure activities and entertainment. Users nowhave more choices and expect to have access to content, data andcommunications at any time, in any place. As more users utilize theseservices, telecommunications networks must expand to meet the increasein user demand, support the array of new services and provide fast,reliable communications.

SUMMARY

The various embodiments include methods of distributingtelecommunications functionality across multiple heterogeneous domainswithin a telecommunications system, including determiningpolicy-charging capabilities of a first telecommunications domainexposing a first public interface for communicating with the firsttelecommunications domain, determining policy-charging capabilities of asecond telecommunications domain exposing a second public interface forcommunicating with the second telecommunications domain, determiningpolicy-charging requirements required for a communication, partitioningthe policy-charging requirements into a first group and a second groupbased on the determined policy-charging capabilities of the first andsecond telecommunications domains, sending a first message including thefirst group of policy-charging requirements to the first publicinterface, and sending a second message including the second group ofpolicy-charging requirements to the second public interface. In anembodiment, determining policy-charging capabilities of a firsttelecommunications domain may include receiving a message from the firstpublic interface identifying the policy-charging capabilities of thefirst telecommunications domain. In a further embodiment, determiningpolicy-charging capabilities of a first telecommunications domain mayinclude determining at least one of a policy, metering, rating,charging, and balance management capability of the firsttelecommunications domain. In a further embodiment, determiningpolicy-charging requirements required for a communication may includeidentifying metering, rating, charging, and balance managementrequirements of the communication. In a further embodiment, partitioningthe policy-charging requirements into a first group and a second groupbased on the determined policy-charging capabilities of the first andsecond telecommunications domains may include partitioning theidentified metering, rating, charging, and balance managementrequirements into at least one of the first and second groups. In afurther embodiment, partitioning the policy-charging requirements into afirst group and a second group based on the determined policy-chargingcapabilities of the first and second telecommunications domains mayinclude partitioning the policy-charging requirements based onsynchronization errors associated with the first or second domains. In afurther embodiment, partitioning the policy-charging requirements into afirst group and a second group based on the determined policy-chargingcapabilities of the first and second telecommunications domains mayinclude partitioning the policy-charging requirements based on aworkloads present on the first and second telecommunications domains. Ina further embodiment, partitioning the policy-charging requirements intoa first group and a second group based on the determined policy-chargingcapabilities of the first and second telecommunications domains mayinclude partitioning the policy-charging requirements based on areliability of the first and second telecommunications domains. In afurther embodiment, sending a first message including the first group ofpolicy-charging requirements to the first public interface may includesending the first message including the first group of policy-chargingrequirements to a public interface of a user equipment domain. In afurther embodiment, sending a second message including the second groupof policy-charging requirements to the second public interface mayinclude sending the second message including the second group ofpolicy-charging requirements to a public interface of a mobile packetcore domain.

Further embodiments may include a computing device having a processorconfigured with processor-executable instructions to perform variousoperations corresponding to the methods discussed above.

Further embodiments may include a computing device that may includevarious means for performing functions corresponding to the methodoperations discussed above.

Further embodiments may include a non-transitory processor-readablestorage medium having stored thereon processor-executable instructionsconfigured to cause a processor to perform various operationscorresponding to the method operations discussed above.

Further embodiments may include a system having a computing device thatincludes a transceiver, a memory, and a device processor coupled to thememory and transceiver, and a communications server having a servertransceiver, a server memory and a server processor coupled to theserver memory, in which the server and/or device processors areconfigured with processor executable instructions to perform variousoperations corresponding to the methods discussed above.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated herein and constitutepart of this specification, illustrate exemplary aspects of theinvention, and, together with the general description given above andthe detailed description given below, serve to explain features of theinvention.

FIG. 1 is a system block diagram illustrating a telecommunicationssystem suitable for implementing various embodiments.

FIG. 2 is a system block diagram illustrating an example communicationssystem in which the resources, devices, components, systems, andnetworks that exist between consumers and providers of services aregrouped into logical domains in accordance with the various embodiments.

FIG. 3 is a network block diagram illustrating an example communicationsnetwork having a continuum orchestrator configured to coordinateoperations within the network in accordance with the variousembodiments.

FIG. 4 is a network diagram illustrating logical components andinformation flows in an example communication system that includes adomain that may be decomposed into additional domains in accordance withan embodiment.

FIG. 5 is a system block diagram illustrating logical components andinformation flows in an example mobile packet core domain that may beused with various embodiments.

FIG. 6 is a system block diagram illustrating logical components andinformation flows in an example user equipment domain that may be usedwith various embodiments.

FIG. 7A is a system block diagram illustrating example logicalcomponents and information flows in a communication system having acontinuum orchestrator configured to delegate service policies inaccordance with an embodiment.

FIG. 7B is a message flow diagram illustrating the orchestrationmessages sent between a single continuum orchestrator and multipletelecommunications domains within an example telecommunicationscontinuum.

FIGS. 8A and 8B are tables that list continuum service policies, alongwith the decomposed resource rules, that may be applied in a userequipment domain and a mobile packet core domain in accordance withvarious embodiments.

FIGS. 9A and 9B are process flow diagrams illustrating embodimentmethods for delegating service policies in an example continuum.

FIG. 10 is a process flow diagram illustrating an embodiment method foradjusting the allocated quality of service.

FIG. 11 is a message flow diagram illustrating message flows in anexample embodiment of the feedback control loop.

FIG. 12A is a table illustrating an initial partial state of threedomains within an example continuum.

FIG. 12B is a table illustrating a stable state of the domains after afeedback control loop has finished iterating.

FIG. 12C is a table illustrating an initial state of the domains afterthe network conditions in the continuum have changed due to the userrequesting a higher quality of video from the video on demand service.

FIG. 12D is another table illustrating the stable state of the domainsafter the feedback control loop has finished iterating.

FIGS. 13A-D are illustrations of a user equipment device showing a userinterface that enables the user to specify policies.

FIG. 14 is an illustration of a user equipment device showing analternative user interface for specifying user policies.

FIGS. 15A-D are illustrations of a user equipment device having a userinteraction system configured to provide a user with live informationregarding his/her usage and charging in accordance with variousembodiments.

FIG. 16 is a system block diagram illustrating example functional nodesof a continuum orchestrator suitable for use with the variousembodiments.

FIG. 17 is a table illustrating example domains and the types ofcontextual information that may be collected from the domains in variousembodiments.

FIG. 18 is a process flow diagram illustrating an embodiment method forconducting network trials with users.

FIG. 19A is a process flow diagram illustrating an embodiment continuumorchestrator method for orchestrating services across multiple domainsthat are participating in a service delivery

FIG. 19B is a process flow diagram illustrating an embodiment domainorchestrator method for orchestrating services across multiple domainsparticipating in a service delivery.

FIG. 20A is a process flow diagram illustrating an embodiment continuumorchestrator method for decomposing abstract service requests intodomain specific concrete service requests.

FIG. 20B is a process flow diagram illustrating an embodiment domainorchestrator method for implementing domain specific resource rules.

FIG. 21A is a process flow diagram illustrating an embodiment continuumorchestrator method for using measurements collected from a first domainto control a service/communication attribute in another domain.

FIG. 21B is a process flow diagram illustrating an embodiment continuumorchestrator method for transferring functionality between domains.

FIG. 21C is a process flow diagram illustrating an embodiment domainorchestrator method for collecting measurements that enable a continuumorchestrator to control a service/communication attribute acrossmultiple domains.

FIG. 22 is a process flow diagram illustrating an embodiment continuumorchestrator method of performing crowd sourcing.

FIG. 23A is a process flow diagram illustrating an embodiment domainorchestrator method for synchronizing information with other domainsparticipating in a service delivery.

FIG. 23B is a process flow diagram illustrating a continuum orchestratormethod for synchronizing information between two or more domainsparticipating in a service delivery.

FIG. 24 is a process flow diagram illustrating a continuum orchestratormethod for distributing policy-charging operations across multipledomains.

FIG. 25 is a system block diagram of a user equipment device in the formof a phone/cell phone suitable for use with various embodiments.

FIG. 26 is a system block diagram of a server suitable for implementingvarious embodiments.

DETAILED DESCRIPTION

The various embodiments will be described in detail with reference tothe accompanying drawings. Wherever possible, the same reference numberswill be used throughout the drawings to refer to the same or like parts.References made to particular examples and implementations are forillustrative purposes, and are not intended to limit the scope of theinvention or the claims.

The word “exemplary” is used herein to mean “serving as an example,instance, or illustration.” Any implementation described herein as“exemplary” is not necessarily to be construed as preferred oradvantageous over other implementations.

The terms “mobile device,” “wireless device” and “user equipment” (UE)may be used interchangeably and refer to any one of various cellulartelephones, smart-phones (e.g., iPhone®), personal data assistants(PDA's), palm-top computers, tablet computers (e.g., iPad®), laptopcomputers, wireless electronic mail receivers (e.g., Blackberry®), VoIPphones, wire-line devices, devices implementing Machine-to-Machine (M2M)technologies, multimedia/Internet enabled cellular telephones, IPenabled televisions, IP enabled entertainment systems, and similarelectronic devices that include a processor and are capable of sendingand receiving wireless or wireline communication signals.

A number of different wireline and wireless communication services andstandards are available or contemplated in the future, all of which mayimplement and benefit from the various embodiments. Such services andstandards include, e.g., third generation partnership project (3GPP),long term evolution (LTE) systems, third generation wireless mobilecommunication technology (3G), fourth generation wireless mobilecommunication technology (4G), global system for mobile communications(GSM), universal mobile telecommunications system (UMTS), 3GSM, generalpacket radio service (GPRS), code division multiple access (CDMA)systems (e.g., cdmaOne, CDMA2000™), enhanced data rates for GSMevolution (EDGE), advanced mobile phone system (AMPS), digital AMPS(IS-136/TDMA), evolution-data optimized (EV-DO), digital enhancedcordless telecommunications (DECT), Worldwide Interoperability forMicrowave Access (WiMAX), wireless local area network (WLAN), Wi-FiProtected Access I & II (WPA, WPA2), and integrated digital enhancednetwork (iden). References to terminology and/or technical detailsrelated to an individual standard or technology are for illustrativepurposes only, and are not intended to limit the scope of the claims toa particular communication system or technology unless specificallyrecited in the claim language.

In recent years, telecommunications service providers have begunoffering many new services and user equipment (e.g., cellular phones,smartphones, tablets, laptop computers, etc.) has become faster and morefeature-rich than ever. For example, modern smartphones have impressiveprocessing capabilities, high speed communication circuitry (e.g.,radios, modems, etc.), and are capable of executing powerfulnetwork-intensive applications, which may include productivityapplications (e.g., calendars, video conferencing, etc.), photo andvideo applications (YouTube®, Netflix®, etc.), social media applications(e.g., Facebook®, etc.), and other similar applications that generateand/or consume large amounts of information over telecommunicationsand/or IP networks.

To meet user demands for these new applications and services, and tomanage the increase in network traffic resulting from the popularity ofthese services, traditional telephony systems are expanding andconverging with IP/data systems. As these networks expand and grow incomplexity, it is becoming more common for a single service orcommunication to require participation from multiple heterogeneousnetworks. For example, a service may be produced in a first network andtransported through (and modified in) multiple heterogeneous networksfor consumption in a yet another network. Each of these participatingnetworks may perform specialized operations on theservice/communication, and operations performed by each participatingnetwork may impact the operations of the other participating networks.

To ensure efficient and reliable delivery of services, a certain degreeof coordination and communication is required between the resources andservices of the participating networks. However, using existingsolutions, networks are often not fully informed of the operationsand/or capabilities of the other networks or components participating inthe service delivery. The various embodiments overcome these and otherlimitations by providing complete and holistic network solutions thatenable reliable, efficient and profitable end-to-end delivery ofservices across multiple heterogeneous networks participating in thedelivery of a service.

The various embodiments include methods, devices and systems fororchestrating services across multiple heterogeneous telecommunicationsdomains, which may include coordinating resources and services acrossmultiple autonomous and semi-autonomous telecommunications systems.

Various embodiments may identify two or more networks participating in aservice delivery associated with a service request, decompose theservice request into multiple single-domain service requests, and sendthe single-domain service requests directly to their respective networksfor processing.

Various embodiments may decompose abstract service requests intoconcrete service requests specific to a particular domain, and send theconcrete domain-specific service requests directly to their respectivecomponents and/or networks for processing.

Various embodiments may measure system and service statistics (e.g.,received quality of service, etc.) on a first participating network, andmodify variables (e.g., the applied quality of service, etc.) in asecond participating network based on the measurements. In anembodiment, a closed circuit feedback control loop may be establishedbetween two or more participating networks. The closed circuit feedbackcontrol loop may be used to collect information/statistics regardingsystem, component and network performance from components/networks andcontinuously or periodically adjust variables to ensure the continued,efficient and profitable delivery of services to consumers.

Various embodiments may collect, combine, and/or generate informationrelating to multiple heterogeneous networks, and intelligently modifycharacteristics or services on one or more networks participating in theservice delivery.

Various embodiments may synchronize services, information and/orcommunications between two or more heterogeneous networks participatingin the service delivery.

Various embodiments may distribute functionality (e.g., chargingfunctionality) associated with a specific network across one or moreheterogeneous networks participating in the service delivery.

The various embodiments may be implemented within a variety ofcommunication systems, an example of which is illustrated in FIG. 1. Atypical communication system 100 includes user equipment 102, such asthe illustrated laptop 102 a or smartphone 102 b, configured to send andreceive voice, data, and control signals to and from a service network104 (and ultimately the Internet and/or a content provider) via acommunications network 106. In the example illustrated in FIG. 1, thecommunications network 106 includes a network infrastructure 108 unitthat encapsulates various network components/systems implementing any ofa variety of communication technologies/protocols to process and routethe voice, data and control signals to and from the user equipment 102(e.g., the illustrated laptop 102 a or smartphone 102 b). The networkinfrastructure 108 unit may include, for example, components forimplementing a cellular telephone network, a radio access network (e.g.,UTRAN, RAN, etc.), WiFi network, WiMAX network, and/or other well knowncommunication technologies (e.g., GPRS, UMTS, LTE, cdmaOne, CDMA2000™).Since these structures are well known, certain details have been omittedin order to focus the descriptions on the most relevant features.

The network infrastructure 108 may also include connections to a policycontrol enforcement function (PCEF) component 110, which may beresponsible for enforcing policy rules to control the bandwidth, thequality of service (QoS), and other characteristics of thecommunications between the service network 104 and the user equipment102. The enforcement of policies may also include querying,coordinating, removing, revoking and/or adjusting various resources(e.g., network resources, subscriber resources, etc.) based on thepolicy rules. The PCEF 110 may also be configured to send signalinginformation (e.g., control plane information relating to communicationsetup, security, authentication, charging, enforcement of policy rules,etc.) to a policy control rules function (PCRF) component 112,online/offline charging systems (OCS/OFCS) 114, and other similarcomponents that participate in, collect information from, or otherwisecontribute to, communications between the service network 104 and theuser equipment 102.

Often, the delivery of a single service (e.g., a communication session)may require participation from multiple heterogeneous networks, and acertain degree of coordination is required between the participatingnetworks to ensure efficient and reliable delivery of services. Toachieve this, various embodiments may group the devices, components,systems, networks, and/or resources (herein collectively “resources”)between providers and consumers of a service into a set of logicaldomains, thereby partitioning and encapsulating the networkfunctionality into logical units that more readily support coordinationand cooperation among the various resources.

FIG. 2 illustrates an example communications system 200 in which all theresources (e.g., devices, components, systems, networks, etc.) thatexist between the consumers (e.g., wireless device users) and providersof services (e.g., content providers) are grouped into logical domainsin accordance with the various embodiments. The resources may be groupedsuch that each domain includes resources that are typically under thecontrol of a single logical entity and/or such that each domain isresponsible for a particular type or category of functionality providedby the telecommunications network. The domains may be antonymous,semi-antonymous, heterogeneous and/or homogeneous domains.

In the example illustrated in FIG. 2, the resources are grouped intofive domains, namely a user equipment domain 202, a radio access networkdomain 204, a mobile packet core domain 206, a transit network domain208, and a content provider domain 210. In an embodiment, the domainsmay be defined more granularly to further separate distinctfunctionality. For example, the content provider domain may be definedto include a content delivery network domain and/or a cloud computingapplication server domain. In a further embodiment, domains may beclassified into a hierarchical tree structure in which each domain typeinherits properties from its parents. For example, the user equipmentdomain may be further classified to be either a mobile device domain ora home entertainment domain.

Communications 212 between the consumer and provider may travel throughand/or may be processed by each of the logical domains 202-210. Eachdomain 202-210 may include components for performing a specialized groupof operations for the communication 212. For example, the contentprovider domain 210 may include resources (e.g., web servers, contentservers, etc.) responsible for producing content (e.g., webpages,videos, etc.) for consumption on the user equipment (e.g., mobilephones, etc.). The transit network domain 208 may include resources(e.g., IP routers, access networks, hubs, etc.) for communicating theinformation across the network (e.g., over the Internet protocol, etc.).The mobile packet core domain 206 may include resources responsible forthe policy and charging control (PCC) aspects of the core mobilenetwork. Resources responsible PCC aspects may include a policy andcharging enforcement function (PCEF) component, a policy and chargingrules function (PCRF) component, an off-line charging system (OFCS)component, an on-line charging system (OCS) component, a subscriberprofile repository (SPR) component, an application function (AF)component, a congestion manager component, a media optimization enginecomponent, an application level routing component (e.g., a DiameterRouting Agent, a dynamic context router, etc.), and/or other similarcomponents. In an embodiment, these components may be contained withinother domains. In an alternative embodiment, these components may berealized as independent domains.

The radio access network domain 204 may include resources that provide aconnection between the user equipment and the network, such as basetransceiver stations (BTS), NodeBs, eNodeBs, home eNodeBs, cells,femtocells, microcells, picocells, base station controllers (BSC),packet control units (PCU), packet data serving nodes (PDSN), radionetwork controllers (RNC), serving gateways (SGW), packet data networkgateway (PGW), components responsible for the policy and chargingcontrol aspects on a radio access network (RAN), and other similarcomponents. The user equipment domain 202 may include user equipment(e.g., smart-phone, laptop, etc.), their associated modules/functionalunits (e.g., location identification unit, power management module,etc.), and resources responsible for managing the user equipment.

As discussed above, the resources between the consumers and providers ofservices may be grouped into various logical domains. In the variousembodiments, these domains may include any combination ofmachine-to-machine domains, user equipment domains, radio access networkdomains, mobile packet core domains, fixed line domains, residentialgateway domains, cable domains, transit network domains, advertisementprovider domains, virtual private network (VPN) domains, storagedomains, content provider domains, content delivery network domains,cloud computing domains, and other similar domains. The resourcesgrouped into domains may include power management systems, admissioncontrol systems, policy management systems, charging systems, policy andcharging enforcement systems, user repositories, offloading managementsystems, and other similar components.

As discussed above, various embodiments may partition and encapsulatenetwork functionality into logical units by grouping the resources intoa distinct set of logical domains. These groupings may be performed suchthat the combination of all the logical domains account for the entireend-to-end telecommunications network for a service or a group ofservices. The end-to-end telecommunications network may form a“continuum,” that includes any telecommunications devices, components,systems, networks, and resources that together enable the services to beproduced and consumed on the telecommunications system, grouped into oneor more logical domains.

FIG. 3 illustrates an example communications system 300 having acontinuum orchestrator 302 for coordinating the operations within acontinuum 304 in accordance with the various embodiments. The continuum304 may include the resources (e.g., devices, components, systems,networks, etc.) in the end-to-end telecommunications network associatedwith a service (or category of services), grouped into domains. Thegroupings may be performed such that each domain is responsible for aparticular function or part of the telecommunications network. In theexample illustrated in FIG. 3, the resources are grouped into a userequipment domain 202, a radio access network domain 204, a mobile packetcore domain 206, a transit network domain 208, and a content providerdomain 210. The continuum 304 may include multiple instances of eachdomain, and each domain may include multiple instances of the samecomponents. For example, in various embodiments, the continuum 304 mayinclude multiple instances of the user equipment domain 202 and/or eachuser equipment domain 202 may include one or more user equipmentdevices.

Each domain (e.g., domains 202, 204, 206, 208, 210) may include a domainorchestrator 306 a-e component, interface and/or software moduleconfigured for sending and receiving information to and from a continuumorchestrator 302. The continuum orchestrator 302 may be any logicalentity that coordinates services and communications between domains toensure that services are delivered in an efficient manner. The continuumorchestrator 302 may be implemented as a stand-alone service or as partof another component. In various embodiments, the continuum orchestrator302 may be part of a domain within the continuum 304, may be outside ofthe domains and within the continuum 304, and/or outside of thecontinuum 304. The continuum 304 may include (or may be associated with)more than one continuum orchestrator 302. In systems having more thanone continuum orchestrator 302, each continuum orchestrator 302 may beresponsible for managing a category, type, or group of services for thecontinuum 304. In various embodiments, the continuum orchestrator 302may be a “mobile application server,” a “customer interaction gateway,”and/or a “subscriber engagement engine.” The continuum orchestrator 302may also be a component of, or included in, a mobile application server,a customer interaction gateway, and/or a subscriber engagement engine.

The continuum orchestrator 302 may be configured to orchestrate servicesacross multiple heterogeneous telecommunications domains and/orcoordinate resources and services across multiple autonomous andsemi-autonomous telecommunications domains in the continuum 304. In anembodiment, the continuum orchestrator 302 may be configured to identifydomains capable of (or required for) fulfilling a service request andcommunicate the service request to the identified domains.

As mentioned above, the continuum orchestrator 302 may be configured tosend and receive service requests to and from one or more of the logicaldomains 202-210. A service request may be any message that containsinformation relating to a particular service or group of services. Aservice request may include service policies that describe one or morebehaviors of the continuum 304, the domains 202-210, and/or services. Aservice request may be implementation agnostic, which may beaccomplished, for example, by specifying a service in terms of itsfunctional requirements rather than in terms of its realization. Invarious embodiments, service requests may be service creation requests,service modification requests, or service termination requests. Forexample, a service request may be a service creation request thatcommands the creation of services that relate to a single once-off event(e.g., sending a single text message) or an ongoing session-based event(e.g., starting a voice call).

As mentioned above, the continuum orchestrator 302 may be configured toidentify domains capable of (or required for) fulfilling a servicerequest. In various embodiments, the continuum orchestrator 302 mayidentify the domains required to fulfill a service request, decomposethe service request into one or more single-domain service requestsspecific to the identified domains, and send each domain specificservice request to a domain orchestrator (e.g., domain orchestrators 306a-e) in the identified domain. The domain orchestrators 306 a-e may beconfigured to receive and decompose single-domain service requests intoresource rules, and send the resource rules to the relevant componentswithin the domain for enforcement.

The resource rules may contain detailed information prescribing abehavior of a component within a domain. The resource rules may also bea message sent from a component (e.g., a domain orchestrator component)within a domain to another component within the same domain. Theresource rules may also include information for reporting the currentusage and status of resources controlled by a component within a domain.The resource rules may be specific to the components that are sendingand/or receiving the rules within the domain, and the system may beconfigured such that the resource rules generated in (or generated for)a domain do not need to be interoperable with components outside of thedomain.

As discussed above, the domain orchestrators 306 a-e may be configuredto decompose service requests into resource rules that are to beenforced by one or more components in the domain. The enforcement ofrules may include performing operations to control the bandwidth,quality of service (QoS), and other the characteristics of the data andservices being communicated.

In an embodiment, one or more domain orchestrators 306 a-e may beconfigured to recursively decompose a single-domain service request intomultiple single-domain service requests. In a further embodiment, one ormore domain orchestrators 306 a-e may be configured to decomposeimplementation agnostic service requests into implementation specificservice requests and resource rules.

In an embodiment, one or more domain orchestrators (e.g., domainorchestrator 306 a) may be configured to collect, publish, and/orsubsequently transfer domain related information (i.e., information thatis produced within the domains) to the continuum orchestrator 302 and toone or more other domain orchestrators (e.g., domain orchestrators 306b-e) within the continuum 304, enabling the information to be producedat the most efficient point (i.e., component, software module, network,etc.) within the continuum 304.

In an embodiment, one or more domain orchestrators (e.g., domainorchestrator 306 a) may include a synchronization mechanism forsynchronizing information with the continuum orchestrator 302 and/orother domain orchestrators (e.g., domain orchestrator 306 b-e) in thecontinuum 304. For example, a domain orchestrator 306 a that publishesinformation may use the synchronization mechanism to synchronizeinformation with the continuum orchestrator 302 (and other domainorchestrators 306 b-e consuming the information) to ensure that the mostcurrent information is always available to the other network componentsand reduce the amount of network traffic involved in transferringinformation across the domains.

As discussed above, one or more domain orchestrators 306 a-e may beconfigured to exchange information with the continuum orchestrator 302.Information exchanged between the domain orchestrators 306 a-e and thecontinuum orchestrator 302 may include any information that facilitatesthe operation of the continuum 304, such as information relating toresource management within a domain, charging for services involvingmultiple domains, and the decomposition of service requests.

In an embodiment, the system may be configured to monitor service usagein one or more domains to determine if the actual quality of service(QoS) received in those domains is above or below the intended qualityof service. If the actual quality of service is less than the intendedquality of service in a monitored domain (e.g., mobile packet coredomain 206), the continuum orchestrator 302 may request that anotherdomain (e.g., content provider domain 210) increase the allocatedquality of service to improve the actual quality of service received inthe monitored domain (e.g., mobile packet core domain 206). The systemmay then reevaluate the actual quality of service in the monitoreddomain (e.g., mobile packet core domain 206) to ensure that it isincreased to the intended level. In an embodiment, the continuumorchestrator 302 may form a feedback control loop with one or more ofthe domain orchestrators 306 a-e in which the monitoring and adjustmentoperations are repeated until the measured level of service isapproximately equal to the intended level of service. In an embodiment,the usage monitoring in a domain may be used to determine the quality ofexperience (QoE).

In an embodiment, the continuum orchestrator 302 may be configured totransfer functionality traditionally associated with one domain (e.g.,user equipment domain 202) to another domain (e.g., mobile packet coredomain 206). The functionality may be transferred on a dynamiccase-by-case basis or based on a static system-wide policy. In anembodiment, the system may be configured to perform load balancingoperations by dynamically transferring functionality between domains202-210.

In an embodiment, the continuum orchestrator 302 may be configured toperform crowd sourcing operations. In an embodiment, the continuumorchestrator 302 may be configured to gather contextual information fromone or more domains 202-210 in the continuum 304. In an embodiment, thecontinuum orchestrator 302 may combine and process contextualinformation gathered from a plurality of domains (e.g., user equipmentdomain 202, mobile packet core domain 206 and content provider domain210) to better manage the operations of one or more domains (e.g.,mobile packet core domain 206) in the continuum 304. In an embodiment,the continuum orchestrator 302 may augment service requests that aresent to one or more domain orchestrators (e.g., domain orchestrator 306c) with the contextual information gathered from multiple domains (e.g.,user equipment domain 202 and content provider domain 210).

In an embodiment, components within a domain may invoke the servicesoffered by the continuum orchestrator 302. In an embodiment, componentsmay be configured to invoke the services offered by the continuumorchestrator in response to changing circumstances in their domain. Inan embodiment, the system may be configured such that componentsexternal to the telecommunications networks may invoke the servicesoffered by the continuum orchestrator 302.

FIG. 4 illustrates logical components and information flows in anexample communication system 400 that includes a domain that may bedecomposed into additional domains in accordance with an embodiment.Specifically, FIG. 4 illustrates a content provider domain 210 that maybe decomposed into a content delivery network domain 402 and a cloudcomputing application server domain 404. The sub-domains 402, 404 may bedecomposed into resources that implement one or more domain functions,or may be decomposed into additional domains. In an embodiment, thesub-domains 402, 404 may be recursively decomposed into sub-domainsuntil it is determined that all of the decomposed components implementone or more of the domain's functions.

The communication system 400 may also include a continuum orchestrator302 configured to coordinate services and communications between thecontent provider domain 210 and other domains in the continuum. Thecontent provider domain 210 may include a domain orchestrator 306 e thatexposes a public interface on behalf of the domain. Likewise, each ofthe sub-domains 402, 404 may include a domain orchestrator 406 a, 406 bthat exposes a public interface on behalf of its respective sub-domain402, 404. In an embodiment, the public interfaces of the domains and/orsub-domains may be “consumed” by the continuum orchestrator 302 in orderto send and receive information (e.g., service requests) to and from thedomains 210, 402, 404. In an alternative embodiment, the domainorchestrator 306 e may assume the role of a continuum orchestrator 302(e.g., with respect to domain orchestrators 406 a, 406 b) and interactdirectly with other domain orchestrators (not illustrated in FIG. 4) inthe continuum. In a further embodiment, the domain orchestrator 306 emay be included, or implemented as part of, a component within thedomain (e.g., a content server, an authentication server, etc.).

In an embodiment, the domain orchestrator 306 e may decompose receivedservice requests into requests specific to the sub domains 402, 404. Inan embodiment, two or more orchestrators 302, 306 e, 406 a, 406 b may beconfigured to use a common ontology and semantics to describe theservice requests, as well as a common syntax and protocol for exchangingthese service requests (e.g., XML or JSON over HTTP in a RESTful manner,Diameter, etc.).

FIG. 5 illustrates logical components and information flows in anexample communication system 500 that includes a domain that may bedecomposed into functional resources in accordance with an embodiment.Specifically, FIG. 5 illustrates a mobile packet core domain 206 thatmay be decomposed into domain specific components that implement thedomain's functionality, such as the illustrated domain orchestrator 306c, policy management system component 502, charging system component504, policy and charging enforcement system component 506, userrepository system component 508, and traffic detection system component510.

The policy management system component 502 may be configured to storeand manage policies that are to be enforced for some or all users withinthe domain or continuum. The policy management system component 502 mayexpose one or more interfaces that enable the other components withinthe domain to request policy related information, and configure or addnew policies. These policies may include policies relating to allowing,blocking, restricting, prioritizing, and filtering network traffic basedupon criteria such as the source, the destination, or the type of thenetwork traffic. In an embodiment, the policy management systemcomponent 502 may be a Policy Decision Point (PDP), which is a knowncomponent of telecommunications networks. In an embodiment, the policymanagement system component 502 may be a Policy and Charging RulesFunction (PCRF) in a 3GPP network.

The charging system component 504 may be configured to store and managecharging information, such as rating information (i.e., information usedto calculate how much the user is charged for service consumption) andbalance management information relating to users. The charging systemcomponent 504 may expose one or more interfaces that enable the othercomponents within the domain to access charging related information, andconfigure or add new charging details. In the preferred embodiment of a3GPP network, the charging system component 504 may be an OnlineCharging System (OCS) or an Offline Charging System (OFSC).

The policy and charging enforcement system component 506 may beconfigured to enforce the policy and charging rules sent to the systemby the domain orchestrator component 306 c, the policy management systemcomponent 502, the charging system component 504, or any othercomponents within the mobile packet core domain 206. The policy andcharging enforcement system component 506 may also be responsible formetering and generating charging records (e.g., Charge Detail Records or“CDRs”) containing information about service and resource usage. In thepreferred embodiment of a 3GPP network, the policy and chargingenforcement system component 506 may be a Policy and ChargingEnforcement Point (PCEF).

The user repository system component 508 may be configured to store andmanage information relating to the users of the user equipments. Some ofthis information may be permanently managed by the user repositorysystem component 508, such as user specific preferences. Additionally,user repository system component 508 may be configured to retrieveinformation from other components within the telecommunicationsoperator's network and operational support systems/business supportsystems (OSS/BSS) environment (not shown). Examples of user repositoriesin the preferred embodiment of a 3GPP network may include a subscriberprofile repository (SPR), a home subscriber server (HSS), and a userdata repository (UDR). In various embodiments, the user repositorysystem component 508 may be a “user manager.”

The traffic detection system component 510 may be configured to performtraffic analysis (e.g., deep packet inspection or “DPI”) on datatraversing the mobile packet core domain 206. The traffic detectionsystem component 510 may additionally receive data from the policy andcharging enforcement system component 506, and/or interact with thepolicy management system component 502 and the charging system component504 to apply service and application related policies to passingtraffic, and to charge for these services and applications. The trafficdetection system component 510 may also generate usage statistics andreport them to the domain orchestrator 306 c. In the preferredembodiment of a 3GPP network, the traffic detection system component 510may be a Traffic Detection Function (TDF).

As mentioned above, the mobile packet core domain 210 may include adomain orchestrator 306 c that exposes a public interface for sendingand receiving information to and from the continuum orchestrator 302.The domain orchestrator 306 c may function as a gateway into the mobilepacket core domain 206 for accessing user information, policies,charging rules, balances, plan information, spending information, andcall details, along with the users' historical service and applicationusage. The domain orchestrator 306 c may optionally be located behind afirewall and/or a network address translation (NAT) device.

In an embodiment, the domain orchestrator 306 c may expose one or moreinternal interfaces used to communicate with the other components withinthe domain. In an embodiment, the domain components (e.g., components502-510) may be configured to communicate directly with each other usinginterfaces (not shown) that are internal to the domain.

In an embodiment, the domain orchestrator 306 c may be configured toperform management operations, such as filtering information going toand from components within the domain (e.g., components 502-510).Similarly, the domain orchestrator 306 c may cache information fromcomponents within the domain to avoid overloading these components withmultiple duplicate requests.

FIG. 6 illustrates logical components and information flows in acommunication system 600 that includes an example user equipment domain202. The user equipment domain 202 may include user equipment (e.g.,cell phones, laptop computers, tablet computers, cellular-equippedcameras, etc.), components connected to the user equipment (e.g.,sensors, wireless modems, GPS receivers, etc.), and other componentsthat provide functionality associated with the user equipment.Functionality associated with the user equipment may include informingthe user of events, enforcing policy or charging within the userequipment, performing traffic analysis, and exchanging user-specificinformation (e.g., balance information, loyalty information, userpolicies, user profile information, etc.) with the continuumorchestrator 302. The user equipment domain 202 and/or its associatedcomponents may be implemented as hardware components (e.g.,microprocessors, embedded circuitry, wireless modems with embeddedprocessors, etc.) configured with one or more software components (e.g.,applications, processes, services, daemons, etc.), and combinations ofhardware components and software components.

In the example illustrated in FIG. 6, the user equipment domain 202 maybe decomposed into the domain specific components configured toimplement one or more aspects of the domain's functionality (as opposedto being decomposed into additional domains). Such domain specificcomponents may include a domain orchestrator 306 a, a traffic detectionsystem component 602, a user interaction system component 604, a policymanagement system component 606, a charging system component 608, apolicy and charging enforcement system component 610, a user datarepository component 612, a power management system component 614, acommunication system component 616, and a location system component 618.

The domain orchestrator 306 a may be configured to function as a gatewayinto the user equipment domain 202 for accessing both user information(e.g., policies, charging rules, etc.) and device information (e.g.,location information, power information, etc.). In an embodiment, thedomain orchestrator 306 a may be a user equipment interaction agent(UEIA).

The traffic detection system component 602 may be configured to performtraffic analysis on data originating and terminating in the userequipment domain 202. The traffic detection system component 602 may befunctionally similar to a mobile packet core traffic detection system(e.g., the traffic detection system component 510 in the mobile packetcore domain 206 illustrated in FIG. 5). Due to its location in the userequipment domain 202, the traffic detection system component 602 mayalso provide user equipment functionality (e.g., additional trafficdetection methods) in addition to that provided by mobile packet coretraffic detection system (e.g., deep packet inspection). For example,the traffic detection system component 602 may directly access the userequipment's operating system's network stack, and may operate as a localproxy server. In an embodiment, the traffic detection system component602 may be a user equipment traffic detection function (UETDF).

The user interaction system component 604 may be configured to manageinteractions between the user and the user equipment domain 202, andhence the entire continuum. These interactions may occur visually (e.g.,via user equipment's graphical user interface, camera, notificationindicators, etc.), acoustically (e.g., via the user equipment's speaker,microphone, etc.), and/or tactilely (e.g., via the user equipment'stouch screen, buttons, vibration capabilities, motion detectors, etc.).These interactions may also occur via software components, such asapplications on the user equipment. For example, the user interactionsystem component 604 may add a reminder to the calendar application toremind the user to pay the bill associated with the user equipment bythe bill due date. In an embodiment, the user interaction systemcomponent 604 may be a user equipment application (UE-APP).

The policy management system component 606 may be configured to storeand manage the policies that are to be enforced for the user within theuser equipment domain 202. These policies may relate to any aspect ofthe user equipment, including charging rules, service rules, devicecapability rules, application specific rules, etc. The policies may becompulsory (e.g., when the user cannot change or override them) orself-imposed (e.g., when the user has set them). In an embodiment, thepolicy management system component 606 may be a user equipment policymanager (UEPM).

The charging system component 608 may be configured to manage allaspects of charging, rating, and balance management for the user of theuser equipment. The charging system component 608 may be configured tomake predictions regarding the future consumption of services based uponpast trends. In an embodiment, the charging system component 608 may bea user equipment charging, rating and balance manager (UECRBM).

The policy and charging enforcement system component 610 may beconfigured to enforce policy and charging rules, which may be receivedfrom the domain orchestrator component 306 a, the policy managementsystem component 606, the charging system component 608, or any othercomponent in the user equipment domain 202. The policy and chargingenforcement system component 610 may also be configured to performoperations for metering and generating charging records (e.g., ChargeDetail Records or “CDRs”) containing information about service andresource usage. In an embodiment, the policy and charging enforcementsystem component 610 may also provide functionality similar to thatprovided by a mobile packet core PCEF (e.g., the policy and chargingenforcement system component 506 illustrated in FIG. 5). In anembodiment, the policy and charging enforcement system component 610 maybe a user equipment enforcement function (UEEF).

The user data repository component 612 may be configured to store andmanage information relating to the user equipment and its user (e.g.,customer IDs, preferences, etc.).

The power management system component 614 may be configured to modifythe user equipment's resources to satisfy policies and resource rulesrelating to power consumption and conservation. For example, resourcerules designed to reduce the user equipment's power consumption mayturn-off the user equipment's display after a short period ofinactivity, or prevent background applications from maintaining radionetwork connections.

The communication system component 616 may be configured to manage allof the user equipment's external communication capabilities, which maybe performed in accordance to the policies of the policy managementsystem component 606 and/or the power management system component 614.

The location system component 618 may be configured to calculate,obtain, and/or provide location information relating to the userequipment, which may be achieved via a single location technology or acombination of multiple location technologies. The location systemcomponent 618 may be configured to operate with or without assistancefrom other external location systems. In an embodiment, the locationsystem component 618 may operate in accordance with the policies of thepolicy management system component 606 and/or the power managementsystem component 614. In an embodiment, the location system may be aglobal positioning system (GPS).

In an embodiment, the system 600 may also include a quality detectorcomponent (not shown in FIG. 6). The quality detector component may beconfigured to measure and report the quality of service (QoS) and thequality of experience (QoE) received in the user equipment domain 202.This measurement may be performed on the overall data originating andterminating in the user equipment domain 202, or on data pertaining tospecific applications and services consumed on the user equipment. In anembodiment, the quality detector component may have application-levelmeasurement capabilities. For example, the quality detector componentmay be configured to measure the number of correctly rendered frames persecond (or the pixilation/blockiness level) instead of (or in additionto) the number of bytes per second in a video stream.

As discussed above, various embodiments may group the devices,components, systems, networks, and/or resources between providers andconsumers of a service into a distinct set of logical domains, and thecombination of all the logical domains in the end-to-endtelecommunications network may form a continuum. In an embodiment, thecontinuum may be organized as a recursive hierarchy that enables policyand charging control (PCC) functions to be distributed amongst two ormore autonomous domains within the telecommunications network.

Distributing functionality is becoming increasingly important becausethe management and operation of modern telecommunications networksrequires that many domains work together in a consistent andcollaborative manner to deliver the overall service to the user. Forexample, some services (e.g., parental control services) should beconsistent regardless of which user equipment and access network areused to access digital content. For other services (e.g., video ondemand), the user equipment and the access network may be significantbecause the video may need to be optimized for the user equipment'sscreen size and the access network's capabilities.

Service policies may define the overall operation of the continuum, andhence the overall operation of all of the domains within the continuumthat are involved in the service delivery. These policies may beexpressed either abstractly in terms of the desired continuum behavior(e.g., optimize the network for video conferencing), or concretely interms of the desired continuum configuration (e.g., configure thenetwork to ensure that the maximum latency does not exceed 500 ms).

In an embodiment, the continuum orchestrator may decompose a servicepolicy into one or more domain specific service policies. The continuumorchestrator may send these domain specific service policies to theassociated domains. Each individual domain may have its own set ofservice policies to implement in order to achieve the overall continuumservice policy. In an embodiment, each domain may be configured toimplement the domain specific service policies in a manner consistentwith existing service policies.

In an embodiment, a domain orchestrator may decompose a service policythat is abstract into one or more domain specific concrete resourcerules. Therefore, abstract service policies may be effectivelypolymorphic. The domain orchestrator may send these domain specificconcrete resource rules to the associated components within the domain.

FIGS. 7A and 7B illustrate example logical components and informationflows in a communication system 700 having a continuum orchestrator 702configured to delegate service policies in accordance with anembodiment. Specifically, FIG. 7A illustrates example logical componentsand interactions in the communications system 700, and

FIG. 7B illustrates message flows and sequences in which messages may beexchanged between the logical components in the communications system700.

For reasons of clarity, FIGS. 7A and 7B are described together withreference to a specific set of example scenarios. However, it should beunderstood that the various embodiments are not limited to the examplescenarios, and this application should not be limited to operationsspecific to described scenarios unless expressly recited as such in theclaims.

FIG. 7A illustrates that the communication system 700 may include acontinuum orchestrator 702 and a continuum 704. The continuum 704 mayinclude all the resources (e.g., devices, components, systems, networks,etc.) in the end-to-end telecommunications network associated with aservice (or group or category of services), grouped into domains. Theresources may be grouped such that each domain is responsible for aparticular function or part of the telecommunications network. In theexample illustrated in FIGS. 7A and 7B, the resources are grouped intoat least a user equipment domain 706, a mobile packet core domain 708,and a fixed line domain 710. It should be understood that the continuum704 may include additional domains (e.g., radio access network domain,etc.), which have been omitted from FIGS. 7A-B to focus the discussionon the relevant features. Each domain 706, 708, 710 may include a domainorchestrator 712 a-c for sending and receiving information to and from acontinuum orchestrator 702.

Referring to FIG. 7B, in block 752 the continuum orchestrator 702 mayreceive a set of service policies 714, which may include two abstractservice policies relating to a single user that describe the desiredcontinuum behavior (i.e., “Prioritize video conferencing,” and “Disablegaming”). Other possible examples of policies include overall end-to-endbandwidth and aggregated throughput requirements, as well as more finegrained policies such as policies specifying the number of concurrentnetwork applications allowed (across both the user equipment domain 706and the mobile packet core domain 708), policies specifying thefrequency of connections spanning multiple domains, policies to preventunexpectedly large bills, policies relating to statistics generation,and application specific policies.

In block 754, the continuum orchestrator 702 may decompose the set ofservice policies 714 into three distinct subsets of service policies,and send one of these subsets to each of the user equipment domain 706(in block 756), the mobile packet core domain 708 (in block 758), andthe fixed line domain 710 (in block 760). Thus, the continuumorchestrator 702 effectively delegates service policies to each of thedomains.

A domain orchestrator (e.g., domain orchestrators 712 a-c) in eachdomain may receive the subset of service policies, and further decomposeeach service policy into one or more domain specific resource rules. Forexample, in block 762, the domain orchestrator 712 a in the userequipment domain 706 may decompose the service policy “Prioritize videoconferencing” into the resource rule “Dedicate core to videoconferencing” to ensure that one processing core in the user equipmentis available for video conferencing when it is required. Similarly, theservice policy “Disable gaming” may be decomposed into the resource rule“Block ‘Happy Fish’ game execution,” which when implemented in the userequipment prevents execution of the game.

In an embodiment, the domain orchestrators (e.g., domain orchestrators712 a-c) may generate resource rules based on a number of factors, suchas the capabilities, roles and/or availability of various domainresources. For example, the domain orchestrator 712 a may be configuredto determine the number of processing cores available on the userequipment and/or generate rules that dedicate processing cores tovarious tasks based on the determined availability of cores. In theexample discussed above, it may be assumed that the user equipment hasbeen determined to include at least two processing cores, becauseotherwise the domain orchestrator 712 a may have chosen not to dedicatean entire processing core to video conferencing. For example, if thedomain orchestrator 712 a had determined that the user equipment hasonly a single processing core, then the domain orchestrator 712 a mayhave created a resource rule limiting the maximum number of activeapplications and processes.

As this example illustrates, an advantage of a domain orchestrator(e.g., domain orchestrator 712 a) decomposing the service policieswithin the domain is that it may create resource rules that are specificto the types and instances of hardware and software implemented in thedomain. Further, as illustrated in this example, the mobile packet coredomain 708 may be responsible for implementing the maximum overallbandwidth, yet the user equipment domain 706 may enforce a maximum userequipment initiated application bandwidth. That is, the user equipmentmay implement maximum bandwidth for special purpose applications asopposed to either the maximum bandwidth for general purposeapplications, such as Internet browsers or the maximum aggregatedbandwidth for all applications.

Examples of other resource rules that may be applied within the userequipment domain 706 include rules to warn the user when he/she isreaching usage limits in order to prevent billshock, rules to implementapplication specific controls, rules to block daemons that send andreceive peer-to-peer network traffic, rules to prioritize maximizingperformance ahead of minimizing cost (and vice-versa), rules related tonotifying the user when thresholds are breached (e.g., 80% of monthlydata transfer, 20% of battery power remaining, etc.), and rules relatingto the user equipment's hardware capabilities (e.g., rules relating tothe device's operating system, display, battery, locating hardware,motion detectors, etc.).

In block 764, the domain orchestrator 712 b in the mobile packet coredomain 708 may decompose the service policy into a correspondingresource rule. For example, if the received service policy is“Prioritize video conferencing,” the mobile packet core domain 708 maydecompose the service policy into the resource rule “Provide 2 MB/svideo conferencing bandwidth.” This resource rule may be based upon boththe bandwidth requirement of video conferencing and the availableresources within the mobile packet core domain 708. Similarly, if thereceived service policy is “Disable gaming” the mobile packet coredomain 708 may decompose the service policy into the resource rule“Block ‘Happy Fish’ game traffic.” In this example, the domainorchestrator 712 b in the mobile packet core domain 708 may create aresource rule to block the downlink traffic associated with the HappyFish game, and the domain orchestrator 712 a in the user equipmentdomain 706 may create a resource rule to block the uplink trafficassociated with the game. In this example scenario, the user equipmentdomain 706 and the mobile packet core domain 708 cooperate to block theforbidden traffic as close to the source as possible. This eliminatesintermediate network nodes (e.g., nodes in the radio access networkdomain) from processing game-related traffic that will ultimately bediscarded in the user equipment. Examples of other resource rules thatmay be applied within the mobile packet core domain 708 include rules toblock peer-to-peer (P2P) traffic, rules to block software updates to theuser equipment, and rules to implement video boosting.

Similarly, in block 766 the domain orchestrator 712 c in the fixed linedomain 710 may decompose a received service policy into a resource ruleappropriate for the fixed line domain. For example, if the receivedservice policy is “Prioritize video conferencing,” the domainorchestrator 712 c in the fixed line domain 710 may decompose thispolicy into the resource rule “Prioritize video conferencing traffic.”The domain orchestrator in any domain may further be configured toignore service policies for which its domain has no involvement orcorresponding capabilities/functionalities. For example, as part ofblock 766, the domain orchestrator 712 c may be configured to notdecompose the service policy “Disable gaming” in response to determiningthat the fixed line domain 710 does not include any components orfunctionality for detecting game traffic, as may be the case for thisexample scenario.

In a further enhancement, the domain orchestrator (e.g., domainorchestrators 712 a-c) in each domain may combine additional resourcerules (e.g., user-specific resource rules or domain wide resource rules)with the generated domain specific resource rules. For example, thedomain orchestrator 712 a in the user equipment domain 706 may combinethe user specific resource rule “Minimize energy consumption” 716 withthe generated resource rules “Dedicate core to video conferencing” and“Block ‘Happy Fish’ game execution” 718 in block 762.

In an embodiment, the domain orchestrators (e.g., domain orchestrators712 a-c) may have a resource rules conflict resolver (not illustrated)configured to identify conflicts and/or determine which resource rulesare to be given priority when a conflict exists. For example, the system700 may be configured such that the policies from the continuumorchestrator 702 are given priority over the policies associated withthe user equipment domain 706, in which the system may limit the userfrom, for example, increasing his/her monthly allowance beyond themonthly allowance permitted by the continuum orchestrator 702. Inanother example, the policies associated with the fixed line domain 710may be given priority over the policies received from the continuumorchestrator 702.

In an embodiment, the continuum orchestrator 702 and its associatedcontinuum 704 may be configured to support many additional servicepolicies that span one or more domains.

FIGS. 8A and 8B list continuum service policies, along with thedecomposed resource rules that may be applied in a user equipment domainand a mobile packet core domain (e.g., the user equipment domain 706 andmobile packet core domain 708 illustrated in FIGS. 7A-B). Similardomain-specific policies may be applied for other domains (e.g., thefixed line domain 710).

FIGS. 9A-9B illustrate embodiment methods for delegating servicepolicies in an example continuum. Specifically, FIG. 9A illustrates anembodiment continuum orchestrator method 900 for delegating servicepolicies across the continuum, and FIG. 9B illustrates an embodimentdomain orchestrator method 920 for implementing delegated servicepolicies as domain specific resources rules.

FIG. 9A illustrates an embodiment continuum orchestrator method 900 fordelegating service policies in an example continuum. In block 902, thecontinuum orchestrator may receive service policies relating to a singleuser that describe a desired continuum behavior (e.g., “improve videoconferencing,” etc.). In block 904, the continuum orchestrator maydecompose the received service policies into distinct subsets of servicepolicies. The distinct subsets may be generated based on thecapabilities, operations, roles and/or availability of the domains inthe continuum. The distinct subsets may include service policiesspecific to the domain to which they are to be sent and/or servicepolicies that may be implemented by multiple domains. In block 906, thecontinuum orchestrator may send a distinct subset of service policies toeach of the domains. The domain orchestrator in each domain may receivethe subset of service policies, decompose each service policy into oneor more domain specific resource rules, and send the domain specificresource rules to one or more components in the domain for enforcement.

FIG. 9B illustrates an embodiment domain method 920 for implementingdelegated service policies as domain specific resources rules. In block922, a domain orchestrator in a domain (e.g., user equipment domain) mayreceive a subset of service policies from a continuum orchestrator. Forexample, the domain orchestrator may receive a subset of servicepolicies that include a “prioritize video conferencing” policy and a“disable gaming” policy.

In block 924, the domain orchestrator may decompose the received servicepolicies into resources rules. For example, a domain orchestrator in auser equipment domain may decompose the “prioritize video conferencing”policy into the resource rule “dedicate core to video conferencing” andthe “disable gaming” policy into the resource rule “block ‘Happy Fish’game execution.” Likewise, a domain orchestrator in a mobile packet coredomain may decompose the “prioritize video conferencing” policy into theresource rule “provide 2 MB/s video conferencing bandwidth” and theservice policy “disable gaming” into the resource rule “block gametraffic” or “block ‘Happy Fish’ game traffic.” As another example, adomain orchestrator in a fixed line domain may decompose in the servicepolicy “prioritize video conferencing” into the resource rule“prioritize video conferencing traffic,” but ignore the service policy“disable gaming” in response to determining that the fixed line domaindoes not include any resources capable of detecting game traffic. Inblock 926, the domain orchestrator may send the domain specific resourcerules to the relevant components in the domain for enforcement.

As mentioned above, the various embodiments provide complete andholistic network solutions that enable reliable, efficient andprofitable end-to-end delivery of services across multiple heterogeneousnetworks participating in the delivery of a service. To facilitatenetwork operations among the diverse domains in a decentralizedarchitecture, the components, domain orchestrators, and one or morecontinuum orchestrators may exchange network and communicationinformation regarding service conditions, network operations,billing/charging, and other communication-related information. For easeof reference, such information is referred to herein generally as“information.” In various embodiments, the continuum may provide aholistic approach to the exchanging of information between domains.Domains may be configured to collect, publish, and/or transferinformation to both the continuum orchestrator and one or more otherdomains. In an embodiment, the domain orchestrator in each domain may beconfigured to perform operations for the collection, publication,transfer, and consumption of all information relating to its domain.

Information exchanged between domains may include usage monitoring andreporting information, such as time based information (e.g., the starttime of a phone call, the duration of the phone call, etc.), volumebased information (e.g., the number of SMS messages sent in the currentperiod, the total number of bytes received by the domain today, etc.),event based information (e.g., purchases of service upgrades, etc.), andperformance based information (e.g., the average bit rate, and themaximum upload speed, etc.). The exchanged information may also includeservice purchase information (e.g., type of service, cost of service,data and time of service purchase, previous related purchases, etc.),service rating information (e.g., current rating plan, etc.), andbalance information (e.g., current balance, previous transactions,threshold information, etc.). The exchanged information may furtherinclude policy information (e.g., policies relating to users, policiesrelating to services, policies relating to domains, etc.). The exchangedinformation may further include contextual information (e.g., the userequipment domain may collect location, signal strength, temperature,time, remaining battery power, biometric information, etc.). Theexchanged information may also include information relating to users(e.g., service preferences, relationships with other users, groupaccount information, etc.). In an embodiment, the domains may beconfigured to process (e.g., sum, average, aggregate, compare,correlate, etc.) the information before transferring it to other domainsin order to enhance its usefulness in managing overall networkfunctionality among the various domains.

In an embodiment, the domains in a continuum may assume, or may beassigned, one or more roles related to creating, monitoring, andconsuming the communication-related information exchanged in managingcommunication sessions and network operations in general. For example,in an embodiment a domain may assume the role of a master, a creator, ora consumer of information. A domain may assume (or be assigned) morethan one role (e.g., a domain may be a master of one piece ofinformation and a consumer of another piece of information, and a domainmay be both the creator and the master of the same information).

In an embodiment, a domain may change its role as the continuum changes.For example, a domain may initially be both the creator and the masterof information, but due to changes in the continuum (e.g., the domainbecomes overloaded, the domain begins generating erroneous data, thedomain becomes unreliable, etc.) the domain may relinquish its role asthe master of the information.

A domain assuming the role of master of information may function as theauthoritative source of that information, and may therefore beresponsible for publishing the information within the continuum. Themaster may also be responsible for enforcing controlled access to theinformation, and for ensuring the accuracy and integrity of theinformation. There may be many different masters within a continuum,because there may be many different pieces of information within thecontinuum. However, a single piece of information may only have onemaster.

A domain assuming the role of creator of information may function as theproducer of a piece of information. This information may include usagemonitoring and reporting information, service information, policyinformation, contextual information, user information, etc. The creatorof the information may process the information that it produces, beforetransferring it to the master for publication. There may be multiplecreators of the same piece of information within a continuum (e.g., botha user equipment domain and a radio access network domain may producelocation information for a specific user).

A domain assuming the role of consumer of information may receive, andsubsequently use, the published information from one or more masters ofinformation. This usage may vary depending on the type of domain (e.g.,a user equipment domain may display the information to the user, amobile packet core domain may use the information for charging and frauddetection purposes, and a content provider domain may use theinformation to adjust a service policy).

In various embodiments, the information may be published, transferred,synchronized, and consumed in different ways depending on the roles ofthe involved domains and the information that is exchanged. The purposeof exchanging the information may be to transfer information from amaster domain to a consumer domain, to synchronize information between acreator domain and a master domain, and/or to compare the informationfrom two or more creator domains for assurance purposes.

Information may be exchanged between domains within the continuum toensure that the consumer domain has accurate and reliable informationfrom the master domain. In an example embodiment, the creator domain maybe the mobile packet core domain, the master domain may also be themobile packet core domain, and the consumer domains may be both themobile packet core domain and the user equipment domain. In thisexample, all information (e.g., metering information, ratinginformation, charging information, balance information, etc.) may becreated and published by the mobile packet core domain. The informationmay be transferred from the mobile packet core domain to the userequipment domain each time that it is required (e.g., when the userrequests his/her current balance using a software application on theuser equipment, etc.), and the user equipment domain may subsequentlypresent the information in a user-friendly manner. The mobile packetcore domain may also be a consumer domain in this example because it mayrequire charging information for billing and revenue assurance purposes.

Information may be exchanged between domains within the continuum toensure that information created in one domain is consistent with thesame information created in another domain. Two domains may besynchronized so they both possess the same information, rather than onedomain simply obtaining the information from or transmitting to theother domain.

In an example embodiment, the creator domains may be both the userequipment domain and the mobile packet core domain, the master domainmay also be the mobile packet core domain, and the consumer domains maybe both the mobile packet core domain and the user equipment domain. Anadvantage of enabling the user equipment domain to be a creator domainis that the information that is most relevant to the user (e.g.,metering information, rating information, charging information, balanceinformation, etc.) is created in the domain where it is most likely tobe required (e.g., by a software application). This eliminates the needfor any network communications with other domains when the user requeststhe information, and therefore the software application is moreresponsive and requires less network resources than is the case with acentralize network architecture as is the current standard. Thus, theinformation created in the user equipment domain may be primarilyintended for the user's benefit. The mobile packet core domain may alsogenerate this information simultaneously for other purposes (e.g.,billing and revenue assurance purposes), and since it is the masterdomain, its version of the information remains the authoritativeversion. Therefore, the information created in the user equipment domainmay be periodically checked to ensure that it is consistent with thesame information created in the mobile packet core domain. Anydiscrepancies in the information may indicate that the user equipment isexperiencing technical difficulties or intentionally attempting todefraud the mobile packet core domain. In this case, the information maybe synchronized across domains by replacing the incorrect portions ofthe information in the user equipment domain with the correct portionsof information from the mobile packet core domain.

Information may be exchanged between domains within the continuum toensure that information created in an unsecure domain is audited againstthe same information created in a secure domain. Therefore, theinformation created by the two domains may be compared to verify itsintegrity and identify discrepancies.

In an example embodiment, the creator domains may be both the userequipment domain and the mobile packet core domain, the master domainmay be the user equipment domain, and the consumer domains may be boththe user equipment domain and the mobile packet core domain. In thisexample, the user equipment domain is both a creator and consumer ofinformation (e.g., metering information, rating information, charginginformation, balance information, etc.). This information may be theauthoritative information used for billing purposes because the userequipment domain is the master domain. In this scenario, the informationmay be sent to a centralized billing system in the mobile packet coredomain. This information may also be consumed by the user equipmentdomain for subsequent use in a software application. An advantage of theembodiment described by this example is that the mobile packet coredomain does not need large complex systems that are costly in order tocontinuously record usage information for all users all of the time,because the user equipment domain is the master domain for thisinformation. Another advantage of this embodiment is that users alwayshave direct access to all of their information (e.g., using a softwareapplication on the user equipment) with minimum latency because the userequipment domain is the master domain. However, the user equipmentdomain may not be a secure domain, because it could be subjected totampering by a malicious user. Therefore, the mobile packet core domainmay be both a creator and consumer of the same information, and it is asecure domain because it is under the direct control of the networkoperator.

In an example embodiment, the mobile packet core domain may create theinformation and compare it with the information created by the userequipment domain. This may occur at fixed time intervals, randomly, whenit has sufficient resources, or when there is a suspicion that the userequipment domain is behaving fraudulently (e.g., based on previous usagepatterns). The mobile packet core domain may become the master domainfor that information, and hence the user equipment domain may forfeitthis role, if the information created by the user equipment domaindiffers from the same information created by the mobile packet coredomain. In an example embodiment, the mobile packet core domain mayretrieve the information from the user equipment domain when it isrequired (e.g., when a user contacts the network operator's customercare center the agent may require the user's current balance).

Information may be exchanged between domains within the continuum toensure that the information is created in the domain where it is mostlikely to be consumed, which minimizes the transferring of informationbetween domains. Therefore, there may be many different master domainswithin the continuum, and each master domain may be responsible fordifferent types of information.

In an example embodiment, the creator domains may be both the userequipment domain and the mobile packet core domain, the master domainsmay be both the user equipment domain and the mobile packet coredomains, and the consumer domains may be both the user equipment domainand the mobile packet core domain. In this example, the user equipmentdomain may be the master of metering information, because this meteringinformation may include application level information that is onlyvisible to the user equipment domain. The mobile packet core may be theconsumer of this metering information, and it may subsequently processit further by combining it with rating information to create charginginformation and balance information. The mobile packet core domain maybe the master of this charging information and balance information, andthe user equipment domain may be a consumer of this charging informationand balance information. In another example embodiment, the mobilepacket core domain may be the master of the balance information.However, the mobile packet core domain may allocate a portion of theuser's balance to the user equipment domain so that service can becharged for within the user equipment domain. Therefore, the userequipment domain may be promoted to being a master domain for thebalance information that represents the allocated balance.

Information may be exchanged between domains (e.g., from a master domainto a consumer domain) using any suitable messaging choreography model,such as a push model in which one domain asynchronously sendsinformation to another domain; a request-response model in which onedomain queries another domain for information and subsequently receivesa response containing the information; or a subscription model in whichone domain registers with another domain to receive information whenevera notification event occurs (e.g., a fixed period of time elapses,information becomes available, etc.).

Regardless of the messaging choreography model being used, the consumerdomain may inform the master domain of the information that it requires(i.e., the type of information, and the specific resource or resourcesto which the information type relates). The consumer domain may alsospecify a refresh period value that indicates how frequently theconsumer domain is likely to require an update of the information. Theconsumer domain may require frequent updates to prevent it from becomingunsynchronized if the information changes rapidly. The refresh periodmay be time based (e.g., once an hour), quantity based (e.g., after 10Mb), event based (e.g., after viewing a video on demand film), costbased (e.g., when there is less than $5 of credit remaining in apre-paid account), trust based (e.g., information from an un-trusteddomain is refreshed more frequently than information from a trusteddomain), and resource based (e.g., the refresh period is related to theavailability of resources within the continuum). The master domain mayrespond with the required information, or an error message indicatingwhy the required information could not be provided. The master domainmay also respond with a freshness value that indicates how long therequired information is likely to remain valid (e.g., a piece of balanceinformation might have a 95% probability of remaining valid for 3hours), and hence how frequently an update of the information is likelyto be required.

In an embodiment, the information may be synchronized between domains(e.g., between a creator domain and a master domain) periodically, uponthe occurrence of an event, or in response to a request for theinformation from a domain. In this scenario, the creator domain mayinform the master domain of its role (i.e., a creator domain), itsinformation creation capabilities (e.g., the frequency with which it cancreate the information), and the information that it can create (i.e.,the type of information, and the specific resource or resources to whichthe information type relates). The creator domain may include theinformation to be synchronized, which may be a subset of all of theinformation that it creates, along with a confidence value thatindicates the correctness of this created information. The creatordomain may also specify a refresh period value. The master domain mayrespond with its role (i.e., a master domain), the information that itmasters (i.e., the type of information, and the specific resource orresources to which the information type relates), and the information tobe synchronized. The master domain may also respond with a freshnessvalue. The creator domain may then respond with its role (i.e., acreator domain), and for each piece of information that was synchronizedthe creator domain may include an acknowledgement receipt and details ofany synchronization discrepancy (e.g., the expected information, thedifference between the actual information and the expected information,and a log of the information creation process that the master domain canuse to reconcile the discrepancy).

In various embodiments, the domain orchestrators and/or continuumorchestrators may be configured to detect discrepancies in information.Discrepancies between the information from domains may occur for anumber of reasons. For example, discrepancies between the informationfrom domains may occur because one domain is creating the data usingdifferent criteria than the other domain (e.g., two domains may becalculating charging information using the same metering information butdifferent rating information). As another example, discrepancies betweenthe information from domains may occur because one domain is behavingmaliciously in order to intentionally defraud the other domain. Asanother example, discrepancies between the information from domains mayoccur because one domain has different capabilities than the otherdomain (e.g., two domains may be creating metering information, but onlyone of these domains may be able to meter application level events). Asanother example, discrepancies between the information from domains mayoccur because one domain has access to additional information (e.g., auser equipment domain may have access to metering information for eachradio access type, whereas a mobile packet core domain might only haveaccess to metering information relating to one radio access type). Asanother example, discrepancies between the information from domains mayoccur because one domain is malfunctioning. In an embodiment, amalfunctioning domain may be detected if it is observed that certaintypes of domain consistently malfunction.

In an embodiment, the quantity of information exchanged between domainsmay vary based upon the domains involved and their states. For example,some situations may require only a small amount of information to beexchanged, whereas other situations may require a complete set ofinformation to be exchanged. In this embodiment, the domains mayinitially attempt to exchange only the minimum information that isrequired at a given time or to support a particular service, transactionor event in order to minimize the use of network resources. If thisminimum information is not sufficient, then the domains may exchangeprogressively larger amounts of information until sufficient informationhas been exchanged. For example, the user equipment domain may have therole of a creator domain and it may exchange information with a mobilepacket core domain that has the roles of both a creator domain and amaster domain. If the master domain is synchronizing the informationcreated by both domains (e.g., a single piece of balance information),then the two domains may exchange only the balance information. However,if the master domain detects a discrepancy between the information fromthe two domains, then they may exchange the complete set of charginginformation that was created since the two domains last had asynchronized balance. The master domain can then use this charginginformation to reconcile the discrepancy in the balance information.

In an embodiment, the information may be exchanged between the domainsusing a flexible and extensible type of data structure based upon calldetail records (CDRs). For example, a domain requesting the information(e.g., a consumer domain) may include information about the requiredcall detail records in the initial request. Such call detail recordsinformation may include the starting point from which call detailrecords are required (e.g., any combination of a date and time, aquantity of data, a service event, a threshold breach, a monetaryamount, etc.), the end point to which call detail records are required(e.g., any combination of a date and time, a quantity of data, a serviceevent, a threshold breach, a monetary amount, etc.), the frequency withwhich the call detail records are created (e.g., once every 15 minutes,etc.), the length of time for which the call detail records should beretained (e.g., if the call detail records will be deleted from the userequipment domain after they have been exchanged with the mobile packetcore domain, then the mobile packet core may need to retain the calldetail records indefinitely), and the quantity of information requiredin each call detail record.

In various embodiments, the exchanging of usage monitoring and reportinginformation between domains may be used to determine the actual qualityof service (QoS) that is received in one or more domains, as distinctfrom the intended quality of service that may be specified by thecontinuum orchestrator. This quality of service may be measuredobjectively using one or more network properties (e.g., bit rate, biterror rate, packet delay, packet loss, allocation and retention priority(ARP), QoS class indicator or (QCI), etc.). The difference in quality ofservice may occur due to issues, restrictions, and limitations in any ofthe domains involved in the delivery of the overall end-to-end service.If the user has been sold a service with a specified intended quality ofservice (e.g., a video service with a guaranteed video delivery rate,etc.) then it may be necessary to increase or decrease the allocatedquality of service in one or more domains to ensure that the userreceives the correct actual quality of service in the user equipmentdomain.

In an embodiment, the quality of service may be measured independentlyfor both the uplink network traffic and the downlink network traffic ineach domain. Differences between the actual qualities of service for asingle network traffic flow in two or more domains may occur as a resultof quality of service loss between the domains. For example, adifference in the downlink actual quality of service between a mobilepacket core domain and a content provider domain may be due to downlinktraffic loss in a transit network domain. The combination of the actualquality of service information from different domains in the continuummay enable the continuum orchestrator (or one or more domainorchestrators, either individually or in collaboration) to modifyservices to adjust their end-to-end actual quality of services.

In an embodiment, the intended quality of service may be obtained byusing an out-of-band communication with the content provider, byexamining the network traffic for embedded intended quality of servicemeta-data, by performing a lookup based upon the service type, or byincreasing the allocated quality of service until the actual quality ofservice stops increasing and remains constant.

In various embodiments, the quality of service monitoring and reportingmay include—or may be used to determine—the actual quality of experience(QoE) received in one or more domains. This quality of experience may beused as a subjective measure of a user's experience of a particularservice (e.g., a video on demand service, a web browsing service, a gameplaying service, a file sharing service etc.). In an embodiment,automated tools may be used to objectively measure/estimate the qualityof experience. For example, video analysis tools capable of measuringpoor quality video may be used to estimate the user's quality ofexperience. Similarly, various embodiments may measure the times takento load web-pages as a way of determining web browsing quality ofexperience. The quality of experience may be used by the continuumorchestrator (or one or more domain orchestrators, either individuallyor in collaboration) to determine whether to increase or decrease theallocated quality of service in one or more other domains in order toensure that the user receives an acceptable quality of experience in theuser equipment domain.

FIG. 10 illustrates an embodiment method 1000 for adjusting theallocated quality of service. In block 1002 a domain component (e.g., adomain orchestrator) may monitor the actual quality of service receivedand report this information to the continuum orchestrator or a domainorchestrator in another domain. In block 1004 the continuum orchestratormay compare the actual quality of service to the intended quality ofservice. In an alternative embodiment, in block 1004, the continuumorchestrator may compare the actual quality of service received from twoor more domains. If there is not a significant difference between theactual and intended quality of services, or if changing the allocatedquality of service is unlikely to affect the actual quality of service(e.g., the network resources within the continuum are being fullyutilized), then control may return to the domain in block 1002.Otherwise, the continuum orchestrator (or a domain orchestrator inanother domain) may request one or more domains to adjust the allocatedquality of service in block 1006. In an embodiment, the magnitude of theallocated quality of service adjustment may be related (e.g., by one ormore of proportional control, integral control, and derivative control)to the difference between the actual quality of service and the intendedquality of service.

The embodiment method 1000 for enabling the continuum orchestrator andthe domains to adjust the allocated quality of service shown in FIG. 10may be modeled as a closed circuit feedback control loop. In this modelthe system is the overall continuum, the controller is the combinationof the continuum orchestrator, and one or more domains (which may inturn use internal components such as policy management systemcomponents), and the sensors are components within the domains (such aspolicy and charging enforcement system components, traffic detectionsystem components, and quality detector components). The system inputmay be the allocated quality of service, the system output may be theactual quality of service, and the measured error may be the differencebetween the intended quality of service and the actual quality ofservice. The use of feedback control loops with the continuum has theeffect of enabling the network to become self organizing. In anembodiment, the magnitude and compositional network properties of thequality of service feedback may be based upon machine learningtechniques (e.g., reinforced learning, etc.).

In an embodiment, a domain may include both network properties that arespecific to the domain and network properties that relate to theend-to-end service. These network properties may relate to either orboth of the overall uplink network traffic quality of service and theoverall downlink network traffic quality of service. The networkproperties may include an aggregated (e.g., summed, averaged, maximum,etc.) actual quality of service; an aggregated intended quality ofservice; an aggregated available quality of service; and informationregarding resource availability. In an embodiment, the domain propertiesmay include network properties that are application and servicespecific.

In various embodiments, the continuum orchestrator may requestinformation from one or more external systems in order to determine thedomains that should adjust their allocated quality of service, and themagnitudes of such adjustments. These external systems may be: qualityof service or quality of experience analysis systems; user data stores(e.g., HSS, SPR, UDC, SDM etc.); congestion management systems; loyaltymanagement systems; malware or virus detection systems; charging orbilling systems; offload management systems; and media optimizationengines. In an embodiment, the continuum orchestrator may obtaininformation from other domains.

As mentioned above, the continuum orchestrator may request one or moredomains to adjust the allocated quality of service. These adjustmentsmay relate to either or both of the overall uplink network trafficquality of service and the overall downlink network traffic quality ofservice, and they may relate to specific applications and services. Thecontinuum orchestrator may request a decrease in the allocated qualityof service, if either there are insufficient network resources withinthe domain to provide the intended quality of service, or if the actualquality of service is greater than the intended quality of service. Inan embodiment, the user may be notified if the actual quality of serviceis insufficient. The user may be offered an additional or differentservice that provides a greater actual quality of service if there areavailable network resources within the continuum. The continuumorchestrator may request an increase in the allocated quality ofservice, if there are available network resources within the domain. Inan embodiment, a domain may reconfigure its behavior and resources inorder to increase the actual quality of service for a specific serviceby decreasing the allocated quality of service for other services (e.g.,a mobile packet core domain may reduce or eliminate the networkresources available for video on demand services in order to increasethe resources available for video call services). A domain may offloadsome of its network traffic from one adjacent domain to another adjacentdomain in order to increase the allocated quality of service (e.g., auser equipment domain may offload traffic from one radio access networkdomain to another access network domain).

A domain may modify one or more services in order to reduce the need foradjusting the allocated quality or service for a specific service. Forexample, a mobile packet core domain may dynamically and temporarilyadjust the rating plans of services to discourage the use of resourceintensive services, and a content provider domain may encode video usinga codec that provides greater compression.

In an embodiment, the feedback control loop may operate continuously. Inan alternative embodiment, the feedback control loop may be started andstopped as required. This may occur based upon one of more of the time(e.g., the actual quality of service may be measured at fixed timeintervals, or the time intervals may be related to the magnitude of theprevious difference between the actual quality of service and theintended quality of service); events that occur within a domain (e.g.,the actual quality of service drops below a predefined threshold);network intelligence (e.g., the output of either a probability basedforecasting system or a machine learning algorithm); external systemtriggers (e.g., a service assurance system); human intervention (e.g.,the user, or a customer support engineer); and any other events.

In various embodiments, the feedback control may be applied to either orboth of the overall uplink network traffic quality of service and theoverall downlink network traffic quality of service. In an embodiment,the feedback control may be applied to specific types of network traffic(e.g., TCP network traffic, UDP network traffic, Real-Time TransportControl Protocol (RTCP) network traffic, etc.). The method ofcalculating the allocated quality of service adjustment may differbetween network traffic sent using a reliable protocol (e.g., TCP) and abest-effort protocol (e.g., UDP). In an embodiment, the feedback controlmay be applied to the network traffic associated with one or moreprotocols, services, or applications rather than the total networktraffic.

FIG. 11 illustrates message flows in an example embodiment of thefeedback control loop within a continuum including a continuumorchestrator 1102 and three domains (i.e., a user equipment domain 1104,a radio access network domain 1106, and a mobile packet core domain1108) in accordance with an embodiment. In this embodiment, thecontinuum orchestrator controls the allocated quality of service (QoS)in the three domains in order to ensure that the actual quality ofservice measured in each domain is greater than or equal to the intendedquality of service. In block 1110, a component (e.g., the qualitydetector component) within the user equipment domain 1104 may measurethe actual quality of service received in the user equipment domain1104. In block 1116, the user equipment domain 1104 may report themeasured actual quality of service to the continuum orchestrator 1102.The user equipment domain 1104 may also report the allocated quality ofservice and the intended quality of service. The user equipment domain1104 may report this quality of service information separately for boththe uplink network traffic and the downlink network traffic. Theoperations illustrated in these blocks may be repeated in both the radioaccess network domain 1106 (i.e., blocks 1112 and 1118) and the mobilepacket core domain 1108 (i.e., blocks 1114 and 1120).

In block 1122, the continuum orchestrator 1102 may calculate thedifference between the actual quality of service and the intendedquality of service for each domain. In an alternative embodiment, thedifference between the actual quality of service and the intendedquality of service may be calculated within each domain, andsubsequently reported to the continuum orchestrator 1102. The continuumorchestrator may subsequently calculate the change that is necessary toadjust the allocated quality of service and/or identify the domains inwhich such adjustments should occur.

In block 1124, the continuum orchestrator 1102 may send a servicerequest to the mobile packet core domain 1108 containing a servicepolicy describing the required new allocated quality of service. Inblock 1130, the mobile packet core domain 1108 may apply the new servicepolicy. The operations illustrated in these blocks may be repeated inboth the radio access network domain 1106 (i.e., blocks 1126 and 1132)and the user equipment domain 1104 (i.e., blocks 1128 and 1134). Theprocess may then be repeated by returning to block 1110 if necessary(i.e., if the actual quality of service differs from the intendedquality of service). As described previously, the messages may bedefined and exchanged using any common syntax and protocol (e.g., XML orJSON over HTTP in a RESTful manner, Diameter, etc.).

FIG. 12A illustrates the initial partial state of three domains (i.e.,the user equipment domain, the mobile packet core domain, and thecontent provider domain) within an example continuum. In the exampleillustrated in FIG. 12A, the user equipment is consuming two services(i.e., a video on demand service and a user equipment update service),and both of these services are delivered using a reliable protocol. Eachservice has an associated priority, and this priority may have beenassigned by either the user who owns the user equipment or the owner ofanother domain (e.g., the network operator). The network traffic qualityof service (QoS) associated with each service is quantified solely interms of bandwidth for ease of understanding, but it could also bequantified in terms of one or more other network properties. Thisnetwork traffic quality of service may be measured in terms of kilobitsper second (kb/s). Furthermore, the feedback control loop may be onlyapplied to the downlink network traffic for the sake of simplicity, butit could also be applied separately to the uplink network traffic.Similarly, the feedback control loop may be only applied to one domain,but it could also be applied to the user equipment domain and thecontent provider domain. In this initial state the user may be activelyviewing a video, so the video-on demand service requires a significantdownlink quality of service. Similarly, in this example the userequipment update service requires a substantial downlink quality ofservice, because the user's user equipment is updating the operatingsystem and installed applications as part of a background task.

In this initial state of the illustrated example, the video on demandservice has a downlink intended quality of service of 3,000 kb/s (asspecified by the content provider domain) and a downlink allocatedquality of service of 3,000 kb/s (as specified in the mobile packet coredomain), but the downlink actual quality of service is only 2,000 kb/s(as measured by the user equipment domain). Thus, the user equipmentdomain is receiving a downlink quality of service that is 1,000 kb/sless than intended. This loss in the downlink quality of service couldbe due to issues in the radio access network domain such as congestion,poor signal strength, and over allocation of radio resources. In thisexample, the user equipment update service is not experiencingdegradation of the downlink quality of service, because the actualdownlink quality of service in the user equipment domain is equal to thedownlink intended quality of service in the content provider domain(i.e., 2,000 kb/s).

In this example, the feedback control loop may attempt to improve thedownlink actual quality of service associated with the video on demandservice, because this service has the highest priority. Therefore, thecontinuum orchestrator may increase the downlink allocated quality ofservice in the mobile packet core domain (i.e., from 3,000 kb/s to 4,000kb/s) until the downlink actual quality of service in the user equipmentdomain equals the downlink intended quality of service (i.e., 3,000kb/s) in the content provider domain. This adjustment of the downlinkallocated quality of service may occur over several iterations of thefeedback control loop. Although all of the services may be using acommon bearer for their network traffic, the continuum orchestrator canincrease the downlink allocated quality of service for each service, andthus increase the downlink allocated quality of service for the bearer.Therefore, the downlink allocated quality of service associated with theuser equipment update service does not change.

FIG. 12B illustrates an example stable state of the domains after thefeedback control loop has finished iterating, and the quality of servicevalues that have changed from the initial state are underlined forclarity.

In an embodiment, it is probable that the network conditions in thecontinuum will change continuously, and therefore the downlink actualquality of service may continuously fluctuate relative to the downlinkallocated quality of service. However, the feedback control loop mayalso operate continuously to ensure that the downlink actual quality ofservice equals the downlink intended quality of service.

FIG. 12C illustrates an example initial state of the domains after thenetwork conditions in the continuum have changed due to the userrequesting a higher quality of video from the video on demand service.This example requested change has caused the downlink intended qualityof service in the content provider domain to increase to 4,000 kb/s forthe video on-demand service, while the user equipment update serviceremains unchanged.

In an embodiment, it is probable that there is an upper limit to theavailable downlink allocated quality of service in the mobile packetcore domain. Therefore, the continuum orchestrator may not be able tokeep increasing this in order to increase the downlink actual quality ofservice in the user equipment domain as part of the feedback controlloop for the video on demand service. In this case, the continuumorchestrator may send a new service policy to the mobile packet coredomain requesting it to redistribute the downlink allocated quality ofservice between the services. This enables the continuum orchestrator,as part of the feedback control loop, to ensure that the highestpriority service can still receive the downlink intended quality ofservice in the user equipment domain. This may be achieved by increasingthe downlink allocated quality of service in the mobile packet coredomain for the video on demand service and decreasing the downlinkallocated quality of service in the mobile packet core domain for theuser equipment update service such that the total downlink allocatedquality of service in the mobile packet core domain remains unchanged(i.e., 6,000 kb/s).

FIG. 12D illustrates an example of the stable state of the domains afterthe feedback control loop has finished iterating.

The continuum orchestrator may continue to monitor the networkconditions as part of the feedback control loop, and it may frequentlyor continuously redistribute the downlink allocated quality of serviceas the network conditions vary.

In various embodiments, the feedback control may be applied to anydomains within the continuum that are involved in the delivery of anend-to-end service. For example, the feedback control loop may beapplied to machine-to-machine domains and mobile packet core domains toensure that machine-to-machine based services that are nottime-sensitive only use the mobile packet core when there are surplusnetwork resources available. Likewise, the feedback control loop may beapplied to fixed line domains and content provider domains to ensurethat the content providers that are using a flexible infrastructure(e.g., an infrastructure based upon cloud computing principles) arecapable of dynamically expanding and contracting to meet changingservice demands from the fixed line domains.

In a further enhancement, the continuum orchestrator and the domains maybe configured to use the service adjustment information to preemptivelyadjust the services of other users who are likely to be similarlyaffected (e.g., using the same service, located within the samegeographic area, etc.). It may be disadvantageous to increase theallocated quality of service if too many users are competing for thesame limited resources. Similarly, the allocated quality of service maybe reduced at any time in order to maximize resources in other domainsif the actual quality of service becomes greater than the intendedquality of service due to changing conditions within one or moredomains. In order to prevent an infinite loop, the control loop may bebound by a maximum quality of service that may be allocated. In afurther enhancement, the continuum orchestrator or a domain orchestratormay interact with a loyalty management system in order to provide theuser with a refund, notify a sales agent to contact the user, proposethat the user purchases an alternative or additional service, etc.

In an embodiment, this usage monitoring and reporting may be used todetermine the end-to-end quality of service between the domain consumingthe service (e.g., the user equipment domain) and the domain providingthe service (e.g., the content provider domain). It may be advantageousto do this quality of service testing before offering the service to theuser, or before initiating the service, to ensure that the continuum isactually capable of delivering the service. For example, if a userwishes to purchase a service such as video on-demand, then the continuumorchestrator may temporarily increase the allocated quality of servicein the relevant domains. It may then cause some test network traffic tobe generated in the domain providing the video on demand service, andthis test network traffic may subsequently be sent through theintermediate domains to the user equipment domain. The continuumorchestrator may then monitor the actual quality of service received ineach of the domains in order to determine the point-to-point quality ofservice.

The continuum orchestrator may also monitor the actual quality ofservice received in the user equipment domain in order to determine theend-to-end quality of service. In an embodiment, the user may not becharged for this test traffic, and the test network traffic may beconfigured to be low priority to ensure that it does not interfere withreal network traffic that may currently be in transit. For example, in a3GPP network the test network traffic may be sent using a non-guaranteedbit rate (non-GBR) bearer with appropriate allocation and retentionpriority (ARP) and quality of service class indicator (QCI) values toindicate that it is low priority. If the actual quality of service isnot sufficient, then the service may not be offered to the user. Thetesting may be performed incrementally, such as the continuumorchestrator may send increasingly larger quantities of test networktraffic until the continuum is no longer able to provide the requiredquality of service for the test network traffic. Thus, the continuumorchestrator may establish the maximum quality of service available forend-to-end services. The testing may be repeated if conditions within adomain change, such as when the radio access network domain is able toprovide an increased quality of service because the user has moved to anew location with better network access conditions. In an embodiment,the end-to-end quality of service testing may be performed independentlyfor uplink and downlink network traffic. In an embodiment, the user maybe offered the opportunity to purchase an increased quality of serviceif the service cannot be provided using the current quality of service.

In various embodiments, the continuum may enable similar, equal, orenhanced policy and charging (e.g., metering, rating, balancemanagement, etc.) functionality to be undertaken by any one of severaldomains. In an embodiment, policy and charging functionality that isnormally centralized in a single mobile packet core domain may be eitherpartially or fully distributed across many user equipment domains. Theextent of this distribution may vary depending on the capabilities ofthe user equipment domains. In an embodiment, the continuum orchestratormay engage in a handshaking process with one or more domains in order toestablish their capabilities before distributing any functionality.

Such distribution of network management functionality is possiblebecause both domains may contain policy management system components(e.g., policy management system 502 illustrated in FIG. 5 and policymanagement system 606 illustrated in FIG. 6), policy and chargingenforcement system components (e.g., policy and charging enforcementsystem 506 illustrated in FIG. 5 and policy and charging enforcementsystem 610 illustrated in FIG. 6), traffic detection system components,user data repository components, and charging system components.

The components in a user equipment domain may exchange policy andcharging information from their counterparts in the mobile packet coredomain via the continuum orchestrator and the domain orchestratorcomponents. In an embodiment, the user equipment domain may store acached copy of the information and the mobile packet core domain maystore the master copy of the information, and therefore the userequipment domain may need to periodically synchronize with the mobilepacket core domain.

In an embodiment, the continuum may enable policy and chargingconfigurations in one domain to be subsequently distributed to one ormore similar domains. Consider as an example a scenario in which a userhas multiple user equipments (each of which has its own user equipmentdomain), and he/she makes policy and charging configuration adjustments.These adjustments may be made on a single user equipment and thendistributed to all of his/her user equipments via the continuum. Thisdistribution method is also advantageous in scenarios where multipleuser equipments are centrally managed (e.g., family accounts, corporateaccounts, machine-to-machine accounts, etc.).

In an embodiment, a user equipment domain may perform policy managementoperations and periodically synchronize with a mobile packet coredomain. In this embodiment a user equipment domain policy managementsystem (e.g., policy management system 606 illustrated in FIG. 6) may beconfigured with policies both from the user (e.g., via user interactionsystem 604 illustrated in FIG. 6) and from another policy managementsystem (e.g., policy management system 502 illustrated in FIG. 5). Thepolicies may be either discretionary or mandatory. An advantage ofspecifying policies in the user equipment domain may be that thepolicies may be more descriptive because the policies can use contextualinformation (e.g., the user equipment's current power saving mode, theapplication that currently has the screen focus, etc.), and the policiescan also be tightly integrated with the features and capabilities of theuser equipment (e.g., location information, battery charge, signalstrength, etc.). For example, a policy could prevent an application(e.g., a game) from executing on the user equipment if the userequipment is in a specified location (e.g., a school); forbid access toa specific service regardless of the network connection type being usedby the user equipment; specify the circumstances under which the userequipment may offload traffic (e.g., traffic associated with a specificapplication) to another network type; limit the number of connectionsthat may be started by a chatty application when the device is in powersaving mode; and warn the user when he/she starts an application forwhich there is not enough bandwidth. In an embodiment, the user mayconfigure policies in terms of high-level goals or profiles.

FIGS. 13A-D are illustrations of a user equipment device showing a userinterface that enables the user to specify policies. Specifically, FIG.13A illustrates how the user interface may enable the user to specifypolicies in terms of battery power, which may minimize the amount ofbattery power used. FIG. 13B illustrates how the user interface mayenable the user to specify policies in terms of network speed, which maymaximize the speed of the data throughput. FIG. 13C illustrates how theuser interface may enable the user to specify policies in terms ofreal-time data, which may give priority to time sensitive applicationsand network traffic such as video calls. FIG. 13D illustrates how theuser interface may enable the user to specify policies in terms ofcosts, which may minimize the usage costs of the data connection.

FIG. 14 is an illustration of a user equipment device showing analternative user interface for specifying user policies. Specifically,FIG. 14 illustrates that the alternative user interface may display theprofiles as slider bars. The slider bars may be dependent on each other.Thus, if the user increases one slider bar then one or more of the otherslider bars may decrease in order to maintain an overall balance amongthe controlled parameters.

In an embodiment, a user equipment domain may be configured to performpolicy enforcement, and periodically synchronize with a mobile packetcore domain. In this scenario, a component in the user equipment domain(e.g., the policy and charging enforcement system component 610illustrated in FIG. 6) may obtain policies from both another componentin the user equipment domain (e.g., policy management system 606illustrated in FIG. 6) and a component in the mobile packet core domain(e.g., policy management system 502 illustrated in FIG. 5). The abilityto perform policy enforcement in the user equipment domain enables moredescriptive policies that better utilize the capabilities of the userequipment. Performing policy enforcement within the user equipmentdomain may also be more efficient than performing the same policyenforcement in another domain. For example, it may be more efficient toblock outgoing network traffic in the user equipment domain compared tothe mobile packet core domain, since blocking it in the former preventsthe traffic from consuming resources while traversing the radio accessnetwork domain.

In an embodiment, a user equipment domain may be configured to performmetering, and periodically synchronize with a mobile packet core domain.In this embodiment, the metering may be performed by a first component(e.g., the policy and charging enforcement system component 610illustrated in FIG. 6) assisted by another component (e.g., trafficdetection system 602 illustrated in FIG. 6). Thus, the user equipmentdomain may perform application level metering operations and/or meterresources that are not visible to other domains (e.g., battery power).

In an embodiment, the user equipment domain may be capable of obtainingnew metering policies from the mobile packet core domain. Such meteringpolicies may enable metering of different resources using differentmethods, and with different accuracies. For example, a user's voice overIP calls may not need to be metered because they are included in themonthly subscription plan, whereas the video over IP calls may need tobe metered to the nearest second. In a further embodiment, the userequipment domain and the mobile packet core domain may cooperate inorder to provide enhanced metering. For example, a traffic detectionsystem in a first domain (e.g., traffic detection system 602 illustratedin FIG. 6) may notify the policy and charging enforcement system inanother domain (e.g., policy and charging enforcement system 506illustrated in FIG. 5) when an application starts and stops executing,so that the policy and charging enforcement system can readily identifythe traffic associated with the application. In another example, thetraffic detection system may be required to perform traffic detection oncertain types of traffic (e.g., peer-to-peer file sharing traffic), butit may not be capable of performing traffic detection on the trafficbelonging to all users. In this example, the traffic detection system ina user equipment domain (e.g., traffic detection system 602 illustratedin FIG. 6) may notify the traffic detection system in another domain(e.g., traffic detection system 510 illustrated in FIG. 5) when the userequipment domain is sending or receiving peer-to-peer traffic, and thetraffic detection system of the user equipment domain could then startperforming detailed traffic detection on that user's traffic.

In an embodiment, the user equipment domain may perform rating, andperiodically synchronize with the mobile packet core domain. In thisscenario, the charging system component in a user equipment domain(e.g., charging system 608 illustrated in FIG. 6) may obtain one or morerating plans applicable to the owner of the user equipment from thecharging system component in another domain (e.g., charging system 504illustrated in FIG. 5). The ability to simultaneously use multiplerating plans that are associated with the user may be advantageous inscenarios where the user is roaming in several differenttelecommunications networks, and the rating plans change infrequently.Additionally, the charging system component may obtain the rating plansfrom other sources, such as from applications that are installeddirectly on the user equipment. In an embodiment, the charging systemcomponent may perform application level rating. The ability to performapplication level rating within the charging system component enables itto provide the user (e.g., via the user interaction system 604illustrated in FIG. 6) with accurate charging information on both theservices that have been consumed and the services that are currentlybeing consumed, and with preemptive charging information on futureservice consumption. This may be particularly advantageous when the useris roaming in another telecommunications network, or when the userequipment domain is unable to establish a connection with the mobilepacket core domain. The charging system component may also warn the userwhen the cost of a service is greater than a user-specified threshold.

In an embodiment, the user equipment domain may store the user'sbalances (e.g., accumulated monthly spend in Dollars, remaining minutesof free video, etc.), and periodically synchronize with the mobilepacket core domain. In this scenario, the charging system component in auser equipment domain (e.g., charging system 608 illustrated in FIG. 6)may obtain and manage (e.g., increment, decrement, average, reset, etc.)one or more balances associated with the owner of the user equipmentfrom the charging system component in another domain (e.g., chargingsystem 504 illustrated in FIG. 5). Thus, the user equipment domain maynot need to query the mobile packet core domain every time that abalance needs to be updated. This may significantly reduce the work loadof the charging system (e.g., charging system 504 illustrated in FIG.5), improve the accuracy of the balance information, and provide theuser of the user equipment with faster responses when querying balanceinformation.

In an embodiment, the components within the user equipment domain may beenabled to make assumptions about policy and charging information (e.g.,remaining credit balance) without needing to communicate with theequivalent components in the mobile packet core domain. In such casesthe scope of the assumptions may be limited to ensure that an incorrectassumption can always be rectified after synchronizing with the mobilepacket core domain.

In an alternative embodiment, the components within the user equipmentdomain (e.g., the policy management system component 606, the policy andcharging enforcement system component 610, the traffic detection systemcomponent 602, the user data repository component 612, and the chargingsystem components 608) may not be replicated in the mobile packet coredomain. Thus, the master policy and charging information may bemaintained in the user equipment domain, and there is no need to performsynchronization with any other domains. Such an embodiment requires thatthe user equipment domain be trusted, and therefore it may be protectedagainst tampering and fraud by the user. This enhanced embodiment isadvantageous because it eliminates the need for the equivalentcomponents within the mobile packet core domain. In a furtherenhancement, the mobile packet core domain may perform audits on userequipment domains to ensure that they are neither malfunctioning norcompromised.

In an embodiment, the metering, rating, and balance managementfunctionalities may be combined to provide the user with liveinformation regarding his/her usage and charging information. This maybe achieved by, for example, implementing a user interaction systemcomponent (e.g., user interaction system component 604 illustrated inFIG. 6) as a software application on the user equipment.

FIGS. 15A-D are illustrations of a user equipment device having a userinteraction system configured to provide a user with live informationregarding his/her usage and charging in accordance with variousembodiments. Specifically, FIG. 15A is an illustration of a devicedisplaying current data velocity (in terms of Mb/s) and a historicaldata velocity (over the past month) in accordance with an embodiment.FIG. 15B is an illustration of a device displaying the current spendvelocity (in terms of currency units per minute) and the historicalspend velocity (over the past month) in accordance with anotherembodiment. The duration of the historical periods (e.g., data velocity,spend velocity) may be user selectable. In the illustrated examples ofFIGS. 15A and 15B, the historical periods are user selectable betweenone day (1 d) and six months (6 m). In various embodiments, the datavelocity and/or the spend velocity may be displayed as percentages ofallowances (e.g., monthly allowances) and/or in terms of previousminimum and maximum values. In an embodiment, a user interaction systemcomponent in the user equipment domain (e.g., the user interactionsystem component 604 illustrated in FIG. 6) may notify the user of theuser equipment when defined usage and charging thresholds have beenexceeded.

FIG. 15C is an illustration of a device displaying an icon 1502 on theuser equipment's desktop or home screen in order to indicate his/hercurrent state relative to one or more user-defined thresholds. Forexample, the icon 1502 may represent the user's current data usagerelative to thresholds representing 75%, 95%, and 100% of his/hermonthly allowance. The icon 1502 may represent the different statesusing any visual means (e.g., shape, color, intensity, blink frequency,animation, completeness, etc.). FIG. 15D is an illustration of a userequipment device having a software widget 1504 that indicates both theuser's current data velocity and his/her spend velocity in terms of anallowance.

In an embodiment, the continuum and the orchestrators may change theirbehavior in order to minimize traffic between them. For example, theuser equipment domain and the mobile packet core domain may beconfigured to limit communications between themselves to periods whenthey already have an active data session. In another example, thefrequency of synchronization communications between domains may beincreased or decreased based upon the user's characteristics (e.g.,identity, current activity, balance, etc.).

As mentioned above, the continuum may provide a holistic approach tousage monitoring and reporting that spans multiple domains in which thedomain orchestrator in each domain has the ability to collect, process,and report contextual information to the continuum orchestrator. Thefrequency, amount, and type of this collected contextual information mayvary depending on the types and numbers of domains from which it iscollected. The continuum orchestrator may combine and process thecollected contextual information to ensure that the collectedinformation is representative of a single group of integrated domains,rather than being representative of many independent and disparatedomains. Thus, the single integrated group of domains may form acombined domain that has different properties and attributes compared toits constituent domains. The continuum orchestrator may then use thiscombined domain information in subsequent service requests to domainorchestrators in one or more domains.

FIG. 16 illustrates example functional nodes of a continuum orchestrator1602 suitable for use with the various embodiments. In the exampleillustrated in FIG. 16, the continuum orchestrator 1602 includes anobservation node 1604, an aggregation node 1606, a service policyselection and application node 1608, a domain selection node 1610, auser information node 1612, and a trial management node 1614. Theobservation node 1604 may be configured to collect and processcontextual information from one or more types of domains and one or moreinstances of each type of domain. The collection of contextualinformation may be based upon either a push or pull model, and theobservation node 1604 may use a policy that determines the frequency andcircumstances of collection. In an embodiment, the observation node 1604may perform initial processing (e.g., ensuring the integrity of thedata) and filtering (e.g., removing unwanted and unnecessaryinformation) of the collected contextual information.

FIG. 17 illustrates example domains and the types of contextualinformation that may be collected (e.g., via observation node 1604illustrated in FIG. 16) from the domains in accordance with variousembodiments.

Returning to FIG. 16, the aggregation node 1606 may receive processedand filtered contextual information from the observation node 1604relating to a plurality of domains. The aggregation node 1606 may alsoreceive information from one or more sources outside of the continuumorchestrator (e.g., components in other domains, external systems,etc.). The aggregation node 1606 may then combine (e.g., aggregate,correlate, etc.) the information obtained from all of these sources inorder to produce enhanced information relating to the combined domainthat is more valuable and useful than the information relating to theindividual domains.

The service policy selection and application node 1608 may use theaggregated and correlated information from the aggregation node 1606 tocreate service policies that modify the resources in one or more domainswithin the continuum. These service policies may modify the resourcesassociated with either one or more applications and services, or users,within the continuum. In an embodiment, the service policies may be usedto configure the domains to change their monitoring and reporting inresponse to configuration changes of network resources within thecontinuum. The service policy selection and application node 1608 maythen send these new or updated service policies to the domainorchestrators in one or more domains. The creation and distribution ofthe service policies may occur immediately, or as soon as is possible,after the aggregated and correlated information is received from theaggregation node 1606. Alternatively, the creation and distribution ofthe service policies may occur in response to some other event withinthe continuum, or at a predefined future time.

The domain selection node 1610 may be configured to select one or moresubsets of domains from a superset of domains where all of the domainsare instances of the same domain type. The domain selection node 1610may receive the selection criteria from another node, and theseselection criteria may be random, based upon a characteristic of thedomain type, or based upon statistically representative characteristicsof the domain instances. For example, if the superset contains all userequipment domains within a network then the selection criteria couldselect all user equipment domains that are capable of consuming a videoon demand service, or the selection criteria could select twonon-intersecting subsets of one thousand user equipment domains each,such that the numbers of pre-paid user equipment domains and post-paiduser equipment domains in each subset are representative of the entiresuperset. The characteristics of the user equipment domain that are usedfor selection may relate to the user equipment (e.g., type, displaycapabilities, processing capabilities, etc.), the owner of the userequipment (e.g., age, gender, home address, work address, spendingprofile, roaming profile, customer support history, etc.), and the usageof the user equipment (e.g., available network resources, availablebattery resources, current location, applications and services in use,etc.). In an embodiment, the selected domains may be anonymized byhaving some of their characteristics hidden or removed so that thedomains cannot be subsequently identified. In an embodiment, the domainselection node 1610 may recursively select further subsets of domainsfrom the previously selected subsets. In an embodiment, the domainselection node 1610 may obtain domain characteristics from theaggregation node 1606.

The user information node 1612 may send information that is intended forusers to one or more domains. This information may be informative (e.g.,text based notifications, current network conditions and status, etc.),instructive (e.g., network selection instructions for use while roaming,etc.), or interactive (e.g., subjective quality of experiencequestionnaires, etc.). The receiving domains may choose the mostappropriate way to communicate this information to the user. Forexample, the user equipment domain may use a user interaction systemcomponent, such as the component 604 illustrated in FIG. 6.

The trial management node 1614 may be configured to conduct trialsinvolving one or more domains in the continuum. In an embodiment, thetrial management node 1614 may use features provided by the other nodesin the continuum orchestrator. For example, the trial management node1614 may collect information from both the observation node 1604 and theaggregation node 1606, and create service policies that modify theresources within the continuum using the service policy selection andapplication node 1608. As another example, the trial management node1614 may use the domain selection node 1610 to select the sets ofdomains to participate in the trial, and the trial management node maycommunicate with the users participating in the trial via the userinformation node 1612.

In an embodiment, the continuum orchestrator may be configured togenerate a location based spending map that combines the locationinformation of users (based upon the location information of their userequipments) with their spending information. The spending may beassociated directly with the network operator (e.g., the purchasing of abandwidth boost), or with a third party (e.g., the purchasing of a videoon demand film). The spending map may enable a network operator todetermine the locations in which users spend the most money, andconsequently the locations that generate the most revenue. The networkoperator may then give the infrastructure (e.g., the radio accessnetwork domains) associated with these locations a higher priority formaintenance and upgrades. It should be understood that the locations inwhich users have their highest spending may differ significantly fromthe locations in which the users are registered as living due to theportable nature of many types of user equipment.

In an embodiment, the system may be configured to compute a spending mapin which locations with higher spending are differentiated fromlocations with medium and low spending. The spending map may bedisplayed on the user equipment. The spending map may illustratespending associated with locations within a single cell and/or spendingassociated with locations across multiple cells. In various embodiments,the spending map may be as finely grained as required.

In an embodiment, the continuum orchestrator may be configured togenerate the spending map using both the observation node 1604 and theaggregation node 1606. The observation node 1604 may receive locationinformation independently from a plurality of user equipment domains,process it (e.g., homogenize it), and subsequently send it to theaggregation node 1606. The aggregation node 1606 may correlate thelocation information with the spending information (obtained from themobile packet core domain) for each user. The aggregation node 1606 maythen aggregate this correlated information for all users in order toproduce the spending map. In various embodiments, the observation node1604 may obtain the location information and the spending informationfrom other domains (e.g., a radio access network domain).

In various embodiments, the continuum orchestrator may be configured tocombine one set of information with one or more other sets ofinformation, where the sets of information are derived from one or moresets of domains within the continuum. In an embodiment, the continuumorchestrator may monitor and track the popularity and characteristics ofapplications and services in order to create their usage profiles. Thecharacteristics of these applications and services may differconsiderably. For example, some applications and services may create alot of signaling network traffic, but transfer relatively smallquantities of application data, whereas other applications may createrelatively small quantities of signaling network traffic, but transferrelatively large quantities of application data using a relatively highquality of service. In this embodiment, the observation node 1604 withinthe continuum orchestrator may obtain usage information from one or moreuser equipment domains and mobile packet core domains (which may obtainthis information from their traffic detection function components). Theaggregation node 1606 may subsequently generate aggregated profileinformation for each application and service operating within thecontinuum. In an embodiment, the aggregation node 1606 may be configuredto make future predictions regarding the application and service profileinformation, and the associated resource usage effects on the continuum.For example, the aggregation node 1606 may detect a newly releasedapplication that creates a lot of signaling network traffic. If theapplication usage is increasing, then the increased signaling networktraffic may have a detrimental impact on the overall operation of thecontinuum. Therefore, it may be beneficial for the continuumorchestrator (using the service policy selection and application node1608) to impose some additional service policies within the continuum(e.g., blocking the application during certain times, restricting howoften the application can connect to the network, etc.).

In another embodiment, the continuum orchestrator may combine thelocation information of users with application and service usage. It islikely that certain locations may experience abnormally high usage ofcertain types of applications and services. For example, locationscontaining airports and train stations may experience high usage ofvideo on demand and gaming applications and services due to userswaiting for their transportation. Similarly, locations in businessdistricts may experience high usage of e-mail, voice, and video callapplications and services. The continuum orchestrator may use thiscombined location, and application and service usage information tomodify the continuum in specific locations (e.g., the continuumorchestrator may create new service policies for user equipment domainsoperating in specific radio access network domains). In an embodiment,the continuum orchestrator may further combine this information withapplication and service profile information in order to determine theoptimum continuum configuration for providing the applications andservices, and hence increase network utilization, customer satisfaction,and revenue.

In an embodiment, the continuum orchestrator 1602 may conduct surveysand polls with users. In this embodiment, the domain selection node 1610may select the set of users to be surveyed (e.g., 5,000 male usersbetween the ages of 25 and 34 in a specific city). The user informationnode 1612 may send the interactive survey to the user equipmentsbelonging to the selected users, and it may subsequently collect thesurvey results. The users may be offered a reward or incentive forparticipating in, and completing, the survey (e.g., discounts on theirnext bills, free application or service usage for a limited time, etc.).The survey results may be used to obtain application and service usageinformation that cannot be objectively measured (e.g., usersatisfaction, reasons for service usage, favorite web sites, etc.). Inan embodiment, the survey results may be used automatically by theservice policy selection and application node 1608, or manually by thenetwork operator, to create new service policies that improve theoperation of the applications and services in the continuum.

In an embodiment, the continuum orchestrator 1602 may be configured todetect sudden large-scale and unexpected changes in application andservice usage that span one or more domains within the continuum as theyare occurring. In this embodiment, each domain may detect changes withinit (e.g., using the traffic detection system component) and report thechanges to the observation node 1604 within the continuum orchestrator1602. The aggregation node 1606 may subsequently examine all of thesechanges from individual domains in order to identify and detect suddenlarge-scale multi-domain changes. When such a change is detected, theservice policy selection and application node 1608 may create newservice policies that modify the continuum. This modification may be toimprove the delivery of the changing application or service, or torestrict the delivery of the changing application or service in order toensure that sufficient resources remain available for the otherapplications and services in the continuum. In an embodiment, additionalinformation from other sources may be used when the new service policiesare being created. For example, user profile information may be used todetermine that low-value users may be offloaded to a different radioaccess network, whereas high-value users may be provided with anincreased quality of service. The user information node 1612 may sendnotifications to the users whose applications or services may beaffected.

The continuum orchestrator 1602 may use the collected contextualinformation in order to encourage users to temporarily change theirusage behavior. For example, the continuum orchestrator 1602 mayencourage users to increase their consumption of services when itdetects that one or more domains in the continuum have resources thatare being underutilized. In this scenario, the network operator maygenerate additional revenue using these underutilized resources.Therefore, in an embodiment, the continuum orchestrator 1602 may collectutilization information from both the radio access network domains andthe mobile packet core domain, and thus the continuum orchestrator 1602may determine the cells and locations which are being underutilized. Thecontinuum orchestrator 1602 may then send a service promotion to usersin the affected areas using the user information node 1612. In anembodiment, the promotion may be specific to either the user, or his/hercurrent activity. For example, if a user is currently watching a filmusing a video on demand service, then he/she may be offered a higherquality of service for the duration of the film.

In an alternative embodiment, the continuum orchestrator 1602 may beconfigured to encourage users to decrease or postpone their consumptionof services when it detects that one or more domains in the continuum donot have sufficient resources to provide the services. For example, thecontinuum orchestrator 1602 may collect utilization information fromboth the radio access network domain and the mobile packet core domainin order to determine the cells and locations that are experiencingcongestion. It may further enhance this utilization information byobtaining additional information (e.g., the current actual quality ofservice received) from user equipment domains that are located in theaffected locations. The continuum orchestrator 1602 may then notifyusers who are likely to be affected by this congestion before or whilethey consume the effected services. This notification may includeinformation and statistics regarding other nearby users who areconsuming the same service (e.g., the average quality of servicecurrently being received), and one or more images illustrating networkconditions (e.g., heat maps). The continuum orchestrator 1602 may offerusers incentives to temporarily alter their service usage (e.g., theuser may be offered free service credits if he/she offloads to a Wi-Finetwork). The continuum orchestrator 1602 may notify the user when thecongestion has been cleared, and hence the user can resume consuming theservices as normal.

As mentioned above, the continuum orchestrator 1602 may be configured toconduct trials involving one or more domains in the continuum using thetrial management node 1614. This allows the network operator totemporarily vary the continuum for a limited number of users and tosubsequently monitor the effect of these changes. The goal of thesetrials may be to improve the efficiency or utilization of a resourcewithin the continuum (e.g., to reduce network congestion in the radioaccess network domain during peak periods, to increase revenue for aspecific service in specific locations, etc.), to understand thebehavior of a user or resource in the continuum (e.g., to determine thefactors inhibiting users from using a video on demand service, todetermine the relationship between quality of service and chargingmodels for video calls, to predict the behavior of chatty social mediaapplications on the mobile packet core domain, etc.), or to evaluatespecific what-if scenarios under modified continuum conditions (e.g.,what happens to the average revenue for gaming services per teenager ifthe first 30 minutes per week are free of charge, etc.). In variousembodiments, the trials may be used to determine user churn, userspending habits, user satisfaction, the number of promotional serviceoffers accepted, revenue, profit, causes of calls to customer support,domain operating costs, continuum operating costs, quantities ofapplication data, quantities of signaling network traffic, factorsinfluencing the popularity of applications and services, and any otheractivities deemed relevant by the network operator.

In various embodiments, the trials may be based on closed user groups, Aversus B tests, before and after tests, etc. The trials may be passiveif they are based exclusively on observations, or they may be active ifthey require changes to any resources within the continuum. The networkoperator may use the results of the trial to make decisions regardingfuture infrastructural development, service offerings, and chargingmodels.

FIG. 18 illustrates an embodiment method 1800 for conducting trials withusers using a continuum orchestrator. For reasons of clarity, method1800 is described with reference to components illustrated in FIG. 16.

In block 1802, the network operator may use a trial management node 1614to create and configure the trial (e.g., by defining its type, scope,parameters, etc.) based upon one or more of the intended trial goals. Inblock 1804, the domain selection node 1610 may select users determinedto be suitable for participating in the trial (e.g., 2,000 tablet usersthat participate in family group accounts). In determination block 1806,the trial management node 1614 may determine if the trial requires theparticipants to either be notified of the trial or opt in toparticipating in the trial. This may be required due to legal reasons,regulatory reasons, network operator policies, user policies, and thenature of the trial. If it is determined that participants are requiredto be notified or opted in (determination block 1806=“Yes”), in block1808, the user information node 1612 may send a notification or inviteto each participant's user equipment and collect any responses to thenotifications. The participants may be offered a reward or incentive forparticipating in the trial. The network operator may also notifyparticipants using out-of-band communications such as mailshots andcustomer service calls.

In block 1810, the trial management node 1614 may determine the finalset of trial participants. In determination block 1812 the trialmanagement node 1614 may determine if the participants need to be splitinto groups due to the type of the trial (e.g., A versus B type trials).If it is determined that participants are required to be split into twoor more groups (determination block 1812=“Yes”), in block 1814, thetrial management node 1614 may split the participants into groups.

In block 1816, the trial management node 1614 may monitor the continuumusing information obtained from both the observation node 1604 and theaggregation node 1606 before any changes are applied to the continuum.This may be necessary due to the type of the trial (e.g., before andafter type trials). In block 1818 the trial management node 1614 may usethe service policy selection and application node 1608 to create theservice policies that modify the resources within the continuum basedupon the trial configuration from block 1802. For example, in an Aversus B type trial there may be two groups of users, and only theresources within the continuum associated with one group of users may bemodified.

In block 1820, the trial management node 1614 may again monitor thecontinuum using information obtained from both the observation node 1604and the aggregation node 1606. The operations in block 1820 may beperformed on an ongoing basis throughout the duration of the trial, orit may occur when the trial has ended based upon the trial configuration(e.g., the trial may be configured to operate for one month, the trialmay be configured to operate until 5,000 hours of films have beenwatched, etc.).

In block 1822, the trial management node 1614 may compare and analyzethe information obtained in block 1820 in order to make observations onthe outcomes of the trial and the overall effects of the change orchanges in the continuum. This comparison and analysis may be performedper user, per resource, and for the entire continuum. The trialmanagement node 1614 may present these results to the network operatorfor further analysis.

In block 1824, the trial management node 1614 may notify theparticipants (e.g., via the user information node 1612) that the trialhas ended, and it may also provide them with some personalized resultsin order to encourage further engagement (e.g., a user may be informedthat the service being trialed may soon be available for purchase, andthat his/her usage of the service during the trial was in the top tenpercentile of all trial participants). The trial management node 1614may use functionality provided by the service policy selection andapplication node 1608 to reset the resources within the continuum totheir pre-trial configuration.

FIG. 19A illustrates an embodiment continuum orchestrator method 1900for orchestrating services across multiple domains that areparticipating in a service delivery. In block 1902, a continuumorchestrator (e.g., continuum orchestrator 1602 illustrated in FIG. 16)may receive a service request relating to a service/communication. In anembodiment, the service request may be received from a component in oneof the domains participating in the service delivery. The servicerequest may be an event-based service request, a session based servicecreation request, a session based service modification request, asession based service termination request, a service request containinga policy, etc. In block 1904, the continuum orchestrator may identifytwo or more domains that provide functionality associated withfulfilling the service request, or which are required to fulfill theservice request. In block 1906, the continuum orchestrator may generateone or more domain specific requests for each of the identified domains.In block 1908, the continuum orchestrator may send the domain specificservice requests to the identified domains. For example, as part ofblock 1908, the continuum orchestrator may send a first domain specificservice to a domain orchestrator in a user equipment domain and a seconddomain specific service to a domain orchestrator in a mobile packet coredomain (or another user equipment domain).

FIG. 19B illustrates an embodiment domain orchestrator method 1950 fororchestrating services across multiple domains participating in aservice delivery. In block 1952, the domain orchestrator may receive adomain specific service request from a continuum orchestrator. Inoptional block 1954, the domain orchestrator may decompose the receivedservice request into one or more resource rules. In optional block 1956,the domain orchestrator may identify domain components capable ofenforcing the resource rules and/or the service request. In block 1958,the domain orchestrator may send the received request and/or resourcerules to the relevant components in the domain for enforcement orfurther decomposition. The domain components may receive therequest/resource rules and perform domain operations by, for example,enforcing the received rules.

FIG. 20A illustrates an embodiment continuum orchestrator method 2000for decomposing abstract service requests into domain specific concreteservice requests. In block 2002, the continuum orchestrator may receivean abstract service request, which may be an implementation agnosticservice request specifying a functional service requirement. In optionalblock 2004, the continuum orchestrator may identify the capabilitiesand/or functionality provided by the domains associated with (orrequired to) fulfill the service request. In block 2006, the continuumorchestrator may decompose the abstract service request into domainspecific service requests, which may identify one or more domainspecific service policies. In an embodiment, the continuum orchestratormay decompose the abstract service request based on the identifiedcapabilities and/or functionality of the domains and/or components inthe domains. In block 2008, the continuum orchestrator may send thedomain specific service requests to the domains. A domain orchestratorin each domain may receive the domain specific service requests,decompose the received domain specific service requests into one or moreresource rules, and send the resource rules to the relevant component inthe domain for enforcement. In an embodiment, each domain may beconfigured to implement policies identified in the domain specificservice requests in a manner that is consistent with existing servicepolicies of the domain.

FIG. 20B illustrates an embodiment domain orchestrator method 2050 fordecomposing abstract service requests into domain specific concreteresource rules. In block 2052, the domain orchestrator may receive anabstract service request, which may be an implementation agnosticservice request specifying a functional service requirement. In anembodiment, the abstract service request may be a policy-chargingservice request, which may be any request relating to charging or theenforcement of policies (i.e., any request relating to any and all thefunctionality provided by policy and/or charging control components). Inblock 2054, the domain orchestrator may decompose the received abstractservice request into one or more domain specific resources rules. Inblock 2056, the domain orchestrator may identify the relevant componentsin the domain having functionality for, or which are capable of,enforcing the received resource rules. In block 2058, the domainorchestrator may send the received resource rules to the relevant domaincomponents for enforcement. In optional block 2060, the domainorchestrator may send a message to a continuum orchestrator (or a parentdomain orchestrator) reporting the results of the enforcement.

FIG. 21A illustrates an embodiment continuum orchestrator method 2100for using measurements (such as actual quality of service) collectedfrom a first domain to control a service/communication attribute (suchas the allocated quality of service) in another domain. In block 2102,the continuum orchestrator may receive measurement values relating to afirst attribute from a first domain (e.g., a user equipment domain)involved with a service. In optional block 2104, the continuumorchestrator may compare the actual measurement values with intendedvalues to determine if the characteristics of the service/communicationpresent in the first domain are approximately equal to thecharacteristics intended for the communication. For example, thecontinuum orchestrator may compare actual quality of servicemeasurements with values associated with the intended quality of servicefor the communication to determine if the quality of service realized inthe first domain is consistent with what is intended for that domain. Inoptional block 2106, the continuum orchestrator may identify a seconddomain (e.g., mobile packet core domain) involved with theservice/communication. In optional block 2108, the continuumorchestrator may form a closed feedback loop that includes the first andsecond telecommunications domains. In block 2110, the continuumorchestrator may generate a request message that includes informationfor adjusting an attribute of the communication/service in the seconddomain. The attribute adjusted in the second domain may be the sameattribute measured on the first domain, or may be a different attribute.In block 2112, the continuum orchestrator may send the request messageto the second domain to cause the second domain to alter its operations.For example, as part of block 2112, the continuum orchestrator may senda request message that causes the second domain to increase the qualityof service or bandwidth in that domain. The operations illustrated inblocks 2102-2112 may be repeated so that the attributes of thecommunication are repeatedly measured in the first domain and adjustedin the second domain until the measured actual values are approximatelyequal to the intended values.

FIG. 21B illustrates an embodiment continuum orchestrator method 2120for transferring functionality between domains. In block 2122, thecontinuum orchestrator may receive measurement values relating to afirst attribute from a first domain (e.g., a user equipment domain)involved with a service. In optional block 2124, the continuumorchestrator may compare the received measurement values with expectedvalues to determine if the characteristics of the service/communicationpresent in the first domain are approximately equal to thecharacteristics desired or intended for the communication. In block2126, the continuum orchestrator may identify a second domain involvedwith the service/communication. In block 2128, the continuumorchestrator may identify a third domain capable of implementing thefunctionality provided by the second domain for theservice/communication. In block 2130, the continuum orchestrator maygenerate one or more request messages that include information fortransferring functionality from the second domain to the third domain.In block 2132, the continuum orchestrator may send the request messagesto the second and/or third domains to cause the functionality to betransferred to the third domain. In an embodiment, the continuumorchestrator may update (or form) a closed feedback loop to include thefirst and third domains (e.g., by removing the second domain from theloop and/or adding the third domain into the loop).

FIG. 21C illustrates an embodiment domain orchestrator method 2140 forcollecting measurements that enable a continuum orchestrator to controla service/communication attribute across multiple domains. In block2142, the domain orchestrator may measure values relating to a firstattribute of a communication (e.g., quality of service for videostreaming). In optional block 2144, the domain orchestrator may comparethe measured values with expected values to determine if the actualvalues are approximately equal to the desired or intended values for thecommunication. In block 2146, the domain orchestrator may send themeasurement values and/or results of the comparison to a continuumorchestrator. The operations illustrated in blocks 2142-2146 may berepeated periodically or until it is determined that the actual valuesare approximately equal to the desired or intended values.

FIG. 22 illustrates an embodiment continuum orchestrator method 2200 ofperforming crowd sourcing operations in which information collected frommultiple domains is used to modify the operations in one or moredomains. In block 2202, the continuum orchestrator may collectinformation published on each of a plurality of domains. For example,the continuum orchestrator may collect information published by domainorchestrators on thousands of user equipment domains and tens of mobilepacket core domains associated with the user equipment domains. Inoptional block 2204, the continuum orchestrator may perform summing,averaging, aggregating, comparing and/or correlating operations on theinformation collected from the plurality of domains. In block 2206, thecontinuum orchestrator may generate one or more messages based on theresults of the collected information and/or results of the operations.The generated message may include information for causing a component ina domain (which may or may not be included in the plurality of domainsfrom which information was collected) to alter its operations or toalter the operations of the domain. In block 2208, the continuumorchestrator may send the generated message to the component in thedomain to cause the component to alter its operations or to alter theoperations of the domain. The component may receive the generatedmessage and alter its operations based on the information included inthe received message.

FIG. 23A illustrates an embodiment domain orchestrator method 2300 forsynchronizing information with other domains participating in a servicedelivery. In block 2302, the domain orchestrator may collect informationfrom components in the domain. In block 2304, the domain orchestratormay generate communication information based on the collectedinformation. In block 2306, the domain orchestrator may identifyportions of the generated communication information that requiresynchronization. In block 2308, the domain orchestrator may send theidentified portions requiring synchronization to a continuumorchestrator. In block 2310, the domain orchestrator may receivesynchronized information from the continuum orchestrator in response tosending the identified portions. In optional block 2312, the domainorchestrator may check the received synchronized information fordiscrepancies. In optional block 2314, the domain orchestrator may sendan acknowledgment message to the continuum orchestrator identifying anydiscrepancies in the received synchronized information. In optionalblock 2316, the domain orchestrator may receive a new batch ofsynchronized information from the continuum orchestrator.

FIG. 23B illustrates a continuum orchestrator method 2350 forsynchronizing information between two or more domains participating in aservice delivery. In block 2352, the continuum orchestrator may receiveinformation to be synchronized from a first domain orchestrator. Inblock 2354, the continuum orchestrator may receive information from asecond domain orchestrator. In block 2356, the continuum orchestratormay synchronize the information received from the second domain with theinformation received from the first domain. In block 2358, the continuumorchestrator may send the synchronized information to the first and/orsecond domains. The operations in blocks 2352-2358 may be repeated asneeded. In an embodiment, the continuum orchestrator may receive anacknowledgment message from the first and/or second domains indicatingreceipt of the synchronized information and/or if the sent synchronizedinformation included discrepancies. In such embodiments, the continuumorchestrator may perform operations to identify and correct the sourceof the deficiency, resynchronize the information, and send a new batchof synchronized information to the first and/or second domains.

FIG. 24 illustrates a continuum orchestrator method 2400 fordistributing policy-charging operations across multiple domains.Policy-charging operations may include any operations relating tocharging or the enforcement of policies in the continuum, and thus mayencompass any and all the functionality provided by policy and chargingcontrol components (e.g., components 502, 504, 506 illustrated in FIG.5, components 606, 608, 610 illustrated in FIG. 6, etc.). Similarly, apolicy-charging message may be any message relating to the policies orcharging.

Returning to FIG. 24, in block 2402, the continuum orchestrator maydetermine the policy-charging capabilities of a first domain. In block2404, the continuum orchestrator may determine the policy-chargingcapabilities of a second domain. In block 2406, the continuumorchestrator may identify the policy-charging requirements for aservice/communication in the continuum. In block 2408, the continuumorchestrator may partition the identified policy-charging requirementsof the communication based on the determined capabilities of the firstand second telecommunications domains. In block 2410, the continuumorchestrator may send messages to the first and secondtelecommunications domains, instructing each domain to performpolicy-charging operations associated with one or more of thepartitions.

FIG. 25 is a system block diagram of a user equipment device in the formof a phone/cell phone suitable for use with various embodiments. A cellphone 2500 may include a processor 2501 coupled to internal memory 2502,a display 2504, and to a speaker 2506. Additionally, the cell phone 2500may include an antenna 2508 for sending and receiving electromagneticradiation that may be connected to a wireless data link and/or cellulartelephone transceiver 2510 coupled to the processor 2501. Cell phones2500 typically also include menu selection buttons 2512 or switches forreceiving user inputs.

The various embodiments may be implemented on any of a variety ofcommercially available server devices, such as the server 2600illustrated in FIG. 26. Such a server 2600 typically includes aprocessor 2601 coupled to volatile memory 2602 and a large capacitynonvolatile memory, such as a disk drive 2603. The server 2600 may alsoinclude a floppy disc drive, compact disc (CD) or DVD disc drive 2606coupled to the processor 2601. The server 2600 may also include networkaccess ports 2604 coupled to the processor 2601 for establishing dataconnections with a network 2605, such as a local area network coupled toother operator network computers and servers.

The processors 2501, 2601 may be any programmable microprocessor,microcomputer or multiple processor chip or chips that can be configuredby software instructions (applications) to perform a variety offunctions, including the functions of the various embodiments describedbelow. Multiple processors 2501, 2601 may be provided, such as oneprocessor dedicated to wireless communication functions and oneprocessor dedicated to running other applications. Typically, softwareapplications may be stored in the internal memory 2502, 2602, 2603before they are accessed and loaded into the processor 2501, 2601. Theprocessor 2501, 2601 may include internal memory sufficient to store theapplication software instructions.

The foregoing method descriptions and the process flow diagrams areprovided merely as illustrative examples and are not intended to requireor imply that the steps and operations of the various embodiments mustbe performed in the order presented. As will be appreciated by one ofskill in the art the order of steps and operations in the foregoingembodiments may be performed in any order. Words such as “thereafter,”“then,” “next,” etc. are not intended to limit the order of the steps oroperations; these words are simply used to guide the reader through thedescription of the methods. Further, any reference to claim elements inthe singular, for example, using the articles “a,” “an” or “the” is notto be construed as limiting the element to the singular.

The various illustrative logical blocks, modules, circuits, andalgorithm steps described in connection with the embodiments disclosedherein may be implemented as electronic hardware, computer software, orcombinations of both. To clearly illustrate this interchangeability ofhardware and software, various illustrative components, blocks, modules,circuits, and steps have been described above generally in terms oftheir functionality. Whether such functionality is implemented ashardware or software depends upon the particular application and designconstraints imposed on the overall system. Skilled artisans mayimplement the described functionality in varying ways for eachparticular application, but such implementation decisions should not beinterpreted as causing a departure from the scope of the presentinvention.

The hardware used to implement the various illustrative logics, logicalblocks, modules, and circuits described in connection with the aspectsdisclosed herein may be implemented or performed with a general purposeprocessor, a digital signal processor (DSP), an application specificintegrated circuit (ASIC), a field programmable gate array (FPGA) orother programmable logic device, discrete gate or transistor logic,discrete hardware components, or any combination thereof designed toperform the functions described herein. A general-purpose processor maybe a microprocessor, but, in the alternative, the processor may be anyconventional processor, controller, microcontroller, or state machine Aprocessor may also be implemented as a combination of computing devices,e.g., a combination of a DSP and a microprocessor, a plurality ofmicroprocessors, one or more microprocessors in conjunction with a DSPcore, or any other such configuration. Alternatively, some steps ormethods may be performed by circuitry that is specific to a givenfunction.

In one or more exemplary aspects, the functions described may beimplemented in hardware, software, firmware, or any combination thereof.If implemented in software, the functions may be stored on ortransmitted over one or more instructions or code on a computer-readablemedium. The steps of a method or algorithm disclosed herein may beembodied in a processor-executable software module which may reside on atangible, non-transitory computer-readable storage medium. Tangible,non-transitory computer-readable storage media may be any availablemedia that may be accessed by a computer. By way of example, and notlimitation, such as, non-transitory computer-readable media may compriseRAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic diskstorage or other magnetic storage devices, or any other medium that maybe used to store desired program code in the form of instructions ordata structures and that may be accessed by a computer. Disk and disc,as used herein, includes compact disc (CD), laser disc, optical disc,digital versatile disc (DVD), floppy disk, and blu-ray disc where disksusually reproduce data magnetically, while discs reproduce dataoptically with lasers. Combinations of the above should also be includedwithin the scope of non-transitory computer-readable media.Additionally, the operations of a method or algorithm may reside as oneor any combination or set of codes and/or instructions on a tangible,non-transitory machine readable medium and/or computer-readable medium,which may be incorporated into a computer program product.

The preceding description of the disclosed embodiments is provided toenable any person skilled in the art to make or use the presentinvention. Various modifications to these embodiments will be readilyapparent to those skilled in the art, and the generic principles definedherein may be applied to other embodiments without departing from thespirit or scope of the invention. Thus, the present invention is notintended to be limited to the embodiments shown herein but is to beaccorded the widest scope consistent with the following claims and theprinciples and novel features disclosed herein.

What is claimed is:
 1. A method of distributing telecommunicationsfunctionality across multiple heterogeneous domains within atelecommunications system, comprising: determining, by a processor of acomputing device, policy-charging capabilities of a first heterogeneoustelecommunications domain of the multiple heterogeneous domains, thefirst heterogeneous telecommunications domain including a policymanagement system component, a charging system component, a policy andcharging enforcement (PCE) system component, and a first domainorchestrator component configured to communicate with the computingdevice and each of the policy management system, charging system, andPCE system components; determining, by the processor, policy-chargingcapabilities of a second heterogeneous telecommunications domain of themultiple heterogeneous domains, the second heterogeneoustelecommunications domain including a second domain orchestratorcomponent configured to communicate with the computing device and one ormore components in the second heterogeneous telecommunications domain;determining, by the processor, policy-charging requirements foraccomplishing an end-to-end communication across the multipleheterogeneous domains; wherein determining policy-charging requirementsfor accomplishing the end-to-end communication across the multipleheterogeneous domains comprises identifying metering, rating, charging,and balance management requirements of the end-to-end communication;using, by the processor, the determined policy-charging capabilities ofthe first heterogeneous telecommunications domain and the determinedpolicy-charging capabilities of the second heterogeneoustelecommunications domain to partition the determined policy-chargingrequirements for accomplishing the end-to-end communication across themultiple heterogeneous domains into a first group that includes a firstsubset of the determined policy-charging requirements for accomplishingthe end-to-end communication across the multiple heterogeneous domainsand a second group that includes a second subset of the determinedpolicy-charging requirements for accomplishing the end-to-endcommunication across the multiple heterogeneous domains, wherein theusing the determined policy-charging capabilities for accomplishing theend-to-end communication across the multiple heterogeneous domainscomprises partitioning the identified metering, rating, charging, andbalance management requirements into at least one of the first andsecond groups; sending a first message including the first group ofpolicy-charging requirements from the computing device to the firstdomain orchestrator component; and sending a second message includingthe second group of policy-charging requirements from the computingdevice to the second domain orchestrator component.
 2. The method ofclaim 1, wherein determining policy-charging capabilities of the firstheterogeneous telecommunications domain comprises receiving a messagefrom the first domain orchestrator component identifying thepolicy-charging capabilities of the first heterogeneoustelecommunications domain.
 3. The method of claim 1, wherein determiningpolicy-charging capabilities of the first heterogeneoustelecommunications domain comprises determining one of: a policycapability of the first heterogeneous telecommunications domain, ametering capability of the first heterogeneous telecommunicationsdomain, a rating capability of the first heterogeneoustelecommunications domain, a charging capability of the firstheterogeneous telecommunications domain, and a balance managementcapability of the first heterogeneous telecommunications domain.
 4. Themethod of claim 1, wherein using the determined policy-chargingcapabilities of the first heterogeneous telecommunications domain andthe determined policy-charging capabilities of the second heterogeneoustelecommunications domain to partition the determined policy-chargingrequirements for accomplishing the end-to-end communication across themultiple heterogeneous domains into the first group that includes thefirst subset of the determined policy-charging requirements foraccomplishing the end-to-end communication across the multipleheterogeneous domains and the second group that includes the secondsubset of the determined policy-charging requirements for accomplishingthe end-to-end communication across the multiple heterogeneous domainscomprises: partitioning the policy-charging requirements based onsynchronization errors associated with the first or second domains. 5.The method of claim 1, wherein using the determined policy-chargingcapabilities of the first heterogeneous telecommunications domain andthe determined policy-charging capabilities of the second heterogeneoustelecommunications domain to partition the determined policy-chargingrequirements for accomplishing the end-to-end communication across themultiple heterogeneous domains into the first group that includes thefirst subset of the determined policy-charging requirements foraccomplishing the end-to-end communication across the multipleheterogeneous domains and the second group that includes the secondsubset of the determined policy-charging requirements for accomplishingthe end-to-end communication across the multiple heterogeneous domainscomprises: partitioning the policy-charging requirements based onworkloads present on the first and second telecommunications domains. 6.The method of claim 1, wherein using the determined policy-chargingcapabilities of the first heterogeneous telecommunications domain andthe determined policy-charging capabilities of the second heterogeneoustelecommunications domain to partition the determined policy-chargingrequirements for accomplishing the end-to-end communication across themultiple heterogeneous domains into the first group that includes thefirst subset of the determined policy-charging requirements foraccomplishing the end-to-end communication across the multipleheterogeneous domains and the second group that includes the secondsubset of the determined policy-charging requirements for accomplishingthe end-to-end communication across the multiple heterogeneous domainscomprises: partitioning the policy-charging requirements based on areliability of the first and second telecommunications domains.
 7. Themethod of claim 1, wherein: sending a first message including the firstgroup of policy-charging requirements to the first domain orchestratorcomponent comprises sending the first message including the first groupof policy-charging requirements to a public interface of a userequipment domain; and sending a second message including the secondgroup of policy-charging requirements to the second domain orchestratorcomponent comprises sending the second message including the secondgroup of policy-charging requirements to a public interface of a mobilepacket core domain.
 8. A method of distributing telecommunicationsfunctionality in a telecommunication system, comprising: receiving in aprocessor of a computing device a request to establish an end-to-endcommunication across a plurality of heterogeneous telecommunicationdomains within the telecommunication system, the plurality ofheterogeneous telecommunication domains comprising: a firstheterogeneous domain that includes: a policy management systemcomponent, a charging system component, a policy and chargingenforcement (PCE) system component, and a first domain orchestratorcomponent configured to communicate with the computing device and eachof the policy management system, charging system, and PCE systemcomponents; and a second heterogeneous domain that includes: a seconddomain orchestrator component configured to communicate with thecomputing device and one or more components in the second heterogeneoustelecommunications domain; determining, by the processor,policy-charging requirements for accomplishing the end-to-endcommunication across the multiple heterogeneous telecommunicationdomains; wherein determining policy-charging requirements foraccomplishing the end-to-end communication across the multipleheterogeneous domains comprises identifying metering, rating, charging,and balance management requirement of the end-to-end communication;determining, by the processor, policy-charging capabilities of each ofthe first and second heterogeneous domains, the determined capabilitiesincluding a policy capability, a metering capability, a ratingcapability, a charging capability and a balance management capability;using the determined capabilities to partition the determinedpolicy-charging requirements into a first group of policy-chargingrequirements and a second group of policy-charging requirements, whereineach of the first and second groups include a subset of thepolicy-charging requirements for accomplishing the end-to-endcommunication, wherein the using the determined policy-chargingcapabilities for accomplishing the end-to-end communication across themultiple heterogeneous domains comprises partitioning the identifiedmetering, rating, charging, and balance management requirements into atleast one of the first and second groups; sending a first communicationmessage that includes the first group of policy-charging requirementsfrom the computing device to the first domain orchestrator component;and sending a second communication message that includes the secondgroup of policy-charging requirements from the computing device to thesecond domain orchestrator component.
 9. A computing device, comprising:a memory; and a processor coupled to the memory, wherein the processoris configured with processor-executable instructions to performoperations comprising: determining policy-charging capabilities of afirst heterogeneous telecommunications domain of multiple heterogeneousdomains within a telecommunications system, the first heterogeneoustelecommunications domain including a policy management systemcomponent, a charging system component, a policy and chargingenforcement (PCE) system component, and a first domain orchestratorcomponent configured to communicate with the computing device and eachof the policy management system, charging system, and PCE systemcomponents; determining policy-charging capabilities of a secondheterogeneous telecommunications domain of the multiple heterogeneousdomains, the second heterogeneous telecommunications domain including asecond domain orchestrator component configured to communicate with thecomputing device and one or more components in the second heterogeneoustelecommunications domain; determining policy-charging requirements foraccomplishing an end-to-end communication across the multipleheterogeneous domains; wherein determining policy-charging requirementsfor accomplishing the end-to-end communication across the multipleheterogeneous domains comprises identifying metering, rating, charging,and balance management requirements of the end-end communication; usingthe determined policy-charging capabilities of the first heterogeneoustelecommunications domain and the determined policy-chargingcapabilities of the second heterogeneous telecommunications domain topartition the determined policy-charging requirements for accomplishingthe end-to-end communication across the multiple heterogeneous domainsinto a first group that includes a first subset of the determinedpolicy-charging requirements for accomplishing the end-to-endcommunication across the multiple heterogeneous domains and a secondgroup that includes a second subset of the determined policy-chargingrequirements for accomplishing the end-to-end communication across themultiple heterogeneous domains, wherein the using the determinedpolicy-charging capabilities for accomplishing the end-to-endcommunication across the multiple heterogeneous domains comprisespartitioning the identified metering, rating, charging, and balancemanagement requirements into at least one of the first and secondgroups; sending a first message including the first group ofpolicy-charging requirements to the first domain orchestrator component;and sending a second message including the second group ofpolicy-charging requirements to the second domain orchestratorcomponent.
 10. The computing device of claim 9, wherein the processor isconfigured with processor-executable instructions such that determiningpolicy-charging capabilities of the first heterogeneoustelecommunications domain comprises receiving a message from the firstdomain orchestrator component identifying the policy-chargingcapabilities of the first heterogeneous telecommunications domain. 11.The computing device of claim 9, wherein the processor is configuredwith processor-executable instructions such that determiningpolicy-charging capabilities of the first heterogeneoustelecommunications domain comprises determining one of: a policycapability of the first heterogeneous telecommunications domain, ametering capability of the first heterogeneous telecommunicationsdomain, a rating capability of the first heterogeneoustelecommunications domain, a charging capability of the firstheterogeneous telecommunications domain, and a balance managementcapability of the first heterogeneous telecommunications domain.
 12. Thecomputing device of claim 9, wherein the processor is configured withprocessor-executable instructions such that using the determinedpolicy-charging capabilities of the first heterogeneoustelecommunications domain and the determined policy-chargingcapabilities of the second heterogeneous telecommunications domain topartition the determined policy-charging requirements for accomplishingthe end-to-end communication across the multiple heterogeneous domainsinto the first group that includes the first subset of the determinedpolicy-charging requirements for accomplishing the end-to-endcommunication across the multiple heterogeneous domains and the secondgroup that includes the second subset of the determined policy-chargingrequirements for accomplishing the end-to-end communication across themultiple heterogeneous domains comprises: partitioning thepolicy-charging requirements based on synchronization errors associatedwith the first or second domains.
 13. The computing device of claim 9,wherein the processor is configured with processor-executableinstructions such that using the determined policy-charging capabilitiesof the first heterogeneous telecommunications domain and the determinedpolicy-charging capabilities of the second heterogeneoustelecommunications domain to partition the determined policy-chargingrequirements for accomplishing the end-to-end communication across themultiple heterogeneous domains into the first group that includes thefirst subset of the determined policy-charging requirements foraccomplishing the end-to-end communication across the multipleheterogeneous domains and the second group that includes the secondsubset of the determined policy-charging requirements for accomplishingthe end-to-end communication across the multiple heterogeneous domainscomprises: partitioning the policy-charging requirements based on aworkloads present on the first and second telecommunications domains.14. The computing device of claim 9, wherein the processor is configuredwith processor-executable instructions such that using the determinedpolicy-charging capabilities of the first heterogeneoustelecommunications domain and the determined policy-chargingcapabilities of the second heterogeneous telecommunications domain topartition the determined policy-charging requirements for accomplishingthe end-to-end communication across the multiple heterogeneous domainsinto the first group that includes the first subset of the determinedpolicy-charging requirements for accomplishing the end-to-endcommunication across the multiple heterogeneous domains and the secondgroup that includes the second subset of the determined policy-chargingrequirements for accomplishing the end-to-end communication across themultiple heterogeneous domains comprises: partitioning thepolicy-charging requirements based on a reliability of the first andsecond telecommunications domains.
 15. The computing device of claim 9,wherein the processor is configured with processor-executableinstructions such that: sending a first message including the firstgroup of policy-charging requirements to the first domain orchestratorcomponent comprises sending the first message including the first groupof policy-charging requirements to a public interface of a userequipment domain; and sending a second message including the secondgroup of policy-charging requirements to the second domain orchestratorcomponent comprises sending the second message including the secondgroup of policy-charging requirements to a public interface of a mobilepacket core domain.
 16. A non-transitory computer readable storagemedium having stored thereon processor-executable software instructionsconfigured to cause a processor to perform operations distributingtelecommunications functionality across multiple heterogeneous domainswithin a telecommunications system, the operations comprising:determining policy-charging capabilities of a first heterogeneoustelecommunications domain of the multiple heterogeneous domains, thefirst heterogeneous telecommunications domain including a policymanagement system component, a charging system component, a policy andcharging enforcement (PCE) system component, and a first domainorchestrator component configured to communicate with the computingdevice and each of the policy management system, charging system, andPOE system components; determining policy-charging capabilities of asecond heterogeneous telecommunications domain of the multipleheterogeneous domains, the second heterogeneous telecommunicationsdomain including a second domain orchestrator component configured tocommunicate with the computing device and one or more components in thesecond heterogeneous telecommunications domain; determiningpolicy-charging requirements for accomplishing an end-to-endcommunication across the multiple heterogeneous domains; whereindetermining policy-charging requirements for accomplishing theend-to-end communication across the multiple heterogeneous domainscomprises identifying metering, rating, charging, and balance managementrequirements of the end-to-end communication; using the determinedpolicy-charging capabilities of the first heterogeneoustelecommunications domain and the determined policy-chargingcapabilities of the second heterogeneous telecommunications domain topartition the determined policy-charging requirements for accomplishingthe end-to-end communication across the multiple heterogeneous domainsinto a first group that includes a first subset of the determinedpolicy-charging requirements for accomplishing the end-to-endcommunication across the multiple heterogeneous domains and a secondgroup that includes a second subset of the determined policy-chargingrequirements for accomplishing the end-to-end communication across themultiple heterogeneous domains, wherein the using the determinedpolicy-charging capabilities for accomplishing the end-to-endcommunication across the multiple heterogeneous domains comprisespartitioning the identified metering, rating, charging, and balancemanagement requirements into at least one of the first and secondgroups; sending a first message including the first group ofpolicy-charging requirements to the first domain orchestrator component;and sending a second message including the second group ofpolicy-charging requirements to the second domain orchestratorcomponent.
 17. The non-transitory computer readable storage medium ofclaim 16, wherein the stored processor-executable software instructionsare configured to cause a processor to perform operations such thatdetermining policy-charging capabilities of the first heterogeneoustelecommunications domain comprises: receiving a message from the firstdomain orchestrator component identifying the policy-chargingcapabilities of the first heterogeneous telecommunications domain. 18.The non-transitory computer readable storage medium of claim 16, whereinthe stored processor-executable software instructions are configured tocause a processor to perform operations such that determiningpolicy-charging capabilities of the first heterogeneoustelecommunications domain comprises determining one of: a policycapability of the first heterogeneous telecommunications domain, ametering capability of the first heterogeneous telecommunicationsdomain, a rating capability of the first heterogeneoustelecommunications domain, a charging capability of the firstheterogeneous telecommunications domain, and a balance managementcapability of the first heterogeneous telecommunications domain.
 19. Thenon-transitory computer readable storage medium of claim 16, wherein thestored processor-executable software instructions are configured tocause a processor to perform operations such that using the determinedpolicy-charging capabilities of the first heterogeneoustelecommunications domain and the determined policy-chargingcapabilities of the second heterogeneous telecommunications domain topartition the determined policy-charging requirements for accomplishingthe end-to-end communication across the multiple heterogeneous domainsinto the first group that includes the first subset of the determinedpolicy-charging requirements for accomplishing the end-to-endcommunication across the multiple heterogeneous domains and the secondgroup that includes the second subset of the determined policy-chargingrequirements for accomplishing the end-to-end communication across themultiple heterogeneous domains comprises: partitioning thepolicy-charging requirements based on synchronization errors associatedwith the first or second domains.
 20. The non-transitory computerreadable storage medium of claim 16, wherein the storedprocessor-executable software instructions are configured to cause aprocessor to perform operations such that using the determinedpolicy-charging capabilities of the first heterogeneoustelecommunications domain and the determined policy-chargingcapabilities of the second heterogeneous telecommunications domain topartition the determined policy-charging requirements for accomplishingthe end-to-end communication across the multiple heterogeneous domainsinto the first group that includes the first subset of the determinedpolicy-charging requirements for accomplishing the end-to-endcommunication across the multiple heterogeneous domains and the secondgroup that includes the second subset of the determined policy-chargingrequirements for accomplishing the end-to-end communication across themultiple heterogeneous domains comprises: partitioning thepolicy-charging requirements based on a workloads present on the firstand second telecommunications domains.
 21. The non-transitory computerreadable storage medium of claim 16, wherein the storedprocessor-executable software instructions are configured to cause aprocessor to perform operations such that using the determinedpolicy-charging capabilities of the first heterogeneoustelecommunications domain and the determined policy-chargingcapabilities of the second heterogeneous telecommunications domain topartition the determined policy-charging requirements for accomplishingthe end-to-end communication across the multiple heterogeneous domainsinto the first group that includes the first subset of the determinedpolicy-charging requirements for accomplishing the end-to-endcommunication across the multiple heterogeneous domains and the secondgroup that includes the second subset of the determined policy-chargingrequirements for accomplishing the end-to-end communication across themultiple heterogeneous domains comprises: partitioning thepolicy-charging requirements based on a reliability of the first andsecond telecommunications domains.
 22. The non-transitory computerreadable storage medium of claim 16, wherein the storedprocessor-executable software instructions are configured to cause aprocessor to perform operations such that: sending a first messageincluding the first group of policy-charging requirements to the firstdomain orchestrator component comprises sending the first messageincluding the first group of policy-charging requirements to a publicinterface of a user equipment domain; and sending a second messageincluding the second group of policy-charging requirements to the seconddomain orchestrator component comprises sending the second messageincluding the second group of policy-charging requirements to a publicinterface of a mobile packet core domain.