Network based speed dependent load balancing

ABSTRACT

A mobile device mobility state is included in device reporting to a radio access network for mobility event and load balancing purposes. Respective load conditions and respective coverage areas of a first set of devices of a first network and a second set of devices of a second network are analyzed. In addition, a mobility state of a mobile device, a first signal strength associated with the first set of devices, and a second signal strength associated with the second set of devices are also analyzed. The mobility state is a function of a movement pattern of the mobile device and a speed at which the mobile device is being moved. Network traffic of the mobile device is routed to a set of network devices selected from the first set of devices and the second set of devices, as a result of the analysis.

TECHNICAL FIELD

The subject disclosure relates to wireless communications and, alsogenerally, to network based speed dependent load balancing.

BACKGROUND

The use of mobile devices and the resulting mobile traffic has beengrowing at a very fast pace and the trend shows no signs of stopping. Tomeet the mobile traffic growth and improve the end user experience,mobile service providers are actively looking for mechanisms to improvenetwork efficiency, system capacity, and end user experience. To meetthe demand of higher traffic and to improve the end user experience,mobile telecommunications operators are deploying metro cells (alsoreferred to as small cells) in an attempt to help improve coverage andcapacity. Mobile telecommunications operators have also been adding morecarriers to meet the traffic demand.

BRIEF DESCRIPTION OF THE DRAWINGS

Various non-limiting embodiments are further described with reference tothe accompanying drawings in which:

FIG. 1 illustrates an example, non-limiting wireless communicationsenvironment that can be utilized with the disclosed aspects;

FIG. 2 illustrates an example, non-limiting system for network selectionand load balancing, according to an aspect;

FIG. 3 illustrates an example, wireless network environment that can beutilized with the disclosed aspects;

FIG. 4 illustrates an example, non-limiting system configured to performnetwork selection, according to an aspect;

FIG. 5 illustrates an example, non-limiting system for networkselection, according to an aspect;

FIG. 6 illustrates an example, non-limiting method for networkselection, according to an aspect;

FIG. 7 illustrates an example, non-limiting method for implementation ofnetwork selection, according to an aspect;

FIG. 8 is a schematic example wireless environment that can operate inaccordance with aspects described herein;

FIG. 9 illustrates a block diagram of access equipment and/or softwarerelated to access of a network, in accordance with an embodiment; and

FIG. 10 illustrates a block diagram of a computing system, in accordancewith an embodiment.

DETAILED DESCRIPTION

Aspects of the subject disclosure will now be described more fullyhereinafter with reference to the accompanying drawings in which exampleembodiments are shown. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the various embodiments. However, thesubject disclosure may be embodied in many different forms and shouldnot be construed as limited to the example embodiments set forth herein.

The disclosed aspects provide an enabler for intelligent networkselection and load balancing between different types of cells (e.g.,macro cells, metro cells, and so on) within a cellular network. Thenetwork selection can be based on cell-type, mobility state of the userequipment device, and, optionally, other criteria including, forexample, real-time network load conditions, user equipment devicechannel quality, and other information. Advantages of the variousaspects provided herein relate to improvement of an end user experienceby choosing proper target cells based on mobility state and cell-type inorder to reduce unnecessary handovers. Another advantage relates toreducing a number of signaling messages sent by the system, which is aresult of the reduction of the unnecessary (or excessive) handovers.Other advantages of the disclosed aspects include, but are not limitedto, improved network efficiency, reduced connection failure rate,avoidance of unnecessary handovers, and improved user experience.

FIG. 1 illustrates an example, non-limiting wireless communicationsenvironment 100 that can be utilized with the disclosed aspects. Thewireless communications environment 100 can include a multitude ofwireless communications networks, each having a respective coveragearea. The coverage area of some of the wireless communications networkscan overlap such that one or more mobile devices might be served by anyof the network devices whose coverage areas overlap. For example, thenetworks might overlap in accordance with different radio accesstechnologies and may also overlap in radio range such that a firstnetwork is capable of receiving signals broadcast by one or more othernetworks. Further, the wireless communications environment 100 can be aheterogeneous environment that includes heterogeneous networks, whichcan include multiple different types of cells such as, for example,macro cells, metro cells, femto cells, micro cells, pico cells, and soforth.

A macro cell is a cell in a wireless communications system that providesradio coverage served by a high power cellular access point (or basestation) and, therefore has a large coverage area, such as a range oftens of kilometers. A metro cell is a cell in a wireless communicationssystem that provides radio coverage served by a low power cellularaccess point (or base station) and, therefore has a smaller coveragearea than a macro cell. A femto cell is a small, low power cellularaccess point that can be used in a home or small business, for example.A femto cell is a subset of a type of cell referred to as small cells,which are low-powered radio access nodes that operate in licensedspectrum and unlicensed spectrum and have a range of 10 meters to 1 or 2kilometers, for example. A micro cell is a cell in a wirelesscommunications system that is served by a low power access point andcovers a limited area (e.g., a shopping mall, a hotel, and so on). Amicro cell usually has a coverage area that is larger than the coveragearea served by a pico cell. A pico cell is a small access point that cancover a small area (e.g., a building) and is used to extend coverage ofsignals to indoor areas and/or to add network capacity in areas withdense wireless communications usage.

Wireless communications environment 100 includes one or more macro cells102, 104 and one or more other types of cells, such as one or more smallcells 106, 108 deployed within the wireless communications environment100 and servicing one or more user equipment devices 110, 112, 114, 116,118. Each wireless communications network (e.g., macro cells 102, 104and small cells 106, 108) comprises one or more network devices (e.g., aset of network devices) that operate in conjunction in order to processnetwork traffic for the one or more user equipment devices 110, 112,114, 116, and 118. For example, macro cells 102, 104 can comprise a setof devices that are macro cell enabled devices. In another example, thesmall cells 106, 108 can include a set of devices that are small cellenabled devices. It is noted that although these networks are describedas macro cells 102, 104 and small cells 106, 108, the networks can beother types of cells (e.g., metro cells, femto cells, and so on). Anyreference to a particular cell-type is used for purposes of discussionand not limitation according to the various aspects.

As illustrated, each of the one or more small cells 106, 108 has acorresponding service area 120, 122. Further, each of the one or moremacro cells 102, 104 has a corresponding service area 124, 126. However,it should be understood that the wireless communications environment 100is not limited to this implementation. Instead, any number of cells(e.g., macro cells, small cells, femto cells, and so on) and respectiveservice areas can be deployed within the wireless communicationsenvironment 100. Further, the geographic areas or cell coverage area canbe any shape and can have any dimensions. Thus, the illustratedembodiment should be understood as being illustrative and should not beconstrued as being limiting in any way.

Further, although only five user equipment devices 110, 112, 114, 116,118 are illustrated; any number of user devices can be deployed withinthe wireless communications environment 100. A user equipment device maycontain some or all of the functionality of a system, subscriber unit,subscriber station, mobile station, mobile, wireless terminal, device,mobile device, remote station, remote terminal, access terminal, userterminal, terminal, wireless communication device, wirelesscommunication apparatus, user agent, user device, or user equipment(UE). A mobile device can be a cellular telephone, a cordless telephone,a Session Initiation Protocol (SIP) phone, a smart phone, a featurephone, a wireless local loop (WLL) station, a personal digital assistant(PDA), a laptop, a handheld communication device, a handheld computingdevice, a netbook, a tablet, a satellite radio, a data card, a wirelessmodem card and/or another processing device for communicating over awireless system. In addition, the user equipment devices 110, 112, 114,116, 118 and/or the networks can include functionality as more fullydescribed herein.

In an aspect, the macro cells 102, 104 and the small cells 106, 108 canmonitor their surrounding radio conditions (e.g., by employingrespective measurement components). For example, each of the macro cells102, 104 and small cells 106, 108 can determine network traffic load onits respective network by performing a network diagnostic procedure. Asan example, during a network listen procedure, macro cells 102, 104 andsmall cells 106, 108 can scan their radio environment to determinenetwork performance statistics. Various parameters associated with macrocells 102, 104 and small cells 106, 108 can be detected during thenetwork diagnostic procedure, such as, but not limited to, frequencybands, scrambling codes, common channel pilot power, bandwidth acrossrespective networks, universal mobile telecommunications systemterrestrial radio access receive signal strength indicator, and so on.

In an example scenario, user equipment devices 110, 112, 114, 116, 118can be serviced by networks through one of the macro cells 102, 104, orsmall cells 106, 108. As a user equipment device is moved within thewireless communications environment 100, the respective user equipmentdevice might be moved in and out of the coverage area of the associatedserving network. For example, as a user is sending/receivingcommunications through their respective user equipment device, the usermight be walking, riding in a car, riding on a train, moving around adensely populated urban area (e.g., a large city), wherein the movementmight cause the mobile device to be moved between various wirelesscommunications networks. In such cases, it is beneficial to route thenetwork traffic (e.g., handoff) from a serving network to a targetnetwork in order to continue the communication (e.g., avoid droppedcalls).

Depending on location, user equipment devices 110, 112, 114, 116, 118can have the option to connect to any number of networks. In onescenario, user equipment device 116 might be handed off (e.g., thenetwork traffic of the user equipment device can be routed) from themacro cell 102 to the small cell 106. The small cell might be a goodchoice for routing of the network traffic of the user equipment device116 if the device is being moved slowly. However, if the user equipmentdevice 116 is being moved at a fast rate, the network traffic might berouted (e.g., handed off) to the small cell 106 and, a short time later,might need to be routed out of the small cell 106 and into macro cell104 or small cell 108.

During either of these two handovers (e.g., into the small cell 106 andthen into the macro cell 104 or small cell 108) there is a possibilitythat the connection might be lost (e.g., dropped call) or that othernegative impacts to the user experience could occur (e.g., disruptionduring the communication, slow response of data, and so on). Therefore,in accordance with the disclosed aspects, based in part on the devicemobility state (e.g., speed, direction, pattern, and so forth), thesmall cell 106, in this example, might be bypassed and the networktraffic of the device routed from macro cell 102 to macro cell 104(skipping or bypassing small cell 106 (and/or small cell 108)). Thisbypassing of the small cell 106 can occur even if the small cell 106 hasproperties that are more desirable than the macro cell 104 (e.g., higherpower level, lower congestion or network traffic, and so on), which isdetermined based on the speed at which the user equipment device 116 isbeing moved. In another example, a macro cell might be bypassed and theuser traffic of a mobile device might be routed from a small cell (orfrom a macro cell) to a small cell. It is noted that although variousaspects are discussed with respect of routing traffic from a macro cellto a small cell, the disclosed aspects are not limited to thisimplementation. Instead, the network traffic can be routed from a smallcell to a macro cell, or from a small cell to another small cell, orfrom a macro cell to a macro cell, and so on.

In an aspect, user equipment devices 110, 112, 114, 116, 118 can connectto any available network based on real-time or near-real time networkcondition statistics and mobility state of the respective user equipmentdevice. Continuing with an example scenario, user equipment device 116for example, can determine small cell 106 or macro cell 104 offers ahigher quality of experience and user equipment device 116 can connectto the selected small cell 106, for example, based, in part, on amobility state of the user equipment device 116. For example, is theuser equipment device 116 is determined to be moving at a low speed(e.g., below a threshold level), it might be beneficial to route thetraffic of the user equipment device 116 to the small cell 106. Furtherto this example, user equipment device 114 might determine macro cell104 offers a higher quality of experience based in part of the devicemoving at a higher speed (e.g., above a threshold level) and userequipment device 114 can connect to the selected macro cell 104 based,in part on the mobility state of the device. For example, the mobilitystate information can indicate that the user equipment device is movingat a speed that is not conductive to the metro cell-type.

In some situations, when an option is available where a particular userequipment device can be serviced by either a cellular broadcast server(e.g., a macro cell) or a Wi-Fi access point (e.g., a small cell), forexample, the Wi-Fi access point might automatically be selected. Forexample, the user equipment device might have user preferencesestablished, which indicates that when a Wi-Fi network is available,network traffic of the user equipment device should be routed to theWi-Fi network. Such user preferences might be established because, insome cases, there is no associated cost to the user of the userequipment device when a Wi-Fi network is utilized, as compared to usageof a cellular network. Thus, the network traffic of the user equipmentdevice is automatically routed to the Wi-Fi network, regardless of theload on the Wi-Fi network and/or other considerations, which couldresult in a negative user experience (e.g., dropped communications, poorcommunications, and so on).

However, according to some aspects discussed herein, rather thanautomatically connecting to a Wi-Fi access point, other considerationscan be utilized to route the network traffic of the user equipmentdevice to the Wi-Fi network, or to determine that the network trafficshould remain on the cellular network and/or move to a differentcellular network. For example, instead of moving to the Wi-Fi networkautomatically when the Wi-Fi network is available, a comparison is madebetween the Wi-Fi network and a cellular network while also consideringthe mobility state of the device. For example, if the device is movingat a relatively high speed and the parameters of the macro cell andsmall cell are both within acceptable levels, the network traffic of thedevice might bypass the small cell and be routed to the macro cell. Thisbypassing of the small cell can reduce the amount of signaling messagesbecause signaling messages are not needed to handoff to the small celland then, shortly thereafter, handoff to the macro cell (e.g., only onehandoff procedure is needed to route the network traffic to the macrocell instead of to the small cell and then to another small cell or tothe macro cell).

According to various aspects discussed herein, a user equipment devicecan continuously, periodically, or based on other temporal conditions,receive data indicative of network statistics (e.g., traffic load orcongestion on the network, capability of the network, and so on). Asnetwork performance changes, a user equipment device can determine thatat least a portion of its respective network traffic should be routed toa different network. The determination can be made based on real-time,or real-near time, network statistics.

In accordance with an implementation, the routing of network traffic canbe based in part on an access network discovery and selection functionpolicy. The access network discovery and selection function policy canbe received from a network server that can be configured to push (e.g.,broadcast) the information to the user equipment device. The networkselection policy can include logic that can instruct the user equipmentdevice to select or recommend a network based, at least in part, onnetwork statistics, which can include network conditions and loadconditions (e.g., network congestion). According to someimplementations, one or more network collection agents can monitormultiple networks and can periodically, continuously (e.g., repeatedly)push updated network statistic information to the user equipment device.Such periodic and/or continuous updates can enable real-time or nearreal-time knowledge of the network conditions by the user equipmentdevice.

User equipment devices can communicate with each other and with otherelements via a network, for instance, a wireless network, or a wirelinenetwork. A “network” can include broadband wide-area networks such ascellular networks, local-area networks, wireless local-area networks(e.g., Wi-Fi), and personal area networks, such as near-fieldcommunication networks including BLUETOOTH®. Communication across anetwork can be packet-based; however, radio and frequency/amplitudemodulation networks can enable communication between communicationdevices using appropriate analog-digital-analog converters and otherelements. Communication is enabled by hardware elements called“transceivers.” User equipment devices can have more than onetransceiver, capable of communicating over different networks. Forexample, a cellular telephone can include a cellular transceiver forcommunicating with a cellular base station, a Wi-Fi transceiver forcommunicating with a Wi-Fi network, and a BLUETOOTH® transceiver forcommunicating with a BLUETOOTH® device. A Wi-Fi network is accessiblevia “access points” such as wireless routers, etc., that communicatewith the Wi-Fi transceiver to send and receive data. The Wi-Fi networkcan further be connected to the internet or other packet-based networks.The “bandwidth” of a network connection or an access point is a measureof the rate of data transfer, and can be expressed as a quantity of datatransferred per unit of time. Additionally, communication (e.g., voicetraffic, data traffic, and so on) between one or more components caninclude, wired communications (e.g., routed through a backhaul broadbandwired network, an optical fiber backbone, twisted-pair line, T1/E1 phoneline, digital subscriber line, coaxial cable, and/or the like), and orradio broadcasts (e.g., cellular channels, Wi-Fi channels, satellitechannels, and/or the like). In accordance with some embodiments, one ormore of the user equipment devices can be capable of simultaneousconnection to the networks. For example, a user equipment device can bea multi-mode device.

A network can include a plurality of elements that host logic forperforming tasks on the network. The logic can be hosted on servers,according to an aspect. In packet-based wide-area networks, servers maybe placed at several logical points on the network. Servers may furtherbe in communication with databases and can enable communication devicesto access the contents of a database. Billing servers and applicationservers are examples of such servers. A server can include severalnetwork elements, including other servers, and can be logically situatedanywhere on a service provider's network, such as the back-end of acellular network. A server hosts or is in communication with a databasehosting an account for a user of a mobile device. The “user account”includes several attributes for a particular user, including a uniqueidentifier of the mobile device(s) owned by the user, relationships withother users, application usage, location, personal settings, businessrules, bank accounts, and other information.

FIG. 2 illustrates an example, non-limiting system 200 for networkselection and load balancing, according to an aspect. The one or moreaspects disclosed herein enhance a standard user equipment devicereporting mechanism by adding user equipment device mobility state tothe device report that is sent to the radio access network (RAN) formobility event and load balancing purposes. The RAN can be part of oneor more communications networks, such as eNB, for example, and can usethe mobility state information combined with the knowledge of thecell-type (e.g., macro cell, metro cell, distributed antenna system(DAS), and so on) and the carrier frequency of itself as well as theneighbor cells (e.g., target cells) to make a proper decision of whetherto move or route the network traffic of the user equipment device toanother cell and which cell is the appropriate cell.

As mentioned, mobile traffic has been growing at a very fast pace andthe trend is continuing. To meet the mobile traffic growth demand andimprove the end user experience, mobile service providers are activelylooking for mechanisms to improve system capacity and end userexperience. Deploying metro cells (also referred to hereininterchangeably as small cells) can help to improve coverage andcapacity. In addition, operators are adding more carriers (e.g., in longterm evolution (LTE)) to meet the traffic demand. It is noted thatalthough various aspects are described with reference to an LTE network,the aspects can be applied to other networks including a 3G network, forexample.

Network performance and user experience are important to mobileoperators. It has been observed that handover (e.g., routing of networktraffic) is a factor impacting voice quality and the user equipmentdevice speed has an impact (which at times can be significant) on thehandover performance. This is even more pronounced in heterogeneousnetwork environments. Metro cells typically have lower output power andsmaller coverage as compared to macro cells. As disclosed herein, for agiven mobile device, the most suitable cell for its traffic depends onits mobility state (e.g., the speed, direction, and the pattern thedevice is moving), the received signal level, the types of cells (macrocell, metro cell, DAS, and so on) and the associated radio networkcongestion situation. For example, a user equipment device might beunder the coverage of both a macro cell and a metro cell and the userequipment device might be moving (e.g., the user is driving in a car at30 miles per hour). In this example, the user equipment device receivesa stronger signal level from a metro cell, which could be lightly loadedas compared to the macro cell. However, given the speed at which theuser equipment device is being moved, the user equipment device would bebetter served by the macro cell, which can avoid unnecessary handovers(and reduce a number of signaling messages sent by the system). However,estimating the mobility state from the RAN is a challenging task andconventional solutions do not have the effective solution providedherein. If the network does not have the knowledge of the user equipmentdevice mobility state, the network could decide to handover the userequipment device to the metro cell based on the signal level as aneffort to perform load balancing. This could lead to more handoverevents for the initial hand-in and later handout after the device movesout of the coverage of the metro cell, which increases the amount ofsignaling needed to perform the multiple handovers. Further, somefrequency carriers have better performance than other frequency carriersin supporting high mobility users (e.g., 700 is better than advancedwireless service (AWS) band in that sense). Feedback on the mobilitystate to the network is helpful for both heterogeneous networks (HetNet)and inter-frequency mobility and load balancing.

With continuing reference to FIG. 2, the system 200 comprises at leastone memory 202 (e.g., a memory device) that can store computerexecutable components and instructions. System 200 can also include atleast one processor 204 (e.g., a processor device), communicativelycoupled to the at least one memory 202. Coupling can include variouscommunications including, but not limited to, direct communications,indirect communications, wired communications, and/or wirelesscommunications. The at least one processor 204 can execute or facilitateexecution of the computer executable components stored in the at leastone memory 202. The at least one processor 204 can be directly involvedin the execution of the computer executable component(s), according toan aspect. Additionally or alternatively, the at least one processor 204can be indirectly involved in the execution of the computer executablecomponent(s). For example, the at least one processor 204 can direct oneor more components to perform the operations.

It is noted that although one or more computer executable components maybe described herein and illustrated as components separate from the atleast one memory 202 (e.g., operatively connected to memory), inaccordance with various embodiments, the one or more computer executablecomponents could be stored in the at least one memory 202. Further,while various components have been illustrated as separate components,it will be appreciated that multiple components can be implemented as asingle component, or a single component can be implemented as multiplecomponents, without departing from example embodiments.

System 200 also includes an evaluation manager component 206 that can beconfigured to analyze various information associated with a userequipment device, a source network, and one or more target networks (orneighbor networks). The information analyzed by the evaluation managercomponent 206 can include a mobility state of the user equipment device.The mobility state can include information related to whether the userequipment device is stationary or is being moved. The mobility state canalso include information as to a speed at which the mobile device isbeing moved and/or a pattern of movement. For example, the speed can beclassified according to various rankings such as, for example, low,medium, and high. In another example, the speed can be classified asfast or slow. In a further example, the speed can be measured and if ator over a certain level (e.g., higher than a predetermined speed) thedevice is considered to be moving quickly and if under the certain level(e.g., under the predetermined speed), the device is considered to bemoving slowly. Further, the direction the device is being moved can beanalyzed, according to an aspect.

Other information that can be analyzed by the evaluation managercomponent 206 includes the power of each network or cell (e.g., sourcenetwork, one or more neighbor or target networks). For example, thepower of each cell can be measured as absolute power and can beexpressed as the power ratio in decibels (dB) of the measured powerreferenced to one milliwatt (mW). The notation for this power ratio isdBm.

Further information that can be analyzed by the evaluation managercomponent 206 can include respective load conditions of the networks,respective coverage areas of the networks, and signal strengthsassociated with the networks. For example, a signal strength thresholdis a reference signal received power (RSRP) over the reference signalsubcarriers, in a long term evolution (LTE) implementation. In anotherexample, a signal strength threshold can be a reference (received)signal code power (RSCP) in a universal mobile telecommunications system(UMTS) implementation. The respective signal strengths can berepresented in a measurement report received from the user equipmentdevice. In addition, the mobility state of the user equipment device canbe received in the measurement report.

In an example, the mobility state of the mobile device can be utilizedby the evaluation manager component 206 as a portion of a determinationas to which network the network traffic should be route. For example,the mobility state information can be used by the evaluation managercomponent 206 to determine if it is appropriate for the mobile device toconnect to a network given the movement or non-movement of the mobiledevice. For example, if the mobility state information indicates themobile device is moving at 60 miles per hour and a metro cell isavailable, it might be decided by the evaluation manager component 206to forgo connecting to the metro cell based on the relatively fastmovement of the mobile device and a prediction that the mobile devicewill not be within range of a base station operating within the metrocell for a sufficient amount of time to handle voice and/or datacommunications between the mobile device and the metro cell.Alternatively, if the mobility state information indicates the mobiledevice is stationary and a metro cell is available, it can be decided bythe evaluation manager component 206 to connect to the metro cell basedupon the stationary state of the mobile device and the prediction thatthe mobile device will be within range of the metro cell for asufficient amount of time to handle voice and/or data communicationsbetween the mobile device and the metro cell.

System 200 also includes a routing manager component 208 that can beconfigured to route network traffic of the mobile device to a networkselected from a set of target networks. According to some aspects, oneor more potential target networks are bypassed. For example, if the userequipment device is being moved at a relatively fast speed, small cellsmight be bypassed and the network traffic of the user equipment devicemight be moved to a macro cell. In another example, if the userequipment device is being moved in a direction that indicates the userequipment device will enter and exit the small cell in a short amount oftime, the small cell can be bypassed and the network traffic of thedevice routed to the macro cell.

FIG. 3 illustrates an example, wireless network environment 300 that canbe utilized with the disclosed aspects. Illustrated is a first cell 302,which can be a current serving cell, and its associated coverage area304. Also illustrated are a second cell 306 and its associatedgeographic coverage area 308. For purposes of this example, the secondcell 306 is a target network that includes a set of devices that aremetro cell enabled devices (e.g., a metro cell network). Alsoillustrated are a third cell 310 and its associated geographic coveragearea 312. For this example, the third cell 310 is a target network thatincludes a set of devices that are macro cell enabled devices (e.g., amacro cell network). Also illustrated is a user equipment device 314.

In this example, the user equipment device 314 is being moved in thedirection indicated by arrow and at a speed of 35 miles-per-hour.Further, for this example, the following assumptions related to the userequipment device radio frequency (RF) environment apply and it isassumed that these conditions stay constant for purposes of thisexample. The first cell 302 (macro cell) has a power of −105 dBm. Thesecond cell 306 (metro cell) has a power of −90 dBm. Further, the thirdcell 310 (macro cell) has a power of −95 dBm. Additionally, in thisexample, the handover threshold plus hysteresis is equal to 5 dB, theTimeToTrigger (TTT) is 1 second (note, both hysteresis and TTT can bemobility state dependent).

The user equipment device 314 detects its mobility state, as discussedherein, which is 35 miles per hour (in this example), which can beconsidered as a medium speed, according to some implementations. An A5(or A3) event can be triggered, which indicates the first cell 302 isbelow an acceptable threshold and that the second cell 306 and/or thethird cell 310 are better than the first cell by 5 dB (e.g., the RSRPfrom the first cell 302, the second cell 306, and the third cell 310 arereported).

As per various aspects disclosed herein, the user equipment mobilitystate (medium in this example) is added to the A3/A5 measurement report.Adding the mobility state to the measurement report provides the network(e.g., current service network, first cell 302) with knowledge of theuser equipment device mobility state. According to some implementations,a direction or pattern in which the user equipment device is moving alsocan be included in the measurement report.

Further to this example, the eNB behavior is that the first cell 302exchanges cell-type information with its neighbors (e.g., the secondcell 306 and the third cell 310). According to an implementation, thecell-type information can be exchanged via X2, however, other manners ofexchanging the information could be utilized and the various aspects arenot limited to this example.

In an implementation, the cell-type information can identify a cell (ornetwork) as being of a particular cell type. The cell-type informationcan include an explicit specification of a cell-type of one or morenetworks. For example, a cell information message can include text thatexplicitly names the cell-type for a given network.

As another example, the cell information message might include a code oridentifier by which the cell-type can be ascertained. For example, thesystem may include a table or other data structure by which tocross-reference cell-type codes or identifiers with cell types. In anexample, non-limiting implementation, the cell-type can be associatedwith a particular identity or range of identifies. For example, an IDrange of 100-49,999 may be assigned to macro cells, and a range of40,000-200,000 may be assigned to metro cells, and so forth.

The cell information message can include any message that is capable ofbeing transmitted over a radio/air interface. Further, the cellinformation message can be sent using any physical, transport, and/orlogical channels. These channel types are known and, therefore, will notbe described in further detail herein.

At about the same time as the first cell 302 receives the A3/A5measurement repot, the first cell 302 (e.g., current serving cell)evaluates the information. As indicated in the assumptions providedabove for this example, the first cell 302 determines that both thesecond cell 306 and the third cell 310 have measurement levels (e.g.,the corresponding RSRP levels) that are at or above an acceptablethreshold. Further, evaluation by the first cell 302 results indiscarding (or disregarding) the second cell 306 as a target cell. Thedetermination to discard the second cell 306 is based on the mobilitystate of the user equipment device (e.g., moving at a medium speedlevel) and the cell type (e.g., metro cell). Thus, the second cell 306is removed from consideration even though the second cell 306 isconsidered the better neighbor (based on a consideration between thesecond cell 306 and the third cell 310). This is because the speed atwhich the device is being moved would cause the device to move into andout of the coverage area of the second cell relatively quickly.Therefore, in this example, the third cell 310 is chosen because thethird cell meets the handover threshold (5 dB<−0.95−(−105)), and theuser equipment speed is greater than or equal to (>=) medium. Thus, thedecision is that the target cell is the third cell 310 and the networktraffic of the user equipment device 314 can be routed (e.g., handedoff) from the first cell 302 and routed to (e.g., handed into) the thirdcell 310.

By analyzing information related to the mobility state of the userequipment device, a decision can be made to bypass one or more smallercells and prefer a larger cell(s) (e.g., a macro cell) and/or to bypassone or more larger cells and prefer a small cell(s). The avoidance ofunnecessary handovers and/or extra handovers (e.g., quickly moving thetraffic into and out of a smaller cell) can improve network efficiency,avoid unnecessary handovers, and reduce the amount of signaling messagesneeded to handover the device (e.g., the user traffic of the device).This can also reduce a connection failure rate and improve the userexperience.

FIG. 4 illustrates an example, non-limiting system 400 configured toperform network selection, according to an aspect. System 400 includes amemory 202 and a processor 204 operatively connected to the memory 202.Also included is an evaluation manager component 206 that can beconfigured to analyze various information related to source network 402,one or more target networks 404, and a user equipment device 406.According to an implementation, a receiver component 408 can beconfigured to obtain the information from the source network 402, theone or more target networks 404, and the user equipment device 406.

In some implementations, the system 400 can be implemented by the sourcenetwork 402 (e.g., the system components are located within the sourcenetwork 402 or are implemented by one or more devices of a sourcenetwork). In this situation, the information related to the sourcenetwork might already be known by the evaluation manager component 206.For example, the evaluation manager component 206 might already haveknowledge related to the type of network for which the source network isconfigured (e.g., macro cell, femto cell, metro cell, and so on). Invarious implementations, the source network is a macro network (e.g.,comprises a set of devices that are macro cell (or macro-network)enabled devices). However, in some implementations, the network can be asmall cell network (e.g., small cell, micro cell, femto cell, and soon).

The receiver component 408 can also be configured to receive loadcondition(s) of each of the target networks 404. For example, theremight be a single target network or, according to some implementations,there might be two or more target networks. The two or more targetnetworks might be different types of networks (e.g., macro network,metro network, pico network, and so on). Further, information related tothe coverage area of each of the target networks 404 can also beobtained by the receiver component 408.

The receiver component 408 also can be configured to receive, from theuser equipment device 406, a mobility report. The mobility report caninclude a mobility state of the user equipment device 406. The mobilitystate is a function of a movement pattern of the user equipment device406 and a speed at which the user equipment device 406 is being moved.For example, the movement pattern can be represented by a set of patterndata and the speed can be represented by speed data. Various techniquescan be utilized by the user equipment device to determine its mobilitystate. According to an aspect, techniques for performing speed detectionand radio selection using accelerometers are described in U.S. Pat. No.8,385,917, entitled “Radio Selection Employing Transit Data Determinedfrom Kinetic Energy Generation”, which is incorporated by reference inits entirety.

According to some implementations, the user equipment device 406transmits measurement report data, which is received by the receivercomponent 408. The measurement report data can include the mobilitystate of the user equipment device and respective signal strengthsassociated with each of the target networks 404. For example, themeasurement report might indicate that a signal strength of the currentserving cell (e.g., source cell) has fallen below an acceptable level.The measurement report might also indicate that the signal strength, asmeasured by the user equipment device, of the one or more target cellsis above (or meets) an acceptable level. It is noted that signalstrength can be an entry level criteria such that a neighbor cell (e.g.,potential target cell) is not even considered if its signal strength isnot at an acceptable level.

Based on the measurement report received from the user equipment device406 and the information received from the source network 402 and targetnetworks 404, a determination is made whether to route user traffic ofthe user equipment device 406 from the source network 402 and, if so,which target network should be chosen.

According to an implementation, a network decision component 410 can beconfigured to utilize the information received from the target networks404, including network traffic load information, and user equipmentdevice 406 to determine which network the user equipment device 406should connect to. The network decision component 410 can be anapplication program that includes computer-executable instruction that,when executed by the one or more processors 204 causes the system 400 toanalyze the received information and to instruct the user equipmentdevice 406 to connect to the selected network.

In an example, the network traffic or load information received from thevarious networks can include historic network load information, which isload information obtained based upon network load experienced by therespective network in the past or otherwise in non-real-time. Accordingto some aspects, the historic network load information is used by thenetwork decision component 410 and/or evaluation manager component 206to identify one or more network load trends over a specified period oftime. This trending network load information can be used to predicttimes during which the network load is favorable as well as the timesduring which the network load will not be favorable for supportingcommunications between the user equipment device 406 and the respectivetarget network.

In another example, the network traffic information includes currentnetwork load information, which is data that is obtained based upon anetwork load experienced by the network. Real-time, in this context, isthe actual time during which a network load is experienced by thenetwork. Near real-time, in this context, is the actual time duringwhich a network load is experienced by the base station, plus a delay onthe order of seconds, minutes, or any other order of magnitude thereof,for example. What constitutes near-real time network load information ascompared to historic network load information can be defined by aservice provider providing service to the network.

The network load information can include a number of active devices(e.g., devices currently engaged in a call or data session). In otherembodiments, the load information includes a number of idle devices(e.g., devices currently camped on a given cell). The load informationcan include active load information and idle load information, which canbe utilized separately or together to select a target network.

According to some aspects, the network decision component 410 canutilize additional information to select the particular network. Thisinformation can include, but is not limited to, one or more policiesand/or one or more user profiles. A policy can be one or more settings,one or more configurations, one or more rules, and so forth, thatdefine, at least in part, one or more courses of action in view of oneor more conditions to be used by the network decision component 410 todecide which target network the user equipment device should beconnected to. In some aspects, a policy includes one or more rules thatspecific one or more if-then conditions for handling a particularsituation, such as redirecting network traffic based upon a speed atwhich the user equipment device is being moved. In accordance with someaspects, a policy can include one or more matrices of cause and effectconditions, tables of actions, and so on for responding to or dealingwith various stimuli, include network conditions, mobile device mobilitystate, and so on.

FIG. 5 illustrates an example, non-limiting system 500 for networkselection, according to an aspect. System 500 includes a memory 202 anda processor 204, coupled to the memory 202. The processor 204facilitates execution of executable instructions included in the memory202 to perform operations.

Also included in a system 500 is an evaluation manager component 206that analyzes transmit information received from and/or related to afirst set of devices of a first network 502, a second set of devices ofa second network 504 (and subsequent sets of devices of subsequentnetworks), and a mobile device 506. For example, a receiver component408 can obtain a measurement report 508 from the mobile device 506,which can be reported under a connected condition. The measurementreport 508 can include a mobility state 510 of the mobile device 506.The mobility state 510 can be a function of a movement pattern of themobile device and a speed at which the mobile device is being moved.

According to an implementation, the mobile device 506 can comprise atransit analysis component 512 that can be configured to analyze transitdata of the mobile device 506 to obtain a mobility state of the mobiledevice 506. For example, the transit analysis component 512 candetermine that the mobile device 506 is being moved rapidly based inpart on a frequency component associated with the movement. In anexample, a frequency can be associated with train travel. Further tothis example, movement of the mobile device 506 (or a pattern of themovement) indicates a frequency associated with a train crossing trackwelds, acceleration/deceleration of a train from/into a station, swayingof the train car during transit, and so forth.

In another example, an irregular sinusoidal nature of a frequency canindicate that the mobile device is being moved, but that such movementwould not result in handoffs between networks. For example, theirregular sinusoidal nature can indicate foot tapping, a leg bouncingwhile the user is seated, and so on. As another example, the gait of theuser walking with the mobile device can be regular and the rise and fallof the body can be periodic. As a further example, the high frequencyvibrations of a turbine engine (e.g., a jet engine) can producerecognizable frequency patterns.

Other considerations that can be taken into account by the transitanalysis component 512 include the data source information. Suchinformation can include a model, type, brand, date of manufacture, agingor environmental characteristics and so on. Other information includes adata type, such as voltage, current, temporal, numeric, ratio, instanthistorical, and so on. Also considered can be a data acquisition window,data acquisition environment, historic data, user preferences, userdefined data, data reference frame(s), multiple data sources, and so on.

The transit analysis component 512 can utilize various motion sensorsincluding, but not limited to, global positioning system (GPS) data,accelerometers, speed calculations between access points for given timeintervals, and so on. Further, the transit analysis component 512 cananalyze information associated with the various motion sensors todetermine close matches (or perfect matches) between known (or inferred)patterns and accessible mobile device transit patterns.

The measurement report 508 can also include signal strengths 514measured by the mobile device. For example, the signal strengths 514included in the measurement report 508 can include a first signalstrength associated with the first set of devices of the first network502. Other single strengths 514 included in the measurement report 508can include a second signal strength associated with the second set ofdevices of the second network 504, as well as other (or subsequent)signal strengths associated with additional networks that are underconsideration.

According to an implementation, the mobile device 506 can generatefeedback related to a preferred network of the target networks to whichthe mobile device 506 should connect. The feedback can be transmitted tothe receiver component 408 and can be utilized by the evaluation managercomponent 206 and/or network decision component 410 to make the networkdecision.

Each of the first network 502 and the second network 504 (as well asother networks) can report their respective cell-types 516, 518 to thesystem 500, such as in a cell broadcast message. In an example, theneighbor cell information can be reported through a system informationblock (SIB), however, other manners of reporting the information can beutilized. In some aspects, the cell broadcast message can be included ina SIB, which can contain other information. The SIB may be a new SIBconfigured to include the network traffic load information.Alternatively, the SIB can be an existing SIB that has been modified toinclude the network traffic load information.

The respective cell-types 516, 518 (as well as other information) can beretained in one or more data stores 520. According to an implementation,the one or more data stores 520 can be integrated with the evaluationmanager component 206 and/or memory 202. In another implementation, theone or more data stores 520 can be located external to, but accessibleby, the evaluation manager component 206 and/or memory 202. It is notedthat a data store can include volatile memory or nonvolatile memory, orcan include both volatile memory and nonvolatile memory. By way ofillustration, and not limitation, nonvolatile memory can include readonly memory, programmable read only memory, electrically programmableread only memory, electrically erasable programmable read only memory,or flash memory. Volatile memory can include random access memory, whichcan operate as external cache memory. By way of illustration and notlimitation, random access memory is available in many forms such asstatic random access memory, dynamic random access memory, synchronousdynamic random access memory, double data rate synchronous dynamicrandom access memory, enhanced synchronous dynamic random access memory,Synchlink dynamic random access memory, and direct Rambus random accessmemory. The memory (e.g., data stores, databases, and so on) of thevarious disclosed aspects is intended to comprise, without being limitedto, these and any other suitable types of memory.

According to an implementation, prior to the evaluation managercomponent 206 analyzing the various information, a thresholddetermination component 522 ascertains whether the reported signalstrengths 514 meet or exceed a threshold level. For example, a signalstrength of a source network is compared to one or more neighbornetworks (or target networks). If the reported signal strength of atarget network is not at least as good as the source network, or doesnot exceed the reported signal strength of the source network, thatparticular target network is removed from consideration and the networktraffic of the mobile device is not routed to that network by therouting manager component 208. However, if the reported signal strengthof a network meets the entry level criteria, further analysis of thatnetwork is considered in combination with the mobility state of themobile device.

In an example, if a target network is a metro cell and the mobile deviceis moving too fast, that metro cell will not be a good target networkfor the device traffic to move to even though that small cell might havea good radio frequency (RF) condition and might be lightly loaded (e.g.,has a low congestion level). This is because if the mobile device ismoving too fast and the network traffic of the device is moved to thatsmall cell, it is likely that the mobile device will move out of thecoverage area of that small cell soon after the network traffic ishanded off to that small cell. In this case, the network traffic willhave to be handed out of the small cell again, which can have a negativeperformance impact due to the multiple, unnecessary handoffs.

According to some implementations, the various aspects disclosed hereincan utilize an artificial intelligence component (not shown), which canfacilitate automating one or more features in accordance with thedisclosed aspects. As discussed herein, the disclosed aspects can beutilized to route user traffic of a mobile device to a target networksuch that network efficiencies can be improved and an amount ofsignaling messages being transmitted is reduced, as well as otheradvantages as compared to conventional systems. The disclosed aspects inconnection with network selection and load balancing can employ variousartificial intelligence-based schemes for carrying out various aspectsthereof. For example, a process for receiving network congestionconditions and parameters and a mobility state of a mobile device,comparing the network congestion conditions and parameters with one ormore usage and one or more movement parameters of a user equipmentdevice can be facilitated with an example automatic classifier systemand process.

An example classifier can be a function that maps an input attributevector, x=(x1, x2, x3, x4, xn), to a confidence that the input belongsto a class, that is, f(x)=confidence(class). Such classification canemploy a probabilistic and/or statistical-based analysis (e.g.,factoring into the analysis utilities and costs) to prognose or infer anaction that can be automatically performed. In the case of communicationsystems, for example, attributes can be types of radio networks,congestion thresholds and the classes can be a type of traffic usage(e.g., voice traffic, data traffic, short message service traffic, andso on), the amount of network traffic usage, the expected location of auser equipment device based on a movement parameter, the speed at whichthe mobile device is being moved, and so on.

A support vector machine is an example of a classifier that can beemployed. The support vector machine can operate by finding ahypersurface in the space of possible inputs, which the hypersurfaceattempts to split the triggering criteria from the non-triggeringevents. Intuitively, this makes the classification correct for testingdata that is near, but not identical to training data. Other directedand undirected model classification approaches include, for example,naïve Bayes, Bayesian networks, decision trees, neural networks, fuzzylogic models, and probabilistic classification models providingdifferent patterns of independence can be employed. Classification asused herein also may be inclusive of statistical regression that isutilized to develop models of priority.

The disclosed aspects can employ classifiers that are explicitly trained(e.g., via a generic training data) as well as implicitly trained (e.g.,via observing usage of the user equipment device, by observing amovement pattern of the user equipment device, and so on). For example,support vector machines can be configured via a learning or trainingphase within a classifier constructor and feature selection module.Thus, the classifier(s) can be used to automatically learn and perform anumber of functions, including but not limited to ascertaining networktraffic should be routed from a source network to a target network,determining the user equipment device is likely to be moved into thecoverage area of one or more networks, determining one or more targetnetworks should be bypassed (e.g., not used as the target network) eventhough parameters associated with the network are better than othernetworks that are not bypassed, and so forth. Further functions caninclude, but are not limited to, gathering information (e.g., networktraffic usage information, network congestion information) from a groupof devices (e.g., a set of network devices), aggregating the datagathered from the subject user equipment device, comparing two or morenetworks in conjunction with the device mobility state to determine themost appropriate network for routing of the network traffic, and so on.The criteria can include, but is not limited to, a type of network,patterns associated with mobile device usage and movement, and so on.

In view of the example systems shown and described herein, methods thatmay be implemented in accordance with the one or more of the disclosedaspects, will be better understood with reference to the following flowcharts. While, for purposes of simplicity of explanation, the methodsare shown and described as a series of blocks, it is to be understoodthat the disclosed aspects are not limited by the number or order ofblocks, as some blocks may occur in different orders and/or atsubstantially the same time with other blocks from what is depicted anddescribed herein. Moreover, not all illustrated blocks may be requiredto implement the methods described hereinafter. It is noted that thefunctionality associated with the blocks may be implemented by software,hardware, in local, cloud, and/or virtualized environment, a combinationthereof or any other suitable means (e.g. device, system, process,component). Additionally, it is also noted that the methods disclosedhereinafter and throughout this specification are capable of beingstored on an article of manufacture to facilitate transporting andtransferring such methodologies to various devices. Those skilled in theart will understand that a method could alternatively be represented asa series of interrelated states or events, such as in a state diagram.The various methods disclosed herein can be performed by a systemcomprising at least one processor and/or one or more network devicescomprising at least one processor.

FIG. 6 illustrates an example, non-limiting method 600 for networkselection, according to an aspect. At 602, network parameters of one ormore target networks and mobility state information of a mobile deviceare analyzed. The network parameters can include respective loadconditions, respective coverage areas, and respective signal strengthsof one or more target networks. For example, respective load conditionsand respective coverage areas of a first set of devices of a firstnetwork and a second set of devices of a second network can be includedin the analysis. Further, a first signal strength associated with thefirst set of devices and a second signal strength associated with thesecond set of devices can be included in the analysis.

The mobility state of the mobile device is a function of a movementpattern of the mobile device and a speed at which the mobile device isbeing moved. A mobility parameter can relate to whether the userequipment device is stationary or is moving and, if moving, a speed atwhich the user equipment device is being moved. For example, the userequipment device might be stationary (e.g., a user of the user equipmentdevice is sitting at her desk). In another example, the user equipmentdevice might be moved and traveling at any of a variety of differentspeeds, which can be a function of the mode of transportation (e.g.,walking, riding a bicycle, in a car, on a train, in an airplane, and soon). Further, the speed might change over time. For example, the usermight be traveling in a car and then get out of the car and walk theremaining distance until arriving at her destination.

Another parameter relates to the direction that the user equipmentdevice is being moved. The direction can be a horizontal direction,which can be associated with cardinal directions or cardinal points(e.g., north, south, east, west, or intermediate points). Further, thedirection can include an altitude (or changes in the height) of the userequipment device. For example, the user equipment device might betraveling in an elevator and a range of one network might not reach allpoints along that altitude (e.g., connectivity is only enabled at thehigher locations).

According to an implementation, the mobility state, the first signalstrength, and the second signal strength are represented in measurementreport data received from the mobile device, at 604. The method 600 alsocan include receiving respective network parameters, at 606. The networkparameters can include cell-type information related to the first set ofnetwork devices and the second set of network devices. A first cell-typeof the first set of network devices can be different from a secondcell-type of the second set of network devices. The parameters receivedcan also include respective network congestion levels, capability of thenetwork, geographic coverage area information, and so on. According toan aspect, a network traffic coverage area of the second set of devicesat least partially overlaps another network traffic coverage area of thefirst set of devices.

According to an implementation, the analysis can include determining thespeed at which the mobile device is being moved satisfies a first speedlevel condition and a micro cell is chosen as a potential target cell toroute the network traffic. For example, if the mobile device is movingslowly or below a first speed level condition, a micro cell might be anappropriate choice for routing of the network traffic.

According to a further implementation, the analysis can includedetermining the speed at which the mobile device is being movedsatisfies a second speed level condition. For example, the mobile devicemight be moving quickly and, based on the quick movement it iscontemplated that the mobile device will quickly move into and out ofthe coverage area of a micro cell. Further to this aspect, the methodcan include bypassing the micro cell as a potential target cell to routethe network traffic and choosing a metro cell as the potential targetcell to route the network traffic.

In an implementation, if a neighbor or target network does not meet acertain threshold parameter, that network is removed from considerationfor routing of the mobile device traffic. For example, a signal strengthof the target network can be analyzed and, if the signal strength isbelow a predefined level, the target network is disregarded (e.g., notincluding in the network analysis).

At 608, network traffic of the mobile device is routed to a set ofnetwork devices selected from the first set of devices and the secondset of devices, as a result of the analyzing. According to animplementation, the routing includes reducing a number of signalingmessages sent by the system. In an example, the first set of devices aremicro cell enabled devices and the second set of devices are macro cellenabled devices. Further to this example, reducing the number ofsignaling messages sent comprises bypassing the first set of devices,and the routing comprises routing the mobile device to the second set ofdevices.

FIG. 7 illustrates an example, non-limiting method 700 forimplementation of network selection, according to an aspect. Accordingto an aspect, the user equipment device reports its mobility state underthe connected state. For example, the user equipment device can be inidle mode or connected mode.

At 702, the user equipment device determines its mobility state. Forexample, the user equipment device can determine whether it is static(e.g., not moving), moving at a slow speed, moving at a medium speed, ormoving at a fast speed. The user equipment device can also determine itsmoving pattern. Various techniques can be utilized by the user equipmentdevice to determine its mobility state and will not be described hereinfor purposes of simplicity.

At 704, the user equipment device informs the serving cell that aneighbor cell is suitable for handover. The information provided theserving cell also includes the mobility state of the user equipmentdevice. For example, using various processes for load balancing,neighbor cell information is given by the serving eNB via SIB or othermeans. After receiving this information, the user equipment devicetriggers the reporting event to inform the serving cell about theneighbor cell. The determination by the user equipment device can bebased on the RSRP/RSRQ level. The serving cell makes a decision whetherto move the user equipment device to the target cell.

The network traffic of the user equipment device is routed to the targetcell identified by the user equipment device or another cell selected bythe eNB, at 706. For example, based on the cell-types of the servingcell and the neighboring cells, their load conditions, and the mobilitystate of the devices, the serving RAN node (e.g., eNB) can make the bestdecision on device mobility handover or whether to move a device to atarget cell and if so, which target cell.

Therefore, the disclosed aspects can reduce an amount of signalingrequired by choosing a proper cell to which network traffic of the userequipment device should be routed, wherein the choice is based in parton a mobility state of the user equipment device. Other advantages caninclude improving a user experience and reducing communication failures,which might occur during handover (e.g., routing of network trafficbetween cells).

By way of further description with respect to one or more non-limitingways to facilitate network selection and load balancing, FIG. 8 is aschematic example wireless environment 800 that can operate inaccordance with aspects described herein. In particular, examplewireless environment 800 illustrates a set of wireless network macrocells. Three coverage macro cells 802, 804, and 806 include theillustrative wireless environment; however, it is noted that wirelesscellular network deployments can encompass any number of macro cells.Coverage macro cells 802, 804, and 806 are illustrated as hexagons;however, coverage cells can adopt other geometries generally dictated bya deployment configuration or floor plan, geographic areas to becovered, and so on. Each macro cell 802, 804, and 806 is sectorized in a2π/3 configuration in which each macro cell includes three sectors,demarcated with dashed lines in FIG. 8. It is noted that othersectorizations are possible, and aspects or features of the disclosedsubject matter can be exploited regardless of type of sectorization.Macro cells 802, 804, and 806 are served respectively through basestations or eNodeBs 808, 810, and 812. Any two eNodeBs can be consideredan eNodeB site pair. It is noted that radio component(s) arefunctionally coupled through links such as cables (e.g., RF andmicrowave coaxial lines), ports, switches, connectors, and the like, toa set of one or more antennas that transmit and receive wireless signals(not illustrated). It is noted that a radio network controller (notshown), which can be a part of mobile network platform(s) 814, and setof base stations (e.g., eNode B 808, 810, and 812) that serve a set ofmacro cells; electronic circuitry or components associated with the basestations in the set of base stations; a set of respective wireless links(e.g., links 816, 818, and 820) operated in accordance to a radiotechnology through the base stations, form a macro radio access network.It is further noted that, based on network features, the radiocontroller can be distributed among the set of base stations orassociated radio equipment. In an aspect, for universal mobiletelecommunication system-based networks, wireless links 816, 818, and820 embody a Uu interface (universal mobile telecommunication system AirInterface).

Mobile network platform(s) 814 facilitates circuit switched-based (e.g.,voice and data) and packet-switched (e.g., Internet protocol, framerelay, or asynchronous transfer mode) traffic and signaling generation,as well as delivery and reception for networked telecommunication, inaccordance with various radio technologies for disparate markets.Telecommunication is based at least in part on standardized protocolsfor communication determined by a radio technology utilized forcommunication. In addition, telecommunication can exploit variousfrequency bands, or carriers, which include any electromagneticfrequency bands licensed by the service provider network 822 (e.g.,personal communication services, advanced wireless services, generalwireless communications service, and so forth), and any unlicensedfrequency bands currently available for telecommunication (e.g., the 2.4GHz industrial, medical and scientific band or one or more of the 5 GHzset of bands). In addition, mobile network platform(s) 814 can controland manage base stations 808, 810, and 812 and radio component(s)associated thereof, in disparate macro cells 802, 804, and 806 by wayof, for example, a wireless network management component (e.g., radionetwork controller(s), cellular gateway node(s), etc.). Moreover,wireless network platform(s) can integrate disparate networks (e.g.,Wi-Fi network(s), femto cell network(s), broadband network(s), servicenetwork(s), enterprise network(s), and so on). In cellular wirelesstechnologies (e.g., third generation partnership project universalmobile telecommunication system, global system for mobile communication,mobile network platform 814 can be embodied in the service providernetwork 822.

In addition, wireless backhaul link(s) 824 can include wired linkcomponents such as T1/E1 phone line; T3/DS3 line, a digital subscriberline either synchronous or asynchronous; an asymmetric digitalsubscriber line; an optical fiber backbone; a coaxial cable, etc.; andwireless link components such as line-of-sight or non-line-of-sightlinks which can include terrestrial air-interfaces or deep space links(e.g., satellite communication links for navigation). In an aspect, foruniversal mobile telecommunication system-based networks, wirelessbackhaul link(s) 824 embodies IuB interface.

It is noted that while exemplary wireless environment 800 is illustratedfor macro cells and macro base stations, aspects, features andadvantages of the disclosed subject matter can be implemented in microcells, pico cells, femto cells, or the like, wherein base stations areembodied in home-based equipment related to access to a network.

To provide further context for various aspects of the disclosed subjectmatter, FIG. 9 illustrates a block diagram of an embodiment of accessequipment and/or software 900 related to access of a network (e.g., basestation, wireless access point, femto cell access point, and so forth)that can enable and/or exploit features or aspects of the disclosedaspects.

Access equipment and/or software 900 related to access of a network canreceive and transmit signal(s) from and to wireless devices, wirelessports, wireless routers, etc. through segments 902 ₁-902 _(B) (B is apositive integer). Segments 902 ₁-902 _(a) can be internal and/orexternal to access equipment and/or software 900 related to access of anetwork, and can be controlled by a monitor component 904 and an antennacomponent 906. Monitor component 904 and antenna component 906 cancouple to communication platform 908, which can include electroniccomponents and associated circuitry that provide for processing andmanipulation of received signal(s) and other signal(s) to betransmitted.

In an aspect, communication platform 908 includes a receiver/transmitter910 that can convert analog signals to digital signals upon reception ofthe analog signals, and can convert digital signals to analog signalsupon transmission. In addition, receiver/transmitter 910 can divide asingle data stream into multiple, parallel data streams, or perform thereciprocal operation. Coupled to receiver/transmitter 910 can be amultiplexer/demultiplexer 912 that can facilitate manipulation ofsignals in time and frequency space. Multiplexer/demultiplexer 912 canmultiplex information (data/traffic and control/signaling) according tovarious multiplexing schemes such as time division multiplexing,frequency division multiplexing, orthogonal frequency divisionmultiplexing, code division multiplexing, space division multiplexing.In addition, multiplexer/demultiplexer component 912 can scramble andspread information (e.g., codes, according to substantially any codeknown in the art, such as Hadamard-Walsh codes, Baker codes, Kasamicodes, polyphase codes, and so forth).

A modulator/demodulator 914 is also a part of communication platform908, and can modulate information according to multiple modulationtechniques, such as frequency modulation, amplitude modulation (e.g.,M-ary quadrature amplitude modulation, with M a positive integer);phase-shift keying; and so forth). Access equipment and/or software 900related to access of a network also includes a processor 916 configuredto confer, at least in part, functionality to substantially anyelectronic component in access equipment and/or software 900. Inparticular, processor 916 can facilitate configuration of accessequipment and/or software 900 through, for example, monitor component904, antenna component 906, and one or more components therein.Additionally, access equipment and/or software 900 can include displayinterface 918, which can display functions that control functionality ofaccess equipment and/or software 900, or reveal operation conditionsthereof. In addition, display interface 918 can include a screen toconvey information to an end user. In an aspect, display interface 918can be a liquid crystal display, a plasma panel, a monolithic thin-filmbased electrochromic display, and so on. Moreover, display interface 918can include a component (e.g., speaker) that facilitates communicationof aural indicia, which can also be employed in connection with messagesthat convey operational instructions to an end user. Display interface918 can also facilitate data entry (e.g., through a linked keypad orthrough touch gestures), which can cause access equipment and/orsoftware 900 to receive external commands (e.g., restart operation).

Broadband network interface 920 facilitates connection of accessequipment and/or software 900 to a service provider network (not shown)that can include one or more cellular technologies (e.g., thirdgeneration partnership project universal mobile telecommunicationsystem, global system for mobile communication, and so on) throughbackhaul link(s) (not shown), which enable incoming and outgoing dataflow. Broadband network interface 920 can be internal or external toaccess equipment and/or software 900, and can utilize display interface918 for end-user interaction and status information delivery.

Processor 916 can be functionally connected to communication platform908 and can facilitate operations on data (e.g., symbols, bits, orchips) for multiplexing/demultiplexing, such as effecting direct andinverse fast Fourier transforms, selection of modulation rates,selection of data packet formats, inter-packet times, and so on.Moreover, processor 916 can be functionally connected, through data,system, or an address bus 922, to display interface 918 and broadbandnetwork interface 920, to confer, at least in part, functionality toeach of such components.

In access equipment and/or software 900, memory 924 can retain locationand/or coverage area (e.g., macro sector, identifier(s)) access list(s)that authorize access to wireless coverage through access equipmentand/or software 900, sector intelligence that can include ranking ofcoverage areas in the wireless environment of access equipment and/orsoftware 900, radio link quality and strength associated therewith, orthe like. Memory 924 also can store data structures, code instructionsand program modules, system or device information, code sequences forscrambling, spreading and pilot transmission, access pointconfiguration, and so on. Processor 916 can be coupled (e.g., through amemory bus), to memory 924 in order to store and retrieve informationused to operate and/or confer functionality to the components, platform,and interface that reside within access equipment and/or software 900.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or deviceincluding, but not limited to including, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit, a digital signalprocessor, a field programmable gate array, a programmable logiccontroller, a complex programmable logic device, a discrete gate ortransistor logic, discrete hardware components, or any combinationthereof designed to perform the functions and/or processes describedherein. Processors can exploit nano-scale architectures such as, but notlimited to, molecular and quantum-dot based transistors, switches andgates, in order to optimize space usage or enhance performance of mobiledevices. A processor may also be implemented as a combination ofcomputing processing units.

In the subject specification, terms such as “store,” “data store,” datastorage,” “database,” and substantially any other information storagecomponent relevant to operation and functionality of a component and/orprocess, refer to “memory components,” or entities embodied in a“memory,” or components including the memory. It is noted that thememory components described herein can be either volatile memory ornonvolatile memory, or can include both volatile and nonvolatile memory.

By way of illustration, and not limitation, nonvolatile memory, forexample, can be included in memory 924, non-volatile memory (see below),disk storage (see below), and memory storage (see below). Further,nonvolatile memory can be included in read only memory, programmableread only memory, electrically programmable read only memory,electrically erasable programmable read only memory, or flash memory.Volatile memory can include random access memory, which acts as externalcache memory. By way of illustration and not limitation, random accessmemory is available in many forms such as synchronous random accessmemory, dynamic random access memory, synchronous dynamic random accessmemory, double data rate synchronous dynamic random access memory,enhanced synchronous dynamic random access memory, Synchlink dynamicrandom access memory, and direct Rambus random access memory.Additionally, the disclosed memory components of systems or methodsherein are intended to include, without being limited to including,these and any other suitable types of memory.

In order to provide a context for the various aspects of the disclosedsubject matter, FIG. 10, and the following discussion, are intended toprovide a brief, general description of a suitable environment in whichthe various aspects of the disclosed subject matter can be implemented.While the subject matter has been described above in the general contextof computer-executable instructions of a computer program that runs on acomputer and/or computers, those skilled in the art will recognize thatthe various aspects also can be implemented in combination with otherprogram modules. Generally, program modules include routines, programs,components, data structures, etc. that perform particular tasks and/orimplement particular abstract data types. For example, in memory (suchas at least one memory 202) there can be software, which can instruct aprocessor (such as at least one processor 204) to perform variousactions. The processor can be configured to execute the instructions inorder to implement the analysis of monitoring an uplink power level,detecting the uplink power level is at or above a threshold level,and/or disable transmission of at least one message as a result of themonitored uplink power level.

Moreover, those skilled in the art will understand that the variousaspects can be practiced with other computer system configurations,including single-processor or multiprocessor computer systems,mini-computing devices, mainframe computers, as well as personalcomputers, base stations hand-held computing devices or user equipment,such as a tablet, phone, watch, and so forth, processor-basedcomputers/systems, microprocessor-based or programmable consumer orindustrial electronics, and the like. The illustrated aspects can alsobe practiced in distributed computing environments where tasks areperformed by remote processing devices that are linked through acommunications network; however, some if not all aspects of the subjectdisclosure can be practiced on stand-alone computers. In a distributedcomputing environment, program modules can be located in both local andremote memory storage devices.

With reference to FIG. 10, a block diagram of a computing system 1000operable to execute the disclosed systems and methods is illustrated, inaccordance with an embodiment. Computer 1002 includes a processing unit1004, a system memory 1006, and a system bus 1008. System bus 1008couples system components including, but not limited to, system memory1006 to processing unit 1004. Processing unit 1004 can be any of variousavailable processors. Dual microprocessors and other multiprocessorarchitectures also can be employed as processing unit 1004.

System bus 1008 can be any of several types of bus structure(s)including a memory bus or a memory controller, a peripheral bus or anexternal bus, and/or a local bus using any variety of available busarchitectures including, but not limited to, industrial standardarchitecture, micro-channel architecture, extended industrial standardarchitecture, intelligent drive electronics, video electronics standardsassociation local bus, peripheral component interconnect, card bus,universal serial bus, advanced graphics port, personal computer memorycard international association bus, Firewire (institute of electricaland electronics engineers 1194), and small computer systems interface.

System memory 1006 includes volatile memory 1010 and nonvolatile memory1012. A basic input/output system, containing routines to transferinformation between elements within computer 1002, such as duringstart-up, can be stored in nonvolatile memory 1012. By way ofillustration, and not limitation, nonvolatile memory 1012 can includeread only memory, programmable read only memory, electricallyprogrammable read only memory, electrically erasable programmable readonly memory, or flash memory. Volatile memory 1010 can include randomaccess memory, which acts as external cache memory. By way ofillustration and not limitation, random access memory is available inmany forms such as dynamic random access memory, synchronous randomaccess memory, synchronous dynamic random access memory, double datarate synchronous dynamic random access memory, enhanced synchronousdynamic random access memory, Synchlink dynamic random access memory,and direct Rambus random access memory, direct Rambus dynamic randomaccess memory, and Rambus dynamic random access memory.

Computer 1002 also includes removable/non-removable,volatile/non-volatile computer storage media. In an implementation,provided is a non-transitory or tangible computer-readable storagedevice storing executable instructions that, in response to execution,cause a system comprising a processor to perform operations. Theoperations can include analyzing respective load conditions andrespective coverage areas of a first set of devices of a first networkand a second set of devices of a second network, a mobility state of amobile device, a first signal strength associated with the first set ofdevices, and a second signal strength associated with the second set ofdevices. The mobility state is a function of patter data representing amovement pattern of the mobile device and speed data representing thespeed at which the mobile device is being moved. The operations can alsoinclude routing network traffic of the mobile device to a set of networkdevices selected from the first set of devices and the second set ofdevices, as a result of the analyzing.

According to an implementation, the routing comprises reducing a numberof signaling messages sent by the system. Further to thisimplementation, the first set of devices are micro cell enabled devicesand the second set of devices are macro cell enabled devices, andreducing the number of signaling messages sent comprises bypassing thefirst set of devices, and the routing comprises routing the mobiledevice to the second set of devices.

FIG. 10 illustrates, for example, disk storage 1014. Disk storage 1014includes, but is not limited to, devices such as a magnetic disk drive,floppy disk drive, tape drive, external or internal removable storagedrives, superdisk drive, flash memory card, or memory stick. Inaddition, disk storage 1014 can include storage media separately or incombination with other storage media including, but not limited to, anoptical disk drive such as a compact disk read only memory device,compact disk recordable drive, compact disk rewritable drive or adigital versatile disk read only memory drive. To facilitate connectionof the disk storage 1014 to system bus 1008, a removable ornon-removable interface is typically used, such as interface component1016.

It is to be noted that FIG. 10 describes software that acts as anintermediary between users and computer resources described in suitableoperating environment. Such software includes an operating system 1018.Operating system 1018, which can be stored on disk storage 1014, acts tocontrol and allocate resources of computer system 1002. Systemapplications 1020 can take advantage of the management of resources byoperating system 1018 through program modules 1022 and program data 1024stored either in system memory 1006 or on disk storage 1014. It is to beunderstood that the disclosed subject matter can be implemented withvarious operating systems or combinations of operating systems.

A user can enter commands or information, for example through interfacecomponent 1016, into computer system 1002 through input device(s) 1026.Input devices 1026 include, but are not limited to, a pointing devicesuch as a mouse, trackball, stylus, touch pad, keyboard, microphone,joystick, game pad, satellite dish, scanner, TV tuner card, digitalcamera, digital video camera, web camera, and the like. These and otherinput devices connect to processing unit 1004 through system bus 1008through interface port(s) 1028. Interface port(s) 1028 include, forexample, a serial port, a parallel port, a game port, and a universalserial bus. Output device(s) 1030 use some of the same type of ports asinput device(s) 1026.

Thus, for example, a universal serial bus port can be used to provideinput to computer 1002 and to output information from computer 1002 toan output device 1030. Output adapter 1032 is provided to illustratethat there are some output devices 1030, such as monitors, speakers, andprinters, among other output devices 1030, which use special adapters.Output adapters 1032 include, by way of illustration and not limitation,video and sound cards that provide means of connection between outputdevice 1030 and system bus 1008. It is also noted that other devicesand/or systems of devices provide both input and output capabilitiessuch as remote computer(s) 1034.

Computer 1002 can operate in a networked environment using logicalconnections to one or more remote computers, such as remote computer(s)1034. Remote computer(s) 1034 can be a personal computer, a server, arouter, a network computer, a workstation, a microprocessor basedappliance, a peer device, or other common network node and the like, andtypically includes many or all of the elements described relative tocomputer 1002.

For purposes of brevity, only one memory storage device 1036 isillustrated with remote computer(s) 1034. Remote computer(s) 1034 islogically connected to computer 1002 through a network interface 1038and then physically connected through communication connection 1040.Network interface 1038 encompasses wire and/or wireless communicationnetworks such as local area networks and wide area networks. Local areanetwork technologies include fiber distributed data interface, copperdistributed data interface, Ethernet, token ring and the like. Wide areanetwork technologies include, but are not limited to, point-to-pointlinks, circuit switching networks, such as integrated services digitalnetworks and variations thereon, packet switching networks, and digitalsubscriber lines.

Communication connection(s) 1040 refer(s) to hardware/software employedto connect network interface 1038 to system bus 1008. Whilecommunication connection 1040 is shown for illustrative clarity insidecomputer 1002, it can also be external to computer 1002. Thehardware/software for connection to network interface 1038 can include,for example, internal and external technologies such as modems,including regular telephone grade modems, cable modems and DSL modems,ISDN adapters, and Ethernet cards.

It is to be noted that aspects, features, or advantages of the aspectsdescribed in the subject specification can be exploited in substantiallyany communication technology. For example, 4G technologies, Wi-Fi,worldwide interoperability for microwave access, Enhanced gatewaygeneral packet radio service, third generation partnership project longterm evolution, third generation partnership project 2 ultra mobilebroadband, third generation partnership project universal mobiletelecommunication system, high speed packet access, high-speed downlinkpacket access, high-speed uplink packet access, global system for mobilecommunication edge radio access network, universal mobiletelecommunication system terrestrial radio access network, long termevolution advanced. Additionally, substantially all aspects disclosedherein can be exploited in legacy telecommunication technologies; e.g.,global system for mobile communication. In addition, mobile as wellnon-mobile networks (e.g., Internet, data service network such asInternet protocol television) can exploit aspect or features describedherein.

Various aspects or features described herein can be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques. In addition, various aspects disclosed inthe subject specification can also be implemented through programmodules stored in a memory and executed by a processor, or othercombination of hardware and software, or hardware and firmware.

Other combinations of hardware and software or hardware and firmware canenable or implement aspects described herein, including the disclosedmethod(s). The term “article of manufacture” as used herein is intendedto encompass a computer program accessible from any computer-readabledevice, carrier, or media. For example, computer readable media caninclude but are not limited to magnetic storage devices (e.g., harddisk, floppy disk, magnetic strips . . . ), optical discs (e.g., compactdisc, digital versatile disc, blu-ray disc . . . ), smart cards, andflash memory devices (e.g., card, stick, key drive . . . ).

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, random access memory, read only memory,electrically erasable programmable read only memory, flash memory orother memory technology, compact disk read only memory, digitalversatile disk or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or other tangible and/or non-transitory media which can be used to storedesired information. Computer-readable storage media can be accessed byone or more local or remote computing devices, e.g., via accessrequests, queries or other data retrieval protocols, for a variety ofoperations with respect to the information stored by the medium.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

What has been described above includes examples of systems and methodsthat provide advantages of the one or more aspects. It is, of course,not possible to describe every conceivable combination of components ormethods for purposes of describing the aspects, but one of ordinaryskill in the art may recognize that many further combinations andpermutations of the claimed subject matter are possible. Furthermore, tothe extent that the terms “includes,” “has,” “possesses,” and the likeare used in the detailed description, claims, appendices and drawingssuch terms are intended to be inclusive in a manner similar to the term“comprising” as “comprising” is interpreted when employed as atransitional word in a claim.

As used in this application, the terms “component,” “system,” and thelike are intended to refer to a computer-related entity or an entityrelated to an operational apparatus with one or more specificfunctionalities, wherein the entity can be either hardware, acombination of hardware and software, software, or software inexecution. As an example, a component may be, but is not limited tobeing, a process running on a processor, a processor, an object, anexecutable, a thread of execution, computer-executable instructions, aprogram, and/or a computer. By way of illustration, both an applicationrunning on a server or network controller, and the server or networkcontroller can be a component. One or more components may reside withina process and/or thread of execution and a component may be localized onone computer and/or distributed between two or more computers. Also,these components can execute from various computer readable media havingvarious data structures stored thereon. The components may communicatevia local and/or remote processes such as in accordance with a signalhaving one or more data packets (e.g., data from one componentinteracting with another component in a local system, distributedsystem, and/or across a network such as the Internet with other systemsvia the signal). As another example, a component can be an apparatuswith specific functionality provided by mechanical parts operated byelectric or electronic circuitry, which is operated by a software, orfirmware application executed by a processor, wherein the processor canbe internal or external to the apparatus and executes at least a part ofthe software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can include a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components. As further yet another example, interface(s) caninclude input/output components as well as associated processor,application, or application programming interface components.

The term “set”, “subset”, or the like as employed herein excludes theempty set (e.g., the set with no elements therein). Thus, a “set”,“subset”, or the like includes one or more elements or periods, forexample. As an illustration, a set of periods includes one or moreperiods; a set of transmissions includes one or more transmissions; aset of resources includes one or more resources; a set of messagesincludes one or more messages, and so forth.

In addition, the term “or” is intended to mean an inclusive “or” ratherthan an exclusive “or.” That is, unless specified otherwise, or clearfrom context, “X employs A or B” is intended to mean any of the naturalinclusive permutations. That is, if X employs A; X employs B; or Xemploys both A and B, then “X employs A or B” is satisfied under any ofthe foregoing instances. Moreover, articles “a” and “an” as used in thesubject specification and annexed drawings should generally be construedto mean “one or more” unless specified otherwise or clear from contextto be directed to a singular form.

What is claimed is:
 1. A method, comprising: analyzing, by a systemcomprising a processor, respective load conditions and respectivecoverage areas of a first set of devices of a first network and a secondset of devices of a second network, a mobility state of a mobile device,a first signal strength associated with the first set of devices, and asecond signal strength associated with the second set of devices,wherein the mobility state is a function of a movement pattern of themobile device and a speed at which the mobile device is determined to bemoving; and routing, by the system, network traffic of the mobile deviceto a set of network devices selected from the first set of devices andthe second set of devices, as a result of the analyzing.
 2. The methodof claim 1, wherein the routing comprises reducing a number of signalingmessages sent by the system.
 3. The method of claim 2, wherein the firstset of devices are micro cell enabled devices and the second set ofdevices are macro cell enabled devices, the reducing the number ofsignaling messages sent comprises bypassing the first set of devices,and the routing comprises routing the mobile device to the second set ofdevices.
 4. The method of claim 3, wherein a network traffic coveragearea of the second set of devices at least partially overlaps anothernetwork traffic coverage area of the first set of devices.
 5. The methodof claim 1, wherein the mobility state, the first signal strength, andthe second signal strength are represented in measurement report datareceived from the mobile device.
 6. The method of claim 1, furthercomprising: determining the speed satisfies a first speed levelcondition; and choosing a micro cell device as a potential target cellto route the network traffic of the mobile device.
 7. The method ofclaim 6, further comprising: determining the speed satisfies a secondspeed level condition; bypassing the micro cell device as the potentialtarget cell to route the network traffic of the mobile device; andchoosing a metro cell device as the potential target cell to route thenetwork traffic of the mobile device.
 8. The method of claim 1, furthercomprising: analyzing, by the system, a signal strength of the first setof devices; and disregarding the first set of devices in response to thesignal strength being determined to be below a predefined level.
 9. Thesystem of claim 1, further comprising receiving respective cell-typeinformation from the first set of devices and the second set of devices,wherein a first cell-type of the first set of devices is different froma second cell-type of the second set of devices.
 10. A system,comprising: a memory device to store executable instructions; and aprocessor device, coupled to the memory device, that facilitatesexecution of the executable instructions to perform operations,comprising: comparing respective load conditions and respective coverageareas of a first set of devices of a first network and a second set ofdevices of a second network, a mobility state of a mobile device, afirst signal strength associated with the first set of devices, and asecond signal strength associated with the second set of devices,wherein the mobility state is a function of a movement pattern of themobile device and a speed at which the mobile device is determined to bemoving; and based on the comparing, routing network traffic of themobile device to a set of network devices selected from the first set ofdevices and the second set of devices.
 11. The system of claim 10,wherein the operations further comprise receiving respective cell-typeinformation from the first set of devices and the second set of devices,wherein a first cell-type of the first set of devices is different froma second cell-type of the second set of devices.
 12. The system of claim10, wherein the operations further comprise: determining the speedsatisfies a first speed level condition; and choosing a micro celldevice as a potential target cell to route the network traffic.
 13. Thesystem of claim 12, wherein the operations further comprise: determiningthe speed satisfies a second speed level condition; bypassing the microcell device as the potential target cell to route the network traffic;and choosing a metro cell device as the potential target cell to routethe network traffic.
 14. The system of claim 10, wherein the routingcomprises sending signaling messages to the set of network devices tofacilitate the routing.
 15. The system of claim 14, wherein the firstset of devices are macro cell enabled devices and the second set ofdevices are micro cell enabled devices, the sending the signalingmessages comprising reducing a number of signaling messages sent by thesystem comprising bypassing the first set of devices, and the routingcomprises routing the mobile device to the second set of devices. 16.The system of claim 10, wherein the mobility state, the first signalstrength, and the second signal strength are represented in measurementreport data received from the mobile device.
 17. A computer-readablestorage device storing executable instructions that, in response toexecution, cause a system comprising a processor to perform operations,comprising: analyzing respective load conditions and respective coverageareas of a first set of devices of a first network and a second set ofdevices of a second network, a mobility state of a mobile device, afirst signal strength associated with the first set of devices, and asecond signal strength associated with the second set of devices, themobility state is a function of pattern data representing a movementpattern of the mobile device and speed data representing the speed atwhich the mobile device is being moved; and routing network traffic ofthe mobile device to a set of network devices selected from the firstset of devices and the second set of devices, as a result of theanalyzing.
 18. The computer-readable storage device of claim 17, whereinthe routing comprises sending signaling messages to the set of networkdevices to facilitate the routing.
 19. The computer-readable storagedevice of claim 18, wherein the first set of devices are micro cellenabled devices and the second set of devices are macro cell enableddevices, the sending the signaling messages comprises reducing a numberof signaling messages sent by the system comprising bypassing the firstset of devices, and the routing comprises routing the mobile device tothe second set of devices.
 20. The computer-readable storage device ofclaim 17, wherein the mobility state, the first signal strength, and thesecond signal strength are represented in measurement report datareceived from the mobile device.