Scaling content communicated over a network

ABSTRACT

An architecture is provided that can scale content resolution in order to mitigate errors in a provisioned service of a communication network, such as a wireless service or a femtocell service that integrates with DSL or other broadband carriers. The architecture can identify fault conditions relating to e.g., bandwidth oversubscription or symbolization integrity. Based upon such identification, the architecture can alter encoding format codecs of certain types of content in order to reduce their resolution/quality, thereby mitigating bandwidth oversubscription fault conditions or freeing up space (without necessarily increasing bandwidth) to insert additional FEC code.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of, and claims priority to each of,U.S. patent application Ser. No. 14/938,168 (now U.S. Pat. No.9,609,038), filed on Nov. 11, 2015, entitled “SCALING CONTENTCOMMUNICATED OVER A NETWORK,” which is a continuation of U.S. patentapplication Ser. No. 13/768,096 (now U.S. Pat. No. 9,215,132), filed onFeb. 15, 2013, entitled “SCALING CONTENT COMMUNICATED OVER A NETWORK,”which is a continuation of U.S. patent application Ser. No. 12/823,202(now U.S. Pat. No. 8,406,134), filed on Jun. 25, 2010, entitled “SCALINGCONTENT COMMUNICATED OVER A NETWORK.” The entireties of the above notedapplications are incorporated herein by reference.

BACKGROUND

With advances in computational power continually increasing for handhelddevices or other mobile devices, new applications are eventuallyexpected to arise that can further stress the various networks ofconventional wireless communications systems as well as theirfemtocell/broadband counterpart. For example, handheld video phones thatcan support video calls/conferencing and/or video text messages mightsoon become a reality. However, voice data alone can be often observedto create a good deal of stress for conventional service providers, sothe addition of video will only exacerbate the issue of handling voicedata today. Moreover, integration with broadband infrastructure via,e.g., femtocells or home nodeB (HNB) devices can be affected as well,which already handle other network traffic relating to the underlyingbroadband (e.g., digital subscriber line (DSL)) service.

Accordingly, both current and future demand placed on communicationsnetwork infrastructure can be improved, which can be useful to bothnetwork providers and service subscribers.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a system that can scale content resolutionto mitigate errors in a provisioned service of a communication network.

FIG. 2 depicts a block diagram of a system that illustrates variousexample gateway types for network communication.

FIG. 3 illustrates a block diagram of a system that can generate varioustypes of alarms in connection with service degradation.

FIG. 4 is a block diagram of a system that facilitates a reduction inresolution of content based upon a variety of scaling factors.

FIG. 5 depicts a block diagram of a system with an integrated scalingcomponent that can scale content resolution to mitigate errors in aprovisioned service of a communication network.

FIG. 6 illustrates a block diagram of a system that can perform or aidwith various determinations or inferences.

FIG. 7 is an exemplary flow chart of procedures that define a method foralleviating errors in a provisioned service of a communication networkby scaling content resolution.

FIG. 8 depicts an exemplary flow chart of procedures defining a methodfor configuring suitable gateways and/or defining fault conditions inconnection with scaling factors.

FIG. 9 provides an exemplary flow chart of procedures defining a methodfor providing addition features or aspects in connection withalleviating errors in a provisioned service of a communication networkby scaling content resolution.

FIG. 10 illustrates an example wireless communication environment withassociated components that can enable operation of an enterprise networkin accordance with aspects described herein.

FIG. 11 illustrates a schematic deployment of a macro cell for wirelesscoverage in accordance with aspects of the subject specification.

FIG. 12 illustrates a block diagram of a computer operable to execute aportion of the disclosed architecture.

DETAILED DESCRIPTION

The subject matter disclosed herein, in one aspect thereof, comprises anarchitecture that can scale content resolution to mitigate errorconditions in a provisioned service of a communication network. Inaccordance therewith and to other related ends, the architecture caninclude a fault management component that can monitor network trafficthrough a gateway, and that can further issue an alarm based upondetection of a predetermined fault condition associated with adegradation of service. The degradation of service can relate to, e.g.,bandwidth oversubscription, symbolization integrity (e.g., damaged bitsor signals) or the like. Thus, the predetermined fault conditions can beassociated with early detection of such indicators of servicedegradation.

In addition, the architecture can include a scaling component that canreduce a resolution (e.g., apply a codec of lesser bitrate, buttypically of the same encoding format) associated with contentcommunicated through the gateway. The resolution can be reduced by ascaling factor that can be determined based upon the type of the alarmissued by the fault management component or based upon other dataincluded therein. By reducing the resolution of certain contenttransitioning the gateway, bandwidth oversubscription can be mitigated.Moreover, in the case of symbolization integrity, this additionalbandwidth can be utilized to insert additional forward error correction(FEC) code, which can operate to alleviate logical errors withoutsubstantially increasing bandwidth in the process (e.g., FEC code addedto content with reduced resolution can still require less bandwidth topropagate than the original resolution content).

The disclosed subject matter is now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the disclosed subject matter. It may beevident, however, that the disclosed subject matter may be practicedwithout these specific details. In other instances, well-knownstructures and devices are shown in block diagram form in order tofacilitate describing the disclosed subject matter.

Referring now to the drawings, with reference initially to FIG. 1,system 100 that can scale content resolution to mitigate errors in aprovisioned service of a communication network is depicted. Generally,system 100 can include fault management 102 that can monitor networktraffic 104 through gateway 106. In addition, fault management component102 can further issue alarm 108 based upon detection of a predeterminedfault condition associated with a degradation of service (e.g., adegradation of network traffic 104 through gateway 106 or other networkelements).

Furthermore, system 100 can also include scaling component 110 that canreduce a resolution associated with content 112 communicated throughgateway 106 by scaling factor 114. Content 112 can represent all or aportion of network traffic 104 and will typically be some known type ofencoded media content such as voice, video, images, or the like. Thus,by reducing the resolution at which content 112 will be presented (e.g.,by a recipient device), file size, data streams, error rates, and/orbandwidth associated with the communication of such content 112 can bereduced as well. Put another way, the quality of presented content 112can be sacrificed in order to mitigate various network errors, which isfurther described in connection with FIG. 3, infra. In addition, scalingfactor 114 as well as a scaling order (e.g., the order in which and/ordegree to which various types of media is scaled) can be based uponalarm 108 (e.g., the type or nature of alarm 108 or information includedtherein), which is also further detailed below.

As depicted, in one or more aspect, system 100 (or components includedtherein) can be operatively or communicatively coupled to gateway 106.However, in other implementations, it should be appreciated that all orcertain portions of system 100 can be embedded or included in gateway106. For example, an alternative implementation is presented withreference to FIG. 5, infra.

In one or more aspect, gateway 106 can be at least one of a wirelessgateway, a digital subscriber line (DSL) gateway, or an integrated mediagateway, which is further discussed with reference to FIG. 2. Whilestill referencing FIG. 1, but turning now as well to FIG. 2, system 200that illustrates various example gateway types for network communicationis provided. As introduced above, examples of gateway 106 can be, e.g.,wireless gateway 202, integrated media gateway 204, DSL gateway 206 orthe like. As depicted, mobile device 208, such as a cellular phone,personal digital assistant (PDA), tablet, etc. can communicate witheither base station 210 (e.g., when roaming outdoors) or femtocell 212(e.g., while indoors, such as a home, office, or other public or privatesite).

Network traffic 104 (e.g., including voice or video content 112)transmitted from mobile device 208 can be received by base station 210and forwarded along to wireless gateway 202 before propagating furtherinto an existing circuit switching network domain or the like. Likewise,network traffic 104 transmitted from mobile device 208 to femtocell 212can be passed to router 214 (or another suitable component) on to DSLgateway 206 before propagating further into an existing Internetprotocol (IP) multimedia subsystem (IMS) network domain. In one or moreaspects, integrated media gateway 204 can support both time-divisionmultiplexing (TDM) protocol signaling and IP signaling. Hence,integrated media gateway 204 can potentially handle network traffic 104to/from base station 210 or femtocell 212.

As another example, network traffic 104 can originate from wirelessdevice 216 (e.g., a laptop, game console, or other appliance or device)or wired device 218 (e.g., a personal computer, television, set top,media player, or other appliance or device). As depicted, both wirelessdevice 216 and wired device 218 can be physically connected to router214 (e.g., physical ethernet, cable, serial lines . . . ), whilewireless device 216 can also communicate with wireless router 214 by wayof WI-FI or another wireless protocol. Regardless of the source ordestination of network traffic 104, upon entering (or just prior toentering) gateway 106, whether implemented as wireless gateway 202,integrated media gateway 204, DSL gateway 206 or another suitable typeof gateway 106, network traffic 104 can be monitored, and content 112included therein potentially modified, as detailed herein.

Still referring to FIG. 1, but turning now also to FIG. 3, system 300that can generate various types of alarms in connection with servicedegradation is illustrated. System 300 can include fault management 102,which as detailed supra, can monitor network traffic 104 through gateway106, and that can further issue alarm 108 based upon detection of apredetermined fault condition associated with a degradation of service.It should then be appreciated that various types of fault conditions canarise that can potentially depredate service. Consequently, detection ofthe various fault conditions as well as potential solutions can alsovary. Accordingly, one or more types of alarm 108 can be constructed foreach type of fault condition.

For instance, FIG. 3 provides two types of example fault conditions, oneof excess bandwidth 304 and another of excess (logical) errors 304.Likewise, FIG. 3 also depicts two associated alarms, 306, and 308.However, it should be appreciated that the illustrated examples areintended to provide concrete illustrations, and are not necessarilyintended as limitations. Thus, many other types of fault conditions canexist, and each fault condition can lead to more than one type of alarm108 (e.g., different types of alarms for the same fault condition basedupon severity of the fault condition, frequency of the fault condition,time of day, broader network or other resource utilization . . . ).

In one or more aspect, fault management component 102 can issuebandwidth alarm 306 based upon detection of a condition in which networktraffic 104 through gateway 106 exceeds a predetermined maximumbandwidth allocation (e.g., excess bandwidth 302 fault condition). Thepredetermined maximum bandwidth allocation can be based upon physicallimitations of network infrastructure or based upon a service provision,which is further discussed infra. Moreover, typically, the predeterminedmaximum bandwidth allocation will relate to upstream traffic, since theupstream typically represents networking bottlenecks, however, such neednot always be the case. For example, if excess bandwidth 302 faultcondition is detected on the downstream pipe, bandwidth alarm 306 canoperate in various ways.

For example, consider the case in which the underlying communicationnetwork is providing a three-way video call between three subscribers,user A, user B, and user C, each operating a video-enabled mobile device208. Suppose further that user A is also simultaneously surfing the weband/or texting while joining in on the video call. Consider now, threedifferent scenarios. In the first case, fault management 102 detectsexcess bandwidth 302 on the upstream for user A. As a result, gateway106 (e.g., wireless gateway 202 or integrated media gateway 204) canreceive, either directly or indirectly, bandwidth alarm 306, which canfacilitate various fault condition mitigation activities related toreducing resolution and further discussed herein. In the second case,fault management 102 detects excess bandwidth 302 on the downstream foruser A. As a result, gateway 106 can receive bandwidth alarm 306 andsuitable remedial measures taken in response.

However, now consider the third case, which is substantially identicalto the second case. Yet, here, rather than delivering bandwidth alarm306 only to gateway 106 associated with user A, bandwidth alarm 306 canbe additionally or alternatively delivered to gateway(s) 106 associatedwith user B and/or user C. Obviously, some pitfalls or trade-offs existfor this third scenario. For example, such might only be considered whenall three users employ the same carrier and/or service provider.Moreover, even though in this case user A is realizing a downstreambottleneck, users B and C might be capable of handling the currentbandwidth constraints without issue. Thus, scaling content 112 canrealize a lower resolution presented to all users, even though only userA requires the lower resolution to remain within bandwidth subscriptionmeasures. The trade-off of this approach, however, is that such canreduce overall network congestion by applying scaling closer to thesource than to the destination that is exhibiting the potential faultcondition.

Regardless, in one or more aspect, fault management 102 can issue erroralarm 308 based upon detection of a fault condition in which networktraffic 104 through gateway 106 includes logical errors in excess of apredetermined maximum error rate threshold (e.g., excess errors 304fault condition). In other words, distinct from a fault condition due tobandwidth oversubscription, a different fault condition resulting fromdamaged bits can exist. However, in both cases degradation of servicecan occur if the underlying fault condition is not remedied. Moreover,these alarms 306, 308 can include various other information relating tonetwork traffic 104 and/or content 112.

Continuing the discussion of FIG. 1, scaling component 110 can receivealarm 108 (which can be constructed as bandwidth alarm 306, error alarm308, or other alarm types). As noted previously, scaling component 110can apply (or transmit an instruction to apply) scaling factor 114 tocontent 112 based upon a type of alarm 108 received as well as otherinformation included in alarm 108 and potentially further based uponinformation obtained or received elsewhere. As discussed, this scalingfactor 114 can be employed to reduce a resolution of all or portions ofcontent 112 included in network traffic 104. By reducing the resolutionof content 112, the amount of (encoded) information describing apresentation of content 112 can be reduced. Accordingly, thepresentation of content 112 will likely be of a lower quality, but theamount of bandwidth required to propagate content 112 through gateway106 (as well as the remainder of the communications network) can bereduced as well.

Hence, in the case of a fault condition relating to excess bandwidth302, a reduction in the caliber of content 112 (e.g., encoded media) canbe a viable or desirable tradeoff. For instance, by lowering thebandwidth necessary to propagate content 112, the excess bandwidth 302fault condition can be mitigated. Thus, lower quality of encoded mediacan be preferred over some type of network failure resulting in adropped call, loss of service, or other potential issues deemed moresevere than maintaining the original or a particular resolution duringpresentation (e.g., output of audio or video) of the underlying content112.

On the other hand, in the case of a fault condition relating to excesserrors 304, bandwidth through gateway 106 is not necessarily an issue.Rather, an ability to interpret the information included in content 112can be endangered due to too many logical errors. In this case, scalingcomponent 110 can further introduce forward error correction (FEC) code116 into content 112 communicated through gateway 106. Thus, the savingswith respect to bandwidth achieved by reducing the resolution of content112 can be viewed as surplus that can be used for additional FEC code116. Put another way, reducing the data size of content 112 allows FECcode 116 to be inserted into content 112 without increasing that sizeover its original dimensions. Thus, FEC code 116 can be inserted towithout effecting bandwidth constraints.

In accordance with the above, it should therefore be appreciated thatscaling component 110 can determine scaling factor 114 based upon acomparison of current network traffic with at least one of apredetermined maximum bandwidth allocation or a predetermined maximumerror rate threshold. Put another way, a value of the scaling factor 114can be based upon current network traffic as well as based upon otherinformation included in alarm 108 or from other suitable sources.

As another example, scaling component 110 can determine scaling factor114 further based upon a type of content 112 communicated throughgateway 106. Typically, the type of content will relate to at least oneof voice content or video content, but it should be appreciated that thetype can relate to a protocol employed, or an encoding scheme employedor the like. Regardless, scaling component 110 can determine, e.g., toscale down video content, but leave voice content undisturbed, which isfurther discussed in connection with FIG. 4. Furthermore, as stillanother example, scaling component 110 can determine scaling factor 114further based upon a service provision agreement or based uponpreferences determined by a network carrier or subscriber, which alongwith additional description in connection with provision of image 118,is also further detailed with reference to FIG. 4.

While still reviewing FIG. 1, but referring now also to FIG. 4, system400 that can facilitate a reduction in resolution of content based upona variety of scaling factors is depicted. System 400 can include scalingcomponent 110 as substantially described supra that can reduce contentresolution according to one of several scaling factors 114. By way ofexample, but not necessarily limitation, scaling factor 114 can be halfrate encoding 402, quarter rate encoding 404, high FEC thumbnail 406, apreselected still image 118, or similar. Typically, half rate encoding402 and quarter rate encoding 404 can be applied to both voice and videocontent, and the encoding rate as well as the encoding format can beselected based upon the encoding format of original content 408. Thus,reduced resolution content 410 will often be of a lower resolution andwill typically require less bandwidth to traverse network elements towhatever degree not offset by addition FEC code 116 (if any).

On the other hand, high FEC thumbnail 406 and preselected still image118 will usually relate only to video content. For example, during timesof prominent fault conditions, video content 112 can be reduced to highFEC thumbnail 406, which can mitigate both bandwidth and logical errorfault conditions contemporaneously. In even more extreme conditions,video content 112 can be replaced with preselected still image 118 untilthe fault condition is alleviated. It should be appreciated that whenscaling component 110 employs preselected still image 118 to representvideo-based content (e.g., in the event the resolution is determined tobe reduced below a particular threshold), preselected still image 118need not necessarily relate to the underlying video-based content.Rather, preselected still image 118 can be, e.g., a profile picture ofan associated user, an image indicative of the fault condition selectedby the service provider or the user, or some other suitable graphic orvisual indicia. However, in other instances, preselected still image 118can be a low (or even high) resolution frame extracted from thevideo-based content, and can in some cases be updated periodically.

Given that various types of content (e.g., voice, video, . . . ) areenvisioned to be suitable for scaling, scaling component 110 can, in oneor more aspect, determine a scaling order for disparate types of content112 communicated through gateway 106. For example, scaling component 110can determine that voice content takes priority over video content sothat all or portions or certain types of video content will be scaledbefore scaling any or certain portions of audio content. Additionally oralternatively, scaling component 110 can determine that certain types ofcontent (e.g., video) should be scaled to a certain level (e.g., toquarter rate encoding 404) prior to scaling other types of content(e.g., audio), but thereafter to scale the audio content to a particularlevel before further scaling video content. As examples of how scalingcomponent 110 can make such inferences or determinations, scaling ordercan be based upon a content type priority (e.g., predetermined list ofcontent types with priority rankings) or based upon a content typeproportion (e.g., the proportion of network traffic 104 that isrepresented by a particular type of content).

It should be readily appreciated that the disclosed subject matter canbe conveniently and/or seamlessly integrated into existingcommunications network infrastructure. For example, by leveragingexisting upstream or downstream fault management elements, thereby,e.g., flagging scaling events through SS7 or C7 (common signaling systemnumber 7 protocols employed in connection with public switched telephonenetwork (PSTN), possibly in connection with voice-over-IP (VOIP)). Suchcan effect changes on VOIP residential gateways or DSL accessmultiplexer (DSLAM) as well as wireless GPRS (general packet radioservices), EDGE (enhanced data rates for GSM (global system for mobilecommunication) evolution), or AMR (adaptive multi-rate) audio codec basestations.

Moreover, the disclosed subject matter can apply to substantially anywireless generation standard, such as 2G (GSM or 1×RTT), 3G (UMTS orEV-DO), 3.5G (HSPA) as well as 4G (LTE, which combines GSM and CDMA). Inaddition, WIMAX can be supported as well, such as IEEE 802.16x. As 4GLTE (long term evolution) replaces earlier standards amongcommunications network providers, video calls or video text messageswill become a reality, which various modulation schemes such asquadrature amplitude modulation (QAM) and applications of various turbocodes are intended to handle to some degree. Likewise, in areas in which16QAM or 64QAM has difficulty penetrating walls or existing physicalstructures, femtocells can be employed to extend coverage, e.g., bymerging home or business DSL connectivity with wireless support.Regardless, the widespread appearance of video phones or the like willlikely create bottlenecks in both domains (e.g., both wireless and IPdomains) of connectivity, which can be alleviated by employing thedisclosed subject matter.

Presently, many communications network providers concerned with DSLupstream bottlenecks are converting from IP security (IPsec) to securereal time transport protocol (SRTP). However, regardless of the protocolchosen, the disclosed subject matter can provide additional bandwidth orerror correction opportunities independent of the underlying protocols,and therefore increase the efficiency or feature set of existing networkproviders.

In more detail with regard to scaling, in one or more aspect, scalingcomponent 110 can apply a lesser codec to content 112 in order to reducethe resolution and therefore effect the scaling of resolution. Inparticular, scaling component 110 can apply the lesser codec accordingto standardized codecs associated with at least one of audio or video.For example, while potentially any suitable codec/modulation can beemployed, scaling component 110 will typically select the lesser codecbased upon the existing codec (e.g., the same format, but of lower bitrate), which are generally standardized codecs. For example, forwireless voice, a common scheme is AMR audio codecs, which typically hasabout eight standard bitrates between 12.2 Kbps and 4.75 Kbps. Likewise,while AMR audio codecs are generally used with wireless voice content,VOIP codecs such as G.711, G.726, G.728 and so on are generally employedin connection with VOIP audio. Similarly, video content often employsH.263, H264, MPEG-4, VC1 or the like, any of which can be suitable inconnection with the disclosed subject matter. Tables I.-V. below providereference to certain VOIP audio codecs and various video codecs that canbe leveraged by the disclosed subject matter.

TABLE I H.323 Gateways Codec Information Bandwidth Calculations CodecBit Rate Ethernet Bandwidth G.711 64 Kbps 87.2 Kbps G.726 32 Kbps 55.2Kbps G.726 24 Kbps 47.2 Kbps G.728 16 Kbps 31.5 Kbps G.729  8 Kbps 31.2Kbps G.723.1 6.3 Kbps  21.9 Kbps G.723.1 5.3 Kbps  20.8 Kbps

TABLE II Voice Bandwidth Savings Algorithm Voice Bandwidth CalculationsCodec Paths Eth BW Scale Down From G.711 G.711 4 348.8 NA NA G.726 4220.8 −128 128 G.726 4 188.8 −32 160 G.728 4 126 −62.8 222.8 G.729 4124.8 −1.2 224 G.723.1 4 87.6 −37.2 261.2 G.723.1 4 83.2 −4.4 265.6

TABLE III Video Scales Across Different Formats Codec InformationBandwidth Calculations SQCIF QCIF CIF H263 Low Quality 33 Kbps  64 Kbps 64 Kbps Standard 33 Kbps 128 Kbps 128 Kbps High Quality 33 Kbps 128Kbps 128 Kbps MPEG 4 Low Quality 64 Kbps  64 Kbps  64 Kbps Standard 64Kbps  75 Kbps 128 Kbps High Quality 64 Kbps  75 Kbps 360 Kbps

TABLE IV CIF to QCIF Bandwidth Range QCIF 64 Kbps-128 Kbps SQCIF 33Kbps-64 Kbps  CIF 64 Kbps-360 Kbps

TABLE V Video Conference Call Bandwidth Quality  110-250 Kbps lowerquality  384-500 Kbps average quality 768-1000 Kbps high quality

Of course, as noted above, it should be underscored yet again that othercodecs in addition to those presented here can be suitable for scaling,and can be selected for particular types of content and/or for certainefficiency related thereto.

With reference now to FIG. 5, system 500 with an integrated scalingcomponent that can scale content resolution to mitigate errors in aprovisioned service of a communication network is provided. System 500can include fault management component 102 and scaling component 110 assubstantially described in connection with FIG. 1. Hence, faultmanagement component 102 can monitor network traffic 104 through gateway106 and can further issue alarm 108. Scaling component 110 can receivealarm 108 and apply scaling factor 114 to content 112 included innetwork traffic 104. In addition, scaling component 110 can, whendetermined appropriate, insert FEC code 116 or substitute content 112with a preselected image 118.

One distinction here relative to FIG. 1, is that scaling component 110is expressly depicted as being embedded or included in gateway 106.Likewise, as depicted based upon an overlap of the block elements, allor portions of fault management component 102 can also be embedded orincluded in gateway 106, but can as well reside elsewhere and beoperatively or communicatively coupled thereto. Conventionalcommunications network architectures are likely to maintain a disparatefault management element. Accordingly, in those cases, the disclosedsubject matter can be more readily integrated with these existingarchitectures by leveraging an existing disparate fault managementelement to serve as a basis for or portion of fault management component102, which would then likely be remote from gateway 106, at least inpart. In those cases, fault management component 102 can transmit alarm108 to notification component 502, which can then serve a portion of therole previously described with reference to fault management component102 (e.g., forward alarm 108 to scaling component 110, as depicted).

Now turning to FIG. 6, system 600 that can perform or aid with variousdeterminations or inferences is illustrated. Generally, system 600 caninclude fault management component 102 and scaling component 110 assubstantially described herein. In addition to what has been described,the above-mentioned components can make intelligent determinations orinferences. For example, Bayesian probabilities or confidence measurescan be employed or inferences can be based upon machine learningtechniques related to historical analysis, feedback, and/or previousdeterminations or inferences.

For instance, fault management component 102 can intelligently determineor infer an impending or likely fault condition, possibly prior tonetwork traffic 104 exhibiting characteristics that violate certainpredetermined thresholds. For example, such inferences or determinationscan be made based upon historical usage patterns based upon time of day,day of the week, or early detection or forecasting of incoming oroutgoing network traffic 104 (e.g., loading an application thatgenerally contributes significantly to network traffic 104, etc.). Inaddition, scaling component 110 can intelligently determine or infer anoptimal scaling factor 114, e.g., optimized to very particular bandwidthutilizations and FEC code 116 insertions to obtain maximal throughputfor a given provision of service. As another example, scaling component110 can intelligently determine or infer the scaling order in a similarmanner (e.g., scale video first, but only to a certain level, thenvoice, but only to a particular level, then back to video).

In addition, system 600 can also include intelligence component 602 thatcan provide for or aid in various inferences or determinations. Inparticular, in accordance with or in addition to what has been describedsupra with respect to intelligent determinations or inferences providedby various components described herein, e.g., all or portions of faultmanagement component 102 and scaling component 110. Additionally oralternatively, all or portions of intelligence component 602 can beincluded in one or more components described herein. Thus, intelligencecomponent 602 can reside in whole or in part either within systems 100or 500 or within suitable network components related thereto, dependingupon various implementation details.

Moreover, intelligence component 602 will typically have access to allor portions of data sets described herein, such as data store 604. Asused herein, data store 604 is intended to be a repository of all orportions of data, data sets, or information described herein orotherwise suitable for use with the described subject matter (e.g., userprofiles, service agreements, history, network traffic 104 data eithercurrent or historical, codec versions, etc.). Data store 604 can becentralized, either remotely or locally cached, or distributed,potentially across multiple devices and/or schemas. Furthermore, datastore 604 can be embodied as substantially any type of memory, includingbut not limited to volatile or non-volatile, sequential access,structured access, or random access and so on. It should be understoodthat all or portions of data store 604 can be included in systems 100 or500, or can reside in part or entirely remotely from systems 100 or 500.

Accordingly, in order to provide for or aid in the numerous inferencesdescribed herein, intelligence component 602 can examine the entirety ora subset of the data available and can provide for reasoning about orinfer states of the system, environment, and/or user from a set ofobservations as captured via events and/or data. Inference can beemployed to identify a specific context or action, or can generate aprobability distribution over states, for example. The inference can beprobabilistic—that is, the computation of a probability distributionover states of interest based on a consideration of data and events.Inference can also refer to techniques employed for composinghigher-level events from a set of events and/or data.

Such inference can result in the construction of new events or actionsfrom a set of observed events and/or stored event data, whether or notthe events are correlated in close temporal proximity, and whether theevents and data come from one or several event and data sources. Variousclassification (explicitly and/or implicitly trained) schemes and/orsystems (e.g., support vector machines, neural networks, expert systems,Bayesian belief networks, fuzzy logic, data fusion engines . . . ) canbe employed in connection with performing automatic and/or inferredaction in connection with the disclosed subject matter.

A classifier can be a function that maps an input attribute vector,x=(x1, x2, x3, x4, xn), to a confidence that the input belongs to aclass, that is, f(x)=confidence(class). Such classification can employ aprobabilistic and/or statistical-based analysis (e.g., factoring intothe analysis utilities and costs) to prognose or infer an action that auser desires to be automatically performed. A support vector machine(SVM) is an example of a classifier that can be employed. The SVMoperates by finding a hyper-surface in the space of possible inputs,where the hyper-surface attempts to split the triggering criteria fromthe non-triggering events. Intuitively, this makes the classificationcorrect for testing data that is near, but not identical to trainingdata. Other directed and undirected model classification approachesinclude, e.g., naive Bayes, Bayesian networks, decision trees, neuralnetworks, fuzzy logic models, and probabilistic classification modelsproviding different patterns of independence can be employed.Classification as used herein also is inclusive of statisticalregression that is utilized to develop models of priority.

FIGS. 7-9 illustrate various methodologies in accordance with thedisclosed subject matter. While, for purposes of simplicity ofexplanation, the methodologies are shown and described as a series ofacts, it is to be understood and appreciated that the disclosed subjectmatter is not limited by the order of acts, as some acts may occur indifferent orders and/or concurrently with other acts from that shown anddescribed herein. For example, those skilled in the art will understandand appreciate that a methodology could alternatively be represented asa series of interrelated states or events, such as in a state diagram.Moreover, not all illustrated acts may be required to implement amethodology in accordance with the disclosed subject matter.Additionally, it should be further appreciated that the methodologiesdisclosed hereinafter and throughout this specification are capable ofbeing stored on an article of manufacture to facilitate transporting andtransferring such methodologies to computers. The term article ofmanufacture, as used herein, is intended to encompass a computer programaccessible from any computer-readable device, carrier, or media.

Referring now to FIG. 7, exemplary method 700 for alleviating errors ina provisioned service of a communication network by scaling contentresolution is depicted. Generally, at reference numeral 702, networktraffic through a gateway can be monitored. Based upon such monitoring,at reference numeral 704, a fault condition in connection with adegradation of service can be identified. For example, the faultcondition can relate to bandwidth oversubscription, to symbolizationintegrity (e.g., logical errors in data representation), or the like.

Regardless, at reference numeral 706, an alarm describing the faultcondition can be issued. Thus, the alarm can include indicia relating tothe type and nature of the fault condition, as well as to a potentialseverity of the fault condition or data types (e.g., encoding formats)that are presently contributing most to the fault condition.Accordingly, at reference numeral 708, the fault condition can bemitigated in response to the alarm by applying a scaling factor fortransforming a presentation resolution (e.g., a resolution at which theunderlying media/content will be presented) associated with contenttransitioning the gateway.

Turning now to FIG. 8, exemplary method 800 for configuring suitablegateways and/or defining fault conditions in connection with scalingfactors is illustrated. For example, at reference numeral 802, thegateway detailed in connection with reference numeral 702 of FIG. 7 canbe configured as at least one of a DSL gateway or a wireless gateway.Hence, network traffic resulting from conventional wirelesscommunications platforms (e.g., propagated by way of base stations) orconventional DSL platforms (e.g., propagated by way of femtocells) canbe subject to the transformations or other features detailed herein.Likewise, at reference numeral 804, the gateway can be configured as anintegrated media gateway supporting both TDM protocol signaling and IPsignaling, which can singularly serve both wireless base stations andfemtocells.

At reference numeral 806, the fault condition (e.g., identified atreference numeral 704 of FIG. 7) can be defined in terms of bandwidthoversubscription. In such cases, at reference numeral 808, the scalingfactor (applied in connection with reference numeral 708) can be appliedto reduce bandwidth utilization of content transitioning the gateway inorder to mitigate the fault condition in terms of bandwidthoversubscription.

Similarly, at reference numeral 810, the fault condition can be appliedin terms of symbolization integrity. Accordingly, at reference numeral812, the scaling factor can be applied to reduce an amount of datatransitioning the gateway and replacing all or a portion of that amountof data with FEC code in order to mitigate the fault condition in termsof symbolization integrity.

Now regarding FIG. 9, exemplary method 900 for providing additionfeatures or aspects in connection with alleviating errors in aprovisioned service of a communication network by scaling contentresolution is provided. At reference numeral 902, the scaling factor canbe determined based upon comparing current network traffic to at leastone of a predetermined maximum bandwidth allocation or to apredetermined maximum error rate threshold. Appreciably, in the firstcase the scaling factor can be employed to mitigate bandwidthoversubscription fault conditions, whereas in the second case, thescaling factor can be employed to mitigate symbolization integrity faultconditions.

Next to be described, at reference numeral 904, the scaling factor canbe determined based upon a type of content transitioning the gateway,wherein the type of content is at least one of voice or video.Appreciably, the type of content can also be more particularlydistinguished (e.g., over broad classifications such as voice and video)based upon a type of encoding format employed for the content.Additionally or alternatively, at reference numeral 906, the scalingfactor can be determined based upon a service provision agreement. Forexample, higher order service agreements might provide higher qualityusage, and therefore can be scaled at smaller intervals or from a higherresolution starting point. On the other hand, lower order serviceagreements might scale at greater intervals or begin at resolutions thatmight otherwise result from scaling of content for higher order serviceagreements.

In one or more aspect, at reference numeral 908, a scaling order (e.g.,a content order or target level of scaling to apply to various types ofcontent) for disparate types of content transitioning the gateway can bedetermined based upon at least one of a content type priority or acontent type proportion. Thus, e.g., voice can be defined to takepriority over video or the scaling order of various types of content canbe defined based upon a detected proportion of each type of contenttransitioning the gateway (e.g., to determine relative effect of thescaling in terms of overall network traffic).

It should be appreciated that regardless of the manner or mechanismsemployed to determine a scaling factor, the application of the scalingfactor can be performed in an independent manner. For example, atreference numeral 910, the scaling factor can be applied to thepresentation resolution by employing a lesser codec (e.g., a codec,potentially of the same encoding format, but with a lesser/lowerbitrate) for a transformation of content transitioning the gateway. Atreference numeral 912, the scaling factor can be applied to thepresentation resolution by employing a preselected still image forrepresenting video-based content.

To provide further context for various aspects of the subjectspecification, FIG. 10 illustrates an example wireless communicationenvironment 1000, with associated components that can enable operationof a femtocell enterprise network in accordance with aspects describedherein. Wireless communication environment 1000 includes two wirelessnetwork platforms: (i) A macro network platform 1010 that serves, orfacilitates communication) with user equipment 1075 via a macro radioaccess network (RAN) 1070. It should be appreciated that in cellularwireless technologies (e.g., 4G, 3GPP UMTS, HSPA, 3GPP LTE, 3GPP UMB),macro network platform 1010 is embodied in a Core Network. (ii) A femtonetwork platform 1080, which can provide communication with UE 1075through a femto RAN 1090, linked to the femto network platform 1080through a routing platform 102 via backhaul pipe(s) 1085, whereinbackhaul pipe(s) are substantially the same a backhaul link 1153 below.It should be appreciated that femto network platform 1080 typicallyoffloads UE 1075 from macro network, once UE 1075 attaches (e.g.,through macro-to-femto handover, or via a scan of channel resources inidle mode) to femto RAN.

It is noted that RAN includes base station(s), or access point(s), andits associated electronic circuitry and deployment site(s), in additionto a wireless radio link operated in accordance with the basestation(s). Accordingly, macro RAN 1070 can comprise various coveragecells like cell 1205, while femto RAN 1090 can comprise multiple femtoaccess points. As mentioned above, it is to be appreciated thatdeployment density in femto RAN 1090 is substantially higher than inmacro RAN 1070.

Generally, both macro and femto network platforms 1010 and 1080 includecomponents, e.g., nodes, gateways, interfaces, servers, or platforms,that facilitate both packet-switched (PS) (e.g., internet protocol (IP),frame relay, asynchronous transfer mode (ATM)) and circuit-switched (CS)traffic (e.g., voice and data) and control generation for networkedwireless communication. In an aspect of the subject innovation, macronetwork platform 1010 includes CS gateway node(s) 1012 which caninterface CS traffic received from legacy networks like telephonynetwork(s) 1040 (e.g., public switched telephone network (PSTN), orpublic land mobile network (PLMN)) or a SS7 network 1060. Circuitswitched gateway 1012 can authorize and authenticate traffic (e.g.,voice) arising from such networks. Additionally, CS gateway 1012 canaccess mobility, or roaming, data generated through SS7 network 1060;for instance, mobility data stored in a VLR, which can reside in memory1030. Moreover, CS gateway node(s) 1012 interfaces CS-based traffic andsignaling and gateway node(s) 1018. As an example, in a 3GPP UMTSnetwork, gateway node(s) 1018 can be embodied in gateway GPRS supportnode(s) (GGSN).

In addition to receiving and processing CS-switched traffic andsignaling, gateway node(s) 1018 can authorize and authenticate PS-baseddata sessions with served (e.g., through macro RAN) wireless devices.Data sessions can include traffic exchange with networks external to themacro network platform 1010, like wide area network(s) (WANs) 1050; itshould be appreciated that local area network(s) (LANs) can also beinterfaced with macro network platform 1010 through gateway node(s)1018. Gateway node(s) 1018 generates packet data contexts when a datasession is established. To that end, in an aspect, gateway node(s) 1018can include a tunnel interface (e.g., tunnel termination gateway (TTG)in 3GPP UMTS network(s); not shown) which can facilitate packetizedcommunication with disparate wireless network(s), such as Wi-Finetworks. It should be further appreciated that the packetizedcommunication can include multiple flows that can be generated throughserver(s) 1014. It is to be noted that in 3GPP UMTS network(s), gatewaynode(s) 1018 (e.g., GGSN) and tunnel interface (e.g., TTG) comprise apacket data gateway (PDG).

Macro network platform 1010 also includes serving node(s) 1016 thatconvey the various packetized flows of information or data streams,received through gateway node(s) 1018. As an example, in a 3GPP UMTSnetwork, serving node(s) can be embodied in serving GPRS support node(s)(SGSN).

As indicated above, server(s) 1014 in macro network platform 1010 canexecute numerous applications (e.g., location services, online gaming,wireless banking, wireless device management . . . ) that generatemultiple disparate packetized data streams or flows, and manage (e.g.,schedule, queue, format . . . ) such flows. Such application(s), forexample can include add-on features to standard services provided bymacro network platform 1010. Data streams can be conveyed to gatewaynode(s) 1018 for authorization/authentication and initiation of a datasession, and to serving node(s) 1016 for communication thereafter.Server(s) 1014 can also effect security (e.g., implement one or morefirewalls) of macro network platform 1010 to ensure network's operationand data integrity in addition to authorization and authenticationprocedures that CS gateway node(s) 1012 and gateway node(s) 1018 canenact. Moreover, server(s) 1014 can provision services from externalnetwork(s), e.g., WAN 1050, or Global Positioning System (GPS)network(s) (not shown). It is to be noted that server(s) 1014 caninclude one or more processor configured to confer at least in part thefunctionality of macro network platform 1010. To that end, the one ormore processor can execute code instructions stored in memory 1030, forexample.

In example wireless environment 1000, memory 1030 stores informationrelated to operation of macro network platform 1010. Information caninclude business data associated with subscribers; market plans andstrategies, e.g., promotional campaigns, business partnerships;operational data for mobile devices served through macro networkplatform; service and privacy policies; end-user service logs for lawenforcement; and so forth. Memory 1030 can also store information fromat least one of telephony network(s) 1040, WAN(s) 1050, or SS7 network1060, enterprise NW(s) 1065, or service NW(s) 1067.

Femto gateway node(s) 1084 have substantially the same functionality asPS gateway node(s) 1018. Additionally, femto gateway node(s) 1084 canalso include substantially all functionality of serving node(s) 1016. Inan aspect, femto gateway node(s) 1084 facilitates handover resolution,e.g., assessment and execution. Further, control node(s) 1020 canreceive handover requests and relay them to a handover component (notshown) via gateway node(s) 1084. According to an aspect, control node(s)1020 can support RNC capabilities.

Server(s) 1082 have substantially the same functionality as described inconnection with server(s) 1014. In an aspect, server(s) 1082 can executemultiple application(s) that provide service (e.g., voice and data) towireless devices served through femto RAN 1090. Server(s) 1082 can alsoprovide security features to femto network platform. In addition,server(s) 1082 can manage (e.g., schedule, queue, format . . . )substantially all packetized flows (e.g., IP-based, frame relay-based,ATM-based) it generates in addition to data received from macro networkplatform 1010. It is to be noted that server(s) 1082 can include one ormore processor configured to confer at least in part the functionalityof macro network platform 1010. To that end, the one or more processorcan execute code instructions stored in memory 1086, for example.

Memory 1086 can include information relevant to operation of the variouscomponents of femto network platform 1080. For example operationalinformation that can be stored in memory 1086 can comprise, but is notlimited to, subscriber information; contracted services; maintenance andservice records; femto cell configuration (e.g., devices served throughfemto RAN 1090; access control lists, or white lists); service policiesand specifications; privacy policies; add-on features; and so forth.

It is noted that femto network platform 1080 and macro network platform1010 can be functionally connected through one or more reference link(s)or reference interface(s). In addition, femto network platform 1080 canbe functionally coupled directly (not illustrated) to one or more ofexternal network(s) 1040, 1050, 1060, 1065 or 1067. Reference link(s) orinterface(s) can functionally link at least one of gateway node(s) 1084or server(s) 1086 to the one or more external networks 1040, 1050, 1060,1065 or 1067.

FIG. 11 illustrates a wireless environment that includes macro cells andfemtocells for wireless coverage in accordance with aspects describedherein. In wireless environment 1150, two areas 1105 represent “macro”cell coverage; each macro cell is served by a base station 1110. It canbe appreciated that macro cell coverage area 1105 and base station 1110can include functionality, as more fully described herein, for example,with regard to system 1100. Macro coverage is generally intended toserve mobile wireless devices, like UE 1120 _(A), 1120 _(B), in outdoorslocations. An over-the-air wireless link 115 provides such coverage, thewireless link 1215 comprises a downlink (DL) and an uplink (UL), andutilizes a predetermined band, licensed or unlicensed, of the radiofrequency (RF) spectrum. As an example, UE 1120 _(A), 1120 _(B) can be a3GPP Universal Mobile Telecommunication System (UMTS) mobile phone. Itis noted that a set of base stations, its associated electronics,circuitry or components, base stations control component(s), andwireless links operated in accordance to respective base stations in theset of base stations form a radio access network (RAN). In addition,base station 1110 communicates via backhaul link(s) 1151 with a macronetwork platform 1160, which in cellular wireless technologies (e.g.,3rd Generation Partnership Project (3GPP) Universal MobileTelecommunication System (UMTS), Global System for Mobile Communication(GSM)) represents a core network.

In an aspect, macro network platform 1160 controls a set of basestations 1110 that serve either respective cells or a number of sectorswithin such cells. Base station 1110 comprises radio equipment 1114 foroperation in one or more radio technologies, and a set of antennas 1112(e.g., smart antennas, microwave antennas, satellite dish(es) . . . )that can serve one or more sectors within a macro cell 1105. It is notedthat a set of radio network control node(s), which can be a part ofmacro network platform; a set of base stations (e.g., Node B 1110) thatserve a set of macro cells 1105; electronics, circuitry or componentsassociated with the base stations in the set of base stations; a set ofrespective OTA wireless links (e.g., links 1115 or 1116) operated inaccordance to a radio technology through the base stations; and backhaullink(s) 1155 and 1151 form a macro radio access network (RAN). Macronetwork platform 1160 also communicates with other base stations (notshown) that serve other cells (not shown). Backhaul link(s) 1151 or 1153can include a wired backbone link (e.g., optical fiber backbone,twisted-pair line, T1/E1 phone line, a digital subscriber line (DSL)either synchronous or asynchronous, an asymmetric ADSL, or a coaxialcable . . . ) or a wireless (e.g., line-of-sight (LOS) or non-LOS)backbone link. Backhaul pipe(s) 1155 link disparate base stations 1110.According to an aspect, backhaul link 1153 can connect multiple femtoaccess points 1130 and/or controller components (CC) 1101 to the femtonetwork platform 1102. In one example, multiple femto APs can beconnected to a routing platform (RP) 1087, which in turn can be connectto a controller component (CC) 1101. Typically, the information from UEs1120 _(A) can be routed by the RP 102, for example, internally, toanother UE 1120 _(A) connected to a disparate femto AP connected to theRP 1087, or, externally, to the femto network platform 1102 via the CC1101, as discussed in detail supra.

In wireless environment 1150, within one or more macro cell(s) 1105, aset of femtocells 1145 served by respective femto access points (APs)1130 can be deployed. It can be appreciated that, aspects of the subjectinnovation are geared to femtocell deployments with substantive femto APdensity, e.g., 10⁴-10⁷ femto APs 1130 per base station 1110. Accordingto an aspect, a set of femto access points 1130 ₁-3730 _(N), with N anatural number, can be functionally connected to a routing platform1087, which can be functionally coupled to a controller component 1101.The controller component 1101 can be operationally linked to the femtonetwork platform 330 by employing backhaul link(s) 1153. Accordingly,UEs UE 3720 _(A) connected to femto APs 1130 ₁-1130 _(N) can communicateinternally within the femto enterprise via the routing platform (RP)1087 and/or can also communicate with the femto network platform 1102via the RP 1087, controller component 1101 and the backhaul link(s)1153. It can be appreciated that although only one femto enterprise isdepicted in FIG. 11, multiple femto enterprise networks can be deployedwithin a macro cell 1105.

It is noted that while various aspects, features, or advantagesdescribed herein have been illustrated through femto access point(s) andassociated femto coverage, such aspects and features also can beexploited for home access point(s) (HAPs) that provide wireless coveragethrough substantially any, or any, disparate telecommunicationtechnologies, such as for example Wi-Fi (wireless fidelity) or picocelltelecommunication. Additionally, aspects, features, or advantages of thesubject innovation can be exploited in substantially any wirelesstelecommunication, or radio, technology; for example, Wi-Fi, WorldwideInteroperability for Microwave Access (WiMAX), Enhanced General PacketRadio Service (Enhanced GPRS), 3GPP LTE, 3GPP2 UMB, 3GPP UMTS, HSPA,HSDPA, HSUPA, or LTE Advanced. Moreover, substantially all aspects ofthe subject innovation can include legacy telecommunicationtechnologies.

Referring now to FIG. 12, there is illustrated a block diagram of anexemplary computer system operable to execute the disclosedarchitecture. In order to provide additional context for various aspectsof the disclosed subject matter, FIG. 12 and the following discussionare intended to provide a brief, general description of a suitablecomputing environment 1200 in which the various aspects of the disclosedsubject matter can be implemented. Additionally, while the disclosedsubject matter described above may be suitable for application in thegeneral context of computer-executable instructions that may run on oneor more computers, those skilled in the art will recognize that thedisclosed subject matter also can be implemented in combination withother program modules and/or as a combination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the disclosed subject matter may also bepracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

A computer typically includes a variety of computer-readable media.Computer-readable media can be any available media that can be accessedby the computer and includes both volatile and nonvolatile media,removable and non-removable media. By way of example, and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media can include eithervolatile or nonvolatile, removable and non-removable media implementedin any method or technology for storage of information such ascomputer-readable instructions, data structures, program modules orother data. Computer storage media includes, but is not limited to, RAM,ROM, EEPROM, flash memory or other memory technology, CD-ROM, digitalversatile disk (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

With reference again to FIG. 12, the exemplary environment 1200 forimplementing various aspects of the disclosed subject matter includes acomputer 1202, the computer 1202 including a processing unit 1204, asystem memory 1206 and a system bus 1208. The system bus 1208 couples tosystem components including, but not limited to, the system memory 1206to the processing unit 1204. The processing unit 1204 can be any ofvarious commercially available processors. Dual microprocessors andother multi-processor architectures may also be employed as theprocessing unit 1204.

The system bus 1208 can be any of several types of bus structure thatmay further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1206includes read-only memory (ROM) 1210 and random access memory (RAM)1212. A basic input/output system (BIOS) is stored in a non-volatilememory 1210 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 1202, such as during start-up. The RAM 1212 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 1202 further includes an internal hard disk drive (HDD)1214 (e.g., EIDE, SATA), which internal hard disk drive 1214 may also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 1216, (e.g., to read from or write to aremovable diskette 1218) and an optical disk drive 1220, (e.g., readinga CD-ROM disk 1222 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 1214, magnetic diskdrive 1216 and optical disk drive 1220 can be connected to the systembus 1208 by a hard disk drive interface 1224, a magnetic disk driveinterface 1226 and an optical drive interface 1228, respectively. Theinterface 1224 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and IEEE1394 interfacetechnologies. Other external drive connection technologies are withincontemplation of the subject matter disclosed herein.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1202, the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer, such as zipdrives, magnetic cassettes, flash memory cards, cartridges, and thelike, may also be used in the exemplary operating environment, andfurther, that any such media may contain computer-executableinstructions for performing the methods of the disclosed subject matter.

A number of program modules can be stored in the drives and RAM 1212,including an operating system 1230, one or more application programs1232, other program modules 1234 and program data 1236. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1212. It is appreciated that the disclosed subjectmatter can be implemented with various commercially available operatingsystems or combinations of operating systems.

A user can enter commands and information into the computer 1202 throughone or more wired/wireless input devices, e.g., a keyboard 1238 and apointing device, such as a mouse 1240. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 1204 through an input deviceinterface 1242 that is coupled to the system bus 1208, but can beconnected by other interfaces, such as a parallel port, an IEEE1394serial port, a game port, a USB port, an IR interface, etc.

A monitor 1244 or other type of display device is also connected to thesystem bus 1208 via an interface, such as a video adapter 1246. Inaddition to the monitor 1244, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1202 may operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1248. The remotecomputer(s) 1248 can be a workstation, a server computer, a router, apersonal computer, a mobile device, portable computer,microprocessor-based entertainment appliance, a peer device or othercommon network node, and typically includes many or all of the elementsdescribed relative to the computer 1202, although, for purposes ofbrevity, only a memory/storage device 1250 is illustrated. The logicalconnections depicted include wired/wireless connectivity to a local areanetwork (LAN) 1252 and/or larger networks, e.g., a wide area network(WAN) 1254. Such LAN and WAN networking environments are commonplace inoffices and companies, and facilitate enterprise-wide computer networks,such as intranets, all of which may connect to a global communicationsnetwork, e.g., the Internet.

When used in a LAN networking environment, the computer 1202 isconnected to the local network 1252 through a wired and/or wirelesscommunication network interface or adapter 1256. The adapter 1256 mayfacilitate wired or wireless communication to the LAN 1252, which mayalso include a wireless access point disposed thereon for communicatingwith the wireless adapter 1256.

When used in a WAN networking environment, the computer 1202 can includea modem 1258, or is connected to a communications server on the WAN1254, or has other means for establishing communications over the WAN1254, such as by way of the Internet. The modem 1258, which can beinternal or external and a wired or wireless device, is connected to thesystem bus 1208 via the serial port interface 1242. In a networkedenvironment, program modules depicted relative to the computer 1202, orportions thereof, can be stored in the remote memory/storage device1250. It will be appreciated that the network connections shown areexemplary and other means of establishing a communications link betweenthe computers can be used.

The computer 1202 is operable to communicate with any wireless devicesor entities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE802.11 (a, b,g, n, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE802.3 or Ethernet). Wi-Finetworks operate in the unlicensed 2.4 and 5 GHz radio bands, at an 11Mbps (802.11b) or 54 Mbps (802.11a) data rate, for example, or withproducts that contain both bands (dual band), so the networks canprovide real-world performance similar to the basic “10BaseT” wiredEthernet networks used in many offices.

Various aspects or features described herein can be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques. In addition, various aspects disclosed inthe subject specification can also be implemented through programmodules stored in a memory and executed by a processor, or othercombination of hardware and software, or hardware and firmware. The term“article of manufacture” as used herein is intended to encompass acomputer program accessible from any computer-readable device, carrier,or media. For example, computer readable media can include but are notlimited to magnetic storage devices (e.g., hard disk, floppy disk,magnetic strips . . . ), optical disks (e.g., compact disc (CD), digitalversatile disc (DVD), blu-ray disc (BD) . . . ), smart cards, and flashmemory devices (e.g., card, stick, key drive . . . ). Additionally itshould be appreciated that a carrier wave can be employed to carrycomputer-readable electronic data such as those used in transmitting andreceiving electronic mail or in accessing a network such as the internetor a local area network (LAN). Of course, those skilled in the art willrecognize many modifications may be made to this configuration withoutdeparting from the scope or spirit of the disclosed subject matter.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising, but not limited to comprising, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Processors can exploit nano-scale architectures suchas, but not limited to, molecular and quantum-dot based transistors,switches and gates, in order to optimize space usage or enhanceperformance of user equipment. A processor also can be implemented as acombination of computing processing units.

In the subject specification, terms such as “store,” “data store,” “datastorage,” “database,” “repository,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory. In addition, memory components or memory elementscan be removable or stationary. Moreover, memory can be internal orexternal to a device or component, or removable or stationary. Memorycan include various types of media that are readable by a computer, suchas hard-disc drives, zip drives, magnetic cassettes, flash memory cardsor other types of memory cards, cartridges, or the like.

By way of illustration, and not limitation, nonvolatile memory caninclude read only memory (ROM), programmable ROM (PROM), electricallyprogrammable ROM (EPROM), electrically erasable ROM (EEPROM), or flashmemory. Volatile memory can include random access memory (RAM), whichacts as external cache memory. By way of illustration and notlimitation, RAM is available in many forms such as synchronous RAM(SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rateSDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), anddirect Rambus RAM (DRRAM). Additionally, the disclosed memory componentsof systems or methods herein are intended to comprise, without beinglimited to comprising, these and any other suitable types of memory.

What has been described above includes examples of the variousembodiments. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing the embodiments, but one of ordinary skill in the art mayrecognize that many further combinations and permutations are possible.Accordingly, the detailed description is intended to embrace all suchalterations, modifications, and variations that fall within the spiritand scope of the appended claims.

In particular and in regard to the various functions performed by theabove described components, devices, circuits, systems and the like, theterms (including a reference to a “means”) used to describe suchcomponents are intended to correspond, unless otherwise indicated, toany component which performs the specified function of the describedcomponent (e.g., a functional equivalent), even though not structurallyequivalent to the disclosed structure, which performs the function inthe herein illustrated exemplary aspects of the embodiments. In thisregard, it will also be recognized that the embodiments includes asystem as well as a computer-readable medium having computer-executableinstructions for performing the acts and/or events of the variousmethods.

In addition, while a particular feature may have been disclosed withrespect to only one of several implementations, such feature may becombined with one or more other features of the other implementations asmay be desired and advantageous for any given or particular application.Furthermore, to the extent that the terms “includes,” and “including”and variants thereof are used in either the detailed description or theclaims, these terms are intended to be inclusive in a manner similar tothe term “comprising.”

As used in this application, the terms “system,” “component,”“interface,” and the like are intended to refer to a computer-relatedentity or an entity related to an operational machine with one or morespecific functionalities. The entities disclosed herein can be eitherhardware, a combination of hardware and software, software, or softwarein execution. For example, a component may be, but is not limited tobeing, a process running on a processor, a processor, an object, anexecutable, a thread of execution, a program, and/or a computer. By wayof illustration, both an application running on a server and the servercan be a component. One or more components may reside within a processand/or thread of execution and a component may be localized on onecomputer and/or distributed between two or more computers. Thesecomponents also can execute from various computer readable media havingvarious data structures stored thereon. The components may communicatevia local and/or remote processes such as in accordance with a signalhaving one or more data packets (e.g., data from one componentinteracting with another component in a local system, distributedsystem, and/or across a network such as the Internet with other systemsvia the signal). As another example, a component can be an apparatuswith specific functionality provided by mechanical parts operated byelectric or electronic circuitry that is operated by software orfirmware application(s) executed by a processor, wherein the processorcan be internal or external to the apparatus and executes at least apart of the software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can include a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components. An interface can include input/output (I/O)components as well as associated processor, application, and/or APIcomponents.

Furthermore, the disclosed subject matter may be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques to produce software, firmware, hardware,or any combination thereof to control a computer to implement thedisclosed subject matter. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device, carrier, or media. For example, computerreadable media can include but are not limited to magnetic storagedevices (e.g., hard disk, floppy disk, magnetic strips . . . ), opticaldisks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ),smart cards, and flash memory devices (e.g., card, stick, key drive . .. ). Additionally it should be appreciated that a carrier wave can beemployed to carry computer-readable electronic data such as those usedin transmitting and receiving electronic mail or in accessing a networksuch as the Internet or a local area network (LAN). Of course, thoseskilled in the art will recognize many modifications may be made to thisconfiguration without departing from the scope or spirit of thedisclosed subject matter.

As used herein, the terms “infer” or “inference” generally refer to theprocess of reasoning about or inferring states of the system,environment, and/or user from a set of observations as captured viaevents and/or data. Inference can be employed to identify a specificcontext or action, or can generate a probability distribution overstates, for example. The inference can be probabilistic—that is, thecomputation of a probability distribution over states of interest basedon a consideration of data and events. Inference can also refer totechniques employed for composing higher-level events from a set ofevents and/or data. Such inference results in the construction of newevents or actions from a set of observed events and/or stored eventdata, whether or not the events are correlated in close temporalproximity, and whether the events and data come from one or severalevent and data sources.

Further, terms like “user equipment,” “mobile station,” “mobile,”subscriber station,” “access terminal,” “terminal,” “handset,” andsimilar terminology, generally refer to a wireless device utilized by asubscriber or user of a wireless communication service to receive orconvey data, control, voice, video, sound, gaming, or substantially anydata-stream or signaling-stream. The foregoing terms are utilizedinterchangeably in the subject specification and related drawings.Likewise, the terms “access point,” “base station,” “cell,” “cell site,”and the like, are utilized interchangeably in the subject application,and refer to a wireless network component or appliance that serves andreceives data, control, voice, video, sound, gaming, or substantiallyany data-stream or signaling-stream from a set of subscriber stations.Data and signaling streams can be packetized or frame-based flows. It isnoted that in the subject specification and drawings, context orexplicit distinction provides differentiation with respect to accesspoints or base stations that serve and receive data from a mobile devicein an outdoor environment, and access points or base stations thatoperate in a confined, primarily indoor environment overlaid in anoutdoor coverage area. Data and signaling streams can be packetized orframe-based flows.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,” andthe like are employed interchangeably throughout the subjectspecification, unless context warrants particular distinction(s) amongthe terms. It should be appreciated that such terms can refer to humanentities, associated devices, or automated components supported throughartificial intelligence (e.g., a capacity to make inference based oncomplex mathematical formalisms) which can provide simulated vision,sound recognition and so forth. In addition, the terms “wirelessnetwork” and “network” are used interchangeable in the subjectapplication, when context wherein the term is utilized warrantsdistinction for clarity purposes such distinction is made explicit.

Moreover, the word “exemplary” is used herein to mean serving as anexample, instance, or illustration. Any aspect or design describedherein as “exemplary” is not necessarily to be construed as preferred oradvantageous over other aspects or designs. Rather, use of the wordexemplary is intended to present concepts in a concrete fashion. As usedin this application, the term “or” is intended to mean an inclusive “or”rather than an exclusive “or”. That is, unless specified otherwise, orclear from context, “X employs A or B” is intended to mean any of thenatural inclusive permutations. That is, if X employs A; X employs B; orX employs both A and B, then “X employs A or B” is satisfied under anyof the foregoing instances. In addition, the articles “a” and “an” asused in this application and the appended claims should generally beconstrued to mean “one or more” unless specified otherwise or clear fromcontext to be directed to a singular form.

What is claimed is:
 1. A gateway device, comprising: a processor; and amemory that stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising: determiningtraffic data indicative of a state of network traffic that iscommunicated via the gateway device of a network comprising networkdevices, wherein the network traffic comprises first content encodedaccording to a first encoding format and second content encodedaccording to a second encoding format; based on the traffic data,determining an update to the state of the network traffic; and based onpriority data indicative of a first priority of the first encodingformat and a second priority of the second encoding format, determining,from between the first encoding format and the second encoding format, aselected encoding format to modify to effectuate the update.
 2. Thegateway device of claim 1, wherein the determining the traffic datacomprises determining the network traffic is in a congested state. 3.The gateway device of claim 2, wherein the determining the networktraffic is in the congested state comprises determining: a bandwidthmeasure of the network traffic exceeds a defined bandwidth threshold, ora bit error rate measure of the network traffic exceeds a defined errorrate threshold.
 4. The gateway device of claim 2, wherein thedetermining the update to the state of the network traffic comprisesdetermining that a first bit rate of a portion the network traffic withthe selected encoding format is to be reduced to a second bit rate thatis less than the first bit rate.
 5. The gateway device of claim 4,wherein the operations further comprise updating the state of thenetwork traffic in response to reducing the first bit rate of theportion of the network traffic with the selected encoding format to thesecond bit rate.
 6. The gateway device of claim 1, wherein thedetermining the traffic data comprises determining the network trafficis in a spare capacity state.
 7. The gateway device of claim 6, whereinthe determining the network traffic is in the spare capacity statecomprises determining: a bandwidth measure of the network traffic isbelow a defined bandwidth threshold, or a bit error rate measure of thenetwork traffic is below a defined error rate threshold.
 8. The gatewaydevice of claim 6, wherein the determining the update to the state ofthe network traffic comprises determining that a first bit rate of aportion the network traffic with the selected encoding format is to beincreased to a second bit rate that is greater than the first bit rate.9. The gateway device of claim 8, wherein the operations furthercomprise updating the state of the network traffic in response toincreasing the first bit rate of the portion of the network traffic withthe selected encoding format to the second bit rate.
 10. The gatewaydevice of claim 1, wherein the operations further comprise receivingremote traffic data indicative of a remote state of remote networktraffic that is communicated via a remote gateway device of the network.11. The gateway device of claim 10, wherein the determining the updateto the state of the network comprises determining the update based onthe remote traffic data.
 12. A machine-readable storage medium,comprising executable instructions that, when executed by a processor,facilitate performance of operations, comprising, comprising:determining traffic data indicative of a state of network traffic thatis communicated via a gateway device of network devices of a network,wherein the network traffic comprises first content encoded according toa first encoding format and second content encoded according to a secondencoding format; determining an update to the state of the networktraffic based on the traffic data; and based on priority data indicativeof a first priority of the first encoding format and a second priorityof the second encoding format, determining, from between the firstencoding format and the second encoding format, a selected encodingformat to modify to effectuate the update.
 13. The machine-readablestorage medium of claim 12, wherein the determining the update to thestate of the network traffic comprises determining that a first bit rateof a portion the network traffic with the selected encoding format is tobe modified to a second bit rate that is different from the first bitrate.
 14. The machine-readable storage medium of claim 13, wherein theoperations further comprise updating the state of the network traffic inresponse to modifying the first bit rate of the portion of the networktraffic with the selected encoding format to the second bit rate. 15.The machine-readable storage medium of claim 12, wherein the operationsfurther comprise receiving different traffic data indicative of adifferent state of different network traffic that is communicated via adifferent gateway device of the network.
 16. The machine-readablestorage medium of claim 15, wherein the determining the update to thestate of the network comprises determining the update based on thedifferent traffic data.
 17. A method, comprising: determining, by adevice comprising a processor, traffic data indicative of a state ofnetwork traffic that is communicated via the gateway device of a networkcomprising network devices, wherein the network traffic comprises firstcontent encoded according to a first encoding format and second contentencoded according to a second encoding format; determining, by thedevice, an update to the state of the network traffic based on thetraffic data; and based on priority data indicative of a first priorityof the first encoding format and a second priority of the secondencoding format, determining, by the device and from between the firstencoding format and the second encoding format, a selected encodingformat to modify to effectuate the update.
 18. The method of claim 17,wherein the determining the update to the state of the network trafficcomprises determining that a first bit rate of a portion the networktraffic with the selected encoding format is to be reduced to a secondbit rate that is lower than the first bit rate.
 19. The method of claim17, wherein the determining the update to the state of the networktraffic comprises determining that a first bit rate of a portion thenetwork traffic with the selected encoding format is to be increased toa second bit rate that is higher than the first bit rate.
 20. The methodof claim 17, wherein the determining the update to the state of thenetwork traffic comprises determining the update based on differenttraffic data indicative of a different state of different networktraffic that is communicated via a different gateway device of thenetwork.