Management of received internet protocol packet bundling for real time services

ABSTRACT

Disclosed is a method for managing Internet Protocol Packet bundling comprising determining an operation of a real-time critical service (“RTCS”) on a mobile device; determining a data management indicator for the RTCS; where a RTCS is operating, and based on the data management indicator, determining a maximum number of Internet Protocol Packets for bundled delivery from a first layer of a protocol stack to a second layer of the protocol stack; receiving a number of Internet Protocol Packets totaling the maximum number of Internet Protocol Packets for bundled delivery; where the maximum number of Internet Protocol Packets for bundled delivery is greater than one, bundling the number of Internet Protocol Packets, and delivering the number of Internet Protocol Packets the first layer of the protocol stack to the second layer of the protocol stack.

TECHNICAL FIELD

Various aspects relate generally to methods and devices concerningbundling of Internet Protocol Packets for transfers between protocolstack layers.

BACKGROUND

With the maturation of Long Term Evolution (“LTE”) wirelesscommunications systems, there is a need to manage steadily increasingdata rates while reducing power consumption. One known area for reducedpower consumption relates to the forwarding of received data to otherprotocol stack layers in each transmission time interval (“TTI”).Specifically, it is known to receive Internet Protocol Packets and,rather than forwarding the Internet Protocol Packets in each TTI, theLTE protocol stack bundles the received Internet Protocol Packets andforwards them to the application layer only once every n-th TTI. Thisprocedure is known as Internet Protocol Packet Bundling. When applied,it reduces the frequency of a full data path between protocol stacklayers, which itself results in power savings. Yet, this benefit inpower consumption comes with the cost of additional delay in forwardingreceived Internet Protocol Packets. For services like internet browsingand file transfer, a few milliseconds of delay do not significantlyaffect performance and can be easily tolerated. For real-time criticalservices, however, such as Voice over Internet Protocol, non-bufferedstreaming video, or gaming data, even minimal delay can be undesirableand can result in poor or unacceptable performance.

SUMMARY

This Disclosure comprises a method and circuit configuration to detectwhen timing critical services are running and reduce or disable InternetProtocol Packet Bundling, thereby emphasizing timing and consistency ofdelivery over power-savings. Because universal disabling of InternetProtocol Packet Bundling would eliminate the established power-savingsthat Internet Protocol Packet Bundling provides, there is utility inrecognizing services for which real-time data delivery is preferred overpower-savings, and temporarily reducing or turning off Internet ProtocolPacket Bundling as needed for these services. For example, services suchas Internet Protocol Packet-based voice services, non-buffered streamingvideo, and real time gaming are especially sensitive to latency and maybenefit from temporary reduction or elimination of Internet ProtocolPacket Bundling. For some circumstances, such as during the use of theseservices, disabling Internet Protocol Packet Bundling eliminates adisadvantage that was designed to reduce power consumption.

BRIEF DESCRIPTION OF THE DRAWINGS

In the drawings, like reference characters generally refer to the sameparts throughout the different views. The drawings are not necessarilyto scale, emphasis instead generally being placed upon illustrating theprinciples of the Disclosure. In the following description, variousaspects of the Disclosure are described with reference to the followingdrawings, in which:

FIG. 1 shows a protocol stack for a user equipment;

FIG. 2 shows a first flowchart for management of Internet ProtocolPacket Bundling;

FIG. 3 shows a Quality of Service Class Identifiers (“QCI”) chart fordata services;

FIG. 4 shows a second flowchart for management of Internet ProtocolPacket Bundling;

FIG. 5 shows a circuit configuration for management of Internet ProtocolPacket Bundling;

FIG. 6 shows a method for management of Internet Protocol PacketBundling; and

FIG. 7 shows a method for management of Internet Protocol PacketBundling.

DETAILED DESCRIPTION

The following detailed description refers to the accompanying drawingsthat show, by way of illustration, specific details and aspects in whichthe Disclosure may be practiced.

The word “exemplary” is used herein to mean “serving as an example,instance, or illustration.” Any aspect or design described herein as“exemplary” is not necessarily to be construed as preferred oradvantageous over other aspects or designs.

The words “plural” and “multiple” in the description and the claimsexpressly refer to a quantity greater than one. Accordingly, any phrasesexplicitly invoking the aforementioned words (e.g. “a plurality of[objects]”, “multiple [objects]”) referring to a quantity of objectsexpressly refers more than one of the said objects. The terms “group(of),” “set [of],” “collection (of),” “series (of),” “sequence (of),”“grouping (of),” etc., and the like in the description and in theclaims, if any, refer to a quantity equal to or greater than one, i.e.one or more. The terms “proper subset,” “reduced subset,” and “lessersubset,” refer to a subset of a set that is not equal to the set, i.e. asubset of a set that contains less elements than the set.

A “circuit” as user herein is understood as any kind oflogic-implementing entity, which may include special-purpose hardware ora processor executing software. A circuit may thus be an analog circuit,digital circuit, mixed-signal circuit, logic circuit, processor,microprocessor, Central Processing Unit (“CPU”), Graphics ProcessingUnit (“GPU”), Digital Signal Processor (“DSP”), Field Programmable GateArray (“FPGA”), integrated circuit, Application Specific IntegratedCircuit (“ASIC”), etc., or any combination thereof. Any other kind ofimplementation of the respective functions which will be described belowin further detail may also be understood as a “circuit.” It isunderstood that any two (or more) of the circuits detailed herein may berealized as a single circuit with substantially equivalentfunctionality, and conversely that any single circuit detailed hereinmay be realized as two (or more) separate circuits with substantiallyequivalent functionality. Additionally, references to a “circuit” mayrefer to two or more circuits that collectively form a single circuit.

As used herein, “memory” may be understood as a non-transitorycomputer-readable medium in which data or information can be stored forretrieval. References to “memory” included herein may thus be understoodas referring to volatile or non-volatile memory, including random accessmemory (“RAM”), read-only memory (“ROM”), flash memory, solid-statestorage, magnetic tape, hard disk drive, optical drive, etc., or anycombination thereof. Furthermore, it is appreciated that registers,shift registers, processor registers, data buffers, etc., are alsoembraced herein by the term memory. It is appreciated that a singlecomponent referred to as “memory” or “a memory” may be composed of morethan one different type of memory, and thus may refer to a collectivecomponent comprising one or more types of memory. It is readilyunderstood that any single memory component may be separated intomultiple collectively equivalent memory components, and vice versa.Furthermore, while memory may be depicted as separate from one or moreother components (such as in the drawings), it is understood that memorymay be integrated within another component, such as on a commonintegrated chip.

The term “base station” used in reference to an access point of a mobilecommunication network may be understood as a macro base station, microbase station, Node B, evolved NodeB (“Enb”), Home eNodeB, Remote RadioHead (“RRH”), relay point, etc., and may include base stationsimplemented with conventional base station architectures (e.g.distributed, “all-in-one”, etc.) and base stations implemented withcentralized base stations architectures (e.g. Cloud Radio Access Network(“Cloud-RAN”) or Virtual RAN (“Vran”)). As used herein, a “cell” in thecontext of telecommunications may be understood as a sector served by abase station. Accordingly, a cell may be a set of geographicallyco-located antennas that correspond to a particular sectorization of abase station. A base station may thus serve one or more cells (orsectors), where each cell is characterized by a distinct communicationchannel. Furthermore, the term “cell” may be utilized to refer to any ofa macrocell, microcell, femtocell, picocell, etc.

For purposes of this disclosure, radio communication technologies may beclassified as one of a Short Range radio communication technology,Metropolitan Area System radio communication technology, or CellularWide Area radio communication technology. Short Range radiocommunication technologies include Bluetooth, WLAN (e.g. according toany IEEE 802.11 standard), and other similar radio communicationtechnologies. Metropolitan Area System radio communication technologiesinclude Worldwide Interoperability for Microwave Access (“WiMax”) (e.g.according to an IEEE 802.16 radio communication standard, e.g. WiMaxfixed or WiMax mobile) and other similar radio communicationtechnologies. Cellular Wide Area radio communication technologiesinclude GSM, UMTS, LTE, LTE-Advanced (“LTE-A”), CDMA, WCDMA, LTE-A,General Packet Radio Service (“GPRS”), Enhanced Data Rates for GSMEvolution (“EDGE”), High Speed Packet Access (“HSPA”), HSPA Plus(“HSPA+”), and other similar radio communication technologies. CellularWide Area radio communication technologies also include “small cells” ofsuch technologies, such as microcells, femtocells, and picocells.Cellular Wide Area radio communication technologies may be generallyreferred to herein as “cellular” communication technologies. It isunderstood that exemplary scenarios detailed herein are demonstrative innature, and accordingly may be similarly applied to various other mobilecommunication technologies, both existing and not yet formulated,particularly in cases where such mobile communication technologies sharesimilar features as disclosed regarding the following examples.

The term “network” as utilized herein, e.g. in reference to acommunication network such as a mobile communication network,encompasses both an access section of a network (e.g. a radio accessnetwork (“RAN”) section) and a core section of a network (e.g. a corenetwork section). The term “radio idle mode” or “radio idle state” usedherein in reference to a mobile terminal refers to a radio control statein which the mobile terminal is not allocated at least one dedicatedcommunication channel of a mobile communication network. The term “radioconnected mode” or “radio connected state” used in reference to a mobileterminal refers to a radio control state in which the mobile terminal isallocated at least one dedicated uplink communication channel of amobile communication network.

Unless explicitly specified, the term “transmit” encompasses both direct(point-to-point) and indirect transmission (via one or more intermediarypoints). Similarly, the term “receive” encompasses both direct andindirect reception. The term “communicate” encompasses one or both oftransmitting and receiving, i.e. unidirectional or bidirectionalcommunication in one or both of the incoming and outgoing directions.

A user device, such as a mobile phone, a computer, a wearable device, oressentially any other device designed to receive and transmit wirelesscommunications over a radio access technology, comprises a protocolstack of various layers, each of which are responsible for theperformance of various tasks related to the reception, transmission, orprocessing of wireless communications. A protocol stack may refer to agroup of protocols that run concurrently with one another, and that areemployed for the implementation of network protocol suite. The protocolsin a stack may determine the rules for interconnectivity for a layerednetwork model. The protocols must be able to connect vertically betweenthe layers of the network. FIG. 1 shows a configuration of a protocolstack 100. The upper levels of the protocol stack 100 comprise a controlplane 101 and a user plane 102. The control plane 101 comprises thenon-access stratum 103 and the radio resource control 104. The controlplane 101 handles radio-specific functionality that depends on the stateof the user equipment. The user plane 102 comprises the TransmissionControl Protocol (“TCP”), the User Datagram Protocol (“UDP”) TCP/UDP 105and the internet protocol layer 106. The protocol stack furthercomprises a Packet Data Convergence Protocol (“PDCP”) layer 107, whichtransfers user plane data, transfers control plane data, performs headercompression, ciphers, and performs integrity protection. The Radio LinkControl (“RLC”) 108 layer performs various functions including errorcorrection, segmentation and reassembly, duplicate detection, protocolerror detection and recovery, and delivery to upper layers. The MediumAccess Control Layer 109 maps between logical channels and transportchannels, performs multiplexing, reports scheduling information,performs error correction, performs priority handling through logicalchannels or with dynamic scheduling, and selects transport formats. ThePhysical Layer 1010 handles actual signal transmission and reception,including coding and decoding. The Application layer 1011 is ahigh-level layer that handles data, which may be clear text, encrypteddata, or compressed data.

FIG. 2 shows a model for controlling Internet Protocol Packet Bundlingin the context of a real-time critical service 200. According to thismodel, downlink data is received by the receiving device 201. It is thendetermined whether a real-time critical service is running 202. If thereis no real-time critical service, then Internet Protocol Packet Bundlingis left enabled 205. If a real-time critical service is running, thereare two options for handling the real-time critical service. One optionis to disable Internet Protocol Packet Bundling whenever a real-timecritical service is running, also referred to throughout herein asOption A 204. Under Option A, whenever a real-time critical service isoperating, Internet Protocol Packet Bundling will be disabled 203. WhereOption A is not selected, the method will proceed in accordance withOption B. According to Option B, it must be determined whether, underthe current Internet Protocol Packet Bundling setting, there is adegradation of the real-time critical service 206. Where there is adegradation of the real-time critical service, the Internet ProtocolPacket Bundling can be disabled 203. Where there is no degradation,Internet Protocol Packet Bundling can remain enabled 205.

FIG. 3 shows a table of QCI 300. QCI is a mechanism to help ensure thatbearer traffic is allotted an appropriate quality of service, which is alevel of traffic prioritization for data transfer. QCI levels range fromone through nine, and are assigned various levels of priority. Ofparticular note, conversation voice transmissions 301 have a QCI of 1;conversational video transmissions 302 have a QCI of 2, and real-timegaming 303 has a QCI of 3.

FIG. 4 shows a more detailed flowchart of a method for managing InternetProtocol Packet Bundling 400, according to an aspect of the Disclosure.According to this method, upon receipt of downlink data 401, it isdetermined whether a real-time critical service is operating 402. Thiscan be achieved through one of two sub-methods. The first sub-method iswith a QCI based evaluation 403, and the second sub-method is with anapplication layer evaluation 404. Using the QCI based evaluation method,it is determined whether there is at least one dedicated bearer ordefault bearer with a low QCI value 405. Where there is at least onededicated bearer or default bearer with a low QCI value, a real-timecritical service is present or operating 406. Where there is nodedicated bearer or default bearer with a low QCI value, then noreal-time critical service is present or operating 407. Under theapplication layer evaluation analysis 404, the application layerdetermines whether a real-time critical service is present or operating408. Where a real-time critical service is present or operating 406,there are two options for Internet Protocol Packet Bundling. Option A isto disable Internet Protocol Packet Bundling whenever a real-timecritical service is present 409. Option B is to only disable InternetProtocol Packet Bundling when both a real-time critical service ispresent and the real-time critical service experiences degraded quality410. Under Option A, any detected real-time critical service will resultin a decrease or disabling of Internet Protocol Packet Bundling 411.Under Option B, it must be determined whether the real-time criticalservice is experiencing degraded quality 412. Where the quality isdegraded, Internet Protocol Packet Bundling can be decreased or disabled411. Where it is not degraded, Internet Protocol Packet Bundling can becontinued or enabled 413.

FIG. 5 shows a circuit configuration for management of Internet ProtocolPacket bundling 500 said circuit configuration comprising a sensingcircuit 501, configured to determine an operation of a real-timecritical service on a mobile device; a logic circuit 502, configured todetermine a data management indicator for the real-time criticalservice; a protocol stack management circuit 503, configured todetermine a maximum number of Internet Protocol Packets for bundleddelivery from a first layer of a protocol stack to a second layer of theprotocol stack, where a real-time critical service is operating, andbased on the data management indicator; wherein the sensing circuit 501determines whether a real-time critical service is operating; the logiccircuit 502 determines a data management indicator for the real-timecritical service; a protocol stack management circuit 503 determines amaximum number of Internet Protocol Packets to bundle for bundleddelivery from a first layer of a protocol stack to a second layer of theprotocol stack, where a real-time critical service is operating, inaccordance with the data management indicator; and wherein the protocolstack management circuit 503 receives a number of Internet ProtocolPackets totaling the maximum number of Internet Protocol Packets tobundle; bundles the number of Internet Protocol Packets for deliveryfrom a first layer of a protocol stack to a second layer of the protocolstack; and delivers the number of Internet Protocol Packets from thefirst layer of the protocol stack to the second layer of the protocolstack.

In FIG. 6, a method for managing Internet Protocol Packet bundling 600is disclosed, said method comprising determining that a real-timecritical service is operating on a mobile device 601; identifying a datamanagement indicator for the real-time critical service 602; where thereal-time critical service is operating, determining a maximum delay fordelivery of Internet Protocol Packets from a first layer of a protocolstack to a second layer of the protocol stack, based on the datamanagement indicator 603; receiving one or more Internet ProtocolPackets in the first layer of the protocol stack over a durationcorresponding to the maximum delay for delivery 604; and bundling anddelivering the received one or more Internet Protocol Packets from thefirst layer of the protocol stack to the second layer of the protocolstack at a conclusion of the duration corresponding to the maximum delayfor delivery 605.

In FIG. 7, a method for managing Internet Protocol Packet bundling 700is disclosed, said method comprising determining whether a real-timecritical service is operating on a mobile device 701; where thereal-time critical service is operating, determining a maximum delay fordelivery of Internet Protocol Packets from a first layer of a protocolstack to a second layer of the protocol stack 702; receiving one or moreInternet Protocol Packets in the first layer of the protocol stack overa duration corresponding to the maximum delay for delivery 703; andbundling and delivering the received one or more Internet ProtocolPackets from the first layer of the protocol stack to the second layerof the protocol stack at a conclusion of the duration corresponding tothe maximum delay for delivery 704.

The received Internet Protocol Packets may also be Packet DataConvergence Protocol Packet Data Units (“PDCP PDUs”) as described in3GPP TS 36.323, Chapter 5.1.2. Upon receipt of these packets, the LTEPDCP entity determines whether time critical services are running. Suchtime critical services can be indicated by the application layer ordetected by the LTE protocol stack, based on whether an LTE dedicatedbearer or default bearer with a low QCI (such as a Quality of ServiceClass Identifier under 3GPP 23.203, Table 6.1.7) value is established.Where no time critical service is running, Internet Protocol Bundling isenabled, and the received Internet Protocol Packets are bundled anddelivered to the application layer every n-th TTI.

Where time critical services are running, however, then there are twooptions. The first option is to disable Internet Protocol Bundling aslong as time critical services are running. The second option is tomaintain Internet Protocol Bundling, even where time critical servicesare running, until such time as the time critical services are degraded.Where the time critical services are degraded, the Internet ProtocolBundling can then be disabled or diminished in frequency. Time criticalservices can be deemed to be running where at least one dedicated beareror default bearer with low QoS parameter QCI, such as a QCI of 1 forconversational voice or a QCI of 3 for real time gaming, is present.

Option A, which disables Internet Protocol Packet Bundling whenever areal-time critical service is active, has the benefit that it does notrequire interfacing with the application layer. Thus, while employingthis option, the PDCP can determine whether a real-time critical serviceis in effect simply by assessing the QCI parameters in use, and withoutany need to interface with the application layer. This is a simple andefficient method for determining the presence of a real-time criticalservice. The drawback to this method, however, is that certain real-timecritical services may be overlooked.

For instance, conversational voice may not be detected as a real-timecritical service when using this method. In LTE, and presumably infuture radio access technologies, voice is generally no longer circuitswitched, but rather transmitted in data packets, such as in voice overinternet protocol (“VoIP”) systems. Voice transmitted in digital datapackets has a low tolerance for latency or delay, which are disruptiveto a conversation and have a high tendency to create userdissatisfaction. However, because of the nature of Internet ProtocolPacked-based voice transfer, such conversations may appear to the PDCPas ordinary web traffic, and the PDCP is generally unable to distinguishdigitally transmitted voice from low-priority data. As such, reliance onthis first option to detect real-time critical services, whileorganizationally and computationally simple, may result in a failure torecognize digital voice services as being of a high-priority orreal-time critical.

A second option to identify a real-time critical service is for theapplication layer to inform the protocol stack with information aboutany ongoing real time services. Although the PDCP cannot identifyconversational voice services as real-time critical service based onQCI, the application layer can identify and report conversational voiceservices as real-time critical service.

Once the presence of a real-time critical service is established,whether from QCI or information obtained from the application layer, theInternet Protocol Packet Bundling can be reduced or disabled. Accordingto one aspect of the Disclosure, the presence of a real-time criticalservice results in a complete disabling of Internet Protocol PacketBundling. According to a second aspect of the Disclosure, the presenceof a real-time critical service results in a diminishment or reductionin Internet Protocol Packet Bundling. Whether a disablement ordiminishment of Internet Protocol Packet Bundling, this can be achievedby setting a maximum number of Internet Protocol Packets to bundle.Where the maximum number of Internet Protocol Packets to bundle is lessthan two, Internet Protocol Packet Bundling is effectively disabled.Where the maximum number of Internet Protocol Packets to bundle is twoor greater, Internet Protocol Packet Bundling is effectively enabled. Ahigh number of maximum Internet Protocol Packets to bundle results inless frequent transfers of Internet Protocol Packets to the upper layersbut may result in power savings. A low number of maximum InternetProtocol Packets to bundle results in more frequent transfers ofInternet Protocol Packets to the upper layers but may result in greaterpower demand.

Because Internet Protocol Packet Bundling remains an establishedpower-saving method, it must be determined when to increase or reinstateInternet Protocol Packet Bundling, in the event that it has beendiminished or discontinued. According to one aspect of the Disclosure,the diminishment or discontinuation of Internet Protocol Packet Bundlingshould be maintained as long as the real-time critical service isoperational. Once the real-time critical service is complete, theInternet Protocol Packet Bundling can be returned to pre-real-timecritical service functionality.

According to a second aspect of the Disclosure, the Internet ProtocolPacket Bundling can be periodically reevaluated during the performanceof the real-time critical service. As detailed above, where a real-timecritical service is present, the Internet Protocol Packet Bundling maybe diminished or discontinued. Many real-time critical services, such asconversational voice calls, streaming video, and gaming, are anticipatedto continue for extended lengths of time, potentially several seconds,minutes, or hours. Whatever the length, it is anticipated that, althougha real-time critical service may be very brief, it may also becomparatively great in duration, and may last greatly in excess of oneor many TTIs. As such, the reduction or elimination of Internet ProtocolPacket Bundling during a real-time critical service can be reevaluatedperiodically to ensure appropriate use of Internet Protocol PacketBundling in light of a currently-running real-time critical service.Where Internet Protocol Packet Bundling has been discontinued due to areal-time critical service, the Internet Protocol Packet Bundling can beperiodically re-evaluated during the real-time critical service. Uponperiod re-evaluation, the real-time critical service can remaindiscontinued, can be restored to pre-real-time critical service levels,or can be increased somewhat, but not returned entirely to pre-real-timecritical service levels. Such an increase would be due to an ongoingreal-time critical service where the quality of the real-time criticalservice is not significantly diminished by Internet Protocol Bundlingand/or where it is determined that an increase in Internet ProtocolPacket Bundling can be tolerated without an unacceptable decrease in thequality of a real-time critical service. Where a re-evaluation isperformed, and it is determined that a real-time critical service hasbeen completed or terminated, but where other real-time criticalservices are still operating, the Internet Protocol Packet Bundling canbe increased or restored. Where a re-evaluation is performed, and it isdetermined that no real-time critical services are in operation, theInternet Protocol Packet Bundling can be restored to previous levels.

According to an additional aspect of the Disclosure, periodic review ofthe Internet Protocol Packet Bundling can be performed with anexamination of the QCI. Where the QCI suggests the operation of areal-time critical service, Internet Protocol Packet Bundling can remaindiminished or disabled. Where fewer real-time critical services areoperating compared to the prior evaluation, Internet Protocol PacketBundling can be increased or restored. Where QCI indicates that noreal-time critical service is operating, then Internet Protocol PacketBundling can be restored.

According to an additional aspect of the Disclosure, Internet ProtocolPacket Bundling results in the bundling of received Internet ProtocolPackets, such that they are not delivered to higher layers upon completereceipt in sequence, as may otherwise occur, but rather are deliveredevery n TTIs, where n is an integer greater than one. For example,Internet Protocol Packets can be bundled together and delivered to thehigher layers every n=4 TTIs. This results in one transfer to the higherlevel every four TTIs, rather than a transfer every TTI, which canresult in a 75% reduction in power for transfer of Internet ProtocolPackets.

The method of Internet Protocol Packet Management may requiredetermination of a data management indicator for the real-time criticalservice. The data management indicator is especially relevant foraspects of the Disclosure where reduction or discontinuation of InternetProtocol Packet Bundling is dependent on both the presence of areal-time critical service and a decrease in quality of service of thereal-time critical service. In such circumstances, the data managementindicator represents the quality of the real-time critical service, andespecially whether the quality of the real-time critical service issuffering from, or could be improved by, a reduction in InternetProtocol Packet Bundling. Thus, once the mobile device establishes theoperation of a real-time critical service, the mobile device must thenassess a data management indicator by determining whether the real-timecritical service is degraded. This can be achieved by assessing dataerror rates or bit rates for the real-time critical service, or throughany known method for assessing error. According to one aspect of thedisclosure, where the data management indicator evidences that thereal-time critical service is degraded, the mobile device can reduce theInternet Protocol Packet Bundling. According to another aspect of thedisclosure, where the data management indicator evidences degradation ofa real-time critical service, the mobile device may perform theadditional step of determining a likelihood of whether a change inInternet Protocol Packet Bundling would be likely to result in a changein the service degradation. For example, where degradation results fromfactors unrelated to Internet Protocol Packet Bundling, such as networkunavailability, a change in Internet Protocol Packet Bundling may beunlikely to improve the service degradation.

A non-exclusive list of real-time critical services comprises Voice overInternet Protocol, Voice over LTE, Voice over 5G, Internet ProtocolPacket based conversational voice services, real-time gaming, andnon-buffered video. Furthermore, a real-time critical service mayinclude any service for which performance of said service can bedegraded by Internet Protocol Packet Bundling.

As described above, Internet Protocol Packet Bundling results in thecombination of n Internet Protocol Packets for delivery to an upperlayer, where n represents the number of Internet Protocol Packets to bebundled together and is an integer of two or greater. Where n=1, thenumber of Internet Protocol Packets to be bundled is one, which iseffectively an elimination of Internet Protocol Packet Bundling. Where nis 0, the number of Internet Protocol Packets to be bundled is zero,which is also effectively an elimination of Internet Protocol PacketBundling. It is anticipated that where n is an integer and n≤2, InternetProtocol Packet Bundling is effectively disabled. Where n is an integertwo or greater, Internet Protocol Packet Bundling is enabled, wherehigher values of n result in greater amounts of Internet ProtocolPackets being bundled together for transmission to the higher levels.

According to one aspect of the Disclosure, the Application layer maydetermine the existence of a real-time critical service and inform anyof the remaining layers that a real-time critical service is inoperation. The Application layer may be able to identify operation ofreal-time critical services that may otherwise be undetected byobserving QCI data. For example, voice data may be transmitted inInternet Protocol Packets, such as in a Voice over Internet Protocolscenario, which may appear to the lower layers as routine, low-priorityweb traffic. The application layer, however, can identify InternetProtocol Packet data voice calls as a real-time critical service. Underthis circumstance, the application layer can inform the lower layersthat a data stream is in fact voice data, rather than routine web data;that it is a real-time critical service; and that it should receive ahigher traffic priority. In this case, the Application layer can informPDCP of the existence of a real-time critical service, particularly areal-time critical service that PDCP could not have itself identified.This identification in the Application layer, which is then passed on toPDCP, permits the creation of a data management indicator forconversational voice services that are routed over a default bearer.

According to an additional aspect of the Disclosure, the Applicationlayer can determine whether the performance of a real-time criticalservice is degraded by Internet Protocol Packet Bundling. BecauseInternet Protocol Packet Bundling results in less frequent delivery ofInternet Protocol Packets to the higher levels, latency intolerantservices, such as real-time critical services, may suffer a degradationin quality from Internet Protocol Packet Bundling. The Application layermay assess the quality of the real-time critical service, determinewhether the real-time critical service would benefit from a reduction inInternet Protocol Packet Bundling, and/or adjust the data managementindicator accordingly. For example, where a real-time critical serviceis operating, but there is no degradation of the real-time criticalservice, the Application layer may inform the other layers that areal-time critical service is running, but the Application layer may setthe data management indicator such that there is no change in InternetProtocol Packet Bundling. Where a running real-time critical servicesuffers from a predetermined level of degradation, the Application layermay adjust the data management indicator to decrease or cease altogetherInternet Protocol Packet Bundling.

Internet Protocol Packet Bundling comprises grouping a plurality ofInternet Protocol Packets for delivery to a higher layer. The termInternet Protocol Packets is used generally to describe a data packet.This may be a packet that is received in a wireless transmission to beprocessed. Alternatively, this may be a packet from an application,routine, or sub-routine, and which is processed for a wirelesstransmission. An Internet Protocol Packet may be a network packet,generally. An Internet Protocol Packet may be a protocol data unit,whether generally or colloquially known as such, or in accordance withthe Packet Data Convergence Protocol. Where additional Radio AccessTechnologies use other terms, the use of Internet Protocol Packet is notmeant to be exclusive. Rather, it is anticipated that this Disclosuremay be applied to future Radio Access Technologies. It is also expresslyanticipated that this Disclosure can be applied to any kind ofinformation packet that is subject to bundling for transmission to ahigher layer.

Where one or more real-time critical services are identified, the datamanagement indicator can be set to alter the frequency of InternetProtocol Packet Bundling. This may result in a temporary reduction infrequency of Internet Protocol Packet Bundling, or a temporarydiscontinuation of Internet Protocol Packet Bundling. According to oneaspect of the Disclosure, the data management indicator can be set toreduce or discontinue Internet Protocol Packet Bundling whenever areal-time critical service is operating. According to a second aspect ofthe disclosure, the Internet Protocol Packet Bundling can be set toreduce or discontinue Internet Protocol Packet Bundling whenever areal-time critical service is operating and experiences a degradation inquality. The Application layer may set the data management indicator.Alternatively, the data management indicator may be set by the network,the user, or another layer.

According to an additional aspect of the Disclosure, a real-timecritical service can be determined to be operating wherein at least onededicated bearer or default bearer is operating with a QCI of 1. ThisQCI threshold may alternatively be set for a number greater than one.For example, and according to an aspect of the Disclosure, a real-timecritical service can be said to be wherein at least one dedicated beareror default bearer is operating with operating with a QCI ≤2, or whereinat least one dedicated bearer or default bearer is operating with a QCI≤3. The data management indicator may be configured as an indication ofa low QCI, or configure to reduce or discontinue Internet ProtocolPacket Bundling whenever an application with a low QCI is operating.According to one aspect of the Disclosure, a real-time critical servicebeing any service that experiences a degradation from Internet ProtocolPacket bundling.

The QCI for conversational voice may be 1, which represents the need tohave high priority data traffic and uninterrupted service forconversational voice. This represents the low latency tolerance ofconversational voice, whereby disruptions in data transmissions mayresult in pausing, hanging, jittering, disconnection, or otheruser-perceivable interruptions that are closely correlated with userdissatisfaction. Internet Protocol Packet-based voice services,regardless of QCI, are real-time critical services that are expected tobe especially susceptible to delay created by Internet Protocol PacketBundling.

The QCI for real time gaming may be 3. This represents real-timegaming's low latency tolerance and its susceptibility to unacceptable,user-perceivable interruptions from delays in data delivery. Such delaysmay result in pausing, hanging, jittering, disconnection, or otheruser-perceivable interruptions.

According to one aspect of the Disclosure, the data management indicatormay be set based on a maximum number of Internet Protocol Packets forbundled delivery from a first layer of a protocol stack to a secondlayer of the protocol stack. This calculation can be performed by anylayer in the protocol stack. It is contemplated that the Applicationlayer is one layer within the protocol stack that is capable of reachingthis determination.

The setting of the data management indicator may require thedetermination of a level of degradation of a real-time critical service.Thus, where a real-time critical service is operational, and where thedata management indicator is to be set, it may be necessary to determinea level of degradation of the real-time critical service. This mayrequire an assessment of the service's performance, with respect tofactors comprising stability, reliability, latency, jitter, and userexperience. The results of any one or any combination of theseassessments can be used to determine a severity of degradation, andsubsequently to determine a corresponding setting for the datamanagement indicator, such that the Internet Protocol Packet Bundling isappropriately diminished or prohibited. This assessment can be performedby any aspect of the protocol stack. It is particularly contemplatedthat this assessment can be performed by the application layer. The datamanagement indicator can be set to reduce or discontinue the InternetProtocol Packet Bundling when a real-time critical service is degraded.Similarly, the data management indicator can be set to increase orrestore Internet Protocol Packet Bundling when the degradation of thereal-time critical service improves. According to one aspect of theDisclosure, Internet Protocol Packet Bundling can be prohibited onlywhere a degradation of the real-time critical service is present. As anextension of this idea, and according to an additional aspect of theDisclosure, the data management indicator can be set to increaseInternet Protocol Bundling only where degradation of a Real-TimeCritical Service improves.

Where Internet Protocol Packet Bundling is disabled, a first layer ofthe protocol stack will deliver an Internet Protocol Packet from thefirst layer of the protocol stack to the second layer of the protocolstack on a TTI immediately after a TTI when the first protocol stackreceived the Internet Protocol Packet. In essence, received InternetProtocol Packets will be delivered on the first TTI available aftercomplete reception.

According to one aspect of the Disclosure, this method may be performedby a circuit configuration for managing Internet Protocol Packetbundling. In this case, said circuit configuration may comprise asensing circuit, configured to determine an operation of a real-timecritical service on a mobile device; a logic circuit, configured todetermine a data management indicator for the real-time criticalservice; a protocol stack management circuit, configured to determine amaximum number of Internet Protocol Packets for bundled delivery from afirst layer of a protocol stack to a second layer of the protocol stack,where a real-time critical service is operating, and based on the datamanagement indicator; wherein the sensing circuit determines whether areal-time critical service is operating on a mobile device; the logiccircuit determines a data management indicator for the real-timecritical service; a protocol stack management circuit determines amaximum number of Internet Protocol Packets to bundle for bundleddelivery from a first layer of a protocol stack to a second layer of theprotocol stack, where a real-time critical service is operating, inaccordance with the data management indicator; and wherein the protocolstack management circuit receives a number of Internet Protocol Packetstotaling the maximum number of Internet Protocol Packets to bundle;bundles the number of Internet Protocol Packets for delivery from afirst layer of a protocol stack to a second layer of the protocol stack;and delivers the number of Internet Protocol Packets from the firstlayer of the protocol stack to the second layer of the protocol stack.

According to one aspect of the Disclosure, this circuit configurationmay be presented in a plurality of devices, which may themselves beconfigured for wireless communication. This circuit configuration may befound within a mobile communication device, such as a mobile phone, asmart phone, a tablet computer, laptop computer configured for wirelesscommunication, or a desktop computer configured for wirelesscommunication. The circuit configuration may be present in a wearabledevice configured for wireless connectivity, where said wearable devicemay comprise, but is not limited to, wristbands, armbands, wearablesensors, clothing, necklaces, headbands, or otherwise. The circuitconfiguration may also be present in a motor vehicle, a home appliance,a home defense system, a home management system, or a home surveillancesystem.

According to an aspect of the Disclosure, this method may be intendedfor use with radio communication technologies, including, but notlimited to, devices in connection with a radio access technology for atleast the reception of wireless communication.

According to one aspect of the Disclosure, there is disclosed a meansfor management of Internet Protocol Packet bundling. Said meansdetermines that a real-time critical service is operating on a mobiledevice, which may be achieved with at least two methods. First, themeans may assess the QCI for any operating applications. The means maybe programmed to determine the presence of a real-time critical servicewhen the QCI is equal to or less than a predetermined number. Forexample, the means may determine that a QCI ≤3 indicates a real-timecritical service. Alternatively, the application layer of the mobiledevice may determine the presence of a real-time critical service.Reliance on the application layer for this determination may provide abenefit where a Voice over Internet Protocol operation is running, asVoice over Internet Protocol is real-time critical but may appear to thelower layers as routine web data, and therefore may not be recognized asa real-time critical service based solely on assessment of QCI. Where anoperation of a real-time critical service is determined, the meansdetermines a data management indicator for the real-time criticalservice. As described herein, the data management indicator is areflection of the function of a real-time critical service, andspecifically whether the real-time critical service is degraded. Wherethe real-time critical service is operating, and based on the datamanagement indicator, the means determines a maximum delay for deliveryof Internet Protocol Packets from a first layer of a protocol stack to asecond layer of the protocol stack. The means may disable or reduceInternet Protocol Packet Bundling. The change in Internet ProtocolPacket Bundling may be triggered from any presence of a real-timecritical service, or from any degradation of a real-time criticalservice, or from a degradation of a real-time critical service past athreshold. Where a change in Internet Protocol Packet Bundling isindicated, the means initiates said change by determining a maximumdelay for delivery of Internet Protocol Packets. The means receives anumber of Internet Protocol Packets in the first layer of the protocolstack over a period of time corresponding to the maximum delay fordelivery and bundles and delivers the Internet Protocol Packets from thefirst layer of a protocol stack to the second layer of the protocolstack at a conclusion of the period of time corresponding to the maximumdelay for delivery.

In Example 1, a method for managing Internet Protocol Packet bundling isdisclosed, said method comprising:

determining that a real-time critical service is operating on a mobiledevice;identifying a data management indicator for the real-time criticalservice;where the real-time critical service is operating, determining a maximumdelay for delivery of Internet Protocol Packets from a first layer of aprotocol stack to a second layer of the protocol stack, based on thedata management indicator;receiving one or more Internet Protocol Packets in the first layer ofthe protocol stack over a duration corresponding to the maximum delayfor delivery; andbundling and delivering the received one or more Internet ProtocolPackets from the first layer of the protocol stack to the second layerof the protocol stack at a conclusion of the duration corresponding tothe maximum delay for delivery.

In Example 2, a method for managing Internet Protocol Packet bundling,said method comprising:

determining whether a real-time critical service is operating on amobile device;where the real-time critical service is operating, determining a maximumdelay for delivery of Internet Protocol Packets from a first layer of aprotocol stack to a second layer of the protocol stack;receiving one or more Internet Protocol Packets in the first layer ofthe protocol stack over a duration corresponding to the maximum delayfor delivery; andbundling and delivering the received one or more Internet ProtocolPackets from the first layer of the protocol stack to the second layerof the protocol stack at a conclusion of the duration corresponding tothe maximum delay for delivery.

In Example 3, the method of any one of examples 1 or 2, furthercomprising Voice over Internet Protocol being a real-time criticalservice.

In Example 4, the method of any one of examples 1 or 2, furthercomprising Voice over LTE being a real-time critical service.

In Example 5, the method of any one of examples 1 or 2, furthercomprising Voice over 5G being a real-time critical service.

In Example 6, the method of any one of examples 1 or 2, furthercomprising real-time gaming being a real-time critical service.

In Example 7, the method of any one of examples 1 or 2, furthercomprising non-buffered video being a real-time critical service.

In Example 8, the method of any one of examples 1 through 7, furthercomprising the maximum delay for delivery of Internet Protocol Packetsbeing a number of transmission time intervals.

In Example 9, the method of example 8, further comprising the number oftransmission time intervals being zero.

In Example 10, the method of example 8, further comprising the number oftransmission time intervals being one.

In Example 11, the method of example 8, further comprising the number oftransmission time intervals being four.

In Example 12, the method of example 8, further comprising the number oftransmission time intervals being an integer from zero to 16.

In Example 13, the method of any one of examples 1 through 12, furthercomprising an application layer setting the data management indicator todiscontinue Internet Protocol Packet bundling.

In Example 14, the method of any one of examples 1 through 13, furthercomprising an application layer setting the data management indicator toreduce the maximum delay for delivery of Internet Protocol Packets.

In Example 15, the method of any one of examples 1 through 13, furthercomprising an application layer setting the data management indicator toincrease the maximum delay for delivery of Internet Protocol Packets.

In Example 16, the method of any one of examples 1 through 15, furthercomprising the Internet Protocol Packet being a protocol data unit.

In Example 17, the method of example 16, further comprising the ProtocolData Unit being a Protocol Data Unit according to a Packet DataConvergence Protocol.

In Example 18, the method of any one of examples 1 through 14 or 16through 17, further comprising setting the data management indicator toreduce the maximum delay for delivery of Internet Protocol Packetswhenever a real-time critical service is operating.

In Example 19, the method of any one of examples 1 through 14 or 16through 18, further comprising setting the data management indicator toset the maximum delay for delivery of Internet Protocol Packets to zerowhenever a real-time critical service is operating.

In Example 20, the method of any one of examples 1 through 14 or 16through 18, further comprising setting the data management indicator todiscontinue Internet Protocol Bundling whenever a real-time criticalservice is operating.

In Example 21, the method of any one of examples 1 through 20, furthercomprising determining a real-time critical service to be operatingwherein at least one dedicated bearer or default bearer is operatingwith a Quality of Service Class Identifier of 1.

In Example 22, the method of any one of examples 1 through 20, furthercomprising determining a real-time critical service to be operatingwherein at least one dedicated bearer or default bearer is operatingwith a Quality of Service Class Identifier of 2.

In Example 23, the method of any one of examples 1 through 20, furthercomprising determining a real-time critical service to be operatingwherein at least one dedicated bearer or default bearer is operatingwith a Quality of Service Class Identifier of 3.

In Example 24, the method of any one of examples 1 through 20, furthercomprising determining a real-time critical service to be operatingwherein at least one dedicated bearer or default bearer is operatingwith a Quality of Service Class Identifier of 1, 2, or 3.

In Example 25, the method of any one of examples 1 through 20, furthercomprising determining a real-time critical service to not be operatingwherein all Quality of Service Class Identifiers are greater than 3.

In Example 26, the method of any one of examples 1 through 25, furthercomprising determining a real-time critical service to be operating dueto a low QoS Class Identifier value.

In Example 27, the method of any one of examples 26, wherein the low QoSClass Identifier value is a value of 1 for conversational voice.

In Example 28, the method of any one of examples 26, wherein the low QoSClass Identifier value is a value of 2 for conversational video.

In Example 29, the method of any one of examples 26, wherein the low QoSClass Identifier value is a value of 3 for real time gaming.

In Example 30, the method of any one of examples 1 through 29, wherein alayer within a protocol stack determines whether a real-time criticalservice is in operation.

In Example 31, the method of any one of examples 1 through 29, whereinan Application layer within a protocol stack determines whether areal-time critical service is in operation.

In Example 32, the method of any one of examples 1 through 29, whereinan Application layer within a protocol stack determines a real-timecritical service to be operating on the mobile device.

In Example 33, the method of example 32, further comprising theApplication layer determining the data management indicator for thereal-time critical service.

In Example 34, the method of any one of examples 1 through 33, furthercomprising Internet Protocol Packet-based voice communications being areal-time critical service.

In Example 35, the method of example 34, further comprising anApplication layer determining that Internet Protocol Packet-based voicecommunications is a real-time critical service.

In Example 36, the method of any one of examples 1 and 3 through 35,further comprising determining a level of degradation of the real-timecritical service.

In Example 37, the method of example 36, further comprising setting thedata management indicator based the level of degradation of thereal-time critical service.

In Example 38, the method of example 36 or 37, further comprisingsetting the data management indicator to discontinue Internet ProtocolBundling because of degradation of the real-time critical service.

In Example 39, the method of example 36 or 37, further comprisingsetting the data management indicator to reduce Internet ProtocolBundling because of degradation of the real-time critical service.

In Example 40, the method of any one of examples 36 or 37, furthercomprising setting the data management indicator to increase InternetProtocol Bundling when the degradation of the real-time critical serviceimproves.

In Example 41, the method of any one of examples 36 or 37, furthercomprising setting the data management indicator to restore InternetProtocol Bundling when the degradation of the real-time critical serviceresolves.

In Example 42, the method of any one of examples 1 and 3 through 41,further comprising a real-time critical service being any service thatexperiences a degradation from Internet Protocol Packet bundling.

In Example 43, the method of any one of examples 1 or 3 through 42,further comprising the data management indicator precluding InternetProtocol Packet bundling only when time-critical services are degraded.

In Example 44, the method of any one of examples 1 or 3 through 43,wherein an Application layer determines the data management indicatorbased on a degradation of a Real-Time Critical Service.

In Example 45, the method of any one of examples 1 or 3 through 44,further comprising setting the data management indicator to reduceInternet Protocol Bundling only where a Real-Time Critical Serviceexperiences degradation.

In Example 46, the method of any one of examples 1 or 3 through 44,further comprising setting the data management indicator to increaseInternet Protocol Bundling where degradation of a Real-Time CriticalService improves.

In Example 47, the method of any one of examples 1 through 46, furtherdisclosing a layer of a protocol stack determining a degradation of areal-time critical service and setting a data management indicatorbecause of the degradation of a real-time critical service.

In Example 48, the method of any one of examples 1 through 47, furthercomprising, for each Internet Protocol Packet received, delivering theInternet Protocol Packet from the first layer of the protocol stack tothe second layer of the protocol stack on a transmission time intervalimmediately after a transmission time interval when the first layer ofthe protocol stack received the Internet Protocol Packet.

In Example 49, the method of any one of examples 1 through 47, furthercomprising, for each Internet Protocol Packet received, delivering theInternet Protocol Packet from the first layer of the protocol stack tothe second layer of the protocol stack on a transmission time intervalimmediately after a transmission time interval when the first layer ofthe protocol stack received the Internet Protocol Packet, based on theoperation of a real-time critical service.

In Example 50, the method of any one of examples 1 through 47, furthercomprising, for each Internet Protocol Packet received, delivering theInternet Protocol Packet from the first layer of the protocol stack tothe second layer of the protocol stack on a transmission time intervalimmediately after a transmission time interval when the first layer ofthe protocol stack received the Internet Protocol Packet, based on theoperation of a data management indicator.

In Example 51, the method of any one of examples 1 through 50, furthercomprising an application layer determining whether a real-time criticalservice is operating and informing a Packet Data Convergence Protocol ofthe determination.

In Example 52, the method of example 51, further comprising the PacketData Convergence Protocol setting the data management indicator forconversational voice services that are routed over a default bearerusing the determination received from an application layer.

In Example 53, the method of any one of examples 1 to 52, furthercomprising delivering an Internet Protocol Packet from the first layerof the protocol stack to the second layer of the protocol stack on atransmission time interval immediately after reception of the InternetProtocol Packet, whenever the maximum delay for delivery of the InternetProtocol Packets is zero.

In Example 54, an apparatus comprising means to perform a method asdescribed in any preceding example.

In Example 55, a circuit configuration for managing Internet ProtocolPacket bundling, said circuit configuration comprising:

a sensing circuit configured to determine that a real-time criticalservice is operating on a mobile device;a logic circuit configured to identify a data management indicator forthe real-time critical service;a protocol stack management circuit configured to determine a maximumdelay for delivery of Internet Protocol Packets from a first layer of aprotocol stack to a second layer of the protocol stack, where thereal-time critical service is operating, and based on the datamanagement indicator;wherein:the protocol stack management circuit receives in the first layer of theprotocol stack a number of Internet Protocol Packets during a periodequaling the maximum delay for delivery of Internet Protocol Packetsfrom a first layer of a protocol stack to a second layer of the protocolstack; andbundles and delivers the Internet Protocol Packets from the first layerof a protocol stack to the second layer of the protocol stack at aconclusion of the period equaling the maximum delay for delivery.

In Example 56, the circuit configuration of example 55, furthercomprising the circuit configuration being present in a mobilecommunication device.

In Example 57, the circuit configuration of example 55, furthercomprising the circuit configuration being present in a desktopcomputer, laptop computer, tablet computer, or smartphone.

In Example 58, the circuit configuration of example 55, furthercomprising the circuit configuration being present in a wearable deviceconfigured for wireless connectivity.

In Example 59, the circuit configuration of example 55, furthercomprising the circuit configuration being present in a motor vehicle.

In Example 60, the circuit configuration of example 55, furthercomprising the circuit configuration being present in a home appliance,a home defense system, a home management system, or a home surveillancesystem.

In Example 61, a means for management of Internet Protocol Packetbundling, wherein said means:

determines that a real-time critical service is operating on a mobiledevice;determines a data management indicator for the real-time criticalservice;where the real-time critical service is operating, and based on the datamanagement indicator, determines a maximum delay for delivery ofInternet Protocol Packets from a first layer of a protocol stack to asecond layer of the protocol stack;receives a number of Internet Protocol Packets in the first layer of theprotocol stack over a period of time corresponding to the maximum delayfor delivery; and bundles and delivers the Internet Protocol Packetsfrom the first layer of a protocol stack to the second layer of theprotocol stack at a conclusion of the period of time corresponding tothe maximum delay for delivery.

In Example 62, a means for management of Internet Protocol Packetbundling, wherein said means:

determines whether a real-time critical service is operating on a mobiledevice;where the real-time critical service is operating, determines a maximumdelay for delivery of Internet Protocol Packets from a first layer of aprotocol stack to a second layer of the protocol stack;receives a number of Internet Protocol Packets in the first layer of theprotocol stack over a period of time corresponding to the maximum delayfor delivery; and bundles and delivers the Internet Protocol Packetsfrom the first layer of a protocol stack to the second layer of theprotocol stack at a conclusion of the period of time corresponding tothe maximum delay for delivery.

In Example 63, a non-transient computer readable medium containingprogram instructions for causing a computer to perform In Example 1, themethod of:

determining whether a real-time critical service is operating on amobile device;determining a data management indicator for the real-time criticalservice;where the real-time critical service is operating, and based on the datamanagement indicator, determining a maximum delay for delivery ofInternet Protocol Packets from a first layer of a protocol stack to asecond layer of the protocol stack;receiving a number of Internet Protocol Packets in the first layer ofthe protocol stack over a period of time corresponding to the maximumdelay for delivery; andbundling and delivering the Internet Protocol Packets from the firstlayer of a protocol stack to the second layer of the protocol stack at aconclusion of the period of time corresponding to the maximum delay fordelivery.

In Example 64, a non-transient computer readable medium containingprogram instructions for causing a computer to perform In Example 1, themethod of:

determining whether a real-time critical service is operating on amobile device;where the real-time critical service is operating, determining a maximumdelay for delivery of Internet Protocol Packets from a first layer of aprotocol stack to a second layer of the protocol stack;receiving a number of Internet Protocol Packets in the first layer ofthe protocol stack over a period of time corresponding to the maximumdelay for delivery; andbundling and delivering the Internet Protocol Packets from the firstlayer of a protocol stack to the second layer of the protocol stack at aconclusion of the period of time corresponding to the maximum delay fordelivery.

In Example 65, a machine-readable medium including code, when executed,to cause a machine to perform In Example 1, the method of any one ofexamples 1 through 60.

In Example 66, a method for managing Internet Protocol Packet bundling,said method comprising:

determining whether a real-time critical service is operating on amobile device;determining a data management indicator for the real-time criticalservice;where the real-time critical service is operating, and based on the datamanagement indicator, determining a maximum number of Internet ProtocolPackets for bundled delivery from a first layer of a protocol stack to asecond layer of the protocol stack;receiving in the first layer of the protocol stack a number of InternetProtocol Packets totaling the maximum number of Internet ProtocolPackets for bundled delivery;where the maximum number of Internet Protocol Packets for bundleddelivery is greater than one, bundling the maximum number of InternetProtocol Packets for bundled delivery, and delivering the bundledmaximum number of Internet Protocol Packets for bundled delivery fromthe first layer of the protocol stack to the second layer of theprotocol stack; andwhere the maximum number of Internet Protocol Packets for bundleddelivery is less than two, delivering Internet Protocol Packets receivedby the first layer of the protocol stack on a first transmission timeinterval to the second layer of the protocol stack on a secondtransmission time interval occurring immediately following the firsttransmission time interval.

In Example 67, a method for managing Internet Protocol Packet bundling,said method comprising:

determining whether a real-time critical service is operating on amobile device;where the real-time critical service is operating, determining a maximumnumber of Internet Protocol Packets for bundled delivery from a firstlayer of a protocol stack to a second layer of the protocol stack;receiving in the first layer of the protocol stack a number of InternetProtocol Packets totaling the maximum number of Internet ProtocolPackets for bundled delivery;where the maximum number of Internet Protocol Packets for bundleddelivery is greater than one, bundling the maximum number of InternetProtocol Packets for bundled delivery, and delivering the bundledmaximum number of Internet Protocol Packets for bundled delivery fromthe first layer of the protocol stack to the second layer of theprotocol stack; andwhere the maximum number of Internet Protocol Packets for bundleddelivery is less than two, delivering Internet Protocol Packets receivedby the first layer of the protocol stack on a first transmission timeinterval to the second layer of the protocol stack on a secondtransmission time interval occurring immediately following the firsttransmission time interval.

In Example 68, the method of any one of examples 66 or 67, furthercomprising Voice over Internet Protocol being a real-time criticalservice.

In Example 69, the method of any one of examples 65 or 66, furthercomprising Voice over LTE being a real-time critical service.

In Example 70, the method of any one of examples 65 or 66, furthercomprising Voice over 5G being a real-time critical service.

In Example 71, the method of any one of examples 65 or 66, furthercomprising real-time gaming being a real-time critical service.

In Example 72, the method of any one of examples 65 or 66, furthercomprising non-buffered video being a real-time critical service.

In Example 73, the method of any one of examples 65 through 72, whereinthe maximum number of Internet Protocol Packets to bundle is one.

In Example 74, the method of any one of examples 65 through 72, whereinthe maximum number of Internet Protocol Packets to bundle is zero.

In Example 75, the method of any one of examples 65 through 72, whereinthe maximum number of Internet Protocol Packets to bundle is less thantwo.

In Example 76, the method of any one of examples 65 through 75, furthercomprising an application layer setting the data management indicator todiscontinue Internet Protocol Packet bundling.

In Example 77, the method of any one of examples 65 through 76, furthercomprising an application layer setting the data management indicator toreduce Internet Protocol Packet bundling.

In Example 78, the method of any one of examples 65 through 77, furthercomprising the Internet Protocol Packet being a protocol data unit.

In Example 79, the method of example 78, further comprising the ProtocolData Unit being a Protocol Data Unit according to a Packet DataConvergence Protocol.

In Example 80, the method of any one of examples 65 through 79, furthercomprising setting the data management indicator to reduce the maximumnumber of Internet Protocol Packets for bundled delivery whenever areal-time critical service is operating.

In Example 81, the method of any one of examples 65 through 80, furthercomprising setting the data management indicator to discontinue InternetProtocol Bundling whenever a real-time critical service is operating.

In Example 82, the method of any one of examples 65 through 81, furthercomprising setting the maximum number of Internet Protocol Packets forbundled delivery to one when a real-time critical service is operating.

In Example 83, the method of any one of examples 65 through 82, furthercomprising setting the maximum number of Internet Protocol Packets forbundled delivery to zero when a real-time critical service is operating.

In Example 84, the method of any one of examples 65 through 83, furthercomprising setting the maximum number of Internet Protocol Packets forbundled delivery to an integer less than 2, when a real-time criticalservice is operating.

In Example 85, the method of any one of examples 65 through 84, furthercomprising determining a real-time critical service to be operatingwherein at least one dedicated bearer or default bearer is operatingwith a Quality of Service Class Identifier of 1.

In Example 86, the method of any one of examples 65 through 84, furthercomprising determining a real-time critical service to be operatingwherein at least one dedicated bearer or default bearer is operatingwith a Quality of Service Class Identifier of 2.

In Example 87, the method of any one of examples 65 through 84, furthercomprising determining a real-time critical service to be operatingwherein at least one dedicated bearer or default bearer is operatingwith a Quality of Service Class Identifier of 3.

In Example 88, the method of any one of examples 65 through 84, furthercomprising determining a real-time critical service to be operatingwherein at least one dedicated bearer or default bearer is operatingwith a Quality of Service Class Identifier of 1, 2, or 3.

In Example 89, the method of any one of examples 65 through 88, furthercomprising determining a real-time critical service to not be operatingwherein all Quality of Service Class Identifiers are greater than 3.

In Example 90, the method of any one of examples 65 through 89, furthercomprising determining a real-time critical service to be operating dueto a low QoS Class Identifier value.

In Example 91, the method of example 90, wherein the low QoS ClassIdentifier value is a value of 1 for conversational voice.

In Example 92, the method of example 90, wherein the low QoS ClassIdentifier value is a value of 2 for conversational video.

In Example 93, the method of example 90, wherein the low QoS ClassIdentifier value is a value of 3 for real time gaming.

In Example 94, the method of any one of examples 65 through 93, whereina layer within a protocol stack determines whether a real-time criticalservice is in operation.

In Example 95, the method of any one of examples 65 through 94, whereinan Application layer within a protocol stack determines whether areal-time critical service is in operation.

In Example 96, the method of any one of examples 65 through 95, whereinan Application layer within a protocol stack determines a real-timecritical service to be operating on the mobile device.

In Example 97, the method of any one of examples 65 through 96, furthercomprising an Application layer determining the data managementindicator for the real-time critical service.

In Example 98, the method of any one of examples 65 through 97, furthercomprising determining a maximum number of Internet Protocol Packets forbundled delivery from a first layer of a protocol stack to a secondlayer of the protocol stack and based on the data management indicator.

In Example 99, the method of any one of examples 65 through 98, furthercomprising Internet Protocol Packet-based voice communications being areal-time critical service.

In Example 100, the method of any one of examples 65 through 99, furthercomprising an Application layer determining that Internet ProtocolPacket-based voice communications is a real-time critical service.

In Example 101, the method of any one of examples 65, and 67 through100, further comprising determining a level of degradation of thereal-time critical service.

In Example 102, the method of example 101, further comprising settingthe data management indicator based the level of degradation of thereal-time critical service.

In Example 103, the method of examples 101 or 102, further comprisingsetting the data management indicator to discontinue Internet ProtocolBundling because of degradation of the real-time critical service.

In Example 104, the method of examples 101 or 102, further comprisingsetting the data management indicator to reduce Internet ProtocolBundling because of degradation of the real-time critical service.

In Example 105, the method of any one of examples 66 through 104,further comprising setting the data management indicator to increaseInternet Protocol Bundling when a degradation of the real-time criticalservice improves.

In Example 106, the method of any one of examples 66 through 105,further comprising setting the data management indicator to restoreInternet Protocol Bundling when a degradation of the real-time criticalservice resolves.

In Example 107, the method of any one of examples 66 through 106,further comprising prohibiting Internet Protocol Bundling only where adegradation of the real-time critical service is present.

In Example 108, the method of any one of examples 66 and 68 through 106,further comprising a real-time critical service being any service thatexperiences a degradation from Internet Protocol Packet bundling.

In Example 109, the method of any one of examples 66 through 108,further comprising the data management indicator precluding InternetProtocol Packet bundling only when time-critical services are degraded.

In Example 110, the method of any one of examples 66 through 109,wherein an Application layer determines the data management indicatorbased on a degradation of a Real-Time Critical Service.

In Example 111, the method of any one of examples 66 through 110,further comprising setting the data management indicator to reduceInternet Protocol Bundling only where a Real-Time Critical Serviceexperiences degradation.

In Example 112, the method of any one of examples 66 through 111,further comprising setting the data management indicator to increaseInternet Protocol Bundling where degradation of a Real-Time CriticalService improves.

In Example 113, the method of any one of examples 66 through 112,further disclosing a layer of a protocol stack determining a degradationof a real-time critical service and setting a data management indicatorbecause of the degradation of a real-time critical service.

In Example 114, the method of any one of examples 66 through 113,further comprising, for each Internet Protocol Packet received,delivering the Internet Protocol Packet from the first layer of theprotocol stack to the second layer of the protocol stack on atransmission time interval immediately after a transmission timeinterval when the first protocol stack received the Internet ProtocolPacket.

In Example 115, the method of any one of examples 66 through 114,further comprising an application layer determining whether a real-timecritical service is operating and informing a Packet Data ConvergenceProtocol of the determination.

In Example 116, the method of example 115, further comprising the PacketData Convergence Protocol setting the data management indicator forconversational voice services that are routed over a default bearerusing the determination received from an application layer.

In Example 117, an apparatus comprising means to perform a method asdescribed in any preceding example.

In Example 118, a circuit configuration for managing Internet ProtocolPacket bundling, said circuit configuration comprising:

a sensing circuit, configured to determine whether a real-time criticalservice is operating on a mobile device;a logic circuit, configured to determine a data management indicator forthe real-time critical service;a protocol stack management circuit, configured to determine a maximumnumber of Internet Protocol Packets for bundled delivery from a firstlayer of a protocol stack to a second layer of the protocol stack, wherethe real-time critical service is operating, and based on the datamanagement indicator;wherein the sensing circuit determines whether a real-time criticalservice is operating on a mobile device;the logic circuit determines a data management indicator for thereal-time critical service;a protocol stack management circuit determines a maximum number ofInternet Protocol Packets for bundled delivery from a first layer of aprotocol stack to a second layer of the protocol stack, where thereal-time critical service is operating, and based on the datamanagement indicator;wherein the protocol stack management circuit receives in the firstlayer of the protocol stack a number of Internet Protocol Packetstotaling the maximum number of Internet Protocol Packets for bundleddelivery;wherein, when the maximum number of Internet Protocol Packets forbundled delivery is greater than one, the protocol stack managementcircuit bundles the maximum number of Internet Protocol Packets forbundled delivery, and delivers the bundled maximum number of InternetProtocol Packets for bundled delivery from the first layer of theprotocol stack to the second layer of the protocol stack;and wherein, when the maximum number of Internet Protocol Packets forbundled delivery is less than two, the protocol stack management circuitdelivers Internet Protocol Packets received by the first layer of theprotocol stack on a first transmission time interval to the second layerof the protocol stack on a second transmission time interval occurringimmediately following the first transmission time interval.

In Example 119, the circuit configuration of example 118, furthercomprising the circuit configuration being present in a mobilecommunication device.

In Example 120, the circuit configuration of example 118, furthercomprising the circuit configuration being present in a desktopcomputer, laptop computer, tablet computer, or smartphone.

In Example 121, the circuit configuration of example 118, furthercomprising the circuit configuration being present in a wearable deviceconfigured for wireless connectivity.

In Example 122, the circuit configuration of example 118, furthercomprising the circuit configuration being present in a motor vehicle.

In Example 123, the circuit configuration of example 118, furthercomprising the circuit configuration being present in a home appliance,a home defense system, a home management system, or a home surveillancesystem.

In Example 124, a means for management of Internet Protocol Packetbundling, wherein said means:

determines whether a real-time critical service is operating on a mobiledevice;determines a data management indicator for the real-time criticalservice;where the real-time critical service is operating, and based on the datamanagement indicator, determines a maximum number of Internet ProtocolPackets for bundled delivery from a first layer of a protocol stack to asecond layer of the protocol stack;receives in the first layer of the protocol stack a number of InternetProtocol Packets totaling the maximum number of Internet ProtocolPackets for bundled delivery;where the maximum number of Internet Protocol Packets for bundleddelivery is greater than one, bundles the maximum number of InternetProtocol Packets for bundled delivery, and delivers the bundled maximumnumber of Internet Protocol Packets for bundled delivery from the firstlayer of the protocol stack to the second layer of the protocol stack;andwhere the maximum number of Internet Protocol Packets for bundleddelivery is less than two, delivers Internet Protocol Packets receivedby the first layer of the protocol stack on a first transmission timeinterval to the second layer of the protocol stack on a secondtransmission time interval occurring immediately following the firsttransmission time interval.

In Example 125, a means for management of Internet Protocol Packetbundling, wherein said means:

determines whether a real-time critical service is operating on a mobiledevice;where the real-time critical service is operating, determines a maximumnumber of Internet Protocol Packets for bundled delivery from a firstlayer of a protocol stack to a second layer of the protocol stack;receives in the first layer of the protocol stack a number of InternetProtocol Packets totaling the maximum number of Internet ProtocolPackets for bundled delivery;where the maximum number of Internet Protocol Packets for bundleddelivery is greater than one, bundles the maximum number of InternetProtocol Packets for bundled delivery, and delivers the bundled maximumnumber of Internet Protocol Packets for bundled delivery from the firstlayer of the protocol stack to the second layer of the protocol stack;andwhere the maximum number of Internet Protocol Packets for bundleddelivery is less than two, delivers Internet Protocol Packets receivedby the first layer of the protocol stack on a first transmission timeinterval to the second layer of the protocol stack on a secondtransmission time interval occurring immediately following the firsttransmission time interval.

In Example 126, a non-transient computer readable medium containingprogram instructions for causing a computer to perform In Example 1, themethod of:

determining whether a real-time critical service is operating on amobile device;determining a data management indicator for the real-time criticalservice;where the real-time critical service is operating, and based on the datamanagement indicator, determining a maximum number of Internet ProtocolPackets for bundled delivery from a first layer of a protocol stack to asecond layer of the protocol stack;receiving in the first layer of the protocol stack a number of InternetProtocol Packets totaling the maximum number of Internet ProtocolPackets for bundled delivery;where the maximum number of Internet Protocol Packets for bundleddelivery is greater than one, bundling the maximum number of InternetProtocol Packets for bundled delivery, and delivering the bundledmaximum number of Internet Protocol Packets for bundled delivery fromthe first layer of the protocol stack to the second layer of theprotocol stack; andwhere the maximum number of Internet Protocol Packets for bundleddelivery is less than two, delivering Internet Protocol Packets receivedby the first layer of the protocol stack on a first transmission timeinterval to the second layer of the protocol stack on a secondtransmission time interval occurring immediately following the firsttransmission time interval.

In Example 127, a non-transient computer readable medium containingprogram instructions for causing a computer to perform In Example 1, themethod of:

determining whether a real-time critical service is operating on amobile device;where the real-time critical service is operating, determining a maximumnumber of Internet Protocol Packets for bundled delivery from a firstlayer of a protocol stack to a second layer of the protocol stack;receiving in the first layer of the protocol stack a number of InternetProtocol Packets totaling the maximum number of Internet ProtocolPackets for bundled delivery;where the maximum number of Internet Protocol Packets for bundleddelivery is greater than one, bundling the maximum number of InternetProtocol Packets for bundled delivery, and delivering the bundledmaximum number of Internet Protocol Packets for bundled delivery fromthe first layer of the protocol stack to the second layer of theprotocol stack; andwhere the maximum number of Internet Protocol Packets for bundleddelivery is less than two, delivering Internet Protocol Packets receivedby the first layer of the protocol stack on a first transmission timeinterval to the second layer of the protocol stack on a secondtransmission time interval occurring immediately following the firsttransmission time interval.

In Example 128, a machine-readable medium including code, when executed,to cause a machine to perform In Example 1, the method of any one ofexamples 66 through 116.

What is claimed is:
 1. A method for managing Internet Protocol PacketBundling, said method comprising: determining that a real-time criticalservice is operating on a mobile device; identifying a data managementindicator for the real-time critical service; where the real-timecritical service is operating, determining a maximum delay for deliveryof Internet Protocol Packets from a first layer of a protocol stack to asecond layer of the protocol stack, based on the data managementindicator; receiving one or more Internet Protocol Packets in the firstlayer of the protocol stack over a duration corresponding to the maximumdelay for delivery; and bundling and delivering the received one or moreInternet Protocol Packets from the first layer of the protocol stack tothe second layer of the protocol stack at a conclusion of the durationcorresponding to the maximum delay for delivery.
 2. The method of claim1, further comprising Voice over Internet Protocol being a real-timecritical service.
 3. The method of claim 1, further comprising Voiceover 5^(th) Generation being a real-time critical service.
 4. The methodof claim 1, further comprising real-time gaming being a real-timecritical service.
 5. The method of claim 1, further comprising themaximum delay for delivery of Internet Protocol Packets being a numberof transmission time intervals.
 6. The method of claim 1, furthercomprising an application layer setting the data management indicator todiscontinue Internet Protocol Packet Bundling.
 7. The method of claim 1,further comprising an application layer setting the data managementindicator to reduce the maximum delay for delivery of Internet ProtocolPackets.
 8. The method of claim 1, further comprising the InternetProtocol Packet being a protocol data unit.
 9. The method of claim 8,further comprising the Protocol Data Unit being a Protocol Data Unitaccording to a Packet Data Convergence Protocol.
 10. The method of claim1, further comprising setting the data management indicator to reducethe maximum delay for delivery of Internet Protocol Packets whenever areal-time critical service is operating.
 11. The method of claim 1,further comprising setting the data management indicator to set themaximum delay for delivery of Internet Protocol Packets to zero whenevera real-time critical service is operating.
 12. The method of claim 1,further comprising setting the data management indicator to discontinueInternet Protocol Packet Bundling whenever a real-time critical serviceis operating.
 13. The method of claim 1, further comprising determininga real-time critical service to be operating wherein at least onededicated bearer or default bearer is operating with a Quality ofService Class Identifier of 1, 2, or
 3. 14. The method of claim 1,further comprising determining a real-time critical service to not beoperating wherein all Quality of Service Class Identifiers are greaterthan
 3. 15. The method of claim 1, wherein an Application layer within aprotocol stack determines whether a real-time critical service is inoperation.
 16. The method of claim 1, further comprising determining alevel of degradation of the real-time critical service.
 17. The methodof claim 16, further comprising setting the data management indicatorbased the level of degradation of the real-time critical service. 18.The method of claim 17, further comprising setting the data managementindicator to increase Internet Protocol Bundling when the level ofdegradation of the real-time critical service improves.
 19. The methodof claim 1, further comprising a real-time critical service being anyservice that experiences a degradation from Internet Protocol PacketBundling.
 20. A method for managing Internet Protocol Packet Bundling,said method comprising: determining whether a real-time critical serviceis operating on a mobile device; where the real-time critical service isoperating, determining a maximum number of Internet Protocol Packets forbundled delivery from a first layer of a protocol stack to a secondlayer of the protocol stack; receiving in the first layer of theprotocol stack a number of Internet Protocol Packets totaling themaximum number of Internet Protocol Packets for bundled delivery; wherethe maximum number of Internet Protocol Packets for bundled delivery isgreater than one, bundling the maximum number of Internet ProtocolPackets for bundled delivery, and delivering the bundled maximum numberof Internet Protocol Packets for bundled delivery from the first layerof the protocol stack to the second layer of the protocol stack; andwhere the maximum number of Internet Protocol Packets for bundleddelivery is less than two, delivering Internet Protocol Packets receivedby the first layer of the protocol stack on a first transmission timeinterval to the second layer of the protocol stack on a secondtransmission time interval occurring immediately following the firsttransmission time interval.
 21. A circuit configuration for managingInternet Protocol Packet Bundling, said circuit configurationcomprising: a sensing circuit configured to determine that a real-timecritical service is operating on a mobile device; a logic circuitconfigured to identify a data management indicator for the real-timecritical service; a protocol stack management circuit configured todetermine a maximum delay for delivery of Internet Protocol Packets froma first layer of a protocol stack to a second layer of the protocolstack, where the real-time critical service is operating, and based onthe data management indicator; wherein: the protocol stack managementcircuit receives in the first layer of the protocol stack a number ofInternet Protocol Packets during a period equaling the maximum delay fordelivery of Internet Protocol Packets from a first layer of a protocolstack to a second layer of the protocol stack; and bundles and deliversthe Internet Protocol Packets from the first layer of a protocol stackto the second layer of the protocol stack at a conclusion of the periodequaling the maximum delay for delivery.
 22. The circuit configurationof claim 21, further comprising the circuit configuration being presentin a mobile communication device.
 23. The circuit configuration of claim21, further comprising the circuit configuration being present in adesktop computer, laptop computer, tablet computer, or smartphone. 24.The circuit configuration of claim 21, further comprising the circuitconfiguration being present in a wearable device configured for wirelessconnectivity.
 25. The circuit configuration of claim 21, furthercomprising the circuit configuration being present in a motor vehicle.