System and method for dynamic allocation of capacity on wireless networks

ABSTRACT

A wireless communication system is described for allocating limited network access according to priorities designated for requested transactions of wireless communications. The wireless network has a number of access links for transmitting transactions for wireless communications. A plurality of wireless communications devices requests transmission of transactions on the wireless network. A designated priority level is associated with each transaction. In response to the transaction requests, an access control manager in the wireless network schedules transmission of transactions when all of the plurality of access links are occupied, by authorizing a transmission of a transaction of higher priority than another transaction that is being transmitted, and discontinuing the transmission of the transaction of lower priority.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.13/586,962, now U.S. Pat. No. 8,718,007, entitled “System and Method forDynamic Allocation of Capacity on Wireless Networks” filed Aug. 16,2012, which is a continuation of U.S. patent application Ser. No.12/144,050, now U.S. Pat. No. 8,265,018, entitled “System and Method forDynamic Allocation of Capacity on Wireless Networks” filed Jun. 23,2008, which is a continuation of U.S. patent application Ser. No.11/248,857, now U.S. Pat. No. 7,420,981, entitled “System and Method forDynamic Allocation of Capacity on Wireless Networks” filed Oct. 12,2005, which is a continuation of U.S. patent application Ser. No.09/559,594, now U.S. Pat. No. 7,050,445, entitled “System and Method forDynamic Allocation of Capacity on Wireless Networks” filed Apr. 28,2000, which is a continuation-in-part of U.S. patent application Ser.No. 08/903,534, now U.S. Pat. No. 6,069,882, entitled “System and Methodfor Providing Data Services Using Idle Cell Resources” filed Jul. 30,1997, which are all incorporated herein by reference in theirentireties. This application also incorporates by reference in itsentirety U.S. Pat. No. 7,046,643 entitled “Method for DynamicMulti-Level Pricing for Wireless Communication According to Quality ofService” filed Apr. 28, 2000.

FIELD OF THE INVENTION

The present invention relates to wireless communication services, andmore particularly, to a system and method for dynamic allocation oflimited capacity on a wireless network.

BACKGROUND OF THE INVENTION

Through the combination of wireless telephony and mobile computingtechnologies, digital wireless handsets are now available that can allowusers to communicate with others by voice, e-mail, paging, facsimile,etc., and to transmit or receive information through the internet over awireless network. Manufacturers of internet-capable telephones andpersonal digital assistants (PDA's) are coordinating with internet website content providers to develop specialized versions of popular websites for wireless access and interaction. In almost any location, whilestationary or while in motion, consumers can use wireless networks tobrowse the world-wide web, participate in e-commerce transactions, joinothers through interactive game software, or communicate with others byvoice or by other means through transmission of data.

In cellular communications over circuit-switched wireless networks, alink is established through radio signals over channels between a mobiletransmitter/receiver and a nearby cell tower. Circuit-switched networksmaintain a continuing or dedicated connection throughout the duration ofa communication. This is known to be inefficient for “bursty” typecommunications, because the dedicated lines occupy the limited bandwidthin the network for the duration of the communication, even duringperiods of time when information signals are not being transmitted. Thecircuit-switched protocol is also inefficient for voice communications,because there are gaps of silence in most voice communications in whichno signal needs to be transmitted.

In packet switched networks, data is divided into ‘envelopes’ ofinformation that contain address, error checking, and user data. If adata communication is not continuous, as is typically the case, thecommunications link can be occupied by packets from other communicationsduring the periods of downtime. In a packet switched wireless network,information is transmitted to and from mobile transmitter/receiversthrough radio signals in the format of discrete packets, instead ofthrough a continuous communications link. The packets are assembledtogether when received to reconstruct the communication, which is a“transaction.” Therefore, portions of multiple different datacommunications can be transmitted along the same communications link,instead of waiting for one communication to end before another canbegin.

For wireless communications, a bottleneck occurs during busy periodsthat can slow down communications because there are a limited number ofaccess points into the wireless network. When a packet switched wirelessnetwork is operating near capacity, the mobile transmitters/receiversmay have to wait before sending or receiving packets for communications.While a transmission delay may not be significant for an e-mailcommunication or a file transfer, the delay is probably not acceptablefor voice-over-IP telephony or other time-sensitive communications.Accordingly, problems exist when sending or receiving urgent data overpacket switched wireless networks during busy periods of networkcongestion.

SUMMARY OF THE INVENTION

The present invention allocates network access for transactions in awireless network according to the priority levels associated with thetransactions. When all access links are occupied on the wirelessnetwork, an access control manager in the wireless network discontinuestransmission of a low priority transaction in favor of a higher prioritytransaction. When a transaction is discontinued, the transaction datathat was not transmitted is maintained in a data buffer. When thetransaction is resumed later, the remaining transaction data is removedfrom the data buffer. There can be data remaining in the data bufferfrom several different transactions of different priorities. Requests toresume transactions occur in an order according to the relative prioritydesignated for the different transactions in the data buffer.

A wireless handset, or a wireless communications device, generatestransactions through user applications operating in the handset. Thetransactions can have a default priority level, or the priority levelscan be selected by the user. E-mail and voice-over-IP transactions arediscussed, wherein the transaction is periodically discontinued, orsuspended, in favor of a higher priority transaction.

In accordance with the present invention, a wireless communicationsystem is described for allocating limited network access according topriorities designated for requested transactions of wirelesscommunications. The wireless network has a number of access links fortransmitting transactions for wireless communications. A plurality ofwireless communications devices request transmission of transactions onthe wireless network. A designated priority level is associated witheach transaction. In response to the transaction requests, an accesscontrol manager in the wireless network schedules transmission oftransactions when all of the plurality of access links are occupied, byauthorizing a transmission of a transaction of higher priority thananother transaction that is being transmitted, and discontinuing thetransmission of the transaction of lower priority.

The present invention also provides a wireless communications device foruse in a wireless communication system. The communications deviceincludes at least one user application configured to send data to awireless network or receive data from the wireless network as part of atransaction. A data buffer in the wireless communications device storestransaction data to be sent by the user application before transmissionalong the wireless network. A communications manager in the wirelesscommunications device generates a control message to be transmitted tothe wireless network to request transmission of a transaction. Thecontrol message includes an identification code for the wirelesscommunications device and a priority level associated with thetransaction.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram of a wireless communication systemaccording to the preferred embodiment of the present invention.

FIG. 2 is a flow diagram of the steps for configuring a transaction fortransmission on the wireless network according to the preferredembodiment of the present invention.

FIG. 3 is a flow diagram of the steps for transmitting a transaction onthe wireless network from a wireless communications device according tothe preferred embodiment of the present invention.

FIG. 4 is a flow diagram of the steps for allocating capacity on thewireless network for transmission of data packets to a wirelesscommunications device according to the preferred embodiment of thepresent invention.

FIG. 5A is a chart of transmission priority levels allocated for ane-mail application by a network, a user application, and a consumeraccording to the present invention.

FIG. 5B is a chart of transmission priority levels allocated for a filetransfer application by a network, a user application, and a consumeraccording to the present invention.

FIG. 5C is a chart of transmission priority levels allocated for avoice-over-IP application by a network, a user application, and aconsumer according to the present invention.

FIG. 6A is a table of steps for transmitting data packets across awireless network for an e-mail application according to the preferredembodiment of the present invention.

FIG. 6B is a table of steps for transmitting data packets across awireless network for a voice-over-IP application according to thepreferred embodiment of the present invention.

FIG. 7 is a table of steps for transmitting data packets across awireless network from a plurality of user applications in a wirelesscommunications device.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS OF THE INVENTION

FIG. 1 is a schematic diagram of the multi-level wireless networkservice of the present invention. Mobile transmitter/receiver handsets,such as a handset 10, are physically located in close proximity to celltower 13, which is part of a packet switched wireless network. Eachhandset is capable of supporting at least one or any number ofapplications, and contains a queue, or buffer, for temporarily storingdata packets to be communicated to cell tower 13. A communicationsmanager in the handset stores control information to be transmitted tocell tower 13 to initiate a wireless communication. For example, HandsetA 10 is capable of running at least three applications, App. A1, App.A2, and App. A3, labeled 10 a-10 c, respectively, and contains queue 10d and communications manager 10 e. Cell tower 13 transmits and receivesradio frequency signals within a general region or cell.

The handsets may be portable, such as cellular telephones, PDA's, orportable game systems, or any other mobile communications unit. However,the present invention can also be used with any device capable ofengaging in wireless communications, which may also be fixed, orintegrated into an immovable object.

Cell tower 13 is in communication with access control manager 14. Accesscontrol manager 14 communicates with a plurality of cell towers tocontrol access to the wireless network. Access control manager 14 may beregionally located, as one of several access control managers on anetwork, or may be centrally located for the entire network. Accesscontrol manager 14 communicates with access buffer 15, which stores datareceived from the internet 16 before it is transmitted on the wirelessnetwork. The internet can be operatively connected to a variety ofservers, such as interactive game server 17, e-mail server 18, andvoice-over-IP telephone server 19.

The applications supported by the handsets are configured to communicatewith the wireless network at one or more priority levels. Theapplications may include services such as e-mail, instant mail, unifiedmessaging, short messaging, paging, world-wide web browsing, pointcast,interactive action games, internet telephony, internet facsimile, filetransfer, etc. The priority levels are used by the access controlmanager 14 in the wireless network to determine the relative order ofaccess to the wireless network for different applications during periodsof congestion. Each application may have a default priority level. Forexample, internet telephony applications, which require rapidtransmission of data packets in order to carry a natural-sounding voicecommunication, will likely have a higher default priority level than ane-mail application, which can usually be delayed without a noticeableeffect.

To provide dynamic quality of service adjustments, many applications canbe configured to operate at several different priority levels accordingto the relative importance of a particular transaction to a user. As anexample, a user may request to send an e-mail at a higher priority thanthe default level, when the e-mail contains time sensitive informationand the delivery time is critical. By charging users for access to thenetwork according to the priority level for each transaction, the usershave a financial incentive to reserve designating high prioritytransactions for applications for which quick transmission is important.The priority levels can also be associated with control mechanisms inother networks, both wired and wireless, to provide end-to-end qualityof service capability. For example, for wireless devices that arecapable of Internet access, the priority levels can affect the qualityof service across both the wireless network and the Internet network.

FIG. 2 provides a flow diagram of the steps for initiating a transactionfrom an application in a handset to transmit data along the wirelessnetwork, from the perspective of a controller in a handset. In step 20,a transaction request is received from a user application in a handset.As discussed above, this transaction request could relate to sending orreceiving an e-mail, engaging in voice-over-IP, receiving a filetransfer, etc. The handset next detects in step 21 whether thetransaction that is requested is at the default priority or at auser-specified priority. A control packet(s) is configured according tothe requested priority or default priority level in steps 22 and 23,respectively. The control packets might include bits for any or all ofthe following: establish connection, desired data rate, priority level,symmetric or asymmetric transmission, encryption on/off, acceptabledelay, estimated quantity of data to transmit or expected duration,destination point of session (IP address), originating device ID, etc.

In step 24, the data in the user application that is to be transmittedis transferred or coded as a series of packets and placed into a queuein the handset. In step 25, the control packet(s) is then transmitted bya radio signal to the nearby cell tower to send a transaction request tothe access control manager. The control packet includes anidentification code for the handset and the priority level for thetransaction.

If, from the user's perspective, the transaction is a single event, suchas sending an e-mail communication, the handset allows the user toengage in other activities once the e-mail communication is placed inthe queue. The subsequent transmission of the plurality of data packetsin the queue, either individually or in groups, can occur transparentlyto the user. When the last data packet is transmitted over the wirelessnetwork, the user will be notified that the transaction was successful.On the other hand, if the transaction request is for a series oftransmissions, such as in a voice communication, the handset willprovide an indication when the user has the requested access to thenetwork.

FIG. 3 describes how the wireless service responds to the transmissionrequest. In step 30, the cell tower receives a control packettransmitted by the handset. Generally, the cell tower reserves capacityfor transmission of control packets between itself and the handsets toindicate when authorization is granted for transactions. However, whenthe cell tower is completely at or beyond full capacity, handsets maytemporarily be unable to transmit control packets to the cell tower,which will be indicated by a “busy” signal during those times.

The cell tower forwards a control packet with a transmission request tothe access control manager in step 31. The control manager then performsan evaluation of the existing capacity on the wireless network, in step32. If there is an available access link, the requested capacity isallocated to the handset for the transaction, in step 33. The accesscontrol manager then sends access authorization to the correspondingcell tower to be transmitted to the handset in step 34. The handsetbegins transmission of the data packets in its queue, which are receivedby the cell tower in step 35. The packets are then forwarded to theInternet in step 36, and a confirmation is sent to the handset tocomplete the transmission for the transaction.

When there are no available access links on the wireless network, theaccess control manager next evaluates in step 38 whether there are anyoccupied access links that are transmitting packets for transactions oflower priority than the pending transaction request. If there is a lowerpriority transmission occurring, the access control manager performs aseries of operations, in step 37, to discontinue the lower prioritytransaction in favor of a higher priority transmission. A signal is sentvia a control packet to the handset that is engaged in the lowerpriority data packet transmission. The signal indicates to that handsettransmitter/receiver that access to the wireless network is suspended.The access control manager then allocates the requested capacity for thehigher priority transmission, in step 33, and authorizes the handset tosend data packets in step 34. The wireless network then receives thedata packets in step 35, which are forwarded to the internet in step 36.

If there is no lower priority transmission that is occurring, the accesscontrol manager sends a data packet to the requesting handset to denythe request for an access link in step 39. A handset whose transactionis discontinued in favor of a transaction with higher priority operatesin the same manner as a handset that is denied access from the outset.The wireless network can be configured in several manners for respondingto a denial of network access, as will be further described below.

As shown in FIG. 4, the wireless network handles transmission of datapackets that are incoming to the handsets from the internet in a similarmanner to the outgoing transmission as described above. In step 40, theaccess buffer receives data packets from the internet. The controlpacket for this data is forwarded to the access control manager in step41. The control manager then performs an evaluation of the existingcapacity on the wireless network, in step 42. If there is an availableaccess link, the requested capacity is allocated to the access bufferfor the transaction, in step 43. An authorization signal is sent to thebuffer in step 44, the data packets are forwarded to the cell tower instep 45, and the cell tower transmits the data packets over the wirelessnetwork for reception by the handset, in step 46.

When there are no available access links on the wireless network, theaccess control manager next evaluates in step 48 whether there are anyaccess links that are transmitting packets for transactions of lowerpriority than the pending transaction request. The priority leveldesignated in a control packet for a transaction in the access buffercan be forwarded by the sender over the internet, or it may be thedefault level for the type of application that corresponds with the datapackets. If there is a lower priority transmission occurring, the accesscontrol manager discontinues the lower priority transaction in favor ofa higher priority transmission, in step 49. Access is then granted tothe access buffer according to steps 43-46, as previously described. Ifthere is no lower priority transmission that is occurring, the accesscontrol manager denies the request by the buffer for an access link instep 50.

There are several possible configurations for re-requesting transmissionof a transaction by either a handset or the access buffer after accessis denied or discontinued. For handsets, each of these configurationsare performed in the background of a handset's operation, during whichtime the handset can be used for other applications, including othertransactions requiring wireless transmission of data.

In response to a denial of access for a transaction, the handsets in thenetwork can be designed to send a new request for access after a givenperiod of delay. Depending upon the congestion that is typically facedby the network, the new requests are transmitted after a few seconds, aminute, ten minutes, etc. If the handset is moved into a new cell site,the subsequent request after a period of delay is transmitted to the newcell tower, which may be operating at a different capacity level.

As an alternative to receiving repeated requests by the handsets andaccess buffer, the access control manager could broadcast a messageafter a period of time that describes the current capacity at each celltower. The handsets that are denied access wait to send a request for anaccess link until the broadcast message is received. Once the broadcastmessage is received, the handsets send requests for access in accordancewith the broadcast message.

An additional alternative is to provide an access request queue residingat the access control manager to register the denied handset requests.For each denied request, the access request queue stores the prioritylevel for the requested transaction and an identity code for thehandset. When access for the requested transaction becomes available,the access control manager sends an authorization to the handset tocommence the transaction. If the handset has since been moved to adifferent cell site, the authorization signal is sent to the appropriatecell tower corresponding to the location of the handset.

The wireless network can also include a network traffic capacity monitorto inform users as to whether it is necessary to select a higherpriority level to gain effective access for a transaction. Each timethat the network evaluates whether there is capacity at a cell site fora transaction of a certain priority level, the access control managerpools all of the access links to determine the capacity on the network.This information can then be used for sending a broadcast message to thehandsets. As an example, consider a network priority implementation thatdetermines access based upon five priority levels. The access controlmanager might broadcast a warning message to handsets when the networkhas not accepted a level 3 communication for over five minutes.Continuing with this example, if a user is about to send an e-mailmessage at level 3, the handset can suggest that the user considersending the message with a higher priority. Even if the broadcastmessage merely indicates whether a cell site is “at capacity,” “busy,”or “not busy,” a user can benefit from this information in determiningwhether to wait before engaging in a wireless transaction.

To assist the user in monitoring workflow, the handsets can provide anindicator that shows the percentage of data packets that weretransmitted from the queue. If a user is not satisfied with the currentaccess level to the wireless network, the handset can reconfigure thecontrol packet associated with the transaction to transmit the remainingpackets in the queue with a higher priority level. For example, if auser unsuccessfully requested to transmit an e-mail message at a lowpriority level, the user may wish to upgrade the transmission of thee-mail at higher priority. Perhaps at the higher priority level, theaccess control manager will immediately transmit the remaining packetsin the queue. Thus, the quality of service over the wireless network canbe changed dynamically, during an individual transaction.

When access for all or part of a transaction has been denied, a usermight instead decide to cancel the delivery. For example, if a majorityof the packets for an e-mail has remained in the handset queue for along time, the user may wish to cancel the e-mail and call the intendedrecipient instead. To incorporate this feature, the handset allows theuser to access the queue. The user can choose to delete a transaction,remove the transaction from the queue, or reschedule a transmission ofthe transaction for a specific time.

Each application in the handsets is configured to be run at a certainone or more priority levels. An example is provided illustrating howavailable priority is configured for an e-mail application, a filetransfer application, and voice-over-IP in FIGS. 5A, 5B, and 5C,respectively.

FIG. 5A provides an example of how the available priority levels may bedetermined for an e-mail application. The wireless network provider hasfour possible priority levels, and allows the e-mail to be transmittedat any of priority levels 2, 3, or 4, with the default at level 3. Inthis example, the carrier/service provider does not allow level 1priority for e-mail communications to reserve the bandwidth for voicecommunications. The application developer designed the e-mailapplication to send e-mails at any of the first three priority levels.Presumably, the lowest priority level is not available because thee-mail application cannot run effectively with low priority. Thecustomer, as part of the service plan with the carrier provider, haspre-designated priority levels 2 and 3 for selection. It may be possiblethat the customer's service agreement provides for a certain number ofe-mail transmissions at each of levels 2 or 3, perhaps as part of afixed monthly fee. Considering the available priority levels common tothe carrier, application developer, and customer, a user can selecttransmission of an e-mail along the wireless network designated aspriority level 2 or 3.

FIG. 5B provides an example of how the priority levels are determinedfor a bulk download of a large file or document from an internet website. The wireless carrier only allows bulk file transfers to beconfigured as level 4 priority. Otherwise, the bulk download will overlytax the wireless servers, creating a delay for many other applications.The application developer designed its browser to allow file transfersat any of the priority levels. The customer, as part of the service planwith the carrier, can only pre-designate priority level 4 for selection.Accordingly, the file transfer is to be sent as level 4 priority.

FIG. 5C is an example of a configuration of priority levels forvoice-over-IP telephony. The carrier allows voice traffic over thewireless network at any of the four priorities. However, in reality, anapplication developer can only implement voice-over-IP if the packetsare transmitted over levels 1, 2, or 3. Level 3 priority is actuallyonly useful for voicemail, because the transmission of the data packetsmay be separated by a minute or more, which would be completelyineffective for a normal two-way speech conversation. The applicationdeveloper configures the application with level 2 as the default. Forone-way speech communications such as voice mail, the system couldoperate at a lower priority level by gradually reassembling orreconstructing the message as packets are received. The customer, whomay wish to utilize voice-over-IP for telephony and voice mail services,preconfigures the system to allow a choice between levels 1, 2, or 3.

FIGS. 6A and 6B illustrate the transmission of data packets across thewireless network for an e-mail communication and a voice-over-IPcommunication, respectively. Because speech communications requiresbi-directional data transmission, as opposed to transmission in a singledirection, the wireless network allocates capacity differently forvoice-over-IP, as opposed to e-mail or other unidirectionalcommunications. Voice-over-IP is also different because the system needsto reserve capacity for transmission of a certain number of data packetsper second in order to assure a reasonable speech quality.

FIG. 6A is a table illustrating the steps of transmitting an e-mail froma handset in the wireless network according to the preferred embodimentof the invention. In the example provided in this table, the e-mail hasa level 2 priority, and the network is almost at full capacity. Becausethe e-mail is designated for level 2 priority, the communication can betemporarily discontinued if the network is at full capacity and thenetwork receives a request for a higher priority transaction. In thisexample, the e-mail communication is composed of five data packets,stored in the queue. The communication is interrupted once in view of ahigher priority transaction.

At time 1, the handset sends a control packet to the cell tower torequest capacity for a level 2 priority communication. The accesscontrol manager evaluates the capacity at time 2, discontinues a lowerpriority transaction to allow for the email communication at time 3, andsends authorization to the handset at time 4. At times 5-7, the handsetremoves data packets of the e-mail communication from the handset queuefor transmission over the wireless network. In the meantime, the cellside receives a request for a higher priority level 1 communication.Because the network is at full capacity at this time, the cell sidegenerates a discontinue message to the handset at time 8, and providesaccess for another transaction at time 9. The network also completesanother level 2 transaction at time 9, and broadcasts the availablecapacity for a level 2 communication at time 10. The handset sends atransmission request at time 11, receives authorization at time 12, andcompletes the transmission of the data packets for the e-mailcommunication at times 13 and 14. Both the handset queue side and thecell side require acknowledgement packets indicating receipt of datapackets (not shown in FIG. 6A).

FIG. 6B is a table illustrating the steps of transmitting abidirectional voiceover-IP communication in the wireless networkaccording to the preferred embodiment of the invention. In the exampleprovided in this table, the application has a level 1 priority. However,because the voice communications do not require constant transmission, alevel 1 priority voice communication can be interrupted for short timeperiods, e.g., when there are gaps in the speech communication.Therefore, when the handset (“vocoder handset”) periodically omitssending data packets, the capacity is filled by a transaction of a lowerpriority communication.

At time 1, the vocoder handset sends a control packet to request a level1 priority voice communication. At time 2, the access control managersends authorization to the vocoder handset to begin the voicecommunication. At time 3, the vocoder handset begins sending datapackets for the transaction. At the same time, another handset receivesauthorization to transmit a data packet along the same access link. Attime 4, the vocoder handset does not send a data packet, but anotherhandset sends a data packet. At time 5 the vocoder handset resumessending data packets, while yet another handset sends a request for atransaction. At time 6, the vocoder handset receives data packets fromthe internet. At the same time, the other handset receives authorizationto initiate its transaction. At step 7, the vocoder handset again omitsfrom sending a data packet, while the other handset begins sending datapackets. This process can continue until the completion of the voicecommunication.

FIG. 7 provides another table illustrating the steps of transmittingdata packets for several different transactions, of differentpriorities, generated in the same handset. In the table of FIG. 7,transaction “A is of priority level 2, transaction” B is of prioritylevel 3, and transaction “C” is of priority level 1. Each occurrence of“A,” “B,” or “C” may represent a single data packet for thattransaction, or a group of data packets from that transaction.

At time 1 in FIG. 7, the handset requests capacity to send data packetsfor a priority level 2 communication. The user has already generated thedata to be transmitted and the handset has sent the data to the handsetqueue as data packets “A.” The access control manager sendsauthorization for the transmission at time 2. At the same time, thehandset places data packets “B” into the queue. Since data packets “B”are of a lower priority than data packets “A,” the data packets “B” areat the end of the queue (from right to left). At times 3 and 4, thehandset sends data packets “A” to the cell side. At time 5, the handsetreceives a discontinue message to stop sending level 2 priority packets.The handset next places data packets “C” of level 1 priority into thequeue at time 6, and requests access for a level 1 prioritycommunication. The handset receives authorization to transmit at time 7,and sends data packet “C” at time 8. This operation continues until thequeue is empty or the handset is turned off.

Thus, it is readily seen that the method and system of the presentinvention provides for improved access for transmission of data packetsof transactions from a handset over a packet switched wireless networkwhen many of the transactions are of differing levels of priority andurgency, and there is limited capacity on the wireless network. Thesystem authorizes wireless communications devices to transmit andreceive data packets until another request is received with higherpriority. Within each handset, transactions that are pending arescheduled according to priority within the handset. This system allowsfor quality of service over the wireless network by allocating theresources according to urgency. The network will likely charge more forhigher priority transactions.

The foregoing disclosure of embodiments of the present invention andspecific examples illustrating the present invention have been presentedfor purposes of illustration and description. It is not intended to beexhaustive or to limit the invention to the precise forms disclosed.Many variations and modifications of the embodiments described hereinwill be obvious to one of ordinary skill in the art in light of theabove disclosure. The scope of the invention is to be defined only bythe claimed appended hereto, and by their equivalents.

What is claimed is:
 1. A wireless communications device comprising: acommunications manager; and a memory storing an application andinstructions that, when executed by the communications manager, causethe communications manager to perform operations comprising receiving,from the application, a transaction request for a transaction, thetransaction associated with a first priority level, wherein the firstpriority level effects a quality of service across a wireless networkand a wired network, generating a control packet to request transmissionof the transaction, the control packet comprising the first prioritylevel for the transaction and at least one of a desired data rate fortransmission of the transaction, information indicating whethertransmission of the transaction is a symmetric transmission or anasymmetric transmission, information indicating whether transmission ofthe transaction is associated with an encryption on or an encryptionoff, an acceptable delay for transmission of the transaction, anestimated quantity of data for transmission of the transaction, anexpected duration for transmission of the transaction, or a destinationpoint of session for transmission of the transaction, causing thecontrol packet to be transmitted to the wireless network to requesttransmission of the transaction, in response to a denial of access fromthe wireless network denying transmission of the transaction, waiting toreceive a broadcast message from the wireless network describing acurrent capacity of the wireless network before retransmitting thecontrol packet to request transmission of the transaction, and aftertransmission of a portion of data of the transaction via the wirelessnetwork, reconfiguring the control packet associated with thetransaction to associate a remaining portion of the data of thetransaction with a second priority level that is higher than the firstpriority level associated with the portion of the data of thetransaction transmitted via the wireless network.
 2. The wirelesscommunications device of claim 1, further comprising a queue that storesthe data of the transaction to be transmitted.
 3. The wirelesscommunications device of claim 2, wherein the transaction is scheduledwithin the queue based on the first priority level.
 4. The wirelesscommunications device of claim 1, wherein the application is configuredto operate at a plurality of priority levels.
 5. The wirelesscommunications device of claim 1, wherein the communications manager isfurther for receiving, from an access control manager of the wirelessnetwork, the broadcast message, wherein the broadcast message comprisesa warning message that access to the wireless network at the firstpriority level is unavailable.
 6. A method comprising: receiving, by acommunications manager of a wireless communications device, from anapplication of the wireless communications device, a transaction requestfor a transaction, the transaction associated with a first prioritylevel, wherein the first priority level effects a quality of serviceacross a wireless network and a wired network; generating, by thecommunications manager of the wireless communications device, a controlpacket to request transmission of the transaction, the control packetcomprising the first priority level for the transaction and at least oneof a desired data rate for transmission of the transaction, informationindicating whether transmission of the transaction is a symmetrictransmission or an asymmetric transmission, information indicatingwhether transmission of the transaction is associated with an encryptionon or an encryption off, an acceptable delay for transmission of thetransaction, an estimated quantity of data for transmission of thetransaction, an expected duration for transmission of the transaction,or a destination point of session for transmission of the transaction;causing, by the communications manager, the control packet to betransmitted to the wireless network to request transmission of thetransaction; in response to a denial of access from the wireless networkdenying transmission of the transaction, waiting to receive a broadcastmessage from the wireless network describing a current capacity of thewireless network before retransmitting the control packet to requesttransmission of the transaction; and after transmission of a portion ofdata of the transaction via the wireless network, reconfiguring, by thecommunications manager, the control packet associated with thetransaction to associate a remaining portion of the data of thetransaction with a second priority level that is higher than the firstpriority level associated with the portion of the data of thetransaction transmitted via the wireless network.
 7. The method of claim6, further comprising a queue that stores the data of the transaction tobe transmitted.
 8. The method of claim 7, wherein the transaction isscheduled within the queue based on the first priority level.
 9. Themethod of claim 6, wherein the application is configured to operate at aplurality of priority levels.
 10. The method of claim 6, furthercomprising receiving, from an access control manager of the wirelessnetwork, the broadcast message, wherein the broadcast message comprisesa warning message that access to the wireless network at the firstpriority level is unavailable.