Data rate throttling

ABSTRACT

The throttling of mobile device data rates is provided at events, e.g., sporting events, and other venues with large, dense crowds. The system can monitor the loading of the mobile radio antennas at the venue, and when the loading reaches a threshold loading point, the system can selectively throttle the data rates of mobile devices at the venue. In some embodiments, the system can throttle the data rates of certain applications on the mobile devices, or can select mobile devices that are placing a large strain on the network infrastructure to throttle. In other embodiments, the system can set maximum upload and download speeds for all the mobile devices at the venue.

TECHNICAL FIELD

The subject disclosure relates to wireless communications and moreparticularly to various embodiments that facilitate throttling the datarate of mobile devices at a major venue or sporting event.

BACKGROUND

Sporting events and other dense gatherings of thousands of people usingmobile devices can stress and overwhelm mobile radio networkinfrastructure and cellular service. Both voice and data can becomepatchy and unusable. Efforts to maintain service by establishingtemporary or portable mobile radio antennas can mitigate serviceoverload conditions. However, even with these efforts, large crowds canstill stress the infrastructure enough to cause noticeable gaps inservice.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram illustrating an example, non-limitingembodiment of a system that identifies mobile devices in a location inaccordance with various aspects described herein.

FIG. 2 is a block diagram illustrating an example, non-limitingembodiment of a system for mobile device data rate throttling inaccordance with various aspects described herein.

FIG. 3 is a block diagram illustrating an example, non-limitingembodiment of a system for determining the location and radio resourceconsumption of a mobile device in accordance with various aspectsdescribed herein.

FIG. 4 is a block diagram illustrating an example, non-limitingembodiment of a system for determining the location and radio resourceconsumption of a mobile device in accordance with various aspectsdescribed herein.

FIG. 5 is a block diagram illustrating an example, non-limitingembodiment of a system for data rate throttling in accordance withvarious aspects described herein.

FIG. 6 is a block diagram illustrating an example, non-limitingembodiment of a system for data rate throttling in accordance withvarious aspects described herein.

FIG. 7 illustrates a flow diagram of an example, non-limiting embodimentof a method for mobile device data rate throttling as described herein.

FIG. 8 illustrates a flow diagram of an example, non-limiting embodimentof a method for mobile device data rate throttling as described herein.

FIG. 9 is a block diagram of an example, non-limiting embodiment of acomputing environment in accordance with various aspects describedherein.

FIG. 10 is a block diagram of an example, non-limiting embodiment of amobile network platform in accordance with various aspects describedherein.

DETAILED DESCRIPTION

One or more embodiments are now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the various embodiments. It is evident,however, that the various embodiments can be practiced without thesespecific details (and without applying to any particular networkedenvironment or standard).

As mentioned, gaps in service can be caused by crowd behavior on awireless communications network, for both data and voice. It is furthernoted that this can be exacerbated by the demographics of the givencrowd and the context of a situation. For example, tickets to sportingevents are expensive, and thus, the types of people that can affordthese tickets are also more likely to own smartphones that tend todisproportionately stress the mobile radio antennas. Voice calling cantake up more bandwidth than simple texting and network controlcommunications, while video streaming and uploading of pictures andvideo can use an order of magnitude greater bandwidth than voicecalling.

Additionally, sporting events and other public gatherings spur the useof these bandwidth heavy activities as people attempt to share notableevents with their friends and family. These types of usage naturallylead to spikes in transmissions as homeruns, touchdowns, halftimeactivities, and other events encourage sharing of photos and videos.These spikes can be unplanned and sudden, and can stress the radioantennas such that disruptions become highly noticeable, even for voicecallers.

Various embodiments described herein relate to a system that facilitatesthe throttling of mobile device data rates at sporting events, and othervenues with large, dense crowds. The system can monitor the loading ofthe mobile radio antennas at the venue, and when the loading reaches athreshold loading point, the system can selectively throttle the datarates of mobile devices at the venue. In some embodiments, the systemcan throttle the data rates of certain applications on the mobiledevices, or can select mobile devices that are placing a large strain onthe network infrastructure to throttle. In other embodiments, the systemcan set maximum upload and download speeds for all the mobile devices atthe venue.

In some embodiments, the mobile device data rate throttling system canidentify mobile devices that are disproportionately placing loads on themobile radio antennas. Mobile devices that are particularly close to theradio antennas can cause increased amounts of interference wherein thereceiver captures a strong signal making it very difficult for the samereceiver to detect a weaker signal. This interference is particularlybad in CDMA (Code Division Multiple Access) systems but can also beproblematic in other systems. Mobile devices that are further away orare behind barriers and drawing more power than other mobile devices canalso place additional loads on the available radio resources. Once thesemobile devices are identified, the mobile device data rate throttlingsystem can selectively throttle transmissions to and from these mobiledevices in order to reduce the load on the mobile radio antennas.

In other embodiments, the system can track the loading of the radioantennas and employ the data rate throttling when the loading crosses,or is about to cross a threshold level. The threshold can be set suchthat the data rate throttling is activated before service disruptionsmanifest in the venue. Accordingly, the mobile device data ratethrottling system can react very quickly to spikes in usage, and alreadyhave mobile devices selected for throttling before the decision tothrottle is made. In some embodiments, the mobile device data ratethrottling system can also predict when peaks in loading will occurbased on current contextual information and past events. At sportingevents for instance, peaks in usage can occur at the beginning andending of the events, as well as during scheduled breaks such ashalftimes, innings, etc. The system can employ data rate throttling justbefore a predicted peak in order to minimize potential disruptions inservice.

In one or more embodiments, a system includes a memory that storescomputer executable instructions and a processor that is communicativelycoupled to the memory and the processor facilitates execution of thecomputer-executable instructions to perform operations. The operationscan include identifying a set of mobile devices served by a set of radioantennas and determining that a first data rate of a radio antenna ofthe set of radio antennas is to be reduced to maintain a data ratelevel, wherein the data rate level is based on a function of a definedlevel. The operations can also include selecting a mobile device fromthe set of mobile devices to be subjected to data rate reduction andinstructing that a second data rate of the mobile device is to bereduced.

In another embodiment, a method includes determining, by a systemincluding a processor, identities of a set of mobile devices that are ina defined area. The method also includes monitoring, by the system, afirst data rate of a radio antenna that communicates with the set ofmobile devices in the defined area and determining, by the system,whether to adjust a second data rate of a mobile device based on whetherthe first data rate of the radio antenna satisfies a defined criterion.The method also includes selecting, by the system, the mobile device forwhich the second data rate is to be adjusted in response to adetermination that the second data rate is to be adjusted.

In another embodiment, a computer readable storage device, comprisingcomputer executable instructions that in response to execution cause adevice including a processor to perform operations including monitoringa first data rate of a radio antenna. The operations also includedetermining to restrict a second data rate of an application on a mobiledevice in response to the first data rate of the radio antenna beingdetermined to satisfy a defined level. The operations can also includeinstructing the mobile device to restrict the second data rate of theapplication based on an amount of data transferred over a defined timeperiod by the application.

The following description and the annexed drawings set forth certainillustrative embodiments of the embodiments. These embodiments areindicative, however, of but a few of the various ways in which theprinciples of the embodiments can be employed. Other features of theembodiments will become apparent from the following detailed descriptionof the embodiments when considered in conjunction with the drawings.

Turning now to FIG. 1, illustrated is a block diagram of an example,non-limiting embodiment of a system 100 that identifies mobile devicesin a location in accordance with various aspects described herein.System 100 includes a plurality of radio antennas 104, 106, and 108 inan area 102 that provide service for mobile devices 110, 112, 114, 116,118, and 120. The mobile network infrastructure that radio antennas 104,106, and 108 are a part of can learn the identities of the mobiledevices that are present in the area 102.

The area 102 can be a location such as a concert venue, a sportsstadium, political rally, or any other localized area where largenumbers of people gather densely. In some embodiments, the area 102 caninclude a permanent structure such as a stadium with many radio antennasthat are designed to service mobile devices in that location. In otherembodiments, the area 102 can be temporary, and can include the areaserved by a selected set of radio antennas. For instance, when a largecrowd gathers in a location that does not have regular gatherings, thenearby radio antennas that service that location can be designated asbelonging to area 102.

In some embodiments, the radio antennas 104, 106, and 108 can bepermanently installed radio antennas that are designed to service astadium or other venue. One or more of the radio antennas can also betemporary antennas that are brought into the area 102 to help providemobile voice and data service for the large crowds present. It is alsoto be appreciated that while FIG. 1 shows only three radio antennas,this is only an exemplary embodiment and in other embodiments, othernumbers of radio antennas are possible.

The mobile devices can include cellphones, smartphones, pagers, tablets,laptops, and other devices that can send and/or receive voice or dataservices over a cellular network. It is noted that although variousaspects and embodiments are discussed herein with respect to UMTS and/orLTE, the disclosed aspects are not limited to a UMTS implementationand/or an LTE implementation. For example, aspects or features of thedisclosed embodiments can be exploited in substantially any wirelesscommunication technology. Such wireless communication technologies caninclude UMTS, CDMA, Wi-Fi, Worldwide Interoperability for MicrowaveAccess (WiMAX), General Packet Radio Service (GPRS), Enhanced GPRS,Third Generation Partnership Project (3GPP) LTE, Third GenerationPartnership Project 2 (3GPP2) Ultra Mobile Broadband (UMB), High SpeedPacket Access (HSPA), Evolved High Speed Packet Access (HSPA+),High-Speed Downlink Packet Access (HSDPA), High-Speed Uplink PacketAccess (HSUPA), Zigbee, or another IEEE 802.XX technology. Additionally,substantially all aspects disclosed herein can be exploited in legacytelecommunication technologies.

The mobile network system can identify the mobile devices that arepresent in area 102 based on transmissions between the mobile devices110-120. Control messages can be sent between the mobile device and thenetwork via the radio antennas even when the mobile devices are notactively making phone calls or using the data services. The mobilenetwork system can identify the mobile devices that enter the area 102based on identifiers transmitted in response to the control messages.The identifiers can include an IMSI (International Mobile SubscriberIdentity) and/or a TMSI (Temporary Mobile Subscriber Identity)identifier. An HLR (Home Location Register), or a local VLR (VisitorLocation Register) can store the details of every mobile device and/orsubscriber that is authorized to use the network (HLR) or local MSC(Mobile Switching Center). The IMSI is a permanent identifier and theTMSI is a temporary identifier that can be randomly assigned by the VLRto every mobile in the area served by the MSC.

Accordingly, the mobile network system can learn the identities of allthe mobile devices 110-120 that are in the area 102, even if the mobiledevices 110-120 have not been used. Once the identities are discovered,information about the mobile subscriber and past usage of the mobiledevice can also be learned. This information can be used to build a userprofile that shows application usage and data rate usage of the mobiledevice over time. The user profile can also be analyzed to indicate theprobability of high data rate usage while in the area 102. For instance,a mobile subscriber that has in the past uploaded photos or videosduring a sporting event at 102 is more likely to do so again, thananother mobile subscriber that has not uploaded media. Similarly,certain types of mobile devices, such as smartphones are more likely totransmit or receive large amounts of data than traditional flip phoneswithout a data plan.

Referring now to FIG. 2, a block diagram illustrating an example,non-limiting embodiment of a system 200 for mobile device data ratethrottling in accordance with various aspects described herein is shown.System 200 includes a throttling component 202 that can throttle thedata rate of mobile devices in order to minimize service disruptions atsporting events and other venues with large crowds of mobile deviceusers. The throttling component 202 is communicably coupled, over abackhaul connection to the set of radio antennas 216, 218, and 220 atthe venue (e.g., area 102). The radio antennas 216, 218, and 220 arealso communicably coupled, via a cellular radio connection to mobiledevices 222, 224, 226, 228, and 230.

The throttling component 202 can include a memory 204 that storescomputer-executable instructions, and a processor 206 that facilitatesexecution of the of the computer executable instructions associated withone or more components. An identification component 210 can identify aset of mobile devices (e.g., 222-230) served by radio antennas 216, 218,and 220. The identification component 210 can identify the mobiledevices 222-230 based on the IMSIs and TMSI transmitted by the mobiledevices 222-230 to radio antennas 216, 218, and 220. The process ofidentification can include the technique described with regard to FIG. 1above. Once identified, and a user profile showing past usage andpredicted future usage has been generated, the user profile can bestored in data storage 208. A user profile for each of the mobiledevices 222-230 and/or mobile subscribers can be stored until the mobiledevice has left the venue. In some embodiments, the data storage 208 cansave the user profile for a particular mobile device for future use,especially when the user profile shows that the mobile device visits thevenue frequently.

While the identification component 210 is identifying the mobiledevices, monitoring component 212 can monitor the loading of the radioantennas 216, 218, and 220 to determine whether the loading is about toexceed a threshold level. The monitoring component 212 can also trackthe data rate of the mobile devices to identify the amount of strain orloading that each mobile device is putting on the radio antennaservicing the mobile device. The user profiles stored in data storage208 can be updated with the radio resource consumption levels of each ofthe mobile devices in the venue, and can be used to identify mobiledevices that are candidates for data throttling.

In some embodiments, the monitoring component 212 can also predictfuture loading based on past events as well as on current events. Themonitoring component 212 can look at the radio antenna loading forprevious events and use it to predict future loading. The monitoringcomponent 212 can apply a weighting function so that similar events areweighted more heavily. For instance, if the location is an indoor arena,and the event is a basketball game, previous basketball games provide amore accurate example of the radio antenna loading at the currentbasketball game than do previous hockey games. Hockey has three periodswith two breaks between the periods, whereas basketball has fourquarters with breaks between the quarters. Since the breaks mayexperience greater mobile device usage, the exemplary loading of theradio antennas during previous basketball games is more likely to cometo pass than the loading during the hockey game.

Monitoring component 212 can also use current events to predict radioantenna loading. For instance, at baseball games, a home run or otherunpredictable happening may cause a spike in radio resource consumption.The monitoring component 212 can receive indications of when such eventshappen and use that information to predict whether the radio antennaloading will exceed a threshold.

The monitoring component 212 can also determine which of the radioantennas 216, 218, and 220 or more likely to experience significantstrain. For instance, if radio antenna 216 is located near the entranceto the stadium, it may experience heavy loads at the beginning andendings of the event, but not during the event itself. In someembodiments monitoring component 212 can thus monitor radio antenna 216at the beginning and ending of the event, and ignore it at other times.Similarly, if radio antenna 220 was located near the concession stands,monitoring component 212 can spend extra resources monitoring radioantenna 220 during regularly scheduled breaks in the event (e.g. betweeninnings, quarters, periods, etc.).

Decision component 214 can determine whether to employ data ratethrottling in order to keep the radio antenna loading below thethreshold level. If the radio antenna loading overwhelms the radioantennas, disruptions in service can occur and even relatively low datarate activities such as texting and voice calling can be interrupted.Decision component 214 can be configured to activate data ratethrottling before any disruptions occur, and can set the loadingthreshold at a sufficiently low point to ensure that data ratethrottling is in place before the radio antennas are overloaded.

In some embodiments, decision component 214 can decide to throttle thedata rate of one or more mobile devices based on predicted radio antennaloading surges. For instance, 10 minutes before the ending of an event,or just before scheduled breaks, decision component 214 can activatedata rate throttling, even if the radio antenna loading is not yet atthe threshold level.

Decision component 214 can also determine whether to throttle the datarates of all of the mobile devices equally, or just a portion of themobile devices. Decision component 214 can base that decision on theuser profile and the likelihood that each of the mobile devices islikely to consume a disproportionate amount of radio resources. Decisioncomponent 214 can also select the mobile devices to throttle the datarate of based on the location of the mobile device and the interferencethat it is causing (See explanation for FIGS. 3 and 4 for more details).For instance, a mobile device that is very close to a radio antenna maycause a large amount of interference (near-far problem), or a mobiledevice that is very far away, leading to path-loss of the transmission,or is behind an obstacle may require extra power from the radio antenna,thus limiting the power available to others. Accordingly, decisioncomponent 212 can determine that throttling the data rates of thosemobile devices would lead to improved service for the remaining mobiledevices, without having to employ additional throttling, or at leastlimited additional throttling.

Decision component 214 can also determine the type of data ratethrottling to employ based on the circumstances. In some embodiments,the decision component 214 can determine to limit the data rates of allmobile devices equally. In other embodiments, decision component 214 candetermine to limit the data rate of certain mobile devices, and notother. Some mobile devices can be limited more strictly, whereas othersare limited only slightly.

Decision component 214 can make these determination based on a set ofpredefined guidelines. For instance, in one embodiment, decisioncomponent 214 can avoid noticeably degrading any subscriber's data rateto, and spread out the data rate throttling over all the mobile devices.In other embodiments, decision component 214 can have guidelines thatprefer to limit data rate throttling to mobile devices thatdisproportionately stress the radio antennas. Decision component 214 canthen strictly throttle the data rate of those selected mobile devices,while leaving others unthrottled. Decision component 214 can then decideon the data rate throttling technique to employ (See explanation forFIGS. 5 and 6 for more details).

Turning now to FIG. 3, a block diagram illustrating an example,non-limiting embodiment of a system 300 for determining the location andradio resource consumption of a mobile device in accordance with variousaspects described herein is shown. System 300 includes a radio antenna302 and mobile devices 304 and 306. Radio antenna 302 can measure timingdelays to determine the distances of mobile devices 306 and 304 from theradio antenna 302.

In some embodiments, radio antenna 302 can also compare the distance tosignal path loss ratio to determine whether or not obstacles (such aswall 308) are in the way between mobile device 304 and radio antenna302. Mobile device 304 behind wall 308 and other obstacles can require astronger signal from the radio antenna 302 and so can stress the radioantenna 302 more than mobile device 306 even though both mobile devicesare similar distances to the radio antenna.

In other embodiments, the mobile network system can determine thelocation of mobile devices 304 and 306 from a network locating systemthat determines the location of mobile devices on the network using twoor more radio antennas. In other embodiments, mobile devices 304 and/or306 can report their locations to the mobile network system if themobile devices have GPS capabilities. Since the position of the radioantenna 302 is known, the distance between the radio antenna 302 and themobile devices 304 and 306 can be determined. The mobile network systemcan also have a layout and/or schematic of the location saved, and anyobstructions between the radio antenna 302 and the mobile devices can bedetermined.

FIG. 4 illustrates an example, non-limiting embodiment of a system 400for determining the location and radio resource consumption of a mobiledevice in accordance with various aspects described herein. System 400includes a throttling component 402 communicably coupled via a backhaulconnection to a radio antenna 410 which communicates with a mobiledevice 412. The throttling component includes a location component 404,a load monitoring component 406 and a decision component 408.

Location component 404 can determine the location of the mobile device412 using the techniques described above with regard to FIG. 3. Loadmonitoring component 406 can determine a load multiplier associated withmobile device 412. Mobile devices that are not too close and not too farfrom a radio antenna, and are not behind obstacles, will have aneffective load multiplier of near one. As the distance between themobile device 412 and the radio antenna 410 shrinks, the interferencedue to the near-far problem increases, thus increasing the load on theradio antenna 410. The load multiplier is larger therefore when themobile device 412 is closer to the antenna since a greater load isplaced on the radio antenna 410 for similar transmissions.

In other embodiments, as the distance increases, the radio antenna 410requires greater power consumption to communicate effectively withmobile device 412 due to path loss effects. This increased consumptioncan cause increase the load of the radio antenna 410, thus increasingthe load multiplier. If an obstruction (e.g., wall 308) is in placebetween radio antenna 410 and mobile device 412, greater power is neededto communicate with the mobile device 412, also placing greater load onthe radio antenna 410.

Load monitoring component 406 can therefore determine a load multiplierfor each of the mobile devices that which radio antenna 410communicates. The load multiplier can change depending on where themobile device 412 moves throughout the event. Load monitoring component406 can thus keep the user profile stored in data storage 208 updatedwith the most recent load multiplier. Decision component 408 candetermine which mobile devices to throttle based on the load multipliereffect. Throttling mobile devices with high load multipliers willprovide a greater reduction in the load on the radio antennas than othermobile devices with lower load multipliers. Decision component 408 cantherefore select mobile devices with high load multiplierspreferentially when selecting mobile devices to throttle.

Referring now to FIG. 5, a block diagram illustrating an example,non-limiting embodiment of a system 500 for data rate throttling inaccordance with various aspects described herein is shown. System 500includes a mobile network 502 that is communicably coupled to radioantenna 512 and mobile device 514. Elements of mobile network 502 can bea part of a core network, or can be localized at the venues, stadiumsetc.

Mobile network 502 can include an HLR (Home Location Register) 504, aSGSN (Serving GPRS Support Node) 506, a GGSN (Gateway GPRS Support Node)508, and a throttling component 510 (e.g., throttling components 202 and402). In some embodiments, HLR 504 can be a VLR. Mobile network 502 canbe used to facilitate the data rate throttling of mobile device 514 oncea determination has been made by throttling component 510 (e.g., bydecision components 214 and/or 408) about the type of data ratethrottling to employ.

In an embodiment, throttle component 510 selects a set mobile devices,including mobile device 514, to throttle and notifies HLR 504 aboutwhich mobile devices have been selected, and by how much to throttle.The maximum allowable uplink and downlink data throughput for eachmobile device can be set in the HLR 504. When SGSN 506 managescommunications with mobile device 514, it can learn of the maximum datarate from the HLR 504 and then limits the radio resource allocation onthe radio link establishment. In another embodiment, throttle component510 can notify the GGSN 508 on a per mobile device basis about themaximum throughput is permitted, and GGSN effectively sets up a throttleper mobile device by limiting packet flow rate.

In some embodiments, mobile network 502 can throttle mobile device 514by slowing maximum allowed uplink and downlink data rates. Mobilenetwork 502 can also slow down the data throughput by manipulating howpackets are handled. For instance, mobile network 502 can delayacknowledgement of receipt of packets by a small time.

Mobile network 502 can also selectively slow down data throughput onmobile device 514 on a per application basis. The throughput for certainapplications can be lowered such that the data rate throttling is lessnoticeable. For instance, delivery of text messages and emails can bedelayed or slowed without the subscriber realizing that data ratethrottling is taking place. Similarly, uploading of pictures and/orvideo can also be slowed, while downlinks remain unaffected. In otherembodiments, the mobile network 502 can also selectively throttle socialmedia applications and other applications that use large amounts ofbandwidth such as video streaming and uploading.

Turning now to FIG. 6, a block diagram illustrating an example,non-limiting embodiment of a system 600 for data rate throttling inaccordance with various aspects described herein is shown. System 600includes mobile network 602 that is communicably coupled to radioantenna 608 and mobile device 610. Mobile network 602 includes athrottling component 604 as well as a notification component 606.

Mobile network 602 can be used to facilitate the data rate throttling ofmobile device 608 once a determination has been made by throttlingcomponent 604 (e.g., by decision components 214 and/or 408) about whichmobile devices to throttle.

In an embodiment, mobile device 610 can be selected to be throttled(among others in the set of mobile devices serviced by radio antenna608) by throttling component 604. Instead of performing the data ratethrottling in the mobile network 602, throttling component 604 caninform notification component 606 of the mobile devices that have beenselected and the amount and type of data rate throttling. Notificationcomponent 606 can then notify mobile device 610, or an application onmobile device 610 about the data rate throttling to perform. Mobiledevice 610 can thus limit the uplink or downlink throughput to themaximum designated by the notification component 606. Such instructionscan be sent via SMS, MMS, overhead broadcast channels, or as an API on adedicated radio channel. Data rate throttling can then be released bynotification component 606 in the same way when data rate throttling isno longer needed at the venue, or when mobile device 610 has left thevenue.

FIGS. 7 and 8 illustrates processes in connection with theaforementioned systems. The processes in FIGS. 7 and 8 can beimplemented for example by systems 100, 200, 300, 400, 500, and 600illustrated in FIGS. 1-6 respectively. While for purposes of simplicityof explanation, the methods are shown and described as a series ofblocks, it is to be understood and appreciated that the claimed subjectmatter is not limited by the order of the blocks, as some blocks mayoccur in different orders and/or concurrently with other blocks fromwhat is depicted and described herein. Moreover, not all illustratedblocks may be required to implement the methods described hereinafter.

FIG. 7 illustrates a flow diagram of an example, non-limiting embodimentof a method 700 for mobile device data rate throttling as describedherein.

At 702, identities of a set of mobile device in a defined area aredetermined. The predetermined area can be a location such as a concertvenue, a sports stadium, political rally, or any other area where largegroups of people gather densely. In some embodiments, the predeterminedarea can include a permanent structure such as a stadium with many radioantennas that are designed to service mobile devices in that location.In other embodiments, the predetermined area can be temporary, and caninclude the area serviced by selected radio antennas.

The mobile network system can identify the mobile devices that arepresent in the predetermined area based on transmissions between themobile devices. Control messages can be sent between the mobile deviceand the network via the radio antennas even when the mobile devices arenot actively making phone calls or using the data services. The mobilenetwork system can identify the mobile devices that enter thepredetermined area based on identifiers transmitted in response to thecontrol messages.

At 704, a first data rate of a radio antenna that communicates with theset of mobile devices in the defined area can be monitored. The mobilenetwork system can determine whether the data rate, or loading, is aboutto exceed a threshold level based on a rate of increase in the loading.Future loading of the radio antenna can also be predicted based on pastevents and current events.

At 706, a determination can be made about whether to adjust a seconddata rate of a mobile device based on whether the first data rate of theradio antenna satisfies a defined criterion. The decision can be made toprevent service disruptions that may result if the loading exceeds thepredetermined level. The predetermined level can be set low enough thatdata rate throttling is in place well before radio antennas areoverloaded. A decision can also be made to throttle the data rate of oneor more mobile devices based on the predicted loading of the radioantennas. Thus, before a scheduled break, or before the end of theevent, data rate throttling can be employed, even if the radio antennaloading is not yet at the predetermined loading level yet.

At 708, a mobile device can be selected for which the second data rateis to be adjusted in response to a determination that the second datarate is to be adjusted. The decision can be based on the current datarate of the mobile device—mobile devices with high data rates can bethrottled first, or more heavily than mobile devices with low datarates. The selection can also be made based on a user profile thatindicates the likelihood of the mobile device consuming a large amountof bandwidth. A mobile device that has been identified as having a highdata rate in the past at events, can be proactively throttled based onthe predicted data rate.

In other embodiments, the mobile device can be selected based on theloading of the radio antenna that the mobile device is responsible for.Mobile devices that are very close to the radio antenna can causeincreased interference and mobile devices that are far away, or behindobstacles and obstructions, might require additional power from theradio antenna to transmit a similar amount of data as another mobiledevice. Mobile devices that are stressing the radio antennasdisproportionately can be selected for data rate throttling.

Turning now to FIG. 8, a flow diagram of an example, non-limitingembodiment of a method 800 for mobile device data rate throttling asdescribed herein is shown.

At 802, a first data rate of a radio antenna can be monitored. Themobile network system can determine whether the data rate is about toexceed a threshold level based on a rate of increase in the bandwidthconsumption. Future consumption of the radio antenna resources can alsobe predicted based on past events and current events.

At 804, a determination to limit a second data rate of an application ona mobile device can be made in response to the first data rate of theradio antenna being determined to satisfy a defined level. To limit theoverall data rate of the mobile device, the throughput for certainapplications can be lowered such that the data rate throttling is lessnoticeable. For instance, delivery of text messages and emails can bedelayed and/or slowed without the subscriber realizing that data ratethrottling is taking place. Similarly, uploading of pictures and/orvideo can also be throttled, while downlinks remain unaffected. At 806,the application can be selected based at least in part on a bandwidthusage, or amount of data transferred over a defined time period by theapplication. Accordingly, the mobile network can selectively throttlesocial media applications and other applications that use large amountsof bandwidth such as video streaming and uploading.

At 808, a data rate limiting technique can be selected based on theapplication selected to be throttled. Different techniques ofthrottling, such as lowering downlink and uplink speeds in the corenetwork, or delaying packets, or controlling the maximum uplink anddownlink speeds from the mobile device can be selected. Each of thedifferent techniques may have advantages and disadvantages whenthrottling selected applications. For applications such as photo orvideo uploading, delaying packets, and thus latency may not have as muchof an effect on reducing load as slowing the maximum allowed uplink datarate. Similarly, delaying packets can be particularly well suited to webbrowsing and/or video chatting, whereas reducing the maximum datalinkthroughputs may not be as effective. Accordingly, the mobile networksystem can select the best data rate throttling technique based on theapplication that is to be throttled.

Referring now to FIG. 9, there is illustrated a block diagram of acomputing environment in accordance with various aspects describedherein. For example, in some embodiments, the computer can be or beincluded within the mobile device data rate throttling system 200, 400,500 and/or 600.

In order to provide additional context for various embodiments of theembodiments described herein, FIG. 9 and the following discussion areintended to provide a brief, general description of a suitable computingenvironment 900 in which the various embodiments of the embodimentdescribed herein can be implemented. While the embodiments have beendescribed above in the general context of computer-executableinstructions that can run on one or more computers, those skilled in theart will recognize that the embodiments can be also implemented incombination with other program modules and/or as a combination ofhardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The terms “first,” “second,” “third,” and so forth, as used in theclaims, unless otherwise clear by context, is for clarity only anddoesn't otherwise indicate or imply any order in time. For instance, “afirst determination,” “a second determination,” and “a thirddetermination,” does not indicate or imply that the first determinationis to be made before the second determination, or vice versa, etc.

The illustrated embodiments of the embodiments herein can be alsopracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

Computing devices typically include a variety of media, which caninclude computer-readable storage media and/or communications media,which two terms are used herein differently from one another as follows.Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structured dataor unstructured data.

Computer-readable storage media can include, but are not limited to,random access memory (RAM), read only memory (ROM), electricallyerasable programmable read only memory (EEPROM), flash memory or othermemory technology, compact disk read only memory (CD-ROM), digitalversatile disk (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devicesor other tangible and/or non-transitory media which can be used to storedesired information. In this regard, the terms “tangible” or“non-transitory” herein as applied to storage, memory orcomputer-readable media, are to be understood to exclude onlypropagating transitory signals per se as modifiers and do not relinquishrights to all standard storage, memory or computer-readable media thatare not only propagating transitory signals per se.

Computer-readable storage media can be accessed by one or more local orremote computing devices, e.g., via access requests, queries or otherdata retrieval protocols, for a variety of operations with respect tothe information stored by the medium.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

With reference again to FIG. 9, the example environment 900 forimplementing various embodiments of the aspects described hereinincludes a computer 902, the computer 902 including a processing unit904, a system memory 906 and a system bus 908. The system bus 908couples system components including, but not limited to, the systemmemory 906 to the processing unit 904. The processing unit 904 can beany of various commercially available processors. Dual microprocessorsand other multi-processor architectures can also be employed as theprocessing unit 904.

The system bus 908 can be any of several types of bus structure that canfurther interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 906 includesROM 910 and RAM 912. A basic input/output system (BIOS) can be stored ina non-volatile memory such as ROM, erasable programmable read onlymemory (EPROM), EEPROM, which BIOS contains the basic routines that helpto transfer information between elements within the computer 902, suchas during startup. The RAM 912 can also include a high-speed RAM such asstatic RAM for caching data.

The computer 902 further includes an internal hard disk drive (HDD) 914(e.g., EIDE, SATA), which internal hard disk drive 914 can also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 916, (e.g., to read from or write to aremovable diskette 918) and an optical disk drive 920, (e.g., reading aCD-ROM disk 922 or, to read from or write to other high capacity opticalmedia such as the DVD). The hard disk drive 914, magnetic disk drive 916and optical disk drive 920 can be connected to the system bus 908 by ahard disk drive interface 924, a magnetic disk drive interface 926 andan optical drive interface 928, respectively. The interface 924 forexternal drive implementations includes at least one or both ofUniversal Serial Bus (USB) and Institute of Electrical and ElectronicsEngineers (IEEE) 994 interface technologies. Other external driveconnection technologies are within contemplation of the embodimentsdescribed herein.

The drives and their associated computer-readable storage media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 902, the drives and storagemedia accommodate the storage of any data in a suitable digital format.Although the description of computer-readable storage media above refersto a hard disk drive (HDD), a removable magnetic diskette, and aremovable optical media such as a CD or DVD, it should be appreciated bythose skilled in the art that other types of storage media which arereadable by a computer, such as zip drives, magnetic cassettes, flashmemory cards, cartridges, and the like, can also be used in the exampleoperating environment, and further, that any such storage media cancontain computer-executable instructions for performing the methodsdescribed herein.

A number of program modules can be stored in the drives and RAM 912,including an operating system 930, one or more application programs 932,other program modules 934 and program data 936. All or portions of theoperating system, applications, modules, and/or data can also be cachedin the RAM 912. The systems and methods described herein can beimplemented utilizing various commercially available operating systemsor combinations of operating systems.

A user can enter commands and information into the computer 902 throughone or more wired/wireless input devices, e.g., a keyboard 938 and apointing device, such as a mouse 940. Other input devices (not shown)can include a microphone, an infrared (IR) remote control, a joystick, agame pad, a stylus pen, touch screen or the like. These and other inputdevices are often connected to the processing unit 904 through an inputdevice interface 942 that can be coupled to the system bus 908, but canbe connected by other interfaces, such as a parallel port, an IEEE 1394serial port, a game port, a universal serial bus (USB) port, an IRinterface, etc.

A monitor 944 or other type of display device can be also connected tothe system bus 908 via an interface, such as a video adapter 946. Inaddition to the monitor 944, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 902 can operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 948. The remotecomputer(s) 948 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer902, although, for purposes of brevity, only a memory/storage device 950is illustrated. The logical connections depicted include wired/wirelessconnectivity to a local area network (LAN) 952 and/or larger networks,e.g., a wide area network (WAN) 954. Such LAN and WAN networkingenvironments are commonplace in offices and companies, and facilitateenterprise-wide computer networks, such as intranets, all of which canconnect to a global communications network, e.g., the Internet.

When used in a LAN networking environment, the computer 902 can beconnected to the local network 952 through a wired and/or wirelesscommunication network interface or adapter 956. The adapter 956 canfacilitate wired or wireless communication to the LAN 952, which canalso include a wireless AP disposed thereon for communicating with thewireless adapter 956.

When used in a WAN networking environment, the computer 902 can includea modem 958 or can be connected to a communications server on the WAN954 or has other means for establishing communications over the WAN 954,such as by way of the Internet. The modem 958, which can be internal orexternal and a wired or wireless device, can be connected to the systembus 908 via the input device interface 942. In a networked environment,program modules depicted relative to the computer 902 or portionsthereof, can be stored in the remote memory/storage device 950. It willbe appreciated that the network connections shown are example and othermeans of establishing a communications link between the computers can beused.

The computer 902 can be operable to communicate with any wirelessdevices or entities operatively disposed in wireless communication,e.g., a printer, scanner, desktop and/or portable computer, portabledata assistant, communications satellite, any piece of equipment orlocation associated with a wirelessly detectable tag (e.g., a kiosk,news stand, restroom), and telephone. This can include Wireless Fidelity(Wi-Fi) and BLUETOOTH® wireless technologies. Thus, the communicationcan be a predefined structure as with a conventional network or simplyan ad hoc communication between at least two devices.

Wi-Fi can allow connection to the Internet from a couch at home, a bedin a hotel room or a conference room at work, without wires. Wi-Fi is awireless technology similar to that used in a cell phone that enablessuch devices, e.g., computers, to send and receive data indoors and out;anywhere within the range of a base station. Wi-Fi networks use radiotechnologies called IEEE 802.11(a, b, g, n, etc.) to provide secure,reliable, fast wireless connectivity. A Wi-Fi network can be used toconnect computers to each other, to the Internet, and to wired networks(which can use IEEE 802.3 or Ethernet). Wi-Fi networks operate in theunlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps (802.11a) or 54 Mbps(802.11b) data rate, for example or with products that contain bothbands (dual band), so the networks can provide real-world performancesimilar to the basic 10BaseT wired Ethernet networks used in manyoffices.

FIG. 10 presents an example embodiment 1000 of a mobile network platform1010 that can implement and exploit one or more aspects of the disclosedsubject matter described herein. Generally, wireless network platform1010 can include components, e.g., nodes, gateways, interfaces, servers,or disparate platforms, that facilitate both packet-switched (PS) (e.g.,internet protocol (IP), frame relay, asynchronous transfer mode (ATM))and circuit-switched (CS) traffic (e.g., voice and data), as well ascontrol generation for networked wireless telecommunication. As anon-limiting example, wireless network platform 1010 can be included intelecommunications carrier networks, and can be considered carrier-sidecomponents as discussed elsewhere herein. Mobile network platform 1010includes CS gateway node(s) 1012 which can interface CS traffic receivedfrom legacy networks like telephony network(s) 1040 (e.g., publicswitched telephone network (PSTN), or public land mobile network (PLMN))or a signaling system #7 (SS7) network 1070. Circuit switched gatewaynode(s) 1012 can authorize and authenticate traffic (e.g., voice)arising from such networks. Additionally, CS gateway node(s) 1012 canaccess mobility, or roaming, data generated through SS7 network 1070;for instance, mobility data stored in a visited location register (VLR),which can reside in memory 1030. Moreover, CS gateway node(s) 1012interfaces CS-based traffic and signaling and PS gateway node(s) 1018.As an example, in a 3GPP UMTS network, CS gateway node(s) 1012 can berealized at least in part in gateway GPRS support node(s) (GGSN). Itshould be appreciated that functionality and specific operation of CSgateway node(s) 1012, PS gateway node(s) 1018, and serving node(s) 1016,is provided and dictated by radio technology(ies) utilized by mobilenetwork platform 1010 for telecommunication.

In addition to receiving and processing CS-switched traffic andsignaling, PS gateway node(s) 1018 can authorize and authenticatePS-based data sessions with served mobile devices. Data sessions caninclude traffic, or content(s), exchanged with networks external to thewireless network platform 1010, like wide area network(s) (WANs) 1050,enterprise network(s) 1070, and service network(s) 1080, which can beembodied in local area network(s) (LANs), can also be interfaced withmobile network platform 1010 through PS gateway node(s) 1018. It is tobe noted that WANs 1050 and enterprise network(s) 1060 can embody, atleast in part, a service network(s) like IP multimedia subsystem (IMS).Based on radio technology layer(s) available in technology resource(s)1017, packet-switched gateway node(s) 1018 can generate packet dataprotocol contexts when a data session is established; other datastructures that facilitate routing of packetized data also can begenerated. To that end, in an aspect, PS gateway node(s) 1018 caninclude a tunnel interface (e.g., tunnel termination gateway (TTG) in3GPP UMTS network(s) (not shown)) which can facilitate packetizedcommunication with disparate wireless network(s), such as Wi-Finetworks.

In embodiment 1000, wireless network platform 1010 also includes servingnode(s) 1016 that, based upon available radio technology layer(s) withintechnology resource(s) 1017, convey the various packetized flows of datastreams received through PS gateway node(s) 1018. It is to be noted thatfor technology resource(s) 1017 that rely primarily on CS communication,server node(s) can deliver traffic without reliance on PS gatewaynode(s) 1018; for example, server node(s) can embody at least in part amobile switching center. As an example, in a 3GPP UMTS network, servingnode(s) 1016 can be embodied in serving GPRS support node(s) (SGSN).

For radio technologies that exploit packetized communication, server(s)1014 in wireless network platform 1010 can execute numerous applicationsthat can generate multiple disparate packetized data streams or flows,and manage (e.g., schedule, queue, format . . . ) such flows. Suchapplication(s) can include add-on features to standard services (forexample, provisioning, billing, customer support . . . ) provided bywireless network platform 1010. Data streams (e.g., content(s) that arepart of a voice call or data session) can be conveyed to PS gatewaynode(s) 1018 for authorization/authentication and initiation of a datasession, and to serving node(s) 1016 for communication thereafter. Inaddition to application server, server(s) 1014 can include utilityserver(s), a utility server can include a provisioning server, anoperations and maintenance server, a security server that can implementat least in part a certificate authority and firewalls as well as othersecurity mechanisms, and the like. In an aspect, security server(s)secure communication served through wireless network platform 1010 toensure network's operation and data integrity in addition toauthorization and authentication procedures that CS gateway node(s) 1012and PS gateway node(s) 1018 can enact. Moreover, provisioning server(s)can provision services from external network(s) like networks operatedby a disparate service provider; for instance, WAN 1050 or GlobalPositioning System (GPS) network(s) (not shown). Provisioning server(s)can also provision coverage through networks associated to wirelessnetwork platform 1010 (e.g., deployed and operated by the same serviceprovider), such as femto-cell network(s) (not shown) that enhancewireless service coverage within indoor confined spaces and offload RANresources in order to enhance subscriber service experience within ahome or business environment by way of UE 1075.

It is to be noted that server(s) 1014 can include one or more processorsconfigured to confer at least in part the functionality of macro networkplatform 1010. To that end, the one or more processor can execute codeinstructions stored in memory 1030, for example. It is should beappreciated that server(s) 1014 can include a content manager 1015,which operates in substantially the same manner as describedhereinbefore.

In example embodiment 1000, memory 1030 can store information related tooperation of wireless network platform 1010. Other operationalinformation can include provisioning information of mobile devicesserved through wireless platform network 1010, subscriber databases;application intelligence, pricing schemes, e.g., promotional rates,flat-rate programs, couponing campaigns; technical specification(s)consistent with telecommunication protocols for operation of disparateradio, or wireless, technology layers; and so forth. Memory 1030 canalso store information from at least one of telephony network(s) 1040,WAN 1050, enterprise network(s) 1060, or SS7 network 1070. In an aspect,memory 1030 can be, for example, accessed as part of a data storecomponent or as a remotely connected memory store.

In order to provide a context for the various aspects of the disclosedsubject matter, FIG. 10, and the following discussion, are intended toprovide a brief, general description of a suitable environment in whichthe various aspects of the disclosed subject matter can be implemented.While the subject matter has been described above in the general contextof computer-executable instructions of a computer program that runs on acomputer and/or computers, those skilled in the art will recognize thatthe disclosed subject matter also can be implemented in combination withother program modules. Generally, program modules include routines,programs, components, data structures, etc. that perform particulartasks and/or implement particular abstract data types.

In the subject specification, terms such as “store,” “storage,” “datastore,” data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory, by way of illustration, and not limitation, volatilememory 1020 (see below), non-volatile memory 1022 (see below), diskstorage 1024 (see below), and memory storage 1046 (see below). Further,nonvolatile memory can be included in read only memory (ROM),programmable ROM (PROM), electrically programmable ROM (EPROM),electrically erasable ROM (EEPROM), or flash memory. Volatile memory caninclude random access memory (RAM), which acts as external cache memory.By way of illustration and not limitation, RAM is available in manyforms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronousDRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM(ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).Additionally, the disclosed memory components of systems or methodsherein are intended to comprise, without being limited to comprising,these and any other suitable types of memory.

Moreover, it will be noted that the disclosed subject matter can bepracticed with other computer system configurations, includingsingle-processor or multiprocessor computer systems, mini-computingdevices, mainframe computers, as well as personal computers, hand-heldcomputing devices (e.g., PDA, phone, watch, tablet computers, netbookcomputers, . . . ), microprocessor-based or programmable consumer orindustrial electronics, and the like. The illustrated aspects can alsobe practiced in distributed computing environments where tasks areperformed by remote processing devices that are linked through acommunications network; however, some if not all aspects of the subjectdisclosure can be practiced on stand-alone computers. In a distributedcomputing environment, program modules can be located in both local andremote memory storage devices.

The embodiments described herein can employ artificial intelligence (AI)to facilitate automating one or more features described herein. Theembodiments (e.g., in connection with automatically identifying acquiredcell sites that provide a maximum value/benefit after addition to anexisting communication network) can employ various AI-based schemes forcarrying out various embodiments thereof. Moreover, the classifier canbe employed to determine a ranking or priority of the each cell site ofthe acquired network. A classifier is a function that maps an inputattribute vector, x=(x1, x2, x3, x4, . . . , xn), to a confidence thatthe input belongs to a class, that is, f(x)=confidence(class). Suchclassification can employ a probabilistic and/or statistical-basedanalysis (e.g., factoring into the analysis utilities and costs) toprognose or infer an action that a user desires to be automaticallyperformed. A support vector machine (SVM) is an example of a classifierthat can be employed. The SVM operates by finding a hypersurface in thespace of possible inputs, which the hypersurface attempts to split thetriggering criteria from the non-triggering events. Intuitively, thismakes the classification correct for testing data that is near, but notidentical to training data. Other directed and undirected modelclassification approaches include, e.g., naïve Bayes, Bayesian networks,decision trees, neural networks, fuzzy logic models, and probabilisticclassification models providing different patterns of independence canbe employed. Classification as used herein also is inclusive ofstatistical regression that is utilized to develop models of priority.

As will be readily appreciated, one or more of the embodiments canemploy classifiers that are explicitly trained (e.g., via a generictraining data) as well as implicitly trained (e.g., via observing UEbehavior, operator preferences, historical information, receivingextrinsic information). For example, SVMs can be configured via alearning or training phase within a classifier constructor and featureselection module. Thus, the classifier(s) can be used to automaticallylearn and perform a number of functions, including but not limited todetermining according to a predetermined criteria which of the acquiredcell sites will benefit a maximum number of subscribers and/or which ofthe acquired cell sites will add minimum value to the existingcommunication network coverage, etc.

As used in this application, in some embodiments, the terms “component,”“system” and the like are intended to refer to, or include, acomputer-related entity or an entity related to an operational apparatuswith one or more specific functionalities, wherein the entity can beeither hardware, a combination of hardware and software, software, orsoftware in execution. As an example, a component may be, but is notlimited to being, a process running on a processor, a processor, anobject, an executable, a thread of execution, computer-executableinstructions, a program, and/or a computer. By way of illustration andnot limitation, both an application running on a server and the servercan be a component. One or more components may reside within a processand/or thread of execution and a component may be localized on onecomputer and/or distributed between two or more computers. In addition,these components can execute from various computer readable media havingvarious data structures stored thereon. The components may communicatevia local and/or remote processes such as in accordance with a signalhaving one or more data packets (e.g., data from one componentinteracting with another component in a local system, distributedsystem, and/or across a network such as the Internet with other systemsvia the signal). As another example, a component can be an apparatuswith specific functionality provided by mechanical parts operated byelectric or electronic circuitry, which is operated by a software orfirmware application executed by a processor, wherein the processor canbe internal or external to the apparatus and executes at least a part ofthe software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can include a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components. While various components have been illustrated asseparate components, it will be appreciated that multiple components canbe implemented as a single component, or a single component can beimplemented as multiple components, without departing from exampleembodiments.

Further, the various embodiments can be implemented as a method,apparatus or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable device or computer-readable storage/communicationsmedia. For example, computer readable storage media can include, but arenot limited to, magnetic storage devices (e.g., hard disk, floppy disk,magnetic strips), optical disks (e.g., compact disk (CD), digitalversatile disk (DVD)), smart cards, and flash memory devices (e.g.,card, stick, key drive). Of course, those skilled in the art willrecognize many modifications can be made to this configuration withoutdeparting from the scope or spirit of the various embodiments.

In addition, the words “example” and “exemplary” are used herein to meanserving as an instance or illustration. Any embodiment or designdescribed herein as “example” or “exemplary” is not necessarily to beconstrued as preferred or advantageous over other embodiments ordesigns. Rather, use of the word example or exemplary is intended topresent concepts in a concrete fashion. As used in this application, theterm “or” is intended to mean an inclusive “or” rather than an exclusive“or”. That is, unless specified otherwise or clear from context, “Xemploys A or B” is intended to mean any of the natural inclusivepermutations. That is, if X employs A; X employs B; or X employs both Aand B, then “X employs A or B” is satisfied under any of the foregoinginstances. In addition, the articles “a” and “an” as used in thisapplication and the appended claims should generally be construed tomean “one or more” unless specified otherwise or clear from context tobe directed to a singular form.

Moreover, terms such as “user equipment,” “mobile station,” “mobile,”subscriber station,” “access terminal,” “terminal,” “handset,” “mobiledevice” (and/or terms representing similar terminology) can refer to awireless device utilized by a subscriber or user of a wirelesscommunication service to receive or convey data, control, voice, video,sound, gaming or substantially any data-stream or signaling-stream. Theforegoing terms are utilized interchangeably herein and with referenceto the related drawings.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer” andthe like are employed interchangeably throughout, unless contextwarrants particular distinctions among the terms. It should beappreciated that such terms can refer to human entities or automatedcomponents supported through artificial intelligence (e.g., a capacityto make inference based, at least, on complex mathematical formalisms),which can provide simulated vision, sound recognition and so forth.

As employed herein, the term “processor” can refer to substantially anycomputing processing unit or device comprising, but not limited tocomprising, single-core processors; single-processors with softwaremultithread execution capability; multi-core processors; multi-coreprocessors with software multithread execution capability; multi-coreprocessors with hardware multithread technology; parallel platforms; andparallel platforms with distributed shared memory. Additionally, aprocessor can refer to an integrated circuit, an application specificintegrated circuit (ASIC), a digital signal processor (DSP), a fieldprogrammable gate array (FPGA), a programmable logic controller (PLC), acomplex programmable logic device (CPLD), a discrete gate or transistorlogic, discrete hardware components or any combination thereof designedto perform the functions described herein. Processors can exploitnano-scale architectures such as, but not limited to, molecular andquantum-dot based transistors, switches and gates, in order to optimizespace usage or enhance performance of user equipment. A processor canalso be implemented as a combination of computing processing units.

As used herein, terms such as “data storage,” data storage,” “database,”and substantially any other information storage component relevant tooperation and functionality of a component, refer to “memorycomponents,” or entities embodied in a “memory” or components comprisingthe memory. It will be appreciated that the memory components orcomputer-readable storage media, described herein can be either volatilememory or nonvolatile memory or can include both volatile andnonvolatile memory.

What has been described above includes mere examples of variousembodiments. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing these examples, but one of ordinary skill in the art canrecognize that many further combinations and permutations of the presentembodiments are possible. Accordingly, the embodiments disclosed and/orclaimed herein are intended to embrace all such alterations,modifications and variations that fall within the spirit and scope ofthe appended claims. Furthermore, to the extent that the term “includes”is used in either the detailed description or the claims, such term isintended to be inclusive in a manner similar to the term “comprising” as“comprising” is interpreted when employed as a transitional word in aclaim.

1. A system, comprising: a memory to store executable instructions; anda processor, coupled to the memory, that facilitates execution of theexecutable instructions to perform operations, comprising: identifying aset of mobile devices served by a set of radio antennas; determiningthat a loading of a radio antenna of the set of radio antennas is to bereduced to maintain a data rate level, wherein the loading is a functionof a utilized antenna resource based on a first data rate and aninterference associated with the radio antenna, and wherein the datarate level is based on a function of a defined level; selecting a mobiledevice from the set of mobile devices to be subjected to data ratereduction, wherein the mobile device is selected based on a proportionof the loading of the radio antenna that is associated with the mobiledevice; and instructing that a second data rate of the mobile device isto be reduced.
 2. The system of claim 1, wherein the operations furthercomprise storing usage data representing usage histories for the set ofmobile devices, wherein the usage data comprises first informationrelating to bandwidth usage by the set of mobile devices and secondinformation relating to application usage by the set of mobile devices.3. The system of claim 2, wherein the selecting comprises selecting themobile device based on a usage history of the mobile device identifiedin the usage data.
 4. (canceled)
 5. The system of claim 1, wherein theoperations further comprise determining the mobile device hascontributed to the loading based on bandwidth usage data of the mobiledevice representing information about bandwidth used by the mobiledevice, distance data representing a distance of the mobile device fromthe radio antenna and interference data representing an amount ofinterference between the mobile device and the radio antenna.
 6. Thesystem of claim 1, wherein the operations further comprise: determininga location of the mobile device; and determining a load multiplier ofthe mobile device based on distance data representing a distance of themobile device from the radio antenna and map data representing a map ofstructural obstacles between the mobile device and the radio antenna. 7.The system of claim 1, wherein the operations further comprise:analyzing a past data rate of the radio antenna; and predicting a futuredata rate of the radio antenna based on the past data rate.
 8. Thesystem of claim 1, wherein the instructing the second data rate of themobile device to be reduced comprises instructing the mobile device thatthe second data rate of the mobile device is to be reduced to apredetermined level.
 9. The system of claim 1, wherein the instructingthe second data rate of the mobile device to be reduced comprisesinstructing the mobile device that a third data rate of an applicationon the mobile device is to be reduced to a predetermined level.
 10. Thesystem of claim 1, wherein the instructing the second data rate of themobile device to be reduced comprises instructing that anacknowledgement of a reception of a packet from the mobile device is tobe delayed.
 11. A method, comprising: determining, by a device includinga processor, identities of a set of mobile devices that are in a definedarea; monitoring, by the device, a resource usage of a radio antennathat communicates with the set of mobile devices in the defined area,wherein the resource usage of the radio antennas is a function of afirst data rate and interference associated with the radio antenna;determining, by the device, whether to adjust a second data rate of amobile device based on whether the first data rate of the radio antennasatisfies a defined criterion; and selecting, by the device, the mobiledevice for which the second data rate is to be adjusted based on apercentage of the resource usage associated with the mobile device,wherein the selecting is in response to a determination that the seconddata rate is to be adjusted.
 12. The method of claim 11, furthercomprising receiving, by the device, information about data rate levelsfor the set of mobile devices.
 13. The method of claim 12, wherein theselecting the mobile device comprises selecting the mobile device basedon comparing the data rate levels of the set of mobile devices.
 14. Themethod of claim 12, wherein the receiving the information comprisesdetermining the data rate levels based on respective amounts of datatransferred by the set of mobile devices per unit of time, respectivedistances of the set of mobile devices from the radio antenna orrespective interferences measured between the set of mobile devices andthe radio antenna.
 15. The method of claim 14, further comprisingdetermining, by the device, the respective distances of the set ofmobile devices from the radio antenna and the respective interferencesbased on an analysis of respective locations of the set of mobiledevices, a location of the radio antenna, or map data representative oflocations of structural obstacles between the set of mobile devices andthe radio antenna.
 16. The method of claim 11, further comprising:determining, by the device, a predicted data rate of the radio antennabased on a past data rate of the radio antenna and on a schedule ofevents in the defined area, wherein the determining whether to adjustthe second data rate comprises determining whether to limit the seconddata rate of the mobile device in response to the predicted data rate ofthe radio antenna being determined to satisfy the defined criterion. 17.The method of claim 11, wherein the determination that the second datarate of the mobile device is to be adjusted comprises a determinationthat an acknowledgement of a reception of a packet from the mobiledevice is being delayed.
 18. A computer readable storage device,comprising computer-executable instructions that, in response toexecution, cause a device including a processor to perform operations,comprising: monitoring a utilized resource level of a radio antenna,wherein the utilized resource level is a function of a first data rateand interference associated with the radio antenna; determining torestrict a second data rate of an application on a mobile device inresponse to the first data rate of the radio antenna being determined tosatisfy a defined level, wherein the mobile device is selected based ona contribution to the utilized resource level of the radio antenna bythe mobile device; and instructing the mobile device to restrict thesecond data rate of the application based on an amount of datatransferred over a defined time period by the application.
 19. Thecomputer readable storage device of claim 18, wherein the operationsfurther comprise: selecting the application based on a priority leveldetermined for the application.
 20. The computer readable storage deviceof claim 18, wherein the operations further comprise: selecting aprocedure for data rate limiting to be used to reduce the second datarate based on a type of the application.
 21. The computer readablestorage device of claim 18, wherein the operations further comprise:selecting the mobile device based on comparing the data rate levels ofthe set of mobile devices.