LTE fault-tolerant signaling approach

ABSTRACT

Fault-tolerant signaling in a Long Term Evolution (LTE) network architecture is disclosed. A method can comprise initiating a primary signaling path to a signaling server device; in response to the initiating, establishing an alternate signaling path to a web application server device, wherein a call session is established over the primary signaling path; monitoring the primary signaling path for a session failure; and in response to the session failure, switching the call session from using the primary signaling path to using the alternate signaling path.

STATEMENT CONCERNING GOVERNMENT INTEREST

This invention was made with government support under HC1013-14-C-0003awarded by Department of Homeland Security, Office of EmergencyCommunications. The government may have certain rights in the invention.

TECHNICAL FIELD

The disclosed subject matter relates to providing fault-tolerantsignaling in a LTE network architecture.

BACKGROUND

Voice over Long Term Evolution (VoLTE) is a standard for high-speedwireless communication for mobile phones and data terminals. It is basedon the Internet Protocol Multimedia Subsystem (IMS) network withspecific profiles for control and media planes of voice service on LongTerm Evolution (LTE). This approach results in the voice service beingdelivered as data flows within a LTE data bearer. This means theregenerally is no dependency on the legacy circuit switched voice network.

Web Real-Time Communication (WebRTC) provides web browser and mobileapplications with real-time communication (RTC) via applicationprogramming interfaces (APIs). It allows audio and video communicationto work inside web pages by allowing direct peer to peer communication.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is an illustration of a system for providing fault-tolerantsignaling in a LTE network architecture, in accordance with aspects ofthe subject disclosure.

FIG. 2 is a further depiction of a further system for providingfault-tolerant signaling in a LTE network architecture, in accordancewith aspects of the subject disclosure.

FIG. 3 provides illustration of an additional system for providingfault-tolerant signaling in a LTE network architecture, in accordancewith aspects of the subject disclosure.

FIG. 4 provides another illustration of a system for providingfault-tolerant signaling in a LTE network architecture, in accordancewith aspects of the subject disclosure.

FIG. 5 illustrates another depiction of a system for providingfault-tolerant signaling in a LTE network architecture, in accordancewith aspects of the subject disclosure.

FIG. 6 depicts a further system for providing fault-tolerant signalingin a LTE network architecture, in accordance with aspects of the subjectdisclosure

FIG. 7 provides illustration of an additional system for providingfault-tolerant signaling in a LTE network architecture, in accordancewith aspects of the subject disclosure

FIG. 8 illustrates another system for providing fault-tolerant signalingin a LTE network architecture, in accordance with aspects of the subjectdisclosure

FIG. 9 depicts a further system for providing fault-tolerant signalingin a LTE network architecture, in accordance with aspects of the subjectdisclosure

FIG. 10 illustrates yet another system for providing fault-tolerantsignaling in a LTE network architecture, in accordance with aspects ofthe subject disclosure

FIG. 11 provides illustration of a flow chart or method for providingfault-tolerant signaling in a LTE network architecture, in accordancewith aspects of the subject disclosure.

FIG. 12 is a block diagram of an example embodiment of a mobile networkplatform to implement and exploit various features or aspects of thesubject disclosure.

FIG. 13 illustrates a block diagram of a computing system operable toexecute the disclosed systems and methods in accordance with anembodiment.

DETAILED DESCRIPTION

The subject disclosure is now described with reference to the drawings,wherein like reference numerals are used to refer to like elementsthroughout. In the following description, for purposes of explanation,numerous specific details are set forth in order to provide a thoroughunderstanding of the subject disclosure. It may be evident, however,that the subject disclosure may be practiced without these specificdetails. In other instances, well-known structures and devices are shownin block diagram form in order to facilitate describing the subjectdisclosure.

The subject application leverages WebRTC technology to provide anadditional and/or alternative signaling path beyond the infrastructureprovided by the current LTE based IMS network architecture. Disclosedembodiments can be used, for example, by key government officials duringnational emergencies to provide a robust signaling architecture for LTEuser equipment devices by engineering a recovery path signaling path forVoLTE and conversational video end user devices. The disclosure providesthat a device, in response to detecting a call setup failure (e.g., afailure in the underlying IMS architecture), can initiate and maintaincommunications between calling and receiving parties (e.g., calling andreceiving end user devices) by using alternative/backup non-IMSsignaling infrastructures and alternative/backup data paths. The goalthat the subject disclosure seeks to achieve is to provide end userdevices with ultra-reliable voice and video sessions.

While the subject application was initially designed to provide abackup/alternative signaling to IMS during severe network stressconditions, the disclosure can find general utility and applicability bytypically all LTE enabled devices at any time.

As described, the subject application discloses a first device (e.g., afirst user equipment (UE) device) that initiates a communication session(e.g., a media flow representing at least voice data, audio data, videodata, and/or general data (overhead data, text data, . . . ) with asecond device (e.g., a second user equipment (UE) device). For ease ofexposition the first device can be referred to as the calling device (orcalling party) and the second device can be referred to as the receivingdevice (or receiving party). In order to initiate and/or establish thecommunication session (e.g., a voice over long term evolution (VoLTE)communication session) between the calling device and the receivingdevice, the calling device can establish/initiate a communicationsession with a signaling server device (e.g., a base station device suchas an evolved NodeB (eNodeB) device) using one or more establishmentprotocols. As will be appreciated by those with ordinary skill, withoutlimitation or loss of generality, the signaling server device can be amember of a grouping of similarly configured signaling server devices;the grouping of signaling server devices and/or other groupings ofaffiliated devices can comprise a network topology.

The signaling server device, in response to recognizing that the callingdevice seeks to initiate and establish communication with the receivingdevice can facilitate communication with the receiving device using anappropriate establishment protocol(s). Once a communication session hasbeen established, the calling device and the receiving device canthereafter communicate via a “signaling path” established through thefunctionalities and facilities provided by the signaling server device.The signaling part can also be referred to as an IMS signaling path.

The foregoing signaling path (e.g., primary signaling path), in times ofnetwork stress and the like, can be subject to failure. For example,problems with initiating and/or establishing the signaling path betweenthe first and second devices can arise when a calling party initiallyattempts to establish a communication session with the signaling serverdevice, for example where contact with the signaling server device fromthe first device becomes inoperable because of a network failure.Further problems can arise when the signaling server device attempts toestablish a communication session with the receiving device, once againbecause of a failure due to a wider network failure. Additional problemscan also manifest themselves once the signaling path has beenestablished between the calling party and receiving party (e.g. in midcommunication session between the calling party and the receivingparty).

In order to alleviate, mitigate, and/or obviate the aforementionedpossible signaling path failures, the subject application discloses thatwhen the first device attempts to initiate a signaling path with thesecond device, simultaneously and/or in near contemporaneity with and inresponse to the first device initiating the communication session withthe second device (e.g., via the facilities and functionalities of thesignaling server device), a web application server device, usingfunctionalities and facilities associated with WebRTC, can also becontacted by the first device. The web application server device throughuse of the functionalities and functionalities provided by WebRTC inconjunction with a controlling wrapper application can establish asecondary signaling path between the first device and the second device.The secondary signaling path can become fully operable in response to adetermination that there is a failure with regard to the primarysignaling path. The secondary signaling path can become fullyoperational without users of either the first device or the seconddevice becoming aware of the switch over between the primary signalingpath and the secondary signaling path; or if indication of the switchover between the primary signaling path and the secondary signaling pathdeemed necessary, such indication can, for example, be provided by animperceptible “click” sound. The secondary signaling path can also bereferred to as a non-IMS signaling path or as an alternative signalingpath.

The disclosed systems and methods, in accordance with variousembodiments, provide a system, apparatus, or device comprising: aprocessor, and a memory that stores executable instructions that, whenexecuted by the processor, facilitate performance of operations. Theoperations can comprise detecting initiation of a primary signaling pathto a signaling server device; initiating an alternate signaling path toa web application server device based on the detecting, wherein a callsession is established over the primary signaling path; monitoring theprimary signaling path for a session failure; and as a function of thesession failure, switching the call session from using the primarysignaling path to using the alternate signaling path.

Additional operations can comprise collecting calling information datarepresentative of the primary signaling path, establishing the alternatesignaling path using the calling information data, and as a function ofthe monitoring, initiating a failure timer. Further operations caninclude based on the initiating the alternate signaling path, furtherinitiating a call establishment service request to the web applicationserver device, and in response to the call session being established viathe primary signaling path, facilitating canceling of the callestablishment service request.

In accordance with the foregoing, the system, apparatus, or device canbe a first device, and the signaling server device can be a seconddevice of a group of network devices that operate using internetprotocol multimedia core network subsystem signaling. Additionally,and/or alternatively, the web application server device can be a seconddevice of a group of network devices that operate using alternatesignaling other than internet protocol multimedia core network subsystemsignaling.

In accordance with additional and/or alternative embodiments, thedisclosure further describes a system, apparatus, or device comprising:a processor, and a memory that stores executable instructions that, whenexecuted by the processor, facilitate performance of operations. Theoperations can comprise detecting initiation of a primary signaling pathto a signaling server device, wherein a call session is established viathe primary signaling path; based on the detecting, initiating analternate signaling path, as an alternative to the primary signalingpath, to a web application server device; monitoring the primarysignaling path for a session failure of the call session; and as afunction of the session failure, switching the call session from usingthe primary signaling path to using the alternate signaling path.

Additional operations can comprise collecting, from a user deviceinitiating the call session, calling information data representative ofthe primary signaling path; initiating the alternate signaling pathusing the calling information data; and as a function of the monitoring,initiating a failure timer that is used to determine, as a function ofan elapse of time as measured by the failure timer, that the sessionfailure has occurred. Further operations can comprise based on thealternate signaling path having been initiated, further initiating acall establishment service request to the web application server device;and in response to the call session being determined to have beenestablished via the primary signaling path, facilitating canceling ofthe call establishment service request.

In accordance with the foregoing, the system, apparatus, or device can afirst device, and the signaling server device can be a second device ofa group of network devices that operate using internet protocolmultimedia core network subsystem signaling; and the web applicationserver device can be a second device of a group of network devices thatoperate using alternate signaling other than internet protocolmultimedia core network subsystem signaling.

In accordance with further embodiments, the subject disclosure describesa method, comprising a series of acts that can include: initiating, by adevice comprising a processor, a primary signaling path to a signalingserver device; in response to the initiating, establishing, by thedevice, an alternate signaling path to a web application server device,wherein a call session is established over the primary signaling path;monitoring, by the device, the primary signaling path for a sessionfailure; and in response to the session failure, switching, by thedevice, the call session from using the primary signaling path to usingthe alternate signaling path.

Further acts can comprise: in response to initiating the primarysignaling path, collecting, by the device, calling information datarepresentative of the primary signaling path; establishing, by thedevice, the alternate signaling path using the calling information data;and initiating, by the device, a countdown timer in response toestablishing the alternate signaling path; Additional acts can include:in response to initiating the alternate signaling path, furtherinitiating, by the device, a call establishment service request to theweb application server device; and in response to detecting a success inestablishing the call session, facilitating, by the device, cancelingthe call establishment service request.

In accordance with the foregoing, the signaling server device can be afirst device of a network of devices that provide a voice over long termevolution core network service, and the web application server devicecan be a second device of the network of devices that provide a voiceover internet protocol network service.

In accordance with additional embodiments, the subject disclosuredescribes a method, comprising a series of acts that can include:initiating, by a device comprising a processor, a primary signaling pathto a signaling server device; in response to the initiating,establishing, by the device, an alternate signaling path to a webapplication server device, wherein a call session is established usingthe primary signaling path, and wherein the alternate signaling path isan alternative path to the primary signaling path; monitoring, by thedevice, the primary signaling path for a failure of the call session;and in response to the failure of the call session, switching, by thedevice, the call session from using the primary signaling path to usingthe alternate signaling path.

Further acts performed by the method can comprise: in response toinitiating the primary signaling path, collecting, by the device,calling information data representative of the primary signaling path,wherein the calling information data is received from a user device;establishing the alternate signaling path using the calling informationdata; and initiating, by the device, a countdown timer in response tothe establishing of the alternate signaling path. Additional acts cancomprise: in response to the establishing of the alternate signalingpath, initiating, by the device, a call establishment service request tothe web application server device; and in response to detecting asuccess in establishing the call session, facilitating, by the device,canceling the call establishment service request.

In accordance with the foregoing, the signaling server device can be afirst device of a network of devices that provide a voice over long termevolution core network service; and the web application server devicecan be a second device of the network of devices that provide a voiceover internet protocol network service.

In accordance with still further embodiments, the subject disclosuredescribes a machine readable storage medium, a computer readable storagedevice, or non-transitory machine readable media comprising instructionsthat, in response to execution, cause a computing system comprising atleast one processor to perform operations. The operations can include:establishing a primary signaling path to a signaling server device; inresponse to the establishing, initiating creation of an alternatesignaling path to a web application server device, wherein a callsession is established over the primary signaling path; monitoring theprimary signaling path for a session failure; and in response to thesession failure, switching the call session from using the primarysignaling path to using the alternate signaling path. Additionaloperations can include initiating, to the web application server device,a call establishment need service request, and in response to detectingsuccess in establishing the call session, facilitating cancelation ofthe call establishment need service request.

In accordance with the foregoing, the signaling server device enables avoice over long term evolution core network service, and the webapplication server device enables a voice over internet protocol networkservice.

In accordance with yet further embodiments, the subject disclosuredescribes a machine readable storage medium, a computer readable storagedevice, or non-tangible machine readable media comprising instructionsthat, in response to execution, cause a computing device comprising atleast one processor to perform operations. The operations can comprise:establishing a primary signaling path to a signaling server device; inresponse to the establishing, initiating creation of an alternatesignaling path to a web application server device, wherein a callsession is established via the primary signaling path; monitoring theprimary signaling path for failure of the call session; and in responseto the failure, switching the call session from using the primarysignaling path to using the alternate signaling path. Additionaloperations can comprise initiating, to the web application serverdevice, a call establishment need service request, and in response todetecting success in establishing the call session, facilitatingcancelation of the call establishment need service request.

Now with reference to the Figures, FIG. 1 illustrates a system 100 thatin accordance with various embodiments provides for fault-tolerantsignaling in a LTE network architecture. System 100 can include asurveillance engine 102 and fault engine 104 that can each be coupled toa processor 106, memory 108, and storage 110. Each of surveillanceengine 102 and fault engine 104 can be in communication with processor106 for facilitating operation of computer or machine executableinstructions and/or components by each of surveillance engine 102 andfault engine 104, memory 108, for storing data and/or the computer ormachine executable instructions and/or components, and storage 110 forproviding longer term storage of data and/or machine and/or computerreadable instructions. Additionally, system 100 can also receive input112 for use, manipulation, and/or transformation by each of surveillanceengine 102 and fault engine 104 to produce one or more useful, concrete,and tangible result, and/or transform one or more articles to differentstates or things. Further, system 100 can also generate and output theuseful, concrete, and tangible results and/or the transformed one ormore articles produced by each of surveillance engine 102 and faultengine 104 and output as output 114.

System 100, for purposes of elucidation, can be any type of mechanism,machine, device, facility, apparatus, and/or instrument that includes aprocessor and/or is capable of effective and/or operative communicationwith a wired and/or wireless network topology. Mechanisms, machines,apparatuses, devices, facilities, and/or instruments that can comprisesystem 100 can include tablet computing devices, handheld devices,server class computing machines and/or databases, laptop computers,notebook computers, desktop computers, cell phones, smart phones,consumer appliances and/or instrumentation, industrial devices and/orcomponents, hand-held devices, personal digital assistants, multimediaInternet enabled phones, multimedia players, and the like.

System 100 (e.g., surveillance engine 102 and/or fault engine 104) canreceive (as input 112) data representative of an initiation request toinitiate and establish a communication session (e.g., a primarysignaling path) between a first device and a second device. Theinitiation request can comprise data representative of informationassociated with calling party information (e.g., unique originatingidentifier (calling party's telephone number), quality of service (QoS)data, and the like) and receiving party information (e.g., uniquedestination identifier (receiving party's telephone number), etc.). Thedata representative of information associated with calling partyinformation and receiving party information can be used, for instance,by a signaling service device to establish a communications session(e.g., IMS signaling path) between the calling party in the receivingparty.

In response to receiving the data representative of informationassociated with calling party information and receiving partyinformation, system 100 can determine whether IMS network infrastructureis operational, for example, system 100 can establish whether or notthere are hard failures associated with the wider IMS networkarchitecture. Further, system 100 can also trigger high level interruptsand/or watchdog timers (or generic timers configured to be: watchdogtimers; countdown timers—timers that count down (decrease) from a firstvalue to a second value; count-up timers—timers that count up (increase)from a first value to a second value; and the like). System 100, as afunction of, in response to, or based on, high level interrupts beingtriggered and/or input from the watchdog timers can further ascertainwhether an IMS signaling path between the first device and the seconddevice has been established via a device of groups of devices that cancomprise the wider IMS network architecture. For example, where time, asdetermined by a watchdog timer, has reached a threshold value and thesignaling path between the first device and the second device has notbeen established, system 100 can determine that there has been a failurewith the underlying IMS network infrastructure. Where system 100determines that a signaling path has been established between the firstdevice and the second device, system 100 can determine that acommunication session between the first device and the second device isin session.

Simultaneously, or in near contemporaneity, with receiving datarepresentative of an initiation request to initiate and establish thecommunication session (e.g., the primary signaling path) between a firstdevice and a second device, system 100 (e.g., surveillance engine 102and/or fault engine 104) can also initiate processes needed to establisha secondary signaling path (a non-IMS signaling path) from the firstdevice to the second device. It should be appreciated that the secondarysignaling path is generally, without limitation or loss of generalityand for the purposes of this disclosure, only used when there areproblems with initiating, establishing, and/or maintaining the primarysignaling path (e.g., the IMS signaling path) between the first deviceand the second device. System 100 in order to initiate and establish thesecondary signaling path from the first device to the second device cancollect the calling information included in the initiation request(e.g., calling party information—unique originating identifier (callingparty's telephone number) quality of service (QoS) data, security dataand the like; and receiving party information—unique destinationidentifier (receiving party's telephone number), etc.) and initiate awrapper application process that together with aspects included withWebRTC can contact the web application server device. As has been notedabove, the secondary signaling path is a non-IMS signaling path thatbecomes operational in response to a determination that there has been afailure with regard to the primary IMS signaling path.

System 100 in response to the determination that there has been afailure with regard to the primary IMS signaling path between the firstdevice and the second device, can initiate the secondary signaling pathbetween the first device and the second device. Additionally, system 100can determine whether a request to establish the secondary signalingpath has been successful, and thereafter system 100 can apply the callattributes that can have been extant in regard to the primary IMSsignaling path between the first device and the second device (e.g., QoSdata, Codex data, security data, etc.)

FIG. 2 illustrates system 100, now represented as system 200, that inaccordance with various embodiments provides for fault-tolerantsignaling in a LTE network architecture. In this depiction, system 200can comprise surveillance engine 102 and fault engine 104 that can becommunicatively coupled to processor 106, memory 108, and storage 110.Additionally, communicatively coupled to surveillance engine 102 can bedetection component 202. Surveillance engine 102 in conjunction withdetection component 202 can detect when a voice over long term evolution(VoLTE) session or a conventional video call session is being initiated,for example, by a first device attempting to establish a VoLTE sessionand/or a conventional video call session with a second device.

In regard to first device and second device, these devices can be anytype of mechanism, machine, device, facility, apparatus, and/orinstrument that includes a processor and/or is capable of effectiveand/or operative communication with a wired and/or wireless networktopology. Mechanisms, machines, apparatuses, devices, facilities, and/orinstruments that can comprise first device and/or second device caninclude, tablet computing devices, handheld devices, server classcomputing machines and/or databases, laptop computers, notebookcomputers, desktop computers, cell phones, smart phones, consumerappliances and/or instrumentation, industrial devices and/or components,hand-held devices, personal digital assistants, multimedia Internetenabled phones, multimedia players, devices associated with satellitetechnologies, devices included in stationary vehicles and/or vehicles inmotion, devices associated with aeronautical vehicles, robotic devices,and the like.

FIG. 3 provides additional illustration of system 100, now representedas system 300, that in accordance with various embodiments provides forfault-tolerant signaling in a LTE network architecture. As illustrated,system 300 can comprise detection component 202 operatively coupled tosurveillance engine 102, fault engine 104, processor 106, memory 108,and storage 110. Further, as illustrated system 300 can comprisedetermination component 302 that, in conjunction with detectioncomponent 202 and surveillance engine 102, and as a function ofdetection component 202 having detected that a first device isattempting to establish a VoLTE session and/or a conventional video callsession with a second device, can determine whether the IMS networkinfrastructure is operational. For instance, determination component 302can establish whether or not there are hard failures associated with thewider IMS network architecture.

FIG. 4 provides additional depiction of system 100, now represented assystem 400, that in accordance with various embodiments provides forfault-tolerant signaling in a LTE network architecture. In thisinstance, system 400 can comprise trigger component 402 that can operatein collaboration with determination component 302, detection component202, and surveillance engine 102 to trigger high level interrupts and/orwatchdog timers. The watchdog timers associated with trigger component402 can be generic timers that can be configured to be watchdog timers;countdown timers—timers that count down (decrease) from a firstthreshold value to a second threshold value; count up timers—timers thatcount up (increase) from a first threshold value to a second thresholdvalue; and the like.

FIG. 5 provides further depiction of system 100, now represented assystem 500, that in accordance with various embodiments provides forfault-tolerant signaling in a LTE network architecture. System 500illustrates a service component 502 that in conjunction with triggercomponent 402, determination component 302, detection component 202, andsurveillance engine 102, and in response to, based on, and/or as afunction of high level interrupts being triggered and/or input from thewatchdog timers, can further determine whether an IMS signaling pathbetween the first device and the second device has been established viathe functionalities and functionalities associated with the wider IMSnetworking architecture(s) provided by one or more mobile networkingoperator (MNO). For instance, where time, as determined by a watchdogtimer, has reached a threshold value in the signaling path from thefirst device to the second device has not been established, triggercomponent 402 in concert with service component 502 can determine thatthere has been a failure with the underlying IMS network infrastructure.Where trigger component 402 and service component 502 determine thatthere has been a failure to establish an IMS signaling path between thefirst device and the second device, and in response to theaforementioned determination (e.g., failure to establish an IMSsignaling path between the first and the second devices), servicecomponent 502 can also cancel a service request that can have beeninitiated initially in order to establish the IMS signaling path betweenthe first device and the second device, and, as will be discussedsubsequently in connection with fault engine 104 and initiationcomponent 802, service component 502 can commence establishing asecondary/alternate signaling path (a non-IMS signaling path) betweenthe first device and the second device.

FIG. 6 provides yet further illustration of system 100, now representedas system 600, that in accordance with various embodiments provides forfault-tolerant signaling in a LTE network architecture. In regard tosystem 600, system 600 can comprise collection component 602 that canoperate in concert with service component 502, trigger component 402,determination component 302, detection component 202, and surveillanceengine 102 can collect the calling information included with theinitiation request from the first device (e.g., calling partyinformation—unique originating identifier (e.g., subscriber numberassociated with the first device), quality of service (QoS) dataassociated with the first device, security data (e.g., publiccryptographic key(s)) associated with the first device, and receivingparty information—unique destination identifier (e.g., subscriber numberassociated with the second device), QoS data associated with the seconddevice, security data associated with the second device, and the like.The calling information included with the initiation request from thefirst device attempting to establish a signaling path to the seconddevice, it should be noted, will generally be the same information thatwill be used to establish the non-IMS signaling path.

FIG. 7 provides still further depiction of system 100, now representedas system 700, that in accordance with various embodiments provides forfault-tolerant signaling in a LTE network architecture. System 700 asdepicted can comprise collaboration component 702 that in conjunctionwith the functionalities and facilities provided by collection component602, service component 502, trigger component 402, determinationcomponent 302, detection component 202, and surveillance engine 102 caninitiate a wrapper application process that together with aspectsincluded with the WebRTC can contact a web application server device inorder to establish a secondary/alternate signaling path between thefirst device and the second device. As will be appreciated by thosehaving ordinary skill in the art, the Web application server device canestablish the secondary/alternate signaling path based on informationsupplied by collection component 602. The secondary/alternate signalingpath, as will also be appreciated by those having skill in the art, willbe a non-IMS signaling path between the first device and the seconddevice, thereby circumventing any issues that might be preventing theestablishment of a IMS signaling path. The non-IMS signaling path can bedistinct and separate, and thereby provide a redundancy, to the IMSsignaling path. The non-IMS signaling path therefore provides forfault-tolerance signaling in a LTE network architecture environment.

FIG. 8 provides further illustration of system 100, now represented assystem 800, that in accordance with various embodiments provides forfault-tolerant signaling in a LTE network architecture. System 800 cancomprise surveillance engine 102 and fault engine 104 that can becommunicatively coupled to processor 106, memory 108, and storage 110.Additionally, system 800 also can comprise collaboration component 702,collection component 602, service component 502, trigger component 402,determination component 302, and detection component 202 that can becommunicatively coupled to surveillance engine 102. Communicativelycoupled to fault engine 104 can be initiation component 802. Faultengine 104 in collaboration with initiation component 802, in responseto detection component 202 having received data representative of aninitiation request to initiate and establish a communication session(e.g. a primary signaling path) between a first device and a seconddevice, can initiate, simultaneously or in near contemporaneity,processes and/or procedures needed to initiate (though not necessarilyestablish) and maintain in a state of hibernation or stasis, a secondarysignaling path from the first device to the second device. As has beennoted above, the secondary signaling path (e.g., the non-IMS signalingpath) is typically, without limitation or loss of generality, only usedwhen there are problems with instantiating and/or maintaining a primarysignaling path (e.g., the IMS signaling path) between the first deviceand the second device. Thus, if and when a failure to establish ormaintain a primary signaling path between the first device and thesecond device is detected by service component 502, for example, anindication by service component 502 can be sent to initiation component802, at which time and in response to the indication directed by servicecomponent 502 initiation component 802 can bring the initiated secondarysignaling path out of the state of hibernation or stasis and establishthe secondary signaling path from the first device to the second device.

FIG. 9 provides further depiction of system 100, now represented assystem 900, that in accordance with various embodiments provides forfault-tolerant signaling in a LTE network architecture. System 900 cancomprise fault engine 104 communicatively and operatively coupled toinitiation component 802 and query component 902, wherein fault engine104, initiation component 802, and query component 902 in collaborationcan determine whether the secondary signaling path between the firstdevice and the second device has been established successfully. Ininstances where the secondary signaling path has not been, or cannot be,successfully established between the first device and the second device,this circumstance can be due to a generalized networking failureassociated with the non-IMS networking infrastructure, and as such asignaling path (e.g., IMS-signaling path and non-IMS signaling path) isunavailable and not communication can be established between the firstdevice and the second device.

FIG. 10 provides additional depiction of system 100, now represented assystem 1000, that in accordance with various embodiments provides forfault-tolerant signaling in a LTE network architecture. System 1000 cancomprise fault engine 104 that can be in operative communication withinitiation component 802, query component 902 and application component1002. In this instance, fault engine 104, initiation component 802,query component 902, and application component 1000 in collaborationwith one another can apply respective attribute data representing QoSattributes, security attributes, Codex data, etc. for each of the firstdevice and the second can be applied to the established secondarysignaling path (e.g., non-IMS signaling path) and a communicationsession between the first device and the second device can take place.

In view of the example system(s) described above, example method(s) thatcan be implemented in accordance with the disclosed subject matter canbe better appreciated with reference to flowchart in FIG. 11. Forpurposes of simplicity of explanation, example method disclosed hereinis presented and described as a series of acts; however, it is to beunderstood and appreciated that the disclosure is not limited by theorder of acts, as some acts may occur in different orders and/orconcurrently with other acts from that shown and described herein. Forexample, one or more example methods disclosed herein couldalternatively be represented as a series of interrelated states orevents, such as in a state diagram. Moreover, interaction diagram(s) mayrepresent methods in accordance with the disclosed subject matter whendisparate entities enact disparate portions of the methods. Furthermore,not all illustrated acts may be required to implement a describedexample method in accordance with the subject specification. Furtheryet, the disclosed example method can be implemented in combination withone or more other methods, to accomplish one or more aspects hereindescribed. It should be further appreciated that the example methoddisclosed throughout the subject specification are capable of beingstored on an article of manufacture (e.g., a computer-readable medium)to allow transporting and transferring such methods to computers forexecution, and thus implementation, by a processor or for storage in amemory.

FIG. 11 illustrates a method 1100 that provides for fault-tolerantsignaling in a LTE network architecture. Method 1100 can commence at act1102 where an initiation of a primary signaling path to a signalingservice device can be detected. At 1104, as a function of the detectionof the initiation of the primary signaling path to the signaling serverdevice, an alternative signaling path to a web application server devicecan be initiated. At 1106 the primary signaling path can be monitoredfor a session failure representative of a call session. At 1108 inresponse to determining that a session failure has occurred, switchingthe call session from using the primary signaling path to using thealternate signaling path.

It should be realized and appreciated by those of ordinary skill, theforegoing non-limiting example use application(s) are merelyillustrations of a use to which the disclosed and described solution canbe applied and thus are provided solely for the purposes of exposition.The described and disclosed subject matter is therefore not limited tothe foregoing example application(s), but can find applicability inother more generalized circumstances and use applications.

FIG. 12 presents an example embodiment 1200 of a mobile network platform1210 that can implement and exploit one or more aspects of the disclosedsubject matter described herein. Generally, wireless network platform1210 can include components, e.g., nodes, gateways, interfaces, servers,or disparate platforms, that facilitate both packet-switched (PS) (e.g.,internet protocol (IP), frame relay, asynchronous transfer mode (ATM))and circuit-switched (CS) traffic (e.g., voice and data), as well ascontrol generation for networked wireless telecommunication. As anon-limiting example, wireless network platform 1210 can be included intelecommunications carrier networks, and can be considered carrier-sidecomponents as discussed elsewhere herein. Mobile network platform 1210includes CS gateway node(s) 1212 which can interface CS traffic receivedfrom legacy networks like telephony network(s) 1240 (e.g., publicswitched telephone network (PSTN), or public land mobile network (PLMN))or a signaling system #7 (SS7) network 1270. Circuit switched gatewaynode(s) 1212 can authorize and authenticate traffic (e.g., voice)arising from such networks. Additionally, CS gateway node(s) 1212 canaccess mobility, or roaming, data generated through SS7 network 1260;for instance, mobility data stored in a visited location register (VLR),which can reside in memory 1230. Moreover, CS gateway node(s) 1212interfaces CS-based traffic and signaling and PS gateway node(s) 1218.As an example, in a 3GPP UMTS network, CS gateway node(s) 1212 can berealized at least in part in gateway GPRS support node(s) (GGSN). Itshould be appreciated that functionality and specific operation of CSgateway node(s) 1212, PS gateway node(s) 1218, and serving node(s) 1216,is provided and dictated by radio technology(ies) utilized by mobilenetwork platform 1210 for telecommunication.

In addition to receiving and processing CS-switched traffic andsignaling, PS gateway node(s) 1218 can authorize and authenticatePS-based data sessions with served mobile devices. Data sessions caninclude traffic, or content(s), exchanged with networks external to thewireless network platform 1210, like wide area network(s) (WANs) 1250,enterprise network(s) 1270, and service network(s) 1280, which can beembodied in local area network(s) (LANs), can also be interfaced withmobile network platform 1210 through PS gateway node(s) 1218. It is tobe noted that WANs 1250 and enterprise network(s) 1270 can embody, atleast in part, a service network(s) like IP multimedia subsystem (IMS).Based on radio technology layer(s) available in technology resource(s)1217, packet-switched gateway node(s) 1218 can generate packet dataprotocol contexts when a data session is established; other datastructures that facilitate routing of packetized data also can begenerated. To that end, in an aspect, PS gateway node(s) 1218 caninclude a tunnel interface (e.g., tunnel termination gateway (TTG) in3GPP UMTS network(s) (not shown)) which can facilitate packetizedcommunication with disparate wireless network(s), such as Wi-Finetworks.

In embodiment 1200, wireless network platform 1210 also includes servingnode(s) 1216 that, based upon available radio technology layer(s) withintechnology resource(s) 1217, convey the various packetized flows of datastreams received through PS gateway node(s) 1218. It is to be noted thatfor technology resource(s) 1217 that rely primarily on CS communication,server node(s) can deliver traffic without reliance on PS gatewaynode(s) 1218; for example, server node(s) can embody at least in part amobile switching center. As an example, in a 3GPP UMTS network, servingnode(s) 1216 can be embodied in serving GPRS support node(s) (SGSN).

For radio technologies that exploit packetized communication, server(s)1214 in wireless network platform 1210 can execute numerous applicationsthat can generate multiple disparate packetized data streams or flows,and manage (e.g., schedule, queue, format . . . ) such flows. Suchapplication(s) can include add-on features to standard services (forexample, provisioning, billing, customer support . . . ) provided bywireless network platform 1210. Data streams (e.g., content(s) that arepart of a voice call or data session) can be conveyed to PS gatewaynode(s) 1218 for authorization/authentication and initiation of a datasession, and to serving node(s) 1216 for communication thereafter. Inaddition to application server, server(s) 1214 can include utilityserver(s), a utility server can include a provisioning server, anoperations and maintenance server, a security server that can implementat least in part a certificate authority and firewalls as well as othersecurity mechanisms, and the like. In an aspect, security server(s)secure communication served through wireless network platform 1210 toensure network's operation and data integrity in addition toauthorization and authentication procedures that CS gateway node(s) 1212and PS gateway node(s) 1218 can enact. Moreover, provisioning server(s)can provision services from external network(s) like networks operatedby a disparate service provider; for instance, WAN 1250 or GlobalPositioning System (GPS) network(s) (not shown). Provisioning server(s)can also provision coverage through networks associated to wirelessnetwork platform 1210 (e.g., deployed and operated by the same serviceprovider), such as femto-cell network(s) (not shown) that enhancewireless service coverage within indoor confined spaces and offloadradio access network resources in order to enhance subscriber serviceexperience within a home or business environment by way of UE 1275.

It is to be noted that server(s) 1214 can include one or more processorsconfigured to confer at least in part the functionality of macro networkplatform 1210. To that end, the one or more processor can execute codeinstructions stored in memory 1230, for example. It is should beappreciated that server(s) 1214 can include a content manager 1215,which operates in substantially the same manner as describedhereinbefore.

In example embodiment 1200, memory 1230 can store information related tooperation of wireless network platform 1210. Other operationalinformation can include provisioning information of mobile devicesserved through wireless platform network 1210, subscriber databases;application intelligence, pricing schemes, e.g., promotional rates,flat-rate programs, couponing campaigns; technical specification(s)consistent with telecommunication protocols for operation of disparateradio, or wireless, technology layers; and so forth. Memory 1230 canalso store information from at least one of telephony network(s) 1240,WAN 1250, enterprise network(s) 1270, or SS7 network 1260. In an aspect,memory 1230 can be, for example, accessed as part of a data storecomponent or as a remotely connected memory store.

In order to provide a context for the various aspects of the disclosedsubject matter, FIG. 13, and the following discussion, are intended toprovide a brief, general description of a suitable environment in whichthe various aspects of the disclosed subject matter can be implemented.While the subject matter has been described above in the general contextof computer-executable instructions of a computer program that runs on acomputer and/or computers, those skilled in the art will recognize thatthe disclosed subject matter also can be implemented in combination withother program modules. Generally, program modules include routines,programs, components, data structures, etc. that perform particulartasks and/or implement particular abstract data types.

In the subject specification, terms such as “store,” “storage,” “datastore,” data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory, by way of illustration, and not limitation, volatilememory 1320 (see below), non-volatile memory 1322 (see below), diskstorage 1324 (see below), and memory storage 1346 (see below). Further,nonvolatile memory can be included in read only memory (ROM),programmable ROM (PROM), electrically programmable ROM (EPROM),electrically erasable ROM (EEPROM), or flash memory. Volatile memory caninclude random access memory (RAM), which acts as external cache memory.By way of illustration and not limitation, RAM is available in manyforms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronousDRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM(ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).Additionally, the disclosed memory components of systems or methodsherein are intended to comprise, without being limited to comprising,these and any other suitable types of memory.

Moreover, it will be noted that the disclosed subject matter can bepracticed with other computer system configurations, includingsingle-processor or multiprocessor computer systems, mini-computingdevices, mainframe computers, as well as personal computers, hand-heldcomputing devices (e.g., PDA, phone, watch, tablet computers, netbookcomputers, . . . ), microprocessor-based or programmable consumer orindustrial electronics, and the like. The illustrated aspects can alsobe practiced in distributed computing environments where tasks areperformed by remote processing devices that are linked through acommunications network; however, some if not all aspects of the subjectdisclosure can be practiced on stand-alone computers. In a distributedcomputing environment, program modules can be located in both local andremote memory storage devices.

FIG. 13 illustrates a block diagram of a computing system 1300 operableto execute the disclosed systems and methods in accordance with anembodiment. Computer 1312, which can be, for example, part of thehardware of system 130, includes a processing unit 1314, a system memory1316, and a system bus 1318. System bus 1318 couples system componentsincluding, but not limited to, system memory 1316 to processing unit1314. Processing unit 1314 can be any of various available processors.Dual microprocessors and other multiprocessor architectures also can beemployed as processing unit 1314.

System bus 1318 can be any of several types of bus structure(s)including a memory bus or a memory controller, a peripheral bus or anexternal bus, and/or a local bus using any variety of available busarchitectures including, but not limited to, Industrial StandardArchitecture (ISA), Micro-Channel Architecture (MSA), Extended ISA(EISA), Intelligent Drive Electronics, VESA Local Bus (VLB), PeripheralComponent Interconnect (PCI), Card Bus, Universal Serial Bus (USB),Advanced Graphics Port (AGP), Personal Computer Memory CardInternational Association bus (PCMCIA), Firewire (IEEE 1194), and SmallComputer Systems Interface (SCSI).

System memory 1316 can include volatile memory 1320 and nonvolatilememory 1322. A basic input/output system (BIOS), containing routines totransfer information between elements within computer 1312, such asduring start-up, can be stored in nonvolatile memory 1322. By way ofillustration, and not limitation, nonvolatile memory 1322 can includeROM, PROM, EPROM, EEPROM, or flash memory. Volatile memory 1320 includesRAM, which acts as external cache memory. By way of illustration and notlimitation, RAM is available in many forms such as SRAM, dynamic RAM(DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM),enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), Rambus direct RAM(RDRAM), direct Rambus dynamic RAM (DRDRAM), and Rambus dynamic RAM(RDRAM).

Computer 1312 can also include removable/non-removable,volatile/non-volatile computer storage media. FIG. 13 illustrates, forexample, disk storage 1324. Disk storage 1324 includes, but is notlimited to, devices like a magnetic disk drive, floppy disk drive, tapedrive, flash memory card, or memory stick. In addition, disk storage1324 can include storage media separately or in combination with otherstorage media including, but not limited to, an optical disk drive suchas a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive),CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive(DVD-ROM). To facilitate connection of the disk storage devices 1324 tosystem bus 1318, a removable or non-removable interface is typicallyused, such as interface 1326.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disk (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or other tangible media which can beused to store desired information. In this regard, the term “tangible”herein as may be applied to storage, memory or computer-readable media,is to be understood to exclude only propagating intangible signals perse as a modifier and does not relinquish coverage of all standardstorage, memory or computer-readable media that are not only propagatingintangible signals per se. In an aspect, tangible media can includenon-transitory media wherein the term “non-transitory” herein as may beapplied to storage, memory or computer-readable media, is to beunderstood to exclude only propagating transitory signals per se as amodifier and does not relinquish coverage of all standard storage,memory or computer-readable media that are not only propagatingtransitory signals per se. For the avoidance of doubt, the term“computer-readable storage device” is used and defined herein to excludetransitory media. Computer-readable storage media can be accessed by oneor more local or remote computing devices, e.g., via access requests,queries or other data retrieval protocols, for a variety of operationswith respect to the information stored by the medium.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

It can be noted that FIG. 13 describes software that acts as anintermediary between users and computer resources described in suitableoperating environment 1300. Such software includes an operating system1328. Operating system 1328, which can be stored on disk storage 1324,acts to control and allocate resources of computer system 1312. Systemapplications 1330 take advantage of the management of resources byoperating system 1328 through program modules 1332 and program data 1334stored either in system memory 1316 or on disk storage 1324. It is to benoted that the disclosed subject matter can be implemented with variousoperating systems or combinations of operating systems.

A user can enter commands or information into computer 1312 throughinput device(s) 1336. As an example, mobile device and/or portabledevice can include a user interface embodied in a touch sensitivedisplay panel allowing a user to interact with computer 1312. Inputdevices 1336 include, but are not limited to, a pointing device such asa mouse, trackball, stylus, touch pad, keyboard, microphone, joystick,game pad, satellite dish, scanner, TV tuner card, digital camera,digital video camera, web camera, cell phone, smartphone, tabletcomputer, etc. These and other input devices connect to processing unit1314 through system bus 1318 by way of interface port(s) 1338. Interfaceport(s) 1338 include, for example, a serial port, a parallel port, agame port, a universal serial bus (USB), an infrared port, a Bluetoothport, an IP port, or a logical port associated with a wireless service,etc. Output device(s) 1340 use some of the same type of ports as inputdevice(s) 1336.

Thus, for example, a USB port can be used to provide input to computer1312 and to output information from computer 1312 to an output device1340. Output adapter 1342 is provided to illustrate that there are someoutput devices 1340 like monitors, speakers, and printers, among otheroutput devices 1340, which use special adapters. Output adapters 1342include, by way of illustration and not limitation, video and soundcards that provide means of connection between output device 1340 andsystem bus 1318. It should be noted that other devices and/or systems ofdevices provide both input and output capabilities such as remotecomputer(s) 1344.

Computer 1312 can operate in a networked environment using logicalconnections to one or more remote computers, such as remote computer(s)1344. Remote computer(s) 1344 can be a personal computer, a server, arouter, a network PC, cloud storage, cloud service, a workstation, amicroprocessor based appliance, a peer device, or other common networknode and the like, and typically includes many or all of the elementsdescribed relative to computer 1312.

For purposes of brevity, only a memory storage device 1346 isillustrated with remote computer(s) 1344. Remote computer(s) 1344 islogically connected to computer 1312 through a network interface 1348and then physically connected by way of communication connection 1350.Network interface 1348 encompasses wire and/or wireless communicationnetworks such as local-area networks (LAN) and wide-area networks (WAN).LAN technologies include Fiber Distributed Data Interface (FDDI), CopperDistributed Data Interface (CDDI), Ethernet, Token Ring and the like.WAN technologies include, but are not limited to, point-to-point links,circuit-switching networks like Integrated Services Digital Networks(ISDN) and variations thereon, packet switching networks, and DigitalSubscriber Lines (DSL). As noted below, wireless technologies may beused in addition to or in place of the foregoing.

Communication connection(s) 1350 refer(s) to hardware/software employedto connect network interface 1348 to bus 1318. While communicationconnection 1350 is shown for illustrative clarity inside computer 1312,it can also be external to computer 1312. The hardware/software forconnection to network interface 1348 can include, for example, internaland external technologies such as modems, including regular telephonegrade modems, cable modems and DSL modems, ISDN adapters, and Ethernetcards.

The above description of illustrated embodiments of the subjectdisclosure, including what is described in the Abstract, is not intendedto be exhaustive or to limit the disclosed embodiments to the preciseforms disclosed. While specific embodiments and examples are describedherein for illustrative purposes, various modifications are possiblethat are considered within the scope of such embodiments and examples,as those skilled in the relevant art can recognize.

In this regard, while the disclosed subject matter has been described inconnection with various embodiments and corresponding Figures, whereapplicable, it is to be understood that other similar embodiments can beused or modifications and additions can be made to the describedembodiments for performing the same, similar, alternative, or substitutefunction of the disclosed subject matter without deviating therefrom.Therefore, the disclosed subject matter should not be limited to anysingle embodiment described herein, but rather should be construed inbreadth and scope in accordance with the appended claims below.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising, but not limited to comprising, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Processors can exploit nano-scale architectures suchas, but not limited to, molecular and quantum-dot based transistors,switches and gates, in order to optimize space usage or enhanceperformance of user equipment. A processor may also be implemented as acombination of computing processing units.

In the subject specification, terms such as “store,” “storage,” “datastore,” data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory.

As used in this application, the terms “component,” “system,”“platform,” “layer,” “selector,” “interface,” and the like are intendedto refer to a computer-related entity or an entity related to anoperational apparatus with one or more specific functionalities, whereinthe entity can be either hardware, a combination of hardware andsoftware, software, or software in execution. As an example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. By way of illustration and not limitation, both anapplication running on a server and the server can be a component. Oneor more components may reside within a process and/or thread ofexecution and a component may be localized on one computer and/ordistributed between two or more computers. In addition, these componentscan execute from various computer readable media, device readablestorage devices, or machine readable media having various datastructures stored thereon. The components may communicate via localand/or remote processes such as in accordance with a signal having oneor more data packets (e.g., data from one component interacting withanother component in a local system, distributed system, and/or across anetwork such as the Internet with other systems via the signal). Asanother example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry, which is operated by a software or firmwareapplication executed by a processor, wherein the processor can beinternal or external to the apparatus and executes at least a part ofthe software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can include a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components.

In addition, the term “or” is intended to mean an inclusive “or” ratherthan an exclusive “or.” That is, unless specified otherwise, or clearfrom context, “X employs A or B” is intended to mean any of the naturalinclusive permutations. That is, if X employs A; X employs B; or Xemploys both A and B, then “X employs A or B” is satisfied under any ofthe foregoing instances. Moreover, articles “a” and “an” as used in thesubject specification and annexed drawings should generally be construedto mean “one or more” unless specified otherwise or clear from contextto be directed to a singular form.

Moreover, terms like “user equipment (UE),” “mobile station,” “mobile,”subscriber station,” “subscriber equipment,” “access terminal,”“terminal,” “handset,” and similar terminology, refer to a wirelessdevice utilized by a subscriber or user of a wireless communicationservice to receive or convey data, control, voice, video, sound, gaming,or substantially any data-stream or signaling-stream. The foregoingterms are utilized interchangeably in the subject specification andrelated drawings. Likewise, the terms “access point (AP),” “basestation,” “NodeB,” “evolved Node B (eNodeB),” “home Node B (HNB),” “homeaccess point (HAP),” “cell device,” “sector,” “cell,” and the like, areutilized interchangeably in the subject application, and refer to awireless network component or appliance that serves and receives data,control, voice, video, sound, gaming, or substantially any data-streamor signaling-stream to and from a set of subscriber stations or providerenabled devices. Data and signaling streams can include packetized orframe-based flows.

Additionally, the terms “core-network”, “core”, “core carrier network”,“carrier-side”, or similar terms can refer to components of atelecommunications network that typically provides some or all ofaggregation, authentication, call control and switching, charging,service invocation, or gateways. Aggregation can refer to the highestlevel of aggregation in a service provider network wherein the nextlevel in the hierarchy under the core nodes is the distribution networksand then the edge networks. UEs do not normally connect directly to thecore networks of a large service provider but can be routed to the coreby way of a switch or radio area network. Authentication can refer todeterminations regarding whether the user requesting a service from thetelecom network is authorized to do so within this network or not. Callcontrol and switching can refer determinations related to the futurecourse of a call stream across carrier equipment based on the callsignal processing. Charging can be related to the collation andprocessing of charging data generated by various network nodes. Twocommon types of charging mechanisms found in present day networks can beprepaid charging and postpaid charging. Service invocation can occurbased on some explicit action (e.g. call transfer) or implicitly (e.g.,call waiting). It is to be noted that service “execution” may or may notbe a core network functionality as third party network/nodes may takepart in actual service execution. A gateway can be present in the corenetwork to access other networks. Gateway functionality can be dependenton the type of the interface with another network.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,”“prosumer,” “agent,” and the like are employed interchangeablythroughout the subject specification, unless context warrants particulardistinction(s) among the terms. It should be appreciated that such termscan refer to human entities or automated components (e.g., supportedthrough artificial intelligence, as through a capacity to makeinferences based on complex mathematical formalisms), that can providesimulated vision, sound recognition and so forth.

Aspects, features, or advantages of the subject matter can be exploitedin substantially any, or any, wired, broadcast, wirelesstelecommunication, radio technology or network, or combinations thereof.Non-limiting examples of such technologies or networks include Geocasttechnology; broadcast technologies (e.g., sub-Hz, ELF, VLF, LF, MF, HF,VHF, UHF, SHF, THz broadcasts, etc.); Ethernet; X.25; powerline-typenetworking (e.g., PowerLine AV Ethernet, etc.); femto-cell technology;Wi-Fi; Worldwide Interoperability for Microwave Access (WiMAX); EnhancedGeneral Packet Radio Service (Enhanced GPRS); Third GenerationPartnership Project (3GPP or 3G) Long Term Evolution (LTE); 3GPPUniversal Mobile Telecommunications System (UMTS) or 3GPP UMTS; ThirdGeneration Partnership Project 2 (3GPP2) Ultra Mobile Broadband (UMB);High Speed Packet Access (HSPA); High Speed Downlink Packet Access(HSDPA); High Speed Uplink Packet Access (HSUPA); GSM Enhanced DataRates for GSM Evolution (EDGE) Radio Access Network (RAN) or GERAN; UMTSTerrestrial Radio Access Network (UTRAN); or LTE Advanced.

What has been described above includes examples of systems and methodsillustrative of the disclosed subject matter. It is, of course, notpossible to describe every combination of components or methods herein.One of ordinary skill in the art may recognize that many furthercombinations and permutations of the disclosure are possible.Furthermore, to the extent that the terms “includes,” “has,”“possesses,” and the like are used in the detailed description, claims,appendices and drawings such terms are intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim.

What is claimed is:
 1. Network equipment, comprising: a processor; and amemory that stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising: detecting aprimary signaling path to signaling server equipment, wherein a callsession is established via the primary signaling path, and wherein theprimary signaling path is established as a voice over long termevolution core network service; based on the detecting, initiating analternate signaling path, as an alternative to the primary signalingpath, to web application server equipment, wherein the alternativesignaling path is established as a function of initiating an executingwrapper application based on a web communication protocol; monitoringthe primary signaling path for a session failure of the call session; asa function of the monitoring, initiating a failure timer that is used todetermine, as a function of an elapse of time as measured by the failuretimer, that the session failure has occurred; and as a function of thesession failure, switching the call session from using the primarysignaling path to using the alternate signaling path.
 2. The networkequipment of claim 1, wherein the network equipment is first equipment,and wherein the signaling server equipment is second equipment of agroup of network equipment that operate using internet protocolmultimedia core network subsystem signaling.
 3. The network equipment ofclaim 1, wherein the network equipment is a first equipment, and whereinthe web application server equipment is second equipment of a group ofnetwork equipment that operate using alternate signaling other thaninternet protocol multimedia core network subsystem signaling.
 4. Thenetwork equipment of claim 1, wherein the operations further comprisecollecting, from a user equipment initiating the call session, callinginformation data representative of the primary signaling path.
 5. Thenetwork equipment of claim 4, wherein initiating the alternate signalingpath comprises establishing the alternate signaling path using thecalling information data.
 6. The network equipment of claim 1, whereinthe operations further comprise, based on the alternate signaling pathhaving been initiated, further initiating a call establishment servicerequest to the web application server equipment.
 7. The networkequipment of claim 6, wherein the operations further comprise, inresponse to the call session being determined to have been establishedvia the primary signaling path, facilitating canceling of the callestablishment service request.
 8. A method, comprising: establishing, byequipment comprising a processor, an alternate signaling path to webapplication server equipment, wherein a call session is establishedusing a primary signaling path to signaling server equipment, whereinthe alternate signaling path is an alternative path to the primarysignaling path, wherein the alternate signaling path to the webapplication server equipment is an instantiation of a wrapperapplication associated with a web communication protocol, and whereinthe primary signaling path is established as a voice over long termevolution core network service; monitoring, by the equipment, theprimary signaling path for a failure of the call session; as a functionof the monitoring, initiating, by the equipment, a failure timer that isused to determine, as a function of an elapse of time as measured b thefailure timer, that the call session has failed; and in response to thefailure of the call session, switching, by the equipment, the callsession from using the primary signaling path to using the alternatesignaling path.
 9. The method of claim 8, wherein the web applicationserver equipment is second equipment of the network of equipment thatprovides a voice over internet protocol network service.
 10. The methodof claim 8, further comprising, in response to initiating the primarysignaling path, collecting, by the equipment, calling information datarepresentative of the primary signaling path, wherein the callinginformation data is received from a user equipment.
 11. The method ofclaim 10, wherein establishing the alternate signaling path comprisesusing the calling information data.
 12. The method of claim 8, furthercomprising initiating, by the equipment, a countdown timer in responseto the establishing of the alternate signaling path.
 13. The method ofclaim 8, further comprising, in response to the establishing of thealternate signaling path, initiating, by the equipment, a callestablishment service request to the web application server equipment.14. The method of claim 13, further comprising, in response to detectinga success in establishing the call session, facilitating, by theequipment, canceling the call establishment service request.
 15. Anon-transitory machine-readable medium, comprising executableinstructions that, when executed by a processor, facilitate performanceof operations, comprising: establishing a primary signaling path to asignaling server, wherein the signaling server enables a voice over longterm evolution core network service; in response to the establishing,initiating creation of an alternate signaling path to a web applicationserver, wherein a call session is established via the primary signalingpath, wherein the alternate signaling path to the web application serveris established based on a wrapper interface that executes instructionbased on a web communication protocol; monitoring the primary signalingpath for failure of the call session; as a function of the monitoring,initiating a failure timer that is used to determine, as a function ofan elapse of time as measured by the failure timer, that the callsession has failed; and in response to the failure, switching the callsession from using the primary signaling path to using the alternatesignaling path.
 16. The non-transitory machine-readable medium of claim15, wherein the web application server enables a voice over internetprotocol network service.
 17. The non-transitory machine-readable mediumof claim 15, wherein the operations further comprise initiating, to theweb application server, a call establishment need service request, andin response to detecting success in establishing the call session,facilitating cancelation of the call establishment need service request.18. The non-transitory machine-readable medium of claim 15, wherein theoperations further comprise initiating a call establishment servicerequest to the web application server equipment.
 19. The non-transitorymachine-readable medium of claim 15, wherein the operations furthercomprising collecting calling information data representative of theprimary signaling path.
 20. The non-transitory machine-readable mediumof claim 19, wherein initiating creation of the alternate signaling pathfurther comprises using the calling information data.