Redirecting handovers in lte networks

ABSTRACT

An architecture that can redirect communications upon detection of a handover failure in a Long Term Evolution (LTE) network is described. The architecture can obtain information indicative of a handover failure that is available in a first portion of the LTE network (e.g., a serving gateway) that has no control over the communication path. The architecture can utilize the information to instruct a second portion of the LTE network (e.g., a mobility management entity), one that can control the communication path but conventionally has no access to the handover information, to reroute the communication path to avoid unresponsive or failing network entities.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.12/855,435, entitled, “REDIRECTING HANDOVERS IN LTE NETWORKS”, and filedAug. 12, 2010. The entirety of this application is incorporated hereinby reference.

TECHNICAL FIELD

The present application relates generally to Long-Term Evolution (LTE)communications networks, and more specifically to utilizing a mobilitymanagement entity (MME) for redirecting handovers that might otherwisefail.

BACKGROUND

Conventional wireless networks typically provide for handover operationsor transactions in which a mobile device switches from a first channelto a second channel. Handover transactions can occur for a variety ofreasons, some of the more common of which are to enable the mobiledevice to maintain a call or data session even when traveling in and outof the effective ranges of cells; to enable interoperability ofdisparate network technologies; to allow more efficient sharing ofnetwork resources; to avoid interference, or to better suit behaviorsuch as high travel speed or to enable required or desired features orservices.

Regardless of the purpose or nature of the handover transaction, in somecases, handover transactions end in a failure for one reason or another.In modern Long Term Evolution (LTE) communication networks, evidence ofhandover failures can be determined by an associated serving gateway,however, in LTE networks, the serving gateway has no control over thecommunication path that is selected, and therefore cannot take anysuitable action to remedy the problem. As a result, a call or other datasession can be dropped by the LTE network, leading to customerdissatisfaction. Accordingly, conventional LTE networks do notadequately handle handover failures with respect to maintaining a callin spite of a handover failure. For example, an eNB (or other networkentity) can fail to accept a handover due to one or more issuesassociated with the eNB (or other network entity), even though that eNBhas been selected to receive the handover.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a system that can redirect communicationssuch as mobile handset calls, data sessions, or other transactions, upondetection of a handover failure in a Long Term Evolution (LTE) network.

FIG. 2 provides a block diagram of various examples of alternative radioaccess technologies (RAT).

FIG. 3 illustrates a graphic depiction that illustrates two examplesituations in which a handover can fail.

FIG. 4 is a block diagram of a system that can predict handoverdifficulties in a LTE network and reroute the communication path inresponse.

FIG. 5 illustrates a block diagram of a system that can perform or aidwith various determinations or inferences.

FIG. 6 depicts an exemplary flow chart of procedures defining a methodfor rerouting handover transactions in a LTE network.

FIG. 7 is an exemplary flow chart of procedures that define a method forproviding additional features or aspects in connection with selecting analternative communication path.

FIG. 8 depicts an exemplary flow chart of procedures defining a methodfor providing additional features or aspects in connection withidentifying and/or determining a handover failure.

FIG. 9 illustrates an example wireless communication environment withassociated components that can enable operation of an enterprise networkin accordance with aspects described herein.

FIG. 10 illustrates a schematic deployment of a macro cell for wirelesscoverage in accordance with aspects of the subject specification.

FIG. 11 illustrates a block diagram of a computer operable to execute aportion of the disclosed architecture.

DETAILED DESCRIPTION

The subject matter disclosed herein, in one aspect thereof, comprises anarchitecture that can redirect communications such as calls or datasessions upon detection of a handover failure in a Long Term Evolution(LTE) network prior to dropping or otherwise losing the call or datasession. In accordance therewith and to other related ends, thearchitecture can include a monitor component that can be operativelycoupled to a serving gateway of a LTE-access network. Thus, the monitorcomponent can be configured to identify a handover failure (orabnormalities that could lead to a handover failure) associated with aparticular LTE handover procedure, given that in LTE networks servinggateways have access to data that can be employed to detect theoccurrence of a handover failure. Upon identification of a handoverfailure, the monitor component can therefore generate a failurenotification, including relevant information relating to the handoverfailure.

In addition, the architecture can include routing component that can beoperatively coupled to a mobility management entity (MME) of theLTE-access network. Since the MME in an LTE network can authorizebearers and/or select network entities to carry a particularcommunication, the routing component can be configured to instruct theMME to select an alternative communication path upon receipt of thefailure notification.

The disclosed subject matter is now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the disclosed subject matter. It may beevident, however, that the disclosed subject matter may be practicedwithout these specific details. In other instances, well-knownstructures and devices are shown in block diagram form in order tofacilitate describing the disclosed subject matter.

As used in this application, the terms “system,” “component,”“interface,” and the like are intended to refer to a computer-relatedentity or an entity related to an operational machine with one or morespecific functionalities. The entities disclosed herein can be eitherhardware, a combination of hardware and software, software, or softwarein execution. For example, a component may be, but is not limited tobeing, a process running on a processor, a processor, an object, anexecutable, a thread of execution, a program, and/or a computer. By wayof illustration, both an application running on a server and the servercan be a component. One or more components may reside within a processand/or thread of execution and a component may be localized on onecomputer and/or distributed between two or more computers. Thesecomponents also can execute from various computer readable media havingvarious data structures stored thereon. The components may communicatevia local and/or remote processes such as in accordance with a signalhaving one or more data packets (e.g., data from one componentinteracting with another component in a local system, distributedsystem, and/or across a network such as the Internet with other systemsvia the signal). As another example, a component can be an apparatuswith specific functionality provided by mechanical parts operated byelectric or electronic circuitry that is operated by software orfirmware application(s) executed by a processor, wherein the processorcan be internal or external to the apparatus and executes at least apart of the software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can include a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components. An interface can include input/output (I/O)components as well as associated processor, application, and/or APIcomponents.

Furthermore, the disclosed subject matter may be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques to produce software, firmware, hardware,or any combination thereof to control a computer to implement thedisclosed subject matter. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device, carrier, or media. For example, computerreadable media can include but are not limited to magnetic storagedevices (e.g., hard disk, floppy disk, magnetic strips . . . ), opticaldisks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ),smart cards, and flash memory devices (e.g., card, stick, key drive . .. ). Additionally it should be appreciated that a carrier wave can beemployed to carry computer-readable electronic data such as those usedin transmitting and receiving electronic mail or in accessing a networksuch as the Internet or a local area network (LAN). Of course, thoseskilled in the art will recognize many modifications may be made to thisconfiguration without departing from the scope or spirit of thedisclosed subject matter.

As used herein, the terms “infer” or “inference” generally refer to theprocess of reasoning about or inferring states of the system,environment, and/or user from a set of observations as captured viaevents and/or data. Inference can be employed to identify a specificcontext or action, or can generate a probability distribution overstates, for example. The inference can be probabilistic—that is, thecomputation of a probability distribution over states of interest basedon a consideration of data and events. Inference can also refer totechniques employed for composing higher-level events from a set ofevents and/or data. Such inference results in the construction of newevents or actions from a set of observed events and/or stored eventdata, whether or not the events are correlated in close temporalproximity, and whether the events and data come from one or severalevent and data sources.

Further, terms like “user equipment,” “mobile station,” “mobile,”subscriber station,” “access terminal,” “terminal,” “handset,” andsimilar terminology, generally refer to a wireless device utilized by asubscriber or user of a wireless communication service to receive orconvey data, control, voice, video, sound, gaming, or substantially anydata-stream or signaling-stream. The foregoing terms are utilizedinterchangeably in the subject specification and related drawings.Likewise, the terms “access point,” “base station,” “cell site,” and thelike, are utilized interchangeably in the subject application, and referto a wireless network component or appliance that serves and receivesdata, control, voice, video, sound, gaming, or substantially anydata-stream or signaling-stream from a set of subscriber stations. Dataand signaling streams can be packetized or frame-based flows. It isnoted that in the subject specification and drawings, context orexplicit distinction provides differentiation with respect to accesspoints or base stations that serve and receive data from a mobile devicein an outdoor environment, and access points or base stations thatoperate in a confined, primarily indoor environment overlaid in anoutdoor coverage area. Data and signaling streams can be packetized orframe-based flows.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,” andthe like are employed interchangeably throughout the subjectspecification, unless context warrants particular distinction(s) amongthe terms. It should be appreciated that such terms can refer to humanentities, associated devices, or automated components supported throughartificial intelligence (e.g., a capacity to make inference based oncomplex mathematical formalisms) which can provide simulated vision,sound recognition and so forth. In addition, the terms “wirelessnetwork” and “network” are used interchangeable in the subjectapplication, when context wherein the term is utilized warrantsdistinction for clarity purposes such distinction is made explicit.

Moreover, the word “exemplary” is used herein to mean serving as anexample, instance, or illustration. Any aspect or design describedherein as “exemplary” is not necessarily to be construed as preferred oradvantageous over other aspects or designs. Rather, use of the wordexemplary is intended to present concepts in a concrete fashion. As usedin this application, the term “or” is intended to mean an inclusive “or”rather than an exclusive “or”. That is, unless specified otherwise, orclear from context, “X employs A or B” is intended to mean any of thenatural inclusive permutations. That is, if X employs A; X employs B; orX employs both A and B, then “X employs A or B” is satisfied under anyof the foregoing instances. In addition, the articles “a” and “an” asused in this application and the appended claims should generally beconstrued to mean “one or more” unless specified otherwise or clear fromcontext to be directed to a singular form.

Referring now to the drawing, with reference initially to FIG. 1, system100 that can redirect communications (e.g., mobile handset calls, datasessions, or other transactions) upon detection of a handover failure ina Long Term Evolution (LTE) network is depicted. Generally, system 100can include monitor component 102 that can be operatively orcommunicatively coupled to serving gateway 104 of a LTE-access network,which is further detailed infra. Monitor component 102 can be configuredto identify failure 106 associated with a particular LTE handoverprocedure 108. For example, based upon the role serving gateways (e.g.,serving gateway 104) play in LTE networks, these serving gateways are ina position to determine or detect evidence of handover failureoccurrences, even though the serving gateways are not able to rectify oralleviate the issue. Thus, monitor component 102 can leverage theability of serving gateway 104 to detect evidence of handover failure106. Accordingly, when such evidence of handover failure 106 is detectedby serving gateway 104, monitor component 102 can identify the failureand provide failure notification 110.

In addition, system 100 can further include routing component 112, whichcan be the recipient of failure notification 110. As with monitorcomponent 102, routing component 112 can also be coupled to one or morecore components of an LTE access network. Yet, in this case, routingcomponent 112 can be operatively or communicatively coupled to mobilitymanagement entity (MME) 114 of the LTE-access network. One role of MMEs(e.g., MME 114) in conventional LTE networks is to authorize bearers forcommunication paths and/or select suitable serving gateways or othernetwork entities. However, since MMEs do not manage data packets or thelike, MMEs in traditional LTE networks have no way of knowing that ahandover procedure has failed. Thus, routing component 112, upon receiptof failure notification 110, can be configured to instruct MME 114 toselect alternative communication path (ACP) 116. Hence, in broad terms,monitor component 102 can leverage information (e.g., informationrelating to handover failure 106) inherently available to servinggateway 104, while routing component 112 can leverage inherentcapabilities (e.g., to select communication paths) of MME 114 that, whencombined, can provide features not available in conventional LTEnetworks such as, e.g., redirecting a call or data session toalternative communication path 116.

In more detail, LTE networks include a core network, denoted evolvedpacket core (EPC) and an associated air interface, denoted evolved UMTS(Universal Mobile Telecommunications System) Terrestrial Radio AccessNetwork or eUTRAN (e.g., eUTRAN 118). The air interface or eUTRAN caninclude a set of evolved Node B (eNB) elements (e.g., eNB 120) thatinterface to user equipment (UE) such as mobile handsets or the like.Likewise, the EPC can include a set of serving gateways, a MME, and aset of packet data network (PDN) gateways (e.g., PDN gateway 122).

Traditionally, the MME operates as the control-plane function for eUTRANaccess and/or is the key control-node for the LTE access-network. TheMME is responsible for authentication and critical management for mobiledevices as well as for tracking and paging procedures for mobile devicesin idle mode. Moreover, the MME authorizes beareractivation/deactivation including serving gateway and PDN gatewayselection. Likewise, the serving gateway operates as a local mobilityanchor for eUTRAN mobility, switching packets between the S5/S8interface and the General Radio Packet System (GPRS) Tunneling Protocol(GTP)-based S1-U interface for mobile devices in connected mode. Formobile devices in idle mode, the serving gateway is responsible forterminating the down-link data path and when down-link data is received.On the other hand, the PDN gateway can operate as the permanent InternetProtocol (IP) point-of-attachment for access via the eUTRAN. The PDNgateway performs IP policy and charging enforcement on packet flows toand from mobile devices. The same access point name (APN) concepts froma UTRAN packet switching core network apply, allowing a mobile device tohave simultaneous connectivity to multiple PDNs.

A characteristic of modern LTE networks is that these networks seek toleverage existing broadband infrastructure, and operate as an all-IPsystem. Hence, eNBs, serving gateways, and PDN gateways are all coupledvia an always-on IP connection, which is illustrated by referencenumeral 124. Therefore, serving gateway 104 can be aware of anyabnormalities associated with such network elements (e.g., often eNB120) involved in handover procedure 108 as well as actual handoverfailures 106. Such information (e.g., failure notification 110) can beprovided to routing component 112, which can then instruct MME 114 toselect alternate communication path 116, as detailed supra.

In one or more aspect, routing component 112 can instruct MME 114 toselect an alternate radio access technology (RAT) for the alternatecommunication path 116. The alternate RAT, also denoted by referencenumeral 116 can be substantially any suitable access technology, butwill generally differ from LTE-based eUTRAN 118. Thus, in the event ofhandover failure 106 in the LTE network, MME 114 can select some(typically non-LTE) other appropriate RAT 116. For example, thealternate RAT 116 can be associated with at least one of a secondgeneration partnership project (2GPP) communication standard, a thirdgeneration partnership project (3GPP) communication standard, or asatellite-based communication standard. Thus, UE with LTE serviceprovision that experience issues that can lead to a dropped connectioncan be instead rerouted to other access technologies prior to losing theconnection and/or service. These alternate RATs 116, being independentof eUTRAN 118 will typically not be subject to the same network issues,and therefore can be leveraged as a failsafe of sorts.

Examples of alternative RATs 116 are provided with reference to FIG. 2.In particular, and as noted supra, MME 114 can select 2GPP 202, 3GPP204, satellite 206, or any other suitable access technology with whichan associated UE is equipped to utilize.

While still referring to FIG. 1, but turning now also to FIG. 3, graphicdepiction 300 illustrates two example situations in which a handover canfail. As depicted, eUTRAN 118 can comprise a plurality of eNBs,including source eNB 302 and target eNB 304, which respectively servesource UE 306 and target UE 308. As previously mentioned, routingcomponent 112 can be configured to instruct MME 114 to select an ACP 116upon receipt of failure notification 110. Thus, in a first case handoverfailure 106 is associated with source eNB 302, in which case alternatesource entity 310 of an associated RAT 116 can be selected to avoid theissues being experienced by source eNB 302. In a second case, handoverfailure 106 arises with respect to target eNB 304. Thus, alternatetarget entity 312 of some suitable RAT 116 can be selected to substitutefor failing target eNB 304. Appreciably, when handover procedures faildue to substantially any reason, serving gateway 104 is capable ofdetecting evidence of such a failure and/or any other abnormality, whichcan be identified by monitor component 102.

In accordance therewith, in one or more aspect of the disclosed subjectmatter, monitor component 102 can identify handover failure 106 basedupon an unavailability condition associated with target eNB 304. Asanother example, monitor component 102 can identify handover failure 106based upon a degraded air interface (e.g., eUTRAN) between UE (e.g., UE306 and/or 308) and either source eNB 302 or target eNB 304. As a thirdexample, monitor component 102 can identify handover failure 106 basedupon a buffer overflow condition or a packet loss condition associatedwith at least one of source eNB 302 or target eNB 304. In addition, as afourth example, monitor component 102 can identify handover failure 106based upon a threshold crossing alarm (TCA) count associated with atleast one of source eNB 302 or target eNB 304, which is further detailedin connection with FIG. 4, infra. Furthermore, it should be appreciatedthat handover failure 106 can be associated with substantially any typeof LTE handover procedure 108. For example, LTE handover procedure canbe directed to a backward handover initiated by source eNB 402 or to aforward handover initiated by UE.

Continuing the discussion of FIG. 1, as noted, monitor component 102 canidentify handover failure 106 and transmit failure notification 110 torouting component 112, which in turn can then instruct MME 114 to selectACP 116 in order to, e.g., bypass the failing network entity orentities. In addition, in one or more aspect, routing component 112 canfurther instruct MME 114 to interact with home subscriber server (HSS)126. Typically, HSS 126 operates as a master user database that supportsnetwork entities that handle calls or other data sessions. The HSS 126can include subscription-related information such as subscriberprofiles, can perform authentication and authorization of users, and canprovide information about a subscriber's location or IP information. Theabove-mentioned interaction between MME 114 and HSS 126 can beaccomplished by way of non-access stratum (NAS) signaling, and the NASsignaling interaction can be for the purposes of determining parametersassociated with quality of service (QoS) and/or service level agreement(SLA) in connection with the provisioned service that is experiencesdifficulties. As a result, MME 114 can choose a most appropriate ACP/RAT116 when redirecting the failed handoff, which can be accomplished priorto losing a network data connection (e.g., dropping a call).

With reference now to FIG. 4, system 400 that can predict handoverdifficulties in a LTE network is provided. Broadly, system 400 intendedto represent an alternate embodiment of, and to be substantially similarto, system 100 of FIG. 1. However, whereas system 100 is directed toearly response to handover failure 106, system 400 is directed topreemptive activity such that handover failure 106 can be predicted inadvance as well. Hence, as with system 100, system 400 can includemonitor component 102 that can be operatively coupled to serving gateway104 of a LTE-access network, wherein monitor component 102 can beconfigured to identify failing eNB 402 that is potentially unable toaccept a LTE-based handover and/or that may not be capable of sustaininga data connection. System 400 can also include routing component 112 assubstantially described in connection with FIG. 1. Specifically, routingcomponent 112 can be operatively coupled to MME 114 of the LTE-accessnetwork, wherein routing component 112 can be configured to instruct MME114 to select an alternative communication path 116 upon receipt of aLTE handover request associated with failing eNB 402.

In addition, system 400 can further include tracking component 404 thatcan store information associated with failing eNB 402, for instance, toa data store or error list 406. Thus, all the evidentiary data availableto serving gateway 104 discussed previously, e.g., unavailability,buffer overflow, packet loss and so on, can be actively tracked andstored in a real-time database, such as error list 406. Such informationcan be employed, e.g., to determine whether or not a target eNB iscapable of accepting a handover rather than examining such informationafter failing eNB 402 has generated a handover failure. In particular,monitor component 102 can identify failing eNB 402 based upon a TCAcount associated with failing eNB 402. Such data can be recorded inerror list, and be maintained with respect to failing eNB 402 until theissue is corrected and/or no longer exists, in which case the entry inerror list 406 relating to failing eNB 402 can be cleared. In themeantime, should MME 114 otherwise attempt to select failing eNB as arecipient of a handover or otherwise involved in a handover transaction,routing component 112 can alert MME 114 of the potential for a fault andinstruct MME 114 to select an ACP 116 instead of failing eNB 402.

Similarly, monitor component 102 can identify failing eNB 402 based upona degraded air interface between UE and failing eNB 402 or based upon abuffer overflow condition or a packet loss condition associate withfailing eNB 402. In either case, this information can be stored to errorlist 406 and referenced should eNB at issue be selected during ahandover procedure as detailed supra.

As with other portions of this disclosure, in this case routingcomponent 112 can instruct MME 114 to select alternate RAT 116 for thealternative communication path 116, wherein alternate RAT 116 differsfrom an LTE-based eUTRAN. For example, alternate RAT 116 can beassociated with at least one of a 2GPP communication standard, a 3GPPcommunication standard, a satellite-based communication standard, oranother suitable access technology communication standard or technique.Regardless, based upon the above, MME 114 can employ alternate RAT 116to bypass failing eNB 402 in connection with the LTE-based handover.

Now turning to FIG. 5, system 500 that can perform or aid with variousdeterminations or inferences is illustrated. Generally, system 500 caninclude monitor component 102, routing component 112, tracking component404, as well as other components described herein. In addition to whathas been described, the above-mentioned components can make intelligentdeterminations or inferences. For example, Bayesian probabilities orconfidence measures can be employed or inferences can be based uponmachine learning techniques related to historical analysis, feedback,and/or previous determinations or inferences.

For instance, fault monitor component 102 can intelligently determine orinfer indicia of a failing eNB 402, e.g., based upon TCA counts, orbased upon QoS, noise, latency, and so forth. Likewise, routingcomponent 112 can intelligently determine or infer a suitable ACP/RAT116 based upon subscriber profiles or the like. In addition, trackingcomponent 404 can intelligently determine or infer whether or not toupdate error list 406 based upon, e.g., time, recovery operations, etc.Regardless of the actual intelligent determination or inference, asnoted, such can be based upon historical analysis, probabilisticinferences or machine learning techniques.

In addition, system 500 can also include intelligence component 502 thatcan provide for or aid in various inferences or determinations. Inparticular, in accordance with or in addition to what has been describedsupra with respect to intelligent determinations or inferences providedby various components described herein, e.g., all or portions of monitorcomponent 102, routing component 112, or tracking component 404.Additionally or alternatively, all or portions of intelligence component502 can be included in one or more components described herein. Thus,intelligence component 502 can reside in whole or in part within system100 or system 400 or within components described therein.

Moreover, intelligence component 502 will typically have access to allor portions of data sets described herein, such as data store 504. Asused herein, data store 504 is intended to be a repository of all orportions of data, data sets, or information described herein orotherwise suitable for use with the described subject matter (e.g., userprofiles, service agreements, history, network traffic data eithercurrent or historical, device types/capabilities, etc.). Data store 504can be centralized, either remotely or locally cached, or distributed,potentially across multiple devices and/or schemas. Furthermore, datastore 504 can be embodied as substantially any type of memory, includingbut not limited to volatile or non-volatile, sequential access,structured access, or random access and so on. It should be understoodthat all or portions of data store 504 can be included in systems 100 or400, or can reside in part or entirely remotely from systems 100 or 400.

In more detail, in order to provide for or aid in the numerousinferences described herein, intelligence component 502 can examine theentirety or a subset of the data available and can provide for reasoningabout or infer states of the system, environment, and/or user from a setof observations as captured via events and/or data. Inference can beemployed to identify a specific context or action, or can generate aprobability distribution over states, for example. The inference can beprobabilistic—that is, the computation of a probability distributionover states of interest based on a consideration of data and events.Inference can also refer to techniques employed for composinghigher-level events from a set of events and/or data.

Such inference can result in the construction of new events or actionsfrom a set of observed events and/or stored event data, whether or notthe events are correlated in close temporal proximity, and whether theevents and data come from one or several event and data sources. Variousclassification (explicitly and/or implicitly trained) schemes and/orsystems (e.g., support vector machines, neural networks, expert systems,Bayesian belief networks, fuzzy logic, data fusion engines . . . ) canbe employed in connection with performing automatic and/or inferredaction in connection with the disclosed subject matter.

A classifier can be a function that maps an input attribute vector,x=(x1, x2, x3, x4, xn), to a confidence that the input belongs to aclass, that is, f(x)=confidence(class). Such classification can employ aprobabilistic and/or statistical-based analysis (e.g., factoring intothe analysis utilities and costs) to prognose or infer an action that auser desires to be automatically performed. A support vector machine(SVM) is an example of a classifier that can be employed. The SVMoperates by finding a hyper-surface in the space of possible inputs,where the hyper-surface attempts to split the triggering criteria fromthe non-triggering events. Intuitively, this makes the classificationcorrect for testing data that is near, but not identical to trainingdata. Other directed and undirected model classification approachesinclude, e.g., naive Bayes, Bayesian networks, decision trees, neuralnetworks, fuzzy logic models, and probabilistic classification modelsproviding different patterns of independence can be employed.Classification as used herein also is inclusive of statisticalregression that is utilized to develop models of priority.

FIGS. 6-8 illustrate various methodologies in accordance with thedisclosed subject matter. While, for purposes of simplicity ofexplanation, the methodologies are shown and described as a series ofacts, it is to be understood and appreciated that the disclosed subjectmatter is not limited by the order of acts, as some acts may occur indifferent orders and/or concurrently with other acts from that shown anddescribed herein. For example, those skilled in the art will understandand appreciate that a methodology could alternatively be represented asa series of interrelated states or events, such as in a state diagram.Moreover, not all illustrated acts may be required to implement amethodology in accordance with the disclosed subject matter.Additionally, it should be further appreciated that the methodologiesdisclosed hereinafter and throughout this specification are capable ofbeing stored on an article of manufacture to facilitate transporting andtransferring such methodologies to computers. The term article ofmanufacture, as used herein, is intended to encompass a computer programaccessible from any computer-readable device, carrier, or media.

Turning now to FIG. 6, exemplary method 600 for rerouting handovertransactions in a LTE network is depicted. Generally, at referencenumeral 602, information received by a serving gateway of a LTE-accessnetwork can be monitored, which can include substantially anyinformation relating to abnormalities that can lead to handover failureor degraded service, examples of which are detailed in connection withFIG. 8, infra.

Accordingly, the information received at reference numeral 602 can, atreference numeral 604, be employed for determining a failure associatedwith a LTE handover procedure. In accordance therewith, at referencenumeral 606, a failure notification can be transmitted to a MME upondetermining the handover failure. Hence, at reference numeral 608, theMME can be employed for selecting an alternative communication path uponreceipt of the failure notification. Additional features, aspects, orexamples of the selection process or the alternative communication pathare provided with reference to FIG. 7, below.

Turning now to FIG. 7, exemplary method 700 for providing additionalfeatures or aspects in connection with selecting an alternativecommunication path is illustrated. At reference numeral 702, a disparateradio access technology (RAT) is selected for the alternativecommunication path. Appreciably, the RAT can be substantially anysuitable technology a particular UE is equipped to utilize, yet willtypically be disparate from the eUTRAN technology employed by theunderlying LTE service. Moreover, at reference numeral 704, thedisparate RAT can be selected based upon non-access stratum (NAS)signaling associate with a HSS network entity. Thus, upon interactingwith the HSS, the MME can obtain useful information in determining themost suitable RAT for the particular case at hand.

By way of example, at reference numeral 706, at least one 2GPP networkentity can be selected for the alternative communication path. As asecond example, at reference numeral 708, at least one 3GPP networkentity can be selected for the alternative communication path. As athird example, at reference numeral 710, at least one satellite networkentity can be selected for the alternative communication path. However,regardless of the type or nature of the alternative communication path,at reference numeral 712, all communication otherwise intended for theoriginal (e.g., failing) communication path can be rerouted via thealternate communication path prior to dropping a network dataconnection.

With reference now FIG. 8, exemplary method 800 for providing additionalfeatures or aspects in connection with identifying and/or determining ahandover failure is depicted. In general, at reference numeral 802, thehandover failure determined in connection with reference numeral 604 ofFIG. 6 can be determined based upon a degraded air interface conditionbetween UE and a source eNB or between UE and a target eNB.

Likewise, at reference numeral 804, the handover failure can bedetermined based upon a buffer overflow condition or a packet losscondition associated with at least one of a source eNB or a target eNB.Similarly, at reference numeral 806, the handover failure can bedetermined based upon an unavailability condition associated with atarget eNB. Moreover, at reference numeral 808, the handover failure canbe determined based upon a TCA count associated with at least one of asource eNB or a target eNB. Appreciably, any such handover failure canbe determined in connection with a backward handover initiated by asource eNB or with a forward handover initiated by UE, as discussed inconnection with reference numeral 810.

To provide further context for various aspects of the subjectspecification, FIG. 9 illustrates an example wireless communicationenvironment 900, with associated components that can enable operation ofa femtocell enterprise network in accordance with aspects describedherein. Wireless communication environment 900 includes two wirelessnetwork platforms: (i) A macro network platform 910 that serves, orfacilitates communication) with user equipment 975 via a macro radioaccess network (RAN) 970. It should be appreciated that in cellularwireless technologies (e.g., 4G, 3GPP UMTS, HSPA, 3GPP LTE, 3GPP UMB),macro network platform 910 is embodied in a Core Network. (ii) A femtonetwork platform 980, which can provide communication with UE 975through a femto RAN 990, linked to the femto network platform 980through a routing platform 92 via backhaul pipe(s) 985, wherein backhaulpipe(s) are substantially the same a backhaul link 3853 below. It shouldbe appreciated that femto network platform 980 typically offloads UE 975from macro network, once UE 975 attaches (e.g., through macro-to-femtohandover, or via a scan of channel resources in idle mode) to femto RAN.

It is noted that RAN includes base station(s), or access point(s), andits associated electronic circuitry and deployment site(s), in additionto a wireless radio link operated in accordance with the basestation(s). Accordingly, macro RAN 970 can comprise various coveragecells like cell 1205, while femto RAN 990 can comprise multiple femtoaccess points. As mentioned above, it is to be appreciated thatdeployment density in femto RAN 990 is substantially higher than inmacro RAN 970.

Generally, both macro and femto network platforms 910 and 980 includecomponents, e.g., nodes, gateways, interfaces, servers, or platforms,that facilitate both packet-switched (PS) (e.g., internet protocol (IP),frame relay, asynchronous transfer mode (ATM)) and circuit-switched (CS)traffic (e.g., voice and data) and control generation for networkedwireless communication. In an aspect of the subject innovation, macronetwork platform 910 includes CS gateway node(s) 912 which can interfaceCS traffic received from legacy networks like telephony network(s) 940(e.g., public switched telephone network (PSTN), or public land mobilenetwork (PLMN)) or a SS7 network 960. Circuit switched gateway 912 canauthorize and authenticate traffic (e.g., voice) arising from suchnetworks. Additionally, CS gateway 912 can access mobility, or roaming,data generated through SS7 network 960; for instance, mobility datastored in a VLR, which can reside in memory 930. Moreover, CS gatewaynode(s) 912 interfaces CS-based traffic and signaling and gatewaynode(s) 918. As an example, in a 3GPP UMTS network, gateway node(s) 918can be embodied in gateway GPRS support node(s) (GGSN).

In addition to receiving and processing CS-switched traffic andsignaling, gateway node(s) 918 can authorize and authenticate PS-baseddata sessions with served (e.g., through macro RAN) wireless devices.Data sessions can include traffic exchange with networks external to themacro network platform 910, like wide area network(s) (WANs) 950; itshould be appreciated that local area network(s) (LANs) can also beinterfaced with macro network platform 910 through gateway node(s) 918.Gateway node(s) 918 generates packet data contexts when a data sessionis established. To that end, in an aspect, gateway node(s) 918 caninclude a tunnel interface (e.g., tunnel termination gateway (TTG) in3GPP UMTS network(s); not shown) which can facilitate packetizedcommunication with disparate wireless network(s), such as Wi-Finetworks. It should be further appreciated that the packetizedcommunication can include multiple flows that can be generated throughserver(s) 914. It is to be noted that in 3GPP UMTS network(s), gatewaynode(s) 918 (e.g., GGSN) and tunnel interface (e.g., TTG) comprise apacket data gateway (PDG).

Macro network platform 910 also includes serving node(s) 916 that conveythe various packetized flows of information or data streams, receivedthrough gateway node(s) 918. As an example, in a 3GPP UMTS network,serving node(s) can be embodied in serving GPRS support node(s) (SGSN).

As indicated above, server(s) 914 in macro network platform 910 canexecute numerous applications (e.g., location services, online gaming,wireless banking, wireless device management . . . ) that generatemultiple disparate packetized data streams or flows, and manage (e.g.,schedule, queue, format . . . ) such flows. Such application(s), forexample can include add-on features to standard services provided bymacro network platform 910. Data streams can be conveyed to gatewaynode(s) 918 for authorization/authentication and initiation of a datasession, and to serving node(s) 916 for communication thereafter.Server(s) 914 can also effect security (e.g., implement one or morefirewalls) of macro network platform 910 to ensure network's operationand data integrity in addition to authorization and authenticationprocedures that CS gateway node(s) 912 and gateway node(s) 918 canenact. Moreover, server(s) 914 can provision services from externalnetwork(s), e.g., WAN 950, or Global Positioning System (GPS) network(s)(not shown). It is to be noted that server(s) 914 can include one ormore processor configured to confer at least in part the functionalityof macro network platform 910. To that end, the one or more processorcan execute code instructions stored in memory 930, for example.

In example wireless environment 900, memory 930 stores informationrelated to operation of macro network platform 910. Information caninclude business data associated with subscribers; market plans andstrategies, e.g., promotional campaigns, business partnerships;operational data for mobile devices served through macro networkplatform; service and privacy policies; end-user service logs for lawenforcement; and so forth. Memory 930 can also store information from atleast one of telephony network(s) 940, WAN(s) 950, or SS7 network 960,enterprise NW(s) 965, or service NW(s) 967.

Femto gateway node(s) 984 have substantially the same functionality asPS gateway node(s) 918. Additionally, femto gateway node(s) 984 can alsoinclude substantially all functionality of serving node(s) 916. In anaspect, femto gateway node(s) 984 facilitates handover resolution, e.g.,assessment and execution. Further, control node(s) 920 can receivehandover requests and relay them to a handover component (not shown) viagateway node(s) 984. According to an aspect, control node(s) 920 cansupport RNC capabilities.

Server(s) 982 have substantially the same functionality as described inconnection with server(s) 914. In an aspect, server(s) 982 can executemultiple application(s) that provide service (e.g., voice and data) towireless devices served through femto RAN 990. Server(s) 982 can alsoprovide security features to femto network platform. In addition,server(s) 982 can manage (e.g., schedule, queue, format . . . )substantially all packetized flows (e.g., IP-based, frame relay-based,ATM-based) it generates in addition to data received from macro networkplatform 910. It is to be noted that server(s) 982 can include one ormore processor configured to confer at least in part the functionalityof macro network platform 910. To that end, the one or more processorcan execute code instructions stored in memory 986, for example.

Memory 986 can include information relevant to operation of the variouscomponents of femto network platform 980. For example operationalinformation that can be stored in memory 986 can comprise, but is notlimited to, subscriber information; contracted services; maintenance andservice records; femto cell configuration (e.g., devices served throughfemto RAN 990; access control lists, or white lists); service policiesand specifications; privacy policies; add-on features; and so forth.

It is noted that femto network platform 980 and macro network platform910 can be functionally connected through one or more reference link(s)or reference interface(s). In addition, femto network platform 980 canbe functionally coupled directly (not illustrated) to one or more ofexternal network(s) 940, 950, 960, 965 or 967. Reference link(s) orinterface(s) can functionally link at least one of gateway node(s) 984or server(s) 986 to the one or more external networks 940, 950, 960, 965or 967.

FIG. 10 illustrates a wireless environment that includes macro cells andfemtocells for wireless coverage in accordance with aspects describedherein. In wireless environment 1050, two areas 1005 represent “macro”cell coverage; each macro cell is served by a base station 1010. It canbe appreciated that macro cell coverage area 1005 and base station 1010can include functionality, as more fully described herein, for example,with regard to system 1000. Macro coverage is generally intended toserve mobile wireless devices, like UE 1020 _(A), 1020 _(B), in outdoorslocations. An over-the-air wireless link 105 provides such coverage, thewireless link 1215 comprises a downlink (DL) and an uplink (UL), andutilizes a predetermined band, licensed or unlicensed, of the radiofrequency (RF) spectrum. As an example, UE 1020 _(A), 1020 _(E) can be a3GPP Universal Mobile Telecommunication System (UMTS) mobile phone. Itis noted that a set of base stations, its associated electronics,circuitry or components, base stations control component(s), andwireless links operated in accordance to respective base stations in theset of base stations form a radio access network (RAN). In addition,base station 1010 communicates via backhaul link(s) 1051 with a macronetwork platform 1060, which in cellular wireless technologies (e.g.,3rd Generation Partnership Project (3GPP) Universal MobileTelecommunication System (UMTS), Global System for Mobile Communication(GSM)) represents a core network.

In an aspect, macro network platform 1060 controls a set of basestations 1010 that serve either respective cells or a number of sectorswithin such cells. Base station 1010 comprises radio equipment 1014 foroperation in one or more radio technologies, and a set of antennas 1012(e.g., smart antennas, microwave antennas, satellite dish(es) . . . )that can serve one or more sectors within a macro cell 1005. It is notedthat a set of radio network control node(s), which can be a part ofmacro network platform; a set of base stations (e.g., Node B 1010) thatserve a set of macro cells 1005; electronics, circuitry or componentsassociated with the base stations in the set of base stations; a set ofrespective OTA wireless links (e.g., links 1015 or 1016) operated inaccordance to a radio technology through the base stations; and backhaullink(s) 1055 and 1051 form a macro radio access network (RAN). Macronetwork platform 1060 also communicates with other base stations (notshown) that serve other cells (not shown). Backhaul link(s) 1051 or 1053can include a wired backbone link (e.g., optical fiber backbone,twisted-pair line, T1/E1 phone line, a digital subscriber line (DSL)either synchronous or asynchronous, an asymmetric ADSL, or a coaxialcable . . . ) or a wireless (e.g., line-of-sight (LOS) or non-LOS)backbone link. Backhaul pipe(s) 1055 link disparate base stations 1010.According to an aspect, backhaul link 1053 can connect multiple femtoaccess points 1030 and/or controller components (CC) 1001 to the femtonetwork platform 1002. In one example, multiple femto APs can beconnected to a routing platform (RP) 1087, which in turn can be connectto a controller component (CC) 1001. Typically, the information from UEs1020 _(A) can be routed by the RP 102, for example, internally, toanother UE 1020 _(A) connected to a disparate femto AP connected to theRP 1087, or, externally, to the femto network platform 1002 via the CC1001, as discussed in detail supra.

In wireless environment 1050, within one or more macro cell(s) 1005, aset of femtocells 1045 served by respective femto access points (APs)1030 can be deployed. It can be appreciated that, aspects of the subjectinnovation are geared to femtocell deployments with substantive femto APdensity, e.g., 10⁴-10⁷ femto APs 1030 per base station 1010. Accordingto an aspect, a set of femto access points 1030 ₁-1030 _(N), with N anatural number, can be functionally connected to a routing platform1087, which can be functionally coupled to a controller component 1001.The controller component 1001 can be operationally linked to the femtonetwork platform 330 by employing backhaul link(s) 1053. Accordingly, UE1020 _(A) connected to femto APs 1030 ₁-1030 _(N) can communicateinternally within the femto enterprise via the routing platform (RP)1087 and/or can also communicate with the femto network platform 1002via the RP 1087, controller component 1001 and the backhaul link(s)1053. It can be appreciated that although only one femto enterprise isdepicted in FIG. 10, multiple femto enterprise networks can be deployedwithin a macro cell 1005.

It is noted that while various aspects, features, or advantagesdescribed herein have been illustrated through femto access point(s) andassociated femto coverage, such aspects and features also can beexploited for home access point(s) (HAPs) that provide wireless coveragethrough substantially any, or any, disparate telecommunicationtechnologies, such as for example Wi-Fi (wireless fidelity) or picocelltelecommunication. Additionally, aspects, features, or advantages of thesubject innovation can be exploited in substantially any wirelesstelecommunication, or radio, technology; for example, Wi-Fi, WorldwideInteroperability for Microwave Access (WiMAX), Enhanced General PacketRadio Service (Enhanced GPRS), 3GPP LTE, 3GPP2 UMB, 3GPP UMTS, HSPA,HSDPA, HSUPA, or LTE Advanced. Moreover, substantially all aspects ofthe subject innovation can include legacy telecommunicationtechnologies.

Referring now to FIG. 11, there is illustrated a block diagram of anexemplary computer system operable to execute the disclosedarchitecture. In order to provide additional context for various aspectsof the disclosed subject matter, FIG. 11 and the following discussionare intended to provide a brief, general description of a suitablecomputing environment 1100 in which the various aspects of the disclosedsubject matter can be implemented. Additionally, while the disclosedsubject matter described above may be suitable for application in thegeneral context of computer-executable instructions that may run on oneor more computers, those skilled in the art will recognize that thedisclosed subject matter also can be implemented in combination withother program modules and/or as a combination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the disclosed subject matter may also bepracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

A computer typically includes a variety of computer-readable media.Computer-readable media can be any available media that can be accessedby the computer and includes both volatile and nonvolatile media,removable and non-removable media. By way of example, and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media can include eithervolatile or nonvolatile, removable and non-removable media implementedin any method or technology for storage of information such ascomputer-readable instructions, data structures, program modules orother data. Computer storage media includes, but is not limited to, RAM,ROM, EEPROM, flash memory or other memory technology, CD-ROM, digitalversatile disk (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

With reference again to FIG. 11, the exemplary environment 1100 forimplementing various aspects of the disclosed subject matter includes acomputer 1102, the computer 1102 including a processing unit 1104, asystem memory 1106 and a system bus 1108. The system bus 1108 couples tosystem components including, but not limited to, the system memory 1106to the processing unit 1104. The processing unit 1104 can be any ofvarious commercially available processors. Dual microprocessors andother multi-processor architectures may also be employed as theprocessing unit 1104.

The system bus 1108 can be any of several types of bus structure thatmay further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1106includes read-only memory (ROM) 1110 and random access memory (RAM)1112. A basic input/output system (BIOS) is stored in a non-volatilememory 1110 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 1102, such as during start-up. The RAM 1112 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 1102 further includes an internal hard disk drive (HDD)1114 (e.g., EIDE, SATA), which internal hard disk drive 1114 may also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 1116, (e.g., to read from or write to aremovable diskette 1118) and an optical disk drive 1120, (e.g., readinga CD-ROM disk 1122 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 1114, magnetic diskdrive 1116 and optical disk drive 1120 can be connected to the systembus 1108 by a hard disk drive interface 1124, a magnetic disk driveinterface 1126 and an optical drive interface 1128, respectively. Theinterface 1124 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and IEEE1394 interfacetechnologies. Other external drive connection technologies are withincontemplation of the subject matter disclosed herein.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1102, the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer, such as zipdrives, magnetic cassettes, flash memory cards, cartridges, and thelike, may also be used in the exemplary operating environment, andfurther, that any such media may contain computer-executableinstructions for performing the methods of the disclosed subject matter.

A number of program modules can be stored in the drives and RAM 1112,including an operating system 1130, one or more application programs1132, other program modules 1134 and program data 1136. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1112. It is appreciated that the disclosed subjectmatter can be implemented with various commercially available operatingsystems or combinations of operating systems.

A user can enter commands and information into the computer 1102 throughone or more wired/wireless input devices, e.g., a keyboard 1138 and apointing device, such as a mouse 1140. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 1104 through an input deviceinterface 1142 that is coupled to the system bus 1108, but can beconnected by other interfaces, such as a parallel port, an IEEE1394serial port, a game port, a USB port, an IR interface, etc.

A monitor 1144 or other type of display device is also connected to thesystem bus 1108 via an interface, such as a video adapter 1146. Inaddition to the monitor 1144, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1102 may operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1148. The remotecomputer(s) 1148 can be a workstation, a server computer, a router, apersonal computer, a mobile device, portable computer,microprocessor-based entertainment appliance, a peer device or othercommon network node, and typically includes many or all of the elementsdescribed relative to the computer 1102, although, for purposes ofbrevity, only a memory/storage device 1150 is illustrated. The logicalconnections depicted include wired/wireless connectivity to a local areanetwork (LAN) 1152 and/or larger networks, e.g., a wide area network(WAN) 1154. Such LAN and WAN networking environments are commonplace inoffices and companies, and facilitate enterprise-wide computer networks,such as intranets, all of which may connect to a global communicationsnetwork, e.g., the Internet.

When used in a LAN networking environment, the computer 1102 isconnected to the local network 1152 through a wired and/or wirelesscommunication network interface or adapter 1156. The adapter 1156 mayfacilitate wired or wireless communication to the LAN 1152, which mayalso include a wireless access point disposed thereon for communicatingwith the wireless adapter 1156.

When used in a WAN networking environment, the computer 1102 can includea modem 1158, or is connected to a communications server on the WAN1154, or has other means for establishing communications over the WAN1154, such as by way of the Internet. The modem 1158, which can beinternal or external and a wired or wireless device, is connected to thesystem bus 1108 via the serial port interface 1142. In a networkedenvironment, program modules depicted relative to the computer 1102, orportions thereof, can be stored in the remote memory/storage device1150. It will be appreciated that the network connections shown areexemplary and other means of establishing a communications link betweenthe computers can be used.

The computer 1102 is operable to communicate with any wireless devicesor entities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE802.11 (a, b,g, n, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE802.3 or Ethernet). Wi-Finetworks operate in the unlicensed 2.4 and 5 GHz radio bands, at an 11Mbps (802.11b) or 54 Mbps (802.11a) data rate, for example, or withproducts that contain both bands (dual band), so the networks canprovide real-world performance similar to the basic “10 BaseT” wiredEthernet networks used in many offices.

Various aspects or features described herein can be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques. In addition, various aspects disclosed inthe subject specification can also be implemented through programmodules stored in a memory and executed by a processor, or othercombination of hardware and software, or hardware and firmware. The term“article of manufacture” as used herein is intended to encompass acomputer program accessible from any computer-readable device, carrier,or media. For example, computer readable media can include but are notlimited to magnetic storage devices (e.g., hard disk, floppy disk,magnetic strips . . . ), optical disks (e.g., compact disc (CD), digitalversatile disc (DVD), blu-ray disc (BD) . . . ), smart cards, and flashmemory devices (e.g., card, stick, key drive . . . ). Additionally itshould be appreciated that a carrier wave can be employed to carrycomputer-readable electronic data such as those used in transmitting andreceiving electronic mail or in accessing a network such as the internetor a local area network (LAN). Of course, those skilled in the art willrecognize many modifications may be made to this configuration withoutdeparting from the scope or spirit of the disclosed subject matter.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising, but not limited to comprising, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Processors can exploit nano-scale architectures suchas, but not limited to, molecular and quantum-dot based transistors,switches and gates, in order to optimize space usage or enhanceperformance of user equipment. A processor also can be implemented as acombination of computing processing units.

In the subject specification, terms such as “store,” “data store,” “datastorage,” “database,” “repository,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory. In addition, memory components or memory elementscan be removable or stationary. Moreover, memory can be internal orexternal to a device or component, or removable or stationary. Memorycan include various types of media that are readable by a computer, suchas hard-disc drives, zip drives, magnetic cassettes, flash memory cardsor other types of memory cards, cartridges, or the like.

By way of illustration, and not limitation, nonvolatile memory caninclude read only memory (ROM), programmable ROM (PROM), electricallyprogrammable ROM (EPROM), electrically erasable ROM (EEPROM), or flashmemory. Volatile memory can include random access memory (RAM), whichacts as external cache memory. By way of illustration and notlimitation, RAM is available in many forms such as synchronous RAM(SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rateSDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), anddirect Rambus RAM (DRRAM). Additionally, the disclosed memory componentsof systems or methods herein are intended to comprise, without beinglimited to comprising, these and any other suitable types of memory.

What has been described above includes examples of the variousembodiments. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing the embodiments, but one of ordinary skill in the art mayrecognize that many further combinations and permutations are possible.Accordingly, the detailed description is intended to embrace all suchalterations, modifications, and variations that fall within the spiritand scope of the appended claims.

In particular and in regard to the various functions performed by theabove described components, devices, circuits, systems and the like, theterms (including a reference to a “means”) used to describe suchcomponents are intended to correspond, unless otherwise indicated, toany component which performs the specified function of the describedcomponent (e.g., a functional equivalent), even though not structurallyequivalent to the disclosed structure, which performs the function inthe herein illustrated exemplary aspects of the embodiments. In thisregard, it will also be recognized that the embodiments includes asystem as well as a computer-readable medium having computer-executableinstructions for performing the acts and/or events of the variousmethods.

In addition, while a particular feature may have been disclosed withrespect to only one of several implementations, such feature may becombined with one or more other features of the other implementations asmay be desired and advantageous for any given or particular application.Furthermore, to the extent that the terms “includes,” and “including”and variants thereof are used in either the detailed description or theclaims, these terms are intended to be inclusive in a manner similar tothe term “comprising.”

What is claimed is:
 1. A system, comprising: a processor; and a memory,that stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising: receiving,from a serving gateway device of a long term evolution network, handoverdata representing a set of handover procedures that switch a firstcommunication path for a user equipment to a second communication path;identifying a handover condition associated with a handover procedure ofthe set of handover procedures based on the handover data; creating anotification in response to the identifying the handover condition; andinstructing a mobility management entity device of the long termevolution network to select an alternative communication path for theuser equipment in response to the notification, wherein the alternativecommunication path differs from the second communication path.
 2. Thesystem of claim 1, wherein the identifying the handover condition isbased on count data representing a count of an alarm associated with anevolved nodeB device of the second communication path.
 3. The system ofclaim 1, wherein the identifying the handover condition is based on anunavailability condition associated with an evolved nodeB device of thesecond communication path.
 4. The system of claim 1, wherein theidentifying the handover condition is based on a condition associatedwith an air interface between the user equipment and an evolved nodeBdevice of the second communication path.
 5. The system of claim 1,wherein the identifying the handover condition is based on a bufferoverflow condition associated with an evolved nodeB device of the secondcommunication path.
 6. The system of claim 1, wherein the identifyingthe handover condition is based on a packet loss condition associatedwith an evolved nodeB device of the second communication path.
 7. Thesystem of claim 1, wherein the alternative communication path isassociated with an alternate radio access technology that differs from aradio access technology associated with the second communication path.8. The system of claim 7, wherein the alternate radio access technologyis associated with a communication standard that differs from acommunication standard associated with a long term evolution network. 9.The system of claim 1, wherein the instructing the mobility managemententity device comprises instructing the mobility management entitydevice prior to a handover failure associated with the user equipment.10. The system of claim 1, wherein the handover procedure is directed toa handover initiated by an evolved nodeB device associated with thefirst communication path or another handover initiated by the userequipment.
 11. A method, comprising: receiving, by a serving gatewaydevice comprising a processor, handover data representing a set ofhandover operations that reroute a first communication path for a userequipment to a second communication path; identifying, by the servinggateway device, a handover issue associated with a handover operation ofthe set of handover operations based on the handover data; andinstructing, by the serving gateway device, a mobility management entitydevice of a long term evolution network to select an alternativecommunication path for the user equipment in response to the identifyingthe handover issue, wherein the alternative communication path differsfrom the second communication path.
 12. The method of claim 11, whereinthe identifying the handover issue is based on count data representing acount of an alarm associated with an evolved nodeB device of the secondcommunication path.
 13. The method of claim 11, wherein the identifyingthe handover issue is based on an unavailability failure associated withan evolved nodeB device of the second communication path.
 14. The methodof claim 11, wherein the identifying the handover issue is based on anair interface condition arising between the user equipment and anevolved nodeB device of the second communication path.
 15. The method ofclaim 11, wherein the identifying the handover issue is based on abuffer overflow condition associated with an evolved nodeB device of thesecond communication path.
 16. A computer readable storage devicecomprising executable instructions that, in response to execution, causea mobility management entity device comprising a processor to performoperations, comprising: receiving, from a serving gateway device of along term evolution communication network, handover data representing aset of handover transactions that switch a first communication path fora mobile device to a second communication path; identifying a handoverissue associated with a handover transaction of the set of handovertransactions based on the handover data; and determining an alternativecommunication path for the mobile device in response to the identifyingthe handover issue, wherein the alternative communication path differsfrom the second communication path.
 17. The computer readable storagedevice of claim 16, wherein the alternative communication path isassociated with an alternate radio access technology that differs from aradio access technology associated with the second communication path.18. The computer readable storage device of claim 17, wherein thealternate radio access technology is associated with a communicationstandard that differs from a communication standard associated with along term evolution network.
 19. The computer readable storage device ofclaim 16, wherein the determining the alternative communication pathcomprises determining the alternative communication path prior to ahandover failure associated with the second communication path.
 20. Thecomputer readable storage device of claim 16, wherein the handovertransaction is directed to a handover initiated by an evolved nodeBdevice associated with the first communication path or another handoverinitiated by the user equipment.