Method and system for facilitating preemptive based radio channel access control

ABSTRACT

Methods and systems for facilitating preemptive based radio access control are provided. The methods and systems include receiving queue data corresponding to a set of requests for highly prioritized communications included on a prioritized queue and utilizing the queue data to determine whether a set of conditions for involuntarily terminating a radio communication session has been met. Session data corresponding to characteristics for each of a plurality of radio communication sessions are also received and utilized to determine which of the plurality of radio communication sessions to terminate if the set of conditions for involuntarily terminating a radio communication session have been met.

TECHNICAL FIELD

The subject invention relates generally to the telecommunicationsindustry, and more particularly towards methods and systems forfacilitating preemptive based radio channel access control.

BACKGROUND

Advances in computer technology (e.g., microprocessor speed, memorycapacity, data transfer bandwidth, software functionality, and the like)have generally contributed to increased computer application in variousindustries. Particular technological advances have been made withrespect to wireless applications in the telecommunications industry.However, under conditions of extreme network congestion, such advanceshave failed to adequately provide a method or system for allocatingresources for highly prioritized communications.

In existing wireless access networks, new call requests are queued if noradio channels are available at the time. The queued call request isthen served whenever radio resources become available, wherein callsmarked as having a higher priority are typically served first. Undernormal operational conditions, the queuing delay for call requests istypically small. Moreover, given the mobile nature of wireless deviceusers, the availability of radio resources is very dynamic. Existingprioritized schemes are thus generally adequate under normal or mildcongestion conditions.

However, under certain extreme conditions where callers typically havelonger call holding times and they are concentrated at a focused area,radio resources may be fully utilized. Such conditions may, for example,arise immediately following a natural disaster where an extraordinarilylarge amount of people located near the disaster site may be attemptingto utilize their wireless devices. Because of the potential difficultyof obtaining wireless connectivity under those conditions, some callersmay be prone to hold their calls for a long time in case they are nolonger able to make calls.

Under such extreme conditions, wireless networks experience radio accesscongestion due to the limited available radio channels, which causes thecall blocking rate to rise. Existing priority calling features, such asWPS (Wireless Priority Service) and GETS (Government EmergencyTelecommunications Service), are only useful when there are availableradio channels. Namely, if no radio channels are available, WPS/GETScallers will not be able to obtain radio access even if all the radiochannels are occupied by low priority calls. The only way for suchWPS/GETS callers to access radio channels is to thus wait for anexisting call to end so that a radio channel is made available.Accordingly, there is a need for a method and system that facilitatesallocating radio resources to accommodate prioritized radiocommunications under extreme network conditions.

The above-described deficiencies are merely intended to provide anoverview of some of the problems of conventional systems, and are notintended to be exhaustive. Other problems with conventional systems andcorresponding benefits of the various non-limiting embodiments describedherein may become further apparent upon review of the followingdescription.

SUMMARY

The following presents a simplified summary of the innovation in orderto provide a basic understanding of some aspects described herein. Thissummary is not an extensive overview of the claimed subject matter. Itis intended to neither identify key or critical elements of the claimedsubject matter nor delineate the scope of the subject innovation. Itssole purpose is to present some concepts of the claimed subject matterin a simplified form as a prelude to the more detailed description thatis presented later.

The subject innovation relates to systems and/or methods for preemptivebased radio channel access control for wireless networks. In an aspect,particular in-session calls are involuntarily terminated so that higherpriority calls can access the limited radio resources available underextreme events. For instance, by terminating an existing call in sessionthat is identified as lower priority call, a WPS equivalent call can beadmitted even though no radio channels may have been available when theWPS call request initially arrived. However, because of the invasivenature of involuntarily terminating an in-session call, an intelligentsystem and method is also provided for determining under what conditionssuch terminations can be invoked.

Various non-limiting embodiments of a system and method for facilitatingpreemptive based radio channel access control are described. In oneparticular embodiment, a method for initiating execution of an algorithmfor involuntarily terminating a radio communication session is provided.The method includes queuing requests for highly prioritizedcommunications onto a memory component as a prioritized queue. Withinsuch embodiment, at least one characteristic of the prioritized queue isascertained so as to provide at least one queue parameter. The methodfurther includes ascertaining radio resource availability foraccommodating each of the requests on the prioritized queue. Initiatingexecution of the algorithm for involuntarily terminating a radiocommunication session is then determined as a function of the radioresource availability and the at least one queue parameter, eitherindividually or in combination.

In another non-limiting embodiment, a method for allocating radioresources to accommodate prioritized radio communications is provided.The method includes receiving a signal causing a computing device tooperate in an active mode in which the signal indicates that at leastone request for a highly prioritized radio communication is included ona queue and that a set of threshold conditions have been met. The methodfurther includes executing a set of computer-readable instructions thatare only executable if the computing device is operating in the activemode. Within such embodiment, the computer-readable instructions includeinstructions for selecting a radio communication to terminate from aplurality of radio communications in which the selected radiocommunication is selected as a function of characteristics correspondingto the selected radio communication. The method also includes providinga signal identifying the selected radio communication and causing thecomputing device to cease operating in the active mode as a function ofeach selected radio communication.

In yet another non-limiting embodiment, a system for facilitatingpreemptive based radio access control is also provided and includes aprocessor coupled to a memory component, a receiving component, and atransmission component. Within such embodiment, the processor isconfigured to execute a set of computer-readable instructions stored inthe memory component, which includes a first algorithm for determiningwhether a set of conditions has been met for involuntarily terminating aradio communication session. The computer-readable instructions alsoinclude a second algorithm for determining which of a plurality of radiocommunication sessions to terminate. The receiving component isconfigured to receive trigger data corresponding to a set of requestsfor highly prioritized communications included on a prioritized queueand data corresponding to radio resource availability such that thefirst algorithm determines whether the set of conditions have been metas a function of the trigger data. The receiving component is alsoconfigured to receive session data corresponding to characteristics foreach of the plurality of radio communication sessions such that thesecond algorithm determines which of the plurality of radiocommunication sessions to terminate as a function of the session data.And finally, the transmission component is configured to transmittermination data corresponding to an output generated by the secondalgorithm.

The following description and the annexed drawings set forth in detailcertain illustrative aspects of the claimed subject matter. Theseaspects are indicative, however, of but a few of the various ways inwhich the principles of the innovation may be employed and the claimedsubject matter is intended to include all such aspects and theirequivalents. Other advantages and novel features of the claimed subjectmatter will become apparent from the following detailed description ofthe innovation when considered in conjunction with the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an exemplary multiple access wireless communicationsystem in accordance with an aspect of the subject specification.

FIG. 2 illustrates a block diagram of an exemplary device thatfacilitates preemptive based radio access control in accordance with anaspect of the subject specification.

FIG. 3 illustrates a flowchart of an exemplary methodology forinitiating execution of an algorithm for involuntarily terminating aradio communication session in accordance with an aspect of the subjectspecification.

FIG. 4 is a schematic diagram illustrating an exemplary operation of aradio resource controller in detect mode in accordance with an aspect ofthe subject specification.

FIG. 5 illustrates an exemplary flowchart of a particular methodologyfor operating a radio resource controller in detect mode in accordancewith an aspect of the subject specification.

FIG. 6 illustrates a flowchart of an exemplary methodology forallocating radio resources to accommodate prioritized radiocommunications in accordance with an aspect of the subjectspecification.

FIG. 7 is a schematic diagram illustrating an exemplary operation of aradio resource controller in active mode in accordance with an aspect ofthe subject specification.

FIG. 8 illustrates an exemplary flowchart of a particular methodologyfor operating a radio resource controller in active mode in accordancewith an aspect of the subject specification.

FIG. 9 illustrates an example of a device, a mobile handset that, thatcan process radio communications in accordance with the embodimentsdisclosed herein.

FIG. 10 illustrates a block diagram of a computer operable to executethe disclosed preemptive based radio access control system.

DETAILED DESCRIPTION

The claimed subject matter is now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the claimed subject matter. It may beevident; however, that such matter can be practiced without thesespecific details. In other instances, well-known structures and devicesare shown in block diagram form in order to facilitate describing theclaimed subject matter.

As utilized herein, terms “component,” “system,” “data store,” “engine,”“template,” “manager,” “network,” “profile,” and the like are intendedto refer to a computer-related entity, either hardware, software (e.g.,in execution), and/or firmware. For example, a component can be aprocess running on a processor, a processor, an object, an executable, aprogram, a function, a library, a subroutine, and/or a computer or acombination of software and hardware. By way of illustration, both anapplication running on a server and the server can be a component. Oneor more components can reside within a process and a component can belocalized on one computer and/or distributed between two or morecomputers.

Furthermore, the claimed subject matter may be implemented as a method,apparatus, or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware, or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable device, carrier, or media. For example, computerreadable media can include but are not limited to magnetic storagedevices (e.g., hard disk, floppy disk, magnetic strips . . . ), opticaldisks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ),smart cards, and flash memory devices (e.g., card, stick, key drive . .. ). Additionally it should be appreciated that a carrier wave can beemployed to carry computer-readable electronic data such as those usedin transmitting and receiving electronic mail or in accessing a networksuch as the Internet or a local area network (LAN). Of course, thoseskilled in the art will recognize many modifications may be made to thisconfiguration without departing from the scope or spirit of the claimedsubject matter. Moreover, the word “exemplary” is used herein to meanserving as an example, instance, or illustration. Any aspect or designdescribed herein as “exemplary” is not necessarily to be construed aspreferred or advantageous over other aspects or designs.

Referring now to FIG. 1, a wireless communication system 100 isillustrated in accordance with various embodiments presented herein.System 100 comprises a base station 102 that can include multipleantenna groups. For example, one antenna group can include antennas 104and 106, another group can comprise antennas 108 and 110, and anadditional group can include antennas 112 and 114. Two antennas areillustrated for each antenna group; however, more or fewer antennas canbe utilized for each group. Base station 102 can additionally include atransmitter chain and a receiver chain, each of which can in turncomprise a plurality of components associated with signal transmissionand reception (e.g., processors, modulators, multiplexers, demodulators,demultiplexers, antennas, etc.), as will be appreciated by one skilledin the art.

Base station 102 can communicate with one or more mobile devices such asmobile device 116 and mobile device 122; however, it is to beappreciated that base station 102 can communicate with substantially anynumber of mobile devices similar to mobile devices 116 and 122. Mobiledevices 116 and 122 can be, for example, cellular phones, smart phones,laptops, handheld communication devices, handheld computing devices,satellite radios, global positioning systems, PDAs, and/or any othersuitable device for communicating over wireless communication system100. As depicted, mobile device 116 is in communication with antennas112 and 114, where antennas 112 and 114 transmit information to mobiledevice 116 over a forward link 118 and receive information from mobiledevice 116 over a reverse link 120. Moreover, mobile device 122 is incommunication with antennas 104 and 106, where antennas 104 and 106transmit information to mobile device 122 over a forward link 124 andreceive information from mobile device 122 over a reverse link 126. In afrequency division duplex (FDD) system, forward link 118 can utilize adifferent frequency band than that used by reverse link 120, and forwardlink 124 can employ a different frequency band than that employed byreverse link 126, for example. Further, in a time division duplex (TDD)system, forward link 118 and reverse link 120 can utilize a commonfrequency band and forward link 124 and reverse link 126 can utilize acommon frequency band.

Each group of antennas and/or the area in which they are designated tocommunicate can be referred to as a sector of base station 102. Forexample, antenna groups can be designed to communicate to mobile devicesin a sector of the areas covered by base station 102. In communicationover forward links 118 and 124, the transmitting antennas of basestation 102 can utilize beamforming to improve signal-to-noise ratio offorward links 118 and 124 for mobile devices 116 and 122. This can beprovided by using a precoder to steer signals in desired directions, forexample. Also, while base station 102 utilizes beamforming to transmitto mobile devices 116 and 122 scattered randomly through an associatedcoverage, mobile devices in neighboring cells can be subject to lessinterference as compared to a base station transmitting through a singleantenna to all its mobile devices. Moreover, mobile devices 116 and 122can communicate directly with one another using a peer-to-peer or ad hoctechnology in one example.

According to an example, system 100 can be a multiple-inputmultiple-output (MIMO) communication system. Further, system 100 canutilize substantially any type of duplexing technique to dividecommunication channels (e.g., forward link, reverse link, . . . ) suchas FDD, TDD, and the like. Moreover, the system 100 can be amultiple-bearer system. A bearer can be an information path of definedcapacity, delay, bit error rate, etc. Mobile devices 116 and 122 caneach serve one or more radio bearers. The mobile devices 116 and 122 canemploy uplink rate control mechanisms to manage and/or share uplinkresources across the one or more radio bearers. In one example, themobile devices 116 and 122 can utilize token bucket mechanisms to servethe radio bearers and to enforce uplink rate limitations.

Pursuant to an illustration, each bearer can have an associatedprioritized bit rate (PBR), maximum bit rate (MBR) and guaranteed bitrate (GBR). The mobile devices 116 and 122 can serve the radio bearersbased, at least in part, on the associated bit rate values. The bit ratevalues can also be employed to calculate queue sizes that account forPBR and MBR for each bearer. The queue sizes can be included in uplinkresource requests transmitted by the mobile devices 116 and 122 to thebase station 102. The base station 102 can schedule uplink resources formobile device 116 and 122 based upon respective uplink requests andincluded queue sizes.

Referring next to FIG. 2, a block diagram of an exemplary system thatfacilitates preemptive based radio access control in accordance with anaspect of the subject specification is provided. As illustrated, radioresource control system 200 includes a processor component 210, a memorycomponent 220, a timing component 230, a receiving component 240, and atransmission component 250. Here, it should be appreciated that system200 may be implemented as either a single computing device or multipledevices comprising any combination of the aforementioned components.Similarly, it should be further appreciated that each of components 210,220, 230, 240, and 250 may be implemented as single devices and/ormultiple devices.

In an embodiment, processor component 210 is configured to executecomputer-readable instructions related to any of a plurality ofalgorithms. In one aspect, processor component 210 is configured toexecute instructions for system 200 to operate in a “detect mode” untila set of conditions has been met for entering an “active mode.”Moreover, processor component 210 is configured to execute instructionsfor detecting when a set of conditions have been met for initiating theinvoluntary termination of a radio communication session. Within suchembodiment, these conditions may depend on any of a plurality of factorsincluding factors corresponding to a queue of requests for highlyprioritized calls (e.g., queue depth, length of time a highlyprioritized call has remained on the queue, etc.) and/or factorscorresponding to the availability of radio resources in light of suchrequests. In other embodiments, such conditions may also include thefrequency of active mode initiations such that the sensitivity of futureinitiations may increase/decrease according to this logged frequency.

Processor component 210 may also be configured to execute instructionsfor system 200 to operate in active mode. Once in active mode, theprocessor executes an algorithm for determining which of a plurality ofradio communication sessions to terminate so as to allow a queuedprioritized call to be transmitted. Within such embodiment, selectingwhich radio communication session should be terminated may depend on anyof various factors including the priority of each radio communication(e.g., WPS, GETS, high priority, medium priority, low priority, etc.) aswell as the hold time of each session (e.g., longer calls may beterminated before shorter calls). Here, it should also be appreciatedthat processor component 210 may be configured to terminate multipleradio communication sessions simultaneously (e.g., if an undesirablylarge number of prioritized calls are queued).

In an aspect, memory component 220 is coupled to processor component 210and configured to store the computer-readable instructions executed byprocessor component 210. Data corresponding to parameters utilized byalgorithms executed by processor component 210 may similarly be storedin memory component 220 including. Such data may, for example, includedata corresponding to the prioritized queue of requests (e.g., queuedepth, length of time a prioritized call has remained on the queue,etc.) and/or data corresponding to the availability of radio resources.Stored data may also include data corresponding to characteristics foreach of the plurality of “candidate” radio communication sessions whichmay be terminated (e.g., priority data, hold time data, etc.). Here, itshould be appreciated that memory component 220 can be configured in anumber of different configurations, including as random access memory,battery-backed memory, hard disk, magnetic tape, etc. Various featurescan also be implemented upon memory component 220, such as compressionand automatic back up (e.g., use of a Redundant Array of IndependentDrives configuration).

In another aspect, timing component 230 is coupled to processor 210 andconfigured to provide data corresponding to any of a plurality of timingfunctions. For instance, timing component 230 may be configured todetermine how long any of the requests for highly prioritizedcommunications have remained on the prioritized queue. Timing component230 may also be configured to determine how long any of the plurality ofradio communication sessions has remained in session.

System 200 may also include receiving component 240 and transmissioncomponent 250, each of which may be coupled to processor component 210and configured to receive/transmit various types of data. For instance,receiving component 240 may be configured to receive trigger data (i.e.,data utilized to determine whether system 200 should enter active mode,including queue depth, length of time a prioritized call has remained onthe queue, availability of radio resources, etc.) and/or session data(i.e., data utilized to determine which radio communication session(s)to terminate, including priority data, hold time data, etc.).Transmission component may then be configured to transmit terminationdata which may identify the particular radio communication session(s)selected for termination. For either of receiving component 240 ortransmission component 250 it should be appreciated that operation cantake place wirelessly, in a hard-wired manner, with employment ofsecurity technology (e.g., encryption), etc. It should be furtherappreciated that receiving component 240 can utilize various protectivefeatures, such as performing a virus scan on obtained data and blockinginformation that is positive for a virus.

Referring next to FIG. 3, a flowchart of an exemplary methodology foroperating a radio resource control system in detect mode in accordancewith an aspect of the subject specification is provided. As illustrated,process 300 begins at step 310 where requests for highly prioritizedcommunications are queued. Such requests may be stored onto a memorycomponent as a prioritized queue, wherein the memory component may beany combination of internal and/or external memory.

Next, at step 320, process 300 continues with particular queuecharacteristics being ascertained. As stated previously, such queuecharacteristics may include the number of highly prioritizedcommunications on the queue and/or the length of time suchcommunications have remained on the queue (either individually orcollectively). In an embodiment, the ascertained characteristics areutilized to provide at least one queue parameter, wherein the queueparameter(s) may depend on individual queue characteristics and/or anycombination of queue characteristics. Furthermore, it should be notedthat each of the queue characteristics and queue parameter(s) may beexpressed as a quantitative and/or qualitative value.

Process 300 then proceeds to step 330 where radio resource availabilityfor accommodating the queued communications is ascertained. Here, radioresource availability may also be expressed as a quantitative and/orqualitative value. For instance, radio resource availability may beexpressed as a quantified percentage, quantified values (# of radiobearers, each radio bearer can carry one communication channel) and/orqualitative description (e.g., high, medium, low, etc.). In otherembodiments, radio resource availability may simply be expressed as abinary value (e.g., available or not available), wherein such binaryvalue depends on whether the actual radio resource availability exceedsa particular value (e.g., whether any radio resources are available).

At step 340, process 300 concludes with a determination of whether theradio resource control system should enter active mode. In one aspect,such determination is made as a function of the queue parameter(s) andradio resource availability, either individually or in combination. Inone embodiment, for example, a positive determination might be made ifeither of the “queue depth” or “length of time on queue” valuesindividually exceed a particular threshold, regardless of radio resourceavailability (i.e., to avoid a “bottleneck” of prioritized calls on thequeue). Similarly, a positive determination might be made if radioresource availability exceeds a particular threshold, regardless of thequeue characteristics (i.e., so as to ensure that a percentage of radioresources are always available). Other embodiments, may includecombinations in which the determination is made according to fixedthreshold combinations (e.g., yielding a positive determination only ifeach of the “radio resource availability,” “queue depth,” and “length oftime on queue” values exceed their respective thresholds), as well asvariable “sliding scale” threshold combinations (e.g., decreasing the“radio resource availability” threshold as either of the “queue depth”and/or “length of time on queue” values increases).

Referring next to FIG. 4, a schematic diagram illustrating an exemplaryoperation of a radio resource controller in detect mode in accordancewith an aspect of the subject specification is provided. For thisparticular system 400, radio resource controller 410 operates in detectmode, wherein radio resource controller 410 monitors elements of system400 to determine whether active mode should be initiated (i.e., whethercalls should be involuntarily terminated so as to make radio channelsavailable for highly prioritized calls). As illustrated, system 400includes a prioritized queue 420, which is a queue of un-served highpriority calls, and a low priority queue 430, which is a queue ofun-served lower priority calls. Within such embodiment, the availabilityof radio resources depends on the number of in-session high prioritycalls 422 and the number of in-session low priority calls 432 that areoccupying radio channels 440 (here seven channels are illustrated).

Depending on the particular threshold scheme implemented, radio resourcecontroller 410 may continue to operate in detect mode until a set ofdesired threshold conditions are met. For instance, because a “queuedepth” threshold may have been set to a value of three, the twoun-served high priority calls shown on prioritized queue 420 might causeresource controller 410 to remain in detect mode. Alternatively,resource controller 410 might remain in detect mode because the “lengthof time on queue” and/or “radio resource availability” thresholds havenot been exceeded.

Referring next to FIG. 5, an exemplary flowchart of a particularmethodology for operating a radio resource controller in detect mode inaccordance with an aspect of the subject specification is provided. Asillustrated, process 500 begins at step 510 where the radio resourcecontroller monitors requests for calls. Process 500 continues tomonitors call requests at step 510 until a request for a highlyprioritized call is received at step 520. Once a request for aprioritized call is received, process 500 determines whether the queueof prioritized calls is empty at step 530. If the priority queue isempty, a timer is started at step 535 for determining how long t_(q) theprioritized queue has not been empty (here, it is assumed that t_(q) isinitially zero if it is determined that queue is empty) followed by step540 where the request is queued on the priority queue. Otherwise, if theprioritized queue is not empty, process 500 proceeds directly to step540 where the t_(q) is assumed to have continued from the time in whicha previously queued priority request initiated the timer.

Once the priority request is queued, process 500 proceeds to step 550where it determines whether radio resources are available to accommodateany of the queued priority requests (i.e., either the newly receivedrequest or a previously queued request). If radio resources are indeedavailable, the first priority request on the priority queue is served atstep 555. Otherwise, if resources are unavailable, process 500 proceedsto step 560.

At step 560, a determination is made as to whether a t_(q) threshold hasbeen exceeded. If the threshold has not been exceeded, process 500 loopsback to step 550 where a resource availability determination isrepeated. Otherwise, if the threshold has indeed been exceeded, theradio resource controller enters its active mode at step 565 where anin-session call is terminated to accommodate the first priority requeston the priority queue.

After either a request on the priority queue is served at step 555 orthe active mode is exited at step 565, t_(q) is reset to zero at step570. After t_(q) is reset, another determination of whether theprioritized queue is empty is made at step 580. If the queue is nowempty, process 500 loops back to step 510 where call requests continueto be monitored. Otherwise, if the queue is not empty, the queue timeris restarted at step 585 and process 500 then loops back to step 550where the resource availability determination is repeated.

In summary, exemplary process 500 proposes a particular embodiment forinvoking an active mode algorithm according to queuing time threshold.Such a process is desirable for keeping track of system dynamics becauseonly one state parameter t_(q) needs to be maintained by the radioresource controller, wherein all WPS call requests may be queued in aseparate queue waiting for free radio channels.

Here, it should be appreciated that the particular threshold t_(qMax)for how long the prioritized queue may continue to hold prioritizedrequests is a configurable parameter. For some embodiments, if theprioritized queue is not empty, the detect mode may be designed suchthat at least one WPS request must be served every t_(qMax) timeinterval. It should thus be further appreciated that a particular detectmode may be designed to take the aggressiveness of preemptive schemesinto consideration by configuring t_(qMax) to manage the invocation ofpreemptive actions. Moreover, t_(qMax) may be strategically configuredby service providers to control the frequency of terminating a lowerpriority call in session. For instance, a larger value of t_(qMax) maylead to a lower frequency of active mode invocations, whereas a smallert_(qMax) may ensure shorter call setup delays for higher priority calls.

In practice, if a call request is sitting in a queue longer than acertain pre-defined time, an automatic re-try can be invoked by thelocal call management entity or the call request will be deleted fromthe request queue. The latter, in most cases, forces a re-try initiatedby the end caller. In either case, the end user experience is negativelyimpacted. However, if the disclosed detect mode is used, the call setuptime for high priority callers can be bounded by t_(qMax), and the enduser initiated re-dial can also be eliminated so long as the network is“properly” engineered (i.e., designs in which the high priority trafficforecast is a much smaller portion of the total forecasted traffic). ForWPS, due to its critical nature, the number of authorized users isusually strictly limited.

Referring next to FIG. 6, a flowchart of an exemplary methodology forallocating radio resources to accommodate prioritized radiocommunications during active mode operation is provided. As illustrated,process 600 begins at step 610 where a signal is received indicatingthat the active mode may be initiated. Here, it is thus assumed that asignal, generated during detect mode operation, has been receivedindicating that all necessary conditions for involuntarily terminating aradio communication in session have been met.

Next, at step 620, process 600 continues with the execution of analgorithm for selecting the particular radio communication(s) toterminate. Here, it should be appreciated that either a singlecommunication or multiple communications can be selected. Althoughselecting single communications at a time may be less intrusive, such ascheme might be inefficient during particularly extreme circumstances,wherein the queue depth of prioritized calls might be extraordinarilydeep. Conversely, although selecting multiple communications might bemore efficient, such a scheme might be more intrusive.

It should be further appreciated that the actual selection of radiocommunications to terminate at step 620 may be performed in variousways. For instance, communication sessions may be selected according totheir respective hold times and/or priority level. Furthermore,communication sessions may be evaluated “individually” according towhether individual sessions meet a criteria independent of the othercandidate sessions (e.g., selecting the first call determined to be“low” priority), and/or sessions may be evaluated “collectively”according to whether individual sessions meet a criteria relative toother candidate sessions (e.g., evaluating all “low” priority calls andselecting the call with the longest hold time).

Once the session(s) to terminate has/have been selected, process 600continues to step 630 where a signal identifying the selected session(s)is generated. Here, it should be appreciated that such signal may thenbe utilized within a particular radio resource control device and/ortransmitted to an external system component. And finally, at step 640,process 600 concludes with the active mode being exited, which may bedesirable since the involuntary termination of in-session calls shouldgenerally be limited. In an embodiment, process 600 may simply return toa detect mode.

Referring next to FIG. 7, a schematic diagram illustrating an exemplaryoperation of a radio resource controller in active mode in accordancewith an aspect of the subject specification is provided. For thisparticular illustration, it may be assumed that the detect modeoperation illustrated in FIG. 4 has detected conditions indicated thatan active mode should be initiated. Moreover, as illustrated, system 700again includes a radio resource controller 710, a high-priority queue720, and a low-priority queue 730. System 700 also includes radiochannels 740 which are comprised of in-session high priority calls 722and in-session low priority calls 732.

However, because radio resource controller 710 is operating in activemode, a particular in-session call 734 is terminated. Here, the activemode may have been activated because each of the seven radio channels440 in FIG. 4 were being used (i.e., the “radio resource availability”threshold may have been met). For this particular example, terminatedin-session call 734 corresponds to a previously identified in-sessionlow priority call 432 in FIG. 4. Accordingly, if it is assumed that onlyseven radio channels 740 are available, the involuntary termination ofin-session call 734 opened a radio channel for the previously queuedpriority call 724 to use, as shown.

Referring next to FIG. 8, an exemplary flowchart of a particularmethodology for operating a radio resource controller in active mode inaccordance with an aspect of the subject specification is provided. Asillustrated, process 800 begins at step 810 where the radio resourcecontroller is assumed to initially operate in detect mode. Once thenecessary conditions have been met, process 800 proceeds to step 820where the radio resource controller begins to operate in active mode.

For this particular example, selecting which calls to terminate is basedon a combination of session length (i.e., the hold time of a particularcall) and priority type (e.g., WPS or non-WPS). As such, process 800continues to step 830 where the radio resource controller evaluates allthe “candidate” calls and identifies the call with the longest holdtime. Here, it should be noted that tracking the call holding time for acall in session is trivial where the call arrival time is obtainable.Given common billing practice, the call arrival times may be included aspart of call CDR records provided by many service providers.Accordingly, a particular embodiment may be configured such that theradio resource controller can access a local CDR maintained in a basestation control (BSC) system for all calls served by the BSC system.

At step 840, process 800 continues with a determination of whether thecall identified as having the longest hold time is a WPS call. If theidentified call is indeed a WPS call, the call is pruned from futurechecks at step 845 and process 800 loops back to step 830 where the callwith the “next” longest call time is identified. If, however, step 840determines that an identified call is not a WPS call, process 800proceeds to step 850.

At step 850, the identified non-WPS call with the longest hold time isthen terminated. Once this call is terminated, the first queued WPS callis served at step 860. Process 800 then concludes with the radioresource controller ceasing to operate in active mode and returning tooperate in detect mode at step 810.

In practice, it should be noted that the particular conditions forinvoluntarily terminating a call via the radio resource controller'sactive mode may be configured so that this only occurs during extremecircumstances. In an exemplary embodiment, the active mode might beinitiated only if the following two conditions have been met: (1) Radioresources have been 100% utilized for a sustained period of time; (2)WPS call requests have been sitting in the WPS queue for more thant_(qMax). Those two criteria will likely only be met under extremeconditions. As a result, such design would provide preferential QoStreatment for WPS users under extreme conditions where invasive measurescan be applied.

FIG. 9 illustrates a schematic block diagram of an exemplary device 900capable of employing the subject system in accordance with someembodiments of the disclosed subject matter, wherein the exemplarydevice is a mobile handset 900. In order to provide additional contextfor various aspects thereof, FIG. 9 and the following discussion areintended to provide a brief, general description of a suitableenvironment 900 in which the various aspects can be implemented. Whilethe description includes a general context of computer-executableinstructions, those skilled in the art will recognize that theinnovation also can be implemented in combination with other programmodules and/or as a combination of hardware and software.

Generally, applications (e.g., program modules) can include routines,programs, components, data structures, etc., that perform particulartasks or implement particular abstract data types. Moreover, thoseskilled in the art will appreciate that the inventive methods can bepracticed with other system configurations, including single-processoror multiprocessor systems, minicomputers, mainframe computers, as wellas personal computers, hand-held computing devices, microprocessor-basedor programmable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

A computing device can typically include a variety of computer-readablemedia. Computer-readable media can be any available media that can beaccessed by the computer and includes both volatile and non-volatilemedia, removable and non-removable media. By way of example and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media includes both volatileand non-volatile, removable and non-removable media implemented in anymethod or technology for storage of information such ascomputer-readable instructions, data structures, program modules orother data. Computer storage media can include, but is not limited to,RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM,digital video disk (DVD) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store thedesired information and which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

The handset 900 includes a processor 902 for controlling and processingall onboard operations and functions. A memory 904 interfaces to theprocessor 902 for storage of data and one or more applications 906(e.g., a video player software, user feedback component software, . . .). Other applications can include voice recognition of predeterminedvoice commands that facilitate initiation of the user feedback signals.The applications 906 can be stored in the memory 904 and/or in afirmware 908, and executed by the processor 902 from either or both thememory 904 or/and the firmware 908. The firmware 908 can also storestartup code for execution in initializing the handset 900. Acommunications component 910 interfaces to the processor 902 tofacilitate wired/wireless communication with external systems, e.g.,cellular networks, VoIP networks, and so on. Here, the communicationscomponent 910 can also include a suitable cellular transceiver 911(e.g., a GSM transceiver) and an unlicensed transceiver 913 (e.g., WiFi,WiMax) for corresponding signal communications. The handset 900 can be adevice such as a cellular telephone, a PDA with mobile communicationscapabilities, and messaging-centric devices. The communicationscomponent 910 also facilitates communications reception from terrestrialradio networks (e.g., broadcast), digital satellite radio networks, andInternet-based radio services networks.

The handset 900 includes a display 912 for displaying text, images,video, telephony functions (e.g., a Caller ID function), setupfunctions, and for user input. The display 912 can also accommodate thepresentation of multimedia content (e.g., music metadata, messages,wallpaper, graphics, . . . ). A serial I/O interface 914 is provided incommunication with the processor 902 to facilitate wired and/or wirelessserial communications (e.g., USB, and/or IEEE 1394) through a hardwireconnection, and other serial input devices (e.g., a keyboard, keypad,and mouse). This supports updating and troubleshooting the handset 900,for example. Audio capabilities are provided with an audio I/O component916, which can include a speaker for the output of audio signals relatedto, for example, indication that the user pressed the proper key or keycombination to initiate the user feedback signal. The audio I/Ocomponent 916 also facilitates the input of audio signals through amicrophone to record data and/or telephony voice data, and for inputtingvoice signals for telephone conversations.

The handset 900 can include a slot interface 918 for accommodating a SIC(Subscriber Identity Component) in the form factor of a card SubscriberIdentity Module (SIM) or universal SIM 920, and interfacing the SIM card920 with the processor 902. However, it is to be appreciated that theSIM card 920 can be manufactured into the handset 900, and updated bydownloading data and software thereinto.

The handset 900 can process IP data traffic through the communicationcomponent 910 to accommodate IP traffic from an IP network such as, forexample, the Internet, a corporate intranet, a home network, a personarea network, etc., through an ISP or broadband cable provider. Thus,VoIP traffic can be utilized by the handset 900 and IP-based multimediacontent can be received in either an encoded or decoded format.

A video processing component 922 (e.g., a camera) can be provided fordecoding encoded multimedia content. The handset 900 also includes apower source 924 in the form of batteries and/or an AC power subsystem,which power source 924 can interface to an external power system orcharging equipment (not shown) by a power I/O component 926.

The handset 900 can also include a video component 930 for processingvideo content received and, for recording and transmitting videocontent. A location tracking component 932 facilitates geographicallylocating the handset 900. As described hereinabove, this can occur whenthe user initiates the feedback signal automatically or manually. A userinput component 934 facilitates the user initiating the quality feedbacksignal. The input component can include such conventional input devicetechnologies such as a keypad, keyboard, mouse, stylus pen, and touchscreen, for example.

Referring again to the applications 906, a hysteresis component 936facilitates the analysis and processing of hysteresis data, which isutilized to determine when to associate with the access point. Asoftware trigger component 938 can be provided that facilitatestriggering of the hysteresis component 938 when the WiFi transceiver 913detects the beacon of the access point. A SIP client 940 enables thehandset 900 to support SIP protocols and register the subscriber withthe SIP registrar server. The applications 906 can also include a client942 that provides at least the capability of discovery, play and storeof multimedia content, for example, music.

The handset 900, as indicated above related to the communicationscomponent 910, includes an indoor network radio transceiver 913 (e.g.,WiFi transceiver). This function supports the indoor radio link, such asIEEE 802.11, for the dual-mode GSM handset 900. The handset 900 canaccommodate at least satellite radio services through a handset that cancombine wireless voice and digital radio chipsets into a single handhelddevice.

Referring now to FIG. 10, there is illustrated a block diagram of acomputer operable to provide networking and communication capabilitiesbetween a wired or wireless communication network and a server and/orcommunication device. In order to provide additional context for variousaspects thereof, FIG. 10 and the following discussion are intended toprovide a brief, general description of a suitable computing environment1000 in which the various aspects of the innovation can be implemented.While the description above is in the general context ofcomputer-executable instructions that can run on one or more computers,those skilled in the art will recognize that the innovation also can beimplemented in combination with other program modules and/or as acombination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the innovation can also be practiced indistributed computing environments where certain tasks are performed byremote processing devices that are linked through a communicationsnetwork. In a distributed computing environment, program modules can belocated in both local and remote memory storage devices.

A computer typically includes a variety of computer-readable media.Computer-readable media can be any available media that can be accessedby the computer and includes both volatile and non-volatile media,removable and non-removable media. By way of example, and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media includes both volatileand non-volatile, removable and non-removable media implemented in anymethod or technology for storage of information such ascomputer-readable instructions, data structures, program modules orother data. Computer storage media includes, but is not limited to, RAM,ROM, EEPROM, flash memory or other memory technology, CD-ROM, digitalvideo disk (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

With reference again to FIG. 10, the exemplary environment 1000 forimplementing various aspects includes a computer 1002, the computer 1002including a processing unit 1004, a system memory 1006 and a system bus1008. The system bus 1008 couples system components including, but notlimited to, the system memory 1006 to the processing unit 1004. Theprocessing unit 1004 can be any of various commercially availableprocessors. Dual microprocessors and other multi-processor architecturescan also be employed as the processing unit 1004.

The system bus 1008 can be any of several types of bus structure thatcan further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1006includes read-only memory (ROM) 1010 and random access memory (RAM)1012. A basic input/output system (BIOS) is stored in a non-volatilememory 1010 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 1002, such as during start-up. The RAM 1012 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 1002 further includes an internal hard disk drive (HDD)1014 (e.g., EIDE, SATA), which internal hard disk drive 1014 can also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 1016, (e.g., to read from or write to aremovable diskette 1018) and an optical disk drive 1020, (e.g., readinga CD-ROM disk 1022 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 1014, magnetic diskdrive 1016 and optical disk drive 1020 can be connected to the systembus 1008 by a hard disk drive interface 1024, a magnetic disk driveinterface 1026 and an optical drive interface 1028, respectively. Theinterface 1024 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and IEEE 1394 interfacetechnologies. Other external drive connection technologies are withincontemplation of the subject innovation.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1002, the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer, such as zipdrives, magnetic cassettes, flash memory cards, cartridges, and thelike, can also be used in the exemplary operating environment, andfurther, that any such media can contain computer-executableinstructions for performing the methods of the disclosed innovation.

A number of program modules can be stored in the drives and RAM 1012,including an operating system 1030, one or more application programs1032, other program modules 1034 and program data 1036. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1012. It is to be appreciated that the innovation canbe implemented with various commercially available operating systems orcombinations of operating systems.

A user can enter commands and information into the computer 1002 throughone or more wired/wireless input devices, e.g., a keyboard 1038 and apointing device, such as a mouse 1040. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 1004 through an input deviceinterface 1042 that is coupled to the system bus 1008, but can beconnected by other interfaces, such as a parallel port, an IEEE 2394serial port, a game port, a USB port, an IR interface, etc.

A monitor 1044 or other type of display device is also connected to thesystem bus 1008 through an interface, such as a video adapter 1046. Inaddition to the monitor 1044, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1002 can operate in a networked environment using logicalconnections by wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1048. The remotecomputer(s) 1048 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer1002, although, for purposes of brevity, only a memory/storage device1050 is illustrated. The logical connections depicted includewired/wireless connectivity to a local area network (LAN) 1052 and/orlarger networks, e.g., a wide area network (WAN) 1054. Such LAN and WANnetworking environments are commonplace in offices and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich may connect to a global communications network, e.g., theInternet.

When used in a LAN networking environment, the computer 1002 isconnected to the local network 1052 through a wired and/or wirelesscommunication network interface or adapter 1056. The adaptor 1056 mayfacilitate wired or wireless communication to the LAN 1052, which mayalso include a wireless access point disposed thereon for communicatingwith the wireless adaptor 1056.

When used in a WAN networking environment, the computer 1002 can includea modem 1058, or is connected to a communications server on the WAN1054, or has other means for establishing communications over the WAN1054, such as by way of the Internet. The modem 1058, which can beinternal or external and a wired or wireless device, is connected to thesystem bus 1008 through the serial port interface 1042. In a networkedenvironment, program modules depicted relative to the computer 1002, orportions thereof, can be stored in the remote memory/storage device1050. It will be appreciated that the network connections shown areexemplary and other means of establishing a communications link betweenthe computers can be used.

The computer 1002 is operable to communicate with any wireless devicesor entities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least WiFi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

WiFi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. WiFi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. WiFi networks use radio technologies called IEEE 802.11 (a, b,g, etc.) to provide secure, reliable, fast wireless connectivity. A WiFinetwork can be used to connect computers to each other, to the Internet,and to wired networks (which use IEEE 802.3 or Ethernet). WiFi networksoperate in the unlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps(802.11a) or 54 Mbps (802.11b) data rate, for example, or with productsthat contain both bands (dual band), so the networks can providereal-world performance similar to the basic 10 BaseT wired Ethernetnetworks used in many offices.

What has been described above includes examples of the claimed subjectmatter. It is, of course, not possible to describe every conceivablecombination of components or methodologies for purposes of describingthe claimed subject matter, but one of ordinary skill in the art canrecognize that many further combinations and permutations of such matterare possible. Accordingly, the claimed subject matter is intended toembrace all such alterations, modifications and variations that fallwithin the spirit and scope of the appended claims. Furthermore, to theextent that the term “includes” is used in either the detaileddescription or the claims, such term is intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim.

1. A method for initiating execution of an algorithm for involuntarilyterminating a radio communication session, comprising: queuing requestsfor highly prioritized communications onto a memory component, therequests stored onto the memory component as a prioritized queue;ascertaining at least one characteristic of the prioritized queue so asto provide at least one queue parameter; ascertaining radio resourceavailability for accommodating each of the requests on the prioritizedqueue; and determining whether to initiate execution of the algorithmfor involuntarily terminating a radio communication session, thedetermining step being a function of the radio resource availability andthe at least one queue parameter, either individually or in combination.2. The method of claim 1, the first ascertaining step comprisingascertaining a length of time that a particular request has been on theprioritized queue, the at least one queue parameter at least partiallydependent on the length of time.
 3. The method of claim 2, thedetermining step being a function of whether the length of time exceedsa threshold, the threshold varying according to a characterization ofthe radio resource availability.
 4. The method of claim 1, the firstascertaining step comprising ascertaining a queue depth corresponding toa quantified number of requests on the prioritized queue, the at leastone queue parameter at least partially dependent on the queue depth. 5.The method of claim 4, the determining step being a function of whetherthe queue depth exceeds a threshold, the threshold varying according toa characterization of the radio resource availability.
 6. The method ofclaim 1 further comprising logging instances in which a determination ismade that execution of the algorithm for involuntarily terminating aradio communication session should be initiated, the determining stepbeing a function of a frequency of the instances.
 7. A computer readablemedium comprising computer executable instructions for carrying out themethod of claim
 1. 8. A method for allocating radio resources toaccommodate prioritized radio communications, comprising: receiving asignal indicating that at least one request for a highly prioritizedradio communication is included on a queue and that a set of thresholdconditions have been met, the signal causing a computing device tooperate in an active mode; executing computer-readable instructionsstored in the computing device, the computer-readable instructionsexecutable only if the computing device is operating in the active mode,the computer-readable instructions including instructions for selectingat least one radio communication to terminate from a plurality of radiocommunications, the at least one selected radio communication selectedas a function of ascertaining at least one characteristic correspondingto the at least one selected radio communication; providing a signalidentifying the at least one selected radio communication; and causingthe computing device to cease operating in the active mode, the causingstep being a function of selecting the at least one selected radiocommunication.
 9. The method of claim 8 further comprising ascertaininga session length for the at least one selected radio communication. 10.The method of claim 8 further comprising ascertaining a priority levelfor the at least one selected radio communication.
 11. The method ofclaim 8 further comprising ascertaining the at least one characteristicfor each of the plurality of radio communications, the at least oneselected radio communication selected as a function of comparing the atleast one characteristic corresponding to the at least one selectedradio communication with the at least one characteristic correspondingto each of the plurality of radio communications.
 12. The method ofclaim 8, the causing step comprising ceasing the computing device fromoperating in the active mode after each selected radio communicationselection.
 13. The method of claim 8, the receiving step furthercomprising receiving a quantity corresponding to the number of requestsfor highly prioritized radio communications included on the queue, theexecuting step comprising instructions to select an amount of radiocommunications to terminate at least equal to the quantity.
 14. Acomputer readable medium comprising computer executable instructions forcarrying out the method of claim
 8. 15. A system that facilitatespreemptive based radio access control, comprising: a processorconfigured to execute computer-readable instructions, thecomputer-readable instructions including a first algorithm and a secondalgorithm, the first algorithm including instructions for determiningwhether a set of conditions has been met for involuntarily terminating aradio communication session, the second algorithm including instructionsfor determining which of a plurality of radio communication sessions toterminate; a memory component coupled to the processor and configured tostore the computer-readable instructions; a receiving component coupledto the processor and configured to receive data as trigger data andtermination data, the trigger data corresponding to a set of requestsfor highly prioritized communications included on a prioritized queueand an availability of radio resources such that the first algorithmdetermines whether the set of conditions has been met as a function ofthe trigger data, the session data corresponding to characteristics foreach of the plurality of radio communication sessions such that thesecond algorithm determines which of the plurality of radiocommunication sessions to terminate as a function of the session data;and a transmission component coupled to the processor and configured totransmit data as termination data, the termination data corresponding toan output generated by the second algorithm.
 16. The system of claim 15further comprising a timing component, the timing component configuredto determine how long any of the requests for highly prioritizedcommunications has remained on the prioritized queue.
 17. The system ofclaim 15 further comprising a timing component, the timing componentconfigured to determine how long any of the plurality of radiocommunication sessions has remained in session.
 18. The method of claim15, the receiving component further configured to receive a quantitycorresponding to the number of requests for highly prioritized radiocommunications included on the prioritized queue, the trigger dataincluding the quantity.
 19. The method of claim 15, the receivingcomponent further configured to receive a quantity corresponding to thenumber of requests for highly prioritized radio communications includedon the prioritized queue, the termination data being a function of thequantity.
 20. The method of claim 15, the processor configured toexecute computer-readable instructions corresponding to the secondalgorithm only if execution of the first algorithm indicates that theset of conditions have been met.