Utilization of crowd-sourced access point data for 5G or other next generation network

ABSTRACT

Utilization of collected crowd-sourced access point quality and selection data for intelligent network selection can optimize access point device selection. A cloud-based application can be utilized in conjunction with a mobile device to build a database of access point quality and thresholds suitable for real-time and other jitter-sensitive services. In one embodiment, a first mobile device can receive access point data associated with a second mobile device. The access point data associated with the second mobile device can then inform the first mobile device on whether to communicate with the access point device or utilized cellular communication.

RELATED APPLICATION

The subject patent application is a continuation of, and claims priorityto, U.S. patent application Ser. No. 15/721,335 (now U.S. Pat. No.10,382,995), filed Sep. 29, 2017, and entitled “UTILIZATION OFCROWD-SOURCED ACCESS POINT DATA FOR 5G OR OTHER NEXT GENERATIONNETWORK,” the entirety of which application is hereby incorporated byreference herein

TECHNICAL FIELD

This disclosure relates generally to utilization of crowd-sourced accesspoint data. For example, this disclosure relates to utilization ofcrowd-sourced access point data to determine thresholds for signaltransfer in a 5G, or other next generation network.

BACKGROUND

5th generation (5G) wireless systems represent a next major phase ofmobile telecommunications standards beyond the currenttelecommunications standards of 4^(th) generation (4G). Rather thanfaster peak Internet connection speeds, 5G planning aims at highercapacity than current 4G, allowing a higher number of mobile broadbandusers per area unit, and allowing consumption of higher or unlimiteddata quantities. This would enable a large portion of the population tostream high-definition media many hours per day with their mobiledevices, when out of reach of wireless fidelity hotspots. 5G researchand development also aims at improved support of machine-to-machinecommunication, also known as the Internet of things, aiming at lowercost, lower battery consumption, and lower latency than 4G equipment.

The above-described background relating to a crowd-sourced access pointdata is merely intended to provide a contextual overview of some currentissues, and is not intended to be exhaustive. Other contextualinformation may become further apparent upon review of the followingdetailed description.

BRIEF DESCRIPTION OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments of the subject disclosureare described with reference to the following figures, wherein likereference numerals refer to like parts throughout the various viewsunless otherwise specified.

FIG. 1 illustrates an example wireless communication system in which anetwork node device (e.g., network node) and user equipment (UE) canimplement various aspects and embodiments of the subject disclosure.

FIG. 2 illustrates an example schematic system block diagram of a Wi-Fiaccess point list with initial default thresholds according to one ormore embodiments.

FIG. 3 illustrates an example schematic system block diagram of anincoming Wi-Fi calling selection scenario with adjusted thresholdsaccording to one or more embodiments.

FIG. 4 illustrates an example schematic system block diagram of anincoming Wi-Fi calling selection scenario with overload or transportjitter according to one or more embodiments.

FIG. 5 illustrates an example schematic system block diagram of a Wi-Fiaccess point list with self-optimized thresholds according to one ormore embodiments.

FIG. 6 illustrates an example schematic system block diagram of anexpanded user equipment Wi-Fi access point list with self-optimizedthresholds according to one or more embodiments.

FIG. 7 illustrates an example schematic system block diagram of a userequipment upload of initial access point threshold information to anaccess point database according to one or more embodiments.

FIG. 8 illustrates an example schematic system block diagram of a userequipment upload of initial access point threshold information to anaccess point database according to one or more embodiments.

FIG. 9 illustrates an example schematic system block diagram of a userequipment refresh and replace of expired access point thresholdinformation to an access point database according to one or moreembodiments.

FIG. 10 illustrates an example schematic system block diagram of a userequipment refresh and replace of expired access point thresholdinformation to an access point database according to one or moreembodiments.

FIG. 11 illustrates an example schematic system block diagram of a userequipment refresh and replace access point threshold information after aquality failure according to one or more embodiments.

FIG. 12 illustrates an example schematic system block diagram of a userequipment refresh and replace access point threshold information after aquality failure according to one or more embodiments.

FIG. 13 illustrates an example schematic system block diagram for a userequipment to obtain crowd-sourced AP thresholds from a cloud accesspoint database according to one or more embodiments.

FIG. 14 illustrates an example schematic system block diagram for a userequipment to obtain crowd-sourced AP thresholds from a cloud accesspoint database according to one or more embodiments.

FIG. 15 illustrates an example schematic system block diagram for userequipment to obtain crowd-sourced access point thresholds from a cloudaccess point database according to one or more embodiments.

FIG. 16 illustrates an example schematic system block diagram for userequipment to obtain crowd-sourced access point thresholds from a cloudaccess point database according to one or more embodiments.

FIG. 17 illustrates an example schematic system block diagram for userequipment to obtain crowd-sourced access point thresholds from a cloudaccess point database.

FIG. 18 illustrates an example schematic system block diagram for userequipment to obtain crowd-sourced access point thresholds from a cloudaccess point database.

FIG. 19 illustrates an example flow diagram for a method for utilizationof crowd-sourced access point data for a 5G network according to one ormore embodiments.

FIG. 20 illustrates an example flow diagram for a system for utilizationof crowd-sourced access point data for a 5G network according to one ormore embodiments.

FIG. 21 illustrates an example flow diagram for a machine-readablemedium for utilization of crowd-sourced access point data for a 5Gnetwork according to one or more embodiments.

FIG. 22 illustrates an example block diagram of an example mobilehandset operable to engage in a system architecture that facilitatessecure wireless communication according to one or more embodimentsdescribed herein.

FIG. 23 illustrates an example block diagram of an example computeroperable to engage in a system architecture that facilitates securewireless communication according to one or more embodiments describedherein.

DETAILED DESCRIPTION

In the following description, numerous specific details are set forth toprovide a thorough understanding of various embodiments. One skilled inthe relevant art will recognize, however, that the techniques describedherein can be practiced without one or more of the specific details, orwith other methods, components, materials, etc. In other instances,well-known structures, materials, or operations are not shown ordescribed in detail to avoid obscuring certain aspects.

Reference throughout this specification to “one embodiment,” or “anembodiment,” means that a particular feature, structure, orcharacteristic described in connection with the embodiment is includedin at least one embodiment. Thus, the appearances of the phrase “in oneembodiment,” “in one aspect,” or “in an embodiment,” in various placesthroughout this specification are not necessarily all referring to thesame embodiment. Furthermore, the particular features, structures, orcharacteristics may be combined in any suitable manner in one or moreembodiments.

As utilized herein, terms “component,” “system,” “interface,” and thelike are intended to refer to a computer-related entity, hardware,software (e.g., in execution), and/or firmware. For example, a componentcan be a processor, a process running on a processor, an object, anexecutable, a program, a storage device, and/or a computer. By way ofillustration, an application running on a server and the server can be acomponent. One or more components can reside within a process, and acomponent can be localized on one computer and/or distributed betweentwo or more computers.

Further, these components can execute from various machine-readablemedia having various data structures stored thereon. The components cancommunicate via local and/or remote processes such as in accordance witha signal having one or more data packets (e.g., data from one componentinteracting with another component in a local system, distributedsystem, and/or across a network, e.g., the Internet, a local areanetwork, a wide area network, etc. with other systems via the signal).

As another example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry; the electric or electronic circuitry can beoperated by a software application or a firmware application executed byone or more processors; the one or more processors can be internal orexternal to the apparatus and can execute at least a part of thesoftware or firmware application. As yet another example, a componentcan be an apparatus that provides specific functionality throughelectronic components without mechanical parts; the electroniccomponents can include one or more processors therein to executesoftware and/or firmware that confer(s), at least in part, thefunctionality of the electronic components. In an aspect, a componentcan emulate an electronic component via a virtual machine, e.g., withina cloud computing system.

The words “exemplary” and/or “demonstrative” are used herein to meanserving as an example, instance, or illustration. For the avoidance ofdoubt, the subject matter disclosed herein is not limited by suchexamples. In addition, any aspect or design described herein as“exemplary” and/or “demonstrative” is not necessarily to be construed aspreferred or advantageous over other aspects or designs, nor is it meantto preclude equivalent exemplary structures and techniques known tothose of ordinary skill in the art. Furthermore, to the extent that theterms “includes,” “has,” “contains,” and other similar words are used ineither the detailed description or the claims, such terms are intendedto be inclusive—in a manner similar to the term “comprising” as an opentransition word—without precluding any additional or other elements.

As used herein, the term “infer” or “inference” refers generally to theprocess of reasoning about, or inferring states of, the system,environment, user, and/or intent from a set of observations as capturedvia events and/or data. Captured data and events can include user data,device data, environment data, data from sensors, sensor data,application data, implicit data, explicit data, etc. Inference can beemployed to identify a specific context or action, or can generate aprobability distribution over states of interest based on aconsideration of data and events, for example.

Inference can also refer to techniques employed for composinghigher-level events from a set of events and/or data. Such inferenceresults in the construction of new events or actions from a set ofobserved events and/or stored event data, whether the events arecorrelated in close temporal proximity, and whether the events and datacome from one or several event and data sources. Various classificationschemes and/or systems (e.g., support vector machines, neural networks,expert systems, Bayesian belief networks, fuzzy logic, and data fusionengines) can be employed in connection with performing automatic and/orinferred action in connection with the disclosed subject matter.

In addition, the disclosed subject matter can be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques to produce software, firmware, hardware,or any combination thereof to control a computer to implement thedisclosed subject matter. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device, machine-readable device, computer-readablecarrier, computer-readable media, or machine-readable media. Forexample, computer-readable media can include, but are not limited to, amagnetic storage device, e.g., hard disk; floppy disk; magneticstrip(s); an optical disk (e.g., compact disk (CD), a digital video disc(DVD), a Blu-ray Disc™ (BD)); a smart card; a flash memory device (e.g.,card, stick, key drive); and/or a virtual device that emulates a storagedevice and/or any of the above computer-readable media.

As an overview, various embodiments are described herein to facilitateutilization of crowd-sourced access point data for a 5G or other nextgeneration network. For simplicity of explanation, the methods (oralgorithms) are depicted and described as a series of acts. It is to beunderstood and appreciated that the various embodiments are not limitedby the acts illustrated and/or by the order of acts. For example, actscan occur in various orders and/or concurrently, and with other acts notpresented or described herein. Furthermore, not all illustrated acts maybe required to implement the methods. In addition, the methods couldalternatively be represented as a series of interrelated states via astate diagram or events. Additionally, the methods described hereafterare capable of being stored on an article of manufacture (e.g., amachine-readable storage medium) to facilitate transporting andtransferring such methodologies to computers. The term article ofmanufacture, as used herein, is intended to encompass a computer programaccessible from any computer-readable device, carrier, or media,including a non-transitory machine-readable storage medium.

It should be noted that although various aspects and embodiments havebeen described herein in the context of 5G, Universal MobileTelecommunications System (UMTS), and/or Long Term Evolution (LTE), orother next generation networks, the disclosed aspects are not limited to5G, a UMTS implementation, and/or an LTE implementation as thetechniques can also be applied in 3G, 4G or LTE systems. For example,aspects or features of the disclosed embodiments can be exploited insubstantially any wireless communication technology. Such wirelesscommunication technologies can include UMTS, Code Division MultipleAccess (CDMA), Wi-Fi, Worldwide Interoperability for Microwave Access(WiMAX), General Packet Radio Service (GPRS), Enhanced GPRS, ThirdGeneration Partnership Project (3GPP), LTE, Third Generation PartnershipProject 2 (3GPP2) Ultra Mobile Broadband (UMB), High Speed Packet Access(HSPA), Evolved High Speed Packet Access (HSPA+), High-Speed DownlinkPacket Access (HSDPA), High-Speed Uplink Packet Access (HSUPA), Zigbee,or another IEEE 802.XX technology. Additionally, substantially allaspects disclosed herein can be exploited in legacy telecommunicationtechnologies.

Described herein are systems, methods, articles of manufacture, andother embodiments or implementations that can facilitate utilization ofcrowd-sourced access point data for a 5G network. Facilitatingutilization of crowd-sourced access point data for a 5G network can beimplemented in connection with any type of device with a connection tothe communications network (e.g., a mobile handset, a computer, ahandheld device, etc.) any Internet of things (JOT) device (e.g.,toaster, coffee maker, blinds, music players, speakers, etc.), and/orany connected vehicles (cars, airplanes, space rockets, and/or other atleast partially automated vehicles (e.g., drones)). In some embodimentsthe non-limiting term user equipment (UE) is used. It can refer to anytype of wireless device that communicates with a radio network node in acellular or mobile communication system. Examples of UE are targetdevice, device to device (D2D) UE, machine type UE or UE capable ofmachine to machine (M2M) communication, PDA, Tablet, mobile terminals,smart phone, laptop embedded equipped (LEE), laptop mounted equipment(LME), USB dongles etc. Note that the terms element, elements andantenna ports can be interchangeably used but carry the same meaning inthis disclosure. The embodiments are applicable to single carrier aswell as to multicarrier (MC) or carrier aggregation (CA) operation ofthe UE. The term carrier aggregation (CA) is also called (e.g.interchangeably called) “multi-carrier system”, “multi-cell operation”,“multi-carrier operation”, “multi-carrier” transmission and/orreception.

In some embodiments the non-limiting term radio network node or simplynetwork node is used. It can refer to any type of network node thatserves UE is connected to other network nodes or network elements or anyradio node from where UE receives a signal. Examples of radio networknodes are Node B, base station (BS), multi-standard radio (MSR) nodesuch as MSR BS, eNode B, network controller, radio network controller(RNC), base station controller (BSC), relay, donor node controllingrelay, base transceiver station (BTS), access point (AP), transmissionpoints, transmission nodes, RRU, RRH, nodes in distributed antennasystem (DAS) etc.

Cloud radio access networks (RAN) can enable the implementation ofconcepts such as software-defined network (SDN) and network functionvirtualization (NFV) in 5G networks. This disclosure can facilitate ageneric channel state information framework design for a 5G network.Certain embodiments of this disclosure can comprise an SDN controllerthat can control routing of traffic within the network and between thenetwork and traffic destinations. The SDN controller can be merged withthe 5G network architecture to enable service deliveries via openapplication programming interfaces (“APIs”) and move the network coretowards an all internet protocol (“IP”), cloud based, and softwaredriven telecommunications network. The SDN controller can work with, ortake the place of policy and charging rules function (“PCRF”) networkelements so that policies such as quality of service and trafficmanagement and routing can be synchronized and managed end to end.

To meet the huge demand for data centric applications, 4G standards canbe applied 5G, also called new radio (NR) access. 5G networks cancomprise the following: data rates of several tens of megabits persecond supported for tens of thousands of users; 1 gigabit per secondcan be offered simultaneously to tens of workers on the same officefloor; several hundreds of thousands of simultaneous connections can besupported for massive sensor deployments; spectral efficiency can beenhanced compared to 4G; improved coverage; enhanced signalingefficiency; and reduced latency compared to LTE. In multicarrier systemsuch as OFDM, each subcarrier can occupy bandwidth (e.g., subcarrierspacing). If the carriers use the same bandwidth spacing, then it can beconsidered a single numerology. However, if the carriers occupydifferent bandwidth and/or spacing, then it can be considered a multiplenumerology.

Collection of crowd-sourced access point quality and selection data forintelligent network selection can assist cloud-based applications inbuilding a database of access point quality data and thresholds suitablefor real-time and other jitter-sensitive services. User equipment (UE)jitter measurements and selection thresholds can be collected at a cloudplatform, which creates access point performance and selection thresholdprofiles.

Network operators can make use of less expensive wireless data transportmechanisms (e.g., broadcast, Wi-Fi, etc.) to serve more traffic withless cellular network capacity and cost impact—typically called “dataoffload”. Although VoLTE (voice over LTE) to VoWiFI (voice over Wi-Fi)data offload examples will be used throughout this disclosure, it shouldbe understood that other service and technology combinations arepossible. During data offload processes, the subscriber should not beable to tell the difference between a voice call delivered over VoLTE orVoWiFi. This challenge is relatively easy to meet for best-effort dataservices, for which non-real-time applications and extensive bufferingcan work around jitter and other artifacts of a sub-optimal Wi-Finetwork path. For this reason, traditional Wi-Fi selection mechanismsmake technology selection decisions using received signal strengthindicator (RSSI) measurements and thresholds. According to theseexisting mechanisms, most smartphones already select different radiopaths for best-effort data services (e.g., applications and browsing)versus VoLTE.

However, these mechanisms are not suitable for voice or otherjitter-sensitive services over Wi-Fi because: 1) voice is a real-timeservice for which packet flow consistency is critical—if voice packetsare not received in order and according to a constant and evenly-spacedflow (jitter occurs), and voice packet playback can result in distortedand otherwise unintelligible voice call experiences; and 2) end-to-endWi-Fi transmission quality is affected by more than RSSI. For instance,Wi-Fi jitter can degrade when RSSI is low. Wi-Fi jitter can also degradewhen there is interference from other Wi-Fi access points, other userssharing overloaded Wi-Fi radio, and/or transport (DSL line, for example)resources. Wi-Fi radio and transport are therefore relativelyunpredictable in terms of jitter performance because they are providedby subscribers or third parties and are not managed by networkoperators. Wi-Fi jitter can be tested before an access point (AP) ischosen to serve a real-time service like VoWiFi. If the jitter testfails, the Wi-Fi access point is not used for VoWiFi, even if the Wi-FiAP is useful for best effort data services. This process can preventvoice over bad Wi-Fi, but it is likely to be repeated many times if thesame Wi-Fi access point is consistently bad. The repeated jittermeasurement can drain network resources and UE battery life. As UEsdetect and test access points for jitter, the UEs can optimizethresholds and build an internal database of access point jitter andthreshold settings per service.

This process can reduce the number of times a UE takes new jittermeasurements of frequently-detected access points, by using cachedmeasurements and thresholds to determine when to select an access pointfor a service. However, this process limits the associated access pointquality information collection and distribution to each individual UE.Therefore, consolidating UE-collected access point quality and thresholdinformation can generate network efficiencies.

Although the below disclosure shall refer to VoLTE (voice over LTE),VoWiFi (voice over Wi-Fi) and smartphone (UE) device examples, it shouldbe understood that the concepts and principles can be applied to manyother operator, service, technology and device combinations as well.Also note that these examples address automatic Wi-Fi frequencyselection (to reduce interference and the need for high technologyselection thresholds) but can also be used to adjust a variety of otherWi-Fi and other network technology (for example LTE-U) parameters aswell.

UEs that arrive on a new access point can make use of the qualitymeasurements and optimized thresholds provided by the previous UEs tovisit and take measurements on the same access point. The stepsassociated with this process comprise: 1) obtaining current APthresholds from cloud-based access point databases; and 2) refreshingexpired data on cloud-based access point databases.

Obtaining current AP thresholds from cloud-based access point databasescan transpire when a UE detects a new AP for the first time. The AP andassociated thresholds are not on the internal AP list in the UE.Therefore, the UE must find the appropriate thresholds to suit variousapplication usage on that AP. This information can be obtained by localmeans including jitter measurements, automatic threshold optimization,and AP table updates. In order to reduce the battery usage, processing,and time cost of such measurements, the UE can first attempt to make useof measurements and thresholds from other UEs that have visited the sameAP. These measurements and thresholds can be archived in the cloud-basedaccess point database. Upon detection of a new AP with no (or expired)thresholds in the internal AP list, the UE can send an AP informationrequest (along with the SSID and MAC info) to the cloud-based accesspoint database. The access point database can be reached using apre-defined IP address or URL. The access point database server can lookfor the SSID+MAC combination and associated thresholds. If a match withcurrent thresholds is found, the access point database server caninclude AP, service, and specific in and out thresholds in its responseto the UE. The UE shall update its internal AP list with the newthresholds, set the “expired” flag to “Y” or “N” (yes or no) and takeappropriate action to select how to communicate. The AP list entry andassociated thresholds can be used for subsequent encounters with the APuntil expiry. Thus, the UE can have an updated set of AP thresholdswithout having to complete a full set of jitter measurements andthreshold re-optimization.

Next, the expired AP information can be refreshed on the local UE andthe cloud-based AP database. Upon reception of the AP informationrequest, the access point database server can find that the last set ofhistorical measurements and thresholds are missing or have expired. Inthis case, the old data can be refreshed to new data versus using oldthresholds that may not reflect the current quality situation for theAP. In this case the access point database server can respond to the UEwith a “threshold update” request. Then the UE can collect a new set ofjitter measurements and re-optimize thresholds. Next, the UE can forwardthe revised measurements and thresholds to the cloud-based AP databaseserver. Finally, the UE can update its internal AP list with the newthresholds, set the “expired” flag to “Y” or “N” (yes or no) and selectthe appropriate communication (e.g., Wi-Fi AP and/or base stationdevice).

First, the aforementioned system can recognize a received signalstrength indicator (RSSI)/jitter mismatch for a specific Wi-Fi serviceset identifier (SSID). If the current RSSI requirements are met, yet thejitter is high, then there is an RSSI threshold/jitter mismatch (e.g.,jitter fail). Second, the system can then adjust the RSSI threshold forthe Wi-Fi SSID by raising the RSSI threshold by a margin, and thenupdate the AP list with the new threshold values. Third, the system canthen recheck the new RSSI threshold for jitter when a new RSSI thresholdrequirement is met for the specific Wi-Fi SSID. If the jitter at the newRSSI threshold is good, then the Wi-Fi SSID can be selected forcommunication. However if the new RSSI threshold is bad, then the systemcan return to the first step to identify and re-adjust the threshold.

In one embodiment, described herein is a method comprising receiving, bya first mobile device comprising a processor, a first signal from anaccess point device of a wireless network. Based on the first signal,the method can comprise determining, by the first mobile device, thatthe access point device has not previously sent a second signal to thefirst mobile device, the second signal being different than the firstsignal. In response to the determining, the method can send, by thefirst mobile device to a network device of the wireless network, requestdata associated with a threshold of a first signal strength quality ofthe first signal. Additionally, in response to a condition associatedwith a third signal communicated between a second mobile device and theaccess point device being determined to have been satisfied, the methodcan comprise receiving, by the first mobile device, threshold dataassociated with a second signal strength quality of the third signal.

According to another embodiment, a system can facilitate, in response toa first mobile device receiving a first signal from a wireless networkdevice of a wireless network, determining that the wireless networkdevice has not previously communicated with the first mobile device. Thesystem can also facilitate, in response to the determining, receiving,from the first mobile device, request data associated with a thresholdof signal strength quality related to the first signal. Furthermore, inresponse to a condition associated with a second signal between a secondmobile device and the wireless network device being determined to havebeen satisfied, the system can send, to the first mobile device,threshold data associated with the threshold of the signal strengthquality of the first signal.

According to yet another embodiment, described herein is amachine-readable storage medium that can perform the operationscomprising in response to a determination that a first signalcommunicated between a first mobile device and an access point device isrepresentative of a type of communication between the first mobiledevice and the access point device, receiving request data associatedwith a request for threshold data associated with the access pointdevice. In response to the receiving the request data, themachine-readable storage medium can send the threshold data to the firstmobile device, wherein the threshold data is associated with a signalquality of a second signal between a second mobile device and the accesspoint device. Thus, the machine-readable storage medium can update adata structure associated with the first mobile device with the signalquality for the second signal.

These and other embodiments or implementations are described in moredetail below with reference to the drawings.

Referring now to FIG. 1, illustrated is an example wirelesscommunication system in accordance with various aspects and embodimentsof the subject disclosure. In one or more embodiments, system 100 cancomprise one or more user equipment UEs 102. The non-limiting term userequipment can refer to any type of device that can communicate with anetwork node in a cellular or mobile communication system. A UE can haveone or more antenna panels having vertical and horizontal elements.Examples of a UE comprise a target device, device to device (D2D) UE,machine type UE or UE capable of machine to machine (M2M)communications, personal digital assistant (PDA), tablet, mobileterminals, smart phone, laptop mounted equipment (LME), universal serialbus (USB) dongles enabled for mobile communications, a computer havingmobile capabilities, a mobile device such as cellular phone, a laptophaving laptop embedded equipment (LEE, such as a mobile broadbandadapter), a tablet computer having a mobile broadband adapter, awearable device, a virtual reality (VR) device, a heads-up display (HUD)device, a smart car, a machine-type communication (MTC) device, and thelike. User equipment UE 102 can also comprise IOT devices thatcommunicate wirelessly.

In various embodiments, system 100 is or comprises a wirelesscommunication network serviced by one or more wireless communicationnetwork providers. In example embodiments, a UE 102 can becommunicatively coupled to the wireless communication network via anetwork node 106. The network node (e.g., network node device) cancommunicate with user equipment (UE), thus providing connectivitybetween the UE and the wider cellular network. The UE 102 can sendtransmission type recommendation data to the network node 106. Thetransmission type recommendation data can comprise a recommendation totransmit data via a closed loop MIMO mode and/or a rank-1 precoder mode.

A network node can have a cabinet and other protected enclosures, anantenna mast, and multiple antennas for performing various transmissionoperations (e.g., MIMO operations). Network nodes can serve severalcells, also called sectors, depending on the configuration and type ofantenna. In example embodiments, the UE 102 can send and/or receivecommunication data via a wireless link to the network node 106. Thedashed arrow lines from the network node 106 to the UE 102 representdownlink (DL) communications and the solid arrow lines from the UE 102to the network nodes 106 represents an uplink (UL) communication.

System 100 can further include one or more communication serviceprovider networks that facilitate providing wireless communicationservices to various UEs, including UE 102, via the network node 106and/or various additional network devices (not shown) included in theone or more communication service provider networks. The one or morecommunication service provider networks can include various types ofdisparate networks, including but not limited to: cellular networks,femto networks, picocell networks, microcell networks, internet protocol(IP) networks Wi-Fi service networks, broadband service network,enterprise networks, cloud based networks, and the like. For example, inat least one implementation, system 100 can be or include a large scalewireless communication network that spans various geographic areas.According to this implementation, the one or more communication serviceprovider networks can be or include the wireless communication networkand/or various additional devices and components of the wirelesscommunication network (e.g., additional network devices and cell,additional UEs, network server devices, etc.). The network node 106 canbe connected to the one or more communication service provider networksvia one or more cells 108. For example, the one or more cells 108 cancomprise wired link components, such as a T1/E1 phone line, a digitalsubscriber line (DSL) (e.g., either synchronous or asynchronous), anasymmetric DSL (ADSL), an optical fiber backbone, a coaxial cable, andthe like. The one or more cells 108 can also include wireless linkcomponents, such as but not limited to, line-of-sight (LOS) or non-LOSlinks which can include terrestrial air-interfaces or deep space links(e.g., satellite communication links for navigation).

The system 100 can employ various cellular systems, technologies, andmodulation modes to facilitate wireless radio communications betweendevices (e.g., the UE 102 and the network node 106). While exampleembodiments might be described for 5G new radio (NR) systems, theembodiments can be applicable to any radio access technology (RAT) ormulti-RAT system where the UE operates using multiple carriers e.g. LTEFDD/TDD, GSM/GERAN, CDMA2000 etc.

For example, the system 100 can operate in accordance with global systemfor mobile communications (GSM), universal mobile telecommunicationsservice (UMTS), long term evolution (LTE), LTE frequency divisionduplexing (LTE FDD, LTE time division duplexing (TDD), high speed packetaccess (HSPA), code division multiple access (CDMA), wideband CDMA(WCMDA), CDMA2000, time division multiple access (TDMA), frequencydivision multiple access (FDMA), multi-carrier code division multipleaccess (MC-CDMA), single-carrier code division multiple access(SC-CDMA), single-carrier FDMA (SC-FDMA), orthogonal frequency divisionmultiplexing (OFDM), discrete Fourier transform spread OFDM (DFT-spreadOFDM) single carrier FDMA (SC-FDMA), Filter bank based multi-carrier(FBMC), zero tail DFT-spread-OFDM (ZT DFT-s-OFDM), generalized frequencydivision multiplexing (GFDM), fixed mobile convergence (FMC), universalfixed mobile convergence (UFMC), unique word OFDM (UW-OFDM), unique wordDFT-spread OFDM (UW DFT-Spread-OFDM), cyclic prefix OFDM CP-OFDM,resource-block-filtered OFDM, Wi Fi, WLAN, WiMax, and the like. However,various features and functionalities of the system 100 are particularlydescribed wherein the devices (e.g., the UEs 102 and the network device104) of the system 100 are configured to communicate wireless signalsusing one or more multi carrier modulation schemes, wherein data symbolscan be transmitted simultaneously over multiple frequency subcarriers(e.g., OFDM, CP-OFDM, DFT-spread OFMD, UFMC, FMBC, etc.). Theembodiments are applicable to single carrier as well as to multicarrier(MC) or carrier aggregation (CA) operation of the UE. The term carrieraggregation (CA) is also called (e.g. interchangeably called)“multi-carrier system”, “multi-cell operation”, “multi-carrieroperation”, “multi-carrier” transmission and/or reception. Note thatsome embodiments are also applicable for Multi RAB (radio bearers) onsome carriers (that is data plus speech is simultaneously scheduled).

In various embodiments, the system 100 can be configured to provide andemploy 5G wireless networking features and functionalities. 5G wirelesscommunication networks are expected to fulfill the demand ofexponentially increasing data traffic and to allow people and machinesto enjoy gigabit data rates with virtually zero latency. Compared to 4G,5G supports more diverse traffic scenarios. For example, in addition tothe various types of data communication between conventional UEs (e.g.,phones, smartphones, tablets, PCs, televisions, Internet enabledtelevisions, etc.) supported by 4G networks, 5G networks can be employedto support data communication between smart cars in association withdriverless car environments, as well as machine type communications(MTCs). Considering the drastic different communication needs of thesedifferent traffic scenarios, the ability to dynamically configurewaveform parameters based on traffic scenarios while retaining thebenefits of multi carrier modulation schemes (e.g., OFDM and relatedschemes) can provide a significant contribution to the highspeed/capacity and low latency demands of 5G networks. With waveformsthat split the bandwidth into several sub-bands, different types ofservices can be accommodated in different sub-bands with the mostsuitable waveform and numerology, leading to an improved spectrumutilization for 5G networks.

To meet the demand for data centric applications, features of proposed5G networks may comprise: increased peak bit rate (e.g., 20 Gbps),larger data volume per unit area (e.g., high system spectralefficiency—for example about 3.5 times that of spectral efficiency oflong term evolution (LTE) systems), high capacity that allows moredevice connectivity both concurrently and instantaneously, lowerbattery/power consumption (which reduces energy and consumption costs),better connectivity regardless of the geographic region in which a useris located, a larger numbers of devices, lower infrastructuraldevelopment costs, and higher reliability of the communications. Thus,5G networks may allow for: data rates of several tens of megabits persecond should be supported for tens of thousands of users, 1 gigabit persecond to be offered simultaneously to tens of workers on the sameoffice floor, for example; several hundreds of thousands of simultaneousconnections to be supported for massive sensor deployments; improvedcoverage, enhanced signaling efficiency; reduced latency compared toLTE.

The upcoming 5G access network may utilize higher frequencies (e.g., >6GHz) to aid in increasing capacity. Currently, much of the millimeterwave (mmWave) spectrum, the band of spectrum between 30 gigahertz (Ghz)and 300 Ghz is underutilized. The millimeter waves have shorterwavelengths that range from 10 millimeters to 1 millimeter, and thesemmWave signals experience severe path loss, penetration loss, andfading. However, the shorter wavelength at mmWave frequencies alsoallows more antennas to be packed in the same physical dimension, whichallows for large-scale spatial multiplexing and highly directionalbeamforming.

Performance can be improved if both the transmitter and the receiver areequipped with multiple antennas. Multi-antenna techniques cansignificantly increase the data rates and reliability of a wirelesscommunication system. The use of multiple input multiple output (MIMO)techniques, which was introduced in the third-generation partnershipproject (3GPP) and has been in use (including with LTE), is amulti-antenna technique that can improve the spectral efficiency oftransmissions, thereby significantly boosting the overall data carryingcapacity of wireless systems. The use of multiple-input multiple-output(MIMO) techniques can improve mmWave communications, and has been widelyrecognized a potentially important component for access networksoperating in higher frequencies. MIMO can be used for achievingdiversity gain, spatial multiplexing gain and beamforming gain. Forthese reasons, MIMO systems are an important part of the 3rd and 4thgeneration wireless systems, and are planned for use in 5G systems.

Referring now to FIG. 2, illustrated is an example schematic systemblock diagram of a Wi-Fi access point list with initial defaultthresholds according to one or more embodiments. FIG. 2 depicts anexample screen capture of a UE 102. The screen capture can show a Wi-FiAP list 200 associated with where the UE 102 has encountered a Wi-Fi AP(e.g., home, friend's house, work, etc.). Additionally, the thresholdsfor joining and releasing each Wi-Fi AP can be listed for each of theWi-Fi APs.

Referring now to FIG. 3, illustrated is an example schematic systemblock diagram of an incoming Wi-Fi calling selection scenario withadjusted thresholds according to one or more embodiments. As depicted byFIG. 3, the UE 104, of the wireless network 300, can remain incommunication with a base station device 302, as it travels, due tohigher thresholds that prevent the UE 104 from selecting a bad Wi-Fidevice 306. For example, if the received signal strength indication(RSSI) for the UE 104 is less than −70 dBm, then the connection to theWi-Fi device 306, 304 can fail and the UE 104 will remain incommunication with the base station device 302. Alternatively, the UE102 is depicted as within the threshold of the Wi-Fi device 304 andtherefore leverages the Wi-Fi device 304 for communication rather thanthe base station device 302. Thus, for a Wi-Fi RSSI of greater than −70dBm, the UE 102 can connect to the Wi-Fi device 304 because the jitteris less than 100 ms, but if the UE 102 were to relocate and the Wi-FiRSSI becomes less than −75 dBm, then the UE 102 can switch back tocommunication with the base station device 302 due to the jitterincrease outside of the threshold value of −75 dBm.

Referring now to FIG. 4, illustrated is an example schematic systemblock diagram of an incoming Wi-Fi calling selection scenario withoverload or transport jitter according to one or more embodiments. Asdepicted by FIG. 4, several adjustments can be made for the UE 104 asthe UE 104 moves closer to the Wi-Fi device 304. For instance, in thisembodiment, if the Wi-Fi RSSI is above the threshold value and yet thejitter is above another threshold value, then the jitter threshold valuecan be increased to compensate for the jitter. Therefore, although,under normal circumstances, the Wi-Fi device 304 would be selected bythe UE 104 for communication, an increased jitter value can cause the UE104 to adaptively increase the threshold value to mitigate the jitter.Thus, successive attempts by the UE 104 to communicate via the Wi-Fidevice 304, which has experienced jitter failures, can result in anincreased Wi-Fi calling RSSI threshold. Consequently, Wi-Fi calling willbe disabled by the system 400 and the UE 104 can leverage the basestation device 302 for voice calls. Additionally, all of the thresholddata, jitter data, UE 104 data, and Wi-Fi device 304 data can be storedin a cloud-based server associated with a cloud 404 for later use asindicated below.

Referring now to FIGS. 5 and 6, illustrated is an example schematicsystem block diagram of a Wi-Fi access point list with self-optimizedthresholds according to one or more embodiments, and an exampleschematic system block diagram of expanded user equipment Wi-Fi accesspoint list with self-optimized thresholds according to one or moreembodiments. FIG. 5 depicts an example screen capture of a UE 102. Thescreen capture can show a Wi-Fi AP list 500 associated with where the UE102 has encountered a Wi-Fi AP (e.g., home, friend's house, work, etc.).Additionally, the thresholds for joining and releasing each Wi-Fi AP canbe listed for each of the Wi-Fi APs, thus allowing the UE 102 toself-optimize based on the Wi-Fi AP history and varying qualitythresholds associated with each Wi-Fi AP. For instance, the “Home” Wi-FiAP can list threshold values of −70 dBm (calling in) to −75 dBm (callingout), which can indicate some history of interference and/or jitter. The“Metro” Wi-Fi AP can list threshold values of −30 dBm (calling in) to−35 dBm (calling out), which can indicate (based on the small thresholdgap of −5 dBm) high jitter from likely congestion and/or interference.In some cases, as with the “Neighbor 1” Wi-Fi AP the threshold valuescan be between −75 dBm (calling in) to −80 dBm (calling out), which canbe a default threshold indicative of the “Neighbor 1” Wi-Fi AP neverbeing accessed. In other cases, as with the “Mom's house” Wi-Fi AP thethreshold values can be between −75 dBm (calling in) to −80 dBm (callingout), and can indicate a low interference and/or a light network loadassociated with the “Mom's house” Wi-Fi AP. With reference to FIG. 6,the Wi-Fi AP list 600 can build upon the Wi-Fi AP list 500 by addingmedia access control (MAC) address data, location data, and/or thresholdexpiration data to the Wi-Fi AP list.

Referring now to FIGS. 7 and 8, illustrated is an example schematicsystem block diagram of a user equipment upload of initial access pointthreshold information to an access point database according to one ormore embodiments. Although the Wi-Fi AP list 700 can be storedinternally to the UE 104, it can also be sent to a cloud 404 via acloud-computing device (e.g., server) to be stored for use and access byother UEs or the same UE 104 at a later time. For example, data (e.g.,threshold data, self-optimization data, SSID data, MAC data, locationdata, service specific data, etc.) associated with a newly detected APsuch as the “New Work” Wi-Fi AP device can be sent to the cloud 404 andstored as Wi-Fi AP list 800 there. Additional information such as theage of the data can be sent from the UE 104 and/or generated at thecloud and updated according to a timeline (e.g., days, weeks, months,etc.).

Referring now to FIGS. 9 and 10, illustrates an example schematic systemblock diagram of a user equipment refresh and replace of expired accesspoint threshold information to an access point database according to oneor more embodiments. In other embodiments, after the “New Work” Wi-Fi APthreshold value data becomes stale due to time expiration as shown bythe Wi-Fi AP list 900, the UE 104 can refresh and/or replace the “NewWork” Wi-Fi AP information by collecting a new set of jittermeasurements and recalculating the thresholds. The refresh and/orreplace data comprising the recalculated thresholds can be communicatedto the cloud 404 and updated in the Wi-Fi AP list 1000.

Referring now to FIGS. 11 and 12, illustrated is an example schematicsystem block diagram of a user equipment refresh and replace accesspoint threshold information after a quality failure according to one ormore embodiments. Upon the UE 104 detecting a quality failure (e.g.,high jitter and poor voice quality) during a Wi-Fi call, the UE 104 canmark the Wi-Fi AP thresholds as expired, and take a new set of jittermeasurements to recalculate the thresholds for the Wi-Fi AP. The refreshand/or replace data comprising the recalculated thresholds can becommunicated to the cloud 404 and updated in the Wi-Fi AP list 1000.

Referring now to FIGS. 13 and 14, illustrated is an example schematicsystem block diagram for a user equipment to obtain crowd-sourced APthresholds from a cloud access point database according to one or moreembodiments. When the UE 104 detects a new Wi-Fi AP 304, for which Wi-Ficalling in and out thresholds are not yet know (see Wi-Fi AP list 1300),the UE 104 can send a Wi-Fi AP SSID and MAC address along with a requestfor the Wi-Fi AP thresholds associated with the Wi-Fi AP 304. The Wi-FiAP thresholds can be crowd-sourced from other UEs 102 that have visitedthe Wi-Fi AP 304 previously. The AP cloud-based platform can then returnthe Wi-Fi in and out thresholds (see Wi-Fi AP list 1400) for the Wi-FiAP 304 to the UE 104. After the AP cloud-based platform has returned theWi-Fi in and out thresholds, the UE 104 can update its internal Wi-Fi APlist 1300 with the correct data (e.g., expired status, Wi-Fi callingthresholds, etc.).

Referring now to FIGS. 15 and 16, illustrated is an example schematicsystem block diagram for user equipment to obtain crowd-sourced accesspoint thresholds from a cloud access point database according to one ormore embodiments. In yet another embodiment, when the threshold data hasexpired at the cloud-based platform, and the UE 104 can detect a newWi-Fi AP 304, for which Wi-Fi calling in and out thresholds are not yetknown (see Wi-Fi AP list 1500). The UE 104 can send a Wi-Fi AP SSID andMAC address along with a request for the Wi-Fi AP thresholds associatedwith Wi-Fi AP 304 to the cloud-based platform. However, if the Wi-Fi APthresholds are not contained in the Wi-Fi AP list 1600, then the APcloud-based platform can then return a request for a threshold update tobe performed by the UE 104.

Referring now to FIGS. 17 and 18, illustrated is an example schematicsystem block diagram for user equipment to obtain crowd-sourced accesspoint thresholds from a cloud access point database according to one ormore embodiments. In yet another embodiment, when the threshold data hasexpired at the cloud-based platform, and the UE 104 detects a new Wi-FiAP 304, for which Wi-Fi calling in and out thresholds are not yet known(see Wi-Fi AP list 1700), the UE 104 can send a Wi-Fi AP SSID and MACaddress along with a request for the Wi-Fi AP thresholds associated withWi-Fi AP 304 to the cloud-based platform. However, if the Wi-Fi APthresholds are not contained in the Wi-Fi AP list 1800, then the APcloud-based platform can then return a request for a threshold update tobe performed by the UE 104. After the AP cloud-based platform hasreturned the request, the UE 104 can perform jitter and thresholdmeasurements and update its internal Wi-Fi AP list 1700 and send itsupdated internal Wi-Fi AP list 1700 to be stored at the externalcloud-based Wi-Fi AP list 1800. This process can refresh expired data atboth the UE 104 and the server device for the cloud 404.

Referring now to FIG. 19, illustrated is an example flow diagram for amethod for utilization of crowd-sourced access point data for a 5Gnetwork according to one or more embodiments. At element 1900, themethod can receive, by a first mobile device (e.g., UE 104) comprising aprocessor, a first signal from an access point device of a wirelessnetwork 300. Based on the first signal, the method can comprisedetermining, by the first mobile device (e.g., UE 104), that the accesspoint device (e.g., Wi-Fi AP 304) has not previously sent a secondsignal to the first mobile device (e.g., UE 104), the second signalbeing different than the first signal at element 1902. In response tothe determining, the method can send, by the first mobile device (e.g.,UE 104) to a network device (e.g., cloud 404 server device) of thewireless network 300, request data associated with a threshold of afirst signal strength quality of the first signal at element 1904.Additionally, in response to a condition associated with a third signalcommunicated between a second mobile device (e.g., UE 102) and theaccess point device (e.g., Wi-Fi AP 304) being determined to have beensatisfied at element 1906, the method can comprise receiving, by thefirst mobile device (e.g., UE 104), threshold data associated with asecond signal strength quality of the third signal.

Referring now to FIG. 20, illustrated is an example flow diagram for asystem for utilization of crowd-sourced access point data for a 5Gnetwork according to one or more embodiments. At element 2000, inresponse to a first mobile device (e.g., UE 104) receiving a firstsignal from a wireless network device (e.g., Wi-Fi AP 304) of a wirelessnetwork 300, the system can determine that the wireless network device(e.g., Wi-Fi AP 304) has not previously communicated with the firstmobile device (e.g., UE 104). At element 2002, the system canfacilitate, in response to the determining, receiving, from the firstmobile device (e.g., UE 104), request data associated with a thresholdof signal strength quality related to the first signal. Furthermore, inresponse to a condition associated with a second signal between a secondmobile device (e.g., UE 102) and the wireless network device (e.g.,Wi-Fi AP 304) being determined to have been satisfied at element 2004,the system can send, to the first mobile device (e.g., UE 104),threshold data associated with the threshold of the signal strengthquality of the first signal.

Referring now to FIG. 21, illustrated is an example flow diagram for amachine-readable medium for utilization of crowd-sourced access pointdata for a 5G network according to one or more embodiments. At element2100, the machine-readable storage medium, in response to adetermination that a first signal communicated between a first mobiledevice (e.g., UE 104) and an access point device is representative of atype of communication between the first mobile device (e.g., UE 104) andthe access point device, request data associated with a request forthreshold data associated with the access point device. In response tothe receiving the request data, the machine-readable storage medium cansend the threshold data to the first mobile device (e.g., UE 104) atelement 2102, wherein the threshold data is associated with a signalquality of a second signal between a second mobile device (e.g., UE 102)and the access point device. Additionally, the machine-readable storagemedium can update a data structure associated with the first mobiledevice (e.g., UE 104) with the signal quality for the second signal atelement 2104.

Referring now to FIG. 22, illustrated is a schematic block diagram of anexemplary end-user device such as a mobile device 2200 capable ofconnecting to a network in accordance with some embodiments describedherein. Although a mobile handset 2200 is illustrated herein, it will beunderstood that other devices can be a mobile device, and that themobile handset 2200 is merely illustrated to provide context for theembodiments of the various embodiments described herein. The followingdiscussion is intended to provide a brief, general description of anexample of a suitable environment 2200 in which the various embodimentscan be implemented. While the description includes a general context ofcomputer-executable instructions embodied on a machine-readable storagemedium, those skilled in the art will recognize that the innovation alsocan be implemented in combination with other program modules and/or as acombination of hardware and software.

Generally, applications (e.g., program modules) can include routines,programs, components, data structures, etc., that perform particulartasks or implement particular abstract data types. Moreover, thoseskilled in the art will appreciate that the methods described herein canbe practiced with other system configurations, includingsingle-processor or multiprocessor systems, minicomputers, mainframecomputers, as well as personal computers, hand-held computing devices,microprocessor-based or programmable consumer electronics, and the like,each of which can be operatively coupled to one or more associateddevices.

A computing device can typically include a variety of machine-readablemedia. Machine-readable media can be any available media that can beaccessed by the computer and includes both volatile and non-volatilemedia, removable and non-removable media. By way of example and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media can include volatileand/or non-volatile media, removable and/or non-removable mediaimplemented in any method or technology for storage of information, suchas computer-readable instructions, data structures, program modules orother data. Computer storage media can include, but is not limited to,RAM, ROM, EEPROM, flash memory or other memory technology, CD ROM,digital video disk (DVD) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store thedesired information and which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

The handset 2200 includes a processor 2202 for controlling andprocessing all onboard operations and functions. A memory 2204interfaces to the processor 2202 for storage of data and one or moreapplications 2206 (e.g., a video player software, user feedbackcomponent software, etc.). Other applications can include voicerecognition of predetermined voice commands that facilitate initiationof the user feedback signals. The applications 2206 can be stored in thememory 2204 and/or in a firmware 2208, and executed by the processor2202 from either or both the memory 2204 or/and the firmware 2208. Thefirmware 2208 can also store startup code for execution in initializingthe handset 2200. A communications component 2210 interfaces to theprocessor 2202 to facilitate wired/wireless communication with externalsystems, e.g., cellular networks, VoIP networks, and so on. Here, thecommunications component 2210 can also include a suitable cellulartransceiver 2211 (e.g., a GSM transceiver) and/or an unlicensedtransceiver 2213 (e.g., Wi-Fi, WiMax) for corresponding signalcommunications. The handset 2200 can be a device such as a cellulartelephone, a PDA with mobile communications capabilities, andmessaging-centric devices. The communications component 2210 alsofacilitates communications reception from terrestrial radio networks(e.g., broadcast), digital satellite radio networks, and Internet-basedradio services networks.

The handset 2200 includes a display 2212 for displaying text, images,video, telephony functions (e.g., a Caller ID function), setupfunctions, and for user input. For example, the display 2212 can also bereferred to as a “screen” that can accommodate the presentation ofmultimedia content (e.g., music metadata, messages, wallpaper, graphics,etc.). The display 2212 can also display videos and can facilitate thegeneration, editing and sharing of video quotes. A serial I/O interface2214 is provided in communication with the processor 2202 to facilitatewired and/or wireless serial communications (e.g., USB, and/or IEEE1394) through a hardwire connection, and other serial input devices(e.g., a keyboard, keypad, and mouse). This supports updating andtroubleshooting the handset 2200, for example. Audio capabilities areprovided with an audio I/O component 2216, which can include a speakerfor the output of audio signals related to, for example, indication thatthe user pressed the proper key or key combination to initiate the userfeedback signal. The audio I/O component 2216 also facilitates the inputof audio signals through a microphone to record data and/or telephonyvoice data, and for inputting voice signals for telephone conversations.

The handset 2200 can include a slot interface 2218 for accommodating aSIC (Subscriber Identity Component) in the form factor of a cardSubscriber Identity Module (SIM) or universal SIM 2220, and interfacingthe SIM card 2220 with the processor 2202. However, it is to beappreciated that the SIM card 2220 can be manufactured into the handset2200, and updated by downloading data and software.

The handset 2200 can process IP data traffic through the communicationcomponent 2210 to accommodate IP traffic from an IP network such as, forexample, the Internet, a corporate intranet, a home network, a personarea network, etc., through an ISP or broadband cable provider. Thus,VoIP traffic can be utilized by the handset 2200 and IP-based multimediacontent can be received in either an encoded or decoded format.

A video processing component 2222 (e.g., a camera) can be provided fordecoding encoded multimedia content. The video processing component 2222can aid in facilitating the generation, editing and sharing of videoquotes. The handset 2200 also includes a power source 2224 in the formof batteries and/or an AC power subsystem, which power source 2224 caninterface to an external power system or charging equipment (not shown)by a power I/O component 2226.

The handset 2200 can also include a video component 2230 for processingvideo content received and, for recording and transmitting videocontent. For example, the video component 2230 can facilitate thegeneration, editing and sharing of video quotes. A location trackingcomponent 2232 facilitates geographically locating the handset 2200. Asdescribed hereinabove, this can occur when the user initiates thefeedback signal automatically or manually. A user input component 2234facilitates the user initiating the quality feedback signal. The userinput component 2234 can also facilitate the generation, editing andsharing of video quotes. The user input component 2234 can include suchconventional input device technologies such as a keypad, keyboard,mouse, stylus pen, and/or touch screen, for example.

Referring again to the applications 2206, a hysteresis component 2236facilitates the analysis and processing of hysteresis data, which isutilized to determine when to associate with the access point. Asoftware trigger component 2238 can be provided that facilitatestriggering of the hysteresis component 2238 when the Wi-Fi transceiver2213 detects the beacon of the access point. A SIP client 2240 enablesthe handset 2200 to support SIP protocols and register the subscriberwith the SIP registrar server. The applications 2206 can also include aclient 2242 that provides at least the capability of discovery, play andstore of multimedia content, for example, music.

The handset 2200, as indicated above related to the communicationscomponent 810, includes an indoor network radio transceiver 2213 (e.g.,Wi-Fi transceiver). This function supports the indoor radio link, suchas IEEE 802.11, for the dual-mode GSM handset 2200. The handset 1100 canaccommodate at least satellite radio services through a handset that cancombine wireless voice and digital radio chipsets into a single handhelddevice.

Referring now to FIG. 23, there is illustrated a block diagram of acomputer 2300 operable to execute a system architecture that facilitatesestablishing a transaction between an entity and a third party. Thecomputer 2300 can provide networking and communication capabilitiesbetween a wired or wireless communication network and a server (e.g.,Microsoft server) and/or communication device. In order to provideadditional context for various aspects thereof, FIG. 23 and thefollowing discussion are intended to provide a brief, generaldescription of a suitable computing environment in which the variousaspects of the innovation can be implemented to facilitate theestablishment of a transaction between an entity and a third party.While the description above is in the general context ofcomputer-executable instructions that can run on one or more computers,those skilled in the art will recognize that the innovation also can beimplemented in combination with other program modules and/or as acombination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the innovation can also be practiced indistributed computing environments where certain tasks are performed byremote processing devices that are linked through a communicationsnetwork. In a distributed computing environment, program modules can belocated in both local and remote memory storage devices.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disk (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or other tangible and/or non-transitorymedia which can be used to store desired information. Computer-readablestorage media can be accessed by one or more local or remote computingdevices, e.g., via access requests, queries or other data retrievalprotocols, for a variety of operations with respect to the informationstored by the medium.

Communications media can embody computer-readable instructions, datastructures, program modules or other structured or unstructured data ina data signal such as a modulated data signal, e.g., a carrier wave orother transport mechanism, and includes any information delivery ortransport media. The term “modulated data signal” or signals refers to asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in one or more signals. By way ofexample, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

With reference to FIG. 23, implementing various aspects described hereinwith regards to the end-user device can include a computer 2300, thecomputer 2300 including a processing unit 2304, a system memory 2306 anda system bus 2308. The system bus 2308 couples system componentsincluding, but not limited to, the system memory 2306 to the processingunit 2304. The processing unit 2304 can be any of various commerciallyavailable processors. Dual microprocessors and other multi processorarchitectures can also be employed as the processing unit 2304.

The system bus 2308 can be any of several types of bus structure thatcan further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 2306includes read-only memory (ROM) 2327 and random access memory (RAM)2312. A basic input/output system (BIOS) is stored in a non-volatilememory 2327 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 2300, such as during start-up. The RAM 2312 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 2300 further includes an internal hard disk drive (HDD)2314 (e.g., EIDE, SATA), which internal hard disk drive 2314 can also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 2316, (e.g., to read from or write to aremovable diskette 2318) and an optical disk drive 2320, (e.g., readinga CD-ROM disk 2322 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 2314, magnetic diskdrive 2316 and optical disk drive 2320 can be connected to the systembus 2308 by a hard disk drive interface 2324, a magnetic disk driveinterface 2326 and an optical drive interface 2328, respectively. Theinterface 2324 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and IEEE 2394 interfacetechnologies. Other external drive connection technologies are withincontemplation of the subject innovation.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 2300 the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer 2300, such aszip drives, magnetic cassettes, flash memory cards, cartridges, and thelike, can also be used in the exemplary operating environment, andfurther, that any such media can contain computer-executableinstructions for performing the methods of the disclosed innovation.

A number of program modules can be stored in the drives and RAM 2312,including an operating system 2330, one or more application programs2332, other program modules 2334 and program data 2336. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 2312. It is to be appreciated that the innovation canbe implemented with various commercially available operating systems orcombinations of operating systems.

A user can enter commands and information into the computer 2300 throughone or more wired/wireless input devices, e.g., a keyboard 2338 and apointing device, such as a mouse 2340. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 2304 through an input deviceinterface 2342 that is coupled to the system bus 2308, but can beconnected by other interfaces, such as a parallel port, an IEEE 2394serial port, a game port, a USB port, an IR interface, etc.

A monitor 2344 or other type of display device is also connected to thesystem bus 2308 through an interface, such as a video adapter 2346. Inaddition to the monitor 2344, a computer 2300 typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 2300 can operate in a networked environment using logicalconnections by wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 2348. The remotecomputer(s) 2348 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentdevice, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer,although, for purposes of brevity, only a memory/storage device 2350 isillustrated. The logical connections depicted include wired/wirelessconnectivity to a local area network (LAN) 2352 and/or larger networks,e.g., a wide area network (WAN) 2354. Such LAN and WAN networkingenvironments are commonplace in offices and companies, and facilitateenterprise-wide computer networks, such as intranets, all of which mayconnect to a global communications network, e.g., the Internet.

When used in a LAN networking environment, the computer 2300 isconnected to the local network 2352 through a wired and/or wirelesscommunication network interface or adapter 2356. The adapter 2356 mayfacilitate wired or wireless communication to the LAN 2352, which mayalso include a wireless access point disposed thereon for communicatingwith the wireless adapter 2356.

When used in a WAN networking environment, the computer 2300 can includea modem 2358, or is connected to a communications server on the WAN2354, or has other means for establishing communications over the WAN2354, such as by way of the Internet. The modem 2358, which can beinternal or external and a wired or wireless device, is connected to thesystem bus 2308 through the input device interface 2342. In a networkedenvironment, program modules depicted relative to the computer, orportions thereof, can be stored in the remote memory/storage device2350. It will be appreciated that the network connections shown areexemplary and other means of establishing a communications link betweenthe computers can be used.

The computer is operable to communicate with any wireless devices orentities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE 802.11 (a, b,g, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE 802.3 or Ethernet).Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, atan 11 Mbps (802.11a) or 54 Mbps (802.11b) data rate, for example, orwith products that contain both bands (dual band), so the networks canprovide real-world performance similar to the basic 10BaseT wiredEthernet networks used in many offices.

The above description of illustrated embodiments of the subjectdisclosure, including what is described in the Abstract, is not intendedto be exhaustive or to limit the disclosed embodiments to the preciseforms disclosed. While specific embodiments and examples are describedherein for illustrative purposes, various modifications are possiblethat are considered within the scope of such embodiments and examples,as those skilled in the relevant art can recognize.

In this regard, while the subject matter has been described herein inconnection with various embodiments and corresponding FIGs, whereapplicable, it is to be understood that other similar embodiments can beused or modifications and additions can be made to the describedembodiments for performing the same, similar, alternative, or substitutefunction of the disclosed subject matter without deviating therefrom.Therefore, the disclosed subject matter should not be limited to anysingle embodiment described herein, but rather should be construed inbreadth and scope in accordance with the appended claims below.

What is claimed is:
 1. A method, comprising: based on a first signalfrom an access point device of a wireless network, determining, by afirst mobile device comprising a processor, that the access point devicehas not previously sent a second signal to the first mobile device;sending, by the first mobile device to a base station device of thewireless network, request data associated with a current threshold of afirst signal strength quality of the first signal; in response to firstthreshold data, associated with the current threshold of the firstsignal strength quality, matching second threshold data associated witha third signal communicated between a second mobile device and theaccess point device, receiving, by the first mobile device, the secondthreshold data associated with a second signal strength quality of thethird signal; and in response to the receiving the second thresholddata, refreshing, by the first mobile device, the first threshold datain an access point data structure associated with the first mobiledevice, resulting in refreshed threshold data; and based on therefreshed threshold data, sending, by the first mobile device to theaccess point device, a fourth signal.
 2. The method of claim 1, whereinthe request data comprises media access control data.
 3. The method ofclaim 1, further comprising: in response to the refreshing the firstthreshold data, updating, by the first mobile device, the access pointdata structure with the first threshold data.
 4. The method of claim 1,wherein the refreshing comprises updating the access point datastructure with expiration data associated with the current signalstrength quality for use in determining a timeframe for selection of theaccess point device for a later communication.
 5. The method of claim 1,wherein the sending the fourth signal comprises sending the fourthsignal to a cloud-based access point database service device.
 6. Themethod of claim 1, further comprising: receiving, by the first mobiledevice, a request to collect jitter data associated with the firstsignal.
 7. The method of claim 1, further comprising: sending, by thefirst mobile device, the second threshold data to the base stationdevice for subsequent use in selection of the access point device by athird mobile device.
 8. A system, comprising: a processor; and a memorythat stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising: based on afirst signal from an access point device of a wireless network,determining that the access point device has not previously sent asecond signal; in response to the determining, sending, to a basestation device of the wireless network, request data associated with acurrent threshold of a first signal strength quality of the firstsignal; in response to first threshold data, associated with the currentthreshold of the first signal strength quality, matching secondthreshold data associated with a third signal communicated between asecond mobile device and the access point device, receiving the secondthreshold data associated with a second signal strength quality of thethird signal; and in response to the receiving the second thresholddata, refreshing the first threshold data in an access point datastructure associated, resulting in refreshed threshold data; and basedon the refreshed threshold data, sending a fourth signal to the accesspoint device.
 9. The system of claim 8, wherein the request datacomprises service set identifier data associated with the access pointdevice.
 10. The system of claim 8, wherein the refreshing the firstthreshold data comprises updating the access point data structure withexpiration data associated with the second signal strength quality foruse in determining a timeframe to select the access point device for acommunication.
 11. The system of claim 8, wherein the operations furthercomprise: in response to an indication that the second signal strengthquality has been reduced from a first value to a second value lower thanthe first value, reducing a timeframe to select the access point devicefrom a first time to a second time less than the first time.
 12. Thesystem of claim 8, wherein the operations further comprise: in responseto an indication that the second signal strength quality has beenincreased from a first value to a second value higher than the firstvalue, increasing a timeframe to select the access point device to anincreased timeframe greater than the timeframe.
 13. The system of claim8, wherein the second signal strength quality is based on jitter data ofa jitter associated with the first signal.
 14. The system of claim 8,wherein the first signal from the access point device comprises mediaaccess control address data and service set identifier data associatedwith the access point device.
 15. A machine-readable storage medium,comprising executable instructions that, when executed by a processor,facilitate performance of operations, comprising: based on a firstsignal from an access point device of a wireless network, facilitatingdetermining that the access point device has not previously sent asecond signal, the second signal being different than the first signal;in response to the facilitating the determining, facilitating sending,to a base station device of the wireless network, request dataassociated with a current threshold of a first signal strength qualityof the first signal; based on the first threshold data, associated withthe current threshold of the first signal strength quality, matchingsecond threshold data associated with a third signal communicatedbetween a mobile device and the access point device, facilitatingreceiving the second threshold data associated with a second signalstrength quality of the third signal; and in response to thefacilitating the receiving of the second threshold data, updating thefirst threshold data in an access point data structure associated,resulting in updated threshold data; and based on the updated thresholddata, facilitating sending a fourth signal to the access point device.16. The machine-readable storage medium of claim 15, wherein theupdating comprises updating expiration data indicative of a length oftime of the second signal strength quality.
 17. The machine-readablestorage medium of claim 15, wherein the updating the first thresholddata comprises updating the access point data structure with theexpiration data.
 18. The machine-readable storage medium of claim 15,wherein the second signal strength quality is based on jitter data of ajitter associated with the first signal.
 19. The machine-readablestorage medium of claim 18, wherein the operations further comprise:based on the jitter, determining that there is a mismatch between thejitter and a received signal strength indicator.
 20. Themachine-readable storage medium of claim 15, wherein the second signalstrength quality is based on a received signal strength associated witha wireless fidelity service set identifier.