Facilitation of adaptive traffic flow management by a power-limited mobile device

ABSTRACT

Facilitation of adaptive traffic flow management by a power-limited device during uplink-limited conditions is provided. A method can include: detecting that power emitted from the device satisfies a first defined condition; evaluating a defined characteristic of a network with which the device is associated and an application being executed by the device, wherein the evaluating is in response to the detecting; and determining whether to transmit information to the network to cause the device to be transferred by the network, wherein transferring is from a first wireless communication system to a second wireless communication system, and wherein the determining is performed based on the evaluating. In various embodiments, the first wireless communication system can be a long-term evolution system and the second wireless communication system can be a universal mobile telecommunications system.

RELATED APPLICATION

This application is a continuation of, and claims the benefit ofpriority to, U.S. patent application Ser. No. 13/682,325 (now U.S. Pat.No. 9,031,559), filed on Nov. 20, 2012, and titled “FACILITATION OFADAPTIVE TRAFFIC FLOW MANAGEMENT BY A POWER-LIMITED MOBILE DEVICE,” theentirety of which application is hereby incorporated herein byreference.

TECHNICAL FIELD

The subject disclosure relates to wireless communications and, alsogenerally, to various embodiments that facilitate adaptive traffic flowmanagement by a power-limited mobile device.

BACKGROUND

Uplink reception at a base station (BS) device is important for a numberof reasons including, but not limited to, transmission of data from themobile device to another destination, signaling and callsetup/maintenance functions impacting both uplink and downlink paths.For example radio link access, quality feedback, transmission controlprotocol and flow control feedback, failure timers and handover can allbe dependent upon uplink reception at the BS device, even in cases inwhich the majority of content is transmitted and/or received over thedownlink. Additionally, inadequate uplink reception calls can drop (evenin cases in which the downlink is ideal). Impacts on call setupaccessibility, in particular, and uplink transmission, in general, canbe worsened if devices transmitting on the uplink operate in apower-limited mode.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example block diagram of a mobile device that canbe power-limited and can facilitate adaptive traffic flow management inaccordance with embodiments described herein.

FIG. 2 illustrates an example mobile device power attenuation table of amobile device that can facilitate adaptive traffic flow management inaccordance with embodiments described herein.

FIG. 3 illustrates an example block diagram of an adaptive traffic flowmanagement component in accordance with embodiments described herein.

FIG. 4 illustrates an example diagram of a data storage that facilitatesprocessing for adaptive traffic flow management by a power-limitedmobile device in accordance with embodiments described herein.

FIGS. 5-9 illustrate example flowcharts of methods that facilitateprocessing for adaptive traffic flow management by a power-limitedmobile device in accordance with embodiments described herein.

FIG. 10 illustrates a block diagram of a computer operable to facilitateprocessing for adaptive traffic flow management by a power-limitedmobile device in accordance with embodiments described herein.

DETAILED DESCRIPTION

One or more embodiments are now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the various embodiments. It is evident,however, that the various embodiments can be practiced without thesespecific details (and without applying to any particular networkedenvironment or standard).

As used in this application, in some embodiments, the terms “component,”“system” and the like are intended to refer to, or include, acomputer-related entity or an entity related to an operational apparatuswith one or more specific functionalities, wherein the entity can beeither hardware, a combination of hardware and software, software, orsoftware in execution. As an example, a component may be, but is notlimited to being, a process running on a processor, a processor, anobject, an executable, a thread of execution, computer-executableinstructions, a program, and/or a computer. By way of illustration andnot limitation, both an application running on a server and the servercan be a component. One or more components may reside within a processand/or thread of execution and a component may be localized on onecomputer and/or distributed between two or more computers. In addition,these components can execute from various computer readable media havingvarious data structures stored thereon. The components may communicatevia local and/or remote processes such as in accordance with a signalhaving one or more data packets (e.g., data from one componentinteracting with another component in a local system, distributedsystem, and/or across a network such as the Internet with other systemsvia the signal). As another example, a component can be an apparatuswith specific functionality provided by mechanical parts operated byelectric or electronic circuitry, which is operated by a softwareapplication or firmware application executed by a processor, wherein theprocessor can be internal or external to the apparatus and executes atleast a part of the software or firmware application. As yet anotherexample, a component can be an apparatus that provides specificfunctionality through electronic components without mechanical parts,the electronic components can include a processor therein to executesoftware or firmware that confers at least in part the functionality ofthe electronic components. While various components have beenillustrated as separate components, it will be appreciated that multiplecomponents can be implemented as a single component, or a singlecomponent can be implemented as multiple components, without departingfrom example embodiments.

Further, the various embodiments can be implemented as a method,apparatus or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable device or computer-readable storage/communicationsmedia. For example, computer readable storage media can include, but arenot limited to, magnetic storage devices (e.g., hard disk, floppy disk,magnetic strips), optical disks (e.g., compact disk (CD), digitalversatile disk (DVD)), smart cards, and flash memory devices (e.g.,card, stick, key drive). Of course, those skilled in the art willrecognize many modifications can be made to this configuration withoutdeparting from the scope or spirit of the various embodiments.

In addition, the words “example” and “exemplary” are used herein to meanserving as an instance or illustration. Any embodiment or designdescribed herein as “example” or “exemplary” is not necessarily to beconstrued as preferred or advantageous over other embodiments ordesigns. Rather, use of the word example or exemplary is intended topresent concepts in a concrete fashion. As used in this application, theterm “or” is intended to mean an inclusive “or” rather than an exclusive“or”. That is, unless specified otherwise or clear from context, “Xemploys A or B” is intended to mean any of the natural inclusivepermutations. That is, if X employs A; X employs B; or X employs both Aand B, then “X employs A or B” is satisfied under any of the foregoinginstances. In addition, the articles “a” and “an” as used in thisapplication and the appended claims should generally be construed tomean “one or more” unless specified otherwise or clear from context tobe directed to a singular form.

Moreover, terms such as “mobile device equipment,” “mobile station,”“mobile,” subscriber station,” “access terminal,” “terminal,” “handset,”“mobile device” (and/or terms representing similar terminology) canrefer to a wireless device utilized by a subscriber or mobile device ofa wireless communication service to receive or convey data, control,voice, video, sound, gaming or substantially any data-stream orsignaling-stream. The foregoing terms are utilized interchangeablyherein and with reference to the related drawings. Likewise, the terms“access point (AP),” “Base Station (BS device),” “Node B,” “evolved NodeB (eNode B),” “home Node B (HNB)” and the like, are utilizedinterchangeably in the application, and refer to a wireless networkcomponent or appliance that transmits and/or receives data, control,voice, video, sound, gaming or substantially any data-stream orsignaling-stream from one or more subscriber stations. Data andsignaling streams can be packetized or frame-based flows.

Furthermore, the terms “mobile device,” “subscriber,” “customer,”“consumer” and the like are employed interchangeably throughout, unlesscontext warrants particular distinctions among the terms. It should beappreciated that such terms can refer to human entities or automatedcomponents supported through artificial intelligence (e.g., a capacityto make inference based on complex mathematical formalisms), which canprovide simulated vision, sound recognition and so forth.

Embodiments described herein can be exploited in substantially anywireless communication system, including, but not limited to, WirelessFidelity (Wi-Fi), Global System for Mobile Communications (GSM),Universal Mobile Telecommunications System (UMTS), WorldwideInteroperability for Microwave Access (WiMAX), Enhanced General PacketRadio Service (Enhanced GPRS), Third Generation Partnership Project(3GPP) Long Term Evolution (LTE), Third Generation Partnership Project 2(3GPP2) Ultra Mobile Broadband (UMB), High Speed Packet Access (HSPA),Zigbee and other 802.XX wireless technologies and/or legacytelecommunication technologies. Further, the term “femto” and“femtocell” are used interchangeably, and the terms “macro” and“macrocell” are used interchangeably.

Mobile devices can transmit and receive radio signals to supportbi-directional wireless services. As the transmit power and receivesensitivity for the mobile device increase, wireless range andperformance generally increase. However, radiation correspondinglyincreases.

Because the mobile device is possibly within proximity to a body ofhuman form, e.g., a human body (whether the user of the device or apasserby within proximity of the mobile device), the mobile device canoutput only a limited amount of radiation in various scenarios. Inparticular, radiation emitted from mobile devices for transmission ofinformation on the uplink is limited to levels deemed safe forabsorption by the human body as determined by various governmentalbodies.

A specific absorption rate (SAR) is the relative amount of radiofrequency (RF) energy absorbed in the body of a user of a wirelessdevice. The SAR depends upon a number of factors including, but notlimited to, the geometry of the body part exposed to the RF energy, thegeometry and location of the wireless device relative to the body partexposed to the RF energy, the amount of power emitted from the wirelessdevice and the frequency-specific transmission loss between the wirelessdevice and the body part. A SAR limit for public exposure from cellulartelephones has been determined by the Federal Communications Commission(FCC) to be equal to or less than 1.6 watts per kilogram (1.6 W/kg)taken over a volume containing a mass of 1 gram of tissue.

Device manufacturers can seek to achieve a balance between wirelessperformance and meeting the requirements of the FCC. As such, ratherthan limiting wireless device power and performance to a single,worst-case level and sacrificing wireless performance at all times,wireless device manufacturers can employ one or more proximity sensorsand configure the wireless devices to transmit power at different levelsbased on the proximity of the mobile device to a particular portion ofthe body.

However beneficial the reduction in power from a safety perspective, theperformance impact is undeniable. Power reduction can expose limitationsin downlink-centric layer selection mechanisms because the effectiveservice area for any bi-directional wireless technology is only as goodas the weakest channel (whether uplink or downlink).

Typically handover can be employed for downlink-centric limitations.Selection towards or away from a wireless communication system isgenerally triggered when raw downlink signal strength meets someabsolute or relative criterion. When mobile device power is full, theuplink service area is roughly equivalent to downlink, so this method iseffective in downlink-limited scenarios.

However, when mobile device transmit power is reduced, downlink-onlyselection methods amplify the negative performance effects of mobiledevice power reduction. And, according to current implementations ofvarious systems, the radio network can be completely unaware of themobile device power reduction. In this case bi-directional calls maydrop when uplink limits are reached. Measurement-based mobility methodscan also fail if the mobile device power is reduced as the measurementreports are not likely to be received by the BS device.

Adaptive traffic flow management by a power-limited mobile device canfacilitate autonomous management of uplink communications to preservecall integrity at or near the edge of a cell. In particular, mobiledevices can control their uplink communications based upon powerlimitation characteristics that may be unknown to the network.

Specifically, in one or more embodiments, a method can include:detecting, at a device comprising a processor, that power emitted fromthe device satisfies a first defined condition; evaluating, by thedevice, a defined characteristic of a network with which the device isassociated and an application being executed by the device, wherein theevaluating is in response to the detecting; and determining, by thedevice, whether to transmit information to the network to cause thedevice to be transferred by the network, wherein transferring is from afirst wireless communication system to a second wireless communicationsystem, and wherein the determining is performed based on theevaluating.

As used herein, a “wireless communication system” means a frequencylayer or system on which a mobile device can communicate and can includeor be associated with any of the wireless communication technologieslisted herein including, but not limited to, the LTE and UMTStechnologies.

In one or more embodiments, a computer-readable storage medium can storecomputer-executable instructions that, in response to execution, cause asystem comprising a processor to perform operations. The operations caninclude: evaluating whether a defined characteristic of a network withwhich the system is associated and a defined characteristic of anapplication executed by the system meets a first defined condition;determining to forego performing an action to cause the system to betransferred from a first wireless communication system to a secondwireless communication system based on the defined characteristic of thenetwork and the defined characteristic of the application meeting thefirst defined condition; and performing selective bundling ofinformation to be transmitted from the system, wherein the performing isbased on the determining.

As used herein, “selective bundling” and “selectively bundling,” canmean temporarily bundling and storing information to be transmitted fromthe mobile device at the mobile device in lieu of transmitting theinformation from the mobile device. The embodiments described herein canperform selective bundling based on a determination that the applicationbeing executed by the mobile device is a non-real-time application andcan therefore experience the delay that results from selective bundlingand, in some cases, based on a determination that the uplink-limitednetwork condition is likely to resolve (or has resolved) within anacceptable amount of time after the uplink-limited network condition hasbeen discovered.

During selective bundling, the mobile device can be changed to the idlemode. After determining that the mobile device should be re-started(based on a satisfactory improvement in the uplink network condition),the mobile device can change to the active mode and transmit the bundledinformation as a burst of information.

In one or more embodiments, a system can include a memory to storecomputer-executable instructions, and a processor, communicativelycoupled to the memory, that facilitates execution of computer-executableinstructions to perform operations comprising: detecting a limitation ofa defined characteristic of a network with which the system isassociated, wherein the defined characteristic is related to uplinktransmission from the system; ceasing transmission of information to betransmitted from the system, and performing selective bundling of theinformation, wherein the ceasing and the performing are based on thedetecting; and re-starting transmission of bundled information from thesystem based on detecting a non-existence of the limitation of thedefined characteristic.

Turning now to FIG. 1, an example block diagram of a mobile device 100that can be power-limited and can facilitate adaptive traffic flowmanagement in accordance with embodiments described herein is shown. Themobile device 100 can include a communication component 102, locationdetection component 104, power component 106, adaptive traffic flowmanagement component 108, memory 110, processor 112 and/or data storage114. In various embodiments, one or more of the communication component102, location detection component 104, power component 106, adaptivetraffic flow management component 108, memory 110, processor 112 and/ordata storage 114 can be electrically and/or communicatively coupled toone another to perform one or more functions of the mobile device 100.

The mobile device 100 can be any number of different wireless mobiledevices including, but not limited to, a cellular telephone, a tablet, alaptop, a personal digital assistant (PDA) or the like. In variousscenarios, the mobile device 100 can limit output power based onproximity of the mobile device 100 to a human body (or region thereof).Further, the mobile device 100 can employ adaptive traffic flowmanagement methods described herein to autonomously control uplinkcommunications to increase the likelihood of preserving call integrityfor the mobile device 100 at or near the edge of a cellular coveragearea in which the mobile device 100 is located. In these embodiments,the output power of the mobile device 100 can be unknown to the networkto which the mobile device 100 is communicatively coupled.

As shown, the mobile device 100 can include a communication component102 that can be communicatively coupled to a network including a BSdevice. The communication component 102 can transmit information toand/or receive information from one or more other mobile devices and/orthe network. The information can include, but not limited to, call setuprequests, uplink and downlink signaling and communications, informationindicative of a power level emitted by the mobile device 100 for uplinktransmissions, voice call information, data information, videoinformation or the like.

The location detection component 104 can include one or more proximitysensors (not shown) and can be configured to receive information fromthe proximity sensors and determine a location of the mobile device 100relative to a portion of the body.

For example, in one embodiment, the proximity sensors can determinewhether the mobile device 100 is located within a defined proximity to ahuman body (as, in some embodiments, the proximity sensors can determinethat the mobile device 100 is not within a defined proximity to a humanbody). In various embodiments, the human body can be the user of themobile device 100 or a nearby passerby.

As another example, the proximity sensors can determine a region atwhich the mobile device 100 is located. The region can be any of anumber of different regions, including, but not limited to, the head,torso, lap or legs. Different regions of the body can be associated withdifferent SARs and different corresponding maximum output power valuesfor the mobile device.

In some embodiments, the one or more proximity sensors can output asignal when the proximity to the body is detected. In variousembodiments, the type, frequency and/or strength of the signal canindicate the region of the body detected.

The power level component 106 can receive the signal output from thelocation detection component 104 and can adjust the level of poweremitted by the mobile device 100 based on the region of the body atwhich the mobile device 100 is placed and based on the SAR requirementfor the region of the body.

FIG. 2 illustrates an example mobile device power attenuation table 200of a mobile device 100 that can facilitate adaptive traffic flowmanagement in accordance with embodiments described herein. FIG. 4illustrates an example diagram of a data storage that facilitatesprocessing for adaptive traffic flow management by a power-limitedmobile device in accordance with embodiments described herein.

As shown in FIG. 2, the mobile phone power attenuation table 200 caninclude information indicative of one or more regions of a human body202 to which the mobile device can be in proximity and a maximum outputpower 204 associated with the region of the body. As shown, differentregions of the body are associated with different maximum output powerlevels from the mobile device 100.

The mobile phone power attenuation table 200 can be stored in the mobiledevice 100 and/or merely accessible by the mobile device 100 over anetwork (e.g., Internet). In some aspects, the information indicative ofone or more regions of the human body and maximum output powerinformation can be stored in data storage (e.g., data storage 400) ofthe mobile device. For example, the data storage 400 can store region ofbody information 402 and power output information 404.

For example, if the location detection component 104 determines that themobile device 100 is not within a defined proximity to a human body, thepower level component 106 can receive information indicative of suchdetermination and control the mobile device 100 to emit full power. Asanother example, if the location detection component 104 determines thatthe mobile device 100 is within a defined proximity to the head, lap,extremities or trunk, the power level component 106 can receiveinformation indicative of such determination and adjust the poweremitted from the mobile device based on an attenuation table of valuesstored in and/or accessible by the mobile device. The particular valueto which the power is adjusted can be a function of the particular bodypart with which the mobile device 100 is within the defined proximity.

With reference to FIGS. 1 and 2, the power component 106 can receive thesignal from the location detection component 104 indicative of theregion of the body within which the mobile device 100 is in proximityand/or access the power attenuation table 400 to determine whether toreduce, increase or allow the power emitted by the mobile device 100 toremain constant.

For example, if the attenuation table 400 indicates that the powerallowed for the region of the body detected is less than the currentpower at which the mobile device 100 transmits, the power component 106can reduce the power output from the mobile device 100 to the amountless than or equal to the maximum output power indicated in theattenuation table 400. If the attenuation table 400 indicates that thepower allowed for the region of the body detected is greater than thecurrent power at which the mobile device 100 transmits, the powercomponent 106 can increase the power output from the mobile device 100to the amount less than or equal to the maximum output power indicatedin the attenuation table 400. If the attenuation table 400 indicatesthat the power allowed for the region of the body detected isapproximately equal to the current power at which the mobile device 100transmits, the power component 106 can allow the power output from themobile device 100 to remain at the current output power value configuredfor the mobile device. In some embodiments, power levels can beapproximately equal if the power levels are within a defined acceptablerange of one another.

Turning back to FIG. 2, as a first example, if the location detectioncomponent 104 determines that the mobile device 100 is within a definedproximity to the head of the user of the mobile device 100, the powercomponent can adjust the power emitted by the mobile device to be lessthan or equal to approximately 0.5 decibel (dB). As a second example, ifthe location detection component 104 determines that the mobile device100 is within a defined proximity to the trunk of the user of the mobiledevice 100, the power component can adjust the power emitted by themobile device to be less than or equal to approximately 3 dB. As a thirdexample, if the location detection component 104 determines that themobile device 100 is within a defined proximity to the lap of the userof the mobile device 100, the power component can adjust the poweremitted by the mobile device to be less than or equal to approximately 1dB.

After the power emitted from the mobile device 100 is reduced, themobile device 100 is power-limited. The power-limited mobile device 100can have an increased risk of transmitting signals that do notsuccessfully reach the BS device if, for example, the mobile device 100is located within a defined proximity to the edge of the cellularcoverage area with which the mobile device 100 is associated. As such,in various embodiments, the power component 106 can determine that thelevel of the power emitted from the mobile device 100 is less than orapproximately equal to a particular threshold value. The power component106 can then transmit a signal to the adaptive traffic flow managementcomponent 108 including such information to facilitate adaptive trafficflow management operations by the mobile device 100.

The memory 110 can be a computer-readable storage medium storingcomputer-executable instructions and/or information for performing thefunctions described herein with reference to the mobile device 100. Forexample, the memory 110 can store computer-executable instructions foradjustment of power emitted from the mobile device 110, determination ofa location of the body at which the mobile device 100 is located and/orevaluation of the network and/or application executed by the mobiledevice 100 to facilitate adaptive traffic flow management.

Processor 112 can perform one or more of the functions described hereinwith reference to the mobile device 100. For example, the processor 112can facilitate determination of a location of the body at which themobile device 100 is placed and/or adjustment of power emitted from themobile device 100. As another example, in some embodiments, theprocessor 112 can facilitate execution of an application by the mobiledevice 100. The application can be a real-time application or anon-real-time application. Based on whether the application is areal-time application or a non-real-time application, the processor 112can facilitate performance of selective bundling and/or initiating aprocess that will cause the mobile device 100 to be transferred to a newwireless communication system from the current wireless communicationsystem.

The data storage 114 can be configured to store information transmittedto, received by and/or processed by the mobile device 100. In variousembodiments, the data storage 114 can store information including, butnot limited to, the information stored in data storage 300, mobile phoneattenuation table 400, information indicative of one or more past orcurrent levels of power emitted by the mobile device, networkinformation, information associated with whether an application executedby the mobile device 100 is a real-time application or a non-real-timeapplication and/or wireless communication system identifiers andinformation.

The adaptive traffic flow management component 108 will be described ingreater detail with reference to FIGS. 1, 3 and 4. FIG. 3 illustrates anexample adaptive traffic flow management component 300 in accordancewith embodiments described herein. The adaptive traffic flow managementcomponent 108 can include one or more of the structure and/orfunctionality of the adaptive traffic flow management component 300 (andvice versa).

As shown in FIG. 3, the adaptive traffic flow management component 300can include a network evaluation component 304, an applicationevaluation component 306, a mobile device cell location component 302, awireless communication system determination component 308, a selectivebundling component 310, a memory 312, a processor 314 and/or datastorage 316. In some embodiments, one or more of the network evaluationcomponent 304, application evaluation component 306, mobile device celllocation component 302, wireless communication system determinationcomponent 308, selective bundling component 310, memory 312, processor314 and/or data storage 316 can be electrically and/or communicativelycoupled to one another to perform one or more functions of the adaptivetraffic flow management component 300.

In various embodiments, the adaptive traffic flow management component300 can employ selective bundling, adaptation from idle mode operationto active mode operation (and vice versa), evaluation of one or morecharacteristics of the network and applications being executed by themobile device to adaptively and autonomously manage the uplinkcommunications from the mobile device 100 and/or determine whether tocause the mobile device to transfer to a different wirelesscommunication system.

Re-starting communication on a new wireless communication system canhave limitations including, reduced resources in the new wirelesscommunication system relative to the resources available in the currentwireless communication system, the delay in communications resultantfrom the time required to re-start communication on the new wirelesscommunication system and the like. As such, the adaptive traffic flowmanagement component 300 can attempt to employ other approaches (e.g.,selective bundling) while remaining on the current wirelesscommunication system in certain embodiments.

As used herein, the term “selective bundling” can mean bundling togetherand temporarily storing at the mobile device information that wouldtypically be transferred separately from the mobile device. For example,multiple packets that would typically be sent separately over time(e.g., packets typically sent in series over time) from the mobiledevice 100 can be selective bundled at the mobile device 100 such thatthe multiple packets are temporarily stored at the mobile device 100.Because LTE, for example, can support high bursts of data, afterselective bundling has ended, when the mobile device 100 changes back toactive mode operation and re-starts LTE, for example, the mobile device100 can transmit a burst of bundled information, and the applicationbeing executed by the mobile device 100 can continue. This process canbe conducted during a short time period such that the likelihood thatthe user experiences inconvenience from the interruption in service onthe application being executed by the user is minimal or non-existent.

The adaptive traffic flow management component 300 can receive signalfrom the power component 106 indicating that the mobile device 100 hasbeen configured to output a level of power for uplink transmissions thatis less than a defined threshold.

Based on receipt of this signal, the mobile device cell locationcomponent 302 can determine the mobile device location within the cell.For example, the mobile device cell location component 302 can determinewhether the mobile device 100 is within a defined proximity to the edgeof the cell. In some embodiments, if the mobile device 100 is within thedefined proximity to the edge of the cell, the adaptive traffic flowmanagement component 300 can perform one or more steps to determine anwhether to transfer the mobile device 100 to a new wirelesscommunication system from the current wireless communication systemand/or to remain associated with the current wireless communicationsystem and perform selective bundling of information from the mobiledevice 100.

In some embodiments, upon receiving a signal indicating that the mobiledevice 100 has been configured to output a level of power for uplinktransmissions that is less than a defined threshold, the adaptivetraffic flow management component 300 can perform one or more steps todetermine an whether to transfer the mobile device 100 to a new wirelesscommunication system from the current wireless communication systemand/or to remain associated with the current wireless communicationsystem and perform selective bundling of information from the mobiledevice 100. In this embodiment, these steps can be performedirrespective of whether the mobile device is within the definedproximity to the edge of the cell.

In either embodiment, the network evaluation component 304 can evaluatethe network with which the mobile device 100 is associated. In someembodiments, the network evaluation component 304 can evaluate thenetwork to determine whether one or more uplink limitations exist. Theuplink limitations can be related to any number of different factorsincluding, but not limited to, the BS device SINR, physical resourceblock (PRB) allocation, modulation coding scheme (MCS), powerinformation as indicated by the power headroom and the like. In variousembodiments, information associated with power margins and powerheadroom reports, information associated with the use of the channelquality indicator (CQI) to determine which MCS is more robust and thelike are well-known and can be defined, described and/or detailed perthe methods described in the 3GPP LTE Release 8 and beyond standard.

The network evaluation component 304 can perform slink adaptation ofvarious radio link characteristics while the mobile device 100 isactively uploading information to the BS device. However, when themobile device 100 has low power, the uplink signaling path can bebroken. When the uplink signaling path is broken, link adaptation canbecome unstable and the uplink can be prone to dropped calls. To addressthese issues, the mobile device can monitor uplink link adaptationsignaling in order to perform adaptive traffic flow management byproactively identifying breaks in the uplink signaling path.

The network evaluation component 304 can perform network evaluation ofthe PRB allocation (e.g., frequency allocation), MCS and power todetermine whether an uplink-limited condition exists. In particular, BSdevice uplink Signal-to-Interference Noise Ratio (SINR), which is anindicator of the uplink signal quality experienced by the BS device,mobile device power headroom reports and/or mobile device uplink bufferstatus reporting can be evaluated and/or employed.

With regard to power, the network evaluation component 304 can performnetwork evaluation to determine whether an uplink-limited conditionexists. In particular, from time to time, the mobile device 100 canreport uplink power headroom to the BS device. In the proximity case inwhich the mobile device is within a particular proximity to a region ofthe human body, the power of the mobile device 100 is limited and themobile device power headroom reports will be reduced (relative toembodiments in which the mobile device 100 is not within a definedproximity to the human body).

As the mobile device 100 nears the edge of the cell, the BS device canrequest power increases until the power headroom for the mobile device100 reaches 0 dB. When the power headroom reaches 0 dB, the BS devicetypically ceases to transmit power increase commands. However, if powerincrease commands from the BS device do not cease after the mobiledevice has reached full allowed power, the network evaluation component304 can determine that the BS device is not receiving uplink powerheadroom reports from the mobile device 100 and therefore the uplinksignaling path is broken, in particular, and/or an uplink-limitedcondition exists, in general.

With regard to PRB allocation, the network evaluation component 304 candetect low PRB allocation as follows. As the mobile device nears theedge of the cell, the BS device can attempt to maximize the uplink SINRof the BS device by concentrating all (or, in some embodiments, at leasta majority portion) of the mobile device power to a limited set of PRB.If the uplink PRB allocation for the mobile device 100 is a minimum PRBvalue (e.g., 1 PRB) for a defined amount of time, the network evaluationcomponent 304 can determine that the BS device uplink SINR is poor andthe mobile device 100 has reached the uplink limit for the mobile device100.

With regard to MCS allocation, the network evaluation component 304 candetect low MCS allocation as follows. As the mobile device nears theedge of the cell, the BS device can attempt to maximize the uplink blockerror rate (BLER) by reducing the MCS to more robust MCSs. For example,quadrature phase-shift keying (QPSK) is more robust than 64 quadratureamplitude modulation (QAM). If the mobile device 100 is at maximumallowed power and the uplink MCS is QPSK for an extended length of time,the network evaluation component 304 can determine that the BS deviceuplink SINR is poor and the uplink limit for the mobile device 100 hasbeen reached.

With reference to the data storage 400 shown in FIG. 4, the power margininformation 408, PRB information 410, MCS information 412, headroomreport/power increase command information 414, SINR information 416and/or buffer status report information 418 can be stored in the datastorage 400 at the mobile device. In some embodiments, the informationcan be stored at a data storage accessible by the mobile device over anetwork (e.g., over the Internet).

The network evaluation component 304 can generate information indicatingthe uplink limitation for the mobile device 100 when such condition isdetected. The network evaluation component 304 can also generateinformation indicative of the downlink reference signal received power(RSRP) to a scheduler within the selective bundling component 310.

In response to the signals generated by the network evaluation component302, the application evaluation component 306 can evaluate theapplication being currently executed by the mobile device 100. Forexample, in some embodiments, the application evaluation component 306can determine whether the application currently executed by the mobiledevice 100 is a real-time application or a non-real-time application.

The wireless communication system determination (WCTD) component 308 candetermine whether to cause the mobile device 100 to be transferred froma first wireless communication system to a second wireless communicationsystem based on the evaluations performed by the network evaluationcomponent 302 and/or the application evaluation component 306.

In various embodiments, the WCTD component 308 can determine to transmitinformation to cause the mobile device to be transferred to the secondwireless communication system (or can determine to not transmit suchinformation) based on any number or combination of different factorsincluding, but not limited to, the evaluation of whether the applicationis a real-time application, the current network condition, anticipatedfuture network condition, the power level of the mobile device and/orthe location of the mobile device within the cell.

In some embodiments, if the mobile device is executing a non-real-timeapplication and/or the network conditions have an acceptable likelihoodof improving within an acceptable defined amount of time, the WCTDcomponent 308 can generate a signal to cause the selective bundlingcomponent 310 to begin selective bundling the information to betransmitted from the mobile device 100. The WCTD component 308 can alsodetermine to not transmit information that will cause the mobile device100 to be transferred to a new wireless communication system.

While the selective bundling component 310 is performing the selectivebundling, the mobile device 100 does not transmit data to the network.

In some embodiments, the selective bundling component 310 candiscontinue data flows by manipulating the uplink buffer status reporttransmitted to the BS device. If the uplink buffer status reportincludes information indicative of an empty buffer to the BS device, theBS device will not grant uplink resources for the mobile device 100.

In some embodiments, however, after a defined amount of time ofperforming selective bundling, and therefore not transmittinginformation, in some embodiments, the mobile device 100 can receive asignal from the network causing the mobile device 100 to updateoperation to idle mode operation. For example, the mobile device 100 canupdate operation to idle mode operation after the mobile device 100fails to transmit information for approximately 10 to 15 seconds.

In lieu of transferring to a new wireless communication system that mayhave better performance given the reduced power of the mobile device100, the mobile device 100 can wait in idle mode on the current wirelesscommunication system and the selective bundling component 310 can bundlethe application information at the mobile device 100 until networkconditions in the current wireless communication system improve.

The selective bundling component 310 can selectively bundle information(e.g., selectively bundle packets) while the network evaluationcomponent 302 continue to monitor the uplink network conditions forimprovement and recovery (and/or until the application evaluationcomponent 306 indicates that a real-time application is now beingexecuted by the mobile device 100). For example, the selective bundlingcomponent 310 can selectively bundle application information in lieu oftransmitting the information from the mobile device 100, and the networkevaluation component 304 can continue to monitor the network conditions.

If the network fails to improve within the acceptable defined amount oftime (or if the likelihood that the network would improve within theacceptable defined amount of time was less than a particular valueduring the initial evaluation of the network), the mobile device 100 cantransmit information (e.g., signal strength report information thatincludes information about the mobile device power limits). The networkcan then transfer the mobile device 100 from the current wirelesscommunication system to a new wireless communication system.

In particular, in some aspects, upon determination that anuplink-limited condition exists, the mobile device 100 can discontinuetransmission of data (e.g., application information) from the mobiledevice 100. The BS device can recognize this inactivity from the mobiledevice 100 and after approximately 10-15 seconds of inactivity, releaseradio bearers so the mobile device can return to idle mode.

While the mobile device is in idle mode, the mobile device can performevaluations to determine the time to re-start transmissions of data fromthe mobile device 100. In some aspects, while in idle mode, the mobiledevice 100 can scan other neighboring communication technologies.

If another wireless communication system is found to be better than thecurrent wireless communication system in one or more of the radio linkconditions evaluated by the network evaluation component (e.g., by theamount of power reduction), the mobile device can re-select the newwireless communication system and re-start the data transmission byreporting actual buffer status on the new wireless communication system.

If no better wireless communication system is found, the mobile device100 can wait in idle mode on the current wireless communication systemuntil the downlink RSRP for the wireless communication system improves.The previous downlink RSRP at which the uplink-limited condition wasdetected can be the reference RSRP. If the downlink RSRP for thewireless communication system improves above the reference RSRP, themobile device 100 can attempt to re-start the data transmission byreporting actual buffer status on the same wireless communication systemon which the mobile device 100 was associated.

Otherwise, in some aspects (if the downlink RSRP has not improved abovethe reference RSRP), the mobile device can wait in the idle mode untilone or more conditions occur. For example, the mobile device can wait inidle mode until the mobile device 100 is no longer within the area thatis a defined proximity to the edge of the cellular coverage area and themaximum power allowed for the power output changes. As another example,example, the mobile device can wait in idle mode until the neighbor orserving signal conditions improve. In either case, the mobile device isable to soften the impact of the uplink limited condition while reducingthe occurrence of dropped calls (relative to taking no action andcontinuing to transmit in the active mode any application informationirrespective of the power limitations of the mobile device 100 and/orirrespective of the network conditions).

If the application being executed is a real-time application, WCTD cantransmit information to the network to cause the network to initiate atransfer of the mobile device 100 from the current wirelesscommunication system to a new wireless communication system. Forexample, if the mobile device 100 is communicating on an LTE system, thenetwork can initiate a transfer of the mobile device to a UMTS system.

For example, in some embodiments, the WCTD component 308 can cause themobile device 100 to be transferred by sending information to thenetwork indicating the reduced power of the mobile device 100. When thepower is reduced to a particular defined level, the network may respondby initiating a process to move the mobile device 100 from a firstwireless communication system to a second wireless communication system.

While the UMTS system may have fewer resources than the LTE systemgenerally, in these embodiments in which the application is a real-timeapplication, the reduced resources in UMTS may be preferable formaintaining performance of the application relative to the performancethat may be reduced in power-limited conditions.

During uplink-limited conditions, active data calls and flows can dropwhile idle data calls and flows wait but do not drop. This is a keyprinciple for this application. For transmission control protocolapplications, downlink data flows are dependent upon uplink acknowledgefeedback from the mobile device towards the server. If the uplink pathis broken, the transmission control protocol feedback is not receivedand downlink data will not flow, even if the downlink path is reliable.In this case the mobile device and BS device can be busy withunnecessary transmission control protocol chatter, yet providing nouseful data flow from the application perspective. While in this mode,the signaling path for active mode mobility, including mobile devicemeasurement reports required for release and re-direct from the BS, arealso broken. Lacking a good signaling path for active mode mobility, theradio link can fail and result in a dropped call.

If the uplink conditions are known to be impaired, it is thereforepreferable to discontinue the data flow and allow the mobile device totemporarily return to idle. In idle mode the mobile device can performautonomous reselection towards another wireless communication technology(if available) and is not dependent upon the uplink signaling path formeasurement reports to the BS device. Also while idle the mobile devicecan monitor radio conditions and re-start data flows when theuplink-limited condition clears.

FIGS. 5-9 illustrate example flowcharts of methods that facilitateprocessing for adaptive traffic flow management by a power-limitedmobile device in accordance with embodiments described herein. At 502,method 500 can include detecting a limitation of a definedcharacteristic of a network with which the system is associated, whereinthe defined characteristic is related to uplink transmission from thesystem. By way of example, but not limitation, the limitation caninclude a network condition impairing the uplink from the mobile device.The defined characteristic can include, but is not limited to, mobiledevice power, physical resource block (PRB) allocation (e.g., frequencyallocation), modulation coding scheme (MCS), BS device uplinkSignal-to-Interference Noise ratio, mobile device power headroom reportsand/or mobile device uplink buffer status reporting. In someembodiments, the limitation can be triggered due to a reduced level ofpower output from the mobile device. The level of power output can besuch that the BS device to which the mobile device is assigned is unableto receive transmissions from the mobile device reliably.

At 504, method 500 can include ceasing transmission of information to betransmitted from the system, and performing selective bundling of theinformation based on the detecting. In some embodiments, although notshown, the method 500 can also include determining that an applicationbeing executed by the system is a non-real-time application, wherein theceasing transmission and the performing the selective bundling are inresponse to the determining.

At 506, method 500 can include re-starting transmission of bundledinformation from the system based on detecting a non-existence of thelimitation of the defined characteristic of the network.

Turning now to FIG. 6, at 602, method 600 can include detecting thatpower emitted from the mobile device satisfies a first definedcondition. In some embodiments, although also not shown, the method caninclude determining a location of the mobile device relative to a regionof a human body within a defined proximity to the mobile device. Forexample, whether the mobile device is within a certain proximity to thebody of a human can be determined. If so, the determination can be madeas to which region of the human body the mobile device located near. Thepower emitted from the mobile device can be reduced or otherwiseincreased or remain constant based on the region of the body that themobile device is near. As such, the detected power level in step 602 canbe a result of reducing, increasing or remaining at a constant level asdictated by the region of the body that the mobile device is near.

At 604, method 600 can include evaluating a defined characteristic of anetwork with which the mobile device is associated and an applicationbeing executed by the mobile device, wherein the evaluating is inresponse to the detecting. In some embodiments, whether the location ofthe mobile device is within a defined proximity to an edge of a cellularcoverage area to which the mobile device is assigned can be determined.The detection that the mobile device is near the edge of the cell, forexample, can be a factor causing the evaluation of the network and/orapplication in some embodiments.

For example, in some embodiments, a determination can be made as towhether the application being executed is a non-real-time applicationand/or whether a characteristic of the network satisfies a seconddefined condition.

At 606, method 600 can include determining whether to transmitinformation to the network to cause the mobile device to be transferredby the network, wherein transferring is from a first wirelesscommunication system to a second wireless communication system, andwherein the determining is performed based on the evaluating. In someembodiments, the first wireless communication system can be associatedwith a Long-Term Evolution system and the second wireless communicationsystem can be associated with UMTS. In other embodiments, the first andsecond technology layers can be any number of different systems on whichthe mobile device is configured to communicate.

In some embodiments, a determination can be made to not transmitinformation to cause the mobile device to be transferred from the firstwireless communication system to the second wireless communicationsystem based on determining that the application being executed is anon-real-time application.

In some embodiments, a determination can be made to transmit informationto cause the mobile device to be transferred from the first wirelesscommunication system to the second wireless communication system basedon determining that the application being executed is a real-timeapplication and/or based on the characteristic of the network notmeeting a defined condition.

The information that the mobile device can transmit to cause the mobiledevice to be transferred can include information indicative of the poweremitted from the mobile device being less than a particular value and/orinformation indicative of the value of the power emitted from the mobiledevice.

Turning now to FIG. 7, at 702, method 700 can include determiningwhether the application being executed is designated as a non-real-timeapplication. At 704, method 700 can include determining whether adefined characteristic of the network satisfies a defined condition.

At 706, method 700 can include determining not to transmit theinformation to cause the mobile device to be transferred from the firstwireless communication system to the second wireless communicationsystem based on the application being executed being determined to bedesignated as a non-real-time application.

At 708, method 700 can include selectively bundling, by the device, theinformation as bundled information to be transmitted by the device,based on the determining not to transmit the information to cause themobile device to be transferred from the first wireless communicationsystem to the second wireless communication system. In some embodiments,the mobile device can change to idle mode after the selectively bundlingis commenced.

Turning now to FIG. 8, at 802, method 800 can include determining, bythe mobile device, that the defined characteristic of the network meetsa defined condition.

At 804, method 800 can include changing, by the mobile device, to activemode based on determining that the defined characteristic of the networkmeets the defined condition. At 806, method 800 can includetransmitting, by the mobile device, bundled information to the network,wherein the transmitting is performed in response to the changing to theactive mode.

Turning now to FIG. 9, at 902, method 900 can include determining, bythe device, a location of the device relative to a region of a body of ahuman form within a predefined proximity to the device.

At 904, method 900 can include reducing, by the device, the poweremitted from the device to a level where the power emitted from thedevice meets the predefined condition, wherein the reducing is inresponse to the determining the location of the device. In someembodiments, the reducing is in response to the determination of thelocation of the mobile device.

Referring now to FIG. 10, there is illustrated a block diagram of acomputer operable to facilitate adaptive traffic flow management. Forexample, in some embodiments, the computer can be or be included withinthe mobile device 100 and/or adaptive traffic flow management component108, 200.

In order to provide additional context for various embodiments of theembodiments described herein, FIG. 10 and the following discussion areintended to provide a brief, general description of a suitable computingenvironment 1000 in which the various embodiments of the embodimentdescribed herein can be implemented. While the embodiments have beendescribed above in the general context of computer-executableinstructions that can run on one or more computers, those skilled in theart will recognize that the embodiments can be also implemented incombination with other program modules and/or as a combination ofhardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The terms “first,” “second,” “third,” and so forth, as used in theclaims, unless otherwise clear by context, is for clarity only anddoesn't otherwise indicate or imply any order in time. For instance, “afirst determination,” “a second determination,” and “a thirddetermination,” does not indicate or imply that the first determinationis to be made before the second determination, or vice versa, etc.

The illustrated embodiments of the embodiments herein can be alsopracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

Computing devices typically include a variety of media, which caninclude computer-readable storage media and/or communications media,which two terms are used herein differently from one another as follows.Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structured dataor unstructured data. Tangible and/or non-transitory computer-readablestorage media can include, but are not limited to, random access memory(RAM), read only memory (ROM), electrically erasable programmable readonly memory (EEPROM), flash memory or other memory technology, compactdisk read only memory (CD-ROM), digital versatile disk (DVD) or otheroptical disk storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices or other media that can beused to store desired information. Computer-readable storage media canbe accessed by one or more local or remote computing devices, e.g., viaaccess requests, queries or other data retrieval protocols, for avariety of operations with respect to the information stored by themedium.

In this regard, the term “tangible” herein as applied to storage, memoryor computer-readable media, is to be understood to exclude onlypropagating intangible signals per se as a modifier and does notrelinquish coverage of all standard storage, memory or computer-readablemedia that are not only propagating intangible signals per se.

In this regard, the term “non-transitory” herein as applied to storage,memory or computer-readable media, is to be understood to exclude onlypropagating transitory signals per se as a modifier and does notrelinquish coverage of all standard storage, memory or computer-readablemedia that are not only propagating transitory signals per se.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

With reference again to FIG. 10, the example environment 1000 forimplementing various embodiments of the embodiments described hereinincludes a computer 1002, the computer 1002 including a processing unit1004, a system memory 1006 and a system bus 1008. The system bus 1008couples system components including, but not limited to, the systemmemory 1006 to the processing unit 1004. The processing unit 1004 can beany of various commercially available processors. Dual microprocessorsand other multi-processor architectures can also be employed as theprocessing unit 1004.

The system bus 1008 can be any of several types of bus structure thatcan further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1006includes ROM 1010 and RAM 1012. A basic input/output system (BIOS) canbe stored in a non-volatile memory such as ROM, erasable programmableread only memory (EPROM), EEPROM, which BIOS contains the basic routinesthat help to transfer information between elements within the computer1002, such as during startup. The RAM 1012 can also include a high-speedRAM such as static RAM for caching data.

The computer 1002 further includes an internal hard disk drive 1014,which internal hard disk drive 1014 can also be configured for externaluse in a suitable chassis (not shown), a magnetic floppy disk drive1016, (e.g., to read from or write to a removable diskette 1018) and anoptical disk drive 1020, (e.g., reading a CD-ROM disk 1022 or, to readfrom or write to other high capacity optical media such as the DVD). Thehard disk drive 1014, magnetic disk drive 1016 and optical disk drive1020 can be connected to the system bus 1008 by a hard disk driveinterface 1024, a magnetic disk drive interface 1026 and an opticaldrive interface 1028, respectively. The interface 1024 for externaldrive implementations includes at least one or both of Universal SerialBus (USB) and Institute of Electrical and Electronics Engineers (IEEE)1394 interface technologies. Other external drive connectiontechnologies are within contemplation of the embodiments describedherein.

The drives and their associated computer-readable storage media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1002, the drives andstorage media accommodate the storage of any data in a suitable digitalformat. Although the description of computer-readable storage mediaabove refers to a hard disk drive, a removable magnetic diskette, and aremovable optical media such as a CD or DVD, it should be appreciated bythose skilled in the art that other types of storage media which arereadable by a computer, such as zip drives, magnetic cassettes, flashmemory cards, cartridges, and the like, can also be used in the exampleoperating environment, and further, that any such storage media cancontain computer-executable instructions for performing the methodsdescribed herein.

A number of program modules can be stored in the drives and RAM 1012,including an operating system 1030, one or more application programs1032, other program modules 1034 and program data 1036. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1012. The systems and methods described herein can beimplemented utilizing various commercially available operating systemsor combinations of operating systems.

A mobile device can enter commands and information into the computer1002 through one or more wired/wireless input devices, e.g., a keyboard1038 and a pointing device, such as a mouse 1040. Other input devices(not shown) can include a microphone, an infrared remote control, ajoystick, a game pad, a stylus pen, touch screen or the like. These andother input devices are often connected to the processing unit 1004through an input device interface 1042 that can be coupled to the systembus 1008, but can be connected by other interfaces, such as a parallelport, an IEEE 1394 serial port, a game port, a USB port, an IRinterface, etc.

A monitor 1044 or other type of display device can be also connected tothe system bus 1008 via an interface, such as a video adapter 1046. Inaddition to the monitor 1044, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1002 can operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1048. The remotecomputer(s) 1048 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer1002, although, for purposes of brevity, only a memory/storage device1050 is illustrated. The logical connections depicted includewired/wireless connectivity to a local area network (LAN) 1052 and/orlarger networks, e.g., a wide area network (WAN) 1054. Such LAN and WANnetworking environments are commonplace in offices and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich can connect to a global communications network, e.g., theInternet.

When used in a LAN networking environment, the computer 1002 can beconnected to the local network 1052 through a wired and/or wirelesscommunication network interface or adapter 1056. The adapter 1056 canfacilitate wired or wireless communication to the LAN 1052, which canalso include a wireless AP disposed thereon for communicating with thewireless adapter 1056.

When used in a WAN networking environment, the computer 1002 can includea modem 1058 or can be connected to a communications server on the WAN1054 or has other means for establishing communications over the WAN1054, such as by way of the Internet. The modem 1058, which can beinternal or external and a wired or wireless device, can be connected tothe system bus 1008 via the input device interface 1042. In a networkedenvironment, program modules depicted relative to the computer 1002 orportions thereof, can be stored in the remote memory/storage device1050. It will be appreciated that the network connections shown areexample and other means of establishing a communications link betweenthe computers can be used.

The computer 1002 can be operable to communicate with any wirelessdevices or entities operatively disposed in wireless communication,e.g., a printer, scanner, desktop and/or portable computer, portabledata assistant, communications satellite, any piece of equipment orlocation associated with a wirelessly detectable tag (e.g., a kiosk,news stand, restroom), and telephone. This can include Wireless Fidelity(Wi-Fi) and BLUETOOTH® wireless technologies. Thus, the communicationcan be a defined structure as with a conventional network or simply anad hoc communication between at least two devices.

Wi-Fi can allow connection to the Internet from a couch at home, a bedin a hotel room or a conference room at work, without wires. Wi-Fi is awireless technology similar to that used in a sector carrier phone thatenables such devices, e.g., computers, to send and receive data indoorsand out; anywhere within the range of a BS device. Wi-Fi networks useradio technologies called IEEE 802.11 (a, b, g, n, etc.) to providesecure, reliable, fast wireless connectivity. A Wi-Fi network can beused to connect computers to each other, to the Internet, and to wirednetworks (which can use IEEE 802.3 or Ethernet). Wi-Fi networks operatein the unlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps (802.11a) or54 Mbps (802.11b) data rate, for example or with products that containboth bands (dual band), so the networks can provide real-worldperformance similar to the basic 10BaseT wired Ethernet networks used inmany offices.

The embodiments described herein can employ artificial intelligence (AI)to facilitate automating one or more features described herein. Theembodiments (e.g., in connection with automatically identifying acquiredsector carrier sites that provide a maximum value/benefit after additionto an existing communication network) can employ various AI-basedschemes for carrying out various embodiments thereof. Moreover, theclassifier can be employed to determine a ranking or priority of theeach sector carrier site of the acquired network. A classifier is afunction that maps an input attribute vector, x=(x1, x2, x3, x4, . . . ,xn), to a confidence that the input belongs to a class, that is,f(x)=confidence(class). Such classification can employ a probabilisticand/or statistical-based analysis (e.g., factoring into the analysisutilities and costs) to prognose or infer an action that a mobile devicedesires to be automatically performed. A support vector machine (SVM) isan example of a classifier that can be employed. The SVM operates byfinding a hypersurface in the space of possible inputs, which thehypersurface attempts to split the triggering criteria from thenon-triggering events. Intuitively, this makes the classificationcorrect for testing data that is near, but not identical to trainingdata. Other directed and undirected model classification approachesinclude, e.g., naïve Bayes, Bayesian networks, decision trees, neuralnetworks, fuzzy logic models, and probabilistic classification modelsproviding different patterns of independence can be employed.Classification as used herein also is inclusive of statisticalregression that is utilized to develop models of priority.

As will be readily appreciated, one or more of the embodiments canemploy classifiers that are explicitly trained (e.g., via a generictraining data) as well as implicitly trained (e.g., via observing mobiledevice behavior, operator preferences, historical information, receivingextrinsic information). For example, SVMs can be configured via alearning or training phase within a classifier constructor and featureselection module. Thus, the classifier(s) can be used to automaticallylearn and perform a number of functions, including but not limited todetermining according to a predetermined criteria which of the acquiredsector carrier sites will benefit a maximum number of subscribers and/orwhich of the acquired sector carrier sites will add minimum value to theexisting communication network coverage, etc.

As employed herein, the term “processor” can refer to substantially anycomputing processing unit or device comprising, but not limited tocomprising, single-core processors; single-processors with softwaremultithread execution capability; multi-core processors; multi-coreprocessors with software multithread execution capability; multi-coreprocessors with hardware multithread technology; parallel platforms; andparallel platforms with distributed shared memory. Additionally, aprocessor can refer to an integrated circuit, an application specificintegrated circuit (ASIC), a digital signal processor, a fieldprogrammable gate array, a programmable logic controller, a complexprogrammable logic device, a discrete gate or transistor logic, discretehardware components or any combination thereof designed to perform thefunctions described herein. Processors can exploit nano-scalearchitectures such as, but not limited to, molecular and quantum-dotbased transistors, switches and gates, in order to optimize space usageor enhance performance of mobile device equipment. A processor can alsobe implemented as a combination of computing processing units.

As used herein, terms such as “data storage,” “database,” andsubstantially any other information storage component relevant tooperation and functionality of a component, refer to “memorycomponents,” or entities embodied in a “memory” or components comprisingthe memory. It will be appreciated that the memory components orcomputer-readable storage media, described herein can be either volatilememory or nonvolatile memory or can include both volatile andnonvolatile memory.

Memory disclosed herein can include volatile memory or nonvolatilememory or can include both volatile and nonvolatile memory. By way ofillustration, and not limitation, nonvolatile memory can include readonly memory (ROM), programmable ROM (PROM), electrically programmableROM (EPROM), electrically erasable PROM (EEPROM) or flash memory.Volatile memory can include random access memory (RAM), which acts asexternal cache memory. By way of illustration and not limitation, RAM isavailable in many forms such as static RAM (SRAM), dynamic RAM,synchronous dynamic RAM, double data rate synchronous dynamic RAM,enhanced synchronous dynamic RAM, synchlink dynamic RAM, and directrambus RAM. The memory (e.g., data storages, databases) of theembodiments are intended to comprise, without being limited to, theseand any other suitable types of memory.

What has been described above includes mere examples of variousembodiments. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing these examples, but one of ordinary skill in the art canrecognize that many further combinations and permutations of the presentembodiments are possible. Accordingly, the embodiments disclosed and/orclaimed herein are intended to embrace all such alterations,modifications and variations that fall within the spirit and scope ofthe appended claims. Furthermore, to the extent that the term “includes”is used in either the detailed description or the claims, such term isintended to be inclusive in a manner similar to the term “comprising” as“comprising” is interpreted when employed as a transitional word in aclaim.

What is claimed is:
 1. A method, comprising: determining, by a devicecomprising a processor, whether to transmit information to a networkdevice of a network with which the device is associated to cause thedevice to be transferred from a first wireless communication system to asecond wireless communication system; and responsive to a result of thedetermining, reducing, by the device, power emitted from the device to apower level at which a reduced power emitted from the device isdetermined to satisfy a first condition, wherein the reducing is basedon a location of the device determined relative to a region of regionsof a body of a user, and wherein the region is determined based on asignal value of the device of signal values using a data structure thatmaps the regions of the body to the signal values.
 2. The method ofclaim 1, further comprising: detecting, by the device, that the locationof the device is within a defined proximity to an edge device associatedwith a cell device with which the device is associated.
 3. The method ofclaim 1, further comprising: determining, by the device, the location ofthe device relative to the region of the regions of the body.
 4. Themethod of claim 1, further comprising: determining, by the device,whether an application being executed by the device is designated as anapplication of a first type, and determining, by the device, whether acharacteristic of the network satisfies a second condition.
 5. Themethod of claim 4, wherein the determining whether to transmit theinformation to cause the device to be transferred from the firstwireless communication system to the second wireless communicationsystem comprises: determining not to transmit the information to causethe device to be transferred from the first wireless communicationsystem to the second wireless communication system based on theapplication being executed being determined to be designated as theapplication of the first type.
 6. The method of claim 5, furthercomprising: selectively bundling, by the device, the information asbundled information to be transmitted by the device, based on thedetermining not to transmit the information; and updating, by thedevice, an operation to an idle mode operation based on the selectivelybundling.
 7. The method of claim 6, wherein the determining whether thecharacteristic of the network satisfies the second condition comprisesdetermining that the characteristic of the network satisfies the secondcondition, and further comprising: changing, by the device, theoperation to an active mode operation based on the characteristic of thenetwork being determined to satisfy the second condition; andtransmitting, by the device, the bundled information to the network. 8.The method of claim 4, wherein the determining whether to transmit theinformation to cause the device to be transferred from the firstwireless communication system to the second wireless communicationsystem comprises: determining to transmit the information to cause thedevice to be transferred from the first wireless communication system tothe second wireless communication system based on determining that theapplication being executed is a real-time application.
 9. The method ofclaim 8, wherein the information comprises indicator informationindicating that the power emitted from the device satisfies the firstcondition, and further comprising: transmitting, by the device to thenetwork device, the indicator information indicating that the poweremitted from the device satisfies the first condition, wherein thetransmitting is in response to the determining to transmit theinformation to cause the device to be transferred from the firstwireless communication system to the second wireless communicationsystem.
 10. The method of claim 4, wherein the determining whether totransmit the information to cause the device to be transferred from thefirst wireless communication system to the second wireless communicationsystem comprises: determining to transmit the information to cause thedevice to be transferred from the first wireless communication system tothe second wireless communication system based on determining that thecharacteristic of the network fails to satisfy the second condition. 11.The method of claim 10, further comprising: transmitting, by the deviceto the network, indicator information indicating that the power emittedfrom the device is less than the first condition, wherein thetransmitting is in response to the determining to transmit theinformation to cause the device to be transferred from the firstwireless communication system to the second wireless communicationsystem.
 12. The method of claim 1, wherein the second wirelesscommunication system communicates according to a universal mobiletelecommunications system protocol.
 13. The method of claim 1, whereinthe first wireless communication system communicates according to a longterm evolution system protocol.
 14. The method of claim 1, wherein thedetermining whether to transmit the information to cause the device tobe transferred from the first wireless communication system to thesecond wireless communication system comprises determining to transmitthe information to cause the device to be transferred as to befacilitated by the network device from the first wireless communicationsystem to the second wireless communication system.
 15. A system,comprising: a processor; and a memory that stores executableinstructions that, when executed by the processor, facilitateperformance of operations, comprising: determining to forego for adefined amount of time performing an action to cause the system to betransferred from a first wireless communication system to a secondwireless communication system based on a defined characteristic ofnetwork devices of a network and a defined characteristic of anapplication being executed by the system being determined to satisfy afirst defined condition; performing selective bundling of information tobe transmitted from the system; determining a region of regions of abody that is using the system based on a signal value, of possiblesignal values, associated with the system comprising determining theregion from a data structure that maps the possible signal values to theregions of the body; and responsive to the selective bundling, reducinga power emitted by the system, resulting in a reduced power less thanthe power, based on detecting a location of the system relative to theregion of the body determined to be using the system.
 16. The system ofclaim 15, wherein the operations further comprise: detecting thelocation of the system relative to the region of the body determined tobe using the system.
 17. The system of claim 15, wherein the operationsfurther comprise: changing a mode of operation of the system to idlemode in response to the performing the selective bundling.
 18. Thesystem of claim 15, wherein the defined characteristic of the networkcomprises information indicative of whether an uplink from the systemsatisfies a second defined condition.
 19. A computer-readable storagedevice storing executable instructions that, in response to execution,cause a system comprising a processor to perform operations, comprising:after a determination of whether to transmit information to a networkdevice of a network, adjusting a power emitted from the system to anadjusted power determined to satisfy a first condition, wherein theadjusting is based on a location of the system, carried on a body of auser, relative to a region of the body of the user associated with anidentity determined to have interacted with the system, and wherein theregion of the body is determined to have interacted with the systembased on a signal value of the system and using a data structure thatmaps signal values of the system, comprising the signal value, toregions of the body, comprising the region; and evaluating acharacteristic of network devices of a network with which the system isassociated and an application being executed by the system.
 20. Thecomputer-readable storage device of claim 19, wherein the evaluatingfurther comprises: determining to forego transmission of information tocause the system to be transferred from a first wireless communicationsystem to a second wireless communication system based on determiningthat the application being executed is designated as a type ofapplication having a lower priority than a priority of another type ofapplication.