Adjusting scanning period interval conducted by a dual connectivity capable communication device for 5g or other next generation wireless network

ABSTRACT

Measurement procedures are provided for a communication device. For instance, a system that comprises determining a probability value, wherein the probability value indicates a likelihood of a communication device, connected to a first network node device, connecting to a second network node device with attempts below a first threshold. The system can also comprise determining a scanning period interval value based on the probability value, used by the communication device, to adjust a scanning procedure usable for establishment of a connection with the second network node device, and requesting the communication device to utilize the scanning period interval value during the establishment of the connection with the second network node device.

TECHNICAL FIELD

This disclosure relates generally to measurement procedure for acommunication device. More specifically, facilitating adjusting scanningperiod interval conducted by a communication device capable of dualconnectivity, e.g., for 5th generation (5G) or other next generationwireless network.

BACKGROUND

5G wireless systems represent a next major phase of mobiletelecommunications standards beyond the current telecommunicationsstandards of 4^(th) generation (4G). In addition to faster peak Internetconnection speeds, 5G planning aims at higher capacity than current 4G,allowing a higher number of mobile broadband users per area unit, andallowing consumption of higher or unlimited data quantities. As 5Gnetwork nodes are deployed, the core network utilizes 4G network nodesand the 5G network nodes for transferring data. A user equipment (US)capable of dual connectivity can utilize a 4G network node (e.g.,eNodeB) and the 5G network node (e.g., gNodeB). A communication devicecapable of dual connectivity can be connected to, for example 4G networknode and while connected can conduct measurements to identify, forexample 5G network node. Conducting additional measurements frequentlycan drain battery charge.

The above-described background relating to relating dual connectivity,measurements and impact of frequent measurements, is merely intended toprovide a contextual overview of some current issues, and is notintended to be exhaustive (e.g., although problems and solution aredirected to next generation networks such as 5G, the solutions can beapplied to 4G/LTE technologies). Other contextual information may becomefurther apparent upon review of the following detailed description.

BRIEF DESCRIPTION OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments of the subject disclosureare described with reference to the following figures, wherein likereference numerals refer to like parts throughout the various viewsunless otherwise specified.

FIG. 1 illustrates a non-limiting example of a wireless communicationsystem in accordance with various aspects and embodiments of the subjectdisclosure.

FIG. 2 illustrates an example network architecture for a new radio withdual connectivity in accordance with various aspects and embodimentsdescribed herein.

FIG. 3A illustrates an example network architecture for a new radio withdual connectivity in accordance with various aspects and embodimentsdescribed herein.

FIG. 3B illustrates an example network architecture for a new radio withdual connectivity in accordance with various aspects and embodimentsdescribed herein.

FIG. 4 illustrates an exemplary communication between core network andnetwork nodes of new radio with dual connectivity in accordance withvarious aspects and embodiments described herein.

FIG. 5 depicts a diagram of an example, non-limiting computerimplemented method that facilitates adjusting scanning period intervalconducted by a communication device capable of dual connectivity inaccordance with one or more embodiments described herein.

FIG. 6 depicts a diagram of an example, non-limiting computerimplemented method that facilitates adjusting scanning period intervalconducted by a communication device capable of dual connectivity inaccordance with one or more embodiments described herein.

FIG. 7 depicts a diagram of an example, non-limiting computerimplemented method that facilitates adjusting scanning period intervalconducted by a communication device capable of dual connectivity inaccordance with one or more embodiments described herein.

FIG. 8 illustrates an example block diagram of an example mobile handsetoperable to engage in a system architecture that facilitates wirelesscommunications according to one or more embodiments described herein.

FIG. 9 illustrates an example block diagram of an example computeroperable to engage in a system architecture that facilitates securewireless communication according to one or more embodiments describedherein.

DETAILED DESCRIPTION

In the following description, numerous specific details are set forth toprovide a thorough understanding of various embodiments. One skilled inthe relevant art will recognize, however, that the techniques describedherein can be practiced without one or more of the specific details, orwith other methods, components, materials, etc. In other instances,well-known structures, materials, or operations are not shown ordescribed in detail to avoid obscuring certain aspects.

Reference throughout this specification to “one embodiment,” or “anembodiment,” means that a particular feature, structure, orcharacteristic described in connection with the embodiment is includedin at least one embodiment. Thus, the appearances of the phrase “in oneembodiment,” “in one aspect,” or “in an embodiment,” in various placesthroughout this specification are not necessarily all referring to thesame embodiment. Furthermore, the particular features, structures, orcharacteristics may be combined in any suitable manner in one or moreembodiments.

As utilized herein, terms “component,” “system,” “interface,” and thelike are intended to refer to a computer-related entity, hardware,software (e.g., in execution), and/or firmware. For example, a componentcan be a processor, a process running on a processor, an object, anexecutable, a program, a storage device, and/or a computer. By way ofillustration, an application running on a server and the server can be acomponent. One or more components can reside within a process, and acomponent can be localized on one computer and/or distributed betweentwo or more computers.

Further, these components can execute from various machine-readablemedia having various data structures stored thereon. The components cancommunicate via local and/or remote processes such as in accordance witha signal having one or more data packets (e.g., data from one componentinteracting with another component in a local system, distributedsystem, and/or across a network, e.g., the Internet, a local areanetwork, a wide area network, etc. with other systems via the signal).

As another example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry; the electric or electronic circuitry can beoperated by a software application or a firmware application executed byone or more processors; the one or more processors can be internal orexternal to the apparatus and can execute at least a part of thesoftware or firmware application. As yet another example, a componentcan be an apparatus that provides specific functionality throughelectronic components without mechanical parts; the electroniccomponents can include one or more processors therein to executesoftware and/or firmware that confer(s), at least in part, thefunctionality of the electronic components. In an aspect, a componentcan emulate an electronic component via a virtual machine, e.g., withina cloud computing system.

The words “exemplary” and/or “demonstrative” are used herein to meanserving as an example, instance, or illustration. For the avoidance ofdoubt, the subject matter disclosed herein is not limited by suchexamples. In addition, any aspect or design described herein as“exemplary” and/or “demonstrative” is not necessarily to be construed aspreferred or advantageous over other aspects or designs, nor is it meantto preclude equivalent exemplary structures and techniques known tothose of ordinary skill in the art. Furthermore, to the extent that theterms “includes,” “has,” “contains,” and other similar words are used ineither the detailed description or the claims, such terms are intendedto be inclusive—in a manner similar to the term “comprising” as an opentransition word—without precluding any additional or other elements.

As used herein, the term “infer” or “inference” refers generally to theprocess of reasoning about, or inferring states of, the system,environment, user, and/or intent from a set of observations as capturedvia events and/or data. Captured data and events can include user data,device data, environment data, data from sensors, sensor data,application data, implicit data, explicit data, etc. Inference can beemployed to identify a specific context or action, or can generate aprobability distribution over states of interest based on aconsideration of data and events, for example.

Inference can also refer to techniques employed for composinghigher-level events from a set of events and/or data. Such inferenceresults in the construction of new events or actions from a set ofobserved events and/or stored event data, whether the events arecorrelated in close temporal proximity, and whether the events and datacome from one or several event and data sources. Various classificationschemes and/or systems (e.g., support vector machines, neural networks,expert systems, Bayesian belief networks, fuzzy logic, and data fusionengines) can be employed in connection with performing automatic and/orinferred action in connection with the disclosed subject matter.

In addition, the disclosed subject matter can be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques to produce software, firmware, hardware,or any combination thereof to control a computer to implement thedisclosed subject matter. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device, machine-readable device, computer-readablecarrier, computer-readable media, or machine-readable media. Forexample, computer-readable media can include, but are not limited to, amagnetic storage device, e.g., hard disk; floppy disk; magneticstrip(s); an optical disk (e.g., compact disk (CD), a digital video disc(DVD), a Blu-ray Disc™ (BD)); a smart card; a flash memory device (e.g.,card, stick, key drive); and/or a virtual device that emulates a storagedevice and/or any of the above computer-readable media.

As an overview, various embodiments are described herein to facilitateadjusting scanning period interval conducted by a communication devicecapable of dual connectivity. For simplicity of explanation, the methods(or algorithms) are depicted and described as a series of acts. It is tobe understood and appreciated that the various embodiments are notlimited by the acts illustrated and/or by the order of acts. Forexample, acts can occur in various orders and/or concurrently, and withother acts not presented or described herein. Furthermore, not allillustrated acts may be required to implement the methods. In addition,the methods could alternatively be represented as a series ofinterrelated states via a state diagram or events. Additionally, themethods described hereafter are capable of being stored on an article ofmanufacture (e.g., a machine-readable storage medium) to facilitatetransporting and transferring such methodologies to computers. The termarticle of manufacture, as used herein, is intended to encompass acomputer program accessible from any computer-readable device, carrier,or media, including a non-transitory machine-readable storage medium.

It should be noted that although various aspects and embodiments havebeen described herein in the context of 5G, Universal MobileTelecommunications System (UMTS), and/or Long-Term Evolution (LTE), orother next generation networks, the disclosed aspects are not limited to5G, a UMTS implementation, and/or an LTE implementation as thetechniques can also be applied in 3G, 4G or other LTE systems. Forexample, aspects or features of the disclosed embodiments can beexploited in substantially any wireless communication technology. Suchwireless communication technologies can include UMTS, Code DivisionMultiple Access (CDMA), Wi-Fi, Worldwide Interoperability for MicrowaveAccess (WiMAX), General Packet Radio Service (GPRS), Enhanced GPRS,Third Generation Partnership Project (3GPP), LTE, Third GenerationPartnership Project 2 (3GPP2) Ultra Mobile Broadband (UMB), High SpeedPacket Access (HSPA), Evolved High Speed Packet Access (HSPA+),High-Speed Downlink Packet Access (HSDPA), High-Speed Uplink PacketAccess (HSUPA), Zigbee, or another IEEE 802.XX technology. Additionally,substantially all aspects disclosed herein can be exploited in legacytelecommunication technologies.

Described herein are systems, methods, articles of manufacture, andother embodiments or implementations that can facilitate adjustingscanning period interval conducted by a communication device capable ofdual connectivity. Facilitating adjusting scanning period intervalconducted by a communication device capable of dual connectivity can beimplemented in connection with any type of device with a connection tothe communications network (e.g., a mobile handset, a computer, ahandheld device, etc.) any Internet of Things (IoT) device (e.g.,toaster, coffee maker, blinds, music players, speakers, etc.), and/orany connected vehicles (cars, airplanes, space rockets, and/or other atleast partially automated vehicles (e.g., drones)). In some embodimentsthe non-limiting term user equipment (UE) is used. It can refer to anytype of wireless device that communicates with a radio network node in acellular or mobile communication system. Examples of UE are targetdevice, device to device (D2D) UE, machine type UE or UE capable ofmachine to machine (M2M) communication, PDA, Tablet, mobile terminals,smart phone, laptop embedded equipped (LEE), laptop mounted equipment(LME), USB dongles, etc. Note that the terms element, elements andantenna ports can be interchangeably used but carry the same meaning inthis disclosure. The embodiments are applicable to single carrier aswell as to multicarrier (MC) or carrier aggregation (CA) operation ofthe UE. The term carrier aggregation (CA) is also called (e.g.,interchangeably called) “multi-carrier system”, “multi-cell operation”,“multi-carrier operation”, “multi-carrier” transmission and/orreception.

In some embodiments the non-limiting term radio, network node device, orsimply network node is used. It can refer to any type of network nodethat serves UE is connected to other network nodes or network elementsor any radio node from where UE receives a signal. Examples of radionetwork nodes are Node B, base station (BS), multi-standard radio (MSR)node such as MSR BS, evolved Node B (eNB or eNodeB), next generationNode B (gNB or gNodeB), network controller, radio network controller(RNC), base station controller (BSC), relay, donor node controllingrelay, base transceiver station (BTS), access point (AP), transmissionpoints, transmission nodes, remote radio unit (RRU), remote radio head(RRH), nodes in distributed antenna system (DAS), relay device, networknode, node device, etc.

Cloud radio access networks (RAN) can enable the implementation ofconcepts such as software-defined network (SDN) and network functionvirtualization (NFV) in 5G networks. This disclosure can facilitate ageneric channel state information framework design for a 5G network.Certain embodiments of this disclosure can comprise an SDN controller(e.g., controller, central controller, or centralized unit) that cancontrol routing of traffic within the network and between the networkand traffic destinations. The SDN controller can be merged with the 5Gnetwork architecture to enable service deliveries via open applicationprogramming interfaces (“APIs”) and move the network core towards an allinternet protocol (“IP”), cloud based, and software driventelecommunications network. The SDN controller can work with or take theplace of policy and charging rules function (“PCRF”) network elements sothat policies such as quality of service and traffic management androuting can be synchronized and managed end to end.

3GPP LTE-eNB triggers inter-frequency/inter-RAT measurement when signalpower (RSRP) of serving frequency is below a pre-defined threshold(e.g., B1_Threshold). There are no standards for adjusting B1_Thresholdon a 4G/5G Dual Connectivity Network. A methodology to adjust inter-RATmeasuring procedure in a 4G/5G E-UTRAN new radio-dual connectivity(EN-DC) network is described. Proposed solution aims at improvingtraffic offloading to 5G while reducing signal overhead and batterydrainage.

Transferring of data is split between LTE and 5G, control ofdual-connectivity is always in the hands of the eNB. A 5G EN-DC UEconsists of: LTE unit (RX/TX radio+protocol stack) and additional 5Gunit (RX/TX radio+protocol stack), thus the 5G EN-DC UEs can receivedata from LTE and 5G simultaneously, which increase data rate. When UEwants to exchange data with the network it establishes a connection withthe LTE network. If the eNB has an ‘integrated’ gNB and if the UEindicates support for EN-DC on the frequency band the gNB is operatedon, the LTE eNB will instruct the UE to make measurements on the 5Gchannel. If UE finds a candidate gNB, the eNB will then communicate tothe gNB and give it all necessary parameters to establish a connectionto the UE as well. Once the gNB confirms the connection setup, the eNBwill then forward a part of the incoming user data the gNB fortransmission to the UE. Optionally, the eNB can then ask the corenetwork S-GW to directly exchange user data with the gNB. In this casethe gNB will then forward a part of the user data to the eNB.

Smart selection of B1-Threshold for secondary gNB (SgNB) addition iscritical to allow traffic offload to 5G. Aggressive B1-Threshold mayyield to higher likelihood to detect SgNB. However, UE battery may drainfaster, and UE throughput may deteriorate. On the other hand, relaxedB1-Threshold may yield to lower likelihood to detect SgNB (especially ifgNBs are not located at eNB-cell edge), and less impact on UE batterylife and UE throughput.

In some embodiments, a central node global control located on the corenetwork (e.g., mobile edge compute (MEC), self-organized network (SON)or RAN intelligent controller (RIC)) is utilized for adjusting scanningperiod interval conducted by a communication device capable of dualconnectivity. The central node (e.g., a processor of a device comprisingset of instructions) keeps track of the 5G gNB deployment and locationin comparison to LTE eNBs. The central node estimates the likelihoodthat a UE, attached to eNB, is within the gNB coverage. For example,based on gNB coverage area and location of the UE, estimating aprobability value (y) indicating a likelihood of the UE connecting to agNB. If the y is high (e.g. above a pre-defined threshold), the centralnode can command eNB to send updated B1_Threshold and Inter-RATmeasuring gap pattern to the UE. Updated values should be moreaggressive to encourage gNB detection, e.g., B1_Threshold=−80 db, andMeasurement Gap pattern=0. If the y is low (e.g., below a pre-definedthreshold) the central node can command eNB to send a more relaxedB1_Threshold and Inter-RAT measuring gap to the UE. Conversely,algorithm can decide not to update these values (B1_Threshold areusually selected to only trigger at cell edge, e.g. B1_Threshold=−120db). It should be noted that aggressive B1_Threshold and Inter-RATmeasuring gap pattern may impact UE throughput, since UE requests tostop TX & RX activities during measuring gaps. Therefore, proposedsolutions herein take into consideration the UEthroughput/application-requirements when selecting y.

In some embodiments, based on the estimation, if the likelihood that aUE will connect to a gNB, then the central node adjusts frequency ofmeasurement conducted by a communication device capable of dualconnectivity. The B1-Theshold may be used to determine the likelihood ofsuccessful connection to gNB. In some embodiments, the cental node mayadjust B1-Threshold based on the likelihood that a given UE is withinthe gNB coverage, based on multiple conditions.

In some embodiments, estimate y based on eNB vs gNB overlappingcoverage. For xample, eNB covers area size A and 2 gNB deployed withinits coverage, each gNB covers area size a, thus for all UEs attached toeNB set y=2*a/A.

In some embodiments, estimate y based on UE reporting and estimated gNBcoverage. eNB sets y=AGGRESSIVE at early stage of the gNB deployment forall UEs. Some UEs will then detect and report gNBs, algorithm willcollect UE GPS location and gNB signal strength. Algorithm will estimategNB footprint within eNB coverage based on these reports. Once this isdone, algorithm will command eNB to change y to RELAXED for all UEs, andcreate customize y for each UE based on its current location and gNBcoverage.

In some embodiments, utilize UE throughput/application-requirementstogether with either estimating based on overlapping coverage orestimate based on UE reporting. Example, If UE is engaged in VoLTE calland higher data rate is not needed, use y=RELAXED. After call has ended,estimate y based on either estimating based on overlapping coverage orestimate based on UE reporting.

In some embodiments, if the UE has high mobility then set the y=RELAXED,because it is not necessary that UE attach to 5G cell since it is goingto handover to another cell soon (signaling overhead, and batterydrainage).

According an embodiment, a system can comprise a processor and a memorythat stores executable instructions that, when executed by theprocessor, facilitate performance of operations comprising based on afirst network node coverage area and a location of a communicationdevice, estimating a probability value indicating a likelihood of thecommunication device connecting to a first network node device. Thesystem can further facilitate based on the probability value,determining a scanning period interval value used by the communicationdevice during a scanning procedure to establish a connection with thefirst network node device and facilitate requesting the communicationdevice to utilize the scanning period interval value duringestablishment of the connection with the first network node device.

According to another embodiment, described herein is a method that cancomprise estimating, by a device comprising a processor, a valueindicating a likelihood of a communication device connecting to a firstnetwork node device, wherein the value is estimated based on a firstnetwork node coverage area and a location of the communication device.The method can further comprise determining, by the device, based on thevalue, a scanning period interval value utilized by a scanning procedureto establish a connection from the communication device to the firstnetwork node device. The method can further comprise communicating, bythe device, the scanning period interval value to the communicationdevice and requesting, by the device, the communication device to adjustthe scanning procedure.

According to yet another embodiment, a device can comprise a processorand a memory that stores executable instructions that, when executed bythe processor, facilitate performance of operations comprisingdetermining a probability value, wherein the probability value indicatesa likelihood of a communication device, connected to a first networknode device, connecting to a second network node device with attemptsbelow a first threshold. The device can further comprise determining ascanning period interval value based on the probability value, used bythe communication device, to adjust a scanning procedure usable forestablishment of a connection with the second network node device, andrequesting the communication device to utilize the scanning periodinterval value during the establishment of the connection with thesecond network node device.

These and other embodiments or implementations are described in moredetail below with reference to the drawings. Repetitive description oflike elements employed in the figures and other embodiments describedherein is omitted for sake of brevity.

FIG. 1 illustrates a non-limiting example of a wireless communicationsystem 100 in accordance with various aspects and embodiments of thesubject disclosure. In one or more embodiments, system 100 can compriseone or more user equipment UEs 102. The non-limiting term user equipment(UE) can refer to any type of device that can communicate with a networknode in a cellular or mobile communication system. A UE can have one ormore antenna panels having vertical and horizontal elements. Examples ofa UE comprise a target device, device to device (D2D) UE, machine typeUE or UE capable of machine to machine (M2M) communications, personaldigital assistant (PDA), tablet, mobile terminals, smart phone, laptopmounted equipment (LME), universal serial bus (USB) dongles enabled formobile communications, a computer having mobile capabilities, a mobiledevice such as cellular phone, a laptop having laptop embedded equipment(LEE, such as a mobile broadband adapter), a tablet computer having amobile broadband adapter, a wearable device, a virtual reality (VR)device, a heads-up display (HUD) device, a smart car, a machine-typecommunication (MTC) device, and the like. User equipment UE 102 can alsocomprise IOT devices that communicate wirelessly.

In various embodiments, system 100 is or comprises a wirelesscommunication network serviced by one or more wireless communicationnetwork providers. In example embodiments, a UE 102 can becommunicatively coupled to the wireless communication network via anetwork node 104. The network node (e.g., network node device) cancommunicate with user equipment (UE), thus providing connectivitybetween the UE and the wider cellular network. The UE 102 can sendtransmission type recommendation data to the network node 104. Thetransmission type recommendation data can comprise a recommendation totransmit data via a closed loop MIMO mode and/or a rank-1 precoder mode.

A network node can have a cabinet and other protected enclosures, anantenna mast, and multiple antennas for performing various transmissionoperations (e.g., MIMO operations). Network nodes can serve severalcells, also called sectors, depending on the configuration and type ofantenna. In example embodiments, the UE 102 can send and/or receivecommunication data via a wireless link to the network node 104. Thedashed arrow lines from the network node 104 to the UE 102 representdownlink (DL) communications and the solid arrow lines from the UE 102to the network nodes 104 represents an uplink (UL) communication.

System 100 can further include one or more communication serviceprovider networks 106 that facilitate providing wireless communicationservices to various UEs, including UE 102, via the network node 104and/or various additional network devices (not shown) included in theone or more communication service provider networks 106. The one or morecommunication service provider networks 106 can include various types ofdisparate networks, including but not limited to: cellular networks,femto networks, picocell networks, microcell networks, internet protocol(IP) networks Wi-Fi service networks, broadband service network,enterprise networks, cloud based networks, millimeter wave networks andthe like. For example, in at least one implementation, system 100 can beor include a large scale wireless communication network that spansvarious geographic areas. According to this implementation, the one ormore communication service provider networks 106 can be or include thewireless communication network and/or various additional devices andcomponents of the wireless communication network (e.g., additionalnetwork devices and cell, additional UEs, network server devices, etc.).The network node 104 can be connected to the one or more communicationservice provider networks 106 via one or more backhaul links 108. Forexample, the one or more backhaul links 108 can comprise wired linkcomponents, such as a T1/E1 phone line, a digital subscriber line (DSL)(e.g., either synchronous or asynchronous), an asymmetric DSL (ADSL), anoptical fiber backbone, a coaxial cable, and the like. The one or morebackhaul links 108 can also include wireless link components, such asbut not limited to, line-of-sight (LOS) or non-LOS links which caninclude terrestrial air-interfaces or deep space links (e.g., satellitecommunication links for navigation).

Wireless communication system 100 can employ various cellular systems,technologies, and modulation modes to facilitate wireless radiocommunications between devices (e.g., the UE 102 and the network node104). While example embodiments might be described for 5G new radio (NR)systems, the embodiments can be applicable to any radio accesstechnology (RAT) or multi-RAT system where the UE operates usingmultiple carriers e.g. LTE FDD/TDD, GSM/GERAN, CDMA2000 etc.

For example, system 100 can operate in accordance with global system formobile communications (GSM), universal mobile telecommunications service(UMTS), long term evolution (LTE), LTE frequency division duplexing (LTEFDD, LTE time division duplexing (TDD), high speed packet access (HSPA),code division multiple access (CDMA), wideband CDMA (WCMDA), CDMA2000,time division multiple access (TDMA), frequency division multiple access(FDMA), multi-carrier code division multiple access (MC-CDMA),single-carrier code division multiple access (SC-CDMA), single-carrierFDMA (SC-FDMA), orthogonal frequency division multiplexing (OFDM),discrete Fourier transform spread OFDM (DFT-spread OFDM) single carrierFDMA (SC-FDMA), Filter bank based multi-carrier (FBMC), zero tailDFT-spread-OFDM (ZT DFT-s-OFDM), generalized frequency divisionmultiplexing (GFDM), fixed mobile convergence (FMC), universal fixedmobile convergence (UFMC), unique word OFDM (UW-OFDM), unique wordDFT-spread OFDM (UW DFT-Spread-OFDM), cyclic prefix OFDM CP-OFDM,resource-block-filtered OFDM, Wi Fi, WLAN, WiMax, and the like. However,various features and functionalities of system 100 are particularlydescribed wherein the devices (e.g., the UEs 102 and the network device104) of system 100 are configured to communicate wireless signals usingone or more multi carrier modulation schemes, wherein data symbols canbe transmitted simultaneously over multiple frequency subcarriers (e.g.,OFDM, CP-OFDM, DFT-spread OFMD, UFMC, FMBC, etc.). The embodiments areapplicable to single carrier as well as to multicarrier (MC) or carrieraggregation (CA) operation of the UE. The term carrier aggregation (CA)is also called (e.g. interchangeably called) “multi-carrier system”,“multi-cell operation”, “multi-carrier operation”, “multi-carrier”transmission and/or reception. Note that some embodiments are alsoapplicable for Multi RAB (radio bearers) on some carriers (that is dataplus speech is simultaneously scheduled).

In various embodiments, system 100 can be configured to provide andemploy 5G wireless networking features and functionalities. 5G wirelesscommunication networks are expected to fulfill the demand ofexponentially increasing data traffic and to allow people and machinesto enjoy gigabit data rates with virtually zero latency. Compared to 4G,5G supports more diverse traffic scenarios. For example, in addition tothe various types of data communication between conventional UEs (e.g.,phones, smartphones, tablets, PCs, televisions, Internet enabledtelevisions, etc.) supported by 4G networks, 5G networks can be employedto support data communication between smart cars in association withdriverless car environments, as well as machine type communications(MTCs). Considering the drastic different communication demands of thesedifferent traffic scenarios, the ability to dynamically configurewaveform parameters based on traffic scenarios while retaining thebenefits of multi carrier modulation schemes (e.g., OFDM and relatedschemes) can provide a significant contribution to the highspeed/capacity and low latency demands of 5G networks. With waveformsthat split the bandwidth into several sub-bands, different types ofservices can be accommodated in different sub-bands with the mostsuitable waveform and numerology, leading to an improved spectrumutilization for 5G networks.

To meet the demand for data centric applications, features of proposed5G networks may comprise: increased peak bit rate (e.g., 20 Gbps),larger data volume per unit area (e.g., high system spectralefficiency—for example about 3.5 times that of spectral efficiency oflong term evolution (LTE) systems), high capacity that allows moredevice connectivity both concurrently and instantaneously, lowerbattery/power consumption (which reduces energy and consumption costs),better connectivity regardless of the geographic region in which a useris located, a larger numbers of devices, lower infrastructuraldevelopment costs, and higher reliability of the communications. Thus,5G networks may allow for: data rates of several tens of megabits persecond should be supported for tens of thousands of users, 1 gigabit persecond to be offered simultaneously to tens of workers on the sameoffice floor, for example; several hundreds of thousands of simultaneousconnections to be supported for massive sensor deployments; improvedcoverage, enhanced signaling efficiency; reduced latency compared toLTE.

The upcoming 5G access network may utilize higher frequencies (e.g., >6GHz) to aid in increasing capacity. Currently, much of the millimeterwave (mmWave) spectrum, the band of spectrum between 30 GHz and 300 GHzis underutilized. The millimeter waves have shorter wavelengths thatrange from 10 millimeters to 1 millimeter, and these mmWave signalsexperience severe path loss, penetration loss, and fading. However, theshorter wavelength at mmWave frequencies also allows more antennas to bepacked in the same physical dimension, which allows for large-scalespatial multiplexing and highly directional beamforming.

Performance can be improved if both the transmitter and the receiver areequipped with multiple antennas. Multi-antenna techniques cansignificantly increase the data rates and reliability of a wirelesscommunication system. The use of multiple input multiple output (MIMO)techniques, which was introduced in the third-generation partnershipproject (3GPP) and has been in use (including with LTE), is amulti-antenna technique that can improve the spectral efficiency oftransmissions, thereby significantly boosting the overall data carryingcapacity of wireless systems. The use of multiple-input multiple-output(MIMO) techniques can improve mmWave communications, and has been widelyrecognized a potentially important component for access networksoperating in higher frequencies. MIMO can be used for achievingdiversity gain, spatial multiplexing gain and beamforming gain. Forthese reasons, MIMO systems are an important part of the 3rd and 4thgeneration wireless systems, and are planned for use in 5G systems.

FIG. 2 illustrates an example network architecture 200 for an E-UTRANnew radio dual connectivity in accordance with various aspects andembodiments described herein. For example, the network 200, comprises agNB 202 (e.g., a 5G network node device or base station) and an eNB 204(e.g., LTE network node device or base station), both can becommunicative connected to and use the LTE core network 206. The LTE eNB204 can be referred to primary eNB to indicate that is the primarynetwork node device controlling secondary 5G NR base station (e.g.,SgNB). In the exemplary network architecture 200, S1 interface 208 and210 are utilized to communicate with core network 206. X2 interfaces 212a and 212 b are utilized to communicate between eNB 204 and gNB 202. AUE 220 capable of dual connectivity is able to receive data from eNB 204over primary interface 214 and from gNB over secondary interface 216. Insome embodiments, the UE 220 in attached to eNB 204 as the primary basestation.

FIG. 3A illustrates an example network architecture 300 for an E-UTRANnew radio dual connectivity in accordance with various aspects andembodiments described herein. As illustrated, the gNB provides NRmeasurement configurations 312 to UE via eNB 204 using X2 interface 212a (e.g., interface between gNB 202 and eNB 204) and primary interface214 (e.g., interface between eNB 204 and UE 220).

FIG. 3B illustrates an example network architecture 300 for an E-UTRANnew radio dual connectivity in accordance with various aspects andembodiments described herein. As illustrated, the gNB can receive RRC 5Gmeasurement report 352 from UE 220 indirectly over eNB 204 via X2AP:RRCtransfer message using primary interface 214 and the X2 interface 212 b.

FIG. 4 illustrates an exemplary communication 400 between core networkand network nodes of E-UTRAN new radio dual connectivity networkarchitecture in accordance with various aspects and embodimentsdescribed herein. As illustrated, the eNB 204 has a primarycommunication coverage area 406. Within the primary communicationcoverage area 406, there is a gNB 202 which has a secondarycommunication coverage area 408. The UE 220 operating in the primarycommunication coverage area 406 may be able receive data from both eNB204 and gNB 202 if the UE 220 has dual connectivity and is able toconnect to gNB 202. Both eNB 204 and gNB 202 are communicativelyconnected to a core network 420 (e.g., MEC, SON or RIC). The corenetwork 420 comprises a policy component 422 and Bayesian DeepReinforcement Learning (BDRL) component 424 which are communicativelyconnected to a global scheduler 426 and a global control component 428.In some embodiments, the global control component 428 tracks 5G gNBdeployment and location in comparison to LTE eNBs. The BDRL component424 determines the likelihood that given UE 220, which is attached tothe eNB 204, is within the gNB 202 coverage area (e.g., secondarycommunication coverage area 408). If the likelihood of UE 220 connectingto the gNB is high, then the global scheduler 426 can adjust thefrequency of measurements conducted by the UE 220 to be aggressive(e.g., aggressive measurements—constantly taking measurements untilconnection is established). Otherwise, the global scheduler 426 canadjust the frequency of measurements conducted by the UE 220 to berelaxed (e.g., relaxed measurements—minimal to no measurementconducted). In several embodiments, the components, for example, globalcontrol component 428, can comprise one or more computer and/or machinereadable, writable, and/or executable components and/or instructionsthat, when executed by a processor, can facilitate performance ofoperations defined by such component(s) and/or instruction(s).

It should be appreciated that the embodiments of the subject disclosuredepicted in various figures disclosed herein are for illustration only,and as such, the architecture of such embodiments are not limited to thesystems, devices, and/or components depicted therein. For example, insome embodiments the global control component 428 can comprise variouscomputer and/or computing-based elements described herein with referenceto operating environment 900 and FIG. 9. In several embodiments, suchcomputer and/or computing-based elements can be used in connection withimplementing one or more of the systems, devices, and/or componentsshown and described in connection with FIG. 4 or other figures disclosedherein.

FIG. 5 depicts a diagram of an example, non-limiting computerimplemented method that facilitates adjusting scanning period intervalconducted by a communication device capable of dual connectivity inaccordance with one or more embodiments described herein. In someexamples, flow diagram 500 can be implemented by operating environment900 described below. It can be appreciated that the operations of flowdiagram 500 can be implemented in a different order than is depicted.

In non-limiting example embodiments, a computing device (or system)(e.g., computer 902) is provided, the device or system comprising one ormore processors and one or more memories that stores executableinstructions that, when executed by the one or more processors, canfacilitate performance of the operations as described herein, includingthe non-limiting methods as illustrated in the flow diagrams of FIG. 5.

Operation 502 depicts estimating, by a device comprising a processor, avalue indicating a likelihood of a communication device connecting to afirst network node device, wherein the value is estimated based on afirst network node coverage area and a location of the communicationdevice. Operation 504 depicts determining, by the device, based on thevalue, a scanning period interval value (e.g., a value indicating thenumber of times measurement can be conducted) utilized by a scanningprocedure (e.g., aggressive or relaxed procedure) to establish aconnection from the communication device to the first network nodedevice. Operation 506 depicts communicating, by the device, the scanningperiod interval value to the communication device. Operation 508 depictsrequesting, by the device, the communication device to adjust thescanning procedure (e.g., based on the value indicating likelihood of aconnected UE successfully connecting to gNB, either conduct aggressivemeasurements or relaxed measurements to connect to the gNB).

FIG. 6 depicts a diagram of an example, non-limiting computerimplemented method that facilitates adjusting scanning period intervalconducted by a communication device capable of dual connectivity inaccordance with one or more embodiments described herein. In someexamples, flow diagram 600 can be implemented by operating environment900 described below. It can be appreciated that the operations of flowdiagram 600 can be implemented in a different order than is depicted.

In non-limiting example embodiments, a computing device (or system)(e.g., computer 902) is provided, the device or system comprising one ormore processors and one or more memories that stores executableinstructions that, when executed by the one or more processors, canfacilitate performance of the operations as described herein, includingthe non-limiting methods as illustrated in the flow diagrams of FIG. 6.

Operation 602 depicts estimating, by a device comprising a processor, avalue indicating a likelihood of a communication device connecting to afirst network node device, wherein the value is estimated based on afirst network node coverage area and a location of the communicationdevice. Operation 604 depicts determining, by the device, based on thevalue, a scanning period interval value utilized by a scanning procedure(e.g., a procedure used to measure and report neighboring cells) toestablish a connection from the communication device to the firstnetwork node device. Operation 606 depicts communicating, by the device,the scanning period interval value to the communication device.Operation 608 depicts requesting, by the device, the communicationdevice to adjust the scanning procedure (e.g., based on the valueindicating likelihood of a connected UE successfully connecting to gNB,either conduct aggressive measurements or relaxed measurements toconnect to the gNB). Operation 610 depicts determining, by the device,that the value is not below a likelihood of successful threshold.Operation 612 depicts determining if the value is below a likelihood ofsuccessful threshold. If the value is below a likelihood of successfulthreshold, then perform operation 714 of FIG. 7 described below.Otherwise, perform operation 614. Operation 614 depicts in response tothe determining that the value is not below the likelihood of successfulthreshold, adjusting, by the device, the scanning period interval valueto allow the communication device to increase a number of searchattempts.

FIG. 7 depicts a diagram of an example, non-limiting computerimplemented method that facilitates adjusting scanning period intervalconducted by a communication device capable of dual connectivity inaccordance with one or more embodiments described herein. In someexamples, flow diagram 700 can be implemented by operating environment900 described below. It can be appreciated that the operations of flowdiagram 700 can be implemented in a different order than is depicted.

In non-limiting example embodiments, a computing device (or system)(e.g., computer 902) is provided, the device or system comprising one ormore processors and one or more memories that stores executableinstructions that, when executed by the one or more processors, canfacilitate performance of the operations as described herein, includingthe non-limiting methods as illustrated in the flow diagrams of FIG. 7.

Operation 702 depicts estimating, by a device comprising a processor, avalue indicating a likelihood of a communication device connecting to afirst network node device, wherein the value is estimated based on afirst network node coverage area and a location of the communicationdevice. Operation 704 depicts determining, by the device, based on thevalue, a scanning period interval value utilized by a scanning procedure(e.g., a procedure used to measure and report neighboring cells) toestablish a connection from the communication device to the firstnetwork node device. Operation 706 depicts communicating, by the device,the scanning period interval value to the communication device.Operation 708 depicts requesting, by the device, the communicationdevice to adjust the scanning procedure (e.g., based on the valueindicating likelihood of a connected UE successfully connecting to gNB,either conduct aggressive measurements or relaxed measurements toconnect to the gNB). Operation 710 depicts determining, by the device,that the value is below a likelihood of successful threshold. Operation712 depicts determining if the value is below a likelihood of successfulthreshold. If the value is below a likelihood of successful threshold,then perform operation 714. Otherwise, perform operation 614 of FIG. 6described above. Operation 714 depicts in response to the determiningthat the value is below the likelihood of successful threshold,adjusting, by the device, the scanning period interval value to limitthe communication device to search for the first network node deviceusing a first criterion.

Referring now to FIG. 8, illustrated is an example block diagram of anexample mobile handset 800 operable to engage in a system architecturethat facilitates wireless communications according to one or moreembodiments described herein. Although a mobile handset is illustratedherein, it will be understood that other devices can be a mobile device,and that the mobile handset is merely illustrated to provide context forthe embodiments of the various embodiments described herein. Thefollowing discussion is intended to provide a brief, general descriptionof an example of a suitable environment in which the various embodimentscan be implemented. While the description includes a general context ofcomputer-executable instructions embodied on a machine-readable storagemedium, those skilled in the art will recognize that the innovation alsocan be implemented in combination with other program modules and/or as acombination of hardware and software.

Generally, applications (e.g., program modules) can include routines,programs, components, data structures, etc., that perform particulartasks or implement particular abstract data types. Moreover, thoseskilled in the art will appreciate that the methods described herein canbe practiced with other system configurations, includingsingle-processor or multiprocessor systems, minicomputers, mainframecomputers, as well as personal computers, hand-held computing devices,microprocessor-based or programmable consumer electronics, and the like,each of which can be operatively coupled to one or more associateddevices.

A computing device can typically include a variety of machine-readablemedia. Machine-readable media can be any available media that can beaccessed by the computer and includes both volatile and non-volatilemedia, removable and non-removable media. By way of example and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media can include volatileand/or non-volatile media, removable and/or non-removable mediaimplemented in any method or technology for storage of information, suchas computer-readable instructions, data structures, program modules, orother data. Computer storage media can include, but is not limited to,RAM, ROM, EEPROM, flash memory or other memory technology, CD ROM,digital video disk (DVD) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store thedesired information and which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules, or other data in a modulated datasignal such as a carrier wave or other transport mechanism and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

The handset includes a processor 802 for controlling and processing allonboard operations and functions. A memory 804 interfaces to theprocessor 802 for storage of data and one or more applications 806(e.g., a video player software, user feedback component software, etc.).Other applications can include voice recognition of predetermined voicecommands that facilitate initiation of the user feedback signals. Theapplications 806 can be stored in the memory 804 and/or in a firmware808 and executed by the processor 802 from either or both the memory 804or/and the firmware 808. The firmware 808 can also store startup codefor execution in initializing the handset 800. A communicationscomponent 810 interfaces to the processor 802 to facilitatewired/wireless communication with external systems, e.g., cellularnetworks, VoIP networks, and so on. Here, the communications component810 can also include a suitable cellular transceiver 811 (e.g., a GSMtransceiver) and/or an unlicensed transceiver 813 (e.g., Wi-Fi, WiMax)for corresponding signal communications. The handset 800 can be a devicesuch as a cellular telephone, a PDA with mobile communicationscapabilities, and messaging-centric devices. The communicationscomponent 810 also facilitates communications reception from terrestrialradio networks (e.g., broadcast), digital satellite radio networks, andInternet-based radio services networks.

The handset 800 includes a display 812 for displaying text, images,video, telephony functions (e.g., a Caller ID function), setupfunctions, and for user input. For example, the display 812 can also bereferred to as a “screen” that can accommodate the presentation ofmultimedia content (e.g., music metadata, messages, wallpaper, graphics,etc.). The display 812 can also display videos and can facilitate thegeneration, editing and sharing of video quotes. A serial I/O interface814 is provided in communication with the processor 802 to facilitatewired and/or wireless serial communications (e.g., USB, and/or IEEE 894)through a hardwire connection, and other serial input devices (e.g., akeyboard, keypad, and mouse). This can support updating andtroubleshooting the handset 800, for example. Audio capabilities areprovided with an audio I/O component 816, which can include a speakerfor the output of audio signals related to, for example, indication thatthe user pressed the proper key or key combination to initiate the userfeedback signal. The audio I/O component 816 also facilitates the inputof audio signals through a microphone to record data and/or telephonyvoice data, and for inputting voice signals for telephone conversations.

The handset 800 can include a slot interface 818 for accommodating a SIC(Subscriber Identity Component) in the form factor of a card SubscriberIdentity Module (SIM) or universal SIM 820, and interfacing the SIM card820 with the processor 802. However, it is to be appreciated that theSIM card 820 can be manufactured into the handset 800, and updated bydownloading data and software.

The handset 800 can process IP data traffic through the communicationscomponent 810 to accommodate IP traffic from an IP network such as, forexample, the Internet, a corporate intranet, a home network, a personarea network, etc., through an ISP or broadband cable provider. Thus,VoIP traffic can be utilized by the handset 800 and IP-based multimediacontent can be received in either an encoded or decoded format.

A video processing component 822 (e.g., a camera) can be provided fordecoding encoded multimedia content. The video processing component 822can aid in facilitating the generation, editing, and sharing of videoquotes. The handset 800 also includes a power source 824 in the form ofbatteries and/or an AC power subsystem, which power source 824 caninterface to an external power system or charging equipment (not shown)by a power I/O component 826.

The handset 800 can also include a video component 830 for processingvideo content received and, for recording and transmitting videocontent. For example, the video component 830 can facilitate thegeneration, editing and sharing of video quotes. A location trackingcomponent 832 facilitates geographically locating the handset 800. Asdescribed hereinabove, this can occur when the user initiates thefeedback signal automatically or manually. A user input component 834facilitates the user initiating the quality feedback signal. The userinput component 834 can also facilitate the generation, editing andsharing of video quotes. The user input component 834 can include suchconventional input device technologies such as a keypad, keyboard,mouse, stylus pen, and/or touchscreen, for example.

Referring again to the applications 806, a hysteresis component 836facilitates the analysis and processing of hysteresis data, which isutilized to determine when to associate with the access point. Asoftware trigger component 838 can be provided that facilitatestriggering of the hysteresis component 836 when the Wi-Fi transceiver813 detects the beacon of the access point. A SIP client 840 enables thehandset 800 to support SIP protocols and register the subscriber withthe SIP registrar server. The applications 806 can also include a client842 that provides at least the capability of discovery, play and storeof multimedia content, for example, music.

The handset 800, as indicated above related to the communicationscomponent 810, includes an indoor network radio transceiver 813 (e.g.,Wi-Fi transceiver). This function supports the indoor radio link, suchas IEEE-802.11, for the dual-mode GSM handset 800. The handset 800 canaccommodate at least satellite radio services through a handset that cancombine wireless voice and digital radio chipsets into a single handhelddevice.

Referring now to FIG. 9, illustrated is an example block diagram of anexample computer 900 operable to engage in a system architecture thatfacilitates wireless communications according to one or more embodimentsdescribed herein. The computer 900 can provide networking andcommunication capabilities between a wired or wireless communicationnetwork and a server and/or communication device.

In order to provide additional context for various embodiments describedherein, FIG. 9 and the following discussion are intended to provide abrief, general description of a suitable computing environment 900 inwhich the various embodiments of the embodiment described herein can beimplemented. While the embodiments have been described above in thegeneral context of computer-executable instructions that can run on oneor more computers, those skilled in the art will recognize that theembodiments can be also implemented in combination with other programmodules and/or as a combination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, Internet of Things (IoT)devices, distributed computing systems, as well as personal computers,hand-held computing devices, microprocessor-based or programmableconsumer electronics, and the like, each of which can be operativelycoupled to one or more associated devices.

The illustrated embodiments of the embodiments herein can be alsopracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

Computing devices typically include a variety of media, which caninclude computer-readable storage media, machine-readable storage media,and/or communications media, which two terms are used herein differentlyfrom one another as follows. Computer-readable storage media ormachine-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media or machine-readablestorage media can be implemented in connection with any method ortechnology for storage of information such as computer-readable ormachine-readable instructions, program modules, structured data orunstructured data.

Computer-readable storage media can include, but are not limited to,random access memory (RAM), read only memory (ROM), electricallyerasable programmable read only memory (EEPROM), flash memory or othermemory technology, compact disk read only memory (CD-ROM), digitalversatile disk (DVD), Blu-ray disc (BD) or other optical disk storage,magnetic cassettes, magnetic tape, magnetic disk storage or othermagnetic storage devices, solid state drives or other solid statestorage devices, or other tangible and/or non-transitory media which canbe used to store desired information. In this regard, the terms“tangible” or “non-transitory” herein as applied to storage, memory orcomputer-readable media, are to be understood to exclude onlypropagating transitory signals per se as modifiers and do not relinquishrights to all standard storage, memory or computer-readable media thatare not only propagating transitory signals per se.

Computer-readable storage media can be accessed by one or more local orremote computing devices, e.g., via access requests, queries or otherdata retrieval protocols, for a variety of operations with respect tothe information stored by the medium.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

With reference again to FIG. 9, the example operating environment 900for implementing various embodiments of the aspects described hereinincludes a computer 902, the computer 902 including a processing unit904, a system memory 906 and a system bus 908. The system bus 908couples system components including, but not limited to, the systemmemory 906 to the processing unit 904. The processing unit 904 can beany of various commercially available processors. Dual microprocessorsand other multi-processor architectures can also be employed as theprocessing unit 904.

The system bus 908 can be any of several types of bus structure that canfurther interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 906 includesROM 910 and RAM 912. A basic input/output system (BIOS) can be stored ina non-volatile memory such as ROM, erasable programmable read onlymemory (EPROM), EEPROM, which BIOS contains the basic routines that helpto transfer information between elements within the computer 902, suchas during startup. The RAM 912 can also include a high-speed RAM such asstatic RAM for caching data.

The computer 902 further includes an internal hard disk drive (HDD) 914(e.g., EIDE, SATA), one or more external storage devices 916 (e.g., amagnetic floppy disk drive (FDD) 916, a memory stick or flash drivereader, a memory card reader, etc.) and an optical disk drive 920 (e.g.,which can read or write from a CD-ROM disc, a DVD, a BD, etc.). Whilethe internal HDD 914 is illustrated as located within the computer 902,the internal HDD 914 can also be configured for external use in asuitable chassis (not shown). Additionally, while not shown inenvironment 900, a solid state drive (SSD) could be used in addition to,or in place of, an HDD 914. The HDD 914, external storage device(s) 916and optical disk drive 920 can be connected to the system bus 908 by anHDD interface 924, an external storage interface 926 and an opticaldrive interface 928, respectively. The interface 924 for external driveimplementations can include at least one or both of Universal Serial Bus(USB) and Institute of Electrical and Electronics Engineers (IEEE) 1394interface technologies. Other external drive connection technologies arewithin contemplation of the embodiments described herein.

The drives and their associated computer-readable storage media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 902, the drives and storagemedia accommodate the storage of any data in a suitable digital format.Although the description of computer-readable storage media above refersto respective types of storage devices, it should be appreciated bythose skilled in the art that other types of storage media which arereadable by a computer, whether presently existing or developed in thefuture, could also be used in the example operating environment, andfurther, that any such storage media can contain computer-executableinstructions for performing the methods described herein.

A number of program modules can be stored in the drives and RAM 912,including an operating system 930, one or more application programs 932,other program modules 934 and program data 936. All or portions of theoperating system, applications, modules, and/or data can also be cachedin the RAM 912. The systems and methods described herein can beimplemented utilizing various commercially available operating systemsor combinations of operating systems.

Computer 902 can optionally comprise emulation technologies. Forexample, a hypervisor (not shown) or other intermediary can emulate ahardware environment for operating system 930, and the emulated hardwarecan optionally be different from the hardware illustrated in FIG. 9. Insuch an embodiment, operating system 930 can comprise one virtualmachine (VM) of multiple VMs hosted at computer 902. Furthermore,operating system 930 can provide runtime environments, such as the Javaruntime environment or the .NET framework, for applications 932. Runtimeenvironments are consistent execution environments that allowapplications 932 to run on any operating system that includes theruntime environment. Similarly, operating system 930 can supportcontainers, and applications 932 can be in the form of containers, whichare lightweight, standalone, executable packages of software thatinclude, e.g., code, runtime, system tools, system libraries andsettings for an application.

Further, computer 902 can be enable with a security module, such as atrusted processing module (TPM). For instance with a TPM, bootcomponents hash next in time boot components, and wait for a match ofresults to secured values, before loading a next boot component. Thisprocess can take place at any layer in the code execution stack ofcomputer 902, e.g., applied at the application execution level or at theoperating system (OS) kernel level, thereby enabling security at anylevel of code execution.

A user can enter commands and information into the computer 902 throughone or more wired/wireless input devices, e.g., a keyboard 938, a touchscreen 940, and a pointing device, such as a mouse 942. Other inputdevices (not shown) can include a microphone, an infrared (IR) remotecontrol, a radio frequency (RF) remote control, or other remote control,a joystick, a virtual reality controller and/or virtual reality headset,a game pad, a stylus pen, an image input device, e.g., camera(s), agesture sensor input device, a vision movement sensor input device, anemotion or facial detection device, a biometric input device, e.g.,fingerprint or iris scanner, or the like. These and other input devicesare often connected to the processing unit 904 through an input deviceinterface 944 that can be coupled to the system bus 908, but can beconnected by other interfaces, such as a parallel port, an IEEE 1394serial port, a game port, a USB port, an IR interface, a BLUETOOTH®interface, etc.

A monitor 946 or other type of display device can be also connected tothe system bus 908 via an interface, such as a video adapter 948. Inaddition to the monitor 946, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 902 can operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 950. The remotecomputer(s) 950 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer902, although, for purposes of brevity, only a memory/storage device 952is illustrated. The logical connections depicted include wired/wirelessconnectivity to a local area network (LAN) 954 and/or larger networks,e.g., a wide area network (WAN) 956. Such LAN and WAN networkingenvironments are commonplace in offices and companies, and facilitateenterprise-wide computer networks, such as intranets, all of which canconnect to a global communications network, e.g., the Internet.

When used in a LAN networking environment, the computer 902 can beconnected to the local network 954 through a wired and/or wirelesscommunication network interface or adapter 958. The adapter 958 canfacilitate wired or wireless communication to the LAN 954, which canalso include a wireless access point (AP) disposed thereon forcommunicating with the adapter 958 in a wireless mode.

When used in a WAN networking environment, the computer 902 can includea modem 960 or can be connected to a communications server on the WAN956 via other means for establishing communications over the WAN 956,such as by way of the Internet. The modem 960, which can be internal orexternal and a wired or wireless device, can be connected to the systembus 908 via the input device interface 944. In a networked environment,program modules depicted relative to the computer 902 or portionsthereof, can be stored in the remote memory/storage device 952. It willbe appreciated that the network connections shown are example and othermeans of establishing a communications link between the computers can beused.

When used in either a LAN or WAN networking environment, the computer902 can access cloud storage systems or other network-based storagesystems in addition to, or in place of, external storage devices 916 asdescribed above. Generally, a connection between the computer 902 and acloud storage system can be established over a LAN 954 or WAN 956 e.g.,by the adapter 958 or modem 960, respectively. Upon connecting thecomputer 902 to an associated cloud storage system, the external storageinterface 926 can, with the aid of the adapter 958 and/or modem 960,manage storage provided by the cloud storage system as it would othertypes of external storage. For instance, the external storage interface926 can be configured to provide access to cloud storage sources as ifthose sources were physically connected to the computer 902.

The computer 902 can be operable to communicate with any wirelessdevices or entities operatively disposed in wireless communication,e.g., a printer, scanner, desktop and/or portable computer, portabledata assistant, communications satellite, any piece of equipment orlocation associated with a wirelessly detectable tag (e.g., a kiosk,news stand, store shelf, etc.), and telephone. This can include WirelessFidelity (Wi-Fi) and BLUETOOTH® wireless technologies. Thus, thecommunication can be a predefined structure as with a conventionalnetwork or simply an ad hoc communication between at least two devices.

The above description of illustrated embodiments of the subjectdisclosure, including what is described in the Abstract, is not intendedto be exhaustive or to limit the disclosed embodiments to the preciseforms disclosed. While specific embodiments and examples are describedherein for illustrative purposes, various modifications are possiblethat are considered within the scope of such embodiments and examples,as those skilled in the relevant art can recognize.

In this regard, while the disclosed subject matter has been described inconnection with various embodiments and corresponding Figures, whereapplicable, it is to be understood that other similar embodiments can beused or modifications and additions can be made to the describedembodiments for performing the same, similar, alternative, or substitutefunction of the disclosed subject matter without deviating therefrom.Therefore, the disclosed subject matter should not be limited to anysingle embodiment described herein, but rather should be construed inbreadth and scope in accordance with the appended claims below.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising, but not limited to comprising, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Processors can exploit nano-scale architectures suchas, but not limited to, molecular and quantum-dot based transistors,switches and gates, in order to optimize space usage or enhanceperformance of user equipment. A processor may also be implemented as acombination of computing processing units.

In the subject specification, terms such as “store,” “storage,” “datastore,” data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory.

As used in this application, the terms “component,” “system,”“platform,” “layer,” “selector,” “interface,” and the like are intendedto refer to a computer-related entity or an entity related to anoperational apparatus with one or more specific functionalities, whereinthe entity can be either hardware, a combination of hardware andsoftware, software, or software in execution. As an example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. By way of illustration and not limitation, both anapplication running on a server and the server can be a component. Oneor more components may reside within a process and/or thread ofexecution and a component may be localized on one computer and/ordistributed between two or more computers. In addition, these componentscan execute from various computer readable media, device readablestorage devices, or machine readable media having various datastructures stored thereon. The components may communicate via localand/or remote processes such as in accordance with a signal having oneor more data packets (e.g., data from one component interacting withanother component in a local system, distributed system, and/or across anetwork such as the Internet with other systems via the signal). Asanother example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry, which is operated by a software or firmwareapplication executed by a processor, wherein the processor can beinternal or external to the apparatus and executes at least a part ofthe software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can include a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components.

In addition, the term “or” is intended to mean an inclusive “or” ratherthan an exclusive “or.” That is, unless specified otherwise, or clearfrom context, “X employs A or B” is intended to mean any of the naturalinclusive permutations. That is, if X employs A; X employs B; or Xemploys both A and B, then “X employs A or B” is satisfied under any ofthe foregoing instances. Moreover, articles “a” and “an” as used in thesubject specification and annexed drawings should generally be construedto mean “one or more” unless specified otherwise or clear from contextto be directed to a singular form.

Moreover, terms like “user equipment (UE),” “mobile station,” “mobile,”subscriber station,” “subscriber equipment,” “access terminal,”“terminal,” “handset,” and similar terminology, refer to a wirelessdevice utilized by a subscriber or user of a wireless communicationservice to receive or convey data, control, voice, video, sound, gaming,or substantially any data-stream or signaling-stream. The foregoingterms are utilized interchangeably in the subject specification andrelated drawings. Likewise, the terms “access point (AP),” “basestation,” “NodeB,” “evolved Node B (eNodeB),” “home Node B (HNB),” “homeaccess point (HAP),” “cell device,” “sector,” “cell,” “relay device,”“node,” “point,” and the like, are utilized interchangeably in thesubject application, and refer to a wireless network component orappliance that serves and receives data, control, voice, video, sound,gaming, or substantially any data-stream or signaling-stream to and froma set of subscriber stations or provider enabled devices. Data andsignaling streams can include packetized or frame-based flows.

Additionally, the terms “core-network”, “core”, “core carrier network”,“carrier-side”, or similar terms can refer to components of atelecommunications network that typically provides some or all ofaggregation, authentication, call control and switching, charging,service invocation, or gateways. Aggregation can refer to the highestlevel of aggregation in a service provider network wherein the nextlevel in the hierarchy under the core nodes is the distribution networksand then the edge networks. UEs do not normally connect directly to thecore networks of a large service provider but can be routed to the coreby way of a switch or radio area network. Authentication can refer todeterminations regarding whether the user requesting a service from thetelecom network is authorized to do so within this network or not. Callcontrol and switching can refer determinations related to the futurecourse of a call stream across carrier equipment based on the callsignal processing. Charging can be related to the collation andprocessing of charging data generated by various network nodes. Twocommon types of charging mechanisms found in present day networks can beprepaid charging and postpaid charging. Service invocation can occurbased on some explicit action (e.g. call transfer) or implicitly (e.g.,call waiting). It is to be noted that service “execution” may or may notbe a core network functionality as third party network/nodes may takepart in actual service execution. A gateway can be present in the corenetwork to access other networks. Gateway functionality can be dependenton the type of the interface with another network.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,”“prosumer,” “agent,” and the like are employed interchangeablythroughout the subject specification, unless context warrants particulardistinction(s) among the terms. It should be appreciated that such termscan refer to human entities or automated components (e.g., supportedthrough artificial intelligence, as through a capacity to makeinferences based on complex mathematical formalisms), that can providesimulated vision, sound recognition and so forth.

Aspects, features, or advantages of the subject matter can be exploitedin substantially any, or any, wired, broadcast, wirelesstelecommunication, radio technology or network, or combinations thereof.Non-limiting examples of such technologies or networks include Geocasttechnology; broadcast technologies (e.g., sub-Hz, ELF, VLF, LF, MF, HF,VHF, UHF, SHF, THz broadcasts, etc.); Ethernet; X.25; powerline-typenetworking (e.g., PowerLine AV Ethernet, etc.); femto-cell technology;Wi-Fi; Worldwide Interoperability for Microwave Access (WiMAX); EnhancedGeneral Packet Radio Service (Enhanced GPRS); Third GenerationPartnership Project (3GPP or 3G) Long Term Evolution (LTE); 3GPPUniversal Mobile Telecommunications System (UMTS) or 3GPP UMTS; ThirdGeneration Partnership Project 2 (3GPP2) Ultra Mobile Broadband (UMB);High Speed Packet Access (HSPA); High Speed Downlink Packet Access(HSDPA); High Speed Uplink Packet Access (HSUPA); GSM Enhanced DataRates for GSM Evolution (EDGE) Radio Access Network (RAN) or GERAN; UMTSTerrestrial Radio Access Network (UTRAN); or LTE Advanced.

What has been described above includes examples of systems and methodsillustrative of the disclosed subject matter. It is, of course, notpossible to describe every combination of components or methods herein.One of ordinary skill in the art may recognize that many furthercombinations and permutations of the disclosure are possible.Furthermore, to the extent that the terms “includes,” “has,”“possesses,” and the like are used in the detailed description, claims,appendices and drawings such terms are intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim.

While the various embodiments are susceptible to various modificationsand alternative constructions, certain illustrated implementationsthereof are shown in the drawings and have been described above indetail. It should be understood, however, that there is no intention tolimit the various embodiments to the specific forms disclosed, but onthe contrary, the intention is to cover all modifications, alternativeconstructions, and equivalents falling within the spirit and scope ofthe various embodiments.

In addition to the various implementations described herein, it is to beunderstood that other similar implementations can be used ormodifications and additions can be made to the describedimplementation(s) for performing the same or equivalent function of thecorresponding implementation(s) without deviating therefrom. Stillfurther, multiple processing chips or multiple devices can share theperformance of one or more functions described herein, and similarly,storage can be affected across a plurality of devices. Accordingly, thedescription is not to be limited to any single implementation, butrather is to be construed in breadth, spirit and scope in accordancewith the appended claims.

What is claimed is:
 1. A system, comprising: a processor; and a memorythat stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising: based on afirst network node coverage area and a location of a communicationdevice, estimating a probability value indicating a likelihood of thecommunication device connecting to a first network node device; based onthe probability value, determining a scanning period interval value usedby the communication device during a scanning procedure to establish aconnection with the first network node device; and requesting thecommunication device to utilize the scanning period interval valueduring establishment of the connection with the first network nodedevice.
 2. The system of claim 1, wherein the operations furthercomprise: determining whether the probability value is above asuccessful connection threshold value; and in response to a result ofthe determining indicating that the probability value is above thesuccessful connection threshold value, adjusting the scanning periodinterval value to allow the communication device to increase searchattempts.
 3. The system of claim 1, wherein the operations furthercomprise: determining whether the probability value is not above asuccessful connection threshold value; and in response to a result ofthe determining indicating that the probability value is not above thesuccessful connection threshold value, adjusting the scanning periodinterval value to limit the communication device to search for the firstnetwork node device using a first criterion.
 4. The system of claim 3,wherein the first criterion is defined by the location of thecommunication device in relations to the first network node coveragearea.
 5. The system of claim 3, wherein the first criterion is definedby a distance of the communication device from an edge of the firstnetwork node device.
 6. The system of claim 1, wherein the estimatingthe probability value is based on a size of a coverage area of the firstnetwork node device.
 7. The system of claim 1, wherein the estimatingthe probability value comprises setting the probability value to adefault value and adjusting the probability value based on measurementscollected by the communication device.
 8. The system of claim 1, whereinthe estimating the probability value is based on an applicationthroughput requirement of an application used by the communicationdevice.
 9. A method, comprising: estimating, by a device comprising aprocessor, a value indicating a likelihood of a communication deviceconnecting to a first network node device, wherein the value isestimated based on a first network node coverage area and a location ofthe communication device; determining, by the device, based on thevalue, a scanning period interval value utilized by a scanning procedureto establish a connection from the communication device to the firstnetwork node device; communicating, by the device, the scanning periodinterval value to the communication device; and requesting, by thedevice, the communication device to adjust the scanning procedure. 10.The method of claim 9, further comprising: determining, by the device,that the value is not below a likelihood of successful threshold; and inresponse to the determining that the value is not below the likelihoodof successful threshold, adjusting, by the device, the scanning periodinterval value to allow the communication device to increase a number ofsearch attempts.
 11. The method of claim 9, further comprising:determining, by the device, that the value is below a likelihood ofsuccessful threshold; and in response to the determining that the valueis below the likelihood of successful threshold, adjusting, by thedevice, the scanning period interval value to limit the communicationdevice to search for the first network node device using a firstcriterion.
 12. The method of claim 11, wherein the first criterion isdefined by the location of the communication device in relation to acoverage area associated with the first network node device.
 13. Themethod of claim 11, wherein the first criterion is defined by a distanceof the communication device from an edge associated with the firstnetwork node device.
 14. The method of claim 9, wherein the estimatingthe value is based on a size of a coverage area of the first networknode device.
 15. The method of claim 9, wherein the estimating the valuecomprises setting the value to a default value and adjusting the valuefrom the default value based on measurements collected by thecommunication device.
 16. The method of claim 9, wherein the estimatingthe value is based on an application throughput requirement of anapplication used by the communication device.
 17. A machine-readablestorage medium, comprising executable instructions that, when executedby a processor, facilitate performance of operations, comprising:determining a probability value, wherein the probability value indicatesa likelihood of a communication device, connected to a first networknode device, connecting to a second network node device with attemptsbelow a first threshold; determining a scanning period interval valuebased on the probability value, used by the communication device, toadjust a scanning procedure usable for establishment of a connectionwith the second network node device; and requesting the communicationdevice to utilize the scanning period interval value during theestablishment of the connection with the second network node device. 18.The machine-readable storage medium of claim 17, wherein the operationsfurther comprise: determining that the probability value is above alikelihood of successful threshold value; and in response to thedetermining that the probability value is above the likelihood ofsuccessful threshold value, adjusting the scanning period interval valueto allow the communication device to increase search attempts.
 19. Themachine-readable storage medium of claim 17, wherein the operationsfurther comprise: determining that the probability value is not above alikelihood of successful threshold value; and in response to thedetermining that the probability value is not above the likelihood ofsuccessful threshold value, adjusting the scanning period interval valueto limit the communication device to search for the first network nodedevice using a first criterion.
 20. The machine-readable storage mediumof claim 17, wherein the estimating the probability value is based on amobility value associated with the communication device.