Apparatus and method for management of service requests in an overload environment

ABSTRACT

A system that incorporates the subject disclosure may include, for example, responsive to a determination that a number of failed service requests directed to a first access technology exceeds a threshold for a maximum number of failed service requests, performing cell selection associated with a second radio access technology during an overload mitigation time duration; and responsive to a determination of an expiration of the overload mitigation time duration, transmitting additional service requests associated with the first radio access technology. Other embodiments are disclosed.

FIELD OF THE DISCLOSURE

The subject disclosure relates to an apparatus and method for managementof service requests in an overload environment.

BACKGROUND

Communication devices can be used to provide services based oncommunication sessions established over a network. These communicationsessions can be utilized for transmitting and receiving various data,including voice and video data.

Mobile wireless communications can involve requesting connections withcells which may or may not be accepted. These communications areaccording to various communication protocols. The protocols canestablish procedures to be executed by the end user device, as well asby the network element(s), based on particular operating conditions.

BRIEF DESCRIPTION OF THE DRAWINGS

Reference will now be made to the accompanying drawings, which are notnecessarily drawn to scale, and wherein:

FIG. 1 depicts an illustrative embodiment of a communication system thatprovides communications services;

FIG. 2 depicts an illustrative embodiment of a method used in portionsof the system described in FIG. 1;

FIG. 3 depicts an illustrative embodiment of a communication system thatprovides communications services;

FIG. 4A depicts an illustrative embodiment of a communication deviceoperable in the system of FIG. 1;

FIG. 4B depicts an illustrative embodiment of a timing diagramassociated with service requests being generated by the communicationdevice of FIG. 4A; and

FIG. 5 is a diagrammatic representation of a machine in the form of acomputer system within which a set of instructions, when executed, maycause the machine to perform any one or more of the methods describedherein.

DETAILED DESCRIPTION

The subject disclosure describes, among other things, illustrativeembodiments in which a first radio access technology network (e.g., thelong term evolution (LTE) network (RAN and CORE)) is protected by way oflimiting service requests in response to the LTE CORE network beingoverloaded. In one or more embodiments, the LTE CORE network can beprotected while also allowing an end user device to search for otherradio access technologies to restore voice and data service and savebattery resources.

In one or more embodiments, an end user device can declare or otherwisedetermine that a network is inoperable or otherwise overloaded based ona count of consecutive ignored service request attempts (e.g., EMMSERVICE REQUEST attempts), and can bar or otherwise prohibit accessattempts to that specific LTE network for a particular period of time(e.g., a configurable variable of time). In one or more embodiments, theend user device, during this particular period of time, can initiate acell selection to move the end user device onto a functioning radioaccess technology.

As an example, the end user device can determine that the network (e.g.,an LTE network) is inoperable or overloaded when N number of servicerequests (e.g., EMM SERVICE REQUESTS) are ignored by the network (e.g.,a T3417 expiry in the LTE network). N can be a constant that can beconfigured by service providers such as through use of a systeminformation broadcast and/or a subscriber identity module over-the-air(SIM OTA) communication. In one embodiment, once an end user devicedetects that the network is inoperable or overloaded, the end userdevice can forbid or otherwise prohibit access by the end user device tothis network for duration of T. In one embodiment, T can be a value withan average of T_(Avg) which can be configured by operators throughsystem information broadcast and/or SIM OTA communication. In oneembodiment, upon initiation of timer T countdown, the end user devicecan start a normal cell selection procedure (e.g., according to the3^(rd) Generation Partnership Project (3GPP) specification). In oneembodiment, any resultant attaches that occur from the cell selectionprocedure can be in both circuit-switching/packet switching (CS/PS) andpacket data protocol (PDP). This can allow the outage (e.g., an LTE MMEoutage) from a data and voice perspective to be transparent to the user.Other embodiments are included in the subject disclosure.

One embodiment of the subject disclosure is a computer-readable storagedevice including computer instructions, which, responsive to beingexecuted by a processor of a wireless communication device, cause theprocessor to perform operations including receiving configurationinformation, where the configuration information includes a thresholdfor a maximum number of failed service requests. The processor canmonitor for service requests being transmitted from the wirelesscommunication device associated with a first radio access technology.The processor can determine a number of failed service requests based onthe monitoring. The processor can, responsive to a determination thatthe number of failed service requests exceeds the threshold for themaximum number of failed service requests, determine an overloadmitigation time duration associated with the first radio accesstechnology. The processor can perform cell selection associated with asecond radio access technology during the overload mitigation timeduration. For example, the cell selection for the second (alternative)radio access technology can be of a different cell or of the same cellassociated with the overloaded radio access technology. The processorcan prohibit transmitting of service requests associated with the firstradio access technology during the overload mitigation time duration.The processor can, responsive to a determination of an expiration of theoverload mitigation time duration, transmit service requests associatedwith the first radio access technology.

One embodiment of the subject disclosure is a method that includesmonitoring, by a processor of a wireless communication device, forservice requests being transmitted from the wireless communicationdevice, wherein the service requests are associated with a first radioaccess technology. The method includes determining, by the processor, anumber of failed service requests based on the monitoring. The methodincludes, responsive to a determination by the processor that the numberof failed service requests exceeds a threshold for a maximum number offailed service requests, performing, by the processor, cell selectionassociated with a second radio access technology during an overloadmitigation time duration associated with the first radio accesstechnology. The method includes prohibiting, by the processor,transmitting of service requests associated with the first radio accesstechnology during the overload mitigation time duration. The methodincludes responsive to a determination of an expiration of the overloadmitigation time duration, transmitting, by the processor, servicerequests associated with the first radio access technology.

One embodiment of the subject disclosure is a wireless communicationdevice, having a memory to store computer instructions, and having aprocessor coupled with the memory. The processor, responsive toexecuting the computer instructions, performs operations including,responsive to a determination that a number of failed service requestsdirected to a first access technology exceeds a threshold for a maximumnumber of failed service requests, performing cell selection associatedwith a second radio access technology during an overload mitigation timeduration. The processor can, responsive to a determination of anexpiration of the overload mitigation time duration, transmit servicerequests associated with the first radio access technology.

Referring to FIG. 1, a mobile communication system 100 is illustratedthat can provide communication services, including voice, video and/ordata services to mobile devices, such as end user device 110. System 100can enable communication services over a number of different networks,such as between end user device 110 and another communication device(e.g., a second end user device) not shown. End user device 110 can be anumber of different types of devices that are capable of voice, videoand/or data communications, including a mobile device (e.g., asmartphone), a personal computer, a set top box, and so forth. End userdevice 110 can include computer instructions and/or hardware to performservice request and cell selection management functions 115. Themanagement functions 115 can include detecting overloaded environments,such as a core network overload. As an example, a core network canbecome overloaded during a natural disaster, during a sporting event, orduring some other situation in which the number of service requests froma large volume of devices cannot be processed (or are otherwise delayed)due to limited resources or for some other reason. The overloaddetection by the end user device 110 can be based on a number ofcriteria, including monitoring for a number of failed service requests.

The management functions 115 can also include overload mitigation stepsbeing performed by the end user device 110, including prohibitingservice requests from being transmitted that are associated with anoverloaded radio access technology. The prohibition of the servicerequests can be for a particular period of time (e.g., an overloadmitigation time duration) which may be a pre-determined time periodand/or a dynamic time period. The failed service requests can berequests that have been rejected, ignored or otherwise are unsuccessful.In one embodiment, the end user device 110 can monitor the number ofconsecutive failed service requests that have been sent to a first celland/or monitor the time period over which these failed consecutiveservice requests were sent. If the failed service requests satisfy anoverload threshold then the end user device 110 can prevent servicerequests from being transmitted to the first cell (e.g., a first serverof the first cell) of the first radio access technology, while enablingthe end user device 110 to select a second radio access technology,which may or may not utilize the same cell. Service requests can then betransmitted in an effort to establish a communication session utilizingthe second radio access technology. In one or more embodiments, thesecond radio access technology can enable communication sessionsutilizing circuit switching, packet switching and packet data protocols.

In one or more embodiment, the cell selection process for the second orother radio access technology can be performed for a limited amount oftime (e.g., an overload mitigation time duration). In one example, at anexpiration of the overload mitigation time duration, the end user device110 can perform actions associated with obtaining the first radio accesstechnology, such as transmitting service requests, performing cellselection associated with the first radio access technology, and soforth. The radio access technologies in these embodiments can vary andcan include the first radio access technology being an LTE service whilethe second radio access technology is a 3G/2G service.

In one or more embodiments, the threshold number of permissible failedservice requests and/or the overload mitigation time duration can bedetermined based on configuration information that is received from aremote source, such as a server associated with the first cell, althoughother network elements and/or other communication devices, includingother end user devices, can provide the configuration information to theend user device 110. The configuration information can be a maximumnumber of failed service requests and/or a maximum time period fortransmitting service requests that are directly utilized or otherwisedirectly applied by the end user device 110 in determining whether toperform the radio access technology switch to mitigate a core networkoverload. In another embodiment, the configuration information can beindirect information that can be analyzed to determine threshold valuesthat are to be applied. For instance, the indirect information can behistorical traffic information indicating that at a particular time(e.g., time of day, day of week, etc.) an increased amount of trafficutilizes a particular radio access technology. In this example, based onthe historical information, the end user device 110 can determine athreshold number of failed service requests that are permissible priorto switching to a different radio access technology, a time period forthe failed service requests, and/or a time duration for the overloadmitigation. Other indirect information can also be analyzed by the enduser device 110 to determine the threshold value and/or the overloadmitigation time duration, such as performance metrics (e.g., latency,jitter, packet loss, and so forth), expected events that will impacttraffic (e.g., scheduled maintenance), and so forth.

In one embodiment, upon a detection by the network that another radioaccess technology is experiencing lower levels of traffic, configurationinformation may be transmitted to various end user devices where theconfiguration information has lower threshold values for the number offailed service requests that are permissible before switching to theother radio access technology.

The networks of the system 100 can include one or more of a UniversalTerrestrial Radio Access Network (UTRAN) 120, a Global System for Mobilecommunications (GSM) Enhanced Data rates for GSM Evolution (EDGE) RadioAccess Network 130 (herein referred to as GERAN 130), and an E-UTRAN140. The system 100 can further include one or more of a Serving Generalpacket radio service (GPRS) Support Node (SGSN) 150, a MobilityManagement Entity (MME) 160 and Mobile Switching Center (MSC) 180.

In one or more embodiments, system 100 can provide for circuit switchingfallback for packet switching so as to enable the provisioning of voiceand other circuit switching-domain services (e.g., circuit switching UDIvideo/LCS/USSD) by reuse of circuit switching infrastructure, such aswhen the end-user device 110 is served by E-UTRAN 140. In one or moreembodiments, a circuit-switching fallback enabled terminal (e.g., enduser device 110) connected to E-UTRAN 140 may use GERAN 130 or UTRAN 120to connect to the circuit switching-domain. In one or more embodiments,the circuit switching fallback and Internet protocol MultimediaSubsystem (IMS)-based services of system 100 can co-exist in a singleservice operator's network.

In one or more embodiments, UTRAN 120 can include node B's and radionetwork controllers which enable carrying many traffic types includingreal-time circuit-switched to IP-based packet switched traffic. TheUTRAN 120 can also enable connectivity between the end user device 110and the core network. The UTRAN 120 can utilize a number of interfacesincluding Iu, Uu, Iub and/or Iur. For example, the Iu interface can bean external interface that connects the radio network controllers to thecore network. The Uu can be an external interface that connects a node Bwith the end user device 110. The Iub can be an internal interfaceconnecting the remote network controllers with the node B. The Iurinterface can be an internal interface and/or external interface forconnecting multiple remote network controllers.

In one or more embodiments, GERAN 130 can facilitate communicationsbetween base stations (e.g., Ater and Abis interfaces) and base stationcontrollers (e.g., A interfaces).

In one or more embodiments, E-UTRAN 140 can be the air interface for theLTE upgrade path for mobile networks according to the 3GPPspecification. E-UTRAN 140 can include enodeBs on the network that areconnected to each other such as via an X2 interface, which areconnectable to the packet switch core network via an S1 interface. Forexample, E-UTRAN 140 can use various communication techniques includingorthogonal frequency-division multiplexing (OFDM), multiple-inputmultiple-output (MIMO) antenna technology depending on the capabilitiesof the terminal, and beamforming for downlink to support more users,higher data rates and lower processing power required on each handset.

In one or more embodiments, the SGSN 150 can assume responsibility fordelivery of data packets from and to mobile stations within the SGSN'sgeographical service or coverage area. The SGSN 150 can performfunctions including packet routing and transfer, mobility management(e.g., attach/detach and location management), logical link management,and/or authentication and charging functions. In one or moreembodiments, a location register of the SGSN 150 can store locationinformation (e.g., current cell) and user profiles (e.g., addresses usedin the packet data network) of users registered with the SGSN.

In one or more embodiments, MME 160 can perform the function of acontrol-node. For example, the MME 160 can perform functions such asidle mode tracking and paging procedure including retransmissions. TheMME 160 can also choose a serving gateway for the end user device 110such as at the initial attach and at time of intra-LTE handoverinvolving node relocation.

In one or more embodiments, the MSC 180 can perform functions includingrouting voice calls and Short-Message Service (SMS), as well as otherservices (e.g., conference calls, FAX and circuit switched data) viasetting up and releasing end-to-end connections, handling mobility andhand-over requirements during the communications, and/or performingcharging and real time pre-paid account monitoring.

In one or more embodiments, the end user device 110 can invoke a servicerequest procedure. The following example is described with respect tothe 3GPP specification but the exemplary embodiments can be implementedfor other radio access technologies and/or other communicationspecifications. The service request procedure can be utilized totransfer the evolved packet system mobility management (EMM) mode fromEMM-IDLE to EMM-CONNECTED mode and to establish the radio and S1 bearerswhen uplink user data or signaling is to be sent. Another purpose ofthis procedure is to invoke MO/MT CS fallback or 1×CS fallbackprocedures. This procedure can be used when the network has downlinksignaling pending; the end user device 110 has uplink signaling pending;the end user device 110 or the network has user data pending and the enduser device 110 is in EMM-IDLE mode; and/or the end user device 110 inEMM-IDLE or EMM-CONNECTED mode has requested to perform mobileoriginating/terminating CS fallback or 1×CS fallback. The servicerequest procedure is initiated by the end user device 110, however, fora downlink transfer of signaling, cdma2000® signaling or user data inEMM-IDLE mode, the trigger can be given by the network by means of apaging procedure.

The end user device 110 can invoke the service request procedure when:a) the end user device 110 in EMM-IDLE mode receives a paging requestwith CN domain indicator set to “PS” from the network; b) the end userdevice 110, in EMM-IDLE mode, has pending user data to be sent; c) theend user device 110, in EMM-IDLE mode, has uplink signaling pending; d)the end user device 110 in EMM-IDLE or EMM-CONNECTED mode is configuredto use CS fallback and has a mobile originating CS fallback request fromthe upper layer; e) the end user device 110 in EMM-IDLE mode isconfigured to use CS fallback and receives a paging request with CNdomain indicator set to “CS”, or the end user device 110 inEMM-CONNECTED mode is configured to use CS fallback and receives a CSSERVICE NOTIFICATION message; f) the end user device 110 in EMM-IDLE orEMM-CONNECTED mode is configured to use 1×CS fallback and has a mobileoriginating 1×CS fallback request from the upper layer; g) the end userdevice 110 in EMM-CONNECTED mode is configured to use 1×CS fallback andaccepts cdma2000® signalling messages containing a 1×CS paging requestreceived over E-UTRAN; h) the end user device 110, in EMM-IDLE mode, hasuplink cdma2000® signalling pending to be transmitted over E-UTRAN; i)the end user device 110, in EMM-IDLE or EMM-CONNECTED mode, isconfigured to use 1×CS fallback, accepts cdma2000® signalling messagescontaining a 1×CS paging request received over cdma2000® 1×RTT, and thenetwork supports dual Rx CSFB or provide CS fallback registrationparameters; j) the end user device 110, in EMM-IDLE or EMM-CONNECTEDmode, has uplink cdma2000® signalling pending to be transmitted overcdma2000® 1×RTT, and the network supports dual Rx CSFB or provide CSfallback registration parameters; or k) the end user device 110 performsan inter-system change from S101 mode to S1 mode and has user datapending. In one embodiment if one of the above criteria to invoke theservice request procedure is fulfilled, then the service requestprocedure may only be initiated by the end user device 110 when thefollowing conditions are fulfilled: its EPS update status is EU1UPDATED, and the TAI of the current serving cell is included in the TAIlist; and no EMM specific procedure is ongoing. In one embodiment, forcases a, b, c, h and k above, if the end user device 110 is notconfigured for NAS signaling low priority, the end user device 110 caninitiate the service request procedure by sending a SERVICE REQUESTmessage to the MME, starts the timer T3417, and enter the stateEMM-SERVICE-REQUEST-INITIATED. In one embodiment, for cases a, b, c, hand k described above, if the end user device 110 is configured for NASsignaling low priority, and the last received ATTACH ACCEPT message orTRACKING AREA UPDATE ACCEPT message from the network indicated that thenetwork supports use of EXTENDED SERVICE REQUEST for packet services,the end user device 110 can send an EXTENDED SERVICE REQUEST messagewith service type set to “packet services via S1.” If the last receivedATTACH ACCEPT message or TRACKING AREA UPDATE ACCEPT message from thenetwork did not indicate that the network supports use of EXTENDEDSERVICE REQUEST for packet services, the end user device 110 can insteadsend a SERVICE REQUEST message. After sending the SERVICE REQUESTmessage or EXTENDED SERVICE REQUEST message with service type set to“packet services via S1”, the end user device 110 can start T3417 andenter the state EMM-SERVICE-REQUEST-INITIATED. In one embodiment, forcase d described above, the end user device 110 can send an EXTENDEDSERVICE REQUEST message, start T3417ext and enter the stateEMM-SERVICE-REQUEST-INITIATED. In one embodiment, for case e describedabove: if the end user device 110 is in EMM-IDLE mode, the end userdevice 110 can send an EXTENDED SERVICE REQUEST message, start T3417extand enter the state EMM-SERVICE-REQUEST-INITIATED; if the end userdevice 110 is in EMM-CONNECTED mode and if the end user device 110accepts the paging, the end user device 110 can send an EXTENDED SERVICEREQUEST message with the CSFB response IE indicating “CS fallbackaccepted by the UE”, start T3417ext and enter the stateEMM-SERVICE-REQUEST-INITIATED; or if the end user device 110 is inEMM-CONNECTED mode and if the end user device 110 rejects the paging,the end user device 110 can send an EXTENDED SERVICE REQUEST messagewith the CSFB response IE indicating “CS fallback rejected by the enduser device 110” and enter the state EMM-REGISTERED.NORMAL-SERVICE. Thenetwork shall not initiate CS fallback procedures. In one embodiment,for cases f, g, i and j described above, the end user device 110 cansend an EXTENDED SERVICE REQUEST message, start T3417 and enter thestate EMM-SERVICE-REQUEST-INITIATED. In some instances, if the servicerequest is not accepted then the end user device 110 can receive aSERVICE REJECT message including an EMM cause value.

In the event of an overload (e.g., a Core Network overload)infrastructure vendors may have implemented a “silent drop” of UESERVICE REQUESTS to mitigate any further loading of network links andprocessing elements. The “silent drop” of a SERVICE REQUEST often occurswhen the T3417 timer expires, where the SERVICE REQUEST procedure isaborted, and where the end user device is to enter the EMM-REGISTEREDstate.

In response to the “silent drop” situation, one or more of the exemplaryembodiments can provide for recovery of user services (e.g., voice anddata) in the case of an LTE outage due to core network overload, and/orprevent applications from sending a further barrage of SERVICE REQUESTon the overloaded radio access technology, which may lead to furtherexacerbation of the core outage, and incapacitate the air interface aswell. The exemplary embodiments can also provide a buffer of time forthe LTE infrastructure to stabilize and re-establish normal operation.

In one or more embodiments, the end user device 110 can performmeasurements for cell selection and reselection purposes, such as whenswitching to a different radio access technology because of the detectedoverload in the first radio access technology. As an example, the NAScan control the radio access technologies in which the cell selectionshould be performed, for instance by indicating radio accesstechnologies associated with the selected PLMN, and by maintaining alist of forbidden registration area(s) and a list of equivalent PLMNs.The end user device 110 can select a suitable cell based on idle modemeasurements and cell selection criteria. In order to speed up the cellselection process, stored information for several radio accesstechnologies can be available in the end user device 110.

In one or more embodiments, the end user device 110 can utilize a numberof different cell selection processes. For example, an initial cellselection procedure can be employed that requires no prior knowledge ofwhich RF channels are E-UTRA carriers. In this example, the end userdevice 110 can scan all or some of the RF channels in the E-UTRA bandsaccording to its capabilities to find a suitable cell. In one or moreembodiments, on each carrier frequency, the end user device 110 needonly search for the strongest cell (e.g., the strongest signal). Once asuitable cell is found this cell can be selected by the end user device110.

In another embodiment, the end user device 110 can employ a storedinformation cell selection procedure. This procedure may require storedinformation of carrier frequencies and/or information on cellparameters, such as from previously received measurement controlinformation elements and/or from previously detected cells. In thisexample, once the end user device 110 has found a suitable cell the enduser device can select it. If no suitable cell is found then the initialcell selection procedure described above may be employed. In one or moreembodiments, priorities between different frequencies and/or radioaccess technologies provided to the end user device 110 by systeminformation or dedicated signaling may not be used in the cell selectionprocess.

In one or more embodiments, the end user device 110 can enter anany-cell-selection state, in which the end user device can attempt tofind an acceptable cell of any PLMN to camp on, trying all radio accesstechnologies (except the prohibited first radio access technology) thatare supported by the end user device and searching first for a highquality cell such as defined in the 3GPP technical specification. Theend user device 110, which may not be camped on any cell, can stay inthis state until an acceptable cell is found.

FIG. 2 illustrates a method 200 for providing communication services.Method 200 is described with respect to end user device 110 but can beperformed by one or more of the devices of system 100 and/or can beperformed by other communication devices. Method 200 can begin at 202 inwhich the end user device 110 determines a threshold that is to beapplied in order to determine a network overload, such as an LTE corenetwork overload. As an example, the threshold can be a permissiblenumber of consecutive failed service requests that have been transmittedby the end user device 110 to a first cell associated with a first radioaccess technology, such as LTE. In one embodiment, the threshold can bedetermined by receiving configuration information at the end user device110 from the network, such as via a system information broadcast and/ora SIM OTA communication.

At 206, the end user device 110 can monitor service requests beingtransmitted and at 208 can determine a number of the service requeststhat have failed consecutively. If at 210, the number of consecutivefailed service requests is still within a permissible threshold then theend user device continues to monitor the transmitted service requests.If on the other hand, the number of consecutive failed service requestsexceeds the threshold then method 200 can proceed to 212 where the enduser device 110 determines or otherwise identifies an overloadmitigation time duration which is a time period over which the end userdevice is to try to switch to a different radio access technology. Inone embodiment, the overload mitigation time duration can be determinedby receiving configuration information at the end user device 110 fromthe network, such as via a system information broadcast and/or a SIM OTAcommunication.

At 216, the end user device 110 can initiate a cell selection procedurebased on a radio access technology that is different from the firstradio access technology. In one embodiment, this procedure can includeselecting a cell that is different from the first cell associated withthe overload detection. The cell selection procedure for other radioaccess technologies can be continued throughout the overload mitigationtime duration as shown at 218. In one embodiment, any attachments thatare made during the overload mitigation time duration can be based onboth CS/PS and PDP communications. In one embodiment, the end userdevice 110 can prohibit or otherwise prevent transmitting servicerequests intended for the first radio access technology that wasdetermined to be overloaded. At 220, upon expiration of the overloadmitigation time duration, the end user device 100 can transmit servicerequests associated with the first radio access technology, such as LTERAT. The expiration of the overload mitigation time duration can alsotrigger other actions associated with accessing the originallyoverloaded service, such as performing cell selection for the firstradio access technology, or otherwise include the first radio accesstechnology in the cell selection procedure. In one embodiment, after theexpiration of the overload mitigation time duration, the end user device110 can send service requests associated with the original radio accesstechnology (e.g., LTE service) which was previously determined to beoverloaded, where those service requests are being transmitted to adifferent cell.

In one or more embodiments, configuration information received by theend user device 110 may not be directly applicable to a selection ofprocedures and may require further analysis and manipulation by the enduser device to determine data that can be directly applied, such asdetermining a maximum number of failed service requests and/or anoverload mitigation time duration based on monitored network resourceusage data received from a server of a cell to which the end user deviceis transmitting service requests. In one or more embodiments, thenetwork status data or other information can include historicalinformation (e.g., peak traffic times, upcoming events expected toresult in traffic increases), monitored resource usage information,monitored performance parameters (e.g., latency, jitter, packet loss,and so forth), and so forth. In one or more embodiments, theconfiguration information can be a combination of threshold values(e.g., directly applicable without further analysis for determiningcontrol procedures) and network status data or other information (e.g.,indirectly applicable via further analysis for determining controlprocedures).

FIG. 3 depicts an illustrative embodiment of a communication system 300employing an IP Multimedia Subsystem (IMS) network architecture tofacilitate the combined services of circuit-switched and packet-switchedsystems. Communication system 300 can be overlaid or operably coupledwith system 100 of FIG. 1 as another representative embodiment ofcommunication system 100. System 300 enables end user devices to detector otherwise declare overload and a mechanism to recover serviceutilizing a different radio access technology. For example, when aparticular number of consecutive service requests are rejected orignored (e.g., on the same cell) such as in an effort to establish LTEcommunications, then the end user device can initiate a cell selectionprocedure involving one or more different radio access technologieswhile also prohibiting or otherwise preventing service requests frombeing transmitted by the end user device via the overloaded radio accesstechnology. The switching to the different radio access technologyand/or the preventing of the transmission of service requests associatedwith the overloaded radio access technology can be performed for aparticular time period, such as an overload mitigation time duration,which can be a pre-determined or dynamic time period provided by theservice provider.

In one or more embodiments, the end user device can receive networkstatus data from a remote source and can analyze the network status datato determine the values to be utilized for the maximum number of failedservice request and/or the overload mitigation time duration. Thenetwork status data can be various types of data including historicaltraffic information, current network performance data, scheduledmaintenance, and so forth.

Communication system 300 can comprise a Home Subscriber Server (HSS)340, a tElephone NUmber Mapping (ENUM) server 330, and other networkelements of an IMS network 350. The IMS network 350 can establishcommunications between IMS-compliant communication devices (CDs) 301,302, Public Switched Telephone Network (PSTN) CDs 303, 305, andcombinations thereof by way of a Media Gateway Control Function (MGCF)320 coupled to a PSTN network 360. The MGCF 320 need not be used when acommunication session involves IMS CD to IMS CD communications. Acommunication session involving at least one PSTN CD may utilize theMGCF 320.

IMS CDs 301, 302 can register with the IMS network 350 by contacting aProxy Call Session Control Function (P-CSCF) which communicates with aninterrogating CSCF (I-CSCF), which in turn, communicates with a ServingCSCF (S-CSCF) to register the CDs with the HSS 340. To initiate acommunication session between CDs, an originating IMS CD 301 can submita Session Initiation Protocol (SIP INVITE) message to an originatingP-CSCF 304 which communicates with a corresponding originating S-CSCF306. The originating S-CSCF 306 can submit the SIP INVITE message to oneor more application servers (ASs) 317 that can provide a variety ofservices to IMS subscribers.

For example, the application servers 317 can be used to performoriginating call feature treatment functions on the calling party numberreceived by the originating S-CSCF 306 in the SIP INVITE message.Originating treatment functions can include determining whether thecalling party number has international calling services, call IDblocking, calling name blocking, 7-digit dialing, and/or is requestingspecial telephony features (e.g., *72 forward calls, *73 cancel callforwarding, *67 for caller ID blocking, and so on). Based on initialfilter criteria (iFCs) in a subscriber profile associated with a CD, oneor more application servers may be invoked to provide various calloriginating feature services.

Additionally, the originating S-CSCF 306 can submit queries to the ENUMsystem 330 to translate an E.164 telephone number in the SIP INVITEmessage to a SIP Uniform Resource Identifier (URI) if the terminatingcommunication device is IMS-compliant. The SIP URI can be used by anInterrogating CSCF (I-CSCF) 307 to submit a query to the HSS 340 toidentify a terminating S-CSCF 314 associated with a terminating IMS CDsuch as reference 302. Once identified, the I-CSCF 307 can submit theSIP INVITE message to the terminating S-CSCF 314. The terminating S-CSCF314 can then identify a terminating P-CSCF 316 associated with theterminating CD 302. The P-CSCF 316 may then signal the CD 302 toestablish Voice over Internet Protocol (VoIP) communication services,thereby enabling the calling and called parties to engage in voiceand/or data communications. Based on the iFCs in the subscriber profile,one or more application servers may be invoked to provide various callterminating feature services, such as call forwarding, do not disturb,music tones, simultaneous ringing, sequential ringing, etc.

In some instances the aforementioned communication process issymmetrical. Accordingly, the terms “originating” and “terminating” inFIG. 3 may be interchangeable. It is further noted that communicationsystem 300 can be adapted to support video conferencing. In addition,communication system 300 can be adapted to provide the IMS CDs 301, 302with the services of communication system 100 of FIG. 1.

If the terminating communication device is instead a PSTN CD such as CD303 or CD 305 (in instances where the cellular phone only supportscircuit-switched voice communications), the ENUM system 330 can respondwith an unsuccessful address resolution which can cause the originatingS-CSCF 306 to forward the call to the MGCF 320 via a Breakout GatewayControl Function (BGCF) 319. The MGCF 320 can then initiate the call tothe terminating PSTN CD over the PSTN network 360 to enable the callingand called parties to engage in voice and/or data communications.

It is further appreciated that the CDs of FIG. 3 can operate as wirelineor wireless devices. For example, the CDs of FIG. 3 can becommunicatively coupled to a cellular base station 321, a femtocell, aWiFi router, a Digital Enhanced Cordless Telecommunications (DECT) baseunit, or another suitable wireless access unit to establishcommunications with the IMS network 350 of FIG. 3. The cellular accessbase station 321 can operate according to common wireless accessprotocols such as GSM, CDMA, TDMA, UMTS, WiMax, SDR, LTE, and so on.Other present and next generation wireless network technologies can beused by one or more embodiments of the subject disclosure. Accordingly,multiple wireline and wireless communication technologies can be used bythe CDs of FIG. 3.

Cellular phones supporting LTE can support packet-switched voice andpacket-switched data communications and thus may operate asIMS-compliant mobile devices. In this embodiment, the cellular basestation 321 may communicate directly with the IMS network 350 as shownby the arrow connecting the cellular base station 321 and the P-CSCF316.

Alternative forms of a CSCF can operate in a device, system, component,or other form of centralized or distributed hardware and/or software.Indeed, a respective CSCF may be embodied as a respective CSCF systemhaving one or more computers or servers, either centralized ordistributed, where each computer or server may be configured to performor provide, in whole or in part, any method, step, or functionalitydescribed herein in accordance with a respective CSCF. Likewise, otherfunctions, servers and computers described herein, including but notlimited to, the HSS, the ENUM server, the BGCF, and the MGCF, can beembodied in a respective system having one or more computers or servers,either centralized or distributed, where each computer or server may beconfigured to perform or provide, in whole or in part, any method, step,or functionality described herein in accordance with a respectivefunction, server, or computer.

Wireless CDs 302 and 305 can be adapted with software to performmanagement function 115 to manage service connection requests, cellselection for alternative radio access technologies and/or prohibitionof transmitting service requests to an overloaded cell/RAT for anoverload mitigation time duration.

For illustration purposes only, the terms S-CSCF, P-CSCF, I-CSCF, and soon, can be server devices, but may be referred to in the subjectdisclosure without the word “server.” It is also understood that anyform of a CSCF server can operate in a device, system, component, orother form of centralized or distributed hardware and software. It isfurther noted that these terms and other terms such as DIAMETER commandsare terms can include features, methodologies, and/or fields that may bedescribed in whole or in part by standards bodies such as 3GPP. It isfurther noted that some or all embodiments of the subject disclosure mayin whole or in part modify, supplement, or otherwise supersede final orproposed standards published and promulgated by 3GPP.

FIG. 4A depicts an illustrative embodiment of a communication device400. Communication device 400 can serve in whole or in part as anillustrative embodiment of the devices depicted in FIG. 1. Device 400can enable monitoring a number of consecutive failed service requests,such as EMM SERVICE REQUESTS in an LTE radio access technology, and canenable detection or otherwise determining network overload based on themonitoring. The device 400 can facilitate alleviating the networkoverload or other undesired conditions whereby a network may want tolimit particular traffic and/or the device may want to utilize adifferent cell/RAT. The initiation of cell selection for other radioaccess technologies and/or the prohibition of service requestsassociated with an overloaded radio access technology can allow a CoreNetwork to overcome an overloaded condition.

For example, the device 400 can receive configuration from which athreshold for a permissible number of failed service requests can bedetermined, and the device can count the number of consecutive servicerequest failures (over a pre-determined time period or without respectto a time period) to determine whether an overload condition may exist.The exemplary embodiments can utilize various factors in determining anoverload condition. The overload determination can be a trigger for thedevice 400 to perform cell selection utilizing other radio accesstechnologies. The overload determination can also be a trigger forprohibiting or otherwise preventing transmission of service requestsfrom the device 400 that are associated with the overloaded radio accesstechnology.

To enable these features, communication device 400 can comprise awireline and/or wireless transceiver 402 (herein transceiver 402), auser interface (UI) 404, a power supply 414, a location receiver 416, amotion sensor 418, an orientation sensor 420, and a controller 406 formanaging operations thereof. The transceiver 402 can support short-rangeor long-range wireless access technologies such as Bluetooth, ZigBee,WiFi, DECT, or cellular communication technologies, just to mention afew. Cellular technologies can include, for example, CDMA-1×,UMTS/HSDPA, GSM/GPRS, TDMA/EDGE, EV/DO, WiMAX, SDR, LTE, as well asother next generation wireless communication technologies as they arise.The transceiver 402 can also be adapted to support circuit-switchedwireline access technologies (such as PSTN), packet-switched wirelineaccess technologies (such as TCP/IP, VoIP, etc.), and combinationsthereof.

The UI 404 can include a depressible or touch-sensitive keypad 408 witha navigation mechanism such as a roller ball, a joystick, a mouse, or anavigation disk for manipulating operations of the communication device400. The keypad 408 can be an integral part of a housing assembly of thecommunication device 400 or an independent device operably coupledthereto by a tethered wireline interface (such as a USB cable) or awireless interface supporting for example Bluetooth. The keypad 408 canrepresent a numeric keypad commonly used by phones, and/or a QWERTYkeypad with alphanumeric keys. The UI 404 can further include a display410 such as monochrome or color LCD (Liquid Crystal Display), OLED(Organic Light Emitting Diode) or other suitable display technology forconveying images to an end user of the communication device 400. In anembodiment where the display 410 is touch-sensitive, a portion or all ofthe keypad 408 can be presented by way of the display 410 withnavigation features.

The display 410 can use touch screen technology to also serve as a userinterface for detecting user input. As a touch screen display, thecommunication device 400 can be adapted to present a user interface withgraphical user interface (GUI) elements that can be selected by a userwith a touch of a finger. The touch screen display 410 can be equippedwith capacitive, resistive or other forms of sensing technology todetect how much surface area of a user's finger has been placed on aportion of the touch screen display. This sensing information can beused to control the manipulation of the GUI elements or other functionsof the user interface. The display 410 can be an integral part of thehousing assembly of the communication device 400 or an independentdevice communicatively coupled thereto by a tethered wireline interface(such as a cable) or a wireless interface.

The UI 404 can also include an audio system 412 that utilizes audiotechnology for conveying low volume audio (such as audio heard inproximity of a human ear) and high volume audio (such as speakerphonefor hands free operation). The audio system 412 can further include amicrophone for receiving audible signals of an end user. The audiosystem 412 can also be used for voice recognition applications. The UI404 can further include an image sensor 413 such as a charged coupleddevice (CCD) camera for capturing still or moving images.

The power supply 414 can utilize common power management technologiessuch as replaceable and rechargeable batteries, supply regulationtechnologies, and/or charging system technologies for supplying energyto the components of the communication device 400 to facilitatelong-range or short-range portable applications. Alternatively, or incombination, the charging system can utilize external power sources suchas DC power supplied over a physical interface such as a USB port orother suitable tethering technologies.

The location receiver 416 can utilize location technology such as aglobal positioning system (GPS) receiver capable of assisted GPS foridentifying a location of the communication device 400 based on signalsgenerated by a constellation of GPS satellites, which can be used forfacilitating location services such as navigation. The motion sensor 418can utilize motion sensing technology such as an accelerometer, agyroscope, or other suitable motion sensing technology to detect motionof the communication device 400 in three-dimensional space. Theorientation sensor 420 can utilize orientation sensing technology suchas a magnetometer to detect the orientation of the communication device400 (north, south, west, and east, as well as combined orientations indegrees, minutes, or other suitable orientation metrics).

The communication device 400 can use the transceiver 402 to alsodetermine a proximity to a cellular, WiFi, Bluetooth, or other wirelessaccess points by sensing techniques such as utilizing a received signalstrength indicator (RSSI) and/or signal time of arrival (TOA) or time offlight (TOF) measurements. The controller 406 can utilize computingtechnologies such as a microprocessor, a digital signal processor (DSP),programmable gate arrays, application specific integrated circuits,and/or a video processor with associated storage memory such as Flash,ROM, RAM, SRAM, DRAM or other storage technologies for executingcomputer instructions, controlling, and processing data supplied by theaforementioned components of the communication device 400.

Other components not shown in FIG. 4 can be used in one or moreembodiments of the subject disclosure. For instance, the communicationdevice 400 can include a reset button (not shown). The reset button canbe used to reset the controller 406 of the communication device 400. Inyet another embodiment, the communication device 400 can also include afactory default setting button positioned, for example, below a smallhole in a housing assembly of the communication device 400 to force thecommunication device 400 to re-establish factory settings. In thisembodiment, a user can use a protruding object such as a pen or paperclip tip to reach into the hole and depress the default setting button.The communication device 400 can also include a slot for adding orremoving an identity module such as a Subscriber Identity Module (SIM)card. SIM cards can be used for identifying subscriber services,executing programs, storing subscriber data, and so forth. In oneembodiment, configuration information in the form of SIM OTA data can beobtained by the device 400, where the configuration information includesa maximum number of permissible failed service requests, an overloadmitigation time duration, and/or data that enables calculation of themaximum number of permissible failed service requests and/or theoverload mitigation time duration.

The communication device 400 as described herein can operate with moreor less of the circuit components shown in FIG. 4A. These variantembodiments can be used in one or more embodiments of the subjectdisclosure.

The communication device 400 can be adapted to perform the functions ofthe communication devices of FIG. 1, as well as the IMS CDs 301-302 andPSTN CDs 303-305 of FIG. 3. It will be appreciated that thecommunication device 400 can also represent other devices that canoperate in communication system 100 of FIG. 1 such as a wireless gamingconsole or a wireless media player.

The communication device 400 (such as via baseband controller 403 and/orapplications controller 406) can be adapted in various embodiments toperform the functions 115 described with respect to FIG. 1, includingdetermining a triggering event for the cell selection associated withalternative radio access technologies and/or preventing transmission ofservice requests associated with an overloaded cell/RAT.

In one or more embodiments, management functions 115 (e.g., determininga network overload, cell selection associated with alternative radioaccess technologies and/or preventing transmission of service requestsassociated with an overloaded cell/RAT) can be performed by the basebandcontroller 403 and/or the applications controller 406 of device 400. Inone embodiment, the baseband controller 403 can manage all of thelong-distance radio functions, which may not include WiFi and/orBluetooth communications. For example, the baseband processor 403 canutilize its own RAM and/or firmware. The baseband processor 403 due tothe radio control functions (signal modulation, encoding, radiofrequency shifting, etc.) can be highly timing dependent, and canutilize a real time operating system. In one embodiment, the basebandprocessor 403 can operate using an operating system that is distinctfrom an operating system of the applications processor 406.

Device 400 can include various other components that may or may not beillustrated in FIG. 4A, including power amplifiers, antennas, memory,user interfaces, SIM card, clock oscillator, battery and so forth. Thecomponents of device 400 can be arranged in various configurations,including positioning the baseband processor 403 between theapplications processor 406 and the transceiver 402 to facilitate thecontrol exerted by the baseband processor to prevent (temporarily orotherwise) service requests associated with an overloaded cell/RAT frombeing transmitted while allowing other service requests associated withalternative radio access technologies to be transmitted.

FIG. 4B illustrates a timing diagram in which ignored service requestsare being monitored to determine an overload condition. In thisembodiment, each of the service requests are associated with LTEcommunications where subsequent service requests are transmitted afterexpiration of timer T3146. For this example, the threshold number ofpermissible failed consecutive service requests is five, so uponreaching the threshold, the end user device 400 initiates cell selectionin an alternative radio access technology (e.g., 3G/2G service). Afterexpiration of the overload mitigation time duration (denotedT_(average)) the end user device can again return to transmittingservice requests for the LTE service.

Upon reviewing the aforementioned embodiments, it would be evident to anartisan with ordinary skill in the art that said embodiments can bemodified, reduced, or enhanced without departing from the scope of theclaims described below. For example, configuration information can beshared peer-to-peer rather than or in combination with a centralizeddistribution of the configuration information. For example, a first enduser device can receive configuration information (e.g., a maximumnumber of failed service requests, an overload mitigation time durationand/or network status data from which these values can be determined)from a second end user device that is operating in or within proximityto a first cell to which the configuration information applies.

In another embodiment, the alternative radio access technologies thatcan be utilized in the cell selection responsive to a determination ofcore network overload can be selected from a group of RATs based ontheir current network status and their ability to provide a desiredservice.

In one embodiment, when N consecutive service requests are ignored on anLTE RAT (e.g., T3417 timer expiry), the end user device can bar ordisable the LTE RAT of the camped PLMN for T minutes. This can alsotrigger starting a cell selection procedure to search for other RATs ofthe same PLMN. For example, the default value for N can be 5 while thedefault value for T can be the value of the T3402 timer. Other valuescan also be utilized, including dynamic values that are adjustable basedon a number of factors, including network conditions, device capability,quality of service requirements, and so forth. In one embodiment, theend user device can follow the 3GPP specification to decide the value ofT3402. In another embodiment, the end user device can read N and/or Tvalues from a file on SIM card and/or the value of N and/or T can becontrolled by SIM OTA communications. In one embodiment, a power cycleof the end user device can clear the barring/disabling of the LTE RAT.In another embodiment, the barring/disabling can be cleared when the enduser device is directed by the network (e.g., handover or redirect) tothe LTE RAT of the same PLMN. In another embodiment, thebarring/disabling can be cleared after a pre-determined or dynamic(e.g., calculated based on network conditions) time duration.

It should be understood that devices described in the exemplaryembodiments can be in communication with each other via various wirelessand/or wired methodologies. The methodologies can be links that aredescribed as coupled, connected and so forth, which can includeunidirectional and/or bidirectional communication over wireless pathsand/or wired paths that utilize one or more of various protocols ormethodologies, where the coupling and/or connection can be direct (e.g.,no intervening processing device) and/or indirect (e.g., an intermediaryprocessing device such as a router).

FIG. 5 depicts an exemplary diagrammatic representation of a machine inthe form of a computer system 500 within which a set of instructions,when executed, may cause the machine to perform any one or more of themethods described above. For example, system 500 can enable determininga network overload based on monitoring of failed service requests andcan initiate overload mitigation procedures, including cell selectionfor alternative radio access technologies and/or preventing servicerequests from being transmitted that are associated with an overloadedcell/RAT. One or more instances of the machine can operate, for example,as the end user device 110, the communication device 400 and otherdevices of FIGS. 1-4. In some embodiments, the machine may be connected(e.g., using a network 526) to other machines. In a networkeddeployment, the machine may operate in the capacity of a server or aclient user machine in server-client user network environment, or as apeer machine in a peer-to-peer (or distributed) network environment.

The machine may comprise a server computer, a client user computer, apersonal computer (PC), a tablet PC, a smart phone, a laptop computer, adesktop computer, a control system, a network router, switch or bridge,or any machine capable of executing a set of instructions (sequential orotherwise) that specify actions to be taken by that machine. It will beunderstood that a communication device of the subject disclosureincludes broadly any electronic device that provides voice, video ordata communication. Further, while a single machine is illustrated, theterm “machine” shall also be taken to include any collection of machinesthat individually or jointly execute a set (or multiple sets) ofinstructions to perform any one or more of the methods discussed herein.

The computer system 500 may include a processor (or controller) 502(e.g., a central processing unit (CPU), a graphics processing unit (GPU,or both), a main memory 504 and a static memory 506, which communicatewith each other via a bus 508. The computer system 500 may furtherinclude a display unit 510 (e.g., a liquid crystal display (LCD), a flatpanel, or a solid state display. The computer system 500 may include aninput device 512 (e.g., a keyboard), a cursor control device 514 (e.g.,a mouse), a disk drive unit 516, a signal generation device 518 (e.g., aspeaker or remote control) and a network interface device 520. Indistributed environments, the embodiments described in the subjectdisclosure can be adapted to utilize multiple display units 510controlled by two or more computer systems 500. In this configuration,presentations described by the subject disclosure may in part be shownin a first of the display units 510, while the remaining portion ispresented in a second of the display units 510.

The disk drive unit 516 may include a tangible computer-readable storagemedium 522 on which is stored one or more sets of instructions (e.g.,software 524) embodying any one or more of the methods or functionsdescribed herein, including those methods illustrated above. Theinstructions 524 may also reside, completely or at least partially,within the main memory 504, the static memory 506, and/or within theprocessor 502 during execution thereof by the computer system 500. Themain memory 504 and the processor 502 also may constitute tangiblecomputer-readable storage media.

Dedicated hardware implementations including, but not limited to,application specific integrated circuits, programmable logic arrays andother hardware devices that can likewise be constructed to implement themethods described herein. Application specific integrated circuits andprogrammable logic array can use downloadable instructions for executingstate machines and/or circuit configurations to implement embodiments ofthe subject disclosure. Applications that may include the apparatus andsystems of various embodiments broadly include a variety of electronicand computer systems. Some embodiments implement functions in two ormore specific interconnected hardware modules or devices with relatedcontrol and data signals communicated between and through the modules,or as portions of an application-specific integrated circuit. Thus, theexample system is applicable to software, firmware, and hardwareimplementations.

In accordance with various embodiments of the subject disclosure, theoperations or methods described herein are intended for operation assoftware programs or instructions running on or executed by a computerprocessor or other computing device, and which may include other formsof instructions manifested as a state machine implemented with logiccomponents in an application specific integrated circuit or fieldprogrammable array. Furthermore, software implementations (e.g.,software programs, instructions, etc.) can include, but not limited to,distributed processing or component/object distributed processing,parallel processing, or virtual machine processing can also beconstructed to implement the methods described herein. It is furthernoted that a computing device such as a processor, a controller, a statemachine or other suitable device for executing instructions to performoperations or methods may perform such operations directly or indirectlyby way of one or more intermediate devices directed by the computingdevice.

While the tangible computer-readable storage medium 522 is shown in anexample embodiment to be a single medium, the term “tangiblecomputer-readable storage medium” should be taken to include a singlemedium or multiple media (e.g., a centralized or distributed database,and/or associated caches and servers) that store the one or more sets ofinstructions. The term “tangible computer-readable storage medium” shallalso be taken to include any non-transitory medium that is capable ofstoring or encoding a set of instructions for execution by the machineand that cause the machine to perform any one or more of the methods ofthe subject disclosure.

The term “tangible computer-readable storage medium” shall accordinglybe taken to include, but not be limited to: solid-state memories such asa memory card or other package that houses one or more read-only(non-volatile) memories, random access memories, or other re-writable(volatile) memories, a magneto-optical or optical medium such as a diskor tape, or other tangible media which can be used to store information.Accordingly, the disclosure is considered to include any one or more ofa tangible computer-readable storage medium, as listed herein andincluding art-recognized equivalents and successor media, in which thesoftware implementations herein are stored.

Although the present specification describes components and functionsimplemented in the embodiments with reference to particular standardsand protocols, the disclosure is not limited to such standards andprotocols. Each of the standards for Internet and other packet switchednetwork transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) representexamples of the state of the art. Such standards are from time-to-timesuperseded by faster or more efficient equivalents having essentiallythe same functions. Wireless standards for device detection (e.g.,RFID), short-range communications (e.g., Bluetooth, WiFi, Zigbee), andlong-range communications (e.g., WiMAX, GSM, CDMA, LTE) can be used bycomputer system 500.

The illustrations of embodiments described herein are intended toprovide a general understanding of the structure of various embodiments,and they are not intended to serve as a complete description of all theelements and features of apparatus and systems that might make use ofthe structures described herein. Many other embodiments will be apparentto those of skill in the art upon reviewing the above description. Otherembodiments may be utilized and derived therefrom, such that structuraland logical substitutions and changes may be made without departing fromthe scope of this disclosure. Figures are also merely representationaland may not be drawn to scale. Certain proportions thereof may beexaggerated, while others may be minimized. Accordingly, thespecification and drawings are to be regarded in an illustrative ratherthan a restrictive sense.

Although specific embodiments have been illustrated and describedherein, it should be appreciated that any arrangement calculated toachieve the same purpose may be substituted for the specific embodimentsshown. This disclosure is intended to cover any and all adaptations orvariations of various embodiments. Combinations of the aboveembodiments, and other embodiments not specifically described herein,can be used in the subject disclosure.

The Abstract of the Disclosure is provided with the understanding thatit will not be used to interpret or limit the scope or meaning of theclaims. In addition, in the foregoing Detailed Description, it can beseen that various features are grouped together in a single embodimentfor the purpose of streamlining the disclosure. This method ofdisclosure is not to be interpreted as reflecting an intention that theclaimed embodiments require more features than are expressly recited ineach claim. Rather, as the following claims reflect, inventive subjectmatter lies in less than all features of a single disclosed embodiment.Thus the following claims are hereby incorporated into the DetailedDescription, with each claim standing on its own as a separately claimedsubject matter.

What is claimed is:
 1. A machine-readable storage device comprisingexecutable instructions, which, responsive to being executed by aprocessor of a wireless communication device, cause the processor toperform operations comprising: receiving configuration information via asystem information broadcast or via a subscriber identity moduleover-the-air communication, wherein the configuration informationincludes status data of a network; calculating a threshold for a maximumnumber of failed service requests, based on the configurationinformation; monitoring for service requests being transmitted from thewireless communication device to a first cell associated with a firstradio access technology; determining a number of consecutive failedservice requests based on the monitoring, wherein failure of a servicerequest corresponds to expiration of a predetermined time period withouta response to the service request; responsive to a determination thatthe number of consecutive failed service requests exceeds the thresholdfor the maximum number of failed service requests, determining anoverload mitigation time duration associated with the first radio accesstechnology from a calculation based on the status data; performing afirst cell selection to select a second cell associated with a secondradio access technology during the overload mitigation time duration,the second cell being different from the first cell; performing anattachment during the overload mitigation time duration and responsiveto the selection of the second cell, wherein the attachment is based oncircuit switching, packet switching and packet data protocolcommunications; prohibiting transmitting of service requests associatedwith the first radio access technology during the overload mitigationtime duration; and responsive to a determination of an expiration of theoverload mitigation time duration: performing a second cell selection toselect a third cell associated with the first radio access technology,and allowing transmission of additional service requests associated withthe first radio access technology.
 2. The machine-readable storagedevice of claim 1, wherein the configuration information comprising thestatus data based on which the threshold for the maximum number offailed service requests is calculated and the status data based on whichthe overload mitigation time duration is calculated comprise historicaltraffic information and performance metrics relating to the network. 3.The machine-readable storage device of claim 2, wherein the status datafurther comprises events expected to affect network traffic.
 4. Themachine-readable storage device of claim 1, wherein the configurationinformation is received from a remote source.
 5. The machine-readablestorage device of claim 1, wherein the configuration information isreceived from a server associated with the first cell.
 6. Themachine-readable storage device of claim 1, wherein the third cell isdifferent from the first cell.
 7. The machine-readable storage device ofclaim 1, wherein the first cell selection is performed using storedinformation regarding carrier frequencies and cell parameters for aplurality of cells.
 8. The machine-readable storage device of claim 1,wherein the service requests comprise evolved packet system mobilitymanagement service requests, and wherein the first radio accesstechnology corresponds to a long term evolution radio access technology.9. A method comprising: receiving, by a processor of a wirelesscommunication device, configuration information via a system informationbroadcast or via a subscriber identity module over-the-aircommunication, wherein the configuration information includes networkstatus data; calculating, by the processor, a threshold for a maximumnumber of failed service requests, based on the configurationinformation; monitoring, by the processor, for service requests beingtransmitted from the wireless communication device to a first cell,wherein the service requests are associated with a first radio accesstechnology; determining, by the processor, a number of consecutivefailed service requests based on the monitoring, wherein failure of aservice request corresponds to expiration of a predetermined time periodwithout a response to the service request; and responsive to adetermination by the processor that the number of consecutive failedservice requests exceeds the threshold for the maximum number of failedservice requests: performing, by the processor, a first cell selectionto select a second cell associated with a second radio access technologyduring an overload mitigation time duration associated with the firstradio access technology, wherein the overload mitigation time durationis determined from a calculation based on the network status data;performing, by the processor, an attachment during the overloadmitigation time duration and responsive to the selection of the secondcell, wherein the attachment is based on circuit switching, packetswitching and packet data protocol communications; and prohibiting, bythe processor, transmitting of service requests associated with thefirst radio access technology during the overload mitigation timeduration; and responsive to a determination by the processor of anexpiration of the overload mitigation time duration: performing, by theprocessor, a second cell selection to select a third cell associatedwith the first radio access technology, and allowing, by the processor,transmission of additional service requests associated with the firstradio access technology.
 10. The method of claim 9, wherein the networkstatus data comprises historical traffic information and performancemetrics relating to a network.
 11. The method of claim 9, wherein theservice requests comprise evolved packet system mobility managementservice requests, and wherein the first radio access technologycorresponds to a long term evolution radio access technology.
 12. Themethod of claim 9, wherein the configuration information is receivedfrom a remote source.
 13. The method of claim 9, wherein theconfiguration information is received from a server associated with thefirst cell.
 14. The method of claim 9, wherein the first cell selectionis performed using stored information regarding carrier frequencies andcell parameters for a plurality of cells.
 15. A wireless communicationdevice, comprising: a memory that stores computer instructions; and aprocessor coupled with the memory, wherein the processor, responsive toexecuting the computer instructions, performs operations comprising:receiving configuration information via a system information broadcastor via a subscriber identity module over-the-air communication, whereinthe configuration information includes network status data; calculatinga threshold for a maximum number of failed service requests, based onthe configuration information; monitoring for service requests beingtransmitted from the wireless communication device to a first cellassociated with a first radio access technology; responsive to adetermination that a number of consecutive failed service requestsexceeds the threshold for the maximum number of failed service requests,wherein failure of a service request corresponds to expiration of apredetermined time period without a response to the service request,determining an overload mitigation time duration associated with thefirst radio access technology from a calculation based on the networkstatus data; performing first cell selection of a second cell associatedwith a second radio access technology, the second cell being differentfrom the first cell, during the overload mitigation time duration;performing an attachment during the overload mitigation time durationand responsive to the selection of the second cell, wherein theattachment is based on circuit switching, packet switching and packetdata protocol communications; prohibiting transmitting of servicerequests associated with the first radio access technology during theoverload mitigation time duration; and responsive to a determination ofan expiration of the overload mitigation time duration, performing asecond cell selection to select a third cell associated with the firstradio access technology, and transmitting additional service requestsassociated with the first radio access technology.
 16. The wirelesscommunication device of claim 15, wherein the first cell selection isperformed using stored information regarding carrier frequencies andcell parameters for a plurality of cells.
 17. The wireless communicationdevice of claim 15, wherein the network status data comprises historicaltraffic information and performance metrics relating to a network. 18.The wireless communication device of claim 17, wherein the configurationinformation is received from a remote source.
 19. The wirelesscommunication device of claim 17, wherein the configuration informationis received from a server associated with the first cell.
 20. Thewireless communication device of claim 17, wherein the service requestscomprise evolved packet system mobility management service requests, andwherein the first radio access technology corresponds to a long termevolution radio access technology.