Determining a service leakage rate within a wireless communication network

ABSTRACT

A method of determining a network leakage rate within a wireless communication network that uses counters within an application server. The number of users at a second point in time, determined by the counters, is subtracted from a number of users at a first point in time, determined by the counters, to provide a first result. The number of user attempts to access the network, determined by the counters, is multiplied by a success rate and then the number of users leaving the network (de-registering from the network or handing off to a different network) is subtracted to provide a second result. The second result is subtracted from the first result and then divided by the number of users at the first point in time. The absolute value is the network leakage rate.

CROSS-REFERENCE TO RELATED APPLICATION

The present disclosure is related to and claims priority from U.S.Provisional Patent Application No. 62/189,403, filed Jul. 7, 2015, whichis incorporated herein by reference.

BACKGROUND

In recent years, telecommunication devices have advanced from offeringsimple voice calling services within wireless networks to providingusers with many new features. Telecommunication devices now providemessaging services such as email, text messaging, and instant messaging;data services such as Internet browsing; media services such as storingand playing a library of favorite songs; location services; and manyothers. In addition to the new features provided by thetelecommunication devices, users of such telecommunication devices havegreatly increased. Such an increase in users is only expected tocontinue and in fact, it is expected that there could be a growth rateof twenty times more users in the next few years alone. Such an increasein wireless traffic implies more demand and less radio resourceavailability, which likely leads to the degradation of the wirelessnetwork performance.

Operators of wireless networks generally use success rate keyperformance indicators (KPIs) to measure the performance in theirwireless networks. However, often KPIs do not capture the “health” or“quality” of the wireless network, such as, for example, the network orservice leakage, i.e., the number of users involuntarily disconnected or“dropped” from the wireless network. For example, current methods tocalculate network leakage include call detail records or charging datarecords (CDRs). However, CDRs generally have a high cost for processingand analysis due to the amount of data in the CDRs. Additionally, theCDRs do not provide for real time network health status and aregenerally less accurate. Finally, the cost associated with using CDRsgrows exponentially as you increase the granularity, e.g., going from anhourly time interval to a 15-minute interval.

BRIEF DESCRIPTION OF THE DRAWINGS

The detailed description is set forth with reference to the accompanyingfigures, in which the left-most digit of a reference number identifiesthe figure in which the reference number first appears. The use of thesame reference numbers in different figures indicates similar oridentical items or features.

FIG. 1 illustrates a wireless communication network, in accordance withvarious embodiments.

FIG. 2 is a flowchart illustrating a method of calculating a networkleakage rate within the wireless communication network of FIG. 1.

DETAILED DESCRIPTION

Described herein is a wireless communication network that includesarchitecture for calculating a network or service leakage rate basedupon various factors such as, for example, users on the network,attempted access to the network and attempted exit from the wirelesscommunication network. For example, an application server, eitherlocated within the wireless communication network or separatelytherefrom, includes counters that count the number of users currently onthe wireless communication network. The counters can also keep count ofthe number of users that attempt to access the wireless communicationnetwork and the number of users that attempt to exit the wirelesscommunication network.

In an embodiment, at a first point in time, the number of users on thewireless communication network is determined using the counters. At asecond point in time, the number of users on the wireless communicationnetwork is again determined using the counters. During the time periodbetween the first point in time and the second point in time, thecounters also determine the number of user attempts to access thewireless communication network and the number of users that weresuccessful in accessing the wireless communication network. Finally, thecounters also determine a number of users that attempted to exit thewireless communication network.

In order to determine the leakage rate, the number of users at thesecond point in time is subtracted from the numbers of users at thefirst point in time to provide a first result. The number of userinitial attempts that attempted to access the wireless communicationnetwork is multiplied by a success rate (where the success rate is thenumber of successful initial registration attempts between the secondpoint in time and the first point in time divided by the number of userinitial registration attempts between the second point in time and thefirst point in time; the number of successful initial registrations canbe defined as the number of positive responses sent back by the networkto the subscribers' initial registration requests) and then the numberof users leaving the network (de-registering from the network or handingoff to a different network) is subtracted to provide a second result.The second result is subtracted from the first result and then dividedby the number of users at the first point in time. The absolute valueprovided by this formula is the leakage rate. Note that initialregistration attempts distinguish from “refresh” registration attempts.For example, in an IMS network the users who are already registered onthe IMS network send “refresh register” on a regular basis (timeinterval is dictated by the network), similarly to a “keep alive”procedure, whereas the “initial register” is the procedure to connectthe users (who are not already registered on the IMS network) to the IMSnetwork

The leakage rate formula assumes that the wireless communication networkdoes not create duplicate subscribers for the subscribers who have lostconnection and then reconnect to the network. The formula also assumesthat the counters keeping track of the various numbers are accurate. Theresult of the formula should be zero, which indicates that there is nochange in the network or no leakage. Otherwise, the formula shouldproduce a negative value, i.e., the value of the formula should be lessthan zero (hence the absolute value of the formula is used as thenetwork leakage rate). If the result of the formula is above zero, thenthis indicates that there is an issue with the counters.

FIG. 1 illustrates a wireless communication network 10 (also referred toherein as network 10). The network 10 comprises a base station (BS) 12communicatively coupled to a plurality of user devices, referred to asUEs 14_1, 14_2, . . . , 14_N, where N is an appropriate integer. The BS12 serves UEs 14 located within a geographical area, e.g., within amacro cell 16. FIG. 1 illustrates the macro cell 16 to be hexagonal inshape, although other shapes of the macro cell 16 may also be possible.In general, the network 10 comprises a plurality of macro cells 16, witheach macro cell 16 including one or more BSs 12.

In an embodiment, the UEs 14_1, . . . , 14_N may comprise anyappropriate devices for communicating over a wireless communicationnetwork. Such devices include mobile telephones, cellular telephones,mobile computers, Personal Digital Assistants (PDAs), radio frequencydevices, handheld computers, laptop computers, tablet computers,palmtops, pagers, integrated devices combining one or more of thepreceding devices, and/or the like. As such, UEs 14_1, . . . , 14_N mayrange widely in terms of capabilities and features. For example, one ofthe UEs 14_1, . . . , 14_N may have a numeric keypad, a capability todisplay only a few lines of text and be configured to interoperate withonly Global System for Mobile Communications (GSM) networks. However,another of the UEs 14_1, . . . , 14_N (e.g., a smart phone) may have atouch-sensitive screen, a stylus, an embedded GPS receiver, and arelatively high-resolution display, and be configured to interoperatewith multiple types of networks. UEs 14_1, . . . , 14_N may also includeSIM-less devices (i.e., mobile devices that do not contain a functionalsubscriber identity module (“SIM”)), roaming mobile devices (i.e.,mobile devices operating outside of their home access networks), and/ormobile software applications.

In an embodiment, the BS 12 may communicate voice traffic and/or datatraffic with one or more of the UEs 14_1, . . . , 14_N. The BS 12 maycommunicate with the UEs 14_1, . . . , 14_N using one or moreappropriate wireless communication protocols or standards. For example,the BS 12 may communicate with the UEs 14_1, . . . , 14_N using one ormore standards, including but not limited to GSM, Internet Protocol (IP)Multimedia Subsystem (IMS), Time Division Multiple Access (TDMA),Universal Mobile Telecommunications System (UMTS), Evolution-DataOptimized (EVDO), Long Term Evolution (LTE), Generic Access Network(GAN), Unlicensed Mobile Access (UMA), Code Division Multiple Access(CDMA) protocols (including IS-95, IS-2000, and IS-856 protocols),Advanced LTE or LTE+, Orthogonal Frequency Division Multiple Access(OFDM), General Packet Radio Service (GPRS), Enhanced Data GSMEnvironment (EDGE), Advanced Mobile Phone System (AMPS), WiMAX protocols(including IEEE 802.16e-2005 and IEEE 802.16m protocols), High SpeedPacket Access (HSPA), (including High Speed Downlink Packet Access(HSDPA) and High Speed Uplink Packet Access (HSUPA)), Ultra MobileBroadband (UMB), and/or the like.

The BS 12 may be communicatively coupled (e.g., using a backhaulconnection, illustrated using solid lines in FIG. 1) to a number ofbackhaul equipments, e.g., an operation support subsystem (OSS) server18, a radio network controller (RNC) 20, and/or the like. The RNC 20 canalso be in the form of a mobility management entity when the wirelesscommunication network 10 operates according to the long term evolution(LTE) standard or LTE Advanced standard.

In an embodiment, the base station 12 may comprise processors 120, oneor more transmit antennas (transmitters) 122, one or more receiveantennas (receivers) 124, and computer-readable media 126. Theprocessors 120 may be configured to execute instructions, which may bestored in the computer-readable media 126 or in other computer-readablemedia accessible to the processors 120. In some embodiments, theprocessors 120 are a central processing unit (CPU), a graphicsprocessing unit (GPU), or both CPU and GPU, or any other sort ofprocessing unit. The base station 12 can also be in the form of a Node B(where the wireless communication network 10 is 3G UMTS network) or inthe form of an eNode B (where the wireless communication network 10operates according to the LTE standard or LTE Advanced standard).

The one or more transmit antennas 122 may transmit signals to the UEs14_1, . . . , 14_N, and the one or more receive antennas 124 may receivesignals from the UEs 14_1, . . . , 14_N. The antennas 122 and 124include any appropriate antennas known in the art. For example, antennas122 and 124 may include radio transmitters and radio receivers thatperform the function of transmitting and receiving radio frequencycommunications. In an embodiment, the antennas 122 and 124 may beincluded in a transceiver module of the BS 12.

The computer-readable media 126 may include computer-readable storagemedia (“CRSM”). The CRSM may be any available physical media accessibleby a computing device to implement the instructions stored thereon. CRSMmay include, but is not limited to, random access memory (“RAM”),read-only memory (“ROM”), electrically erasable programmable read-onlymemory (“EEPROM”), flash memory or other memory technology, compact diskread-only memory (“CD-ROM”), digital versatile disks (“DVD”) or otheroptical disk storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other medium which canbe used to store the desired information and which can be accessed bythe base station 12. The computer-readable media 126 may reside withinthe base station 12, on one or more storage devices accessible on alocal network to the base station 12, on cloud storage accessible via awide area network to the base station 12, or in any other accessiblelocation.

The computer-readable media 126 may store modules, such as instructions,data stores, and so forth that are configured to execute on theprocessors 120. For instance, the computer-readable media 126 may storean access point control module 128 and a network settings module 130, aswill be discussed in more detail herein later.

Although FIG. 1 illustrates the computer-readable media 126 in the BS 12storing the access point control module 128 and the network settingsmodule 130, in various other embodiments, the access point controlmodule 128, the network settings module 130, and one or more othermodules (not illustrated, may be stored in another component of thenetwork 10 (e.g., other than the BS 12). For example, one or more ofthese modules may be stored in a computer-readable media included in theOSS server 18, the RNC 20, another appropriate server associated withthe network 10, and/or the like.

Although not illustrated in FIG. 1, various other modules (e.g., anoperating system module, basic input/output systems (BIOS), etc.) mayalso be stored in the computer-readable media 126. Furthermore, althoughnot illustrated in FIG. 1, the base station 12 may comprise severalother components, e.g., a power bus configured to supply power tovarious components of the base station 12, one or more interfaces tocommunicate with various backhaul equipment, and/or the like.

In an embodiment, the UEs 14 may comprise processors 140, one or moretransmit antennas (transmitters) 142, one or more receive antennas(receivers) 144, and computer-readable media 146. The processors 140 maybe configured to execute instructions, which may be stored in thecomputer-readable media 146 or in other computer-readable mediaaccessible to the processors 140. In some embodiments, the processors140 is a central processing unit (CPU), a graphics processing unit(GPU), or both CPU and GPU, or any other sort of processing unit. Theone or more transmit antennas 142 may transmit signals to the basestation 12, and the one or more receive antennas 144 may receive signalsfrom the base station 12. In an embodiment, the antennas 142 and 144 maybe included in a transceiver module of the UE 14.

The computer-readable media 146 may also include CRSM. The CRSM may beany available physical media accessible by a computing device toimplement the instructions stored thereon. CRSM may include, but is notlimited to, RAM, ROM, EEPROM, a SIM card, flash memory or other memorytechnology, CD-ROM, DVD or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store thedesired information and which can be accessed by the UE 14.

The computer-readable media 146 may store several modules, such asinstructions, data stores, and so forth that are configured to executeon the processors 140. For instance, the computer-readable media 140 maystore a configuration module 148. Although not illustrated in FIG. 1,the computer-readable media 146 may also store one or more applicationsconfigured to receive and/or provide voice, data and messages (e.g.,short message service (SMS) messages, multi-media message service (MMS)messages, instant messaging (IM) messages, enhanced message service(EMS) messages, etc.) to and/or from another device or component (e.g.,the base station 12, other UEs, etc.).

Although not illustrated in FIG. 1, the UEs 14 may also comprise variousother components, e.g., a battery, a charging unit, one or more networkinterfaces, an audio interface, a display, a keypad or keyboard, a GPSreceiver and/or other location determination component, and other inputand/or output interfaces.

Although FIG. 1 illustrates only one UE (UE 14_1) in detail, each of theUEs 14_2, . . . , 14_N may have a structure that is at least in partsimilar to that of the UE 14_1. For example, similar to the UE 14_1,each of the UEs 14_2, . . . , 14_N may comprise processors, one or moretransmit antennas, one or more receive antennas, and computer-readablemedia including a configuration module.

In an embodiment, the network settings module 130 stored in thecomputer-readable media 126 maintains a plurality of network settingsassociated with the network 10. Individual network settings maintainedby the network settings module 130 may be pertinent to a single UE ofthe UEs 14_1, . . . , 14_N, a subset of the UEs 14_1, . . . , 14_N, oreach of the UEs 14_1, . . . , 14_N. For example, a network setting ofthe plurality of network settings may specify a maximum bit rate atwhich a UE (or each of the UEs 14_1, . . . , 14_N) may transmit data tothe BS 12. Another network setting of the plurality of network settingsmay specify a transmit time interval (tti) used by each of the UEs 14_1,. . . , 14_N to transmit data to the BS 12. Yet another network settingof the plurality of network settings may specify a maximum power thateach of the UEs 14_1, . . . , 14_N may use to transmit data to the BS12. The plurality of network settings maintained by the network settingsmodule 130 may also include any other appropriate type of networksettings.

In an embodiment, one or more of the plurality of network settingsmaintained by the network settings module 13 may be communicated to theUEs 14_1, . . . , 14_N (e.g., by the transmit antennas 122 to thereceive antennas 144 of the UEs 14_1, . . . , 14_N). Based on receivingthe network settings, the UEs 14_1, . . . , 14_N (e.g., thecorresponding configuration modules 148) may configure themselves andcommunicate with the BS 12 accordingly.

Generally, the network 10 is made up of multiple macro cells 16. Thus,depending on the configuration and size, the network 10 can representand serve various regional areas, e.g., a city, a state, an entirenation, the whole world, etc.

In embodiments, a counter 132 is located within an application server(AS) 134. In an embodiment, as the application server 134 is a telephonyapplication server (TAS). The application server can also be locatedwithin the OSS server 18 or the RNC 20. The network 10 may includemultiple application servers 134, and therefore multiple counters 132.Furthermore, each application server 134 may include more than onecounter 132 to help keep track of various parameters. The applicationserver(s) 134 can also be located outside the network 10.

The UEs 14 generally access or connect to the network 10 by aregistration process. Likewise, the UEs 14 exit the network 10 by ade-registration process. However, sometimes the UEs 14 are involuntarilydisconnected or dropped from the network 10. In order to monitor thequality and health of the network 10, a network or service leakage rateis monitored, where the network or service leakage rate represents therate at which UEs 14 are involuntarily disconnected from the network 10.

In accordance with an embodiment, a leakage rate formula is representedby Eq. 1:(Sub_count_T2−Sub_count_T1−(InitReg_Attempts*Reg_SR−DeReg_Attempts))/Sub_count_T1  Eq. 1

Sub_count_T1 and Sub_count_T2 are the registered subscriber countmeasured at 2 consecutive times T1 and T2 separated by a time intervalTi=T2−T1. InitReg_Attempts is the (cumulated) number of InitialRegistration attempts counted between T2 and T1. DeReg_Attempts is the(cumulated) number of De-Registration attempts counted between T2 andT1. Reg_SR is the Success Rate for the Initial Registration Attempt (in%) and thus is the number of successful initial registration attemptsbetween the second point in time and the first point in time divided bythe number of user initial registration attempts between the secondpoint in time and the first point in time. The number of successfulinitial registrations can be defined as the number of positive responsessent back by the network to the subscribers' initial registrationrequests. Initial registration attempts distinguish from “refresh”registration attempts. For example, in an IMS network the users who arealready registered on the IMS network send “refresh register” on aregular basis (time interval is dictated by the network), similarly to a“keep alive” procedure, whereas the “initial register” is the procedureto connect the users (who are not already registered on the IMS network)to the IMS network. Reg_SR is represented by Eq. 2:(InitReg_Attempts−number_of_unsuccessful_Initial Registrations)/InitReg_Attempts)   Eq. 2

Thus, in an embodiment, at a first point in time T1, the number of UEs14 on the network 10 (Sub_count_T1) is determined using one or more ofthe counters 132. At a second point in time T2, the number of UEs 14 onthe network 10 (Sub_count_T2) is again determined using one or more ofthe counters 132. During the time period between the T1 and T2, one ormore of the counters 132 also determine the number of UEs 14 thatattempted to access the network 10 (InitReg_Attempts) and the number ofUEs 14 that were successful in accessing the network 10(number_of_successful_Initial Registrations). Finally, one or more ofcounters 132 also determine a number of UEs 14 that attempted to exitthe network 10 (DeReg_Attempts).

Thus, using Eqs. 1 and 2, in order to determine the leakage rate, thenumber of UEs 14 at the second point in time is subtracted from thenumber of UEs 14 at the first point in time to provide a first result.The number of UEs 14 initial attempts to access the network 10 ismultiplied by the success rate and then the number of UEs 14 leaving thenetwork 10 (de-registering from the network 10 or handing off to adifferent network) is subtracted to provide a second result. The secondresult is subtracted from the first result and then divided by thenumber of UEs 14 at the first point in time. The absolute value providedby the leakage rate formula (Eq.1) is the network leakage rate.

The leakage rate formula (Eq. 1) can be calculated by the applicationserver(s) 134 or other server(s) or processor(s). Additionally, theleakage rate formula (Eq. 1) assumes that the network 10 does not createduplicate registered UEs 14 for the UEs 14 who have lost connection tothe network 10 and then successfully reconnect to the network 10. Theformula also assumes that the counters 132 keeping track of the variousnumbers are accurate. Ideally, the result of the formula would be zero,which indicates that there is no change in the network 10, i.e. noleakage. Otherwise, the formula should produce a negative value, i.e.,the value of the formula should be less than zero (hence the absolutevalue of the formula is used as the network leakage rate). If the resultof the formula is above zero, then this indicates that there is an issuewith the counters 132.

The leakage rate formula (Eq.1) can be used with the various wirelesscommunication network protocols or standards previously mentioned above.Additionally, the leakage rate formula can be used can be used tocalculate a leakage rate for services that are based on an IMS network,such as, for example, voice-over LTE (VoLTE), video-over LTE (ViLTE),Wi-Fi calling, rich communication services (RCS) and web RTC. Use of theleakage rate formula as described herein provides real time networkhealth status. Additionally, the leakage rate formula requires very lowprocessing and calculation costs. Additionally, the leakage rate formulaallows for finer statistical granularity. For example, in embodiments,the leakage rate can be calculated hourly, every 30 minutes, every 20minutes, every 15 minutes, every 10 minutes, etc., in order to provideeven more accuracy. In other words, the smaller time interval betweencalculation of the leakage rate, the more accurate the leakage rateinformation is.

FIG. 2 is a flow diagram of an illustrative process that may beimplemented within the wireless communication network 10. This process(as well as other processes described throughout) are illustrated as alogical flow graph, each operation of which represents a sequence ofoperations that can be implemented in hardware, software, or acombination thereof. In the context of software, the operationsrepresent computer-executable instructions stored on one or moretangible computer-readable storage media that, when executed by one ormore processors, perform the recited operations. Generally,computer-executable instructions include routines, programs, objects,components, data structures, and the like that perform particularfunctions or implement particular abstract data types. The order inwhich the operations are described is not intended to be construed as alimitation, and any number of the described operations can be combinedin any order and/or in parallel to implement the process. Furthermore,while the architectures and techniques described herein have beendescribed with respect to wireless networks, the architectures andtechniques are equally applicable to processors and processing cores inother environments and computing devices.

FIG. 2 is a flowchart illustrating a method 200 of calculating a networkleakage rate within a wireless communication network. As illustrated, atblock 202, one or more counters located within one or more applicationservers within the wireless communication network count (i) users on thewireless communication network, (ii) users attempting to access thewireless communication network, and (iii) users attempting to exit thewireless communication network. At block 204, based upon the counting, afirst number of users on the wireless communication network at a firsttime is determined. At block 206, based upon the counting, a secondnumber of users on the wireless communication network at a second timeis determined. At block 208, based upon the counting, a third number ofuser attempts to access the wireless communication network between thefirst time and the second time is determined. At block 210, a successrate for the third number of user attempts to access the wirelesscommunication network between the first time and the second time isdetermined. At block 212, a fourth number of users that attempted toexit the wireless communication network between the first time and thesecond time is determined. At block 214, the third number is multipliedby the success rate to provide a first result. At block 216, the fourthnumber is subtracted from the first result to provide a second result.At block 218, the leakage rate is calculated by (i) determining adifference between the first number and the second number, (ii)subtracting the second result from the difference to create a thirdresult, and (iii) dividing the third result by the first number.

Although the subject matter has been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the subject matter defined in the appended claims is notnecessarily limited to the specific features or acts described. Rather,the specific features and acts are disclosed as exemplary forms ofimplementing the claims.

We claim:
 1. A method of determining a leakage rate within a wirelesscommunication network, the method comprising: counting, with one or morecounters located within one or more application servers within thewireless communication network, (i) users on the wireless communicationnetwork, (ii) users attempting to access the wireless communicationnetwork, and (iii) users attempting to exit the wireless communicationnetwork; based upon the counting, determining a first number of users onthe wireless communication network at a first time; based upon thecounting, determining a second number of users on the wirelesscommunication network at a second time; based upon the counting,determining a third number of user attempts to access the wirelesscommunication network between the first time and the second time;determining a success rate for the third number of user attempts thewireless communication network between the first time and the secondtime; determining a fourth number of users that attempted to exit thewireless communication network between the first time and the secondtime; multiplying the third number by the success rate to provide afirst result; subtracting the fourth number from the first result toprovide a second result; and calculating the leakage rate by (i)determining a difference between the first number and the second number,(ii) subtracting the second result from the difference to create a thirdresult, and (iii) dividing the third result by the first number.
 2. Themethod of claim 1, wherein the leakage rate is calculated for a regionwithin the wireless communication network.
 3. The method of claim 1,wherein the leakage rate is calculated for the entire wirelesscommunication network.
 4. The method of claim 1, wherein an amount oftime between the first time and the second time is one hour.
 5. Themethod of claim 1, wherein an amount of time between the first time andthe second time is fifteen minutes.
 6. The method of claim 1, whereinthe application server is located within the wireless communicationnetwork.
 7. The method of claim 1, wherein the application server islocated outside the wireless communication network.
 8. The method ofclaim 1, wherein the wireless communication network comprises one of (i)a long term evolution (LTE) network, (ii) an advanced LTE network, (iii)a global system for mobile communications (GSM) network, (iv) aninternet protocol multimedia subsystem (IMS) network, (v) a UniversalMobile Telecommunications System (UMTS) network, or (vi) a Wi-Fi Callingnetwork.
 9. An apparatus comprising: a non-transitory storage medium;and instructions stored in the non-transitory storage medium, theinstructions being executable by the apparatus to: count (i) users on awireless communication network, (ii) users attempting to access thewireless communication network, (iii) users attempting to exit thewireless communication network; based upon the counting, determine afirst number of users on the wireless communication network at a firsttime; based upon the counting, determine a second number of users on thewireless communication network at a second time; based upon thecounting, determine a third number of user attempts to access thewireless communication network between the first time and the secondtime; determine a success rate for the third number of user attempts toaccess the wireless communication network between the first time and thesecond time; determine a fourth number of users that attempted to exitthe wireless communication network between the first time and the secondtime; multiply the third number by the success rate to provide a firstresult; subtract the fourth number from the first result to provide asecond result; and calculate a leakage rate by (i) determining adifference between the first number and the second number, (ii)subtracting the second result from the difference to create a thirdresult, and (iii) dividing the third result by the first number.
 10. Theapparatus of claim 9, wherein the leakage rate is calculated for aregion within the wireless communication network.
 11. The apparatus ofclaim 9, wherein the leakage rate is calculated for the entire wirelesscommunication network.
 12. The apparatus of claim 9, wherein an amountof time between the first time and the second time is one hour.
 13. Theapparatus of claim 9, wherein an amount of time between the first timeand the second time is fifteen minutes.
 14. The apparatus of claim 9,wherein the apparatus comprises an application server located within thewireless communication network.
 15. The apparatus of claim 9, whereinthe apparatus comprises an application server located outside thewireless communication network.
 16. The apparatus of claim 9, whereinthe wireless communication network comprises one of (i) a long termevolution (LTE) network, (ii) an advanced LTE network, (iii) a globalsystem for mobile communications (GSM) network, (iv) internet protocolmultimedia subsystem (IMS) network, (v) a Universal MobileTelecommunications System (UMTS) network, or (vi) a Wi-Fi Callingnetwork.
 17. A wireless communication network comprising: an apparatuscomprising a non-transitory storage medium and instructions stored inthe non-transitory storage medium, the instructions being executable bythe apparatus to: count (i) users on the wireless communication network,(ii) users attempting to access the wireless communication network,(iii) users attempting to exit the wireless communication network; basedupon the counting, determine a first number of users on the wirelesscommunication network at a first time; based upon the counting,determine a second number of users on the wireless communication networkat a second time; based upon the counting, determine a third number ofuser attempts to access the wireless communication network between thefirst time and the second time; determine a success rate for the thirdnumber of user attempts to access the wireless communication networkbetween the first time and the second time; determine a fourth number ofusers that attempted to exit the wireless communication network betweenthe first time and the second time; multiply the third number by thesuccess rate to provide a first result; subtract the fourth number fromthe first result to provide a second result; and calculate a leakagerate by (i) determining a difference between the first number and thesecond number, (ii) subtracting the second result from the difference tocreate a third result, and (iii) dividing the third result by the firstnumber.
 18. The wireless communication system of claim 17, wherein theleakage rate is calculated for a region within the wirelesscommunication network.
 19. The wireless communication system of claim17, wherein the leakage rate is calculated for the entire wirelesscommunication network.
 20. The wireless communication system of claim17, wherein the apparatus comprises an application server.
 21. Thewireless communication system of claim 17, wherein the wirelesscommunication network comprises one of (i) a long term evolution (LTE)network, (ii) an advanced LTE network, (iii) a global system for mobilecommunications (GSM) network, (iv) internet protocol multimediasubsystem (IMS) network, (v) a Universal Mobile TelecommunicationsSystem (UMTS) network, or (vi) a Wi-Fi Calling network.