Lossless data delivery at route changes in wireless radio networks

ABSTRACT

The described technology is generally directed towards lossless delivery of data when there are route changes, e.g., in an integrated access and backhaul (IAB) multi-hop relay network. When a route changes is to occur, the last unchanged node in a multiple hop route preserves the data (e.g., copies unacknowledged and unsent PDCP PDUs from the protocol stack corresponding to the radio link control layer of the failed relay hop, and populates a replacement protocol stack for the node in the new route with the preserved data. Also described is pre-emptive detection of link failure, which triggers a route change based on monitoring retransmissions to detect a deteriorating link, which can occur before complete link communication failure.

RELATED APPLICATION

The subject patent application is a continuation of, and claims priorityto, U.S. patent application Ser. No. 15/994,453, filed May 31, 2018, andentitled “LOSSLESS DATA DELIVERY AT ROUTE CHANGES IN WIRELESS RADIONETWORKS,” the entirety of which application is hereby incorporated byreference herein.

TECHNICAL FIELD

The subject application is related to wireless communication systems,and, for example, to lossless delivery of data when there are dynamicroute changes in an integrated access and backhaul multiple hop relaynetwork.

BACKGROUND

In new radio, sometimes referred to as 5G, wireless communicationsystems, a data relaying solution has been identified, in which useraccess and backhaul links are integrated with each other seamlesslyusing the same air interface. This is generally referred to asIntegrated Access and Backhaul (IAB), which makes it possible todynamically share air interface resources between user access andbackhaul links such as in response to traffic and network conditions.

With an IAB multiple hop (multi-hop) network, there can be a dynamicroute change, such as when channel or network conditions cause an IABlink to fail and a replacement link is configured and used. However, aroute change over the IAB network has a potential for data loss. Forexample, a route change could cause already acknowledged communicationsto be dropped without any possibility of recovery.

BRIEF DESCRIPTION OF THE DRAWINGS

The technology described herein is illustrated by way of example and notlimited in the accompanying figures in which like reference numeralsindicate similar elements and in which:

FIG. 1 illustrates an example wireless communication system in whichdata delivery is lossless when a route change occurs over an IntegratedAccess and Backhaul (IAB) network, in accordance with various aspectsand implementations of the subject disclosure.

FIG. 2 illustrates an example user plane protocol stack for multi-hopIAB relay scenario, in which data delivery is lossless when a routechange occurs in accordance with various aspects and implementations ofthe subject disclosure.

FIGS. 3 and 4 comprise a flow diagram comprising example operationsdirected towards lossless data delivery in an IAB network with a dynamicroute change, in accordance with various aspects and implementations ofthe subject disclosure.

FIG. 5 is a data flow diagram showing data transmissions and ACK/NACKresponses that facilitate lossless data delivery in an IAB network witha dynamic route change, in accordance with various aspects andimplementations of the subject disclosure.

FIG. 6 illustrates an example flow diagram of network device operationswith respect to lossless data delivery in an IAB network with a dynamicroute change, in accordance with various aspects and implementations ofthe subject disclosure.

FIG. 7 illustrates a block diagram of a network device's exampleoperations with respect to lossless data delivery in an IAB network witha dynamic route change, in accordance with various aspects andimplementations of the subject disclosure.

FIG. 8 illustrates an example flow diagram of network device operationswith respect to lossless data delivery in an IAB network with a dynamicroute change, in accordance with various aspects and implementations ofthe subject disclosure.

FIG. 9 illustrates an example block diagram of an example mobile handsetoperable to engage in a system architecture that facilitates wirelesscommunications according to one or more embodiments described herein.

FIG. 10 illustrates an example block diagram of an example computeroperable to engage in a system architecture that facilitates wirelesscommunications according to one or more embodiments described herein.

DETAILED DESCRIPTION

One or more aspects of the technology described herein are generallydirected towards lossless delivery of data when there are route changesin a multi-hop relay network. The technology is based on having the lastunchanged node in a multiple hop route preserve the data (e.g., copyunacknowledged and unsent packet data convergence protocol protocol dataunit data (PDCP PDUs) data) from the protocol stack corresponding to theradio link control layer of the failed relay hop, and populate areplacement protocol stack for the node in the new route with thepreserved data. In one or more implementations, the copied PDCP PDUs aretransmitted first to the new IAB node, before any new data that isreceived from an incoming link. This provides a data recovery mechanismthat recovers partially transmitted or untransmitted PDCP PDUs when aroute change occurs.

In one or more aspects, a pre-emptive detection of link failure isperformed, which triggers a route change. To this end, radio linkcontrol retransmissions are monitored, and if too many retransmissionsoccur (e.g., at a high rate or level), which indicates a deterioratingnext hop link, a route change is triggered. This pre-emptive detectionprevents a link from deteriorating beyond a certain point, and thus canadd robustness to the dynamic multi-hop IAB network by taking preventiveaction to change the route.

It should be understood that any of the examples and terms used hereinare non-limiting. For instance, the examples are based on New Radio (NR,sometimes referred to as 5G) communications between a user equipmentexemplified as a smartphone or the like and network devices/nodes;however virtually any communications devices may benefit from thetechnology described herein, and/or their use in different spectrums maylikewise benefit. Notwithstanding, these are non-limiting examples, andany of the embodiments, aspects, concepts, structures, functionalitiesor examples described herein are non-limiting, and the technology may beused in various ways that provide benefits and advantages in radiocommunications in general.

In some embodiments the non-limiting term “radio network node” or simply“network node,” “radio network device or simply “network device” is usedherein. These terms may be used interchangeably, and refer to any typeof network node that serves user equipment and/or connected to othernetwork node or network element or any radio node from where userequipment receives signal. Examples of radio network nodes are Node B,base station (BS), multi-standard radio (MSR) node such as MSR BS,gNodeB, eNode B, network controller, radio network controller (RNC),base station controller (BSC), relay, donor node controlling relay, basetransceiver station (BTS), access point (AP), transmission points,transmission nodes, RRU, RRH, nodes in distributed antenna system (DAS)etc.

In some embodiments the non-limiting term user equipment (UE) is used.It refers to any type of wireless device that communicates with a radionetwork node in a cellular or mobile communication system. Examples ofuser equipment are target device, device to device (D2D) user equipment,machine type user equipment or user equipment capable of machine tomachine (M2M) communication, PDA, Tablet, mobile terminals, smart phone,laptop embedded equipped (LEE), laptop mounted equipment (LME), USBdongles etc.

Some embodiments are described in particular for 5G new radio systems.The embodiments are however applicable to any radio access technology(RAT) or multi-RAT system where the user equipment operates usingmultiple carriers e.g. LTE FDD/TDD, WCMDA/HSPA, GSM/GERAN, Wi Fi, WLAN,WiMax, CDMA2000 etc.

The embodiments are applicable to single carrier as well as tomulticarrier (MC) or carrier aggregation (CA) operation of the userequipment. The term carrier aggregation (CA) is also called (e.g.interchangeably called) “multi-carrier system”, “multi-cell operation”,“multi-carrier operation”, “multi-carrier” transmission and/orreception.

Note that the solutions outlined equally applies for Multi RAB (radiobearers) on some carriers (that is data plus speech is simultaneouslyscheduled).

FIG. 1 illustrates a wireless communication system comprising and IABnetwork 100, in which a user equipment (UE) 102 communicates with an IAB(serving) node 1 (labeled 104). As is specified in an IAB network suchas the network 100, IAB nodes relay information on behalf of a userequipment to (uplink) and from (downlink) a donor node. In general, arelay node can multiplex access and backhaul links in time, frequency,or space (e.g. beam-based operation). In the example of FIG. 2, a routefor relaying data is from IAB node 1 (104) to IAB node 2 (labeled 106)to a donor node 108.

Note that 5G mobile networks are deployed using a split RAN (radioaccess network) protocol architecture such that on the user plane thePDCP (packet data convergence protocol) sublayers reside at acentralized unit (CU) 110, while the RLC (radio link control), MAC(medium access control) and PHY (physical) layers reside at thedistributed unit (DU), which is the IAB donor node 108 in FIG. 2. Userplane data is carried on Data Radio Bearers (DRBs) that traverse theuser plane RAN protocol architecture. On the control plane, signalingradio bearers (SRBs) are set up that carry control messages from the RRC(radio resource control) layer and also utilize the PDCP layer at theCU, and are further carried down through the RLC, MAC, and PHY layers atthe DU to be delivered to the UE over the air interface. Each networkuser can be allocated multiple DRBs and SRBs by the network. The networkinterface between the CU and DU is called the F1 interface (per 3GPPspecifications).

Consider that the original route (represented by the dashed arrows inFIG. 1) is degraded to an extent that a new route is desired. An examplereprinted in FIG. 1 is a blockage, e.g., a large vehicle has blocked thecommunication path between node 104 and the node 106, which can happenwith communication in the millimeter wave spectrum used by 5G. Note thatas described herein, the route need not entirely fail, but can bedetected as being sufficiently degraded to warrant a route change.

As described herein, when a route change is needed, a new node replacesthe old (e.g., degraded or failed) node, forming a new route. In FIG. 1,this is represented by the IAB node 3 (labeled 114) being used in a newroute instead of the degraded or failed node 2 (106).

A problem with rerouting solutions is that there is a potential for dataloss. For example, when channel or network conditions cause an IAB linkto fail, a route change could cause already acknowledged PDCP PDUs(protocol data units) to be dropped without any possibility of recovery.This prevents lossless delivery of data across the IAB network whenthere are route changes.

As a more particular example, an issue is that the acknowledgement (ACK)for a PDCP PDU transmitted on the access link from the UE to firstaccess IAB node is provided to the UE well before the PDCP PDU haseventually reached its final destination (the IAB donor node 108 in thecase of an uplink example) in the multi-hop relay network. In thisscenario, if there is a link failure on one of the relay hops, the RLCat the UE may have already have discarded the PDCP PDU. This may cause aloss in data without some form of data recovery to recover partiallytransmitted or untransmitted PDCP PDUs when this route change happens.

Described herein is data recovery at a route change to ensure losslessdata delivery in an IAB network that performs dynamic route changes. Ingeneral and as described herein, the last unchanged IAB node (the node104 in FIG. 1) copies data from the old route's RLC (state machine) inthe protocol stack, e.g., RLC2 into the new route's RLC (state machine)in the new route's protocol stack, e.g., RLC3 in FIG. 1, as representedvia the arrow labeled A in the node 104. Once this information iscopied, the old protocol stack can be reset (arrow B), and transmittedin the new route, e.g., to the relay node 114 in FIG. 1 (as representedvia the arrow labeled C between the node 104 and the node 114).

FIG. 2 shows a user plane protocol stack for a multi-hop IAB relayscenario 220 corresponding to FIG. 1. Note that in the example protocolstack the full RLC layer, including the ARQ (automatic repeat request)functionality resides at each IAB node. Hence, the RLC ARQ in thismulti-hop relay network is performed on a hop-by-hop basis. Again theblockage example 112 in the uplink scenario has caused a rerouting fromthe IAB node 1 (serving) 104 to the IAB node 114 in place of the old,degraded-communication node 106.

In one or more implementations and as represented in FIG. 2, in 5G NewRadio, an adaptation layer (“Adapt.”) can be placed above the RLC layerat the IAB nodes. The adaptation layer may perform the tasks of routingof UE traffic across the multi-hop network, and performing anaggregation of bearers from multiple UE into common backhaul bearers. InFIG. 2, the adaption layer of the IAB node 104 is labeled as 104 a.

Described herein is data recovery along with pre-emptive detection oflink failure, resulting in triggering a route change in a way thatperforms data recovery in conjunction with the route change to ensurelossless data delivery in a IAB network with dynamic route changes.Although in one or more implementations some of the logic and operationsare performed by the adaptation layer, alternative implementations canemploy other components for this purpose.

FIGS. 3 and 4 comprise a flow diagram having example operations directedtowards detection of a link failure to trigger a route change, as wellas data recovery operations. Note that for hop-by-hop RLC ARQ, thetransmitting RLC at an IAB node can monitor the level/rate of RLCretransmissions over the next hop, as represented by operation 302. Whenthe next hop link deteriorates beyond a certain point (when level of RLCretransmissions crosses a certain threshold) as evaluated at operation304, the RLC layer sends a message (a route change trigger request) asrepresented by operation 306 to the adaptation layer above the RCL layerin the IAB node's protocol stack (or a similarly configured component)to trigger a route change. The adaption layer (or the similarlyconfigured component) finds a new node for the route, e.g., by findingan alternative route or switching to an already established back-uproute, so as to bypass the hop with the deteriorating link, asrepresented by operation 308.

Note that the preemptive rerouting before an actual link failure can addrobustness to the dynamic multi-hop IAB network. Notwithstanding, thedata recovery technology described herein can be used with other linkfailure detection mechanisms, such as to trigger a route change upon acomplete link failure (instead of or in addition to preemptivedetection).

With respect to data recovery at such a route change, as describedherein, when a route change is triggered in response to a link failureon one of the multi-hop links, a loss in data can occur, without someform of data recovery mechanism to recover partially transmitted oruntransmitted PDCP PDUs when the route change occurs. To prevent suchdata loss, according to the technology described herein, the exampleoperations described with reference to FIG. 4 can be performed.

To this end, in one or more implementations, when the route change istriggered, the adaptation layer 104 a at the last unchanged IAB node inthe new route (e.g., the node 104 in FIGS. 1 and 2) copies theunacknowledged and unsent PDCP PDUs from the “old” (still current in thelast unchanged IAB node in the route) RLC, as represented by operation402 of FIG. 4. Note that additional information can be copied from theRLC as well, but for purposes of data recovery as described herein atleast the unacknowledged and unsent PDCP PDUs.

At this time, with the information from the old RCL preserved, theadaption layer 104 a can safely reset the old RLC corresponding to oldroute, as represented by operation 404. Note that the entire protocolstack below the adaptation layer can be reset.

Operation 406 represents the adaption layer 104 a resetting establishinga new RLC instance (and if needed a new MAC and PHY instance) for thenew IAB link to the new IAB node in the new route, e.g., the node 114 inFIGS. 1 and 2. Once established, operation 408 populates the new RLCinstance with the copied PDCP PDUs from the old RLC instance, (copied atoperation 402 in this example).

Operation 410 represents transmitting the copied PDCP PDUs to the newnode (e.g., the node 114) in the new route, before any new data that isreceived from the incoming link, (that is, from the user equipment inFIGS. 1 and 2). Operation 410 then returns to operation 310 of FIG. 3,where the data recovery at the route change is completed, and new datacan be communicated.

Note that because the last unchanged IAB node in a route (e.g., the node104 in FIGS. 1 and 2) has the information needed to retransmit theunacknowledged or untransmitted PDCP PDUs, the last unchanged IAB nodecan internally take the above actions in order to perform data recovery.This is efficient because operations are within the node; moreover,because for these operations communication with other nodes is notneeded, data recovery is without the risk of further loss that couldoccur with the exchange of data packets on additional links.

By way of example, FIG. 5 shows a data flow when the relay link betweenIAB node 1 (104) and IAB node 2 (106) fails, and a route change istriggered. In this example, the partially transmitted/unacknowledged RLCPDUs at IAB node 1 (104) may need to be retransmitted over the newroute. If the new route is still via IAB node 1, then IAB node 1 (104)is able to retransmit the partially transmitted/unacknowledged PDUs viathe new link.

FIG. 6 summarizes some of the example operations described herein withrespect to data recovery. Operation 602 represents detecting, by anetwork device comprising a processor in a first hop of a multiple hoprelay network, a request for a route change with respect to a second hopadjacent to the first hop. Operation 604 represents copying, by thenetwork device, data maintained in an existing protocol stack at thefirst hop, the data corresponding to communication information withrespect to the second hop. Operation 606 represents selecting, by thenetwork device, a third hop adjacent to the first hop as a replacementhop for the second hop. Operation 608 represents establishing, by thenetwork device, a new protocol stack, different than the existingprotocol stack, corresponding to the third hop. Operation 610 representspopulating, by the network device, the new protocol stack with the datacorresponding to the communication information with respect to thesecond hop. Operation 612 represents communicating, by the networkdevice, with the third hop to facilitate the route change.

Copying the data maintained in the existing protocol stack can comprisecopying the data from a radio link control layer of the existingprotocol stack, and populating the new protocol stack with the data cancomprise populating a radio link control layer of the new protocolstack. Aspects can comprise resetting, by the network device, the radiolink control layer of the existing protocol stack after the copying thedata maintained in the radio link control layer of the existing protocolstack.

Copying the data maintained in the existing protocol stack can comprisecopying packet data convergence protocol protocol data unit (PDCP PDU)data from a radio link control layer of the existing protocol stack, andpopulating the new protocol stack can comprise populating a radio linkcontrol layer of the new protocol stack with a copy of the PDCP PDUdata.

Copying the data maintained in the existing protocol stack can comprisecopying unacknowledged and unsent PDCP PDU data from a radio linkcontrol layer of the existing protocol stack, and wherein the populatingthe new protocol stack can comprise populating a radio link controllayer of the new protocol stack with a copy of the unacknowledged andunsent PDCP PDU data. Communicating with the third hop to perform theroute change can comprise transmitting the unacknowledged and unsentPDCP PDU protocol data unit data to the third hop before transmittingother data that is received from an incoming link to the third hop node.

Detecting the request for the route change can comprise determining adeterioration of a radio link between the first hop and the second hop.Detecting the request for the route change can comprise monitoringcontrol retransmission data of a radio link corresponding tocommunications between the first hop and the second hop, and determininga deterioration of the radio link when the retransmission data hasreached a threshold value. Detecting the request for the route changecan comprise monitoring radio link control retransmission datacorresponding to communications between the first hop and the secondhop, and determining a failure of the second hop based on controlretransmission data of a radio link corresponding to communicationsbetween the first hop and the second hop.

Further aspects can comprise triggering, by the network device, a routechange at an adaptation layer upon detecting the request for the routechange; establishing the new protocol stack corresponding to the thirdhop and populating the new protocol stack with the data can be performedby a logic system.

FIG. 7 summarizes example operations of a network device, e.g., having aprocessor and a memory that stores executable instructions that, whenexecuted by the processor, facilitate performance of such operations.Operation 702 represents rerouting communications with respect to asecond hop node adjacent to a first hop node in a multiple hop relaynetwork to a third hop node adjacent to the first hop node, wherein thenetwork device corresponds to the first hop node of the multiple hoprelay network. The rerouting can comprise copying (operation 704) datamaintained in a current protocol stack maintained at the first hop nodewith respect to the second hop node to obtain copied protocol stack dataand establishing (operation 706) an updated protocol stack maintained atthe first hop node with respect to the third hop node. The rerouting canfurther comprise populating (operation 708) the updated protocol stackwith the copied protocol stack data; and transmitting (operation 710) atleast part of the copied protocol stack data to the third hop node.

The copied protocol stack data can comprise unacknowledged and unsentPDCP PDU data. Transmitting at least the part of the copied protocolstack data to the third hop node can comprise transmitting theunacknowledged and unsent PDCP PDU data to the third hop node beforetransmitting any new data that is received from an incoming link to thethird hop node.

The network device corresponding to the first hop node can comprise aserving node between adjacent user equipment, and the second hop nodeand the third hop node. An adaptation layer can be part of the currentprotocol stack, and logic associated with the adaptation layer canperform the establishing the updated protocol stack maintained at thefirst hop node with respect to the third hop node, and the populatingthe updated protocol stack with the copied protocol stack data; thelogic associated with the adaptation layer can further perform aresetting of at least a radio link control layer of the current protocolstack after the copying the data maintained in the radio link controllayer of the current protocol stack.

FIG. 8 shows other example operations, such as corresponding to amachine-readable storage medium, comprising executable instructionsthat, when executed by a processor of a network device of a first hopnode in a multiple hop relay network, facilitate performance of theoperations. Operation 802 represents detecting a request for a routechange with respect to a second hop node neighboring the first hop node.Operation 804 represents rerouting communications with respect to thesecond hop node to a third hop node neighboring the first hop node inthe multiple hop relay network. The rerouting can comprise copying(operation 806) data maintained in a deployed protocol stack maintainedat the first hop node with respect to the second hop node to obtaincopied protocol stack data, maintaining (operation 808) the copiedprotocol stack data in a replacement protocol stack, to replace thedeployed protocol stack, and to be established at the first hop nodewith respect to the to the third hop node, and transmitting (operation810) at least part of the copied protocol stack data in the replacementprotocol stack to the third hop node.

Copying the data maintained in the deployed protocol stack can comprisecopying the data from a first radio link control layer of the deployedprotocol stack, and maintaining the copied protocol stack data in thereplacement protocol stack can comprise populating a second radio linkcontrol layer of the replacement protocol stack.

The copied protocol stack data can comprise unacknowledged and unsentPDCP PDU data, and transmitting at least the part of the copied protocolstack data to the third hop node can comprise transmitting theunacknowledged and unsent PDCP PDU data to the third hop node beforetransmitting any further data that is received from an incoming link tothe third hop node.

Detecting the request for the route change can comprise monitoring radiolink control retransmission data corresponding to communications betweenthe first hop node and the second hop node, and determining the requestfor the route change based on a radio link control retransmission ratecorresponding to the radio link control retransmission data.

Further operations can comprise resetting a radio link control layer ofthe deployed protocol stack after the copying the data maintained in thedeployed protocol stack.

As can be seen, the technology described herein facilitates the losslessdelivery of data in an IAB network when there are route changes duringan active data transaction. The technology allows the IAB node toperform data recovery internal to itself, without needing any externalsignaling to other nodes. This is very efficient, which makes the datarecovery very fast and without the risk of further loss due to exchangeof data packets on additional links.

Referring now to FIG. 9, illustrated is an example block diagram of anexample mobile handset 900 operable to engage in a system architecturethat facilitates wireless communications according to one or moreembodiments described herein. Although a mobile handset is illustratedherein, it will be understood that other devices can be a mobile device,and that the mobile handset is merely illustrated to provide context forthe embodiments of the various embodiments described herein. Thefollowing discussion is intended to provide a brief, general descriptionof an example of a suitable environment in which the various embodimentscan be implemented. While the description includes a general context ofcomputer-executable instructions embodied on a machine-readable storagemedium, those skilled in the art will recognize that the innovation alsocan be implemented in combination with other program modules and/or as acombination of hardware and software.

Generally, applications (e.g., program modules) can include routines,programs, components, data structures, etc., that perform particulartasks or implement particular abstract data types. Moreover, thoseskilled in the art will appreciate that the methods described herein canbe practiced with other system configurations, includingsingle-processor or multiprocessor systems, minicomputers, mainframecomputers, as well as personal computers, hand-held computing devices,microprocessor-based or programmable consumer electronics, and the like,each of which can be operatively coupled to one or more associateddevices.

A computing device can typically include a variety of machine-readablemedia. Machine-readable media can be any available media that can beaccessed by the computer and includes both volatile and non-volatilemedia, removable and non-removable media. By way of example and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media can include volatileand/or non-volatile media, removable and/or non-removable mediaimplemented in any method or technology for storage of information, suchas computer-readable instructions, data structures, program modules, orother data. Computer storage media can include, but is not limited to,RAM, ROM, EEPROM, flash memory or other memory technology, solid statedrive (SSD) or other solid-state storage technology, Compact Disk ReadOnly Memory (CD ROM), digital video disk (DVD), Blu-ray disk, or otheroptical disk storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other medium which canbe used to store the desired information and which can be accessed bythe computer. In this regard, the terms “tangible” or “non-transitory”herein as applied to storage, memory or computer-readable media, are tobe understood to exclude only propagating transitory signals per se asmodifiers and do not relinquish rights to all standard storage, memoryor computer-readable media that are not only propagating transitorysignals per se.

Communication media typically embodies computer-readable instructions,data structures, program modules, or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media

The handset includes a processor 902 for controlling and processing allonboard operations and functions. A memory 904 interfaces to theprocessor 902 for storage of data and one or more applications 906(e.g., a video player software, user feedback component software, etc.).Other applications can include voice recognition of predetermined voicecommands that facilitate initiation of the user feedback signals. Theapplications 906 can be stored in the memory 904 and/or in a firmware908, and executed by the processor 902 from either or both the memory904 or/and the firmware 908. The firmware 908 can also store startupcode for execution in initializing the handset 900. A communicationscomponent 910 interfaces to the processor 902 to facilitatewired/wireless communication with external systems, e.g., cellularnetworks, VoIP networks, and so on. Here, the communications component910 can also include a suitable cellular transceiver 911 (e.g., a GSMtransceiver) and/or an unlicensed transceiver 913 (e.g., Wi-Fi, WiMax)for corresponding signal communications. The handset 900 can be a devicesuch as a cellular telephone, a PDA with mobile communicationscapabilities, and messaging-centric devices. The communicationscomponent 910 also facilitates communications reception from terrestrialradio networks (e.g., broadcast), digital satellite radio networks, andInternet-based radio services networks.

The handset 900 includes a display 912 for displaying text, images,video, telephony functions (e.g., a Caller ID function), setupfunctions, and for user input. For example, the display 912 can also bereferred to as a “screen” that can accommodate the presentation ofmultimedia content (e.g., music metadata, messages, wallpaper, graphics,etc.). The display 912 can also display videos and can facilitate thegeneration, editing and sharing of video quotes. A serial I/O interface914 is provided in communication with the processor 902 to facilitatewired and/or wireless serial communications (e.g., USB, and/or IEEE 994)through a hardwire connection, and other serial input devices (e.g., akeyboard, keypad, and mouse). This supports updating and troubleshootingthe handset 900, for example. Audio capabilities are provided with anaudio I/O component 916, which can include a speaker for the output ofaudio signals related to, for example, indication that the user pressedthe proper key or key combination to initiate the user feedback signal.The audio I/O component 916 also facilitates the input of audio signalsthrough a microphone to record data and/or telephony voice data, and forinputting voice signals for telephone conversations.

The handset 900 can include a slot interface 918 for accommodating a SIC(Subscriber Identity Component) in the form factor of a card SubscriberIdentity Module (SIM) or universal SIM 920, and interfacing the SIM card920 with the processor 902. However, it is to be appreciated that theSIM card 920 can be manufactured into the handset 900, and updated bydownloading data and software.

The handset 900 can process IP data traffic through the communicationscomponent 910 to accommodate IP traffic from an IP network such as, forexample, the Internet, a corporate intranet, a home network, a personarea network, etc., through an ISP or broadband cable provider. Thus,VoIP traffic can be utilized by the handset 900 and IP-based multimediacontent can be received in either an encoded or a decoded format.

A video processing component 922 (e.g., a camera) can be provided fordecoding encoded multimedia content. The video processing component 922can aid in facilitating the generation, editing, and sharing of videoquotes. The handset 900 also includes a power source 924 in the form ofbatteries and/or an AC power subsystem, which power source 924 caninterface to an external power system or charging equipment (not shown)by a power I/O component 926.

The handset 900 can also include a video component 930 for processingvideo content received and, for recording and transmitting videocontent. For example, the video component 930 can facilitate thegeneration, editing and sharing of video quotes. A location trackingcomponent 932 facilitates geographically locating the handset 900. Asdescribed hereinabove, this can occur when the user initiates thefeedback signal automatically or manually. A user input component 934facilitates the user initiating the quality feedback signal. The userinput component 934 can also facilitate the generation, editing andsharing of video quotes. The user input component 934 can include suchconventional input device technologies such as a keypad, keyboard,mouse, stylus pen, and/or touch screen, for example.

Referring again to the applications 906, a hysteresis component 936facilitates the analysis and processing of hysteresis data, which isutilized to determine when to associate with the access point. Asoftware trigger component 938 can be provided that facilitatestriggering of the hysteresis component 936 when the Wi-Fi transceiver913 detects the beacon of the access point. A SIP client 940 enables thehandset 900 to support SIP protocols and register the subscriber withthe SIP registrar server. The applications 906 can also include a client942 that provides at least the capability of discovery, play and storeof multimedia content, for example, music.

The handset 900, as indicated above related to the communicationscomponent 910, includes an indoor network radio transceiver 913 (e.g.,Wi-Fi transceiver). This function supports the indoor radio link, suchas IEEE 802.11, for the dual-mode GSM handset 900. The handset 900 canaccommodate at least satellite radio services through a handset that cancombine wireless voice and digital radio chipsets into a single handhelddevice.

Referring now to FIG. 10, illustrated is an example block diagram of anexample computer 1000 operable to engage in a system architecture thatfacilitates wireless communications according to one or more embodimentsdescribed herein. The computer 1000 can provide networking andcommunication capabilities between a wired or wireless communicationnetwork and a server (e.g., Microsoft server) and/or communicationdevice. In order to provide additional context for various aspectsthereof, FIG. 10 and the following discussion are intended to provide abrief, general description of a suitable computing environment in whichthe various aspects of the innovation can be implemented to facilitatethe establishment of a transaction between an entity and a third party.While the description above is in the general context ofcomputer-executable instructions that can run on one or more computers,those skilled in the art will recognize that the innovation also can beimplemented in combination with other program modules and/or as acombination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the various methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the innovation can also be practiced indistributed computing environments where certain tasks are performed byremote processing devices that are linked through a communicationsnetwork. In a distributed computing environment, program modules can belocated in both local and remote memory storage devices.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disk (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or other tangible and/or non-transitorymedia which can be used to store desired information. Computer-readablestorage media can be accessed by one or more local or remote computingdevices, e.g., via access requests, queries or other data retrievalprotocols, for a variety of operations with respect to the informationstored by the medium.

Communications media can embody computer-readable instructions, datastructures, program modules, or other structured or unstructured data ina data signal such as a modulated data signal, e.g., a carrier wave orother transport mechanism, and includes any information delivery ortransport media. The term “modulated data signal” or signals refers to asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in one or more signals. By way ofexample, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

The techniques described herein can be applied to any device or set ofdevices (machines) capable of running programs and processes. It can beunderstood, therefore, that servers including physical and/or virtualmachines, personal computers, laptops, handheld, portable and othercomputing devices and computing objects of all kinds including cellphones, tablet/slate computers, gaming/entertainment consoles and thelike are contemplated for use in connection with various implementationsincluding those exemplified herein. Accordingly, the general purposecomputing mechanism described below with reference to FIG. 10 is but oneexample of a computing device.

In order to provide a context for the various aspects of the disclosedsubject matter, FIG. 10 and the following discussion, are intended toprovide a brief, general description of a suitable environment in whichthe various aspects of the disclosed subject matter can be implemented.While the subject matter has been described above in the general contextof computer-executable instructions of a computer program that runs on acomputer and/or computers, those skilled in the art will recognize thatthe disclosed subject matter also can be implemented in combination withother program modules. Generally, program modules include routines,programs, components, data structures, etc. that perform particulartasks and/or implement particular abstract data types.

In the subject specification, terms such as “store,” “storage,” “datastore,” data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory, by way of illustration, and not limitation, volatilememory 1020 (see below), non-volatile memory 1022 (see below), diskstorage 1024 (see below), and memory storage 1046 (see below). Further,nonvolatile memory can be included in read only memory (ROM),programmable ROM (PROM), electrically programmable ROM (EPROM),electrically erasable ROM (EEPROM), or flash memory. Volatile memory caninclude random access memory (RAM), which acts as external cache memory.By way of illustration and not limitation, RAM is available in manyforms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronousDRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM(ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).Additionally, the disclosed memory components of systems or methodsherein are intended to comprise, without being limited to comprising,these and any other suitable types of memory.

Moreover, it will be noted that the disclosed subject matter can bepracticed with other computer system configurations, includingsingle-processor or multiprocessor computer systems, mini-computingdevices, mainframe computers, as well as personal computers, hand-heldcomputing devices (e.g., PDA, phone, watch, tablet computers, netbookcomputers, . . . ), microprocessor-based or programmable consumer orindustrial electronics, and the like. The illustrated aspects can alsobe practiced in distributed computing environments where tasks areperformed by remote processing devices that are linked through acommunications network; however, some if not all aspects of the subjectdisclosure can be practiced on stand-alone computers. In a distributedcomputing environment, program modules can be located in both local andremote memory storage devices.

FIG. 10 illustrates a block diagram of a computing system 1000 operableto execute the disclosed systems and methods in accordance with anembodiment. Computer 1012, which can be, for example, part of thehardware of system 1020, includes a processing unit 1014, a systemmemory 1016, and a system bus 1018. System bus 1018 couples systemcomponents including, but not limited to, system memory 1016 toprocessing unit 1014. Processing unit 1014 can be any of variousavailable processors. Dual microprocessors and other multiprocessorarchitectures also can be employed as processing unit 1014.

System bus 1018 can be any of several types of bus structure(s)including a memory bus or a memory controller, a peripheral bus or anexternal bus, and/or a local bus using any variety of available busarchitectures including, but not limited to, Industrial StandardArchitecture (ISA), Micro-Channel Architecture (MSA), Extended ISA(EISA), Intelligent Drive Electronics , VESA Local Bus (VLB), PeripheralComponent Interconnect (PCI), Card Bus, Universal Serial Bus (USB),Advanced Graphics Port (AGP), Personal Computer Memory CardInternational Association bus (PCMCIA), Firewire (IEEE 1394), and SmallComputer Systems Interface (SCSI).

System memory 1016 can include volatile memory 1020 and nonvolatilememory 1022. A basic input/output system (BIOS), containing routines totransfer information between elements within computer 1012, such asduring start-up, can be stored in nonvolatile memory 1022. By way ofillustration, and not limitation, nonvolatile memory 1022 can includeROM, PROM, EPROM, EEPROM, or flash memory. Volatile memory 1020 includesRAM, which acts as external cache memory. By way of illustration and notlimitation, RAM is available in many forms such as SRAM, dynamic RAM(DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM),enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), Rambus direct RAM(RDRAM), direct Rambus dynamic RAM (DRDRAM), and Rambus dynamic RAM(RDRAM).

Computer 1012 can also include removable/non-removable,volatile/non-volatile computer storage media. FIG. 10 illustrates, forexample, disk storage 1024. Disk storage 1024 includes, but is notlimited to, devices like a magnetic disk drive, floppy disk drive, tapedrive, flash memory card, or memory stick. In addition, disk storage1024 can include storage media separately or in combination with otherstorage media including, but not limited to, an optical disk drive suchas a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive),CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive(DVD-ROM). To facilitate connection of the disk storage devices 1024 tosystem bus 1018, a removable or non-removable interface is typicallyused, such as interface 1026.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non- removable media. By way ofexample, and not limitation, computer-readable storage media can beimplemented in connection with any method or technology for storage ofinformation such as computer-readable instructions, program modules,structured data, or unstructured data. Computer-readable storage mediacan include, but are not limited to, random access memory (RAM), readonly memory (ROM), electrically erasable programmable read only memory(EEPROM), flash memory or other memory technology, solid state drive(SSD) or other solid-state storage technology, compact disk read onlymemory (CD ROM), digital versatile disk (DVD), Blu-ray disc or otheroptical disk storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices or other tangible and/ornon-transitory media which can be used to store desired information. Inthis regard, the terms “tangible” or “non-transitory” herein as appliedto storage, memory or computer-readable media, are to be understood toexclude only propagating transitory signals per se as modifiers and donot relinquish rights to all standard storage, memory orcomputer-readable media that are not only propagating transitory signalsper se. In an aspect, tangible media can include non-transitory mediawherein the term “non-transitory” herein as may be applied to storage,memory or computer-readable media, is to be understood to exclude onlypropagating transitory signals per se as a modifier and does notrelinquish coverage of all standard storage, memory or computer-readablemedia that are not only propagating transitory signals per se. For theavoidance of doubt, the term “computer-readable storage device” is usedand defined herein to exclude transitory media. Computer-readablestorage media can be accessed by one or more local or remote computingdevices, e.g., via access requests, queries or other data retrievalprotocols, for a variety of operations with respect to the informationstored by the medium.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

It can be noted that FIG. 10 describes software that acts as anintermediary between users and computer resources described in suitableoperating environment 1000. Such software includes an operating system1028. Operating system 1028, which can be stored on disk storage 1024,acts to control and allocate resources of computer system 1012. Systemapplications 1030 take advantage of the management of resources byoperating system 1028 through program modules 1032 and program data 1034stored either in system memory 1016 or on disk storage 1024. It is to benoted that the disclosed subject matter can be implemented with variousoperating systems or combinations of operating systems.

A user can enter commands or information into computer 1012 throughinput device(s) 1036. As an example, a mobile device and/or portabledevice can include a user interface embodied in a touch sensitivedisplay panel allowing a user to interact with computer 1012. Inputdevices 1036 include, but are not limited to, a pointing device such asa mouse, trackball, stylus, touch pad, keyboard, microphone, joystick,game pad, satellite dish, scanner, TV tuner card, digital camera,digital video camera, web camera, cell phone, smartphone, tabletcomputer, etc. These and other input devices connect to processing unit1014 through system bus 1018 by way of interface port(s) 1038. Interfaceport(s) 1038 include, for example, a serial port, a parallel port, agame port, a universal serial bus (USB), an infrared port, a Bluetoothport, an IP port, or a logical port associated with a wireless service,etc. Output device(s) 1040 and a move use some of the same type of portsas input device(s) 1036.

Thus, for example, a USB port can be used to provide input to computer1012 and to output information from computer 1012 to an output device1040. Output adapter 1042 is provided to illustrate that there are someoutput devices 1040 like monitors, speakers, and printers, among otheroutput devices 1040, which use special adapters. Output adapters 1042include, by way of illustration and not limitation, video and soundcards that provide means of connection between output device 1040 andsystem bus 1018. It should be noted that other devices and/or systems ofdevices provide both input and output capabilities such as remotecomputer(s) 1044.

Computer 1012 can operate in a networked environment using logicalconnections to one or more remote computers, such as remote computer(s)1044. Remote computer(s) 1044 can be a personal computer, a server, arouter, a network PC, cloud storage, cloud service, a workstation, amicroprocessor based appliance, a peer device, or other common networknode and the like, and typically includes many or all of the elementsdescribed relative to computer 1012.

For purposes of brevity, only a memory storage device 1046 isillustrated with remote computer(s) 1044. Remote computer(s) 1044 islogically connected to computer 1012 through a network interface 1048and then physically connected by way of communication connection 1050.Network interface 1048 encompasses wire and/or wireless communicationnetworks such as local-area networks (LAN) and wide-area networks (WAN).LAN technologies include Fiber Distributed Data Interface (FDDI), CopperDistributed Data Interface (CDDI), Ethernet, Token Ring and the like.WAN technologies include, but are not limited to, point-to-point links,circuit-switching networks like Integrated Services Digital Networks(ISDN) and variations thereon, packet switching networks, and DigitalSubscriber Lines (DSL). As noted below, wireless technologies may beused in addition to or in place of the foregoing.

Communication connection(s) 1050 refer(s) to hardware/software employedto connect network interface 1048 to bus 1018. While communicationconnection 1050 is shown for illustrative clarity inside computer 1012,it can also be external to computer 1012. The hardware/software forconnection to network interface 1048 can include, for example, internaland external technologies such as modems, including regular telephonegrade modems, cable modems and DSL modems, ISDN adapters, and Ethernetcards.

The above description of illustrated embodiments of the subjectdisclosure, including what is described in the Abstract, is not intendedto be exhaustive or to limit the disclosed embodiments to the preciseforms disclosed. While specific embodiments and examples are describedherein for illustrative purposes, various modifications are possiblethat are considered within the scope of such embodiments and examples,as those skilled in the relevant art can recognize.

In this regard, while the disclosed subject matter has been described inconnection with various embodiments and corresponding Figures, whereapplicable, it is to be understood that other similar embodiments can beused or modifications and additions can be made to the describedembodiments for performing the same, similar, alternative, or substitutefunction of the disclosed subject matter without deviating therefrom.Therefore, the disclosed subject matter should not be limited to anysingle embodiment described herein, but rather should be construed inbreadth and scope in accordance with the appended claims below.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising, but not limited to comprising, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Processors can exploit nano-scale architectures suchas, but not limited to, molecular and quantum-dot based transistors,switches and gates, in order to optimize space usage or enhanceperformance of user equipment. A processor may also be implemented as acombination of computing processing units.

In the subject specification, terms such as “store,” “storage,” “datastore,” data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory.

As used in this application, the terms “component,” “system,”“platform,” “layer,” “selector,” “interface,” and the like are intendedto refer to a computer-related entity or an entity related to anoperational apparatus with one or more specific functionalities, whereinthe entity can be either hardware, a combination of hardware andsoftware, software, or software in execution. As an example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. By way of illustration and not limitation, both anapplication running on a server and the server can be a component. Oneor more components may reside within a process and/or thread ofexecution and a component may be localized on one computer and/ordistributed between two or more computers. In addition, these componentscan execute from various computer readable media, device readablestorage devices, or machine readable media having various datastructures stored thereon. The components may communicate via localand/or remote processes such as in accordance with a signal having oneor more data packets (e.g., data from one component interacting withanother component in a local system, distributed system, and/or across anetwork such as the Internet with other systems via the signal). Asanother example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry, which is operated by a software or firmwareapplication executed by a processor, wherein the processor can beinternal or external to the apparatus and executes at least a part ofthe software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can include a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components.

In addition, the term “or” is intended to mean an inclusive “or” ratherthan an exclusive “or.” That is, unless specified otherwise, or clearfrom context, “X employs A or B” is intended to mean any of the naturalinclusive permutations. That is, if X employs A; X employs B; or Xemploys both A and B, then “X employs A or B” is satisfied under any ofthe foregoing instances. Moreover, articles “a” and “an” as used in thesubject specification and annexed drawings should generally be construedto mean “one or more” unless specified otherwise or clear from contextto be directed to a singular form.

Moreover, terms like “user equipment (UE),” “mobile station,” “mobile,”subscriber station,” “subscriber equipment,” “access terminal,”“terminal,” “handset,” and similar terminology, refer to a wirelessdevice utilized by a subscriber or user of a wireless communicationservice to receive or convey data, control, voice, video, sound, gaming,or substantially any data-stream or signaling-stream. The foregoingterms are utilized interchangeably in the subject specification andrelated drawings. Likewise, the terms “access point (AP),” “basestation,” “NodeB,” “evolved Node B (eNodeB),” “home Node B (HNB),” “homeaccess point (HAP),” “cell device,” “sector,” “cell,” and the like, areutilized interchangeably in the subject application, and refer to awireless network component or appliance that serves and receives data,control, voice, video, sound, gaming, or substantially any data-streamor signaling-stream to and from a set of subscriber stations or providerenabled devices. Data and signaling streams can include packetized orframe-based flows.

Additionally, the terms “core-network”, “core”, “core carrier network”,“carrier-side”, or similar terms can refer to components of atelecommunications network that typically provides some or all ofaggregation, authentication, call control and switching, charging,service invocation, or gateways. Aggregation can refer to the highestlevel of aggregation in a service provider network wherein the nextlevel in the hierarchy under the core nodes is the distribution networksand then the edge networks. User equipments do not normally connectdirectly to the core networks of a large service provider but can berouted to the core by way of a switch or radio area network.Authentication can refer to determinations regarding whether the userrequesting a service from the telecom network is authorized to do sowithin this network or not. Call control and switching can referdeterminations related to the future course of a call stream acrosscarrier equipment based on the call signal processing. Charging can berelated to the collation and processing of charging data generated byvarious network nodes. Two common types of charging mechanisms found inpresent day networks can be prepaid charging and postpaid charging.Service invocation can occur based on some explicit action (e.g. calltransfer) or implicitly (e.g., call waiting). It is to be noted thatservice “execution” may or may not be a core network functionality asthird party network/nodes may take part in actual service execution. Agateway can be present in the core network to access other networks.Gateway functionality can be dependent on the type of the interface withanother network.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,”“prosumer,” “agent,” and the like are employed interchangeablythroughout the subject specification, unless context warrants particulardistinction(s) among the terms. It should be appreciated that such termscan refer to human entities or automated components (e.g., supportedthrough artificial intelligence, as through a capacity to makeinferences based on complex mathematical formalisms), that can providesimulated vision, sound recognition and so forth.

Aspects, features, or advantages of the subject matter can be exploitedin substantially any, or any, wired, broadcast, wirelesstelecommunication, radio technology or network, or combinations thereof.Non-limiting examples of such technologies or networks include Geocasttechnology; broadcast technologies (e.g., sub-Hz, ELF, VLF, LF, MF, HF,VHF, UHF, SHF, THz broadcasts, etc.); Ethernet; X.25; powerline-typenetworking (e.g., PowerLine AV Ethernet, etc.); femto-cell technology;Wi-Fi; Worldwide Interoperability for Microwave Access (WiMAX); EnhancedGeneral Packet Radio Service (Enhanced GPRS); Third GenerationPartnership Project (3GPP or 3G) Long Term Evolution (LTE); 3GPPUniversal Mobile Telecommunications System (UMTS) or 3GPP UMTS; ThirdGeneration Partnership Project 2 (3GPP2) Ultra Mobile Broadband (UMB);High Speed Packet Access (HSPA); High Speed Downlink Packet Access(HSDPA); High Speed Uplink Packet Access (HSUPA); GSM Enhanced DataRates for GSM Evolution (EDGE) Radio Access Network (RAN) or GERAN; UMTSTerrestrial Radio Access Network (UTRAN); or LTE Advanced.

What has been described above includes examples of systems and methodsillustrative of the disclosed subject matter. It is, of course, notpossible to describe every combination of components or methods herein.One of ordinary skill in the art may recognize that many furthercombinations and permutations of the disclosure are possible.Furthermore, to the extent that the terms “includes,” “has,”“possesses,” and the like are used in the detailed description, claims,appendices and drawings such terms are intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim.

While the various embodiments are susceptible to various modificationsand alternative constructions, certain illustrated implementationsthereof are shown in the drawings and have been described above indetail. It should be understood, however, that there is no intention tolimit the various embodiments to the specific forms disclosed, but onthe contrary, the intention is to cover all modifications, alternativeconstructions, and equivalents falling within the spirit and scope ofthe various embodiments.

In addition to the various implementations described herein, it is to beunderstood that other similar implementations can be used ormodifications and additions can be made to the describedimplementation(s) for performing the same or equivalent function of thecorresponding implementation(s) without deviating therefrom. Stillfurther, multiple processing chips or multiple devices can share theperformance of one or more functions described herein, and similarly,storage can be effected across a plurality of devices. Accordingly, thevarious embodiments are not to be limited to any single implementation,but rather are to be construed in breadth, spirit and scope inaccordance with the appended claims.

What is claimed is:
 1. A method, comprising, based on a detectedcondition, changing, by a network node comprising a processor, a routethat comprises the network node, comprising: switching from a nextnetwork node in the route adjacent to the network node to a replacementnext network node; copying unacknowledged and unsent data unitsmaintained in a first protocol stack associated with the next networknode; populating the unacknowledged and unsent data units in a secondprotocol stack associated with the replacement next network node; andtransmitting the unacknowledged and unsent data units to the replacementnext network node before transmitting any new data units that arereceived from an incoming link and are destined for the replacement nextnetwork node.
 2. The method of claim 1, wherein copying theunacknowledged and unsent data units comprises copying theunacknowledged and unsent data units from a first radio link controllayer of the first protocol stack, and wherein populating the secondprotocol stack comprises populating the unacknowledged and unsent dataunits in a second radio link control layer of the second protocol stack.3. The method of claim 1, further comprising resetting, by the networknode, the first protocol stack after copying the unacknowledged andunsent data units of the first protocol stack.
 4. The method of claim 1,wherein the detected condition comprises a deterioration of a radio linkbetween the network node and the next network node.
 5. The method ofclaim 4, wherein the deterioration of the radio link comprises controlretransmissions satisfying a function of a threshold value.
 6. Themethod of claim 1, wherein the detected condition comprises a failure ofa radio link between the network node and the next network node.
 7. Themethod of claim 1, wherein the replacement next network node is a backupnetwork node predefined as the backup network node.
 8. Networkequipment, comprising: a processor; and a memory that stores executableinstructions that, when executed by the processor, facilitateperformance of operations, the operations comprising: altering a routecomprising hops based on a criterion, wherein the network equipment is ahop in the route, comprising: determining to switch from a next hop inthe route adjacent to the hop to a replacement hop; copyingunacknowledged and unsent data maintained in a first protocol stackassociated with the next hop; populating the unacknowledged and unsentdata in a second protocol stack associated with the replacement hop; andtransmitting the unacknowledged and unsent data to the replacement hopbefore transmitting any new data received that is to be sent to thereplacement hop.
 9. The network equipment of claim 8, wherein copyingthe unacknowledged and unsent data comprises copying the unacknowledgedand unsent data from a first radio link control layer of the firstprotocol stack, and wherein populating the second protocol stackcomprises populating the unacknowledged and unsent data in a secondradio link control layer of the second protocol stack.
 10. The networkequipment of claim 9, wherein the operations further comprise resettingthe first radio link control layer after copying the unacknowledged andunsent data units of the first radio link control layer.
 11. The networkequipment of claim 8, wherein the criterion comprises a degradation of acommunication link between the hop and the next hop.
 12. The networkequipment of claim 11, wherein the degradation of the communication linkcomprises a quantity of retransmissions being determined to havetransitioned a threshold value.
 13. The network equipment of claim 8,wherein the criterion comprises a failure of a communication linkbetween the hop and the next hop.
 14. The network equipment of claim 8,wherein the replacement hop is predefined as a backup hop for the nexthop.
 15. A non-transitory machine-readable medium, comprising executableinstructions that, when executed by a processor of integrated access andbackhaul equipment, facilitate performance of operations, the operationscomprising: modifying a route comprising nodes based on a criterion,wherein the integrated access and backhaul equipment is comprised in anode in the route, comprising: switching from a next node in the routeadjacent to the node to a replacement node; copying unacknowledged andunsent protocol data units maintained in an existing protocol stackassociated with the next node; populating the unacknowledged and unsentprotocol data units in a new protocol stack associated with thereplacement node; and transmitting the unacknowledged and unsentprotocol data units to the replacement node before transmitting any newprotocol data units received that are to be sent to the replacementnode.
 16. The non-transitory machine-readable medium of claim 15,wherein copying the unacknowledged and unsent protocol data unitscomprises copying the unacknowledged and unsent protocol data units froma first radio link control layer of the existing protocol stack, andwherein populating the new protocol stack comprises populating theunacknowledged and unsent protocol data units in a second radio linkcontrol layer of the new protocol stack.
 17. The non-transitorymachine-readable medium of claim 16, wherein the operations furthercomprise resetting the first radio link control layer after copying theunacknowledged and unsent data units of the existing protocol stack. 18.The non-transitory machine-readable medium of claim 15, wherein thecriterion comprises a degradation of a communication link between thenode and the next node.
 19. The non-transitory machine-readable mediumof claim 18, wherein the degradation of the communication link comprisesa quantity of retransmissions being determined to have reached athreshold value.
 20. The non-transitory machine-readable medium of claim15, wherein the criterion comprises a failure of a communication linkbetween the node and the next node.