Controlling and mitigating dropped communications

ABSTRACT

Aspects relate to temporarily disabling a message or a set of messages based on the detection that an uplink transmission power is reaching maximum power or is at maximum power. The detection can be based on observing that one or more uplink transmissions are near, or at, the maximum power. The message or set of messages that are disabled can be a non-call critical message(s), such as a non-signaling radio bearer related message(s). Disabling the message or set of messages can conserve resources, which can be utilized for call critical messages, which can include signaling radio bearer related messages, call maintenance messages, voice communications, and so forth. Disabling the message or set of messages can also mitigate the chances of a call being disconnected due to power demands that exceed the maximum power available.

TECHNICAL FIELD

The subject disclosure relates to wireless communications and, moreparticularly, to controlling and mitigating dropped communications.

BACKGROUND

As the uses and complexity of wireless devices have evolved, so has thewish for improved reliability of such wireless devices. For example, aswireless devices are used, the wireless devices are moved. During themovement, a first base station (or network) that was servicing thewireless device might no longer be able to service the wireless devicedue to limitations of the geographic area covered by the first basestation. In this situation, the wireless device is handed off from thefirst base station to a second base station. The handoff between basestations generally allows for seamless transition of the device from thefirst base station to the second base station.

In some circumstances, however, the communication can be at risk due tothe device using a large amount of transmission power in order tocontinue the communication. For example, when the device is at the edgeof coverage, a transmission power of the device can be at maximum level.When this occurs, the probability of a communication (e.g., a call)being dropped or a disconnection occurring can become relatively high.Thus, the unreliability of the device and/or the network can frustrate auser as well as cause other problems (e.g., an important communicationbeing lost).

The above-described deficiencies of today's wireless communicationsystems are merely intended to provide an overview of some of theproblems of conventional systems, and are not intended to be exhaustive.Other problems with conventional systems and corresponding benefits ofthe various non-limiting embodiments described herein may become furtherapparent upon review of the following description.

SUMMARY

A simplified summary is provided herein to help enable a basic orgeneral understanding of various aspects of exemplary, non-limitingembodiments that follow in the more detailed description and theaccompanying drawings. This summary is not intended, however, as anextensive or exhaustive overview. Instead, the sole purpose of thissummary is to present some concepts related to some exemplarynon-limiting embodiments in a simplified form as a prelude to the moredetailed description of the various embodiments that follow.

In an example embodiment, a method comprises detecting that an uplinkpower level during a wireless communication by a mobile device meets acondition with respect to a pre-specified power level and disablingtransmission of a non-call critical message on an uplink in response tothe uplink power level meeting the condition with respect to thepre-specified power level.

In another example embodiment, an apparatus comprises an analyzercomponent configured to determine that uplink transmit power levelsduring a wireless communication by a mobile device meet a condition withrespect to maximum transmit power levels for an uplink transmissionduring a first period. The apparatus also includes a manager componentconfigured to temporarily disable transmission of a message that is notrelated to call maintenance in response to a determination by theanalyzer component that the uplink transmit power levels meet thecondition.

In another example embodiment, a system comprises an analyzer componentthat detects an uplink transmit power during a wireless communication bya mobile device is near a maximum transmit power during a first period.The system also includes a manager component that selectively suspends amessage in response to detection by the analyzer component that theuplink transmit power is near the maximum transmit power during thefirst period and a processor that utilizes a resource conserved bysuspension of the message by the manager component.

These and other embodiments are described in more detail below.

BRIEF DESCRIPTION OF THE DRAWINGS

Various non-limiting embodiments are further described with reference tothe accompanying drawings in which:

FIG. 1 illustrates a network in which the disclosed aspects can beutilized.

FIG. 2 illustrates a high-level block diagram of an exemplarycommunication network, according to an aspect.

FIG. 3 illustrates an example non-limiting network configured to controlcall drop by disabling uplink transmissions, according to an aspect.

FIG. 4 illustrates an apparatus configured to control the transmissionor non-transmission of uplink messages, according to an aspect.

FIG. 5 illustrates a flow chart for controlling call drop by disablinguplink transmissions, according to an aspect.

FIG. 6 illustrates a flow chart for controlling and mitigating droppedcalls, in accordance with an aspect.

FIG. 7 illustrates a flow chart for selectively disabling and enablingone or more messages on an uplink, according to an aspect.

FIG. 8 is a schematic example wireless environment that can operate inaccordance with aspects described herein;

FIG. 9 illustrates a block diagram of access equipment and/or softwarerelated to access of a network, in accordance with an embodiment; and

FIG. 10 illustrates a block diagram of a computing system, in accordancewith an embodiment.

DETAILED DESCRIPTION Overview

Various embodiments are configured to enable detection of a devicemaximum power state (or near maximum power state) and disable uplinkreporting/status information and/or other non-call critical messagesthat would otherwise be sent during the maximum (or near maximum) powerstate. Since fading can be rapid, a single maximum power state detectionduring a first period can be utilized to place the device in a “maximumpower state”. The single maximum power state detection can allow formore rapid detection of maximum power. Subsequently, in the “maximumpower state” the reporting/status messages and/or other non-callcritical messages can be disabled in the uplink. This also allows todevice to not need additional power in the uplink. Further, powerresources can be conserved and/or the resources can be devoted tomaintain existing speech and/or critical control messages. The disclosedaspects can also alleviate the issue of additional power being neededfor other message and can mitigate the probability of call disconnectiondue to power demands in excess of the maximum power available.

In various wireless data networks (e.g., UMTS (Universal MobileTelecommunications System), LTE (Long Term Evolution), and so forth),such as network 100 illustrated in FIG. 1, downlink coverage 102 isgenerally greater than the uplink coverage 104. The downlink coverage102 is the coverage from a base station 106 to a user equipment 108 andthe uplink coverage 104 is the coverage from the user equipment 108 tothe base station 106. For purposes of simplicity, only a single basestation 106 and a single user equipment 108 are illustrated, however,network 100 can include more than one base station and/or more than oneuser equipment.

The disparity in the downlink and uplink coverage is due, in part todownlink (DL) data rates 110 being larger than uplink (UL) data rates112. However, in the case of voice only (e.g., speech) transmissionwhere the uplink data rates 112 and the downlink data rates 110 aresubstantially the same, the difference can be an issue since the uplink104 will be the limiting case for the voice coverage. Therefore, thedownlink 102 can have a coverage margin when the uplink 104 has nomargin. Thus, when the downlink 102 is still active (e.g., since it hascoverage margin), the uplink 104 may be at maximum power (e.g., limit ofcoverage). Maximum power is utilized herein to refer to theinstantaneous power reaching maximum over the smallest measurementinterval used.

If the downlink 102 (e.g., base station 106) is actively transmittingdata, acknowledgement messages (ACKs 114) are expected to be sent to thebase station 106 from the uplink 104 (e.g., user equipment 108),according to conventional techniques. However, since the uplink 104 isalready at maximum transmission power, this situation can result indisconnection of the link once (or at substantially the same time as)the ACKs 114 are transmitted.

For example, in the case of multiple Radio Access Bearer (mRAB), whenthere are packets of data, speech, and Signalling Radio Bearers (SRBs),in the buffers, the various packets are transmitted in the same frame,even though all of the packets might not be necessary to maintain thecommunication. Since sending additional messages (especiallynon-critical “data” messages) would utilize additional device power,there might not be enough power left to transmit critical signalingmessages reliably and, therefore, the call can drop when the networkconsistently does not receive reliable signaling messages. Thisprocedure is allowed by the 3GPP UMTS standards, for example. Thissituation can occur at cell boundaries and can also occur during“in-building” situations, which can happen at relatively close range tothe base station.

Further, some conventional systems allow the user equipment to rapidlylower the uplink data rate to a zero rate but downlink response messagesand measurement report messages still are allowed in the uplink, whichcan exacerbate the device transmission power issue (e.g., maximum powerlevel being reached) and can result in call disconnection. Althoughthere is no limit on how long a device can transmit at peak powerwithout dropping to a lower power, the condition exacerbates the calldrop probability, the data throughput, and so forth.

Thus, it would be beneficial to mitigate the transmission of theacknowledgement messages and/or other messages (e.g., non-call criticalmessages) when the user equipment is at, or near, a maximum transmissionpower level.

An aspect relates to a method that includes detecting that an uplinkpower level during a wireless communication by a mobile device meets acondition with respect to a pre-specified power level. The method alsoincludes disabling transmission of a non-call critical message on anuplink in response to the uplink power level meeting the condition withrespect to the pre-specified power level.

In an implementation, disabling the non-call critical message includesdisabling a non-signaling radio bearer related message. In anotherimplementation, disabling the non-call critical message includesdisabling a set of messages. Further to this implementation, disablingthe set of messages includes disabling a session.

In some implementations, detecting the uplink power level includesevaluating the uplink power level for a defined number of uplinktransmissions and determining the uplink power level meets the conditionwith respect to a maximum power level for a subset of the defined numberof uplink transmissions as a function of the evaluating. Further to thisimplementation, evaluating the uplink power level includes analyzing theuplink power level during a period of time.

According to an implementation, disabling transmission of a non-callcritical message includes conserving a power resource. Further to thisimplementation, the method includes mitigating a power resource ofnon-call critical control signals and using the mitigated power resourcefor a critical message signal. In another implementation, disablingtransmission of a non-call critical message includes conserving a powerresource. Further to this implementation, the method includes mitigatinga power resource of non-critical data signals and using the mitigatedpower resource for critical data signals.

According to some implementations, disabling transmission of thenon-call critical message includes conserving a power resource and themethod includes pushing bit duration energy from a speech signal toincrease corresponding bit durations of call critical signalingmessages. Further to this implementation, the method includes increasinga gain of a code carrying the call critical signaling messages andmitigating the gain of non-call critical control signals. In someimplementations, the method includes increasing a signal amplitude and abit energy of the call critical signaling messages by taking the signalamplitude and the bit energy from non-critical call signals and bitenergies. In other implementations, disabling transmission of thenon-call critical message further includes conserving a power resource,and the method further includes pushing bit duration energy from aspeech signal to increase corresponding bit durations of call criticaldata signals.

In some implementations, disabling transmission of a non-call criticalmessage is during a first period. Further to this implementation, themethod includes reviewing the uplink power level during a second periodand enabling a transmission non-call critical message on the uplinkduring the second period in response to a result of reviewing the uplinkpower level.

According to a further implementation, disabling transmission of anon-call critical message is during a first period. Further to thisimplementation, the method includes reviewing the uplink power levelduring a second period and continuing to disable the non-call criticalmessage on the uplink during the second period in response to a resultof reviewing the uplink power level.

According to some implementations, disabling transmission of thenon-call critical message includes temporarily disabling the non-callcritical message on the uplink. In some implementations, the methodincludes receiving the pre-specified power level as a dynamic updateover-the-air. In other implementations, the method includes monitoringan uplink power level during a wireless communication by a mobiledevice.

Another aspect relates to an apparatus that includes an analyzercomponent configured to determine that uplink transmit power levelsduring a wireless communication by a mobile device meet a condition withrespect to maximum transmit power levels for an uplink transmissionduring a first period. The apparatus also includes a manager componentconfigured to temporarily disable a message that is not related to callmaintenance in response to a determination by the analyzer componentthat the uplink transmit power levels meet the condition.

In an implementation, the manager component is configured to temporarilydisable a session in response to the determination by the analyzercomponent. In another implementation, the analyzer component is furtherconfigured to review the uplink transmit power levels during a secondperiod and the manager component is further configured to continue todisable the transmission of the message in response to a result of thereview. In a further implementation, the analyzer component is furtherconfigured to review the uplink transmit power levels during a secondperiod and the manager component is further configured to enable thetransmission of the message in response to a result of the review.

In some implementations, the manager component is further configured totemporarily disable a session. In an implementation, the message that isnot related to the call maintenance is a non-signaling radio bearerrelated message. In an implementation, the apparatus is a mobilehandset.

A further aspect relates to a system that includes an analyzer componentthat detects an uplink transmit power during a wireless communication bya mobile device is near a maximum transmit power during a first period.The system also includes a manager component that selectively suspends amessage in response to a detection by the analyzer component that theuplink transmit power is near the maximum transmit power during thefirst period. Also included in the system is a processor that utilizes aresource conserved by the suspension of the message by the managercomponent.

According to an implementation, the message is a non-signaling radiobearer related message and the processor utilizes the resource for asignaling radio bearer related message. In some implementations, theanalyzer component reviews the uplink transmit power during a secondperiod and the manager component enables the message in response to aresult of the review. In an implementation, the analyzer component, themanager component, and the processor are included in a wirelesscommunication device.

Herein, an overview of some of the embodiments for control of call dropby disabling one or more uplink transmissions has been provided above.As a roadmap for what follows next, various exemplary, non-limitingembodiments and features for control and/or disabling (at leasttemporarily) uplink transmissions are described in more detail. Then,some non-limiting implementations and examples are given for additionalillustration, followed by representative networks and environments inwhich such embodiments and/or features can be implemented.

Controlling and Mitigating Dropped Communications

By way of further description with respect to one or more non-limitingways to provide control of uplink transmissions to mitigate call drop, ahigh-level block diagram of an exemplary communication network 200 isillustrated generally by FIG. 2.

Included in network 200 are a user equipment, illustrated as a mobiledevice 202, and a base station 204. The mobile device 202 communicatesto the base station 204 over an uplink 206 and the base station 204communicates to the mobile device 202 over a downlink 208.

Mobile device 202 includes an observation component 210 configured tomonitor an uplink power level during a wireless communication. Forexample, the observation component 210 can be configured to monitor theuplink power level during one or more time periods and/or cancontinuously monitor the uplink power level during the wirelesscommunication.

An analyzer component 212 is configured to detect if the uplink powerlevel meets a condition with respect to a pre-specified power level. Inan example, the pre-specified power level can be a threshold powerlevel. For example, the analyzer component 212 can detect whether theuplink power level is at, or near, a maximum power level during at leastone time period. In some aspects, the detection by analyzer component212 is based on the uplink power level being at, or near, a maximumpower level for at least a subset of a defined number of uplinktransmissions. In an example, a single uplink transmission is a singlesignaling message. In accordance with some aspects, analyzer component212 is associated with (or includes) a radio frequency (RF) circuit thatis configured to measure the transmit power of the mobile device 202.For example, code in a RF chip-set can be changed, according to anaspect.

Also included in mobile device 202 is a manager component 214 configuredto selectively disable at least one message in response to the detectionby analyzer component 212 that the uplink power level meets thecondition with respect to the pre-specified power level. For example,the manager component 214 can be configured to selectively disable theone or more messages during the device maximum power condition. At aboutthe same time as the device is no longer in the maximum power condition,manager component 214 can selectively enable one or more messages thatwere previously disabled. In accordance with some aspects, the managercomponent 214 can be configured to disable at least one non-callcritical message on the uplink 206.

For example, the base station 204 might be actively communicating withthe mobile device 202 on the downlink 208. In response to the downlinkcommunications, the mobile device 202 might be expected to reply, on theuplink 206, with various messages, such as acknowledgement messages,report information, status information, as well as other non-callcritical messages and/or call-critical messages. However, the mobiledevice 202 might be in a situation where the mobile device 202 is atmaximum transmission power. Thus, if the mobile device 202 attempts totransmit information in response to the downlink messages whileoperating at, or near, maximum power, it can result in disconnection ofthe communication link. Such disconnection can negatively impact a userexperience. For example, the disconnection can result in a dropped call,which can be frustrating to the user and can result in communicationsbeing missed. The dropped call scenario can be devastating in the casewhere the communication was related to an emergency situation (e.g., a911 emergency call).

FIG. 3 illustrates an example non-limiting network 300 configured tocontrol call drop by disabling uplink transmissions, according to anaspect. Similar to the above figure, FIG. 3 illustrates a mobile device302 that communicates with a base station 304 over an uplink 306 andreceives a communication from the base station 304 over a downlink 308.Downlink data rates can be larger than uplink data rates and, therefore,the base station 304 might be able to communicate effectively while, atsubstantially the same time, communication by the mobile device 302 canoccur, however, the mobile device 302 is transmitting at maximum, ornear maximum, power level. The transmission at maximum (or near maximum)power level can result in call disconnection.

To help control the amount of power consumed by the mobile device 302during a communication, an observation component 310 is configured tomonitor an uplink power level 312. For example, the observationcomponent 310 can include a timer 314 configured to track differentintervals or periods. While the intervals or periods are describedherein with respect to time for purposes of simplicity, other manners ofdistinguishing intervals or periods can be utilized. For example, thetimer 314 can be configured to divide the communication into a firstperiod 316, a second period 318, through an N period 320, where N is aninteger. In an aspect, the last period of the communication (e.g., Nperiod 320) is not an entire period because the timer 314 does not knowthe duration of the communication while the communication is inprogress.

The observation component 310 is configured to monitor the uplink powerlevel 312 during one or more periods tracked by timer 314. In accordancewith some aspects, the periods can be during a single transmission timeinterval. However, according to some aspects, the periods can encompassmore than one transmission time interval. In other aspects, the periodscan include at least a portion of one or more transmission timeintervals. In some aspects, the observation component 310 is configuredto continuously monitor the uplink power level during the wirelesscommunication.

An analyzer component 322 is configured to detect if the uplink powerlevel 312 meets a condition with respect to a pre-specified power level324. For example, the uplink power level 312 can have limitations due tothe type of mobile device, capabilities of the mobile device, and/orother parameters. Based on the various limitations, there is a maximumuplink power level 326 that mobile device 302 can utilize fortransmission of data, voice, other messages, and/or information.Operating at, or near, the maximum uplink power level 326 can quicklyconsume mobile device resources, including battery power andtransmission power. In some aspects, a threshold power level is utilizedby analyzer component 322 as the pre-specified power level 324. Forexample, the threshold power level can be a power level that is apercentage (e.g., 75%, 80%, 95%, and so forth) of the maximum uplinkpower level 326. In other aspects, the pre-specified power level 324 issubstantially the same as, the maximum power level is utilized.

In an aspect, the analyzer component 322 includes an assessment module328 that is configured to evaluate the uplink power level 312 for adefined number of uplink transmissions, referred to as M transmissions330, where M is an integer. In some aspects, the M transmissions 330 canbe defined with respect to each period (e.g., first period 316, secondperiod 318, through N period 320). For example, the M transmissions 330can be a subset of the total number of uplink transmissions (e.g., lessthan all uplink transmissions, less than substantially all uplinktransmissions, and so on) during each period. In another example, the Mtransmissions 330 can be one uplink transmission. In a further example,the M transmissions 330 can be five uplink transmissions, and so forth.In some aspects, the number of M transmissions 330 can be configurableand/or can be varied manually (e.g., by a user, by a network, and soforth) and/or dynamically (e.g., based on historical data related to themobile device, and so forth).

A decision module 332 is configured to determine the uplink power level312 is at, or near, the maximum uplink power level 326 (or meets acondition with respect to the pre-specified power level 324) for atleast a subset of the defined number of uplink transmissions (e.g., Mtransmissions) as a function of the evaluation by assessment module 328.For example, if the uplink power level is at, or near, the maximumuplink power level 326 (or meets the condition for the pre-specifiedpower level 324) for M transmissions, decision module 332 can concludethat the mobile device 302 is operating at (or substantially at) maximumpower and action, by a manager component 334, should be taken.

Manager component 334 is configured to selectively disable (at leasttemporarily) at least one message. For example, manager component 334(or another component) can divide the various messages and/or data intonon-call critical messages 336 or call-critical messages 338. Forexample, after analyzer component 322 and/or decision module 332conclude that the device is operating at (or near) the maximum uplinkpower level 326, manager component 334 can evaluate the messages.However, if it has not been determined that mobile device 302 isoperating at, or near, the maximum uplink power level 326, managercomponent 334 might not distinguish the messages (which can conservemobile device resources and/or power). However, according to someaspects, the messages are identified as non-call critical messages 336or call critical messages 338 regardless of the transmission powerutilized by the device.

In an example, a non-call critical message is a non-signaling radiobearer related message. Both the base station and the mobile device canbe aware of the messages that are signaling radio bearer related as wellas the messages that are non-signaling radio bearer related. In anotherexample, the non-call critical message is a message that includes userdata. In still another example, the non-call critical message is anacknowledgement message (in reply to a downlink message). In a furtherexample, the non-call critical message includes report information. Inanother example, the non-call critical message includes statusinformation. In a further example, the non-call critical message is amessage that is not needed for call maintenance.

In an example, the call critical message is a signaling radio bearerrelated message. In another example, the call critical message is avoice communication. In a further example, the call critical message isa critical control message.

As a result of the determination whether the message is a non-callcritical message 336 or a call critical message 338, the managercomponent 334 selectively enables or disables transmission of themessage. For example, if the message is a call critical message 338,manager component 334 allows the message to be transmitted on the uplink306 when the mobile device 302 is in the “maximum power state”. However,if the message is a non-call critical message 336, the manager component334 can disable (at least temporarily) transmission of the message. Insuch a manner, power from the non-call critical messages or signals(that are not transmitted) can be applied to the critical signals, forexample. In another example, a power resource can be conserved andapplied to a critical control message. In still another example, thepower resource can be conserved and applied to a voice communication. Inyet another example, the power resource can be conserved in order todynamically control network parameters, such as rate matching, poweroffset of physical channels, and so forth, wherein the power resourcecan be utilized to provide more power to the signaling radio bearer.

In another example, disabling transmission of the non-call criticalmessage includes conserving a power resource. Further, a power resourceof non-call critical control signals can be mitigated and the mitigatedpower resource can be used for a critical message signal and/or can beused for critical data signals. In yet another example, disablingtransmission of the non-call critical message includes conserving apower resource. Further to this example, bit duration energy from aspeech signal can be pushed to increase corresponding bit durations of acall critical signaling message. The pushing of energy from the speechsignal can be performed without appreciably degrading the speech signal,according to an aspect.

As another example, manager component 334 can be configured to conserveenergy by temporarily disabling non-critical messages and can further beconfigured to improve the energy into the critical signaling messages.For example, manager component 334 can increase a gain of a codecarrying the call critical signaling messages and can mitigate the gainof non-call critical control signals.

In another example, a signal amplitude and a bit energy of the callcritical signaling messages can be increased by taking the signalamplitude and the bit energy from non-critical call signals and bitenergies.

In a further example, disabling transmission of the non-call criticalmessage can include conserving a power resource and a bit durationenergy can be pushed from a speech signal to increase corresponding bitdurations of call critical data signals.

In accordance with some aspects, information related to one or more ofthe pre-specified power level 324, the maximum uplink power level 326,other criteria related to the power level, identification of non-callcritical messages 336, and identification of call critical messages 338can be updated dynamically. For example, the various information can beprovided to the device over-the-air, according to an aspect. Althoughdynamic updating over-the-air may utilize more signaling, such updatingcan be advantageous in some cases (e.g., limited device processingcapabilities, rapidly changing conditions, parameters, or criteria, andso forth).

FIG. 4 illustrates an apparatus 400 configured to control thetransmission or non-transmission of uplink messages, according to anaspect. In accordance with some aspects, apparatus 400 is a mobilehandset (e.g., user equipment, mobile device, and so forth). Forexample, a mobile handset can react relatively quickly to degrading RFconditions on the uplink. However, according to some aspects, apparatus400 can be configured to be a base station, a Radio Network Controller(RNC), or the like. Although a base station or RNC might react slowerthan the mobile handset, the base station or RNC can control thedownlink RF situation in which similar disabling of non-critical messagecan also occur, according to an aspect.

Included in apparatus 400 is an observation component 402 configured toreview a transmit power level during an uplink communication. Alsoincluded in apparatus 400 is an analyzer component 404 configured toevaluate the transmit power for a defined number of uplink transmissionsover a first period. A manager component 406 is configured toselectively suspend, at least temporarily, one or more messages if theevaluation by analyzer component 404 indicates that the apparatus isoperating at, or near, a maximum transmit power level. For example,manager component 406 can selectively suspend one or more non-callcritical messages, which can be a non-signaling radio bearer relatedmessage. In some aspects, manager component 406 is configured totemporarily suspend a set of messages. In an example, disabling the setof messages includes disabling a session. A session, as utilized herein,refers to a condition where there is more than one non-critical message.For example, the session can be a packet-switched session. In an aspect,if the session is disabled, re-initiation of the session is notattempted (at least while the apparatus is operating at, or near, amaximum power level).

In an aspect, the manager component 406 includes an enable module 408and a disable module 410. The enable module 408 is configured to allowcall critical messages to be transmitted, by a communication component412, even though the apparatus 400 is operating at, or near, maximumtransmit power for one or more uplink transmissions. The disable module410 is configured to, at least temporarily, disable transmission of oneor more non-call critical messages on an uplink if the apparatus 400 isoperating at, or near, maximum transmit power for one or more uplinktransmissions.

In accordance with some aspects, the transmit power evaluated byanalyzer component 404 is during a first period. If, in response to theevaluation, disable module 410 (or manager component 406) temporarilydisables at least one message from being transmitted, the analyzercomponent 404 is configured to review the uplink power level during asecond period. If the apparatus 400 is no longer transmitting at full,or near full, power, the enable module 408 is configured to enabletransmission of the message that was previously disabled. However, ifthe apparatus 400 is still transmitting at full, or near full, power,the disable module 410 can continue to disable the messages during thesecond (or a subsequent) period.

According to some aspects, information related to power level parametersand/or identification of critical and non-critical signaling messagescan be updated dynamically, such as over-the air. For example,communication component 412 can be configured to receive one or moreparameters and/or identification and convey such information to theanalyzer component 404, the manager component 406, and/or othercomponents for further analysis and implementation. Although the dynamicsignaling over-the-air uses more signaling, it can be advantageous inthe case where processing capabilities of the apparatus 400 are limitedor where conditions warrant the dynamic updating, for example.

In accordance with some aspects, apparatus 400 can include memory 414and a processor 416. The processor 416 can be coupled to the memory 414,according to some aspects. Although shown as being internal to apparatus400, either or both the memory 414 and the processor 416 can be externalto apparatus. Processor 416 can be configured to execute instructionsrelated to monitoring an uplink power level in order to detect whetherapparatus 400 is operating at or near maximum transmit power. Processor416 can also be configured to execute instructions related toselectively disabling and/or enabling the transmission of one or moremessages that are not related to signaling and/or that are notcall-critical messages.

In accordance with some aspects, processor 416 is configured to utilizepower resources, which are made available when the message(s) areselectively disabled, for other functions. For example, processor 416can utilize the conserved power resource for a voice communication. Inanother example, processor 416 can utilize the conserved power resourcefor a critical control message. In a further example, processor 416 canutilize the conserved power resource for a signaling radio bearerrelated message. For example, processor 416 can be configured toincrease a gain of a code carrying the call critical signaling messagesand mitigate the gain of the non-call critical control signals. Inanother example, process 416 can increase a signal amplitude and a bitenergy of the call critical signaling messages by taking the signalamplitude and the bit energy from non-critical call signals and bitenergies. In another example, the processor 416 can push bit durationenergy from a speech signal (while not degrading the speech signalappreciably) to increase corresponding bit durations of call criticaldata signals.

Memory 414 can be configured to store information related to transmitpower ranges, a maximum transmit power available, a defined and/orconfigurable number of M uplink transmissions, historical transmissionpower levels, location information, as well as other parametersassociated with transmit power ranges and/or transmit power levels.

In accordance with some aspects, memory 414 is configured to retaininformation (e.g., historical information) related to call drops. Forexample, memory 414 can be configured to retain information related toprevious call drop situations, diagnosis of reasons why the call wasdropped (which can be based on information received by communicationcomponent 412 or based on analysis by processor 416 or another componentof apparatus 400). In accordance with some aspects, memory 414 isconfigured to retain information related to parameters and/or thresholdsthat were utilized in the past to correct a call drop situation.

According to some aspects, machine learning and reasoning is utilized toleverage historical information for improving communication reliability.Machine learning and reasoning can employ principles of probabilisticand decision theoretic inference and rely on predictive modelsconstructed through the use of machine learning procedures.Logic-centric inference can also be employed separately or inconjunction with probabilistic methods. For example, machine learningand reasoning can infer whether a condition is such that a call drop islikely to occur by obtaining knowledge about the similar conditions(e.g., previous call drop situations) and the outcome of the similarconditions in the past. Based on this knowledge, machine learning andreasoning can make an inference based on which actions to implement(e.g., based on diagnosis of a similar condition, based on how thecondition was corrected in the past), which signaling messages totemporarily disable, how long to disable the signaling messages, and soforth.

The various aspects (e.g., in connection with controlling call drop,disabling one or more signaling messages, and so forth) can employvarious artificial intelligence-based schemes for carrying out variousaspects thereof. For example, a process for determining if a particularsituation resulted in a call drop and a similar situation is once againoccurring can be enabled through an automatic classifier system andprocess.

A classifier is a function that maps an input attribute vector, x=(x1,x2, x3, x4, xn), to a confidence that the input belongs to a class, thatis, f(x)=confidence(class). Such classification can employ aprobabilistic and/or statistical-based analysis (e.g., factoring intothe analysis utilities and costs) to prognose or infer an action thatshould be automatically performed (e.g., temporarily disabling one ormore signaling messages).

A support vector machine (SVM) is an example of a classifier that can beemployed. The SVM operates by finding a hypersurface in the space ofpossible inputs, which hypersurface attempts to split the triggeringcriteria from the non-triggering events. Intuitively, this makes theclassification correct for testing data that is near, but not identicalto training data. Other directed and undirected model classificationapproaches include, for example, naïve Bayes, Bayesian networks,decision trees, neural networks, fuzzy logic models, and probabilisticclassification models providing different patterns of independence canbe employed. Classification as used herein also is inclusive ofstatistical regression that is utilized to develop models of priority.

As will be readily appreciated from the subject specification, the oneor more aspects can employ classifiers that are explicitly trained(e.g., through a generic training data) as well as implicitly trained(e.g., by observing conditions related to communications that weredropped in the past, receiving extrinsic information, and so forth). Forexample, SVM's are configured through a learning or training phasewithin a classifier constructor and feature selection module. Thus, theclassifier(s) can be used to automatically learn and perform a number offunctions as described herein.

FIG. 5 illustrates a flow chart 500 for controlling call drop bydisabling uplink transmissions, according to an aspect. The uplinktransmissions can be disabled, at least temporarily, to conserveresources (e.g., power resources, computing resources, and so forth).Further, the disabling of uplink transmissions can mitigate theprobability of call disconnection due to power resources being neededwhich are in excess of the maximum power available. Although a handsetcan transmit at peak power, doing so can exacerbate the call dropprobability and the data though put, for example.

At 502, an uplink power level is monitored during a wirelesscommunication. An uplink power level that meets a condition with respectto a pre-specified power level is detected, at 504. For example, theuplink power level might be at or above the threshold level when amobile device is at the edge of coverage. In this case, the devicetransmission power can be at a maximum or near maximum power level. Whenthis occurs, the chances of a call being dropped or disconnected canbecome relatively high.

In response to detection that the uplink power level meets thecondition, transmission of at least one message is disabled, at 506. Insome aspects, the at least one message that is disabled is a non-callcritical message on the uplink. According to some aspects, the at leastone message is an acknowledgement message. In another aspect, the atleast one message includes report information. In a further aspect, theat least one message includes status information. In other aspects, theat least one message is a non-signaling radio bearer related message.Disabling the transmission of the at least one message, at 506, can betemporary, wherein, transmission of the at least one message can beselectively enabled when the transmission power level is once againlower than the threshold level.

FIG. 6 illustrates a flow chart 600 for controlling and mitigatingdropped calls, in accordance with an aspect. At 602, an uplink powerlevel is monitored during a wireless communication. At 604, it isdetected that the uplink power level meets a condition with respect to apre-specified power level. In accordance with some aspects, thedetecting, at 604, includes evaluating, at 606, the uplink power levelfor a defined number of uplink transmissions (e.g., M transmissions).

At 608, it is determined that the uplink power level meets the conditionwith respect to the pre-specified power level for a subset of thedefined number of uplink transmissions as a function of the evaluation.At 610, transmission of a non-signaling radio bearer related message istemporarily disabled.

According to some aspects, the evaluation, at 606, includes analyzing,at 612, the uplink power level during a first period. Further to thisaspect, the disabling includes conserving a power resource(s), at 614.The power resource(s) can be used for a critical control message and/ora voice communication, at 616.

In accordance with some aspects, method can include mitigating a powerresource of non-call critical control signals and sing the mitigatedpower resource for a critical message signal. According to anotheraspect, method can include mitigating a power resource of non-criticaldata signals and using the mitigated power resource for critical datasignals.

In some aspects, method include pushing bit duration energy from aspeech signal to increase corresponding bit durations of call criticaldata signals. According to some aspects, method can include pushing bitduration energy from a speech signal to increase corresponding bitdurations of call critical signaling messages. Further to this aspect,method can include increasing a gain of a code carrying the callcritical signaling messages and mitigating the gain of non-call criticalcontrol signals. Additionally or alternatively, method can includeincreasing a signal amplitude and a bit energy of the call criticalsignaling messages by taking the signal amplitude and the bit energyfrom non-critical call signals and bit energies.

FIG. 7 illustrates a flow chart 700 for selectively disabling andenabling one or more messages on an uplink, according to an aspect. At702, an uplink power level is monitored during a wireless communication.At 704, it is detected that the uplink power level is at or above athreshold level and, at 706, transmission of at least one message isdisabled in response to the uplink power level being above the thresholdlevel.

According to some aspects, disabling the at least one message includesdisabling a non-call critical message. The non-call critical message canbe a non-signaling radio bearer related message. In accordance with someaspects, the disabling includes disabling transmission of a set ofmessages. In an aspect, disabling the set of messages includes disablinga session.

In accordance with some aspects, detecting the uplink power level is ator above a threshold level, at 704, is during a first period. Thus, at708, the uplink power level is reviewed during a second period. Adetermination is made, at 710, whether the uplink power is still at orabove the threshold level.

If the determination, at 710, is that the uplink power is still at orabove the threshold level (“YES”), continuation of the disabling of themessage or set of messages continues, at 706. This can be recursive suchthat the message or set of messages is disabled until the uplink powerlevel is below the threshold level or when the communication is nolonger in process.

If the determination, at 710, is that the uplink power is below thethreshold level (“NO”), at 712, the message or set of messages isenabled for the second period (or a subsequent period). Monitoring ofthe uplink power level can continue, at 702.

In accordance with some aspects, information related to power levelparameters and/or identification of critical and non-critical signalingmessages can be updated dynamically, such as over-the-air. Further tothis aspect, method 700 is configured to receive one or more parametersand/or identification and perform further analysis of the parametersand/or identification and implement an action based on the analysis.Although the dynamic signaling over-the-air uses more signaling, it canbe advantageous in the case where processing capabilities are limited orwhere conditions warrant the dynamic updating, for example.

As discussed herein, the disclosed aspects can control call drop byselectively disabling uplink transmissions. In some cases, fading can berapid, and therefore, detection of a maximum power state during a firstperiod can be utilized to place the device in a “maximum power state”.Subsequently, in the “maximum power state” the reporting messages,status messages and/or other non-call critical messages can be disabledin the uplink. For example, the disclosed aspects can alleviate theissue of additional power being needed for other (e.g., non-callcritical) messages and can mitigate the probability of calldisconnection due to power demands in excess of the maximum poweravailable.

Exemplary Networked and Operating Environments

By way of further description with respect to one or more non-limitingways to control call drop by disabling uplink transmissions, FIG. 8 is aschematic example wireless environment 800 that can operate inaccordance with aspects described herein. In particular, examplewireless environment 800 illustrates a set of wireless network macrocells. Three coverage macro cells 802, 804, and 806 include theillustrative wireless environment; however, it should be appreciatedthat wireless cellular network deployments can encompass any number ofmacro cells. Coverage macro cells 802, 804, and 806 are illustrated ashexagons; however, coverage cells can adopt other geometries generallydictated by a deployment configuration or floor plan, geographic areasto be covered, and so on. Each macro cell 802, 804, and 806 issectorized in a 2π/3 configuration in which each macro cell includesthree sectors, demarcated with dashed lines in FIG. 8. It should beappreciated that other sectorizations are possible, and aspects orfeatures of the disclosed subject matter can be exploited regardless oftype of sectorization. Macro cells 802, 804, and 806 are servedrespectively through base stations or eNodeBs 808, 810, and 812. Any twoeNodeBs can be considered a eNodeB site pair (NBSP). It is noted thatradio component(s) are functionally coupled through links such as cables(e.g., RF and microwave coaxial lines), ports, switches, connectors, andthe like, to a set of one or more antennas that transmit and receivewireless signals (not illustrated). It is noted that a radio networkcontroller (not shown), which can be a part of mobile networkplatform(s) 814, and set of base stations (e.g., eNode B 808, 810, and812) that serve a set of macro cells; electronic circuitry or componentsassociated with the base stations in the set of base stations; a set ofrespective wireless links (e.g., links 816, 818, and 820) operated inaccordance to a radio technology through the base stations, form a macroradio access network (RAN). It is further noted that, based on networkfeatures, the radio controller can be distributed among the set of basestations or associated radio equipment. In an aspect, for UMTS-basednetworks, wireless links 816, 818, and 820 embody a Uu interface (UMTSAir Interface).

Mobile network platform(s) 814 facilitates circuit switched (CS)-based(e.g., voice and data) and packet-switched (PS) (e.g., internet protocol(IP), frame relay, or asynchronous transfer mode (ATM)) traffic andsignaling generation, as well as delivery and reception for networkedtelecommunication, in accordance with various radio technologies fordisparate markets. Telecommunication is based at least in part onstandardized protocols for communication determined by a radiotechnology utilized for communication. In addition, telecommunicationcan exploit various frequency bands, or carriers, which include any EMfrequency bands licensed by the service provider network 822 (e.g.,personal communication services (PCS), advanced wireless services (AWS),general wireless communications service (GWCS), and so forth), and anyunlicensed frequency bands currently available for telecommunication(e.g., the 2.4 GHz industrial, medical and scientific (IMS) band or oneor more of the 5 GHz set of bands). In addition, mobile networkplatform(s) 814 can control and manage base stations 808, 810, and 812and radio component(s) associated thereof, in disparate macro cells 802,804, and 806 by way of, for example, a wireless network managementcomponent (e.g., radio network controller(s), cellular gateway node(s),etc.) Moreover, wireless network platform(s) can integrate disparatenetworks (e.g., femto network(s), Wi-Fi network(s), femto cellnetwork(s), broadband network(s), service network(s), enterprisenetwork(s), and so on). In cellular wireless technologies (e.g., 3rdGeneration Partnership Project (3GPP) Universal Mobile TelecommunicationSystem (UMTS), Global System for Mobile Communication (GSM)), mobilenetwork platform 814 can be embodied in the service provider network822.

In addition, wireless backhaul link(s) 824 can include wired linkcomponents such as T1/E1 phone line; a digital subscriber line (DSL)either synchronous or asynchronous; an asymmetric DSL (ADSL); an opticalfiber backbone; a coaxial cable, etc.; and wireless link components suchas line-of-sight (LOS) or non-LOS links which can include terrestrialair-interfaces or deep space links (e.g., satellite communication linksfor navigation). In an aspect, for UMTS-based networks, wirelessbackhaul link(s) 824 embodies IuB interface.

It should be appreciated that while exemplary wireless environment 800is illustrated for macro cells and macro base stations, aspects,features and advantages of the disclosed subject matter can beimplemented in microcells, picocells, femto cells, or the like, whereinbase stations are embodied in home-based equipment related to access toa network.

To provide further context for various aspects of the disclosed subjectmatter, FIG. 9 illustrates a block diagram of an embodiment of accessequipment and/or software 900 related to access of a network (e.g., basestation, wireless access point, femtocell access point, and so forth)that can enable and/or exploit features or aspects of the disclosedaspects.

Access equipment and/or software 900 related to access of a network canreceive and transmit signal(s) from and to wireless devices, wirelessports, wireless routers, etc. through segments 902 ₁-902 _(B) (B is apositive integer). Segments 902 ₁-902 _(B) can be internal and/orexternal to access equipment and/or software 900 related to access of anetwork, and can be controlled by a monitor component 904 and an antennacomponent 906. Monitor component 904 and antenna component 906 cancouple to communication platform 908, which includes electroniccomponents and associated circuitry that provide for processing andmanipulation of received signal(s) and other signal(s) to betransmitted.

In an aspect, communication platform 908 includes a receiver/transmitter910 that can convert analog signals to digital signals upon reception ofthe analog signals, and can convert digital signals to analog signalsupon transmission. In addition, receiver/transmitter 910 can divide asingle data stream into multiple, parallel data streams, or perform thereciprocal operation. Coupled to receiver/transmitter 910 is amultiplexer/demultiplexer 912 that facilitates manipulation of signalsin time and frequency space. Multiplexer/demultiplexer 912 can multiplexinformation (data/traffic and control/signaling) according to variousmultiplexing schemes such as time division multiplexing (TDM), frequencydivision multiplexing (FDM), orthogonal frequency division multiplexing(OFDM), code division multiplexing (CDM), space division multiplexing(SDM). In addition, multiplexer/demultiplexer component 912 can scrambleand spread information (e.g., codes, according to substantially any codeknown in the art, such as Hadamard-Walsh codes, Baker codes, Kasamicodes, polyphase codes, and so forth).

A modulator/demodulator 914 is also a part of communication platform908, and can modulate information according to multiple modulationtechniques, such as frequency modulation, amplitude modulation (e.g.,M-ary quadrature amplitude modulation (QAM), with M a positive integer);phase-shift keying (PSK); and so forth).

Access equipment and/or software 900 related to access of a network alsoincludes a processor 916 configured to confer, at least in part,functionality to substantially any electronic component in accessequipment and/or software 900. In particular, processor 916 canfacilitate configuration of access equipment and/or software 900through, for example, monitor component 904, antenna component 906, andone or more components therein. Additionally, access equipment and/orsoftware 900 can include display interface 918, which can displayfunctions that control functionality of access equipment and/or software900, or reveal operation conditions thereof. In addition, displayinterface 918 can include a screen to convey information to an end user.In an aspect, display interface 918 can be an LCD (Liquid CrystalDisplay), a plasma panel, a monolithic thin-film based electrochromicdisplay, and so on. Moreover, display interface 918 can include acomponent (e.g., speaker) that facilitates communication of auralindicia, which can also be employed in connection with messages thatconvey operational instructions to an end user. Display interface 918can also facilitate data entry (e.g., through a linked keypad or throughtouch gestures), which can cause access equipment and/or software 900 toreceive external commands (e.g., restart operation).

Broadband network interface 920 facilitates connection of accessequipment and/or software 900 to a service provider network (not shown)that can include one or more cellular technologies (e.g., 3GPP UMTS,GSM, and so on.) through backhaul link(s) (not shown), which enableincoming and outgoing data flow. Broadband network interface 920 can beinternal or external to access equipment and/or software 900, and canutilize display interface 918 for end-user interaction and statusinformation delivery.

Processor 916 can be functionally connected to communication platform908 and can facilitate operations on data (e.g., symbols, bits, orchips) for multiplexing/demultiplexing, such as effecting direct andinverse fast Fourier transforms, selection of modulation rates,selection of data packet formats, inter-packet times, and so on.Moreover, processor 916 can be functionally connected, through data,system, or an address bus 922, to display interface 918 and broadbandnetwork interface 920, to confer, at least in part, functionality toeach of such components.

In access equipment and/or software 900, memory 924 can retain locationand/or coverage area (e.g., macro sector, identifier(s)), access list(s)that authorize access to wireless coverage through access equipmentand/or software 905, sector intelligence that can include ranking ofcoverage areas in the wireless environment of access equipment and/orsoftware 900, radio link quality and strength associated therewith, orthe like. Memory 924 also can store data structures, code instructionsand program modules, system or device information, code sequences forscrambling, spreading and pilot transmission, access pointconfiguration, and so on. Processor 916 can be coupled (e.g., through amemory bus, to memory 924 in order to store and retrieve informationused to operate and/or confer functionality to the components, platform,and interface that reside within access equipment and/or software 900.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or deviceincluding, but not limited to including, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsand/or processes described herein. Processors can exploit nano-scalearchitectures such as, but not limited to, molecular and quantum-dotbased transistors, switches and gates, in order to optimize space usageor enhance performance of mobile devices. A processor may also beimplemented as a combination of computing processing units.

In the subject specification, terms such as “store,” “data store,” datastorage,” “database,” and substantially any other information storagecomponent relevant to operation and functionality of a component and/orprocess, refer to “memory components,” or entities embodied in a“memory,” or components including the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory.

By way of illustration, and not limitation, nonvolatile memory, forexample, can be included in memory 924, non-volatile memory (see below),disk storage (see below), and memory storage (see below). Further,nonvolatile memory can be included in read only memory (ROM),programmable ROM (PROM), electrically programmable ROM (EPROM),electrically erasable ROM (EEPROM), or flash memory. Volatile memory caninclude random access memory (RAM), which acts as external cache memory.By way of illustration and not limitation, RAM is available in manyforms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronousDRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM(ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).Additionally, the disclosed memory components of systems or methodsherein are intended to include, without being limited to including,these and any other suitable types of memory.

In order to provide a context for the various aspects of the disclosedsubject matter, FIG. 10, and the following discussion, are intended toprovide a brief, general description of a suitable environment in whichthe various aspects of the disclosed subject matter can be implemented.While the subject matter has been described above in the general contextof computer-executable instructions of a computer program that runs on acomputer and/or computers, those skilled in the art will recognize thatthe various aspects also can be implemented in combination with otherprogram modules. Generally, program modules include routines, programs,components, data structures, etc. that perform particular tasks and/orimplement particular abstract data types. For example, in memory (suchas memory 414 of FIG. 4) there can be software, which can instruct aprocessor (such as processor 416 of FIG. 4) to perform various actions.The processor 416 can be configured to execute the instructions in orderto implement the analysis of monitoring an uplink power level, detectingthe uplink power level is at or above a threshold level, and/or disabletransmission of at least one message as a result of the monitored uplinkpower level.

Moreover, those skilled in the art will appreciate that the variousaspects can be practiced with other computer system configurations,including single-processor or multiprocessor computer systems,mini-computing devices, mainframe computers, as well as personalcomputers, base stations 106 (FIG. 1) hand-held computing devices oruser equipment 108 (FIG. 1), such as a PDA, phone, watch, and so forth,microprocessor-based or programmable consumer or industrial electronics,and the like. The illustrated aspects can also be practiced indistributed computing environments where tasks are performed by remoteprocessing devices that are linked through a communications network;however, some if not all aspects of the subject disclosure can bepracticed on stand-alone computers. In a distributed computingenvironment, program modules can be located in both local and remotememory storage devices.

With reference to FIG. 10, a block diagram of a computing system 1000operable to execute the disclosed systems and methods is illustrated, inaccordance with an embodiment. Computer 1002 includes a processing unit1004, a system memory 1006, and a system bus 1008. System bus 1008couples system components including, but not limited to, system memory1006 to processing unit 1004. Processing unit 1004 can be any of variousavailable processors. Dual microprocessors and other multiprocessorarchitectures also can be employed as processing unit 1004.

System bus 1008 can be any of several types of bus structure(s)including a memory bus or a memory controller, a peripheral bus or anexternal bus, and/or a local bus using any variety of available busarchitectures including, but not limited to, Industrial StandardArchitecture (ISA), Micro-Channel Architecture (MSA), Extended ISA(EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB),Peripheral Component Interconnect (PCI), Card Bus, Universal Serial Bus(USB), Advanced Graphics Port (AGP), Personal Computer Memory CardInternational Association bus (PCMCIA), Firewire (IEEE 1194), and SmallComputer Systems Interface (SCSI).

System memory 1006 includes volatile memory 1010 and nonvolatile memory1012. A basic input/output system (BIOS), containing routines totransfer information between elements within computer 1002, such asduring start-up, can be stored in nonvolatile memory 1012. By way ofillustration, and not limitation, nonvolatile memory 1012 can includeROM, PROM, EPROM, EEPROM, or flash memory. Volatile memory 1010 caninclude RAM, which acts as external cache memory. By way of illustrationand not limitation, RAM is available in many forms such as SRAM, dynamicRAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), Rambus directRAM (RDRAM), direct Rambus dynamic RAM (DRDRAM), and Rambus dynamic RAM(RDRAM).

Computer 1002 also includes removable/non-removable,volatile/non-volatile computer storage media. FIG. 10 illustrates, forexample, disk storage 1014. Disk storage 1014 includes, but is notlimited to, devices such as a magnetic disk drive, floppy disk drive,tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, ormemory stick. In addition, disk storage 1014 can include storage mediaseparately or in combination with other storage media including, but notlimited to, an optical disk drive such as a compact disk ROM device(CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RWDrive) or a digital versatile disk ROM drive (DVD-ROM). To facilitateconnection of the disk storage 1014 to system bus 1008, a removable ornon-removable interface is typically used, such as interface component1016.

It is to be appreciated that FIG. 10 describes software that acts as anintermediary between users and computer resources described in suitableoperating environment. Such software includes an operating system 1018.Operating system 1018, which can be stored on disk storage 1014, acts tocontrol and allocate resources of computer system 1002. Systemapplications 1020 can take advantage of the management of resources byoperating system 1018 through program modules 1022 and program data 1024stored either in system memory 1006 or on disk storage 1014. It is to beappreciated that the disclosed subject matter can be implemented withvarious operating systems or combinations of operating systems.

A user can enter commands or information, for example through interfacecomponent 1016, into computer system 1002 through input device(s) 1026.Input devices 1026 include, but are not limited to, a pointing devicesuch as a mouse, trackball, stylus, touch pad, keyboard, microphone,joystick, game pad, satellite dish, scanner, TV tuner card, digitalcamera, digital video camera, web camera, and the like. These and otherinput devices connect to processing unit 1004 through system bus 1008through interface port(s) 1028. Interface port(s) 1028 include, forexample, a serial port, a parallel port, a game port, and a universalserial bus (USB). Output device(s) 1030 use some of the same type ofports as input device(s) 1026.

Thus, for example, a USB port can be used to provide input to computer1002 and to output information from computer 1002 to an output device1030. Output adapter 1032 is provided to illustrate that there are someoutput devices 1030, such as monitors, speakers, and printers, amongother output devices 1030, which use special adapters. Output adapters1032 include, by way of illustration and not limitation, video and soundcards that provide means of connection between output device 1030 andsystem bus 1008. It should be noted that other devices and/or systems ofdevices provide both input and output capabilities such as remotecomputer(s) 1034.

Computer 1002 can operate in a networked environment using logicalconnections to one or more remote computers, such as remote computer(s)1034. Remote computer(s) 1034 can be a personal computer, a server, arouter, a network PC, a workstation, a microprocessor based appliance, apeer device, or other common network node and the like, and typicallyincludes many or all of the elements described relative to computer1002.

For purposes of brevity, only one memory storage device 1036 isillustrated with remote computer(s) 1034. Remote computer(s) 1034 islogically connected to computer 1002 through a network interface 1038and then physically connected through communication connection 1040.Network interface 1038 encompasses wire and/or wireless communicationnetworks such as local-area networks (LAN) and wide-area networks (WAN).LAN technologies include Fiber Distributed Data Interface (FDDI), CopperDistributed Data Interface (CDDI), Ethernet, Token Ring and the like.WAN technologies include, but are not limited to, point-to-point links,circuit switching networks like Integrated Services Digital Networks(ISDN) and variations thereon, packet switching networks, and DigitalSubscriber Lines (DSL).

Communication connection(s) 1040 refer(s) to hardware/software employedto connect network interface 1038 to system bus 1008. Whilecommunication connection 1040 is shown for illustrative clarity insidecomputer 1002, it can also be external to computer 1002. Thehardware/software for connection to network interface 1038 can include,for example, internal and external technologies such as modems,including regular telephone grade modems, cable modems and DSL modems,ISDN adapters, and Ethernet cards.

It is to be noted that aspects, features, or advantages of the aspectsdescribed in the subject specification can be exploited in substantiallyany communication technology. For example, 4G technologies, Wi-Fi,WiMAX, Enhanced GPRS, 3GPP LTE, 3GPP2 UMB, 3GPP UMTS, HSPA, HSDPA,HSUPA, GERAN, UTRAN, LTE Advanced. Additionally, substantially allaspects disclosed herein can be exploited in legacy telecommunicationtechnologies; e.g., GSM. In addition, mobile as well non-mobile networks(e.g., Internet, data service network such as IPTV) can exploit aspector features described herein.

Various aspects or features described herein can be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques. In addition, various aspects disclosed inthe subject specification can also be implemented through programmodules stored in a memory and executed by a processor, or othercombination of hardware and software, or hardware and firmware.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disk (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or other tangible and/or non-transitorymedia which can be used to store desired information. Computer-readablestorage media can be accessed by one or more local or remote computingdevices, e.g., via access requests, queries or other data retrievalprotocols, for a variety of operations with respect to the informationstored by the medium.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

What has been described above includes examples of systems and methodsthat provide advantages of the one or more aspects. It is, of course,not possible to describe every conceivable combination of components ormethods for purposes of describing the aspects, but one of ordinaryskill in the art may recognize that many further combinations andpermutations of the claimed subject matter are possible. Furthermore, tothe extent that the terms “includes,” “has,” “possesses,” and the likeare used in the detailed description, claims, appendices and drawingssuch terms are intended to be inclusive in a manner similar to the term“comprising” as “comprising” is interpreted when employed as atransitional word in a claim.

As used in this application, the terms “component,” “system,” and thelike are intended to refer to a computer-related entity or an entityrelated to an operational apparatus with one or more specificfunctionalities, wherein the entity can be either hardware, acombination of hardware and software, software, or software inexecution. As an example, a component may be, but is not limited tobeing, a process running on a processor, a processor, an object, anexecutable, a thread of execution, a program, and/or a computer. By wayof illustration, both an application running on a server or networkcontroller, and the server or network controller can be a component. Oneor more components may reside within a process and/or thread ofexecution and a component may be localized on one computer and/ordistributed between two or more computers. Also, these components canexecute from various computer readable media having various datastructures stored thereon. The components may communicate via localand/or remote processes such as in accordance with a signal having oneor more data packets (e.g., data from one component interacting withanother component in a local system, distributed system, and/or across anetwork such as the Internet with other systems via the signal). Asanother example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry, which is operated by a software, or firmwareapplication executed by a processor, wherein the processor can beinternal or external to the apparatus and executes at least a part ofthe software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can include a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components. As further yet another example, interface(s) caninclude input/output (I/O) components as well as associated processor,application, or Application Programming Interface (API) components.

The term “set”, “subset”, or the like as employed herein excludes theempty set (e.g., the set with no elements therein). Thus, a “set”,“subset”, or the like includes one or more elements or periods, forexample. As an illustration, a set of periods includes one or moreperiods; a set of transmissions includes one or more transmissions; aset of resources includes one or more resources; a set of messagesincludes one or more messages, and so forth.

In addition, the term “or” is intended to mean an inclusive “or” ratherthan an exclusive “or.” That is, unless specified otherwise, or clearfrom context, “X employs A or B” is intended to mean any of the naturalinclusive permutations. That is, if X employs A; X employs B; or Xemploys both A and B, then “X employs A or B” is satisfied under any ofthe foregoing instances. Moreover, articles “a” and “an” as used in thesubject specification and annexed drawings should generally be construedto mean “one or more” unless specified otherwise or clear from contextto be directed to a singular form.

1. A method, comprising: determining, by a system including a processor,that an uplink power level associated with a wireless communication by amobile device on an uplink of the mobile device satisfies a conditionwith respect to a pre-specified power level including determining, bythe system, that the mobile device is transmitting at the pre-specifiedpower level, wherein the pre-specified power level is defined relativeto a maximum transmission power level of the mobile device; disabling,by the system, transmission of a non-call critical message on the uplinkin response to the uplink power level satisfying the condition withrespect to the pre-specified power level; and continuing, by the system,to enable transmission of a call critical message on the uplink inresponse to the uplink power level satisfying the condition.
 2. Themethod of claim 1, wherein the disabling the non-call critical messagecomprises disabling, by the system, a non-signaling radio bearer relatedmessage.
 3. The method of claim 1, wherein the disabling the non-callcritical message comprises disabling, by the system, a set of messages.4. The method of claim 3, wherein the disabling the set of messagescomprises disabling, by the system, a communication session includingthe wireless communication.
 5. The method of claim 1, wherein thedetermining that the uplink power level satisfies the condition furthercomprises: evaluating, by the system, the uplink power level for adefined number of uplink transmissions; and determining, by the system,the uplink power level satisfies the condition with respect to themaximum transmission power level for a subset of the defined number ofuplink transmissions as a function of the evaluating.
 6. The method ofclaim 5, wherein the evaluating the uplink power level comprisesanalyzing, by the system, the uplink power level for a period of timeduring which the defined number of uplink transmissions occur.
 7. Themethod of claim 1, wherein the disabling the transmission of thenon-call critical message further comprises conserving, by the system, apower resource, and further comprising: using, by the system, the powerresource for the call critical message.
 8. The method of claim 1,wherein the disabling the transmission of the non-call critical messagefurther comprises conserving, by the system, a power resource, andfurther comprising: reducing, by the system, a usage of a power resourcefor a non-call critical control signal; and using, by the system, anunused part of the usage of the power resource for a call criticalmessage signal.
 9. The method of claim 1, wherein the disabling thetransmission of the non-call critical message further comprisesconserving, by the system, a power resource, and further comprising:reducing, by the system, a usage of a power resource of a non-callcritical data signal; and using, by the system, an unused part of theusage of the power resource for a call critical data signal.
 10. Themethod of claim 1, wherein the disabling the transmission of thenon-call critical message further comprises conserving, by the system, apower resource, and further comprising: using, by the system, a bitduration energy obtained from a speech signal to increase correspondingbit durations of call critical signaling messages.
 11. The method ofclaim 10, further comprising increasing, by the system, a gain of a codesignal that carries the call critical signaling messages and reducing again of non-call critical control signals.
 12. The method of claim 10,further comprising increasing, by the system, a first signal amplitudeand a first bit energy of a call critical signaling message of the callcritical signaling messages by transferring a second signal amplitudeand a second bit energy from a non-critical call signal.
 13. The methodof claim 1, wherein the disabling the transmission of the non-callcritical message further comprises conserving a power resource, andfurther comprising: transferring, by the system, a bit duration energyobtained from a speech signal to increase corresponding bit durations ofcall critical data signals.
 14. The method of claim 1, wherein thedisabling the transmission of the non-call critical message is during afirst period, and further comprising: reviewing, by the system, theuplink power level during a second period different from the firstperiod; and enabling, by the system, another transmission of thenon-call critical message on the uplink during the second period inresponse to the reviewing the uplink power level.
 15. The method ofclaim 1, wherein the disabling the transmission of the non-call criticalmessage is during a first period, and further comprising: reviewing, bythe system, the uplink power level during a second period different fromthe first period; and continuing to disable the transmission of thenon-call critical message on the uplink during the second period inresponse to the reviewing the uplink power level.
 16. The method ofclaim 1, wherein the disabling the transmission of the non-call criticalmessage comprises temporarily disabling the non-call critical message onthe uplink.
 17. The method of claim 1, further comprising: receiving, bythe system, the pre-specified power level as an over-the air update. 18.The method of claim 1, further comprising: monitoring, by the system,the uplink power level associated with the wireless communication by themobile device.
 19. An apparatus, comprising: a memory that storescomputer-executable instructions; and a processor, communicativelycoupled to the memory, that facilitates execution of thecomputer-executable instructions to at least: determine that uplinktransmit power levels during a wireless communication by a mobile devicesatisfy a condition with respect to maximum transmit power levels for anuplink transmission during a first period; and in response to adetermination that the uplink transmit power levels satisfy thecondition, temporarily disable transmission of a non-critical messagethat is not related to call maintenance, and continue to enabletransmission of a critical message.
 20. The apparatus of claim 19,wherein the processor further facilitates the execution of thecomputer-executable instructions to temporarily disable a sessionincluding the wireless communication in response to the determination.21. The apparatus of claim 19, wherein the processor further facilitatesthe execution of the computer-executable instructions to review theuplink transmit power levels during a second period and continue todisable the transmission of the non-critical message based on a resultof the review.
 22. The apparatus of claim 19, wherein the processorfurther facilitates the execution of the computer-executableinstructions to review the uplink transmit power levels during a secondperiod and enable the transmission of the non-critical message based ona result of the review.
 23. The apparatus of claim 19, wherein theprocessor further facilitates the execution of the computer-executableinstructions to temporarily disable a session including the wirelesscommunication.
 24. The apparatus of claim 19, wherein the non-criticalmessage that is not related to the call maintenance is a non-signalingradio bearer related message.
 25. The apparatus of claim 19, wherein thememory and the processor are included in a mobile handset.
 26. A system,comprising: a memory that stores computer-executable instructions; and aprocessor, communicatively coupled to the memory, that facilitatesexecution of the computer-executable instructions to at least: determinethat an uplink transmit power during a wireless communication by amobile device is near a maximum transmit power during a first period; inresponse to the uplink transmit power being determined to be near themaximum transmit power during the first period, selectively suspendtransmission of a first message and selectively enable transmission of asecond message, wherein the first message is a non-critical message andthe second message is a critical message; and utilize a resourceconserved by suspension of the first message.
 27. The system of claim26, wherein the first message is a non-signaling radio bearer relatedmessage, the resource is utilized for the second message, and the secondmessage is a signaling radio bearer related message.
 28. The system ofclaim 26, wherein the processor further facilitates the execution of thecomputer-executable instructions to review the uplink transmit powerduring a second period and enable the first message based on a result ofthe review.
 29. The system of claim 26, wherein the memory and theprocessor are included in a wireless communication device.