The present application relates generally to adaptive techniques for determining spare equipment allocation, e.g., adapting spare equipment allocation based on constraints or based on characteristics of locations where the equipment is in-use.
Equipment used to provide network services can fail, which can lead to downtime for the service being provided while the failed or faulty equipment is replaced. In order to limit this downtime, spare equipment is often maintained at or near locations where the equipment is in use.
Numerous aspects, embodiments, objects and advantages of the present application will be apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which like reference characters refer to like parts throughout, and in which:
Operations teams of network service providers typically manage a large inventory of solid-state equipment such as routers, multiplexers, switches, hubs, and so on. These equipment represent different technologies and handle different transmission mediums and types to provide network services. These equipment carry and route customer data, so, upon failure, customer services may be negatively affected.
For equipment that is deemed critical to providing services, operations teams may maintain an on-hand set of spare equipment that is used to rapidly restore services when in-use equipment fails. Spare inventory can be kept to prevent significant downtime. In some cases, spares can be housed in centralized supply chain centers. Naively, operations teams can maintain spare inventory for each device that is in-use, either on-site or at the central supply chain centers. Such a strategy, while potentially effective at reducing downtime, is also expensive and inefficient considering these spare equipment have costs to acquire and store. In the case of certain devices, availability might also be quite limited.
In contrast to commodity-type equipment used by network service providers, solid-state equipment has a very low failure rate that is below a threshold for conventional spare allocation schemes to be effective. Furthermore, network evolution has relegated much solid-state equipment to legacy equipment that is no longer manufactured at scale, which represents a concern for spare inventory management. Certain types of equipment have scarce availability and it can be challenging to merely find a vendor for some legacy resources. Significant downtime can result from a lack of availability of a particular device on an open market. Hence, a sparing strategy that minimizes the risk of downtime while simultaneously minimizing spend or requests for difficult-to-acquire spare devices can be a welcome advance.
Further, decentralized supply chain strategies can create opportunities for space management. Fewer items in centralized distribution centers can allow for more productive space management strategies. Together, these issues demand new solutions for optimizing spare inventory levels and storage locations so that time to repair constraints (e.g., based on service line agreements with customers, regulatory requirements, and so forth) can be met or minimized, while reducing or potentially minimizing spare inventory levels.
In mathematics literature, set cover problems and bin packing problems are well known. It has been shown that a general solution to the set cover problem or the bin packing problem requires a nondeterministic Turing machine to solve in polynomial time. Hence, a general solution that can be determined in polynomial time is deemed impossible.
In a similar way, a general solution to a spare allocation problem can be shown to require a nondeterministic Turing machine to solve in polynomial time. In fact, the sparing solutions can be framed similar to the bin packing problem, where spares are bins and a goal is to assign as many in-use equipment to that spare and to locate that spare as closely as possible to the in-use equipment. It is known that bin packing problems are similar to set cover problems. In fact, the two problem formulations are related.
In order to frame a spare allocation optimization problem in the context of a set cover problem, the following can be assumed. Given a superset of locations and a set of subsets of the superset, one aim can be to find a minimal cost set of subsets that ‘cover’ or contain all locations of the superset. In spares optimization, subsets are the locations where one element contains a spare, and the remaining subset elements depend on that spare (e.g., they are locations where the equipment is in service and depend on the spare that is reasonably proximate to sufficiently limit time to repair). In these equipment, the most significant factor in time to repair is the time required to fetch the spare. If the spare is at the location, fetch time is 0. If the spare is elsewhere, fetch time is the driving time to retrieve the equipment.
In order to frame a spare allocation optimization problem in the context of a bin packing problem, the following can be assumed. In bin packing, one can assign as many elements to as minimal a number of bins. In spares optimization, the spare equipment can be a bin and the locations that depend on that spare can be the elements to assign to a bin.
In both set cover approaches and bin packing approaches applied in the context of spare allocation optimization, it can be shown that general solutions to these problems require a nondeterministic Turing machine to solve in polynomial time. By posing the spares set cover problem as a linear programming problem, it can be shown that set cover problems are dualities of bin packing problems in optimization, and that solutions can be found within a factor of optimal. The disclosed subject matter is discussed in the context of solutions to spare equipment allocation. But it is noted that being able to solve spare allocation optimization in polynomial time with a deterministic Turing machine means that a similar approach in connection with the disclosed techniques can be used to similarly solve set cover problems and bin packing problems, which is considered by conventional literature to be impossible.
The disclosed subject matter is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the disclosed subject matter. It may be evident, however, that the disclosed subject matter may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the disclosed subject matter.
Referring now to
In response to execution of the executable instructions stored to memory 104, Device 100 can determine group of locations 110, which is illustrated by determination 108. Group of locations 110 can comprise locations where a device is operable to provide a service. In addition, group of locations 110 can comprise warehouse locations that are suitable to store the spare device. It is appreciated that the type of the device (e.g., device type 112) and a type of the spare device can be equivalent. Hence, the spare device is suitable to replace the device in the event the device fails or otherwise is to be replaced. It is appreciated that the disclosed sparing strategies can be applied independently for different equipment/devices having a different device type 112. Likewise, different device types 112 can have different characteristics that can be integral to the spare allocation strategies detailed herein such as, for example, different failure rate profiles, different replacement time values, and so forth.
As a function of device type 112, determine a replacement time 116, which is illustrated by determination 114. Replacement time 116 can be representative of a time allotted and/or allowed to replace the device with the spare device. Such can be based on contractual agreements, regulatory requirements, or internal guidelines that indicate a maximum amount of downtime for the device of the device type 112. In some embodiments, replacement time 116 can include a fetch time and/or drive time to bring the spare device to the location of the failed or faulty device to be replaced. In some embodiments, replacement time 116 can include an install time that can indicate an expected amount of time remove the device and install the spare device. Thus, e.g., subtracting the install time from replacement time 116 can yield a fetch time, which can be used to determine supply distance 120, which is illustrated by determination 118.
At determination 118, device 100 can determine supply distance 120. Supply distance 120 can be representative of a maximum distance between the device and the spare device. As noted above, such can be determined based on replacement time 116. Device 100 can further generate a graph, as illustrated by reference numeral 122. This graph can comprise a group of nodes that represent the group of locations 110 that were determined in connection with determination 108.
While still referring to
Illustration 200B depicts an example of the graph that might be generated from data associated with group of locations 110 in accordance with certain embodiments of this disclosure. Nodes 2041-204N can represent locations 2021-202N. Nodes 2041 and 2042 can be connected by an edge 206, and thus considered neighbor nodes, in response to a determination that locations 2021 and 2022 are neighbor locations, that is, separated by a physical distance that is no more than supply distance 120. In some embodiments, an edge length or weight can represent the physical distance and in that case a maximum edge length or weight can be limited by supply distance 120.
Still referring
It is appreciated that while the graph supports edges 206, the initial graph input to sparing procedure 106 might only include the group of locations 110 or might include a partial set of edges 206. All or a portion of edges 206 can be added subsequently during operation of sparing procedure 106, which may differ based on the type of sparing procedure 106 that is used, which is further detailed in connection with
With reference now to
Because supply distance 120 can directly impact the arrangement of edges 206 on the graph, spare allocation optimization (e.g., within a factor of optimal) under these constraints 302 can be significant. However, the ability to allow for and to configure these and other constraints 302 can have value to supply chain management as these constraints can reflect supply realities relating to budgeting mandates, equipment scarcity on the open market, and so on. Hence, the adaptive nature of sparing procedure 106 can adapt to real world constraints and further adapt to inherent characteristics of the group of locations 110, which is further detailed in connection with
Turning now to
By way of example, the sparing procedure types can be greedy random sparing procedure 406, greedy sparing procedure 408, or another suitable procedure. Based on the type of sparing procedure 106 that is selected, different results or solutions can be obtained (e.g., different depot node selection). Moreover, different sparing procedure types can have different advantages, or, potentially even disadvantages, that can be leveraged to select a preferred or sparing procedure 106.
To that end, in analyzing the sparing goals of a large service provider several observations can be made. For example, equipment usage in the network can vary significantly. The distribution of in-use locations can depend on the equipment type, generally due to the technology used and/or service being provided to customers. Another observation is that there are some equipment locations that are spatially isolated. That is, these ‘island’ locations are too far (e.g., greater than a defined island distance threshold) from any other utilization location to be able to benefit from sharing a common spare device. To improve the efficacy of sparing procedure 106, these island locations can be removed from consideration. Ideally, the number of island locations will be small, but in any case the handling of island locations can be determined independently. For example, the decision to keep spare equipment at those locations can be based on the maximum time to repair metrics for that equipment at that location. If the maximum time to repair is less than the time to fetch the equipment from a depot location, then the spare can be stored at the location.
Hence, the group of locations 110 can exclude any identified island locations, meaning the graph generated at reference numeral 122 will not include nodes representative of those island locations. For instance, the initial graph input to sparing procedure 106 can include nodes representative of a list of candidate locations that are capable of storing spare equipment or a specific spare device. As noted, such can be in-use locations as well as warehouse locations. A second parameter received by sparing procedure 106 can be the radius of a location to be considered as an island location (e.g., the defined island distance threshold). It is appreciated that in application of sparing procedure 106, certain distances or thresholds relied on can vary between equipment types.
In some embodiments, sparing procedure 106 can perform clustering and decomposing operations of the graph. For example, after removing island locations and combining other in-use locations with other candidate locations (e.g., warehouse locations), sparing procedure 106 can operate to determine optimal (e.g., within a factor) spare device allocation that simultaneously reduces or minimizes downtime while using a fewest number of spares to cover those locations. Depending on the cardinality of the set of remaining in-use locations, the proposed techniques can group candidate locations for optimization.
For example, consider the graph of candidate and in-use locations (e.g., generated based on group of locations 110) where edge weights represent distances. Sparing procedure 106 can generate clusters using, for example, a minimum k-cut technique or another suitable technique that appropriately cuts the graph into different clusters. In some embodiments, the k parameter of the minimum k-cut technique can be set through binary search over k by ensuring max cluster size. The max cluster size can be the upper limit of the number of locations among group of locations 110 that can be evaluated using the optimization technique.
After said clustering and decomposing techniques, the specific type of procedure or solution can be selected, e.g., selected from among a greedy random solution, a greedy solution, or another suitable solution, as illustrated at reference numeral 404. The selected solution can then be applied for determining efficient or optimal depot nodes (e.g., that indicate the associated depot location where a spare device is to be stored) within each cluster generated by the minimum k-cut technique. It is appreciated that there is an intuition that by randomly selecting locations from the uncovered set of locations, the solution will rapidly generate results.
In the case of selection of the greedy random solution, the following process can be performed. Input to sparing procedure 106 (e.g., in this case a greedy random procedure) can be an unweighted location graph representative of a union of in-use locations and approved storage candidates and excluding island locations. Output of sparing procedure 106 in this case can be a list of depot nodes. In order to generate these results, the input can be received and the following operations can be iteratively or recursively performed until all nodes are ‘covered’ by a spare, which can be programmatically implemented as a while loop or another type of loop:
(1a) Randomly select a node from among all the ‘uncovered’ nodes.
(2a) Collect selected node and immediate node neighbors that are connected to the selected node by an edge.
(3a) From among the selected node and immediate neighbors, rank nodes by connectivity (e.g., the number of edges whose nodes are uncovered).
(4a) Assign highest ranking node (e.g., having the most neighbors connected by an edge) as a depot node.
(5a) Remove selected node and neighbor nodes from the uncovered location set. (e.g., from group of locations 110).
In the case of selection of the greedy solution, the following process can be performed. Input to sparing procedure 106 (e.g., in this case a greedy procedure) can be an unweighted location graph representative of a union of in-use locations and approved storage candidates and excluding island locations. Output of sparing procedure 106 in this case can be a list of depot nodes. In order to generate these results, the input can be received and the following operations can be iteratively or recursively performed until all nodes are ‘covered’ by a spare, which can be programmatically implemented as a while loop or another type of loop:
(1b) identify boundary nodes indicative of nodes within a defined number of hops from a boundary of the graph.
(2b) Rank all boundary nodes according to connectivity (e.g., the number of connected edges).
(3b) Assign highest ranking node as a depot node.
(4b) Remove edges and covered nodes (e.g., neighbors) and their edges from graph.
It is appreciated that both example solutions can assign depot nodes based on an edge rank (e.g., number of edges connected to the subject node), for example at pseudo code process (4a) or (3b). In some cases, two or more nodes may have the same highest edge rank. In those cases, ties can be resolved in any suitable manner For example, in some embodiments ties can be resolved randomly. In other embodiments, ties can be resolved based on other metrics such as, for example, a distance from a graph boundary (e.g., nearest node to—or farthest node from—a graph boundary is the winner/loser), distance from another depot node already determined or processed (e.g., nearest node to—or farthest node from—a another depot node is the winner/loser), or another suitable technique.
As noted previously, the actual solution that identifies depot nodes and, by proxy, the associated depot locations can vary based on the type of sparing procedure 106 selected, two examples of which (e.g., a greedy random solution and a greedy solution) are detailed above. Selection of the particular type of sparing procedure 106 can be based on data 402, several examples of which are described in connection with
Referring now to
As another example, data 402 can be indicative of failure rate data 504 representative of a failure rate of devices having device type 112. Hence, the type of sparing procedure 106 can be selected based on failure rate data 504. Additionally or alternatively, data 402 can be indicative of repair time data 506 representative of a time determined to facilitate removing the device and installing the spare device having device type 112. Replacement time 116 might be used as well in addition to or in lieu of the repair time.
As still another example, data 402 can be indicative of a size 508 of supply distance 120. For instance, when supply distance 120 is determined to be below a defined threshold, a first type of sparing procedure 106 can be selected. Otherwise, a second type of sparing procedure 106 can be selected instead. Data 402 can further be indicative of constraint 302. As one example, data 510 indicating the number of spare devices of device type 112 can be used in some embodiments to select the type of sparing procedure 106. These examples are intended to be non-limiting and other suitable data can be used to select the type of sparing procedure 106 to be used to identify depot nodes.
It is noted that being able to generate optimal (e.g., within a factor of optimal) spare equipment allocation at scale of the network complexity of large service providers can allow network planners to better utilize network resources. In solid-state domains, where equipment failure rates are much lower than traditional (e.g., commodity-based) equipment stocking techniques support, the disclosed techniques can produce superior sparing plans. At such low failure rates, the risk of multiple simultaneous failures can be ignored and need not be considered. While improving resource utilization has overt cost benefits, improving network resource utilization can also improve customer experiences and satisfaction.
Turning now to
At reference numeral 604, the device can determine a replacement time representative of a time allowed to replace the device with the spare device. The replacement time can be a function of or based on the first type of the device. In some embodiments, the replacement time can be further based on contractual agreements, regulatory requirements, or the like that cap or constrain a total downtime permitted.
At reference numeral 606, the device can determine a supply distance representative of a maximum distance between the device and the spare device. The supply distance can be a function of or based on the replacement time determined at reference numeral 604. By way of example, neighbor locations can be determined when two locations are within the supply distance of one another, but otherwise are not considered neighbor locations.
At reference numeral 608, the device can generate a graph. This graph can comprise a group of nodes that represent the group of locations. The graph can be configured to provide one or more edges. An edge of the of the graph can connect two neighbor nodes, of the group of nodes, in response to a determination that neighbor locations, represented by the two neighbor nodes, are separated by no more than the supply distance. Edges can be populated during the generation of the graph or be populated separately by a sparing procedure that is detailed below.
At reference numeral 610, the device can perform the sparing procedure. The graph generated at reference numeral 608 can be used as input to the sparing procedure. The sparing procedure can select a depot node indicating a depot location from among the group of locations that is to store the spare device. Method 600 can stop or proceed to insert A, which is further detailed in connection with
With reference now to
At reference numeral 704, the device can receive an input that defines a number of spare devices of the first type to be stored at a group of depot locations, comprising the depot location, and determining, by the device, the supply distance based on the input. In this case the constraint can limit the (total) number of spare devices that are to ‘cover’ the group of locations
To provide further context for various aspects of the subject specification,
It is noted that RAN comprises base station(s), or access point(s), and its associated electronic circuitry and deployment site(s), in addition to a wireless radio link operated in accordance with the base station(s). Accordingly, macro RAN1370 can comprise various coverage cells, while femto RAN 890 can comprise multiple femto access points or multiple metro cell access points. As mentioned above, it is to be appreciated that deployment density in femto RAN 890 can be substantially higher than in macro RAN 870.
Generally, both macro and femto network platforms 810 and 880 comprise components, e.g., nodes, gateways, interfaces, servers, or platforms, that facilitate both packet-switched (PS) (e.g., internet protocol (IP), Ethernet, frame relay, asynchronous transfer mode (ATM)) and circuit-switched (CS) traffic (e.g., voice and data) and control generation for networked wireless communication. In an aspect of the subject innovation, macro network platform 810 comprises CS gateway node(s) 812 which can interface CS traffic received from legacy networks like telephony network(s) 840 (e.g., public switched telephone network (PSTN), or public land mobile network (PLMN)) or a SS7 network 860. Circuit switched gateway 812 can authorize and authenticate traffic (e.g., voice) arising from such networks. Additionally, CS gateway 812 can access mobility, or roaming, data generated through SS7 network 860; for instance, mobility data stored in a VLR, which can reside in memory 830. Moreover, CS gateway node(s) 812 interfaces CS-based traffic and signaling and gateway node(s) 818. As an example, in a 3GPP UMTS network, gateway node(s) 818 can be embodied in gateway GPRS support node(s) (GGSN).
In addition to receiving and processing CS-switched traffic and signaling, gateway node(s) 818 can authorize and authenticate PS-based data sessions with served (e.g., through macro RAN) wireless devices. Data sessions can comprise traffic exchange with networks external to the macro network platform 810, like wide area network(s) (WANs) 850; it should be appreciated that local area network(s) (LANs) can also be interfaced with macro network platform 810 through gateway node(s) 818. Gateway node(s) 818 generates packet data contexts when a data session is established. To that end, in an aspect, gateway node(s) 818 can comprise a tunnel interface (e.g., tunnel termination gateway (TTG) in 3GPP UMTS network(s); not shown) which can facilitate packetized communication with disparate wireless network(s), such as Wi-Fi networks. It should be further appreciated that the packetized communication can comprise multiple flows that can be generated through server(s) 814. It is to be noted that in 3GPP UMTS network(s), gateway node(s)1318 (e.g., GGSN) and tunnel interface (e.g., TTG) comprise a packet data gateway (PDG).
Macro network platform 810 also comprises serving node(s) 816 that convey the various packetized flows of information or data streams, received through gateway node(s) 818. As an example, in a 3GPP UMTS network, serving node(s) can be embodied in serving GPRS support node(s) (SGSN).
As indicated above, server(s) 814 in macro network platform 810 can execute numerous applications (e.g., location services, online gaming, wireless banking, wireless device management . . . ) that generate multiple disparate packetized data streams or flows, and manage (e.g., schedule, queue, format . . . ) such flows. Such application(s), for example can comprise add-on features to standard services provided by macro network platform 810. Data streams can be conveyed to gateway node(s) 818 for authorization/authentication and initiation of a data session, and to serving node(s) 816 for communication thereafter. Server(s) 814 can also effect security (e.g., implement one or more firewalls) of macro network platform 810 to ensure network's operation and data integrity in addition to authorization and authentication procedures that CS gateway node(s) 812 and gateway node(s) 818 can enact. Moreover, server(s) 814 can provision services from external network(s), e.g., WAN 850, or Global Positioning System (GPS) network(s) (not shown). It is to be noted that server(s) 814 can comprise one or more processor configured to confer at least in part the functionality of macro network platform 810. To that end, the one or more processor can execute code instructions stored in memory 830, for example.
In example wireless environment 800, memory 830 stores information related to operation of macro network platform 810. Information can comprise business data associated with subscribers; market plans and strategies, e.g., promotional campaigns, business partnerships; operational data for mobile devices served through macro network platform; service and privacy policies; end-user service logs for law enforcement; and so forth. Memory 830 can also store information from at least one of telephony network(s) 840, WAN(s) 850, or SS7 network 860, enterprise NW(s) 865, or service NW(s) 867.
Femto gateway node(s) 884 have substantially the same functionality as PS gateway node(s) 818. Additionally, femto gateway node(s) 884 can also comprise substantially all functionality of serving node(s) 816. In an aspect, femto gateway node(s) 884 facilitates handover resolution, e.g., assessment and execution. Further, control node(s) 820 can receive handover requests and relay them to a handover component (not shown) via gateway node(s) 884. According to an aspect, control node(s) 820 can support RNC capabilities.
Server(s) 882 have substantially the same functionality as described in connection with server(s) 814. In an aspect, server(s) 882 can execute multiple application(s) that provide service (e.g., voice and data) to wireless devices served through femto RAN 890. Server(s) 882 can also provide security features to femto network platform. In addition, server(s) 882 can manage (e.g., schedule, queue, format . . . ) substantially all packetized flows (e.g., IP-based) it generates in addition to data received from macro network platform 810. It is to be noted that server(s) 882 can comprise one or more processor configured to confer at least in part the functionality of macro network platform 810. To that end, the one or more processor can execute code instructions stored in memory 886, for example.
Memory 886 can comprise information relevant to operation of the various components of femto network platform 880. For example, operational information that can be stored in memory 886 can comprise, but is not limited to, subscriber information; contracted services; maintenance and service records; femto cell configuration (e.g., devices served through femto RAN 890; access control lists, or white lists); service policies and specifications; privacy policies; add-on features; and so forth.
It is noted that femto network platform 880 and macro network platform 810 can be functionally connected through one or more reference link(s) or reference interface(s). In addition, femto network platform 880 can be functionally coupled directly (not illustrated) to one or more of external network(s) 840, 850, 860, 865 or 867. Reference link(s) or interface(s) can functionally link at least one of gateway node(s) 884 or server(s) 886 to the one or more external networks 840, 850, 860, 865 or 867.
In an aspect, macro network platform 960 controls a set of base stations 910 that serve either respective cells or a number of sectors within such cells. Base station 910 comprises radio equipment 914 for operation in one or more radio technologies, and a set of antennas 912 (e.g., smart antennas, microwave antennas, satellite dish(es) . . . ) that can serve one or more sectors within a macro cell 905. It is noted that a set of radio network control node(s), which can be a part of macro network platform 960; a set of base stations (e.g., Node B 910) that serve a set of macro cells 905; electronics, circuitry or components associated with the base stations in the set of base stations; a set of respective OTA wireless links (e.g., links 915 or 916) operated in accordance to a radio technology through the base stations; and backhaul link(s) 955 and 951 form a macro radio access network (RAN). Macro network platform 960 also communicates with other base stations (not shown) that serve other cells (not shown). Backhaul link(s) 951 or 953 can comprise a wired backbone link (e.g., optical fiber backbone, twisted-pair line, T1/E1 phone line, a digital subscriber line (DSL) either synchronous or asynchronous, an asymmetric ADSL, or a coaxial cable . . . ) or a wireless (e.g., LoS or non-LoS) backbone link. Backhaul pipe(s) 955 link disparate base stations 910. According to an aspect, backhaul link 953 can connect multiple femto access points 930 and/or controller components (CC) 901 to the femto network platform 902. In one example, multiple femto APs can be connected to a routing platform (RP) 987, which in turn can be connect to a controller component (CC) 901. Typically, the information from UEs 920A can be routed by the RP 987, for example, internally, to another UE 920A connected to a disparate femto AP connected to the RP 987, or, externally, to the femto network platform 902 via the CC 901, as discussed in detail supra.
In wireless environment 905, within one or more macro cell(s) 905, a set of femtocells 945 served by respective femto access points (APs) 930 can be deployed. It can be appreciated that, aspects of the subject innovation can be geared to femtocell deployments with substantive femto AP density, e.g., 94-107 femto APs 930 per base station 910. According to an aspect, a set of femto access points 9301-930N, with N a natural number, can be functionally connected to a routing platform 987, which can be functionally coupled to a controller component 901. The controller component 901 can be operationally linked to the femto network platform 902 by employing backhaul link(s) 953. Accordingly, UE 920A connected to femto APs 9301-930N can communicate internally within the femto enterprise via the routing platform (RP) 987 and/or can also communicate with the femto network platform 902 via the RP 987, controller component 901 and the backhaul link(s) 953. It can be appreciated that although only one femto enterprise is depicted in
It is noted that while various aspects, features, or advantages described herein have been illustrated through femto access point(s) and associated femto coverage, such aspects and features also can be exploited for home access point(s) (HAPs) that provide wireless coverage through substantially any, or any, disparate telecommunication technologies, such as for example Wi-Fi (wireless fidelity) or picocell telecommunication. Additionally, aspects, features, or advantages of the subject innovation can be exploited in substantially any wireless telecommunication, or radio, technology; for example, Wi-Fi, Worldwide Interoperability for Microwave Access (WiMAX), Enhanced General Packet Radio Service (Enhanced GPRS), 3GPP LTE, 3GPP2 UMB, 3GPP UMTS, HSPA, HSDPA, HSUPA, or LTE Advanced. Moreover, substantially all aspects of the subject innovation can comprise legacy telecommunication technologies.
With respect to
Referring now to
Generally, program modules include routines, programs, components, data structures, etc., that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the various methods can be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, minicomputers, mainframe computers, Internet of Things (IoT) devices, distributed computing systems, as well as personal computers, hand-held computing devices, microprocessor-based or programmable consumer electronics, and the like, each of which can be operatively coupled to one or more associated devices.
The illustrated embodiments of the embodiments herein can be also practiced in distributed computing environments where certain tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules can be located in both local and remote memory storage devices.
Computing devices typically include a variety of media, which can include computer-readable storage media, machine-readable storage media, and/or communications media, which two terms are used herein differently from one another as follows. Computer-readable storage media or machine-readable storage media can be any available storage media that can be accessed by the computer and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer-readable storage media or machine-readable storage media can be implemented in connection with any method or technology for storage of information such as computer-readable or machine-readable instructions, program modules, structured data or unstructured data.
Computer-readable storage media can include, but are not limited to, random access memory (RAM), read only memory (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD), Blu-ray disc (BD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, solid state drives or other solid state storage devices, or other tangible and/or non-transitory media which can be used to store desired information. In this regard, the terms “tangible” or “non-transitory” herein as applied to storage, memory or computer-readable media, are to be understood to exclude only propagating transitory signals per se as modifiers and do not relinquish rights to all standard storage, memory or computer-readable media that are not only propagating transitory signals per se.
Computer-readable storage media can be accessed by one or more local or remote computing devices, e.g., via access requests, queries or other data retrieval protocols, for a variety of operations with respect to the information stored by the medium.
Communications media typically embody computer-readable instructions, data structures, program modules or other structured or unstructured data in a data signal such as a modulated data signal, e.g., a carrier wave or other transport mechanism, and includes any information delivery or transport media. The term “modulated data signal” or signals refers to a signal that has one or more of its characteristics set or changed in such a manner as to encode information in one or more signals. By way of example, and not limitation, communication media include wired media, such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media.
With reference again to
The system bus 1008 can be any of several types of bus structure that can further interconnect to a memory bus (with or without a memory controller), a peripheral bus, and a local bus using any of a variety of commercially available bus architectures. The system memory 1006 includes ROM 1010 and RAM 1012. A basic input/output system (BIOS) can be stored in a non-volatile memory such as ROM, erasable programmable read only memory (EPROM), EEPROM, which BIOS contains the basic routines that help to transfer information between elements within the computer 1002, such as during startup. The RAM 1012 can also include a high-speed RAM such as static RAM for caching data.
The computer 1002 further includes an internal hard disk drive (HDD) 1014 (e.g., EIDE, SATA), one or more external storage devices 1016 (e.g., a magnetic floppy disk drive (FDD) 1016, a memory stick or flash drive reader, a memory card reader, etc.) and an optical disk drive 1020 (e.g., which can read or write from a CD-ROM disc, a DVD, a BD, etc.). While the internal HDD 1014 is illustrated as located within the computer 1002, the internal HDD 1014 can also be configured for external use in a suitable chassis (not shown). Additionally, while not shown in environment 1000, a solid state drive (SSD) could be used in addition to, or in place of, an HDD 1014. The HDD 1014, external storage device(s) 1016 and optical disk drive 1020 can be connected to the system bus 1008 by an HDD interface 1024, an external storage interface 1026 and an optical drive interface 1028, respectively. The interface 1024 for external drive implementations can include at least one or both of Universal Serial Bus (USB) and Institute of Electrical and Electronics Engineers (IEEE) 1094 interface technologies. Other external drive connection technologies are within contemplation of the embodiments described herein.
The drives and their associated computer-readable storage media provide nonvolatile storage of data, data structures, computer-executable instructions, and so forth. For the computer 1002, the drives and storage media accommodate the storage of any data in a suitable digital format. Although the description of computer-readable storage media above refers to respective types of storage devices, it should be appreciated by those skilled in the art that other types of storage media which are readable by a computer, whether presently existing or developed in the future, could also be used in the example operating environment, and further, that any such storage media can contain computer-executable instructions for performing the methods described herein.
A number of program modules can be stored in the drives and RAM 1012, including an operating system 1030, one or more application programs 1032, other program modules 1034 and program data 1036. All or portions of the operating system, applications, modules, and/or data can also be cached in the RAM 1012. The systems and methods described herein can be implemented utilizing various commercially available operating systems or combinations of operating systems.
Computer 1002 can optionally comprise emulation technologies. For example, a hypervisor (not shown) or other intermediary can emulate a hardware environment for operating system 1030, and the emulated hardware can optionally be different from the hardware illustrated in
Further, computer 1002 can be enable with a security module, such as a trusted processing module (TPM). For instance, with a TPM, boot components hash next in time boot components, and wait for a match of results to secured values, before loading a next boot component. This process can take place at any layer in the code execution stack of computer 1002, e.g., applied at the application execution level or at the operating system (OS) kernel level, thereby enabling security at any level of code execution.
A user can enter commands and information into the computer 1002 through one or more wired/wireless input devices, e.g., a keyboard 1038, a touch screen 1040, and a pointing device, such as a mouse 1042. Other input devices (not shown) can include a microphone, an infrared (IR) remote control, a radio frequency (RF) remote control, or other remote control, a joystick, a virtual reality controller and/or virtual reality headset, a game pad, a stylus pen, an image input device, e.g., camera(s), a gesture sensor input device, a vision movement sensor input device, an emotion or facial detection device, a biometric input device, e.g., fingerprint or iris scanner, or the like. These and other input devices are often connected to the processing unit 1004 through an input device interface 1044 that can be coupled to the system bus 1008, but can be connected by other interfaces, such as a parallel port, an IEEE 1394 serial port, a game port, a USB port, an IR interface, a BLUETOOTH® interface, etc.
A monitor 1046 or other type of display device can be also connected to the system bus 1008 via an interface, such as a video adapter 1048. In addition to the monitor 1046, a computer typically includes other peripheral output devices (not shown), such as speakers, printers, etc.
The computer 1002 can operate in a networked environment using logical connections via wired and/or wireless communications to one or more remote computers, such as a remote computer(s) 1050. The remote computer(s) 1050 can be a workstation, a server computer, a router, a personal computer, portable computer, microprocessor-based entertainment appliance, a peer device or other common network node, and typically includes many or all of the elements described relative to the computer 1002, although, for purposes of brevity, only a memory/storage device 1052 is illustrated. The logical connections depicted include wired/wireless connectivity to a local area network (LAN) 1054 and/or larger networks, e.g., a wide area network (WAN) 1056. Such LAN and WAN networking environments are commonplace in offices and companies, and facilitate enterprise-wide computer networks, such as intranets, all of which can connect to a global communications network, e.g., the Internet.
When used in a LAN networking environment, the computer 1002 can be connected to the local network 1054 through a wired and/or wireless communication network interface or adapter 1058. The adapter 1058 can facilitate wired or wireless communication to the LAN 1054, which can also include a wireless access point (AP) disposed thereon for communicating with the adapter 1058 in a wireless mode.
When used in a WAN networking environment, the computer 1002 can include a modem 1060 or can be connected to a communications server on the WAN 1056 via other means for establishing communications over the WAN 1056, such as by way of the Internet. The modem 1060, which can be internal or external and a wired or wireless device, can be connected to the system bus 1008 via the input device interface 1044. In a networked environment, program modules depicted relative to the computer 1002 or portions thereof, can be stored in the remote memory/storage device 1052. It will be appreciated that the network connections shown are example and other means of establishing a communications link between the computers can be used.
The computer 1002 is operable to communicate with any wireless devices or entities operatively disposed in wireless communication, e.g., a printer, scanner, desktop and/or portable computer, portable data assistant, communications satellite, any piece of equipment or location associated with a wirelessly detectable tag (e.g., a kiosk, news stand, restroom), and telephone. This comprises at least Wi-Fi and Bluetooth™ wireless technologies. Thus, the communication can be a predefined structure as with a conventional network or simply an ad hoc communication between at least two devices.
Wi-Fi, or Wireless Fidelity, allows connection to the Internet from a couch at home, a bed in a hotel room, or a conference room at work, without wires. Wi-Fi is a wireless technology similar to that used in a cell phone that enables such devices, e.g., computers, to send and receive data indoors and out; anywhere within the range of a base station. Wi-Fi networks use radio technologies called IEEE 802.11 (a, b, g, n, etc.) to provide secure, reliable, fast wireless connectivity. A Wi-Fi network can be used to connect computers to each other, to the Internet, and to wired networks (which use IEEE802.3 or Ethernet). Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps (802.11b) or 54 Mbps (802.11a) data rate, for example, or with products that contain both bands (dual band), so the networks can provide real-world performance similar to the basic “10BaseT” wired Ethernet networks used in many offices.
What has been described above comprises examples of the various embodiments. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the embodiments, but one of ordinary skill in the art may recognize that many further combinations and permutations are possible. Accordingly, the detailed description is intended to embrace all such alterations, modifications, and variations that fall within the spirit and scope of the appended claims.
As used in this application, the terms “system,” “component,” “interface,” and the like are generally intended to refer to a computer-related entity or an entity related to an operational machine with one or more specific functionalities. The entities disclosed herein can be either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. These components also can execute from various computer readable storage media having various data structures stored thereon. The components may communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal). As another example, a component can be an apparatus with specific functionality provided by mechanical parts operated by electric or electronic circuitry that is operated by software or firmware application(s) executed by a processor, wherein the processor can be internal or external to the apparatus and executes at least a part of the software or firmware application. As yet another example, a component can be an apparatus that provides specific functionality through electronic components without mechanical parts, the electronic components can comprise a processor therein to execute software or firmware that confers at least in part the functionality of the electronic components. An interface can comprise input/output (I/O) components as well as associated processor, application, and/or API components.
Furthermore, the disclosed subject matter may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer to implement the disclosed subject matter. The term “article of manufacture” as used herein is intended to encompass a computer program accessible from by a computing device.
As it employed in the subject specification, the term “processor” can refer to substantially any computing processing unit or device comprising, but not limited to comprising, single-core processors; single-processors with software multithread execution capability; multi-core processors; multi-core processors with software multithread execution capability; multi-core processors with hardware multithread technology; parallel platforms; and parallel platforms with distributed shared memory. Additionally, a processor can refer to an integrated circuit, an application specific integrated circuit (ASIC), a digital signal processor (DSP), a field programmable gate array (FPGA), a programmable logic controller (PLC), a complex programmable logic device (CPLD), a discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. Processors can exploit nano-scale architectures such as, but not limited to, molecular and quantum-dot based transistors, switches and gates, in order to optimize space usage or enhance performance of user equipment. A processor also can be implemented as a combination of computing processing units.
In the subject specification, terms such as “store,” “data store,” “data storage,” “database,” “repository,” “queue”, and substantially any other information storage component relevant to operation and functionality of a component, refer to “memory components,” or entities embodied in a “memory” or components comprising the memory. It will be appreciated that the memory components described herein can be either volatile memory or nonvolatile memory, or can comprise both volatile and nonvolatile memory. In addition, memory components or memory elements can be removable or stationary. Moreover, memory can be internal or external to a device or component, or removable or stationary. Memory can comprise various types of media that are readable by a computer, such as hard-disc drives, zip drives, magnetic cassettes, flash memory cards or other types of memory cards, cartridges, or the like.
By way of illustration, and not limitation, nonvolatile memory can comprise read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory can comprise random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). Additionally, the disclosed memory components of systems or methods herein are intended to comprise, without being limited to comprising, these and any other suitable types of memory.
In particular and in regard to the various functions performed by the above described components, devices, circuits, systems and the like, the terms (including a reference to a “means”) used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., a functional equivalent), even though not structurally equivalent to the disclosed structure, which performs the function in the herein illustrated exemplary aspects of the embodiments. In this regard, it will also be recognized that the embodiments comprise a system as well as a computer-readable medium having computer-executable instructions for performing the acts and/or events of the various methods.
Computing devices typically comprise a variety of media, which can comprise computer-readable storage media and/or communications media, which two terms are used herein differently from one another as follows. Computer-readable storage media can be any available storage media that can be accessed by the computer and comprises both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer-readable storage media can be implemented in connection with any method or technology for storage of information such as computer-readable instructions, program modules, structured data, or unstructured data. Computer-readable storage media can comprise, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or other tangible and/or non-transitory media which can be used to store desired information. Computer-readable storage media can be accessed by one or more local or remote computing devices, e.g., via access requests, queries or other data retrieval protocols, for a variety of operations with respect to the information stored by the medium.
On the other hand, communications media typically embody computer-readable instructions, data structures, program modules or other structured or unstructured data in a data signal such as a modulated data signal, e.g., a carrier wave or other transport mechanism, and comprises any information delivery or transport media. The term “modulated data signal” or signals refers to a signal that has one or more of its characteristics set or changed in such a manner as to encode information in one or more signals. By way of example, and not limitation, communications media comprise wired media, such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media
Further, terms like “user equipment,” “user device,” “mobile device,” “mobile,” station,” “access terminal,” “terminal,” “handset,” and similar terminology, generally refer to a wireless device utilized by a subscriber or user of a wireless communication network or service to receive or convey data, control, voice, video, sound, gaming, or substantially any data-stream or signaling-stream. The foregoing terms are utilized interchangeably in the subject specification and related drawings. Likewise, the terms “access point,” “node B,” “base station,” “evolved Node B,” “cell,” “cell site,” and the like, can be utilized interchangeably in the subject application, and refer to a wireless network component or appliance that serves and receives data, control, voice, video, sound, gaming, or substantially any data-stream or signaling-stream from a set of subscriber stations. Data and signaling streams can be packetized or frame-based flows. It is noted that in the subject specification and drawings, context or explicit distinction provides differentiation with respect to access points or base stations that serve and receive data from a mobile device in an outdoor environment, and access points or base stations that operate in a confined, primarily indoor environment overlaid in an outdoor coverage area. Data and signaling streams can be packetized or frame-based flows.
Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,” and the like are employed interchangeably throughout the subject specification, unless context warrants particular distinction(s) among the terms. It should be appreciated that such terms can refer to human entities, associated devices, or automated components supported through artificial intelligence (e.g., a capacity to make inference based on complex mathematical formalisms) which can provide simulated vision, sound recognition and so forth. In addition, the terms “wireless network” and “network” are used interchangeable in the subject application, when context wherein the term is utilized warrants distinction for clarity purposes such distinction is made explicit.
Moreover, the word “exemplary” is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs. Rather, use of the word exemplary is intended to present concepts in a concrete fashion. As used in this application, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or”. That is, unless specified otherwise, or clear from context, “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, if X employs A; X employs B; or X employs both A and B, then “X employs A or B” is satisfied under any of the foregoing instances. In addition, the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from context to be directed to a singular form.
In addition, while a particular feature may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Furthermore, to the extent that the terms “includes” and “including” and variants thereof are used in either the detailed description or the claims, these terms are intended to be inclusive in a manner similar to the term “comprising.”