Method and system for providing tiered access to communication network resources
First Claim
1. A communication method, comprising:
- monitoring network resource usage via a processor of a first eNodeB coupled to a plurality of mobile devices;
dynamically determining, via the processor the first eNodeB, a plurality of threshold values based on the monitored network resource usage, the dynamically determined plurality of threshold values including at least a first threshold and a second threshold;
performing, via the processor of the first eNodeB, internal tiered priority access (ITPA) operations to group the coupled mobile devices into tiers, each tier being associated with a priority;
handing off one or more coupled mobile devices to a second eNodeB in response to determining, via the processor of the first eNodeB, that the usage of the monitored network resources exceeds both the first threshold and the second threshold of the dynamically determined plurality of threshold values; and
restricting originations of new sessions from coupled mobile devices that are grouped into a low priority tier, and restricting handins of additional mobile devices to the first eNodeB, in response to determining that the monitored network resource usage exceeds the first threshold of the dynamically determined plurality of threshold values.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems automatically allocate cellular communication network resources to emergency response personnel during emergency situations which are detected by call volumes exceeding a predetermined maximum. Access to cellular communication network resources is provided by dedicating a portion of communication radio resources to emergency response personnel use. By reserving radio resources for emergency communication purposes, emergency personnel are able to both initiate and receive calls or data sessions from both other mobile devices as well as conventional landline telephone stations. Qualified emergency response personnel can preregistered their phones and be assigned personal identification numbers to enable access to allocated network resources. Users can also be registered “on the fly.”
21 Citations
18 Claims
-
1. A communication method, comprising:
-
monitoring network resource usage via a processor of a first eNodeB coupled to a plurality of mobile devices; dynamically determining, via the processor the first eNodeB, a plurality of threshold values based on the monitored network resource usage, the dynamically determined plurality of threshold values including at least a first threshold and a second threshold; performing, via the processor of the first eNodeB, internal tiered priority access (ITPA) operations to group the coupled mobile devices into tiers, each tier being associated with a priority; handing off one or more coupled mobile devices to a second eNodeB in response to determining, via the processor of the first eNodeB, that the usage of the monitored network resources exceeds both the first threshold and the second threshold of the dynamically determined plurality of threshold values; and restricting originations of new sessions from coupled mobile devices that are grouped into a low priority tier, and restricting handins of additional mobile devices to the first eNodeB, in response to determining that the monitored network resource usage exceeds the first threshold of the dynamically determined plurality of threshold values. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An eNodeB server, comprising:
-
a server memory; and a server processor coupled to the server memory, wherein the server processor is configured with processor-executable instructions to perform operations comprising; establishing communication links with a telecommunication network; establishing wireless communication links with a plurality of mobile devices; monitoring network resource usage; dynamically determining a plurality of threshold values based on the monitored network resource usage, the dynamically determined plurality of threshold values including at least a first threshold and a second threshold; performing internal tiered priority access (ITPA) operations to group the mobile devices into one of a plurality of tiers, each tier being associated with a priority; handing off one or more coupled mobile devices to a second eNodeB in response to determining that the usage of the monitored network resources exceeds both the first threshold and the second threshold of the dynamically determined plurality of threshold values; and restricting originations of new sessions from a subset of the plurality of mobile devices that are grouped into a low priority tier, and restricting handins of additional mobile devices, in response to determining that the monitored network resource usage exceeds the first threshold of the dynamically determined plurality of threshold values. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable storage medium having stored thereon processor-executable software instructions configured to cause a processor to perform operations for relaying communications between a plurality of mobile devices and a telecommunication network, the operations comprising:
-
establishing communication links with the telecommunication network; establishing wireless communication links with the plurality of mobile devices; monitoring network resource usage; dynamically determining a plurality of threshold values based on the monitored network resource usage, the dynamically determined plurality of threshold values including at least a first threshold and a second threshold; performing internal tiered priority access (ITPA) operations to group each of mobile devices into one of a plurality of tiers, each tier being associated with a priority; handing off one or more coupled mobile devices to a second eNodeB in response to determining that the usage of the monitored network resources exceeds both the first threshold and the second threshold of the dynamically determined plurality of threshold values; and restricting originations of new sessions from a subset of the plurality of mobile devices that are grouped into a low priority tier, and restricting handins of additional mobile devices, in response to determining that the monitored network resource usage exceeds the first threshold of the dynamically determined plurality of threshold values. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification