WO2015168394A1 - Optimizing capacity expansion in a mobile network - Google Patents

Optimizing capacity expansion in a mobile network Download PDF

Info

Publication number
WO2015168394A1
WO2015168394A1 PCT/US2015/028496 US2015028496W WO2015168394A1 WO 2015168394 A1 WO2015168394 A1 WO 2015168394A1 US 2015028496 W US2015028496 W US 2015028496W WO 2015168394 A1 WO2015168394 A1 WO 2015168394A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
mobile
usage
mobile network
network
Prior art date
Application number
PCT/US2015/028496
Other languages
French (fr)
Inventor
Philip To
Original Assignee
Affirmed Networks, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Affirmed Networks, Inc. filed Critical Affirmed Networks, Inc.
Priority to KR1020167032960A priority Critical patent/KR102178142B1/en
Priority to ES15785224T priority patent/ES2760875T3/en
Priority to JP2016565048A priority patent/JP2017522749A/en
Priority to CN201580036285.7A priority patent/CN106688257B/en
Priority to EP15785224.5A priority patent/EP3138307B1/en
Publication of WO2015168394A1 publication Critical patent/WO2015168394A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/08Load balancing or load distribution
    • H04W28/09Management thereof
    • H04W28/0958Management thereof based on metrics or performance parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/18Communication route or path selection, e.g. power-based or shortest path routing based on predicted events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/17Selecting a data network PoA [Point of Attachment]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/52Allocation or scheduling criteria for wireless resources based on load
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/53Allocation or scheduling criteria for wireless resources based on regulatory allocation policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Definitions

  • Embodiments of the present invention generally relate to computerized methods and apparatus for optimizing capacity expansion in a mobile network.
  • a computing device receives a user identification and a user attribute, the user identification corresponding to a characteristic of the mobile network user, the user attribute corresponding to at least one characteristic of mobile network usage by the mobile network user.
  • the computing device generates a usage prediction based on the user identification and the user attribute, the usage prediction including information corresponding to anticipated future data usage of the mobile network user, the anticipated future mobile network usage corresponding to at least one mobile resource.
  • the computing device transmits the usage prediction to a serving gateway (SGW) such that the SGW routes the mobile network user to one of a legacy packet data network gateway (PGW) and a network function virtualization (NFV) PGW based on the usage prediction, the legacy PGW including a fixed capacity for the at least one mobile resource and the NFV PGW including a configurable capacity for the at least one mobile resource.
  • SGW serving gateway
  • PGW packet data network gateway
  • NFV network function virtualization
  • the at least one characteristic of the mobile network usage of the mobile network user includes amount of prior mobile network usage, a time correlating to the mobile network usage, location of a mobile device corresponding to the mobile user, amount of time spent roaming by the mobile device, make and model of the mobile device, application installed on the mobile device, operating system and firmware version of the mobile device, subscription plan, remaining quota, and demographics information.
  • the at least one characteristic of the mobile network user includes a mobile device ID or a phone number.
  • receiving the user attribute further comprises receiving the user attribute from at least one of a Home Subscriber Server (HSS), Mobility Management Entity (MME), a billing system, and a System Architecture Evolution (SAE) gateway.
  • the mobile resource comprises at least one of signaling activities, throughput, session occupancy, encryption, and transcoding.
  • FIG. 1 is a diagram showing demands a mobile network user incurs on a mobile network, according to some embodiments of the present disclosure.
  • FIG. 2 is a diagram illustrating a traditional method of expansion using legacy equipment.
  • FIG. 3 is a diagram illustrating method of expansion using legacy equipment and NFV-based equipment, according to some embodiments of the present disclosure.
  • FIG. 4 is a system diagram illustrating a user in connection with a mobile network, according to some embodiments of the present disclosure.
  • FIG. 5 is a diagram illustrating a usage prediction engine, according to some embodiments of the present disclosure.
  • FIG. 6 is a system diagram of a mobile network, according to some embodiments of the present disclosure.
  • FIG. 7 is a system diagram illustrating capacity optimization in a mobile network, according to some embodiments of the present invention.
  • a mobile network can include mobile users with vastly different usage
  • Some mobile users are data heavy and consume large quantities of data, driving up the total amount of data throughput that the network needs to support.
  • Other users can be very signaling heavy and make a lot of connections (e.g., using "chatty" mobile applications which send updates frequently) but transfer only small amount of data. Even though they use only a small amount of data, they drive up the amount of signaling processing required by the network.
  • Yet some other users might be relatively idle in both data throughput and signaling dimensions (e.g., networked power meter readers), but there are many of them and just signing them onto the network takes up a lot of session capacity.
  • a network operator needs to deploy enough networking equipment to cover the worst case of all these dimensions (e.g., throughput, signaling activities, session capacity, and maybe other dimensions).
  • legacy networking equipment is designed with a fixed capacity ratio (supporting X number of users, Y amount of signaling and Z amount of data throughput), covering the worst case of one dimension will lead to under-utilization of the others.
  • a legacy platform deployed in the network may be hitting 100% of the session capacity but utilizing only 20% of the throughput capacity.
  • new equipment needs to be installed to increase the number users supported. This drives up both capital and operational costs.
  • a user base is segregated into separate applications. For example, regular consumers are separated from machine-to-machine devices. Devices can be categorized such that the devices have similar demands. Devices with similar demands can be assigned to equipment with different performance characteristics, which often comes from a different manufacturer. Even with this approach, the problem of optimizing capacity is not solved because of at least the following: (1) the broad categorization of users does not guarantee that users within a group have similar usage demands.
  • the equipment serving a category of users can still be underutilized in some dimensions; (2) capital and operational expenditures will increase since the operators now need to potentially deal with equipment from multiple vendors, which may or may not interoperate well; (3) when the demands from different group of users change over time, the operator would need to repartition the users and reallocate the network resources which can be time consuming and costly.
  • Preferred embodiments of the present disclosure include using Network Function Virtualization (NFV) on platforms with different capability and cost characteristics to handle demands introduced by different types of users. Configured differently (both in terms of hardware and software), different NFV based platforms can have different strengths and weaknesses. For example, one NFV based platform can be designed so that it can house a lot of users (e.g., by using servers with a lot of memory), but with limited throughput and signaling capability. Another NFV based platform can be designed so that it can process a lot of throughput (e.g., by using specialized network adaptor cards). Yet another NFV based platform can be designed so that it can handle a lot of signaling (e.g., with a high power CPU).
  • NFV Network Function Virtualization
  • NFV based platforms with different characteristics can be put together in a network to meet the different demands introduced by different types of users.
  • users of different characteristics are directed to the servers with matching strength so that each server is best utilized.
  • the strength of the legacy and NFV based platforms complement the weaknesses of one another. Network equipment can therefore be better utilized, leading to a lower overall capital and operational cost.
  • Preferred embodiments of the present disclosure include a function to classify and direct mobile users or subscribers to different network equipment based on past and predicted future usage characteristics to match the capacity characteristics of the network equipment.
  • the users do not need to be segregated into different groups (e.g., separating users into different Access Point Names or APN's.)
  • APN's Access Point Names
  • the network can appear seamless to end users and therefore there is little change in the user experience.
  • Operators can make use of NFV to deploy platforms with different cost and performance characteristics. NFV is suitable for such applications since it allows the same network function to run on different hardware platforms. These hardware platforms range from highly sophisticated blade server chassis to low cost server boxes, which provide different performance and capacity.
  • additional capability can be obtained by building a server with specialized hardware, such as a chip for hardware encryption, to support certain groups of users.
  • Preferred embodiments of the present disclosure can be used as a green field solution (e.g., a new network made up of only NFV based platforms), or to supplement an existing legacy network which is running out of capacity.
  • NFV servers can be designed to specifically relieve the bottlenecks of the legacy equipment and make the utilization of all performance dimensions more balanced.
  • techniques are described to determine the choke point of the existing legacy platforms, to build NFV based platforms to relieve these choke points, to predict and identify the usage characteristics of the users, and to direct them to the NFV based platforms which can best handle the demands.
  • Preferred embodiments of the present disclosure make use of network function virtualization based platforms with different capabilities and cost characteristics to complement existing legacy equipment which has fixed capacity ratios.
  • the legacy and NFV based platforms can work seamlessly as a single network.
  • the NFV based platforms are designed to complement the weakness of the legacy platform so that when they work together, it reduces the chance of overloading a certain capacity dimension and overall all the network nodes will be better utilized.
  • the usage characteristics of the user are predicted based on a number of factors including his past usage pattern. The user is then directed to the network nodes which can best handle the user's demands.
  • FIG. 1 is a diagram showing demands a mobile network user incurs on a mobile network, according to some embodiments of the present disclosure.
  • FIG. 1 shows a mobile device 101, signaling activities 102, throughput 103, session occupancy 104 and other dimensions 105.
  • a mobile network user 101 incurs demands on the mobile network on a number of different dimensions.
  • the user generates signaling activities 102 when registering to and deregistering from the network, when roaming around the network, etc.
  • the user puts demands on the throughput dimension 103 when he or she is browsing web pages or sending status updates.
  • the user also occupies one or more session spaces 104 when he or she is attached to the network.
  • there are demands on other dimensions 105 for example if the user requires encryption or image/video transcoding services. Not all users behave the same way.
  • a data heavy user consumes a lot of data and drives up the demand on the throughput dimension.
  • legacy network equipment is designed to support a fixed capacity ratio (supporting X number of users, Y amount of signaling and Z amount of data throughput), covering the worst case of one dimension often leads to under-utilization of the others. For example, a network node may be hitting 100% of the session capacity but utilizing only 50% of the throughput. Even though there is still excess throughput capacity, new legacy equipment is installed to increase the number of users supported. Installing new legacy equipment can drive up both capital and operational costs.
  • FIG. 2 is a diagram illustrating a traditional method of expansion using legacy equipment.
  • FIG. 2 shows a network operator reaching maximum session capacity with a first legacy platform 201, capacity of a first legacy platform 202 after a 2x expansion 210, and capacity of a second legacy platform 203 after a 2x expansion 210.
  • a network operator reaches maximum capacity in a first legacy platform.
  • the first legacy platform has a maximum throughput of 100 units and a maximum of 100 sessions. 50 of the 100 units of throughput are used, while 100 of the 100 sessions are used.
  • the network operator anticipates a doubling of demand (e.g., 100 units of throughput and 200 sessions)
  • the network operator has to find a way to increase capacity.
  • the network operator installs a second legacy platform.
  • an operator can determine the capacity usage of a platform by monitoring peak usage levels of a device (e.g., monitoring usage during busy hours).
  • a platform can specify the maximum value for each dimension (e.g., 10 million sessions, 50 Gbps of throughput at a CPU limit such as 80%). For example, to determine an amount of session usage, an operator can use a statistic counter to see how many sessions are used during a busy hour. As another example, an operator can determine an amount of throughput by measuring the throughput at a specific CPU limit during a busy hour. An operator can determine capacity by measuring an amount of CPU usage during. In both the first legacy platform 202 and the second legacy platform 203, 50 of the 100 units of throughput are used, while 100 of the 100 sessions are used. After the expansion, both legacy platforms are still bottlenecked by the session dimension. The capacity ratio in the expanded legacy platform (e.g., equal capacity for session and throughput) does not match the demand by the users (e.g., lots of sessions but not as much throughput).
  • the preferred embodiment of the present invention calls for understanding the cause for the bottleneck of existing legacy platforms, the present and future usage pattern of the users, and building NFV based platforms to complement the legacy platforms so that all capacity dimensions can be better utilized.
  • FIG. 3 is a diagram illustrating method of expansion using legacy equipment and NFV-based equipment, according to some embodiments of the present disclosure.
  • FIG. 3 shows a network operator reaching a maximum session capacity with a first legacy platform 201, capacity of a first legacy platform 302 after a 2x expansion 310, and capacity of a second NFV-based platform 303 after a 2x expansion 310. While FIG. 3 illustrates expansion in two dimensions (e.g., session and throughput), a similar technique can be applied to any number of dimensions.
  • an operator has reached capacity in a first legacy platform with 50 of 100 units of throughput used and 100 of 100 sessions used 201.
  • the network operator anticipates a doubling of demand (e.g., 100 units of throughput and 200 sessions)
  • the network operator doubles the capacity 210 by installing an NFV-based platform 303.
  • the combination of the first legacy platform 302 and the NFV- based platform 303 takes into consideration the present and future usage patterns of the users. For example, if 20% of the users are using 80% of the throughput, it means that out of the 100 users:
  • An NFV -based platform can be built to support 200 users but only support 40 units of throughput, mostly likely at a fraction of the cost compared to the legacy platform. This can be done due to the flexible nature of NFV solutions - a platform can be built with a lot of memory to support more sessions, but only moderately powerful CPU for throughput processing to reduce cost.
  • the 160 light users can be directed to the NFV based platform 303 while the heavy users can be directed to the legacy platform 302. If the legacy platform costs $1M and the NFV platform costs $0.2M, then the cost for doubling the capacity would be:
  • NFV-based platforms can save $0.8M or 40% of the cost of using only legacy platforms.
  • the legacy platform has high throughput capacity but not enough session capacity.
  • the NFV based platform complements the legacy platform by offering high session capacity but offering low throughput capacity to keep cost down.
  • Using an NFV-based platform allows an operator to analyze demands from different users, build NFV-based platforms with capabilities which complement the legacy platforms, and direct the users appropriately to the different platforms to make best use of the capacity on all the platforms.
  • the systems and methods described herein direct and classify users based on past and predicted demands. Predicting user capacity demands can help to balance capacity usage on both the legacy platform and the NFV based platforms.
  • FIG. 4 is a system diagram illustrating a user in connection with a mobile network, according to some embodiments of the present disclosure.
  • FIG. 4 shows mobile network user 401, classifier 402, usage prediction engine 403, legacy network platform, NFV-based platform 405 and mobile network 406.
  • Mobile network user 401 can include mobile network subscribers who access the mobile network 406 via one or more mobile network devices (e.g., smartphones, laptops, tablets).
  • mobile network 406 comprises a plurality of network devices.
  • network device in mobile network 406 can route and analyze user traffic.
  • a classifier 402 consults usage prediction engine 403 to predict a resource usage pattern.
  • Classifier 402 is a component which takes information from the user and his/her equipment (e.g., the Mobile equipment identifier), consults the usage prediction engine 403 and makes decision on which platform to put the user on in the mobile network 406.
  • Classifier 402 can be implemented as a separate component, or as part of a certain network device (e.g., on the load balancer) in the mobile network.
  • Usage prediction engine 403, which is described in more detail below, is a component that takes user identification and other attributes related to the user, and predicts the future network resource usage of the user.
  • classifier Based on a result from usage prediction engine 403, user 401 is directed to be serviced by legacy network platform 404 or a NFV based platform 405. As described above, classifier also receives an input from both the legacy and the NFV based platforms corresponding to their available capacity level, and their capabilities (e.g., encryption, video transcoding).
  • a user can be directed to either a legacy platform or an NFV-based platform based on characteristics of either the user or the platform. For example, a user can be directed when the user joins a network (e.g., when the user powers up the phone in the morning).
  • existing users can also be actively migrated from one system to another if the loading of the existing system reaches a certain threshold, or the characteristics of the user change significantly.
  • FIG. 5 is a diagram illustrating a usage prediction engine, according to some embodiments of the present disclosure.
  • FIG. 5 shows user identification 501, usage prediction engine 502, usage prediction 503, past usage pattern and trend 504, temporal information 505, user location 506, past mobility pattern 507, make and model of mobile device 508, installed applications 509, operating system (OS) and firmware version 510, subscription plan 511, remaining quota 512 and demographics information 513.
  • Usage prediction engine 502 receives user identification 501 and user attributes 504-513. As described in more detail below, user prediction engine 502 predicts future usage demands of the user 503 based on the inputs.
  • User identification 501 corresponds to information about a user's mobile device (e.g., International Mobile Equipment Identity (IMEI)).
  • IMEI International Mobile Equipment Identity
  • User attributes can be collected from various components in a mobile network, as described in more detail in FIG 6.
  • User attributes 504-513 include, but are not limited to:
  • Time of day, day of the week, and date of the year 505 - the temporal information provides clues on what service the user uses on the mobile device. Occurrences of any mass events (e.g., Super Bowl) can also be helpful in predicting the usage pattern of the user.
  • mass events e.g., Super Bowl
  • the geographical location information can be helpful in predicting the usage pattern. For example, if the user is located in the city where there are more cell sites of smaller size, it is likely that the user will experience higher amount of handover events as he/she goes back and forth between cell sites. Whereas if the user is located in a suburban area, a cell site is likely to cover a larger area and the chance of handovers will be smaller.
  • OS and firmware version of the mobile device 510 - demands can be different with different OS versions.
  • the messenger application on Apple iOS 8 supports voices and video in addition to text. That most likely translates to higher throughput usage.
  • Subscription plan of the user 511- For example, a user with a low data cap will use less data than one with a large data cap.
  • the remaining quota for the current billing period 512 - For example, a user with a low remaining quota is likely to be more constrained in bandwidth usage than one with plenty of quota left.
  • FIG. 6 is a system diagram of a mobile network, according to some embodiments of the present disclosure.
  • FIG. 6 shows Home Subscriber Server (HSS) 601, Mobility Management Entity (MME) 602, billing system 603, eNodeB 604, System Architecture Evolution (SAE) Gateway 605, and Analytics Server 606. All of the elements shown in FIG. 6 can be either legacy or virtual.
  • HSS Home Subscriber Server
  • MME Mobility Management Entity
  • SAE System Architecture Evolution Gateway
  • Analytics Server 6 All of the elements shown in FIG. 6 can be either legacy or virtual.
  • some operators may have an Analytics Server 606 to collect and analyze usage statistics about the users. This information can be fed into the prediction engine directly.
  • prediction engine contains analytic abilities of analytics server 606, and the two components are subsumed into one unit.
  • HSS 601 contains information about the mobility of the user. Mobility information can be fed periodically into an analytics server 606 to compute the past mobility pattern of the user.
  • Mobility Management Entity (MME) 602 tracks a current location of a device and can send location information to analytics server 606 for further processing.
  • Billing system contains a subscription plan, remaining quotas, and other billing related information of the user. Billing information can be fed to the analytics server 606 for usage trend determination.
  • SAE gateways 605 can examine all traffic to and from the user.
  • DPI Deep Packet Inspection
  • usage information can be extracted from data traffic including device make and model, installed and most frequently used apps, OS and firmware version, etc.
  • DPI data is fed into the analytics server 606 for further analysis before being used by the prediction engine.
  • usage trend of a user changes slowly over time.
  • usage prediction engine does not need to update its prediction for a user in real time.
  • the prediction for a particular user can be updated once a week, and for different users a different interval can be used.
  • usage trends change more rapidly.
  • the prediction can be triggered to update on demand.
  • prediction can be updated immediately if the user switched to another subscription plan or to a new phone.
  • predictions can be made based on the limited amount of information available. For example, if the new subscriber is a teenager, he/she is likely to have more chatty apps such as Facebook, Instagram or Snapchat, which will incur more signaling load. If instead, the new subscriber is a business account who has signed up for tethering, he/she is likely to be a heavier data user. Prediction update frequency for new users can be higher so that the prediction can quickly converge based on newly acquired factors. At this stage, the user can be put on either the legacy system or the NFV system. Once the user is classified, it can then be moved between the legacy and the NFV systems for optimal use of network resources.
  • FIG. 7 is a system diagram illustrating capacity optimization in a mobile network, according to some embodiments of the present invention.
  • FIG. 7 shows prediction engine 701, Serving Gateway (SGW) 702, Legacy Packet Data Network Gateway (PGW) 703 and NFV-based PGW 704.
  • SGW Serving Gateway
  • PGW Packet Data Network Gateway
  • PGW 701 When a subscriber switches on the phone, the phone will try to establish a session with the mobile network. The request will eventually be sent to SGW 701 and the SGW 701 selects a PGW 703 704 to home the user session.
  • One of the PGW nodes includes legacy equipment 703 and the other PGW node includes an NFV-based platform 704.
  • SGW selects a PGW based on Access Point Name (APN) only.
  • APN identifies the packet data network (PDN) that a mobile data user wants to communicate with, and is assigned to a user when they activate their subscription plan.
  • PDN packet data network
  • SGW consults the prediction engine to determine the best place to home the user session based on the characteristics of the user.
  • the classifier / prediction engine may provide an API based on Simple Object Access protocol (SOAP) or Representational State Transfer (REST) in which SGW can call to get a decision as to where to set up the session.
  • SOAP Simple Object Access protocol
  • REST Representational State Transfer
  • the subject matter described herein can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structural means disclosed in this specification and structural equivalents thereof, or in combinations of them.
  • the subject matter described herein can be implemented as one or more computer program products, such as one or more computer programs tangibly embodied in an information carrier (e.g., in a machine readable storage device), or embodied in a propagated signal, for execution by, or to control the operation of, data processing apparatus (e.g., a programmable processor, a computer, or multiple computers).
  • a computer program (also known as a program, software, software application, or code) can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
  • a computer program does not necessarily correspond to a file.
  • a program can be stored in a portion of a file that holds other programs or data, in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code).
  • a computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
  • processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processor of any kind of digital computer.
  • a processor will receive instructions and data from a read only memory or a random access memory or both.
  • the essential elements of a computer are a processor for executing instructions and one or more memory devices for storing instructions and data.
  • a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
  • Information carriers suitable for embodying computer program instructions and data include all forms of nonvolatile memory, including by way of example semiconductor memory devices, (e.g., EPROM, EEPROM, and flash memory devices); magnetic disks, (e.g., internal hard disks or removable disks); magneto optical disks; and optical disks (e.g., CD and DVD disks).
  • semiconductor memory devices e.g., EPROM, EEPROM, and flash memory devices
  • magnetic disks e.g., internal hard disks or removable disks
  • magneto optical disks e.g., CD and DVD disks
  • optical disks e.g., CD and DVD disks.
  • the processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
  • the subject matter described herein can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, (e.g., a mouse or a trackball), by which the user can provide input to the computer.
  • a display device e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor
  • a keyboard and a pointing device e.g., a mouse or a trackball
  • Other kinds of devices can be used to provide for interaction with a user as well.
  • feedback provided to the user can be any form of sensory feedback, (e.g., visual feedback, auditory feedback, or tactile feedback), and input from the user can be received in any form, including acoustic, speech, or tactile input.
  • the subject matter described herein can be implemented in a computing system that includes a back end component (e.g., a data server), a middleware component (e.g., an application server), or a front end component (e.g., a client computer having a graphical user interface or a web browser through which a user can interact with an implementation of the subject matter described herein), or any combination of such back end, middleware, and front end components.
  • the components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network ("LAN”) and a wide area network (“WAN”), e.g., the Internet.
  • LAN local area network
  • WAN wide area network

Abstract

Systems and methods of optimizing capacity of network equipment in mobile networks. A computing device receives a user identification and a user attribute, the user identification corresponding to a characteristic of the mobile network user, the user attribute corresponding to at least one characteristic of mobile network usage by the mobile network user. The computing device generates a usage prediction based on the user identification and the user attribute, the usage prediction including information corresponding to anticipated future data usage of the mobile network user, the anticipated future mobile network usage corresponding to at least one mobile resource. The computing device transmits the usage prediction to a serving gateway (SGW) such that the SGW routes the mobile network user to one of a legacy packet data network gateway (PGW) and a network function virtualization (NFV) PGW based on the usage prediction.

Description

OPTIMIZING CAPACITY EXPANSION IN A MOBILE NETWORK
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority to U.S. Application No. 61/986,462, entitled "Optimizing Capacity Expansion Using NFV-Based Platforms," filed April 30, 2014, the contents of which are incorporated by reference in their entirety.
TECHNICAL FIELD
[0002] Embodiments of the present invention generally relate to computerized methods and apparatus for optimizing capacity expansion in a mobile network.
BACKGROUND
[0003] Traditional methods of provisioning resources in a mobile network have included adding additional physical infrastructure when a resource is at capacity. Physical equipment is designed to have fixed capacity ratios. Once a particular dimension (e.g., throughput, signaling activities, session capacity) is exhausted, a mobile network operator has no choice but to put in more equipment even though all of the other dimensions may be underutilized. This leads to increased capital and operational expenses.
SUMMARY OF THE INVENTION
[0004] In some embodiments, systems and methods are disclosed for optimizing capacity of network equipment in mobile networks. In some embodiments, a computing device receives a user identification and a user attribute, the user identification corresponding to a characteristic of the mobile network user, the user attribute corresponding to at least one characteristic of mobile network usage by the mobile network user. In some embodiments, the computing device generates a usage prediction based on the user identification and the user attribute, the usage prediction including information corresponding to anticipated future data usage of the mobile network user, the anticipated future mobile network usage corresponding to at least one mobile resource. In some embodiments, the computing device transmits the usage prediction to a serving gateway (SGW) such that the SGW routes the mobile network user to one of a legacy packet data network gateway (PGW) and a network function virtualization (NFV) PGW based on the usage prediction, the legacy PGW including a fixed capacity for the at least one mobile resource and the NFV PGW including a configurable capacity for the at least one mobile resource.
[0005] In some embodiments, the at least one characteristic of the mobile network usage of the mobile network user includes amount of prior mobile network usage, a time correlating to the mobile network usage, location of a mobile device corresponding to the mobile user, amount of time spent roaming by the mobile device, make and model of the mobile device, application installed on the mobile device, operating system and firmware version of the mobile device, subscription plan, remaining quota, and demographics information. In some embodiments, the at least one characteristic of the mobile network user includes a mobile device ID or a phone number. In some embodiments, wherein receiving the user attribute further comprises receiving the user attribute from at least one of a Home Subscriber Server (HSS), Mobility Management Entity (MME), a billing system, and a System Architecture Evolution (SAE) gateway. In some embodiments, the mobile resource comprises at least one of signaling activities, throughput, session occupancy, encryption, and transcoding.
[0006] These and other capabilities of the disclosed subject matter will be more fully understood after a review of the following figures, detailed description, and claims. It is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.
BRIEF DESCRIPTION OF FIGURES
[0007] Various objectives, features, and advantages of the disclosed subject matter can be more fully appreciated with reference to the following detailed description of the disclosed subject matter when considered in connection with the following drawings, in which like reference numerals identify like elements.
[0008] FIG. 1 is a diagram showing demands a mobile network user incurs on a mobile network, according to some embodiments of the present disclosure.
[0009] FIG. 2 is a diagram illustrating a traditional method of expansion using legacy equipment.
[0010] FIG. 3 is a diagram illustrating method of expansion using legacy equipment and NFV-based equipment, according to some embodiments of the present disclosure. [0011] FIG. 4 is a system diagram illustrating a user in connection with a mobile network, according to some embodiments of the present disclosure.
[0012] FIG. 5 is a diagram illustrating a usage prediction engine, according to some embodiments of the present disclosure.
[0013] FIG. 6 is a system diagram of a mobile network, according to some embodiments of the present disclosure.
[0014] FIG. 7 is a system diagram illustrating capacity optimization in a mobile network, according to some embodiments of the present invention.
DETAILED DESCRIPTION
[0015] A mobile network can include mobile users with vastly different usage
characteristics. For example, some mobile users are data heavy and consume large quantities of data, driving up the total amount of data throughput that the network needs to support. Other users can be very signaling heavy and make a lot of connections (e.g., using "chatty" mobile applications which send updates frequently) but transfer only small amount of data. Even though they use only a small amount of data, they drive up the amount of signaling processing required by the network. Yet some other users might be relatively idle in both data throughput and signaling dimensions (e.g., networked power meter readers), but there are many of them and just signing them onto the network takes up a lot of session capacity. To accommodate all types of users, a network operator needs to deploy enough networking equipment to cover the worst case of all these dimensions (e.g., throughput, signaling activities, session capacity, and maybe other dimensions). Since legacy networking equipment is designed with a fixed capacity ratio (supporting X number of users, Y amount of signaling and Z amount of data throughput), covering the worst case of one dimension will lead to under-utilization of the others. For example, a legacy platform deployed in the network may be hitting 100% of the session capacity but utilizing only 20% of the throughput capacity. Even though there is still excess throughput capacity, new equipment needs to be installed to increase the number users supported. This drives up both capital and operational costs.
[0016] Previously, a user base is segregated into separate applications. For example, regular consumers are separated from machine-to-machine devices. Devices can be categorized such that the devices have similar demands. Devices with similar demands can be assigned to equipment with different performance characteristics, which often comes from a different manufacturer. Even with this approach, the problem of optimizing capacity is not solved because of at least the following: (1) the broad categorization of users does not guarantee that users within a group have similar usage demands. The equipment serving a category of users can still be underutilized in some dimensions; (2) capital and operational expenditures will increase since the operators now need to potentially deal with equipment from multiple vendors, which may or may not interoperate well; (3) when the demands from different group of users change over time, the operator would need to repartition the users and reallocate the network resources which can be time consuming and costly.
[0017] Preferred embodiments of the present disclosure include using Network Function Virtualization (NFV) on platforms with different capability and cost characteristics to handle demands introduced by different types of users. Configured differently (both in terms of hardware and software), different NFV based platforms can have different strengths and weaknesses. For example, one NFV based platform can be designed so that it can house a lot of users (e.g., by using servers with a lot of memory), but with limited throughput and signaling capability. Another NFV based platform can be designed so that it can process a lot of throughput (e.g., by using specialized network adaptor cards). Yet another NFV based platform can be designed so that it can handle a lot of signaling (e.g., with a high power CPU). These NFV based platforms with different characteristics can be put together in a network to meet the different demands introduced by different types of users. To maximize the effectiveness and minimize the costs, users of different characteristics are directed to the servers with matching strength so that each server is best utilized. In this way, the strength of the legacy and NFV based platforms complement the weaknesses of one another. Network equipment can therefore be better utilized, leading to a lower overall capital and operational cost.
[0018] Preferred embodiments of the present disclosure include a function to classify and direct mobile users or subscribers to different network equipment based on past and predicted future usage characteristics to match the capacity characteristics of the network equipment. The users do not need to be segregated into different groups (e.g., separating users into different Access Point Names or APN's.) The network can appear seamless to end users and therefore there is little change in the user experience. Operators can make use of NFV to deploy platforms with different cost and performance characteristics. NFV is suitable for such applications since it allows the same network function to run on different hardware platforms. These hardware platforms range from highly sophisticated blade server chassis to low cost server boxes, which provide different performance and capacity.
[0019] In some cases, additional capability can be obtained by building a server with specialized hardware, such as a chip for hardware encryption, to support certain groups of users.
Preferred embodiments of the present disclosure can be used as a green field solution (e.g., a new network made up of only NFV based platforms), or to supplement an existing legacy network which is running out of capacity. In the latter case, NFV servers can be designed to specifically relieve the bottlenecks of the legacy equipment and make the utilization of all performance dimensions more balanced. In the following, techniques are described to determine the choke point of the existing legacy platforms, to build NFV based platforms to relieve these choke points, to predict and identify the usage characteristics of the users, and to direct them to the NFV based platforms which can best handle the demands.
[0020] Preferred embodiments of the present disclosure make use of network function virtualization based platforms with different capabilities and cost characteristics to complement existing legacy equipment which has fixed capacity ratios. The legacy and NFV based platforms can work seamlessly as a single network. In some embodiments, the NFV based platforms are designed to complement the weakness of the legacy platform so that when they work together, it reduces the chance of overloading a certain capacity dimension and overall all the network nodes will be better utilized.
[0021] In some embodiments, in order to make the best use of the different capabilities of the legacy and NFV based platforms, when a user tries to access the network, the usage characteristics of the user are predicted based on a number of factors including his past usage pattern. The user is then directed to the network nodes which can best handle the user's demands.
[0022] FIG. 1 is a diagram showing demands a mobile network user incurs on a mobile network, according to some embodiments of the present disclosure. FIG. 1 shows a mobile device 101, signaling activities 102, throughput 103, session occupancy 104 and other dimensions 105.
[0023] As shown in Figure 1, a mobile network user 101 incurs demands on the mobile network on a number of different dimensions. The user generates signaling activities 102 when registering to and deregistering from the network, when roaming around the network, etc. The user puts demands on the throughput dimension 103 when he or she is browsing web pages or sending status updates. The user also occupies one or more session spaces 104 when he or she is attached to the network. Finally, there are demands on other dimensions 105 for example if the user requires encryption or image/video transcoding services. Not all users behave the same way. A data heavy user consumes a lot of data and drives up the demand on the throughput dimension. Other users could be very signaling heavy and make lots of connections (e.g., using "chatty" apps which send a lot of updates) but transferring only small amount of data. Some users can drive up the demands on the signaling dimension in the network. Yet some other users might be relative idle in both the data throughput and the signaling dimensions (e.g., networked power meter readers), but there are many of them and just keeping them signed onto the network requires a lot of session capacity.
[0024] Network operators often have to install more network equipment to handle the aggregate demands in the different dimensions described above. Since legacy network equipment is designed to support a fixed capacity ratio (supporting X number of users, Y amount of signaling and Z amount of data throughput), covering the worst case of one dimension often leads to under-utilization of the others. For example, a network node may be hitting 100% of the session capacity but utilizing only 50% of the throughput. Even though there is still excess throughput capacity, new legacy equipment is installed to increase the number of users supported. Installing new legacy equipment can drive up both capital and operational costs.
[0025] FIG. 2 is a diagram illustrating a traditional method of expansion using legacy equipment. FIG. 2 shows a network operator reaching maximum session capacity with a first legacy platform 201, capacity of a first legacy platform 202 after a 2x expansion 210, and capacity of a second legacy platform 203 after a 2x expansion 210.
[0026] As shown in 201 , a network operator reaches maximum capacity in a first legacy platform. The first legacy platform has a maximum throughput of 100 units and a maximum of 100 sessions. 50 of the 100 units of throughput are used, while 100 of the 100 sessions are used. When the network operator anticipates a doubling of demand (e.g., 100 units of throughput and 200 sessions), the network operator has to find a way to increase capacity. To double the capacity 210, the network operator installs a second legacy platform. In some embodiments, an operator can determine the capacity usage of a platform by monitoring peak usage levels of a device (e.g., monitoring usage during busy hours). A platform can specify the maximum value for each dimension (e.g., 10 million sessions, 50 Gbps of throughput at a CPU limit such as 80%). For example, to determine an amount of session usage, an operator can use a statistic counter to see how many sessions are used during a busy hour. As another example, an operator can determine an amount of throughput by measuring the throughput at a specific CPU limit during a busy hour. An operator can determine capacity by measuring an amount of CPU usage during. In both the first legacy platform 202 and the second legacy platform 203, 50 of the 100 units of throughput are used, while 100 of the 100 sessions are used. After the expansion, both legacy platforms are still bottlenecked by the session dimension. The capacity ratio in the expanded legacy platform (e.g., equal capacity for session and throughput) does not match the demand by the users (e.g., lots of sessions but not as much throughput).
[0027] In contrast, the preferred embodiment of the present invention calls for understanding the cause for the bottleneck of existing legacy platforms, the present and future usage pattern of the users, and building NFV based platforms to complement the legacy platforms so that all capacity dimensions can be better utilized.
[0028] FIG. 3 is a diagram illustrating method of expansion using legacy equipment and NFV-based equipment, according to some embodiments of the present disclosure. FIG. 3 shows a network operator reaching a maximum session capacity with a first legacy platform 201, capacity of a first legacy platform 302 after a 2x expansion 310, and capacity of a second NFV-based platform 303 after a 2x expansion 310. While FIG. 3 illustrates expansion in two dimensions (e.g., session and throughput), a similar technique can be applied to any number of dimensions.
[0029] As described above, an operator has reached capacity in a first legacy platform with 50 of 100 units of throughput used and 100 of 100 sessions used 201. When the network operator anticipates a doubling of demand (e.g., 100 units of throughput and 200 sessions), the network operator doubles the capacity 210 by installing an NFV-based platform 303. As shown after expansion 310, the combination of the first legacy platform 302 and the NFV- based platform 303 takes into consideration the present and future usage patterns of the users. For example, if 20% of the users are using 80% of the throughput, it means that out of the 100 users:
• 20 heavy users are using 40 units of throughput; and • 80 light users are using 10 units of throughput.
[0030] When the demand doubles, there is a total of 200 users, out of which
• 40 heavy users use 80 units of throughput; and
• 160 light users use 20 units of throughput.
[0031] An NFV -based platform can be built to support 200 users but only support 40 units of throughput, mostly likely at a fraction of the cost compared to the legacy platform. This can be done due to the flexible nature of NFV solutions - a platform can be built with a lot of memory to support more sessions, but only moderately powerful CPU for throughput processing to reduce cost. The 160 light users can be directed to the NFV based platform 303 while the heavy users can be directed to the legacy platform 302. If the legacy platform costs $1M and the NFV platform costs $0.2M, then the cost for doubling the capacity would be:
• $2M if only legacy platforms are used (e.g., as shown in FIG. 2); and
• $1.2M if one NFV based platform is added to the legacy platform (e.g., as shown in FIG. 3).
[0032] Using NFV-based platforms can save $0.8M or 40% of the cost of using only legacy platforms. As described in FIGS. 2 and 3, the legacy platform has high throughput capacity but not enough session capacity. The NFV based platform complements the legacy platform by offering high session capacity but offering low throughput capacity to keep cost down. There are many different ways to build the NFV based platform to complement the legacy platforms. Operators can decide on cost and performance tradeoffs of different components such as memory, CPU, or other specialized chips, as well as how future demands will change. Using an NFV-based platform allows an operator to analyze demands from different users, build NFV-based platforms with capabilities which complement the legacy platforms, and direct the users appropriately to the different platforms to make best use of the capacity on all the platforms.
[0033] In some embodiments, the systems and methods described herein direct and classify users based on past and predicted demands. Predicting user capacity demands can help to balance capacity usage on both the legacy platform and the NFV based platforms.
[0034] FIG. 4 is a system diagram illustrating a user in connection with a mobile network, according to some embodiments of the present disclosure. FIG. 4 shows mobile network user 401, classifier 402, usage prediction engine 403, legacy network platform, NFV-based platform 405 and mobile network 406. [0035] Mobile network user 401 can include mobile network subscribers who access the mobile network 406 via one or more mobile network devices (e.g., smartphones, laptops, tablets). As described in more detail below, mobile network 406 comprises a plurality of network devices. Briefly, network device in mobile network 406 can route and analyze user traffic.
[0036] As a user 401 signs onto the network 406, a classifier 402 consults usage prediction engine 403 to predict a resource usage pattern. Classifier 402 is a component which takes information from the user and his/her equipment (e.g., the Mobile equipment identifier), consults the usage prediction engine 403 and makes decision on which platform to put the user on in the mobile network 406. Classifier 402 can be implemented as a separate component, or as part of a certain network device (e.g., on the load balancer) in the mobile network. Usage prediction engine 403, which is described in more detail below, is a component that takes user identification and other attributes related to the user, and predicts the future network resource usage of the user. Based on a result from usage prediction engine 403, user 401 is directed to be serviced by legacy network platform 404 or a NFV based platform 405. As described above, classifier also receives an input from both the legacy and the NFV based platforms corresponding to their available capacity level, and their capabilities (e.g., encryption, video transcoding).
[0037] In some embodiments, a user can be directed to either a legacy platform or an NFV-based platform based on characteristics of either the user or the platform. For example, a user can be directed when the user joins a network (e.g., when the user powers up the phone in the morning). In addition, existing users can also be actively migrated from one system to another if the loading of the existing system reaches a certain threshold, or the characteristics of the user change significantly.
[0038] FIG. 5 is a diagram illustrating a usage prediction engine, according to some embodiments of the present disclosure. FIG. 5 shows user identification 501, usage prediction engine 502, usage prediction 503, past usage pattern and trend 504, temporal information 505, user location 506, past mobility pattern 507, make and model of mobile device 508, installed applications 509, operating system (OS) and firmware version 510, subscription plan 511, remaining quota 512 and demographics information 513. [0039] Usage prediction engine 502 receives user identification 501 and user attributes 504-513. As described in more detail below, user prediction engine 502 predicts future usage demands of the user 503 based on the inputs. User identification 501 corresponds to information about a user's mobile device (e.g., International Mobile Equipment Identity (IMEI)). User attributes can be collected from various components in a mobile network, as described in more detail in FIG 6.
[0040] User attributes 504-513 include, but are not limited to:
(1) The past usage pattern and trend of the user 504 - a data heavy user is likely to be data heavy in the future.
(2) Time of day, day of the week, and date of the year 505 - the temporal information provides clues on what service the user uses on the mobile device. Occurrences of any mass events (e.g., Super Bowl) can also be helpful in predicting the usage pattern of the user.
(3) The location of the user 506 - similar to the temporal information, the geographical location information can be helpful in predicting the usage pattern. For example, if the user is located in the city where there are more cell sites of smaller size, it is likely that the user will experience higher amount of handover events as he/she goes back and forth between cell sites. Whereas if the user is located in a suburban area, a cell site is likely to cover a larger area and the chance of handovers will be smaller.
(4) The past mobility pattern 507 - a user who roams around a lot in the past will likely roam around a lot in the future.
(5) Make and model of the mobile device 508 - sometimes specific types of mobile devices have vastly different resource usages. For example, a user with a touch screen phone will use more data service compare to user of a feature phone with no touch screen support.
(6) Installed mobile applications 509 - some mobile apps are more "chatty" than others and trigger a lot more connections.
(7) OS and firmware version of the mobile device 510 - demands can be different with different OS versions. For example, the messenger application on Apple iOS 8 supports voices and video in addition to text. That most likely translates to higher throughput usage.
(8) Subscription plan of the user 511- For example, a user with a low data cap will use less data than one with a large data cap. (9) The remaining quota for the current billing period 512 - For example, a user with a low remaining quota is likely to be more constrained in bandwidth usage than one with plenty of quota left.
(10) The demographic profile of the user 513 - For example, usage behavior is likely to be drastically different between a teenager user versus and adult user. A teenager user is likely to consume more data via their social activities while an adult user may use more voice calls than data in he/her day to day activities.
[0041] FIG. 6 is a system diagram of a mobile network, according to some embodiments of the present disclosure. FIG. 6 shows Home Subscriber Server (HSS) 601, Mobility Management Entity (MME) 602, billing system 603, eNodeB 604, System Architecture Evolution (SAE) Gateway 605, and Analytics Server 606. All of the elements shown in FIG. 6 can be either legacy or virtual.
[0042] In some embodiments, some operators may have an Analytics Server 606 to collect and analyze usage statistics about the users. This information can be fed into the prediction engine directly. In other embodiments, prediction engine contains analytic abilities of analytics server 606, and the two components are subsumed into one unit.
[0043] Home Subscriber Server (HSS) 601 contains information about the mobility of the user. Mobility information can be fed periodically into an analytics server 606 to compute the past mobility pattern of the user.
[0044] Mobility Management Entity (MME) 602 tracks a current location of a device and can send location information to analytics server 606 for further processing.
[0045] Billing system contains a subscription plan, remaining quotas, and other billing related information of the user. Billing information can be fed to the analytics server 606 for usage trend determination.
[0046] SAE gateways 605 can examine all traffic to and from the user. By using Deep Packet Inspection (DPI) techniques, usage information can be extracted from data traffic including device make and model, installed and most frequently used apps, OS and firmware version, etc. In some embodiments, DPI data is fed into the analytics server 606 for further analysis before being used by the prediction engine.
[0047] In some embodiments, usage trend of a user changes slowly over time. When usage trends change slowly, usage prediction engine does not need to update its prediction for a user in real time. For example, the prediction for a particular user can be updated once a week, and for different users a different interval can be used. In some embodiments, usage trends change more rapidly. For example, when certain events happen, the prediction can be triggered to update on demand. For example, prediction can be updated immediately if the user switched to another subscription plan or to a new phone.
[0048] When a new subscriber joins the network, there will not be much usage history to build predictions from. Initially, new users can be treated as an "average" user with average throughput and signaling loads. Alternatively, predictions can be made based on the limited amount of information available. For example, if the new subscriber is a teenager, he/she is likely to have more chatty apps such as Facebook, Instagram or Snapchat, which will incur more signaling load. If instead, the new subscriber is a business account who has signed up for tethering, he/she is likely to be a heavier data user. Prediction update frequency for new users can be higher so that the prediction can quickly converge based on newly acquired factors. At this stage, the user can be put on either the legacy system or the NFV system. Once the user is classified, it can then be moved between the legacy and the NFV systems for optimal use of network resources.
[0049] FIG. 7 is a system diagram illustrating capacity optimization in a mobile network, according to some embodiments of the present invention. FIG. 7 shows prediction engine 701, Serving Gateway (SGW) 702, Legacy Packet Data Network Gateway (PGW) 703 and NFV-based PGW 704.
[0050] When a subscriber switches on the phone, the phone will try to establish a session with the mobile network. The request will eventually be sent to SGW 701 and the SGW 701 selects a PGW 703 704 to home the user session. One of the PGW nodes includes legacy equipment 703 and the other PGW node includes an NFV-based platform 704. Normally, SGW selects a PGW based on Access Point Name (APN) only. The APN identifies the packet data network (PDN) that a mobile data user wants to communicate with, and is assigned to a user when they activate their subscription plan. In preferred embodiments, SGW consults the prediction engine to determine the best place to home the user session based on the characteristics of the user. For example, the classifier / prediction engine may provide an API based on Simple Object Access protocol (SOAP) or Representational State Transfer (REST) in which SGW can call to get a decision as to where to set up the session. Once the SGW decide to set up the session on, say, the NFV based PGW, all future signaling and data traffic related to the subscriber will be handled by the selected PGW.
[0051] The subject matter described herein can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structural means disclosed in this specification and structural equivalents thereof, or in combinations of them. The subject matter described herein can be implemented as one or more computer program products, such as one or more computer programs tangibly embodied in an information carrier (e.g., in a machine readable storage device), or embodied in a propagated signal, for execution by, or to control the operation of, data processing apparatus (e.g., a programmable processor, a computer, or multiple computers). A computer program (also known as a program, software, software application, or code) can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program does not necessarily correspond to a file. A program can be stored in a portion of a file that holds other programs or data, in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
[0052] The processes and logic flows described in this specification, including the method steps of the subject matter described herein, can be performed by one or more programmable processors executing one or more computer programs to perform functions of the subject matter described herein by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus of the subject matter described herein can be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
[0053] Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processor of any kind of digital computer. Generally, a processor will receive instructions and data from a read only memory or a random access memory or both. The essential elements of a computer are a processor for executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks. Information carriers suitable for embodying computer program instructions and data include all forms of nonvolatile memory, including by way of example semiconductor memory devices, (e.g., EPROM, EEPROM, and flash memory devices); magnetic disks, (e.g., internal hard disks or removable disks); magneto optical disks; and optical disks (e.g., CD and DVD disks). The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
[0054] To provide for interaction with a user, the subject matter described herein can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, (e.g., a mouse or a trackball), by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well. For example, feedback provided to the user can be any form of sensory feedback, (e.g., visual feedback, auditory feedback, or tactile feedback), and input from the user can be received in any form, including acoustic, speech, or tactile input.
[0055] The subject matter described herein can be implemented in a computing system that includes a back end component (e.g., a data server), a middleware component (e.g., an application server), or a front end component (e.g., a client computer having a graphical user interface or a web browser through which a user can interact with an implementation of the subject matter described herein), or any combination of such back end, middleware, and front end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network ("LAN") and a wide area network ("WAN"), e.g., the Internet.
[0056] It is to be understood that the disclosed subject matter is not limited in its application to the details of construction and to the arrangements of the components set forth in the following description or illustrated in the drawings. The disclosed subject matter is capable of other embodiments and of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.
[0057] As such, those skilled in the art will appreciate that the conception, upon which this disclosure is based, may readily be utilized as a basis for the designing of other structures, methods, and systems for carrying out the several purposes of the disclosed subject matter. It is important, therefore, that the claims be regarded as including such equivalent constructions insofar as they do not depart from the spirit and scope of the disclosed subject matter.
[0058] Although the disclosed subject matter has been described and illustrated in the foregoing exemplary embodiments, it is understood that the present disclosure has been made only by way of example, and that numerous changes in the details of implementation of the disclosed subject matter may be made without departing from the spirit and scope of the disclosed subject matter, which is limited only by the claims which follow.

Claims

1. A computerized method of optimizing capacity of network equipment in mobile networks, the computerized method comprising: receiving, by a computing device, a user identification and a user attribute, the user identification corresponding to a characteristic of the mobile network user, the user attribute corresponding to at least one characteristic of mobile network usage by the mobile network user; generating, by the computing device, a usage prediction based on the user
identification and the user attribute, the usage prediction including information corresponding to anticipated future data usage of the mobile network user, the anticipated future mobile network usage corresponding to at least one mobile resource; and transmitting, by the computing device, the usage prediction to a serving gateway (SGW) such that the SGW routes the mobile network user to one of a legacy packet data network gateway (PGW) and a network function virtualization (NFV) PGW based on the usage prediction, the legacy PGW including a fixed capacity for the at least one mobile resource and the NFV PGW including a configurable capacity for the at least one mobile resource.
2. The computerized method of claim 1, wherein the at least one characteristic of the mobile network usage of the mobile network user includes amount of prior mobile network usage, a time correlating to the mobile network usage, location of a mobile device corresponding to the mobile user, amount of time spent roaming by the mobile device, make and model of the mobile device, application installed on the mobile device, operating system and firmware version of the mobile device, subscription plan, remaining quota, and demographics information.
3. The computerized method of claim 1, wherein the at least one characteristic of the mobile network user includes a mobile device ID or a phone number.
4. The computerized method of claim 1, wherein receiving the user attribute further comprises receiving the user attribute from at least one of a Home Subscriber Server (HSS), Mobility Management Entity (MME), a billing system, and a System Architecture Evolution (SAE) gateway.
5. The computerized method of claim 1, wherein the mobile resource comprises at least one of signaling activities, throughput, session occupancy, encryption, and transcoding.
6. A system for optimizing capacity of network equipment in mobile networks, the system comprising: a processor; and a memory coupled to the processor and including computer-readable instructions that, when executed by a processor, cause the processor to: receive a user identification and a user attribute, the user identification corresponding to a characteristic of the mobile network user, the user attribute corresponding to at least one characteristic of mobile network usage by the mobile network user; generate a usage prediction based on the user identification and the user attribute, the usage prediction including information corresponding to anticipated future data usage of the mobile network user, the anticipated future mobile network usage corresponding to at least one mobile resource; and transmit the usage prediction to a serving gateway (SGW) such that the SGW routes the mobile network user to one of a legacy packet data network gateway (PGW) and a network function virtualization (NFV) PGW based on the usage prediction, the legacy PGW including a fixed capacity for the at least one mobile resource and the NFV PGW including a configurable capacity for the at least one mobile resource.
7. The system of claim 6, wherein the at least one characteristic of the mobile network usage of the mobile network user includes amount of prior mobile network usage, a time correlating to the mobile network usage, location of a mobile device corresponding to the mobile user, amount of time spent roaming by the mobile device, make and model of the mobile device, application installed on the mobile device, operating system and firmware version of the mobile device, subscription plan, remaining quota, and demographics information.
8. The system of claim 6, wherein the at least one characteristic of the mobile network user includes a mobile device ID or a phone number.
9. The system of claim 6, wherein the processor is further caused to receive the user attribute from at least one of a Home Subscriber Server (HSS), Mobility Management Entity (MME), a billing system, and a System Architecture Evolution (SAE) gateway.
10. The system of claim 6, wherein the mobile resource comprises at least one of signaling activities, throughput, session occupancy, encryption, and transcoding.
PCT/US2015/028496 2014-04-30 2015-04-30 Optimizing capacity expansion in a mobile network WO2015168394A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
KR1020167032960A KR102178142B1 (en) 2014-04-30 2015-04-30 Optimizing capacity expansion in a mobile network
ES15785224T ES2760875T3 (en) 2014-04-30 2015-04-30 Optimization of capacity extension in a mobile network
JP2016565048A JP2017522749A (en) 2014-04-30 2015-04-30 Optimizing capacity expansion in mobile networks
CN201580036285.7A CN106688257B (en) 2014-04-30 2015-04-30 Optimizing capacity expansion in mobile networks
EP15785224.5A EP3138307B1 (en) 2014-04-30 2015-04-30 Optimizing capacity expansion in a mobile network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201461986462P 2014-04-30 2014-04-30
US61/986,462 2014-04-30

Publications (1)

Publication Number Publication Date
WO2015168394A1 true WO2015168394A1 (en) 2015-11-05

Family

ID=54356251

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/028496 WO2015168394A1 (en) 2014-04-30 2015-04-30 Optimizing capacity expansion in a mobile network

Country Status (7)

Country Link
US (1) US9781631B2 (en)
EP (1) EP3138307B1 (en)
JP (1) JP2017522749A (en)
KR (1) KR102178142B1 (en)
CN (1) CN106688257B (en)
ES (1) ES2760875T3 (en)
WO (1) WO2015168394A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11224012B1 (en) 2020-06-18 2022-01-11 T-Mobile Usa, Inc. Simulating continuous millimeter wave band access to a telecommunications network

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6401537B2 (en) * 2014-07-29 2018-10-10 Kddi株式会社 Prediction device and prediction method
US10652308B2 (en) * 2017-11-08 2020-05-12 International Business Machines Corporation Cognitive storage management for a mobile computing device
CN108834143B (en) * 2018-05-28 2021-06-29 中国联合网络通信集团有限公司 Network expansion method, terminal and system
JP6973300B2 (en) * 2018-06-04 2021-11-24 日本電信電話株式会社 Service chain design equipment, service chain design method, and service chain design program
CN110933097B (en) * 2019-12-05 2022-06-28 美味不用等(上海)信息科技股份有限公司 Current limiting and automatic capacity expanding and shrinking method for multi-service gateway
CN111669765B (en) * 2020-06-02 2022-09-13 中国联合网络通信集团有限公司 Network capacity expansion method and device, control equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050132051A1 (en) * 2003-12-11 2005-06-16 Kimberly-Clark Worldwide, Inc. System and method predicting and managing network capacity requirements
US20050243726A1 (en) * 2000-07-28 2005-11-03 Tactical Networks A.S. System and method for real-time buying and selling of internet protocol (IP) transit
US20100017506A1 (en) * 2008-07-18 2010-01-21 Apple Inc. Systems and methods for monitoring data and bandwidth usage
US20130196617A1 (en) * 2012-01-27 2013-08-01 Microsoft Corporation Predicting network data consumption relative to data usage patterns

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001279266A1 (en) 2000-06-26 2002-01-08 Tradingscreen, Inc. Securities trading system with latency check
US7346840B1 (en) 2001-02-26 2008-03-18 Cisco Technology, Inc. Application server configured for dynamically generating web forms based on extensible markup language documents and retrieved subscriber data
DE60302051T2 (en) 2002-03-18 2006-07-20 Matsushita Electric Industrial Co., Ltd., Kadoma METHOD, NETWORK AND APPARATUS FOR CONFIGURING AND CONTROLLING NET RESOURCES IN PROVIDING CONTAINERS WITH DISTRIBUTION RULES
JP4022764B2 (en) 2003-06-26 2007-12-19 日本電気株式会社 Information processing apparatus, file management method, and program
US7418253B2 (en) 2004-07-19 2008-08-26 Telefonaktiebolaget Lm Ericsson (Publ) Method, security system control module and policy server for providing security in a packet-switched telecommunications system
EP1777962A1 (en) 2005-10-24 2007-04-25 Alcatel Lucent Access/edge node supporting multiple video streaming services using a single request protocol
US7466694B2 (en) 2006-06-10 2008-12-16 Cisco Technology, Inc. Routing protocol with packet network attributes for improved route selection
US10157368B2 (en) 2006-09-25 2018-12-18 International Business Machines Corporation Rapid access to data oriented workflows
US8326958B1 (en) 2009-01-28 2012-12-04 Headwater Partners I, Llc Service activation tracking system
US8032182B2 (en) 2008-08-07 2011-10-04 Broadcom Corporation Subscriber identity module with an incorporated radio
US8144182B2 (en) 2008-09-16 2012-03-27 Biscotti Inc. Real time video communications system
CN101835238A (en) * 2009-03-11 2010-09-15 中兴通讯股份有限公司 Method and device for selecting route in junction network
EP2693705B1 (en) 2011-03-31 2018-11-21 Fujitsu Limited Gateway device and gateway selection method
WO2012175140A1 (en) 2011-06-24 2012-12-27 Nokia Siemens Networks Oy Gateway selection for load balancing
US9154641B2 (en) * 2012-11-21 2015-10-06 At&T Intellectual Property I, L.P. Long term evolution intelligent subscriber profile
CN103269280B (en) * 2013-04-23 2017-12-15 华为技术有限公司 The method, apparatus and system commenced business in network
US9426688B2 (en) * 2014-02-28 2016-08-23 Verizon Patent And Licensing Inc. Determining a frequency for a client device to use to connect to a network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050243726A1 (en) * 2000-07-28 2005-11-03 Tactical Networks A.S. System and method for real-time buying and selling of internet protocol (IP) transit
US20050132051A1 (en) * 2003-12-11 2005-06-16 Kimberly-Clark Worldwide, Inc. System and method predicting and managing network capacity requirements
US20100017506A1 (en) * 2008-07-18 2010-01-21 Apple Inc. Systems and methods for monitoring data and bandwidth usage
US20130196617A1 (en) * 2012-01-27 2013-08-01 Microsoft Corporation Predicting network data consumption relative to data usage patterns

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3138307A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11224012B1 (en) 2020-06-18 2022-01-11 T-Mobile Usa, Inc. Simulating continuous millimeter wave band access to a telecommunications network
US11765652B2 (en) 2020-06-18 2023-09-19 T-Mobile Usa, Inc. Simulating continuous millimeter wave band access to a telecommunications network

Also Published As

Publication number Publication date
KR102178142B1 (en) 2020-11-13
EP3138307A1 (en) 2017-03-08
JP2017522749A (en) 2017-08-10
US20150319762A1 (en) 2015-11-05
ES2760875T3 (en) 2020-05-18
KR20160147927A (en) 2016-12-23
EP3138307B1 (en) 2019-09-11
CN106688257B (en) 2020-05-19
CN106688257A (en) 2017-05-17
US9781631B2 (en) 2017-10-03
EP3138307A4 (en) 2017-12-13

Similar Documents

Publication Publication Date Title
US9781631B2 (en) Optimizing capacity expansion in a mobile network
US11683716B2 (en) Communication apparatus, system, method, allocation apparatus, and non-transitory recording medium
US10942786B2 (en) Network management
US9288148B1 (en) Hierarchical network, service and application function virtual machine partitioning across differentially sensitive data centers
EP2955631B1 (en) Controlling of virtualized network functions for usage in communication network
US20180139109A1 (en) Sdn-based api controller
WO2018016043A1 (en) Resource management apparatus, resource management method and program
US11310731B1 (en) Updating policy and radio access network decisions based on dispersion analytics of cellular systems
EP3429137B1 (en) Slice allocating method
WO2014127346A1 (en) Methods, systems, and computer readable media for providing a thinking diameter network architecture
CN104285459A (en) Control node and communication control method
WO2015082013A1 (en) Management of network entity selection
EP3203686A1 (en) Virtualized network function interworking
Bolettieri et al. Application-aware resource allocation and data management for MEC-assisted IoT service providers
CN106063201A (en) Server, control device, management device, communication system, communication method, control method, management method, and program
CN114980034A (en) Method and device for realizing raw computing power service, network equipment and terminal
Bruschi et al. Managing 5G network slicing and edge computing with the MATILDA telecom layer platform
JPWO2018174225A1 (en) Network function virtualization management orchestration apparatus, communication system, method and program
CN111699659A (en) Virtualized network functions
CN114205850A (en) Service processing method, base station, core network system and service processing system
CN103609169A (en) Control method and device for data transmission
CN114980033A (en) Method and device for realizing raw computing power service, network equipment and terminal
Mannweiler et al. Context-awareness for heterogeneous access management
WO2016148049A1 (en) Communication device, system, and method, and allocation device and program
CN113098705B (en) Authorization method and device for life cycle management of network service

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15785224

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2015785224

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015785224

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2016565048

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20167032960

Country of ref document: KR

Kind code of ref document: A