FIELD OF INVENTION
[0001] The present subject matter 5 tter relates to communication systems and, particularly but
not exclusively, to communication in radio access networks.
BACKGROUND
[0002] Communication devices, such as phones, personal digital assistants, portable
computers, and desktop computers have seemingly become a ubiquitous part of today’s human
10 life. Communication devices facilitate the subscribers to have access to various communication
services, such as to make and receive calls, and send and receive texts or videos. Communication
devices are used for a variety of purposes, including communicating with family members and
friends and conducting business. With the increasing use of such communication devices, calling
or the call service has become a pervasive mode of communication, where it allows for a quick
15 communication between the subscribers, irrespective of whether they are located in the same
geographical area or not.
SUMMARY
[0003] This summary is provided to introduce concepts related to generation of call back
trigger for dropped calls. This summary is not intended to identify essential features of the
20 claimed subject matter nor is it intended for use in determining or limiting the scope of the
claimed subject matter.
[0004] In one implementation, a method to generate a call back trigger in an event of a
call drop in a Radio Access Network (RAN) is described. The method includes identifying
termination of a call on a first user’s communication device (CD), where the call is between the
25 first user and a second user. The method also includes determining the termination of the call to
be a call drop based on value of a call drop identification parameter, where the call drop
identification parameter is indicative of signal strength received by the first user’s CD. The
method further includes monitoring signal strength received by the first user’s CD, where the
3
signal strength is indicative of capability of the first user’s CD to connect to a nearest transceiver
station; and generating a call back trigger based on the monitoring, wherein the signal strength is
above a predefined minimum threshold.
[0005] A CD to generate a call back trigger in an event of a call drop in a Radio Access
Network (RAN) is also described. The CD includes a processor and an analysis module 5 dule coupled
to the processor to identify termination of a call connected through the CD, where the call is
between a first user and a second user, and wherein the first user utilizes the CD; and determine
the termination of the call to be a call drop based on value of a call drop identification parameter,
where the call drop identification parameter is indicative of signal strength received by the CD.
10 The CD may also include a monitoring module coupled to the processor to monitor signal
strength received by the CD, where the signal strength is indicative of capability of the CD to
connect to a nearest transceiver station. The CD also includes a triggering module coupled to the
processor to generate a call back trigger based on the monitored signal strength, wherein the
signal strength is above a predefined minimum threshold.
15 [0006] A computer-readable medium having embodied thereon a computer program for
executing a method is also described. The method includes executed by the computer program
includes identifying termination of a call on a first user’s communication device (CD), where the
call is between the first user and a second user. The method also includes determining the
termination of the call to be a call drop based on value of a call drop identification parameter,
20 where the call drop identification parameter is indicative of signal strength received by the first
user’s CD. The method further includes monitoring signal strength received by the first user’s
CD, where the signal strength is indicative of capability of the first user’s CD to connect to a
nearest transceiver station; and generating a call back trigger based on the monitoring, wherein
the signal strength is above a predefined minimum threshold.
25 BRIEF DESCRIPTION OF THE FIGURES
[0007] The detailed description is described with reference to the accompanying figures.
In the figures, the left-most digit(s) of a reference number identifies the figure in which the
reference number first appears. The same numbers are used throughout the figures to reference
like features and components. Some implementations of system and/or methods in accordance
4
with implementations of the present subject matter are now described, by way of example only,
and with reference to the accompanying figures, in which:
[0008] Fig. 1 illustrates an communication device, according to an implementation of the
present subject matter;
[0009] Fig. 2 illustrates a method of initiating a call 5 back for dropped calls, in accordance
with an implementation of the present subject matter.
[0010] In the present document, the word "exemplary" is used herein to mean "serving as
an example, instance, or illustration." Any implementation of the present subject matter
described herein as "exemplary" is not necessarily to be construed as preferred or advantageous
10 over other implementations.
[0011] It should be appreciated by those skilled in the art that any block diagrams herein
represent conceptual views of illustrative systems embodying the principles of the present
subject matter. Similarly, it will be appreciated that any flow charts, flow diagrams, state
transition diagrams, pseudo code, and the like represent various processes which may be
15 substantially represented in computer readable medium and so executed by a computer or a
processor, whether or not such computer or processor is explicitly shown.
DESCRIPTION OF IMPLEMENTATIONS
[0012] Systems and methods for generating a call back trigger in situations of a call drop
20 in a Radio Access Network (RAN) are described. The described methods may be implemented in
various communication devices, including, but not limited to, mobile phones, Smartphones,
Tablets, Phablets, tabphones, hand held devices, personal digital assistants (PDAs), cell phones,
and other user equipments capable of communicating in the RAN. Although the description
herein is made with reference to limited communication devices, other communication devices
25 may also be utilized, albeit with a few variations, as would be understood by a person skilled in
the art.
[0013] The techniques described herein may be used in various wireless communication
technologies, such as Code Division Multiple Access (CDMA), Time Division Multiple Access
(TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency-Division
5
Multiple Access (OFDMA), Single Carrier Frequency Division Multiple Access (SC-FDMA)
and other systems. A CDMA system may implement a radio technology, such as Universal
Terrestrial Radio Access (UTRA), cdma2000, etc. UTRA includes variants of CDMA.
Cdma2000 covers IS-2000, IS-95, and IS-856 standards. A TDMA system may implement a
radio technology, such as Global System 5 for Mobile Communications (GSM). An OFDMA
system may implement a radio technology, such as Evolved UTRA (E-UTRA), Ultra Mobile
Broadband (UMB), IEEE 802.20, IEEE 802.16 (WiMAX), 802.11 (WiFiTM), Flash-OFDM®, etc.
UTRA and E-UTRA are part of Universal Mobile Telecommunication System (UMTS). 3GPP
Long Term Evolution (LTE) is an upcoming release of UMTS that uses E-UTRA. UTRA, E10
UTRA, UMTS, LTE, and GSM are described in documents from an organization "3rd
Generation Partnership Project" (3GPP). Cdma2000 and UMB are described in documents from
an organization named "3rd Generation Partnership Project 2" (3GPP2). For clarity, certain
aspects of the techniques are described below for Wideband Code Division Multiple Access
(WCDMA), and 3GPP terminology is used in much of the description below.
15 [0014] Generally, connectivity to the radio access networks, for usage of
telecommunication services, is provided by service providers through a network of infrastructure
components, such as base transceiver stations (Node Bs), Radio Network Controllers (RNCs),
and Media Gateway (MGW). The network of infrastructure components work on one or more
standards of communication, such as Global System for Mobile Communication (GSM), Third
20 Generation (3G) standards, and Long Term Evolution (LTE). Based on such standards and the
infrastructure to support telecommunication services, the service providers provide connectivity
to the users at different geographic locations.
[0015] However, in spite of such network infrastructure capabilities being provided by
service providers, users often face connectivity issues while communication with other users, and
25 sometimes even strive to reach to different geographic locations that are within communicating
range of a nearest transceiver station of the service provider.
[0016] For the sake of explanation, a user of the radio access network who initiates a call
to communicate with another user is referred to as a caller party, and a user to whom the call is
directed, is referred to as a called party, hereinafter. It would also be appreciated that transceiver
30 stations, providing connectivity to user’s communication devices, may merely provide services
6
up to a limited geographic area, commonly known as its coverage area. Users outside the
coverage area of the transceiver station may either be served by another transceiver station, or in
absence of another transceiver station, may not be served at all. Geographic locations where
users may not be served at all due to being outside network coverage area of any transceiver
station 5 are referred to as dead zones, hereinafter.
[0017] In situations where a calling party, say party A, is in a conversation with a called
party, say party B, there may occur an instant when either of the calling party or the called party
may move to a dead zone and the call between them may get dropped. The user who may have
moved to the dead zone may not be able to connect the call with the other party until the user has
10 moved out of the dead zone and reached a location within coverage area of a transceiver station.
[0018] Also, in some situations, even though the users may be within the coverage area
of a transceiver station, signal strength received by their communication devices may drop to a
level lower than a predefined minimum threshold necessitated to establish a connection with the
nearest transceiver station. The drop in signal strength may occur due to various causes, like bad
15 weather, interference, etc., and would be understood by those skilled in the art. Therefore, if the
party A and party B are in a call and communicating with each other while being within the
coverage area, the signal strength received by any of their communication device may drop
below the minimum threshold, causing the call to drop. In such situations, the users may either
have to wait for the signal strength to be restored, or may have to move to a different geographic
20 location and establish the call again with the other party.
[0019] Since the time taken by the user to again reach within the coverage area or for the
signal strength to restore, may be highly unpredictable, the user may forget to call back the other
user when the telecommunication services are restored. Moreover, the user may also not know
whether appropriate conditions have been restored so that a call can be rescheduled. Therefore,
25 both parties may not speak again or continue the call instantaneously as soon as both of them can
reestablish the dropped call.
[0020] According to an implementation of the present subject matter, systems and
methods to generate a call back trigger in situations of a call drop in a RAN are described. In one
implementation of the present subject matter, the described system may implement the described
30 methods to generate call back trigger for dropped calls. The described systems and methods, on
7
one hand may generate a call back trigger to remind call back for dropped calls, on the other
hand, may also establish a call with other users in reference to dropped calls.
[0021] As described earlier, a call between two users, such as a first user and a second
user may be dropped due to various reasons, such as movement of a user into a dead zone, or
drop in signal strength received by communication device of the users to a level 5 l below the
minimum threshold. Therefore, in such situations, the described systems and methods may
identify a time instant when the user can reestablish the call with the other user and generate a
call back trigger for the user.
[0022] In case the first user has moved to a dead zone, time instant may be identified
10 when the first user arrives back into the coverage area and can reestablish the call to generate the
call back trigger. Similarly, if the signal strength of the communication device of the second user
had dropped below the minimum threshold, time instant may be identified when the signal
strength received by the second user’s communication device rises above the minimum threshold
and the second user can reestablish the call, such that the call back trigger can be generated.
15 [0023] In operation, the communication device of a user, say the first user, may identify
termination of a call between the first user and the second user. The termination of the call may
have occurred due to various reasons. For instant, the call may be terminated by the service
provider due to low credit in calling parties account. Also, the call may have terminated since
either of the user may have pressed an exit button to willingly terminate the call. Similarly, the
20 call may have also terminated due to movement of either of the user to a dead zone, or drop in
signal strength received by any of the user’s communication device. For the sake of explanation,
termination of call due to movement of either of the user to a dead zone, or drop in signal
strength received by any of the user’s communication device is referred to as ‘call drop’
hereinafter. It would be appreciated that the signal strength received by the communication
25 device may be indicative of capability of the communication device to connect to a nearest
transceiver station for establishing a call.
[0024] In one implementation, the communication device of the first user may determine
if the termination of the call is a call drop. In said implementation, the identification of
termination of the call to be the call drop may be based on call drop identification parameter.
8
Value of the Call drop identification parameter may allow the communication device to
determine the termination of the call to be the call drop.
[0025] Upon identification of the call to be the call drop, the communication device of
the first user may monitor the received signal strength to identify a time instant when the
received signal strength rises to a level more than the predetermined minimum 5 threshold. It
would be noted that in either of the situations, i.e., if the user moves into the dead zone, or while
he is within the coverage area and the signal strength drops, he would be able to reestablish a call
with the second user only when the signal strength received by the communication device is
more that the predetermined minimum threshold. Therefore, the communication device of the
10 first user may monitor the received signal strength to rise to a level more than the predetermined
minimum threshold.
[0026] In one implementation of the present subject matter, upon identification of the
received signal strength to be more that the predetermined minimum threshold, a call back
trigger to call back the second user may be generated. The call back trigger may be an alert, or a
15 reminder, for the first user, to call back the second user since the call can now be reestablished.
In one implementation, the call back trigger may be send through a message on the
communication device of the first user. In another implantation, the call back trigger may be a
configurable event which can be defined by the user. For example, the user may configure the
call back trigger to be a specific tone, or a specific vibration of the communication device.
20 [0027] In one implementation of the present subject matter, the call back trigger may also
be provided to secondary devices of the first user connected or coupled with the communication
device, such as headsets, wearable watches, and bands. For the sake of explanation, any
communication device coupled to the CD of the user may be a secondary device and can be used
for providing the call back trigger.
25 [0028] The described methodologies can be implemented within a communication device
in its hardware, firmware, software, or a combination thereof. For a hardware implementation,
the processing units can be implemented within one or more application specific integrated
circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs),
programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors,
9
controllers, micro-controllers, microprocessors, electronic devices, other electronic units
designed to perform the functions described herein, or a combination thereof.
[0029] It should be noted that the description merely illustrates the principles of the
present subject matter. It will thus be appreciated that those skilled in the art will be able to
devise various arrangements that, although not explicitly described 5 herein, embody the principles
of the present subject matter and are included within its spirit and scope. Furthermore, all
examples recited herein are principally intended expressly to be only for explanatory purposes to
aid the reader in understanding the principles of the invention and the concepts contributed by
the inventor(s) to furthering the art, and are to be construed as being without limitation to such
10 specifically recited examples and conditions. Moreover, all statements herein reciting principles,
aspects, and implementations of the invention, as well as specific examples thereof, are intended
to encompass equivalents thereof.
[0030] The manner in which the systems and methods of generating a call back trigger
for dropped calls shall be implemented has been explained in details with respect to the Fig. 1
15 and Fig. 2. While aspects of described systems and methods can be implemented in any number
of different computing systems, transmission environments, and/or configurations, the
implementations are described in the context of the following exemplary system(s).
[0031] It will also be appreciated by those skilled in the art that the words during, while,
and when as used herein are not exact terms that mean an action takes place instantly upon an
20 initiating action but that there may be some small but reasonable delay, such as a propagation
delay, between the initial action and the reaction that is initiated by the initial action.
Additionally, the words “connected” and “coupled” are used throughout for clarity of the
description and can include either a direct connection or an indirect connection. Thus, if a first
device couples to a second device, that connection may be through a direct electrical or
25 mechanical connection, through an indirect electrical or mechanical connection via other devices
and connections, through an optical electrical connection, or through a wireless electrical
connection. Various implementations of the present subject matter have been described below by
referring to several examples.
[0032] Fig. 1 illustrates a computing device for generation of a call back trigger in
30 situations of a call drop in a Radio Access Network (RAN). Fig. 1 illustrates a communication
10
network environment 100 implementation, describing a communication device (CD) of a user
102, in accordance with an implementation of the present subject matter. The CD 102 described
herein, can be implemented in any radio access network utilizing any known standard of
communication, such as GSM, 3G, and LTE. In one implementation the CD 102 may
communicate 5 with different mobile equipments (ME) 104-1, 104-2, 104-3, …, 104-N, through a
communication network 106. The ME 104-1, 104-2, 104-3, …, 104-N may be individually
referred to as ME 104, and commonly referred to as MEs 104 hereinafter.
[0033] Although the description herein is with reference to CD 102 of a calling party, the
methods and systems may be implemented in other MEs 104 of called parties as well, albeit with
10 a few variations, as will be understood by a person skilled in the art. The CD 102 may be
implemented as any known communication device capable of communicating in the RAN, such
as mobile phones, Smartphones, Tablets, Phablets, tabphones, hand held devices, personal digital
assistants (PDAs), and cell phones. The CD 102 described herein, can also be implemented in
any network environment comprising a variety of network devices, including base transceiver
15 stations (Node Bs), Radio Network Controllers (RNCs), and Media Gateway (MGW), etc.
[0034] The MEs 104 may be implemented as, but are not limited to, mobile phones,
Smartphones, Tablets, Phablets, Tabphones, hand held devices, personal digital assistants
(PDAs), cell phones, fixed mobile convergence equipments, hand-held devices, laptops or other
portable computers, fixed phones, and the like. MEs 104 may be stationary or mobile, and may
20 also be understood to be a mobile station, a terminal, an access terminal, a subscriber unit, a
station, etc.
[0035] The network 106 may be a wireless or a wired network, or a combination thereof.
The network 106 can be a collection of individual networks, interconnected with each other and
functioning as a single large network (e.g., the internet or an intranet). Examples of such
25 individual networks include, but are not limited to, Global System for Mobile Communication
(GSM) network, Universal Mobile Telecommunications System (UMTS) network, Personal
Communications Service (PCS) network, Time Division Multiple Access (TDMA) network,
Code Division Multiple Access (CDMA) network, Next Generation Network (NGN), Public
Switched Telephone Network (PSTN), and Integrated Services Digital Network (ISDN).
30 Depending on the technology, the network 106 includes various network entities, such as
11
transceivers, gateways, and routers; however, such details have been omitted for ease of
understanding.
[0036] In one implementation, the CD 102 includes processor(s) 112. The processor 112
may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital
signal processors, central processing 5 ng units, state machines, logic circuitries, and/or any devices
that manipulate signals based on operational instructions. Among other capabilities, the
processor(s) is configured to fetch and execute computer-readable instructions stored in the
memory.
[0037] The functions of the various elements shown in the figure, including any
10 functional blocks labeled as “processor(s)”, may be provided through the use of dedicated
hardware as well as hardware capable of executing software in association with appropriate
software. When provided by a processor, the functions may be provided by a single dedicated
processor, by a single shared processor, or by a plurality of individual processors, some of which
may be shared. Moreover, explicit use of the term “processor” should not be construed to refer
15 exclusively to hardware capable of executing software, and may implicitly include, without
limitation, digital signal processor (DSP) hardware, network processor, application specific
integrated circuit (ASIC), field programmable gate array (FPGA), read only memory (ROM) for
storing software, random access memory (RAM), non-volatile storage. Other hardware,
conventional and/or custom, may also be included.
20 [0038] Also, the CD 102 includes interface(s) 114. The interfaces 114 may include a
variety of software and hardware interfaces that allow the CD 102 to interact with the entities of
the network 106, or with each other. The interfaces 114 may facilitate multiple communications
within a wide variety of networks and protocol types, including wireless networks, wireless
Local Area Network (WLAN), RAN, satellite-based network, etc.
25 [0039] The CD 102 may also include a memory 116. The memory 116 may be coupled to
the processor 112. The memory 116 can include any computer-readable medium known in the
art including, for example, volatile memory, such as static random access memory (SRAM) and
dynamic random access memory (DRAM), and/or non-volatile memory, such as read only
memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and
30 magnetic tapes.
12
[0040] Further, the CD 102 may include module(s) 118 and data 120. The modules 118,
amongst other things, include routines, programs, objects, components, data structures, etc.,
which perform particular tasks or implement particular abstract data types. The modules 118 may
also be implemented as, signal processor(s), state machine(s), logic circuitries, and/or any other
device or component that manipulate 5 nipulate signals based on operational instructions.
[0041] Further, the modules 118 can be implemented in hardware, instructions executed
by a processing unit such as the processor 112, or by a combination thereof. The processing unit
can comprise a computer, a processor, a state machine, a logic array, or any other suitable
devices capable of processing instructions. The processing unit can be a general-purpose
10 processor which executes instructions to cause the general-purpose processor to perform the
required tasks or, the processing unit can be dedicated to perform the required functions.
[0042] In another aspect of the present subject matter, the modules 118 may be machinereadable
instructions which, when executed by a processor/processing unit, perform any of the
described functionalities. The machine-readable instructions may be stored on an electronic
15 memory device, hard disk, optical disk or other machine-readable storage medium or nontransitory
medium. In one implementation, the machine-readable instructions can be also be
downloaded to the storage medium via a network connection.
[0043] In an implementation, the module(s) 118 includes an analysis module 122, a
monitoring module 124, a triggering module 126, and other module(s) 128. The other module(s)
20 128 may include programs or coded instructions that supplement applications or functions
performed by the CD 102. In said implementation, the data 120 includes signal data 130, location
data 132, triggering data 134, and other data 136. The other data 136, amongst other things, may
serve as a repository for storing data that is processed, received, or generated as a result of the
execution of one or more modules in the module(s) 118. Although the data 120 is shown internal
25 to the CD 102, it may be understood that the data 120 can reside in an external repository (not
shown in the figure), which may be coupled to the CD 102. The CD 102 may communicate with
the external repository through the interface(s) 114 to obtain information from the data 120.
[0044] The different implementations, examples, and conditions explained hereinafter are
made based on considering the user of the CD 102 to be the first user and the calling party; and
30 the user of either of the MEs 104 to be the second user and the called party. The same may also
13
be implemented considering the user of the ME 104 to be the calling party and the user of the
CD102 to be the called party, albeit a few variations, as would be apparent to those skilled in the
art.
[0045] In an implementation of the present subject matter, the analysis module 122 of the
CD 102 may identify termination 5 ination of a call between the first user, and the second user. The call
may either be an audio call, or may be a multimedia call between the first user and the second
user.
[0046] The call between the first user and the second user may be terminated due to
various reasons. In one example, the call may be intentionally terminated by either of the users.
10 In another example, the call may be terminated by the service provider due to various reasons
like low available credit in account of either of the users, network congestion, etc. In another
example of the present subject matter, the call termination may be a call drop.
[0047] The call drop may occur when either of the users may either enter into a dead
zone, or may not receive sufficient signal strength from a nearest transceiver station. For
15 example, if the first user is travelling and moves out of a coverage area of any transceiver station
into a dead zone, the termination of the call between the first user and the second user may be a
call drop. Similarly, if the first user is within the coverage area of a nearest transceiver and still
looses signal strength die to some reason such that the signal strength received by the CD 102
drops to a level below a predefined minimum threshold, the termination of call may be a call
20 drop.
[0048] According to an implementation of the present subject matter, the analysis module
122 may determine if the termination of the call between the first user and the second user is a
call drop based on call drop identification parameter. In one implementation, the call drop
identification parameter may be defined as a function of the signal strength received by the CD
25 102 of the first user. Since in either of the situations, either when the user moves to a dead zone,
or the signal strength drops to a level below the predefined minimum threshold, the signal
strength would drop, and therefore the call drop identification parameter may be based on the
signal strength. Accordingly, if the signal strength is at a level below the predefined minimum
threshold, the value of the call drop identification parameter may be defined to be negative, and
30 if the signal strength is at a level above the predefined minimum threshold, the value of the call
14
drop identification parameter may be defined to be positive. Therefore, in case the value of the
call drop identification parameter is identified to be negative, the termination of the call may be
determined to be the call drop.
[0049] In another implementation of the present subject matter, the call drop
identification parameter may 5 y also be defined as a function of signal strength and location of the
CD 102. Based on location and signal strength of the user, the analysis module may identify
value of the call drop identification parameter, and may identify the termination of the call to be
a call drop.
[0050] In an example, if the analysis module of the CD 102 identifies the signal strength
10 received by the CD102 to be in a range of about -105 to -80 dBm, the value of the call drop
identification parameter may indicate the termination of the call to be a call drop and the analysis
module 122 may identify the termination to be the call drop.
[0051] The identification of the termination of the call to be the call drop may provide
the CD 102 with an indication that the call may have ended abruptly and the termination was not
15 intentional by any of the users. Therefore, in one implementation of the present subject matter,
the monitoring module 124 of the CD 102 may start monitor the signal strength received by the
CD 102. It would be appreciated that if signal strength received by the CD 102 rises above the
predefined minimum threshold, the CD 102 may be able to connect to the communication
network 106 and reestablish the call with the second user.
20 [0052] Therefore, in said implementation, the triggering module 126 may generate a call
back trigger to call back the second user when the monitoring module identifies the signal
strength received by the CD102 to be above the predefined minimum threshold. For example, if
the monitoring module 124 identifies the signal strength to be above -79 dBm, the triggering
module 126 may generate a call back trigger to alert the first user to reestablish a call with the
25 second user.
[0053] In an implementation of the present subject matter, the triggering module 126
may wait for a predetermined time period prior to generating the call back trigger. For example,
if the signal strength is identified to be above the predefined minimum threshold for 10 seconds,
the triggering module 126 may generate the call back trigger for the first user.
15
[0054] The call back trigger may be an alert or a reminder that may remind the user to
reestablish the dropped call. In one implementation, the call back trigger may be provided in
different modes to the first user. For instance, the call back trigger may be a message popup on
display screen of the CD 102. The call back trigger may also be a tone that may be played by the
triggering 5 module 126 through the speaker of the CD 102. Also, the call back trigger can be a
vibration pattern for the CD 102. Therefore, the call back trigger may be provided in different
modes to the users, and may not be limited any particular mode.
[0055] Further, the call back trigger may also be configured by the user based on their
choices and preferences. For example, the first user may choose the call back trigger to be either
10 a tone or a message on the display of CD 102. The first user may also choose the CD 102 to
vibrate in a particular pattern to indicate the call back trigger for call back to the second user.
[0056] In an illustrative example, the first user utilizing the CD 102 may be in a call with
the second user utilizing the ME 104-1. The first user may also be travelling and may suddenly
move into a dead zone. In such a situation, the call between the first user and the second user
15 may get terminated. The analysis module 122 of the CD 102 may identify the call drop
identification parameter to identify the termination of the call to be a call drop.
[0057] Upon identification of the termination of the call to be the call drop, the
monitoring module 124 of the CD 102 may initiate monitoring of the signal strength received by
the CD 102. It would be appreciated that the CD 102 may not receive any signals until the first
20 user is within the dead zone. Once the first user travels out of the dead zone and starts receiving
signals from a nearest transceiver station, the monitoring module 124 may identify rise in signal
strength received by the CD 102. In case the signal strength rises above the predefined minimum
threshold, the triggering module 124 may generate a call back trigger for the first user to
reestablish a call with the second user.
25 [0058] As described above, the triggering module 126 may also wait for the
predetermined time period prior to generating the call back trigger. The wait for the
predetermined time period may allow the triggering module 126 to identify that the signal
strength is appropriate for the CD 102 to reestablish the call with the second user.
[0059] In one implementation of the present subject matter, the triggering module 126
30 may also provide the call back trigger, to a secondary device coupled to the CD 102. For
16
example, the user may utilize a wireless headset, or a wearable device along with the CD 102. In
such situations, the triggering module 126 may provide the call back trigger onto the secondary
device for the user to take appropriate action.
[0060] In an example of the present subject matter, the triggering module 126 may also
initiate the call back with the second user upon generation of the call back trigger. 5 r. In said
example, the triggering module 126 may generate the call back trigger for the first user and may
then reestablish the call with the second user. The reestablishment of the call may either be
initiated based on an input received from the first user, or may be preconfigured as a function of
the triggering module 126 to occur after a preconfigured time period.
10 [0061] For example, the triggering module 126 may be configured to automatically
initiate the call back with the second user upon generation of the call back trigger. In another
example, upon generation of the call back trigger, the user may provide an input to the triggering
module 126 for generation of the call back, and the triggering module 126 may reestablish the
call between the first user and the second user.
15 [0062] Fig. 2 illustrates a method 200 for generating a call back trigger for call back in
call drop situations, according to an implementation of the present subject matter. The order in
which the method 200 is described is not intended to be construed as a limitation, and any
number of the described method blocks can be combined in any order to implement the method
200, or any alternative methods. Additionally, individual blocks may be deleted from the method
20 without departing from the scope of the subject matter described herein. Furthermore, the
method can be implemented in any suitable hardware, software, firmware, or combination
thereof.
[0063] The method may be described in the general context of computer executable
instructions. Generally, computer executable instructions can include routines, programs, objects,
25 components, data structures, procedures, modules, functions, etc., that perform particular
functions or implement particular abstract data types. The method may also be practiced in a
distributed computing environment where functions are performed by remote processing devices
that are linked through a communications network. In a distributed computing environment,
computer executable instructions may be located in both local and remote computer storage
30 media, including memory storage devices.
17
[0064] For the purpose of explanation, the method has been explained from the
perspective of a communication device (CD) of a first user communicating through a call with a
second user. It would be understood that the method may also be implemented on other
communication devices, such as that of the second user, albeit a few variations, as would be
5 understood by those skilled in the art.
[0065] A person skilled in the art will readily recognize that steps of the method can be
performed by programmed computers. Herein, some implementations are also intended to cover
program storage devices, for example, digital data storage media, which are machine or
computer readable and encode machine-executable or computer-executable programs of
10 instructions, where said instructions perform some or all of the steps of the described method.
The program storage devices may be, for example, digital memories, magnetic storage media,
such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data
storage media. The implementations are also intended to cover both communication network and
communication devices configured to perform said steps of the exemplary methods.
15 [0066] Referring to Fig. 2, at block 202, termination of a call may be identified on a first
user’s communication device (CD). The call may be between the first user and a second user. In
one implementation, the termination of the call may be due to various reasons, such as
intentional termination by either the first user or the second user, termination by the service
provider due to low credit in account of either of the first user or the second user, and
20 termination due to low signal strength received by either of the first user or the second user.
[0067] At block 204, the termination of the call may be determined to be a call drop. In
one implementation, the determination may be based on value of a call drop identification
parameter. The call drop identification parameter value may be defined to be based at least on
the signal strength received by the users. Based on the signal strength received by the CD of the
25 user, the value for the call drop identification parameter may be determined, and based on which
the termination of the call may be determined to be the cal drop. For example, in case the
termination of the call is being determined at the CD of the first user, call drop identification
parameter may be identified based on the signal strength received by the CD of the first user. In
one implementation, if the signal strength is at a level below a predefined minimum threshold,
30 the value of the call drop identification parameter may be defined to be negative, and if the signal
18
strength is at a level above the predefined minimum threshold, the value of the call drop
identification parameter may be defined to be positive. Therefore, in case the value of the call
drop identification parameter is identified to be negative, the termination of the call may be
determined to be the call drop.
[0068] In another implementation of the present subject matter, the 5 call drop
identification parameter may also be defined as a function of signal strength and location of the
CD. Based on location and signal strength, value of the call drop identification parameter may be
determined, and the termination of the call may be determined to be the call drop.
[0069] At block 206, the signal strength received by the first user’s communication
10 device is monitored. The signal strength may provide the indication whether the call can be
reestablished with the second user. It would be appreciated that if the signal strength received by
the CD of the first user is above the predefined minimum threshold, the call can be reestablished
between the first user and the second user.
[0070] At block 208, a call back trigger may be initiated upon identifying the signal
15 strength to be above the level of the predefined minimum threshold. In one implementation is
provided to the CD of the first user. In another implementation, the call back trigger may be
provided to a secondary device of the first user, such as a wireless headset and a wearable
device.
[0071] Although the subject matter has been described with reference to specific
20 implementations, this description is not meant to be construed in a limiting sense. Various
modifications of the disclosed implementations as well as alternate implementations of the
subject matter, will become apparent to persons skilled in the art upon reference to the
description of the subject matter. It is therefore contemplated that such modifications can be
made without departing from the scope of the present subject matter as defined.
19
I/We claim:
1. A method to generate a call back trigger in event of a call drop in a Radio Access
Network (RAN), the method comprising:
identifying termination of a call on a first user’s communication device (5 CD),
wherein the call is between the first user and a second user;
determining the termination of the call to be a call drop based on value of a call
drop identification parameter, wherein the call drop identification parameter is indicative
of signal strength received by the first user’s CD;
10 monitoring signal strength received by the first user’s CD, wherein the signal
strength is indicative of capability of the first user’s CD to connect to a nearest
transceiver station; and
generating a call back trigger based on the monitoring, wherein the signal strength
is above a predefined minimum threshold.
15
2. The method as claimed in claim 1, wherein the method further comprises establishing
another call between the first user and the second user based on the call back trigger.
3. The method as claimed in claim 2, wherein the another call is established upon receiving
20 an input from the first user’s CD.
4. The method as claimed in claim 1, wherein the call is one of an audio call and a
multimedia call.
25 5. The method as claimed in claim 1, wherein the call drop is due to movement of the first
user to a dead zone, wherein the dead zone is a region of no network coverage by the nearest
transceiver station.
6. The method as claimed in claim 1, wherein mode of the call back trigger is configured by
30 the first user based on user preferences.
20
7. The method as claimed in claim 1, wherein the method further comprises providing the
call back trigger to a secondary device of the first user.
8. A Communication Device (CD) (102) to generate a call back trigger in an event of a call
drop in a RAN, 5 AN, the CD (102) comprising:
a processor (112);
an analysis module (122) coupled to the processor (112) to:
identify termination of a call connected through the CD (102), wherein the
call is between a first user and a second user, and wherein the first user utilizes
10 the CD (102); and
determine the termination of the call to be a call drop based on value of a
call drop identification parameter, wherein the call drop identification parameter
is indicative of signal strength received by the CD (102);
a monitoring module (124) coupled to the processor (112) to monitor signal
15 strength received by the CD (102), wherein the signal strength is indicative of capability
of the CD (102) to connect to a nearest transceiver station; and
a triggering module (126) coupled to the processor (112) to generate a call back
trigger based on the monitored signal strength, wherein the signal strength is above a
predefined minimum threshold.
20
9. The CD (102) as claimed in claim 8, wherein the triggering module (126) is to further
establish another call between the first user and the second user based on the call back trigger.
10. The CD (102) as claimed in claim 9, wherein the triggering module (126) is to establish
25 the another call after a preconfigured time period.
11. The CD (102) as claimed in claim 8, wherein the call drop is due to drop in signal
strength received by the CD (102) to a level below a predefined minimum threshold.
30 12. The CD (102) as claimed in claim 8, wherein the triggering module (126) is to further
provide the call back trigger to a secondary device coupled to the CD (102).
21
13. The CD (102) as claimed in claim 8, wherein the secondary device is at least one of a
wearable device and a Bluetooth communicating device.
14. A computer-readable medium having embodied thereon a computer program 5 for
executing a method, the method comprising:
identifying termination of a call on a first user’s communication device (CD),
wherein the call is between the first user and a second user;
determining the termination of the call to be a call drop based on value of a call
10 drop identification parameter, wherein the call drop identification parameter is indicative
of signal strength received by the first user’s CD;
monitoring signal strength received by the first user’s CD, wherein the signal
strength is indicative of capability of the first user’s CD to connect to a nearest
transceiver station; and
15 generating a call back trigger based on the monitoring, wherein the signal strength
is above a predefined minimum threshold.
15. The computer-readable medium as claimed in claim 14, wherein the method further
comprises establishing another call between the first user and the second user based on the call
20 back trigger.
Dated 28 July 2014
JAYA PANDEYA
25 IN/PA-1345
Agent for the Applicant
To,
The Controller of Patents