Methods of incorporating an ad hoc cellular network into a fixed cellular network
11147079 · 2021-10-12
Assignee
Inventors
- Rajesh Kumar Mishra (Westford, MA)
- Steven Paul Papa (Windham, MA)
- Kaitki Agarwal (Westford, NH)
- Sridhar Donepudi (Nashua, NH)
Cpc classification
Y02D30/70
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
H04W84/18
ELECTRICITY
H04W88/10
ELECTRICITY
H04W16/00
ELECTRICITY
H04W24/08
ELECTRICITY
H04W84/02
ELECTRICITY
H04W16/14
ELECTRICITY
H04W4/90
ELECTRICITY
H04L12/66
ELECTRICITY
H04W88/04
ELECTRICITY
H04L12/4633
ELECTRICITY
H04W72/20
ELECTRICITY
International classification
H04W84/02
ELECTRICITY
H04W16/00
ELECTRICITY
H04L12/66
ELECTRICITY
H04W24/08
ELECTRICITY
Abstract
In this invention, we disclose methods of establishing a cellular network having backhaul flexibility, comprising, establishing, at a first cellular base station, a first connection with a core cellular network; establishing, at the first cellular base station, an inter-base station connection with a second cellular base station for relaying traffic from the first and the second cellular base stations to the core cellular network, the second cellular base station having a second connection with the core cellular network; determining, at the first cellular base station, if the quality of the first connection falls below a threshold parameter; and terminating, at the first cellular base station, the first connection in favor of the second connection if the quality of the first connection falls below the threshold parameter.
Claims
1. A method of establishing a cellular network having backhaul flexibility, comprising: establishing, at a first cellular base station, a first connection with a core cellular network; establishing, at the first cellular base station, an inter-base station connection with a second cellular base station for relaying traffic from the first and the second cellular base stations to the core cellular network, the second cellular base station having a second connection with the core cellular network; determining, at the first cellular base station, if the quality of the first connection falls below a threshold parameter; terminating, at the first cellular base station, the first connection in favor of the second connection when the quality of the first connection falls below the threshold parameter; and providing at the first cellular base station, a local limited core network when a quality of a backhaul connection falls below the threshold parameter, wherein the first and the second connection with the core cellular network are backhaul connections, wherein the first cellular base station comprises a multi-RAT node supporting at least one of a 5G RAT or a combination 4G RAT and a 5G RAT.
2. The method of claim 1, wherein the threshold parameter is determined by aggregating more than one threshold parameter and averaging the aggregated threshold parameter.
3. The method of claim 1, wherein the threshold parameter is one of a received signal power, a frequency error, a time alignment, a signal-to-noise ratio, a fraction of maximum throughput for a given signal-to-noise ratio, a number of hybrid automatic retransmission request retransmissions, a data rate, an interference level, a network load level, a congestion level, and a latency.
4. The method of claim 1, wherein the threshold parameter is or is derived from a received signal strength indicator.
5. The method of claim 1, wherein the inter-base station connection is established using a cellular protocol or Wi-Fi protocol.
6. The method of claim 1, further comprising terminating, at the second cellular base station, the second connection in favor of the first connection when the quality of the first connection falls below the threshold parameter.
7. The method of claim 1, further comprising determining if either the first or the second connection should be given priority treatment based on the threshold parameter.
8. The method of claim 1, further comprising establishing the inter-base station connection while measuring and analyzing operational parameters of an existing cellular network.
9. The method of claim 1, further comprising establishing the inter-base station connection while analyzing a speed of the second cellular base station.
10. The method of claim 1, further comprising establishing the inter-base station connection while querying a local or remote cache of a backhaul or access configuration of the second cellular base station.
11. The method of claim 1, further comprising determining if a backhaul or access configuration of one of the first or the second cellular base station should be updated.
12. The method of claim 1, further comprising providing a local limited core network when both the first and the second connection to the core cellular network fall below the threshold parameter.
13. The method of claim 12, wherein providing a local limited core network further comprises providing authentication and packet gateway functionality.
14. The method of claim 13, wherein providing a local limited core network further comprises receiving authentication information from a core network database having core authentication information stored therein; storing the authentication information in a memory; and using the authentication information to authenticate a user equipment.
15. The method of claim 14, further comprising receiving the authentication information from a home subscriber server HSS in the core cellular network, and wherein the authentication information is one of a service set identifier and an international mobile equipment identifier.
16. The method of claim 15, further comprising synchronizing updated authentication information with the HSS upon restoration of a connection to the core cellular network.
17. The method of claim 1, further comprising providing ad hoc networking capability to each of a plurality of radio access technologies at the first cellular base station.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
DEFINITIONS
(13) Ad hoc cellular base stations can be mobile, stationary, or part of a semi-permanent installation. The difference between an ad hoc node and a fixed cellular base station is ad hoc cellular base stations can be easily moved. They may remain at a particular location for many months, but they are designed to be moved easily. Ad hoc cellular base stations are dynamic, heterogeneous nodes. Ad hoc cellular base stations may have computer readable instructions stored in memory that allow them to seamlessly integrate into existing cellular networks or to provided limited local wireless and core network functionality or services.
(14) Ad hoc cellular network is a stand-alone network of ad hoc cellular base stations. These networks can be used by consumers, businesses, or for special purposes. Additionally they can be integrated into fixed networks. They can provide coverage in rural areas. They can enhance coverage of fixed networks. And they can be used to provide network services in areas where there is no network or where a natural or man-made disaster has destroyed part or all of a fixed network.
(15) Cellular means operates within a standards compliant network.
(16) Characteristic means the network quality experienced by a user, which can be affected by network load, congestion, latency, or capacity.
(17) Destination ad hoc cellular base station means an ad hoc or fixed cellular base station that can receive a hand-in. A destination ad hoc cellular base station can be stationary or mobile.
(18) Dynamic heterogeneous node means a node that is able to dynamically alter an operational mode or an operational parameter.
(19) Environmental condition means radio frequency interference, temperature, precipitation, or other weather related metric.
(20) EPC means an evolved packet core.
(21) Fixed cellular base stations or fixed cellular nodes or fixed base stations are part of a fixed infrastructure. Their installation typically requires advanced planning, which means they are not ad hoc base stations or nodes.
(22) Fixed cellular networks or fixed networks are comprised of fixed cellular base stations or fixed cellular nodes.
(23) Heterogeneous means being diverse in character or content.
(24) Heterogeneous network means a network that is diverse in at least one of the following operational modes: frequency, protocol, duplexing scheme, wired versus wireless connection, or licensed versus unlicensed spectrum
(25) Heterogeneous node means a node that can establish a heterogeneous network.
(26) HSS means a home subscriber server.
(27) Limited core network functionality means a processor having at least one of the following functionalities: paging, handover, authentication, location management, SGW selection, radio resource management, mobility management, roaming management, tracking area management, mobility anchor, lawful interception, policy enforcement, packet filtering, charging, or providing an anchor between 3GPP and non 3GPP technologies.
(28) MME means mobility management entity.
(29) Neighboring cellular base station could be a fixed base station or an ad hoc base station.
(30) Operational parameter means radio frequency, mobility, network load, network configuration, access configuration, backhaul configuration, interference, or power level.
(31) PGW means a packet data network gateway.
(32) PCRF means a policy and charging rules function.
(33) PDN means a packet data network.
(34) SGW means a switching gateway.
(35) Source ad hoc cellular base station means an ad hoc or fixed cellular base station from which a hand-off can be performed. A source ad hoc cellular base station can be stationary or mobile.
DETAILED DESCRIPTION
(36)
(37) In the public safety communication network 100, range problems are further compounded in the United States by the fact that most public safety communication networks 100 are owned and operated by individual towns, cities, municipalities, and the like. This results in a lack of uniformity nationwide and an inability to leverage infrastructure from surrounding localities. Some of the public safety communications networks 100 in various countries are private networks, and some are run by commercial network operators, an example of one being Verizon or AT&T in the US. These communication networks 100 most typically support the use of land mobile radios, although some public safety networks 100 are capable of supporting smart phones used by public safety personnel.
(38) In contrast to the prior art fixed infrastructure networks and the prior art of ad hoc military networks, the present invention is designed to utilize a mobile cellular base station to create an ad hoc cellular network as a stand-alone network or as a network that seamlessly integrates with existing cellular network infrastructure. Although this application uses the term “mobile” it will be understood by those skilled in the art that a mobile cellular base station may, at times, be mobile, and at other times may be stationary. The distinction between a “mobile cellular base station” as used in this application and a traditional stationary base station. Examples of stationary nodes are fixed tower base stations, fixed small cells, or a COW (cell on wheels). These types of base stations are not routinely moved, whereas the mobile cellular base stations described herein can be routinely moved. In terms of mobility, mobile cellular base stations could be carried by any number of moving entities such as: a vehicle, an airplane, a drone, a helicopter, a hot air balloon, a person, an animal, a boat, a snow mobile, a dirigible, a blimp, a train, a motorcycle, or a robot.
(39) The process of creating, maintaining, or enhancing an ad hoc cellular network with a mobile cellular base station, alternatively called a mobile ad hoc cellular base station is challenging because mobile cellular base stations are not part of the fixed infra-structure. The fixed infrastructure makes many assumptions when operating that result from the base stations therein being pre-planned and fixed. The installation, operational parameters, antenna characteristics, interference patterns, access and backhaul configurations of ad hoc cellular base stations are not preplanned. An ad hoc cellular base stations can change their location at any time.
(40) Adding a ad hoc cellular base station to an existing cellular network in a way that enhances overall network capability requires considering which access and backhaul configurations should be offered, what the transmission power of the mobile ad hoc cellular base station should be, how the fixed cellular network should respond, and in some instances, deciding whether to include limited core network functionality within the mobile ad hoc cellular base stations so that they can perform some of the functions of the core network operational devices. In LTE for example, a core network operational device could be an EPC. If a mobile ad hoc cellular base station did include limited core network functionality within its processor, for an LTE network, these functionalities would include: the HSS, the SGW, the PGW, or the MME. Those of skill in the art will recognize that these functionalities may be assumed by different entities within different networks outside of an LTE network. Embodiments of the limited core network functionality could therefore be adapted to meet the functionalities of these additional networks.
(41) One of the novel aspects of the methods described herein is, they take these issues into consideration before and during the establishment of an ad hoc cellular network. Another point of novelty in the methods disclosed herein is the fact that they are executed on multi-RAT nodes. Because the nodes have multiple access and backhaul radios built-in, the choice of which access or which backhaul configuration to adopt is fluid and can be determined by the network conditions in real-time.
(42) The concept of multiple radio access technology will also be defined. The term “radio access technology” indicates the type of radio technology used to access a core network. Multiple radio access technology, or multi-RAT, is a radio technology capable of operating in varying parameters. These varying radio parameters could be, for example, different protocols, different duplexing schemes, different media access methods, disparate frequency bands, and the like. The multi-RAT nodes, upon which SON embodiments operate are dynamic mesh nodes. A multi-RAT node may include one or more “Gs,” including 2G, 3G, 4G, 5G and Wi-Fi. Where the present disclosure mentions any RAT, such as 2G/3G/4G/5G/Wi-Fi, it is understood that any other RAT could be substituted. E.g., any combination of 2 RATs, any combination of 3 RATs, etc. is enabled by the present disclosure; interworking between any 2 RATs is enabled by the present disclosure; virtualization of any RAT at the core (stand-alone or non-standalone) or at the RAN to appear as another RAT is enabled by the present disclosure; changing of operational parameters of any RAT based on environment variables of any RAT is contemplated; addition of one or more additional RF chains is contemplated, in some embodiments, to support the processing requirements of any particular RAT, which in combination with the multi-RAT architecture disclosed herein enables a multi-RAT node with any combination of RATs.
(43) In addition, the multi-RAT nodes work cooperatively in some embodiments with a computing cloud component. The computing cloud component is able to bring a “God's view,” that is a high level management perspective, to the ad hoc cellular network. Some of the network management intelligence resident in the computing cloud is also resident in processors of the multi-RAT nodes. Accordingly, either of these computer mediums can make decisions about access or backhaul configurations, choosing different frequency bands, such as, but not restricted to, 2G, 3G, 4G, LTE, Wi-Fi, high speed Wi-Fi, TV white space, satellite, Bluetooth, ZigBee, licensed or unlicensed spectrum, wired or wireless connectivity, and the like, different communication protocols, duplexing schemes e.g., FDD, TDD, Full Duplex and the like, as well as transmit power levels, antenna orientations, and in the case of phased array antennas, transmission power characteristics.
(44) In addition, ad hoc cellular base stations as described herein are able to provide multimedia services, not just voice, data or Internet services. The intelligence that is imbued to the ad hoc cellular networks facilitates data prioritization, that is prioritizing data for first responders in a public safety environment while additionally allowing simultaneous lower priority users to access additional network bandwidth if available. Priority can mean capacity guarantees, decisions regarding resolution of image, audio, video transmissions, or data download speeds. These management decisions can be applied to both access and backhaul configurations.
(45) Access and backhaul configurations can further utilize encryption to provide secure data transmissions. Moreover, secured authorizations similar to those used by VPN can be implemented. Ad hoc cellular base stations executing the methods described herein have a memory within their architecture. As such, they are able to cache data packets. If there is a path failure, these cached data packets can be retransmitted. In addition, authentication credentials can be cached. These too can be used to reauthenticate in the event of a path loss or a network failure.
(46)
(47) The embodiments described herein enhance network coverage by creating and maintaining an ad hoc cellular network, or extending the range of a fixed network. They also create a multi-dimensional heterogeneous networks having redundancy and autonomy. When the ad hoc cellular base stations utilizing embodiments discussed herein establishes or enhances a fixed cellular network, it they so by seamlessly integrating into the fixed network topology. If there is an existing fixed network, the methods disclosed herein provide a means of automating the integration of the ad hoc cellular into an existing fixed network. This is currently done by humans as part of network planning and implementation. The overall orchestration of adding to an existing fixed network, both from the standpoint of connecting the two networks, and from the standpoint of managing the combined networks is a labor intensive process that is automated by the method embodiments of this invention.
(48) These embodiments could be executed and run on networks having a topology similar to that depicted in
(49) Assume that
(50) Additional variations of this topology include additional ad hoc nodes 222 and 224, the absence of the fixed node 207 and/or the absence of macro tower 202. In addition, although
(51) Assume for purposes of this example that the fire fighters and police officers share the macro tower 202, either by sharing a base station mounted on the tower or by mounting two independent base stations, one providing coverage to the fire fighters and one providing coverage to the police officers. When the first responders arrive at the scene they notice that the macro coverage boundary 212 does not reach inside of the burning building 230. This means, once they are inside of the building 230, they will not have external cellular network connectivity. If their radios do not have applications that allow them to function in peer-to-peer mode or if those radios do not have transmit and receive capabilities that would work anywhere in the building, the first responders will not be able to communicate with one another.
(52) When the ad hoc cellular base station 220 is en route to the burning building 230, it could have a backhaul configurations, such as LTE or Wi-Fi, which would allow it to provide an access signal having for example Wi-Fi as the access configuration to individuals within the vehicle containing the ad hoc cellular base station 220. Applicants note that the methods described herein could be executed on a computer readable medium located within the ad hoc cellular base station 220, on another device in the exiting wireless network, on a computing cloud component 204, or on a fixed base station 207.
(53)
(54) Referring to
(55) In some embodiments and without limitation, hardware configurations could be as follows. At least one access radio 340 could be a 20 MHz 2×2 MIMO LTE radio transmitting at 1 W of power. A second access radio 340 could be a Wi-Fi access radio, 3×3 MIMO WPA 2 Enterprise. One of the backhaul radios 310 could be a multi radio mesh, up to 3×3 MIMO, 40 MHz wide, and WPA 2 enterprise grade encryption, another example of a backhaul radio could be cellular backhaul radios. The ad hoc cellular base station 300 could also include connectors for long haul link support and antennas. In some embodiments antennas could be high gain/narrow beam or omni/sectored antenna, or omni antennas. Moreover, the hardware depicted in
(56) The limited core network functionality could include at least one of the following network operation functions: paging, handover, authentication, location management, SGW selection, radio resource management, mobility management, roaming management, tracking area management, mobility anchor, lawful interception, policy enforcement, packet filtering, charging, or providing an anchor between 3GPP and non 3GPP technologies.
(57)
(58) In the method of this embodiment, the first step could be analyzing 402 a speed of the ad hoc cellular base station 300. This analysis could be performed by using a velocity measurement obtained from GPS 314, by using location data or direction data of the ad hoc cellular base station 300 as a function of time, to determine if the ad hoc cellular base station 300 has become stationary. Once the ad hoc cellular base station 300 becomes stationary, the computer readable medium in a processor 324 could query 404 a local or remote cache to determine an access configuration or a first backhaul configuration to be used by the ad hoc cellular base station 300.
(59) As discussed, the access configuration or backhaul configuration could be at least one of the following: 2G, 3G, 4G, LTE, Wi-Fi, high speed Wi-Fi, TV white space, satellite, Bluetooth, ZigBee, FDD, TDD, full duplex, wired or wireless backhaul, and licensed and unlicensed spectrum. In some embodiments, the choice of which access configuration or backhaul configuration could be related to an available power source for the ad hoc cellular base station 300. For example, if the ad hoc cellular base station 300 is connected to a car battery, it likely has more transmit and receive power than if it is connected to a battery cell. The amount of available power, limited by battery life, could be a factor used to determine which access or backhaul configuration should be used. Moreover, this decision could be made dynamically because available power may change.
(60) After querying the local or remote cache, the processor 324 could receive 406 an access configuration or a backhaul configuration. The processor 324 may then evaluate 408 an operational parameter and determine 410 if the access configuration or the backhaul configuration should be updated. Once a final access configuration or backhaul configuration is chosen, the ad hoc cellular node 300 could transmit 460 an access signal or a backhaul signal.
(61) In an alternate embodiment, the access configuration and the backhaul configuration could be within the same frequency and band or exactly the same frequency and band, e.g., LTE Band 14 used for access and backhaul. In another alternate embodiment, the access configuration or the backhaul configuration could be full duplex. In a variation of this embodiment, a second ad hoc cellular base station could be added to the ad hoc cellular network. In this embodiment, the ad hoc cellular base station could establish a second backhaul connection between itself and the second ad hoc cellular base station. This second backhaul link could have a cellular or mesh protocol.
(62) In an additional embodiment, the access or backhaul configuration could be determined based on an operational parameter. In yet another embodiment, the ad hoc cellular base station could authenticate a user equipment within the ad hoc cellular network by using information from an already authenticated user concerning additional users within the ad hoc cellular network. This already authenticated user may, for example, have identifying information about other users within the ad hoc cellular network.
(63) Referring again to
(64) In an alternate embodiment, after transmitting 460 the access signal or the backhaul signal, the ad hoc cellular base station could alter 430 a power level of one of its access radios or one of its backhaul radios. It could then use 432 a wireless mesh backhaul connection within the ad hoc cellular network. The ad hoc cellular node could then alter 434 an antenna configuration so as to more optimally transmit upon a particular access configuration or a backhaul configuration.
(65) In the situation where the ad hoc cellular base station is transitioning from a mobile state to a stationary state, it may have to readjust some of the operational parameters of its radio access or backhaul hardware. In that instance, the ad hoc cellular base station 300 may alter 430 a power level of an access or a backhaul radio in order to transmit or receive over the access or backhaul configuration. In some embodiments, ad hoc cellular base stations 300 are equipped with a plurality of antennas chosen to support the access and backhaul configurations for that particular ad hoc cellular base station 300. When establishing an ad hoc cellular network, the ad hoc cellular base station 300 could also alter 434 an antenna configuration, such as directionality, gain, frequency characteristics, and the like.
(66) In an additional embodiment, the ad hoc cellular base station 300 could use query a local or remote cache to cross correlate a first access configuration with a first location. After comparing the two, the ad hoc cellular base station could choose an updated first access configuration based upon information retrieved during its query. For example, the ad hoc cellular base station could use geographic information to determine which service providers have the best coverage for that area. It could, in that instance choose an access or a backhaul configuration based on this criterion. Similarly, a TV white space backhaul frequency could be chosen based on availability of spectrum in the particular geographic location. In an alternate embodiment, the ad hoc cellular base station may query the local or remote cache to discern whether other base stations are operating within its proximity and if so, it could adjust its power level so as to minimize interference.
(67) Referring again to
(68) In yet an additional embodiment, the ad hoc cellular base station 300 could detect a coverage gap within the ad hoc cellular network. After detecting this coverage gap, it could establish at least one wireless backhaul connection to a core network using one of its antennas having a gain of greater than 0 dB. Once this backhaul connection is established, the ad hoc cellular base station 300 could use the access configuration to transmit or receive signals on one of its access radios.
(69) In an alternate embodiment, the ad hoc cellular base station 300 could establish a wireless backhaul link. A message flow for this embodiment is shown in
(70)
(71) In some embodiments at least one ad hoc cellular base station 620 can localize the functionality of the PGW 645 by creating a local PGW or LGW 646. If user equipment being serviced by the ad hoc cellular base station 620 creates a specific packet data network that is Local IP Access enable, LGW 646 could act as a packet data network gateway by handling the signaling to create a PDN connection. The packet data network, in this embodiment, would be anchored on LGW 646. In this embodiment, LGW 646 could allocate IP address to user equipment within the network. LGW 646 would also anchor these IP addresses. When the uplink data traffic is received by the ad hoc cellular base station 620, it could, using internal processors, route this traffic using LGW 646 functionality. LGW 646 functionality has the advantage of optimizing traffic paths and thereby reducing network overhead. One way this is accomplished is, for example, if an ad hoc cellular base station 620 receives data for more than one user equipment that it is servicing, LGW 646 can route the traffic between these two device internally within the ad hoc cellular network rather than through any other network elements. In this way, LGW 646 can create a peer-to-peer communication network between these two user equipments. In some embodiments, traffic optimization done by LGW 646 can improve data throughput by removing and caching a protocol header that is typically passed on by existing unintelligent fixed cellular nodes. The choice of which ad hoc cellular base station 610 or 620 is arbitrary and in subsequent embodiments, the architecture described with respect to the second ad hoc cellular base station 620 could be resident on the first ad hoc cellular base station 610 and vice versa.
(72) The steps of this embodiment, shown in
(73) In an alternate embodiment of this method, the data packet could be an initial attach request. In yet an additional alternate embodiment, the modified data packet could be forwarded to the EPC. These embodiments have the advantage of eliminating tunnel overhead by extracting packets from mobile nodes. In yet another embodiment of this method, the ad hoc cellular network could provide situational awareness to a user within that network via either the first or second cellular base stations. Examples of situational awareness include without limitation: a location of an ad hoc cellular base station, a direction or travel of an ad hoc cellular base station, a mobility parameter for an ad hoc cellular base station, an environmental parameter for an ad hoc cellular base station, a coverage map of an ad-hoc cellular base station, an environmental parameter of a fixed base station, an operational parameter of a fixed base station, a location of a fixed base station, or a location of a user.
(74) Turning again to
(75) TABLE-US-00001 BS class PRAT Wide Area BS — (note) Local Area BS ≤+24 dBm (for one transmit antenna port) ≤+21 dBm (for two transmit antenna ports) ≤+18 dBm (for four transmit antenna ports) Home BS ≤+20 dBm (for one transmit antenna port) ≤+17 dBm (for two transmit antenna ports) ≤+14 dBm (for four transmit antenna ports) NOTE: There is no upper limit for the rated output power or the Wide Area Base Station.
(76) Additional examples of threshold parameters are data rate, interference, network load, congestion, and latency.
(77) Referring again to
(78) In an alternate embodiment of this method, the ad hoc cellular network could be managed for example by an external computing cloud component, or by either the first ad hoc cellular base station or the second ad hoc cellular base station. Management could include making decisions about power levels, the ad hoc cellular base stations could also include a voice-over-IP applications including without limitation: push-to-talk, peer-to-peer communication, an ad hoc user nationwide dialing plan; an ad hoc user international dialing plan, conference calling, or a speed dial list. The national or international dialing plans could be similar to the E 164 standard dialing plan. In this embodiment, the voice application server could enable national or international calls between first responders in disparate locations. For example, a bridge application server could bridge standard E 164 telephony users to emergency users and vice versa. These embodiments could be implemented in closed ad hoc networks of the present invention or in ad hoc cellular networks integrated into fixed cellular networks.
(79) In an alternate embodiment of these methods, there could be a third ad hoc cellular base station that come within range of the local limited core network. In this embodiment, the first or second ad hoc cellular base station could detect the presence of this third ad hoc cellular base station. In this embodiment, the third ad hoc cellular base station could also have a processor having limited core functionality stored thereon. The first and or second ad hoc cellular base station could use a wired or wireless backhaul connection to integrate the third ad hoc cellular base station into the local limited core network. This integration could transpire via exchanging messaging information between the ad hoc cellular nodes. This messaging information could include network operational parameters such as power output, access and backhaul configurations, routing tables, user authentication information, antenna transmission characteristics, and the like.
(80) In an alternate embodiment of these methods, it may be the case that the quality of the backhaul connection to the core network is restored above a threshold parameter. In that case, this embodiment could synchronize the authentication information it has stored in local memory with an HSS or other core network device providing authentication for core network users.
(81) In some situations it may be advantageous when an ad hoc cellular base station arrives at a location to determine if there is a fixed cellular adequately supporting users within range. In this instance, the ad hoc cellular base station may forego establishing an ad hoc cellular network until a user within the existing network needs enhanced coverage.
(82)
(83) In an alternate embodiment, it may be advantageous to in the context of an ad hoc cellular network for one ad hoc cellular base station to act as a local gateway. The steps of this embodiment are described with reference to
(84) In an alternate method directed toward network resiliency in the context of an ad hoc cellular networks, and with reference to
(85) The foregoing discussion discloses and describes merely exemplary embodiments of the present invention. In additional embodiments, the methods described herein can be stored on a computer readable medium such as a computer memory storage, a compact disk (CD), flash drive, optical drive, or the like. Further, the computer readable medium could be distributed across memory storage devices within multiple servers, multi-RAT nodes, controllers, computing cloud components, mobile nodes, and the like. As will be understood by those skilled in the art, the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. For example, wireless network topology can also apply to wired networks, optical networks, and the like. Various components in the devices described herein may be added, removed, or substituted with those having the same or similar functionality. Various steps as described in the figures and specification may be added or removed from the processes described herein, and the steps described may be performed in an alternative order, consistent with the spirit of the invention. Accordingly, the disclosure of the present invention is intended to be illustrative, but not limiting of the scope of the invention, as well as other claims. The disclosure, including any readily discernible variants of the teachings herein, defines, in part, the scope of the foregoing claim terminology.