SYSTEMS AND METHODS FOR PERFORMING ROAMING AND HANDOVER LOAD BALANCING IN A MULTICELL NETWORK
20250212076 ยท 2025-06-26
Inventors
Cpc classification
International classification
Abstract
A method of performing roaming and handover load balancing in a multicell wireless communication network that comprises one or more base stations, each base having a number of call slots to communicate with wireless terminals. The method includes receiving, at a terminal, a broadcast from a base, of the one or more bases, providing capacity information for the one or more bases. The capacity information comprises terminal localization status information and active call handover status information for the one or more bases. The method also includes storing the capacity information in a database at the terminal. The method further includes receiving a roaming or handover request based on signal strength and/or link quality directing the terminal to roam or handover a call to a target base; and overriding the roaming or handover request, to prevent roaming or handover to the target base, based on the stored capacity information.
Claims
1. A method of performing roaming and handover load balancing in a multicell wireless communication network, the network comprising one or more base stations, each base station having a number of call slots to communicate with wireless terminals, the method comprising: receiving, at a wireless terminal, a broadcast from a base station, of said one or more base stations, providing capacity information for said one or more base stations, the capacity information comprising wireless terminal localization status information and active call handover status information for said one or more base stations; storing the capacity information in a database at the wireless terminal; receiving a roaming or handover request based on at least one of signal strength and link quality directing the wireless terminal to roam or handover a call to a target base station; and overriding the roaming or handover request, to prevent roaming or handover to the target base station, based at least in part on the stored capacity information.
2. The method of claim 1, wherein the wireless terminal localization status information specifies a number of wireless terminals currently localized to each of said one or more base stations.
3. The method of claim 1, wherein the active call handover status information specifies a number of active call handovers at each of said one or more base stations.
4. The method of claim 1, wherein the capacity information is continually broadcast by the base station to all of the wireless terminals associated with the base station.
5. The method of claim 1, wherein the capacity information is obtained from a shared database of the base station, the shared database comprising capacity information of other base stations of said one or more base stations.
6. The method of claim 5, wherein the shared database of capacity information is stored at each of said one or more base stations.
7. The method of claim 1, wherein, in said receiving the roaming or handover request, the roaming or handover request is generated by DECT protocol.
8. The method of claim 1, wherein, in said overriding the roaming or handover request, the request is overridden if the stored capacity information of the base station indicates that the target base station does not have an open call slot for roaming or handover, respectively.
9. A system for performing roaming and handover load balancing in a multicell wireless communication network, the network comprising one or more base stations, each base station having a number of call slots to communicate with wireless terminals, the system comprising: at least one processor in a base station; and memory operatively coupled to said at least one processor, the memory including instructions that, when executed, cause said at least one processor to perform: receiving, at a wireless terminal, a broadcast from a base station, of said one or more base stations, providing capacity information for said one or more base stations, the capacity information comprising wireless terminal localization status information and active call handover status information for said one or more base stations; storing the capacity information in a database at the wireless terminal; receiving a roaming or handover request based on at least one of signal strength and link quality directing the wireless terminal to roam or handover a call to a target base station; and overriding the roaming or handover request, to prevent roaming or handover to the target base station, based at least in part on the stored capacity information.
10. The system of claim 9, wherein the wireless terminal localization status information specifies a number of wireless terminals currently localized to each of said one or more base stations.
11. The system of claim 9, wherein the active call handover status information specifies a number of active call handovers at each of said one or more base stations.
12. The system of claim 9, wherein the capacity information is continually broadcast by the base station to all of the wireless terminals associated with the base station.
13. The system of claim 9, wherein the capacity information is obtained from a shared database of the base station, the shared database comprising capacity information of other base stations of said one or more base stations.
14. The system of claim 13, wherein the shared database of capacity information is stored at each of said one or more base stations.
15. The system of claim 9, wherein, in said receiving the roaming or handover request, the roaming or handover request is generated by DECT protocol.
16. The system of claim 9, wherein the memory further includes instructions that, when executed, cause said at least one processor to perform: in said overriding the roaming or handover request, the request is overridden if the stored capacity information of the base station indicates that the target base station does not have an open call slot for roaming or handover, respectively.
17. One or more non-transitory computer-readable storage media comprising instructions which, when executed by at least one processor, cause said at least one processor to carry out a method of performing roaming and handover load balancing, as performed in a multicell wireless communication network by one or more wireless terminals which communicate with one or more base stations, each base station having a number of call slots to communicate with the wireless terminals, the method comprising: receiving, at a wireless terminal, a broadcast from a base station, of said one or more base stations, providing capacity information for said one or more base stations, the capacity information comprising wireless terminal localization status information and active call handover status information for said one or more base stations; storing the capacity information in a database at the wireless terminal; receiving a roaming or handover request based on at least one of signal strength and link quality directing the wireless terminal to roam or handover a call to a target base station; and overriding the roaming or handover request, to prevent roaming or handover to the target base station, based at least in part on the stored capacity information.
18. The one or more non-transitory computer-readable storage media of claim 17, wherein the wireless terminal localization status information specifies a number of wireless terminals currently localized to each of said one or more base stations.
19. The one or more non-transitory computer-readable storage media of claim 17, wherein the active call handover status information specifies a number of active call handovers at each of said one or more base stations.
20. The one or more non-transitory computer-readable storage media of claim 17, wherein, in said overriding the roaming or handover request, the request is overridden if the stored capacity information of the base station indicates that the target base station does not have an open call slot for roaming or handover, respectively.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0015]
[0016]
[0017]
[0018]
[0019] Where considered appropriate, reference numerals may be repeated among the drawings to indicate corresponding or analogous elements. Moreover, some of the blocks depicted in the drawings may be combined into a single function.
DETAILED DESCRIPTION
[0020] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present teachings. However, it will be understood by those of ordinary skill in the art that the presently taught approaches and the example embodiments provided herein may be practiced without these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail so as not to obscure the presently taught approaches and techniques.
[0021]
[0022] In the example depicted in
[0023]
[0024] DECT uses Time Division Multiple Access (TDMA) to allow multiple handsets to communicate with the base station simultaneously. It divides the communication channel into multiple time slots, and each handset is assigned a specific time slot in which to transmit and receive information. DECT systems use encryption to secure the communications between the handsets and base stations. The DECT standard specifies the use of the DECT Standard Authentication Algorithm (DSAA) for authentication and the DECT Standard Cipher (DSC) for encryption.
[0025] In a DECT multicell system there are a limited number of operational TDMA slots to be able to use for the establishment of a call connection between a base and a wireless terminal. In a multicell system, wireless terminals may roam between bases when idle (not on a call), or they may handover calls from one base to another (while on an active call). The roaming and handover operations are discussed in further detail below.
[0026] Roaming is the ability of a wireless DECT terminal (120, 130) (also referred to as a Portable Part or PP) to be able to select, via an algorithm, any of the particular DECT base stations 110 to which the terminal (120, 130) has been registered, via the appropriate Radio Fixed Part Identity (RFPI) and Radio Fixed Part Number (RPN). Roaming takes place without any active calls or DECT connection and generally while the DECT terminal (120, 130) is in an idle state (i.e., is not on a call). Roaming selection criteria of disclosed embodiments revolves around factors such as relative signal strength among the bases and/or link quality measurements, as well as available space for a new PP on the new base station.
[0027] In embodiments, a target base station (e.g., the primary base station 220) may have 8 slots available for terminals to connect to the target base station, plus 2 extra slots for terminals that roam/handover to the target base station from other bases. (It is to be understood that this is just an example and the numbers of slots or extra slots on a base may vary.) Once 8 terminals have localized to the target base station (e.g., 220) and, thus, the target base station is at capacity, disclosed embodiments provide a mechanism to prevent additional terminals from localizing to the target base station. For example, if a terminal is currently localized to a particular originating base station (e.g., a secondary base station 230) and the RSSI of the target base station (e.g., 220) is higher than that of the originating base station (e.g., 230), but the target base station does not have a slot available for another terminal, then the disclosed technology provides a mechanism to prevent the terminal at the originating base station (e.g., 230) from localizing to the target base station (e.g., 220). Conventional techniques do not provide such a feature.
[0028] If more than 8 terminals localize, or attempt to localize, to a target base station (e.g., 220), then the slot capacity of the target base would be exceeded and the system may not be able to set up calls to all terminals and/or ring all of the terminals at the same time. In conventional approaches, the DECT system has a protocol for rejecting the excess terminals attempting to roam to the target base (e.g., 220), but only after the roaming terminal has localized to the target base station. Thus, in conventional techniques roaming terminals localize to the target base station, but thereafter the target base station at capacity will reject them, and the terminals will then be forced to localize back to the originating base station (e.g., 230). This can lead to a terminal constantly localizing to a target base station and being forced back to an originating base station, which wastes battery life and may also cause delays in call setup. The disclosed technology ameliorates such problems.
[0029] Handover is the ability to re-establish a DECT connection with a new target base to which it has been registered via the appropriate RFPI and RPN and with better signal strength and/or link quality with a call in progress. During a handover the DECT connection carrying data or media is transferred over to a new, i.e., target, base station and terminated at the old, i.e., originating, base station.
[0030] As discussed above, a base station has a number of extra call slots, in addition to a core number of call slots to be allocated. In one example, a base may have 2 additional call slots in addition to the core 8 call slots to be allocated, for a total of 10 call slots. (In other examples, there may be 3 additional call slots for a total of 11 call slots, or various other combinations depending on system requirements.) One purpose of the additional call slots is to allow wireless terminals to handover a call to another base, i.e., initiate a handover operation, if the RSSI of their current base is too low and the wireless terminal determines that there is a better RSSI on another base station. However, a problem arises when the number of terminals attempting to handover to a target base exceeds the number of additional call slots on the target base. In conventional methods, the terminals exceeding the number of additional call slots on the target base would not be able to make or receive calls. The DECT protocol can reject any additional terminal(s) for which there is no available call slot, but only after the terminal has localized to the target base. This can cause the audio on such a call to have an interruption, and the terminal(s) may continuously attempt to hand over to a target base with a better RSSI, causing problems such as continuous audio interruptions. The disclosed technology can solve these technical problems associated with conventional methods.
[0031] To further illustrate the example given above, if there is a target base with 2 additional call slots, a problem arises if more than 2 additional wireless terminals, e.g., 3 additional wireless terminals, attempt to hand over to the target base. If handled as in conventional methods, then 11 terminals are associated with a base that can only supply a maximum of 10 call slots. In such a case, one of the terminals would not be able to make or receive calls. Again, the DECT protocol can reject the 11th terminal, but only after it has localized to the target base. This can cause the audio on the call to have an interruption, and the terminal may continuously attempt to hand over to the target base with a better RSSI, causing problems such as continuous audio interruptions. The disclosed technology is directed to solving the technical problems associated with conventional methods.
[0032]
[0033] In the system 300 of
[0034] In embodiments, the primary base station 302 comprises an application 308a for carrying out various functions of the base station (e.g., call control), an operating system 310a, and a LAN adapter 312a. A radio 314a receives files, which may be stored in file storage 316a. The primary base station 302 further comprises a shared database, i.e., Volatile Real-Time Database (VRTDB) 318, which is described in further detail below.
[0035] Each secondary base station 304 comprises an application 308b for carrying out various functions of the base station, an operating system 310b, and a LAN adaptor 312b. A radio 314b receives files, e.g., from the primary base station 302, which may be stored in file storage 316b. As described further below, each secondary base station 304 is enabled to update the site-wide VRTDB 318 with information received from terminals 306.
[0036] Each wireless terminal 306 has an application 320 for performing the various functions of the wireless terminal (e.g., in accordance with DECT protocol), an operating system 322, a radio 324, a file storage 326, and a roaming/handover manager (referred to herein as handover manager) 328. During operation of the system, the radio 324 may receive files from bases to which the terminal is attached.
[0037] Disclosed embodiments can resolve the issues or drawbacks discussed above, caused when a terminal roams or hands over to a base that is already at full slot capacity. In embodiments, a broadcast channel of each base station, e.g., the dummy bearer channel, continuously broadcasts real-time information about the status of each base station 302, 304 to all of the wireless terminals 306 in the system 300 which are in range of the broadcast channels of the respective base stations.
[0038] Thus, a base station, e.g., the primary base station 302, broadcasts to wireless terminals 306 capacity information for the one or more base stations 302, 304. The capacity information may include wireless terminal localization status information for the one or more base stations (e.g., 302, 304), which is information that specifies a number of wireless terminals 306 currently localized to each of the one or more base stations. The capacity information may also include active call handover status information for the one or more base stations, which is information that specifies the number of active call handovers at each of the one or more base stations.
[0039] The wireless terminals 306 may receive this broadcast and store the capacity information in a storage in the terminals 306, such as in a file storage 326. This, in effect, enables a wireless terminal 306 to continuously monitor the capacity information, and form its own database, for all the base stations (e.g., 302, 304) in the system 300, including information regarding how many terminals 306 are currently localized to a base station as well as how many terminals 306 may have actively handed over a call to a particular base station.
[0040] Terminals 306 frequently act on roaming or handover requests, which are typically based on relative signal strength or link quality between the current base and a new/target base. The roaming or handover requests may be generated by DECT protocol executed by the terminal itself, in which case the requests are received in the sense that they are processed by the terminal as part of a software-implemented method, e.g., by a handover manager 328, which receives input from another process, e.g., the DECT protocol implementation executing on the terminal.
[0041] In the system 300, when a terminal 306 acts on a roaming or handover request that directs the terminal 306 to roam or handover a call to a target base, instead of automatically granting the request the handover manager 328 first determines whether to override the request to prevent roaming or handover to the target base when the target base does not have an open call slot for roaming or handover. The handover manager 328 overrides the request if the stored capacity information of the base station indicates that the target base station does not have an open call slot for roaming or handover.
[0042] In embodiments, the handover manager 328 overrides the standard DECT protocol operation (which would automatically, in conventional systems, force the terminals to roam or handover to a new base) whenever the signal strength and/or link quality of a current base station is below a lower threshold and the signal strength and/or link quality of a target base station is above an upper threshold. By virtue of the features of the disclosed embodiments, instead of initiating potentially unnecessary actions as described herein (e.g., in which a terminal localizes to a new base that does not have slot capacity to accommodate the roaming or handover of the new terminal, thereby forcing the new terminal back to the original base), which can disrupt communications and cause lower battery life, the terminals 306 by virtue of the handover manager 328 may ignore or override the request from the DECT protocol and thus take no action if the new base does not have slot capacity. On the other hand, if the new base does have slot capacity, then the handover manager 328 acts on the roaming/handover request.
[0043] Referring again to
[0044] In examples, thresholds are established for a maximum number of additional handovers (e.g., 2 or 3), as well as to limit the total number of localizations to a set number per base (e.g., 8). Reporting in the broadcast channel indicates whether and how much roaming and handover capacity exists per base station (e.g., 302, 304) in real time. Accordingly, the system 300 uses base localization and handover status polling to continuously update the VRTDB 318.
[0045] Localization status information of a terminal 306 can be reported to an attached base station from the terminal 306 as the terminal 306 localizes to the base station, at which point the base station can update the site-wide VRTDB 318. Similarly, when an active call handover to a base occurs, the terminal 306 can report such active call handover status information to the attached base station from the terminal 306. The information can be recorded in the VRTDB 318, e.g., as fields in each status record. A status record may therefore hold capacity information for the base stations, which includes, for example, wireless terminal localization status information and active call handover status information for the base stations.
[0046] In implementations, the VRTDB 318 may be part of a distributed configuration subsystem which is responsible for indicating/managing configuration and capacity information throughout the system 300. For example, a Terminal 1, upon localizing to Secondary Base 1 or performing an active call handover to Secondary Base 1, sends its status information (localization status or active call handover status) to Secondary Base 1. Secondary Base 1 enters the status information into the VRTDB record for Secondary Base 1, thereby updating the capacity information of Secondary Base 1, which then flows toward the Primary Base. The Primary Base then sends the record to Secondary Base 2 as part of the routine transmission of VRTDB data. The Primary and Secondary Bases broadcast the capacity information to the Terminals. Thus, eventually the entire system is informed of the capacity information of Secondary Base 1, for example. A similar process can occur for other terminals attached to other bases. Accordingly, the VRTDB 318 can be continuously updated to reflect dynamically changing status conditions of the terminals and the bases, and this information is broadcast to the terminals.
[0047] Accordingly, in the system 300, the capacity information received by the terminals 306 is obtained from a shared database of the base stations (e.g., VRTDB 318), the shared database comprising capacity information of other base stations of the one or more base stations 302, 304. Thus, the shared database of capacity information is stored at each of the one or more base stations 302, 304.
[0048] It is noted that the VRTDB 318 is shown in
[0049]
[0050] The method 400 includes receiving (402), at a wireless terminal 306, a broadcast from a base station, of the one or more base stations 302, 304, providing capacity information for the one or more base stations. The capacity information may be continually broadcast by the base station to all of the wireless terminals associated with the base station. In embodiments, each base station 302, 304 broadcasting the capacity information may use the dummy bearer broadcast channel to continuously broadcast the capacity information to the wireless terminals 306 associated with the base, as described herein.
[0051] The capacity information may include wireless terminal localization status information and active call handover status information for the one or more base stations 302, 304. The wireless terminal localization status information may specify a number of wireless terminals 306 currently localized to each of the one or more base stations 302, 304. The active call handover status information may specify a number of active call handovers at each of the one or more base stations 302, 304. The method also includes storing (404) the capacity information in a database at the wireless terminal, such as file storage 326 of
[0052] The method further includes receiving (406) a roaming or handover request based on at least one of signal strength and link quality, directing the wireless terminal 306 to roam or handover a call to a target base station. In an example embodiment the roaming or handover request is generated by DECT protocol.
[0053] The method further includes overriding (408) the roaming or handover request, to prevent roaming or handover to the target base station, based at least in part on the stored capacity information. This override can be performed by, e.g., handover manager 328 as described in connection with
[0054] The capacity information received by the terminals 306 is obtained from a shared database of the base stations 302, 304 such as VRTDB 318 described in connection with
EXAMPLE IMPLEMENTATIONS
[0055] As described herein, disclosed embodiments are directed to optimizing load balancing in a multicell network during roaming and handover of wireless terminals among the bases. An example aspect provides a wireless system broadcast status for roaming and handover load balancing.
[0056] As described herein, in conventional techniques, the terminal has no way to know in advance whether a target base station to which the terminal decides to roam or handover actually has the required capacity to accept the new terminal. If there is no capacity at the target base station, this may result in a rejection of the terminal and thus wasted battery or audio disruption. The disclosed technology imparts the base station capacity status to the terminal which is provisioned with a system/method to enable the terminal to determine, based on the target base capacity status, whether to attempt roaming or handover. If there is no capacity at the target base then the normal procedure of the terminal of roaming or handing over to the target base anyway is blocked or overridden.
[0057] Example embodiments provide systems and methods to obtain wireless terminal localization status information and active call handover status information for wireless terminals and bases in the network, and store this information in a database which is then shared across different bases in a multicell system.
[0058] Example embodiments provide systems and methods to continuously broadcast the database status information in real time to all of the wireless terminals associated with a particular base station in a multicell system.
[0059] Example embodiments provide wireless terminal capability to only perform roaming to a target base when the roaming status information obtained from a target base station indicates adequate slot capacity on the target base station and meets certain criteria. Example embodiments also provide wireless terminal capability to only allow in-call handover to a target base when the handover status information obtained from a target base station indicates adequate slot capacity on the target base station and meets certain criteria.
[0060] Example embodiments can result in improved battery life of a terminal during roaming and can avoid unnecessary connection setup and channel usage (e.g., in a DECT system) to set up a new localization at a target base, only to be rejected and forced back over to the original base station. For the handover situation it would also prevent unnecessary connection setup (e.g., in a DECT system) and channel usage to set up a new connection at a target base and can also remove interruptions in the audio connection for the call.
[0061] As described herein, disclosed embodiments have various components in the disclosed system, or various methods using the disclosed system, to handle the described operations including base localization and handover status polling; status storage in a local database; real-time sharing of the database across a multi-cell system; wireless broadcast of status information to wireless terminals (of all system base stations); gathering and storage of status information at the wireless terminals; wireless terminal methods to control the behavior for roaming or localizing to a new base only when available capacity at the new base is indicate; wireless terminal logic to control he behavior for in-call handover to a new base only when available capacity at the new base is indicated.
[0062] It should be noted that the terms optimize, optimal and the like as used herein can be used to mean making or achieving performance as effective or perfect as possible. However, as one of ordinary skill in the art reading this document will recognize, perfection cannot always be achieved. Accordingly, these terms can also encompass making or achieving performance as good or effective as possible or practical under the given circumstances, or making or achieving performance better than that which can be achieved with other settings or parameters.
[0063] The claimed software elements can be realized on a variety of telecommunications systems or subsystems. The following description, in conjunction with the disclosed embodiments described in the foregoing, provides representative, non-limiting examples of potential telecommunications systems or subsystems that could be used to execute the claimed software elements.
[0064] At a high level, a telecommunications system or subsystem typically includes, but is not limited to, communication devices, networks, base stations, servers, and a variety of other hardware and software components. Communication devices may include a broad range of devices such as cordless telephones, mobile phones, smartphones, computers, tablets, and other types of devices capable of sending and receiving communication signals. These devices usually include at least one processor, memory, a user interface (such as a display, keyboard, or touch screen), and a network interface for connecting to a network.
[0065] The network component of a telecommunications system or subsystem can take various forms, including multicell systems, e.g., Digital Enhanced Cordless Telecommunications (DECT), public switched telephone networks (PSTN), the Internet, mobile networks (e.g., 3G, 4G, 5G), local area networks (LAN), wide area networks (WAN), and others. Base stations and/or servers are also commonly part of telecommunications systems, facilitating the storage, processing, and exchange of data. Like the aforementioned communication devices, these elements generally include a processor and memory for executing software applications, as well as network interfaces for communicating with the network and other devices.
[0066] Software elements in the telecommunications system may include operating systems, device drivers, networking software, applications, and other types of software. These software elements can be executed on communication devices, base stations, servers, or other hardware components of the telecommunications systems or subsystems. The claimed software elements may be embodied as computer program code that is executed on one or more of the hardware components of the telecommunications system or subsystem. This code could be stored on a non-transitory computer-readable medium that is part of the communication device, base station, server, or other component, or it could be stored on an external storage device, network storage, or cloud storage.
[0067] It should be noted that the described telecommunications systems and subsystems are illustrative and that the claimed software elements can be executed on any suitable telecommunications system or subsystem. The specific configuration of the telecommunications system or subsystem may vary depending on the requirements of the application, performance characteristics of the system, cost considerations, and other factors. The scope of the invention is not limited to the specific telecommunications systems and subsystems described herein but includes any and all systems or subsystems suitable for implementing the present invention.
[0068] The foregoing detailed description has presented various implementations of the devices and/or processes through the use of block diagrams, schematics, and illustrative examples. As such block diagrams, schematics, and examples include one or more functions and/or operations, it should be understood by those skilled in the art that each function and/or operation within these block diagrams, flowcharts, or examples can be implemented individually and/or collectively by employing a wide range of hardware, software, firmware, or any combination thereof. It should also be recognized by those skilled in the art that the methods or algorithms described herein may incorporate additional steps, may exclude some steps, and/or may execute steps in an order different from the one specified. The various implementations described above can be combined to create additional implementations.
[0069] These modifications and other changes can be made to the implementations in light of the above-detailed description. Generally, the terms used in the following claims should not be construed to limit the claims to the specific implementations disclosed in the specification and the claims. Instead, they should be interpreted to encompass all possible implementations, along with the full scope of equivalents to which such claims are entitled. Consequently, the claims are not limited by the disclosure but are intended to cover all possible implementations within their scope.