US20090265542A1 - Home Node B System Architecture - Google Patents
Home Node B System Architecture Download PDFInfo
- Publication number
- US20090265542A1 US20090265542A1 US12/426,200 US42620009A US2009265542A1 US 20090265542 A1 US20090265542 A1 US 20090265542A1 US 42620009 A US42620009 A US 42620009A US 2009265542 A1 US2009265542 A1 US 2009265542A1
- Authority
- US
- United States
- Prior art keywords
- hnb
- message
- network
- ranap
- network controller
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 247
- 238000004891 communication Methods 0.000 claims abstract description 120
- 230000008878 coupling Effects 0.000 claims abstract description 5
- 238000010168 coupling process Methods 0.000 claims abstract description 5
- 238000005859 coupling reaction Methods 0.000 claims abstract description 5
- 230000005540 biological transmission Effects 0.000 claims description 8
- 239000010410 layer Substances 0.000 description 143
- 230000011664 signaling Effects 0.000 description 129
- 210000004027 cell Anatomy 0.000 description 126
- 230000032258 transport Effects 0.000 description 106
- 238000012546 transfer Methods 0.000 description 103
- 238000007726 management method Methods 0.000 description 83
- 230000007246 mechanism Effects 0.000 description 66
- 230000006870 function Effects 0.000 description 40
- 230000006978 adaptation Effects 0.000 description 34
- 230000004044 response Effects 0.000 description 33
- 230000008569 process Effects 0.000 description 26
- 238000004590 computer program Methods 0.000 description 21
- 238000005259 measurement Methods 0.000 description 21
- 238000003860 storage Methods 0.000 description 21
- 230000001413 cellular effect Effects 0.000 description 14
- 230000001960 triggered effect Effects 0.000 description 12
- 210000000712 G cell Anatomy 0.000 description 10
- 230000008859 change Effects 0.000 description 10
- 102000018059 CS domains Human genes 0.000 description 9
- 108050007176 CS domains Proteins 0.000 description 9
- 238000012545 processing Methods 0.000 description 9
- 238000013500 data storage Methods 0.000 description 8
- 238000013507 mapping Methods 0.000 description 8
- 230000000737 periodic effect Effects 0.000 description 8
- CSRZQMIRAZTJOY-UHFFFAOYSA-N trimethylsilyl iodide Substances C[Si](C)(C)I CSRZQMIRAZTJOY-UHFFFAOYSA-N 0.000 description 8
- 239000013598 vector Substances 0.000 description 8
- 230000002159 abnormal effect Effects 0.000 description 7
- 238000005538 encapsulation Methods 0.000 description 7
- 230000000977 initiatory effect Effects 0.000 description 7
- 230000008093 supporting effect Effects 0.000 description 7
- 238000013475 authorization Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 5
- 239000013256 coordination polymer Substances 0.000 description 5
- 230000001419 dependent effect Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 238000001914 filtration Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000002360 preparation method Methods 0.000 description 4
- 238000001228 spectrum Methods 0.000 description 4
- 230000009466 transformation Effects 0.000 description 4
- 238000000844 transformation Methods 0.000 description 4
- 230000007704 transition Effects 0.000 description 4
- 230000004913 activation Effects 0.000 description 3
- 238000013459 approach Methods 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 230000001105 regulatory effect Effects 0.000 description 3
- 238000013519 translation Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 101710104937 Non-specific acid phosphatase Proteins 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 208000020832 chronic kidney disease Diseases 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 201000000523 end stage renal failure Diseases 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000012384 transportation and delivery Methods 0.000 description 2
- 230000005641 tunneling Effects 0.000 description 2
- 238000011144 upstream manufacturing Methods 0.000 description 2
- 238000004846 x-ray emission Methods 0.000 description 2
- 101100346893 Arabidopsis thaliana MTPA2 gene Proteins 0.000 description 1
- 101000597193 Homo sapiens Telethonin Proteins 0.000 description 1
- 101150006417 MTP3 gene Proteins 0.000 description 1
- 101150042248 Mgmt gene Proteins 0.000 description 1
- 108010007100 Pulmonary Surfactant-Associated Protein A Proteins 0.000 description 1
- 102100027773 Pulmonary surfactant-associated protein A2 Human genes 0.000 description 1
- 102100032008 Solute carrier family 40 member 1 Human genes 0.000 description 1
- 101710111423 Solute carrier family 40 member 1 Proteins 0.000 description 1
- 102100035155 Telethonin Human genes 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 239000002355 dual-layer Substances 0.000 description 1
- 230000001976 improved effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 239000002346 layers by function Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000010187 selection method Methods 0.000 description 1
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000008685 targeting Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/04—Interfaces between hierarchically different network devices
- H04W92/12—Interfaces between hierarchically different network devices between access points and access point controllers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/12—Setup of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
- H04L12/5601—Transfer mode dependent, e.g. ATM
- H04L2012/5603—Access techniques
- H04L2012/5604—Medium of transmission, e.g. fibre, cable, radio
- H04L2012/5607—Radio
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
- H04L12/5601—Transfer mode dependent, e.g. ATM
- H04L2012/5638—Services, e.g. multimedia, GOS, QOS
- H04L2012/5646—Cell characteristics, e.g. loss, delay, jitter, sequence integrity
- H04L2012/5652—Cell construction, e.g. including header, packetisation, depacketisation, assembly, reassembly
- H04L2012/5653—Cell construction, e.g. including header, packetisation, depacketisation, assembly, reassembly using the ATM adaptation layer [AAL]
- H04L2012/5656—Cell construction, e.g. including header, packetisation, depacketisation, assembly, reassembly using the ATM adaptation layer [AAL] using the AAL2
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/222—Monitoring or handling of messages using geographical location information, e.g. messages transmitted or received in proximity of a certain spot or area
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/73—Access point logical identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0055—Transmission or use of information for re-establishing the radio link
- H04W36/0066—Transmission or use of information for re-establishing the radio link of control information between different types of networks in order to establish a new radio link in the target network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
- H04W60/04—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration using triggered events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
- H04W76/32—Release of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/16—Mobility data transfer selectively restricting mobility data tracking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
- H04W84/045—Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B
Definitions
- Provisional Application 61/101,148 entitled, “Support for Closer Subscriber Group (CSG) in Femtocell System”, filed Sep. 29, 2008.
- the contents of Provisional Applications 61/046,401, 61/055,961, 61/058,912, 61/080,227, and 61/101,148 are hereby incorporated by reference.
- the invention relates to telecommunication. More particularly, this invention relates to a Home Node-B system architecture.
- Licensed wireless systems provide mobile wireless communications to individuals using wireless transceivers.
- Licensed wireless systems refer to public cellular telephone systems and/or Personal Communication Services (PCS) telephone systems.
- Wireless transceivers also referred to as user equipment (UE), include cellular telephones, PCS telephones, wireless-enabled personal digital assistants, wireless modems, and the like.
- Licensed wireless systems continually upgrade their networks and equipment in an effort to deliver greater data transfer rates and range.
- the licensed wireless system providers incur substantial costs from licensing additional bandwidth spectrum to upgrading the existing radio network equipment or core network equipment.
- the licensed wireless system providers pass down the costs to the user through the licensed wireless service fees.
- Users also incur equipment costs with each iterative upgrade of the licensed wireless network as new user equipment is needed to take advantage of the new services or improved services of the upgraded network.
- Landline (wired) connections are extensively deployed and generally perform at a lower cost with higher quality voice and higher speed data services than the licensed wireless systems.
- the problem with landline connections is that they constrain the mobility of a user.
- Traditionally a physical connection to the landline was required.
- Unlicensed Mobile Access emerged as one solution to lower costs associated with the licensed wireless systems while maintaining user wireless mobility and taking advantage of the higher quality voice and higher speed data services of the landline connections.
- UMA allowed users the ability to seamlessly and wirelessly roam in and out of licensed wireless systems and unlicensed wireless systems where the unlicensed wireless systems facilitate mobile access to the landline-based networks.
- Such unlicensed wireless systems support wireless communication based on the IEEE 802.11a, b or g standards (WiFi), or the Bluetooth® standard.
- WiFi IEEE 802.11a, b or g standards
- Bluetooth® Bluetooth® standard.
- the mobility range associated with such unlicensed wireless systems is typically on the order of 100 meters or less.
- a typical unlicensed wireless communication system includes a base station comprising a wireless access point (AP) with a physical connection (e.g., coaxial, twisted pair, or optical cable) to a landline-based network.
- the AP has a RF transceiver to facilitate communication with a wireless handset that is operative within a modest distance of the AP, wherein the data transport rates supported by the WiFi and Bluetooth® standards are much higher than those supported by the aforementioned licensed wireless systems.
- UMA allowed users to purchase ordinary off-the-shelf access points in order to deploy a UMA service region that allowed for access to UMA service. In this manner, UMA was able to provide higher quality services at a lower cost than the licensed wireless systems. However, other UMA associated costs remained an obstacle to the large scale adoption of UMA.
- HNBs Home Node Bs
- the HNBs employ similar techniques as unlicensed access points such as the support of lower transmission power and range, integrated design, and use of regular landlines to communicate with the mobile operators' network to be cost and performance competitive with UMA.
- the use of regular landlines required the HNBs to adopt proprietary messaging and signaling standards that were different than those used by the licensed wireless systems for the expensive Base Stations.
- Some embodiments provide methods and systems for integrating a first communication system with a core network of a second communication system that has a licensed wireless radio access network.
- the first communication system includes one or more user hosted access points that operate using short range licensed wireless frequencies in order to establish service regions of the first communication system and a network controller for communicatively coupling the service regions associated with the access points to the core network.
- the first communication system of some embodiments includes a Home Node-B (HNB) Access Network (HNB-AN) where the access points are Home Node-Bs and the network controller is a HNB Gateway (HNB-GW).
- the licensed wireless radio access network of the second communication system of some embodiments includes a Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (UTRAN) and the core network of the second communication system includes a core network of the UMTS.
- UMTS Universal Mobile Telecommunications System
- UTRAN Universal Mobile Telecommunications System
- the network controller of some embodiments seamlessly integrates each of the short range licensed wireless service regions with the core network.
- the network controller seamlessly integrates with the core network by using existing Iu interfaces of the core network to communicatively couple each of the service regions to the core network.
- the network controller of some embodiments uses standardized messaging and protocols to communicate with the core network while utilizing HNB-AN messaging and protocols to communicate with each of the service regions.
- the network controller of some embodiments reduces deployment costs of the HNB-AN within the UMTS core network.
- deployment of the network controller of some embodiments requires no change to the UMTS core network while still providing HNB wireless service that combines the mobility of licensed wireless networks with the quality and speed of landline/broadband services.
- the network controllers take on some of the functionality of a traditional Radio Network Controller (RNC).
- RNC Radio Network Controller
- the access points of some embodiments seamlessly integrate with existing user equipment (UE) of the licensed wireless radio access networks of the second communication system.
- UE user equipment
- the access points reduce deployment costs of the HNB-AN, as users are able to utilize existing UE in order to wirelessly communicate through either the first communication system or the second communication system where the first communication system combines the wireless mobility afforded by the licensed wireless radio access network of the second communication system with the speed and quality of service afforded by landline/broadband services.
- the access points are functionally equivalent to a Node-B of the UTRAN while having the flexibility and lower deployment costs associated with an ad-hoc and user hosted service region.
- the access points take on some the functionality of a traditional Radio Network Controller (RNC).
- RNC Radio Network Controller
- the protocol stacks include a Radio Access Network Application Part (RANAP) user adaptation (RUA) layer that enables a method for transparently passing RANAP messages between the access points and the network controller over a reliable transport connection.
- the method receives a RANAP message and encapsulates the message with a RUA header.
- the method then passes the encapsulated message to a receiving endpoint within the first communication system. In this manner, the RANAP message is passed from a first endpoint of the first communication system to a second endpoint of the first communication system.
- RANAP Radio Access Network Application Part
- RUA Radio Access Network Application Part
- the network controller decodes and processes only the RUA header before relaying the RANAP message to the core network operating within a service region of the first communication system.
- an access point performs the RANAP encapsulation and the receiving endpoint is a network controller.
- the network controller performs the RANAP encapsulation and the receiving endpoint is an access point.
- the receiving endpoint need only decode and process the RUA header.
- RANAP is only used to communicate with core network. The communication with UE (e.g.
- the HNB uses the RRC protocol as per 3GPP 25.331 specifications, “Radio Resource Control (RRC) Protocol Specification”, the contents of which are herein incorporated by reference, hereinafter referred to as TS 25.331.
- the HNB on the receiving end processes the RUA as well as the entire RANAP message.
- the content of the RANAP messages are extracted by the HNB and converted to appropriate RRC messages.
- Some embodiments define messaging formats to be used in conjunction with the various protocol stacks. Some embodiments provide a message that when sent from a particular access point to the network controller explicitly indicates the start of a communication session between the particular access point and the network controller. In some embodiments, the contents of the message are used to route the establishment of a signaling connection from the network controller to a core network node within a core network domain identified by the message.
- Some embodiments provide a computer readable storage medium of an access point that stores a computer program.
- the computer program includes instructions that are executable by one or more processors.
- the computer program includes a set of instruction for generating a message to send to the network controller to explicitly indicate start of a communication session with the network controller.
- the message includes a Radio Access Network Application Part (RANAP) message for establishing a signaling connection with the network controller.
- the computer program also includes a set of instructions for passing a set of RANAP messages to the core network through the network controller after establishing the signaling connection.
- the set of RANAP messages facilitates communications between the particular access point and the core network.
- RANAP Radio Access Network Application Part
- Some embodiments provide a computer readable storage medium of a particular access point that stores a computer program.
- the computer program includes instructions that are executable by one or more processors.
- the computer program includes a set of instruction for receiving a message to explicitly indicate start of a communication session with a particular access point.
- the message includes a Radio Access Network Application Part (RANAP) message that is encapsulated with a header of the second network.
- RANAP Radio Access Network Application Part
- the message is used for establishing a signaling connection with the particular access point.
- the computer program also includes a set of instructions for analyzing the message header to identify a destination in the core network to receive the message.
- the computer program further includes a set of instructions for forwarding the message without the header to the destination in the core network to establish the signaling connection
- Some embodiments further provide messages for directly transferring data downstream from the core network through the first communication system to a UE operating within a particular service region. Some embodiments provide messages for directly transferring data upstream from a UE in a particular service region through the first communication system to the core network. Directly transferring data involves routing a RANAP message through the network controller and an access point where the contents of the RANAP message are not processed by the network controller. In some embodiments, the network controller may process and modify the content of some of the RANAP message (for example, transport network switching that is converting ATM transport from/to the core network into the appropriate IP transport over the HNB-AN).
- Some embodiments provide a computer-readable medium that is encoded with a data storage structure.
- the data storage structure for passing a Radio Access Network Application Part (RANAP) message within a first communication system that includes several user hosted access points for establishing service regions of the first communication system by using short range licensed wireless frequencies and a network controller that can communicatively couple user equipment operating in the service regions to a core network of a second communication system that also includes a licensed wireless radio access network.
- the data storage structure has a header that includes a core network domain identity to identify at least one of a core network domain from which the RANAP message originated and a core network domain for which the RANAP message is to be sent.
- the header also includes a context identifier to uniquely identify a particular user equipment operating within a particular service region of the second communication system.
- the data storage structure also includes payload data that include the RANAP message.
- the registration procedure of some embodiments specifies a method for registering UEs with the first communication system.
- the method from an access point coupled to a UE sends a registration request message to the network controller on behalf of the UE.
- the method receives a registration accept message when the UE is authorized to access services of the first communication system through the particular access point.
- some embodiments include a uniquely assigned context identifier that identifies the UE while the UE is connected for service at the particular access point. All subsequent messages will include the assigned context identifier to identify the UE.
- the registration procedure of some embodiments also specifies a method for registering an access point with the network controller.
- the method includes the access point sending its identification information and location information to the network controller.
- the network controller determines whether the access point identified by the identification information at the specified location is permitted to access services of the first communication system through the network controller. When permitted, the access point receives a registration accept message from the network controller. Otherwise, the method rejects the access point or redirects the access point to another network controller.
- Some embodiments provide emergency responders the ability to locate a position of an emergency caller when the caller places the emergency request through a service area of the first communication system. More specifically, some embodiments provide a method whereby unauthorized UEs are still permitted limited service to the first communication system in order to establish an emergency call when in a service region of the first communication system.
- the method includes receiving, at a particular access point, a service request from a UE indicating that the UE is requesting emergency services.
- the particular access point then performs a registration procedure with the network controller that indicates that the purpose of the registration is to request emergency services for the UE.
- the method includes receiving a registration accept message with a context identifier to be used by the UE in order to access limited services of the first communication system, specifically, emergency services.
- Some embodiments provide a method that at the network controller, establishes a bearer connection between a particular access point and the core network.
- the establishing the bearer connection includes initiating signaling to establish an asynchronous transfer mode (ATM) based bearer connection between the network controller and the core network.
- the establishing the bearer connection also includes establishing an Internet Protocol (IP) based bearer connection between the network controller and the particular service region.
- IP Internet Protocol
- the method also includes receiving a message from the particular access point for establishing a user plane between the particular access point and the core network.
- the method also includes establishing the user plane by using the IP based bearer connection between the particular access point and the network controller and the ATM based bearer connection between the network controller and the core network.
- the network controller routes user plane data received from the particular access point over the IP based bearer connection to the core network through the ATM based bearer connection by the network controller.
- Some embodiments provide a method for user equipment (UE) registration with a closed subscriber group (CSG) system.
- the method receives a UE registration request at the network controller from an access point.
- the request includes an initial NAS message from the UE and a CSG identification associated with the access point.
- the method relays the registration request that includes the initial NAS message and the CSG identification to the core network.
- the method receives a permanent identity of the UE from the core network based on the registration request.
- the method uses the permanent identity of the UE to complete the UE registration.
- FIG. 1 illustrates a system architecture for 3 G HNB deployments in accordance with some embodiments of the invention.
- FIG. 2 illustrates elements of the HNB Access Network (HNB-AN) sub-system architecture in accordance with some embodiments.
- HNB-AN HNB Access Network
- FIG. 3 illustrates the Home Node-B (HNB) system architecture including the HNB-AN of some embodiments integrated with a core network of a second communication system that includes a licensed wireless radio access network.
- HNB Home Node-B
- FIG. 4 illustrates some of the various devices that may be used in some embodiments in order to access services of the HNB-AN or HNB system.
- FIG. 5 illustrates the protocol architecture supporting the HNB Application Part (HNBAP) over the Iuh interface, in some embodiments.
- HNBAP HNB Application Part
- FIG. 6 illustrates the protocol architecture in support of the HNB control plane (i.e., for both the CS and PS domain), in some embodiments.
- FIG. 7 illustrates INITIAL DIRECT TRANSFER message content in some embodiments.
- FIG. 8 illustrates UPLINK DIRECT TRANSFER message content in some embodiments.
- FIG. 9 illustrates DOWNLINK DIRECT TRANSFER message content in some embodiments.
- FIG. 10 illustrates an applicable Protocol Data Unit (PDU) structure for the transport of RANAP in some embodiments.
- PDU Protocol Data Unit
- FIG. 11 illustrates an alternative PDU/RUA Adaptation Layer Structure of some embodiments.
- FIG. 12 illustrates the details of the RUA Header structure in some embodiments.
- FIG. 13 illustrates a PDU Error Indication message in some embodiments.
- FIG. 14 illustrates a RANAP message transfer using adaptation layer in some embodiments.
- FIG. 15 illustrates handling of abnormal conditions over the Iuh interface in some embodiments.
- FIG. 16 illustrates the CS domain transport network control signaling (using ALCAP) over the ATM-based Iu-cs interface in some embodiments.
- FIG. 17 illustrates the protocol architecture in support of the CS domain user plane over the Iuh interface in some embodiments.
- FIG. 18 illustrates the PS Domain User Plane Protocol Architecture in some embodiments.
- FIG. 19 illustrates an overview of HNB initialization, discovery and registration in some embodiments.
- FIG. 20 illustrates the possible states for the HNBAP sub-layer in the HNB in some embodiments.
- FIG. 21 illustrates the setup of UE context identifiers via UE registration in some embodiments.
- FIG. 22 illustrates the fields of an Iuh RANAP Header in some embodiments.
- FIG. 23 illustrates a RANAP-H PDU in some embodiments.
- FIG. 24 illustrates a Context Create Request (CCREQ) message in some embodiments.
- FIG. 25 illustrates an Iuh RANAP header, in some embodiments.
- FIG. 26 illustrates the structure of a PDU used for transferring an HNBAP message in some embodiments.
- FIG. 27 illustrates a Create UE Context Request going from the HNB to the HNB-GW in some embodiments.
- FIG. 28 illustrates a Create UE Context Accept message going from the HNB-GW to the HNB in some embodiments.
- FIG. 29 illustrates a Release UE Context message going from either the HNB-GW to the HNB or the HNB to the HNB-GW in some embodiments.
- FIG. 30 illustrates a Release UE Context Complete message going from either the HNB-GW to the HNB or the HNB to the HNB-GW in some embodiments.
- FIG. 31 illustrates the case when the HNB powers on and does not have stored information on the Serving HNB-GW, and then performs a discovery procedure with the provisioning HNB-GW and SeGW in some embodiments.
- FIG. 32 illustrates the HNB Power on registration procedure in some embodiments.
- FIG. 33 illustrates UE registration with the HNB in some embodiments.
- FIG. 34 illustrates a procedure for the HNB-GW to allow UE registration using temporary identity in some embodiments.
- FIG. 35 illustrates the UE rove out procedure, where the UE leaves the HNB coverage area while idle in some embodiments.
- FIG. 36 illustrates the case when the UE powers down and performs an IMSI detach via the HNB access network in some embodiments.
- FIG. 37 illustrates the loss of Iuh interface capacity for the HNB in some embodiments.
- FIG. 38 illustrates an HNB-initiated register update between the HNB and HNB-GW in some embodiments.
- FIG. 39 illustrates the HNB-GW-initiated registration update between the HNB and HNB-GW in some embodiments.
- FIG. 40 illustrates the CS Handover from HNB to UTRAN in some embodiments.
- FIG. 41 illustrates the CS handover from HNB to GERAN procedure in some embodiments.
- FIG. 42 illustrates the PS Handover from HNB to UTRAN in some embodiments.
- FIG. 43 illustrates the PS handover from HNB to GERAN procedure in some embodiments.
- FIG. 44 illustrates CS bearer establishment (ATM transport) procedures (for MO/MT calls, using Iu-UP over AAL2) in some embodiments.
- ATM transport CS bearer establishment
- FIG. 45 illustrates CS bearer establishment (IP transport) procedures (for MO/MT calls, using Iu-UP over AAL2) in some embodiments.
- FIG. 46 illustrates a mobile originated call over HNB procedure in some embodiments.
- FIG. 47 illustrates a mobile terminated PSTN-to-mobile call procedure in some embodiments.
- FIG. 48 illustrates a call release by an HNB subscriber procedure in some embodiments.
- FIG. 49 illustrates an example relay of DTAP supplementary service messages in some embodiments.
- FIG. 50 illustrates an uplink control plane data transport procedure in some embodiments.
- FIG. 51 illustrates a downlink control plane data transport procedure in some embodiments.
- FIG. 52 illustrates the HNB protocol architecture related to CS and PS domain SMS support builds on the circuit and packet services signaling architecture in some embodiments.
- FIG. 53 illustrates a CS mode mobile-originated SMS over HNB scenario in some embodiments.
- FIG. 54 illustrates an emergency call routing over HNB using service area procedure in some embodiments.
- FIG. 55 illustrates an emergency call routing over HNB of an unauthorized UE using service area procedure in some embodiments.
- FIG. 56 illustrates a location based emergency call routing over HNB procedure in some embodiments.
- FIG. 57 illustrates HNB security mechanisms in some embodiments.
- FIG. 58 illustrates message flow for security mode control over HNB in some embodiments.
- FIG. 59 illustrates a CN AKA authentication over HNB procedure in some embodiments.
- FIG. 60 illustrates the SAC for a new HNB connecting to the HNB network in some embodiments.
- FIG. 61 illustrates the SAC for an HNB getting redirected in HNB network in some embodiments.
- FIG. 62 illustrates the SAC for an HNB registering in a restricted UMTS coverage area in some embodiments.
- FIG. 63 illustrates the SAC for an unauthorized UE accessing an authorized HNB in some embodiments.
- FIG. 64 conceptually illustrates a computer system with which some embodiments are implemented.
- Some embodiments provide methods and systems for integrating a first communication system with a core network of a second communication system that has a licensed wireless radio access network.
- the first communication system includes one or more user hosted access points that operate using short range licensed wireless frequencies in order to establish service regions of the first communication system and a network controller for communicatively coupling the service regions associated with the access points to the core network.
- the first communication system of some embodiments includes a Home Node-B (HNB) Access Network (HNB-AN) where the access points are Home Node-Bs and the network controller is a HNB Gateway (HNB-GW).
- the licensed wireless radio access network of the second communication system of some embodiments includes a Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (UTRAN) and the core network of the second communication system includes a core network of the UMTS.
- UMTS Universal Mobile Telecommunications System
- UTRAN Universal Mobile Telecommunications System
- the network controller of some embodiments seamlessly integrates each of the short range licensed wireless service regions with the core network.
- the network controller seamlessly integrates with the core network by using existing Iu interfaces of the core network to communicatively couple each of the service regions to the core network.
- the network controller of some embodiments uses standardized messaging and protocols to communicate with the core network while utilizing HNB-AN messaging and protocols to communicate with each of the service regions.
- the network controller of some embodiments reduces deployment costs of the HNB-AN within the UMTS core network.
- deployment of the network controller of some embodiments requires no change to the UMTS core network while still providing HNB wireless service that combines the mobility of licensed wireless networks with the quality and speed of landline/broadband services.
- the network controllers take on some of the functionality of a traditional Radio Network Controller (RNC).
- RNC Radio Network Controller
- the access points of some embodiments seamlessly integrate with existing user equipment (UE) of the licensed wireless radio access networks of the second communication system.
- UE user equipment
- the access points reduce deployment costs of the HNB-AN, as users are able to utilize existing UE in order to wirelessly communicate through either the first communication system or the second communication system where the first communication system combines the wireless mobility afforded by the licensed wireless radio access network of the second communication system with the speed and quality of service afforded by landline/broadband services.
- the access points are functionally equivalent to a Node-B of the UTRAN while having the flexibility and lower deployment costs associated with an ad-hoc and user hosted service region.
- the access points take on some the functionality of a traditional Radio Network Controller (RNC).
- RNC Radio Network Controller
- Some embodiments define multi-layered protocol stacks for implementing management functionality within the access points and the network controller of the first communication system.
- the protocol stacks include a management layer that performs functionality of the HNB Application Part (HNBAP) protocol.
- HNBAP HNB Application Part
- the protocol stacks of some embodiments implement management functionality that includes a registration procedure for registering a particular access point with the network controller.
- the protocol stacks enable a registration procedure that allows a service region associated with a particular access point to access services of the core network through the network controller.
- Additional management functionality implemented by the protocol stacks of some embodiments include discovery procedures for identifying a network controller with which the particular access point is to register.
- the protocol stacks include a Radio Access Network Application Part (RANAP) user adaptation (RUA) layer that enables a method for transparently passing RANAP messages between the access points and the network controller over a reliable transport connection.
- the method receives a RANAP message and encapsulates the message with a RUA header.
- the method then passes the encapsulated message to a receiving endpoint within the first communication system. In this manner, the RANAP message is passed from a first endpoint of the first communication system to a second endpoint of the first communication system.
- RANAP Radio Access Network Application Part
- RUA Radio Access Network Application Part
- the network controller decodes and processes only the RUA header before relaying the RANAP message to the core network operating within a service region of the first communication system.
- an access point performs the RANAP encapsulation and the receiving endpoint is a network controller.
- the network controller performs the RANAP encapsulation and the receiving endpoint is an access point.
- the receiving endpoint need only decode and process the RUA header.
- RANAP is only used to communicate with core network.
- the communication with UE e.g. by the HNB uses the RRC protocol as per 3GPP 25.331 specifications.
- the HNB on the receiving end processes the RUA as well as the entire RANAP message.
- the content of the RANAP messages are extracted by the HNB and converted to appropriate RRC messages.
- Some embodiments define messaging formats to be used in conjunction with the various protocol stacks. Some embodiments provide a message that when sent from a particular access point to the network controller explicitly indicates the start of a communication session between the particular access point and the network controller. In some embodiments, the contents of the message are used to route the establishment of a signaling connection from the network controller to a core network node within a core network domain identified by the message.
- Some embodiments provide a computer readable storage medium of an access point that stores a computer program.
- the computer program includes instructions that are executable by one or more processors.
- the computer program includes a set of instruction for generating a message to send to the network controller to explicitly indicate start of a communication session with the network controller.
- the message includes a Radio Access Network Application Part (RANAP) message for establishing a signaling connection with the network controller.
- the computer program also includes a set of instructions for passing a set of RANAP messages to the core network through the network controller after establishing the signaling connection.
- the set of RANAP messages facilitates communications between the particular access point and the core network.
- RANAP Radio Access Network Application Part
- Some embodiments provide a computer readable storage medium of a particular access point that stores a computer program.
- the computer program includes instructions that are executable by one or more processors.
- the computer program includes a set of instruction for receiving a message to explicitly indicate start of a communication session with a particular access point.
- the message includes a Radio Access Network Application Part (RANAP) message that is encapsulated with a header of the second network.
- RANAP Radio Access Network Application Part
- the message is used for establishing a signaling connection with the particular access point.
- the computer program also includes a set of instructions for analyzing the message header to identify a destination in the core network to receive the message.
- the computer program further includes a set of instructions for forwarding the message without the header to the destination in the core network to establish the signaling connection
- Some embodiments further provide messages for directly transferring data downstream from the core network through the first communication system to a UE operating within a particular service region. Some embodiments provide messages for directly transferring data upstream from a UE in a particular service region through the first communication system to the core network. Directly transferring data involves routing a RANAP message through the network controller and an access point where the contents of the RANAP message are not processed by the network controller. In some embodiments, the network controller may process and modify the content of some of the RANAP message (for example, transport network switching that is converting ATM transport from/to the core network into the appropriate IP transport over the HNB-AN).
- Some embodiments provide a computer-readable medium that is encoded with a data storage structure.
- the data storage structure for passing a Radio Access Network Application Part (RANAP) message within a first communication system that includes several user hosted access points for establishing service regions of the first communication system by using short range licensed wireless frequencies and a network controller that can communicatively couple user equipment operating in the service regions to a core network of a second communication system that also includes a licensed wireless radio access network.
- the data storage structure has a header that includes a core network domain identity to identify at least one of a core network domain from which the RANAP message originated and a core network domain for which the RANAP message is to be sent.
- the header also includes a context identifier to uniquely identify a particular user equipment operating within a particular service region of the second communication system.
- the data storage structure also includes payload data that include the RANAP message.
- the registration procedure of some embodiments specifies a method for registering UEs with the first communication system.
- the method from an access point coupled to a UE sends a registration request message to the network controller on behalf of the UE.
- the method receives a registration accept message when the UE is authorized to access services of the first communication system through the particular access point.
- some embodiments include a uniquely assigned context identifier that identifies the UE while the UE is connected for service at the particular access point. All subsequent messages will include the assigned context identifier to identify the UE.
- the registration procedure of some embodiments also specifies a method for registering an access point with the network controller.
- the method includes the access point sending its identification information and location information to the network controller.
- the network controller determines whether the access point identified by the identification information at the specified location is permitted to access services of the first communication system through the network controller. When permitted, the access point receives a registration accept message from the network controller. Otherwise, the method rejects the access point or redirects the access point to another network controller.
- Some embodiments provide emergency responders the ability to locate a position of an emergency caller when the caller places the emergency request through a service area of the first communication system. More specifically, some embodiments provide a method whereby unauthorized UEs are still permitted limited service to the first communication system in order to establish an emergency call when in a service region of the first communication system.
- the method includes receiving, at a particular access point, a service request from a UE indicating that the UE is requesting emergency services.
- the particular access point then performs a registration procedure with the network controller that indicates that the purpose of the registration is to request emergency services for the UE.
- the method includes receiving a registration accept message with a context identifier to be used by the UE in order to access limited services of the first communication system, specifically, emergency services.
- Some embodiments provide a method that at the network controller, establishes a bearer connection between a particular access point and the core network.
- the establishing the bearer connection includes initiating signaling to establish an asynchronous transfer mode (ATM) based bearer connection between the network controller and the core network.
- the establishing the bearer connection also includes establishing an Internet Protocol (IP) based bearer connection between the network controller and the particular service region.
- IP Internet Protocol
- the method also includes receiving a message from the particular access point for establishing a user plane between the particular access point and the core network.
- the method also includes establishing the user plane by using the IP based bearer connection between the particular access point and the network controller and the ATM based bearer connection between the network controller and the core network.
- the network controller routes user plane data received from the particular access point over the IP based bearer connection to the core network through the ATM based bearer connection by the network controller.
- Some embodiments provide a method for user equipment (UE) registration with a closed subscriber group (CSG) system.
- the method receives a UE registration request at the network controller from an access point.
- the request includes an initial NAS message from the UE and a CSG identification associated with the access point.
- the method relays the registration request that includes the initial NAS message and the CSG identification to the core network.
- the method receives a permanent identity of the UE from the core network based on the registration request.
- the method uses the permanent identity of the UE to complete the UE registration.
- Section I discusses the HNB system architecture.
- Section II describes various protocol architectures of the HNB system, including protocol architectures for the Home Node-B Application Part (HNBAP) and the Radio Access Network Application Part (RANAP) User Adaption (RUA) layer.
- Section III discusses mobility management within the HNB system, including mobility management scenarios and relocation.
- Section IV describes call management and some call management scenarios.
- Section V discusses packet services.
- Section VI discusses short message services and scenarios.
- Section VII describes emergency services, including service area based routing and location based routing.
- Section VIII discusses Lawfully Authorized Electronic Surveillance (LAES) Service.
- LAES Lawfully Authorized Electronic Surveillance
- Section IX discusses HNB security, including authentication, encryption, a profile of IKEv2, a profile of IPSec ESP, security mode control, and core network authentication.
- Section X describes HNB service access control (HNB SAC), including HNB-GW and service area selection, and service access control use case examples.
- Section XI analyzes the impacts of various access control policies.
- Section XII provides a description of a computer system with which some embodiments of the invention are implemented.
- Section XIII lists the abbreviations and provides definitions for terms found herein.
- FIG. 1 illustrates a system architecture for 3 G HNB deployments in accordance with some embodiments of the invention.
- the system includes a HNB access network (or HNB system) 110 .
- the key features of the 3 G HNB system architecture include (a) support for a standard User Equipment (UE) 105 as defined in the 3GPP technical specification TS 23.101 entitled “General UMTS architecture” which is incorporated herein by reference and (b) co-existence with the UMTS Terrestrial Radio Access Network (UTRAN) and interconnection with the existing Core Network (CN) 115 via the standardized interfaces defined for UTRAN.
- UE User Equipment
- CN Core Network
- the standardized interfaces include (a) the Iu-cs interface for circuit switched services as overviewed in the 3GPP technical specification (TS) 25.410 entitled “UTRAN Iu Interface: general aspects and principles” which is incorporated herein by reference, (b) the Iu-ps interface for packet switched services as overviewed in the 3GPP TS 25.410, (c) the Iu-pc interface for supporting location services as described in the 3GPP TS 25.450 entitled “UTRAN Iupc interface general aspects and principles” which is incorporated herein by reference, and (d) the Iu-bc interface for supporting cell broadcast services as described in the 3GPP TS 25.419 entitled “UTRAN Iu-BC interface: Service Area Broadcast Protocol (SABP)” which is incorporated herein by reference.
- SABP Service Area Broadcast Protocol
- some embodiments utilize existing Iu and Uu interfaces within the HNB-AN 110 .
- the HNB-AN 110 addresses some of the key issues in the deployment of 3 G HNB applications, such as the ad-hoc and large scale deployment of 3 G HNBs using public infrastructure such as the Internet.
- FIG. 2 illustrates elements of the HNB Access Network (HNB-AN) 200 architecture in accordance with some embodiments.
- This figure includes (3 G) HNB 205 , Generic IP Access Network 210 , HNB-GW 215 , HNB Management System 220 , Iuh interface 225 that is established between the Generic IP Access Network 210 and the HNB-GW 215 , and an interface 230 between the HNB-GW 215 and the HNB Management System 220 .
- the interface 230 is based on the 3GPP TR-069 family of standards.
- the interface 230 is the Iuhm interface.
- FIG. 2 and other figures below illustrate a single access point (e.g., HNB 205 ) communicatively coupled to a network controller (e.g., HNB-GW 215 ).
- a network controller e.g., HNB-GW 215
- the network controller e.g., HNB-GW 215
- the network controller communicatively coupled to several HNBs and the network controller communicatively couples all such HNBs to the core network.
- the HNB of some embodiments is communicatively coupled to several UEs.
- the figures merely illustrate a single HNB communicatively coupled to the HNB-GW for purposes of simplifying the discussion to interactions between a single access point and a single network controller. However, the same network controller may have several of the same interactions with several different access points.
- FIG. 3 illustrates the HNB-AN system architecture of some embodiments integrated with a core network of a second communication system that includes a licensed wireless radio access network.
- the HNB system includes (1) Home Node-B (HNB) 305 , (2) Home Node-B Gateway (HNB-GW) 315 , (3) Broadband IP Network 320 , (4) Security Gateway (SeGW) 325 , and (6) HNB Management System 330 .
- the licensed wireless radio access network of the second communication system includes UTRAN 385 which is comprised of a Node-B 380 and a Radio Network Controller 375 of a UMTS.
- the core network of the second communication system includes Mobile Switching Center (MSC) 365 , Serving GPRS Support Node (SGSN) 370 , Authorization, Authentication, and Accounting server 355 , and Home Location Register 360 . Additionally, Service Mobile Location Center (SMLC) 340 and Cell Broadcast Center (CBC) 345 may be components of the core network.
- MSC Mobile Switching Center
- SGSN Serving GPRS Support Node
- CBC Cell Broadcast Center
- UE User Equipment
- UE 310 is used to access services of the HNB-AN and also access services of the licensed wireless radio access network 385 of a cellular provider. In some such embodiments, the UE seamlessly transitions from the HNB-AN to the cellular provider and vice versa without loss of connectivity. In some embodiments, the UE 310 is thus a standard device operating over licensed spectrum of a licensed wireless system provider. Accordingly, the UE 310 wirelessly connects to the HNB 305 using the same signaling and messaging interfaces as it would when connecting to a base station, such as a base transceiver station (BTS) in GSM, or the Node-B 380 of a Universal Mobile Telecommunications System (UMTS).
- BTS base transceiver station
- UMTS Universal Mobile Telecommunications System
- FIG. 4 illustrates some of the various devices that may be used in some embodiments in order to access services of the HNB-AN or HNB system.
- the devices include (1) standard licensed wireless handsets 405 and wireless enabled computers 410 that connect through an HNB 415 , (2) dual mode handsets with WiMAX capabilities 420 that connect through WiMAX access points 425 , (3) devices such as wired telephones 430 and faxes 435 that connect through terminal adapters 440 , and (4) softmobile enabled devices 445 .
- the UE 310 includes cellular telephones 405 , smartphones, PDAs, and modem like devices some of which are shown in FIG. 4 .
- These devices include any device that wirelessly communicates with a licensed wireless service provider using existing licensed wireless technologies, such as Global System for Mobile (GSM) communications, UMTS, etc.
- GSM Global System for Mobile
- the UE 310 includes a terminal adaptor device (such as 440 of FIG. 4 ) that allows incorporating fixed-terminal devices such as telephones, faxes, and other equipments that are not wirelessly enabled within the HNB-AN.
- a terminal adaptor device such as 440 of FIG. 4
- fixed-terminal devices such as telephones, faxes, and other equipments that are not wirelessly enabled within the HNB-AN.
- the service behaves as a standard analog fixed telephone line.
- the service is delivered in a manner similar to other fixed line VoIP services, where a UE is connected to the subscriber's existing broadband (e.g., Internet) service.
- broadband e.g., Internet
- the UE 310 includes a dual mode cellular/WiMAX UE (such as 420 of FIG. 4 ) that enables a subscriber to seamlessly transition between a cellular network and a WiMAX network through a WiMAX access point (such as 425 of FIG. 4 ).
- a dual mode cellular/WiMAX UE such as 420 of FIG. 4
- a WiMAX access point such as 425 of FIG. 4
- the UE 310 of some embodiments includes SoftMobile like devices.
- a subscriber would place a USB memory stick with an embedded SIM into a USB port of their laptop.
- a SoftMobile client would automatically launch and connect over IP to the mobile service provider. From that point on, the subscriber would be able to make and receive mobile calls as if she was in her home calling area.
- the Home Node-B (HNB) 305 is an access point that offers a standard radio interface (Uu) for user equipment (UE) connectivity using short range licensed wireless frequencies.
- the HNB 305 provides the radio access network connectivity to the UE using the Iuh interface towards the HNB-GW 315 .
- the HNB 305 differs from the UMTS Node-B in that the range of wireless connectivity supported by the HNB 305 (e.g., tens of meters) is much less than the range supported by the UMTS Node-B (e.g., hundreds or thousands of meters). This is because the HNB 305 is a low power and a short range device similar to wireless access points found within a user's home. The low power and short range requirement ensures that the HNB 305 does not interfere with the service regions of the licensed wireless system providers (e.g., cellular networks) that are established using the wireless frequencies that the licensed wireless system providers licensed from the government at great expense. Moreover, the low power requirement enables the HNB 305 to operate using standard electrical outlets of a user's home or office.
- the licensed wireless system providers e.g., cellular networks
- the low power and short range requirement further facilitates the small scale of the HNB device relative to the radio access network Node-B devices.
- the HNB is a much smaller device often the size of 802.11 wireless routers commonly found within a user's home.
- the Node-B is network equipment of a UMTS Terrestrial Radio Access Network (UTRAN).
- the Node-B is managed and operated by a licensed wireless system provider.
- the Node-B of the licensed wireless system has to provide service to many more users than the HNB 305 and must do so without loss of connectivity over vast regions (e.g., states and countries).
- the licensed wireless service provider deploys several Node-Bs that are adjacent to one another in order to create an uninterrupted region of coverage.
- an HNB service region established by a first HNB does not need to be adjacent to any other HNB service region and need not offer uninterrupted service between HNB service regions.
- the HNB 305 is user hosted as opposed to the Node-B that is hosted by the licensed wireless system.
- a user hosted HNB allows a user to specify the location of the HNB, provide the connectivity between HNB and the HNB network or HNB-GW (e.g., the broadband connection), control operation of the HNB, for example, by providing power to the HNB, or manage the HNB by modifying configuration parameters of the HNB. All such control over the Node-B is tightly managed by the licensed wireless system provider.
- the HNB is customer premise equipment (CPE) that a user is able to purchase from an electronics store or from the HNB-AN provider, whereas the Node-B is network equipment that is impractical for a single user to purchase, operate, and maintain.
- CPE customer premise equipment
- HNB architecture a key characteristic of the HNB architecture of some embodiments is that there are no permanent pre-configured peer adjacencies between HNB and HNB-GW. Instead, there are ad-hoc adjacencies that are initiated from the HNB (as it is usually behind a NAT/firewall, and does not have a permanent IP address in the carrier network).
- the HNB system therefore offers flexibility in deploying service.
- the HNBs of an HNB system may be deployed on an ad hoc basis as opposed to the regimented deployment structure of the licensed wireless system.
- the HNB 305 supports enhancements for operating in an ad-hoc environment and the Node-B does not.
- the ad hoc system allows for individual users to establish HNB service regions based on each user's needs.
- each user purchases an HNB and each of the HNBs may be purchased from different vendors with different HNB implementations.
- the ad hoc HNB system creates several individual local coverage areas based on user deployment of each HNB whereas the licensed wireless system deploys its Node-Bs in an effort to provide regional coverage area that is uninterrupted across large areas (e.g., hundreds of miles).
- the HNB system provider deploys the HNBs rather than the users.
- the system remains ad hoc by virtue of the discontinuous nature of the separate and local HNB service regions.
- the HNBs remain user hosted since power and broadband connectivity is provided by the user even though the system provider more closely regulates the HNB equipment that is deployed.
- the ad hoc nature of the HNB system also allows the system to grow and shrink as its user base grows and shrinks. For example, whenever a new user desires to utilize the HNB service, the user purchases and hosts a HNB at a home or office location. The user hosted HNB provides the user with a HNB-AN service region from which the user access HNB system services. Conversely, the licensed wireless system provider must first deploy several Node-Bs in order to provide extensive large scale regional coverage. Once the service regions are established at great expense to the licensed wireless system provider, users then activate service with the licensed wireless system provider. Accordingly, the HNB system is an unplanned system whereas the licensed wireless system is a planned system. In other words, the HNB system does not need an existing access point infrastructure in order to operate.
- the licensed wireless system requires that there be an existing infrastructure before new users can be added.
- the infrastructure of the licensed wireless system is planned in the sense that the infrastructure is built first in a particular region and then the service is marketed to that region after the infrastructure is built.
- the HNB 305 also differs from generic access points used in UMA systems. Specifically, in a UMA system the access points act as transparent base stations. In other words, the user equipment and the network controller directly communicate. In the HNB system, however, the HNB 305 includes various Radio Network Controller (RNC) functionality. In some such embodiments, the HNB 305 initiates various messaging procedures and maintains state information regarding user equipment operating within the service region associated with the HNB 305 .
- the HNB 305 is equipped with either a standard 3 G Universal Subscriber Identity Module (USIM) or a 2 G SIM.
- USIM Universal Subscriber Identity Module
- SIM 2 G SIM
- the HNB identity of some embodiments is based on Media Access Control (MAC) address of the HNB or any other globally unique identifier such as the combination of vendor identity and serial number from that vendor.
- MAC Media Access Control
- the access points of some embodiments include circuits for receiving, transmitting, generating, and processing the various messages that cause various physical transformations within the HNB-AN, core network, and licensed wireless radio access network.
- the circuits of the access points include a processor, memory, receiver, and transceiver.
- the receiver and/or the transceiver are wireless interfaces that operate using short range licensed wireless frequencies.
- the receiver and/or the transceiver are wired interfaces (e.g., DSL, cable, etc.). These circuits perform various physical transformations on the access point as well as other elements within the HNB-AN, licensed wireless radio access network, and core network.
- the processor in conjunction with the memory generate a paging message that when sent to a UE using the transceiver causes the UE to prompt the user of an incoming call.
- the access point registers a UE by generating a registration message that is sent to the network controller using the transceiver when the access point detects that the UE has camped on the service region of the access point based on a location update message received by the access point on its receiver.
- the HNB is one implementation of an access point that operates using short range licensed wireless frequencies. Some embodiments allow for any access point that operates using short range licensed wireless frequencies to be used in place of or in conjunction with the HNBs.
- a Femtocell access point is a different implementation of an access point that provides short range licensed wireless frequencies in order to establish a service region of a Femtocell system that is similar to the HNB system described in relation to some embodiments of the invention.
- the HNB 305 provides radio access network connectivity for the UE 310 .
- the HNB 305 then communicatively couples the UE to the HNB-GW 315 using the Iuh interface that exists between the HNB 305 and the HNB-GW 315 .
- the Iuh interface is established over a broadband Internet Protocol (IP) network 320 where, in some embodiments, a customer's broadband connection is utilized.
- IP Internet Protocol
- the broadband IP Network 320 represents all the elements that collectively, support IP connectivity between the HNB-GW 315 and the HNB 305 .
- the IP network 320 is assumed to be an untrusted public IP network without any Asynchronous Transfer Mode (ATM) or Signaling System 7 (SS7) infrastructure.
- ATM Asynchronous Transfer Mode
- SS7 Signaling System 7
- the broadband IP network 320 includes (1) other Customer premise equipment (e.g., Digital Subscriber Line (DSL)/cable modem, Wireless Local Area Network (WLAN) switch, residential gateways/routers, switches, hubs, WLAN access points), (2) network systems specific to the broadband access technology (e.g., DSL Access Multiplexer (DSLAM) or Cable Modem Termination System (CMTS)), (3) Internet Service Provider (ISP) IP network systems (edge routers, core routers, firewalls), (4) wireless service provider (WSP) IP network systems (edge routers, core routers, firewalls) and Network address translation (NAT) functions, either standalone or integrated into one or more of the above systems.
- DSL Access Multiplexer DSL Access Multiplexer
- CMTS Cable Modem Termination System
- ISP Internet Service Provider
- WSP wireless service provider IP network systems
- NAT Network address translation
- the HNB-GW 315 is a network controller that provides network connectivity of the HNB 305 to the existing core network (CN) 335 .
- the HNB-GW 315 entity appears as a legacy RNC to the existing CN 335 .
- the HNB-GW 315 uses existing Iu interfaces (e.g., Iu-cs and Iu-ps) for CN connectivity.
- Iu-cs and Iu-ps existing Iu interfaces
- the HNB system may be integrated into the existing CN 335 with no change to the CN 335 . This allows licensed wireless system providers the ability to provide HNB system functionality to their users with no change to their existing network.
- the HNB-GW 315 connects to the HNB 305 using the Iuh interface. Additional interfaces of the HNB-GW 315 include the Iu-pc interface to the Service Mobile Location Center (SMLC) 340 , the Iu-bc interface to the Cell Broadcast Center (CBC) 345 , the Wm interface to the Authorization, Authentication, and Accounting (AAA) server 355 , and an interface that is based on the 3GPP TR-069 family of standards, as specified by the DSL Forum technical specifications, to the HNB management system 330 . In some embodiments, the interface to the HNB management system 330 is the Iuhm interface.
- SMLC Service Mobile Location Center
- CBC Cell Broadcast Center
- AAA Authorization, Authentication, and Accounting
- the interface to the HNB management system 330 is the Iuhm interface.
- the Iuhm interface carries information related to customer premise equipment (CPE) device management functionality between the HNB and HNB Mgmt System. It should be apparent to one of ordinary skill in the art that other interfaces may be used instead of or in addition to the above enumerated interfaces.
- CPE customer premise equipment
- the HNB-GW 315 connects to several different HNBs and services each of the corresponding service regions of each of the several HNBs.
- a single HNB-GW such as the HNB-GW 315 , communicatively couples multiple HNB service regions to the CN 335 .
- the HNB-GW 315 provides call management functionality, mobility management functionality, security functionality, etc. as will be described in greater detail below.
- the HNB-GW 315 also performs key functionalities, such as the management of the legacy UTRAN identifiers (Location Area Identifiers (LAI), Service Area Identifiers (SAI), RND-Id, etc.) towards the CN 335 , and Iuh interface management.
- LAI Local Area Identifiers
- SAI Service Area Identifiers
- RND-Id Radio Network-Id
- the HNB-GW 315 includes various software module sub-components and/or various hardware module sub-components that perform some of the above mentioned functionality.
- the Security Gateway (SeGW) 325 is a logical entity within the HNB-GW 315 .
- the SeGW 325 provides the security functions including termination of secure access tunnels from the HNB 305 , mutual authentication, encryption and data integrity for signaling, voice and data traffic.
- the HNB Management System 330 provides centralized Customer Premise Equipment (CPE) device management for the HNB 305 and communicates with the HNB 305 via the security gateway logical entity. This system is used to manage a large number of HNBs including configuration, failure management, diagnostics, monitoring and software upgrades. In some embodiments, the HNB Management System 330 utilizes existing CPE device management techniques such as those described in the DSL Forum technical specifications TR-069.
- CPE Customer Premise Equipment
- the network controller of some embodiments includes circuits for receiving, transmitting, generating, and processing the various messages that cause various physical transformations within the HNB-AN, core network, and licensed wireless radio access network.
- the circuits of the network controller include a processor, memory, receiver, and transceiver. These circuits perform various physical transformations on the network controller as well as other elements within the HNB-AN, licensed wireless radio access network, and core network.
- the processor in conjunction with the memory generate context identifiers that when sent to a UE using the transceiver provide the UE with a unique identifier when operating within the HNB-AN.
- the HNB-GW 315 provides network connectivity of the HNB 305 to the existing CN 335 .
- the CN 335 includes one or more HLRs 360 and AAA servers 355 for subscriber authentication and authorization. Once authorized, the UE may access the voice and data services of the CN 335 through the HNB system.
- the CN 335 includes a Mobile Switching Center (MSC) 365 to provide circuit switched services (i.e., voice).
- the CN also includes a Serving GPRS Support Node (SGSN) 370 to provide packet switched services. Though not shown in FIG. 3 , the SGSN operates in a conjunction with a Gateway GPRS Support Node (GGSN) in order to provide the packet switched services.
- MSC Mobile Switching Center
- SGSN Serving GPRS Support Node
- GGSN Gateway GPRS Support Node
- the SGSN 370 is typically responsible for delivering data packets from and to the GGSN and the UE within the geographical service area of the SGSN 370 . Additionally, the SGSN 370 may perform functionality such as mobility management, storing user profiles, and storing location information. However, the actual interface from the CN 335 to various external data packet services networks (e.g., public Internet) is facilitated by the GGSN. As the data packets originating from the UE typically are not structured in the format with which to access the external data networks, it is the role of the GGSN to act as the gateway into such packet services networks. In this manner, the GGSN provides addressing for data packets passing to and from the UE and the external packet services networks (not shown). Moreover, as the user equipment of a licensed wireless network traverses multiple service regions and thus multiple SGSNs, it is the role of the GGSN to provide a static gateway into the external data networks.
- the GGSN provides addressing for data packets passing to and from the UE and the external packet
- the CBC 345 provides support for cell broadcast services.
- the licensed wireless system will be described with reference to the UTRAN of a UMTS. However, it should be apparent to one of ordinary skill in the art that any licensed wireless system, such as a GSM/EDGE Radio Access Network (GERAN) may be used to reference the licensed wireless system.
- GERAN GSM/EDGE Radio Access Network
- Elements common to a UTRAN based cellular network include multiple base stations referred to as Node-Bs that facilitate wireless communication services for various UE via respective licensed radio links (e.g., radio links employing radio frequencies within a licensed bandwidth).
- the licensed wireless channel may comprise any licensed wireless service having a defined UTRAN or GERAN interface protocol (e.g., Iu-cs and Iu-ps interfaces for UTRAN or A and Gb interfaces for GERAN) for a voice/data network.
- the UTRAN 385 typically includes at least one Node-B 380 and a Radio Network Controller (RNC) 375 for managing the set of Node-Bs.
- RNC Radio Network Controller
- the multiple Node-Bs are configured in a cellular configuration (one per each cell) that covers a wide service area.
- a licensed wireless cell is sometimes referred to as a macro cell which is a logical term used to reference, e.g., the UMTS radio cell (i.e., 3 G cell) under Node-B/RNC which is used to provide coverage typically in the range of tens of kilometers.
- the UTRAN or GERAN is sometimes referred to as a macro network.
- Each RNC communicates with components of the core network through the above described standard radio network controller interface such as the Iu-cs and Iu-ps interfaces.
- a RNC communicates with MSC via the UTRAN Iu-cs interface for circuit switched services.
- the RNC communicates with SGSN via the UTRAN Iu-ps interface for packet switched services through GGSN. It is through the use of these standardized network interfaces that the HNB system, more particularly the HNB-GW, may be seamlessly integrated to leverage services of the CN and emulate functionality of a legacy RNC of the licensed wireless system.
- the protocol stacks include software layers that are stored to the memory of the HNB and HNB-GW and that are executed by a processing unit of the HNB and HNB-GW.
- the protocol stacks are implemented as hardware modules within the HNB and HNB-GW. Additional hardware components of the HNB and HNB-GW are described below in Section XII, “Computer System”.
- the HNB system separates management functions from control plane functions into two separate protocol stacks.
- the HNB Application Part (HNBAP) protocol architecture implements the management functions for the HNB system and the RANAP User Adaptation (RUA) protocol architecture implements the control functions for the HNB system.
- HNBAP HNB Application Part
- ROA User Adaptation
- additional protocol architectures are specified for providing other functionality such as user plane functionality.
- other protocol architectures may be integrated into the components of the HNB system and that the functionality of each of the protocol architectures is scalable to provide more or less functionality than described below.
- HNBAP HNB Application Part
- the HNBAP protocol architecture supports management functions between the HNB and HNB-GW including, but not limited to, the management of the underlying transport (i.e., the SCTP connection), HNB-GW discovery, and HNB and UE registration procedures.
- FIG. 5 illustrates the HNBAP protocol architecture in accordance with some embodiments. This figure illustrates (1) HNB 505 , (2) HNB-GW 515 , and (3) HNBAP protocol stacks of each of the HNB 505 and the HNB-GW 515 .
- the HNBAP protocol stacks include (1) access layers 510 , (2) transport IP layer 520 , (3) IP Security (IPSec) ESP layer 525 , (4) remote IP layer 540 , (5) Stream Control Transmission Protocol layer (SCTP) 530 , and (6) a HNBAP protocol layer 545 .
- IPSec IP Security
- SCTP Stream Control Transmission Protocol layer
- the underlying Access Layers 510 and “Transport IP” layer 520 (i.e., the “outer” IP layer associated with IPSec tunnel mode) provide the generic connectivity between the HNB 505 and the HNB-GW 515 .
- the IPSec layer 525 operates in tunnel mode and provides encryption and data integrity for communications and data that are passed using the upper layers ( 530 , 540 , and 545 ).
- SCTP 530 provides reliable transport between the HNB 505 and the HNB-GW 515 .
- SCTP 530 is transported using the “Remote IP” layer 540 (i.e., the “inner” IP layer associated with IPSec tunnel mode).
- the SCTP 530 establishes a single SCTP association between the HNB 505 and HNB-GW 515 .
- the same SCTP association is used for the transport of both the HNBAP messages as well as the RANAP messages (using RUA protocol), described in further detail below, over the Iuh interface 535 .
- the SCTP Payload Protocol Identifier (PPI) value is used to identify the protocol being transported in the SCTP data chunk (e.g., HNBAP or RUA).
- the PPI value used for HNBAP transport is coordinated between the HNB 505 and the HNB-GW 515 (e.g., the HNBAP PPI value should be registered with the Internet Assigned Numbers Authority (IANA)).
- Each SCTP association contains a number of “streams” which are used to support multiple flows across the Iuh interface.
- a dedicated SCTP stream i.e., stream id 0 of the underlying SCTP transport association
- TCP Transmission Control Protocol
- the HNBAP protocol 545 provides a resource management layer or equivalent functional layer capable of discovery of the serving HNB-GW, registration of the HNB and UE with the HNB-GW, registration updates with the HNB-GW, and support for the identification of the HNB being used for HNB access. It should be apparent to one of ordinary skill in the art that the HNBAP protocol layer of some embodiments implements additional resource management functionality and that the above enumerated list is an exemplary set of such functionality. In some embodiments, the HNBAP protocol 545 utilizes different message formats and utilizes a different set of procedures than the resource management layers of the 3GPP and UMA systems in order to implement the resource management layer of the HNB system.
- the HNB and HNB-GW After performing the management functions defined by the HNBAP protocol, the HNB and HNB-GW utilize a different protocol architecture that specifies the control plane in the HNB system.
- FIG. 6 illustrates the protocol architecture in support of the HNB control plane (i.e., for both the CS and PS domain) in accordance with some embodiments.
- FIG. 6 includes (1) HNB 605 , (2) HNB-GW 615 , (3) CN 640 , (4) UE 650 , and (5) control plane protocol stacks of each of the HNB 605 , the HNB-GW 615 , the CN 640 , and the UE 650 .
- the control plane protocol stacks of the HNB 605 and the HNB-GW 615 include (1) access layers 610 , (2) transport IP layer 620 , (3) IPSec layer 625 , (4) remote IP layer 640 , (5) SCTP 630 , (6) RANAP user adaptation (RUA) layer 635 , and (7) interworking functionality (IWF) 645 .
- IWF interworking functionality
- the control plane protocol stack of the CN 640 includes signaling transport layers defined according to the 3GPP technical specification TS 25.412, “UTRAN Iu Interface Signaling Transport”, herein incorporated by reference, a RANAP layer, and a Non Access Stratum (NAS) layer 665 that performs various call management, mobility management, General Packet Radio Service (GPRS) mobility management and session management, and short message services (SMS).
- the control plane protocol stack of the UE 650 includes a layer 1 signaling transport layer, a Media Access Control (MAC) layer, a Radio Link Control (RLC) layer, a Radio Resource Control (RRC) layer, and the NAS layer 665 .
- MAC Media Access Control
- RLC Radio Link Control
- RRC Radio Resource Control
- the underlying Access Layers 610 and “Transport IP” layer 620 provide the generic connectivity between the HNB 605 and the HNB-GW 615 .
- the IPSec layer 625 provides encryption and data integrity for communications and data that are passed using the upper layers.
- SCTP 630 provides reliable transport for the RANAP User Adaptation (RUA) layer 635 between the HNB 605 and the HNB-GW 615 .
- RUA User Adaptation
- the RANAP protocol is used for CS/PS signaling between the HNB 605 and the CN 640 .
- RANAP as is well known in the art, is an established protocol used for UMTS signaling between the CN and the UTRAN of a licensed wireless radio access network. Accordingly, the use of RANAP messages within the control plane of the HNB system, allows for the HNB system to support many of the UTRAN functions in the HNB system. These functions include: Radio Access Bearer (RAB) management, Radio Resource Management (RRM), Iu link management, Iu U-plane (RNL) management, mobility management, security, service and network access, and Iu coordination.
- RAB Radio Access Bearer
- RRM Radio Resource Management
- Iu link management Iu U-plane
- RNL Iu U-plane
- the HNB-GW 615 relays the RANAP messages between the HNB 605 and the CN 640 .
- the HNB-GW 615 terminates and re-originates some RANAP messages.
- the HNB-GW 615 terminates and re-originates connection-less RANAP messages.
- the HNB control plane protocol stacks of the HNB 605 and the HNB-GW 615 include the RUA layer 635 .
- the RUA layer 635 provides a lightweight mechanism to transport RANAP messages 660 and control functions between the HNB 605 and the HNB-GW 615 .
- the RUA layer 635 encapsulates the RANAP messages 660 in an RUA layer header for transport between the HNB 605 and the HNB-GW 615 . Therefore, through the use of the RUA 635 layer, no changes are made to the RANAP message definitions. Rather, all necessary changes are contained in the RUA header.
- the RUA adaptation layer of some embodiments enables: (1) transport of RANAP messages using SCTP over the Iuh interface between the HNB and HNB-GW, (2) support for associating and identifying UE specific logical connections (i.e., identifying the RANAP messages belonging to a specific UE via the concept of UE context identifiers), (3) support for routing the establishment of a signaling connection to a CN node within a CN domain (i.e., support for Iu-flex at the HNB-GW), (4) support for indicating the cause for establishing the UE specific logical connection (e.g., for emergency session establishment, etc.), (5) providing a mechanism to transparently relay the RANAP messages from the HNB to CN without the need to decode the encapsulated RANAP message, and (6) support for the indication of service domain (CS or PS) for the RANAP messaging.
- CS or PS service domain
- the RUA layer 635 does not duplicate existing RANAP procedures. Accordingly, RUA procedures are minimized.
- the HNB control plane protocol architecture of some embodiments simplifies context-ID allocation and associated functional overhead.
- the RUA 635 utilizes the same underlying transport (i.e., SCTP connection) as HNBAP. It should be apparent to one of ordinary skill in the art that it is also possible to use TCP as a reliable transport layer instead of SCTP.
- SCTP PPI value used for RUA transport is coordinated between the HNB 605 and the HNB-GW 615 (e.g., the RUA PPI value should be registered with IANA).
- a dedicated SCTP stream (e.g., stream id 0 of the underlying SCTP transport association) is used for the transport of connectionless RANAP messages 660 between the HNB 605 and the HNB-GW 615 .
- the number of SCTP streams to be established at SCTP connection setup and the mapping of UE transactions to the specific SCTP streams is an implementation choice.
- the use of UE Context-Id allows multiple UE transactions to be multiplexed over the same SCTP stream.
- the Inter-working Functionality (IWF) 645 in the HNB-GW 615 switches the RANAP messages 660 between the Iuh interface and the corresponding domain specific (CS/PS) Iu interface. It should be noted that the IWF 645 is a logical entity in the RUA protocol stack. As mentioned above, some RANAP messages 660 are terminated and re-originated in the HNB-GW 615 (e.g., connection-less RANAP messages) and some are modified in the HNB-GW 615 to adapt to the underlying transport towards the CN 640 (e.g., when using ATM interfaces towards the CN 640 ). Additionally, NAS protocol messages 655 (e.g., CC/MM/SMS, etc) are carried transparently between the UE 650 and the CN 640 .
- NAS protocol messages 655 e.g., CC/MM/SMS, etc
- the first RANAP message (i.e., the RANAP “Initial UE Message”) is carried from the HNB 605 in the INITIAL DIRECT TRANSFER message over the Iuh interface as is described below with reference to FIG. 7 .
- the INITIAL DIRECT TRANSFER message also carries information used to route the establishment of a signaling connection from HNB-GW 615 to a CN node within a CN domain (i.e. support for Iu-flex).
- connection-less RANAP messages are terminated and processed in the HNB-GW 615 .
- specific connectionless message e.g. Paging
- the DIRECT TRANSFER message is used to relay the specific connection-less message.
- the direct transfer mechanism for relaying RANAP messages provides a single protocol over the Iuh interface (i.e., clean architecture) whereby a single interface between HNB and HNB-GW functional entity is used.
- the direct transfer mechanism of some embodiments eliminates changes to the RANAP specifications for use over the Iuh interface. If RANAP were to be used directly over the Iuh interface, then all the specifications which reference RANAP would need to be updated to describe the applicability of existing RANAP messages between the two new nodes (e.g., HNB and the HNB-GW).
- the direct transfer mechanism eliminates the need for “RNC-ID” and “Iu signaling connection identifier” attributes on a per HNB basis, carried in the RANAP messages.
- the “RNC-ID” and “Iu-signaling connection identifier” carried in the downlink RANAP messages are processed by the HNB-GW and can be ignored by the HNB.
- the usage of the RNC-ID and Iu signaling connection identifier attributes can be implementation specific with no impact on the Iuh interface.
- the overhead (management and runtime) of the underlying transport layers of RANAP such as SCCP/M3UA are eliminated as well.
- the HNB sends a message to the HNB-GW to transfer the RANAP “Initial UE Message” from the HNB to the indicated core network domain.
- the message explicitly indicates the start of a communication session and the message contains parameters used to route the establishment of a signaling connection from the HNB-GW to a CN node within a CN domain when no signaling connection exists
- this message is an INITIAL DIRECT TRANSFER message.
- FIG. 7 illustrates INITIAL DIRECT TRANSFER message content, in some embodiments.
- the INITIAL DIRECT TRANSFER message includes the following information elements (IEs): length indicator, protocol discriminator, message identity, CN Domain Identity, Intra Domain Non Access Stratum (NAS) Node Selector (IDNNS), and an encapsulated RANAP message.
- the CN Domain Identity information element indicates the CN domain with which to establish the signaling connection.
- the IDNNS information element is used by the HNB-GW to route the establishment of a signaling connection to a core network node within the indicated core network domain. By using this explicit message, the HNB-GW is explicitly notified of impending signaling connection without having to process the contents of the message.
- the presence field indicates whether the information element is (1) mandatory (M) where the message is erroneous if the mandatory information element is missing, (2) conditional (C) where the presence of the information element depends on a value of a different information element, or (3) optional (O) where the presence of the information element is the choice of the sender.
- the format field indicates how the message is formatted.
- Type only (T) or Type and value (TV) indicates that the information element is of fixed length and an information element identifier is included.
- Value only (V) indicates that the information element is of fixed length but no information element identifier is included.
- Length and value (LV) indicates that the information element is of variable length, an information element identifier is not included, and a length indicator is included.
- Type, length, and value (TLV) indicates that the information element is of variable length and that an information element identifier and a length indicator are included.
- the HNB sends a message to the HNB-GW to transfer a subsequent (i.e., other than the initial RANAP message) RANAP message from the HNB to the indicated core network domain.
- this message is an UPLINK DIRECT TRANSFER message.
- FIG. 8 illustrates an UPLINK DIRECT TRANSFER message content, in some embodiments. As shown, the UPLINK DIRECT TRANSFER message includes a length indicator, protocol discriminator, message identity, CN Domain Identity, and RANAP message information elements.
- the HNB-GW sends a message to the HNB to transfer a RANAP message from the indicated core network domain to the HNB.
- this message is a DOWNLINK DIRECT TRANSFER message.
- FIG. 9 illustrates a DOWNLINK DIRECT TRANSFER message content, in some embodiments.
- the DOWNLINK DIRECT TRANSFER message includes a length indicator, protocol discriminator, message identity, CN Domain Identity, and RANAP message information elements.
- functionalities of the DOWNLINK DIRECT TRANSFER message and the UPLINK DIRECT TRANSFER message are carried by one message. In some embodiments, this message is referred to as a DIRECT TRANSFER message.
- the INITIAL DIRECT TRANSFER message is referred to as a CONNECT message.
- the transfer mechanism(s) involves encapsulation of the RANAP messages with additional header information.
- This additional header provides sufficient information to the HNB and HNB-GW for distinguishing and associating specific UE messages.
- the additional header also provides information used to route the establishment of a signaling connection from HNB-GW to a CN node within a CN domain (i.e. support for Iu-flex).
- FIG. 10 illustrates an applicable Protocol Data Unit (PDU) structure for the transport of RANAP, in some embodiments.
- the PDU 1000 includes an Iuh RANAP Header 1005 (i.e. the adaptation layer) and the RANAP Message 1010 (the latter ASN.1 formatted per TS 25.413).
- the PDU formats described are not indicative of particular byte ordering (which may vary based on the underlying transport (e.g., word-aligned for SCTP based transport)), but rather indicate the information included for those particular PDUs.
- the details for the adaptation layer i.e., Iuh RANAP header 1005
- FIG. 11 illustrates an alternative PDU/RUA Adaptation Layer Structure of some embodiments.
- the PDU 1100 includes the RUA Header 1105 and the Payload Data 1110 where the latter includes either the RANAP Message to be transferred or an error indication message.
- the RUA header 1105 provides sufficient information for the HNB and HNB-GW to distinguish and associate messages to a specific UE.
- the RUA header 1105 also provides information used to route the establishment of a signaling connection from the HNB-GW to a CN node within a CN domain (i.e. support for Iu-flex).
- the HNB-GW performs the NAS Node Selection Function (NNSF) as described in the 3GPP technical specification TS 23.236 entitled “Intra-domain connection of Radio Access Network (RAN) nodes to multiple Core Network (CN) nodes”, hereinafter incorporated by reference and referred to as TS 23.236. and utilizes the Intra Domain NAS Node Selector (IDNNS) information provided in the adaptation layer.
- the adaptation layer also provides a means for the HNB or HNB-GW to indicate abnormal conditions during message exchange.
- Some embodiments transport RANAP messages over the Iuh interface via: (1) RANAP over SCCP; (2) RANAP over SCTP with UEs identified by use of PPI; and, (3) RANAP over SCTP with an adaptation layer.
- RANAP over SCCP
- RANAP over SCTP with UEs identified by use of PPI
- RANAP over SCTP with an adaptation layer.
- various other mechanisms may be used by some embodiments to transport RANAP messages over the Iuh interface.
- FIG. 12 illustrates the details of the RUA Header structure, in some embodiments.
- This figure includes the PDU 1200 with the following fields (1) Version 1205 , (2) Payload Type 1210 , (3) Reserved 1215 , (4) CN Domain ID 1220 , (5) UE Context ID 1225 , (6) RANAP Procedure Code 1230 , (7) Initial UE Message Cause 1235 , (8) Initial UE Message IDNNS 1240 , and (9) Payload Data 1245 .
- Version 1205 is 8 bits in some embodiments and identifies the version of the RUA header.
- Payload Type 1210 is 8 bits in some embodiments, (with values that can range from 0-255) and identifies the type of information contained in the Payload Data 1245 .
- the following table gives sample values and corresponding descriptions in some embodiments.
- Reserved field 1215 is 16 bits in some embodiments, and is used as a placeholder here.
- UE Context ID 1225 is 24 bits in some embodiments, and indicates the locally unique identifier allocated by the HNB-GW for a particular UE.
- CN Domain ID 1220 is 8 bits in some embodiments and indicates “CS Domain” or “PS Domain”.
- RANAP Procedure Code 1230 is 8 bits in some embodiments, and is conditionally present if the Payload Type 1210 is set to RANAP and contains the Procedure Code value from TS 25.413.
- Initial UE Message IDNNS 1240 is 16 bits in some embodiments, and is conditionally present if the Payload Type 1210 is set to RANAP.
- Initial UE Message Cause 1235 is 8 bits in some embodiments, and is conditionally present if the Payload Type 1210 is set to RANAP.
- Payload Data 1245 is of a variable length in some embodiments, and indicates the actual information to be transferred in the PDU 1200 . The usage and format of this field is dependent on the Payload Type 1210 . If the Payload Type 1210 is RANAP, then the Payload Data 1245 contains a RANAP message which is ASN.1 formatted per TS 25.413.
- FIG. 13 illustrates a PDU Error Indication message, in some embodiments.
- This Error Indication message 1300 may be used by either HNB or HNB-GW to indicate abnormal conditions during message exchanges.
- FIG. 14 illustrates a RANAP message transfer using adaptation layer, in some embodiments.
- all message exchanges between the HNB and the HNB-GW contain the RUA header where the RUA header includes various parameters in addition to an encapsulated RANAP message that is either received from the UE or from the MSC of the CN.
- FIG. 15 illustrates handling of abnormal conditions over the Iuh interface, in some embodiments.
- the RUA header is used by the HNB-GW to notify (at step 6 ) the HNB of a failure to establish a SCCP connection.
- the RRC connection between the HNB and the UE is released (at step 7 ).
- UE Context Identifiers are allocated so as to uniquely identify the UE over the Iuh interface within the HNB and HNB-GW.
- the HNB receives the UE Context Id (as allocated by the HNB-GW) it stores it for the duration of the UE-associated logical Iuh connection for this UE.
- this information is included in all the UE associated signaling (for uplink as well as downlink direction).
- the UE context identifiers are provided in the Iuh header (i.e. adaptation layer). However, there can be various mechanisms for indicating this information within the Iuh header.
- Some embodiments utilize the HNBAP procedures for explicit setup and release of the UE context identifiers while some other embodiments utilize the RANAP procedures for setup and release of the UE context identifiers utilizing either (a) an implicit mechanism using existing RANAP procedures with additional header information, or (b) an explicit mechanism using new RANAP procedures.
- Some embodiments use an adaptation layer protocol (such as. RANAP-H) for transporting RANAP over the Iuh interface via explicit mechanisms for setup and release.
- An implicit mechanism using existing RANAP procedures with additional header information is utilized under normal conditions.
- an explicit release of UE context identifiers can be indicated via the use of HNBAP or RANAP or RANAP-H protocols.
- FIG. 16 illustrates the CS domain transport network control signaling (using Access Link Control Application Part (ALCAP)) over the ATM-based Iu-cs interface in accordance with some embodiments of the invention.
- Atop the physical layer is the ATM layer 1605 .
- the Service Specific Connection Oriented Protocol (SSCOP) layer 1610 is responsible for providing mechanisms for the establishment, release and monitoring of signaling information exchanged between peer signaling entities.
- SSCOP Service Specific Connection Oriented Protocol
- the service-specific coordination function Network to Node Interface (SSCF-NNI) layer 1615 receives the SS7 signaling of a Layer 3 and maps it to the SSCOP, and vice versa.
- the SSCF-NNI performs coordination between the higher and the lower layers.
- Message Transfer Part Level 3 for Broadband (MTP3b) layer 1620 has the higher Layer 3, which requires service from the SSCOP-NNI.
- the control signaling further includes ATM Adaption Layer 2 (AAL2) signaling transport 1625 conversion functionality and connection signaling layers 1630 .
- ATM Adaption Layer 2 (AAL2) signaling transport 1625 conversion functionality and connection signaling layers 1630 .
- FIG. 17 illustrates the protocol architecture in support of the CS domain user plane over the Iuh interface in accordance with some embodiments of the invention. This figure includes (1) HNB 1705 , (2) UE 1710 , (3) HNB-GW 1715 , (4) MSC 1720 , and (5) CS user plane protocol stacks for each of the devices.
- the user plane of the HNB 1705 and HNB-GW 1715 includes the access, transport IP, IPSec, and remote IP layers described above with reference to FIG. 5 .
- the protocol stacks include the User Datagram Protocol (UDP) layer 1730 to perform connectionless transfer of Real-Time Protocol (RTP) layer 1735 messages.
- the HNB 1705 also includes an Iu-UP protocol layer 1725 that operates directly with the MSC 1720 of the CN.
- the Iu-UP 1725 protocol transports CS user data across the Iuh and Iu-cs interfaces.
- the HNB-GW 1715 provides either a transport layer conversion between IP (towards the HNB 1705 ) and ATM (towards the MSC 1720 ) or transport layer routing when IP transport is used on Iuh as well as the Iu-cs interfaces. In this manner, CS user data is carried transparently between the UE 1710 and the MSC 1720 .
- the RTP 1735 and the UDP layers 1730 operate directly between the HNB and the MSC (not shown).
- FIG. 18 illustrates the PS Domain User Plane Protocol Architecture in accordance with some embodiments. This figure includes (1) HNB 1805 , (2) UE 1810 , (3) HNB-GW 1815 , (4) SGSN 1825 , and (5) PS user plane protocol stacks for each of the devices.
- the user plane of the HNB 1805 and HNB-GW 1815 includes the access transport IP, IPSec, and remote IP layers described above with reference to FIG. 5 .
- the protocol stack of the HNB 1805 also includes the User Datagram Protocol (UDP) layer 1835 to perform connectionless transfer of GPRS Tunneling Protocol (GTP) User (GTP-U) data messages.
- UDP User Datagram Protocol
- GTP GPRS Tunneling Protocol
- GTP-U GPRS Tunneling Protocol
- the GTP-U protocol 1830 operates between the HNB 1805 and the SGSN 1825 , transporting the PS user data across the Iuh and Iu-ps interfaces.
- the HNB-GW 1815 provides either a transport layer conversion between IP (towards the HNB 1805 ) and ATM (towards the CN) or transport layer routing when IP transport is used on Iuh as well as the Iu-ps interfaces.
- PS user data is carried transparently between the UE 1810 and CN (SGSN 1825 /GGSN).
- the GTP-U protocol from the HNB and the SGSN terminates in the HNB-GW and the HNB-GW provides interworking of GTP-U protocol between the Iuh and Iu-cs interface.
- a key feature of the HNB system is the seamless integration of the HNB functionality to existing core networks used by licensed wireless networks and also the co-existence of the HNB system with the legacy core network (e.g., UMTS and GSM) within the same or different Public Land Mobile Network (PLMN).
- legacy core network e.g., UMTS and GSM
- PLMN Public Land Mobile Network
- the HNB-GW seamlessly integrates with the core network by emulating RNC like functions and interfaces.
- the HNB seamlessly integrates with the UEs that operate across the various licensed wireless networks by emulating the Node-B like functions.
- Standard UMTS UEs will thus be able to utilize both access options (Node-Bs of the licensed wireless network or HNBs of the HNB system) whichever is more optimal in the specific scenario. No change is required to the PLMN selection procedures in the NAS layers (MM and above) in the UE or to the standard cell selection mechanism of the UE.
- the HNB system supports UE rove-in for a UE that roves into a HNB service region from a licensed wireless network service region and UE rove-out for a UE that roves out of a HNB service region into a licensed wireless network service region.
- the HNB Management System provides the HNB with radio parameters during the service activation or provisioning update. These radio parameters include the operating UARFCN (UMTS Absolute Radio Frequency Channel Number) and a list of primary scrambling codes for the HNB.
- the provisioning parameters also include the list of UARFCNs/scrambling codes (SCs) associated with the neighboring macro cells of the licensed wireless network.
- the HNB then performs a neighborhood scan for the existence of macro coverage using the macro UARFCN information. If multiple macro network cells are detected in the HNB scan, the HNB selects the best suitable macro cell for the purpose of reporting it to the Serving HNB-GW during HNB registration. The HNB also stores the macro cell list to be provided as a neighbor list for the camping UEs. The HNB scans the neighborhood for the existence of other HNBs within the same PLMN. The HNB then selects an unused ⁇ UARFCN, SC ⁇ pair from the provisioned list of available pairs such that the selected ⁇ UARFCN, SC ⁇ does not conflict with any neighboring HNB's ⁇ UARFCN, SC ⁇ combination.
- the HNB attempts to register with the Serving HNB-GW and includes information about the selected macro cell and other neighboring HNBs.
- the Serving HNB-GW uses information provided during registration to assign network operating parameters for the registering HNB such as the LAI, 3 G cell-id, service area, etc.
- the Serving HNB-GW returns the network operating parameters to the registering HNB using the register accept message.
- some of the operating parameters are provided by the HNB management system using the TR-069 mechanisms.
- the HNB uses a combination of information obtained through the initial provisioning and registration and broadcasts appropriate system information to UEs to be able to select HNB service and camp on the HNB.
- the macro network RNCs are provisioned with the list of ⁇ UARFCN, SC ⁇ associated with HNB neighbors. Since the HNB network has to be able to scale to millions of HNBs and the deployment location cannot be controlled, the macro network RNCs are provisioned with a list of 5-10 ⁇ UARFCN, SC ⁇ combinations corresponding to the neighboring HNBs. As a result of the limitations associated with the neighbor list provisioning on the macro RNC, the HNB of some embodiments selects one of the 5-10 provisioned ⁇ UARFC, SC ⁇ pairs for its operation such that no two neighboring HNBs (determined via HNBs' scan) re-use the same pair for its operation. The macro RNC provides the HNB neighbor list information to the UEs camped on the macro network and using the specific RNC. This results in the UEs making periodic measurements on the HNB neighbor list.
- the UE cell-reselection i.e., rove-in to HNB cell
- the HNB cell can be in a different HPLMN (equivalent PLMN list) and be selected via preferred equivalent PLMN selection. This assumes that the UE's current camped macro cell is not in the equivalent PLMN list, (b) the HNB will broadcast system information (such as Qqualmin and Qrxlevmin) so that UE prefers the HNB cell in the presence of other macro cell coverage, and (c) forced cell reselection using Hierarchical Cell Selection (HCS).
- HCS Hierarchical Cell Selection
- FIG. 19 illustrates an overview of HNB initialization, discovery, and registration in accordance with some embodiments of the invention. The details for the specific procedures such as discovery and registration are described in subsequent sections.
- This message exchange for system initialization occurs when a HNB 1905 is initially powered on (at step 1 ).
- the HNB 1905 attempts to identify a serving HNB-GW with which to connect. To do so, the HNB 1905 first attempts to connect to a provisioning Security Gateway (SeGW) 1915 .
- the provisioning SeGW is a default gateway.
- the HNB 1905 submits (at step 2 a ) a Domain Name System (DNS) query containing a Fully Qualified Domain Name (FQDN) of the provisioning SeGW 1915 .
- DNS 1910 responds (at step 2 b ) with the identification information for the provisioning SeGW 1915 .
- the DNS 1910 responds with the IP address of the provisioning SeGW 1915 .
- the HNB 1905 connects to the provisioning SeGW 1915 by first establishing (at step 3 ) a secure tunnel with the provisioning SeGW 1915 .
- the HNB 1905 then performs (at step 4 ) an initialization procedure that includes retrieving device configuration (e.g., radio configuration).
- the HNB 1905 also performs (at step 5 ) a radio scan of neighboring HNBs and macro cell coverage areas.
- the HNB 1905 performs (at step 6 a ) a second DNS query containing a FQDN of the provisioning HNB-GW 1920 .
- the DNS response (at step 6 b ) identifies the IP address of the provisioning HNB-GW 1920 .
- the HNB 1905 then establishes (at step 7 ) a reliable transport session, such as a SCTP session, with the provisioning HNB-GW 1920 .
- the HNB 1905 performs (at step 8 ) a discovery procedure to identify the HNB serving system that is associated with the HNB 1905 .
- the HNB 1905 sends (at step 8 a ) a discovery request message to the provisioning HNB-GW 1920 .
- the discovery request message includes location information of the HNB 1905 and an identity of the HNB 1905 . From the supplied location information and identification information, the provisioning HNB-GW 1920 identifies the serving system for the HNB 1905 . The HNB 1905 then receives (at step 8 b ) from the provisioning HNB-GW 1920 a discovery access message containing the serving HNB-GW information. The HNB 1905 stores (at step 9 ) the received serving HNB-GW information. In some embodiments, the function of discovery is done using the HNB management system.
- the received serving HNB-GW information includes a FQDN of the serving SeGW 1925 . Accordingly, the HNB 1905 performs (at step 10 ) a DNS query with the serving SeGW FQDN information. The HNB 1905 then receives (at step 11 ) an IP address of the serving SeGW 1925 in the DNS response.
- the HNB 1905 establishes a secure tunnel (at step 11 ) with the serving SeGW 1925 and submits (at step 12 ) a DNS query with the FQDN of the serving HNB-GW 1930 . In the DNS response, the HNB 1905 receives the IP address of the serving HNB-GW 1930 . At this stage, the HNB 1905 has identified the HNB-GW that is to communicatively couple the serving region of the HNB 1905 to the core network. Some embodiments perform the discovery procedure to locate the HNB-GW that is closest to the location of the HNB 1905 whereby there is less latency in the message exchanges between the HNB 1905 and the HNB-GW. Some embodiments perform the discovery procedure in order to perform load balancing on the HNB-GWs of the HNB system such that no single HNB-GW is overwhelmed by requests from the several HNBs that are communicatively coupled to that particular HNB-GW.
- the HNB 1905 establishes (at step 13 ) a reliable transport session with the serving HNB-GW 1930 .
- the HNB 1905 performs (at step 14 ) a registration procedure in order to gain access to the services of the HNB system through the serving HNB-GW 1930 .
- the HNB 1905 is ready to offer service to any UEs that operate within the service region of the HNB 1905 .
- FIG. 20 illustrates the possible states for the HNBAP sub-layer in the HNB of some embodiments.
- the HNBAP sub-layer in the HNB can be in one of two states.
- the HNBAP-DEREGISTERED 2005 state identifies a device that has deregistered, lost its IPSec connection, or has roved out of the service region of the HNB.
- the HNBAP-REGISTERED 2010 state identifies a device that has successfully registered with the HNB system.
- the HNB contains a HNBAP sub-layer for each device it registers. Based on the type of device, the functionality of the HNBAP sub-layer can vary.
- the HNBAP sub-layer is in the HNBAP-DEREGISTERED state upon power-up of the HNB. In this state, the HNB has not registered successfully with the HNB-GW.
- the HNB may initiate the Registration procedure when in the HNBAP-DEREGISTERED state. In some embodiments, the HNB returns to HNBAP-DEREGISTERED state on loss of SCTP or IPSec connection or on execution of the De-registration procedure.
- the HNB Upon transition to HNBAP-DEREGISTERED state, the HNB must trigger an implicit deregistration for all the UEs currently camped on the HNB and cease transmitting.
- the HNB In the HNBAP-REGISTERED state, the HNB is registered with the Serving HNB-GW.
- the HNB has an IPSec tunnel and an SCTP connection established to the Serving HNB-GW through which the HNB may exchange HNBAP signaling messages with the HNB-GW. While the HNB remains in the HNBAP-REGISTERED state, it performs application level keep-alive with the HNB-GW.
- the HNBAP sub-layer in the HNB (for each UE) is in the HNBAP-DEREGISTERED state upon UE rove-in. In this state, the UE has not been registered successfully (by the HNB) with the HNB-GW.
- the HNB initiates the Registration procedure when UE specific HNBAP sub-layer is in the HNBAP-DEREGISTERED state.
- the HNBAP sub-layer returns to the HNBAP-DEREGISTERED state on loss of SCTP or IPSec connection or on execution of the de-registration procedure. Upon loss of SCTP connection, HNB may attempt to re-establish the corresponding SCTP session and perform the synchronization procedure.
- HNBAP layer transitioning to HNBAP-DEREGISTERED state A failure to successfully re-establish the SCTP session will result in the HNBAP layer transitioning to HNBAP-DEREGISTERED state.
- the HNBAP sub-layer for the UE can also transition to the HNBAP-DEREGISTERED state if the corresponding HNBAP sub-layer for the HNB device is in HNBAP-DEREGSITERED state.
- the UE In the HNBAP-REGISTERED state, the UE has been registered successfully (by the HNB) with the Serving HNB-GW.
- the HNB has a shared IPSec tunnel and an SCTP connection established to the Serving HNB-GW through which the HNB exchanges HNBAP and/or RANAP signaling messages (for each registered UE) with the HNB-GW.
- the UE In the HNBAP-REGISTERED state, the UE is camped on the HNB and may be idle, or the UE may be active in the HNB (e.g., a UTRAN RRC connection may be established).
- the RANAP protocol as described above with reference to FIG. 6 is used by the HNB for CS and PS services resource management.
- an adaptation layer is used to allow RANAP messages to be transported over the Iuh interface using SCTP.
- the transport of RANAP using the adaptation layer utilizes a UE context identifier, UE-associated signaling, UE-associated logical Iuh connection, and/or RANAP procedure code.
- the HNB-GW allocates the UE context identifier to each particular UE during registration of the particular UE (using HNBAP).
- the UE context identifier uniquely identifies the UE over the Iuh interface within the HNB-GW for a particular domain. This implies that for a particular UE, the same context identifier can be used across two different service domains (i.e. CS and PS).
- the HNB receives the UE context identifier from the HNB-GW, the HNB stores it for the duration of the UE registration. Once known to the HNB, this information is included in all the UE associated signaling (for uplink as well as downlink directions). Additionally, the UE context identifier is also utilized by the HNB and HNB-GW as the “Iu Signaling Connection Identifier” attributes value for use in the RANAP messages.
- the UE registration is also utilized to exchange the context identifier for a given UE as shown in FIG. 21 .
- FIG. 21 illustrates a message exchange of some embodiments for setting up UE context identifiers via UE registration.
- the HNB-GW 2115 allocates a unique UE context identifier to each UE during the UE registration procedure.
- the UE registration procedure illustrated in FIG. 21 is triggered by the HNB 2105 upon detecting camping of a given UE 2110 on that particular HNB 2105 .
- the UE registration procedure is triggered upon an initial NAS transaction (e.g., LAU or paging response). In the Example of FIG. 21 , this occurs when the UE 2110 establishes (at step 1 a ) a RRC connection with the HNB 2105 and sends (at step 1 b ) for example, a location update request NAS message that includes the UE identity.
- the UE identity is an International Mobile Subscriber Identity (IMSI) of the UE 2110 .
- the UE identity is a Temporary Mobile Subscriber Identity (TMSI) that was assigned for temporarily identifying the UE 2110 .
- the UE identity is a Packet-Temporary Mobile Subscriber Identity (P-TMSI or PTMSI).
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- P-TMSI Packet-Temporary Mobile Subscriber Identity
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- P-TMSI Packet-Temporary Mobile Subscriber Identity
- the HNB 2105 requests (at step 1 c ) additional identification information from the UE 2110 that is provided by the UE 2110 at step 1 d .
- the HNB 2105 then initiates the UE registration procedure by sending (at step 2 ) a register request message to the HNB-GW 2115 with the UE IMSI.
- the register request message also includes the HNB identity.
- the HNB-GW 2115 responds (at step 3 ) with a register accept message that includes the uniquely assigned UE context identifier.
- the context identifier provides a unique handle allocated and authorized by the HNB-GW 2115 to identify transactions of the UE 2105 .
- the context identifier is then used for all UE-specific transactions (such as relay of UE associated RANAP messages).
- the lifetime of the UE context identifiers is the entire duration of the UE registration and the UE context identifier is released only at the time of the corresponding UE deregistration.
- the UE Context Id value is also used as the “Iu Signaling Connection Identifier” attribute value for use in the RANAP messages (for example, in the “Initial UE Message” RANAP message).
- the context associated with a UE includes states and other information that the HNB-GW keeps for each UE which is successfully registered.
- UE-associated signaling occurs when RANAP messages associated with a given UE are identified via a UE-associated logical Iuh connection between HNB and HNB-GW.
- the UE-associated logical Iuh connection uses the UE context identifier. For a received UE associated RANAP message, both the HNB-GW and HNB identify the associated UE based on the UE context identifier.
- the RANAP procedure code is used within the adaptation layer.
- the RANAP procedure code in the adaptation layer provides a mechanism for the HNB-GW to relay the RANAP messages transparently towards the CN without needing to decode the encapsulated RANAP message.
- RANAP procedure code may be used directly from the encapsulated RANAP message, without needing to decode the entire RANAP message since the procedure code is at a fixed location of every encapsulated RANAP message.
- the PDU structure for carrying the RANAP messages is the same as the description above for adaptation layers (i.e., the message is comprised of Iuh RANAP Header and RANAP messages).
- FIG. 22 illustrates the fields of an Iuh RANAP Header, in some embodiments.
- the Iuh RANAP Header includes the following fields: (1) length 2205 , (2) Iuh RANAP Header Version 2210 , (3) RANAP Procedure Code 2215 containing the Procedure Code value from TS 25.413, (4) HNB Context Id 2220 , (5) HNB-GW Context Id 2225 , (6) CN Domain ID 2230 , (7) Initial UE Message Cause 2235 , and (8) Initial UE Message IDNNS 2240 , including if RANAP Procedure Code 2215 indicates Initial UE Message.
- the length field 2205 indicates the length of the Iuh RANAP Header and the length of the RANAP Message, but excludes the length field.
- the CN Domain ID 2230 indicates ‘CS Domain’, ‘PS Domain’, ‘Both CS Domain and PS Domain’ or ‘Not Domain Specific’.
- the Initial UE Message Cause 2235 is included when the RANAP Procedure Code indicates Initial UE Message and/or if Initial UE Message is for ‘Emergency Call’ purposes (or other cause values).
- the HNB indicates the locally allocated UE context Id (via the Iuh header) to the HNB-GW in the first RANAP message for a given UE (i.e., RANAP Initial UE Message).
- the HNB-GW indicates the locally allocated UE context Id to the HNB in the first downlink RANAP message for that particular UE from the HNB-GW to the HNB.
- Subsequent RANAP messages (in the uplink and downlink direction) carry both the UE context identifiers of the HNB and HNB-GW.
- the release of these UE context identifiers (and associated resources) is triggered by the final RANAP message for a particular UE.
- the Iu Release Complete message from the HNB is an indication for the HNB and the HNB-GW to release the associated UE context identifiers.
- This mechanism is similar to the mechanism as described in subsection “Mechanisms for Signaling the Adaptation Layer Information”. However, some embodiments utilize new RANAP procedures instead of HNBAP for the setup and release of UE context identifiers.
- a new protocol is defined for the transport of RANAP over the Iuh interface.
- the RANAP-H protocol is used to transport the RANAP message along with UE context identifiers.
- a RANAP-H PDU may have a variable length in some embodiments.
- FIG. 23 illustrates a RANAP-H PDU in some embodiments. As shown, the RANAP-H PDU 2300 , includes (1) Payload Type 2310 , (2) Flags 2315 , (3) Length 2320 , (4) HNB Context ID 2325 , (5) HNB-GW Context ID 2330 , and (6) Payload Data 2305 .
- the Payload Type 2310 may be 8 bits (with values ranging from 0-255) and identifies the type of information contained in the Payload data 2305 .
- the value of 255 is reserved for future use as an extension field, in some embodiments.
- the total length of a chunk must be a multiple of 4 bytes. If the length of the chunk is not a multiple of 4 bytes, the sender pads the chunk with all zero bytes and this padding is not included in the chunk length field. The sender should never pad with more than 3 bytes. The receiver ignores the padding bytes.
- Payload Types 2310 The following table describes some of the types of information (Payload Types 2310 ) that can be sent through a RANAP-H PDU 2300 :
- Flags 2315 are 8 bits in some embodiments. The usage of these bits depends on the payload type as given by the Payload type 2310 . Unless otherwise specified, they are set to zero on transmit and are ignored on receipt.
- Length 2320 is 16 bits in some embodiments, and is the size of the PDU 2300 in bytes including the Payload Type 2310 , Flags 2315 , Length 2320 , and Payload Data 2305 fields. Therefore, if the Payload Data field 2305 is zero-length, the Length field 2320 will be set to 8.
- the HNB Context ID 2325 is 16 bits in some embodiments and indicates the locally unique identifier allocated by the HNB for a particular UE.
- the HNB-GW Context ID 2330 is 16 bits in some embodiments and indicates the locally unique identifier allocated by the HNB-GW for a particular UE.
- the Payload Data 2305 is a variable length in some embodiments, and is the actual information to be transferred in the PDU 2300 . The usage and format of this field is dependent on the Payload type 2310 .
- FIG. 24 illustrates a Context Create Request (CCREQ) message, in some embodiments.
- the CCREQ 2400 is made up of the CN Domain ID 2405 , the CCREQ Reason 2410 , and the IDNNS 2415 .
- the Context Create Acknowledge (CCACK), Context Release Command (CRCMD), and Context Release Complete (CRCMP) messages do not have any payload data.
- FIG. 25 illustrates an Iuh RANAP header, in some embodiments.
- the Iuh RANAP Header includes the following fields: length 2505 , RANAP Procedure Code 2510 , HNB Context Id 2515 ; and HNB-GW Context Id 2520 .
- the length field 2505 indicates the length of the Iuh RANAP Header in addition to the length of the RANAP Message, but excluding the length field.
- the RANAP Procedure Code 2510 contains the Procedure Code value from TS 25.413.
- FIG. 26 illustrates the structure of a PDU used for transferring an HNBAP message, in some embodiments.
- the PDU has the following fields: length 2605 , Message Type 2610 , and a list of information elements 2615 .
- the length 2605 indicates the length of the HNBAP Header plus the length of the HNBAP Message Body, but excludes the length field.
- the HNBAP Message Type 2610 contains the HNBAP Message Type value.
- the HNBAP Create UE Context Request message is used to indicate the HNB UE Context Id to the HNB-GW and also to provide information to the HNB-GW for support of the Iu-flex functionality.
- FIG. 27 illustrates a Create UE Context Request going from the HNB to the HNB-GW, in some embodiments.
- the message includes the following IEs: (1) the HNB Context ID 2705 , (2) the CN Domain ID 2710 , indicating ‘CS Domain’, ‘PS Domain’, ‘Both CS Domain and PS Domain’ or ‘Not Domain Specific’, (3) the Context Request Cause 2715 , indicating if request is for “Emergency Call” purposes (or other cause values), and (4) the IDNNS 2720 .
- the HNBAP Create UE Context Accept message is used by the HNB-GW to indicate successful allocation of the corresponding UE context Id by the HNB-GW.
- FIG. 28 illustrates a Create UE Context Accept message going from the HNB-GW to the HNB, in some embodiments. As shown, the message includes the following IEs: the HNB UE Context ID 2805 ; and the HNB-GW Context ID 2810 . Accordingly, the Create UE Context Accept message contains the allocated UE Context ID values. Additionally, the message contains the HNB-GW Context ID 2810 . In some embodiments, the HNB-GW Context ID 2810 is allocated so as to uniquely identify the UE over the Iuh interface within the HNB-GW.
- the HNBAP Release UE Context Command message is used by either the HNB or HNB-GW to release context identifiers for a particular UE.
- FIG. 29 illustrates a Release UE Context message going from either the HNB-GW to the HNB or the HNB to the HNB-GW, in some embodiments. As shown, the message includes the following IEs: the HNB Context ID 2905 and the HNB-GW Context ID 2910 .
- the HNBAP Release UE Context Complete message is used to acknowledge successful release of the associated UE context identifiers.
- FIG. 30 illustrates a Release UE Context Complete message going from either the HNB-GW to the HNB or the HNB to the HNB-GW, in some embodiments. As shown, the message includes the following IEs: the HNB Context ID 3005 and the HNB-GW Context ID 3010 .
- the IMSI associated with the (U)SIM in the UE identifier is provided by the HNB to the HNB-GW when it registers a specific UE attempting to camp on the HNB.
- the HNB-GW maintains a record for each registered UE. For example, IMSI is used by the HNB-GW to find the appropriate UE record when the HNB-GW receives a RANAP PAGING message.
- the HNB is addressed within the HNB system by one or more of the following addressing parameters: the IMSI associated with the (U)SIM in the HNB, the Public IP Address of the HNB, and the Private IP Address of the HNB, and/or the vendor specific unique serial number (such as MAC address).
- the IMSI associated with the (U)SIM in the HNB is provided by the HNB to the HNB-GW when the HNB registers for service.
- the HNB-GW maintains a record for each registered HNB. If the HNB is not equipped with a (U)SIM, then an alternate identifier must be allocated to the HNB and provided to the HNB-GW during registration of the HNB. Any alternate identifier must ensure global uniqueness for the HNB identity, since this identity is also used by the HNB-GW to validate the closed user groups of UEs allowed to access a particular HNB.
- the HNB identity may include a TMSI that is assigned to the HNB or a P-TMSI that is assigned to the HNB.
- the Public IP address of the HNB is the address used by the HNB when it establishes an IPSec tunnel to the HNB-GW Security Gateway. This identifier is provided by the HNB-GW Security Gateway to the AAA server. In some embodiments, the HNB-GW uses this identifier to support location services (including emergency calls) and fraud detection. In some embodiments, service providers use this identifier to support Quality of Service (QoS) for IP flows in managed IP networks.
- QoS Quality of Service
- the Private IP address of the HNB (also referred to as the “remote IP address”) is used by the HNB inside the IPSec tunnel.
- the private IP address of the HNB is utilized by the HNB-GW to associate or bind a particular HNB to a specific transport address for the purpose of network initiated messages.
- the vendor specific unique serial may be used by the HNB for identification purposes.
- the combination of vendor identity and the serial number within each vendor identity ensure a globally unique HNB identity over the Iuh interface.
- LA Location Area
- RA Routing Area
- the coverage area is split into logical registration areas called Location Areas (for CS domain) and Routing Areas (for PS domain).
- UEs are required to register with the core network (CN) each time the serving location area (or routing area) changes.
- CN core network
- One or more location areas identifiers (LAIs) may be associated with each MSC/VLR in a carrier's network.
- one or more routing area identifiers (RAIs) may be controlled by a single SGSN.
- the LA and the RA are used in particular when the UE is in idle mode and the UE does not have any active RRC connection.
- the CN would utilize the last known LA (for CS domain) and RA (for PS domain) for paging of the mobile when active radio connection is not available.
- the Service Area Identifier identifies an area including one or more cells belonging to the same Location Area.
- the SAI is a subset of location area and can be used for indicating the location of a UE to the CN. SAI can also be used for emergency call routing and billing purposes.
- the Service Area Code which is 16 bits, together with the PLMN-Id and the LAC constitute the Service Area Identifier.
- the HNB it is necessary to assign a distinct LAI (distinct from its neighboring macro cells or other neighboring HNBs) to each HNB for the following reasons: (1) the UE's mobility from the macro network to a HNB cell must be detected by the HNB and the network. The UE can camp on a HNB via its internal cell selection logic. However, if the UE is in idle mode, there are no messages exchanged between the UE and the HNB, thus making it difficult for the HNB to detect the presence of the UE. In order to trigger an initial message from the UE, upon its camping on a specific HNB, the HNB is assigned distinct location areas different than the neighboring macro cells.
- the UE's MM layer triggering a Location Update message to the CN via the camped cell (i.e., the HNB); (2) the UE's mobility from one HNB to another HNB must also be detected.
- the UE's cell selection selects a neighboring HNB and it will camp on the neighboring HNB without any explicit messaging.
- the neighboring HNB's Service Access Control (SAC) may not allow the camping of that specific UE, but without an initial explicit messaging there would not be a way for the neighboring HNB to detect and subsequently to reject the UE.
- SAC Service Access Control
- LAI uniqueness is ensured by allocating a distinct Location Area Code (LAC) to each HNB, such that the LAC assigned to the HNB is different from the neighboring macro network cells and other neighboring HNBs.
- LAC space is limited to theoretical maximum of 64K (due to the limitation of a 16 bit LAC attribute as specified in “Numbering, addressing and identification”, 3GPP TS 23.003, hereinafter “TS 23.003”.
- the LAC allocation scheme must provide a mechanism for the re-use of LAC for scalable solution, and at the same time minimize the operational impact on existing CN elements (MSC/SGSN).
- the LAC allocation is split into two separate categories: (1) a pool of LACs managed by the HNB/HNB Management System and (2) a small set of LACs (one per “Iu” interface) managed by the HNB-GW.
- the first set of LACs (Broadcast LACs) is used by the HNB/HNB Management System to assign a unique LAC to each HNB such that it meets the following requirements (at the minimum): (1) uniqueness with respect to the neighboring macro as well as other HNBs (this will ensure an initial message from the UE upon HNB selection and rove-in) and (2) resolution of conflicts with shared LACs where multiple HNBs sharing the same LAC are not neighbors but can be accessed by the same UE (this is to allow the use of “LA not allowed” rejection code for UE rejection).
- the second set of LACs (a much smaller set) is managed within each HNB-GW as follows, with the following key requirements: they must (1) minimize the impact on the existing CN elements (such as minimal configuration and operational impact), (2) seamlessly integrate the existing functionality for routing of emergency call routing to appropriate PSAPs, and (3) seamlessly integrate existing functionality for the generation of appropriate CDR for billing purposes.
- each HNB-GW represents a Super LAC for a given Iu interface (i.e., MSC and SGSN interface).
- MSC and SGSN can be configured with a single set of Super LAI/Super RAI information for that HNB-GW. It should be apparent to one of ordinary skill in the art that this does not limit the operator from configuring multiple Super LAI/Super RAI sets if necessary, for example, to further subdivide the region served by a single HNB-GW into multiple geographic areas.
- the HNB-GW utilizes the following mapping functionality for assignment of a Super LA: (1) when macro coverage is reported by the HNB, HNB-GW supports mapping of the reported macro coverage to a Super LAC, Super RAC, and Service Area Code (SAC). The number of SACs utilized will be dependent on the granularity which the operator chooses for regional distribution (e.g., for emergency call routing, billing, etc.); (2) When no macro coverage is reported by the HNB, the HNB-GW has the following logic for the Super LAC/RAC/SAC assignment: (a) query the subscriber database for information on the “provisioned macro coverage” for the given HNB IMSI (or identity).
- SAC Service Area Code
- the HNB-GW uses the provisioned macro coverage information to map Super LAC/RAC/SAC as above; (b) when there is no information about the macro coverage from the subscriber database query, HNB-GW maps the HNB to default Super LAC/RAC/SAC.
- one or more of the following additional enhancements on the HNB of some embodiments may be utilized: (i) upon a UE rove-in to this “no coverage” HNB, the HNB gathers information from the UE's initial LU request (since the UE will report last camped LAI), (ii) the HNB collects information from multiple UEs and constructs a “derived” macro coverage information (the number of UEs utilized to derive macro coverage could be algorithmic), (iii) using this derived macro coverage information, the HNB sends a HNBAP Register Update Uplink message to the HNB-GW, and (iv) the HNB-GW utilizes the macro coverage information reported via the HNBAP Register Update Uplink message to map the HNB to an appropriate Super LAC/RAC/SAC as above.
- a distinct LAI for each HNB also implies a distinct RAI since the RAI is composed of the LAI and Routing Area Code (RAC).
- the LAI, RAI and the Service area code (SAC) are sent to the HNB upon successful registration of HNB.
- the HNB provides Super LAC/RAC replacement in the NAS messages from the network to the UE (e.g., LU Accept or RAU accept). In some such embodiments, the HNB replaces the “Super LAC/RAC” contained in the relevant NAS messages from the network, with the appropriate locally assigned LAC/RAC information in messages sent to the UEs camped on the HNB.
- the HNB also includes the SAI provided by the HNB-GW in the corresponding UE specific RANAP messages.
- a 3 G Cell Id identifies a cell unambiguously within a PLMN.
- the 3 G Cell Ids in UMTS are managed within the UTRAN and are not exposed to the CN. As a result, the cell assignment logic can be localized to the UTRAN as long as it can ensure uniqueness within a given PLMN.
- the 3 G Cell Id assigned to each HNB must be distinct from its neighboring HNB primarily to avoid advertisement of the same cell id in system information broadcast by two adjacent HNBs, considering that in some embodiments the physical deployment of the HNBs are ad-hoc and not controlled by the operator.
- each HNB-GW is statically provisioned with a unique RNC-Id and the RNC-Id will be conveyed to the HNB during registration.
- the HNB will be responsible for the assignment of the 16 bit cell-id locally and construct the 3 G cell using the combination of HNB-GW supplied RNC-Id and locally assigned cell-id.
- the HNB may use the entire 28 bits for cell Id (and not include the RNC Id) for broadcasting over the air interface.
- mapping between these 28 bits cells ids to RNC Id(s) is maintained either in the HNB or the HNB-GW.
- the LAC/RAC information sent to the UE is different (locally assigned by the HNB) than that sent to the CN (Super LAC/RAC assigned by the HNB-GW).
- the UE stores (upon successful LU/RAU), the local or broadcast LAC/RAC on the UE's (U)SIM.
- the UE Upon rove-out to the licensed wireless network, the UE triggers location update and routing area update using these local values for LAC and RAC.
- the CN does not have any information about this local LAC/RAC value since the MSC/SGSN is aware of the Super LAC/RAC for that UE.
- PS service may be affected.
- the new SGSN will not be aware of the “RAI” contained in the Routing Area Update message.
- the new SGSN may be unable to retrieve subscriber context (i.e., existing PDP information) from the old SGSN. This could result in the PDP sessions having to be re-established by the UE.
- Re-establishing the PDP sessions results in the exchange of additional signaling messages and possible impacts to service such as delayed PS applications.
- the PDP session in idle mode be terminated and restarted with the correct billing indicators (e.g., SAI, etc.).
- the above limitation is a non-issue. If the routing area update is performed using a P-TMSI, the new SGSN will not have the associated P-TMSI and will trigger an “Identity request” NAS message to the UE thus resulting in the exchange of additional signaling messages.
- the CN elements are enhanced to recognize the Super LAC/RAC from the Broadcast LAC. If it is able to distinguish the Super LAC and Broadcast LAC, then the subscriber information (such as ongoing PDP and other information) can be consolidated (for example, using the IMSI), thus mitigating any impacts due to the above limitations.
- two HNB operating configurations include a common core configuration and a separate core configuration.
- the HNB Super LAI and the umbrella UTRAN's LAI e.g., the “umbrella” UTRAN that serves the subscriber's neighborhood
- the network is engineered such that the same core network entities (i.e., MSC and SGSN) serve both the HNBs and the umbrella UMTS cells.
- MSC and SGSN the same core network entities
- the primary advantage of this configuration is that subscriber movement between the HNB coverage area and the UMTS coverage area does not result in inter-system (i.e., MAP) signaling (e.g., location updates and handovers are intra-MSC).
- the common core configuration requires coordinated HNB and UMTS traffic engineering (e.g., for the purpose of MSC and SGSN capacity planning).
- the HNB Super LAI and umbrella UTRAN's LAI are different.
- the network is engineered such that different core network entities serve the HNBs and the umbrella UMTS cells.
- the advantage of this configuration is that engineering of the HNB and UMTS networks can be more independent than in the common core configuration.
- the separate core configuration requires that subscriber movement between the HNB coverage area and the UMTS coverage area results in inter-system (i.e., MAP) signaling.
- the HNB is plug-and-play upon connection to the operator core network.
- the HNB does not require any manual “per unit” configuration by the operator or by the subscriber to be activated.
- HNBs from multiple vendors will connect to each HNB-GW (i.e., many to one relationship).
- a standardized and inter-operable mechanism of connecting these multiple vendor HNBs to HNB-GW is highly desirable.
- the discovery and registration procedures provide a standardized and inter-operable mechanism for HNB to connect and receive services from the most appropriate HNB-GW.
- the HNB-GW discovery process does not involve any signaling to the PLMN infrastructure and is wholly contained within the HNB system (i.e., between the HNB, HNB-GW).
- the HNB Upon initial power-up (e.g., when the HNB has not stored information about its serving HNB-GW), the HNB initiates the discovery procedure towards the HNB-GW.
- the discovery procedure services provide an automated way for the HNB to determine the most appropriate serving HNB-GW in the HPLMN of the HNB, taking into account parameters such as the HNB identity and location. Additionally, the discovery procedure services provide an inter-operable mechanism for the HNB from multiple vendors to find the appropriate HNB-GW which can serve the specific HNB.
- the logic reflecting operator policy for assigning HNB to the appropriate HNB-GW is implemented in one place and is the same for every HNB product or vendor. In some embodiments, all HNBs, from every HNB vendor, are provisioned with exactly the same initial information. In some embodiments, this initial information includes the address (e.g., FQDN) of the network-wide Provisioning HNB-GW.
- the discovery of serving HNB-GW is performed via the HNB management system.
- the HNB registration process does not involve any signaling to the PLMN infrastructure and is wholly contained within the HNB system (i.e., between the HNB, HNB-GW).
- the registration process includes HNB registration and UE registration.
- HNB registration occurs upon HNB power-up. When powered-up, the HNB registers with the HNB-GW. HNB registration serves to (a) inform the HNB-GW that a HNB is now connected and is available at a particular IP address, (b) provide the HNB with the network operating parameters associated with the HNB service at the current location which must be coordinated between the HNB and HNB-GW (information that need not be locally coordinated can be obtained through the HNB Management System prior to HNB-GW Discovery/Registration), (c) allow the HNB-GW to perform network based access control (e.g., HNB restriction and location verification), and (d) provide a mechanism to redirect the HNB to a different serving HNB-GW (e.g., based on incoming location, current load on the HNB-GW, and availability/load status of the Iu-CS/Iu-PS interface, etc).
- network based access control e.g., HNB restriction and location verification
- UE registration occurs upon HNB selection and cell camping.
- the UE selects a HNB and camps on the corresponding cell
- the UE initiates an initial NAS (Non-access stratum) message (for example a Location Update (LU) message) towards the CN via the HNB.
- the HNB utilizes this message to detect the presence of the UE on that specific HNB.
- the HNB then initiates a registration message towards the HNB-GW for the camped UE.
- UE registration by the HNB informs the HNB-GW that a UE is now connected through a particular HNB and is available at a particular IP address.
- the HNB-GW keeps track of this information (e.g.
- UE registration by the HNB also allows the HNB-GW to provide network based service access control (SAC) functionality.
- SAC network based service access control
- the HNB-GW provides authorization and enforcement based on the operator's service access control polices.
- Network based SAC can be used to insure that a particular UE is indeed authorized for service over a particular HNB.
- UE registration by the HNB allows the HNB-GW to provide UE specific service parameters to the HNB (e.g., differentiated billing for home users versus guest users).
- UE registration by the HNB provides a mechanism for indicating emergency services only.
- the HNB-GW can override the normal service access controls for this UE but the HNB-GW may still restrict the UE to only emergency services for fraud prevention.
- this emergency services indicator allows the HNB-GW to support emergency call-backs by targeting the correct HNB over which the emergency call had originated. This assumes that the HNB allows an unauthorized UE (i.e., a UE not allowed service over that particular HNB) to camp for limited service.
- the HNB is initially provisioned with information (i.e., an IP address or a FQDN) about the Provisioning HNB-GW and the corresponding Provisioning SeGW related to that HNB-GW. If the HNB does not have any information about the Serving HNB-GW and the associated SeGW stored, then the HNB completes the Discovery procedure towards the Provisioning HNB-GW via the associated SeGW. If the HNB has stored information about the Serving HNB-GW on which it registered successfully the last time, the HNB skips the discovery procedure and attempts registration with the Serving HNB-GW as described below.
- information i.e., an IP address or a FQDN
- FIG. 31 illustrates the case when the HNB powers on and does not have stored information on the Serving HNB-GW, and then performs a discovery procedure with the provisioning HNB-GW and SeGW, in some embodiments.
- the HNB 3105 when the HNB 3105 has a provisioned FQDN of the HNB-GW Discovery service, it performs (at step 1 ) a DNS query (via the generic IP access network interface) to resolve the FQDN to an IP address.
- the DNS step is omitted.
- the DNS Server 3110 returns (at step 2 ) a response including the IP Address of a HNB-GW that provides HNB-GW Discovery service.
- the HNB 3105 establishes (at step 3 ) a secure tunnel to the HNB-GW 3115 .
- the SeGW is any logical entity within the HNB-GW 3115 .
- the HNB 3105 sets up (at step 4 ) a reliable transport session to a well-defined port on the HNB-GW 3115 .
- the HNB 3105 queries (at step 5 ) the HNB-GW 3115 for the address of the serving HNB-GW, using the HNBAP DISCOVERY REQUEST message.
- the message contains both HNB location information and HNB identity.
- the HNB 3105 provides location information via use of one or more of the following mechanisms: (1) detected macro coverage information (e.g., GERAN or UTRAN cell information), (2) geographical co-ordinates (e.g., via use of GPS, etc.), or (3) Internet connectivity information (e.g., IP address or DSL Line Identifier). It is possible that none of the above information is available.
- the discovery mechanism of some embodiments supports HNB assignment to a default HNB-GW for such use with the understanding that service via such default assignment may be non-optimal. Alternately, some embodiments deny discovery of a serving HNB-GW until valid location information is provided.
- the HNB 3105 is assumed to have a globally unique identity. In some embodiments, the specific identity may be the IMSI if a (U)SIM is associated with the HNB.
- the HNB-GW 3115 returns (at step 6 ) the HNBAP DISCOVERY ACCEPT message, using the information provided by the HNB 3105 to determine the address of the most appropriate serving HNB-GW.
- the DISCOVERY ACCEPT message may also indicate whether the serving HNB-GW address information is stored by the HNB 3105 for future access (i.e., versus performing HNB-GW discovery each time the HNB 3105 is power-cycled).
- the HNB-GW 3115 When the HNB-GW 3115 cannot accept (at step 7 ) the HNBAP DISCOVERY REQUEST message, it returns a HNBAP DISCOVERY REJECT message indicating the reject cause. The secure tunnel to the HNB-GW 3115 is released (at step 8 ).
- the HNB establishes a secure tunnel with the Security Gateway of the Serving HNB-GW and attempts to register with the HNB-GW.
- This HNB-GW may become the Serving HNB-GW for that connection by accepting the registration, or this HNB-GW may redirect the HNB to a different Serving HNB-GW.
- HNB-GW redirection may be based on information provided by the HNB during the Registration procedure, operator chosen policy or network load balancing.
- FIG. 32 illustrates the HNB Power on registration procedure of some embodiments.
- the HNB 3205 performs (at step 1 ) the HNB-GW Discovery procedure.
- the HNB 3205 establishes (at step 2 ) a secure tunnel to the serving HNB-GW 3215 . This step may be omitted if a secure tunnel is being reused from an earlier discovery or registration procedure.
- the HNB 3205 sets up (at step 3 ) a reliable transport session to a well-defined port on the serving HNB-GW 3215 .
- the HNB 3205 attempts (at step 4 ) to register with the serving HNB-GW 3215 using a HNBAP REGISTRATION REQUEST message.
- the message contains the HNB identity (per SA1 requirement, the HNB 3205 has a globally unique identity; for example, it may be the IMSI if a (U)SIM is associated with the HNB), and HNB location information.
- the location information can be in the following forms: (1) detected macro coverage information (e.g., GERAN or UTRAN cell information), (2) geographical coordinates (e.g., via use of GPS, etc.), or (3) Internet connectivity information (e.g., IP address or DSL Line Identifier).
- the registration mechanism of some embodiments supports either a registration with default network operating parameters or a registration rejection to prevent HNB operation in unknown locations.
- the determination for exact logic should be based on configured policy of the HNB-GW (here, 3215 ).
- the serving HNB-GW 3215 may use the information from the HNBAP REGISTER REQUEST message to perform access control of the HNB 3205 (e.g., whether a particular HNB is allowed to operate in a given location, etc). If the serving HNB-GW 3215 accepts the registration attempt it responds (at step 5 ) with a HNBAP REGISTER ACCEPT message.
- the HNBAP REGISTER ACCEPT message includes the necessary system information for the HNB functionality which needs to be coordinated with the serving HNB-GW 3215 . In this case, the reliable transport session and the secure tunnel are not released and are maintained as long as the HNB 3205 is registered with the serving HNB-GW 3215 .
- the serving HNB-GW 3215 may reject (at step 6 ) the request (e.g., due to network congestion or overload, blacklisted HNB, unauthorized location, etc.). In this case, the HNB-GW 3215 responds with a HNBAP REGISTER REJECT message indicating the reject cause. Additionally, in cases of network congestion or overload, the HNB-GW may also indicate a back-off time to prevent the HNB from attempting an immediate registration retry.
- the serving HNB-GW 3215 wishes to redirect (at step 7 ) the HNB 3205 to (another) serving HNB-GW (not shown)
- the HNB-GW 3215 responds with a HNBAP REGISTER REDIRECT message providing information about the target HNB-GW.
- the functionality of redirection maybe performed via the HNB receiving a HNBAP REGISTER REJECT message from the HNB-GW and attempting to connect to a second HNB-GW using information for the second HNB-GW provided by the HNB management system.
- the HNB 3205 releases (at step 8 ) the transport session as well as the secure tunnel if it does not receive a HNBAP REGISTER ACCEPT message in response.
- the HNB may re-attempt the discovery procedure (including in the message a cause indicating the failed registration attempt and the serving HNB-GW provided in the last discovery procedure). The HNB may also delete all stored information about the rejected serving HNB-GW.
- HNB Registration attempts Some of the possible reject causes for HNB registration attempts are: network congestion or overload, location not allowed, geo-location not known, HNB Identity (e.g., IMSI) not allowed, resource unavailable, and/or “unspecified”.
- HNB Identity e.g., IMSI
- the HNB After an HNB is registered with a HNB-GW, the HNB establishes a short range licensed wireless service region of the HNB system. When UEs enter the service region, the HNB performs a registration procedure to authenticate and authorize the UE for HNB service for the service region of a particular HNB. UE registration first determines whether the HNB is permitted to access services of the HNB system through the particular service region associated with the HNB on which the UE is camped. UE registration also serves to determine what services the UE is authorized to access from that particular service region. Similar to the HNB registration, UE registration is performed through the HNB-GW.
- UEs may be restricted to service through certain HNBs i.e. the HNBs may have a closed subscriber group (CSG) for allowing access through the particular HNB.
- CSG closed subscriber group
- the UE is allowed service through an HNB that is associated with the user's home location.
- the UE is allowed HNB service through certain HNB hotspots.
- FIG. 33 illustrates UE registration with the HNB, in some embodiments.
- the HNB 3305 registers a specific UE 3310 with the HNB-GW 3315 .
- the registration is triggered when the UE 3310 attempts to access the HNB 3305 for the first time via an initial NAS message (e.g. Location Updating Request).
- an initial NAS message e.g. Location Updating Request
- the UE 3310 upon camping on the HNB 3305 , the UE 3310 initiates (at step 1 a ) a Location Update procedure by establishing an RRC connection with the HNB 3305 (it can be assumed that the HNB 3305 has a location area that is distinct from its neighboring HNB and macro cells to trigger an initial message upon camping on the HNB 3305 ).
- the UE 3310 transmits (at step 1 b ) a NAS message carrying the Location Updating Request message with some form of identity (IMSI/TMSI).
- the HNB requests (at step 1 c ) the IMSI of the UE and the UE replies at step Id.
- the UE could trigger a combined Routing Area and Location Area update request instead of the initial LU request.
- the HNB may also optionally perform local access control for faster rejection of those UEs not authorized to access the particular HNB. If the HNB performs the local access control, then unauthorized UEs are not attempted to be registered with the HNB-GW.
- the HNB 3305 attempts (at step 2 ) to register the UE 3310 on the HNB-GW 3315 over the UE specific transport session by transmitting the HNBAP UE REGISTER REQUEST.
- the message contains location information and the UE identity such as the IMSI of the (U)SIM associated with the UE.
- the HNB identity over which the UE is attempting access can be inferred or derived by the HNB-GW based on HNB registration and the associated transport session (e.g. SCTP session) since the UE registration is also attempted (by the HNB) using the same transport session.
- the HNB-GW 3315 performs access control for the particular UE 3310 attempting to utilize the specific HNB 3305 . If the HNB-GW 3315 accepts the registration attempt, it responds (at step 3 ) with a HNBAP REGISTER ACCEPT message back to the HNB 3305 . In some embodiments, the HNB-GW 3315 also assigns information specific to the UE 3310 such as SAI specific to the registered UE, UE Context Id (for use in the RUA layer), etc. The UE Context Id provides a unique identifier for each UE within a particular HNB-GW. The UE Context Id is used to identify a logical Iuh signaling connection for a given UE. Additionally, since the UE Context Id is unique within the HNB-GW, it is also used (e.g. by the HNB) as the “Iu signaling connection identifier” in corresponding RANAP messages for that particular UE.
- the HNB 3305 performs (at step 4 ) a NAS relay of the Location Updating Request message from the UE 3310 to the HNB-GW 3315 via the use of RANAP Initial UE Message.
- the RANAP Initial UE Message is encapsulated in the RUA message header with additional necessary information which enables the HNB-GW 3315 to relay RANAP message towards the appropriate CN entity.
- the HNB-GW 3315 establishes (at step 5 ) an SCCP connection to the CN 3320 and forwards the Location Update request (or the combined RA/LA update request) NAS PDU to the CN 3320 using the RANAP Initial UE Message. Subsequent NAS messages between the UE 3310 and core network 3320 will be sent between the HNB 3305 /HNB-GW 3315 and the CN 3320 using the RANAP Direct Transfer message encapsulated in the RUA header.
- the CN 3320 authenticates (at step 6 ) the UE 3310 using standard authentication procedures.
- the CN 3320 also initiates the Security Mode Control procedure.
- the NAS messages are relayed transparently by the HNB-GW 3315 and the HNB 3305 between the UE 3310 and the CN 3320 .
- the CN 3320 indicates (at step 7 ) it has received the location update and it will accept the location update using the Location Update Accept message to the HNB-GW 3315 .
- the HNB-GW 3315 relays (at step 8 ) the LU Accept NAS message to the HNB 3305 via the use of RANAP Direct Transfer message encapsulated in the RUA header.
- the HNB 3305 relays (at step 9 ) the LU Accept over the air interface to the UE 3310 and the procedure is completed.
- the HNB has a location area that is distinct from its neighboring HNB and macro cells in order to trigger an initial message from a UE upon the UE camping on the HNB.
- the uniqueness of location is with respect to neighbors of a given HNB, which includes other surrounding HNBs and macro cells. It is neither required nor feasible to have a system-wide (i.e., across PLMN) unique location area for each HNB. Multiple HNBs are able to re-use the location area with the above consideration (i.e., non-conflicting with other neighbors).
- This unique location area is required to trigger an initial UE message and serves to perform access control and rejection of unauthorized UEs upon initial cell reselection and camping on the HNB; and, to track authorized UEs, in order to minimize the impact of paging at the HNB-GW as well as the HNB (via UE registration).
- the HNB may expect a periodic LU for that UE (the enabling and the periodicity of the LU is controlled by the HNB via System Information broadcast from the HNB to the UE). This exchange will serve as a keep-alive between the HNB and the UE and will help the HNB detect idle UEs moving away from the camped HNB without explicit disconnect from the network.
- the HNB-GW When the unauthorized UE is not allowed to camp on the HNB, the HNB-GW responds to the UE registration with a HNBAP REGISTRATION REJECT message to the HNB. The HNB is then expected to reject the corresponding UE using appropriate reject mechanisms. For example, some rejection mechanisms include RRC rejection or redirection to another cell or reject the LU with cause such as “Location Area not allowed”, etc.
- the HNB-GW When the unauthorized UE is allowed to camp in idle mode only, the HNB-GW responds to the UE registration with a HNBAP REGISTRATION ACCEPT message to the HNB and also includes a cause code indicating the limited camping of the UE (i.e., idle mode only).
- the HNB continues with the Location Update NAS message processing.
- the HNB will use the appropriate mechanisms (e.g., RRC redirection or relocation) to redirect the UE to another macro cell for the active call.
- a HNB can be deployed in multiple access modes.
- the HNBs When the HNBs are deployed in closed access mode (meaning only a certain group of users are allowed access), a mechanism for access control is implemented via enforcement in the network (either the radio access network or the core network). As a result, the network must reject un-authorized UEs (i.e. UEs not subscribing to a particular HNB).
- the allowed CSG list stored on the UE or in the subscriber database record (such as in the HLR or HSS) is also known as the white-list.
- the CSG capable HNB broadcasts a CSG-Id over the air interface.
- the CSG-Id refers to a single cell, and in other embodiments, the CSG-Id may be shared by multiple CSG cells.
- the HNB may also include an indication on whether the cell belongs to a closed subscriber group.
- the CN elements MSC/VLR/SGSN
- the CN elements are assumed to be CSG capable i.e. they are able to access the allowed CSG list (i.e. white-list) of a particular UE (i.e. subscriber) and to enforce access control for each subscriber.
- Subscribers can be equipped with either a legacy UE or a CSG capable UE.
- the legacy UE's decision to select a particular HNB may be based on macro NCL (e.g. if moving from macro coverage into HNB coverage area in idle mode) or based on full scan of all available cells for a particular operator PLMN (e.g. if there is no macro coverage in idle mode).
- CSG capable UEs do not need the macro NCL assistance and are capable of selecting the HNB autonomously based on the White-List on the (U)SIM or manual selection using the CSG-Id/“HNB Display Identity” broadcast by the HNB.
- macro NCL includes HNB neighbors
- a CSG capable UE may use that information for initial scanning of the HNB but the eventual decision to select the particular HNB is based on the white-list or manual selection decision.
- the HNB can rely upon an initial L3 transaction (e.g. LAU or Paging Response) to perform UE registration (similar to UE registration supported for legacy i.e. pre-CSG systems).
- LAU initial L3 transaction
- the HNB since the access control is performed in the CN, the HNB must also monitor for successful confirmation of the initial L3 transaction (e.g. LAU Accept). If the HNB detects failure in the L3 procedure, the HNB must trigger deregistration of the CSG UE.
- the UE registration procedure as defined for legacy systems requires the HNB to know the permanent identity (IMSI) of the UE and the IMSI is obtained via identity request procedure which is considered a breach of the current user confidentiality assumptions in macro networks.
- IMSI permanent identity
- the UE permanent identity is required in legacy (i.e. pre-CSG) environments to perform access control and to perform paging filtering (in the HNB-GW) using the IMSI.
- legacy i.e. pre-CSG
- the access control is performed by the CN using CSG-id and the white-list on the UE. This leaves the problem of paging filtering.
- the paging filtering using UE registration, in the legacy system i.e. pre-CSG UE/HNB
- HNB the IMSI as the identity.
- Some embodiments modify the UE registration to allow UE registration using the ⁇ TMSI/P-TMSI, LAC ⁇ as temporary UE identity (Note: LAC is required since TMSI is unique within given LAC only and 2 simultaneous UE registration must be handled).
- the NAS message triggering UE registration (LAU or CSG Update) will result in the RANAP Common-Id procedure being sent by the CN towards the HNB-GW and will include the IMSI.
- This allows the HNB-GW to associate the UE context (created at UE registration using a temporary identity, such as (P)TMSI, with the particular IMSI. Subsequent paging can be filtered at the HNB-GW using the IMSI stored in the UE context.
- FIG. 34 illustrates a procedure for the HNB-GW to allow UE registration using temporary identity (e.g. TMSI or PTMSI) in some embodiments.
- the HNB-GW subsequently receives the permanent identity from the core network (CN) and associates the above said UE registration with the permanent identity i.e. IMSI of the UE.
- CN core network
- UE 3405 selects (at step 1 ) and camps on the HNB 3410 using its white-list (or allowed CSG list) and CSG information broadcast by the HNB 3410 .
- the UE 3405 then sends (at step 2 ) an initial NAS (L3) message towards the HNB 3410 (e.g. LAU request or Page response) containing only a temporary UE identity such as the TMSI (CS domain) or PTMSI (PS domain).
- L3 initial NAS
- the HNB 3410 initiates (at step 3 ) a UE registration towards the HNB-GW 3415 with this temporary UE identity without any further identity request from the UE 3405 over the air interface.
- the HNB-GW 3415 accepts (at step 4 ) the UE registration using the temporary identity and includes a unique context id in the UE registration accept message.
- the initial NAS message is forwarded (at steps 5 - 8 ) towards the CN 3420 followed by authentication and other normative procedures.
- the CN 3420 then sends (at step 9 ) the RANAP Common Id message containing the UE's permanent identity i.e. IMSI.
- the HNB-GW 3415 then associates (at step 10 ) the existing UE registration and context Id with the IMSI obtained in this manner.
- the CN is able to access the allowed CSG list (i.e. white-list) of a particular UE (i.e. subscriber).
- the HNB-GW can send the page to the correct HNB, and IMSI becomes a non-issue.
- this mechanism does require modification to existing RANAP Page messages from the CN.
- the CN may be required to include the CSG-Id conditionally towards the HNB-GW and never towards a macro RNC.
- FIG. 35 illustrates the UE rove out procedure, where the UE leaves the HNB coverage area while idle, in some embodiments.
- the HNB 3505 upon successful UE registration/LAU of the UE 3510 , the HNB 3505 will monitor (at step 1 ) the UE 3510 via periodic location updates. The enabling and the periodicity of the LU are controlled by the HNB 3505 via System Information broadcast from the HNB 3505 to the UE 3510 . This exchange will serve as a keep-alive between the HNB 3505 and the UE 3510 .
- the HNB 3505 determines (at step 2 ) that the UE 3510 is no longer camped on the HNB 3505 (roved out), as a result of missing number of periodic location updates from the UE 3510 .
- the HNB 3505 will inform (at step 3 ) the HNB-GW 3515 that the UE 3510 has moved out of the HNB coverage area by sending a HNBAP DEREGISTER message.
- the HNB-GW 3515 will remove any associated UE context upon receiving the deregister message for the UE 3510 .
- FIG. 36 illustrates the case when the UE powers down and performs an IMSI detach via the HNB access network, in some embodiments.
- the UE 3610 in idle mode initiates (at step 1 ) the power off sequence.
- the UE 3610 establishes (at step 2 ) an RRC Connection with the HNB 3605 .
- the UE 3610 sends (at step 3 ) an MM Layer IMSI-Detach message over the air interface to the HNB 3605 .
- the HNB 3605 sends (at step 4 ) the RANAP encapsulated IMSI-Detach NAS PDU message along with the RUA header information to the HNB-GW 3615 .
- the HNB-GW 3615 establishes (at step 5 ) an SCCP connection to the CN 3620 and forwards the IMSI-Detach NAS PDU to the CN 3620 using the RANAP Initial UE Message.
- the CN 3620 initiates (at step 6 ) a normal resource cleanup via RANAP Iu Release Command to the HNB-GW 3615 .
- the HNB-GW 3615 forwards (at step 7 ) the RANAP Iu Release Command message encapsulated in the RUA to the HNB 3605 .
- the HNB 3605 acknowledges (at step 8 ) resource cleanup via RUA encapsulated RANAP Iu Release Complete message to the HNB-GW 3615 .
- the HNB-GW 3615 forwards (at step 9 ) the RANAP Iu Release Complete message to the CN 3620 .
- the HNB 3605 triggers (at step 10 ) deregistration for the specific UE 3610 by sending a corresponding HNBAP DEREGISTER message to the HNB-GW 3615 .
- the HNB 3605 detects that the UE 3610 has roved and triggers the UE deregistration.
- the HNB 3605 can also monitor the IMSI-Detach NAS message from the UE 3610 and trigger deregistration of the UE 3610 .
- the HNB 3605 initiates (at step 11 ) RRC Connection release procedure towards the UE 3610 and the UE 3610 powers off (at step 12 ).
- the sequence of events is same as UE Roving out of HNB as described above in with reference to FIG. 36 .
- FIG. 37 illustrates the loss of Iuh interface capacity for the HNB, in some embodiments.
- the SCTP instance on the HNB 3705 periodically sends (at step 1 ) a SCTP HEARTBEAT message to the HNB-GW 3715 to check that the SCTP connection exists.
- IP connectivity between the HNB 3705 and HNB-GW 3715 is lost (at step 2 ) (e.g., due to a broadband network problem).
- the HNB-GW 3715 detects the loss of connectivity, it releases (at step 3 ) the resources assigned to the HNB 3705 (e.g., SCTP connection) and deletes the subscriber record (i.e., performs a local deregistration of the HNB 3705 ).
- the HNB-GW implementation deletes UE specific sessions and contexts originating from that particular HNB.
- the HNB 3705 If the HNB 3705 detects (at step 4 ) the loss of SCTP connectivity, it attempts (at step 5 ) to re-establish the SCTP connection and re-register with the HNB-GW 3715 . Should the HNB 3705 re-establish connectivity and re-register before the HNB-GW 3715 detects the problem, the HNB-GW 3715 must recognize that the HNB 3705 is already registered and adjust accordingly (e.g., release the old SCTP connection resources).
- the HNB 3705 will implicitly deregister (at step 6 ) all the UEs 3710 currently camped on the HNB 3705 . Additionally, the HNB 3705 must force all the UEs 3710 , currently camped on that HNB 3705 , to do a cell-reselection and rove out of HNB coverage. The UE 3710 , as a result of the cell re-selection, will switch (at step 7 ) to UMTS macro cell (if UMTS macro network coverage is available).
- the HNB-GW deregisters the HNB when (1) the HNB-GW receives an HNBAP REGISTER UPDATE UPLINK message, but the HNB is not registered, (2) the HNB-GW receives an HNBAP REGISTER UPDATE UPLINK message, but encounters a resource error and cannot process the message, or (3) the HNB-GW receives an HNBAP REGISTER UPDATE UPLINK message with new macro network cell information, and the macro cell is HNB-restricted.
- the HNB-GW will deregister the UE if it receives an HNBAP SYNCHRONIZATION INFORMATION message for a UE that is not registered.
- the updates from the HNB may be indicated by the HNB sending another HNBAP REGISTER REQUEST over the same SCTP transport where it is already registered.
- FIG. 38 illustrates an HNB-initiated register update between the HNB and HNB-GW, in some embodiments.
- a register update is triggered (at step 1 ) in the HNB 3805 (e.g., change of macro network coverage).
- the HNB 3805 sends (at step 2 ) HNBAP REGISTER UPDATE UPLINK to the HNB-GW 3815 .
- the HNB-GW 3815 may optionally send (at step 3 ) HNBAP REGISTER UPDATE DOWNLINK message if there is a change in system information for the HNB 3805 due to updated macro information (e.g., change in Iu interface parameters such as LAI, etc. due to updated macro information).
- updated macro information e.g., change in Iu interface parameters such as LAI, etc. due to updated macro information.
- the HNB-GW 3815 may trigger (at step 4 ) the deregistration procedure as described in the subsection above.
- the updates from the HNB may be indicated by the HNB sending another HNBAP REGISTER REQUEST over the same SCTP transport where it is already registered.
- FIG. 39 illustrates the HNB-GW-initiated registration update between the HNB and HNB-GW, in some embodiments.
- a register update is triggered (at step 1 ) in the HNB-GW 3915 (e.g., due to change in access control list or closed user group for the HNB, or change in System Information such as LAI, RNC-Id, etc).
- the HNB-GW 3915 sends (at step 2 ) HNBAP REGISTER UPDATE DOWNLINK to the HNB 3905 .
- the HNBAP REGISTER UPDATE DOWNLINK message triggers (at step 3 ) an additional procedure.
- the HNB rejects UEs due to updated access control or a closed user group list received from the HNB-GW.
- the updates from the HNB-GW may be forced by the HNB-GW by sending a HNBAP DEREGISTER message and subsequently re-registrating the HNB.
- FIG. 40 illustrates the CS Handover from HNB to a UTRAN cell, in some embodiments.
- This figure includes HNB 4005 , UE 4010 , HNB-GW 4015 , CN 4020 , and RNC 4025 .
- this procedure is performed when the UE 4010 is on an active call on the HNB 4005 and has been ordered (by the HNB 4005 ) to make measurements on neighboring macro UTRAN cells.
- the HNB 4005 is able to derive the neighbor list configuration (for example, by using a scan of its neighbor cells or be provisioned by the HNB management system) and the HNB 4005 is able to distinguish other neighboring HNBs from the macro cells.
- the HNB 4005 is able to retrieve from the HNB-GW 4015 (using HNBAP registration procedures) the target RNC-Id information for each of the neighbor cells.
- the target RNC-Id mapping is obtained from the HNB Management system during HNB initialization.
- the UE 4010 sends (at step 1 ) periodic Measurement Reports (Signal Measurements) to the HNB 4005 .
- the handover may be triggered as a result of the UE Measurement Reports indicating better signal strength on a neighboring macro cell.
- the HNB 4005 makes a decision (at step 2 ) on handover (e.g., based on the Measurement Reports from the UE 4010 or any uplink quality indications received from the HNB-GW 4015 ) and selects a target UTRAN cell.
- the HNB 4005 then sends RANAP Relocation Required messages encapsulated in the RUA header to the HNB-GW 4015 .
- This message would carry the necessary information such as the target cell id necessary to communicate with the CN 4020 and target UTRAN system (here, the RNC 4025 ).
- the HNB-GW 4015 relays (at step 3 ) the RANAP Relocation Required messages to the CN entity in the appropriate domain (using the domain indicator from the RUA header).
- the CN 4020 starts (at step 4 ) the handover procedure towards the target RNC 4025 identified by the Target-Id in the Relocation Required message from the HNB-GW 4015 .
- the CN 4020 requests that the target RNC 4025 allocate the necessary resources using a Relocation Request message.
- the target RNC 4025 builds (at step 5 ) a Physical Channel Reconfiguration message providing information on the allocated UTRAN resources and sends it to the CN 4020 through the Relocation Request Acknowledge message.
- the CN 4020 signals (at step 6 ) the HNB-GW 4015 to handover the UE 4010 to the UTRAN, using a Relocation Command message (which includes the Physical Channel Reconfiguration message), ending the handover preparation phase.
- the HNB-GW 4015 relays (at step 7 ) the RANAP Relocation Command message to the HNB 4005 with the appropriate RUA header information.
- the HNB 4005 extracts (at step 8 ) the Physical Channel Reconfiguration message and sends it to the UE 4010 over the Uu interface.
- the UE 4010 performs (at step 9 ) a handover into the new cell via uplink synchronization to the target RNS on the Uu interface.
- the target RNC 4025 confirms (at step 10 ) the detection of the handover to the CN 4020 , using the Relocation Detect message.
- the CN 4020 may at this point switch (at step 11 ) the user plane to the target RNS.
- the UE 4010 Upon completion of synchronization with the target RNS, the UE 4010 signals (at step 12 ) completion of handover using the Physical Channel Reconfiguration Complete message.
- the target RNC 4025 confirms (at step 13 ) handover completion by sending the Relocation Complete message to the CN 4020 .
- Bi-directional voice traffic is now flowing (at step 14 ) between the UE 4010 and CN 4020 , via the UTRAN.
- the CN 4020 On receiving the confirmation of the completion of the handover, the CN 4020 indicates (at step 15 ) to the HNB-GW 4015 to release any resources allocated to the UE 4005 , via the Iu Release Command.
- the HNB-GW 4015 relays (at step 16 ) the RANAP Iu Release Command message to the HNB 4005 .
- the HNB 4005 confirms (at step 17 ) UE specific resource release using the RUA encapsulated RANAP Iu Release Complete message to the HNB-GW 4015 .
- the HNB-GW 4015 confirms (at step 18 ) resource release to the CN 4020 using the Iu Release Complete message.
- the HNB-GW 4015 may also release any local resources for the specific UE (e.g., ATM resources reserved for the voice bearer, etc).
- the HNB 4005 deregisters (at step 19 ) the UE 4010 from the HNB-GW 4015 , using an explicit HNBAP DEREGISTER message.
- FIG. 41 illustrates the CS handover from HNB to GERAN procedure, in some embodiments.
- This figure includes HNB 4105 , UE 4110 , HNB-GW 4115 , CN 4120 , and the (target) BSC 4125 .
- the description of the procedures in this clause assume the UE 4110 is on an active call on the HNB 4105 and has been ordered (by the HNB 4105 ) to make inter RAT measurements on neighboring GSM cells. It is also assumed the HNB 4105 is able to derive the neighbor list configuration (using a scan of its neighbor cells). In some embodiments, the HNB 4105 is able to distinguish other neighboring HNBs from the macro cells.
- the UE 4110 sends (at step 1 ) a periodic Measurement Report (Signal Measurement) to the HNB 4105 .
- the handover is triggered as a result of the UE Measurement Reports indicating better signal strength on neighboring macro GSM cell.
- the HNB 4105 makes a decision on handover (e.g., based on the Measurement Reports from the UE 4110 or any uplink quality indications received from the HNB-GW 4115 ) and selects a target GERAN cell.
- the HNB 4105 then sends (at step 2 ) a RANAP Relocation Required messages encapsulated in the RUA header to the HNB-GW 4115 .
- This message would carry the necessary information such as the target CGI necessary to communicate with the CN 4120 and target GERAN system (here the BSC 4125 ).
- the HNB-GW 4115 relays (at step 3 ) the RANAP Relocation Required messages to the CN entity in the appropriate domain (using the domain indicator from the RUA header).
- the CN 4120 starts (at step 4 ) the handover procedure towards the target GERAN (again, here the BSC 4125 ) identified by the Target-Id (i.e., CGI) in the Relocation Required message from the HNB-GW 4115 .
- the CN 4120 requests the BSC 4125 to allocate the necessary resources using Handover Request.
- the BSC 4125 builds (at step 5 ) a Handover Command message providing information on the channel allocated and sends it to the CN 4120 through the Handover Request Acknowledge message.
- the CN 4120 signals (at step 6 ) the HNB-GW 4115 to handover the UE 4110 to the BSC 4125 , using Relocation Command message (which includes the DTAP Handover Command message), ending the handover preparation phase.
- the HNB-GW 4115 relays (at step 7 ) the RANAP Relocation Command message to the HNB 4105 with the appropriate RUA header information.
- the HNB 4105 extracts (at step 8 ) the DTAP Handover Command message and sends it to the UE 4110 using the Uu: Handover from UTRAN message.
- the UE 4110 transmits (at step 9 ) the Um: Handover Access containing the handover reference element to allow the BSC 4125 to correlate this handover access with the Handover Command message transmitted earlier to the CN 4120 in response to the Handover Request.
- the BSC 4125 confirms (at step 10 ) the detection of the handover to the CN 4120 , using the Handover Detect message.
- the CN 4120 may at this point switch (at step 11 ) the user plane to the target BSS (not shown).
- the BSC 4125 provides (at step 12 ) Physical Information to the UE 4110 (i.e., Timing Advance), to allow the UE 4110 to synchronize with the BSC 4125 .
- the UE 4110 signals (at step 13 ) to the BSC 4125 that the handover is completed, using Handover Complete.
- the BSC 4125 confirms (at step 14 ) to the CN 4120 the completion of the handover, via Handover Complete message.
- the CN 4120 uses the target CGI used in the Handover procedure for charging purposes. Bi-directional voice traffic is now flowing (at step 15 ) between the UE 4110 and CN 4120 , via the GERAN.
- the CN 4120 On receiving the confirmation of the completion of the handover, the CN 4120 indicates (at step 16 ) to the HNB-GW 4115 to release any resources allocated to the UE 4110 , via the Iu Release Command.
- the HNB-GW 4115 relays (at step 17 ) the RANAP Iu Release Command message to the HNB 4105 .
- the HNB 4105 confirms (at step 18 ) UE specific resource release using the RUA encapsulated RANAP Iu Release Complete message to the HNB-GW 4115 .
- the HNB-GW 4115 relays (at step 19 ) the RANAP Iu Release Complete message to the CN 4120 .
- the HNB 4105 deregisters (at step 20 ) the UE 4110 from the HNB-GW 4115 , using an explicit HNBAP DEREGISTER message.
- FIG. 42 illustrates the PS Handover from HNB to UTRAN, in some embodiments.
- This figure includes HNB 4205 , UE 4210 , HNB-GW 4215 , CN 4220 , and the (target) RNC 4225 .
- the UE 4210 is on an active call on the HNB 4205 and the UE 4210 has been ordered (by the HNB 4205 ) to make measurements on neighboring macro UTRAN cells.
- the HNB 4205 is able to derive the neighbor list configuration (using a scan of its neighbor cells) and the HNB 4205 is able to distinguish other neighboring HNBs from the macro cells.
- the HNB 4205 is able to retrieve from the HNB-GW 4215 (using HNBAP registration procedures) the target RNC-Id information for each of the neighbor cells.
- the target RNC-Id mapping can also be obtained from the HNB Management system during HNB initialization.
- the UE 4210 sends (at step 1 ) a periodic Measurement Report (Signal Measurement) to the HNB 4205 .
- the handover is triggered as a result of the UE Measurement Reports indicating better signal strength on a neighboring macro cell.
- the HNB 4205 makes a decision to handover based on the Measurement Reports from the UE 4210 and selects a target UTRAN cell (here, the RNC 4225 ).
- the HNB 4205 then sends (at step 2 ) a RANAP Relocation Required messages encapsulated in the RUA header to the HNB-GW 4215 . This message would carry the necessary information such as the target cell id necessary to communicate with the CN 4220 and the RNC 4225 .
- the HNB-GW 4215 relays (at step 3 ) the RANAP Relocation Required messages to the CN entity in the appropriate domain (using the domain indicator from the RUA header).
- the CN 4220 starts (at step 4 ) the handover procedure towards the RNC 4225 identified by the Target-Id in the Relocation Required message from the HNB-GW 4215 .
- the CN 4220 requests from the RNC 4225 to allocate the necessary resources using Relocation Request.
- the RNC 4225 builds (at step 5 ) a Physical Channel Reconfiguration message providing information on the allocated UTRAN resources and sends it to the CN 4220 through the Relocation Request Acknowledge message.
- the CN 4220 signals (at step 6 ) the HNB-GW 4215 to handover the UE 4205 to the RNC 4225 , using a Relocation Command message (which includes the Physical Channel Reconfiguration message), ending the handover preparation phase.
- the HNB-GW 4215 relays (at step 7 ) the RANAP Relocation Command message to the HNB 4205 with the appropriate RUA header information.
- the order of steps from Step 8 onwards doesn't necessarily indicate the order of events. For example, steps 8 to 10 may be performed by the HNB 4205 almost simultaneously.
- the HNB 4205 may begin (at step 8 ) forwarding the data for the radio access bearers (RABs) which are subject to data forwarding.
- RABs radio access bearers
- the GTP-PDUs related to transmitted but not yet acknowledged PDCP-PDUs are duplicated and routed at an IP layer towards the target RNC 4225 together with their related downlink PDCP sequence numbers.
- the HNB 4205 continues transmitting duplicates of downlink data and receiving uplink data.
- the HNB 4205 extracts (at step 9 ) the Physical Channel Reconfiguration message and sends it to the UE 4210 over the Uu interface.
- the HNB 4205 sends (at step 10 ) a RANAP Forward SRNS Context message to the HNB-GW 4215 to transfer the SRNS contexts to the RNC 4225 via HNB-GW 4215 .
- the HNB-GW 4215 relays (at step 11 ) the corresponding Forward SRNS Context message to the associated CN node.
- the CN 4220 relays (at step 12 ) the SRNS Context information to the RNC 4225 .
- the UE 4210 performs (at step 13 ) a handover into the new cell via uplink synchronization to the target RNS on the Uu interface.
- the RNC 4225 confirms (at step 14 ) the detection of the handover to the CN 4220 , using the Relocation Detect message.
- the UE 4210 signals (at step 15 ) completion of handover using the Physical Channel Reconfiguration Complete message.
- the RNC 4225 confirms (at step 16 ) handover completion by sending the Relocation Complete message to the CN 4220 .
- the CN 4220 indicates (at step 17 ) to the HNB-GW 4215 to release any resources allocated to the UE 4210 , via the Iu Release Command.
- the CN 4220 will also switch the PS user plane from the HNB-GW 4215 to the target RNS.
- the HNB-GW 4215 relays (at step 18 ) the RANAP Iu Release Command message to the HNB 4205 .
- the HNB 4205 confirms (at step 19 ) UE specific resource release using the RUA encapsulated RANAP Iu Release Complete message to the HNB-GW 4215 .
- the HNB-GW 4215 confirms (at step 20 ) resource release to the CN 4220 using the Iu Release Complete message.
- the HNB 4205 deregisters (at step 21 ) the UE 4210 from the HNB-GW 4215 , using an explicit HNBAP DEREGISTER message.
- FIG. 43 illustrates the PS handover from HNB to GERAN procedure, in some embodiments.
- This figure includes HNB 4305 , UE 4310 , HNB-GW 4315 , CN 4320 , and BSC 4325 .
- the UE 4310 is on an active call on the HNB 4305 and has been ordered (by the HNB 4305 ) to make inter RAT measurements on neighboring GSM cells.
- the HNB 4305 is able to derive the neighbor list configuration (using a scan of its neighbor cells).
- the HNB 4305 is able to distinguish other neighboring HNBs from the macro cells.
- the UE 4310 sends (at step 1 ) a periodic Measurement Report (Signal Measurement) to the HNB 4305 .
- the handover is triggered as a result of the UE Measurement Reports indicating better signal strength on a neighboring GSM cell.
- the HNB 4305 makes a decision (at step 2 ) to handover based on the Measurement Reports from the UE 4310 and selects a target GERAN cell (here, the BSC 4325 ).
- the HNB 4305 then sends RANAP Relocation Required messages encapsulated in the RUA header to the HNB-GW 4315 . This message would carry the necessary information such as the target cell id necessary to communicate with the CN 4320 and target GERAN system.
- the HNB-GW 4315 relays (at step 3 ) the RANAP Relocation Required messages to the CN 4320 in the appropriate domain (using the domain indicator from the RUA header).
- the CN 4320 i.e., SGSN
- Target BSS complete (at steps 4 - 6 ) the UTRAN to GERAN PS handover preparation as described in 3GPP Technical Specification 43.129 entitled “Packet-switched handover for GERAN A/Gb mode; Stage 2” the contents of which are herein incorporated by reference.
- the CN 4320 signals (at step 7 ) the HNB-GW 4315 to handover the UE 4310 to the BSC 4325 , using a RANAP Relocation Command message.
- the HNB-GW 4315 relays (at step 8 ) the RANAP Relocation Command message to the HNB 4305 with the appropriate RUA header information.
- the HNB 4305 may begin forwarding (at step 9 ) the data for the Radio Access Bearers (RABs) which are subject to data forwarding per the description in 3GPP TS 43.129.
- the HNB 4305 sends (at step 10 ) the Handover from UTRAN message and sends it to the UE 4305 over the Uu interface.
- the HNB 4305 sends (at step 11 ) a RUA encapsulated RANAP Forward SRNS Context message to the HNB-GW 4315 to transfer the SRNS contexts to the BSC 4325 .
- the HNB-GW 4315 relays (at step 12 ) the corresponding Forward SRNS Context message to the associated CN node.
- the CN 4320 relays (at step 13 ) the SRNS Context information to the BSC 4325 .
- the UE 4310 executes (at step 14 ) the GERAN A/Gb PS handover access procedures as described in 3GPP TS 43.129.
- the UE 4310 and BSC 4325 complete (at step 15 ) the GERAN PS handover procedures as described in 3GPP TS 43.129.
- the BSC 4325 confirms (at step 16 ) handover completion by sending the Handover Complete message to the CN 4320 .
- the CN 4320 indicates (at step 17 ) to the HNB-GW 4315 to release any resources allocated to the UE 4310 , via the Iu Release Command.
- the HNB-GW 4315 relays (at step 18 ) the RANAP Iu Release Command message to the HNB 4305 .
- the HNB 4305 confirms (step 19 ) UE-specific resource release using the RUA encapsulated RANAP Iu Release Complete message to the HNB-GW 4315 .
- the HNB-GW 4315 confirms (at step 20 ) resource release to the CN 4320 using the Iu Release Complete message.
- the HNB 4305 deregisters (at step 21 ) the UE 4310 from the HNB-GW 4315 , using an explicit HNBAP DEREGISTER message.
- the UE 4310 performs (at step 22 ) the Routing Area Update procedures through the BSC 4325 .
- FIG. 44 illustrates CS bearer establishment (ATM transport) procedures (for MO/MT calls, using Iu-UP over AAL2), in some embodiments.
- ATM transport CS bearer establishment
- an ATM interface exists between the HNB-GW 4415 and the MSC 4420 .
- the MSC 4420 sends (at step 2 ) a RAB Assignment Request message to the HNB-GW 4415 .
- the assignment request contains the address for ALCAP signaling (an ATM E.164 or NSAP address) and also the binding-id.
- the HNB-GW 4415 will initiate (at step 3 ) ALCAP signaling towards the MSC 4420 using the ATM address and the binding-id.
- the MSC 4420 acknowledges (at step 4 ) the AAL2 connection request using the ALCAP Establish confirm message.
- an AAL2 connection with appropriate QoS exists (at step 5 ) between the HNB-GW 4415 and the MSC 4420 .
- the HNB-GW 4415 forwards (at step 6 ) the RUA encapsulated RANAP RAB Assignment Request message to the HNB 4405 to prepare a bearer connection between the endpoints.
- the HNB-GW 4415 assigns an IP address and a RTP port for this specific bearer towards the HNB 4405 .
- the HNB-GW 4415 modifies the RANAP RAB Assignment Request message to remove ATM specific transport information and replaces it with the necessary information (e.g., RTP port and IP address of the HNB-GW 4415 ) for setup of Iu-UP over IP between the HNB 4405 and HNB-GW 4415 .
- the HNB 4405 upon receiving the RANAP RAB Assignment Request message triggers the setup of Iu-UP by sending (at step 7 ) an Iu-UP Init user plane control message over the specified IP transport to the HNB-GW 4415 .
- the HNB-GW 4415 switches (at step 8 ) the transport layer and relays the Iu-UP Init message towards the CN (not shown) over the corresponding AAL2 connection which was setup in step 5 .
- the MSC 4420 responds (at step 9 ) back to the HNB-GW 4415 with Iu-UP Init Ack message over the corresponding AAL2 connection.
- the HNB-GW 4415 relays (at step 10 ) the Iu-UP Init Ack message the HNB 4405 over the corresponding RTP transport.
- the HNB 4405 will initiate (at step 11 ) appropriate RRC layer Radio Bearer Setup message towards the UE 4410 .
- the UE 4410 confirms (at step 12 ) the setup via Radio Bearer Setup Complete message to the HNB 4405 .
- the HNB 4405 then sends (at step 13 ) a RUA encapsulated RANAP RAB Assignment Response message to the HNB-GW 4415 , including the local IP address and port to be used for the Iu-UP over the Iuh interface.
- the HNB-GW 4415 replaces (at step 14 ) the IP transport information with ATM specific transport information and forwards the RANAP RAB Assignment Response message to the CN signaling the completion of RAB assignment.
- FIG. 45 illustrates CS bearer establishment (IP transport) procedures (for MO/MT calls, using Iu-UP over AAL2), in some embodiments.
- IP transport IP transport
- an IP interface exists between the HNB-GW 4515 and the MSC 4520 .
- the MSC 4520 sends (at step 2 ) a RAB Assignment Request message to the HNB-GW 4515 .
- the assignment request contains the necessary information for IP based transport setup of the CS bearer.
- the HNB-GW 4515 forwards (at step 3 ) the RUA encapsulated RANAP RAB Assignment Request message to the HNB 4505 for preparing a bearer connection between the endpoints.
- the HNB-GW 4515 assigns a local IP address of the HNB-GW 4515 and a RTP port for this specific bearer towards the HNB 4505 and modifies the RANAP RAB Assignment Request message to replace the necessary information (e.g., RTP port and IP address of the HNB-GW 4515 ) for setup of Iu-UP over IP between the HNB 4505 and HNB-GW 4515 .
- the HNB 4505 upon receiving the RANAP RAB Assignment Request message, triggers (at step 4 ) the setup of Iu-UP by sending an Iu-UP Init user plane control message over the specified IP transport to the HNB-GW 4515 .
- the HNB-GW 4515 relays (at step 5 ) the Iu-UP Init message towards the CN (here, MSC 4520 ) over the corresponding CN IP transport.
- the MSC 4520 responds (at step 6 ) back to the HNB-GW 4515 with Iu-UP Init Ack message.
- the HNB-GW 4515 relays (at step 7 ) the Iu-UP Init Ack message to the HNB 4505 over the corresponding IP transport.
- the HNB 4505 will initiate (at step 8 ) an appropriate RRC layer Radio Bearer Setup message towards the UE 4510 .
- the UE 4510 confirms (at step 9 ) the setup via a Radio Bearer Setup Complete message to the HNB 4505 .
- the HNB 4505 then sends (at step 10 ) a RUA encapsulated RANAP RAB Assignment Response message to the HNB-GW 4515 , including the local IP address and port to be used for the Iu-UP over the Iuh interface.
- the HNB-GW 4515 replaces (at step 11 ) the IP transport information with local HNB-GW specific transport information and forwards the RANAP RAB Assignment Response message to the CN.
- the RANAP RAB Assignment Response message signals the completion of RAB assignment.
- FIG. 46 illustrates a mobile originated call over HNB procedure, in some embodiments.
- the UE 4610 in idle mode originates (at step 1 ) a call.
- the UE 4610 establishes (at step 2 ) a RRC connection with the HNB 4605 .
- the UE 4610 sends (at step 3 ) the CM Service Request to the HNB 4605 .
- the HNB 4605 sends (at step 4 ) a RUA encapsulated RANAP Initial UE Message towards the HNB-GW 4615 .
- this RUA message can be the RUA Connect message thus indicating to the HNB-GW the initial message for that particular UE signaling.
- the HNB-GW 4615 establishes (at steps 5 a - b ) an SCCP connection to the MSC 4620 and forwards the RANAP Initial UE Message to the MSC 4620 over the corresponding SCCP connection.
- the MSC 4620 authenticates (at step 6 ) the HNB 4605 using standard UTRAN authentication procedures.
- the MSC 4620 also initiates the Security Mode Control procedure described in previous sections.
- the UE 4610 sends (at step 7 ) the Setup message to the HNB 4605 providing details on the call to the MSC 4620 and its bearer capability and supported codecs.
- the HNB 4605 forwards (at step 8 ) this Setup message within the RUA encapsulated RANAP Direct Transfer message to the HNB-GW 4615 .
- the HNB-GW 4615 relays (at step 9 ) the RANAP Direct Transfer (Setup) message to the MSC 4620 .
- the MSC 4620 indicates (at step 10 ) it has received the call setup and it will accept no additional call-establishment information using the Call Proceeding message to the HNB-GW 4615 .
- the HNB-GW 4615 forwards (at step 11 ) the RUA encapsulated RANAP Direct Transfer (Call Proceeding) message to the HNB 4605 .
- the HNB 4605 relays (at step 12 ) the Call Proceeding message to the UE 4610 over the air interface.
- An end to end bearer path is established (at step 13 ) between the MSC 4620 and UE 4610 using one of the procedures shown in previous sections.
- the MSC 4620 signals (at step 14 ) to the UE 4610 , with the Alerting message, that the B-Party is ringing.
- the message is transferred to the HNB-GW 4615 .
- the HNB-GW 4615 forwards (at step 15 ) the RUA encapsulated RANAP Direct Transfer (Alerting) message to the HNB 4605 .
- the HNB 4605 relays (at step 16 ) the Alerting message to the UE 4610 and if the UE 4610 has not connected the audio path to the user, it generates ring back to the calling party. Otherwise, the network-generated ring back will be returned to the calling party.
- the MSC 4620 signals (at step 17 ) that the called party has answered, via the Connect message. The message is transferred to the HNB-GW 4615 .
- HNB-GW 4615 forwards (at step 18 ) the RUA encapsulated RANAP Direct Transfer (Connect) message to the HNB 4605 .
- the HNB 4605 relays (at step 19 ) the Connect message to the UE 4610 and the UE 4610 connects the user to the audio path. If the UE 4610 is generating ring back, it stops and connects the user to the audio path.
- the UE 4610 sends (at step 20 ) the Connect Ack in response, and the two parties are connected for the voice call.
- the HNB 4605 forwards (at step 21 ) this Connect Ack message within the RUA encapsulated RANAP Direct Transfer message to the HNB-GW 4615 .
- the HNB-GW 4615 forwards (at step 22 ) the Connect Ack message to the MSC 4620 .
- the end-to-end two way path is now in place and bi-directional voice traffic flows (at step 23 ) between the UE 4610 and MSC 4620 through the HNB 4605 and the HNB-GW 4615 .
- FIG. 47 illustrates a mobile terminated PSTN-to-mobile call procedure, in some embodiments.
- the MSC 4720 sends (at step 1 ) a RANAP Paging message to the HNB-GW 4715 identified through the last Location Update received by it and includes the TMSI if available.
- the IMSI of the mobile being paged is always included in the request.
- the HNB-GW 4715 identifies (at step 2 ) the UE registration context and the HNB 4705 using the IMSI provided by the MSC 4720 .
- the HNB-GW 4715 then forwards the RANAP Paging message to the corresponding HNB 4705 with the RANAP Paging message encapsulated by the RUA header.
- the HNB 4705 relays (at step 3 ) the Paging request to the UE 4710 .
- the HNB 4705 uses Paging Type I or II based on the RRC state of the UE 4710 as described in 3GPP technical specification TS 25.331 entitled “Radio Resource Control (RRC) protocol specification”, incorporated herein by reference, and referred to herein as TS 25.331.
- RRC Radio Resource Control
- the UE 4710 establishes (at step 4 ) an RRC connection with the HNB 4705 if one doesn't exist. This step is omitted if there is an already existing RRC connection (e.g., an RRC connection may have been established for PS domain).
- the UE 4710 processes (at step 5 ) the paging request and sends the Paging response to the HNB 4705 .
- the HNB 4705 sends (at step 6 ) a RUA encapsulated RANAP Initial UE Message carrying the paging response from the UE 4710 towards the HNB-GW 4715 .
- this RUA message can be the RUA Connect message thus indicating to the HNB-GW the initial message for that particular UE signaling.
- the HNB-GW 4715 establishes (at step 7 ) an SCCP connection to the MSC 4720 .
- the HNB-GW 4715 then forwards the paging response to the MSC 4720 using the RANAP Initial UE Message.
- the MSC 4720 authenticates (at step 8 ) the HNB 4705 using standard UTRAN authentication procedures.
- the MSC 4720 also initiates the Security Mode Control procedures.
- the MSC 4720 initiates (at step 9 ) call setup using the Setup message sent to the HNB 4705 via the HNB-GW 4710 .
- the HNB-GW 4710 forwards (at step 10 ) the RUA encapsulated RANAP Direct Transfer (Setup) message to the HNB 4705 .
- the HNB 4705 relays (at step 11 ) the Setup message to the UE 4710 .
- the UE 4710 responds (at step 12 ) with Call Confirmed after checking it's compatibility with the bearer service requested in the Setup and modifying the bearer service as needed. If the Setup included the signal information element, the UE 4710 alerts the user using the indicated signal, otherwise the UE 4710 alerts the user after the successful configuration of the user plane.
- the HNB 4705 relays (at step 13 ) the Call Confirmed to the HNB-GW 4715 using the RUA encapsulated RANAP Direct Transfer.
- the HNB-GW 4715 forwards (at step 14 ) the Call Confirmed message to the MSC 4720 using RANAP Direct Transfer message.
- An end to end bearer path is established (at step 15 ) between the MSC 4720 and UE 4710 using one of the procedures shown in previous sections.
- the UE 4710 signals (at step 16 ) that it is alerting the user, via the Alerting message to the HNB 4705 .
- the HNB 4705 relays (at step 17 ) the Alerting message to the HNB-GW 4715 using the RUA encapsulated RANAP Direct Transfer message.
- the HNB-GW 4715 forwards (at step 18 ) the Alerting message to the MSC 4720 .
- the UE 4710 signals (at step 19 ) that the called party has answered, via the Connect message.
- the HNB 4705 relays (at step 20 ) the Connect message to the HNB-GW 4715 using the RUA encapsulated RANAP Direct Transfer message.
- the HNB-GW 4715 forwards (at step 21 ) the Connect message to the MSC 4720 .
- the MSC 4720 acknowledges (at step 22 ) via the Connect Ack message to the HNB-GW 4715 .
- the HNB-GW 4715 forwards (at step 23 ) the RUA encapsulated RANAP Direct Transfer (Connect Ack) message to the HNB 4705 .
- the HNB 4705 relays (at step 24 ) the Connect Ack to the UE 4710 .
- the two parties on the call are connected on the audio path.
- the end-to-end two way path is now in place and bi-directional voice traffic flows (at step 25 ) between the UE 4710 and MSC 4720 through the HNB 4705 and the HNB-GW 4715 .
- FIG. 48 illustrates a call release by an HNB subscriber procedure, in some embodiments.
- the HNB subscriber requests (at step 1 ) call release (e.g., by pressing the END button).
- the UE 4810 sends (at step 2 ) the Disconnect NAS message to the HNB 4805 .
- the HNB 4805 relays (at step 3 ) the Disconnect message to the HNB-GW 4815 using the RUA encapsulated RANAP Direct Transfer message.
- the HNB-GW 4815 relays (at step 4 ) the Disconnect message to the MSC 4820 via RANAP Direct Transfer message.
- the MSC 4820 sends (at step 5 ) a Release to the HNB-GW 4820 using a RANAP Direct Transfer message.
- the HNB-GW 4815 forwards (at step 6 ) the RUA encapsulated RANAP Direct Transfer (Release) message to the HNB 4805 .
- the HNB 4805 sends (at step 7 ) the Release message to the UE 4810 over the air interface.
- the UE 4810 confirms (at step 8 ) the Release via the Release Complete message to the HNB 4805 .
- the HNB 4805 relays (at step 9 ) the Release Complete message to the HNB-GW 4815 using the RUA encapsulated RANAP Direct Transfer message.
- the HNB-GW 4815 forwards (at step 10 ) the message to the MSC 4820 using a RANAP Direct Transfer message. At this point, the MSC 4820 considers the connection released.
- the MSC 4820 sends (at step 11 ) an Iu Release Command to the HNB-GW 4815 indicating a request to release the call resources.
- the SCCP Connection Identifier is used to determine the corresponding call.
- the HNB-GW 4815 forwards (at step 12 ) the RUA encapsulated RANAP Iu Release Command message to the HNB 4805 .
- the HNB 4805 in turn releases any radio resource associated for the specific call.
- the RRC connection may not be released by the HNB 4805 , and only the corresponding CS radio bearers are released.
- the HNB 4805 acknowledges (at step 14 ) the radio resource to the HNB-GW 4815 using the RUA encapsulated RANAP Iu Release Complete message.
- this RUA message can be the RUA Disconnect message thus indicating to the HNB-GW the final message for that particular UE signaling.
- the HNB-GW 4815 releases (at step 15 ) any local resources (such as ATM transport or IP transport resources).
- the HNB-GW 4815 then forwards (at step 16 ) the resource release to the MSC using the Iu Release Complete message to the MSC.
- the SCCP connection associated with the call between the HNB-GW and the MSC is released as well.
- the HNB solution supports additional calling scenarios.
- the HNB solution supports calling line identification presentation (CLIP), calling line identification restriction (CLIR), connected line identification presentation (CoLP), connected line identification restriction (CoLR), call forwarding unconditional, call forwarding busy, call forwarding no reply, call forwarding not reachable, call waiting (CW), call hold (CH), multi-party (MPTY), closed user group (CUG), advice of charge (AoC), user user signaling (UUS), call barring (CB), explicit call transfer (ECT), name identification, and completion of calls to busy subscriber (CCBS).
- supplementary services involve procedures that operate end-to-end between the UE and the MSC. Beyond the basic DTAP messages already described for mobile originated and mobile terminated calls, the following DTAP messages are used for these additional supplementary service purposes: HOLD, HOLD-ACKNOWLEDGE, HOLD-REJECT, RETRIEVE, RETRIEVE-ACKNOWLEDGE, RETRIEVE-REJECT, FACILITY, USER-INFORMATION, CONGESTION-CONTROL, CM-SERVICE-PROMPT, START-CC, CC-ESTABLISHMENT, CC-ESTABLISHMENT-CONFIRMED, and RECALL.
- FIG. 49 illustrates an example relay of DTAP supplementary service messages, in some embodiments.
- MM connection established (at step 1 ) between the UE 4910 and the MSC 4920 for an ongoing call.
- the user requests (at step 2 ) a particular supplementary service operation (e.g., to put the call on hold).
- the UE 4910 sends (at step 3 ) the HOLD message to the HNB 4905 over the air which in turn forwards the message to HNB-GW 4915 , embedded in a RUA encapsulated RANAP Direct Transfer message.
- the HNB-GW 4915 relays the DTAP HOLD message to the MSC 4920 over the Iu-interface.
- the DTAP HOLD-ACK message is sent (at step 4 ) from MSC 4920 to UE 4910 in an analogous manner.
- the user requests (at step 5 ) another supplementary service operation (e.g., to initiate a Multi-Party call).
- the UE 4910 sends (at step 6 ) the FACILITY message to the HNB 4905 over the air interface which in turn forwards the message to the HNB-GW 4915 .
- the HNB-GW 4915 relays the DTAP FACILITY message to the MSC 4920 over the Iu-interface.
- the DTAP FACILITY message containing the response is sent (at step 7 ) from the MSC 4920 to the UE 4910 in an analogous manner.
- a single SCTP connection to the HNB-GW per HNB is established for the transport of signaling messages from that HNB.
- This SCTP connection is used to transport CS and PS related signaling and SMS messages for all the UEs from the HNB.
- the UE For UE initiated PS related signaling, the UE sends a PS signaling message to the CN, via the HNB-GW which forwards it to the CN over the Iu-PS interface as per standard UMTS (e.g., the signaling message may include GMM attach or SM PDP context activation message).
- the HNB-GW encapsulates the received signaling message within a RANAP Direct Transfer message that is forwarded to the SGSN over the Iu-PS interface.
- FIG. 50 illustrates an uplink control plane data transport procedure, in some embodiments.
- the UE 5010 is ready to send an uplink signaling message for PS services to the CN (SGSN) 5020 .
- the UE 5010 initiates (at step 1 ) a RRC Connection establishment procedure as per standard 3GPP procedure. Upon successful RRC Connection establishment, the UE 5010 forwards (at step 2 ) a Service Request message to the SGSN 5020 via the HNB 5005 indicating a PS Signaling message. The HNB 5005 sends (at step 3 ) the Service Request within the RUA encapsulated RANAP Initial UE message to the HNB-GW 5015 .
- the RUA encapsulated RANAP Initial UE message sent at step 3 is an INITIAL DIRECT TRANSFER message of the HNB system.
- the INITIAL DIRECT TRANSFER is used to transfer the RANAP “Initial UE Message” that is encapsulated in the INITIAL DIRECT TRANSFER from the HNB to an indicated core network domain.
- the INITIAL DIRECT TRANSFER message explicitly indicates the start of a communication session and the message contains parameters used to route the establishment of a signaling connection from the HNB-GW to a CN node within a CN domain, such as the SGSN, when no signaling connection exists.
- the HNB-GW is explicitly notified of impending signaling connection without having to process the contents of the message.
- this RUA message can be the RUA Connect message thus indicating to the HNB-GW the initial message for that particular UE signaling.
- the HNB-GW 5015 forwards (at step 4 ) the Service Request to the CN (specifically the SGSN) 5020 encapsulated within the Initial Iu message.
- the CN (SGSN) 5020 may initiate (at step 5 ) a security function.
- the UE 5010 sends (at step 6 ) the PS signaling message to the HNB 5005 using RRC Uplink Direct Transfer service.
- the HNB 5005 forwards (at step 7 ) the PS signaling message to the HNB-GW 5015 using a RUA encapsulated RANAP Direct Transfer message.
- the HNB-GW 5015 forwards (at step 8 ) the PS signaling message to the CN (SGSN) 5020 using RANAP Direct Transfer message.
- the Core Network sends a PS signaling message to the HNB-GW via the Iu-PS interface as per standard UMTS (e.g., the signaling message may include GMM attach accept or SM PDP context activation accept message).
- the HNB-GW encapsulates the RANAP received signaling message within the RUA header and forwards it to the HNB via the existing SCTP signaling connection.
- FIG. 51 illustrates a downlink control plane data transport procedure, in some embodiments.
- the CN (SGSN) 5120 is ready to send a downlink signaling message for PS services to the UE 5110 .
- the signaling procedure is network initiated and if the UE 5110 is in PMM-IDLE state, the SGSN 5120 will first page the UE 5110 . If the UE 5110 is in PMM-CONNECTED state, the SGSN 5120 will send the downlink PS signaling message using RANAP Direct Transfer procedure starting with step 9 .
- the CN (SGSN) 5120 sends (at step 1 ) the RANAP Paging request to the UE 5110 via the HNB-GW 5115 to locate the user.
- the paging request indicates paging for PS Domain.
- the HNB-GW 5115 identifies (at step 2 ) the target HNB 5105 and forwards the request using the RUA encapsulated RANAP Paging message to the HNB 5105 .
- the HNB 5105 forwards (at step 3 ) the PS page to the UE 5110 as per standard 3GPP procedure.
- the RRC connection does not exist for that UE 5110 , it is established (at step 4 ) as per standard 3GPP procedures.
- the UE 5110 responds (at step 5 ) to the SGSN 5120 via the HNB 5105 with a Service Request message indicating PS paging response.
- the Service Request message is encapsulated within the RRC INITIAL DIRECT TRANSFER message.
- the HNB 5105 forwards (at step 6 ) the paging response via a RUA encapsulated RANAP Initial UE message to the HNB-GW 5115 .
- this RUA message can be the RUA Connect message, thus indicating to the HNB-GW the initial message for that particular UE signaling.
- the HNB-GW 5115 establishes SCCP connection towards the CN for the specified domain and forwards (at step 7 ) the Service Request message to the SGSN 5120 encapsulated in the RANAP Initial UE Message.
- the CN (SGSN) 5120 initiates (at step 8 ) Security Function.
- the CN (SGSN) 5120 forwards (at step 9 ) the PS signaling message to the HNB-GW 5115 using RANAP Direct Transfer procedure.
- the HNB-GW 5115 forwards (at step 10 ) the PS signaling message to the HNB 5105 via RUA encapsulated RANAP Direct Transfer message.
- the HNB 5105 sends (at step 11 ) the signaling message to the UE 5110 using RRC Downlink Direct Transfer service.
- the HNB system provides support for both circuit mode (CS mode) and packet mode (PS mode) SMS services.
- CS mode circuit mode
- PS mode packet mode
- UEs may be able to send and receive short messages using either the MM sub-layer or the GMM sub-layer.
- UEs using the PS mode of operation send and receive short messages using only GMM sub-layer. Inter-working with HNB related to SMS services is described in the following sections.
- FIG. 52 illustrates the HNB protocol architecture related to CS and PS domain SMS support in accordance with some embodiments.
- This protocol architecture builds on the circuit and packet services signaling architecture. This figure includes (1) UE 5210 , (2) HNB-GW 5215 , (3) CN/MSC 5220 , (4) SMS layers 5225 , (5) MM layer 5235 , (6) SM-CP protocol 5240 ; and (7) HNB 5245 .
- the HNB SMS support is based on the same mechanism that is utilized for CS/PS mobility management and call control.
- the SMS layers (including the supporting CM sub-layer functions) utilize the services of the MM layer 5235 (CS domain) and GMM (PS domain) to transfer SMS messages per standard circuit/packet domain implementation.
- the SM-CP protocol 5240 is effectively tunneled between the UE 5210 and the MSC 5220 using the message relay functions in the RUA encapsulated RANAP messages.
- SMS uses the SCTP signaling connection between the HNB 5245 and the HNB-GW 5215 , providing reliable SMS delivery over the Iuh interface.
- FIG. 53 illustrates a CS mode mobile-originated SMS over HNB scenario, in some embodiments.
- This figure includes (1) HNB 5305 , (2) UE 5310 , (3) HNB-GW 5315 , (4) CN (MSC) 5320 , and (5) SMS interworking MSC (IWMSC) 5325 .
- the user enters (at step 1 ) a message and invokes the mobile-originated SMS function on the UE 5310 in idle mode.
- Steps 2 - 6 are the same as steps 2 - 7 in FIG. 46 .
- the UE 5310 sends (at step 7 ) the SMS message encapsulated in a CP-DATA message to the HNB 5305 over the air interface.
- the HNB 5305 forwards (at step 8 ) this CP-DATA message within the RUA encapsulated RANAP Direct Transfer message to the HNB-GW 5315 .
- the HNB-GW 5315 forwards (at step 9 ) the CP-DATA message to the MSC 5320 using RANAP Direct Transfer message.
- the MSC 5320 forwards (at step 10 ) the message to the SMSC (not shown) via the SMS interworking MSC (IWMSC) 5325 using the MAP-MO-FORWARD-SM Invoke message.
- the MSC 5320 sends (at step 11 ) CP-DATA-ACK to acknowledge the receipt of the CP-DATA message.
- the SM-CP is designed in a way that every CP-DATA block is acknowledged on each point-to-point connection between the UE and SMSC (SM Service Center) to ensure that the under-laying transport layer (in this case RANAP) works error free since there is no explicit acknowledgement to a RANAP Direct Transfer message.
- the HNB-GW 5315 relays (at step 12 ) the RUA encapsulated RANAP Direct Transfer (CP-DATA-ACK) message to the HNB 5305 .
- the HNB 5305 forwards (at step 13 ) the CP-DATA-ACK to the UE 5310 over the air interface.
- the SMSC sends (at step 14 ) an SMS message in response to the IWMSC 5325 and the IWMSC 5325 sends the response to the MSC 5320 in the MAP-MO-FORWARD-SM Return Result message.
- the MSC 5320 relays (at step 15 ) the response to the HNB-GW 5315 in the CP-DATA message.
- the HNB-GW 5315 relays (at step 16 ) the RUA encapsulated RANAP Direct Transfer (CP-DATA) message to the HNB 5305 .
- the HNB 5305 forwards (at step 17 ) the response to the UE 5310 over the air interface using the existing RRC connections.
- the UE 5310 acknowledges (at step 18 ) the receipt of CP-DATA to the HNB 5305 .
- the HNB 5305 forwards (at step 19 ) this CP-DATA-ACK message within the RUA encapsulated RANAP Direct Transfer message to the HNB-GW 5315 .
- the HNB-GW 5315 forwards (at step 20 ) the acknowledgement to the MSC 5320 using the RANAP Direct Transfer message.
- the MSC 5320 sends (at step 21 ) an Iu Release message to the HNB-GW 5315 indicating a request to release the session resources.
- the SCCP Connection Identifier is used to determine the corresponding session.
- the HNB-GW 5315 relays (at step 22 ) the RUA encapsulated RANAP Iu Release message to the HNB 5305 .
- the HNB 5305 releases (at step 23 ) corresponding radio resources towards the UE 5310 .
- the HNB 5305 acknowledges (at step 24 ) the radio resource to the HNB-GW 5315 using the RUA encapsulated RANAP Iu Release Complete message.
- this RUA message can be the RUA Disconnect message thus indicating to the HNB-GW the final message for that particular UE signaling.
- the HNB-GW 5315 then forwards (at step 25 ) the resource release to the MSC 5320 using the Iu Release Complete message.
- the SCCP connection associated with the call between the HNB-GW 5315 and the MSC 5320 is released as well.
- Transparent support for emergency services is a key regulatory requirement.
- support for emergency services in the HNB system is complicated by virtue of the fact that the HNBs are deployed on an ad-hoc basis by many users. Additionally, these HNBs may be relocated at any time by the user without notice to the service provider. Therefore, some embodiments provide methods and systems for transparently supporting emergency services within the HNB system by dynamically determining a location for each of the HNBs. In this manner, some embodiments provide emergency responders the ability to locate a position of an emergency caller when the caller places the emergency request through a HNB service area. This is referred to below as Service Area Based Routing. Some embodiments provide methods and systems for transparently supporting emergency services within the HNB system based on location information (e.g. using information derived from the UE or through UE assisted location determination). This is referred to below as Location Based Routing.
- the location information is routed through the core network to the appropriate responding node closest to the location of the caller. This is done by transparently integrating the HNB system information with the existing core network components (e.g., Public Safety Answering Point (PSAP)) that facilitate emergency services.
- PSAP Public Safety Answering Point
- HNB emergency services support capabilities include support for flexible SAI assignment and HNB-GW assignment functionality. This allows the HNB to be assigned to an HNB-GW that is, in turn, connected to an MSC that can route calls to the PSAP in the HNB service area. This also allows the service provider to define HNB service areas that align with macro network service areas, to leverage the existing service area based PSAP routing approach.
- HNB emergency services support capabilities also include support for the retrieval and storage of HNB location information from an external database.
- the HNB emergency services support capabilities also include support for the RANAP Location Report procedure, by which the HNB-GW (or HNB) returns the HNB/UE location information to the MSC during emergency call processing. Additional emergency services support include support emergency services for any UE with proper SIM card regardless of the access control policy of the HNB.
- HNB-GW One of the functions of the HNB-GW is to assign a HNB service area for calls made by the UE using the HNB.
- the HNB during registration, provides information on macro coverage (such as macro LAI, macro 3 G cell-id, etc.) which can be used to derive a HNB Service Area Identification (SAI).
- SAI HNB Service Area Identification
- This HNB SAI can be used to support the ability to route emergency calls to the correct PSAP (i.e., based on SAI).
- SAI service area
- some other embodiments utilize location based routing.
- the PSAP routing decision is based on either the Service Area Code (SAC) contained within the SAI or the LAI contained within the SAI or the entire SAI (i.e., LAI+SAC). Since the service area of a HNB spans only several meters, the location information meets regulatory requirements and provides an accurate location of the user.
- SAC Service Area Code
- FIG. 54 illustrates an emergency call routing over HNB using a service area procedure in accordance with some embodiments.
- the UE originates the emergency call after successfully camping (and registering with the HNB-GW by the HNB) prior to the origination of the emergency call.
- This figure includes HNB 5405 , UE 5410 , HNB-GW 5415 , MSC 5420 , and PSAP 5425 .
- the user originates (at step 1 ) an emergency call using the UE 5410 camped on the HNB 5405 .
- the UE 5410 establishes (at step 2 ) an RRC connection with the HNB 5405 with the establishment cause of emergency call.
- the UE 5410 sends (at step 3 ) the CM Service Request (with CM Service Type set to “Emergency Call Establishment”) to the HNB 5405 .
- the establishment cause notifies the HNB 5405 that the call being placed by the UE 5410 is to request emergency services.
- the HNB 5405 forwards (at step 4 ) the CM Service Request within a RUA encapsulated RANAP Initial UE message.
- this RUA message can be the RUA Connect message thus indicating to the HNB-GW the initial message for that particular UE signaling.
- the RUA header also carries additional information such as the cause indicating an emergency call.
- the cause field in the RUA header allows the HNB-GW 5415 to allocate appropriate resources for emergency call setup without needing to decode the encapsulated RANAP message.
- the HNB-GW 5415 establishes (at step 5 ) an SCCP connection to the MSC 5420 and forwards the CM Service Request to the MSC 5420 using the RANAP Initial UE Message.
- This initial message contains information about the location area (LAI) and service area (SAI) assigned to the specific HNB over which the emergency call was initiated.
- LAI and SAI information contained in the RANAP messages is provided to the HNB by the HNB-GW via HNBAP registration procedures.
- the LAI and SAC information contained in the RANAP message is provided to the HNB by the HNB management system during the initial provisioning of the HNB.
- the MSC 5420 , HNB-GW 5415 , HNB 5405 and UE 5410 continue (at step 6 ) call establishment signaling.
- the MSC 5420 determines the serving PSAP based on the service area of the calling UE and routes the emergency call to the appropriate PSAP. Additional signal messages are exchanged (at step 8 ) between the UE 5410 and the PSAP 5425 and the emergency call is established between the UE 5410 and the appropriate serving PSAP 5425 .
- a UE is required to register with the HNB system before the UE is provided access to services of the HNB system.
- the UE is not authorized for HNB service over a particular HNB, the UE is handed over to the licensed wireless radio access network of a cellular provider or is simply prevented from accessing HNB services at the particular HNB through appropriate rejection mechanisms.
- the HNB system is required to provide emergency services to the UE irrespective of whether the UE is permitted access to services of the HNB system when the UE operates within a service region of the HNB system. Accordingly, some embodiments provide methods and systems to provide emergency services to unauthorized UEs requesting emergency services through the HNB system.
- FIG. 55 illustrates an emergency call routing over HNB of an unauthorized UE using service area procedure, in some embodiments. This figure includes HNB 5505 ; UE 5510 ; HNB-GW 5515 ; MSC 5520 ; and PSAP 5525 .
- the user originates (at step 1 ) an emergency call using the UE 5510 camped on the HNB 5505 for limited service only (e.g., due to rejection from the HNB 5505 based on access control policy).
- the UE 5510 establishes (at step 2 ) an RRC connection with the HNB 5505 indicating an establishment cause of emergency call.
- the UE 5510 sends (at step 3 ) the CM Service Request (with CM Service Type set to “Emergency Call Establishment”) to the HNB 5505 .
- the HNB 5505 retrieves (at steps 4 a - b ) the permanent identity of the UE 5510 using MM procedures.
- the HNB 5505 performs local access control and consults the local policy for emergency calls before allowing an incoming request for emergency call from the unauthorized UE.
- the HNB may be configured with policy to allow emergency calls without access control check and, as a result, the HNB may not retrieve the permanent identity of the UE 5510 using MM procedures as shown in steps 4 a - b.
- the HNB 5505 attempts (at step 5 ) a UE registration towards the HNB-GW 5515 .
- the HNB 5505 includes the necessary attributes as specified in the subsection above entitled UE Registration. Additionally, the HNB 5505 signals an emergency call registration via the Registration Indicator IE.
- the purpose of the emergency indicator is to assist the network in performing network based access control for unauthorized UEs.
- the Registration Indicator IE notifies the HNB-GW 5515 that the UE 5510 requires limited service (i.e., emergency service).
- the HNB-GW 5515 checks (at step 6 ) to see if an unauthorized UE is allowed HNB access for emergency calls using the specific HNB 5505 . When the HNB-GW 5515 accepts the registration attempt, it responds with a HNBAP REGISTER ACCEPT including attributes such as the UE Context Id, etc.
- the HNB 5505 forwards (at step 7 ) the CM Service Request within RUA encapsulated RANAP Initial UE message.
- this RUA message can be the RUA Connect message thus indicating to the HNB-GW the initial message for that particular UE signaling.
- the RUA header also carries additional information such as the cause indicating an emergency call, which allows the HNB-GW 5515 to allocate appropriate resources for emergency call setup without needing to decode the encapsulated RANAP message.
- the HNB-GW 5515 establishes (at step 8 ) an SCCP connection to the MSC 5520 and forwards the CM Service Request to the MSC 5520 using the RANAP Initial UE Message.
- This initial message contains information about the service area identity (SAI) assigned to the specific HNB 5505 over which the emergency call was initiated.
- SAI service area identity
- the MSC 5520 , HNB-GW 5515 , HNB 5505 and UE 5510 continue (at step 9 ) call establishment signaling.
- the MSC 5520 determines (at step 10 ) the serving PSAP 5525 based on the service area of the calling UE and routes the emergency call to the appropriate PSAP. Additional signal messages are exchanged (at step 11 ) between the UE 5510 and the PSAP 5525 and the emergency call is established between the UE 5510 and the appropriate serving PSAP 5525 .
- the HNB Upon completion of the emergency call from the unauthorized UE, the HNB deregisters the UE from the HNB-GW.
- the HNB or the HNB-GW may choose to implement timer based deregistration upon emergency call termination, to allow call-back to the unauthorized UE for emergency purposes.
- the HNB service area is not split into multiple service areas. Accordingly, some embodiments provide an alternative method for performing emergency calling. Routing by position is defined in the 3GPP technical specification TS 23.271 (v6.10.0) entitled “Location Services (LCS); Functional description; Stage 2” which is incorporated herein by reference. Routing by position is also known as “location based routing” or “X/Y routing.”
- the MSC does an immediate position request to HNB-GW.
- the MSC selects the PSAP based on the received location information (such as latitude/longitude).
- Location based routing is not HNB-specific. Location based routing is also an issue in UMTS where macro network service areas can span multiple PSAP serving areas. Since latitude/longitude can also be available in the HNB-GW (e.g., retrieved from the subscriber database during HNB registration), little delay is added by doing the position request and the position returned is as accurate as is available.
- Using routing by location eliminates the need to split HNB coverage areas into multiple HNB service areas based on PSAP routing requirements.
- FIG. 56 illustrates a location based emergency call routing over HNB procedure, in some embodiments. This figure includes HNB 5605 , UE 5610 , HNB-GW 5615 , MSC 5620 , and PSAP 5625 .
- steps 1 - 6 are the same as the service area based routing scenario as described with reference to FIG. 54 above.
- the MSC 5620 determines (at step 7 ) that the serving area of the UE 5610 serves an area that contains portions of multiple emergency services zones. Therefore, the MSC 5620 delays call setup and initiates procedures to obtain the UE's location for routing the emergency call to the PSAP 5625 .
- the MSC 5620 issues a location request of the UE 5610 using the RANAP Location Reporting Control message to the HNB-GW 5615 . This message includes the type of location information requested, the UE's location capabilities and a QoS with low delay and low horizontal accuracy.
- the HNB-GW 5615 relays (at step 8 ) the RANAP Location Reporting Control message to the HNB 5605 encapsulated in the RUA header.
- the HNB 5605 sends (at step 9 ) back the UE location with RUA encapsulated RANAP Location Report message to the HNB-GW 5615 .
- the HNB-GW 5615 forwards (at step 10 ) the RANAP Location Report message to the MSC 5620 .
- the HNB-GW 5615 retrieves the UE Location information from the stored HNB information (using either information provided by the HNB 5605 during registration or retrieved from subscriber database) and responds with the latitude and longitude in the RANAP Location Report message back to the MSC 5620 .
- the MSC 5620 determines (at step 11 ) the serving PSAP (here, the PSAP 5625 ) based on the location information of the UE 5610 and routes the emergency call to the appropriate PSAP.
- additional network elements such as GMLC, S/R may be involved in mapping the location information and routing the emergency call to the appropriate PSAP.
- Additional signal messages are exchanged (at step 12 ) between the UE 5610 and the PSAP 5625 and the emergency call is established between the UE 5610 and the PSAP 5625 .
- LAWFULLY AUTHORIZED ELECTRONIC SURVEILLANCE LAES
- the J-STD-025 standard defines the means to access communications as an intercept access service for the purposes of lawfully authorized electronic surveillance (LAES).
- LAES lawfully authorized electronic surveillance
- the services fall into three categories: (1) non-call associated services to provide information about intercept subjects that is not necessarily related to a call, (2) call associated services to provide call-identifying information about calls involving the intercept subjects, and (3) content surveillance services to provide access to an intercept subject's communications. Since LAES is provided by core network functions, neither the UTRAN nor the HNB are impacted; therefore, there are no HNB-specific LAES requirements on the HNB-GW and HNB.
- FIG. 57 illustrates HNB security mechanisms, in some embodiments. This figure includes HNB 5705 , UE 5710 , HNB-GW 5715 , MSC/VLR or SGSN 5720 , application server 5725 , and security gateway (SeGW) 5730 .
- HNB 5705 UE 5710
- HNB-GW 5715 MSC/VLR or SGSN 5720
- application server 5725 application server
- SeGW security gateway
- the security mechanisms are as follows: (1) the security mechanisms over the Iuh interface protect signaling, voice and data traffic flows between the HNB 5705 and the HNB-GW-SeGW 5715 - 5730 from unauthorized use, data manipulation, and eavesdropping (i.e., authentication, encryption, and data integrity mechanisms are supported), (2) authentication of the subscriber by the core network occurs between the MSC/VLR or SGSN 5720 and the UE 5710 and is transparent to the HNB-GW 5715 , (3) the air interface between the UE 5710 and the HNB 5705 is protected via encryption (optional) and integrity checks, and (4) additional application level security mechanisms may be employed in the PS domain to secure the end-to-end communication between the UE 5710 and the application server 5725 . For example, the UE 5710 runs the HTTP protocol over an SSL session for secure web access.
- All signaling traffic and user-plane traffic sent between HNB and HNB-GW over the Iuh interface is protected by an IPSec tunnel between the HNB and HNB-GW-SEGW, that provides mutual authentication (for example, using (U)SIM credentials), encryption, and data integrity using similar mechanisms as specified in the 3GPP technical specification TS 33.234 entitled “3 G security; Wireless Local Area Network (WLAN) interworking security” which is incorporated herein by reference.
- WLAN Wireless Local Area Network
- FIG. 58 illustrates message flow for security mode control over HNB, in some embodiments.
- This figure includes HNB 5805 , UE 5810 , HNB-GW 5815 , and VLR/SGSN (CN) 5820 .
- the CN 5820 and the UE 5810 perform (at step 1 ) mutual authentication using AKA procedures.
- the CN authentication is initiated by the CN 5820 as a result of the CN processing an initial L3 message from the UE 5810 .
- the CN 5820 Upon successful authentication, the CN 5820 sends (at step 2 ) RANAP Security Mode Command message to the HNB-GW 5815 .
- This message contains the encryption and the integrity keys, and also the encryption and integrity algorithms to be used for ciphering.
- the HNB-GW 5815 forwards (at step 3 ) the RUA encapsulated RANAP Security Mode Command message to the HNB 5805 .
- the HNB 5805 stores (at step 4 ) the ciphering keys and algorithm for the UE 5810 . In some embodiments, the HNB 5805 should ensure that these keys are not accessible to 3 rd party applications or any other module on the HNB 5805 . Additionally, these keys should not be stored on any persistent storage.
- the HNB 5805 generates (at step 5 ) a random number (FRESH) and computes the downlink MAC using the Ik and integrity algorithms and sends the Security Mode command to the UE 5810 along with the computed MAC-I and the FRESH.
- the UE 5810 computes (at step 6 ) the MAC locally (XMAC-I) and verifies that the received downlink MAC-I is same. The downlink integrity check is started from this message onwards.
- the UE 5810 Upon successful verification of the MAC, the UE 5810 responds (at step 7 ) back with the Security Mode Complete command and also sends the MAC-I for the uplink.
- the HNB 5805 computes (at step 8 ) XMAC-I for the uplink message and verifies the received MAC-I is same as that of computed XMAC-I. The uplink integrity check is started from this message onwards.
- the HNB 5805 sends (at step 9 ) the RUA encapsulated RANAP Security Mode Complete message to the HNB-GW 5815 .
- the HNB-GW 5815 relays (at step 10 ) the Security Mode Complete command to the CN 5820 via corresponding RANAP message.
- the core network AKA based authentication provides mutual authentication between the user and the network.
- the AKA procedure is also used to generate the ciphering keys (encryption and integrity) which in turn provide confidentiality and integrity protection of signaling and user data.
- the basis of mutual authentication mechanism is the master key K (permanent secret with a length of 128 bits) that is shared between the USIM of the user and home network database.
- the ciphering keys Ck and Ik are derived from this master key K. This section describes the AKA procedure used for mutual authentication.
- FIG. 59 illustrates a CN AKA authentication over HNB procedure, in some embodiments.
- This figure includes HNB 5905 , UE 5910 , HNB-GW 5915 , VLR/SGSN (CN) 5920 , and Home Environment (HE)/HLR 5925 .
- HNB 5905 HNB 5905
- UE 5910 HNB-GW 5915
- CN VLR/SGSN
- HE Home Environment
- the UE 5905 when the UE 5905 camps on the HNB Access Point, it will initiate (at step 1 ) a Location Update Request towards the CN 5920 .
- the HNB-GW 5915 will forward (at step 2 ) the Location Update request in a RANAP message to the VLR/SGSN 5920 .
- the AuC contains the master keys of the UEs and based on the IMSI, the AuC will generate (at step 4 ) the authentication vectors for the UE 5910 .
- the vector list is sent back to the VLR/SGSN 5920 in the authentication data response MAP message.
- the VLR/SGSN 5920 selects (at step 5 ) one authentication vector from the list (only 1 vector is needed for each run of the authentication procedure).
- the VLR/SGSN 5920 sends (at step 6 ) user authentication request (AUTREQ) message to the HNB-GW 5915 .
- This message also contains two parameters RAND and AUTN (from the selected authentication vector).
- the HNB-GW 5915 relays (at step 7 ) the AUTREQ message to the HNB 5905 in a RUA encapsulated RANAP Direct Transfer message.
- the HNB 5905 forwards (at step 8 ) the AUTREQ to the UE 5910 over the air interface.
- the USIM on the UE 5910 contains (at step 9 ) the master key K and using it with the parameters RAND and AUTN as inputs, the USIM carries out computation resembling generation of authentication vectors in the AuC. From the generated output, the USIM verifies if the AUTN was generated by the right AuC. The USIM computation also generates (at step 10 ) a RES which is sent towards the CN 5920 in an authentication response message to the CN 5920 .
- the HNB 5905 forwards (at step 11 ) the Authentication Response to the HNB-GW 5915 in a RUA encapsulated RANAP Direct Transfer message.
- the HNB-GW 5915 will relay (at step 12 ) the response along with the RES parameter in a RANAP message to the CN 5920 .
- the VLR/SGSN 5920 verifies (at step 13 ) the UE response RES with the expected response XRES (which is part of authentication vector). If there is a match, authentication is successful.
- the CN 5920 may then initiate (at step 14 ) a Security Mode procedure to distribute the ciphering keys to the HNB-GW 5915 .
- HNB service access control is to provide operators with the tools to properly implement their HNB service plans based on real-time information from the subscriber and non real-time information provisioned within the operator's IT systems and service databases.
- service policies the operator can implement a range of creative services and controls to be applied on a per individual subscriber basis, which results in the acceptance or rejection of any discrete HNB session registration request.
- service policies are used to identify whether a subscriber's current request for access meets the conditions of the service plan to which they are subscribed.
- HNB SAC encompasses the discovery, registration and redirection functions as well as enhanced service access control functions, such as restricting HNB service access based on the reported neighboring macro network UTRAN/GERAN cell information.
- a local access control may be performed by the HNB for performance reasons (example: HNB may use local service access control for faster rejection of UEs which are not allowed access to either HNB services or not allowed access to HNB services via the specific HNB).
- the HNB-GW selection processes include HNB-GW selection and HNB service area selection.
- HNB-GW Selection serves the following functions: (1) it allows an HNB-GW functioning as a “provisioning HNB-GW” to direct a mobile station to its designated “default HNB-GW”, (2) it allows an HNB-GW functioning as a “default HNB-GW” to direct a mobile station to an appropriate “serving HNB-GW” (e.g., in case the HNB is outside its normal default HNB-GW coverage area), and (3) it allows the HNB-GW to determine if the UTRAN/GERAN coverage area is HNB-restricted and, if so, to deny service.
- HNB Service Area Selection serves the following functions: it allows an HNB-GW functioning as a “default or serving HNB-GW” to assign the HNB service area associated with the HNB registration (and all the UEs camped on that specific HNB). The service area can then be utilized for emergency call routing as described above in the subsection entitled Service Area Based Routing.
- New HNB connects to the HNB-GW; (2) the HNB connects to the HNB-GW network (redirected connection); (3) the HNB attempts to connect in a restricted UMTS coverage area; (4) Authorized UE roves into an authorized HNB for HNB service; and (5) Unauthorized UE roves into an authorized HNB for HNB service.
- FIG. 60 illustrates the SAC for a new HNB connecting to the HNB network, in some embodiments.
- This figure includes HNB 6005 , public DNS 6010 , SeGW # 1 (provisioning SeGW) 6015 , private DNS 6020 , (provisioning) HNB-GW # 1 6025 , and (default/serving) HNB-GW # 2 6030 .
- the HNB 6005 performs (at step 1 ) a DNS query (via the generic IP access network interface) to resolve the FQDN to an IP address. If the HNB 6005 has a provisioned IP address for the Provisioning SeGW 6015 , the DNS step is omitted.
- the DNS Server 6010 returns (at step 2 ) a response including the IP Address of the Provisioning SeGW 6015 .
- the HNB 6005 establishes (at step 3 ) a secure tunnel to the Provisioning SeGW 6015 using IKEv2 and EAP-AKA or EAP-SIM.
- the HNB 6005 If the HNB 6005 has a provisioned FQDN of the Provisioning HNB-GW 6025 , it performs (at step 4 ) a DNS query (via the secure tunnel) to resolve the FQDN to an IP address. If the HNB 6005 has a provisioned IP address for the Provisioning HNB-GW 6025 , the DNS step will be omitted.
- the DNS Server 6020 returns (at step 5 ) a response including the IP Address of the Provisioning HNB-GW 6025 .
- the HNB 6005 sets up (at step 6 ) a SCTP connection to a well-defined port on the Provisioning HNB-GW 6025 .
- the HNB 6005 queries (at step 7 ) the Provisioning HNB-GW 6025 for the Default/Serving HNB-GW 6030 , using HNBAP DISCOVERY REQUEST.
- the provisioning HNB-GW 6025 optionally performs (at step 8 ) an access control for the HNB 6005 using information such as HNB Identity and reported macro coverage information.
- the provisioning HNB-GW 6025 determines (at step 9 ) the default/serving HNB-GW (here, HNB-GW # 2 6030 ) using the HNB-GW selection function. This is done so the HNB is directed to a “local” Default HNB-GW in the HPLMN to optimize network performance.
- the Provisioning HNB-GW 6025 returns (at step 10 ) the default/serving HNB-GW 6030 information in the HNBAP DISCOVERY ACCEPT message.
- the DISCOVERY ACCEPT message also indicates whether the HNB-GW and SEGW address provided shall or shall not be stored by the HNB.
- the HNB 6005 releases (at step 11 ) the SCTP connection and IPSec tunnel and proceeds to register on HNB-GW # 2 6030 .
- the HNB 6005 performs (at step 12 ) a private DNS query using the assigned Default HNB-GW FQDN.
- the private DNS server 6020 returns (at step 13 ) the IP address of HNB-GW # 2 6030 .
- the HNB 6005 establishes (at step 14 ) an SCTP connection to HNB-GW # 2 6030 .
- the HNB 6005 sends (at step 15 ) an HNBAP REGISTER REQUEST message to the default/serving HNB-GW 6030 .
- the default/serving HNB-GW 6030 performs (at step 16 ) an access control for the HNB 6005 for example, using information such as HNB Identity and reported macro coverage information.
- the default/serving HNB-GW 6030 determines (at step 17 ) that it is the correct serving HNB-GW for the mobile current location using the HNB-GW selection function. It also determines the HNB service area to associate with the HNB 6005 using the SAI selection functions. The default/serving HNB-GW 6030 returns a HNBAP REGISTER ACCEPT message to the HNB 6005 .
- the HNB Connects to the HNB-GW (Redirected Connection)
- FIG. 61 illustrates the SAC for an HNB getting redirected in HNB network, in some embodiments.
- This figure includes HNB 6105 , public DNS 6110 , SeGW (# 1 ) 6115 , private DNS 6120 , and HNB-GW (# 2 ) 6125 .
- the HNB-GW 6125 uses (at step 9 ) the HNB-GW selection function to determine that the HNB 6105 should be served by another HNB-GW.
- the HNB-GW 6125 sends (at step 10 ) the new serving SEGW and HNB-GW FQDNs to the HNB 6105 in the HNBAP REGISTER REDIRECT message.
- the HNB-GW sends the HNBAP REGISTER REJECT message, which allows the HNB to select a different HNB-GW (using pre-provisioned information from the HNB management system) for registration thus providing equivalent redirection functionality.
- the HNB 6105 releases (at step 11 ) the SCTP connection and IPSec tunnel and proceeds to register with the designated HNB-GW 6125 .
- FIG. 62 illustrates the SAC for an HNB registering in a restricted UMTS coverage area, in some embodiments.
- This figure includes HNB 6205 , public DNS 6210 , SeGW (# 1 ) 6215 , private DNS 6220 , and HNB-GW (# 2 ) 6225 .
- the HNB-GW 6225 uses (at step 9 ) the HNB-GW selection function to determine that the HNB 6205 is in an UMTS area that is HNB restricted (i.e., HNB access is not allowed in the area).
- the HNB-GW 6225 sends (at step 10 ) a HNBAP REGISTER REJECT message to the HNB 6205 , including a reject cause (for example, “Location not allowed”).
- the HNB 6205 releases (at step 11 ) the SCTP connection and IPSec tunnel and does not attempt to register again from the same macro coverage area until powered-off.
- An unauthorized UE upon camping on the HNB (via its internal cell selection mechanism), will send an initial NAS layer message (for example, the Location Update message) towards the CN via the HNB (the LU is triggered since the HNB broadcasts a distinct LAI than its neighboring macro cells and other neighboring HNBs).
- the HNB will intercept the Location Update message and attempt to register the UE with the HNB-GW as described below.
- FIG. 63 illustrates the SAC for an unauthorized UE accessing an authorized HNB, in some embodiments.
- the UE 6310 establishes (at step 1 a ) an RRC connection with the HNB 6305 on which it camps.
- the UE 6310 starts a Location Update procedure towards the CN (not shown).
- the HNB 6305 will intercept the Location Update request and attempts to register the UE 6310 with the associated Serving HNB-GW over the existing IPSEC tunnel.
- the HNB 6305 may request (at step 1 b ) the IMSI of the UE 6310 if the Location Update is done using the TMSI, since the initial registration for the UE 6310 must be done using the permanent identity (i.e., the IMSI of the UE 6310 ).
- the HNB 6305 optionally performs (at steps 1 c - d ) local access control for faster rejection of those UEs not authorized to access the particular HNB 6305 (the exact rejection mechanism is left as HNB implementation specific). As a result, if the HNB performs local access control, then unauthorized UEs may not be attempted to be registered with the HNB-GW 6315 and the following steps can be skipped.
- the HNB 6305 attempts to register (at step 2 ) the UE 6310 on the HNB-GW 6315 by transmitting the HNBAP REGISTER REQUEST.
- the HNB 6305 uses the same SCTP connection for the UE 6310 as that used for HNB registration to a destination SCTP port on the HNB-GW 6315 .
- the access control logic on the HNB-GW 6315 would also check (at step 3 ) to see if the UE 6310 is allowed HNB access using the specific HNB 6305 .
- the HNB-GW SAC logic indicates that the registering UE 6310 is not authorized to access HNB service over the specific HNB 6305 .
- the HNB-GW 6315 responds with a HNBAP REGISTER REJECT message to the HNB 6305 indicating the reject cause.
- the HNB 6305 in turn utilizes (at step 4 ) an implementation specific rejection mechanism to reject the UE 6310 .
- the HNB 6305 may send a Location Updating Reject to the UE 6310 with cause of “Location Area Not Allowed”. This will prevent the UE 6310 from attempting to camp on the specific HNB 6305 again.
- the use of “Location Area Not Allowed” is an example mechanism for rejection of an unauthorized UE. Other mechanisms may also be used and is left as HNB implementation specific.
- Access control i.e., only certain pre-authorized users are allowed to access particular 3 G HNB
- 3 G HNB is one of the key functional requirements for the deployments of 3 G HNB.
- the UE With Release 8, CSG-enabled UEs, the UE will only attempt to select CSG cells which are listed in the UE's CSG cell white-list. The UE will not use CSG cells for either idle mode cell reselection or active mode relocation into the CSG cell. Since pre-Release 8 UEs are also expected to be supported by the HNB Access Network, the HNB Access Network should mirror the same end-user experience for pre-Release 8 UEs as for CSG-enabled UEs.
- Pre-Release 8 UEs For pre-Release 8 UEs, it is not possible for the UE to autonomously recognize CSG cells and avoid using them. Pre-Release 8 UEs performs legacy cell reselection and relocation procedures whenever it detects a neighbor HNB cell. It is necessary for the 3 G HNB Access Network to either accept the UE or reject the UE using a legacy control procedure supported by the legacy UE. In some embodiments, the need to support active mode mobility from macro cell to 3 G HNB is for further study as are the access control policies for such a scenario.
- Access control by mobility management signaling, where the access control is performed when the UE re-selects a particular 3 G HNB cell. This approach does not allow the UE to camp normally without successful access control.
- Access control by redirection and handover where the access control is performed when the UE requests actual data transmission from a particular 3 G HNB. This approach allows the UE to camp normally on 3 G HNB without access control even if the UE is not authorized for that specific 3 G HNB.
- mobility pattern of a particular UE will appear as “3 G HNB->Macro->3 G HNB (either same or different 3 G HNB)” or “Macro->3 G HNB”.
- the signaling load on the core network will increase significantly due to the fact the location area updates from even unauthorized UEs must be relayed to the CN (assuming that the macro and 3 G HNB have different location areas).
- Access control using the mechanisms of redirection and handover results in increased setup times or increased signaling (due to additional handover signaling).
- the UE upon cell re-selection of a particular 3 G HNB would display HNB coverage indicator. In cases where the UE is unauthorized to access a particular 3 G HNB, this would result in the following severely degraded service impacts to the subscriber.
- the UE will likely select the macro cell for camping upon completion of that particular service (i.e., upon moving from connected to idle mode). This would also result in the UE performing an initial NAS message, such as a location area update message, via the macro network. Additionally, it is possible for the UE to again select the same 3 G HNB (from which it was redirected for data service) and trigger additional LU via that particular 3 G HNB. As a result of this ping-pong behavior between the macro and 3 G HNB for unauthorized UEs, significant signaling load would be generated towards the CN.
- Protocol stacks are implemented as software processes that are specified as a set of instructions recorded on a computer readable storage medium (also referred to as computer readable medium).
- a computer readable storage medium also referred to as computer readable medium.
- these instructions are executed by one or more computational element(s) (such as processors or other computational elements like ASICs and FPGAs), they cause the computational element(s) to perform the actions indicated in the instructions.
- Computer is meant in its broadest sense, and can include any electronic device with a processor (e.g., HNB and HNB-GW).
- Examples of computer readable media include, but are not limited to, CD-ROMs, flash drives, RAM chips, hard drives, EPROMs, etc.
- the computer readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.
- the term “software” is meant in its broadest sense. It can include firmware residing in read-only memory or applications stored in magnetic storage which can be read into memory for processing by a processor. Also, in some embodiments, multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions. In some embodiments, multiple software inventions can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software invention described here is within the scope of the invention. In some embodiments, the software programs when installed to operate on one or more computer systems define one or more specific machine implementations that execute and perform the operations of the software programs.
- FIG. 64 conceptually illustrates a computer system with which some embodiments of the invention are implemented.
- the computer system 6400 includes a bus 6405 , a processor 6410 , a system memory 6415 , a read-only memory 6420 , a permanent storage device 6425 , input devices 6430 , and output devices 6435 .
- the bus 6405 collectively represents all system, peripheral, and chipset buses that support communication among internal devices of the computer system 6400 .
- the bus 6405 communicatively connects the processor 6410 with the read-only memory 6420 , the system memory 6415 , and the permanent storage device 6425 .
- the processor 6410 retrieves instructions to execute and data to process in order to execute the processes of the invention.
- the processor comprises a Field Programmable Gate Array (FPGA), an ASIC, or various other electronic components for executing instructions.
- the read-only-memory (ROM) 6420 stores static data and instructions that are needed by the processor 6410 and other modules of the computer system.
- the permanent storage device 6425 is a read-and-write memory device. This device is a non-volatile memory unit that stores instruction and data even when the computer system 6400 is off.
- Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 6425 .
- Some embodiments use one or more removable storage devices (flash memory card or memory stick) as the permanent storage device.
- the system memory 6415 is a read-and-write memory device. However, unlike storage device 6425 , the system memory is a volatile read-and-write memory, such as a random access memory. The system memory stores some of the instructions and data that the processor needs at runtime.
- Instructions and/or data needed to perform processes of some embodiments are stored in the system memory 6415 , the permanent storage device 6425 , the read-only memory 6420 , or any combination of the three.
- the various memory units include instructions for processing multimedia items in accordance with some embodiments. From these various memory units, the processor 6410 retrieves instructions to execute and data to process in order to execute the processes of some embodiments.
- the bus 6405 also connects to the input and output devices 6430 and 6435 .
- the input devices enable the user to communicate information and select commands to the computer system.
- the input devices 6430 include alphanumeric keyboards and cursor-controllers.
- the output devices 6435 display images generated by the computer system.
- the output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD).
- bus 6405 also couples computer 6400 to a network 6465 through a network adapter (not shown). In this manner, the computer can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet) or a network of networks (such as the Internet).
- LAN local area network
- WAN wide area network
- Intranet such as the Internet
- any or all of the components of computer system 6400 may be used in conjunction with the invention.
- some or all components of the computer system described with regards to FIG. 64 comprise some embodiments of the UE, HNB, HNB-GW, and SGSN described above.
- any other system configuration may also be used in conjunction with the invention or components of the invention.
- Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
- computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable blu-ray discs, ultra density optical discs, any other optical or magnetic media, and floppy disks.
- the computer-readable media may store a computer program that is executable by at least one processor and includes sets of instructions for performing various operations.
- hardware devices configured to store and execute sets of instructions include, but are not limited to application specific integrated circuits (ASICs), field programmable gate arrays (FPGA), programmable logic devices (PLDs), ROM, and RAM devices.
- ASICs application specific integrated circuits
- FPGA field programmable gate arrays
- PLDs programmable logic devices
- ROM read only memory
- RAM devices random access memory
- Examples of computer programs or computer code include machine code, such as produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
- the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people.
- display or displaying means displaying on an electronic device.
- computer readable medium and “computer readable media” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral signals.
- FIG. 215 Many of the above figures illustrate a single access point (e.g., HNB 205 ) communicatively coupled to a network controller (e.g., HNB-GW 215 ).
- the network controller e.g., HNB-GW 215
- the network controller communicatively coupled to several HNBs and the network controller communicatively couples all such HNBs to the core network.
- the figures merely illustrate a single HNB communicatively coupled to the HNB-GW for purposes of simplifying the discussion to interactions between a single access point and a single network controller.
- the same network controller of some embodiments may have several of the same interactions with several different access points.
- the access point to be a HNB and the network controller to be a HNB-GW.
- HNB the network controller
- these terms are used to provide a specific implementation for the various procedures, messages, and protocols described within some of the embodiments described with reference to the figures.
- the procedures, messages, and protocols may be used with other communication systems and the HNB system was provided for exemplary purposes.
- such procedures, messages, and protocols may be adapted to function with a Femtocell cell system that includes Femtocell access points and a Femtocell network controller (e.g., Generic Access Network Controller).
- HNB-AN functionality such as control plane functionality or user plane functionality.
- control plane functionality such as control plane functionality or user plane functionality.
- user plane functionality such as control plane functionality or user plane functionality.
- HNB-AN function such as control plane functionality or user plane functionality.
- the above described messaging may include additional or alternative information elements to those enumerated above.
- GSM/EDGE Radio Access Network GERAN GSM/EDGE Radio Access Network
- Gateway GPRS Support Node GGSN Gateway GPRS Support Node GGSN
- Gateway Mobile Location Center GMLC Gateway Mobile Location Center
- GSM GPRS Radio Resource sublayer
- GSM Global System for Mobile communications
- GSM Global Text Telephony
- HeNB Gateway HeNB-GW HeNB Gateway HeNB-GW
- IP version 4 IP version 4 IP version 4 IP version 4 IP version 4 IP version 6 IPv6
- ISP Internet Service Provider
- LAC Location Area Code
- LAI Location Area Identifier
- NAI Network Access Identifier
- PSTN Public Switched Telephone Network
- P-TMSI Packet-Temporary Mobile Subscriber Identity
- Radio Network Controller RNC Radio Network Controller
- SMS Short Message Services
- SMS-GMSC Short Message Service Gateway
- SMS-IWMSC Short Message Service Interworking MSC SMS-IWMSC
- SMS-SC Short Message Service Center
- Visited Public Land Mobile Network VPLMN Visited Public Land Mobile Network
- Wireless Service Provider WSP Wireless Service Provider
- CSG List A list of CSG cells, each of which is identified by a CSG identity, allowed for a particular subscriber.
- Access Control It is the mechanism of ensuring that access to particular HNB is based on the subscription policy of the subscriber as well as that of the HNB.
- Closed Subscriber Group CSG: A list of subscribers which have access to mobile network using a particular HNB (a.k.a HeNB or Femtocell).
- CSG Cell A cell (e.g. HNB) which allows mobile network access to CSG only.
- a CSG cell may broadcast a specific CSG identifier over the air interface.
- CSG Identity The identity of the CSG cell.
- a CSG identity may be shared by multiple CSG cells.
- CSG UE A UE which has support for CSG white-list and can autonomously detect and select CSG cells.
- Legacy UE A UE which does not have support for CSG white-list (e.g. R99 or pre-release 8 UE).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Some embodiments provide methods and systems for integrating a first communication system with a core network of a second communication system that has a licensed wireless radio access network. The first communication system includes one or more user hosted access points that operate using short range licensed wireless frequencies in order to establish service regions of the first communication system and a network controller for communicatively coupling the service regions to the core network. The first communication system includes a Home Node-B (HNB) system where the access points are Home Node-Bs and the network controller is a HNB Gateway (HNB-GW). Some embodiments define multi-layered protocol stacks for implementing management functionality and control plane functionality for the access points and the network controller. The HNB is connected to the HNB-GW via the Iuh interface. The Iuh management functionality is provided via a HNBAP protocol layer and control plane functionality, such as relay of RANAP, is provided via a RUA protocol layer.
Description
- This application claims the benefit of U.S. Provisional Application 61/046,401, entitled “Mechanisms to Relay or Transfer RANAP Messages between 3 G Home Node-B and the Core Network via the Home Node-B Gateway”, filed Apr. 18, 2008; U.S. Provisional Application 61/055,961, entitled “Mechanisms to Transport RANAP Messages between 3 G Home Node-B and the Core Network via the Home Node-B Gateway”, filed May 23, 2008; U.S. Provisional Application 61/058,912, entitled “Transport of RANAP Messages over the Iuh Interface”, filed Jun. 4, 2008; U.S. Provisional Application 61/080,227, entitled “HNB System Architecture”, filed Jul. 11, 2008; and U.S. Provisional Application 61/101,148, entitled, “Support for Closer Subscriber Group (CSG) in Femtocell System”, filed Sep. 29, 2008. The contents of Provisional Applications 61/046,401, 61/055,961, 61/058,912, 61/080,227, and 61/101,148 are hereby incorporated by reference.
- The invention relates to telecommunication. More particularly, this invention relates to a Home Node-B system architecture.
- Licensed wireless systems provide mobile wireless communications to individuals using wireless transceivers. Licensed wireless systems refer to public cellular telephone systems and/or Personal Communication Services (PCS) telephone systems. Wireless transceivers, also referred to as user equipment (UE), include cellular telephones, PCS telephones, wireless-enabled personal digital assistants, wireless modems, and the like.
- Licensed wireless systems utilize wireless signal frequencies that are licensed from governments. Large fees are paid for access to these frequencies. Expensive base station (BS) equipment is used to support communications on licensed frequencies. Base stations are typically installed approximately a mile apart from one another (e.g., cellular towers in a cellular network). In a Universal Mobile Telecommunications System (UMTS), these base stations are system provider controlled and include Node-Bs which are high power and long range radio frequency transmitters and receivers used to directly connect with the user equipment. The wireless transport mechanisms and frequencies employed by typical licensed wireless systems limit both data transfer rates and range.
- Licensed wireless systems continually upgrade their networks and equipment in an effort to deliver greater data transfer rates and range. However, with each upgrade iteration (e.g., 3 G to 4 G), the licensed wireless system providers incur substantial costs from licensing additional bandwidth spectrum to upgrading the existing radio network equipment or core network equipment. To offset these costs, the licensed wireless system providers pass down the costs to the user through the licensed wireless service fees. Users also incur equipment costs with each iterative upgrade of the licensed wireless network as new user equipment is needed to take advantage of the new services or improved services of the upgraded network.
- Landline (wired) connections are extensively deployed and generally perform at a lower cost with higher quality voice and higher speed data services than the licensed wireless systems. The problem with landline connections is that they constrain the mobility of a user. Traditionally, a physical connection to the landline was required.
- Unlicensed Mobile Access (UMA) emerged as one solution to lower costs associated with the licensed wireless systems while maintaining user wireless mobility and taking advantage of the higher quality voice and higher speed data services of the landline connections. UMA allowed users the ability to seamlessly and wirelessly roam in and out of licensed wireless systems and unlicensed wireless systems where the unlicensed wireless systems facilitate mobile access to the landline-based networks. Such unlicensed wireless systems support wireless communication based on the IEEE 802.11a, b or g standards (WiFi), or the Bluetooth® standard. The mobility range associated with such unlicensed wireless systems is typically on the order of 100 meters or less. A typical unlicensed wireless communication system includes a base station comprising a wireless access point (AP) with a physical connection (e.g., coaxial, twisted pair, or optical cable) to a landline-based network. The AP has a RF transceiver to facilitate communication with a wireless handset that is operative within a modest distance of the AP, wherein the data transport rates supported by the WiFi and Bluetooth® standards are much higher than those supported by the aforementioned licensed wireless systems.
- UMA allowed users to purchase ordinary off-the-shelf access points in order to deploy a UMA service region that allowed for access to UMA service. In this manner, UMA was able to provide higher quality services at a lower cost than the licensed wireless systems. However, other UMA associated costs remained an obstacle to the large scale adoption of UMA.
- With the emergence of UMA and licensed devices equipped with unlicensed radios that bypass the mobile operators' network/service, mobile operators sought to provide an equivalent solution using their licensed spectrum. Home Node Bs (HNBs) are low cost versions of the expensive Base Stations that comprise the mobile network that still use the operator's licensed spectrum for communication with licensed devices. The HNBs employ similar techniques as unlicensed access points such as the support of lower transmission power and range, integrated design, and use of regular landlines to communicate with the mobile operators' network to be cost and performance competitive with UMA. The use of regular landlines required the HNBs to adopt proprietary messaging and signaling standards that were different than those used by the licensed wireless systems for the expensive Base Stations.
- Accordingly, there is a need in the art to develop a simplified integrated system that leverages the mobility provided by licensed wireless systems while maintaining the quality of service and data transfer rates of landline connections. Such a simplified integrated system needs to reduce adoption costs for both the individual user and the system provider that deploys such a system.
- Some embodiments provide methods and systems for integrating a first communication system with a core network of a second communication system that has a licensed wireless radio access network. In some embodiments, the first communication system includes one or more user hosted access points that operate using short range licensed wireless frequencies in order to establish service regions of the first communication system and a network controller for communicatively coupling the service regions associated with the access points to the core network.
- The first communication system of some embodiments includes a Home Node-B (HNB) Access Network (HNB-AN) where the access points are Home Node-Bs and the network controller is a HNB Gateway (HNB-GW). The licensed wireless radio access network of the second communication system of some embodiments includes a Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (UTRAN) and the core network of the second communication system includes a core network of the UMTS.
- The network controller of some embodiments seamlessly integrates each of the short range licensed wireless service regions with the core network. In some such embodiments, the network controller seamlessly integrates with the core network by using existing Iu interfaces of the core network to communicatively couple each of the service regions to the core network. Accordingly, the network controller of some embodiments uses standardized messaging and protocols to communicate with the core network while utilizing HNB-AN messaging and protocols to communicate with each of the service regions. In this manner, the network controller of some embodiments reduces deployment costs of the HNB-AN within the UMTS core network. Specifically, deployment of the network controller of some embodiments requires no change to the UMTS core network while still providing HNB wireless service that combines the mobility of licensed wireless networks with the quality and speed of landline/broadband services. In some embodiments, the network controllers take on some of the functionality of a traditional Radio Network Controller (RNC).
- Additionally, the access points of some embodiments seamlessly integrate with existing user equipment (UE) of the licensed wireless radio access networks of the second communication system. In this manner, the access points reduce deployment costs of the HNB-AN, as users are able to utilize existing UE in order to wirelessly communicate through either the first communication system or the second communication system where the first communication system combines the wireless mobility afforded by the licensed wireless radio access network of the second communication system with the speed and quality of service afforded by landline/broadband services. In some embodiments, the access points are functionally equivalent to a Node-B of the UTRAN while having the flexibility and lower deployment costs associated with an ad-hoc and user hosted service region. In some embodiments, the access points take on some the functionality of a traditional Radio Network Controller (RNC).
- Some embodiments define multi-layered protocol stacks for implementing management functionality within the access points and the network controller of the first communication system. In some embodiments, the protocol stacks include a management layer that performs functionality of the HNB Application Part (HNBAP) protocol. The protocol stacks of some embodiments implement management functionality that includes a registration procedure for registering a particular access point with the network controller. Specifically, the protocol stacks enable a registration procedure that allows a service region associated with a particular access point to access services of the core network through the network controller. Additional management functionality implemented by the protocol stacks of some embodiments include discovery procedures for identifying a network controller with which the particular access point is to register.
- Some embodiments define multi-layered protocol stacks for implementing control plane functionality within the access points and the network controller of the first communication system. In some embodiments, the protocol stacks include a Radio Access Network Application Part (RANAP) user adaptation (RUA) layer that enables a method for transparently passing RANAP messages between the access points and the network controller over a reliable transport connection. The method receives a RANAP message and encapsulates the message with a RUA header. The method then passes the encapsulated message to a receiving endpoint within the first communication system. In this manner, the RANAP message is passed from a first endpoint of the first communication system to a second endpoint of the first communication system. Additionally, in some embodiments, the network controller decodes and processes only the RUA header before relaying the RANAP message to the core network operating within a service region of the first communication system. In some embodiments, an access point performs the RANAP encapsulation and the receiving endpoint is a network controller. In some embodiments, the network controller performs the RANAP encapsulation and the receiving endpoint is an access point. The receiving endpoint need only decode and process the RUA header. Note that RANAP is only used to communicate with core network. The communication with UE (e.g. by the HNB) uses the RRC protocol as per 3GPP 25.331 specifications, “Radio Resource Control (RRC) Protocol Specification”, the contents of which are herein incorporated by reference, hereinafter referred to as TS 25.331. The HNB on the receiving end processes the RUA as well as the entire RANAP message. The content of the RANAP messages are extracted by the HNB and converted to appropriate RRC messages.
- Some embodiments define messaging formats to be used in conjunction with the various protocol stacks. Some embodiments provide a message that when sent from a particular access point to the network controller explicitly indicates the start of a communication session between the particular access point and the network controller. In some embodiments, the contents of the message are used to route the establishment of a signaling connection from the network controller to a core network node within a core network domain identified by the message.
- Some embodiments provide a computer readable storage medium of an access point that stores a computer program. The computer program includes instructions that are executable by one or more processors. In some embodiments, the computer program includes a set of instruction for generating a message to send to the network controller to explicitly indicate start of a communication session with the network controller. The message includes a Radio Access Network Application Part (RANAP) message for establishing a signaling connection with the network controller. The computer program also includes a set of instructions for passing a set of RANAP messages to the core network through the network controller after establishing the signaling connection. The set of RANAP messages facilitates communications between the particular access point and the core network.
- Some embodiments provide a computer readable storage medium of a particular access point that stores a computer program. The computer program includes instructions that are executable by one or more processors. In some embodiments, the computer program includes a set of instruction for receiving a message to explicitly indicate start of a communication session with a particular access point. The message includes a Radio Access Network Application Part (RANAP) message that is encapsulated with a header of the second network. The message is used for establishing a signaling connection with the particular access point. The computer program also includes a set of instructions for analyzing the message header to identify a destination in the core network to receive the message. The computer program further includes a set of instructions for forwarding the message without the header to the destination in the core network to establish the signaling connection
- Some embodiments further provide messages for directly transferring data downstream from the core network through the first communication system to a UE operating within a particular service region. Some embodiments provide messages for directly transferring data upstream from a UE in a particular service region through the first communication system to the core network. Directly transferring data involves routing a RANAP message through the network controller and an access point where the contents of the RANAP message are not processed by the network controller. In some embodiments, the network controller may process and modify the content of some of the RANAP message (for example, transport network switching that is converting ATM transport from/to the core network into the appropriate IP transport over the HNB-AN).
- Some embodiments provide a computer-readable medium that is encoded with a data storage structure. The data storage structure for passing a Radio Access Network Application Part (RANAP) message within a first communication system that includes several user hosted access points for establishing service regions of the first communication system by using short range licensed wireless frequencies and a network controller that can communicatively couple user equipment operating in the service regions to a core network of a second communication system that also includes a licensed wireless radio access network. The data storage structure has a header that includes a core network domain identity to identify at least one of a core network domain from which the RANAP message originated and a core network domain for which the RANAP message is to be sent. The header also includes a context identifier to uniquely identify a particular user equipment operating within a particular service region of the second communication system. The data storage structure also includes payload data that include the RANAP message.
- The registration procedure of some embodiments specifies a method for registering UEs with the first communication system. The method, from an access point coupled to a UE sends a registration request message to the network controller on behalf of the UE. The method receives a registration accept message when the UE is authorized to access services of the first communication system through the particular access point. As part of the registration accept message, some embodiments include a uniquely assigned context identifier that identifies the UE while the UE is connected for service at the particular access point. All subsequent messages will include the assigned context identifier to identify the UE.
- The registration procedure of some embodiments also specifies a method for registering an access point with the network controller. The method includes the access point sending its identification information and location information to the network controller. The network controller determines whether the access point identified by the identification information at the specified location is permitted to access services of the first communication system through the network controller. When permitted, the access point receives a registration accept message from the network controller. Otherwise, the method rejects the access point or redirects the access point to another network controller.
- Some embodiments provide emergency responders the ability to locate a position of an emergency caller when the caller places the emergency request through a service area of the first communication system. More specifically, some embodiments provide a method whereby unauthorized UEs are still permitted limited service to the first communication system in order to establish an emergency call when in a service region of the first communication system. The method includes receiving, at a particular access point, a service request from a UE indicating that the UE is requesting emergency services. The particular access point then performs a registration procedure with the network controller that indicates that the purpose of the registration is to request emergency services for the UE. The method includes receiving a registration accept message with a context identifier to be used by the UE in order to access limited services of the first communication system, specifically, emergency services.
- Some embodiments provide a method that at the network controller, establishes a bearer connection between a particular access point and the core network. The establishing the bearer connection includes initiating signaling to establish an asynchronous transfer mode (ATM) based bearer connection between the network controller and the core network. The establishing the bearer connection also includes establishing an Internet Protocol (IP) based bearer connection between the network controller and the particular service region. The method also includes receiving a message from the particular access point for establishing a user plane between the particular access point and the core network. The method also includes establishing the user plane by using the IP based bearer connection between the particular access point and the network controller and the ATM based bearer connection between the network controller and the core network. The network controller routes user plane data received from the particular access point over the IP based bearer connection to the core network through the ATM based bearer connection by the network controller.
- Some embodiments provide a method for user equipment (UE) registration with a closed subscriber group (CSG) system. The method receives a UE registration request at the network controller from an access point. The request includes an initial NAS message from the UE and a CSG identification associated with the access point. The method relays the registration request that includes the initial NAS message and the CSG identification to the core network. The method receives a permanent identity of the UE from the core network based on the registration request. The method uses the permanent identity of the UE to complete the UE registration.
- The novel features of the invention are set forth in the appended claims. However, for purpose of explanation, several embodiments of the invention are set forth in the following figures.
-
FIG. 1 illustrates a system architecture for 3 G HNB deployments in accordance with some embodiments of the invention. -
FIG. 2 illustrates elements of the HNB Access Network (HNB-AN) sub-system architecture in accordance with some embodiments. -
FIG. 3 illustrates the Home Node-B (HNB) system architecture including the HNB-AN of some embodiments integrated with a core network of a second communication system that includes a licensed wireless radio access network. -
FIG. 4 illustrates some of the various devices that may be used in some embodiments in order to access services of the HNB-AN or HNB system. -
FIG. 5 illustrates the protocol architecture supporting the HNB Application Part (HNBAP) over the Iuh interface, in some embodiments. -
FIG. 6 illustrates the protocol architecture in support of the HNB control plane (i.e., for both the CS and PS domain), in some embodiments. -
FIG. 7 illustrates INITIAL DIRECT TRANSFER message content in some embodiments. -
FIG. 8 illustrates UPLINK DIRECT TRANSFER message content in some embodiments. -
FIG. 9 illustrates DOWNLINK DIRECT TRANSFER message content in some embodiments. -
FIG. 10 illustrates an applicable Protocol Data Unit (PDU) structure for the transport of RANAP in some embodiments. -
FIG. 11 illustrates an alternative PDU/RUA Adaptation Layer Structure of some embodiments. -
FIG. 12 illustrates the details of the RUA Header structure in some embodiments. -
FIG. 13 illustrates a PDU Error Indication message in some embodiments. -
FIG. 14 illustrates a RANAP message transfer using adaptation layer in some embodiments. -
FIG. 15 illustrates handling of abnormal conditions over the Iuh interface in some embodiments. -
FIG. 16 illustrates the CS domain transport network control signaling (using ALCAP) over the ATM-based Iu-cs interface in some embodiments. -
FIG. 17 illustrates the protocol architecture in support of the CS domain user plane over the Iuh interface in some embodiments. -
FIG. 18 illustrates the PS Domain User Plane Protocol Architecture in some embodiments. -
FIG. 19 illustrates an overview of HNB initialization, discovery and registration in some embodiments. -
FIG. 20 illustrates the possible states for the HNBAP sub-layer in the HNB in some embodiments. -
FIG. 21 illustrates the setup of UE context identifiers via UE registration in some embodiments. -
FIG. 22 illustrates the fields of an Iuh RANAP Header in some embodiments. -
FIG. 23 illustrates a RANAP-H PDU in some embodiments. -
FIG. 24 illustrates a Context Create Request (CCREQ) message in some embodiments. -
FIG. 25 illustrates an Iuh RANAP header, in some embodiments. -
FIG. 26 illustrates the structure of a PDU used for transferring an HNBAP message in some embodiments. -
FIG. 27 illustrates a Create UE Context Request going from the HNB to the HNB-GW in some embodiments. -
FIG. 28 illustrates a Create UE Context Accept message going from the HNB-GW to the HNB in some embodiments. -
FIG. 29 illustrates a Release UE Context message going from either the HNB-GW to the HNB or the HNB to the HNB-GW in some embodiments. -
FIG. 30 illustrates a Release UE Context Complete message going from either the HNB-GW to the HNB or the HNB to the HNB-GW in some embodiments. -
FIG. 31 illustrates the case when the HNB powers on and does not have stored information on the Serving HNB-GW, and then performs a discovery procedure with the provisioning HNB-GW and SeGW in some embodiments. -
FIG. 32 illustrates the HNB Power on registration procedure in some embodiments. -
FIG. 33 illustrates UE registration with the HNB in some embodiments. -
FIG. 34 illustrates a procedure for the HNB-GW to allow UE registration using temporary identity in some embodiments. -
FIG. 35 illustrates the UE rove out procedure, where the UE leaves the HNB coverage area while idle in some embodiments. -
FIG. 36 illustrates the case when the UE powers down and performs an IMSI detach via the HNB access network in some embodiments. -
FIG. 37 illustrates the loss of Iuh interface capacity for the HNB in some embodiments. -
FIG. 38 illustrates an HNB-initiated register update between the HNB and HNB-GW in some embodiments. -
FIG. 39 illustrates the HNB-GW-initiated registration update between the HNB and HNB-GW in some embodiments. -
FIG. 40 illustrates the CS Handover from HNB to UTRAN in some embodiments. -
FIG. 41 illustrates the CS handover from HNB to GERAN procedure in some embodiments. -
FIG. 42 illustrates the PS Handover from HNB to UTRAN in some embodiments. -
FIG. 43 illustrates the PS handover from HNB to GERAN procedure in some embodiments. -
FIG. 44 illustrates CS bearer establishment (ATM transport) procedures (for MO/MT calls, using Iu-UP over AAL2) in some embodiments. -
FIG. 45 illustrates CS bearer establishment (IP transport) procedures (for MO/MT calls, using Iu-UP over AAL2) in some embodiments. -
FIG. 46 illustrates a mobile originated call over HNB procedure in some embodiments. -
FIG. 47 illustrates a mobile terminated PSTN-to-mobile call procedure in some embodiments. -
FIG. 48 illustrates a call release by an HNB subscriber procedure in some embodiments. -
FIG. 49 illustrates an example relay of DTAP supplementary service messages in some embodiments. -
FIG. 50 illustrates an uplink control plane data transport procedure in some embodiments. -
FIG. 51 illustrates a downlink control plane data transport procedure in some embodiments. -
FIG. 52 illustrates the HNB protocol architecture related to CS and PS domain SMS support builds on the circuit and packet services signaling architecture in some embodiments. -
FIG. 53 illustrates a CS mode mobile-originated SMS over HNB scenario in some embodiments. -
FIG. 54 illustrates an emergency call routing over HNB using service area procedure in some embodiments. -
FIG. 55 illustrates an emergency call routing over HNB of an unauthorized UE using service area procedure in some embodiments. -
FIG. 56 illustrates a location based emergency call routing over HNB procedure in some embodiments. -
FIG. 57 illustrates HNB security mechanisms in some embodiments. -
FIG. 58 illustrates message flow for security mode control over HNB in some embodiments. -
FIG. 59 illustrates a CN AKA authentication over HNB procedure in some embodiments. -
FIG. 60 illustrates the SAC for a new HNB connecting to the HNB network in some embodiments. -
FIG. 61 illustrates the SAC for an HNB getting redirected in HNB network in some embodiments. -
FIG. 62 illustrates the SAC for an HNB registering in a restricted UMTS coverage area in some embodiments. -
FIG. 63 illustrates the SAC for an unauthorized UE accessing an authorized HNB in some embodiments. -
FIG. 64 conceptually illustrates a computer system with which some embodiments are implemented. - In the following detailed description of the invention, numerous details, examples, and embodiments of the invention are set forth and described. However, it will be clear and apparent to one skilled in the art that the invention is not limited to the embodiments set forth and that the invention may be practiced without some of the specific details and examples discussed.
- Throughout the following description, acronyms commonly used in the telecommunications industry for wireless services are utilized along with acronyms specific to the present invention. A table of acronyms used in this application is included in Section XIII.
- Some embodiments provide methods and systems for integrating a first communication system with a core network of a second communication system that has a licensed wireless radio access network. In some embodiments, the first communication system includes one or more user hosted access points that operate using short range licensed wireless frequencies in order to establish service regions of the first communication system and a network controller for communicatively coupling the service regions associated with the access points to the core network.
- The first communication system of some embodiments includes a Home Node-B (HNB) Access Network (HNB-AN) where the access points are Home Node-Bs and the network controller is a HNB Gateway (HNB-GW). The licensed wireless radio access network of the second communication system of some embodiments includes a Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (UTRAN) and the core network of the second communication system includes a core network of the UMTS.
- The network controller of some embodiments seamlessly integrates each of the short range licensed wireless service regions with the core network. In some such embodiments, the network controller seamlessly integrates with the core network by using existing Iu interfaces of the core network to communicatively couple each of the service regions to the core network. Accordingly, the network controller of some embodiments uses standardized messaging and protocols to communicate with the core network while utilizing HNB-AN messaging and protocols to communicate with each of the service regions. In this manner, the network controller of some embodiments reduces deployment costs of the HNB-AN within the UMTS core network. Specifically, deployment of the network controller of some embodiments requires no change to the UMTS core network while still providing HNB wireless service that combines the mobility of licensed wireless networks with the quality and speed of landline/broadband services. In some embodiments, the network controllers take on some of the functionality of a traditional Radio Network Controller (RNC).
- Additionally, the access points of some embodiments seamlessly integrate with existing user equipment (UE) of the licensed wireless radio access networks of the second communication system. In this manner, the access points reduce deployment costs of the HNB-AN, as users are able to utilize existing UE in order to wirelessly communicate through either the first communication system or the second communication system where the first communication system combines the wireless mobility afforded by the licensed wireless radio access network of the second communication system with the speed and quality of service afforded by landline/broadband services. In some embodiments, the access points are functionally equivalent to a Node-B of the UTRAN while having the flexibility and lower deployment costs associated with an ad-hoc and user hosted service region. In some embodiments, the access points take on some the functionality of a traditional Radio Network Controller (RNC).
- Some embodiments define multi-layered protocol stacks for implementing management functionality within the access points and the network controller of the first communication system. In some embodiments, the protocol stacks include a management layer that performs functionality of the HNB Application Part (HNBAP) protocol. The protocol stacks of some embodiments implement management functionality that includes a registration procedure for registering a particular access point with the network controller. Specifically, the protocol stacks enable a registration procedure that allows a service region associated with a particular access point to access services of the core network through the network controller. Additional management functionality implemented by the protocol stacks of some embodiments include discovery procedures for identifying a network controller with which the particular access point is to register.
- Some embodiments define multi-layered protocol stacks for implementing control plane functionality within the access points and the network controller of the first communication system. In some embodiments, the protocol stacks include a Radio Access Network Application Part (RANAP) user adaptation (RUA) layer that enables a method for transparently passing RANAP messages between the access points and the network controller over a reliable transport connection. The method receives a RANAP message and encapsulates the message with a RUA header. The method then passes the encapsulated message to a receiving endpoint within the first communication system. In this manner, the RANAP message is passed from a first endpoint of the first communication system to a second endpoint of the first communication system. Additionally, in some embodiments, the network controller decodes and processes only the RUA header before relaying the RANAP message to the core network operating within a service region of the first communication system. In some embodiments, an access point performs the RANAP encapsulation and the receiving endpoint is a network controller. In some embodiments, the network controller performs the RANAP encapsulation and the receiving endpoint is an access point. The receiving endpoint need only decode and process the RUA header. Note that RANAP is only used to communicate with core network. The communication with UE (e.g. by the HNB) uses the RRC protocol as per 3GPP 25.331 specifications. The HNB on the receiving end processes the RUA as well as the entire RANAP message. The content of the RANAP messages are extracted by the HNB and converted to appropriate RRC messages.
- Some embodiments define messaging formats to be used in conjunction with the various protocol stacks. Some embodiments provide a message that when sent from a particular access point to the network controller explicitly indicates the start of a communication session between the particular access point and the network controller. In some embodiments, the contents of the message are used to route the establishment of a signaling connection from the network controller to a core network node within a core network domain identified by the message.
- Some embodiments provide a computer readable storage medium of an access point that stores a computer program. The computer program includes instructions that are executable by one or more processors. In some embodiments, the computer program includes a set of instruction for generating a message to send to the network controller to explicitly indicate start of a communication session with the network controller. The message includes a Radio Access Network Application Part (RANAP) message for establishing a signaling connection with the network controller. The computer program also includes a set of instructions for passing a set of RANAP messages to the core network through the network controller after establishing the signaling connection. The set of RANAP messages facilitates communications between the particular access point and the core network.
- Some embodiments provide a computer readable storage medium of a particular access point that stores a computer program. The computer program includes instructions that are executable by one or more processors. In some embodiments, the computer program includes a set of instruction for receiving a message to explicitly indicate start of a communication session with a particular access point. The message includes a Radio Access Network Application Part (RANAP) message that is encapsulated with a header of the second network. The message is used for establishing a signaling connection with the particular access point. The computer program also includes a set of instructions for analyzing the message header to identify a destination in the core network to receive the message. The computer program further includes a set of instructions for forwarding the message without the header to the destination in the core network to establish the signaling connection
- Some embodiments further provide messages for directly transferring data downstream from the core network through the first communication system to a UE operating within a particular service region. Some embodiments provide messages for directly transferring data upstream from a UE in a particular service region through the first communication system to the core network. Directly transferring data involves routing a RANAP message through the network controller and an access point where the contents of the RANAP message are not processed by the network controller. In some embodiments, the network controller may process and modify the content of some of the RANAP message (for example, transport network switching that is converting ATM transport from/to the core network into the appropriate IP transport over the HNB-AN).
- Some embodiments provide a computer-readable medium that is encoded with a data storage structure. The data storage structure for passing a Radio Access Network Application Part (RANAP) message within a first communication system that includes several user hosted access points for establishing service regions of the first communication system by using short range licensed wireless frequencies and a network controller that can communicatively couple user equipment operating in the service regions to a core network of a second communication system that also includes a licensed wireless radio access network. The data storage structure has a header that includes a core network domain identity to identify at least one of a core network domain from which the RANAP message originated and a core network domain for which the RANAP message is to be sent. The header also includes a context identifier to uniquely identify a particular user equipment operating within a particular service region of the second communication system. The data storage structure also includes payload data that include the RANAP message.
- The registration procedure of some embodiments specifies a method for registering UEs with the first communication system. The method, from an access point coupled to a UE sends a registration request message to the network controller on behalf of the UE. The method receives a registration accept message when the UE is authorized to access services of the first communication system through the particular access point. As part of the registration accept message, some embodiments include a uniquely assigned context identifier that identifies the UE while the UE is connected for service at the particular access point. All subsequent messages will include the assigned context identifier to identify the UE.
- The registration procedure of some embodiments also specifies a method for registering an access point with the network controller. The method includes the access point sending its identification information and location information to the network controller. The network controller determines whether the access point identified by the identification information at the specified location is permitted to access services of the first communication system through the network controller. When permitted, the access point receives a registration accept message from the network controller. Otherwise, the method rejects the access point or redirects the access point to another network controller.
- Some embodiments provide emergency responders the ability to locate a position of an emergency caller when the caller places the emergency request through a service area of the first communication system. More specifically, some embodiments provide a method whereby unauthorized UEs are still permitted limited service to the first communication system in order to establish an emergency call when in a service region of the first communication system. The method includes receiving, at a particular access point, a service request from a UE indicating that the UE is requesting emergency services. The particular access point then performs a registration procedure with the network controller that indicates that the purpose of the registration is to request emergency services for the UE. The method includes receiving a registration accept message with a context identifier to be used by the UE in order to access limited services of the first communication system, specifically, emergency services.
- Some embodiments provide a method that at the network controller, establishes a bearer connection between a particular access point and the core network. The establishing the bearer connection includes initiating signaling to establish an asynchronous transfer mode (ATM) based bearer connection between the network controller and the core network. The establishing the bearer connection also includes establishing an Internet Protocol (IP) based bearer connection between the network controller and the particular service region. The method also includes receiving a message from the particular access point for establishing a user plane between the particular access point and the core network. The method also includes establishing the user plane by using the IP based bearer connection between the particular access point and the network controller and the ATM based bearer connection between the network controller and the core network. The network controller routes user plane data received from the particular access point over the IP based bearer connection to the core network through the ATM based bearer connection by the network controller.
- Some embodiments provide a method for user equipment (UE) registration with a closed subscriber group (CSG) system. The method receives a UE registration request at the network controller from an access point. The request includes an initial NAS message from the UE and a CSG identification associated with the access point. The method relays the registration request that includes the initial NAS message and the CSG identification to the core network. The method receives a permanent identity of the UE from the core network based on the registration request. The method uses the permanent identity of the UE to complete the UE registration.
- Several more detailed embodiments of the invention are described in sections below. Specifically, Section I discusses the HNB system architecture. Section II describes various protocol architectures of the HNB system, including protocol architectures for the Home Node-B Application Part (HNBAP) and the Radio Access Network Application Part (RANAP) User Adaption (RUA) layer. Section III discusses mobility management within the HNB system, including mobility management scenarios and relocation.
- Section IV describes call management and some call management scenarios. Section V discusses packet services. Section VI discusses short message services and scenarios. Section VII describes emergency services, including service area based routing and location based routing. Section VIII discusses Lawfully Authorized Electronic Surveillance (LAES) Service.
- Section IX discusses HNB security, including authentication, encryption, a profile of IKEv2, a profile of IPSec ESP, security mode control, and core network authentication. Section X describes HNB service access control (HNB SAC), including HNB-GW and service area selection, and service access control use case examples. Section XI analyzes the impacts of various access control policies. Section XII provides a description of a computer system with which some embodiments of the invention are implemented. Lastly, Section XIII lists the abbreviations and provides definitions for terms found herein.
-
FIG. 1 illustrates a system architecture for 3 G HNB deployments in accordance with some embodiments of the invention. As shown, the system includes a HNB access network (or HNB system) 110. The key features of the 3 G HNB system architecture include (a) support for a standard User Equipment (UE) 105 as defined in the 3GPP technical specification TS 23.101 entitled “General UMTS architecture” which is incorporated herein by reference and (b) co-existence with the UMTS Terrestrial Radio Access Network (UTRAN) and interconnection with the existing Core Network (CN) 115 via the standardized interfaces defined for UTRAN. - In some embodiments, the standardized interfaces include (a) the Iu-cs interface for circuit switched services as overviewed in the 3GPP technical specification (TS) 25.410 entitled “UTRAN Iu Interface: general aspects and principles” which is incorporated herein by reference, (b) the Iu-ps interface for packet switched services as overviewed in the 3GPP TS 25.410, (c) the Iu-pc interface for supporting location services as described in the 3GPP TS 25.450 entitled “UTRAN Iupc interface general aspects and principles” which is incorporated herein by reference, and (d) the Iu-bc interface for supporting cell broadcast services as described in the 3GPP TS 25.419 entitled “UTRAN Iu-BC interface: Service Area Broadcast Protocol (SABP)” which is incorporated herein by reference. However, it should be apparent to one of ordinary skill in the art that other interfaces may be implemented by the HNB-AN such as the A/Gb interfaces of standard Global System for Mobile (GSM) communications systems.
- To address specific 3 G HNB applications, some embodiments utilize existing Iu and Uu interfaces within the HNB-
AN 110. The HNB-AN 110 addresses some of the key issues in the deployment of 3 G HNB applications, such as the ad-hoc and large scale deployment of 3 G HNBs using public infrastructure such as the Internet. -
FIG. 2 illustrates elements of the HNB Access Network (HNB-AN) 200 architecture in accordance with some embodiments. This figure includes (3 G)HNB 205, GenericIP Access Network 210, HNB-GW 215,HNB Management System 220,Iuh interface 225 that is established between the GenericIP Access Network 210 and the HNB-GW 215, and aninterface 230 between the HNB-GW 215 and theHNB Management System 220. In some embodiments, theinterface 230 is based on the 3GPP TR-069 family of standards. In some other embodiments, theinterface 230 is the Iuhm interface. These elements are described in further detail below with reference toFIG. 3 . -
FIG. 2 and other figures below illustrate a single access point (e.g., HNB 205) communicatively coupled to a network controller (e.g., HNB-GW 215). However, it should be apparent to one of ordinary skill in the art that the network controller (e.g., HNB-GW 215) of some embodiments is communicatively coupled to several HNBs and the network controller communicatively couples all such HNBs to the core network. Also, the HNB of some embodiments is communicatively coupled to several UEs. The figures merely illustrate a single HNB communicatively coupled to the HNB-GW for purposes of simplifying the discussion to interactions between a single access point and a single network controller. However, the same network controller may have several of the same interactions with several different access points. -
FIG. 3 illustrates the HNB-AN system architecture of some embodiments integrated with a core network of a second communication system that includes a licensed wireless radio access network. The HNB system includes (1) Home Node-B (HNB) 305, (2) Home Node-B Gateway (HNB-GW) 315, (3)Broadband IP Network 320, (4) Security Gateway (SeGW) 325, and (6)HNB Management System 330. The licensed wireless radio access network of the second communication system includesUTRAN 385 which is comprised of a Node-B 380 and aRadio Network Controller 375 of a UMTS. The core network of the second communication system includes Mobile Switching Center (MSC) 365, Serving GPRS Support Node (SGSN) 370, Authorization, Authentication, andAccounting server 355, andHome Location Register 360. Additionally, Service Mobile Location Center (SMLC) 340 and Cell Broadcast Center (CBC) 345 may be components of the core network. - A. User Equipment (UE)
- In some embodiments,
UE 310 is used to access services of the HNB-AN and also access services of the licensed wirelessradio access network 385 of a cellular provider. In some such embodiments, the UE seamlessly transitions from the HNB-AN to the cellular provider and vice versa without loss of connectivity. In some embodiments, theUE 310 is thus a standard device operating over licensed spectrum of a licensed wireless system provider. Accordingly, theUE 310 wirelessly connects to theHNB 305 using the same signaling and messaging interfaces as it would when connecting to a base station, such as a base transceiver station (BTS) in GSM, or the Node-B 380 of a Universal Mobile Telecommunications System (UMTS). -
FIG. 4 illustrates some of the various devices that may be used in some embodiments in order to access services of the HNB-AN or HNB system. In some embodiments, the devices include (1) standard licensed wireless handsets 405 and wireless enabledcomputers 410 that connect through anHNB 415, (2) dual mode handsets withWiMAX capabilities 420 that connect throughWiMAX access points 425, (3) devices such aswired telephones 430 andfaxes 435 that connect throughterminal adapters 440, and (4) softmobile enableddevices 445. - 1. Licensed Wireless Handsets
- In some embodiments, the
UE 310 includes cellular telephones 405, smartphones, PDAs, and modem like devices some of which are shown inFIG. 4 . These devices include any device that wirelessly communicates with a licensed wireless service provider using existing licensed wireless technologies, such as Global System for Mobile (GSM) communications, UMTS, etc. - 2. Terminal Adaptors
- In some embodiments, the
UE 310 includes a terminal adaptor device (such as 440 ofFIG. 4 ) that allows incorporating fixed-terminal devices such as telephones, faxes, and other equipments that are not wirelessly enabled within the HNB-AN. As far as the subscriber is concerned, the service behaves as a standard analog fixed telephone line. The service is delivered in a manner similar to other fixed line VoIP services, where a UE is connected to the subscriber's existing broadband (e.g., Internet) service. - 3. WiMAX
- In some embodiments, the
UE 310 includes a dual mode cellular/WiMAX UE (such as 420 ofFIG. 4 ) that enables a subscriber to seamlessly transition between a cellular network and a WiMAX network through a WiMAX access point (such as 425 ofFIG. 4 ). - 4. SoftMobiles
- Connecting laptops to broadband access at hotels and Wi-Fi hot spots has become popular, particularly for international business travelers. In addition, many travelers are beginning to utilize their laptops and broadband connections for the purpose of voice communications. Rather than using mobile phones to make calls and pay significant roaming fees, they utilize SoftMobiles (or SoftPhones) such as 445 of
FIG. 4 and VoIP services when making long distance calls. Accordingly, theUE 310 of some embodiments includes SoftMobile like devices. - To use a SoftMobile service, a subscriber would place a USB memory stick with an embedded SIM into a USB port of their laptop. A SoftMobile client would automatically launch and connect over IP to the mobile service provider. From that point on, the subscriber would be able to make and receive mobile calls as if she was in her home calling area.
- B. HNB
- The Home Node-B (HNB) 305 is an access point that offers a standard radio interface (Uu) for user equipment (UE) connectivity using short range licensed wireless frequencies. The
HNB 305 provides the radio access network connectivity to the UE using the Iuh interface towards the HNB-GW 315. - The
HNB 305 differs from the UMTS Node-B in that the range of wireless connectivity supported by the HNB 305 (e.g., tens of meters) is much less than the range supported by the UMTS Node-B (e.g., hundreds or thousands of meters). This is because theHNB 305 is a low power and a short range device similar to wireless access points found within a user's home. The low power and short range requirement ensures that theHNB 305 does not interfere with the service regions of the licensed wireless system providers (e.g., cellular networks) that are established using the wireless frequencies that the licensed wireless system providers licensed from the government at great expense. Moreover, the low power requirement enables theHNB 305 to operate using standard electrical outlets of a user's home or office. In some embodiments, the low power and short range requirement further facilitates the small scale of the HNB device relative to the radio access network Node-B devices. Unlike the Node-B, which often is a tower with multiple antennae with the tower reaching several meters in height, the HNB is a much smaller device often the size of 802.11 wireless routers commonly found within a user's home. - Conversely, the Node-B is network equipment of a UMTS Terrestrial Radio Access Network (UTRAN). The Node-B is managed and operated by a licensed wireless system provider. The Node-B of the licensed wireless system has to provide service to many more users than the
HNB 305 and must do so without loss of connectivity over vast regions (e.g., states and countries). Accordingly, the licensed wireless service provider deploys several Node-Bs that are adjacent to one another in order to create an uninterrupted region of coverage. Conversely, an HNB service region established by a first HNB does not need to be adjacent to any other HNB service region and need not offer uninterrupted service between HNB service regions. - In some embodiments, the
HNB 305 is user hosted as opposed to the Node-B that is hosted by the licensed wireless system. A user hosted HNB allows a user to specify the location of the HNB, provide the connectivity between HNB and the HNB network or HNB-GW (e.g., the broadband connection), control operation of the HNB, for example, by providing power to the HNB, or manage the HNB by modifying configuration parameters of the HNB. All such control over the Node-B is tightly managed by the licensed wireless system provider. In other words, the HNB is customer premise equipment (CPE) that a user is able to purchase from an electronics store or from the HNB-AN provider, whereas the Node-B is network equipment that is impractical for a single user to purchase, operate, and maintain. - Additionally, a key characteristic of the HNB architecture of some embodiments is that there are no permanent pre-configured peer adjacencies between HNB and HNB-GW. Instead, there are ad-hoc adjacencies that are initiated from the HNB (as it is usually behind a NAT/firewall, and does not have a permanent IP address in the carrier network). The HNB system therefore offers flexibility in deploying service. The HNBs of an HNB system may be deployed on an ad hoc basis as opposed to the regimented deployment structure of the licensed wireless system.
- Accordingly, in some embodiments, the
HNB 305 supports enhancements for operating in an ad-hoc environment and the Node-B does not. The ad hoc system allows for individual users to establish HNB service regions based on each user's needs. In some embodiments, each user purchases an HNB and each of the HNBs may be purchased from different vendors with different HNB implementations. In this manner, the ad hoc HNB system creates several individual local coverage areas based on user deployment of each HNB whereas the licensed wireless system deploys its Node-Bs in an effort to provide regional coverage area that is uninterrupted across large areas (e.g., hundreds of miles). - It should be apparent to one of ordinary skill in the art that in some embodiments the HNB system provider deploys the HNBs rather than the users. In some such embodiments, the system remains ad hoc by virtue of the discontinuous nature of the separate and local HNB service regions. Additionally, in some such embodiments, the HNBs remain user hosted since power and broadband connectivity is provided by the user even though the system provider more closely regulates the HNB equipment that is deployed.
- The ad hoc nature of the HNB system also allows the system to grow and shrink as its user base grows and shrinks. For example, whenever a new user desires to utilize the HNB service, the user purchases and hosts a HNB at a home or office location. The user hosted HNB provides the user with a HNB-AN service region from which the user access HNB system services. Conversely, the licensed wireless system provider must first deploy several Node-Bs in order to provide extensive large scale regional coverage. Once the service regions are established at great expense to the licensed wireless system provider, users then activate service with the licensed wireless system provider. Accordingly, the HNB system is an unplanned system whereas the licensed wireless system is a planned system. In other words, the HNB system does not need an existing access point infrastructure in order to operate. Rather, the infrastructure is unplanned whereby the infrastructure is built upon with every new user that is added to the system. This is opposite to the planned licensed wireless system. The licensed wireless system requires that there be an existing infrastructure before new users can be added. The infrastructure of the licensed wireless system is planned in the sense that the infrastructure is built first in a particular region and then the service is marketed to that region after the infrastructure is built.
- The
HNB 305 also differs from generic access points used in UMA systems. Specifically, in a UMA system the access points act as transparent base stations. In other words, the user equipment and the network controller directly communicate. In the HNB system, however, theHNB 305 includes various Radio Network Controller (RNC) functionality. In some such embodiments, theHNB 305 initiates various messaging procedures and maintains state information regarding user equipment operating within the service region associated with theHNB 305. TheHNB 305 is equipped with either a standard 3 G Universal Subscriber Identity Module (USIM) or a 2 G SIM. The (U)SIM provides theHNB 305 with a unique subscriber identity and allows theHNB 305 to utilize the existing subscriber management infrastructure of an operator. It should be apparent to one of ordinary skill in the art that some embodiments of the HNB system utilize a different identification mechanism for the HNB than the (U)SIM. For example, the HNB identity of some embodiments is based on Media Access Control (MAC) address of the HNB or any other globally unique identifier such as the combination of vendor identity and serial number from that vendor. - The access points of some embodiments include circuits for receiving, transmitting, generating, and processing the various messages that cause various physical transformations within the HNB-AN, core network, and licensed wireless radio access network. In some embodiments, the circuits of the access points include a processor, memory, receiver, and transceiver. In some embodiments, the receiver and/or the transceiver are wireless interfaces that operate using short range licensed wireless frequencies. In some other embodiments, the receiver and/or the transceiver are wired interfaces (e.g., DSL, cable, etc.). These circuits perform various physical transformations on the access point as well as other elements within the HNB-AN, licensed wireless radio access network, and core network. For example, the processor in conjunction with the memory generate a paging message that when sent to a UE using the transceiver causes the UE to prompt the user of an incoming call. As another example, the access point registers a UE by generating a registration message that is sent to the network controller using the transceiver when the access point detects that the UE has camped on the service region of the access point based on a location update message received by the access point on its receiver. These and other physical components of the access points of some embodiments are described with further detail in
FIG. 64 below. - It should be apparent to one of ordinary skill in the art that the HNB is one implementation of an access point that operates using short range licensed wireless frequencies. Some embodiments allow for any access point that operates using short range licensed wireless frequencies to be used in place of or in conjunction with the HNBs. For example, a Femtocell access point is a different implementation of an access point that provides short range licensed wireless frequencies in order to establish a service region of a Femtocell system that is similar to the HNB system described in relation to some embodiments of the invention.
- C. Broadband IP Network
- The
HNB 305 provides radio access network connectivity for theUE 310. TheHNB 305 then communicatively couples the UE to the HNB-GW 315 using the Iuh interface that exists between theHNB 305 and the HNB-GW 315. As shown inFIG. 3 , the Iuh interface is established over a broadband Internet Protocol (IP)network 320 where, in some embodiments, a customer's broadband connection is utilized. Thebroadband IP Network 320 represents all the elements that collectively, support IP connectivity between the HNB-GW 315 and theHNB 305. TheIP network 320 is assumed to be an untrusted public IP network without any Asynchronous Transfer Mode (ATM) or Signaling System 7 (SS7) infrastructure. - In some embodiments, the
broadband IP network 320 includes (1) other Customer premise equipment (e.g., Digital Subscriber Line (DSL)/cable modem, Wireless Local Area Network (WLAN) switch, residential gateways/routers, switches, hubs, WLAN access points), (2) network systems specific to the broadband access technology (e.g., DSL Access Multiplexer (DSLAM) or Cable Modem Termination System (CMTS)), (3) Internet Service Provider (ISP) IP network systems (edge routers, core routers, firewalls), (4) wireless service provider (WSP) IP network systems (edge routers, core routers, firewalls) and Network address translation (NAT) functions, either standalone or integrated into one or more of the above systems. - D. HNB-GW
- The HNB-
GW 315 is a network controller that provides network connectivity of theHNB 305 to the existing core network (CN) 335. The HNB-GW 315 entity appears as a legacy RNC to the existingCN 335. Specifically, the HNB-GW 315 uses existing Iu interfaces (e.g., Iu-cs and Iu-ps) for CN connectivity. In this manner, the HNB system may be integrated into the existingCN 335 with no change to theCN 335. This allows licensed wireless system providers the ability to provide HNB system functionality to their users with no change to their existing network. - As noted above, the HNB-
GW 315 connects to theHNB 305 using the Iuh interface. Additional interfaces of the HNB-GW 315 include the Iu-pc interface to the Service Mobile Location Center (SMLC) 340, the Iu-bc interface to the Cell Broadcast Center (CBC) 345, the Wm interface to the Authorization, Authentication, and Accounting (AAA)server 355, and an interface that is based on the 3GPP TR-069 family of standards, as specified by the DSL Forum technical specifications, to theHNB management system 330. In some embodiments, the interface to theHNB management system 330 is the Iuhm interface. In some such embodiments, the Iuhm interface carries information related to customer premise equipment (CPE) device management functionality between the HNB and HNB Mgmt System. It should be apparent to one of ordinary skill in the art that other interfaces may be used instead of or in addition to the above enumerated interfaces. - In some embodiments, the HNB-
GW 315 connects to several different HNBs and services each of the corresponding service regions of each of the several HNBs. In this manner, a single HNB-GW, such as the HNB-GW 315, communicatively couples multiple HNB service regions to theCN 335. Accordingly, the HNB-GW 315 provides call management functionality, mobility management functionality, security functionality, etc. as will be described in greater detail below. The HNB-GW 315 also performs key functionalities, such as the management of the legacy UTRAN identifiers (Location Area Identifiers (LAI), Service Area Identifiers (SAI), RND-Id, etc.) towards theCN 335, and Iuh interface management. - In some embodiments, the HNB-
GW 315 includes various software module sub-components and/or various hardware module sub-components that perform some of the above mentioned functionality. For example, the Security Gateway (SeGW) 325 is a logical entity within the HNB-GW 315. TheSeGW 325 provides the security functions including termination of secure access tunnels from theHNB 305, mutual authentication, encryption and data integrity for signaling, voice and data traffic. - The
HNB Management System 330 provides centralized Customer Premise Equipment (CPE) device management for theHNB 305 and communicates with theHNB 305 via the security gateway logical entity. This system is used to manage a large number of HNBs including configuration, failure management, diagnostics, monitoring and software upgrades. In some embodiments, theHNB Management System 330 utilizes existing CPE device management techniques such as those described in the DSL Forum technical specifications TR-069. - The network controller of some embodiments includes circuits for receiving, transmitting, generating, and processing the various messages that cause various physical transformations within the HNB-AN, core network, and licensed wireless radio access network. In some embodiments, the circuits of the network controller include a processor, memory, receiver, and transceiver. These circuits perform various physical transformations on the network controller as well as other elements within the HNB-AN, licensed wireless radio access network, and core network. For example, the processor in conjunction with the memory generate context identifiers that when sent to a UE using the transceiver provide the UE with a unique identifier when operating within the HNB-AN. These and other physical components of the network controller of some embodiments are described with further detail in
FIG. 64 below. - E. Core Network (CN) and Other Network Elements
- As mentioned above, the HNB-
GW 315 provides network connectivity of theHNB 305 to the existingCN 335. TheCN 335 includes one or more HLRs 360 andAAA servers 355 for subscriber authentication and authorization. Once authorized, the UE may access the voice and data services of theCN 335 through the HNB system. To provide such services, theCN 335 includes a Mobile Switching Center (MSC) 365 to provide circuit switched services (i.e., voice). The CN also includes a Serving GPRS Support Node (SGSN) 370 to provide packet switched services. Though not shown inFIG. 3 , the SGSN operates in a conjunction with a Gateway GPRS Support Node (GGSN) in order to provide the packet switched services. - The
SGSN 370 is typically responsible for delivering data packets from and to the GGSN and the UE within the geographical service area of theSGSN 370. Additionally, theSGSN 370 may perform functionality such as mobility management, storing user profiles, and storing location information. However, the actual interface from theCN 335 to various external data packet services networks (e.g., public Internet) is facilitated by the GGSN. As the data packets originating from the UE typically are not structured in the format with which to access the external data networks, it is the role of the GGSN to act as the gateway into such packet services networks. In this manner, the GGSN provides addressing for data packets passing to and from the UE and the external packet services networks (not shown). Moreover, as the user equipment of a licensed wireless network traverses multiple service regions and thus multiple SGSNs, it is the role of the GGSN to provide a static gateway into the external data networks. - Location services are provided by the
SMLC 340. TheCBC 345 provides support for cell broadcast services. - These and other elements of the
CN 335 are primarily intended for use with the licensed wireless systems. In the description below, the licensed wireless system will be described with reference to the UTRAN of a UMTS. However, it should be apparent to one of ordinary skill in the art that any licensed wireless system, such as a GSM/EDGE Radio Access Network (GERAN) may be used to reference the licensed wireless system. - Elements common to a UTRAN based cellular network include multiple base stations referred to as Node-Bs that facilitate wireless communication services for various UE via respective licensed radio links (e.g., radio links employing radio frequencies within a licensed bandwidth). The licensed wireless channel may comprise any licensed wireless service having a defined UTRAN or GERAN interface protocol (e.g., Iu-cs and Iu-ps interfaces for UTRAN or A and Gb interfaces for GERAN) for a voice/data network. The
UTRAN 385 typically includes at least one Node-B 380 and a Radio Network Controller (RNC) 375 for managing the set of Node-Bs. Typically, the multiple Node-Bs are configured in a cellular configuration (one per each cell) that covers a wide service area. A licensed wireless cell is sometimes referred to as a macro cell which is a logical term used to reference, e.g., the UMTS radio cell (i.e., 3 G cell) under Node-B/RNC which is used to provide coverage typically in the range of tens of kilometers. Also, the UTRAN or GERAN is sometimes referred to as a macro network. - Each RNC communicates with components of the core network through the above described standard radio network controller interface such as the Iu-cs and Iu-ps interfaces. For example, a RNC communicates with MSC via the UTRAN Iu-cs interface for circuit switched services. Additionally, the RNC communicates with SGSN via the UTRAN Iu-ps interface for packet switched services through GGSN. It is through the use of these standardized network interfaces that the HNB system, more particularly the HNB-GW, may be seamlessly integrated to leverage services of the CN and emulate functionality of a legacy RNC of the licensed wireless system.
- Functionality provided by each of the HNB and the HNB-GW are defined within various protocol stacks. In some embodiments, the protocol stacks include software layers that are stored to the memory of the HNB and HNB-GW and that are executed by a processing unit of the HNB and HNB-GW. In some embodiments, the protocol stacks are implemented as hardware modules within the HNB and HNB-GW. Additional hardware components of the HNB and HNB-GW are described below in Section XII, “Computer System”.
- In some embodiments, the HNB system separates management functions from control plane functions into two separate protocol stacks. The HNB Application Part (HNBAP) protocol architecture implements the management functions for the HNB system and the RANAP User Adaptation (RUA) protocol architecture implements the control functions for the HNB system. As will be described below, additional protocol architectures are specified for providing other functionality such as user plane functionality. However, it should be apparent to one of ordinary skill in the art that other protocol architectures may be integrated into the components of the HNB system and that the functionality of each of the protocol architectures is scalable to provide more or less functionality than described below.
- 1. HNB Application Part (HNBAP) Protocol Architecture
- As noted above, the HNBAP protocol architecture supports management functions between the HNB and HNB-GW including, but not limited to, the management of the underlying transport (i.e., the SCTP connection), HNB-GW discovery, and HNB and UE registration procedures.
FIG. 5 illustrates the HNBAP protocol architecture in accordance with some embodiments. This figure illustrates (1)HNB 505, (2) HNB-GW 515, and (3) HNBAP protocol stacks of each of theHNB 505 and the HNB-GW 515. The HNBAP protocol stacks include (1) access layers 510, (2)transport IP layer 520, (3) IP Security (IPSec)ESP layer 525, (4)remote IP layer 540, (5) Stream Control Transmission Protocol layer (SCTP) 530, and (6) aHNBAP protocol layer 545. - The
underlying Access Layers 510 and “Transport IP” layer 520 (i.e., the “outer” IP layer associated with IPSec tunnel mode) provide the generic connectivity between theHNB 505 and the HNB-GW 515. TheIPSec layer 525 operates in tunnel mode and provides encryption and data integrity for communications and data that are passed using the upper layers (530, 540, and 545). -
SCTP 530 provides reliable transport between theHNB 505 and the HNB-GW 515.SCTP 530 is transported using the “Remote IP” layer 540 (i.e., the “inner” IP layer associated with IPSec tunnel mode). In some embodiments, theSCTP 530 establishes a single SCTP association between theHNB 505 and HNB-GW 515. The same SCTP association is used for the transport of both the HNBAP messages as well as the RANAP messages (using RUA protocol), described in further detail below, over theIuh interface 535. The SCTP Payload Protocol Identifier (PPI) value is used to identify the protocol being transported in the SCTP data chunk (e.g., HNBAP or RUA). The PPI value used for HNBAP transport is coordinated between theHNB 505 and the HNB-GW 515 (e.g., the HNBAP PPI value should be registered with the Internet Assigned Numbers Authority (IANA)). Each SCTP association contains a number of “streams” which are used to support multiple flows across the Iuh interface. In some embodiments, a dedicated SCTP stream (i.e., stream id 0 of the underlying SCTP transport association) is used for the transport of HNBAP messages across the Iuh interface. - It should be apparent to one of ordinary skill in the art that other reliable transport protocol layers may be used instead of
SCTP 530 to facilitate reliable transport of communications and data between theHNB 505 and the HNB-GW 515. For example, some embodiments use the Transmission Control Protocol (TCP) for reliably transporting messages between theHNB 505 and the HNB-GW 515. - In some embodiments, the
HNBAP protocol 545 provides a resource management layer or equivalent functional layer capable of discovery of the serving HNB-GW, registration of the HNB and UE with the HNB-GW, registration updates with the HNB-GW, and support for the identification of the HNB being used for HNB access. It should be apparent to one of ordinary skill in the art that the HNBAP protocol layer of some embodiments implements additional resource management functionality and that the above enumerated list is an exemplary set of such functionality. In some embodiments, theHNBAP protocol 545 utilizes different message formats and utilizes a different set of procedures than the resource management layers of the 3GPP and UMA systems in order to implement the resource management layer of the HNB system. - 2. HNB Control Plane Architecture (RUA)
- After performing the management functions defined by the HNBAP protocol, the HNB and HNB-GW utilize a different protocol architecture that specifies the control plane in the HNB system.
FIG. 6 illustrates the protocol architecture in support of the HNB control plane (i.e., for both the CS and PS domain) in accordance with some embodiments. -
FIG. 6 includes (1)HNB 605, (2) HNB-GW 615, (3)CN 640, (4)UE 650, and (5) control plane protocol stacks of each of theHNB 605, the HNB-GW 615, theCN 640, and theUE 650. The control plane protocol stacks of theHNB 605 and the HNB-GW 615 include (1) access layers 610, (2)transport IP layer 620, (3)IPSec layer 625, (4)remote IP layer 640, (5)SCTP 630, (6) RANAP user adaptation (RUA)layer 635, and (7) interworking functionality (IWF) 645. The control plane protocol stack of theCN 640 includes signaling transport layers defined according to the 3GPP technical specification TS 25.412, “UTRAN Iu Interface Signaling Transport”, herein incorporated by reference, a RANAP layer, and a Non Access Stratum (NAS)layer 665 that performs various call management, mobility management, General Packet Radio Service (GPRS) mobility management and session management, and short message services (SMS). The control plane protocol stack of theUE 650 includes alayer 1 signaling transport layer, a Media Access Control (MAC) layer, a Radio Link Control (RLC) layer, a Radio Resource Control (RRC) layer, and theNAS layer 665. - As described above, the
underlying Access Layers 610 and “Transport IP”layer 620 provide the generic connectivity between theHNB 605 and the HNB-GW 615. TheIPSec layer 625 provides encryption and data integrity for communications and data that are passed using the upper layers.SCTP 630 provides reliable transport for the RANAP User Adaptation (RUA)layer 635 between theHNB 605 and the HNB-GW 615. - The RANAP protocol is used for CS/PS signaling between the
HNB 605 and theCN 640. RANAP, as is well known in the art, is an established protocol used for UMTS signaling between the CN and the UTRAN of a licensed wireless radio access network. Accordingly, the use of RANAP messages within the control plane of the HNB system, allows for the HNB system to support many of the UTRAN functions in the HNB system. These functions include: Radio Access Bearer (RAB) management, Radio Resource Management (RRM), Iu link management, Iu U-plane (RNL) management, mobility management, security, service and network access, and Iu coordination. - The HNB-
GW 615 relays the RANAP messages between theHNB 605 and theCN 640. In some embodiments, the HNB-GW 615 terminates and re-originates some RANAP messages. For example, the HNB-GW 615 terminates and re-originates connection-less RANAP messages. - To perform the transparent transfer of RANAP messages, the HNB control plane protocol stacks of the
HNB 605 and the HNB-GW 615 include theRUA layer 635. TheRUA layer 635 provides a lightweight mechanism to transportRANAP messages 660 and control functions between theHNB 605 and the HNB-GW 615. Specifically, theRUA layer 635 encapsulates theRANAP messages 660 in an RUA layer header for transport between theHNB 605 and the HNB-GW 615. Therefore, through the use of theRUA 635 layer, no changes are made to the RANAP message definitions. Rather, all necessary changes are contained in the RUA header. - It should be apparent to one of ordinary skill in the art to reference the RUA layer with other terminologies such as RANAP Adaptation Layer (RAL) or RANAP Transport Adaptation (RTA), etc. However, the key function of this adaptation layer is to provide the functionality, over the Iuh interface, of transferring RANAP messages as defined in the 3GPP technical specification TS 25.413 entitled “UTRAN Iu interface Radio Access Network Application Part (RANAP) signaling” which is incorporated herein by reference, and will be referred to as TS 25.413.
- Through the RUA header and the encapsulation of the RANAP message, the RUA adaptation layer of some embodiments enables: (1) transport of RANAP messages using SCTP over the Iuh interface between the HNB and HNB-GW, (2) support for associating and identifying UE specific logical connections (i.e., identifying the RANAP messages belonging to a specific UE via the concept of UE context identifiers), (3) support for routing the establishment of a signaling connection to a CN node within a CN domain (i.e., support for Iu-flex at the HNB-GW), (4) support for indicating the cause for establishing the UE specific logical connection (e.g., for emergency session establishment, etc.), (5) providing a mechanism to transparently relay the RANAP messages from the HNB to CN without the need to decode the encapsulated RANAP message, and (6) support for the indication of service domain (CS or PS) for the RANAP messaging.
- The
RUA layer 635 minimizes the decoding and processing ofRANAP messages 660 at the HNB-GW 615. Specifically, the HNB-GW 615, in many instances, no longer must decode and process theRANAP message 660. Instead, the HNB-GW 615 processes information within the RUA header information in order to determine a destination within the core network to receive aRANAP message 660 sent from a UE operating from a HNB service region communicatively coupled by the HNB-GW 615. TheRUA layer 635 also eliminates the need for the HNB-GW 615 to process and decode theNAS layer 665. - In some embodiments, the
RUA layer 635 does not duplicate existing RANAP procedures. Accordingly, RUA procedures are minimized. As will be described in further detail below, the HNB control plane protocol architecture of some embodiments simplifies context-ID allocation and associated functional overhead. - The
RUA 635 utilizes the same underlying transport (i.e., SCTP connection) as HNBAP. It should be apparent to one of ordinary skill in the art that it is also possible to use TCP as a reliable transport layer instead of SCTP. The SCTP PPI value used for RUA transport is coordinated between theHNB 605 and the HNB-GW 615 (e.g., the RUA PPI value should be registered with IANA). - In some embodiments, a dedicated SCTP stream (e.g., stream id 0 of the underlying SCTP transport association) is used for the transport of
connectionless RANAP messages 660 between theHNB 605 and the HNB-GW 615. For the connection oriented messages, the number of SCTP streams to be established at SCTP connection setup and the mapping of UE transactions to the specific SCTP streams is an implementation choice. The use of UE Context-Id allows multiple UE transactions to be multiplexed over the same SCTP stream. - The Inter-working Functionality (IWF) 645 in the HNB-
GW 615 switches theRANAP messages 660 between the Iuh interface and the corresponding domain specific (CS/PS) Iu interface. It should be noted that theIWF 645 is a logical entity in the RUA protocol stack. As mentioned above, someRANAP messages 660 are terminated and re-originated in the HNB-GW 615 (e.g., connection-less RANAP messages) and some are modified in the HNB-GW 615 to adapt to the underlying transport towards the CN 640 (e.g., when using ATM interfaces towards the CN 640). Additionally, NAS protocol messages 655 (e.g., CC/MM/SMS, etc) are carried transparently between theUE 650 and theCN 640. - In some embodiments, the relay of
RANAP messages 660 between theHNB 605 and the CN by the HNB-GW 615 is achieved using a direct transfer mechanism over the Iuh interface. This direct transfer mechanism involves encapsulation of theRANAP messages 660 in a DIRECT TRANSFER message exchanged between theHNB 605 and HNB-GW 615 over the Iuh interface. In some embodiments, this message is referred to as a RUA DIRECT TRANSFER message. In some embodiments, this message is referred to as a HNBAP DIRECT TRANSFER message. In some embodiments, the direct transfer mechanism is used to relay messages from CBC (Iu-bc) (not shown) and SMLC (Iu-pc) (not shown) toHNB 605 and vice-versa via the HNB-GW 615. - The architecture of
FIG. 6 also supports transfer of the RANAP “Initial UE Message” and support for Iu-flex. Iu-flex functionality is defined in 3GPP TS 23.236, “Intra-Domain Connection of Radio Access Network (RAN) nodes to multiple Core Network (CN) nodes”, hereinafter, TS 23.236, with additional functionality such as messaging, etc., described in TS 25.331. Specifically, Iu-flex covers details for the Intra Domain Connection of RAN Nodes to Multiple CN Nodes for GSM and UMTS systems. The first RANAP message (i.e., the RANAP “Initial UE Message”) is carried from theHNB 605 in the INITIAL DIRECT TRANSFER message over the Iuh interface as is described below with reference toFIG. 7 . The INITIAL DIRECT TRANSFER message also carries information used to route the establishment of a signaling connection from HNB-GW 615 to a CN node within a CN domain (i.e. support for Iu-flex). - Many of the common or connection-less RANAP messages are terminated and processed in the HNB-
GW 615. When there is a need to relay specific connectionless message (e.g. Paging), then the DIRECT TRANSFER message is used to relay the specific connection-less message. - In some embodiments, the direct transfer mechanism for relaying RANAP messages provides a single protocol over the Iuh interface (i.e., clean architecture) whereby a single interface between HNB and HNB-GW functional entity is used. The direct transfer mechanism of some embodiments eliminates changes to the RANAP specifications for use over the Iuh interface. If RANAP were to be used directly over the Iuh interface, then all the specifications which reference RANAP would need to be updated to describe the applicability of existing RANAP messages between the two new nodes (e.g., HNB and the HNB-GW). In some embodiments, the direct transfer mechanism eliminates the need for “RNC-ID” and “Iu signaling connection identifier” attributes on a per HNB basis, carried in the RANAP messages. The “RNC-ID” and “Iu-signaling connection identifier” carried in the downlink RANAP messages are processed by the HNB-GW and can be ignored by the HNB. Similarly, in the uplink RANAP messages, the usage of the RNC-ID and Iu signaling connection identifier attributes can be implementation specific with no impact on the Iuh interface. Additionally, by carrying the RANAP messages in a container, the overhead (management and runtime) of the underlying transport layers of RANAP such as SCCP/M3UA are eliminated as well.
- a. INITIAL DIRECT TRANSFER Message
- In some embodiments, the HNB sends a message to the HNB-GW to transfer the RANAP “Initial UE Message” from the HNB to the indicated core network domain. Specifically, the message explicitly indicates the start of a communication session and the message contains parameters used to route the establishment of a signaling connection from the HNB-GW to a CN node within a CN domain when no signaling connection exists
- In some embodiments, this message is an INITIAL DIRECT TRANSFER message.
FIG. 7 illustrates INITIAL DIRECT TRANSFER message content, in some embodiments. The INITIAL DIRECT TRANSFER message includes the following information elements (IEs): length indicator, protocol discriminator, message identity, CN Domain Identity, Intra Domain Non Access Stratum (NAS) Node Selector (IDNNS), and an encapsulated RANAP message. The CN Domain Identity information element indicates the CN domain with which to establish the signaling connection. The IDNNS information element is used by the HNB-GW to route the establishment of a signaling connection to a core network node within the indicated core network domain. By using this explicit message, the HNB-GW is explicitly notified of impending signaling connection without having to process the contents of the message. - In
FIGS. 7-9 , the presence field indicates whether the information element is (1) mandatory (M) where the message is erroneous if the mandatory information element is missing, (2) conditional (C) where the presence of the information element depends on a value of a different information element, or (3) optional (O) where the presence of the information element is the choice of the sender. Additionally, the format field indicates how the message is formatted. Type only (T) or Type and value (TV) indicates that the information element is of fixed length and an information element identifier is included. Value only (V) indicates that the information element is of fixed length but no information element identifier is included. Length and value (LV) indicates that the information element is of variable length, an information element identifier is not included, and a length indicator is included. Type, length, and value (TLV) indicates that the information element is of variable length and that an information element identifier and a length indicator are included. - b. UPLINK DIRECT TRANSFER Message
- In some embodiments, the HNB sends a message to the HNB-GW to transfer a subsequent (i.e., other than the initial RANAP message) RANAP message from the HNB to the indicated core network domain. In some embodiments, this message is an UPLINK DIRECT TRANSFER message.
FIG. 8 illustrates an UPLINK DIRECT TRANSFER message content, in some embodiments. As shown, the UPLINK DIRECT TRANSFER message includes a length indicator, protocol discriminator, message identity, CN Domain Identity, and RANAP message information elements. - c. DOWNLINK DIRECT TRANSFER Message
- In some embodiments, the HNB-GW sends a message to the HNB to transfer a RANAP message from the indicated core network domain to the HNB. In some embodiments, this message is a DOWNLINK DIRECT TRANSFER message.
FIG. 9 illustrates a DOWNLINK DIRECT TRANSFER message content, in some embodiments. As shown, the DOWNLINK DIRECT TRANSFER message includes a length indicator, protocol discriminator, message identity, CN Domain Identity, and RANAP message information elements. - In some embodiments, functionalities of the DOWNLINK DIRECT TRANSFER message and the UPLINK DIRECT TRANSFER message are carried by one message. In some embodiments, this message is referred to as a DIRECT TRANSFER message.
- It should be apparent to one of ordinary skill in the art that any nomenclature may be used to represent the messages implemented by some embodiments and described above with reference to
FIGS. 7-9 . For example, in some embodiments, the INITIAL DIRECT TRANSFER message is referred to as a CONNECT message. - d. Adaptation Layer
- As noted above, the transfer mechanism(s) involves encapsulation of the RANAP messages with additional header information. This additional header provides sufficient information to the HNB and HNB-GW for distinguishing and associating specific UE messages. The additional header also provides information used to route the establishment of a signaling connection from HNB-GW to a CN node within a CN domain (i.e. support for Iu-flex).
-
FIG. 10 illustrates an applicable Protocol Data Unit (PDU) structure for the transport of RANAP, in some embodiments. As shown, thePDU 1000 includes an Iuh RANAP Header 1005 (i.e. the adaptation layer) and the RANAP Message 1010 (the latter ASN.1 formatted per TS 25.413). The PDU formats described are not indicative of particular byte ordering (which may vary based on the underlying transport (e.g., word-aligned for SCTP based transport)), but rather indicate the information included for those particular PDUs. The details for the adaptation layer (i.e., Iuh RANAP header 1005) can have various implementations based on the mechanism utilized to negotiate the header information. -
FIG. 11 illustrates an alternative PDU/RUA Adaptation Layer Structure of some embodiments. As shown, thePDU 1100 includes theRUA Header 1105 and thePayload Data 1110 where the latter includes either the RANAP Message to be transferred or an error indication message. - The
RUA header 1105 provides sufficient information for the HNB and HNB-GW to distinguish and associate messages to a specific UE. TheRUA header 1105 also provides information used to route the establishment of a signaling connection from the HNB-GW to a CN node within a CN domain (i.e. support for Iu-flex). The HNB-GW performs the NAS Node Selection Function (NNSF) as described in the 3GPP technical specification TS 23.236 entitled “Intra-domain connection of Radio Access Network (RAN) nodes to multiple Core Network (CN) nodes”, hereinafter incorporated by reference and referred to as TS 23.236. and utilizes the Intra Domain NAS Node Selector (IDNNS) information provided in the adaptation layer. The adaptation layer also provides a means for the HNB or HNB-GW to indicate abnormal conditions during message exchange. - Some embodiments transport RANAP messages over the Iuh interface via: (1) RANAP over SCCP; (2) RANAP over SCTP with UEs identified by use of PPI; and, (3) RANAP over SCTP with an adaptation layer. However, it should be apparent to one of ordinary skill in the art that various other mechanisms may be used by some embodiments to transport RANAP messages over the Iuh interface.
- i. RUA Header Structure
-
FIG. 12 illustrates the details of the RUA Header structure, in some embodiments. This figure includes thePDU 1200 with the following fields (1)Version 1205, (2)Payload Type 1210, (3)Reserved 1215, (4)CN Domain ID 1220, (5)UE Context ID 1225, (6)RANAP Procedure Code 1230, (7) InitialUE Message Cause 1235, (8) InitialUE Message IDNNS 1240, and (9)Payload Data 1245. -
Version 1205 is 8 bits in some embodiments and identifies the version of the RUA header.Payload Type 1210 is 8 bits in some embodiments, (with values that can range from 0-255) and identifies the type of information contained in thePayload Data 1245. The following table gives sample values and corresponding descriptions in some embodiments. -
TABLE 1 Sample Payload Type Values and Corresponding Descriptions Payload Type Description References 0 RANAP, RANAP message TS 25.413 1 Error Indication Shown in FIG. 13 2-255 Reserved - Reserved
field 1215 is 16 bits in some embodiments, and is used as a placeholder here.UE Context ID 1225 is 24 bits in some embodiments, and indicates the locally unique identifier allocated by the HNB-GW for a particular UE.CN Domain ID 1220 is 8 bits in some embodiments and indicates “CS Domain” or “PS Domain”.RANAP Procedure Code 1230 is 8 bits in some embodiments, and is conditionally present if thePayload Type 1210 is set to RANAP and contains the Procedure Code value from TS 25.413. InitialUE Message IDNNS 1240 is 16 bits in some embodiments, and is conditionally present if thePayload Type 1210 is set to RANAP. InitialUE Message Cause 1235 is 8 bits in some embodiments, and is conditionally present if thePayload Type 1210 is set to RANAP.Payload Data 1245 is of a variable length in some embodiments, and indicates the actual information to be transferred in thePDU 1200. The usage and format of this field is dependent on thePayload Type 1210. If thePayload Type 1210 is RANAP, then thePayload Data 1245 contains a RANAP message which is ASN.1 formatted per TS 25.413. -
FIG. 13 illustrates a PDU Error Indication message, in some embodiments. ThisError Indication message 1300 may be used by either HNB or HNB-GW to indicate abnormal conditions during message exchanges.Error Cause 1305 is 8 bits in some embodiments, and identifies the cause for the error indication message. In some embodiments, the following values could be defined: 1=Unknown UE Context Identifier; 2=SCCP Connection Establishment Failed; other values could be assigned later. -
FIG. 14 illustrates a RANAP message transfer using adaptation layer, in some embodiments. As shown, all message exchanges between the HNB and the HNB-GW contain the RUA header where the RUA header includes various parameters in addition to an encapsulated RANAP message that is either received from the UE or from the MSC of the CN. -
FIG. 15 illustrates handling of abnormal conditions over the Iuh interface, in some embodiments. In this figure, the RUA header is used by the HNB-GW to notify (at step 6) the HNB of a failure to establish a SCCP connection. As a result, the RRC connection between the HNB and the UE is released (at step 7). - ii. Mechanisms for Signaling the Adaptation Layer Information
- In some embodiments, UE Context Identifiers (Ids) are allocated so as to uniquely identify the UE over the Iuh interface within the HNB and HNB-GW. When the HNB receives the UE Context Id (as allocated by the HNB-GW) it stores it for the duration of the UE-associated logical Iuh connection for this UE. Once known to the HNB and HNB-GW, this information is included in all the UE associated signaling (for uplink as well as downlink direction). In some embodiments, the UE context identifiers are provided in the Iuh header (i.e. adaptation layer). However, there can be various mechanisms for indicating this information within the Iuh header.
- Some embodiments utilize the HNBAP procedures for explicit setup and release of the UE context identifiers while some other embodiments utilize the RANAP procedures for setup and release of the UE context identifiers utilizing either (a) an implicit mechanism using existing RANAP procedures with additional header information, or (b) an explicit mechanism using new RANAP procedures. Some embodiments use an adaptation layer protocol (such as. RANAP-H) for transporting RANAP over the Iuh interface via explicit mechanisms for setup and release. An implicit mechanism using existing RANAP procedures with additional header information is utilized under normal conditions. For abnormal conditions (such as errors in the HNB or HNB-GW), an explicit release of UE context identifiers can be indicated via the use of HNBAP or RANAP or RANAP-H protocols.
- 3. Iu-cs Transport Network Control Plane Architecture
- Some embodiments communicatively couple the HNB-GW to the CN over an ATM based Iu-cs interface. Separate transport network control signaling is used in some such embodiments.
FIG. 16 illustrates the CS domain transport network control signaling (using Access Link Control Application Part (ALCAP)) over the ATM-based Iu-cs interface in accordance with some embodiments of the invention. Atop the physical layer is theATM layer 1605. The Service Specific Connection Oriented Protocol (SSCOP)layer 1610 is responsible for providing mechanisms for the establishment, release and monitoring of signaling information exchanged between peer signaling entities. The service-specific coordination function Network to Node Interface (SSCF-NNI)layer 1615 receives the SS7 signaling of aLayer 3 and maps it to the SSCOP, and vice versa. The SSCF-NNI performs coordination between the higher and the lower layers. Within UTRAN, MessageTransfer Part Level 3 for Broadband (MTP3b)layer 1620 has thehigher Layer 3, which requires service from the SSCOP-NNI. The control signaling further includes ATM Adaption Layer 2 (AAL2)signaling transport 1625 conversion functionality and connection signaling layers 1630. These protocol layers formulate ALCAP signaling protocol messages that are exchanged between the HNB-GW and MSC. Additional details on transport network control signaling may be found in 3GPP technical specification TS 25.414, “UTRAN Iu Interface Data Transport and Transport Signaling”, section 5.2.2, which is incorporated herein by reference. - 4. HNB Circuit Switched (CS) Domain—User Plane Architecture
-
FIG. 17 illustrates the protocol architecture in support of the CS domain user plane over the Iuh interface in accordance with some embodiments of the invention. This figure includes (1)HNB 1705, (2)UE 1710, (3) HNB-GW 1715, (4)MSC 1720, and (5) CS user plane protocol stacks for each of the devices. - The user plane of the
HNB 1705 and HNB-GW 1715 includes the access, transport IP, IPSec, and remote IP layers described above with reference toFIG. 5 . The protocol stacks include the User Datagram Protocol (UDP)layer 1730 to perform connectionless transfer of Real-Time Protocol (RTP)layer 1735 messages. TheHNB 1705 also includes an Iu-UP protocol layer 1725 that operates directly with theMSC 1720 of the CN. - The Iu-
UP 1725 protocol transports CS user data across the Iuh and Iu-cs interfaces. The HNB-GW 1715 provides either a transport layer conversion between IP (towards the HNB 1705) and ATM (towards the MSC 1720) or transport layer routing when IP transport is used on Iuh as well as the Iu-cs interfaces. In this manner, CS user data is carried transparently between theUE 1710 and theMSC 1720. In some embodiments, for example when IP transport is used on Iu-cs interface, theRTP 1735 and the UDP layers 1730 operate directly between the HNB and the MSC (not shown). - 5. HNB Packet Switched (PS) Domain—User Plane Architecture
-
FIG. 18 illustrates the PS Domain User Plane Protocol Architecture in accordance with some embodiments. This figure includes (1)HNB 1805, (2)UE 1810, (3) HNB-GW 1815, (4)SGSN 1825, and (5) PS user plane protocol stacks for each of the devices. - The user plane of the
HNB 1805 and HNB-GW 1815 includes the access transport IP, IPSec, and remote IP layers described above with reference toFIG. 5 . The protocol stack of theHNB 1805 also includes the User Datagram Protocol (UDP)layer 1835 to perform connectionless transfer of GPRS Tunneling Protocol (GTP) User (GTP-U) data messages. - The GTP-
U protocol 1830 operates between theHNB 1805 and theSGSN 1825, transporting the PS user data across the Iuh and Iu-ps interfaces. The HNB-GW 1815 provides either a transport layer conversion between IP (towards the HNB 1805) and ATM (towards the CN) or transport layer routing when IP transport is used on Iuh as well as the Iu-ps interfaces. PS user data is carried transparently between theUE 1810 and CN (SGSN 1825/GGSN). In an alternate embodiment (not shown in theFIG. 18 ), the GTP-U protocol from the HNB and the SGSN terminates in the HNB-GW and the HNB-GW provides interworking of GTP-U protocol between the Iuh and Iu-cs interface. - 1. System Selection
- A key feature of the HNB system is the seamless integration of the HNB functionality to existing core networks used by licensed wireless networks and also the co-existence of the HNB system with the legacy core network (e.g., UMTS and GSM) within the same or different Public Land Mobile Network (PLMN).
- As noted above, the HNB-GW seamlessly integrates with the core network by emulating RNC like functions and interfaces. Similarly, the HNB seamlessly integrates with the UEs that operate across the various licensed wireless networks by emulating the Node-B like functions. Standard UMTS UEs will thus be able to utilize both access options (Node-Bs of the licensed wireless network or HNBs of the HNB system) whichever is more optimal in the specific scenario. No change is required to the PLMN selection procedures in the NAS layers (MM and above) in the UE or to the standard cell selection mechanism of the UE. Accordingly, the HNB system supports UE rove-in for a UE that roves into a HNB service region from a licensed wireless network service region and UE rove-out for a UE that roves out of a HNB service region into a licensed wireless network service region.
- To provide such rove-in and rove-out functionality, the HNB Management System of some embodiments provides the HNB with radio parameters during the service activation or provisioning update. These radio parameters include the operating UARFCN (UMTS Absolute Radio Frequency Channel Number) and a list of primary scrambling codes for the HNB. In some embodiments, the provisioning parameters also include the list of UARFCNs/scrambling codes (SCs) associated with the neighboring macro cells of the licensed wireless network.
- The HNB then performs a neighborhood scan for the existence of macro coverage using the macro UARFCN information. If multiple macro network cells are detected in the HNB scan, the HNB selects the best suitable macro cell for the purpose of reporting it to the Serving HNB-GW during HNB registration. The HNB also stores the macro cell list to be provided as a neighbor list for the camping UEs. The HNB scans the neighborhood for the existence of other HNBs within the same PLMN. The HNB then selects an unused {UARFCN, SC} pair from the provisioned list of available pairs such that the selected {UARFCN, SC} does not conflict with any neighboring HNB's {UARFCN, SC} combination.
- In some embodiments, the HNB attempts to register with the Serving HNB-GW and includes information about the selected macro cell and other neighboring HNBs. The Serving HNB-GW uses information provided during registration to assign network operating parameters for the registering HNB such as the LAI, 3 G cell-id, service area, etc.
- In some embodiments, the Serving HNB-GW returns the network operating parameters to the registering HNB using the register accept message. In an alternate embodiment, some of the operating parameters are provided by the HNB management system using the TR-069 mechanisms. The HNB uses a combination of information obtained through the initial provisioning and registration and broadcasts appropriate system information to UEs to be able to select HNB service and camp on the HNB.
- The macro network RNCs are provisioned with the list of {UARFCN, SC} associated with HNB neighbors. Since the HNB network has to be able to scale to millions of HNBs and the deployment location cannot be controlled, the macro network RNCs are provisioned with a list of 5-10 {UARFCN, SC} combinations corresponding to the neighboring HNBs. As a result of the limitations associated with the neighbor list provisioning on the macro RNC, the HNB of some embodiments selects one of the 5-10 provisioned {UARFC, SC} pairs for its operation such that no two neighboring HNBs (determined via HNBs' scan) re-use the same pair for its operation. The macro RNC provides the HNB neighbor list information to the UEs camped on the macro network and using the specific RNC. This results in the UEs making periodic measurements on the HNB neighbor list.
- As the UE comes within the coverage area of the HNB and its signal level becomes stronger, the UE selects the HNB. In some embodiments, the UE cell-reselection (i.e., rove-in to HNB cell) can be enhanced via three possible mechanisms: (a) the HNB cell can be in a different HPLMN (equivalent PLMN list) and be selected via preferred equivalent PLMN selection. This assumes that the UE's current camped macro cell is not in the equivalent PLMN list, (b) the HNB will broadcast system information (such as Qqualmin and Qrxlevmin) so that UE prefers the HNB cell in the presence of other macro cell coverage, and (c) forced cell reselection using Hierarchical Cell Selection (HCS). Upon cell reselection and camping on the HNB cell, the UE initiates a location update since the HNB LAI is different than the LAI of the previously camped macro cell.
- 2. System Initialization Overview
-
FIG. 19 illustrates an overview of HNB initialization, discovery, and registration in accordance with some embodiments of the invention. The details for the specific procedures such as discovery and registration are described in subsequent sections. - This message exchange for system initialization occurs when a
HNB 1905 is initially powered on (at step 1). TheHNB 1905 then attempts to identify a serving HNB-GW with which to connect. To do so, theHNB 1905 first attempts to connect to a provisioning Security Gateway (SeGW) 1915. In some embodiments, the provisioning SeGW is a default gateway. TheHNB 1905 submits (atstep 2 a) a Domain Name System (DNS) query containing a Fully Qualified Domain Name (FQDN) of theprovisioning SeGW 1915. TheDNS 1910 responds (atstep 2 b) with the identification information for theprovisioning SeGW 1915. In some embodiments, theDNS 1910 responds with the IP address of theprovisioning SeGW 1915. - The
HNB 1905 connects to theprovisioning SeGW 1915 by first establishing (at step 3) a secure tunnel with theprovisioning SeGW 1915. TheHNB 1905 then performs (at step 4) an initialization procedure that includes retrieving device configuration (e.g., radio configuration). TheHNB 1905 also performs (at step 5) a radio scan of neighboring HNBs and macro cell coverage areas. - The
HNB 1905 performs (atstep 6 a) a second DNS query containing a FQDN of the provisioning HNB-GW 1920. The DNS response (atstep 6 b) identifies the IP address of the provisioning HNB-GW 1920. TheHNB 1905 then establishes (at step 7) a reliable transport session, such as a SCTP session, with the provisioning HNB-GW 1920. Once established, theHNB 1905 performs (at step 8) a discovery procedure to identify the HNB serving system that is associated with theHNB 1905. Specifically, theHNB 1905 sends (at step 8 a) a discovery request message to the provisioning HNB-GW 1920. The discovery request message includes location information of theHNB 1905 and an identity of theHNB 1905. From the supplied location information and identification information, the provisioning HNB-GW 1920 identifies the serving system for theHNB 1905. TheHNB 1905 then receives (at step 8 b) from the provisioning HNB-GW 1920 a discovery access message containing the serving HNB-GW information. TheHNB 1905 stores (at step 9) the received serving HNB-GW information. In some embodiments, the function of discovery is done using the HNB management system. - In some embodiments, the received serving HNB-GW information includes a FQDN of the serving
SeGW 1925. Accordingly, theHNB 1905 performs (at step 10) a DNS query with the serving SeGW FQDN information. TheHNB 1905 then receives (at step 11) an IP address of the servingSeGW 1925 in the DNS response. - The
HNB 1905 establishes a secure tunnel (at step 11) with the servingSeGW 1925 and submits (at step 12) a DNS query with the FQDN of the serving HNB-GW 1930. In the DNS response, theHNB 1905 receives the IP address of the serving HNB-GW 1930. At this stage, theHNB 1905 has identified the HNB-GW that is to communicatively couple the serving region of theHNB 1905 to the core network. Some embodiments perform the discovery procedure to locate the HNB-GW that is closest to the location of theHNB 1905 whereby there is less latency in the message exchanges between theHNB 1905 and the HNB-GW. Some embodiments perform the discovery procedure in order to perform load balancing on the HNB-GWs of the HNB system such that no single HNB-GW is overwhelmed by requests from the several HNBs that are communicatively coupled to that particular HNB-GW. - The
HNB 1905 establishes (at step 13) a reliable transport session with the serving HNB-GW 1930. TheHNB 1905 performs (at step 14) a registration procedure in order to gain access to the services of the HNB system through the serving HNB-GW 1930. When registration is successfully accomplished, theHNB 1905 is ready to offer service to any UEs that operate within the service region of theHNB 1905. - 1. States of the HNBAP Sub-Layer
-
FIG. 20 illustrates the possible states for the HNBAP sub-layer in the HNB of some embodiments. The HNBAP sub-layer in the HNB can be in one of two states. In some embodiments, the HNBAP-DEREGISTERED 2005 state identifies a device that has deregistered, lost its IPSec connection, or has roved out of the service region of the HNB. The HNBAP-REGISTERED 2010 state identifies a device that has successfully registered with the HNB system. The HNB contains a HNBAP sub-layer for each device it registers. Based on the type of device, the functionality of the HNBAP sub-layer can vary. - a. HNBAP Sub-Layer for Device Type HNB
- For the HNB device type, the HNBAP sub-layer is in the HNBAP-DEREGISTERED state upon power-up of the HNB. In this state, the HNB has not registered successfully with the HNB-GW. The HNB may initiate the Registration procedure when in the HNBAP-DEREGISTERED state. In some embodiments, the HNB returns to HNBAP-DEREGISTERED state on loss of SCTP or IPSec connection or on execution of the De-registration procedure. Upon transition to HNBAP-DEREGISTERED state, the HNB must trigger an implicit deregistration for all the UEs currently camped on the HNB and cease transmitting.
- In the HNBAP-REGISTERED state, the HNB is registered with the Serving HNB-GW. The HNB has an IPSec tunnel and an SCTP connection established to the Serving HNB-GW through which the HNB may exchange HNBAP signaling messages with the HNB-GW. While the HNB remains in the HNBAP-REGISTERED state, it performs application level keep-alive with the HNB-GW.
- b. HNBAP Sub-Layer for Device Type UE
- For the UE device type, the HNBAP sub-layer in the HNB (for each UE) is in the HNBAP-DEREGISTERED state upon UE rove-in. In this state, the UE has not been registered successfully (by the HNB) with the HNB-GW. The HNB initiates the Registration procedure when UE specific HNBAP sub-layer is in the HNBAP-DEREGISTERED state. The HNBAP sub-layer returns to the HNBAP-DEREGISTERED state on loss of SCTP or IPSec connection or on execution of the de-registration procedure. Upon loss of SCTP connection, HNB may attempt to re-establish the corresponding SCTP session and perform the synchronization procedure. A failure to successfully re-establish the SCTP session will result in the HNBAP layer transitioning to HNBAP-DEREGISTERED state. The HNBAP sub-layer for the UE can also transition to the HNBAP-DEREGISTERED state if the corresponding HNBAP sub-layer for the HNB device is in HNBAP-DEREGSITERED state.
- In the HNBAP-REGISTERED state, the UE has been registered successfully (by the HNB) with the Serving HNB-GW. The HNB has a shared IPSec tunnel and an SCTP connection established to the Serving HNB-GW through which the HNB exchanges HNBAP and/or RANAP signaling messages (for each registered UE) with the HNB-GW.
- In the HNBAP-REGISTERED state, the UE is camped on the HNB and may be idle, or the UE may be active in the HNB (e.g., a UTRAN RRC connection may be established).
- 2. RUA (RANAP User Adaption) Layer
- The RANAP protocol as described above with reference to
FIG. 6 is used by the HNB for CS and PS services resource management. In some embodiments, an adaptation layer is used to allow RANAP messages to be transported over the Iuh interface using SCTP. In some embodiments, the transport of RANAP using the adaptation layer utilizes a UE context identifier, UE-associated signaling, UE-associated logical Iuh connection, and/or RANAP procedure code. - In some embodiments, the HNB-GW allocates the UE context identifier to each particular UE during registration of the particular UE (using HNBAP). The UE context identifier uniquely identifies the UE over the Iuh interface within the HNB-GW for a particular domain. This implies that for a particular UE, the same context identifier can be used across two different service domains (i.e. CS and PS). When the HNB receives the UE context identifier from the HNB-GW, the HNB stores it for the duration of the UE registration. Once known to the HNB, this information is included in all the UE associated signaling (for uplink as well as downlink directions). Additionally, the UE context identifier is also utilized by the HNB and HNB-GW as the “Iu Signaling Connection Identifier” attributes value for use in the RANAP messages.
- In addition to performing functions such as network-based access control and paging filtering, the UE registration is also utilized to exchange the context identifier for a given UE as shown in
FIG. 21 . Specifically,FIG. 21 illustrates a message exchange of some embodiments for setting up UE context identifiers via UE registration. - In some embodiments, the HNB-
GW 2115 allocates a unique UE context identifier to each UE during the UE registration procedure. In some embodiments, the UE registration procedure illustrated inFIG. 21 is triggered by theHNB 2105 upon detecting camping of a givenUE 2110 on thatparticular HNB 2105. In some embodiments, the UE registration procedure is triggered upon an initial NAS transaction (e.g., LAU or paging response). In the Example ofFIG. 21 , this occurs when theUE 2110 establishes (atstep 1 a) a RRC connection with theHNB 2105 and sends (atstep 1 b) for example, a location update request NAS message that includes the UE identity. In some embodiments, the UE identity is an International Mobile Subscriber Identity (IMSI) of theUE 2110. In some other embodiments, the UE identity is a Temporary Mobile Subscriber Identity (TMSI) that was assigned for temporarily identifying theUE 2110. In still some other embodiments, the UE identity is a Packet-Temporary Mobile Subscriber Identity (P-TMSI or PTMSI). It should be apparent to one of ordinary skill in the art that these terms (e.g., IMSI, TMSI, and P-TMSI) may be used interchangeably throughout this document to refer to an identity of a particular UE. Therefore, in many instances the term IMSI is used. However, the terms TMSI or P-TMSI may similarly be used in such instances. - In some embodiments, the
HNB 2105 requests (atstep 1 c) additional identification information from theUE 2110 that is provided by theUE 2110 atstep 1 d. TheHNB 2105 then initiates the UE registration procedure by sending (at step 2) a register request message to the HNB-GW 2115 with the UE IMSI. In some embodiments, the register request message also includes the HNB identity. When UE registration is successful, the HNB-GW 2115 responds (at step 3) with a register accept message that includes the uniquely assigned UE context identifier. The context identifier provides a unique handle allocated and authorized by the HNB-GW 2115 to identify transactions of theUE 2105. The context identifier is then used for all UE-specific transactions (such as relay of UE associated RANAP messages). The lifetime of the UE context identifiers is the entire duration of the UE registration and the UE context identifier is released only at the time of the corresponding UE deregistration. The UE Context Id value is also used as the “Iu Signaling Connection Identifier” attribute value for use in the RANAP messages (for example, in the “Initial UE Message” RANAP message). In some embodiments, the context associated with a UE includes states and other information that the HNB-GW keeps for each UE which is successfully registered. - In some embodiments, UE-associated signaling occurs when RANAP messages associated with a given UE are identified via a UE-associated logical Iuh connection between HNB and HNB-GW. In some embodiments, the UE-associated logical Iuh connection uses the UE context identifier. For a received UE associated RANAP message, both the HNB-GW and HNB identify the associated UE based on the UE context identifier.
- In some embodiments, the RANAP procedure code is used within the adaptation layer. The RANAP procedure code in the adaptation layer provides a mechanism for the HNB-GW to relay the RANAP messages transparently towards the CN without needing to decode the encapsulated RANAP message. In an alternate embodiment, RANAP procedure code may be used directly from the encapsulated RANAP message, without needing to decode the entire RANAP message since the procedure code is at a fixed location of every encapsulated RANAP message.
- In some embodiments, the PDU structure for carrying the RANAP messages is the same as the description above for adaptation layers (i.e., the message is comprised of Iuh RANAP Header and RANAP messages).
FIG. 22 illustrates the fields of an Iuh RANAP Header, in some embodiments. As shown, the Iuh RANAP Header includes the following fields: (1)length 2205, (2) IuhRANAP Header Version 2210, (3)RANAP Procedure Code 2215 containing the Procedure Code value from TS 25.413, (4)HNB Context Id 2220, (5) HNB-GW Context Id 2225, (6)CN Domain ID 2230, (7) InitialUE Message Cause 2235, and (8) InitialUE Message IDNNS 2240, including ifRANAP Procedure Code 2215 indicates Initial UE Message. In some embodiments, thelength field 2205 indicates the length of the Iuh RANAP Header and the length of the RANAP Message, but excludes the length field. In some embodiments, theCN Domain ID 2230 indicates ‘CS Domain’, ‘PS Domain’, ‘Both CS Domain and PS Domain’ or ‘Not Domain Specific’. In some embodiments, the InitialUE Message Cause 2235 is included when the RANAP Procedure Code indicates Initial UE Message and/or if Initial UE Message is for ‘Emergency Call’ purposes (or other cause values). - This mechanism relies on existing RANAP procedures for exchanging the UE context identifiers between the HNB and HNB-GW. The HNB indicates the locally allocated UE context Id (via the Iuh header) to the HNB-GW in the first RANAP message for a given UE (i.e., RANAP Initial UE Message). The HNB-GW indicates the locally allocated UE context Id to the HNB in the first downlink RANAP message for that particular UE from the HNB-GW to the HNB. Subsequent RANAP messages (in the uplink and downlink direction) carry both the UE context identifiers of the HNB and HNB-GW.
- In some embodiments, the release of these UE context identifiers (and associated resources) is triggered by the final RANAP message for a particular UE. For example, the Iu Release Complete message from the HNB is an indication for the HNB and the HNB-GW to release the associated UE context identifiers.
- 1. Explicit Mechanism Using New RANAP Procedures
- This mechanism is similar to the mechanism as described in subsection “Mechanisms for Signaling the Adaptation Layer Information”. However, some embodiments utilize new RANAP procedures instead of HNBAP for the setup and release of UE context identifiers.
- In some embodiments, a new protocol (RANAP-H) is defined for the transport of RANAP over the Iuh interface. The RANAP-H protocol is used to transport the RANAP message along with UE context identifiers. A RANAP-H PDU may have a variable length in some embodiments.
FIG. 23 illustrates a RANAP-H PDU in some embodiments. As shown, the RANAP-H PDU 2300, includes (1)Payload Type 2310, (2)Flags 2315, (3)Length 2320, (4)HNB Context ID 2325, (5) HNB-GW Context ID 2330, and (6)Payload Data 2305. - In some embodiments, the
Payload Type 2310 may be 8 bits (with values ranging from 0-255) and identifies the type of information contained in thePayload data 2305. The value of 255 is reserved for future use as an extension field, in some embodiments. The total length of a chunk must be a multiple of 4 bytes. If the length of the chunk is not a multiple of 4 bytes, the sender pads the chunk with all zero bytes and this padding is not included in the chunk length field. The sender should never pad with more than 3 bytes. The receiver ignores the padding bytes. - The following table describes some of the types of information (Payload Types 2310) that can be sent through a RANAP-H PDU 2300:
-
TABLE 2 Payload Types and Descriptions Payload type Description References 0 RANAP, RANAP message. TS 25.413 1 CCREQ, Context Create Request. FIG. 24 2 CCACK, Context Create Acknowledgement. 3 CRCMD, Context Release Command. 4 CRCMP, Context Release Complete. 5 ERROR, Operation Error. 6-255 Reserved -
Flags 2315 are 8 bits in some embodiments. The usage of these bits depends on the payload type as given by thePayload type 2310. Unless otherwise specified, they are set to zero on transmit and are ignored on receipt.Length 2320 is 16 bits in some embodiments, and is the size of thePDU 2300 in bytes including thePayload Type 2310,Flags 2315,Length 2320, andPayload Data 2305 fields. Therefore, if thePayload Data field 2305 is zero-length, theLength field 2320 will be set to 8. TheHNB Context ID 2325 is 16 bits in some embodiments and indicates the locally unique identifier allocated by the HNB for a particular UE. The HNB-GW Context ID 2330 is 16 bits in some embodiments and indicates the locally unique identifier allocated by the HNB-GW for a particular UE. ThePayload Data 2305 is a variable length in some embodiments, and is the actual information to be transferred in thePDU 2300. The usage and format of this field is dependent on thePayload type 2310. -
FIG. 24 illustrates a Context Create Request (CCREQ) message, in some embodiments. As shown, theCCREQ 2400 is made up of theCN Domain ID 2405, theCCREQ Reason 2410, and theIDNNS 2415. In some embodiments, the Context Create Acknowledge (CCACK), Context Release Command (CRCMD), and Context Release Complete (CRCMP) messages do not have any payload data. - Alternative embodiments utilize the HNBAP protocol for exchanging the Iuh header information.
FIG. 25 illustrates an Iuh RANAP header, in some embodiments. As shown, the Iuh RANAP Header includes the following fields:length 2505,RANAP Procedure Code 2510,HNB Context Id 2515; and HNB-GW Context Id 2520. In some embodiments, thelength field 2505 indicates the length of the Iuh RANAP Header in addition to the length of the RANAP Message, but excluding the length field. TheRANAP Procedure Code 2510 contains the Procedure Code value from TS 25.413. -
FIG. 26 illustrates the structure of a PDU used for transferring an HNBAP message, in some embodiments. As shown, the PDU has the following fields:length 2605,Message Type 2610, and a list ofinformation elements 2615. In some embodiments, thelength 2605 indicates the length of the HNBAP Header plus the length of the HNBAP Message Body, but excludes the length field. In some embodiments, theHNBAP Message Type 2610 contains the HNBAP Message Type value. - 1. Create UE Context Request
- In some embodiments, the HNBAP Create UE Context Request message is used to indicate the HNB UE Context Id to the HNB-GW and also to provide information to the HNB-GW for support of the Iu-flex functionality.
FIG. 27 illustrates a Create UE Context Request going from the HNB to the HNB-GW, in some embodiments. As shown, the message includes the following IEs: (1) theHNB Context ID 2705, (2) theCN Domain ID 2710, indicating ‘CS Domain’, ‘PS Domain’, ‘Both CS Domain and PS Domain’ or ‘Not Domain Specific’, (3) theContext Request Cause 2715, indicating if request is for “Emergency Call” purposes (or other cause values), and (4) theIDNNS 2720. - 2. Create UE Context Accept
- The HNBAP Create UE Context Accept message is used by the HNB-GW to indicate successful allocation of the corresponding UE context Id by the HNB-GW.
FIG. 28 illustrates a Create UE Context Accept message going from the HNB-GW to the HNB, in some embodiments. As shown, the message includes the following IEs: the HNBUE Context ID 2805; and the HNB-GW Context ID 2810. Accordingly, the Create UE Context Accept message contains the allocated UE Context ID values. Additionally, the message contains the HNB-GW Context ID 2810. In some embodiments, the HNB-GW Context ID 2810 is allocated so as to uniquely identify the UE over the Iuh interface within the HNB-GW. - 3. Release UE Context
- The HNBAP Release UE Context Command message is used by either the HNB or HNB-GW to release context identifiers for a particular UE.
FIG. 29 illustrates a Release UE Context message going from either the HNB-GW to the HNB or the HNB to the HNB-GW, in some embodiments. As shown, the message includes the following IEs: theHNB Context ID 2905 and the HNB-GW Context ID 2910. - 4. Release UE Context Complete
- The HNBAP Release UE Context Complete message is used to acknowledge successful release of the associated UE context identifiers.
FIG. 30 illustrates a Release UE Context Complete message going from either the HNB-GW to the HNB or the HNB to the HNB-GW, in some embodiments. As shown, the message includes the following IEs: theHNB Context ID 3005 and the HNB-GW Context ID 3010. - The IMSI associated with the (U)SIM in the UE identifier is provided by the HNB to the HNB-GW when it registers a specific UE attempting to camp on the HNB. The HNB-GW maintains a record for each registered UE. For example, IMSI is used by the HNB-GW to find the appropriate UE record when the HNB-GW receives a RANAP PAGING message.
- In some embodiments, the HNB is addressed within the HNB system by one or more of the following addressing parameters: the IMSI associated with the (U)SIM in the HNB, the Public IP Address of the HNB, and the Private IP Address of the HNB, and/or the vendor specific unique serial number (such as MAC address).
- The IMSI associated with the (U)SIM in the HNB is provided by the HNB to the HNB-GW when the HNB registers for service. The HNB-GW maintains a record for each registered HNB. If the HNB is not equipped with a (U)SIM, then an alternate identifier must be allocated to the HNB and provided to the HNB-GW during registration of the HNB. Any alternate identifier must ensure global uniqueness for the HNB identity, since this identity is also used by the HNB-GW to validate the closed user groups of UEs allowed to access a particular HNB. In some embodiments, the HNB identity may include a TMSI that is assigned to the HNB or a P-TMSI that is assigned to the HNB.
- The Public IP address of the HNB is the address used by the HNB when it establishes an IPSec tunnel to the HNB-GW Security Gateway. This identifier is provided by the HNB-GW Security Gateway to the AAA server. In some embodiments, the HNB-GW uses this identifier to support location services (including emergency calls) and fraud detection. In some embodiments, service providers use this identifier to support Quality of Service (QoS) for IP flows in managed IP networks.
- The Private IP address of the HNB (also referred to as the “remote IP address”) is used by the HNB inside the IPSec tunnel. The private IP address of the HNB is utilized by the HNB-GW to associate or bind a particular HNB to a specific transport address for the purpose of network initiated messages.
- The vendor specific unique serial may be used by the HNB for identification purposes. The combination of vendor identity and the serial number within each vendor identity ensure a globally unique HNB identity over the Iuh interface.
- The following points describe the HNB Identification strategy.
- 1. Location Area (LA), Routing Area (RA), and Service Area Identification
- In order to facilitate the Mobility Management functions in UMTS, the coverage area is split into logical registration areas called Location Areas (for CS domain) and Routing Areas (for PS domain). UEs are required to register with the core network (CN) each time the serving location area (or routing area) changes. One or more location areas identifiers (LAIs) may be associated with each MSC/VLR in a carrier's network. Likewise, one or more routing area identifiers (RAIs) may be controlled by a single SGSN.
- The LA and the RA are used in particular when the UE is in idle mode and the UE does not have any active RRC connection. The CN would utilize the last known LA (for CS domain) and RA (for PS domain) for paging of the mobile when active radio connection is not available.
- The Service Area Identifier (SAI) identifies an area including one or more cells belonging to the same Location Area. The SAI is a subset of location area and can be used for indicating the location of a UE to the CN. SAI can also be used for emergency call routing and billing purposes.
- The Service Area Code (SAC) which is 16 bits, together with the PLMN-Id and the LAC constitute the Service Area Identifier.
- SAI=PLMN-Id∥LAC∥SAC.
- In some embodiments, it is necessary to assign a distinct LAI (distinct from its neighboring macro cells or other neighboring HNBs) to each HNB for the following reasons: (1) the UE's mobility from the macro network to a HNB cell must be detected by the HNB and the network. The UE can camp on a HNB via its internal cell selection logic. However, if the UE is in idle mode, there are no messages exchanged between the UE and the HNB, thus making it difficult for the HNB to detect the presence of the UE. In order to trigger an initial message from the UE, upon its camping on a specific HNB, the HNB is assigned distinct location areas different than the neighboring macro cells. This results in the UE's MM layer triggering a Location Update message to the CN via the camped cell (i.e., the HNB); (2) the UE's mobility from one HNB to another HNB must also be detected. The UE's cell selection selects a neighboring HNB and it will camp on the neighboring HNB without any explicit messaging. The neighboring HNB's Service Access Control (SAC) may not allow the camping of that specific UE, but without an initial explicit messaging there would not be a way for the neighboring HNB to detect and subsequently to reject the UE.
- When the MCC and MNC components of the LAI remain fixed for each operator, LAI uniqueness is ensured by allocating a distinct Location Area Code (LAC) to each HNB, such that the LAC assigned to the HNB is different from the neighboring macro network cells and other neighboring HNBs. However, the LAC space is limited to theoretical maximum of 64K (due to the limitation of a 16 bit LAC attribute as specified in “Numbering, addressing and identification”, 3GPP TS 23.003, hereinafter “TS 23.003”. As a result, the LAC allocation scheme must provide a mechanism for the re-use of LAC for scalable solution, and at the same time minimize the operational impact on existing CN elements (MSC/SGSN).
- In some embodiments, the following solution is utilized to meet the above requirements. The LAC allocation is split into two separate categories: (1) a pool of LACs managed by the HNB/HNB Management System and (2) a small set of LACs (one per “Iu” interface) managed by the HNB-GW. The first set of LACs (Broadcast LACs) is used by the HNB/HNB Management System to assign a unique LAC to each HNB such that it meets the following requirements (at the minimum): (1) uniqueness with respect to the neighboring macro as well as other HNBs (this will ensure an initial message from the UE upon HNB selection and rove-in) and (2) resolution of conflicts with shared LACs where multiple HNBs sharing the same LAC are not neighbors but can be accessed by the same UE (this is to allow the use of “LA not allowed” rejection code for UE rejection).
- The second set of LACs (a much smaller set) is managed within each HNB-GW as follows, with the following key requirements: they must (1) minimize the impact on the existing CN elements (such as minimal configuration and operational impact), (2) seamlessly integrate the existing functionality for routing of emergency call routing to appropriate PSAPs, and (3) seamlessly integrate existing functionality for the generation of appropriate CDR for billing purposes.
- To meet the above requirements for the second set of LACs each HNB-GW represents a Super LAC for a given Iu interface (i.e., MSC and SGSN interface). This implies the MSC/SGSN can be configured with a single set of Super LAI/Super RAI information for that HNB-GW. It should be apparent to one of ordinary skill in the art that this does not limit the operator from configuring multiple Super LAI/Super RAI sets if necessary, for example, to further subdivide the region served by a single HNB-GW into multiple geographic areas.
- In addition, the HNB-GW utilizes the following mapping functionality for assignment of a Super LA: (1) when macro coverage is reported by the HNB, HNB-GW supports mapping of the reported macro coverage to a Super LAC, Super RAC, and Service Area Code (SAC). The number of SACs utilized will be dependent on the granularity which the operator chooses for regional distribution (e.g., for emergency call routing, billing, etc.); (2) When no macro coverage is reported by the HNB, the HNB-GW has the following logic for the Super LAC/RAC/SAC assignment: (a) query the subscriber database for information on the “provisioned macro coverage” for the given HNB IMSI (or identity). When the database query reports macro coverage, the HNB-GW uses the provisioned macro coverage information to map Super LAC/RAC/SAC as above; (b) when there is no information about the macro coverage from the subscriber database query, HNB-GW maps the HNB to default Super LAC/RAC/SAC.
- However, such a mapping may result in the HNB-GW routing traffic to the CN in a sub-optimal mechanism. Therefore, to prevent this sub-optimal routing of UE traffic to default MSC/SGSN, one or more of the following additional enhancements on the HNB of some embodiments may be utilized: (i) upon a UE rove-in to this “no coverage” HNB, the HNB gathers information from the UE's initial LU request (since the UE will report last camped LAI), (ii) the HNB collects information from multiple UEs and constructs a “derived” macro coverage information (the number of UEs utilized to derive macro coverage could be algorithmic), (iii) using this derived macro coverage information, the HNB sends a HNBAP Register Update Uplink message to the HNB-GW, and (iv) the HNB-GW utilizes the macro coverage information reported via the HNBAP Register Update Uplink message to map the HNB to an appropriate Super LAC/RAC/SAC as above.
- A distinct LAI for each HNB also implies a distinct RAI since the RAI is composed of the LAI and Routing Area Code (RAC). The LAI, RAI and the Service area code (SAC) are sent to the HNB upon successful registration of HNB.
- In some embodiments, the HNB provides Super LAC/RAC replacement in the NAS messages from the network to the UE (e.g., LU Accept or RAU accept). In some such embodiments, the HNB replaces the “Super LAC/RAC” contained in the relevant NAS messages from the network, with the appropriate locally assigned LAC/RAC information in messages sent to the UEs camped on the HNB. The HNB also includes the SAI provided by the HNB-GW in the corresponding UE specific RANAP messages.
- 2. 3 G Cell Identification
- A 3 G Cell Id identifies a cell unambiguously within a PLMN. A 3 G cell identifier is typically composed as follows: 3 G Cell Id=28 bits=RNC-Id (12 bits)+cell Id (16 bits). In an alternate embodiment, the 3 G Cell Id may also be composed as follows: 3 G Cell Id=28 bits=RNC-Id (16 bits)+cell Id (12 bits).
- The 3 G Cell Ids in UMTS are managed within the UTRAN and are not exposed to the CN. As a result, the cell assignment logic can be localized to the UTRAN as long as it can ensure uniqueness within a given PLMN. The 3 G Cell Id assigned to each HNB must be distinct from its neighboring HNB primarily to avoid advertisement of the same cell id in system information broadcast by two adjacent HNBs, considering that in some embodiments the physical deployment of the HNBs are ad-hoc and not controlled by the operator.
- Accordingly, in some embodiments, each HNB-GW is statically provisioned with a unique RNC-Id and the RNC-Id will be conveyed to the HNB during registration. The HNB will be responsible for the assignment of the 16 bit cell-id locally and construct the 3 G cell using the combination of HNB-GW supplied RNC-Id and locally assigned cell-id. In some embodiments, the HNB may use the entire 28 bits for cell Id (and not include the RNC Id) for broadcasting over the air interface. In this alternate embodiment, mapping between these 28 bits cells ids to RNC Id(s) is maintained either in the HNB or the HNB-GW.
- 3. Impact on Core Network
- The LAC/RAC information sent to the UE is different (locally assigned by the HNB) than that sent to the CN (Super LAC/RAC assigned by the HNB-GW). As a result of this split allocation, the UE stores (upon successful LU/RAU), the local or broadcast LAC/RAC on the UE's (U)SIM. Upon rove-out to the licensed wireless network, the UE triggers location update and routing area update using these local values for LAC and RAC. The CN does not have any information about this local LAC/RAC value since the MSC/SGSN is aware of the Super LAC/RAC for that UE.
- Therefore, in the PS domain, for UEs in idle mode, if there are existing PDP sessions, PS service may be affected. The new SGSN will not be aware of the “RAI” contained in the Routing Area Update message. As a result, the new SGSN may be unable to retrieve subscriber context (i.e., existing PDP information) from the old SGSN. This could result in the PDP sessions having to be re-established by the UE. Re-establishing the PDP sessions results in the exchange of additional signaling messages and possible impacts to service such as delayed PS applications. For billing purposes, it is desirable that the PDP session in idle mode be terminated and restarted with the correct billing indicators (e.g., SAI, etc.). For such scenarios, the above limitation is a non-issue. If the routing area update is performed using a P-TMSI, the new SGSN will not have the associated P-TMSI and will trigger an “Identity request” NAS message to the UE thus resulting in the exchange of additional signaling messages.
- In the CS domain, if the location update done is performed using the TMSI, this could trigger an “Identity Request” NAS message from the MSC to the UE thus resulting in the exchange of additional signaling messages. Also, there may be additional impact on the HLR, if the “new VLR” and the “old VLR” for the given subscriber IMSI are the same. The VLR may not be able to make the determination of the old VLR due to an unknown LAI and may send a message to the HLR. This could result in the VLR requesting complete subscriber information from the HLR thus resulting in additional signaling messages in the CN. In some embodiments, the CN elements (SGSN/MSC) are enhanced to recognize the Super LAC/RAC from the Broadcast LAC. If it is able to distinguish the Super LAC and Broadcast LAC, then the subscriber information (such as ongoing PDP and other information) can be consolidated (for example, using the IMSI), thus mitigating any impacts due to the above limitations.
- In the HNB system of some embodiments, two HNB operating configurations include a common core configuration and a separate core configuration. For the common core configuration of some embodiments, the HNB Super LAI and the umbrella UTRAN's LAI (e.g., the “umbrella” UTRAN that serves the subscriber's neighborhood) are different. Also, the network is engineered such that the same core network entities (i.e., MSC and SGSN) serve both the HNBs and the umbrella UMTS cells. The primary advantage of this configuration is that subscriber movement between the HNB coverage area and the UMTS coverage area does not result in inter-system (i.e., MAP) signaling (e.g., location updates and handovers are intra-MSC). In some embodiments, the common core configuration requires coordinated HNB and UMTS traffic engineering (e.g., for the purpose of MSC and SGSN capacity planning).
- For the separate core configuration, the HNB Super LAI and umbrella UTRAN's LAI are different. Also, the network is engineered such that different core network entities serve the HNBs and the umbrella UMTS cells. The advantage of this configuration is that engineering of the HNB and UMTS networks can be more independent than in the common core configuration. In some embodiments, the separate core configuration requires that subscriber movement between the HNB coverage area and the UMTS coverage area results in inter-system (i.e., MAP) signaling.
- In some embodiments, the HNB is plug-and-play upon connection to the operator core network. The HNB does not require any manual “per unit” configuration by the operator or by the subscriber to be activated. In some embodiments, HNBs from multiple vendors will connect to each HNB-GW (i.e., many to one relationship). As a result, a standardized and inter-operable mechanism of connecting these multiple vendor HNBs to HNB-GW is highly desirable. The discovery and registration procedures provide a standardized and inter-operable mechanism for HNB to connect and receive services from the most appropriate HNB-GW.
- 1. HNB Discovery
- In some embodiments, the HNB-GW discovery process does not involve any signaling to the PLMN infrastructure and is wholly contained within the HNB system (i.e., between the HNB, HNB-GW). Upon initial power-up (e.g., when the HNB has not stored information about its serving HNB-GW), the HNB initiates the discovery procedure towards the HNB-GW.
- The discovery procedure services provide an automated way for the HNB to determine the most appropriate serving HNB-GW in the HPLMN of the HNB, taking into account parameters such as the HNB identity and location. Additionally, the discovery procedure services provide an inter-operable mechanism for the HNB from multiple vendors to find the appropriate HNB-GW which can serve the specific HNB. The logic reflecting operator policy for assigning HNB to the appropriate HNB-GW is implemented in one place and is the same for every HNB product or vendor. In some embodiments, all HNBs, from every HNB vendor, are provisioned with exactly the same initial information. In some embodiments, this initial information includes the address (e.g., FQDN) of the network-wide Provisioning HNB-GW. In alternate embodiments, the discovery of serving HNB-GW is performed via the HNB management system.
- 2. HNB and UE Registration
- In some embodiments, the HNB registration process does not involve any signaling to the PLMN infrastructure and is wholly contained within the HNB system (i.e., between the HNB, HNB-GW). The registration process includes HNB registration and UE registration.
- In some embodiments, HNB registration occurs upon HNB power-up. When powered-up, the HNB registers with the HNB-GW. HNB registration serves to (a) inform the HNB-GW that a HNB is now connected and is available at a particular IP address, (b) provide the HNB with the network operating parameters associated with the HNB service at the current location which must be coordinated between the HNB and HNB-GW (information that need not be locally coordinated can be obtained through the HNB Management System prior to HNB-GW Discovery/Registration), (c) allow the HNB-GW to perform network based access control (e.g., HNB restriction and location verification), and (d) provide a mechanism to redirect the HNB to a different serving HNB-GW (e.g., based on incoming location, current load on the HNB-GW, and availability/load status of the Iu-CS/Iu-PS interface, etc).
- In some embodiments, UE registration occurs upon HNB selection and cell camping. When the UE selects a HNB and camps on the corresponding cell, the UE initiates an initial NAS (Non-access stratum) message (for example a Location Update (LU) message) towards the CN via the HNB. The HNB utilizes this message to detect the presence of the UE on that specific HNB. The HNB then initiates a registration message towards the HNB-GW for the camped UE. UE registration by the HNB informs the HNB-GW that a UE is now connected through a particular HNB and is available at a particular IP address. The HNB-GW keeps track of this information (e.g. for the purposes of “directed paging” in the case of a mobile-terminated call). UE registration by the HNB also allows the HNB-GW to provide network based service access control (SAC) functionality. The HNB-GW provides authorization and enforcement based on the operator's service access control polices. Network based SAC can be used to insure that a particular UE is indeed authorized for service over a particular HNB. Additionally, UE registration by the HNB allows the HNB-GW to provide UE specific service parameters to the HNB (e.g., differentiated billing for home users versus guest users). In some embodiments, UE registration by the HNB provides a mechanism for indicating emergency services only. With this explicit indication, the HNB-GW can override the normal service access controls for this UE but the HNB-GW may still restrict the UE to only emergency services for fraud prevention. In addition, this emergency services indicator allows the HNB-GW to support emergency call-backs by targeting the correct HNB over which the emergency call had originated. This assumes that the HNB allows an unauthorized UE (i.e., a UE not allowed service over that particular HNB) to camp for limited service.
- 1. HNB Power On
- In some embodiments, the HNB is initially provisioned with information (i.e., an IP address or a FQDN) about the Provisioning HNB-GW and the corresponding Provisioning SeGW related to that HNB-GW. If the HNB does not have any information about the Serving HNB-GW and the associated SeGW stored, then the HNB completes the Discovery procedure towards the Provisioning HNB-GW via the associated SeGW. If the HNB has stored information about the Serving HNB-GW on which it registered successfully the last time, the HNB skips the discovery procedure and attempts registration with the Serving HNB-GW as described below.
- 2. HNB Discovery Procedure
-
FIG. 31 illustrates the case when the HNB powers on and does not have stored information on the Serving HNB-GW, and then performs a discovery procedure with the provisioning HNB-GW and SeGW, in some embodiments. - As shown, when the
HNB 3105 has a provisioned FQDN of the HNB-GW Discovery service, it performs (at step 1) a DNS query (via the generic IP access network interface) to resolve the FQDN to an IP address. When theHNB 3105 already has the IP address for the HNB-GW Discovery service, the DNS step is omitted. TheDNS Server 3110 returns (at step 2) a response including the IP Address of a HNB-GW that provides HNB-GW Discovery service. TheHNB 3105 establishes (at step 3) a secure tunnel to the HNB-GW 3115. In some embodiments, the SeGW is any logical entity within the HNB-GW 3115. TheHNB 3105 sets up (at step 4) a reliable transport session to a well-defined port on the HNB-GW 3115. - The
HNB 3105 then queries (at step 5) the HNB-GW 3115 for the address of the serving HNB-GW, using the HNBAP DISCOVERY REQUEST message. The message contains both HNB location information and HNB identity. TheHNB 3105 provides location information via use of one or more of the following mechanisms: (1) detected macro coverage information (e.g., GERAN or UTRAN cell information), (2) geographical co-ordinates (e.g., via use of GPS, etc.), or (3) Internet connectivity information (e.g., IP address or DSL Line Identifier). It is possible that none of the above information is available. In such instances where the information is not available, the discovery mechanism of some embodiments supports HNB assignment to a default HNB-GW for such use with the understanding that service via such default assignment may be non-optimal. Alternately, some embodiments deny discovery of a serving HNB-GW until valid location information is provided. TheHNB 3105 is assumed to have a globally unique identity. In some embodiments, the specific identity may be the IMSI if a (U)SIM is associated with the HNB. - The HNB-
GW 3115 returns (at step 6) the HNBAP DISCOVERY ACCEPT message, using the information provided by theHNB 3105 to determine the address of the most appropriate serving HNB-GW. The DISCOVERY ACCEPT message may also indicate whether the serving HNB-GW address information is stored by theHNB 3105 for future access (i.e., versus performing HNB-GW discovery each time theHNB 3105 is power-cycled). - When the HNB-
GW 3115 cannot accept (at step 7) the HNBAP DISCOVERY REQUEST message, it returns a HNBAP DISCOVERY REJECT message indicating the reject cause. The secure tunnel to the HNB-GW 3115 is released (at step 8). - 3. HNB Registration Procedure
- Following the discovery of a serving HNB-GW, the HNB establishes a secure tunnel with the Security Gateway of the Serving HNB-GW and attempts to register with the HNB-GW. This HNB-GW may become the Serving HNB-GW for that connection by accepting the registration, or this HNB-GW may redirect the HNB to a different Serving HNB-GW. HNB-GW redirection may be based on information provided by the HNB during the Registration procedure, operator chosen policy or network load balancing.
FIG. 32 illustrates the HNB Power on registration procedure of some embodiments. - As shown, if the
HNB 3205 does not have stored information on the serving HNB-GW 3215, theHNB 3205 performs (at step 1) the HNB-GW Discovery procedure. TheHNB 3205 establishes (at step 2) a secure tunnel to the serving HNB-GW 3215. This step may be omitted if a secure tunnel is being reused from an earlier discovery or registration procedure. TheHNB 3205 sets up (at step 3) a reliable transport session to a well-defined port on the serving HNB-GW 3215. - The
HNB 3205 then attempts (at step 4) to register with the serving HNB-GW 3215 using a HNBAP REGISTRATION REQUEST message. The message contains the HNB identity (per SA1 requirement, theHNB 3205 has a globally unique identity; for example, it may be the IMSI if a (U)SIM is associated with the HNB), and HNB location information. The location information can be in the following forms: (1) detected macro coverage information (e.g., GERAN or UTRAN cell information), (2) geographical coordinates (e.g., via use of GPS, etc.), or (3) Internet connectivity information (e.g., IP address or DSL Line Identifier). When none of the above information is available at theHNB 3205, the registration mechanism of some embodiments supports either a registration with default network operating parameters or a registration rejection to prevent HNB operation in unknown locations. The determination for exact logic should be based on configured policy of the HNB-GW (here, 3215). - The serving HNB-
GW 3215 may use the information from the HNBAP REGISTER REQUEST message to perform access control of the HNB 3205 (e.g., whether a particular HNB is allowed to operate in a given location, etc). If the serving HNB-GW 3215 accepts the registration attempt it responds (at step 5) with a HNBAP REGISTER ACCEPT message. In some embodiments, the HNBAP REGISTER ACCEPT message includes the necessary system information for the HNB functionality which needs to be coordinated with the serving HNB-GW 3215. In this case, the reliable transport session and the secure tunnel are not released and are maintained as long as theHNB 3205 is registered with the serving HNB-GW 3215. - Alternatively, the serving HNB-
GW 3215 may reject (at step 6) the request (e.g., due to network congestion or overload, blacklisted HNB, unauthorized location, etc.). In this case, the HNB-GW 3215 responds with a HNBAP REGISTER REJECT message indicating the reject cause. Additionally, in cases of network congestion or overload, the HNB-GW may also indicate a back-off time to prevent the HNB from attempting an immediate registration retry. When the serving HNB-GW 3215 wishes to redirect (at step 7) theHNB 3205 to (another) serving HNB-GW (not shown), the HNB-GW 3215 responds with a HNBAP REGISTER REDIRECT message providing information about the target HNB-GW. In some embodiments, the functionality of redirection maybe performed via the HNB receiving a HNBAP REGISTER REJECT message from the HNB-GW and attempting to connect to a second HNB-GW using information for the second HNB-GW provided by the HNB management system. TheHNB 3205 releases (at step 8) the transport session as well as the secure tunnel if it does not receive a HNBAP REGISTER ACCEPT message in response. - a. Abnormal Cases
- When the Serving HNB-GW rejects a Registration Request and is unable to provide redirection to a suitable Serving HNB-GW, the HNB may re-attempt the discovery procedure (including in the message a cause indicating the failed registration attempt and the serving HNB-GW provided in the last discovery procedure). The HNB may also delete all stored information about the rejected serving HNB-GW.
- Some of the possible reject causes for HNB registration attempts are: network congestion or overload, location not allowed, geo-location not known, HNB Identity (e.g., IMSI) not allowed, resource unavailable, and/or “unspecified”.
- 4. UE Registration
- After an HNB is registered with a HNB-GW, the HNB establishes a short range licensed wireless service region of the HNB system. When UEs enter the service region, the HNB performs a registration procedure to authenticate and authorize the UE for HNB service for the service region of a particular HNB. UE registration first determines whether the HNB is permitted to access services of the HNB system through the particular service region associated with the HNB on which the UE is camped. UE registration also serves to determine what services the UE is authorized to access from that particular service region. Similar to the HNB registration, UE registration is performed through the HNB-GW.
- Based on the service policy of the HNB system provider, UEs may be restricted to service through certain HNBs i.e. the HNBs may have a closed subscriber group (CSG) for allowing access through the particular HNB. In some embodiments, the UE is allowed service through an HNB that is associated with the user's home location. In some embodiments, the UE is allowed HNB service through certain HNB hotspots. By providing registration through the HNB-GW, some embodiments provide a central location whereby access to the HNB services can be controlled
-
FIG. 33 illustrates UE registration with the HNB, in some embodiments. Here, theHNB 3305 registers aspecific UE 3310 with the HNB-GW 3315. The registration is triggered when theUE 3310 attempts to access theHNB 3305 for the first time via an initial NAS message (e.g. Location Updating Request). - In the example of
FIG. 33 , upon camping on theHNB 3305, theUE 3310 initiates (atstep 1 a) a Location Update procedure by establishing an RRC connection with the HNB 3305 (it can be assumed that theHNB 3305 has a location area that is distinct from its neighboring HNB and macro cells to trigger an initial message upon camping on the HNB 3305). TheUE 3310 then transmits (atstep 1 b) a NAS message carrying the Location Updating Request message with some form of identity (IMSI/TMSI). If the (P)TMSI of the UE 3310 (provided during RRC Connection Establishment) is unknown at the HNB being accessed (e.g., first access attempt by this specific UE using the (P)TMSI, the HNB requests (atstep 1 c) the IMSI of the UE and the UE replies at step Id. In some embodiments where the networkssupport network mode 1, the UE could trigger a combined Routing Area and Location Area update request instead of the initial LU request. The HNB may also optionally perform local access control for faster rejection of those UEs not authorized to access the particular HNB. If the HNB performs the local access control, then unauthorized UEs are not attempted to be registered with the HNB-GW. - The
HNB 3305 attempts (at step 2) to register theUE 3310 on the HNB-GW 3315 over the UE specific transport session by transmitting the HNBAP UE REGISTER REQUEST. The message contains location information and the UE identity such as the IMSI of the (U)SIM associated with the UE. The HNB identity over which the UE is attempting access can be inferred or derived by the HNB-GW based on HNB registration and the associated transport session (e.g. SCTP session) since the UE registration is also attempted (by the HNB) using the same transport session. - The HNB-
GW 3315 performs access control for theparticular UE 3310 attempting to utilize thespecific HNB 3305. If the HNB-GW 3315 accepts the registration attempt, it responds (at step 3) with a HNBAP REGISTER ACCEPT message back to theHNB 3305. In some embodiments, the HNB-GW 3315 also assigns information specific to theUE 3310 such as SAI specific to the registered UE, UE Context Id (for use in the RUA layer), etc. The UE Context Id provides a unique identifier for each UE within a particular HNB-GW. The UE Context Id is used to identify a logical Iuh signaling connection for a given UE. Additionally, since the UE Context Id is unique within the HNB-GW, it is also used (e.g. by the HNB) as the “Iu signaling connection identifier” in corresponding RANAP messages for that particular UE. - The
HNB 3305 performs (at step 4) a NAS relay of the Location Updating Request message from theUE 3310 to the HNB-GW 3315 via the use of RANAP Initial UE Message. The RANAP Initial UE Message is encapsulated in the RUA message header with additional necessary information which enables the HNB-GW 3315 to relay RANAP message towards the appropriate CN entity. - The HNB-
GW 3315 establishes (at step 5) an SCCP connection to theCN 3320 and forwards the Location Update request (or the combined RA/LA update request) NAS PDU to theCN 3320 using the RANAP Initial UE Message. Subsequent NAS messages between theUE 3310 andcore network 3320 will be sent between theHNB 3305/HNB-GW 3315 and theCN 3320 using the RANAP Direct Transfer message encapsulated in the RUA header. - The
CN 3320 authenticates (at step 6) theUE 3310 using standard authentication procedures. TheCN 3320 also initiates the Security Mode Control procedure. The NAS messages are relayed transparently by the HNB-GW 3315 and theHNB 3305 between theUE 3310 and theCN 3320. TheCN 3320 indicates (at step 7) it has received the location update and it will accept the location update using the Location Update Accept message to the HNB-GW 3315. The HNB-GW 3315 relays (at step 8) the LU Accept NAS message to theHNB 3305 via the use of RANAP Direct Transfer message encapsulated in the RUA header. TheHNB 3305 relays (at step 9) the LU Accept over the air interface to theUE 3310 and the procedure is completed. - In some embodiments, the HNB has a location area that is distinct from its neighboring HNB and macro cells in order to trigger an initial message from a UE upon the UE camping on the HNB. The uniqueness of location is with respect to neighbors of a given HNB, which includes other surrounding HNBs and macro cells. It is neither required nor feasible to have a system-wide (i.e., across PLMN) unique location area for each HNB. Multiple HNBs are able to re-use the location area with the above consideration (i.e., non-conflicting with other neighbors). This unique location area is required to trigger an initial UE message and serves to perform access control and rejection of unauthorized UEs upon initial cell reselection and camping on the HNB; and, to track authorized UEs, in order to minimize the impact of paging at the HNB-GW as well as the HNB (via UE registration).
- Once the UE has successfully registered with the HNB-GW and performed a successful location update, the HNB may expect a periodic LU for that UE (the enabling and the periodicity of the LU is controlled by the HNB via System Information broadcast from the HNB to the UE). This exchange will serve as a keep-alive between the HNB and the UE and will help the HNB detect idle UEs moving away from the camped HNB without explicit disconnect from the network.
- a. Abnormal Cases
- When the unauthorized UE is not allowed to camp on the HNB, the HNB-GW responds to the UE registration with a HNBAP REGISTRATION REJECT message to the HNB. The HNB is then expected to reject the corresponding UE using appropriate reject mechanisms. For example, some rejection mechanisms include RRC rejection or redirection to another cell or reject the LU with cause such as “Location Area not allowed”, etc.
- When the unauthorized UE is allowed to camp in idle mode only, the HNB-GW responds to the UE registration with a HNBAP REGISTRATION ACCEPT message to the HNB and also includes a cause code indicating the limited camping of the UE (i.e., idle mode only). The HNB continues with the Location Update NAS message processing. At the completion of a successful location update procedure, if this unauthorized UE now attempts a subsequent L3 transaction (e.g., a mobile originated service request), the HNB will use the appropriate mechanisms (e.g., RRC redirection or relocation) to redirect the UE to another macro cell for the active call.
- b. Iuh Registration and Paging Optimization for CSG UEs
- A HNB can be deployed in multiple access modes. When the HNBs are deployed in closed access mode (meaning only a certain group of users are allowed access), a mechanism for access control is implemented via enforcement in the network (either the radio access network or the core network). As a result, the network must reject un-authorized UEs (i.e. UEs not subscribing to a particular HNB). The allowed CSG list stored on the UE or in the subscriber database record (such as in the HLR or HSS) is also known as the white-list.
- The CSG capable HNB broadcasts a CSG-Id over the air interface. In some embodiments, the CSG-Id refers to a single cell, and in other embodiments, the CSG-Id may be shared by multiple CSG cells. Additionally, the HNB may also include an indication on whether the cell belongs to a closed subscriber group. The CN elements (MSC/VLR/SGSN) are assumed to be CSG capable i.e. they are able to access the allowed CSG list (i.e. white-list) of a particular UE (i.e. subscriber) and to enforce access control for each subscriber.
- Subscribers can be equipped with either a legacy UE or a CSG capable UE. The legacy UE's decision to select a particular HNB may be based on macro NCL (e.g. if moving from macro coverage into HNB coverage area in idle mode) or based on full scan of all available cells for a particular operator PLMN (e.g. if there is no macro coverage in idle mode). CSG capable UEs do not need the macro NCL assistance and are capable of selecting the HNB autonomously based on the White-List on the (U)SIM or manual selection using the CSG-Id/“HNB Display Identity” broadcast by the HNB. However, if macro NCL includes HNB neighbors, then a CSG capable UE may use that information for initial scanning of the HNB but the eventual decision to select the particular HNB is based on the white-list or manual selection decision.
- The following sub-sections describe CSG UE registration over the Iuh interface as well as the various mechanisms which would allow Page messages from the CN to be filtered at the HNB-GW (i.e. send the Page message to the specific HNB where the UE is camped) without any dependency or need for specific co-relation between the CSG-Id and Location area of the HNBs (or with the macro LA).
- i. UE Registration
- Use of UE registration for CSG UEs over Iuh interface requires the HNB to trigger UE registration upon HNB cell selection. The HNB can rely upon an initial L3 transaction (e.g. LAU or Paging Response) to perform UE registration (similar to UE registration supported for legacy i.e. pre-CSG systems). For the CSG systems case, since the access control is performed in the CN, the HNB must also monitor for successful confirmation of the initial L3 transaction (e.g. LAU Accept). If the HNB detects failure in the L3 procedure, the HNB must trigger deregistration of the CSG UE. The UE registration procedure as defined for legacy systems requires the HNB to know the permanent identity (IMSI) of the UE and the IMSI is obtained via identity request procedure which is considered a breach of the current user confidentiality assumptions in macro networks. The following describes a solution, in some embodiments, which avoids the need for issuing an identity request (over the air interface) for CSG UEs Registration procedure.
- 1. Resolving Identity Issues for UE Registration
- The UE permanent identity is required in legacy (i.e. pre-CSG) environments to perform access control and to perform paging filtering (in the HNB-GW) using the IMSI. In the CSG environment, the access control is performed by the CN using CSG-id and the white-list on the UE. This leaves the problem of paging filtering. The paging filtering using UE registration, in the legacy system (i.e. pre-CSG UE/HNB), is triggered by HNB using the IMSI as the identity. Some embodiments modify the UE registration to allow UE registration using the {TMSI/P-TMSI, LAC} as temporary UE identity (Note: LAC is required since TMSI is unique within given LAC only and 2 simultaneous UE registration must be handled). The NAS message triggering UE registration (LAU or CSG Update) will result in the RANAP Common-Id procedure being sent by the CN towards the HNB-GW and will include the IMSI. This allows the HNB-GW to associate the UE context (created at UE registration using a temporary identity, such as (P)TMSI, with the particular IMSI. Subsequent paging can be filtered at the HNB-GW using the IMSI stored in the UE context.
-
FIG. 34 illustrates a procedure for the HNB-GW to allow UE registration using temporary identity (e.g. TMSI or PTMSI) in some embodiments. The HNB-GW subsequently receives the permanent identity from the core network (CN) and associates the above said UE registration with the permanent identity i.e. IMSI of the UE. - As shown,
UE 3405 selects (at step 1) and camps on theHNB 3410 using its white-list (or allowed CSG list) and CSG information broadcast by theHNB 3410. TheUE 3405 then sends (at step 2) an initial NAS (L3) message towards the HNB 3410 (e.g. LAU request or Page response) containing only a temporary UE identity such as the TMSI (CS domain) or PTMSI (PS domain). TheHNB 3410 initiates (at step 3) a UE registration towards the HNB-GW 3415 with this temporary UE identity without any further identity request from theUE 3405 over the air interface. The HNB-GW 3415 accepts (at step 4) the UE registration using the temporary identity and includes a unique context id in the UE registration accept message. The initial NAS message is forwarded (at steps 5-8) towards theCN 3420 followed by authentication and other normative procedures. TheCN 3420 then sends (at step 9) the RANAP Common Id message containing the UE's permanent identity i.e. IMSI. The HNB-GW 3415 then associates (at step 10) the existing UE registration and context Id with the IMSI obtained in this manner. - It should be noted that if the RRC “cell update” (or equivalent) procedure is used instead of NAS level messaging for indication of HNB selection by the CSG UE, then IMSI cannot be obtained from the CN. This would then require that the HNB perform an identity request or require that the CSG UE include the IMSI in the RRC “cell update” (or equivalent) procedure.
- 2. Inclusion of CSG-id in the Page Message from CN
- As described in Section III.F.4.b, the CN is able to access the allowed CSG list (i.e. white-list) of a particular UE (i.e. subscriber). By including target CSG-Id (i.e., the Allowed CSG list, white-list, CSG identity, etc.) in the Page message from the CN, the HNB-GW can send the page to the correct HNB, and IMSI becomes a non-issue. However, this mechanism does require modification to existing RANAP Page messages from the CN. Additionally, the CN may be required to include the CSG-Id conditionally towards the HNB-GW and never towards a macro RNC.
- 5. UE Rove Out
-
FIG. 35 illustrates the UE rove out procedure, where the UE leaves the HNB coverage area while idle, in some embodiments. As shown, upon successful UE registration/LAU of theUE 3510, theHNB 3505 will monitor (at step 1) theUE 3510 via periodic location updates. The enabling and the periodicity of the LU are controlled by theHNB 3505 via System Information broadcast from theHNB 3505 to theUE 3510. This exchange will serve as a keep-alive between theHNB 3505 and theUE 3510. TheHNB 3505 determines (at step 2) that theUE 3510 is no longer camped on the HNB 3505 (roved out), as a result of missing number of periodic location updates from theUE 3510. TheHNB 3505 will inform (at step 3) the HNB-GW 3515 that theUE 3510 has moved out of the HNB coverage area by sending a HNBAP DEREGISTER message. The HNB-GW 3515 will remove any associated UE context upon receiving the deregister message for theUE 3510. - 6. UE Power Down with IMSI Detach
-
FIG. 36 illustrates the case when the UE powers down and performs an IMSI detach via the HNB access network, in some embodiments. In some such embodiments, theUE 3610 in idle mode initiates (at step 1) the power off sequence. TheUE 3610 establishes (at step 2) an RRC Connection with theHNB 3605. TheUE 3610 sends (at step 3) an MM Layer IMSI-Detach message over the air interface to theHNB 3605. TheHNB 3605 sends (at step 4) the RANAP encapsulated IMSI-Detach NAS PDU message along with the RUA header information to the HNB-GW 3615. The HNB-GW 3615 establishes (at step 5) an SCCP connection to theCN 3620 and forwards the IMSI-Detach NAS PDU to theCN 3620 using the RANAP Initial UE Message. - The
CN 3620 initiates (at step 6) a normal resource cleanup via RANAP Iu Release Command to the HNB-GW 3615. The HNB-GW 3615 forwards (at step 7) the RANAP Iu Release Command message encapsulated in the RUA to theHNB 3605. TheHNB 3605 acknowledges (at step 8) resource cleanup via RUA encapsulated RANAP Iu Release Complete message to the HNB-GW 3615. The HNB-GW 3615 forwards (at step 9) the RANAP Iu Release Complete message to theCN 3620. - The
HNB 3605 triggers (at step 10) deregistration for thespecific UE 3610 by sending a corresponding HNBAP DEREGISTER message to the HNB-GW 3615. TheHNB 3605 detects that theUE 3610 has roved and triggers the UE deregistration. As an optimization, theHNB 3605 can also monitor the IMSI-Detach NAS message from theUE 3610 and trigger deregistration of theUE 3610. TheHNB 3605 initiates (at step 11) RRC Connection release procedure towards theUE 3610 and theUE 3610 powers off (at step 12). - 7. UE Power Down without IMSI Detach
- The sequence of events is same as UE Roving out of HNB as described above in with reference to
FIG. 36 . - 8. Loss of Iuh Interface IP Connectivity
-
FIG. 37 illustrates the loss of Iuh interface capacity for the HNB, in some embodiments. As shown, the SCTP instance on theHNB 3705 periodically sends (at step 1) a SCTP HEARTBEAT message to the HNB-GW 3715 to check that the SCTP connection exists. IP connectivity between theHNB 3705 and HNB-GW 3715 is lost (at step 2) (e.g., due to a broadband network problem). If the HNB-GW 3715 detects the loss of connectivity, it releases (at step 3) the resources assigned to the HNB 3705 (e.g., SCTP connection) and deletes the subscriber record (i.e., performs a local deregistration of the HNB 3705). Optionally, the HNB-GW implementation deletes UE specific sessions and contexts originating from that particular HNB. - If the
HNB 3705 detects (at step 4) the loss of SCTP connectivity, it attempts (at step 5) to re-establish the SCTP connection and re-register with the HNB-GW 3715. Should theHNB 3705 re-establish connectivity and re-register before the HNB-GW 3715 detects the problem, the HNB-GW 3715 must recognize that theHNB 3705 is already registered and adjust accordingly (e.g., release the old SCTP connection resources). - If the
HNB 3705 is unsuccessful in re-establishing connectivity to the HNB-GW 3715, theHNB 3705 will implicitly deregister (at step 6) all theUEs 3710 currently camped on theHNB 3705. Additionally, theHNB 3705 must force all theUEs 3710, currently camped on thatHNB 3705, to do a cell-reselection and rove out of HNB coverage. TheUE 3710, as a result of the cell re-selection, will switch (at step 7) to UMTS macro cell (if UMTS macro network coverage is available). - 9. HNB-GW-Initiated Deregister
- In some embodiments, the HNB-GW deregisters the HNB when (1) the HNB-GW receives an HNBAP REGISTER UPDATE UPLINK message, but the HNB is not registered, (2) the HNB-GW receives an HNBAP REGISTER UPDATE UPLINK message, but encounters a resource error and cannot process the message, or (3) the HNB-GW receives an HNBAP REGISTER UPDATE UPLINK message with new macro network cell information, and the macro cell is HNB-restricted. In some embodiments, the HNB-GW will deregister the UE if it receives an HNBAP SYNCHRONIZATION INFORMATION message for a UE that is not registered. In some embodiments, the updates from the HNB may be indicated by the HNB sending another HNBAP REGISTER REQUEST over the same SCTP transport where it is already registered.
- 10. HNB-Initiated Register Update
-
FIG. 38 illustrates an HNB-initiated register update between the HNB and HNB-GW, in some embodiments. As shown, a register update is triggered (at step 1) in the HNB 3805 (e.g., change of macro network coverage). TheHNB 3805 sends (at step 2) HNBAP REGISTER UPDATE UPLINK to the HNB-GW 3815. The HNB-GW 3815 may optionally send (at step 3) HNBAP REGISTER UPDATE DOWNLINK message if there is a change in system information for theHNB 3805 due to updated macro information (e.g., change in Iu interface parameters such as LAI, etc. due to updated macro information). Optionally, the HNB-GW 3815 may trigger (at step 4) the deregistration procedure as described in the subsection above. In some embodiments, the updates from the HNB may be indicated by the HNB sending another HNBAP REGISTER REQUEST over the same SCTP transport where it is already registered. - 11. HNB-GW-Initiated Register Update
-
FIG. 39 illustrates the HNB-GW-initiated registration update between the HNB and HNB-GW, in some embodiments. A register update is triggered (at step 1) in the HNB-GW 3915 (e.g., due to change in access control list or closed user group for the HNB, or change in System Information such as LAI, RNC-Id, etc). The HNB-GW 3915 sends (at step 2) HNBAP REGISTER UPDATE DOWNLINK to theHNB 3905. In some embodiments, the HNBAP REGISTER UPDATE DOWNLINK message triggers (at step 3) an additional procedure. For example, the HNB rejects UEs due to updated access control or a closed user group list received from the HNB-GW. In some embodiments, the updates from the HNB-GW may be forced by the HNB-GW by sending a HNBAP DEREGISTER message and subsequently re-registrating the HNB. - 12. Relocation
- a. Relocation—CS Relocation from HNB to UTRAN Target
-
FIG. 40 illustrates the CS Handover from HNB to a UTRAN cell, in some embodiments. This figure includesHNB 4005,UE 4010, HNB-GW 4015,CN 4020, andRNC 4025. In some embodiments, this procedure is performed when theUE 4010 is on an active call on theHNB 4005 and has been ordered (by the HNB 4005) to make measurements on neighboring macro UTRAN cells. In addition, it is assumed, theHNB 4005 is able to derive the neighbor list configuration (for example, by using a scan of its neighbor cells or be provisioned by the HNB management system) and theHNB 4005 is able to distinguish other neighboring HNBs from the macro cells. In some embodiments, theHNB 4005 is able to retrieve from the HNB-GW 4015 (using HNBAP registration procedures) the target RNC-Id information for each of the neighbor cells. In some other embodiments, the target RNC-Id mapping is obtained from the HNB Management system during HNB initialization. - As shown, the
UE 4010 sends (at step 1) periodic Measurement Reports (Signal Measurements) to theHNB 4005. The handover may be triggered as a result of the UE Measurement Reports indicating better signal strength on a neighboring macro cell. TheHNB 4005 makes a decision (at step 2) on handover (e.g., based on the Measurement Reports from theUE 4010 or any uplink quality indications received from the HNB-GW 4015) and selects a target UTRAN cell. TheHNB 4005 then sends RANAP Relocation Required messages encapsulated in the RUA header to the HNB-GW 4015. This message would carry the necessary information such as the target cell id necessary to communicate with theCN 4020 and target UTRAN system (here, the RNC 4025). The HNB-GW 4015 relays (at step 3) the RANAP Relocation Required messages to the CN entity in the appropriate domain (using the domain indicator from the RUA header). - The
CN 4020 starts (at step 4) the handover procedure towards thetarget RNC 4025 identified by the Target-Id in the Relocation Required message from the HNB-GW 4015. TheCN 4020 requests that thetarget RNC 4025 allocate the necessary resources using a Relocation Request message. Thetarget RNC 4025 builds (at step 5) a Physical Channel Reconfiguration message providing information on the allocated UTRAN resources and sends it to theCN 4020 through the Relocation Request Acknowledge message. TheCN 4020 signals (at step 6) the HNB-GW 4015 to handover theUE 4010 to the UTRAN, using a Relocation Command message (which includes the Physical Channel Reconfiguration message), ending the handover preparation phase. - The HNB-
GW 4015 relays (at step 7) the RANAP Relocation Command message to theHNB 4005 with the appropriate RUA header information. TheHNB 4005 extracts (at step 8) the Physical Channel Reconfiguration message and sends it to theUE 4010 over the Uu interface. TheUE 4010 performs (at step 9) a handover into the new cell via uplink synchronization to the target RNS on the Uu interface. Thetarget RNC 4025 confirms (at step 10) the detection of the handover to theCN 4020, using the Relocation Detect message. TheCN 4020 may at this point switch (at step 11) the user plane to the target RNS. - Upon completion of synchronization with the target RNS, the
UE 4010 signals (at step 12) completion of handover using the Physical Channel Reconfiguration Complete message. Thetarget RNC 4025 confirms (at step 13) handover completion by sending the Relocation Complete message to theCN 4020. Bi-directional voice traffic is now flowing (at step 14) between theUE 4010 andCN 4020, via the UTRAN. - On receiving the confirmation of the completion of the handover, the
CN 4020 indicates (at step 15) to the HNB-GW 4015 to release any resources allocated to theUE 4005, via the Iu Release Command. The HNB-GW 4015 relays (at step 16) the RANAP Iu Release Command message to theHNB 4005. TheHNB 4005 confirms (at step 17) UE specific resource release using the RUA encapsulated RANAP Iu Release Complete message to the HNB-GW 4015. The HNB-GW 4015 confirms (at step 18) resource release to theCN 4020 using the Iu Release Complete message. Additionally, the HNB-GW 4015 may also release any local resources for the specific UE (e.g., ATM resources reserved for the voice bearer, etc). TheHNB 4005 deregisters (at step 19) theUE 4010 from the HNB-GW 4015, using an explicit HNBAP DEREGISTER message. - b. Relocation—CS Relocation from HNB to GERAN Target
-
FIG. 41 illustrates the CS handover from HNB to GERAN procedure, in some embodiments. This figure includesHNB 4105,UE 4110, HNB-GW 4115,CN 4120, and the (target)BSC 4125. The description of the procedures in this clause assume theUE 4110 is on an active call on theHNB 4105 and has been ordered (by the HNB 4105) to make inter RAT measurements on neighboring GSM cells. It is also assumed theHNB 4105 is able to derive the neighbor list configuration (using a scan of its neighbor cells). In some embodiments, theHNB 4105 is able to distinguish other neighboring HNBs from the macro cells. - As shown, the
UE 4110 sends (at step 1) a periodic Measurement Report (Signal Measurement) to theHNB 4105. The handover is triggered as a result of the UE Measurement Reports indicating better signal strength on neighboring macro GSM cell. - The
HNB 4105 makes a decision on handover (e.g., based on the Measurement Reports from theUE 4110 or any uplink quality indications received from the HNB-GW 4115) and selects a target GERAN cell. TheHNB 4105 then sends (at step 2) a RANAP Relocation Required messages encapsulated in the RUA header to the HNB-GW 4115. This message would carry the necessary information such as the target CGI necessary to communicate with theCN 4120 and target GERAN system (here the BSC 4125). The HNB-GW 4115 relays (at step 3) the RANAP Relocation Required messages to the CN entity in the appropriate domain (using the domain indicator from the RUA header). - The
CN 4120 starts (at step 4) the handover procedure towards the target GERAN (again, here the BSC 4125) identified by the Target-Id (i.e., CGI) in the Relocation Required message from the HNB-GW 4115. TheCN 4120 requests theBSC 4125 to allocate the necessary resources using Handover Request. TheBSC 4125 builds (at step 5) a Handover Command message providing information on the channel allocated and sends it to theCN 4120 through the Handover Request Acknowledge message. TheCN 4120 signals (at step 6) the HNB-GW 4115 to handover theUE 4110 to theBSC 4125, using Relocation Command message (which includes the DTAP Handover Command message), ending the handover preparation phase. - The HNB-
GW 4115 relays (at step 7) the RANAP Relocation Command message to theHNB 4105 with the appropriate RUA header information. TheHNB 4105 extracts (at step 8) the DTAP Handover Command message and sends it to theUE 4110 using the Uu: Handover from UTRAN message. TheUE 4110 transmits (at step 9) the Um: Handover Access containing the handover reference element to allow theBSC 4125 to correlate this handover access with the Handover Command message transmitted earlier to theCN 4120 in response to the Handover Request. - The
BSC 4125 confirms (at step 10) the detection of the handover to theCN 4120, using the Handover Detect message. TheCN 4120 may at this point switch (at step 11) the user plane to the target BSS (not shown). TheBSC 4125 provides (at step 12) Physical Information to the UE 4110 (i.e., Timing Advance), to allow theUE 4110 to synchronize with theBSC 4125. TheUE 4110 signals (at step 13) to theBSC 4125 that the handover is completed, using Handover Complete. TheBSC 4125 confirms (at step 14) to theCN 4120 the completion of the handover, via Handover Complete message. In some embodiments, theCN 4120 uses the target CGI used in the Handover procedure for charging purposes. Bi-directional voice traffic is now flowing (at step 15) between theUE 4110 andCN 4120, via the GERAN. - On receiving the confirmation of the completion of the handover, the
CN 4120 indicates (at step 16) to the HNB-GW 4115 to release any resources allocated to theUE 4110, via the Iu Release Command. The HNB-GW 4115 relays (at step 17) the RANAP Iu Release Command message to theHNB 4105. TheHNB 4105 confirms (at step 18) UE specific resource release using the RUA encapsulated RANAP Iu Release Complete message to the HNB-GW 4115. The HNB-GW 4115 relays (at step 19) the RANAP Iu Release Complete message to theCN 4120. TheHNB 4105 deregisters (at step 20) theUE 4110 from the HNB-GW 4115, using an explicit HNBAP DEREGISTER message. - c. Relocation—PS Relocation from HNB to UTRAN Target
-
FIG. 42 illustrates the PS Handover from HNB to UTRAN, in some embodiments. This figure includesHNB 4205,UE 4210, HNB-GW 4215,CN 4220, and the (target)RNC 4225. In some embodiments, theUE 4210 is on an active call on theHNB 4205 and theUE 4210 has been ordered (by the HNB 4205) to make measurements on neighboring macro UTRAN cells. In addition, theHNB 4205 is able to derive the neighbor list configuration (using a scan of its neighbor cells) and theHNB 4205 is able to distinguish other neighboring HNBs from the macro cells. In some embodiments, theHNB 4205 is able to retrieve from the HNB-GW 4215 (using HNBAP registration procedures) the target RNC-Id information for each of the neighbor cells. In some other embodiments, the target RNC-Id mapping can also be obtained from the HNB Management system during HNB initialization. - As shown, the
UE 4210 sends (at step 1) a periodic Measurement Report (Signal Measurement) to theHNB 4205. The handover is triggered as a result of the UE Measurement Reports indicating better signal strength on a neighboring macro cell. TheHNB 4205 makes a decision to handover based on the Measurement Reports from theUE 4210 and selects a target UTRAN cell (here, the RNC 4225). TheHNB 4205 then sends (at step 2) a RANAP Relocation Required messages encapsulated in the RUA header to the HNB-GW 4215. This message would carry the necessary information such as the target cell id necessary to communicate with theCN 4220 and theRNC 4225. The HNB-GW 4215 relays (at step 3) the RANAP Relocation Required messages to the CN entity in the appropriate domain (using the domain indicator from the RUA header). - The
CN 4220 starts (at step 4) the handover procedure towards theRNC 4225 identified by the Target-Id in the Relocation Required message from the HNB-GW 4215. TheCN 4220 requests from theRNC 4225 to allocate the necessary resources using Relocation Request. TheRNC 4225 builds (at step 5) a Physical Channel Reconfiguration message providing information on the allocated UTRAN resources and sends it to theCN 4220 through the Relocation Request Acknowledge message. TheCN 4220 signals (at step 6) the HNB-GW 4215 to handover theUE 4205 to theRNC 4225, using a Relocation Command message (which includes the Physical Channel Reconfiguration message), ending the handover preparation phase. The HNB-GW 4215 relays (at step 7) the RANAP Relocation Command message to theHNB 4205 with the appropriate RUA header information. The order of steps fromStep 8 onwards doesn't necessarily indicate the order of events. For example, steps 8 to 10 may be performed by theHNB 4205 almost simultaneously. TheHNB 4205 may begin (at step 8) forwarding the data for the radio access bearers (RABs) which are subject to data forwarding. For each radio bearer which uses lossless PDCP, the GTP-PDUs related to transmitted but not yet acknowledged PDCP-PDUs are duplicated and routed at an IP layer towards thetarget RNC 4225 together with their related downlink PDCP sequence numbers. TheHNB 4205 continues transmitting duplicates of downlink data and receiving uplink data. - The
HNB 4205 extracts (at step 9) the Physical Channel Reconfiguration message and sends it to theUE 4210 over the Uu interface. TheHNB 4205 sends (at step 10) a RANAP Forward SRNS Context message to the HNB-GW 4215 to transfer the SRNS contexts to theRNC 4225 via HNB-GW 4215. The HNB-GW 4215 relays (at step 11) the corresponding Forward SRNS Context message to the associated CN node. - The
CN 4220 relays (at step 12) the SRNS Context information to theRNC 4225. TheUE 4210 performs (at step 13) a handover into the new cell via uplink synchronization to the target RNS on the Uu interface. TheRNC 4225 confirms (at step 14) the detection of the handover to theCN 4220, using the Relocation Detect message. Upon completion of synchronization with the target RNS (not shown), theUE 4210 signals (at step 15) completion of handover using the Physical Channel Reconfiguration Complete message. - The
RNC 4225 confirms (at step 16) handover completion by sending the Relocation Complete message to theCN 4220. On receiving the confirmation of the completion of the handover, theCN 4220 indicates (at step 17) to the HNB-GW 4215 to release any resources allocated to theUE 4210, via the Iu Release Command. At this point, theCN 4220 will also switch the PS user plane from the HNB-GW 4215 to the target RNS. The HNB-GW 4215 relays (at step 18) the RANAP Iu Release Command message to theHNB 4205. TheHNB 4205 confirms (at step 19) UE specific resource release using the RUA encapsulated RANAP Iu Release Complete message to the HNB-GW 4215. The HNB-GW 4215 confirms (at step 20) resource release to theCN 4220 using the Iu Release Complete message. TheHNB 4205 deregisters (at step 21) theUE 4210 from the HNB-GW 4215, using an explicit HNBAP DEREGISTER message. - d. Relocation—PS Relocation from HNB to GERAN Target
-
FIG. 43 illustrates the PS handover from HNB to GERAN procedure, in some embodiments. This figure includesHNB 4305,UE 4310, HNB-GW 4315,CN 4320, andBSC 4325. In some embodiments, theUE 4310 is on an active call on theHNB 4305 and has been ordered (by the HNB 4305) to make inter RAT measurements on neighboring GSM cells. Additionally, theHNB 4305 is able to derive the neighbor list configuration (using a scan of its neighbor cells). In some embodiments, theHNB 4305 is able to distinguish other neighboring HNBs from the macro cells. - As shown, the
UE 4310 sends (at step 1) a periodic Measurement Report (Signal Measurement) to theHNB 4305. The handover is triggered as a result of the UE Measurement Reports indicating better signal strength on a neighboring GSM cell. TheHNB 4305 makes a decision (at step 2) to handover based on the Measurement Reports from theUE 4310 and selects a target GERAN cell (here, the BSC 4325). TheHNB 4305 then sends RANAP Relocation Required messages encapsulated in the RUA header to the HNB-GW 4315. This message would carry the necessary information such as the target cell id necessary to communicate with theCN 4320 and target GERAN system. The HNB-GW 4315 relays (at step 3) the RANAP Relocation Required messages to theCN 4320 in the appropriate domain (using the domain indicator from the RUA header). - The CN 4320 (i.e., SGSN) and Target BSS complete (at steps 4-6) the UTRAN to GERAN PS handover preparation as described in 3GPP Technical Specification 43.129 entitled “Packet-switched handover for GERAN A/Gb mode;
Stage 2” the contents of which are herein incorporated by reference. TheCN 4320 signals (at step 7) the HNB-GW 4315 to handover theUE 4310 to theBSC 4325, using a RANAP Relocation Command message. The HNB-GW 4315 relays (at step 8) the RANAP Relocation Command message to theHNB 4305 with the appropriate RUA header information. - The
HNB 4305 may begin forwarding (at step 9) the data for the Radio Access Bearers (RABs) which are subject to data forwarding per the description in 3GPP TS 43.129. TheHNB 4305 sends (at step 10) the Handover from UTRAN message and sends it to theUE 4305 over the Uu interface. TheHNB 4305 sends (at step 11) a RUA encapsulated RANAP Forward SRNS Context message to the HNB-GW 4315 to transfer the SRNS contexts to theBSC 4325. The HNB-GW 4315 relays (at step 12) the corresponding Forward SRNS Context message to the associated CN node. TheCN 4320 relays (at step 13) the SRNS Context information to theBSC 4325. TheUE 4310 executes (at step 14) the GERAN A/Gb PS handover access procedures as described in 3GPP TS 43.129. - After successfully accessing the GERAN cell, the
UE 4310 andBSC 4325 complete (at step 15) the GERAN PS handover procedures as described in 3GPP TS 43.129. TheBSC 4325 confirms (at step 16) handover completion by sending the Handover Complete message to theCN 4320. On receiving the confirmation of the completion of the handover, theCN 4320 indicates (at step 17) to the HNB-GW 4315 to release any resources allocated to theUE 4310, via the Iu Release Command. The HNB-GW 4315 relays (at step 18) the RANAP Iu Release Command message to theHNB 4305. - When the HNB data forwarding timer has expired, the
HNB 4305 confirms (step 19) UE-specific resource release using the RUA encapsulated RANAP Iu Release Complete message to the HNB-GW 4315. The HNB-GW 4315 confirms (at step 20) resource release to theCN 4320 using the Iu Release Complete message. TheHNB 4305 deregisters (at step 21) theUE 4310 from the HNB-GW 4315, using an explicit HNBAP DEREGISTER message. TheUE 4310 performs (at step 22) the Routing Area Update procedures through theBSC 4325. - 1. CS User Plane Establishment (ATM Transport)
-
FIG. 44 illustrates CS bearer establishment (ATM transport) procedures (for MO/MT calls, using Iu-UP over AAL2), in some embodiments. In some such embodiments, an ATM interface exists between the HNB-GW 4415 and theMSC 4420. - As shown, signaling for a call origination or termination is in progress (at step 1). The
MSC 4420 sends (at step 2) a RAB Assignment Request message to the HNB-GW 4415. The assignment request contains the address for ALCAP signaling (an ATM E.164 or NSAP address) and also the binding-id. The HNB-GW 4415 will initiate (at step 3) ALCAP signaling towards theMSC 4420 using the ATM address and the binding-id. TheMSC 4420 acknowledges (at step 4) the AAL2 connection request using the ALCAP Establish confirm message. - At this point an AAL2 connection with appropriate QoS exists (at step 5) between the HNB-
GW 4415 and theMSC 4420. The HNB-GW 4415 forwards (at step 6) the RUA encapsulated RANAP RAB Assignment Request message to theHNB 4405 to prepare a bearer connection between the endpoints. The HNB-GW 4415 assigns an IP address and a RTP port for this specific bearer towards theHNB 4405. The HNB-GW 4415 modifies the RANAP RAB Assignment Request message to remove ATM specific transport information and replaces it with the necessary information (e.g., RTP port and IP address of the HNB-GW 4415) for setup of Iu-UP over IP between theHNB 4405 and HNB-GW 4415. TheHNB 4405 upon receiving the RANAP RAB Assignment Request message triggers the setup of Iu-UP by sending (at step 7) an Iu-UP Init user plane control message over the specified IP transport to the HNB-GW 4415. The HNB-GW 4415 switches (at step 8) the transport layer and relays the Iu-UP Init message towards the CN (not shown) over the corresponding AAL2 connection which was setup instep 5. - The
MSC 4420 responds (at step 9) back to the HNB-GW 4415 with Iu-UP Init Ack message over the corresponding AAL2 connection. The HNB-GW 4415 relays (at step 10) the Iu-UP Init Ack message theHNB 4405 over the corresponding RTP transport. TheHNB 4405 will initiate (at step 11) appropriate RRC layer Radio Bearer Setup message towards theUE 4410. TheUE 4410 confirms (at step 12) the setup via Radio Bearer Setup Complete message to theHNB 4405. - The
HNB 4405 then sends (at step 13) a RUA encapsulated RANAP RAB Assignment Response message to the HNB-GW 4415, including the local IP address and port to be used for the Iu-UP over the Iuh interface. The HNB-GW 4415 replaces (at step 14) the IP transport information with ATM specific transport information and forwards the RANAP RAB Assignment Response message to the CN signaling the completion of RAB assignment. At this point, there is (atsteps 15 a-c) CS bearer between theUE 4410 and theMSC 4420 via theHNB 4405 and the HNB-GW MGW. The rest of the call establishment continues. - 2. CS User Plane Establishment (IP Transport)
-
FIG. 45 illustrates CS bearer establishment (IP transport) procedures (for MO/MT calls, using Iu-UP over AAL2), in some embodiments. In some such embodiments, an IP interface exists between the HNB-GW 4515 and theMSC 4520. - As shown, signaling for a call origination or termination is in progress (at step 1). The
MSC 4520 sends (at step 2) a RAB Assignment Request message to the HNB-GW 4515. The assignment request contains the necessary information for IP based transport setup of the CS bearer. The HNB-GW 4515 forwards (at step 3) the RUA encapsulated RANAP RAB Assignment Request message to theHNB 4505 for preparing a bearer connection between the endpoints. In some embodiments, the HNB-GW 4515 assigns a local IP address of the HNB-GW 4515 and a RTP port for this specific bearer towards theHNB 4505 and modifies the RANAP RAB Assignment Request message to replace the necessary information (e.g., RTP port and IP address of the HNB-GW 4515) for setup of Iu-UP over IP between theHNB 4505 and HNB-GW 4515. - The
HNB 4505, upon receiving the RANAP RAB Assignment Request message, triggers (at step 4) the setup of Iu-UP by sending an Iu-UP Init user plane control message over the specified IP transport to the HNB-GW 4515. The HNB-GW 4515 relays (at step 5) the Iu-UP Init message towards the CN (here, MSC 4520) over the corresponding CN IP transport. TheMSC 4520 responds (at step 6) back to the HNB-GW 4515 with Iu-UP Init Ack message. The HNB-GW 4515 relays (at step 7) the Iu-UP Init Ack message to theHNB 4505 over the corresponding IP transport. TheHNB 4505 will initiate (at step 8) an appropriate RRC layer Radio Bearer Setup message towards theUE 4510. TheUE 4510 confirms (at step 9) the setup via a Radio Bearer Setup Complete message to theHNB 4505. - The
HNB 4505 then sends (at step 10) a RUA encapsulated RANAP RAB Assignment Response message to the HNB-GW 4515, including the local IP address and port to be used for the Iu-UP over the Iuh interface. The HNB-GW 4515 replaces (at step 11) the IP transport information with local HNB-GW specific transport information and forwards the RANAP RAB Assignment Response message to the CN. The RANAP RAB Assignment Response message signals the completion of RAB assignment. At this point, there is (atsteps 12 a-c) a CS bearer between theUE 4510 andMSC 4520 via theHNB 4505 and the HNB-GW MGW (here, part of 4515). The rest of the call establishment continues. - 1. Mobile Originated Call
-
FIG. 46 illustrates a mobile originated call over HNB procedure, in some embodiments. As shown, theUE 4610 in idle mode originates (at step 1) a call. TheUE 4610 establishes (at step 2) a RRC connection with theHNB 4605. Upon request from the upper layers, theUE 4610 sends (at step 3) the CM Service Request to theHNB 4605. TheHNB 4605 sends (at step 4) a RUA encapsulated RANAP Initial UE Message towards the HNB-GW 4615. In some embodiments, this RUA message can be the RUA Connect message thus indicating to the HNB-GW the initial message for that particular UE signaling. - The HNB-
GW 4615 establishes (atsteps 5 a-b) an SCCP connection to theMSC 4620 and forwards the RANAP Initial UE Message to theMSC 4620 over the corresponding SCCP connection. TheMSC 4620 authenticates (at step 6) theHNB 4605 using standard UTRAN authentication procedures. TheMSC 4620 also initiates the Security Mode Control procedure described in previous sections. TheUE 4610 sends (at step 7) the Setup message to theHNB 4605 providing details on the call to theMSC 4620 and its bearer capability and supported codecs. TheHNB 4605 forwards (at step 8) this Setup message within the RUA encapsulated RANAP Direct Transfer message to the HNB-GW 4615. The HNB-GW 4615 relays (at step 9) the RANAP Direct Transfer (Setup) message to theMSC 4620. - The
MSC 4620 indicates (at step 10) it has received the call setup and it will accept no additional call-establishment information using the Call Proceeding message to the HNB-GW 4615. The HNB-GW 4615 forwards (at step 11) the RUA encapsulated RANAP Direct Transfer (Call Proceeding) message to theHNB 4605. TheHNB 4605 relays (at step 12) the Call Proceeding message to theUE 4610 over the air interface. An end to end bearer path is established (at step 13) between theMSC 4620 andUE 4610 using one of the procedures shown in previous sections. - The
MSC 4620 signals (at step 14) to theUE 4610, with the Alerting message, that the B-Party is ringing. The message is transferred to the HNB-GW 4615. The HNB-GW 4615 forwards (at step 15) the RUA encapsulated RANAP Direct Transfer (Alerting) message to theHNB 4605. TheHNB 4605 relays (at step 16) the Alerting message to theUE 4610 and if theUE 4610 has not connected the audio path to the user, it generates ring back to the calling party. Otherwise, the network-generated ring back will be returned to the calling party. TheMSC 4620 signals (at step 17) that the called party has answered, via the Connect message. The message is transferred to the HNB-GW 4615. - HNB-
GW 4615 forwards (at step 18) the RUA encapsulated RANAP Direct Transfer (Connect) message to theHNB 4605. TheHNB 4605 relays (at step 19) the Connect message to theUE 4610 and theUE 4610 connects the user to the audio path. If theUE 4610 is generating ring back, it stops and connects the user to the audio path. TheUE 4610 sends (at step 20) the Connect Ack in response, and the two parties are connected for the voice call. TheHNB 4605 forwards (at step 21) this Connect Ack message within the RUA encapsulated RANAP Direct Transfer message to the HNB-GW 4615. The HNB-GW 4615 forwards (at step 22) the Connect Ack message to theMSC 4620. The end-to-end two way path is now in place and bi-directional voice traffic flows (at step 23) between theUE 4610 andMSC 4620 through theHNB 4605 and the HNB-GW 4615. - 2. Mobile Terminated Call
-
FIG. 47 illustrates a mobile terminated PSTN-to-mobile call procedure, in some embodiments. TheMSC 4720 sends (at step 1) a RANAP Paging message to the HNB-GW 4715 identified through the last Location Update received by it and includes the TMSI if available. The IMSI of the mobile being paged is always included in the request. The HNB-GW 4715 identifies (at step 2) the UE registration context and theHNB 4705 using the IMSI provided by theMSC 4720. The HNB-GW 4715 then forwards the RANAP Paging message to thecorresponding HNB 4705 with the RANAP Paging message encapsulated by the RUA header. TheHNB 4705 relays (at step 3) the Paging request to theUE 4710. In some embodiments, theHNB 4705 uses Paging Type I or II based on the RRC state of theUE 4710 as described in 3GPP technical specification TS 25.331 entitled “Radio Resource Control (RRC) protocol specification”, incorporated herein by reference, and referred to herein as TS 25.331. - The
UE 4710 establishes (at step 4) an RRC connection with theHNB 4705 if one doesn't exist. This step is omitted if there is an already existing RRC connection (e.g., an RRC connection may have been established for PS domain). TheUE 4710 processes (at step 5) the paging request and sends the Paging response to theHNB 4705. TheHNB 4705 sends (at step 6) a RUA encapsulated RANAP Initial UE Message carrying the paging response from theUE 4710 towards the HNB-GW 4715. In some embodiments, this RUA message can be the RUA Connect message thus indicating to the HNB-GW the initial message for that particular UE signaling. The HNB-GW 4715 establishes (at step 7) an SCCP connection to theMSC 4720. The HNB-GW 4715 then forwards the paging response to theMSC 4720 using the RANAP Initial UE Message. - The
MSC 4720 authenticates (at step 8) theHNB 4705 using standard UTRAN authentication procedures. TheMSC 4720 also initiates the Security Mode Control procedures. TheMSC 4720 initiates (at step 9) call setup using the Setup message sent to theHNB 4705 via the HNB-GW 4710. The HNB-GW 4710 forwards (at step 10) the RUA encapsulated RANAP Direct Transfer (Setup) message to theHNB 4705. TheHNB 4705 relays (at step 11) the Setup message to theUE 4710. - The
UE 4710 responds (at step 12) with Call Confirmed after checking it's compatibility with the bearer service requested in the Setup and modifying the bearer service as needed. If the Setup included the signal information element, theUE 4710 alerts the user using the indicated signal, otherwise theUE 4710 alerts the user after the successful configuration of the user plane. - The
HNB 4705 relays (at step 13) the Call Confirmed to the HNB-GW 4715 using the RUA encapsulated RANAP Direct Transfer. The HNB-GW 4715 forwards (at step 14) the Call Confirmed message to theMSC 4720 using RANAP Direct Transfer message. An end to end bearer path is established (at step 15) between theMSC 4720 andUE 4710 using one of the procedures shown in previous sections. - The
UE 4710 signals (at step 16) that it is alerting the user, via the Alerting message to theHNB 4705. TheHNB 4705 relays (at step 17) the Alerting message to the HNB-GW 4715 using the RUA encapsulated RANAP Direct Transfer message. The HNB-GW 4715 forwards (at step 18) the Alerting message to theMSC 4720. TheUE 4710 signals (at step 19) that the called party has answered, via the Connect message. TheHNB 4705 relays (at step 20) the Connect message to the HNB-GW 4715 using the RUA encapsulated RANAP Direct Transfer message. The HNB-GW 4715 forwards (at step 21) the Connect message to theMSC 4720. TheMSC 4720 acknowledges (at step 22) via the Connect Ack message to the HNB-GW 4715. - The HNB-
GW 4715 forwards (at step 23) the RUA encapsulated RANAP Direct Transfer (Connect Ack) message to theHNB 4705. TheHNB 4705 relays (at step 24) the Connect Ack to theUE 4710. The two parties on the call are connected on the audio path. The end-to-end two way path is now in place and bi-directional voice traffic flows (at step 25) between theUE 4710 andMSC 4720 through theHNB 4705 and the HNB-GW 4715. -
FIG. 48 illustrates a call release by an HNB subscriber procedure, in some embodiments. The HNB subscriber requests (at step 1) call release (e.g., by pressing the END button). Upon request from the upper layers, theUE 4810 sends (at step 2) the Disconnect NAS message to theHNB 4805. TheHNB 4805 relays (at step 3) the Disconnect message to the HNB-GW 4815 using the RUA encapsulated RANAP Direct Transfer message. The HNB-GW 4815 relays (at step 4) the Disconnect message to theMSC 4820 via RANAP Direct Transfer message. - The
MSC 4820 sends (at step 5) a Release to the HNB-GW 4820 using a RANAP Direct Transfer message. The HNB-GW 4815 forwards (at step 6) the RUA encapsulated RANAP Direct Transfer (Release) message to theHNB 4805. TheHNB 4805 sends (at step 7) the Release message to theUE 4810 over the air interface. TheUE 4810 confirms (at step 8) the Release via the Release Complete message to theHNB 4805. TheHNB 4805 relays (at step 9) the Release Complete message to the HNB-GW 4815 using the RUA encapsulated RANAP Direct Transfer message. The HNB-GW 4815 forwards (at step 10) the message to theMSC 4820 using a RANAP Direct Transfer message. At this point, theMSC 4820 considers the connection released. - The
MSC 4820 sends (at step 11) an Iu Release Command to the HNB-GW 4815 indicating a request to release the call resources. The SCCP Connection Identifier is used to determine the corresponding call. The HNB-GW 4815 forwards (at step 12) the RUA encapsulated RANAP Iu Release Command message to theHNB 4805. TheHNB 4805 in turn releases any radio resource associated for the specific call. In some embodiments, when there is an active PS session for theUE 4810, the RRC connection may not be released by theHNB 4805, and only the corresponding CS radio bearers are released. - The
HNB 4805 acknowledges (at step 14) the radio resource to the HNB-GW 4815 using the RUA encapsulated RANAP Iu Release Complete message. In some embodiments, this RUA message can be the RUA Disconnect message thus indicating to the HNB-GW the final message for that particular UE signaling. The HNB-GW 4815 releases (at step 15) any local resources (such as ATM transport or IP transport resources). The HNB-GW 4815 then forwards (at step 16) the resource release to the MSC using the Iu Release Complete message to the MSC. The SCCP connection associated with the call between the HNB-GW and the MSC is released as well. - In some embodiments, the HNB solution supports additional calling scenarios. For example, the HNB solution supports calling line identification presentation (CLIP), calling line identification restriction (CLIR), connected line identification presentation (CoLP), connected line identification restriction (CoLR), call forwarding unconditional, call forwarding busy, call forwarding no reply, call forwarding not reachable, call waiting (CW), call hold (CH), multi-party (MPTY), closed user group (CUG), advice of charge (AoC), user user signaling (UUS), call barring (CB), explicit call transfer (ECT), name identification, and completion of calls to busy subscriber (CCBS).
- These supplementary services involve procedures that operate end-to-end between the UE and the MSC. Beyond the basic DTAP messages already described for mobile originated and mobile terminated calls, the following DTAP messages are used for these additional supplementary service purposes: HOLD, HOLD-ACKNOWLEDGE, HOLD-REJECT, RETRIEVE, RETRIEVE-ACKNOWLEDGE, RETRIEVE-REJECT, FACILITY, USER-INFORMATION, CONGESTION-CONTROL, CM-SERVICE-PROMPT, START-CC, CC-ESTABLISHMENT, CC-ESTABLISHMENT-CONFIRMED, and RECALL.
- These DTAP message are relayed between the UE and MSC by the HNB and HNB-GW in the same manner as in the other call control and mobility management scenarios described above.
FIG. 49 illustrates an example relay of DTAP supplementary service messages, in some embodiments. - As shown, there is an existing MM connection established (at step 1) between the
UE 4910 and theMSC 4920 for an ongoing call. The user requests (at step 2) a particular supplementary service operation (e.g., to put the call on hold). - The
UE 4910 sends (at step 3) the HOLD message to theHNB 4905 over the air which in turn forwards the message to HNB-GW 4915, embedded in a RUA encapsulated RANAP Direct Transfer message. The HNB-GW 4915 relays the DTAP HOLD message to theMSC 4920 over the Iu-interface. The DTAP HOLD-ACK message is sent (at step 4) fromMSC 4920 toUE 4910 in an analogous manner. - Later in the call, the user requests (at step 5) another supplementary service operation (e.g., to initiate a Multi-Party call). The
UE 4910 sends (at step 6) the FACILITY message to theHNB 4905 over the air interface which in turn forwards the message to the HNB-GW 4915. The HNB-GW 4915 relays the DTAP FACILITY message to theMSC 4920 over the Iu-interface. The DTAP FACILITY message containing the response is sent (at step 7) from theMSC 4920 to theUE 4910 in an analogous manner. - In some embodiments, a single SCTP connection to the HNB-GW per HNB is established for the transport of signaling messages from that HNB. This SCTP connection is used to transport CS and PS related signaling and SMS messages for all the UEs from the HNB.
- 1. UE Initiated PS Signaling Procedure
- For UE initiated PS related signaling, the UE sends a PS signaling message to the CN, via the HNB-GW which forwards it to the CN over the Iu-PS interface as per standard UMTS (e.g., the signaling message may include GMM attach or SM PDP context activation message). The HNB-GW encapsulates the received signaling message within a RANAP Direct Transfer message that is forwarded to the SGSN over the Iu-PS interface.
-
FIG. 50 illustrates an uplink control plane data transport procedure, in some embodiments. Initially, theUE 5010 is ready to send an uplink signaling message for PS services to the CN (SGSN) 5020. This could be any of the GMM or SM signaling messages. - As shown, when the RRC connection does not exist, the
UE 5010 initiates (at step 1) a RRC Connection establishment procedure as per standard 3GPP procedure. Upon successful RRC Connection establishment, theUE 5010 forwards (at step 2) a Service Request message to theSGSN 5020 via theHNB 5005 indicating a PS Signaling message. TheHNB 5005 sends (at step 3) the Service Request within the RUA encapsulated RANAP Initial UE message to the HNB-GW 5015. - In some embodiments, the RUA encapsulated RANAP Initial UE message sent at
step 3 is an INITIAL DIRECT TRANSFER message of the HNB system. The INITIAL DIRECT TRANSFER is used to transfer the RANAP “Initial UE Message” that is encapsulated in the INITIAL DIRECT TRANSFER from the HNB to an indicated core network domain. Specifically, the INITIAL DIRECT TRANSFER message explicitly indicates the start of a communication session and the message contains parameters used to route the establishment of a signaling connection from the HNB-GW to a CN node within a CN domain, such as the SGSN, when no signaling connection exists. By using this explicit message, the HNB-GW is explicitly notified of impending signaling connection without having to process the contents of the message. In some embodiments, this RUA message can be the RUA Connect message thus indicating to the HNB-GW the initial message for that particular UE signaling. - The HNB-
GW 5015 forwards (at step 4) the Service Request to the CN (specifically the SGSN) 5020 encapsulated within the Initial Iu message. In some embodiments, the CN (SGSN) 5020 may initiate (at step 5) a security function. - The
UE 5010 sends (at step 6) the PS signaling message to theHNB 5005 using RRC Uplink Direct Transfer service. TheHNB 5005 forwards (at step 7) the PS signaling message to the HNB-GW 5015 using a RUA encapsulated RANAP Direct Transfer message. The HNB-GW 5015 forwards (at step 8) the PS signaling message to the CN (SGSN) 5020 using RANAP Direct Transfer message. - 2. Network Initiated PS Signaling Procedure
- For Network initiated PS related signaling, the Core Network sends a PS signaling message to the HNB-GW via the Iu-PS interface as per standard UMTS (e.g., the signaling message may include GMM attach accept or SM PDP context activation accept message). The HNB-GW encapsulates the RANAP received signaling message within the RUA header and forwards it to the HNB via the existing SCTP signaling connection.
-
FIG. 51 illustrates a downlink control plane data transport procedure, in some embodiments. Initially, the CN (SGSN) 5120 is ready to send a downlink signaling message for PS services to theUE 5110. This could be any of the GMM or SM signaling messages. Given that the signaling procedure is network initiated and if theUE 5110 is in PMM-IDLE state, theSGSN 5120 will first page theUE 5110. If theUE 5110 is in PMM-CONNECTED state, theSGSN 5120 will send the downlink PS signaling message using RANAP Direct Transfer procedure starting withstep 9. - However, if the
UE 5120 is in PMM-IDLE state, the CN (SGSN) 5120 sends (at step 1) the RANAP Paging request to theUE 5110 via the HNB-GW 5115 to locate the user. The paging request indicates paging for PS Domain. Optionally, if the paging request was received, the HNB-GW 5115 identifies (at step 2) thetarget HNB 5105 and forwards the request using the RUA encapsulated RANAP Paging message to theHNB 5105. Optionally, if the paging message is received, theHNB 5105 forwards (at step 3) the PS page to theUE 5110 as per standard 3GPP procedure. Optionally, if the RRC connection does not exist for thatUE 5110, it is established (at step 4) as per standard 3GPP procedures. Optionally, if the page for PS services was received, theUE 5110 responds (at step 5) to theSGSN 5120 via theHNB 5105 with a Service Request message indicating PS paging response. The Service Request message is encapsulated within the RRC INITIAL DIRECT TRANSFER message. - The
HNB 5105 forwards (at step 6) the paging response via a RUA encapsulated RANAP Initial UE message to the HNB-GW 5115. In some embodiments, this RUA message can be the RUA Connect message, thus indicating to the HNB-GW the initial message for that particular UE signaling. The HNB-GW 5115 establishes SCCP connection towards the CN for the specified domain and forwards (at step 7) the Service Request message to theSGSN 5120 encapsulated in the RANAP Initial UE Message. Optionally, the CN (SGSN) 5120 initiates (at step 8) Security Function. - The CN (SGSN) 5120 forwards (at step 9) the PS signaling message to the HNB-
GW 5115 using RANAP Direct Transfer procedure. The HNB-GW 5115 forwards (at step 10) the PS signaling message to theHNB 5105 via RUA encapsulated RANAP Direct Transfer message. TheHNB 5105 sends (at step 11) the signaling message to theUE 5110 using RRC Downlink Direct Transfer service. - In some embodiments, the HNB system provides support for both circuit mode (CS mode) and packet mode (PS mode) SMS services. In the CS/PS mode of operation, UEs may be able to send and receive short messages using either the MM sub-layer or the GMM sub-layer. In some embodiments, UEs using the PS mode of operation send and receive short messages using only GMM sub-layer. Inter-working with HNB related to SMS services is described in the following sections.
- 1. SMS Services
-
FIG. 52 illustrates the HNB protocol architecture related to CS and PS domain SMS support in accordance with some embodiments. This protocol architecture builds on the circuit and packet services signaling architecture. This figure includes (1)UE 5210, (2) HNB-GW 5215, (3) CN/MSC 5220, (4)SMS layers 5225, (5)MM layer 5235, (6) SM-CP protocol 5240; and (7)HNB 5245. - The HNB SMS support is based on the same mechanism that is utilized for CS/PS mobility management and call control. On the UE side, the SMS layers (including the supporting CM sub-layer functions) utilize the services of the MM layer 5235 (CS domain) and GMM (PS domain) to transfer SMS messages per standard circuit/packet domain implementation. The SM-
CP protocol 5240 is effectively tunneled between theUE 5210 and theMSC 5220 using the message relay functions in the RUA encapsulated RANAP messages. As with CS/PS mobility management and call control procedures, SMS uses the SCTP signaling connection between theHNB 5245 and the HNB-GW 5215, providing reliable SMS delivery over the Iuh interface. - 1. Circuit Mode Mobile-Originated SMS
-
FIG. 53 illustrates a CS mode mobile-originated SMS over HNB scenario, in some embodiments. This figure includes (1)HNB 5305, (2)UE 5310, (3) HNB-GW 5315, (4) CN (MSC) 5320, and (5) SMS interworking MSC (IWMSC) 5325. The user enters (at step 1) a message and invokes the mobile-originated SMS function on theUE 5310 in idle mode. Steps 2-6 are the same as steps 2-7 inFIG. 46 . TheUE 5310 sends (at step 7) the SMS message encapsulated in a CP-DATA message to theHNB 5305 over the air interface. TheHNB 5305 forwards (at step 8) this CP-DATA message within the RUA encapsulated RANAP Direct Transfer message to the HNB-GW 5315. The HNB-GW 5315 forwards (at step 9) the CP-DATA message to theMSC 5320 using RANAP Direct Transfer message. TheMSC 5320 forwards (at step 10) the message to the SMSC (not shown) via the SMS interworking MSC (IWMSC) 5325 using the MAP-MO-FORWARD-SM Invoke message. - The
MSC 5320 sends (at step 11) CP-DATA-ACK to acknowledge the receipt of the CP-DATA message. In some embodiments, the SM-CP is designed in a way that every CP-DATA block is acknowledged on each point-to-point connection between the UE and SMSC (SM Service Center) to ensure that the under-laying transport layer (in this case RANAP) works error free since there is no explicit acknowledgement to a RANAP Direct Transfer message. The HNB-GW 5315 relays (at step 12) the RUA encapsulated RANAP Direct Transfer (CP-DATA-ACK) message to theHNB 5305. TheHNB 5305 forwards (at step 13) the CP-DATA-ACK to theUE 5310 over the air interface. - The SMSC sends (at step 14) an SMS message in response to the
IWMSC 5325 and theIWMSC 5325 sends the response to theMSC 5320 in the MAP-MO-FORWARD-SM Return Result message. TheMSC 5320 relays (at step 15) the response to the HNB-GW 5315 in the CP-DATA message. The HNB-GW 5315 relays (at step 16) the RUA encapsulated RANAP Direct Transfer (CP-DATA) message to theHNB 5305. TheHNB 5305 forwards (at step 17) the response to theUE 5310 over the air interface using the existing RRC connections. As part of SM-CP ack process, theUE 5310 acknowledges (at step 18) the receipt of CP-DATA to theHNB 5305. - The
HNB 5305 forwards (at step 19) this CP-DATA-ACK message within the RUA encapsulated RANAP Direct Transfer message to the HNB-GW 5315. The HNB-GW 5315 forwards (at step 20) the acknowledgement to theMSC 5320 using the RANAP Direct Transfer message. TheMSC 5320 sends (at step 21) an Iu Release message to the HNB-GW 5315 indicating a request to release the session resources. The SCCP Connection Identifier is used to determine the corresponding session. The HNB-GW 5315 relays (at step 22) the RUA encapsulated RANAP Iu Release message to theHNB 5305. TheHNB 5305 releases (at step 23) corresponding radio resources towards theUE 5310. - The
HNB 5305 acknowledges (at step 24) the radio resource to the HNB-GW 5315 using the RUA encapsulated RANAP Iu Release Complete message. In some embodiments, this RUA message can be the RUA Disconnect message thus indicating to the HNB-GW the final message for that particular UE signaling. The HNB-GW 5315 then forwards (at step 25) the resource release to theMSC 5320 using the Iu Release Complete message. The SCCP connection associated with the call between the HNB-GW 5315 and theMSC 5320 is released as well. - Transparent support for emergency services is a key regulatory requirement. However, support for emergency services in the HNB system is complicated by virtue of the fact that the HNBs are deployed on an ad-hoc basis by many users. Additionally, these HNBs may be relocated at any time by the user without notice to the service provider. Therefore, some embodiments provide methods and systems for transparently supporting emergency services within the HNB system by dynamically determining a location for each of the HNBs. In this manner, some embodiments provide emergency responders the ability to locate a position of an emergency caller when the caller places the emergency request through a HNB service area. This is referred to below as Service Area Based Routing. Some embodiments provide methods and systems for transparently supporting emergency services within the HNB system based on location information (e.g. using information derived from the UE or through UE assisted location determination). This is referred to below as Location Based Routing.
- The location information is routed through the core network to the appropriate responding node closest to the location of the caller. This is done by transparently integrating the HNB system information with the existing core network components (e.g., Public Safety Answering Point (PSAP)) that facilitate emergency services.
- HNB emergency services support capabilities include support for flexible SAI assignment and HNB-GW assignment functionality. This allows the HNB to be assigned to an HNB-GW that is, in turn, connected to an MSC that can route calls to the PSAP in the HNB service area. This also allows the service provider to define HNB service areas that align with macro network service areas, to leverage the existing service area based PSAP routing approach. HNB emergency services support capabilities also include support for the retrieval and storage of HNB location information from an external database. In some embodiments, the HNB emergency services support capabilities also include support for the RANAP Location Report procedure, by which the HNB-GW (or HNB) returns the HNB/UE location information to the MSC during emergency call processing. Additional emergency services support include support emergency services for any UE with proper SIM card regardless of the access control policy of the HNB.
- One of the functions of the HNB-GW is to assign a HNB service area for calls made by the UE using the HNB. The HNB, during registration, provides information on macro coverage (such as macro LAI, macro 3 G cell-id, etc.) which can be used to derive a HNB Service Area Identification (SAI). This HNB SAI can be used to support the ability to route emergency calls to the correct PSAP (i.e., based on SAI). However, to meet the requirement to route the emergency call to the correct PSAP, some embodiments utilize service area (i.e., SAI) based routing and some other embodiments utilize location based routing.
- A. Service Area Based Routing
- With Service Area Based Routing, the PSAP routing decision is based on either the Service Area Code (SAC) contained within the SAI or the LAI contained within the SAI or the entire SAI (i.e., LAI+SAC). Since the service area of a HNB spans only several meters, the location information meets regulatory requirements and provides an accurate location of the user.
- 1. Service Area Based Routing of UEs Camped Successfully on the HNB
-
FIG. 54 illustrates an emergency call routing over HNB using a service area procedure in accordance with some embodiments. In some such embodiments, the UE originates the emergency call after successfully camping (and registering with the HNB-GW by the HNB) prior to the origination of the emergency call. This figure includesHNB 5405,UE 5410, HNB-GW 5415,MSC 5420, andPSAP 5425. - As shown, the user originates (at step 1) an emergency call using the
UE 5410 camped on theHNB 5405. TheUE 5410 establishes (at step 2) an RRC connection with theHNB 5405 with the establishment cause of emergency call. Upon request from the upper layers, theUE 5410 sends (at step 3) the CM Service Request (with CM Service Type set to “Emergency Call Establishment”) to theHNB 5405. The establishment cause notifies theHNB 5405 that the call being placed by theUE 5410 is to request emergency services. - The
HNB 5405 forwards (at step 4) the CM Service Request within a RUA encapsulated RANAP Initial UE message. In some embodiments, this RUA message can be the RUA Connect message thus indicating to the HNB-GW the initial message for that particular UE signaling. The RUA header also carries additional information such as the cause indicating an emergency call. The cause field in the RUA header allows the HNB-GW 5415 to allocate appropriate resources for emergency call setup without needing to decode the encapsulated RANAP message. - The HNB-
GW 5415 establishes (at step 5) an SCCP connection to theMSC 5420 and forwards the CM Service Request to theMSC 5420 using the RANAP Initial UE Message. This initial message contains information about the location area (LAI) and service area (SAI) assigned to the specific HNB over which the emergency call was initiated. In some embodiments, the LAI and SAI information contained in the RANAP messages is provided to the HNB by the HNB-GW via HNBAP registration procedures. In some embodiments, the LAI and SAC information contained in the RANAP message is provided to the HNB by the HNB management system during the initial provisioning of the HNB. - The
MSC 5420, HNB-GW 5415,HNB 5405 andUE 5410 continue (at step 6) call establishment signaling. TheMSC 5420 determines the serving PSAP based on the service area of the calling UE and routes the emergency call to the appropriate PSAP. Additional signal messages are exchanged (at step 8) between theUE 5410 and thePSAP 5425 and the emergency call is established between theUE 5410 and theappropriate serving PSAP 5425. - 2. Service Area Based Routing of Unauthorized UEs
- As described in the sections above, a UE is required to register with the HNB system before the UE is provided access to services of the HNB system. When the UE is not authorized for HNB service over a particular HNB, the UE is handed over to the licensed wireless radio access network of a cellular provider or is simply prevented from accessing HNB services at the particular HNB through appropriate rejection mechanisms.
- However, as part of the regulatory requirements for supporting emergency services, the HNB system is required to provide emergency services to the UE irrespective of whether the UE is permitted access to services of the HNB system when the UE operates within a service region of the HNB system. Accordingly, some embodiments provide methods and systems to provide emergency services to unauthorized UEs requesting emergency services through the HNB system.
- The following scenario illustrates origination of an emergency call from a UE which has been rejected by the HNB (e.g., due to HNB's access control policy). This scenario also assumes that there is no other suitable cell available for the UE to camp on for normal service as defined in 3GPP technical specification TS 25.304 entitled “User Equipment (UE) procedures in idle mode and procedures for cell reselection in connected mode”, herein incorporated by reference. Hence, the UE is camped on the HNB for limited services.
FIG. 55 illustrates an emergency call routing over HNB of an unauthorized UE using service area procedure, in some embodiments. This figure includesHNB 5505;UE 5510; HNB-GW 5515;MSC 5520; andPSAP 5525. - The user originates (at step 1) an emergency call using the
UE 5510 camped on theHNB 5505 for limited service only (e.g., due to rejection from theHNB 5505 based on access control policy). TheUE 5510 establishes (at step 2) an RRC connection with theHNB 5505 indicating an establishment cause of emergency call. Upon request from the upper layers, theUE 5510 sends (at step 3) the CM Service Request (with CM Service Type set to “Emergency Call Establishment”) to theHNB 5505. - When the CM Service Request is performed using the TMSI, the
HNB 5505 retrieves (atsteps 4 a-b) the permanent identity of theUE 5510 using MM procedures. In some embodiments, theHNB 5505 performs local access control and consults the local policy for emergency calls before allowing an incoming request for emergency call from the unauthorized UE. In some embodiments, the HNB may be configured with policy to allow emergency calls without access control check and, as a result, the HNB may not retrieve the permanent identity of theUE 5510 using MM procedures as shown insteps 4 a-b. - In order to provide emergency services to the
unauthorized UE 5510, theHNB 5505 attempts (at step 5) a UE registration towards the HNB-GW 5515. TheHNB 5505 includes the necessary attributes as specified in the subsection above entitled UE Registration. Additionally, theHNB 5505 signals an emergency call registration via the Registration Indicator IE. The purpose of the emergency indicator is to assist the network in performing network based access control for unauthorized UEs. Specifically, the Registration Indicator IE notifies the HNB-GW 5515 that theUE 5510 requires limited service (i.e., emergency service). The HNB-GW 5515 checks (at step 6) to see if an unauthorized UE is allowed HNB access for emergency calls using thespecific HNB 5505. When the HNB-GW 5515 accepts the registration attempt, it responds with a HNBAP REGISTER ACCEPT including attributes such as the UE Context Id, etc. - The
HNB 5505 forwards (at step 7) the CM Service Request within RUA encapsulated RANAP Initial UE message. In some embodiments, this RUA message can be the RUA Connect message thus indicating to the HNB-GW the initial message for that particular UE signaling. The RUA header also carries additional information such as the cause indicating an emergency call, which allows the HNB-GW 5515 to allocate appropriate resources for emergency call setup without needing to decode the encapsulated RANAP message. - The HNB-
GW 5515 establishes (at step 8) an SCCP connection to theMSC 5520 and forwards the CM Service Request to theMSC 5520 using the RANAP Initial UE Message. This initial message contains information about the service area identity (SAI) assigned to thespecific HNB 5505 over which the emergency call was initiated. TheMSC 5520, HNB-GW 5515,HNB 5505 andUE 5510 continue (at step 9) call establishment signaling. TheMSC 5520 determines (at step 10) the servingPSAP 5525 based on the service area of the calling UE and routes the emergency call to the appropriate PSAP. Additional signal messages are exchanged (at step 11) between theUE 5510 and thePSAP 5525 and the emergency call is established between theUE 5510 and theappropriate serving PSAP 5525. - Upon completion of the emergency call from the unauthorized UE, the HNB deregisters the UE from the HNB-GW. In some embodiments, the HNB or the HNB-GW may choose to implement timer based deregistration upon emergency call termination, to allow call-back to the unauthorized UE for emergency purposes.
- B. Location Based Routing
- In some embodiments, the HNB service area is not split into multiple service areas. Accordingly, some embodiments provide an alternative method for performing emergency calling. Routing by position is defined in the 3GPP technical specification TS 23.271 (v6.10.0) entitled “Location Services (LCS); Functional description;
Stage 2” which is incorporated herein by reference. Routing by position is also known as “location based routing” or “X/Y routing.” - With routing by position, rather than making the PSAP routing decision based on HNB service areas (which might span multiple PSAP serving areas), the MSC does an immediate position request to HNB-GW. The MSC then selects the PSAP based on the received location information (such as latitude/longitude). Location based routing is not HNB-specific. Location based routing is also an issue in UMTS where macro network service areas can span multiple PSAP serving areas. Since latitude/longitude can also be available in the HNB-GW (e.g., retrieved from the subscriber database during HNB registration), little delay is added by doing the position request and the position returned is as accurate as is available. Using routing by location eliminates the need to split HNB coverage areas into multiple HNB service areas based on PSAP routing requirements.
- 1. Location Based Emergency Call Routing
-
FIG. 56 illustrates a location based emergency call routing over HNB procedure, in some embodiments. This figure includesHNB 5605,UE 5610, HNB-GW 5615,MSC 5620, andPSAP 5625. - As shown, steps 1-6 are the same as the service area based routing scenario as described with reference to
FIG. 54 above. TheMSC 5620 determines (at step 7) that the serving area of theUE 5610 serves an area that contains portions of multiple emergency services zones. Therefore, theMSC 5620 delays call setup and initiates procedures to obtain the UE's location for routing the emergency call to thePSAP 5625. TheMSC 5620 issues a location request of theUE 5610 using the RANAP Location Reporting Control message to the HNB-GW 5615. This message includes the type of location information requested, the UE's location capabilities and a QoS with low delay and low horizontal accuracy. - The HNB-
GW 5615 relays (at step 8) the RANAP Location Reporting Control message to theHNB 5605 encapsulated in the RUA header. TheHNB 5605 sends (at step 9) back the UE location with RUA encapsulated RANAP Location Report message to the HNB-GW 5615. The HNB-GW 5615 forwards (at step 10) the RANAP Location Report message to theMSC 5620. Alternately, instead of step 8-10, the HNB-GW 5615 retrieves the UE Location information from the stored HNB information (using either information provided by theHNB 5605 during registration or retrieved from subscriber database) and responds with the latitude and longitude in the RANAP Location Report message back to theMSC 5620. - The
MSC 5620 determines (at step 11) the serving PSAP (here, the PSAP 5625) based on the location information of theUE 5610 and routes the emergency call to the appropriate PSAP. In some embodiments, additional network elements such as GMLC, S/R may be involved in mapping the location information and routing the emergency call to the appropriate PSAP. Additional signal messages are exchanged (at step 12) between theUE 5610 and thePSAP 5625 and the emergency call is established between theUE 5610 and thePSAP 5625. - The J-STD-025 standard defines the means to access communications as an intercept access service for the purposes of lawfully authorized electronic surveillance (LAES). The services fall into three categories: (1) non-call associated services to provide information about intercept subjects that is not necessarily related to a call, (2) call associated services to provide call-identifying information about calls involving the intercept subjects, and (3) content surveillance services to provide access to an intercept subject's communications. Since LAES is provided by core network functions, neither the UTRAN nor the HNB are impacted; therefore, there are no HNB-specific LAES requirements on the HNB-GW and HNB.
-
FIG. 57 illustrates HNB security mechanisms, in some embodiments. This figure includesHNB 5705,UE 5710, HNB-GW 5715, MSC/VLR orSGSN 5720,application server 5725, and security gateway (SeGW) 5730. - As shown, the security mechanisms are as follows: (1) the security mechanisms over the Iuh interface protect signaling, voice and data traffic flows between the
HNB 5705 and the HNB-GW-SeGW 5715-5730 from unauthorized use, data manipulation, and eavesdropping (i.e., authentication, encryption, and data integrity mechanisms are supported), (2) authentication of the subscriber by the core network occurs between the MSC/VLR orSGSN 5720 and theUE 5710 and is transparent to the HNB-GW 5715, (3) the air interface between theUE 5710 and theHNB 5705 is protected via encryption (optional) and integrity checks, and (4) additional application level security mechanisms may be employed in the PS domain to secure the end-to-end communication between theUE 5710 and theapplication server 5725. For example, theUE 5710 runs the HTTP protocol over an SSL session for secure web access. - All signaling traffic and user-plane traffic sent between HNB and HNB-GW over the Iuh interface is protected by an IPSec tunnel between the HNB and HNB-GW-SEGW, that provides mutual authentication (for example, using (U)SIM credentials), encryption, and data integrity using similar mechanisms as specified in the 3GPP technical specification TS 33.234 entitled “3 G security; Wireless Local Area Network (WLAN) interworking security” which is incorporated herein by reference.
- A. Security Mode Control
-
FIG. 58 illustrates message flow for security mode control over HNB, in some embodiments. This figure includesHNB 5805,UE 5810, HNB-GW 5815, and VLR/SGSN (CN) 5820. As shown, theCN 5820 and theUE 5810 perform (at step 1) mutual authentication using AKA procedures. In some embodiments, the CN authentication is initiated by theCN 5820 as a result of the CN processing an initial L3 message from theUE 5810. - Upon successful authentication, the
CN 5820 sends (at step 2) RANAP Security Mode Command message to the HNB-GW 5815. This message contains the encryption and the integrity keys, and also the encryption and integrity algorithms to be used for ciphering. The HNB-GW 5815 forwards (at step 3) the RUA encapsulated RANAP Security Mode Command message to theHNB 5805. - The
HNB 5805 stores (at step 4) the ciphering keys and algorithm for theUE 5810. In some embodiments, theHNB 5805 should ensure that these keys are not accessible to 3rd party applications or any other module on theHNB 5805. Additionally, these keys should not be stored on any persistent storage. TheHNB 5805 generates (at step 5) a random number (FRESH) and computes the downlink MAC using the Ik and integrity algorithms and sends the Security Mode command to theUE 5810 along with the computed MAC-I and the FRESH. TheUE 5810 computes (at step 6) the MAC locally (XMAC-I) and verifies that the received downlink MAC-I is same. The downlink integrity check is started from this message onwards. - Upon successful verification of the MAC, the
UE 5810 responds (at step 7) back with the Security Mode Complete command and also sends the MAC-I for the uplink. TheHNB 5805 computes (at step 8) XMAC-I for the uplink message and verifies the received MAC-I is same as that of computed XMAC-I. The uplink integrity check is started from this message onwards. Upon successful verification of the uplink MAC, theHNB 5805 sends (at step 9) the RUA encapsulated RANAP Security Mode Complete message to the HNB-GW 5815. The HNB-GW 5815 relays (at step 10) the Security Mode Complete command to theCN 5820 via corresponding RANAP message. - B. Core Network Authentication
- The core network AKA based authentication provides mutual authentication between the user and the network. The AKA procedure is also used to generate the ciphering keys (encryption and integrity) which in turn provide confidentiality and integrity protection of signaling and user data. The basis of mutual authentication mechanism is the master key K (permanent secret with a length of 128 bits) that is shared between the USIM of the user and home network database. The ciphering keys Ck and Ik are derived from this master key K. This section describes the AKA procedure used for mutual authentication.
-
FIG. 59 illustrates a CN AKA authentication over HNB procedure, in some embodiments. This figure includesHNB 5905,UE 5910, HNB-GW 5915, VLR/SGSN (CN) 5920, and Home Environment (HE)/HLR 5925. - As shown, when the
UE 5905 camps on the HNB Access Point, it will initiate (at step 1) a Location Update Request towards theCN 5920. The HNB-GW 5915 will forward (at step 2) the Location Update request in a RANAP message to the VLR/SGSN 5920. This triggers (at step 3) the authentication procedure in the VLR/SGSN 5920 and it will send an authentication data request MAP message to the Authentication Center (AuC) in the Home Environment (HE) 5925. The AuC contains the master keys of the UEs and based on the IMSI, the AuC will generate (at step 4) the authentication vectors for theUE 5910. The vector list is sent back to the VLR/SGSN 5920 in the authentication data response MAP message. - The VLR/
SGSN 5920 selects (at step 5) one authentication vector from the list (only 1 vector is needed for each run of the authentication procedure). The VLR/SGSN 5920 sends (at step 6) user authentication request (AUTREQ) message to the HNB-GW 5915. This message also contains two parameters RAND and AUTN (from the selected authentication vector). The HNB-GW 5915 relays (at step 7) the AUTREQ message to theHNB 5905 in a RUA encapsulated RANAP Direct Transfer message. TheHNB 5905 forwards (at step 8) the AUTREQ to theUE 5910 over the air interface. - The USIM on the
UE 5910 contains (at step 9) the master key K and using it with the parameters RAND and AUTN as inputs, the USIM carries out computation resembling generation of authentication vectors in the AuC. From the generated output, the USIM verifies if the AUTN was generated by the right AuC. The USIM computation also generates (at step 10) a RES which is sent towards theCN 5920 in an authentication response message to theCN 5920. - The
HNB 5905 forwards (at step 11) the Authentication Response to the HNB-GW 5915 in a RUA encapsulated RANAP Direct Transfer message. The HNB-GW 5915 will relay (at step 12) the response along with the RES parameter in a RANAP message to theCN 5920. The VLR/SGSN 5920 verifies (at step 13) the UE response RES with the expected response XRES (which is part of authentication vector). If there is a match, authentication is successful. TheCN 5920 may then initiate (at step 14) a Security Mode procedure to distribute the ciphering keys to the HNB-GW 5915. - The objective of HNB service access control is to provide operators with the tools to properly implement their HNB service plans based on real-time information from the subscriber and non real-time information provisioned within the operator's IT systems and service databases. Using service policies, the operator can implement a range of creative services and controls to be applied on a per individual subscriber basis, which results in the acceptance or rejection of any discrete HNB session registration request. Primarily, service policies are used to identify whether a subscriber's current request for access meets the conditions of the service plan to which they are subscribed.
- For the purposes of this document, we consider that HNB SAC encompasses the discovery, registration and redirection functions as well as enhanced service access control functions, such as restricting HNB service access based on the reported neighboring macro network UTRAN/GERAN cell information. Note: a local access control may be performed by the HNB for performance reasons (example: HNB may use local service access control for faster rejection of UEs which are not allowed access to either HNB services or not allowed access to HNB services via the specific HNB).
- A. HNB-GW and Service Area Selection
- The HNB-GW selection processes include HNB-GW selection and HNB service area selection. HNB-GW Selection serves the following functions: (1) it allows an HNB-GW functioning as a “provisioning HNB-GW” to direct a mobile station to its designated “default HNB-GW”, (2) it allows an HNB-GW functioning as a “default HNB-GW” to direct a mobile station to an appropriate “serving HNB-GW” (e.g., in case the HNB is outside its normal default HNB-GW coverage area), and (3) it allows the HNB-GW to determine if the UTRAN/GERAN coverage area is HNB-restricted and, if so, to deny service.
- HNB Service Area Selection serves the following functions: it allows an HNB-GW functioning as a “default or serving HNB-GW” to assign the HNB service area associated with the HNB registration (and all the UEs camped on that specific HNB). The service area can then be utilized for emergency call routing as described above in the subsection entitled Service Area Based Routing.
- B. Service Access Control Use Case Examples
- The following example service access control use cases are described in this section: (1) New HNB connects to the HNB-GW; (2) the HNB connects to the HNB-GW network (redirected connection); (3) the HNB attempts to connect in a restricted UMTS coverage area; (4) Authorized UE roves into an authorized HNB for HNB service; and (5) Unauthorized UE roves into an authorized HNB for HNB service.
- 1. New HNB Connects to the HNB-GW
-
FIG. 60 illustrates the SAC for a new HNB connecting to the HNB network, in some embodiments. This figure includesHNB 6005,public DNS 6010, SeGW #1 (provisioning SeGW) 6015,private DNS 6020, (provisioning) HNB-GW # 1 6025, and (default/serving) HNB-GW # 2 6030. - As shown, if the
HNB 6005 has a provisioned FQDN of theProvisioning SeGW 6015, it performs (at step 1) a DNS query (via the generic IP access network interface) to resolve the FQDN to an IP address. If theHNB 6005 has a provisioned IP address for theProvisioning SeGW 6015, the DNS step is omitted. TheDNS Server 6010 returns (at step 2) a response including the IP Address of theProvisioning SeGW 6015. TheHNB 6005 establishes (at step 3) a secure tunnel to theProvisioning SeGW 6015 using IKEv2 and EAP-AKA or EAP-SIM. - If the
HNB 6005 has a provisioned FQDN of the Provisioning HNB-GW 6025, it performs (at step 4) a DNS query (via the secure tunnel) to resolve the FQDN to an IP address. If theHNB 6005 has a provisioned IP address for the Provisioning HNB-GW 6025, the DNS step will be omitted. TheDNS Server 6020 returns (at step 5) a response including the IP Address of the Provisioning HNB-GW 6025. TheHNB 6005 sets up (at step 6) a SCTP connection to a well-defined port on the Provisioning HNB-GW 6025. TheHNB 6005 then queries (at step 7) the Provisioning HNB-GW 6025 for the Default/Serving HNB-GW 6030, using HNBAP DISCOVERY REQUEST. The provisioning HNB-GW 6025 optionally performs (at step 8) an access control for theHNB 6005 using information such as HNB Identity and reported macro coverage information. - If the access is allowed, then the provisioning HNB-
GW 6025 determines (at step 9) the default/serving HNB-GW (here, HNB-GW # 2 6030) using the HNB-GW selection function. This is done so the HNB is directed to a “local” Default HNB-GW in the HPLMN to optimize network performance. The Provisioning HNB-GW 6025 returns (at step 10) the default/serving HNB-GW 6030 information in the HNBAP DISCOVERY ACCEPT message. The DISCOVERY ACCEPT message also indicates whether the HNB-GW and SEGW address provided shall or shall not be stored by the HNB. - The
HNB 6005 releases (at step 11) the SCTP connection and IPSec tunnel and proceeds to register on HNB-GW # 2 6030. TheHNB 6005 performs (at step 12) a private DNS query using the assigned Default HNB-GW FQDN. Theprivate DNS server 6020 returns (at step 13) the IP address of HNB-GW # 2 6030. TheHNB 6005 establishes (at step 14) an SCTP connection to HNB-GW # 2 6030. TheHNB 6005 sends (at step 15) an HNBAP REGISTER REQUEST message to the default/serving HNB-GW 6030. The default/serving HNB-GW 6030 performs (at step 16) an access control for theHNB 6005 for example, using information such as HNB Identity and reported macro coverage information. - If access is allowed, then the default/serving HNB-
GW 6030 determines (at step 17) that it is the correct serving HNB-GW for the mobile current location using the HNB-GW selection function. It also determines the HNB service area to associate with theHNB 6005 using the SAI selection functions. The default/serving HNB-GW 6030 returns a HNBAP REGISTER ACCEPT message to theHNB 6005. - 2. The HNB Connects to the HNB-GW (Redirected Connection)
-
FIG. 61 illustrates the SAC for an HNB getting redirected in HNB network, in some embodiments. This figure includesHNB 6105,public DNS 6110, SeGW (#1) 6115,private DNS 6120, and HNB-GW (#2) 6125. - As shown, steps 1-8 are the same as described with reference to
FIG. 60 . The HNB-GW 6125 uses (at step 9) the HNB-GW selection function to determine that theHNB 6105 should be served by another HNB-GW. The HNB-GW 6125 sends (at step 10) the new serving SEGW and HNB-GW FQDNs to theHNB 6105 in the HNBAP REGISTER REDIRECT message. In some embodiments, the HNB-GW sends the HNBAP REGISTER REJECT message, which allows the HNB to select a different HNB-GW (using pre-provisioned information from the HNB management system) for registration thus providing equivalent redirection functionality. TheHNB 6105 releases (at step 11) the SCTP connection and IPSec tunnel and proceeds to register with the designated HNB-GW 6125. - 3. The HNB Attempts to Connect in a Restricted Macro Coverage Area
-
FIG. 62 illustrates the SAC for an HNB registering in a restricted UMTS coverage area, in some embodiments. This figure includesHNB 6205,public DNS 6210, SeGW (#1) 6215,private DNS 6220, and HNB-GW (#2) 6225. - As shown, steps 1-8 are the same as described with reference to
FIG. 60 . The HNB-GW 6225 uses (at step 9) the HNB-GW selection function to determine that theHNB 6205 is in an UMTS area that is HNB restricted (i.e., HNB access is not allowed in the area). The HNB-GW 6225 sends (at step 10) a HNBAP REGISTER REJECT message to theHNB 6205, including a reject cause (for example, “Location not allowed”). TheHNB 6205 releases (at step 11) the SCTP connection and IPSec tunnel and does not attempt to register again from the same macro coverage area until powered-off. - 4. Authorized UE Roves into an Authorized HNB for HNB Service
- The sequence of events is same as described with reference to the subsection entitled UE Registration.
- 5. Unauthorized UE Roves into an Authorized HNB for HNB Service
- An unauthorized UE (unauthorized for HNB service over the specific HNB), upon camping on the HNB (via its internal cell selection mechanism), will send an initial NAS layer message (for example, the Location Update message) towards the CN via the HNB (the LU is triggered since the HNB broadcasts a distinct LAI than its neighboring macro cells and other neighboring HNBs). The HNB will intercept the Location Update message and attempt to register the UE with the HNB-GW as described below.
-
FIG. 63 illustrates the SAC for an unauthorized UE accessing an authorized HNB, in some embodiments. Here, theUE 6310 establishes (atstep 1 a) an RRC connection with theHNB 6305 on which it camps. TheUE 6310 starts a Location Update procedure towards the CN (not shown). TheHNB 6305 will intercept the Location Update request and attempts to register theUE 6310 with the associated Serving HNB-GW over the existing IPSEC tunnel. Optionally, theHNB 6305 may request (atstep 1 b) the IMSI of theUE 6310 if the Location Update is done using the TMSI, since the initial registration for theUE 6310 must be done using the permanent identity (i.e., the IMSI of the UE 6310). In some embodiments, theHNB 6305 optionally performs (atsteps 1 c-d) local access control for faster rejection of those UEs not authorized to access the particular HNB 6305 (the exact rejection mechanism is left as HNB implementation specific). As a result, if the HNB performs local access control, then unauthorized UEs may not be attempted to be registered with the HNB-GW 6315 and the following steps can be skipped. - When the
UE 6310 is not rejected locally by theHNB 6305, theHNB 6305 attempts to register (at step 2) theUE 6310 on the HNB-GW 6315 by transmitting the HNBAP REGISTER REQUEST. TheHNB 6305 uses the same SCTP connection for theUE 6310 as that used for HNB registration to a destination SCTP port on the HNB-GW 6315. - The access control logic on the HNB-
GW 6315 would also check (at step 3) to see if theUE 6310 is allowed HNB access using thespecific HNB 6305. The HNB-GW SAC logic indicates that the registeringUE 6310 is not authorized to access HNB service over thespecific HNB 6305. The HNB-GW 6315 responds with a HNBAP REGISTER REJECT message to theHNB 6305 indicating the reject cause. - The
HNB 6305 in turn utilizes (at step 4) an implementation specific rejection mechanism to reject theUE 6310. For example, theHNB 6305 may send a Location Updating Reject to theUE 6310 with cause of “Location Area Not Allowed”. This will prevent theUE 6310 from attempting to camp on thespecific HNB 6305 again. In some embodiments, the use of “Location Area Not Allowed” is an example mechanism for rejection of an unauthorized UE. Other mechanisms may also be used and is left as HNB implementation specific. - Access control (i.e., only certain pre-authorized users are allowed to access particular 3 G HNB) is one of the key functional requirements for the deployments of 3 G HNB. The requirements from SA1 state that “Mechanisms shall be specified for a HNB to control access (i.e., accept and reject connection requests) of pre-Release 8 UEs”. This section attempts to analyze the fundamental questions on when to perform access control in the 3 G HNB Access Network.
- With
Release 8, CSG-enabled UEs, the UE will only attempt to select CSG cells which are listed in the UE's CSG cell white-list. The UE will not use CSG cells for either idle mode cell reselection or active mode relocation into the CSG cell. Since pre-Release 8 UEs are also expected to be supported by the HNB Access Network, the HNB Access Network should mirror the same end-user experience for pre-Release 8 UEs as for CSG-enabled UEs. - For pre-Release 8 UEs, it is not possible for the UE to autonomously recognize CSG cells and avoid using them. Pre-Release 8 UEs performs legacy cell reselection and relocation procedures whenever it detects a neighbor HNB cell. It is necessary for the 3 G HNB Access Network to either accept the UE or reject the UE using a legacy control procedure supported by the legacy UE. In some embodiments, the need to support active mode mobility from macro cell to 3 G HNB is for further study as are the access control policies for such a scenario.
- The following options are envisioned regarding when an access control could be performed. (1) Access control by mobility management signaling, where the access control is performed when the UE re-selects a particular 3 G HNB cell. This approach does not allow the UE to camp normally without successful access control. (2) Access control by redirection and handover, where the access control is performed when the UE requests actual data transmission from a particular 3 G HNB. This approach allows the UE to camp normally on 3 G HNB without access control even if the UE is not authorized for that specific 3 G HNB.
- The following section provides further analysis on the significant drawbacks of the 2nd mechanism where the UE is allowed to camp normally without access control upon cell re-selection.
- A. Increased Signaling Load on the Core Network During Idle Mode Mobility
- It is possible, and likely the norm rather than a corner case, that mobility pattern of a particular UE will appear as “3 G HNB->Macro->3 G HNB (either same or different 3 G HNB)” or “Macro->3 G HNB”. As a result of such mobility patterns, the signaling load on the core network will increase significantly due to the fact the location area updates from even unauthorized UEs must be relayed to the CN (assuming that the macro and 3 G HNB have different location areas).
- B. Increased Signaling Load and Setup Times During Service Initiation from UE
- Access control using the mechanisms of redirection and handover results in increased setup times or increased signaling (due to additional handover signaling).
- C. Service Impact Via Erroneous HNB Coverage Indication
- The UE upon cell re-selection of a particular 3 G HNB would display HNB coverage indicator. In cases where the UE is unauthorized to access a particular 3 G HNB, this would result in the following severely degraded service impacts to the subscriber.
- In case of lacking overlapping macro coverage, it is not possible to employ the redirection and handover mechanism for data service initiation. As a result, any service initiation from unauthorized UEs must now be denied at the particular 3 G HNB and thus resulting in an undesirable user experience (i.e., indicating valid coverage but denying service).
- In case of overlapping macro coverage, redirection and handover to macro cell upon service initiation, one would need to address the charging requirements. If macro is used as a basis, then this would again result in undesired user experience where HNB coverage is indicated to the user but charging is done on a macro basis.
- In case of overlapping macro coverage, it is possible that redirection and handover to macro cell upon service initiation is not successful (due to various reasons at the target macro cell), thus resulting in failure of the service request. These failed data service requests would result in undesired user experience.
- D. Ping-Pong Behavior and the Resulting Signaling Load
- Due to redirection and handover to the macro cell for the actual data transmission service of unauthorized UEs from a particular 3 G HNB, the UE will likely select the macro cell for camping upon completion of that particular service (i.e., upon moving from connected to idle mode). This would also result in the UE performing an initial NAS message, such as a location area update message, via the macro network. Additionally, it is possible for the UE to again select the same 3 G HNB (from which it was redirected for data service) and trigger additional LU via that particular 3 G HNB. As a result of this ping-pong behavior between the macro and 3 G HNB for unauthorized UEs, significant signaling load would be generated towards the CN.
- It can be concluded from the above scenarios that there are significant drawbacks in allowing unauthorized UEs to camp without access control and as a result it would be recommended to reject unauthorized UEs upon initial cell re-selection to the HNB.
- Many of the above-described protocol stacks are implemented as software processes that are specified as a set of instructions recorded on a computer readable storage medium (also referred to as computer readable medium). When these instructions are executed by one or more computational element(s) (such as processors or other computational elements like ASICs and FPGAs), they cause the computational element(s) to perform the actions indicated in the instructions. Computer is meant in its broadest sense, and can include any electronic device with a processor (e.g., HNB and HNB-GW). Examples of computer readable media include, but are not limited to, CD-ROMs, flash drives, RAM chips, hard drives, EPROMs, etc. The computer readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.
- In this specification, the term “software” is meant in its broadest sense. It can include firmware residing in read-only memory or applications stored in magnetic storage which can be read into memory for processing by a processor. Also, in some embodiments, multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions. In some embodiments, multiple software inventions can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software invention described here is within the scope of the invention. In some embodiments, the software programs when installed to operate on one or more computer systems define one or more specific machine implementations that execute and perform the operations of the software programs.
-
FIG. 64 conceptually illustrates a computer system with which some embodiments of the invention are implemented. Thecomputer system 6400 includes abus 6405, aprocessor 6410, asystem memory 6415, a read-only memory 6420, apermanent storage device 6425,input devices 6430, andoutput devices 6435. - The
bus 6405 collectively represents all system, peripheral, and chipset buses that support communication among internal devices of thecomputer system 6400. For instance, thebus 6405 communicatively connects theprocessor 6410 with the read-only memory 6420, thesystem memory 6415, and thepermanent storage device 6425. - From these various memory units, the
processor 6410 retrieves instructions to execute and data to process in order to execute the processes of the invention. In some embodiments the processor comprises a Field Programmable Gate Array (FPGA), an ASIC, or various other electronic components for executing instructions. The read-only-memory (ROM) 6420 stores static data and instructions that are needed by theprocessor 6410 and other modules of the computer system. Thepermanent storage device 6425, on the other hand, is a read-and-write memory device. This device is a non-volatile memory unit that stores instruction and data even when thecomputer system 6400 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as thepermanent storage device 6425. Some embodiments use one or more removable storage devices (flash memory card or memory stick) as the permanent storage device. - Like the
permanent storage device 6425, thesystem memory 6415 is a read-and-write memory device. However, unlikestorage device 6425, the system memory is a volatile read-and-write memory, such as a random access memory. The system memory stores some of the instructions and data that the processor needs at runtime. - Instructions and/or data needed to perform processes of some embodiments are stored in the
system memory 6415, thepermanent storage device 6425, the read-only memory 6420, or any combination of the three. For example, the various memory units include instructions for processing multimedia items in accordance with some embodiments. From these various memory units, theprocessor 6410 retrieves instructions to execute and data to process in order to execute the processes of some embodiments. - The
bus 6405 also connects to the input andoutput devices input devices 6430 include alphanumeric keyboards and cursor-controllers. Theoutput devices 6435 display images generated by the computer system. The output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Finally, as shown inFIG. 64 ,bus 6405 also couplescomputer 6400 to anetwork 6465 through a network adapter (not shown). In this manner, the computer can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet) or a network of networks (such as the Internet). - Any or all of the components of
computer system 6400 may be used in conjunction with the invention. For instance, some or all components of the computer system described with regards toFIG. 64 comprise some embodiments of the UE, HNB, HNB-GW, and SGSN described above. However, one of ordinary skill in the art will appreciate that any other system configuration may also be used in conjunction with the invention or components of the invention. - Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media). Some examples of such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable blu-ray discs, ultra density optical discs, any other optical or magnetic media, and floppy disks. The computer-readable media may store a computer program that is executable by at least one processor and includes sets of instructions for performing various operations. Examples of hardware devices configured to store and execute sets of instructions include, but are not limited to application specific integrated circuits (ASICs), field programmable gate arrays (FPGA), programmable logic devices (PLDs), ROM, and RAM devices. Examples of computer programs or computer code include machine code, such as produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
- As used in this specification and any claims of this application, the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms display or displaying means displaying on an electronic device. As used in this specification and any claims of this application, the terms “computer readable medium” and “computer readable media” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral signals.
- Many of the above figures illustrate a single access point (e.g., HNB 205) communicatively coupled to a network controller (e.g., HNB-GW 215). However, it should be apparent to one of ordinary skill in the art that the network controller (e.g., HNB-GW 215) of some embodiments is communicatively coupled to several HNBs and the network controller communicatively couples all such HNBs to the core network. The figures merely illustrate a single HNB communicatively coupled to the HNB-GW for purposes of simplifying the discussion to interactions between a single access point and a single network controller. However, the same network controller of some embodiments may have several of the same interactions with several different access points.
- Additionally, many of the above figures illustrate the access point to be a HNB and the network controller to be a HNB-GW. These terms are used to provide a specific implementation for the various procedures, messages, and protocols described within some of the embodiments described with reference to the figures. However, it should be apparent to one of ordinary skill in the art that the procedures, messages, and protocols may be used with other communication systems and the HNB system was provided for exemplary purposes. For example, such procedures, messages, and protocols may be adapted to function with a Femtocell cell system that includes Femtocell access points and a Femtocell network controller (e.g., Generic Access Network Controller).
- Similarly, many of the messages and protocol stacks were described with reference to particular HNB-AN functionality such as control plane functionality or user plane functionality. However, it should be apparent to one of ordinary skill in the art that such functionality may apply across multiple HNB-AN functions or may apply to a different HNB-AN function altogether. Moreover, it should be apparent to one of ordinary skill in the art that the above described messaging may include additional or alternative information elements to those enumerated above.
- While the invention has been described with reference to numerous specific details, one of ordinary skill in the art will recognize that the invention can be embodied in other specific forms without departing from the spirit of the invention. Thus, one of ordinary skill in the art would understand that the invention is not to be limited by the foregoing illustrative details, but rather is to be defined by the appended claims.
- AUTREQ parameter AUTN
- Connection Manager sublayer CM-sub
- Cellular Text/Telephone Modem (from 3GPP 26.226) CTM
- Electronic Code Book (AES mode) ECB
- A random number generated by the HNB FRESH
General Access Network (unlicensed mobile access) GAN - GPRS Mobility Management sublayer GMM-sub
GPRS Radio Resource sublayer (GSM) GRR-sub - Global System for Mobile communications GSM
- International Mobile station Equipment Identity IMEI
-
IP version 4 IPv4
IP version 6 IPv6 - Lightweight EAP (same as EAP-Cisco) LEAP
- Logical Link Control sublayer LLC-sub
- Message Authentication Code (same as MIC) MAC
MAC computed at HNB with Ik MAC-I - Message Integrity Check (same as MAC) MIC
- Mobility Management sublayer MM-sub
- Network layer Service Indoor Base Station
- Offset Code Book (AES mode) OCB
- Pseudo-ANI (either the ESRD or ESRK) p-ANI
- Authentication number generated from UE RES
- Radio Resource Management sublayer RR-sub
- Short Message Control (entity) SMC
Short Message Relay (entity) SMR - Station (802.11 client) STA
- Expected MAC-I calculated at UE XMAC-I
Expected RES from VLR XRES - Allowed CSG List: A list of CSG cells, each of which is identified by a CSG identity, allowed for a particular subscriber.
Access Control: It is the mechanism of ensuring that access to particular HNB is based on the subscription policy of the subscriber as well as that of the HNB.
Closed Subscriber Group (CSG): A list of subscribers which have access to mobile network using a particular HNB (a.k.a HeNB or Femtocell).
CSG Cell: A cell (e.g. HNB) which allows mobile network access to CSG only. A CSG cell may broadcast a specific CSG identifier over the air interface.
CSG Identity: The identity of the CSG cell. A CSG identity may be shared by multiple CSG cells.
CSG UE: A UE which has support for CSG white-list and can autonomously detect and select CSG cells.
E.164: A public networking addressing standard
Femtocell Access Network: The Femtocell access network constitutes of the HNB and the HNB-GW (same as HNB access network)
Legacy UE: A UE which does not have support for CSG white-list (e.g. R99 or pre-release 8 UE).
Operator: Licensed wireless service provider
White-List: It is the allowed CSG list stored on the UE or in the subscriber database record (such as in the HLR or HSS).
Claims (20)
1. In a communication system comprising (i) a first network comprising a licensed wireless radio access network and a core network and (ii) a second network comprising a plurality of user hosted access points for establishing service regions of the second network using short range licensed wireless frequencies and a network controller for communicatively coupling user equipment operating in the service regions to the core network, an access point comprising:
a first set of protocol layers for establishing a secure communication path with the network controller to encrypt and provide data integrity for messages exchanged between the particular access point and the network controller;
a second set of protocol layers for ensuring reliable transport of messages exchanged between the particular access point and the network controller through the secure communication path; and
a third set of protocol layers for defining a registration procedure for enabling a service region associated with the particular access point to services of the core network through the network controller.
2. The access point of claim 1 , wherein the third set of protocol layers are further for defining a discovery procedure to identify a network controller to enable the service region associated with the particular access point to services of the core network based on a location of the particular access point.
3. The access point of claim 1 , wherein the first set of protocol layers correspond to an Internet Protocol Security (IPSec) protocol layer.
4. The access point of claim 1 , wherein the second set of protocol layers correspond to a Stream Control Transmission Protocol (SCTP) reliable transport protocol.
5. The access point of claim 1 , wherein the third set of protocol layers correspond to an Home Node B Application Part (HNBAP) protocol.
6. The access point of claim 1 , wherein the second set of protocol layers ensures reliable transport of the messages by establishing a single association with the network controller over which said messages are exchanged with the network controller.
7. The access point of claim 6 , wherein the second set of protocol layers use a payload protocol identifier for identifying a protocol for the messages being exchanged between the network controller and the particular access point.
8. The access point of claim 6 , wherein the particular access point passes control messages and data messages over the single association.
9. The access point of claim 1 , wherein the particular access point is a Home Node B (HNB) and the third set of protocol layers define management messages used in a Home Node B Access Network (HNBAN) for the HNB to access services of the core network through the network controller.
10. The access point of claim 1 further comprising an Iuh interface established with the network controller, wherein the first, second, and third set of protocol layers define messaging formats for the Iuh interface.
11. In a communication system comprising (i) a first network comprising a licensed wireless radio access network and a core network and (ii) a second network comprising a plurality of user hosted access points for establishing service regions of the second network using short range licensed wireless frequencies and a network controller for communicatively coupling user equipment operating in the service regions to the core network, the network controller comprising:
a first set of protocol layers for establishing a secure communication path with each of the access points to encrypt and provide data integrity for messages exchanged between each of the access points and said network controller;
a second set of protocol layers for ensuring reliable transport of messages exchanged between each of the access points and the network controller through each of the secure communication paths; and
a third set of protocol layers for defining a registration procedure for determining which of the service regions associated with the access points is permitted access to services of the core network.
12. The network controller of claim 11 , wherein the first set of protocol layers correspond to an IPSec protocol layer.
13. The network controller of claim 11 , wherein the second set of protocol layers correspond to an SCTP reliable transport protocol.
14. The network controller of claim 11 , wherein the third set of protocol layers correspond to an HNBAP protocol.
15. The network controller of claim 11 , wherein the third set of protocol layers define management messages used in a Home Node B Access Network (HNBAN) to enable an access point access services of the core network through the network controller.
16. A communication system comprising:
a first communication system comprising a licensed wireless radio access network and a core network; and
a second communication system comprising a plurality of user hosted access points and a network controller, each access point operating using short range licensed wireless frequencies to establish a service region that is communicatively coupled to the core network by the network controller,
wherein each the plurality of access points and the network controller comprise a particular set of protocol layers for specifying management messages that are exchanged between an access point and the network controller, said management messages for allowing the network controller to determine whether the access point is permitted access to services of the second communication system through the network controller.
17. The communication system of claim 16 , wherein said management messages perform a registration procedure for registering an access point with the second communication system.
18. The communication system of claim 16 , wherein each access point exchanges said management messages with the network controller upon power up of the access point.
19. The communication system of claim 16 , wherein each access point exchanges said management messages with the network controller upon loss of a previously established connection with the network controller.
20. The communication system of claim 16 , wherein the network controller is a first network controller, wherein said management messages comprise a redirect message to redirect an access point to access services of the second communication system through a second network controller.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/426,200 US20090265542A1 (en) | 2008-04-18 | 2009-04-17 | Home Node B System Architecture |
EP09732229A EP2272261A1 (en) | 2008-04-18 | 2009-04-18 | Method and apparatus for direct transfer of ranap messages in a home node b system |
PCT/US2009/041055 WO2009129516A1 (en) | 2008-04-18 | 2009-04-18 | Method and apparatus for direct transfer of ranap messages in a home node b system |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US4640108P | 2008-04-18 | 2008-04-18 | |
US5596108P | 2008-05-23 | 2008-05-23 | |
US5891208P | 2008-06-04 | 2008-06-04 | |
US8022708P | 2008-07-11 | 2008-07-11 | |
US10114808P | 2008-09-29 | 2008-09-29 | |
US12/426,200 US20090265542A1 (en) | 2008-04-18 | 2009-04-17 | Home Node B System Architecture |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090265542A1 true US20090265542A1 (en) | 2009-10-22 |
Family
ID=41201029
Family Applications (10)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/426,206 Abandoned US20090262703A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Encapsulation of RANAP Messages in a Home Node B System |
US12/426,203 Abandoned US20090265543A1 (en) | 2008-04-18 | 2009-04-17 | Home Node B System Architecture with Support for RANAP User Adaptation Protocol |
US12/426,207 Abandoned US20090262683A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Setup and Release of User Equipment Context Identifiers in a Home Node B System |
US12/426,205 Abandoned US20090262682A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Transport of RANAP Messages over the Iuh Interface in a Home Node B System |
US12/426,211 Active 2030-03-22 US8041335B2 (en) | 2008-04-18 | 2009-04-17 | Method and apparatus for routing of emergency services for unauthorized user equipment in a home Node B system |
US12/426,215 Abandoned US20090262704A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Establishment of Asynchronous Transfer Mode Based Bearer Connection between a Network Controller and Core Network |
US12/426,217 Abandoned US20090264126A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Support of Closed Subscriber Group Services in a Home Node B System |
US12/426,209 Abandoned US20090262684A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Home Node B Registration using HNBAP |
US12/426,204 Abandoned US20090262702A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Direct Transfer of RANAP Messages in a Home Node B System |
US12/426,200 Abandoned US20090265542A1 (en) | 2008-04-18 | 2009-04-17 | Home Node B System Architecture |
Family Applications Before (9)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/426,206 Abandoned US20090262703A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Encapsulation of RANAP Messages in a Home Node B System |
US12/426,203 Abandoned US20090265543A1 (en) | 2008-04-18 | 2009-04-17 | Home Node B System Architecture with Support for RANAP User Adaptation Protocol |
US12/426,207 Abandoned US20090262683A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Setup and Release of User Equipment Context Identifiers in a Home Node B System |
US12/426,205 Abandoned US20090262682A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Transport of RANAP Messages over the Iuh Interface in a Home Node B System |
US12/426,211 Active 2030-03-22 US8041335B2 (en) | 2008-04-18 | 2009-04-17 | Method and apparatus for routing of emergency services for unauthorized user equipment in a home Node B system |
US12/426,215 Abandoned US20090262704A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Establishment of Asynchronous Transfer Mode Based Bearer Connection between a Network Controller and Core Network |
US12/426,217 Abandoned US20090264126A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Support of Closed Subscriber Group Services in a Home Node B System |
US12/426,209 Abandoned US20090262684A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Home Node B Registration using HNBAP |
US12/426,204 Abandoned US20090262702A1 (en) | 2008-04-18 | 2009-04-17 | Method and Apparatus for Direct Transfer of RANAP Messages in a Home Node B System |
Country Status (3)
Country | Link |
---|---|
US (10) | US20090262703A1 (en) |
EP (1) | EP2272261A1 (en) |
WO (1) | WO2009129516A1 (en) |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100226346A1 (en) * | 2008-07-17 | 2010-09-09 | Caldwell Christopher E | System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier |
US20100284369A1 (en) * | 2007-11-23 | 2010-11-11 | Zte Corporation | Optimization method of multiple service flows operation for WiMAX system |
US20100323633A1 (en) * | 2009-06-19 | 2010-12-23 | Interdigital Patent Holdings, Inc. | Method and apparatus for detecting and measuring for home node-bs |
US20110128890A1 (en) * | 2009-12-01 | 2011-06-02 | Spidercloud Wireless, Inc. | Method, system and device for configuring topology of a wireless network |
US20110149834A1 (en) * | 2008-09-25 | 2011-06-23 | Jamadagni Satish Nanjunda Swamy | Method and system to support multimedia broadcast multicast service over generic access networks |
US20110164591A1 (en) * | 2008-09-09 | 2011-07-07 | Boling Wang | Method for user relocation triggered by home node b gateway |
WO2011088662A1 (en) * | 2010-01-22 | 2011-07-28 | 中兴通讯股份有限公司 | Method, user network equipment and management system thereof for secure data transmission |
WO2011136619A2 (en) * | 2010-04-30 | 2011-11-03 | Samsung Electronics Co., Ltd. | Apparatus and method of user equipment relocation |
EP2391155A1 (en) * | 2010-05-27 | 2011-11-30 | Alcatel Lucent | A femtocell base station and method of determining a macrocell location area within which a femtocell base station resides |
US20110296500A1 (en) * | 2010-05-28 | 2011-12-01 | Macnider James | Methods for Server-Driven Packet Congestion Control |
US20120094643A1 (en) * | 2010-10-14 | 2012-04-19 | At&T Intellectual Property I, L.P. | Over-the-air content management of wireless equipment in confined-coverage wireless networks |
US20120135701A1 (en) * | 2009-08-17 | 2012-05-31 | Zte Corporation | Method and system for paging an emergency service user |
US20120147872A1 (en) * | 2009-08-10 | 2012-06-14 | Samsung Electronics Co., Ltd. | Method and system for remotely accessing |
US20120207137A1 (en) * | 2009-11-03 | 2012-08-16 | Zte Corporation | Method for Managing Local IP Access Connection |
US8396871B2 (en) | 2011-01-26 | 2013-03-12 | DiscoverReady LLC | Document classification and characterization |
US20130143532A1 (en) * | 2010-08-02 | 2013-06-06 | Huawie Technologies Co., Ltd. | Key separation method and device |
WO2014052850A1 (en) * | 2012-09-28 | 2014-04-03 | Alexander Sirotkin | Os level wlan/cellular aggregation for integrated femto and ap deployments |
US9338701B2 (en) | 2009-10-30 | 2016-05-10 | Interdigital Patent Holdings, Inc. | Method and apparatus for efficient signaling and usage of resources for wireless communications supporting circuit switched and packet switched sessions |
CN106102074A (en) * | 2016-08-11 | 2016-11-09 | 山东奥联信息科技有限公司 | Express highway all-way is wireless WIFI covering system |
US9667514B1 (en) | 2012-01-30 | 2017-05-30 | DiscoverReady LLC | Electronic discovery system with statistical sampling |
US9848358B2 (en) | 2008-03-21 | 2017-12-19 | Interdigital Patent Holdings, Inc. | Apparatus to enable fallback to circuit switched domain from packet switched domain |
US9918353B2 (en) | 2013-02-19 | 2018-03-13 | Zte Corporation | 802.1X access session keepalive method, device, and system |
US20190166484A1 (en) * | 2016-08-10 | 2019-05-30 | Reliance Jio Infocomm Limited | A system and methods for availing services in an international roaming by using proactive commands |
US10469286B2 (en) * | 2017-03-06 | 2019-11-05 | At&T Intellectual Property I, L.P. | Methods, systems, and devices for managing client devices using a virtual anchor manager |
US10467252B1 (en) | 2012-01-30 | 2019-11-05 | DiscoverReady LLC | Document classification and characterization using human judgment, tiered similarity analysis and language/concept analysis |
US10511724B2 (en) | 2016-11-01 | 2019-12-17 | At&T Intellectual Property I, L.P. | Method and apparatus for adaptive charging and performance in a software defined network |
US10659619B2 (en) | 2017-04-27 | 2020-05-19 | At&T Intellectual Property I, L.P. | Method and apparatus for managing resources in a software defined network |
US10659535B2 (en) | 2017-02-27 | 2020-05-19 | At&T Intellectual Property I, L.P. | Methods, systems, and devices for multiplexing service information from sensor data |
US10819629B2 (en) | 2016-11-15 | 2020-10-27 | At&T Intellectual Property I, L.P. | Method and apparatus for dynamic network routing in a software defined network |
US10992709B2 (en) * | 2015-07-28 | 2021-04-27 | Citrix Systems, Inc. | Efficient use of IPsec tunnels in multi-path environment |
US11102131B2 (en) | 2016-11-01 | 2021-08-24 | At&T Intellectual Property I, L.P. | Method and apparatus for dynamically adapting a software defined network |
Families Citing this family (342)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7308263B2 (en) | 2001-02-26 | 2007-12-11 | Kineto Wireless, Inc. | Apparatus for supporting the handover of a telecommunication session between a licensed wireless system and an unlicensed wireless system |
US6915473B2 (en) * | 2001-05-14 | 2005-07-05 | Interdigital Technology Corporation | Method and system for implicit user equipment identification |
US7606190B2 (en) | 2002-10-18 | 2009-10-20 | Kineto Wireless, Inc. | Apparatus and messages for interworking between unlicensed access network and GPRS network for data services |
EP2334129A3 (en) | 2002-10-18 | 2012-07-11 | Kineto Wireless, Inc. | Method and apparatuses for paging a telecommunication device |
US7349698B2 (en) | 2002-10-18 | 2008-03-25 | Kineto Wireless, Inc. | Registration messaging in an unlicensed mobile access telecommunications system |
US7940746B2 (en) | 2004-08-24 | 2011-05-10 | Comcast Cable Holdings, Llc | Method and system for locating a voice over internet protocol (VoIP) device connected to a network |
US8843995B2 (en) * | 2004-11-02 | 2014-09-23 | Blackberry Limited | Generic access network (GAN) controller selection in PLMN environment |
US9282451B2 (en) | 2005-09-26 | 2016-03-08 | Telecommunication Systems, Inc. | Automatic location identification (ALI) service requests steering, connection sharing and protocol translation |
US7664106B2 (en) * | 2006-02-28 | 2010-02-16 | At&T Corp. | Method and apparatus for providing E911 services via network announcements |
US20070201622A1 (en) * | 2006-02-28 | 2007-08-30 | Marian Croak | Method and apparatus for providing E911 services for nomadic users |
US8165086B2 (en) * | 2006-04-18 | 2012-04-24 | Kineto Wireless, Inc. | Method of providing improved integrated communication system data service |
US8326296B1 (en) | 2006-07-12 | 2012-12-04 | At&T Intellectual Property I, L.P. | Pico-cell extension for cellular network |
US20080076425A1 (en) | 2006-09-22 | 2008-03-27 | Amit Khetawat | Method and apparatus for resource management |
US8204502B2 (en) | 2006-09-22 | 2012-06-19 | Kineto Wireless, Inc. | Method and apparatus for user equipment registration |
US9072074B1 (en) | 2006-12-27 | 2015-06-30 | At&T Intellectual Property Ii, L.P. | Method and apparatus for determining the location of a terminal adaptor |
US8280348B2 (en) | 2007-03-16 | 2012-10-02 | Finsphere Corporation | System and method for identity protection using mobile device signaling network derived location pattern recognition |
ATE489826T1 (en) * | 2007-03-28 | 2010-12-15 | Ericsson Telefon Ab L M | NETWORK NODES AND METHOD RELATING TO COMMUNICATION CARRIERS |
GB0716246D0 (en) * | 2007-08-20 | 2007-09-26 | Nec Corp | IP Based emergency services solution in WiMax |
US9167505B2 (en) | 2007-10-08 | 2015-10-20 | Qualcomm Incorporated | Access management for wireless communication |
US9055511B2 (en) * | 2007-10-08 | 2015-06-09 | Qualcomm Incorporated | Provisioning communication nodes |
US9775096B2 (en) | 2007-10-08 | 2017-09-26 | Qualcomm Incorporated | Access terminal configuration and access control |
US8787306B2 (en) * | 2007-10-09 | 2014-07-22 | Qualcomm Incorporated | Centralized mobile access point acquisition |
EP2208319A1 (en) * | 2007-10-12 | 2010-07-21 | T-Mobile International AG & CO. KG | Circuit-switched call control via an ip user channel connection in the access network |
US9198122B2 (en) * | 2007-10-12 | 2015-11-24 | Qualcomm Incorporated | Method and system for service redirection background |
US8831027B2 (en) * | 2008-01-22 | 2014-09-09 | Thomson Licensing | Method of aiding the reservation of resources for a packet switching network, and associated management device and aid device |
US20090262703A1 (en) | 2008-04-18 | 2009-10-22 | Amit Khetawat | Method and Apparatus for Encapsulation of RANAP Messages in a Home Node B System |
UA104250C2 (en) * | 2008-04-29 | 2014-01-10 | Нокиа Сименс Нетворкс Ой | Simplified local routing |
US8719420B2 (en) | 2008-05-13 | 2014-05-06 | At&T Mobility Ii Llc | Administration of access lists for femtocell service |
US8094551B2 (en) | 2008-05-13 | 2012-01-10 | At&T Mobility Ii Llc | Exchange of access control lists to manage femto cell coverage |
US8532092B2 (en) * | 2008-06-02 | 2013-09-10 | Tekelec, Inc. | Methods, systems, and computer readable media for providing next generation network (NGN)-based end user services to legacy subscribers in a communications network |
CN101605391A (en) * | 2008-06-12 | 2009-12-16 | 三星电子株式会社 | Remove the method for invalid information in the home base-station gateway |
US20100041365A1 (en) * | 2008-06-12 | 2010-02-18 | At&T Mobility Ii Llc | Mediation, rating, and billing associated with a femtocell service framework |
US8620255B2 (en) | 2008-06-16 | 2013-12-31 | Qualcomm Incorporated | Method and apparatus for supporting emergency calls and location for femto access points |
US20100008293A1 (en) * | 2008-07-09 | 2010-01-14 | Qualcomm Incorporated | X2 interfaces for access point base stations in self-organizing networks (son) |
US20100159895A1 (en) * | 2008-07-30 | 2010-06-24 | Mavenir Systems, Inc. | Providing enhanced edge services to devices in femtozones |
KR20110048043A (en) * | 2008-08-11 | 2011-05-09 | 가부시키가이샤 엔티티 도코모 | Downlink Synchronization Method in User Equipment and User Equipment |
US8351920B2 (en) * | 2008-08-29 | 2013-01-08 | Spidercloud Wireless, Inc. | System and method for femtocell management |
EP2345277B1 (en) * | 2008-09-02 | 2017-07-19 | Telefonaktiebolaget LM Ericsson (publ) | Verifying neighbor cell |
US8503391B2 (en) * | 2008-09-18 | 2013-08-06 | Futurewei Technologies, Inc. | CS to IMS hand-back and hand-in for IMS systems for legacy CS UE with home node B access |
US8520682B2 (en) * | 2008-09-18 | 2013-08-27 | Futurewei Technologies, Inc. | System and method for provision of IMS based services for legacy CS UE with home node B access |
US8358647B2 (en) * | 2008-09-18 | 2013-01-22 | Futurewei Technologies, Inc. | System and method for provision of IMS based services for legacy CS UE with home node B access |
CN101677455A (en) * | 2008-09-19 | 2010-03-24 | 三星电子株式会社 | Method for assisting network to find destination node |
EP2351396B1 (en) * | 2008-09-24 | 2017-03-01 | InterDigital Patent Holdings, Inc. | Home node-b apparatus and security protocols |
CN102172062B (en) | 2008-10-06 | 2015-11-25 | 日本电气株式会社 | Communication system, connection control device, mobile terminal, base station control method, service request method and program |
CN101730267B (en) * | 2008-10-21 | 2012-11-07 | 华为技术有限公司 | Access control method, access control device and communication system |
EP2356857A2 (en) * | 2008-11-10 | 2011-08-17 | Alcatel Lucent | Methods and apparatuses supporting cs domain services over a packet only mobile system comprising an interworking function iwf |
CN101742454B (en) * | 2008-11-26 | 2012-10-17 | 华为技术有限公司 | Management method, device and system of emergency business of mobile restricted terminal |
GB2465664B (en) | 2008-11-27 | 2011-02-09 | Lg Electronics Inc | Method of determining an access mode of cell in a wireless communication system |
JP2010141838A (en) * | 2008-12-15 | 2010-06-24 | Toshiba Corp | Mobile terminal, network control method for mobile terminal, network control program for mobile terminal, and radio communication system |
US20100157850A1 (en) * | 2008-12-23 | 2010-06-24 | Qualcomm Incorporated | In-band provisioning for a closed subscriber group |
CN101442727B (en) * | 2008-12-30 | 2011-11-16 | 华为技术有限公司 | Method, apparatus and system for signal transmission |
US8615258B2 (en) * | 2009-01-22 | 2013-12-24 | Intel Mobile Communications GmbH | Home base station communication with a mobile radio communication device using a home base station group member identifier |
KR101500338B1 (en) * | 2009-01-28 | 2015-03-19 | 삼성전자주식회사 | METHOD AND SYSTEM FOR MANAGING CLOSED SUBSCRIBER GROUP OF A FEMTO BASE STATION IN WiMAX SYSTEM |
US8731551B2 (en) * | 2009-01-30 | 2014-05-20 | Qualcomm Incorporated | CSG membership indication |
US20100197307A1 (en) * | 2009-01-30 | 2010-08-05 | Qualcomm Incorporated | Access control for access terminals |
US8520594B2 (en) * | 2009-01-30 | 2013-08-27 | Qualcomm Incorporated | Selectively including allowed closed subscriber group list in page message |
US9480003B2 (en) * | 2009-02-01 | 2016-10-25 | Qualcomm Incorporated | Apparatus and method for determining cell suitability for a wireless device in a communication system |
US20100240365A1 (en) * | 2009-03-23 | 2010-09-23 | Qualcomm Incorporated | Wireless communication systems with femto nodes |
US8160976B2 (en) | 2009-04-17 | 2012-04-17 | Research In Motion Limited | Systems and methods for achieving PLMN continuity when moving between networks of different types through network selection |
KR101308864B1 (en) * | 2009-04-20 | 2013-09-16 | 닛본 덴끼 가부시끼가이샤 | Gateway apparatus, communication control method, and non-transitory computer readable medium storing communication control program |
EP2422471B1 (en) * | 2009-04-21 | 2019-02-27 | LG Electronics Inc. | Method of utilizing a relay node in wireless communication system |
WO2010127680A1 (en) * | 2009-05-04 | 2010-11-11 | Nokia Siemens Networks Oy | Informing a user equipment of a cell and a radio base station serving the cell about access rights granted to the user equipment |
US8867485B2 (en) * | 2009-05-05 | 2014-10-21 | Telecommunication Systems, Inc. | Multiple location retrieval function (LRF) network having location continuity |
US8977303B2 (en) * | 2009-05-08 | 2015-03-10 | Zte Corporation | Interworking circuit service fall back |
US8804661B2 (en) * | 2009-05-21 | 2014-08-12 | Htc Corporation | Method of handling call in handover in wireless communication system and wireless communication device using the same |
US8099117B2 (en) * | 2009-06-01 | 2012-01-17 | Alcatel Lucent | SMS message delivery over broadband data networks |
WO2010147524A1 (en) * | 2009-06-18 | 2010-12-23 | Telefonaktiebolaget L M Ericsson (Publ) | Method and arrangements in a mobile telecommunications system |
CA2851517C (en) * | 2009-06-22 | 2016-10-11 | Nokia Corporation | Reporting and use of user equipment measurement event confidence level |
EA029377B1 (en) * | 2009-06-23 | 2018-03-30 | Шарп Кабусики Кайся | Mobile communication system, mobile station apparatus, position management apparatus, communication method using mobile station apparatus and position management apparatus |
TWI426797B (en) * | 2009-06-29 | 2014-02-11 | Inst Information Industry | Base station, subordinate station, and emergency information transmission method thereof |
US8538407B2 (en) * | 2009-06-30 | 2013-09-17 | Honeywell International Inc. | Fixed mobile convergence home control system |
JP5164122B2 (en) * | 2009-07-04 | 2013-03-13 | 株式会社エヌ・ティ・ティ・ドコモ | Mobile communication method and mobile communication system |
US8255677B2 (en) * | 2009-07-06 | 2012-08-28 | Intel Corporation | Initializing femtocells |
US8965324B2 (en) * | 2009-07-08 | 2015-02-24 | At&T Mobility Ii Llc | E911 services using distributed nodes |
US8233481B2 (en) * | 2009-07-27 | 2012-07-31 | Cisco Technology, Inc. | Access class based picocell policy enforcement |
US8879419B2 (en) | 2009-07-28 | 2014-11-04 | Centurylink Intellectual Property Llc | System and method for registering an IP telephone |
KR101682388B1 (en) * | 2009-07-31 | 2016-12-06 | 삼성전자주식회사 | Method and apparatus for supporting communication service for unauthenticated/unregistered mobile device in wireless communication system |
JP5531767B2 (en) | 2009-07-31 | 2014-06-25 | ソニー株式会社 | Transmission power control method, communication apparatus, and program |
JP5565082B2 (en) | 2009-07-31 | 2014-08-06 | ソニー株式会社 | Transmission power determination method, communication apparatus, and program |
JP5429036B2 (en) | 2009-08-06 | 2014-02-26 | ソニー株式会社 | COMMUNICATION DEVICE, TRANSMISSION POWER CONTROL METHOD, AND PROGRAM |
US8743696B2 (en) | 2009-08-07 | 2014-06-03 | Cisco Technology, Inc. | Mobile transport solution for offloading to an alternate network |
GB0914103D0 (en) * | 2009-08-12 | 2009-09-16 | Nippon Electric Co | Communication system |
CN105554826B (en) * | 2009-08-12 | 2019-03-15 | 日本电气株式会社 | Mobile communication system, base station, epigyny device, gateway apparatus, communication means |
CN101998366A (en) * | 2009-08-20 | 2011-03-30 | 三星电子株式会社 | Method for indicating home base station relation |
GB0915152D0 (en) * | 2009-09-01 | 2009-10-07 | Vodafone Plc | LTE voice call handling |
WO2011029211A1 (en) * | 2009-09-08 | 2011-03-17 | Axalto Smart Cards Technology Co., Ltd | Method for binding secure device to a wireless phone |
US8824364B2 (en) | 2009-09-16 | 2014-09-02 | At&T Mobility Ii Llc | Targeting communications in a femtocell network |
US9279699B2 (en) | 2009-09-16 | 2016-03-08 | At&T Mobility Ii Llc | Leveraging a femtocell network for premises management or monitoring |
US9392528B2 (en) * | 2009-09-18 | 2016-07-12 | Qualcomm Incorporated | Access control based on receipt of message from access terminal |
US8942690B2 (en) * | 2009-09-18 | 2015-01-27 | Qualcomm Incorporated | Access control based on receipt of defined information from access terminal |
US20110223886A1 (en) * | 2009-09-18 | 2011-09-15 | Qualcomm Incorporated | Access point-based control of access control list |
US9655009B2 (en) * | 2009-09-18 | 2017-05-16 | Futurewei Technologies, Inc. | System and method for inter-femto access point handoffs |
US8693367B2 (en) * | 2009-09-26 | 2014-04-08 | Cisco Technology, Inc. | Providing offloads in a communication network |
GB2473882A (en) * | 2009-09-29 | 2011-03-30 | Nec Corp | Allocation of temporary identifiers to mobile devices connecting to home node base stations |
CN104936242B (en) * | 2009-09-29 | 2019-07-05 | 北京三星通信技术研究有限公司 | The method for handling radio link failure report |
US8938234B2 (en) * | 2009-10-01 | 2015-01-20 | Nec Corporation | Mobile communication system |
JP2011078024A (en) * | 2009-10-01 | 2011-04-14 | Ntt Docomo Inc | Mobile communication method, mobile station, and radio base station |
US8510801B2 (en) | 2009-10-15 | 2013-08-13 | At&T Intellectual Property I, L.P. | Management of access to service in an access point |
US8458452B1 (en) * | 2009-10-26 | 2013-06-04 | James P. Morgan | System and method for encryption and decryption of data transferred between computer systems |
US8811986B2 (en) * | 2009-11-06 | 2014-08-19 | Intel Corporation | Cell reselection mechanism for a base station with closed subscriber group |
US9009293B2 (en) | 2009-11-18 | 2015-04-14 | Cisco Technology, Inc. | System and method for reporting packet characteristics in a network environment |
US9015318B1 (en) | 2009-11-18 | 2015-04-21 | Cisco Technology, Inc. | System and method for inspecting domain name system flows in a network environment |
US9148380B2 (en) | 2009-11-23 | 2015-09-29 | Cisco Technology, Inc. | System and method for providing a sequence numbering mechanism in a network environment |
CN102007799A (en) * | 2009-12-01 | 2011-04-06 | 高通股份有限公司 | Method and apparatus for system selection in wireless multi-mode terminal |
WO2011068557A1 (en) * | 2009-12-01 | 2011-06-09 | Qualcomm Incorporated | Method and apparatus for system selection in a wireless multimode terminal |
WO2011075467A1 (en) * | 2009-12-14 | 2011-06-23 | Zte Usa Inc. | Method and system for macro base station to wfap handover |
WO2011075469A1 (en) * | 2009-12-14 | 2011-06-23 | Zte Usa Inc. | Wimax femto and macro idle mode and paging support for re-entry |
US8792495B1 (en) | 2009-12-19 | 2014-07-29 | Cisco Technology, Inc. | System and method for managing out of order packets in a network environment |
KR20110073251A (en) * | 2009-12-21 | 2011-06-29 | 엘지전자 주식회사 | Apparatus and method for discovering a closed subscirber group terminal in a femto cell |
JP5277154B2 (en) * | 2009-12-24 | 2013-08-28 | 株式会社エヌ・ティ・ティ・ドコモ | Mobile communication method and switching center |
KR101038096B1 (en) * | 2010-01-04 | 2011-06-01 | 전자부품연구원 | Secure key authentication method for binary cdma network |
DE102010004660A1 (en) * | 2010-01-14 | 2011-07-21 | Vodafone Holding GmbH, 40213 | Communication device and device and method for communication |
US9157745B2 (en) * | 2010-01-14 | 2015-10-13 | Qualcomm Incorporated | Scalable routing for mobile station navigation with location context identifier |
US9730261B2 (en) * | 2010-01-18 | 2017-08-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Hierarchical protocol classification |
MX2012008896A (en) | 2010-02-02 | 2012-08-31 | Ericsson Telefon Ab L M | Methods and arrangements in a cellular communication network. |
EP2532188B1 (en) * | 2010-02-04 | 2017-09-20 | Nokia Solutions and Networks Oy | A method of supervising a node in a communication system |
CN102149214B (en) * | 2010-02-05 | 2015-05-13 | 中兴通讯股份有限公司 | Data transmission method and system in communication system |
US8831650B2 (en) * | 2010-02-10 | 2014-09-09 | Lg Electronics Inc. | Method of exchanging SMS data in a wireless communications system |
US8792392B2 (en) * | 2010-02-10 | 2014-07-29 | Qualcomm Incorporated | Method and apparatus for in-band provisioning of a device at a closed subscriber group |
US20110223953A1 (en) * | 2010-03-15 | 2011-09-15 | Lg Electronics Inc. | Apparatus for direct communication in a wireless system and method thereof |
JP2011211619A (en) * | 2010-03-30 | 2011-10-20 | Sony Corp | Communication control device, terminal device, radio communication system, radio communication method, and program |
WO2011127224A1 (en) * | 2010-04-06 | 2011-10-13 | Kineto Wireless, Inc. | System and method for supporting access control in hnb and hnb-gw for legacy and csg user equipments |
US20110249609A1 (en) * | 2010-04-08 | 2011-10-13 | Alec Brusilovsky | Secure Relay Node in Communication System |
US10383166B2 (en) | 2010-04-14 | 2019-08-13 | Qualcomm Incorporated | Method and apparatus for supporting location services via a home node B (HNB) |
US9119028B2 (en) | 2010-04-14 | 2015-08-25 | Qualcomm Incorporated | Method and apparatus for supporting location services via a Home Node B (HNB) |
US9445215B2 (en) * | 2010-04-21 | 2016-09-13 | Telefonaktiebolaget Lm Ericsson (Publ) | MTC device bandwidth reduction |
EP3334215B1 (en) | 2010-04-22 | 2019-08-28 | Huawei Technologies Co., Ltd. | Congestion/overload control method and apparatus |
US8548465B2 (en) * | 2010-04-23 | 2013-10-01 | Apple Inc. | Methods and apparatus for providing dynamic information in a wireless information channel |
US8406202B2 (en) * | 2010-04-28 | 2013-03-26 | Htc Corporation | Apparatuses and methods for handling timers for routing area (RA) update procedures or attachment procedures without integrity protection |
US9094927B2 (en) * | 2010-04-28 | 2015-07-28 | T-Mobile Usa, Inc. | Location continuity service for locating mobile devices using multiple access networks including wireless telecommunication networks |
US8600387B2 (en) * | 2010-04-29 | 2013-12-03 | Qualcomm Incorporated | Method and apparatus for performing intra closed subscriber group handover |
WO2011139187A1 (en) * | 2010-05-03 | 2011-11-10 | Telefonaktiebolaget L M Ericsson (Publ) | Methods and arrangements for communication channel re-establishment |
JP5521749B2 (en) | 2010-05-06 | 2014-06-18 | 富士通株式会社 | COMMUNICATION SYSTEM, BASE STATION DEVICE, AND COMMUNICATION METHOD |
KR101688857B1 (en) * | 2010-05-13 | 2016-12-23 | 삼성전자주식회사 | Terminal for contents centric network and method of communication for terminal and herb in contents centric network(ccn) |
JP5898189B2 (en) * | 2010-06-21 | 2016-04-06 | ドイチェ テレコム アクチエンゲゼルシャフトDeutsche Telekom AG | Telecommunications network, method and system for efficiently using a connection between the telecommunications network and customer premises equipment |
US8520634B2 (en) | 2010-08-04 | 2013-08-27 | Sierra Wireless, Inc. | Active/standby operation of a femtocell base station |
US8619582B2 (en) * | 2010-08-12 | 2013-12-31 | Via Telecom Co., Ltd. | Data processing methods for processing machine type communication data and wireless communications systems thereof |
JP2012044327A (en) * | 2010-08-16 | 2012-03-01 | Ntt Docomo Inc | Mobile communication method, relay node, and radio base station |
US8520526B2 (en) * | 2010-08-18 | 2013-08-27 | Ubeeairwalk | Method and apparatus of load balancing femtocell cluster access |
CN102404416B (en) * | 2010-09-16 | 2016-06-15 | 中兴通讯股份有限公司 | A kind of method obtaining DNS and tunnel gateway equipment |
CN102413493A (en) * | 2010-09-21 | 2012-04-11 | 北京三星通信技术研究有限公司 | Method for determining relocation process and method for determining switching process |
WO2012039082A1 (en) * | 2010-09-24 | 2012-03-29 | 日本電気株式会社 | Gateway, server, method of communication control for same, and gateway system |
EP2622905B1 (en) * | 2010-09-28 | 2019-06-19 | BlackBerry Limited | Residential/enterprise network connection management and handover scenarios |
CN103229546B (en) | 2010-09-28 | 2017-02-15 | 黑莓有限公司 | Method and device for releasing connection with local GW when UE moved out of the residential/enterprise network coverage |
US8768290B2 (en) * | 2010-09-29 | 2014-07-01 | Htc Corporation | Apparatuses and methods for handling of an equivalent public land mobile network (PLMN) list |
US9806965B2 (en) * | 2010-09-29 | 2017-10-31 | Avaya Inc. | Automatic user redundancy determination |
US8902791B2 (en) * | 2010-10-01 | 2014-12-02 | Qualcomm Incorporated | Configuration control of inter-cell signaling based on power state |
KR101413570B1 (en) * | 2010-10-05 | 2014-06-30 | 에이치티씨 코퍼레이션 | Method of handling apn based congestion control and related communication device |
US8787303B2 (en) | 2010-10-05 | 2014-07-22 | Cisco Technology, Inc. | Methods and apparatus for data traffic offloading at a router |
US8761000B2 (en) | 2010-11-29 | 2014-06-24 | Edge Velocity Corporation | Router and rapid response network |
US8600403B2 (en) | 2010-12-03 | 2013-12-03 | Qualcomm Incorporated | Method and apparatus for configuring and locating a home base station |
EP2652994B1 (en) * | 2010-12-17 | 2018-08-29 | Telefonaktiebolaget LM Ericsson (publ) | Enabling a communication server to use msc-s related functions |
CN102143536B (en) * | 2010-12-17 | 2013-11-06 | 华为终端有限公司 | Method and device for automatically switching networks, wireless access equipment and intermediate equipment |
CN102143465A (en) * | 2010-12-20 | 2011-08-03 | 华为技术有限公司 | Methods, device and system for processing ECT (Explicit Call Transfer) service |
US8593956B2 (en) * | 2010-12-21 | 2013-11-26 | Htc Corporation | Methods for congestion control for machine type communication (MTC) devices or low priority devices, and apparatuses using the same |
US9565117B2 (en) | 2010-12-22 | 2017-02-07 | Cisco Technology, Inc. | Adaptive intelligent routing in a communication system |
US8477730B2 (en) | 2011-01-04 | 2013-07-02 | Cisco Technology, Inc. | Distributed load management on network devices |
US9003057B2 (en) | 2011-01-04 | 2015-04-07 | Cisco Technology, Inc. | System and method for exchanging information in a mobile wireless network environment |
JP5648484B2 (en) * | 2011-01-05 | 2015-01-07 | 富士ゼロックス株式会社 | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND PROGRAM |
CN102595386A (en) * | 2011-01-06 | 2012-07-18 | 北京三星通信技术研究有限公司 | Method for supporting mobility of user equipment (UE) |
EP3544326B1 (en) | 2011-01-21 | 2020-11-04 | BlackBerry Limited | Network apparatus and process to determine the connection context for connections used for (local) offloading |
US8909223B2 (en) * | 2011-01-28 | 2014-12-09 | Cisco Technology, Inc. | Multicast optimization and aggregation in an enterprise controller |
JP5582257B2 (en) * | 2011-02-24 | 2014-09-03 | 日本電気株式会社 | Sleeping Core Network Node for Energy Saving in 3G Network |
US8873618B2 (en) * | 2011-02-28 | 2014-10-28 | Blackberry Limited | Device to transmit data by displaying a coded image generated according to a selectable encoding scheme and associated methods |
US20120238264A1 (en) * | 2011-03-18 | 2012-09-20 | Stoke, Inc. | Method and apparatus to support seamless mobility across offload gateways |
EP2690913B1 (en) * | 2011-03-23 | 2018-11-28 | Nec Corporation | Hnb gateway device, femtocell system and method of operating hnb-gw used for same with reduced electric power |
JP5796325B2 (en) | 2011-03-31 | 2015-10-21 | ソニー株式会社 | COMMUNICATION CONTROL DEVICE, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL SYSTEM |
US9031013B2 (en) * | 2011-05-05 | 2015-05-12 | Industrial Technology Research Institute | Identifier-sharing method for wireless communication devices and wireless communication device and base station using the same |
EP2709403A4 (en) * | 2011-05-11 | 2015-01-07 | Huawei Tech Co Ltd | Method and apparatus for processing network configuration, and radio network controller |
US8819499B2 (en) * | 2011-06-09 | 2014-08-26 | At&T Mobility Ii Llc | Sending network reject/error codes from a terminal adaptor to terminal equipment through an at command interface |
US8948013B1 (en) | 2011-06-14 | 2015-02-03 | Cisco Technology, Inc. | Selective packet sequence acceleration in a network environment |
US8792353B1 (en) | 2011-06-14 | 2014-07-29 | Cisco Technology, Inc. | Preserving sequencing during selective packet acceleration in a network environment |
US8737221B1 (en) | 2011-06-14 | 2014-05-27 | Cisco Technology, Inc. | Accelerated processing of aggregate data flows in a network environment |
US8743690B1 (en) | 2011-06-14 | 2014-06-03 | Cisco Technology, Inc. | Selective packet sequence acceleration in a network environment |
US8644762B1 (en) * | 2011-06-20 | 2014-02-04 | Netscout Systems, Inc. | Mobile user tracking and application monitoring across an IuPS interface |
WO2012176141A1 (en) * | 2011-06-20 | 2012-12-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Roaming selection of a v-epdg |
US8730823B2 (en) * | 2011-06-24 | 2014-05-20 | Jasper Wireless, Inc. | Core services platform for wireless voice, data and messaging network services |
JP5955514B2 (en) * | 2011-06-27 | 2016-07-20 | シャープ株式会社 | CSG type base station, control program, and integrated circuit |
US9392535B2 (en) | 2011-07-12 | 2016-07-12 | Lg Electronics Inc. | Method for performing a cooperative operation between heterogeneous networks and device for same |
KR101790794B1 (en) * | 2011-07-15 | 2017-10-27 | 삼성전자주식회사 | Device and method for preventing performance degradation of call service in wireless terminal |
GB2493240B (en) | 2011-07-29 | 2016-01-20 | Sca Ipla Holdings Inc | Mobile communications network, infrastructure equipment and method |
EP2740236A4 (en) | 2011-08-01 | 2015-04-01 | Intel Corp | Method and system for network access control |
US8799459B2 (en) * | 2011-09-12 | 2014-08-05 | Microsoft Corporation | Event-driven detection of device presence for layer 3 services using layer 2 discovery information |
US9014023B2 (en) | 2011-09-15 | 2015-04-21 | International Business Machines Corporation | Mobile network services in a mobile data network |
US9237356B2 (en) | 2011-09-23 | 2016-01-12 | Qualcomm Incorporated | Reference picture list construction for video coding |
US8644237B2 (en) * | 2011-09-24 | 2014-02-04 | Telefonaktiebolaget L M Ericsson (Publ) | Uplink load generation in communication networks |
WO2013048551A1 (en) * | 2011-09-30 | 2013-04-04 | Telecommunication Systems, Inc. | Unique global identifier for minimizing prank 911 calls |
US9467868B2 (en) | 2011-09-30 | 2016-10-11 | Telefonaktiebolaget L M Ericsson | Method and apparatus for enabling assignment of a gateway to an access node |
US9312941B2 (en) | 2011-10-14 | 2016-04-12 | Qualcomm Incorporated | Base stations and methods for facilitating dynamic simulcasting and de-simulcasting in a distributed antenna system |
US9276685B2 (en) * | 2011-10-14 | 2016-03-01 | Qualcomm Incorporated | Distributed antenna systems and methods of wireless communications for facilitating simulcasting and de-simulcasting of downlink transmissions |
EP2774399A1 (en) * | 2011-11-04 | 2014-09-10 | Nokia Solutions and Networks Oy | Method of management in a communications network |
US9215649B2 (en) * | 2011-11-30 | 2015-12-15 | Intel Corporation | Techniques for assisted network acquisition |
GB2497741A (en) * | 2011-12-19 | 2013-06-26 | Renesas Mobile Corp | A verification system for use in requesting access to a D2D communication service |
CN102573016B (en) * | 2012-01-05 | 2014-09-17 | 中国联合网络通信集团有限公司 | Control method, device and system for accessing home gateway into network |
US9060286B2 (en) * | 2012-01-19 | 2015-06-16 | Extenet Systems, Inc. | Local management and control of remotely subscribed wireless communication devices |
US8811344B1 (en) * | 2012-01-20 | 2014-08-19 | Wichorus, Inc. | Methods and apparatus for assigning same sequence number to multiple GTP messages |
EP2621229A1 (en) * | 2012-01-24 | 2013-07-31 | Alcatel Lucent | Process for managing the presence of mobile terminals in the coverage area of at least one cellular base station in a network |
US20150029973A1 (en) * | 2012-02-21 | 2015-01-29 | Seppo Ilmari Vesterinen | Signalling Interfaces in Communications |
CN103430579B (en) * | 2012-02-21 | 2017-04-12 | 华为技术有限公司 | Emergency call access method and system, base station, and terminal |
US10123368B2 (en) | 2012-02-23 | 2018-11-06 | Cisco Technology, Inc. | Systems and methods for supporting multiple access point names for trusted wireless local area network |
US9419940B2 (en) * | 2012-03-02 | 2016-08-16 | Futurewei Technologies, Inc. | IPv4 data center support for IPv4 and IPv6 visitors |
WO2013134540A1 (en) | 2012-03-07 | 2013-09-12 | Huawei Technologies Co., Ltd. | Extending epon multi-point control protocol to run on ethernet pon over coax networks |
GB2500064A (en) * | 2012-03-09 | 2013-09-11 | Ip Access Ltd | Enabling a wireless communication unit to access cellular communication network services via an IP access network |
US20130242844A1 (en) * | 2012-03-16 | 2013-09-19 | Qualcomm Incorporated | Access point communication based on uplink transmission |
WO2013140207A1 (en) * | 2012-03-22 | 2013-09-26 | Vasona Networks, Inc | Method and computer readable medium for gathering user equipment location information |
WO2013169006A1 (en) * | 2012-05-08 | 2013-11-14 | Lg Electronics Inc. | Method and apparatus for transmitting message in wireless communication system |
CN103428690B (en) * | 2012-05-23 | 2016-09-07 | 华为技术有限公司 | The safe method for building up of WLAN and system, equipment |
GB2502340B (en) * | 2012-05-25 | 2014-08-06 | Ip Access Ltd | Network elements, cellular communication system and methods therefor |
US9351140B2 (en) * | 2012-06-06 | 2016-05-24 | Avaya Inc. | Special handling of certain types of communications |
US8913556B2 (en) | 2012-06-18 | 2014-12-16 | International Business Machines Corporation | Reducing packet loss in a mobile data network with data breakout at the edge |
CN102739541B (en) * | 2012-06-30 | 2015-09-30 | 华为终端有限公司 | The method, apparatus and system of a kind of routing function startup and transfer of data |
WO2014006803A1 (en) * | 2012-07-02 | 2014-01-09 | パナソニック株式会社 | Server and communication terminal |
WO2014008912A1 (en) * | 2012-07-09 | 2014-01-16 | Telefonaktiebolaget L M Ericsson (Publ) | A method and nodes for paging in a radio access network |
EP2873257A4 (en) | 2012-07-10 | 2016-03-09 | Ericsson Telefon Ab L M | Reducing signaling load caused by change of terminal location |
EP2873295A4 (en) * | 2012-07-10 | 2016-03-30 | Ericsson Telefon Ab L M | Reducing signaling load caused by changes in terminal location |
US9019843B2 (en) | 2012-09-13 | 2015-04-28 | International Business Machines Corporation | Utilizing stored data to reduce packet data loss in a mobile data network with data breakout at the edge |
US8929292B2 (en) | 2012-10-04 | 2015-01-06 | International Business Machines Corporation | Mobility support in a mobile data network |
TW201434292A (en) * | 2012-10-15 | 2014-09-01 | Interdigital Patent Holdings | Failover recovery methods with an edge component |
US9374774B2 (en) | 2012-12-18 | 2016-06-21 | Qualcomm Incorporated | WAN-WLAN cell selection in UEs |
US10484334B1 (en) | 2013-02-26 | 2019-11-19 | Zentera Systems, Inc. | Distributed firewall security system that extends across different cloud computing networks |
US9699034B2 (en) | 2013-02-26 | 2017-07-04 | Zentera Systems, Inc. | Secure cloud fabric to connect subnets in different network domains |
US10382401B1 (en) * | 2013-02-26 | 2019-08-13 | Zentera Systems, Inc. | Cloud over IP for enterprise hybrid cloud network and security |
US10348767B1 (en) | 2013-02-26 | 2019-07-09 | Zentera Systems, Inc. | Cloud over IP session layer network |
US9210682B2 (en) * | 2013-04-15 | 2015-12-08 | Qualcomm Incorporated | Varying processes to control transmission characteristics for position determination operations |
JP6364069B2 (en) * | 2013-05-06 | 2018-07-25 | コンヴィーダ ワイヤレス, エルエルシー | Device trigger |
EP2997767A4 (en) * | 2013-05-13 | 2016-05-04 | Ericsson Telefon Ab L M | Mobility in mobile communications network |
CN104244426B (en) * | 2013-06-09 | 2019-02-05 | 华为技术有限公司 | A kind of resource allocation methods and device of Data Radio Bearer DRB |
EP3022973A4 (en) * | 2013-07-19 | 2017-06-21 | Appcard, Inc. | Methods and apparatus for cellular-based identification of individuals within a vicinity |
FR3009163B1 (en) * | 2013-07-25 | 2015-09-04 | Thales Sa | METHOD FOR SECURITY EXCHANGE OF DATA ON AN AD-HOC NETWORK USING XCAST BROADCAST SERVICE; ASSOCIATED NODE |
GB2516837B (en) | 2013-07-31 | 2015-12-09 | Ip Access Ltd | Network elements, wireless communication system and methods therefor |
CN104519549A (en) * | 2013-09-26 | 2015-04-15 | 华为技术有限公司 | Service access method, user equipment (UE) and wireless controller |
US10219305B2 (en) * | 2013-11-21 | 2019-02-26 | Bao Tran | Communication apparatus |
US9591608B2 (en) * | 2014-01-31 | 2017-03-07 | Qualcomm Incorporated | Methods and systems for discovery of home node B gateway support of positioning |
US10599356B2 (en) | 2014-02-11 | 2020-03-24 | Hiveio Inc. | Aggregating memory to create a network addressable storage volume for storing virtual machine files |
US9380497B1 (en) * | 2014-02-11 | 2016-06-28 | Sprint Spectrum L.P. | Controlled transition between operating modes for call initiation |
US20170026899A1 (en) * | 2014-03-07 | 2017-01-26 | Thomson Licensing | Determination method and corresponding terminal, computer program product and storage medium |
CN105101157A (en) * | 2014-05-16 | 2015-11-25 | 中兴通讯股份有限公司 | Mobile terminal SIM control method and apparatus |
US9838858B2 (en) | 2014-07-08 | 2017-12-05 | Rapidsos, Inc. | System and method for call management |
KR102367097B1 (en) * | 2014-07-08 | 2022-02-24 | 삼성전자 주식회사 | Method for performing inter plmn discovery by a user equipment (ue) in device-to- device (d2d) communication |
CN106664596B (en) * | 2014-07-30 | 2020-04-14 | Lg 电子株式会社 | Method and apparatus for performing access control for WLAN interworking in wireless communication system |
FR3024809B1 (en) * | 2014-08-08 | 2017-12-01 | Myfox | DOMOTIC DEVICE HAVING ALTERNATIVE COMMUNICATION LINK WITH A REMOTE COMPUTER SERVER |
US20160043844A1 (en) * | 2014-08-11 | 2016-02-11 | Qualcomm Incorporated | Over the top methods for aggregation of wlan carriers to lte |
EP3187023B1 (en) * | 2014-08-29 | 2021-02-17 | Intel Corporation | Method for a wireless network bridge |
US9681349B1 (en) * | 2014-09-05 | 2017-06-13 | Sprint Spectrum L.P. | Method and system for managing traffic offload in a wireless communication network based on closed access mode conditions |
WO2016044540A1 (en) | 2014-09-19 | 2016-03-24 | Rapidsos, Inc. | Method and system for emergency call management |
EP3035741A1 (en) | 2014-12-17 | 2016-06-22 | Thomson Licensing | WLAN user quality of experience control in a multi-access point environment |
US10541916B2 (en) * | 2014-12-17 | 2020-01-21 | Google Llc | Tunneled routing |
KR102255182B1 (en) * | 2014-12-17 | 2021-05-24 | 삼성전자주식회사 | A method and apparatus for receiving a mobile terminated srevice by a mobile terminal of idle mode in a communication system |
US9699594B2 (en) * | 2015-02-27 | 2017-07-04 | Plantronics, Inc. | Mobile user device and method of communication over a wireless medium |
WO2016157890A1 (en) * | 2015-03-30 | 2016-10-06 | 日本電気株式会社 | Broadcast delivery system, gateway device, broadcast delivery method and storage medium |
US10194375B2 (en) * | 2015-03-30 | 2019-01-29 | Futurewei Technologies, Inc. | System and method for controlling network signaling loads in a wireless network |
EP3278497A4 (en) * | 2015-03-31 | 2019-03-06 | Telefonaktiebolaget LM Ericsson (publ) | Methods and devices for facilitating emergency calls over wireless communication systems |
US11032688B2 (en) * | 2015-04-01 | 2021-06-08 | Telefonaktiebolaget Lm Ericsson (Publ) | IMS emergency calls for roaming UEs |
TWI569679B (en) * | 2015-04-08 | 2017-02-01 | 普易科技股份有限公司 | Home control gateway and gateway control method thereof |
WO2016163032A1 (en) * | 2015-04-10 | 2016-10-13 | 富士通株式会社 | Wireless communication system, base station, mobile station, and processing method |
US10869198B2 (en) * | 2015-07-01 | 2020-12-15 | Hytera Communications Corporation Limited | Wireless system access control method and device |
CN106332010B (en) * | 2015-07-03 | 2019-10-22 | 普天信息技术有限公司 | A kind of broadband cluster communication system and its point-to-point call method being classified networking |
WO2017024453A1 (en) * | 2015-08-07 | 2017-02-16 | 华为技术有限公司 | Connection control apparatus and method |
US9736700B1 (en) * | 2015-10-13 | 2017-08-15 | Sprint Communications Company L.P. | Cellular communication equipment radio resource adaptation |
WO2017079354A1 (en) | 2015-11-02 | 2017-05-11 | Rapidsos, Inc. | Method and system for situational awareness for emergency response |
CN105491225A (en) * | 2015-11-23 | 2016-04-13 | 联想(北京)有限公司 | Control method and electronic apparatus |
US10341915B2 (en) * | 2015-11-30 | 2019-07-02 | Time Warner Cable Enterprises Llc | Wireless communication management and handoffs |
JP6630990B2 (en) | 2015-12-03 | 2020-01-15 | テレフオンアクチーボラゲット エルエム エリクソン(パブル) | Lightweight RRC connection setup in multi-RAT network |
WO2017092813A1 (en) | 2015-12-03 | 2017-06-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Multi-rat access stratum security |
CN108702409A (en) | 2015-12-17 | 2018-10-23 | 快速求救公司 | Device and method for effective urgent call |
WO2017112820A1 (en) | 2015-12-22 | 2017-06-29 | Rapidsos, Inc. | Systems and methods for robust and persistent emergency communications |
US9986404B2 (en) | 2016-02-26 | 2018-05-29 | Rapidsos, Inc. | Systems and methods for emergency communications amongst groups of devices based on shared data |
JP6272373B2 (en) * | 2016-03-17 | 2018-01-31 | 株式会社トヨタマップマスター | MAP INFORMATION CREATION DEVICE, NAVIGATION SYSTEM, INFORMATION DISPLAY METHOD, INFORMATION DISPLAY PROGRAM, RECORDING MEDIUM |
US11665597B2 (en) * | 2016-03-18 | 2023-05-30 | Parallel Wireless, Inc. | UE mobility across super-cells |
US10219209B2 (en) * | 2016-03-28 | 2019-02-26 | The Boeing Company | Content delivery across heterogeneous networks |
CN107347058B (en) | 2016-05-06 | 2021-07-23 | 阿里巴巴集团控股有限公司 | Data encryption method, data decryption method, device and system |
MX2018013187A (en) | 2016-04-26 | 2019-08-12 | Rapidsos Inc | Systems and methods for emergency communications. |
US10958481B2 (en) * | 2016-04-29 | 2021-03-23 | Hewlett Packard Enterprise Development Lp | Transforming a service packet from a first domain to a second domain |
WO2017196753A1 (en) | 2016-05-09 | 2017-11-16 | Rapidsos, Inc. | Systems and methods for emergency communications |
US10075534B1 (en) * | 2016-07-25 | 2018-09-11 | Juniper Networks, Inc. | Method, system, and apparatus for reducing control traffic in connection with neighbor reachability confirmations |
WO2018039142A1 (en) | 2016-08-22 | 2018-03-01 | Rapidsos, Inc. | Predictive analytics for emergency detection and response management |
CN107786511A (en) * | 2016-08-27 | 2018-03-09 | 北京信威通信技术股份有限公司 | The method that group communication safety is realized in group system |
CN108307454B (en) * | 2016-08-30 | 2022-03-25 | 中兴通讯股份有限公司 | Network switching method and device |
US10764863B2 (en) | 2016-09-01 | 2020-09-01 | Parallel Wireless, Inc. | Multi-radio access technology paging |
US10382956B2 (en) * | 2016-09-08 | 2019-08-13 | At&T Mobility Ii Llc | Short message service gateway for media streaming security |
US10477608B2 (en) | 2016-09-29 | 2019-11-12 | Futurewei Technologies, Inc. | System and method for network access using a relay |
US11419177B2 (en) * | 2016-10-11 | 2022-08-16 | Nec Corporation | Method, session management function node, user plane function node, and user equipment for session management parameters maintenance and computer readable recording medium therein |
EP3533245A1 (en) * | 2016-10-31 | 2019-09-04 | Telefonaktiebolaget LM Ericsson (PUBL) | Methods supporting authentication in wireless communication networks and related network nodes and wireless terminals |
US10009801B1 (en) * | 2016-12-05 | 2018-06-26 | Motorola Solutions, Inc. | Systems and methods for forming an incident area network |
CN108347410B (en) * | 2017-01-24 | 2021-08-31 | 华为技术有限公司 | Safety implementation method, equipment and system |
US10624020B2 (en) * | 2017-02-06 | 2020-04-14 | Qualcomm Incorporated | Non-access stratum transport for non-mobility management messages |
US10445127B2 (en) | 2017-02-28 | 2019-10-15 | At&T Mobility Ii Llc | Hypervisor for shared spectrum core and regional network elements |
CN108667608B (en) | 2017-03-28 | 2021-07-27 | 阿里巴巴集团控股有限公司 | Method, device and system for protecting data key |
CN108736981A (en) * | 2017-04-19 | 2018-11-02 | 阿里巴巴集团控股有限公司 | It is a kind of wirelessly to throw screen method, apparatus and system |
DE112018002113B4 (en) * | 2017-04-21 | 2023-01-19 | Kyocera Corporation | RADIO COMMUNICATION DEVICE AND CONTROL METHOD THEREOF |
US10375558B2 (en) | 2017-04-24 | 2019-08-06 | Rapidsos, Inc. | Modular emergency communication flow management system |
CN108934022B (en) * | 2017-05-25 | 2020-11-06 | 华为技术有限公司 | Registration method and device |
CN109388500B (en) * | 2017-08-10 | 2020-10-23 | 大唐移动通信设备有限公司 | Processing method and system based on wireless Measurement Report (MR) |
ES2973964T3 (en) | 2017-10-13 | 2024-06-25 | Ericsson Telefon Ab L M | Method and apparatus for network function service discovery |
US10652950B2 (en) * | 2017-11-16 | 2020-05-12 | Cisco Technology, Inc. | Method and system for providing signed user location information |
US10735521B1 (en) | 2017-11-20 | 2020-08-04 | Senet, Inc. | IoT network controller / server |
US11044607B1 (en) | 2017-12-04 | 2021-06-22 | Senet Inc. | Method for gateway onboarding for IoT networks |
EP3721402A4 (en) | 2017-12-05 | 2021-08-04 | Rapidsos Inc. | Social media content for emergency management |
US11012916B2 (en) | 2017-12-11 | 2021-05-18 | At&T Mobility Ii Llc | Minimum camping level bypass for limited network communications |
US20190191303A1 (en) * | 2017-12-19 | 2019-06-20 | Motorola Solutions, Inc | Deployable Cell And Method For Validating A Deployable Cell To Be Fully Operational |
CN109994115B (en) | 2018-01-03 | 2023-07-07 | 阿里巴巴集团控股有限公司 | Communication method and device, data processing method and device |
US10820181B2 (en) | 2018-02-09 | 2020-10-27 | Rapidsos, Inc. | Emergency location analysis system |
US11611923B2 (en) * | 2018-03-08 | 2023-03-21 | Charter Communications Operatine, LLC | Methods and apparatus for supporting quality of service in a system including a cable modem termination system and wireless communications link |
US20190320310A1 (en) | 2018-04-16 | 2019-10-17 | Rapidsos, Inc. | Emergency data management and access system |
US11272526B2 (en) * | 2018-05-09 | 2022-03-08 | Qualcomm Incorporated | Efficient operation with unlicensed downlink (DL) and licensed uplink (UL) by transmission of selective DL messages using licensed UL |
US10805786B2 (en) | 2018-06-11 | 2020-10-13 | Rapidsos, Inc. | Systems and user interfaces for emergency data integration |
US11917514B2 (en) | 2018-08-14 | 2024-02-27 | Rapidsos, Inc. | Systems and methods for intelligently managing multimedia for emergency response |
CN110881014B (en) * | 2018-09-05 | 2021-09-28 | 普天信息技术有限公司 | Method and device for physically isolating services of wireless private network |
MX2021003363A (en) * | 2018-09-24 | 2021-05-27 | Nokia Technologies Oy | Systems and method for security protection of nas messages. |
CN109450620B (en) | 2018-10-12 | 2020-11-10 | 创新先进技术有限公司 | Method for sharing security application in mobile terminal and mobile terminal |
US10977927B2 (en) | 2018-10-24 | 2021-04-13 | Rapidsos, Inc. | Emergency communication flow management and notification system |
US10778752B1 (en) * | 2018-11-16 | 2020-09-15 | Senet, Inc. | System and method for low power wide area virtual network for IoT |
US11553343B2 (en) * | 2018-12-12 | 2023-01-10 | Qualcomm Incorporated | Real-time soft combining, CRC validation, and MIC validation of decrypted packets |
CN110020901A (en) * | 2018-12-25 | 2019-07-16 | 阿里巴巴集团控股有限公司 | Resource allocation methods and device and electronic equipment based on block chain |
US10687379B1 (en) * | 2018-12-31 | 2020-06-16 | Doron Shaul Shalev | Communication apparatus |
US11038852B2 (en) | 2019-02-08 | 2021-06-15 | Alibaba Group Holding Limited | Method and system for preventing data leakage from trusted network to untrusted network |
WO2020172612A1 (en) | 2019-02-22 | 2020-08-27 | Rapidsos, Inc. | Systems & methods for automated emergency response |
CN111669841B (en) * | 2019-03-06 | 2023-08-22 | 华为技术有限公司 | Method and device for determining CSG (closed subscriber group) of cell site gateway |
US11146680B2 (en) | 2019-03-29 | 2021-10-12 | Rapidsos, Inc. | Systems and methods for emergency data integration |
BR112021018291A2 (en) | 2019-03-29 | 2021-11-23 | Idac Holdings Inc | Methods and apparatus for secure access control in wireless communications |
CA3135274C (en) | 2019-03-29 | 2024-01-16 | Rapidsos, Inc. | Systems and methods for emergency data integration |
KR20220019662A (en) | 2019-06-17 | 2022-02-17 | 삼성전자주식회사 | Method and apparatus for handling emergency services in a wireless communication system |
US11297680B2 (en) * | 2019-06-17 | 2022-04-05 | Samsung Electronics Co., Ltd. | Method and apparatus for handling emergency services in a wireless network |
US11228891B2 (en) | 2019-07-03 | 2022-01-18 | Rapidsos, Inc. | Systems and methods for emergency medical communications |
EP3939374A4 (en) | 2019-08-14 | 2022-05-18 | Samsung Electronics Co., Ltd. | Method and apparatus for handling session in a wireless communication system |
US11245569B2 (en) * | 2019-09-20 | 2022-02-08 | T-Mobile Usa, Inc. | System and method for enhancing identification of network node initiator errors |
US11429519B2 (en) | 2019-12-23 | 2022-08-30 | Alibaba Group Holding Limited | System and method for facilitating reduction of latency and mitigation of write amplification in a multi-tenancy storage drive |
US11166326B2 (en) * | 2020-01-21 | 2021-11-02 | Juniper Networks, Inc. | Utilizing a transport protocol for fifth generation (5G) client devices to carry messages on wireline access |
US10911500B1 (en) | 2020-07-01 | 2021-02-02 | T-Mobile Usa, Inc. | Registration control for wireless networks, such as IMS networks |
US11206535B1 (en) | 2020-07-13 | 2021-12-21 | T-Mobile Usa, Inc. | Device authentication in a wireless telecommunications network |
US11190981B1 (en) * | 2020-07-28 | 2021-11-30 | Geoverse, LLC | Systems and methods for monitoring and managing network traffic in a private cellular network |
US12041589B2 (en) * | 2020-08-17 | 2024-07-16 | Charter Communications Operating, Llc | Methods and apparatus for spectrum utilization coordination between wireline backhaul and wireless systems |
US11582055B2 (en) | 2020-08-18 | 2023-02-14 | Charter Communications Operating, Llc | Methods and apparatus for wireless device attachment in a managed network architecture |
US11563593B2 (en) | 2020-08-19 | 2023-01-24 | Charter Communications Operating, Llc | Methods and apparatus for coordination between wireline backhaul and wireless systems |
US11844057B2 (en) | 2020-09-09 | 2023-12-12 | Charter Communications Operating, Llc | Methods and apparatus for wireless data traffic management in wireline backhaul systems |
CN112153753B (en) * | 2020-09-24 | 2022-09-16 | 维沃移动通信有限公司 | Network connection method and device |
US11330664B1 (en) | 2020-12-31 | 2022-05-10 | Rapidsos, Inc. | Apparatus and method for obtaining emergency data and providing a map view |
US11445357B1 (en) | 2021-03-05 | 2022-09-13 | T-Mobile Usa, Inc. | Call routing while roaming on a 5G wireless telecommunication network |
US20230156476A1 (en) * | 2021-11-18 | 2023-05-18 | Charter Communications Operating, Llc | Network access control and offloading |
US11632271B1 (en) | 2022-02-24 | 2023-04-18 | T-Mobile Usa, Inc. | Location-based channel estimation in wireless communication systems |
US11765052B1 (en) | 2022-03-11 | 2023-09-19 | T-Mobile Usa, Inc. | User equipment hosting for customizable 5G services |
WO2024076184A1 (en) * | 2022-10-07 | 2024-04-11 | Samsung Electronics Co., Ltd. | Method and apparatus for message routing between different network nodes in 6g network architecture |
Citations (95)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5014197A (en) * | 1988-09-02 | 1991-05-07 | International Business Machines Corporation | Assignment of files to storage device using macro and micro programming model which optimized performance of input/output subsystem |
US5101501A (en) * | 1989-11-07 | 1992-03-31 | Qualcomm Incorporated | Method and system for providing a soft handoff in communications in a cdma cellular telephone system |
US5109528A (en) * | 1988-06-14 | 1992-04-28 | Telefonaktiebolaget L M Ericsson | Handover method for mobile radio system |
US5390233A (en) * | 1993-08-31 | 1995-02-14 | At&T Corp. | Telephone call transfer between a wireless and wired telephone |
US5392331A (en) * | 1992-08-25 | 1995-02-21 | Motorola, Inc. | Method and apparatus for performing a hand-off in a wireless communication system |
US5406615A (en) * | 1993-08-04 | 1995-04-11 | At&T Corp. | Multi-band wireless radiotelephone operative in a plurality of air interface of differing wireless communications systems |
US5428601A (en) * | 1990-07-23 | 1995-06-27 | U.S. Philips Corporation | Method of operating a communications system, a communications system and a secondary station for use in the system |
US5507035A (en) * | 1993-04-30 | 1996-04-09 | International Business Machines Corporation | Diversity transmission strategy in mobile/indoor cellula radio communications |
US5594782A (en) * | 1994-02-24 | 1997-01-14 | Gte Mobile Communications Service Corporation | Multiple mode personal wireless communications system |
US5610969A (en) * | 1994-12-23 | 1997-03-11 | Bell Atlantic Mobile Systems, Inc. | Personal communication service registration system and method |
US5634193A (en) * | 1992-03-24 | 1997-05-27 | Telefonaktiebolaget Lm Ericsson | Method of locating a mobile station in a mobile telephone system having indoor and outdoor base stations |
US5640414A (en) * | 1992-03-05 | 1997-06-17 | Qualcomm Incorporated | Mobile station assisted soft handoff in a CDMA cellular communications system |
US5724658A (en) * | 1995-08-21 | 1998-03-03 | Mci Communications Corporation | Call routing to wireless roamers in mobile telecommunication systems |
US5732076A (en) * | 1995-10-26 | 1998-03-24 | Omnipoint Corporation | Coexisting communication systems |
US5745852A (en) * | 1995-07-31 | 1998-04-28 | Lucent Technologies | Land-line supported private base station operable in a cellular system |
US5758281A (en) * | 1992-03-05 | 1998-05-26 | Bell Atlantic Network Services, Inc. | Personal communications service using wireline/wireless integration |
US5870677A (en) * | 1992-10-05 | 1999-02-09 | Ntt Mobile Communications Network Inc. | Private mobile communication system easily connecting portable or mobile radio telephone equipment to public network |
US5887260A (en) * | 1995-09-08 | 1999-03-23 | Sony Corporation | Mobile communication apparatus, fixed communicaton apparatus, communication system and communication method |
US5887020A (en) * | 1991-05-13 | 1999-03-23 | Omnipoint Corporation | Multi-band, multi-mode spread-spectrum communication system |
US5890064A (en) * | 1996-03-13 | 1999-03-30 | Telefonaktiebolaget L M Ericsson (Publ) | Mobile telecommunications network having integrated wireless office system |
US5890055A (en) * | 1995-07-28 | 1999-03-30 | Lucent Technologies Inc. | Method and system for connecting cells and microcells in a wireless communications network |
US5903834A (en) * | 1995-10-06 | 1999-05-11 | Telefonaktiebolaget L/M Ericsson | Distributed indoor digital multiple-access cellular telephone system |
US6016318A (en) * | 1996-07-12 | 2000-01-18 | Nec Corporation | Virtual private network system over public mobile data network and virtual LAN |
US6035193A (en) * | 1996-06-28 | 2000-03-07 | At&T Wireless Services Inc. | Telephone system having land-line-supported private base station switchable into cellular network |
US6052592A (en) * | 1994-05-06 | 2000-04-18 | Motorola, Inc. | Call routing system for a wireless data device |
US6226515B1 (en) * | 1995-05-31 | 2001-05-01 | Siemens Aktiengesellschaft | Cellular cordless telecommunications system |
US6236852B1 (en) * | 1998-12-11 | 2001-05-22 | Nortel Networks Limited | Authentication failure trigger method and apparatus |
US20020032030A1 (en) * | 2000-08-28 | 2002-03-14 | Berglund Arne Kristian | Communication system |
US6359872B1 (en) * | 1997-10-28 | 2002-03-19 | Intermec Ip Corp. | Wireless personal local area network |
US6374102B1 (en) * | 1998-12-31 | 2002-04-16 | At+T Corp. | User proactive call handling |
US20020045459A1 (en) * | 2000-10-13 | 2002-04-18 | Nec Corporation | Point-to-multipoint wireless access system |
US6381457B1 (en) * | 1998-04-09 | 2002-04-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for determining if a mobile station is present in an area |
US20020051440A1 (en) * | 2000-10-30 | 2002-05-02 | Mitsubishi Denki Kabushiki Kaisha | Method of establishing a radio link between an access controller and a base station |
US20020059516A1 (en) * | 2000-11-16 | 2002-05-16 | Esa Turtiainen | Securing Voice over IP traffic |
US6393007B1 (en) * | 1997-10-16 | 2002-05-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Method of and a system for voice and data radio communication providing improved interference diversity |
US20020066036A1 (en) * | 2000-11-13 | 2002-05-30 | Gowri Makineni | System and method for secure network mobility |
US20020065099A1 (en) * | 1998-02-11 | 2002-05-30 | Per Bjorndahl | System, method and apparatus for secure transmission of confidential information |
US20030007475A1 (en) * | 2001-06-07 | 2003-01-09 | Kabushiki Kaisha Toshiba | Mobile terminal using priority processing for packets that require urgency in communications |
US20030026269A1 (en) * | 2001-07-31 | 2003-02-06 | Paryani Harish P. | System and method for accessing a multi-line gateway using cordless telephony terminals |
US20030031151A1 (en) * | 2001-08-10 | 2003-02-13 | Mukesh Sharma | System and method for secure roaming in wireless local area networks |
US20030043773A1 (en) * | 2001-08-31 | 2003-03-06 | Hyokang Chang | Multilink wireless access scheme for multiband operation in wireless mobile networks |
US6539237B1 (en) * | 1998-11-09 | 2003-03-25 | Cisco Technology, Inc. | Method and apparatus for integrated wireless communications in private and public network environments |
US20030058816A1 (en) * | 2001-09-24 | 2003-03-27 | Shearer Daniel D. M. | Forwarding communication network and wireless channel allocation method therefor |
US6542516B1 (en) * | 1998-04-15 | 2003-04-01 | Nokia Mobile Phones Limited | Adaptation layer for realizing protocol adaptations in a digital wireless data transmission system |
US6553219B1 (en) * | 1999-04-08 | 2003-04-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobile internet access system and method mapping mobile to internet service provider |
US6556830B1 (en) * | 1998-02-02 | 2003-04-29 | Ericsson Inc. | Coverage area sectorization in time division multiple access/frequency-time division duplex communications systems |
US6556822B1 (en) * | 1995-06-30 | 2003-04-29 | Sanyo Electric Co., Ltd. | Digital cordless telephone device which gives a warning to prevent unexpected termination of communication |
US6556825B1 (en) * | 2000-02-08 | 2003-04-29 | Sharp Laboratories Of America, Inc. | Method and apparatus for automatic adaptation of communications systems to regional spectrum variations |
US20030087653A1 (en) * | 2001-10-03 | 2003-05-08 | Leung Nikolai K.N. | Method and apparatus for data packet transport in a wireless communication system using an internet protocol |
US20040003060A1 (en) * | 2001-07-13 | 2004-01-01 | International Business Machines Corporation | Method and apparatus for network connection registration and selection |
US6675009B1 (en) * | 2001-02-15 | 2004-01-06 | Sprint Communications Company, L.P. | Automated configuration of a wireless communication device |
US20040008649A1 (en) * | 2002-07-10 | 2004-01-15 | Samsung Electronics Co., Ltd. | Apparatus and method for recovering communication sessions in a wireless network gateway |
US20040009749A1 (en) * | 2001-03-20 | 2004-01-15 | Nitzan Arazi | Wireless private branch exchange(wpbx) and communicating between mobile units and base stations |
US6680923B1 (en) * | 2000-05-23 | 2004-01-20 | Calypso Wireless, Inc. | Communication system and method |
US20040013099A1 (en) * | 2002-04-15 | 2004-01-22 | O'neill Alan | Method and apparatus for extending mobile IP |
US20040025018A1 (en) * | 2002-01-23 | 2004-02-05 | Haas Zygmunt J. | Secure end-to-end communication in mobile ad hoc networks |
US20040037312A1 (en) * | 2002-08-23 | 2004-02-26 | Spear Stephen L. | Method and communication network for operating a cross coding element |
US6708033B1 (en) * | 1998-02-13 | 2004-03-16 | Teliasonera Finland Oyj | Change of service profile of mobile subscriber |
US20040053623A1 (en) * | 2000-12-29 | 2004-03-18 | Hoff Per Magne | Methods and means related to the maintenance of connections in a gprs network |
US6711400B1 (en) * | 1997-04-16 | 2004-03-23 | Nokia Corporation | Authentication method |
US20040063451A1 (en) * | 2002-09-27 | 2004-04-01 | Bonta Jeffrey D. | Relaying information within an ad-hoc cellular network |
US20040068571A1 (en) * | 2001-02-06 | 2004-04-08 | Kalle Ahmavaara | Access system for an access network |
US20040072593A1 (en) * | 2002-10-10 | 2004-04-15 | Robbins Barry R. | Extension of a local area phone system to a wide area network |
US20040077356A1 (en) * | 2002-10-22 | 2004-04-22 | Krenik William R. | Wirelessly-linked, distributed resource control to support wireless communication in non-exclusive spectrum |
US20040077374A1 (en) * | 2002-10-10 | 2004-04-22 | Interdigital Technology Corporation | System and method for integrating WLAN and 3G |
US20040087307A1 (en) * | 2002-10-18 | 2004-05-06 | Ibe Oliver C. | Method of seamless roaming between wireless local area networks and cellular carrier networks |
US6842621B2 (en) * | 2001-12-21 | 2005-01-11 | Motorola, Inc. | Method and apparatus for splitting control and media content from a cellular network connection |
US6842462B1 (en) * | 1998-12-18 | 2005-01-11 | Lucent Technologies Inc. | Wireless access of packet based networks |
US6845095B2 (en) * | 2001-04-27 | 2005-01-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Efficient header handling involving GSM/EDGE radio access networks |
US6850503B2 (en) * | 2002-08-06 | 2005-02-01 | Motorola, Inc. | Method and apparatus for effecting a handoff between two IP connections for time critical communications |
US6853851B1 (en) * | 1998-03-18 | 2005-02-08 | Nokia Mobile Phones Limited | Dual mode terminal for accessing a cellular network directly or via a wireless intranet |
US20050041787A1 (en) * | 2003-08-19 | 2005-02-24 | Qwest Communications International Inc (Patent Prosecution) | Advanced call screening appliance |
US20050053070A1 (en) * | 2002-04-09 | 2005-03-10 | Jarkko Jouppi | Transfer of packet data to wireless terminal |
US6895255B1 (en) * | 2000-10-20 | 2005-05-17 | Symbol Technologies, Inc. | Dual mode wireless data communications |
US20050111409A1 (en) * | 2003-11-25 | 2005-05-26 | Spear Stephen L. | Method and apparatus for mobile station registration in a cellular communication system |
US20060019667A1 (en) * | 2003-06-06 | 2006-01-26 | Hicks John A Iii | System and method for providing integrated voice and data services utilizing wired cordless access with unlicensed spectrum and wired access with licensed spectrum |
US6993359B1 (en) * | 2000-04-28 | 2006-01-31 | Cisco Technology, Inc. | Method and apparatus for inter-cell handover in wireless networks using multiple protocols |
US20060035645A1 (en) * | 2004-07-26 | 2006-02-16 | Lg Electronics Inc. | Changing serving radio network controller for mobile terminal supporting multimedia broadcast services |
US20060036733A1 (en) * | 2004-07-09 | 2006-02-16 | Toshiba America Research, Inc. | Dynamic host configuration and network access authentication |
US7009952B1 (en) * | 2001-05-24 | 2006-03-07 | 3Com Corporation | Method and apparatus for seamless mobility with layer two assistance |
US7028186B1 (en) * | 2000-02-11 | 2006-04-11 | Nokia, Inc. | Key management methods for wireless LANs |
US7039025B1 (en) * | 2000-09-29 | 2006-05-02 | Siemens Communications, Inc. | System and method for providing general packet radio services in a private wireless network |
US20060094431A1 (en) * | 2004-11-01 | 2006-05-04 | Nokia Corporation | Method, system and mobile station for handing off communications from a cellular radio access network to an unlicensed mobile access network |
US20060111113A1 (en) * | 2002-10-17 | 2006-05-25 | Heikki Waris | Virtual private network with mobile nodes |
US20070022469A1 (en) * | 2005-07-20 | 2007-01-25 | Cooper Robin R | Network user authentication system and method |
US20070025366A1 (en) * | 2001-02-21 | 2007-02-01 | Interdigital Technology Corporation | Method and system for a low-overhead mobility management protocol in the internet protocol layer |
US20070053370A1 (en) * | 2005-09-06 | 2007-03-08 | King's College London | Method of providing access to packet-switched services in a heterogeneous network environment |
US20070054668A1 (en) * | 2002-10-25 | 2007-03-08 | Ibis Telecom, Inc. | Private base station with exclusivity |
US7200112B2 (en) * | 2002-01-02 | 2007-04-03 | Winphoria Networks, Inc. | Method, system, and apparatus for a mobile station to sense and select a wireless local area network (WLAN) or a wide area mobile wireless network (WWAN) |
US20070094374A1 (en) * | 2005-10-03 | 2007-04-26 | Snehal Karia | Enterprise-managed wireless communication |
US20080051060A1 (en) * | 2003-01-14 | 2008-02-28 | Samsung Electronics Co., Ltd. | Method for fast roaming in a wireless network |
US20080117841A1 (en) * | 2003-06-16 | 2008-05-22 | Xiaobao Chen | Telecommunications System And Method |
US20080123595A1 (en) * | 2004-12-30 | 2008-05-29 | Christofer Lindheimer | Method And System Of Wireless Communications |
US20090017864A1 (en) * | 2005-08-01 | 2009-01-15 | Peter Keevill | Local area cellular basestation |
US20110039566A1 (en) * | 2007-08-27 | 2011-02-17 | Telefonaktiebolaget Lm Ericsson (Publ) | method and a network control node for bandwidth and access control in femto cells of a wireless system |
Family Cites Families (204)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5367558A (en) | 1988-09-23 | 1994-11-22 | Motorola, Inc. | Cellular cordless telephone |
SE465992B (en) | 1990-04-10 | 1991-11-25 | Ericsson Telefon Ab L M | MOBILE PHONE SYSTEM PROVIDED TO USE BY SUBSCRIBERS INDOOR AND OUTDOOR |
JPH0494228A (en) | 1990-08-09 | 1992-03-26 | Matsushita Electric Ind Co Ltd | Dynamic channel allocation method |
US5203013A (en) | 1990-09-10 | 1993-04-13 | Motorola, Inc. | Radio telephone system supporting busy and out-of-range function |
US5112088A (en) * | 1990-10-10 | 1992-05-12 | Stainless Steel Products, Inc. | Duct joint link assembly |
US5815525A (en) | 1991-05-13 | 1998-09-29 | Omnipoint Corporation | Multi-band, multi-mode spread-spectrum communication system |
US5260988A (en) | 1992-02-06 | 1993-11-09 | Motorola, Inc. | Apparatus and method for alternative radiotelephone system selection |
US5448619A (en) | 1992-04-14 | 1995-09-05 | Orion Industries, Inc. | Apparatus and a method of allowing private cellular operation within an existing public cellular system |
US5226045A (en) | 1992-05-07 | 1993-07-06 | Bell Communications Research, Inc. | Method and apparatus for autonomous selective routing during radio access in TDMA portable radio systems |
WO1994000946A1 (en) | 1992-06-23 | 1994-01-06 | Motorola Inc. | Dual system cellular cordless radiotelephone apparatus with sub-data channel timing monitor |
US5333175A (en) | 1993-01-28 | 1994-07-26 | Bell Communications Research, Inc. | Method and apparatus for dynamic power control in TDMA portable radio systems |
SE516173C2 (en) | 1993-02-16 | 2001-11-26 | Ericsson Telefon Ab L M | Device for telecommunications |
US5796727A (en) | 1993-04-30 | 1998-08-18 | International Business Machines Corporation | Wide-area wireless lan access |
GB2282735B (en) | 1993-06-04 | 1998-11-18 | Mercury Personal Communication | Autorouting system for mobile telephones |
SE518649C2 (en) * | 1993-06-22 | 2002-11-05 | Ericsson Telefon Ab L M | Procedure for telecommunications access in a multi-network environment |
GB2282730B (en) | 1993-10-08 | 1998-01-28 | Nokia Telecommunications Oy | Dual mode subscriber terminal and a handover procedure of the dual mode subscriber terminal in a mobile telecommunication network |
US6088590A (en) | 1993-11-01 | 2000-07-11 | Omnipoint Corporation | Method and system for mobile controlled handoff and link maintenance in spread spectrum communication |
JPH07154859A (en) | 1993-11-29 | 1995-06-16 | Mitsubishi Electric Corp | Mobile equipment, switchboard and mobile communication system |
CA2136796C (en) * | 1993-11-29 | 1998-11-24 | Shinichi Urasaka | Cordless telephone apparatus |
US5488649A (en) * | 1994-05-06 | 1996-01-30 | Motorola, Inc. | Method for validating a communication link |
US5673307A (en) | 1994-02-17 | 1997-09-30 | Spectralink Corporation | Handoff method for indoor cellular phone system |
US5509052A (en) * | 1994-05-25 | 1996-04-16 | Motorola, Inc. | Base storage of handset's base registrations |
JPH089042A (en) | 1994-06-24 | 1996-01-12 | Matsushita Electric Ind Co Ltd | Radio telephone system |
US5602903A (en) | 1994-09-28 | 1997-02-11 | Us West Technologies, Inc. | Positioning system and method |
US5825759A (en) | 1994-10-26 | 1998-10-20 | Telefonaktiebolaget Lm Ericsson | Distributing network services and resources in a mobile communications network |
US5475677A (en) | 1994-12-29 | 1995-12-12 | Bell Communications Research Inc. | Compatible licensed and unlicensed band portable handset unit for TDMA wireless communications system |
US5812522A (en) | 1995-03-31 | 1998-09-22 | Airtouch Communications, Inc. | Location-ruled radio-integrated network |
US5651137A (en) | 1995-04-12 | 1997-07-22 | Intel Corporation | Scalable cache attributes for an input/output bus |
JPH08307937A (en) | 1995-04-28 | 1996-11-22 | Sony Corp | Radio communication system and its communication terminal equipment |
US5926760A (en) | 1995-07-31 | 1999-07-20 | Lucent Technologies, Inc. | System for providing features for a land-line supported private base station operable in a cellular system |
US5675629A (en) | 1995-09-08 | 1997-10-07 | At&T | Cordless cellular system base station |
US6134227A (en) | 1995-12-04 | 2000-10-17 | Advanced Micro Devices | Secondary channel for radio frequency communications |
US6658250B1 (en) | 1996-01-05 | 2003-12-02 | Hughes Electronics Corporation | System and method for a wide area wireless personal communication system incorporating advanced messaging |
US5822681A (en) | 1996-01-24 | 1998-10-13 | Bell Communications Research, Inc. | Method for assigning band port channels in an unlicensed personal communications system |
JP2838998B2 (en) * | 1996-02-07 | 1998-12-16 | 日本電気株式会社 | Mobile terminal and mobile network |
GB2310342A (en) | 1996-02-16 | 1997-08-20 | Northern Telecom Ltd | Dual mode radio transceiver front end |
US6167279A (en) | 1996-03-13 | 2000-12-26 | Telcordia Technologies, Inc. | Method and system for supporting PACS using a GSM mobile switching center |
US5867292A (en) | 1996-03-22 | 1999-02-02 | Wireless Communications Products, Llc | Method and apparatus for cordless infrared communication |
US5796729A (en) | 1996-05-09 | 1998-08-18 | Bell Communications Research, Inc. | Integrated telecommunication system architecture for wireless and wireline access featuring PACS radio technology |
DE19617441C1 (en) | 1996-05-02 | 1997-12-18 | Deutsche Telekom Mobil | Method for the integration of cordless telephone networks in cellular mobile radio networks |
DE69728079T2 (en) | 1996-05-03 | 2005-01-20 | Agilent Technologies, Inc. (n.d.Ges.d.Staates Delaware), Palo Alto | Method and device for tracking the change of the identification code in a mobile communication system |
JP2877199B2 (en) | 1996-06-21 | 1999-03-31 | 日本電気株式会社 | Roaming method |
US6088591A (en) | 1996-06-28 | 2000-07-11 | Aironet Wireless Communications, Inc. | Cellular system hand-off protocol |
GB2315193B (en) | 1996-07-10 | 2000-11-15 | Orange Personal Comm Serv Ltd | Mobile communications system |
US6101176A (en) | 1996-07-24 | 2000-08-08 | Nokia Mobile Phones | Method and apparatus for operating an indoor CDMA telecommunications system |
US6112088A (en) | 1996-08-30 | 2000-08-29 | Telefonaktiebolaget, L.M. Ericsson | Radio communications system and method for mobile assisted handover between a private network and a public mobile network |
US5936949A (en) | 1996-09-05 | 1999-08-10 | Netro Corporation | Wireless ATM metropolitan area network |
US5960361A (en) | 1996-10-22 | 1999-09-28 | Qualcomm Incorporated | Method and apparatus for performing a fast downward move in a cellular telephone forward link power control system |
US5960364A (en) | 1996-11-08 | 1999-09-28 | Ericsson Inc. | Satellite/cellular phone using different channel spacings on forward and return links |
US5946622A (en) | 1996-11-19 | 1999-08-31 | Ericsson Inc. | Method and apparatus for providing cellular telephone service to a macro-cell and pico-cell within a building using shared equipment |
CA2280618A1 (en) * | 1997-02-07 | 1998-08-13 | Siemens Aktiengesellschaft | Conveyor system for automatic transporting items |
US6010176A (en) * | 1997-03-18 | 2000-01-04 | Worldwide Container Services, Inc. | Reversible cover for trucks, trailers and other vehicles |
US5987010A (en) | 1997-05-15 | 1999-11-16 | Advanced Micro Devices, Inc. | System and method for providing FDD and TDD modes of operation for a wireless communications device |
FI104685B (en) | 1997-09-05 | 2000-04-14 | Nokia Networks Oy | Method for selecting a cell in a cellular radio network, mobile telephone system and a mobile station |
US6327470B1 (en) | 1997-11-07 | 2001-12-04 | Ericsson Inc. | Handover between fixed and mobile networks for dual mode phones |
US6587444B1 (en) | 1997-11-14 | 2003-07-01 | Ericsson Inc. | Fixed frequency-time division duplex in radio communications systems |
DE69817145T2 (en) | 1998-02-13 | 2004-06-09 | Lucent Technologies Inc. | Integrated system of cordless telecommunications and a local network |
US6269086B1 (en) | 1998-02-27 | 2001-07-31 | Legerity, Inc. | Arrangement and method for selectable time/frequency division multiplex communication |
SE517215C2 (en) | 1998-03-20 | 2002-05-07 | Ericsson Telefon Ab L M | A system and method related to packet data communication |
US5949773A (en) | 1998-03-31 | 1999-09-07 | Motorola, Inc. | Method for transferring a data signal in a wireless communications system |
US7065353B1 (en) | 1998-06-23 | 2006-06-20 | Siemens Aktiengesellschaft | Method for controlling the handover of telecommunication connections between mobile parts and base stations in cellular telecommunications systems having wireless telecommunication |
US6463307B1 (en) | 1998-08-14 | 2002-10-08 | Telefonaktiebolaget Lm Ericsson | Method and apparatus for power saving in a mobile terminal with established connections |
US6320873B1 (en) | 1998-08-27 | 2001-11-20 | Qualcomm Incorporated | CDMA transmission of packet-switched data |
US6263211B1 (en) | 1998-09-24 | 2001-07-17 | Telefonaktiebolaget L M Ericsson (Publ) | System and method of automatically conveying a Wireless Office System (WOS) frequency set to mobile stations |
CN1329805A (en) | 1998-12-08 | 2002-01-02 | 英国电讯有限公司 | Method of operating cellular mobile telephone network having subset of base stations only available to some subscribers |
US6243581B1 (en) | 1998-12-11 | 2001-06-05 | Nortel Networks Limited | Method and system for seamless roaming between wireless communication networks with a mobile terminal |
FI105964B (en) | 1998-12-16 | 2000-10-31 | Nokia Networks Oy | A method for managing mobile communications |
US6415158B1 (en) | 1999-02-01 | 2002-07-02 | Lucent Technologies Inc. | Dual mode mobile phone operating as a two-way radio |
US6498934B1 (en) | 1999-03-24 | 2002-12-24 | Telefonaktiebologet Lm Ericsson (Publ) | Channel allocation using enhanced pathloss estimates |
DE69906592T2 (en) | 1999-05-05 | 2004-01-29 | Nokia Corp | METHOD FOR DETERMINING A MOBILE STATION |
US6947469B2 (en) | 1999-05-07 | 2005-09-20 | Intel Corporation | Method and Apparatus for wireless spread spectrum communication with preamble processing period |
SE514264C2 (en) | 1999-05-07 | 2001-01-29 | Ericsson Telefon Ab L M | A communication system |
US6574266B1 (en) | 1999-06-25 | 2003-06-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Base-station-assisted terminal-to-terminal connection setup |
DE69942589D1 (en) | 1999-07-15 | 2010-08-26 | Nokia Siemens Networks Oy | METHOD AND NETWORK ELEMENT FOR BUILDING A CONNECTION WITH A LOCAL SERVICE |
US6643512B1 (en) | 1999-09-14 | 2003-11-04 | Motorola, Inc. | Method and apparatus for spanning operation of a cellular telephone |
US6654431B1 (en) | 1999-09-15 | 2003-11-25 | Telcordia Technologies, Inc. | Multicarrier personal access communication system |
US6909705B1 (en) | 1999-11-02 | 2005-06-21 | Cello Partnership | Integrating wireless local loop networks with cellular networks |
EP1315395A1 (en) | 1999-11-09 | 2003-05-28 | Sony Corporation | Information communication system and method |
US6609148B1 (en) * | 1999-11-10 | 2003-08-19 | Randy Salo | Clients remote access to enterprise networks employing enterprise gateway servers in a centralized data center converting plurality of data requests for messaging and collaboration into a single request |
US6445921B1 (en) | 1999-12-20 | 2002-09-03 | Koninklijke Philips Electronics N.V. | Call re-establishment for a dual mode telephone |
US20010029186A1 (en) | 2000-01-24 | 2001-10-11 | James Canyon | Massively parallel cordless telephone network |
GB2358771B (en) | 2000-01-27 | 2003-08-06 | Phillip Jarrett | Multi-purpose mobile cordless phone system |
GB0004178D0 (en) * | 2000-02-22 | 2000-04-12 | Nokia Networks Oy | Integrity check in a communication system |
US6665276B1 (en) | 2000-02-24 | 2003-12-16 | The United States Of America As Represented By The Secretary Of The Navy | Full duplex transceiver |
US6324470B1 (en) | 2000-03-07 | 2001-11-27 | Navigation Technologies Corporation | Method and system for representing restricted driving maneuvers |
FI109443B (en) | 2000-03-16 | 2002-07-31 | Nokia Corp | Updating subscriber data |
US6430395B2 (en) | 2000-04-07 | 2002-08-06 | Commil Ltd. | Wireless private branch exchange (WPBX) and communicating between mobile units and base stations |
US6766160B1 (en) | 2000-04-11 | 2004-07-20 | Nokia Corporation | Apparatus, and associated method, for facilitating authentication of communication stations in a mobile communication system |
US6801519B1 (en) | 2000-04-11 | 2004-10-05 | Sprint Communications Company, L.P. | Traffic distribution in a wireless communication system |
US6714797B1 (en) | 2000-05-17 | 2004-03-30 | Nokia Corporation | System and method for the transfer of digital data to a mobile device |
KR100362569B1 (en) | 2000-05-24 | 2002-11-29 | 삼성전자 주식회사 | Call originating service method of public and private common mobile communication system and apparatus therefor |
US6725036B1 (en) | 2000-05-30 | 2004-04-20 | Nokia Telecommunications Ojy | System and method of controlling application level access of a subscriber to a network |
US6970719B1 (en) | 2000-06-15 | 2005-11-29 | Sprint Spectrum L.P. | Private wireless network integrated with public wireless network |
US7099339B1 (en) | 2000-06-22 | 2006-08-29 | Nokia Corporation | Apparatus, and associated method, for integrating operation of packet radio communication systems |
GB0015715D0 (en) | 2000-06-27 | 2000-08-16 | Nokia Networks Oy | Maintaining association in a communications network |
FI111208B (en) | 2000-06-30 | 2003-06-13 | Nokia Corp | Arrangement of data encryption in a wireless telecommunication system |
US6633761B1 (en) | 2000-08-11 | 2003-10-14 | Reefedge, Inc. | Enabling seamless user mobility in a short-range wireless networking environment |
FI111312B (en) | 2000-08-25 | 2003-06-30 | Nokia Corp | Monitoring a connection to a user terminal in a telecommunications system |
US6545643B1 (en) | 2000-09-08 | 2003-04-08 | 3Com Corporation | Extendable planar diversity antenna |
TW532040B (en) | 2000-10-20 | 2003-05-11 | Koninkl Philips Electronics Nv | Method and system for transferring a communication session |
US6829227B1 (en) | 2000-10-27 | 2004-12-07 | Lucent Technologies Inc. | Dual polling media access control protocol for packet data in fixed wireless communication systems |
US7035932B1 (en) | 2000-10-27 | 2006-04-25 | Eric Morgan Dowling | Federated multiprotocol communication |
US6553218B1 (en) | 2000-11-17 | 2003-04-22 | Eimar M. Boesjes | Distributed wireless online access system |
DE60019817T2 (en) | 2000-11-17 | 2006-01-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobile communication network |
US20050239453A1 (en) | 2000-11-22 | 2005-10-27 | Vikberg Jari T | Mobile communication network |
FI111423B (en) | 2000-11-28 | 2003-07-15 | Nokia Corp | A system for securing post-handover communications |
US20020101848A1 (en) | 2000-12-05 | 2002-08-01 | Ivan Lee | Systems and methods for on-location, wireless access of web content |
US6990089B2 (en) * | 2000-12-12 | 2006-01-24 | Telelec | Methods and systems for routing messages in a radio access network |
FI110902B (en) | 2000-12-15 | 2003-04-15 | Nokia Corp | Arranging packet data connections in an office system |
US20020075844A1 (en) * | 2000-12-15 | 2002-06-20 | Hagen W. Alexander | Integrating public and private network resources for optimized broadband wireless access and method |
KR100457185B1 (en) * | 2000-12-23 | 2004-11-16 | 엘지전자 주식회사 | Tone Providing Method in Next Generation Network |
US7039027B2 (en) | 2000-12-28 | 2006-05-02 | Symbol Technologies, Inc. | Automatic and seamless vertical roaming between wireless local area network (WLAN) and wireless wide area network (WWAN) while maintaining an active voice or streaming data connection: systems, methods and program products |
US6885869B2 (en) | 2001-01-26 | 2005-04-26 | Ericsson Inc. | Method for mating a mobile terminal with a cordless phone system |
US8019335B2 (en) | 2001-01-29 | 2011-09-13 | Nokia Corporation | Identifying neighboring cells in telecommunication network |
US20020142761A1 (en) | 2001-02-01 | 2002-10-03 | Wallstedt Yngve Kenneth | Handoff between digital wireless office system (DWOS) radio-infrastructure units using a conference call |
US20020118674A1 (en) | 2001-02-23 | 2002-08-29 | Faccin Stefano M. | Key distribution mechanism for IP environment |
US20030119490A1 (en) | 2001-02-26 | 2003-06-26 | Jahangir Mohammed | Wireless communications handset for facilitating licensed and unlicensed wireless communications, and method of operation |
US20020123325A1 (en) | 2001-03-01 | 2002-09-05 | Cooper Gerald M. | Method and apparatus for increasing the security of wireless data services |
US6947405B2 (en) | 2001-03-19 | 2005-09-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Cellular system with cybercells |
US20020174335A1 (en) | 2001-03-30 | 2002-11-21 | Junbiao Zhang | IP-based AAA scheme for wireless LAN virtual operators |
US7386000B2 (en) | 2001-04-17 | 2008-06-10 | Nokia Corporation | Packet mode speech communication |
US6941152B2 (en) | 2001-04-24 | 2005-09-06 | Ipr Licensing, Inc. | Wireless subscriber network registration system for configurable services |
US20020160811A1 (en) | 2001-04-25 | 2002-10-31 | Jannette Michele Ann | Radius profiles at a base station and methods of using the radius profiles |
FI110464B (en) | 2001-04-26 | 2003-01-31 | Nokia Corp | IP security and mobile network connections |
US7089586B2 (en) | 2001-05-02 | 2006-08-08 | Ipr Licensing, Inc. | Firewall protection for wireless users |
US6826154B2 (en) | 2001-05-24 | 2004-11-30 | 3Com Corporation | Method and apparatus for seamless mobility between different access technologies |
WO2002103970A1 (en) | 2001-06-18 | 2002-12-27 | Tatara Systems, Inc. | Method and apparatus for converging local area and wide area wireless data networks |
US20020197984A1 (en) | 2001-06-22 | 2002-12-26 | Tadlys Ltd. | Flexible wireless local networks |
US7389412B2 (en) | 2001-08-10 | 2008-06-17 | Interactive Technology Limited Of Hk | System and method for secure network roaming |
US6744753B2 (en) | 2001-11-01 | 2004-06-01 | Nokia Corporation | Local service handover |
US6643513B2 (en) * | 2001-11-15 | 2003-11-04 | Nokia Corporation | Method and apparatus for providing immediate ciphering after an inter-system UTRAN-GSM handover |
GB2382502B (en) | 2001-11-23 | 2005-10-19 | Actix Ltd | Network testing systems |
US6801777B2 (en) | 2001-11-27 | 2004-10-05 | Intel Corporation | Device and method for intelligent wireless communication selection |
US20030139180A1 (en) | 2002-01-24 | 2003-07-24 | Mcintosh Chris P. | Private cellular network with a public network interface and a wireless local area network extension |
US6973086B2 (en) | 2002-01-28 | 2005-12-06 | Nokia Corporation | Method and system for securing mobile IPv6 home address option using ingress filtering |
US20030172264A1 (en) | 2002-01-28 | 2003-09-11 | Hughes Electronics | Method and system for providing security in performance enhanced network |
US20030219022A1 (en) | 2002-01-28 | 2003-11-27 | Hughes Electronics | Method and system for utilizing virtual private network (VPN) connections in a performance enhanced network |
US20030193952A1 (en) | 2002-02-04 | 2003-10-16 | O'neill Alan | Mobile node handoff methods and apparatus |
FI113329B (en) | 2002-02-15 | 2004-03-31 | Validitas Oy | A device for testing a packet switched cellular radio network |
EP1486015A4 (en) | 2002-02-20 | 2005-08-31 | Passover Inc | Wireless provider monitoring of catv segment |
JP3697217B2 (en) | 2002-03-08 | 2005-09-21 | キヤノン株式会社 | Image forming apparatus |
US7233791B2 (en) | 2002-04-02 | 2007-06-19 | X-Cyte, Inc. | Cell phone feature for downloading information via a telecommunications network |
KR100465208B1 (en) | 2002-04-02 | 2005-01-13 | 조광선 | System, Apparatus, and Method for Wireless Mobile Communication in association with Mobile AD-HOC Network Support |
US7400903B2 (en) | 2002-04-16 | 2008-07-15 | Texas Instruments Incorporated | Wireless communications system using both licensed and unlicensed frequency bands |
AU2002311528A1 (en) * | 2002-04-29 | 2003-11-17 | Nokia Corporation | Internet protocol based system |
US7006467B2 (en) | 2002-04-29 | 2006-02-28 | Hereuare Communications, Inc. | Method and system for simulating multiple independent client devices in a wired or wireless network |
US20030217132A1 (en) | 2002-05-16 | 2003-11-20 | International Business Machines Corporation | System and method for remotely managing a computer system by a wireless communications device |
US6937605B2 (en) | 2002-05-21 | 2005-08-30 | Nokia Corporation | Wireless gateway, and associated method, for a packet radio communication system |
US7529933B2 (en) | 2002-05-30 | 2009-05-05 | Microsoft Corporation | TLS tunneling |
CN1618224A (en) * | 2002-06-07 | 2005-05-18 | 西门子公司 | Method and device for transmitting IP packets between a radio network controller (RNC) and another device of mobile radio network |
US20030235186A1 (en) | 2002-06-25 | 2003-12-25 | Park Sang Gyu | Internet cordless phone |
US7065358B2 (en) * | 2002-08-13 | 2006-06-20 | Thomson Licensing | Identity protection in a LAN-universal radiotelephone system |
US7360233B2 (en) * | 2002-09-05 | 2008-04-15 | Scientific-Atlanta, Inc. | Broadcast carousel system access for remote home communication terminal |
US20040057408A1 (en) * | 2002-09-19 | 2004-03-25 | Gray William H. | Method and system of providing bandwidth on demand to WAN user from WLAN access point |
US20040077256A1 (en) * | 2002-10-02 | 2004-04-22 | Anthony Laferrera | Nail and toy set |
US7607015B2 (en) * | 2002-10-08 | 2009-10-20 | Koolspan, Inc. | Shared network access using different access keys |
US7369859B2 (en) | 2003-10-17 | 2008-05-06 | Kineto Wireless, Inc. | Method and system for determining the location of an unlicensed mobile access subscriber |
US7640008B2 (en) * | 2002-10-18 | 2009-12-29 | Kineto Wireless, Inc. | Apparatus and method for extending the coverage area of a licensed wireless communication system using an unlicensed wireless communication system |
US7349698B2 (en) * | 2002-10-18 | 2008-03-25 | Kineto Wireless, Inc. | Registration messaging in an unlicensed mobile access telecommunications system |
US7606190B2 (en) | 2002-10-18 | 2009-10-20 | Kineto Wireless, Inc. | Apparatus and messages for interworking between unlicensed access network and GPRS network for data services |
EP2334129A3 (en) | 2002-10-18 | 2012-07-11 | Kineto Wireless, Inc. | Method and apparatuses for paging a telecommunication device |
US7366519B2 (en) * | 2002-10-21 | 2008-04-29 | Hong Kong Applied Science And Technology Research Institute Co., Ltd. | Systems and methods for managing wireless communications using link space information |
US20040203346A1 (en) | 2002-10-24 | 2004-10-14 | John Myhre | System and method for integrating local-area and wide-area wireless networks |
US20040203737A1 (en) | 2002-10-24 | 2004-10-14 | John Myhre | System and method for delivering data services in integrated wireless networks |
US20040203800A1 (en) | 2002-10-24 | 2004-10-14 | John Myhre | System and method for content delivery using alternate data paths in a wireless network |
US20040203736A1 (en) * | 2002-11-20 | 2004-10-14 | Pedro Serna | Method, network node and system for selecting network nodes |
WO2004073256A1 (en) * | 2003-02-12 | 2004-08-26 | Samsung Electronics Co., Ltd. | Method for managing service context for paging user equipment in a multimedia broadcast/multicast service |
WO2004084572A1 (en) * | 2003-03-20 | 2004-09-30 | Telefonaktiebolaget L M Ericsson (Publ) | Method for transferring a mobile terminal in e.g. an umts-network from one server node in a pool to another server node in the same pool |
US20040240525A1 (en) | 2003-05-29 | 2004-12-02 | Karabinis Peter D. | Wireless communications methods and apparatus using licensed-use system protocols with unlicensed-use access points |
US8457082B2 (en) | 2003-06-06 | 2013-06-04 | At&T Intellectual Property I, L.P. | System and method for providing integrated voice and data services utilizing wired cordless access with unlicensed/unregulated spectrum |
US7146153B2 (en) * | 2003-07-30 | 2006-12-05 | Sbc Knowledge Ventures, L.P. | Provisioning of wireless private access subscribers for location based services |
FI20031149A0 (en) * | 2003-08-12 | 2003-08-12 | Nokia Corp | Arrangement and procedure for searching, cellular radio system, and control unit for searching cellular radio system |
US8694869B2 (en) * | 2003-08-21 | 2014-04-08 | QUALCIMM Incorporated | Methods for forward error correction coding above a radio link control layer and related apparatus |
US20050059396A1 (en) * | 2003-09-09 | 2005-03-17 | Chuah Mooi Choo | Communications protocol between a gateway and an access point |
JP3651850B2 (en) * | 2003-10-21 | 2005-05-25 | アンリツ株式会社 | Mobile communication terminal test equipment |
CN1918922A (en) | 2004-02-18 | 2007-02-21 | 艾利森电话股份有限公司 | Mobiler cornmunications with unlicensed-radio access networks |
US10375023B2 (en) | 2004-02-20 | 2019-08-06 | Nokia Technologies Oy | System, method and computer program product for accessing at least one virtual private network |
US7200383B2 (en) * | 2004-04-26 | 2007-04-03 | Nokia Corporation | Subscriber authentication for unlicensed mobile access signaling |
KR20060001777A (en) * | 2004-06-29 | 2006-01-06 | 삼성전자주식회사 | A method and apparatus for transmission/receiving about packet call service in ip multimedia subsystem |
ATE550893T1 (en) * | 2004-08-27 | 2012-04-15 | Nokia Siemens Networks Gmbh | METHOD FOR DECENTRALIZING THE COUNTING OF IRREGULAR CELL-BASED CONNECTIONS IN DIGITAL CELLULAR COMMUNICATION NETWORKS |
CN101133658A (en) * | 2004-10-22 | 2008-02-27 | 特克雷克公司 | Mobility management apparatus and methods |
US7190959B2 (en) * | 2004-11-19 | 2007-03-13 | Tekelec | Methods and systems for signaling in a communications network for ported, migrated and/or dual-mode subscribers |
ES2374824T3 (en) | 2004-11-29 | 2012-02-22 | Research In Motion Limited | METHOD, USER EQUIPMENT AND GENERIC ACCESS NETWORK CONTROLLER TO PROVIDE DIFFERENT MESSAGING ACCORDING TO THE OPERATOR TO A WIRELESS USER EQUIPMENT (EU) DEVICE. |
US7577121B2 (en) | 2005-02-28 | 2009-08-18 | Alcatel-Lucent Usa Inc. | Method for scheduling users in a hierarchical network |
FI20050235A0 (en) * | 2005-03-03 | 2005-03-03 | Nokia Corp | Access to a communication system |
FI20050369A0 (en) * | 2005-04-12 | 2005-04-12 | Nokia Corp | Selection of network elements |
US7864673B2 (en) * | 2005-05-24 | 2011-01-04 | At&T Mobility Ii Llc | Dynamic dual-mode service access control, location-based billing, and E911 mechanisms |
US8428584B2 (en) * | 2005-07-01 | 2013-04-23 | Research In Motion Limited | System and method for accelerating network selection by a wireless user equipment (UE) device |
ATE458373T1 (en) * | 2005-12-13 | 2010-03-15 | Panasonic Corp | ALLOCATION OF BROADCAST SYSTEM INFORMATION TO TRANSPORT CHANNELS IN A MOBILE COMMUNICATIONS SYSTEM |
JP2007266725A (en) * | 2006-03-27 | 2007-10-11 | Fujitsu Ltd | Mobility management device and method |
US20080039086A1 (en) * | 2006-07-14 | 2008-02-14 | Gallagher Michael D | Generic Access to the Iu Interface |
US7852817B2 (en) * | 2006-07-14 | 2010-12-14 | Kineto Wireless, Inc. | Generic access to the Iu interface |
WO2008009016A2 (en) * | 2006-07-14 | 2008-01-17 | Kineto Wireless, Inc. | Generic access to the iu interface |
US20090061877A1 (en) * | 2006-07-14 | 2009-03-05 | Gallagher Michael D | Generic Access to the Iu Interface |
US7514997B2 (en) * | 2006-09-11 | 2009-04-07 | Lecroy Corporation | Common mode regulation for thermal tail compensation |
EP2074839A4 (en) | 2006-09-22 | 2010-05-05 | Kineto Wireless Inc | Method and apparatus for resource management |
US8204502B2 (en) * | 2006-09-22 | 2012-06-19 | Kineto Wireless, Inc. | Method and apparatus for user equipment registration |
US20080076412A1 (en) * | 2006-09-22 | 2008-03-27 | Amit Khetawat | Method and apparatus for registering an access point |
US7990912B2 (en) * | 2007-04-02 | 2011-08-02 | Go2Call.Com, Inc. | VoIP enabled femtocell with a USB transceiver station |
US8594678B2 (en) * | 2007-04-18 | 2013-11-26 | Qualcomm Incorporated | Backhaul network for femto base stations |
US8868083B2 (en) * | 2007-05-22 | 2014-10-21 | Mavenir Systems, Inc. | Discovering cellular network elements |
EP2046090A1 (en) * | 2007-10-02 | 2009-04-08 | Panasonic Corporation | Management of session control signaling for multicast/broadcast services |
US20090262703A1 (en) | 2008-04-18 | 2009-10-22 | Amit Khetawat | Method and Apparatus for Encapsulation of RANAP Messages in a Home Node B System |
US8413226B2 (en) * | 2008-05-13 | 2013-04-02 | Telefonaktiebolaget Lm Ericsson (Publ) | User-type handling in a wireless access network |
-
2009
- 2009-04-17 US US12/426,206 patent/US20090262703A1/en not_active Abandoned
- 2009-04-17 US US12/426,203 patent/US20090265543A1/en not_active Abandoned
- 2009-04-17 US US12/426,207 patent/US20090262683A1/en not_active Abandoned
- 2009-04-17 US US12/426,205 patent/US20090262682A1/en not_active Abandoned
- 2009-04-17 US US12/426,211 patent/US8041335B2/en active Active
- 2009-04-17 US US12/426,215 patent/US20090262704A1/en not_active Abandoned
- 2009-04-17 US US12/426,217 patent/US20090264126A1/en not_active Abandoned
- 2009-04-17 US US12/426,209 patent/US20090262684A1/en not_active Abandoned
- 2009-04-17 US US12/426,204 patent/US20090262702A1/en not_active Abandoned
- 2009-04-17 US US12/426,200 patent/US20090265542A1/en not_active Abandoned
- 2009-04-18 EP EP09732229A patent/EP2272261A1/en not_active Withdrawn
- 2009-04-18 WO PCT/US2009/041055 patent/WO2009129516A1/en active Application Filing
Patent Citations (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5109528A (en) * | 1988-06-14 | 1992-04-28 | Telefonaktiebolaget L M Ericsson | Handover method for mobile radio system |
US5014197A (en) * | 1988-09-02 | 1991-05-07 | International Business Machines Corporation | Assignment of files to storage device using macro and micro programming model which optimized performance of input/output subsystem |
US5101501A (en) * | 1989-11-07 | 1992-03-31 | Qualcomm Incorporated | Method and system for providing a soft handoff in communications in a cdma cellular telephone system |
US5428601A (en) * | 1990-07-23 | 1995-06-27 | U.S. Philips Corporation | Method of operating a communications system, a communications system and a secondary station for use in the system |
US5887020A (en) * | 1991-05-13 | 1999-03-23 | Omnipoint Corporation | Multi-band, multi-mode spread-spectrum communication system |
US6389059B1 (en) * | 1991-05-13 | 2002-05-14 | Xircom Wireless, Inc. | Multi-band, multi-mode spread-spectrum communication system |
US5758281A (en) * | 1992-03-05 | 1998-05-26 | Bell Atlantic Network Services, Inc. | Personal communications service using wireline/wireless integration |
US5640414A (en) * | 1992-03-05 | 1997-06-17 | Qualcomm Incorporated | Mobile station assisted soft handoff in a CDMA cellular communications system |
US5634193A (en) * | 1992-03-24 | 1997-05-27 | Telefonaktiebolaget Lm Ericsson | Method of locating a mobile station in a mobile telephone system having indoor and outdoor base stations |
US5392331A (en) * | 1992-08-25 | 1995-02-21 | Motorola, Inc. | Method and apparatus for performing a hand-off in a wireless communication system |
US5870677A (en) * | 1992-10-05 | 1999-02-09 | Ntt Mobile Communications Network Inc. | Private mobile communication system easily connecting portable or mobile radio telephone equipment to public network |
US5507035A (en) * | 1993-04-30 | 1996-04-09 | International Business Machines Corporation | Diversity transmission strategy in mobile/indoor cellula radio communications |
US5406615A (en) * | 1993-08-04 | 1995-04-11 | At&T Corp. | Multi-band wireless radiotelephone operative in a plurality of air interface of differing wireless communications systems |
US5390233A (en) * | 1993-08-31 | 1995-02-14 | At&T Corp. | Telephone call transfer between a wireless and wired telephone |
US5594782A (en) * | 1994-02-24 | 1997-01-14 | Gte Mobile Communications Service Corporation | Multiple mode personal wireless communications system |
US6052592A (en) * | 1994-05-06 | 2000-04-18 | Motorola, Inc. | Call routing system for a wireless data device |
US5610969A (en) * | 1994-12-23 | 1997-03-11 | Bell Atlantic Mobile Systems, Inc. | Personal communication service registration system and method |
US6226515B1 (en) * | 1995-05-31 | 2001-05-01 | Siemens Aktiengesellschaft | Cellular cordless telecommunications system |
US6556822B1 (en) * | 1995-06-30 | 2003-04-29 | Sanyo Electric Co., Ltd. | Digital cordless telephone device which gives a warning to prevent unexpected termination of communication |
US5890055A (en) * | 1995-07-28 | 1999-03-30 | Lucent Technologies Inc. | Method and system for connecting cells and microcells in a wireless communications network |
US5745852A (en) * | 1995-07-31 | 1998-04-28 | Lucent Technologies | Land-line supported private base station operable in a cellular system |
US5724658A (en) * | 1995-08-21 | 1998-03-03 | Mci Communications Corporation | Call routing to wireless roamers in mobile telecommunication systems |
US5887260A (en) * | 1995-09-08 | 1999-03-23 | Sony Corporation | Mobile communication apparatus, fixed communicaton apparatus, communication system and communication method |
US5903834A (en) * | 1995-10-06 | 1999-05-11 | Telefonaktiebolaget L/M Ericsson | Distributed indoor digital multiple-access cellular telephone system |
US5732076A (en) * | 1995-10-26 | 1998-03-24 | Omnipoint Corporation | Coexisting communication systems |
US5890064A (en) * | 1996-03-13 | 1999-03-30 | Telefonaktiebolaget L M Ericsson (Publ) | Mobile telecommunications network having integrated wireless office system |
US6035193A (en) * | 1996-06-28 | 2000-03-07 | At&T Wireless Services Inc. | Telephone system having land-line-supported private base station switchable into cellular network |
US6016318A (en) * | 1996-07-12 | 2000-01-18 | Nec Corporation | Virtual private network system over public mobile data network and virtual LAN |
US6711400B1 (en) * | 1997-04-16 | 2004-03-23 | Nokia Corporation | Authentication method |
US6393007B1 (en) * | 1997-10-16 | 2002-05-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Method of and a system for voice and data radio communication providing improved interference diversity |
US6359872B1 (en) * | 1997-10-28 | 2002-03-19 | Intermec Ip Corp. | Wireless personal local area network |
US6556830B1 (en) * | 1998-02-02 | 2003-04-29 | Ericsson Inc. | Coverage area sectorization in time division multiple access/frequency-time division duplex communications systems |
US20020065099A1 (en) * | 1998-02-11 | 2002-05-30 | Per Bjorndahl | System, method and apparatus for secure transmission of confidential information |
US6708033B1 (en) * | 1998-02-13 | 2004-03-16 | Teliasonera Finland Oyj | Change of service profile of mobile subscriber |
US6853851B1 (en) * | 1998-03-18 | 2005-02-08 | Nokia Mobile Phones Limited | Dual mode terminal for accessing a cellular network directly or via a wireless intranet |
US20050064896A1 (en) * | 1998-03-18 | 2005-03-24 | Markku Rautiola | Dual mode terminal for accessing a cellular network directly or via a wireless intranet |
US6381457B1 (en) * | 1998-04-09 | 2002-04-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for determining if a mobile station is present in an area |
US6542516B1 (en) * | 1998-04-15 | 2003-04-01 | Nokia Mobile Phones Limited | Adaptation layer for realizing protocol adaptations in a digital wireless data transmission system |
US6539237B1 (en) * | 1998-11-09 | 2003-03-25 | Cisco Technology, Inc. | Method and apparatus for integrated wireless communications in private and public network environments |
US6236852B1 (en) * | 1998-12-11 | 2001-05-22 | Nortel Networks Limited | Authentication failure trigger method and apparatus |
US6842462B1 (en) * | 1998-12-18 | 2005-01-11 | Lucent Technologies Inc. | Wireless access of packet based networks |
US6374102B1 (en) * | 1998-12-31 | 2002-04-16 | At+T Corp. | User proactive call handling |
US6553219B1 (en) * | 1999-04-08 | 2003-04-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobile internet access system and method mapping mobile to internet service provider |
US6556825B1 (en) * | 2000-02-08 | 2003-04-29 | Sharp Laboratories Of America, Inc. | Method and apparatus for automatic adaptation of communications systems to regional spectrum variations |
US7028186B1 (en) * | 2000-02-11 | 2006-04-11 | Nokia, Inc. | Key management methods for wireless LANs |
US6993359B1 (en) * | 2000-04-28 | 2006-01-31 | Cisco Technology, Inc. | Method and apparatus for inter-cell handover in wireless networks using multiple protocols |
US6680923B1 (en) * | 2000-05-23 | 2004-01-20 | Calypso Wireless, Inc. | Communication system and method |
US20020032030A1 (en) * | 2000-08-28 | 2002-03-14 | Berglund Arne Kristian | Communication system |
US7039025B1 (en) * | 2000-09-29 | 2006-05-02 | Siemens Communications, Inc. | System and method for providing general packet radio services in a private wireless network |
US20020045459A1 (en) * | 2000-10-13 | 2002-04-18 | Nec Corporation | Point-to-multipoint wireless access system |
US6895255B1 (en) * | 2000-10-20 | 2005-05-17 | Symbol Technologies, Inc. | Dual mode wireless data communications |
US20020051440A1 (en) * | 2000-10-30 | 2002-05-02 | Mitsubishi Denki Kabushiki Kaisha | Method of establishing a radio link between an access controller and a base station |
US20020066036A1 (en) * | 2000-11-13 | 2002-05-30 | Gowri Makineni | System and method for secure network mobility |
US20020059516A1 (en) * | 2000-11-16 | 2002-05-16 | Esa Turtiainen | Securing Voice over IP traffic |
US20040053623A1 (en) * | 2000-12-29 | 2004-03-18 | Hoff Per Magne | Methods and means related to the maintenance of connections in a gprs network |
US20050101245A1 (en) * | 2001-02-06 | 2005-05-12 | Kalle Ahmavaara | Access system for a cellular network |
US20040068571A1 (en) * | 2001-02-06 | 2004-04-08 | Kalle Ahmavaara | Access system for an access network |
US6675009B1 (en) * | 2001-02-15 | 2004-01-06 | Sprint Communications Company, L.P. | Automated configuration of a wireless communication device |
US20070025366A1 (en) * | 2001-02-21 | 2007-02-01 | Interdigital Technology Corporation | Method and system for a low-overhead mobility management protocol in the internet protocol layer |
US20040009749A1 (en) * | 2001-03-20 | 2004-01-15 | Nitzan Arazi | Wireless private branch exchange(wpbx) and communicating between mobile units and base stations |
US6845095B2 (en) * | 2001-04-27 | 2005-01-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Efficient header handling involving GSM/EDGE radio access networks |
US7009952B1 (en) * | 2001-05-24 | 2006-03-07 | 3Com Corporation | Method and apparatus for seamless mobility with layer two assistance |
US20030007475A1 (en) * | 2001-06-07 | 2003-01-09 | Kabushiki Kaisha Toshiba | Mobile terminal using priority processing for packets that require urgency in communications |
US20040003060A1 (en) * | 2001-07-13 | 2004-01-01 | International Business Machines Corporation | Method and apparatus for network connection registration and selection |
US20030026269A1 (en) * | 2001-07-31 | 2003-02-06 | Paryani Harish P. | System and method for accessing a multi-line gateway using cordless telephony terminals |
US20030031151A1 (en) * | 2001-08-10 | 2003-02-13 | Mukesh Sharma | System and method for secure roaming in wireless local area networks |
US20030043773A1 (en) * | 2001-08-31 | 2003-03-06 | Hyokang Chang | Multilink wireless access scheme for multiband operation in wireless mobile networks |
US20030058816A1 (en) * | 2001-09-24 | 2003-03-27 | Shearer Daniel D. M. | Forwarding communication network and wireless channel allocation method therefor |
US20030087653A1 (en) * | 2001-10-03 | 2003-05-08 | Leung Nikolai K.N. | Method and apparatus for data packet transport in a wireless communication system using an internet protocol |
US6842621B2 (en) * | 2001-12-21 | 2005-01-11 | Motorola, Inc. | Method and apparatus for splitting control and media content from a cellular network connection |
US7200112B2 (en) * | 2002-01-02 | 2007-04-03 | Winphoria Networks, Inc. | Method, system, and apparatus for a mobile station to sense and select a wireless local area network (WLAN) or a wide area mobile wireless network (WWAN) |
US20040025018A1 (en) * | 2002-01-23 | 2004-02-05 | Haas Zygmunt J. | Secure end-to-end communication in mobile ad hoc networks |
US20050053070A1 (en) * | 2002-04-09 | 2005-03-10 | Jarkko Jouppi | Transfer of packet data to wireless terminal |
US20040013099A1 (en) * | 2002-04-15 | 2004-01-22 | O'neill Alan | Method and apparatus for extending mobile IP |
US20040008649A1 (en) * | 2002-07-10 | 2004-01-15 | Samsung Electronics Co., Ltd. | Apparatus and method for recovering communication sessions in a wireless network gateway |
US6850503B2 (en) * | 2002-08-06 | 2005-02-01 | Motorola, Inc. | Method and apparatus for effecting a handoff between two IP connections for time critical communications |
US20040037312A1 (en) * | 2002-08-23 | 2004-02-26 | Spear Stephen L. | Method and communication network for operating a cross coding element |
US20040063451A1 (en) * | 2002-09-27 | 2004-04-01 | Bonta Jeffrey D. | Relaying information within an ad-hoc cellular network |
US20040077374A1 (en) * | 2002-10-10 | 2004-04-22 | Interdigital Technology Corporation | System and method for integrating WLAN and 3G |
US20040072593A1 (en) * | 2002-10-10 | 2004-04-15 | Robbins Barry R. | Extension of a local area phone system to a wide area network |
US20060111113A1 (en) * | 2002-10-17 | 2006-05-25 | Heikki Waris | Virtual private network with mobile nodes |
US20040087307A1 (en) * | 2002-10-18 | 2004-05-06 | Ibe Oliver C. | Method of seamless roaming between wireless local area networks and cellular carrier networks |
US20040077356A1 (en) * | 2002-10-22 | 2004-04-22 | Krenik William R. | Wirelessly-linked, distributed resource control to support wireless communication in non-exclusive spectrum |
US20040077355A1 (en) * | 2002-10-22 | 2004-04-22 | Krenik William R. | Wireless mobile communication stations for operation in non-exclusive spectrum |
US20070054668A1 (en) * | 2002-10-25 | 2007-03-08 | Ibis Telecom, Inc. | Private base station with exclusivity |
US20080051060A1 (en) * | 2003-01-14 | 2008-02-28 | Samsung Electronics Co., Ltd. | Method for fast roaming in a wireless network |
US20060019667A1 (en) * | 2003-06-06 | 2006-01-26 | Hicks John A Iii | System and method for providing integrated voice and data services utilizing wired cordless access with unlicensed spectrum and wired access with licensed spectrum |
US20080117841A1 (en) * | 2003-06-16 | 2008-05-22 | Xiaobao Chen | Telecommunications System And Method |
US20050041787A1 (en) * | 2003-08-19 | 2005-02-24 | Qwest Communications International Inc (Patent Prosecution) | Advanced call screening appliance |
US20050111409A1 (en) * | 2003-11-25 | 2005-05-26 | Spear Stephen L. | Method and apparatus for mobile station registration in a cellular communication system |
US20060036733A1 (en) * | 2004-07-09 | 2006-02-16 | Toshiba America Research, Inc. | Dynamic host configuration and network access authentication |
US20060035645A1 (en) * | 2004-07-26 | 2006-02-16 | Lg Electronics Inc. | Changing serving radio network controller for mobile terminal supporting multimedia broadcast services |
US20060094431A1 (en) * | 2004-11-01 | 2006-05-04 | Nokia Corporation | Method, system and mobile station for handing off communications from a cellular radio access network to an unlicensed mobile access network |
US20080123595A1 (en) * | 2004-12-30 | 2008-05-29 | Christofer Lindheimer | Method And System Of Wireless Communications |
US20070022469A1 (en) * | 2005-07-20 | 2007-01-25 | Cooper Robin R | Network user authentication system and method |
US20090017864A1 (en) * | 2005-08-01 | 2009-01-15 | Peter Keevill | Local area cellular basestation |
US20070053370A1 (en) * | 2005-09-06 | 2007-03-08 | King's College London | Method of providing access to packet-switched services in a heterogeneous network environment |
US20070094374A1 (en) * | 2005-10-03 | 2007-04-26 | Snehal Karia | Enterprise-managed wireless communication |
US20110039566A1 (en) * | 2007-08-27 | 2011-02-17 | Telefonaktiebolaget Lm Ericsson (Publ) | method and a network control node for bandwidth and access control in femto cells of a wireless system |
Cited By (73)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100284369A1 (en) * | 2007-11-23 | 2010-11-11 | Zte Corporation | Optimization method of multiple service flows operation for WiMAX system |
US8254334B2 (en) * | 2007-11-23 | 2012-08-28 | Zte Corporation | Optimization method of multiple service flows operation for WiMAX system |
US9848358B2 (en) | 2008-03-21 | 2017-12-19 | Interdigital Patent Holdings, Inc. | Apparatus to enable fallback to circuit switched domain from packet switched domain |
US8953620B2 (en) * | 2008-07-17 | 2015-02-10 | T-Mobile Usa, Inc. | System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier |
US20100226346A1 (en) * | 2008-07-17 | 2010-09-09 | Caldwell Christopher E | System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier |
US9629032B2 (en) * | 2008-09-09 | 2017-04-18 | Samsung Electronics Co., Ltd | Method for user relocation by home node B |
US20110164591A1 (en) * | 2008-09-09 | 2011-07-07 | Boling Wang | Method for user relocation triggered by home node b gateway |
US8934392B2 (en) * | 2008-09-25 | 2015-01-13 | Samsung Electronics Co., Ltd | Method and system to support multimedia broadcast multicast service over generic access networks |
US20110149834A1 (en) * | 2008-09-25 | 2011-06-23 | Jamadagni Satish Nanjunda Swamy | Method and system to support multimedia broadcast multicast service over generic access networks |
US20150163690A1 (en) * | 2009-06-19 | 2015-06-11 | Interdigital Patent Holdings, Inc. | Method and apparatus for detecting and measuring for home node-bs |
US8634836B2 (en) * | 2009-06-19 | 2014-01-21 | Interdigital Patent Holdings, Inc. | Method and apparatus for detecting and measuring for Home Node-Bs |
US20170265099A1 (en) * | 2009-06-19 | 2017-09-14 | Interdigital Patent Holdings, Inc. | Method and apparatus for detecting and measuring for home node-bs |
US9686707B2 (en) * | 2009-06-19 | 2017-06-20 | Interdigital Patent Holdings, Inc. | Method and apparatus for detecting and measuring for Home Node-Bs |
US8996015B2 (en) * | 2009-06-19 | 2015-03-31 | Interdigital Patent Holdings, Inc. | Method and apparatus for detecting and measuring for Home Node-Bs |
US20140099948A1 (en) * | 2009-06-19 | 2014-04-10 | Interdigital Patent Holdings, Inc. | Method and apparatus for detecting and measuring for home node-bs |
US20100323633A1 (en) * | 2009-06-19 | 2010-12-23 | Interdigital Patent Holdings, Inc. | Method and apparatus for detecting and measuring for home node-bs |
US20120147872A1 (en) * | 2009-08-10 | 2012-06-14 | Samsung Electronics Co., Ltd. | Method and system for remotely accessing |
US9179289B2 (en) * | 2009-08-10 | 2015-11-03 | Samsung Electronics Co., Ltd. | Method and system for remotely accessing |
US20120135701A1 (en) * | 2009-08-17 | 2012-05-31 | Zte Corporation | Method and system for paging an emergency service user |
US8843102B2 (en) * | 2009-08-17 | 2014-09-23 | Zte Corporation | Method and system for paging an emergency service user |
US9338701B2 (en) | 2009-10-30 | 2016-05-10 | Interdigital Patent Holdings, Inc. | Method and apparatus for efficient signaling and usage of resources for wireless communications supporting circuit switched and packet switched sessions |
US9781636B2 (en) | 2009-10-30 | 2017-10-03 | Interdigital Patent Holdings, Inc. | Method and apparatus for efficient signaling and usage of resources for wireless communications supporting circuit switched and packet switched sessions |
US20120207137A1 (en) * | 2009-11-03 | 2012-08-16 | Zte Corporation | Method for Managing Local IP Access Connection |
US8644193B2 (en) | 2009-12-01 | 2014-02-04 | Spidercloud Wireless, Inc. | Method, system and device for configuring topology or a wireless network |
WO2011068804A1 (en) * | 2009-12-01 | 2011-06-09 | Spidercloud Wireless, Inc. | Method, system and device for configuring topology of a wireless network |
US20110130144A1 (en) * | 2009-12-01 | 2011-06-02 | Spidercloud Wireless, Inc. | Handoff in a self-configuring communication system |
US20110128890A1 (en) * | 2009-12-01 | 2011-06-02 | Spidercloud Wireless, Inc. | Method, system and device for configuring topology of a wireless network |
US8606228B2 (en) | 2010-01-22 | 2013-12-10 | Zte Corporation | Method, user network equipment and management system thereof for secure data transmission |
WO2011088662A1 (en) * | 2010-01-22 | 2011-07-28 | 中兴通讯股份有限公司 | Method, user network equipment and management system thereof for secure data transmission |
WO2011136619A3 (en) * | 2010-04-30 | 2012-03-08 | Samsung Electronics Co., Ltd. | Apparatus and method of user equipment relocation |
WO2011136619A2 (en) * | 2010-04-30 | 2011-11-03 | Samsung Electronics Co., Ltd. | Apparatus and method of user equipment relocation |
US8675499B2 (en) | 2010-04-30 | 2014-03-18 | Samsung Electronics Co., Ltd. | Apparatus and method of user equipment relocation |
EP2391155A1 (en) * | 2010-05-27 | 2011-11-30 | Alcatel Lucent | A femtocell base station and method of determining a macrocell location area within which a femtocell base station resides |
US8516556B2 (en) * | 2010-05-28 | 2013-08-20 | Bridgewater Systems Corp. | Methods for server-driven packet congestion control |
US20110296500A1 (en) * | 2010-05-28 | 2011-12-01 | Macnider James | Methods for Server-Driven Packet Congestion Control |
US8934914B2 (en) * | 2010-08-02 | 2015-01-13 | Huawei Technologies Co., Ltd. | Key separation method and device |
US20130143532A1 (en) * | 2010-08-02 | 2013-06-06 | Huawie Technologies Co., Ltd. | Key separation method and device |
US10542421B2 (en) | 2010-10-14 | 2020-01-21 | At&T Intellectual Property I, L.P. | Over-the-air content management of wireless equipment in confined-coverage wireless networks |
US20200137559A1 (en) * | 2010-10-14 | 2020-04-30 | At&T Intellectual Property I, L.P. | Over-the-air content management of wireless equipment in confined-coverage wireless networks |
US10237727B2 (en) | 2010-10-14 | 2019-03-19 | At&T Intellectual Property I, L.P. | Over-the-air content management of wireless equipment in confined-coverage wireless networks |
US20120094643A1 (en) * | 2010-10-14 | 2012-04-19 | At&T Intellectual Property I, L.P. | Over-the-air content management of wireless equipment in confined-coverage wireless networks |
US9913130B2 (en) | 2010-10-14 | 2018-03-06 | At&T Intellectual Property I, L.P. | Over-the-air content management of wireless equipment in confined-coverage wireless networks |
US9020487B2 (en) * | 2010-10-14 | 2015-04-28 | At&T Mobility Ii Llc | Over-the-air content management of wireless equipment in confined-coverage wireless networks |
US10986492B2 (en) | 2010-10-14 | 2021-04-20 | At&T Intellectual Property I, L.P. | Over-the-air content management of wireless equipment in confined-coverage wireless networks |
US9703863B2 (en) | 2011-01-26 | 2017-07-11 | DiscoverReady LLC | Document classification and characterization |
US8396871B2 (en) | 2011-01-26 | 2013-03-12 | DiscoverReady LLC | Document classification and characterization |
US10467252B1 (en) | 2012-01-30 | 2019-11-05 | DiscoverReady LLC | Document classification and characterization using human judgment, tiered similarity analysis and language/concept analysis |
US9667514B1 (en) | 2012-01-30 | 2017-05-30 | DiscoverReady LLC | Electronic discovery system with statistical sampling |
US10045245B2 (en) | 2012-04-27 | 2018-08-07 | Intel Corporation | Discontinuous reception (DRX) enhancements in LTE systems |
US9332456B2 (en) | 2012-09-28 | 2016-05-03 | Intel Corporation | Discontinuous reception (DRX) enhancements in LTE systems |
US9374806B2 (en) | 2012-09-28 | 2016-06-21 | Intel Corporation | Dynamic hybrid automatic repeat request-acknowledgement (HARQ-ACK) transmission with enhanced physical downlink control channels |
US9609602B2 (en) | 2012-09-28 | 2017-03-28 | Intel Corporation | Always-on bearer for small data transfers in LTE systems |
US9603132B2 (en) | 2012-09-28 | 2017-03-21 | Intel Corporation | Dynamic hybrid automatic repeat request-acknowledgement (HARQ-ACK) transmission with enhanced physical downlink control channels |
US10264482B2 (en) | 2012-09-28 | 2019-04-16 | Intel Corporation | Enhanced node B configured for user plane EPS optimization |
US9591581B2 (en) | 2012-09-28 | 2017-03-07 | Intel Corporation | RSRP mobility state estimation for cellular device |
WO2014052850A1 (en) * | 2012-09-28 | 2014-04-03 | Alexander Sirotkin | Os level wlan/cellular aggregation for integrated femto and ap deployments |
US11638170B2 (en) | 2012-09-28 | 2023-04-25 | Apple Inc. | Discontinuous reception (DRX) enhancements in LTE systems |
US11979768B2 (en) | 2012-09-28 | 2024-05-07 | Apple Inc. | Discontinuous reception (DRX) enhancements in LTE systems |
US10631190B2 (en) | 2012-09-28 | 2020-04-21 | Apple Inc. | Discontinuous reception (DRX) enhancements in LTE systems |
US9918353B2 (en) | 2013-02-19 | 2018-03-13 | Zte Corporation | 802.1X access session keepalive method, device, and system |
US10992709B2 (en) * | 2015-07-28 | 2021-04-27 | Citrix Systems, Inc. | Efficient use of IPsec tunnels in multi-path environment |
US20190166484A1 (en) * | 2016-08-10 | 2019-05-30 | Reliance Jio Infocomm Limited | A system and methods for availing services in an international roaming by using proactive commands |
US10484862B2 (en) * | 2016-08-10 | 2019-11-19 | Reliance Jio Infocomm Limited | System and methods for availing services in an international roaming by using proactive commands |
CN106102074A (en) * | 2016-08-11 | 2016-11-09 | 山东奥联信息科技有限公司 | Express highway all-way is wireless WIFI covering system |
US10511724B2 (en) | 2016-11-01 | 2019-12-17 | At&T Intellectual Property I, L.P. | Method and apparatus for adaptive charging and performance in a software defined network |
US11102131B2 (en) | 2016-11-01 | 2021-08-24 | At&T Intellectual Property I, L.P. | Method and apparatus for dynamically adapting a software defined network |
US10819629B2 (en) | 2016-11-15 | 2020-10-27 | At&T Intellectual Property I, L.P. | Method and apparatus for dynamic network routing in a software defined network |
US10659535B2 (en) | 2017-02-27 | 2020-05-19 | At&T Intellectual Property I, L.P. | Methods, systems, and devices for multiplexing service information from sensor data |
US10944829B2 (en) | 2017-02-27 | 2021-03-09 | At&T Intellectual Property I, L.P. | Methods, systems, and devices for multiplexing service information from sensor data |
US10469286B2 (en) * | 2017-03-06 | 2019-11-05 | At&T Intellectual Property I, L.P. | Methods, systems, and devices for managing client devices using a virtual anchor manager |
US11012260B2 (en) | 2017-03-06 | 2021-05-18 | At&T Intellectual Property I, L.P. | Methods, systems, and devices for managing client devices using a virtual anchor manager |
US10887470B2 (en) | 2017-04-27 | 2021-01-05 | At&T Intellectual Property I, L.P. | Method and apparatus for managing resources in a software defined network |
US10659619B2 (en) | 2017-04-27 | 2020-05-19 | At&T Intellectual Property I, L.P. | Method and apparatus for managing resources in a software defined network |
Also Published As
Publication number | Publication date |
---|---|
US20090262684A1 (en) | 2009-10-22 |
US20090264126A1 (en) | 2009-10-22 |
US20090262683A1 (en) | 2009-10-22 |
WO2009129516A1 (en) | 2009-10-22 |
US20090262704A1 (en) | 2009-10-22 |
US20090262682A1 (en) | 2009-10-22 |
US8041335B2 (en) | 2011-10-18 |
EP2272261A1 (en) | 2011-01-12 |
US20090264095A1 (en) | 2009-10-22 |
US20090265543A1 (en) | 2009-10-22 |
US20090262702A1 (en) | 2009-10-22 |
US20090262703A1 (en) | 2009-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8041335B2 (en) | Method and apparatus for routing of emergency services for unauthorized user equipment in a home Node B system | |
US8150397B2 (en) | Method and apparatus for establishing transport channels for a femtocell | |
US7995994B2 (en) | Method and apparatus for preventing theft of service in a communication system | |
US8204502B2 (en) | Method and apparatus for user equipment registration | |
US8073428B2 (en) | Method and apparatus for securing communication between an access point and a network controller | |
US8036664B2 (en) | Method and apparatus for determining rove-out | |
US20080076419A1 (en) | Method and apparatus for discovery | |
US20080076412A1 (en) | Method and apparatus for registering an access point | |
US20080076392A1 (en) | Method and apparatus for securing a wireless air interface | |
US7852817B2 (en) | Generic access to the Iu interface | |
US8005076B2 (en) | Method and apparatus for activating transport channels in a packet switched communication system | |
US7912004B2 (en) | Generic access to the Iu interface | |
US20100041403A1 (en) | Method and Apparatus for Management of UTRAN Radio Network Temporary Identifiers (U-RNTIs) over the Iuh Interface | |
WO2008036961A2 (en) | Method and apparatus for resource management | |
CN101543107A (en) | Method and apparatus for resource management | |
WO2011127224A1 (en) | System and method for supporting access control in hnb and hnb-gw for legacy and csg user equipments | |
WO2010104992A1 (en) | Network triggered ue rigistration on iuh interface |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: KINETO WIRELESS, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KHETAWAT, AMIT;TAO, PATRICK;GALLAGHER, MICHAEL D.;AND OTHERS;REEL/FRAME:022946/0835;SIGNING DATES FROM 20090625 TO 20090701 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |