System and method for creating and managing private subnetworks of lte base stations

ABSTRACT

Disclosed is a system and methods for creating and maintaining a virtual subnetwork of telecommunication base stations within a wider telecommunication network. In an LTE-based example, the subnetwork includes a connection aggregator that is coupled between the plurality of eNodeBs internal to the subnetwork and one or more MMEs in the outer network. The connection aggregator intercepts all control plane messages between the MMEs and the internal eNodeBs, remaps eNodeB identifiers, and transmits repackaged messages so that the outer network sees the entire subnetwork as a single “giant” eNodeB. The disclosed system and methods enables the operator of the virtual subnetwork to add and shut down eNodeBs as demand for connectivity fluctuates, and to do so such that all changes are unseen by the outer network.

This application is a non-provisional application which claims thebenefit of U.S. Provisional Application No. 62/721,963 filed Aug. 23,2018, which is hereby incorporated by reference in its entirety for allpurposes as if fully set forth herein.

BACKGROUND OF THE INVENTION Field of the Invention

The present invention relates to wireless communications base stations,and more particularly, to a system and method for creating privatesubnetworks of LTE base stations for use in large venues and urbansettings.

Related Art

In the current state of development for LTE, anyone deploying a basestation (eNodeB), whether a network operator, neutral host, etc., makesthat eNodeB available to the greater mobile network, including allinformation related to the capabilities of the eNodeB. In many cases,the entity may deploy a plurality of eNodeBs as a local network. This istypically done in a large venue, such as a stadium, airport, universitycampus, etc. In this case, the capabilities of each deployed eNodeB areknown to the greater mobile network.

A disadvantage of the current state is that there is currently no wayfor anyone deploying a network of eNodeBs to reconfigure or redesign thenetwork without it impacting the entire network. There is currently noway for someone to deploy an LTE subnetwork in such a way that the innerworkings of the subnetwork are hidden from the greater network.

A further disadvantage of the current state is as follows. A giveneNodeB is identified by a 20 bit identifier (eNB ID). Each eNodeB cansupport up to 256 cells, each of which is identified by a global cellidentifier (E-CGI) that appends the 20 bit eNB ID with a unique 8 bitpattern. Although each eNodeB may, in theory, support 256 cells, this isbasically impossible due to computing constraints. In practice, eacheNodeB typically supports a maximum of approximately twelve cells. Thisnot only limits the potential usefulness of a given eNodeB, but it alsoleads to inefficient use of E-CGI address space.

Accordingly, there is a need for a system and method for creating andmaintaining an LTE private subnetwork whereby the subnetwork is seen bythe greater network as a single eNodeB, in which the complexities of thesubnetwork are hidden from the greater network, and in which thesubnetwork may be redesigned, and/or dynamically reconfigured as needed,in a way that is transparent to the greater network, and in which theeNodeB may make full use of the capability of servicing as many as 256cells.

SUMMARY OF THE INVENTION

An aspect of the present invention involves a telecommunication system,which comprises a plurality of internal baseband processors, and aconnection aggregator coupled to the plurality of internal basebandprocessors, wherein the connection aggregator maintains a plurality ofinternal identifiers, each corresponding to one of plurality of internalbaseband processors. The connection aggregator is configured tointercept an outbound message from an internal baseband processor,replace the internal baseband procesor's internal identifier within theoutbound message with a virtual subnetwork baseband processoridentifier, and transmit the modified outbound message. The connectionaggregator is further configured to intercept an inbound message to adestination internal baseband processor, replace the virtual subnetworkbaseband processor identifier within the inbound message with adestination internal identifier to create a modified inbound message,and transmit the modified inbound message to the destination internalbaseband processor.

Another aspect of the present invention involves a method forconfiguring a telecommunication subnetwork. The method comprisesintercepting a plurality of PWS restart indication messages, each of theplurality of PWS restart messages coming from an internal eNodeB;extracting an internal eNodeB identifier and one or more cell IDs fromeach intercepted PWS restart indication message; assigning each internaleNodeB identifier and corresponding one or more cell IDs to a memory;and transmitting a subnetwork PWS restart indication message. Thesubnetwork PWS restart indication message includes a virtual subnetworkbaseband processor identifier and the one or more cell IDs from theplurality of PWS restart indication messages.

Another aspect of the present invention involves a method forconfiguring a telecommunication subnetwork. The method comprisesintercepting a plurality of initiation messages from a correspondingplurality of internal baseband processors, wherein each initiationmessage includes an internal identifier and at least one cell ID foreach cell corresponding to the internal baseband processor; extractingthe internal identifier and the at least one cell ID from eachinitiation message; storing each internal identifier and each at leastone cell ID in a memory; generating a virtual subnetwork basebandprocessor identifier; and transmitting a subnetwork initiation message,wherein the subnetwork initiation message includes the virtualsubnetwork baseband processor identifier and each one or more cell IDs.

Another aspect of the present invention involves a method forestablishing a connection between a source internal baseband processorand a target internal baseband processor within a telecommunicationsubnetwork. The method comprises generating a source internal basebandprocessor identifier; generating a target internal baseband processoridentifier; generating a source configuration transfer message, thesource configuration transfer message including the source internalbaseband processor identifier and the target internal baseband processoridentifier; transmitting the source configuration transfer message to amobility management entity; intercepting the source configurationtransfer message to the mobility management entity; extracting thesource internal baseband processor identifier and the target internalbaseband identifier from the source configuration transfer message;generating a target configuration transfer message, the targetconfiguration transfer message including the source internal basebandprocessor identifier and the target internal baseband processoridentifier; and transmitting the target configuration transfer messageto the target internal baseband processor.

Another aspect of the present invention involves a method for handingover a UE's call from an internal eNodeB within a telecommunicationsubnetwork to an external eNodeB. The method comprises sending aHandover Required message, the Handover Required message including aninternal eNodeB identifier and a target eNodeB identifier; interceptingthe Handover Required message; replacing the internal eNodeB identifierwith a virtual subnetwork eNodeB identifier to generate a subnetworkHandover Required message; transmitting the subnetwork Handover Requiredmessage to an MME; receiving a Handover Command from the MME; replacingthe virtual subnetwork eNodeB identifier with the internal eNodeBidentifier to generate a subnetwork Handover Command message; andtransmitting the subnetwork Handover Command message to the internaleNodeB for transmission to the UE.

Another aspect of the present invention involves a method forreconfiguring a telecommunication subnetwork. The method comprisesassessing demand for connectivity within the telecommunicationsubnetwork; identifying a low-activity internal baseband processor;handing off one or more UE connections from the low-activity internalbaseband processor to one or more neighboring internal basebandprocessors; shutting down the low-activity internal baseband processor;and removing an internal eNodeB identifier and at least one cell IDcorresponding to the low-activity internal baseband processor from amemory corresponding to active internal baseband processors.

Another aspect of the present invention involves a method forreconfiguring a telecommunication subnetwork. The method comprisesassessing demand for connectivity within the telecommunicationsubnetwork; identifying one or more high-demand internal basebandprocessors; instantiating a virtual internal baseband processor;assigning to the virtual internal baseband processor one or more cells;handing off UE connections from the one or more high-demand basebandprocessors to the virtual baseband processor; sending an initiationmessage, the initiation message including an internal identifier and oneor more cell IDs corresponding to the virtual baseband processor;intercepting the intiation message; and retrieving from the intiationmessage and storing the internal identifier and the one or more cellIDs.

Another aspect of the present invention involves a method fordetermining a location of an event within a venue. The method comprisesintercepting a first plurality of call establishment messages, each callestablishment message coming from one of a plurality of UEs; determiningif each call establishment message within the first plurality of callestablishment messages corresponds to a voice call; determining a secondplurality of call establishment messages, wherein each of the secondplurality of call establishment messages corresponds to a voice call;retrieving a call establishment message time corresponding to each ofthe second plurality of call establishment messages; retrieving aninternal baseband processor identifier from each of the second pluralityof call establishment message; and identifying a cluster of callestablishment messages within the second plurality of call establishmentmessages, wherein the cluster of call establishment messages correspondto a single eNodeB and wherein the call establishment time correspondingto each of the cluster of call establishment messages occur within anarrow window of time.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an exemplary private subnetwork of LTE base stationsaccording to the disclosure.

FIG. 2 illustrates an exemplary process for configuring a privatesubnetwork of LTE base stations according to the disclosure.

FIG. 3 illustrates an exemplary process by which a UE establishesconnection with an eNodeB internal to the private subnetwork.

FIG. 4 illustrates an exemplary process for establishing an X2connection between two eNodeBs within the private subnetwork accordingto the disclosure.

FIG. 5 illustrates an exemplary process for executing an X2 handoverbetween two eNodeBs that are internal to the private subnetwork.

FIG. 6 illustrates an exemplary process for executing an S1 handoverbetween an eNodeB internal to the private subnetwork to an eNodeB thatis external to the private subnetwork.

FIG. 7 illustrates an exemplary process for reconfiguring the privatesubnetwork based on an increase or decrease in traffic demand.

FIG. 8 illustrates an exemplary process by which the private subnetworkinteracts with a positioning system, such as that implemented accordingto the LTE Positioning Protocol annex (LPPa).

FIG. 9 illustrates an exemplary process by which the private subnetworkmay identify patterns of call establishment messages to identifypossible emergencies and notify venue security personnel.

DESCRIPTION OF EXEMPLARY EMBODIMENTS

FIG. 1 illustrates an exemplary private subnetwork of LTE base stations(hereinafter subnetwork 100) according to the disclosure. Subnetwork 100comprises a connection aggregator (hereinafter S1-Conn 110); anoperation and maintenance module 120; a plurality of internal basebandprocessors (or internal eNodeBs 125), each of which has a correspondingsupervisor module 130, and each of which has one or more correspondingcells 135. Each internal eNodeB 125 is coupled to the S1-Conn 110 by arespective internal S1 connection 140, which is a standard S1 connectionas would be implemented between a conventional eNodeB and a conventionalMME (Mobility Management Entity) as defined in the LTE specification.Each supervisor module 130 may be coupled to the operation andmaintenance module 120 by a conventional IP connection 145.

S1-Conn 110 may be coupled to one or more MMEs 150 via a correspondingexternal S1 connection 155. Each external S1 connection 155 may beidentical to each internal S1 connection 140 in that they each arestandard S1 connections as defined in the LTE specification.

Also illustrated in FIG. 1 is an external eNodeB 160 having at least onecorresponding cell 165. External eNodeB 160 may be coupled to one ormore of the illustrated MMEs 150 via an S1 connection 170. Furtherillustrated is a UE 170, which may be in communication with one or morecells 135/165.

Subnetwork 100 may be deployed or integrated in, for example, a denseurban environment or a large venue, such as a stadium, airport, shoppingcenter, university campus, etc. Each internal eNodeB 125 may correspondto macro cell, a small cell, femto cell, or a Distributed Antenna System(DAS). Each internal eNodeB 125 may have any number of cells 135.

Each individual internal eNodeB 125 may be individually implemented as apure software-based virtual baseband processor that may be instantiatedand de-instantiated as needed, or each may be individually implementedas a hardware-based baseband processor that is deployed in dedicatedhardware in close proximity to its corresponding RF and antennacomponents, or any combination of the above. Although an LTE-specificterm is used to refer to a given eNodeB 125, it may actually beimplemented according to a different or legacy RAT technology, as longas it communicates with S1-Conn 110 via an S1 interface. As used herein,the terms baseband processor and eNodeB may be interchangeable.

S1-Conn 110 and operation and maintenance module 120 (and potentiallyone or more of the internal eNodeBs 125) may be implemented in softwarethat runs in a conventional server hardware that may be located in asingle location (e.g., one or more racks) within or near the venue wheresubnetwork 100 is deployed, or otherwise distributed. There may be anadvantage to having the internal eNodeBs 125 pure software-based virtualbaseband processors in that they can make the best advantage of theability of the subnetwork 100 to dynamically instantiate andde-instantiate internal eNodeBs 125 as traffic demand within the venuefluctuates. Further, having each internal eNodeB 125 implemented purelyin software enables each internal eNodeB 125 to be instrumented withcode to enable interaction with its corresponding supervisor module 130and easier configuration and maintenance from operation and maintenancemodule 120. However, it will be understood that hardware-based internaleNodeBs 125 may be activated/de-activated in place ofinstantiation/de-instantiation of a virtual internal eNodeB 125.

FIG. 2 illustrates an exemplary process for configuring a subnetwork 100according to the disclosure.

In step 205, S1-Conn 110 establishes an S1 interface with each of theMMEs 150. In doing so, S1-Conn 110 issues an S1 SETUP REQUEST message toeach of the MMEs 150, which includes its own 20 bit eNB ID (the virtualsubnetwork baseband processor identifier) and all of the E-CGIscorresponding to each of the constituent cells of all of the internaleNodeBs 125. In response, each MME 150 may send a subsequent S1 SETUPRESPONSE message to S1-Conn 110, thereby establishing an external S1Connection 155 between the S1-Conn 110 and each MME 150.

In step 210, each internal eNodeB 125 starts up according to its nominalfunction. Each internal eNodeB 125 has the same 20 bit identifier, and anumber of allocated 8 bit subidentifiers for each possible cell 135 thatmight correspond to that particular internal eNodeB 125. Thisinformation may be stored in a configuration file within each internaleNodeB 125 and may be supplied by its corresponding supervisor module130. Alternatively, configuration information for each internal eNodeB125 may be stored in a distributed data source. Examples of suchdistributed data sources may include systems like consul and etcd. Giventhat all of the internal eNodeBs 125 have the same 20 bit identifier, inorder to uniquely identify each internal eNodeB 125, each one may selecta 8 bit cell identifier of one of its cells 135 (for example, its firstcell 135) and append it to its own 20 bit identifier, making it a 28 biteNodeB identifier. The internal identifier may be the same as that usedconventionally with Home eNodeBs (HeNB). This internal 28 bit eNodeBidentifier may be referred to herein as an “internal identifier”.

Once it has started up, in step 215, each internal eNodeB 125 sets up anS1 connection with S1-Conn 110, using its individual internal 28 biteNodeB identifier. An example of how the internal eNodeB 125 mayestablish an S1 connection with an MME 150 is described in 3GPP TS36.413. In doing so, the given internal eNodeB 125 functions as if it isestablishing an S1 connection with each MME 150. However, S1-Conn 110intercepts each S1 SETUP REQUEST from each internal eNodeB. S1-Conn 110uses this information to establish an S1 interface with each internaleNodeB 125 and subsequently generates and issues an S1 SETUP RESPONSEmessage to each of the internal eNodeBs 125. In doing so, each of theinternal eNodeBs 125 “thinks” that it has established an S1 interfacewith a single MME that has a lot of capabilities (actually thecollective capabilities of the MMEs 150), but what it has actually doneis establish an internal S1 connection 140 with the S1-Conn 110.

In step 220, each internal eNodeB 125 sends an initiation message thatwould otherwise indicate to one or more MMEs 150 that it is functioning.This initiation message would include its own identity and the cellidentities of its corresponding cells 135. In an exemplary embodiment ofprocess 200, each internal eNodeB 125 sends a PWSRestartIndicationmessage, which is intercepted by S1-Conn 110. The PWSRestartIndicationmessage, an example of which is described in 3GPP TS 36.413, includesthe following information: the E-CGI (Enhanced Cell Global ID) of eachcell corresponding to the sending internal eNodeB 125, the Global eNB IDfor the sending internal eNodeB 125 (which is its aforementionedinternal 28 bit eNodeB identifier), the TAI (Tracking Area Identifier)list for the internal eNodeB ‘s 125 corresponding cells, and theEmergency Area ID list for the internal eNodeB’ s 125 correspondingcells.

It will be understood that the described functions performed by eachinternal eNodeB 125 may correspond to a sequence of computerinstructions stored on a machine readable memory allocated to orassociated with each corresponding internal eNodeB 125, and executedeither by a dedicated processor embedded within corresponding eNodeB 125or by a server processor or virtual machine spawned in a cloud computingenvironment running on server hardware located within the venue ofsubnetwork 100 or elsewhere. The same is true for the S1-Conn 110 andthe operation and maintenance module 120. These components may comprisecomputer instructions that may be stored in non-volatile memory andexecuted on server compute hardware that may be located in, near, ordistributed around the venue corresponding to subnetwork 100. Each ofthese components may be implemented in C, C++, Java, one or morescripting languages, or any combination thereof, depending on the givensubcomponent within each of these components.

In step 225, S1-Conn 110 intercepts each PWSRestartIndication messagefrom each internal eNodeB 125, and in step 230, creates a mapping of thefollowing for each internal eNodeB 125: its internal 28 bit eNodeBidentifier, its constituent cell IDs (E-CGIs), and the rest of theinformation provided in its corresponding PWSRestartIndication message.Further to step 230, S1-Conn 110 assigns itself the 20 bit eNodeB IDcommon to all of the internal eNodeBs 125, extracts the constituentcells IDs (E-CGIs) and further information gathered from eachcorresponding PWSRestartIndication message and populates thisinformation in a new “repackaged” PWSRestartIndication Message. The 20bit eNodeB ID assigned to the S1-Conn 110 may be referred to as avirtual subnetwork baseband processor identifier.

In step 235, S1-Conn 110 sends its own PWSRestartIndication messageassembled in step 225 to each corresponding MME 150 via its respectiveexternal S1 connection 155.

Accordingly, each MME 150 will behave as though it is interacting with asingle “giant” eNodeB with a potentially large number of aggregatedcells 135 (potentially as many as 256 cells), even though each MME 150is interacting exclusively with S1-Conn 110. Further, each internaleNodeB 125 will behave as though it is interacting with any of MMEs 150,even though it is interacting exclusively with S1-Conn 110. In order toaccomplish this, S1-Conn 110 intercepts each subsequent message,bidirectionally, between a given MME 150 and an internal eNodeB 125, andalso between the MME 150 a given UE 170. S1-Conn 110 remaps the cell IDsand other required information using—for example—look up tables storedin memory allocated to S1-Conn 110, repackages the given message withthe re-mapped information, and sends the repackaged message to itsdestination. For the purposes herein, the internal eNodeB 125 that isthe destination of the incoming message from a given MME 150 may bereferred to as a message destination baseband processor.

Advantages of this include the following. First, any given (non-Home)eNodeB has a 20 bit identifier and may have allocated to it as many as256 cells, given that the cell ID for each eNodeB is an 8 bitidentifier. However, given the practical limitations in computationalpower, any given eNodeB typically has no more than a dozen cells. Thedisclosed subnetwork 100 enables a given eNodeB (in this case, theS-Conn 110 acting like a “giant” eNodeB) to make use of all 8 bits ofcell IDs. This is because each internal eNodeB 125 has allocated to it(either in dedicated hardware or provisioned cloud computing resources)sufficient memory and computational resources to handle a typical numberof cells commonly used.

Second, given that the external network (e.g., from the MMEs 150outward) is only aware of a single “giant” eNodeB encompassed by thefunctions of S1-Conn 110, the number of internal eNodeBs 125 (andsubsequent number of cells 135) may be dynamically adjusted according totraffic demand. This may be extremely useful for venues, such asstadiums, that may be filled to capacity one day a week and quiet therest of the time. In this case, internal eNodeBs 125, each with aplurality of corresponding cells 135, may be created and allocated tohandle changes in traffic demand, such that all of these changes arehidden to the outer network.

It will be understood that the described functions performed by theS-Conn 110 is further describing a sequence of computer instructionsstored on a machine readable memory allocated to or associated with theS1-Conn 110, and executed either by a dedicated processor or by a serverprocessor or virtual machine spawned in a cloud computing environmentrunning on server hardware located within the venue of subnetwork 100 orelsewhere.

FIG. 3 illustrates an exemplary process 300 by which a UE 170establishes connection with an internal eNodeB 125.

In step 305, the UE 170 and the given internal eNodeB 125 exchangeappropriate conventional signals to establish a connection. For example,UE 170 may transmit an RRC Connection Request to the internal eNodeB125, which may in turn respond with an RRC Connection Setup message,etc. The result is that UE 170 is connected to internal eNodeB 125 andthat internal eNodeB 125 has established an internal identifiercorresponding to that UE.

In subprocess 310, internal eNodeB 125 establishes a default bearer withan MME 150 via S1-Conn 110. As illustrated in FIG. 3, subprocess 310comprises several steps that are added to the default bearerestablishment procedures specified in 3GPP TS 24.301, for example. steps315, 320, and 325 describe modifications/enhancements to theconventional procedures described in the 3GPP technical specifications.

In step 315, S1-Conn 110 intercepts the default bearer establishmentmessages sent by internal eNodeB 125, which includes a UE ID generatedby the internal eNodeB 125.

In step 320, the S1-Conn replaces the UE ID (generated by the internaleNodeB 125) and replaces it with a unique UE ID generated by the S1-Conn110. This is necessary because each of the internal eNodeBs 125 generateUE IDs without any awareness of the UE IDs generated by any of the otherinternal eNodeBs 125. There is a significant chance of two eNodeBs 125generating duplicate UE IDs. Given this possibility, S1-Conn replacesthe UE ID generated by the internal eNodeB 125 with a unique value,repackages the message, and transmits the message to the appropriate MME150.

In step 325, S1-Conn 110 intercepts default bearer establishmentmessages from the MME 150 to the internal eNodeB 125, remaps the UE ID,and transmits the repackaged message to the internal eNodeB 125.

The objective is that the given internal eNodeB 125 is not aware that itis not interacting directly with MME 150, and that the MME 150 is notaware that it is not interacting directly with internal eNodeB 125. Inthe former case, S1-Conn 110 is acting as the MME 150 for the internaleNodeB 125, and in the latter case, S1-Conn 110 is acting as the eNodeBthat interacts with the MME 150 (and the UE 170).

In subprocess 330, internal eNodeB 125 establishes a dedicated bearerwith an MME 150 via S1-Conn 110. As illustrated in FIG. 3, subprocess330 comprises several steps that are added to the default bearerestablishment procedures specified in 3GPP TS 24.301. The steps requiredfor establishing a dedicated bearer may be substantially identical tosteps 320 and 325 described above. The result is that there is at leastone dedicated bearer established between UE 170 and MME 150, wherebyS1-Conn 110 is serving as an unseen intermediary between internal eNodeB120 and MME 150.

FIG. 4 illustrates an exemplary process 400 for establishing an X2connection between two internal eNodeBs 125.

In step 405, UE 170 communicates with its currently connected sourceinternal eNodeB 125 that it has a strong signal from another internaleNodeB 125. UE 170 does so by transmitting a measurement report to thesource internal eNodeB 125, which identifies neighboring internaleNodeBs 125 and cell 135 from which UE 170 is receiving a strong signal.Step 405 may be a conventional process, an example of which is describedin 3GPP TS 36.300. From this information UE 170 identifies andrecommends a target internal eNodeB 125 for handover.

In step 410, the source internal eNodeB 125 retrieves its own internal28 bit identifier from internal memory. Recalling from step 210, eachinternal eNodeB has as a default the same 20 bit eNodeB identifier. Inorder to prevent collisions within subnetwork 100, each internaleNodeB's supervisor module 120 instructs its respective internal eNodeB125 to select the 8 bit identifier of one of its cells (e.g., the firstcell) and append its own 20 bit identifier with the 8 bit identifier ofits cell, creating a false Home eNodeB (HeNB) internal identifier foritself, referred to herein as an internal eNodeB identifier. Further tostep 410, the source internal eNodeB 125 retrieves the E-CGI for thetarget cell identified by the UE (via the measurement report) and usesthat 28 bit cell identifier corresponding to the target eNodeB.

In step 415, the source internal eNodeB 125 sends aneNBConfigurationTransfer command, which is conventionally sent to one ofthe MMEs 150. In the eNBConfigurationTransfer command, the sourceinternal eNodeB 125 is identifying itself with its internal eNodeBidentifier and the internal eNodeB identifier for the target internaleNodeB identifier.

In step 420, S1-Conn 110 intercepts the eNBConfigurationTransfertransmitted in step 415. In step 425, S1-Conn 110 extracts the internaleNodeB identifier of the source internal eNodeB 125 and the internaleNodeB identifier of the target internal eNodeB 125 (as well as otherinformation in the eNBConfigurationTransfer command) and constructs anMMEConfigurationTransfer command with this information. And in step 430,S1-Conn sends the MMEConfigurationTransfer command to the targetinternal eNodeB 125.

With the configuration transfer complete, source internal eNodeB 125 andtarget eNodeB 125 may establish an X2 connection between them. Inperforming the steps of process 400, S1-Conn 110 is acting as the MME150 such that neither source internal eNodeB 125 nor target eNodeB 125is aware that they were not communicating directly with MME 150.Further, MME 150 was not at any point involved in the process. This isbecause MME 150 sees the S1-Conn 110 as a “giant” eNodeB and thus therewould be no X2 connection, given only one eNodeB.

FIG. 5 illustrates an exemplary process 500 for executing an X2 handoverbetween two internal eNodeB s 125.

In step 505, the UE 170 identifies a target cell 135 and target internaleNodeB 125 and notifies the source internal eNodeB 125, to which the UE170 is currently connected. This process may be substantially similar tostep 405 of process 400.

In step 510, the source internal eNodeB 125 forwards any data packets(downlink and potentially uplink) corresponding to UE 170 to targetinternal eNodeB 125 over the X2 connection that was established inprocess 400.

In step 515, the target internal eNodeB 125 sends a Path Switch Requestmessage to the relevant MME 150. The Path Switch Request includes theTAI (Tracking Area Identity) of the target cell 135 of the targetinternal eNodeB 125 as well as the target cell's E-CGI. S1-Conn 110relays this message to the relevant MME 150.

In step 520, target internal eNodeB 125 sends a Release Resource messageto the source internal eNodeB 125 over their mutual X2 connection, thuscompleting the handover process of a UE 170 between two internal eNodeBs125 within subnetwork 100 in a way that is hidden from the outernetwork.

FIG. 6 illustrates an exemplary process 600 for executing an S1 handoverbetween an internal eNodeB 125 to an external eNodeB 160. This is forthe situation in which UE 170 is moving out of range of the internaleNodeBs 125 of subnetwork 100. The steps of process 600 may beincorporated into the S1-based handover process.

In step 605, the UE 170 identifies a target cell 165 and target externaleNodeB 160 and notifies the source internal eNodeB 125, to which the UE170 is currently connected. This process may be substantially similar tostep 405 of process 400 and step 505 of process 500.

In step 610, the source internal eNodeB 125 sends a Handover Requiredmessage to the relevant MME 150. In doing so, source internal eNodeB 125uses its internal eNodeB identifier in the message.

In step 615, S1-Conn 110 intercepts the Handover Required message andrepackages the message with its own 20 bit virtual subnetwork basebandprocessor identifier and the E-CGI of the cell currently connecting UE170 with source internal eNodeB 125, and sends the message to therelevant MME 150.

In step 620, MME 150 sends a Handover Command to S1-Conn 110. It will beunderstood that MME 150 behaves as though it were interacting with aconventional eNodeB.

In step 625, S1-Conn 110 receives the Handover Command from MME 150 andre-maps the eNB ID to the internal eNodeB identifier of the sourceinternal eNodeB 125, and sends the repackaged Handover Command to thesource internal eNodeB 125. Subsequently, in step 630, source internaleNodeB 125 sends the Handover Command to UE 170.

If any of the E-RABs (Evolved Radio Access Bearers) corresponding to UE170 are configured for PDCP (Packet Data Convergence Protocol)preservation, the source internal eNodeB 125 may send an eNB StatusTransfer message to the relevant MME 150. S1-Conn 110 may intercept thismessage, remap the information in the message to specify the virtualsubnetwork baseband processor identifier, repackage the message, andtransmit it to the relevant MME 150 (the source MME).

In step 635, the source MME 150 sends a UE Context Release Command tothe S1-Conn 110. In step 640, the S1-Conn 110 in turn remaps the eNB IDto the internal eNodeB identifier of the source internal eNodeB 125 andtransmits the message to the source internal eNodeB 125.

In step 645, the source internal eNodeB 125 sends a UE Context ReleaseComplete message to the source MME 150.

In step 650, the S1-Conn 110 intercepts the UE Context Release Completemessage, remaps the information to reflect the virtual subnetworkbaseband processor identifier, repackages the message, and transmits itto the source MME 150.

It will be understood that there are many steps to the conventionalprocess of an S1-based handover, as described in 3GPP TS 23.401, thatoccur (for example) between steps 615 and 620, and between steps 620 and635. These steps occur in the outer network (e.g., between MMEs 150,S-GW and P-GW (not shown) and external eNodeB 160. It is understood thatthese external steps are known and fully described in the referenced3GPP documentation.

Accordingly, to the outer network, the S1-based handoff disclosed inprocess 600 involves a handoff between the “giant” eNodeB represented byS1-Conn 110 and external eNodeB 160. The inner workings of subnetwork100 are hidden from the outer network.

FIG. 7 illustrates an exemplary process 700 for reconfiguring subnetwork100 based on an increase or decrease in traffic demand. This enables thesubnetwork 100 to expand and contract based on demand while hiding thechanges to the subnetwork from the outer network.

In step 705, the operation and maintenance module 120 may, inconjunction with the S1-Conn 110, make an assessment of current trafficusage and demand. This may involve analyzing historical usage data aswell as extrapolating near future demand. For example, if subnetwork 100is deployed in a stadium, operation and maintenance module 120 may havestored in accessible memory a calendar of upcoming events so that it cananticipate periods of high and low demands. For deployments such as in adense urban setting, operation and maintenance module 120 may haveaccumulated historical data on demand based on time of day, day of week,holidays, and days with special events. Given this, operation andmaintenance module 120 may be able to perform appropriate analytics toestimate current and near future demand, and take action accordingly toprovide for the provisioning of cloud-based computing capacity forvirtual internal eNodeBs 125, or to power up/down hardware-basedinternal eNodeBs 125.

Additionally, the virtual eNodeBs 125 may employ 3GPP-specifiedmechanisms for assessing (i.e., determining) demand, including setting aconfigurable threshold(s), and comparing actual demand to saidthreshold(s). The eNodeBs 125 can then send the results of thecomparisions to the operation and maintenance module 120. The operationand maintanenace module 120 can then further determine whether demandhas dropped below a low threshold (e.g., 5% of configured maximumcapacity) or whether demand has gone above a high threshold (e.g., 95%of configured maximum capacity). Alternatively, each of the eNodeBs canmake the above described further determinations and send an alarmsignal, or the like, to the operation and maintenance module 120 ifeither of the thresholds has been exceeded. This mechanism may use thestandard PM-Stat files (Performance Measurement) that are generatedevery 15 minutes and transmitted to the core network via a northboundinterface (not shown) that is also specified by 3GPP. It will beunderstood that such variations are possible and within the scope of thedisclosure.

Depending on the result of the assessing done in step 705, process 700may either take no action (not shown in FIG. 7); it may take subprocesspath 701, in which operation and maintenance module 120 may increase thecapacity of subnetwork 100 by adding one or more internal eNodeBs 125;or it may take subprocess path 702, in which operation and maintenancemodule 120 may reduce capacity by removing one or more internal eNodeBs125.

Regarding subpath 701, if in the assessing in step 705 the operation andmaintenance module 120 determines that additional capacity is required,operation and maintenance module 120 may proceed to step 710 and executeinstructions to identify where within subnetwork 100 one or moreadditional internal eNodeBs 125 are needed. This may include determiningthe location of the internal eNodeBs 125 with the greatest demand anddetermining the availability of remote radio unit and antenna hardwarein the vicinity, for example.

In step 715, operation and maintenance module 120 executes instructionsto bring up one or more new internal eNodeBs 125. In doing so, operationand maintenance module 120 may execute instructions to have local serverhardware instantiate one or more software-based virtual basebandprocessors, and/or to power up one or more dormant hardware-based basestations.

In step 720, operation and maintenance module 120 may issue instructionsto S1-Conn 110 to command the currently-running high-demand internaleNodeBs 125 to handoff UE connections to the recently-introduced newinternal eNodeBs 125. This may be alternatively done whereby theoperation and maintenance module 120 may issue instructions to theappropriate supervisor modules 130, via IP connection 145, to have thecorresponding internal eNodeBs 125 execute UE connection handoffs.

With the new eNodeBs 125 up and running, it is necessary to update theidentifier mapping information within S1-Conn 110. Accordingly, in step725, the newly online internal eNodeBs 125 may each issue aPWSRestartIndication message (or similar initiation message), indicatingits internal eNodeB identifier and constituent cell IDs.

In step 730, S1-Conn 110 intercepts the one or more PWSRestartIndicationmessages, one from each newly online internal eNodeB 125, extracts theinternal eNodeB identifier and corresponding cell IDs, and adds thisinformation to the pre-existing mapping that S1-Conn 110 stores in itsmemory.

In step 735, S1-Conn may issue its own PWSRestartIndication to one ormore MMEs 150, similarly to step 235 in process 200. In this case, theouter network is not aware of the addition of new internal eNodeBs 125.Instead, it is only aware of a single “giant” eNodeB that has one ormore additional cells.

Regarding subpath 702, if in the assessing in step 705 the operation andmaintenance module 120 determined that subnetwork 100 has excesscapacity, operation and maintenance module 120 may proceed to step 750and execute instructions to identify where within subnetwork 100 one ormore additional internal eNodeBs 125 are to be shut down. This mayinclude determining the location of the internal eNodeBs 125 withinsufficient demand and the internal identifiers of neighboring eNodeBs125 that might be available for handoff.

In step 755, operation and maintenance module 120 may executeinstructions to command the internal eNodeBs 125 designated for shutdownto handoff UE connections to neighboring eNodeBs that are otherwisecapable of servicing these UEs 170. As with step 720, this may happenone or more ways: whereby operation and maintenance module 120 issuesinstructions to S1-Conn 110 to command the handoffs, or operation andmaintenance module 120 issues instructions to the relevant supervisormodules 130 to implement the handoffs. It will be understood that suchvariations are possible and within the scope of the disclosure.

In step 760, operation and maintenance module 120 may shutdown theinternal eNodeBs 125 designated in step 750. In the case ofsoftware-based virtual internal eNodeBs 125, this may involveterminating the corresponding virtual machine running on thesubnetwork's server hardware. Alternatively (or additionally) this mayinvolve powering down appropriate hardware-based base stations.Operation and maintenance module 120 may do this by issuing commands tothe relevant supervisor modules 130.

In step 765, S1-Conn 110 executes instructions to remove the terminatedinternal eNodeB identifiers and corresponding cell IDs from its memory.Subprocess 702 then proceeds to step 735. In step 735, S1-Conn 110issues a new PWSRestartIndication with the revised list of Cell IDs(minus the Cell IDs corresponding to the terminated internal eNodeBs125).

The ability of the S1-Conn 110 to intercept, re-map information within,repackage, and transmit messages between the internal eNodeBs 125 andthe MMEs 150 enables other capabilities. For example, S1-Conn 110 mayidentify patterns in messages from the internal eNodeBs and deriveposition information from one or more of the UEs 170 connected to them.

FIG. 8 illustrates two exemplary processe 800 by which S1-Conn 110handles position-related information in accordance with the LTEPositioning Protocol Annex (LPPa) between an E-SMLC (Evolved ServingMobile Location Center) 801 and an internal eNodeB 125 and a UE 170,respectively. The E-SMLC 801 may be coupled to subnetwork 100 via one ofthe MMEs 150. The connection between MME 150 and E-SMLC 801 may be overan SLs interface, as specified in 3GPP TS 23.271. Details regarding LPPamay be found in 3GPP TS 36.455.

Through process 800, the E-SMLC 801 interacts with eNodeB in accordancewith LPPa procedures, with the exception of the intervention of theS1-Conn 110, which as described above, makes the E-SMLC function asthough it is interacting with a single “giant” eNodeB that is actuallythe S1-Conn 110 acting as a proxy for the internal eNodeBs 125 withinsubnetwork 100.

In step 805, E-SMLC 801 issues a request/command to the eNodeB emulatedby S1-Conn 110. In this case, the E-SMLC 801 is not aware of theinternal eNodeBs 125 of subnetwork 100, and only interacts with theS1-Conn 110. The request/command may include, for example, E-CID(Enhanced Cell ID) MEASUREMENT INITIATION REQUEST, E-CID MEASUREMENTTERMINATION COMMAND, OTDOA (Observed Time Difference of Arrival)INFORMATION REQUEST, etc. Note that in these interactions, S1-Conn 110will report a predetermined location that may or may not be the actuallocation of the instantiation of S1-Conn 110. For example, if subnetwork100 is deployed in a venue such as a stadium or an airport, the positionreported by S1-Conn 100 may be the location of the venue's securityoffice, or its main entrance, etc. Alternatively, S1-Conn 110 may returna list of locations, one for each cell 135 within subnetwork 100.

In step 810, S1-Conn 110 receives and processes the request/command, andin step 820, the S1-Conn 110 packages a response and transmits it to theE-SMLC 801.

FIG. 9 illustrates an exemplary process 900 by which S1-Conn 110 mayselectively intercept requests from multiple UEs 170 connecting to oneor more eNodeBs 125 of subnetwork 100 and take actions to intervene andnotify relevant people/entities related to the venue of anomalousbehavior among connected or connecting UEs 170.

In step 905, a plurality of UEs 170 issue messages to initiate a call,either by VoIP or CS fallback to a 3G/2G cell (not shown). These callsmay be initiated via one internal eNodeB 125, or two or more neighboringinternal eNodeBs 125.

In step 910, S1-Conn 110 intercepts the call initiation messages. In thecase of VoIP, the S1-Conn 110 retrieves the QCI (QoS Class Identifier)from each message. If the QCI is equal to 1, the bearer to beestablished is identified as corresponding to a voice call.Alternatively, if the QCI is equal to 5, then the message corresponds toIMS (IP Multimedia Subsystem) signaling used to establish and release aVoIP connection. As with any message, S1-Conn 110 remaps the eNodeB cellID with its virtual subnetwork baseband processor identifier, repackagesthe message, and transmits it to the intended MME 150. With eachrecognized VoIP call initiation, S1-Conn 110 may execute instructions tolog relevant information corresponding to the call initiation (e.g., UEidentifier, internal eNodeB identifier, 28 bit cell identifier (ECGI),S-TMSI (SAE-Temporary Mobile Subscriber Identity), time of receipt ofmessage, etc.).

In step 915, S1-Conn 110 stores information related to callestablishment events in step 910. Further to step 915, S1-Conn 110 mayexecute instructions to identify patterns, including history of callpatterns, as a function of time. If, in the course of executing theseinstructions, S1-Conn 110 might identify an anomaly in callestablishment, such as a sudden surge in call establishment messagesfrom UEs 170 connected to a given internal cell 135, or multipleadjacent cells 135 of a single eNodeB 125, or an isolated instance ofnumerous UEs 170 within a single cell 135 simultaneously initiatingcalls. As used herein, simultaneously may imply events within a singlenarrow time window, such as within 1 second, 5 seconds, etc., at thelocation(s) corresponding to the antenna(s) of relevant cell(s) 135. Inthis case, S1-Conn 110 may store a plurality of identifiers, eachcorresponding to a UE 170 identified within the cluster.

In step 920, the S1-Conn 110 may command the relevant internal eNodeBs125 to provide the most recent Timing Advance values corresponding toeach UE identified in step 915. Subsequently, in step 925, the relevantinternal eNodeBs 125 may provide the requested Timing Advanceinformation corresponding to each UE 170 identified in step 915.

In step 930, once the S1-Conn 110 has received these values, it mayexecute instructions to determine if the Timing Advance values aresufficiently clustered to indicate whether the call establishmentprocedures executed by the relevant UEs may be in response to an eventin their common location. It will be understood that, in doing so,S1-Conn 110 may execute instructions corresponding to one or more knownclustering algorithms. If the clustering calculated in step 920indicates a possible event, S1-Conn 110 may transmit instructions toneighboring internal eNodeBs 125 to determine Timing Advance values foreach of the relevant UEs 170 and provide them to the S1-Conn 110.S1-Conn 110 may then determine the position of the cluster of UEs 170based on triangulation.

In step 935, if S1-Conn 110 identifies a clustering of Timing Advancevalues for the relevant UEs 170 (regardless of whether it executesinstructions to determine a cluster position via triangulation), S1-Conn110 may execute instructions to send a message to a predetermined entitywithin the venue of subnetwork 100. An example of a predetermined entitymay include a customer office, such as a security office.

What is claimed is:
 1. A telecommunications system, comprising: aplurality of internal baseband processors; and a connection aggregatoroperatively coupled to the plurality of internal baseband processors,wherein the connection aggregator maintains a plurality of internalidentifiers, each corresponding to one of the plurality of internalbaseband processors, and wherein the connection aggregator is configuredto intercept an outbound message from an internal baseband processorwhich is one of the plurality of internal baseband processors, replacethe internal baseband processor's internal identifier within theoutbound message with a virtual subnetwork baseband processoridentifier, and transmit the modified outbound message, and wherein theconnection aggregator is configured to intercept an inbound message to adestination internal baseband processor which is one of the plurality ofinternal baseband processors, replace the virtual subnetwork basebandprocessor identifier within the inbound message with the destinationinternal baseband processor's internal identifier to create a modifiedinbound message, and transmit the modified inbound message to thedestination internal baseband processor.
 2. The telecommunication systemof claim 1, wherein the connection aggregator is further configured to:intercept an outbound message from a second internal baseband processorwhich is one of the plurality of internal baseband processors, replacethe second internal baseband processor's internal identifier within theoutbound message with the virtual subnetwork baseband processoridentifier, and transmit the modified outbound message, and intercept aninbound message to a second destination internal baseband processorwhich is one of the plurality of internal baseband processors, replacethe virtual subnetwork baseband processor identifier within the inboundmessage with the second destination internal baseband processor'sinternal identifier to create a modified inbound message, and transmitthe modified inbound message to the second destination internal basebandprocessor.
 3. The telecommunication system of claim 2, wherein theconnection aggregator is further configured to transmit the modifiedoutbound message from the internal baseband processor and the modifiedoutbound message from the second internal baseband processor, both ofwhich include the virtual subnetwork baseband processor identifier, to amobility management entity (MME), and wherein the connection aggregatoris further configured to receive the inbound message for the destinationinternal baseband processor and the inbound message for the seconddestination internal baseband processor, both of which include thevirtual subnetwork baseband processor identifier, from an MME.
 4. Thetelecommunication system of claim 1, wherein each of the plurality ofinternal baseband processors comprises an internal eNodeB.
 5. Thetelecommunication system of claim 4, wherein the internal eNodeBcomprises a virtual eNodeB.
 6. The telecommunication system of claim 5,wherein the virtual eNodeB comprises a supervisor module.
 7. Thetelecommunication system of claim 6, further comprising an operationsand maintenance module that is coupled to each of the supervisormodules.
 8. The telecommunication system of claim 4, wherein eachinternal identifier comprises a 28 bit internal eNodeB identifier. 9.The telecommunication system of claim 8, wherein the 28 bit internaleNodeB identifier corresponds to a 28 bit cell identity of a cell of theinternal eNodeB.
 10. The telecommunication system of claim 8, whereinthe virtual subnetwork baseband processor identifier comprises 20 bits,wherein the 20 bits are the same as a first 20 bits of the 28 bitinternal eNodeB identifier.
 11. A method for configuring atelecommunication subnetwork, comprising: intercepting a plurality ofmessages, each of the plurality of messages coming from a correspondingone of a plurality of internal baseband processors in the subnetwork;extracting an internal baseband processor identifier and one or morecell IDs from each intercepted message; assigning each internal basebandprocessor identifier and corresponding one or more cell IDs to a memory;and transmitting a subnetwork message, wherein the subnetwork messagecorresponds to the plurality of intercepted messages, and wherein thesubnetwork message includes a virtual subnetwork baseband processoridentifier and the one or more cell IDs from the plurality ofintercepted messages.
 12. The method of claim 11, wherein each of theplurality of messages is a Public Warning System (PWS) restartindication message.
 13. The method of claim 11, wherein each of theplurality of messages is an initiation message.
 14. The method of claim11 further comprising: generating the virtual subnetwork basebandprocessor identifier that is included in the subnetwork message.
 15. Amethod for establishing a connection between a source internal basebandprocessor and a target internal baseband processor within atelecommunication subnetwork, comprising: generating a source internalbaseband processor identifier; generating a target internal basebandprocessor identifier; generating a source configuration transfermessage, the source configuration transfer message including the sourceinternal baseband processor identifier and the target internal basebandprocessor identifier; transmitting the source configuration transfermessage to a mobility management entity; intercepting the sourceconfiguration transfer message to the mobility management entity;extracting the source internal baseband processor identifier and thetarget internal baseband identifier from the source configurationtransfer message; generating a target configuration transfer message,the target configuration transfer message including the source internalbaseband processor identifier and the target internal baseband processoridentifier; and transmitting the target configuration transfer messageto the target internal baseband processor.
 16. The method of claim 15,wherein the source configuration transfer message comprises an eNBConfiguration Transfer message.
 17. The method of claim 15, wherein thetarget configuration transfer message comprises an MIME ConfigurationTransfer message.
 18. The method of claim 15, wherein the generating asource internal baseband processor identifier comprises generating a 28bit internal identifier, wherein the 28 bit internal identifiercomprises a 20 bit eNodeB identifier and an 8 bit identifier of a cellcorresponding to the source internal baseband processor.
 19. The methodof claim 15, wherein the generating a target internal baseband processoridentifier comprises retrieving a 28 bit cell identifier from ameasurement report.
 20. A method for handing over a UE's call from aninternal eNodeB within a telecommunication subnetwork to an externaleNodeB, comprising: sending a Handover Required message, the HandoverRequired message including an internal eNodeB identifier and a targeteNodeB identifier; intercepting the Handover Required message; replacingthe internal eNodeB identifier with a virtual subnetwork eNodeBidentifier to generate a subnetwork Handover Required message;transmitting the subnetwork Handover Required message to an MME;receiving a Handover Command from the MIME; replacing the virtualsubnetwork eNodeB identifier with the internal eNodeB identifier togenerate a subnetwork Handover Command message; and transmitting thesubnetwork Handover Command message to the internal eNodeB fortransmission to the UE.
 21. The method of claim 20, further comprising:receiving a UE Context Release Command message from the MME; replacingthe virtual subnetwork eNodeB identifier with the internal eNodeBidentifier to generate a subnetwork UE Context Release Command message;and transmitting the subnetwork UE Context Release Command message tothe internal eNodeB.
 22. A method for reconfiguring a telecommunicationsubnetwork, comprising: assessing demand for connectivity within thetelecommunication subnetwork; identifying a low-activity internalbaseband processor based on a result of assessing demand forconnectivity within the telecommunication subnetwork; handing off one ormore UE connections from the low-activity internal baseband processor toone or more neighboring internal baseband processors; shutting down thelow-activity internal baseband processor; and removing an internaleNodeB identifier and at least one cell ID corresponding to thelow-activity internal baseband processor from a memory corresponding toactive internal baseband processors.
 23. The method of claim 22, whereinassessing demand for connectivity within the telecommunicationsubnetwork comprises: comparing demand for an internal basebandprocessor to a preconfigured threshold value that reflects alow-activity condition.
 24. The method of claim 23, wherein thethreshold value that reflects a low-activity condition is based on apercentage of maximum capacity.
 25. A method for reconfiguring atelecommunication subnetwork, comprising: assessing demand forconnectivity within the telecommunication subnetwork; identifying one ormore high-demand internal baseband processors based on a result ofassessing demand for connectivity within the telecommunicationsubnetwork; instantiating a virtual internal baseband processor;assigning to the virtual internal baseband processor one or more cells;handing off UE connections from the one or more high-demand basebandprocessors to the virtual baseband processor; sending an initiationmessage, the initiation message including an internal identifier and oneor more cell IDs corresponding to the virtual baseband processor;intercepting the initiation message; and retrieving from the initiationmessage and storing the internal identifier and the one or more cellIDs.
 26. The method of claim 25, wherein assessing demand forconnectivity within the telecommunication subnetwork comprises:comparing demand for an internal baseband processor to a preconfiguredthreshold value that reflects a high-demand condition.
 27. The method ofclaim 26, wherein the threshold value that reflects a high-demandcondition is based on a percentage of maximum capacity.