Mobility in a wireless enterprise network

ABSTRACT

A method for configuring a network is described, the method comprising: receiving, from a first radio node in the network, network information associated with one or more second radio nodes in the network; generating a network relation table, the network relation table comprising network information associated with the first radio node and the one or more second radio nodes; and performing a handoff to a third radio node in the network using the network relation table.

CLAIM OF PRIORITY

This application is a continuation of and claims priority under 35U.S.C. §120 to U.S. application Ser. No. 12/797,138, filed on Jun. 9,2010, to be issued on Feb. 26, 2013 as U.S. Pat. No. 8,385,291, which inturn claims priority under 35 U.S.C. §119(e) to provisional U.S. PatentApplication No. 61/185,757, filed on Jun. 10, 2009, the entire contentsof each of which are hereby incorporated by reference.

BACKGROUND

3G (“third generation”) networks are widely deployed networks thatprovide users with a wide range of wireless services including wirelessvoice telephone, video calls, and broadband wireless data. Examples of3G technologies include code division multiple access (“CDMA”) 2000,Wideband Code Division Multiple Access (WCDMA), High Speed Packet Access(HSPA) and Evolution-Data Optimized (“EVDO”), which was originallyreferred to as High Data Rate (“HDR”). CDMA and EVDO refer to the same3G technology but represent various evolutions of the 3G technology.WCDMA and HSPA refer to the same 3G technology but represent variousevolutions of the 3G technology.

The CDMA standard is used for high-speed data-only services. CDMA hasbeen standardized by the Telecommunication Industry Association (“TIA”)as TIA/EIA/IS-856 (see “CDMA2000 High Rate Packet Data Air InterfaceSpecification,” 3GPP2 C.S0024-0, Version 4.0, Oct. 25, 2002, which isincorporated herein by reference. Revision A to this specification hasbeen published as TIA/EIA/IS-856, “CDMA2000 High Rate Packet Data AirInterface Specification,” 3GPP2 C.S0024-A, Version 2.0, June 2005, andis also incorporated herein by reference).

The Universal Mobile Telecommunications Standard (UMTS) is used for bothvoice and high-speed data services. UMTS is a globally applicable set oftechnical specifications and technical reports for a 3G mobile systemsupporting UTRA Frequency Division Duplex (FDD) and Time Division Duplex(TDD), Global System for Mobile Communication (GSM) including GeneralPacket Radio Service (GPRS), Enhanced Data Rates for GSM Evolution(EGDE) and Long Term Evolution (LTE). The UMTS standards are publishedand maintained by 3GPP which is also incorporated herein by reference.

The EVDO standard is used for the wireless transmission of data throughradio signals, using multiplexing techniques including CDMA to maximizeboth individual user's throughput and the overall system throughput.EVDO was designed as an evolution of the CDMA 2000 standard that wouldsupport high data rates and could be deployed alongside a wirelesscarrier's voice services. Initially, the EVDO standard was named HighData Rate (HDR), but was renamed to EVDO after the standard was ratifiedby the International Telecommunication Union (“ITU”). (See P. Bender, etal., “CDMA/HDR: A Bandwidth-Efficient High-Speed Wireless Data Servicefor Nomadic Users,” IEEE Communications Magazine, July 2000; and ThirdGeneration Partnership Project 2 (“3GPP2”), “Draft Baseline Text for1xEV-DO,” Aug. 21, 2000).

Advances in telecommunications technology have brought forth a newlydeveloped class of technologies referred to as 4G (“fourth generation”).Examples of 4G technology include Long-Term Evolution (“LTE”) andWorldwide Interoperability for Microwave Access (“WiMAX”)telecommunications technologies. Generally, 3G networks, such as EVDO,have wide deployment. 4G networks, such as WiMAX and LTE, are deployedin a limited area (concentrated in larger cities, for example) and oftenhave limited coverage area.

In telecommunications, the term handover or “handoff” refers to theprocess of transferring an ongoing call or data session from one radionode connected to a core network, for example using 3G or 4G technology,to another radio node. Generally, a “hard handoff” is one in which acommunication with a radio node in a source cell is released and thenthe communication in a target cell is engaged. Thus, the connection tothe source cell is broken before the connection to the target cell isestablished. A “soft handoff” is one in which the communications in thesource cell are retained and are used in parallel with communications inthe target cell. In a soft handoff, the connection to the target cell isestablished before the connection to the source cell is broken. A softhandoff may involve using connections to more than two cells, e.g.,connections to three, four or more cells can be maintained by onehandset at the same time.

Home base-stations, which are also referred to as “femto cells,” may bedeployed in residences, in public hot-spot areas and in enterprises,e.g., company buildings or campuses, to provide wireless coverage using3G and 4G technologies. With public hot-spot and enterprise deployments,femto cells are deployed as a connection of radio nodes that allow ahandset to maintain a call while travelling through the physical domainof the enterprise. In order to maintain the call in current systems, anengineer or technician selects cell sites, puts up towers, designatesone cell as a central controller, and configures the central controllerto control mobility from one cell to another. Based on this manualconfiguration, as the handset transitions from one node to another, thecall is maintained using one or more soft handovers.

The description uses the following acronyms:

-   -   HNB—Home Node B (e.g., a home base station)    -   CSG—Closed Subscriber Group    -   CSG Id—CSG Identifier, which includes a numerical identifier        (“Id”). A CSG HNB advertises a CSG Id so that handsets with        membership at the HNB can access the CSG. A HNB broadcasts its        CSG Id in the broadcast channel.    -   UPnP—Universal Plug and Play    -   PnP—Plug and play    -   HNB-GW—HNB Gateway. A gateway that provides core network        connectivity for HNBs.    -   REM—Radio Environment Monitoring. A HNB performs REM scans to        discover its neighbors.    -   SIB—System Information Blocks. SIBs are broadcast by a HNB on        the broadcast channel and include control information for the        handsets.    -   UUID—Universally Unique Id. UPnP devices are uniquely identified        by a UUID.    -   UE—User Equipment, e.g., a handset.    -   PSC—Primary Scrambling Code. A physical identity on the HNB,        which may be reused by geographically distant/separated HNBs.    -   UDP—User Datagram Protocol. A transport layer protocol for use        with an internet protocol (“IP”) protocol suite.    -   RNC Id—Radio Network Control Id. A unique numerical Id of the        HNB-GW within a network.    -   SCTP—Stream Control Transmission Protocol. A transport layer        protocol for use with the IP protocol suite.    -   Cell Identity—A unique numerical identity for the HNB within the        network.

SUMMARY

Described herein is an enterprise network configuration that enablesgraduated, scalable, and flexible deployment of femto cells, by allowinga radio node to be a controller either temporarily or permanently, e.g.,when it is serving a handset. The enterprise network enablesdecentralized handover processes, and may do so without a designatedcentralized controller responsible for managing handovers. Alsodescribed are methods by which the enterprise network auto-configuresitself, e.g., through a self-discovery process, and implementshandovers.

In one aspect of the present disclosure, a method for configuring anetwork, comprises: receiving, from a first radio node in the network,network information associated with one or more second radio nodes inthe network; generating a network relation table, the network relationtable comprising network information associated with the first radionode and the one or more second radio nodes; and performing a handoff toa third radio node in the network using the network relation table.

Implementations of the disclosure may include one or more of thefollowing features. In some implementations, the third radio nodecomprises one of (i) the first radio node; or (ii) the one or moresecond radio nodes. The method further comprises sending, to the firstradio node, a request for network information associated with the one ormore second radio nodes in the network.

In other implementations, the network relation table comprises a routingtable. The method also comprises receiving, from the first radio nodethrough a radio interface, information identifying the first radio nodeas being in the network. The method additionally comprises using anetwork protocol to identify the first radio node as being in thenetwork.

In still other implementations, the handoff comprises one of a softhandoff or a hard handoff, the handoff is executed through a directcommunication link within the network, and the handoff is initiatedfollowing a detection, by the first radio node, of one or more of (i) aneed to load balance the network, (ii) a need to maintain interferenceand power limits within the network, and (iii) one or more measurementreports received from a handset. The method also comprises automaticallyorganizing one or more operational parameters based on informationreceived about the third radio node in the network.

In another aspect of the disclosure, one or more machine-readable mediaare configured to store instructions that are executable by one or moreprocessing devices to perform functions comprising: receiving, from afirst radio node in the network, network information associated with oneor more second radio nodes in the network; generating a network relationtable, the network relation table comprising network informationassociated with the first radio node and the one or more second radionodes; and performing a handoff to a third radio node in the networkusing the network relation table. Implementations of this aspect of thepresent disclosure can include one or more of the foregoing features.

In still another aspect of the disclosure, a system for configuring anetwork comprises a first radio device, in the network, configured toreceive signals from a second radio device, in the network, and totransmit signals to the second radio device, the first radio devicebeing configured to: receive, from a second radio node in the network,network information associated with one or more third radio nodes in thenetwork; generate a network relation table, the network relation tablecomprising network information associated with the second radio node andthe one or more third radio nodes; and perform a handoff to a fourthradio node in the network using the network relation table.Implementations of this aspect of the present disclosure can include oneor more of the foregoing features.

Advantages of particular implementations include one or more of thefollowing. Femto cells may be deployed within an enterprise network inan ad-hoc, scalable manner, without manual configuration, e.g., by anengineer or a technician, and optionally with or without a designatedcentral controller. As the enterprise network grows, each node in theenterprise network learns of the other nodes in the enterprise networkthrough an auto-configuration process.

DESCRIPTION OF DRAWINGS

FIG. 1 is a block diagram of a communications network.

FIG. 2 is a flow chart of processes used by the communications network.

FIG. 3 is a block diagram of an enterprise network.

FIG. 4 is a diagram of a network relation table.

FIGS. 5A-5D are diagrams of a handover process.

DETAILED DESCRIPTION

Referring to FIG. 1, a communication network 10 includes radio nodes 12,14, 16, 18, 20, 22 (HNB [a-f]) in wireless communication with a gateway24 (HNB-GW). A radio node 12, 14, 16, 18, 20, 22 may also be referred toas a “home base station,” a “base station,” or a “home node B.” Radionodes 12, 14, 16 (HNB [a-c]) belong to an enterprise network 26, whileradio nodes 18, 20, 22 (HNB [e-f]) are private residential nodes, e.g.,in different houses. Depending on the number of radio nodes in theenterprise network 26 and the configuration of the radio nodes in theenterprise network 26, the enterprise network may have a meshconfiguration, a star configuration, or any combination thereof. Thoughan interface (e.g., an Iuh interface, a 3GPP interface, a standardizedinterface, a proprietary interface, and so forth), the network 10establishes communication links 28, 30, 32, 34, 36, 38 between thegateway and the radio nodes 12, 14, 16, 18, 20, 22. The enterprisenetwork 26 uses an interface (e.g., an Iux interface, a standardizedinterface, a proprietary interface, and so forth) to establish links 40,42, 44 between the radio nodes 12, 14, 16 (HNB [a-c]).

Radio nodes 12, 14, 16 (HNB [a-c]) are assigned a group identifier,e.g., a CSG-Id, to identify the network associated with the radio nodes12, 14, 16. Radio nodes 12, 14, 16 belonging to the same enterprisenetwork (e.g., enterprise network 26) are assigned the same CSG-Id.

The enterprise network 26 is configured by a discovery process (e.g., anautonomous recognition process) performed both in the radio domain andin the network domain. Through the discovery process, a control pointradio node (i.e., a radio node that is servicing a handset) identifiesnetwork information (e.g., routing information, CSG-Id information, PSCinformation, and so forth) associated with its “neighboring radionodes,” radio nodes that are within the radio range, and/or the networkrange of the control point radio node. The control point radio node alsoidentifies network information associated with its “neighbors' neighborsradio nodes,” radio nodes that are within the radio range, and/or thenetwork range of the neighboring radio nodes. Based on the discoverednetwork information, the control point radio nodes generates and updatesa network relation table (“NRT”), e.g., a table that includes networkinformation for the radio nodes (e.g., neighboring radio nodes andneighbors' neighbors radio nodes) of an enterprise network.

Referring to FIG. 2, a control point radio node (e.g., radio nodes 12,14, 16) generates (50) a NRT as follows. The control point radio nodesearches (51) the radio domain and the network domain for neighboringradio nodes, as discussed in further detail below. The control pointradio node receives (52) messages including group identifier informationfor the neighboring radio nodes. The control point radio node determines(53) the neighboring radio nodes belonging to the same enterprisenetwork by comparing the group identifier of the neighboring radio nodesto the group identifier of the control point radio node. The controlpoint radio node updates (54) its NRT with network information for theneighboring radio nodes in the same enterprise network. The controlpoint radio node discovers (55) its neighbors' neighbors radio nodes byreceiving the NRTs of the neighboring radio nodes (“neighboring NRTs”)in the same enterprise network. The neighboring NRTs include networkinformation for the neighbors' neighbors radio nodes, as discussed infurther detail below. The control point radio node updates (56) its NRTwith the network information of its neighbors' neighbors radio nodes.

Referring to FIG. 2, a radio node searches (51) for neighboring radionodes in the radio domain and in the network domain, as follows. In theradio domain, a radio node uses a radio interface to “broadcast” itsgroup identifier to other radio nodes. A radio node that broadcasts itsgroup identifier is referred to as a “broadcast radio node.” A radionode may broadcast its group identifier through a broadcast message. Acontrol point radio node receives (52) (e.g., by intercepting) thebroadcast messages to determine the broadcast radio nodes belonging tothe same network as the control point radio node.

In one particular embodiment, a control point radio node performs REMscans, e.g., when the control point radio node turns on and/orperiodically thereafter, to intercept broadcast messages (e.g., SIB#3messages) of the broadcast radio notes. The broadcast messages include agroup identifier (e.g., CSG-Id) of the broadcast radio nodes. Bycomparing the group identifier of the broadcast radio nodes to the groupidentifier of the control point radio node, the control point radio nodeidentifies (53) neighboring radio nodes that belong to the sameenterprise network as the control point radio node. When the controlpoint radio node identifies a broadcast radio node that belongs to thesame enterprise network, i.e., the CSG-Id of the broadcast radio nodematches the CSG-Id of the control point radio node, the control pointradio node records the identity and network information of the broadcastradio nodes in its NRT, as described in further detail below.

In some embodiments, a control point radio node instructs a handset tosearch for neighboring radio nodes by sending a message (i.e., aninformation request message) using a network protocol to the other radionodes in the enterprise network. The message is broadcast to the radionodes in the enterprise network. The message includes networkinformation of the control point radio node. A radio node, receiving themessage, compares its group identifier to the group identifier includedin the message. If the radio node determines that the group identifiersmatch, the radio node sends the control point radio node a responsemessage indicating that the radio node belongs to the same enterprisenetwork as the control point radio node.

In the network domain, a control point radio node searches (51) forneighboring radio nodes by sending “request messages” (e.g., through useof a Simple Service Discovery Protocol (“SSDP”), UPnP discovery process,and so forth) to radio nodes within the network range of the controlpoint radio node. Because the address (e.g., the Transport Network Layeraddress) of the other radio nodes is unknown to the control point radionode, the search is a “multicast” search in which requests for networkinformation are simultaneously sent to multiple nodes in the network.Through the search, the control point radio node receives (52) theunique identifiers of other radio nodes (“discovered radio nodes”) anddevices on the network side. The unique identifier may be in the form ofan UUID. An example of the UUID format is included in Table 1 below.

TABLE 1 Byte Format: [4 bytes]-[4 bytes]-[2 bytes]-[2 bytes]-[2 byte]-[1byte]- [1 byte] Content Format: [Cell Identity]-[CSG Id]-[RNC-Id]-[SCTPport]-[PSC]- [version]-[reserved] Example:123A324D-67AFB34C-2001-25A0-0072-01-00

The UUID includes network information (e.g., Cell Identity information,CSG-Id information, RNC-Id information, maximum load and current loadinformation, interference and power related information and so forth)that is used by the control point radio node in updating its NRT, asdescribed in further detail below. For example, the UUID includes a“CSG-Id” field, which is used by the control point radio node toidentify (53) neighboring radio nodes associated with the same CSG-Id asthe control point radio node. The UUID also includes a “SCTP port”field, which indicates the port through which the control point radionode may establish a connection with a discovered radio node.

Additionally, through the search, the control point radio node receives(52) “discovery messages” (e.g., UDP messages) from the discovered radionodes. The discovery messages include a uniform resource location(“URL”), from which the control point radio node may retrieve adescription of the discovered radio node, and an IP address of thediscovered radio node. The IP address of the discovered radio node isused by the control point radio node in communicating with thediscovered radio node and is stored in the NRT of the control pointradio node. For example, using the IP address of the neighboring radionodes, the control point radio node requests the NRTs of the neighboringradio nodes, as described in further detail below.

Referring back to FIG. 2, control point radio node updates (54) its NRTwith network information (e.g., information included in the UUID and thediscovery messages) for its neighboring radio nodes. An example NRT isshown below in Table 2.

TABLE 2 Cell Identity PSC CSG-Id IP address SCTP port 123456 4 123104/24 7001 234567 3 123 102/24 7001 345678 6 123 103/24 7001

A NRT includes cell identity information, PSC information, CSG-Idinformation, IP address information and SCTP port information. The cellidentity includes an identifier of a radio node that was discovered fromradio scanning (e.g., REM) and also from a UUID received from thenetwork through the discovery process. CSG-Id designates a group, e.g.,enterprise, to which a radio node belongs. PSC designates a physicalidentity of a radio node. The IP address field includes a radio node'sIP address. The SCTP port field includes a number that defines acommunications port of a radio node. A radio node stores its NRT andupdates its NRT, for example, during a scheduled and/or “periodic” REMscan or when another neighboring radio node is discovered.

Still referring back to FIG. 2, the control point radio node discovers(55) its neighbors' neighbors by receiving the NRTs of its neighboringradio nodes (i.e., neighboring NRTs). Through the network informationincluded in the neighboring NRTs, the control point radio node “sees”(i.e., identifies) other radio nodes that are not otherwise “visible”(e.g., are outside the radio range and/or the network range) to thecontrol point radio node. The control point radio node builds 56 acomprehensive mapping of the radio nodes belonging to the sameenterprise network as the control point radio node by adding (56) theneighboring NRTs to the NRT of the control point radio node.

In one particular embodiment, radio node 12 (FIG. 1) is a control pointradio node. Through radio and/or network searching, radio node 12discovers radio node 14 and receives the UUID of radio node 14. Usingthe SCTP-port information included in the UUID of radio node 14, radionode 12 establishes a SCTP connection with radio node 14. Based on theinformation included in the UUID of radio node 14 and the discoverymessages received from radio node 14, radio node 12 updates its NRT withthe network information associated with radio node 14. Radio node 14also updates its NRT with the network information associated with radionode 12.

Through the connection, radio node 12 and radio node 14 exchange NRTs.Radio node 12 receives the NRT of radio node 14. Radio node 14 receivesthe NRT of radio node 12. Radio node 12 updates its NRT with the networkinformation included in the NRT of radio node 14. Radio node 14 updatesits NRT with the network information included in the NRT of radio node12.

Through the SCTP connection, radio node 12 receives “heart beat”messages from radio node 14. The heart beat messages indicate theexistence of a connection between radio node 12 and radio node 14. Whenradio node 12 stops receiving heart beat messages from radio node 14,radio node 12 removes radio node 14 and the neighboring radio nodes ofradio node 14 from its NRT. Radio node 12 also removes radio node 14 andthe neighboring radio nodes of radio node 14 from its NRT when asubsequent REM scan indicates that radio node 14 has been deactivated.

Referring to FIG. 3, an example of a self-discovered enterprise network60 is shown. The network 60 includes radio nodes 62, 64, 66, 68, 70, 72,74, 76, 78, 80, 82 having different scrambling codes and IP addresses.The radio nodes 62, 64, 66, 68, 70, 72, 74, 76, 78, 80, 82 areassociated with the same CSG-Id, belong to the same enterprise network,and are connected to each other through communication links (e.g., Iuxlinks). Through radio scanning and network searching, radio node 62locates neighboring radio nodes 64, 66, 68 and updates its NRT with thenetwork information associated with the neighboring radio nodes 64, 66,68.

Referring to FIG. 4, an example NRT 90 is shown. The NRT includescolumns 91, 93, 95, 97, 99 corresponding to various types of networkinformation (e.g., cell identity information, PSC information, gatewaynode information, SCTP port information and destination IP information).Entries 92, 94, 96 correspond to the network information associated withneighboring radio nodes 64, 66, and 68. As new radio nodes cells areadded to the network, radio node 62 discovers more neighboring radionodes and updates its NRT accordingly.

Referring back to FIG. 3, radio node 62 receives over a communicationlink (e.g., an Iux link) the NRT of neighboring radio node 64. The NRTof neighboring radio node 64 includes network information associatedwith radio nodes 76, 78 and 80 (i.e., the neighbors' neighbors radionodes). Through the NRT of neighboring radio node 64, radio node 62learns of neighbors' neighbors radio nodes 76, 78 and 80. Radio node 62updates its NRT with the network information associated with neighbors'neighbors radio nodes 76, 78 and 80. In FIG. 4, entries 98, 100 and 102correspond to the network information associated with neighbors'neighbors radio nodes 76, 78 and 80.

Radio node 62 receives the NRT of neighboring radio node 68, whichincludes network information associated with neighbors' neighbors radionodes 70, 72 and 74. In FIG. 4, entries 104, 106 and 108 correspond tothe network information associated with neighbors' neighbors radio nodes70, 72 and 74. Radio node 62 also receives the NRT of neighboring radionode 66, which includes network information associated with neighbors'neighbor radio node 82. In FIG. 4, entry 110 corresponds to the networkinformation associated with neighbors' neighbor radio node 82.

Referring to FIGS. 5A-5D, an example of a handover process in acommunications network 120 is shown. The communications network includesa gateway 124 (HNB-GW) and radio nodes 62, 64, 76 (see also FIG. 3).Referring to FIG. 3, radio node 64 is a neighboring radio node of radionode 62 and radio node 76 is a neighbors' neighbor radio node of radionode 62. Radio nodes 62, 64, 76 are connected to gateway 124 through Iuhinterface links 126, 127, 129. Radio nodes 62, 64, 76 are connected toeach other through Iux interface links 128, 131.

Referring to FIG. 5A, a handset 122 is connected to radio node 62through an active communication link (not shown). Handset 122 moves fromradio node 62 towards neighboring radio node 64. Referring to FIG. 5B,to maintain a communication on the handset 122, radio node 62 retrievesfrom its NRT network information for neighboring radio node 64 and setsup a soft handover link 130 (which may also be link 128) to theneighboring radio node 64. Through the soft handover link 130, thehandset communicates with both radio node 62 and neighboring radio node64 over communication links 121, 123. Radio node 62 retains control ofthe communication during and/or after the soft handover, because radionode 62 is acting as a control point radio node.

Referring to FIG. 5C, the handset 122 moves away from neighboring radionode 64 toward neighbors' neighbor radio node 76. Radio node 62 acts asa control point radio node and retrieves from its NRT the networkinformation for radio node 76 to establish a link 134 with neighbors'neighbor radio node 76. Through the link 134, radio node 62 initiates ahard handover to neighbors' neighbor radio node 76. In the hardhandover, the call gets physically relocated to radio node 76. Referringthe FIG. 5D, the handover finishes when the handset 122 attaches itselfto radio node 76 through link 136.

The techniques described herein can be implemented in digital electroniccircuitry, or in computer hardware, firmware, software, or incombinations of them. The techniques can be implemented as a computerprogram product, i.e., a computer program tangibly embodied in aninformation carrier, e.g., in a machine-readable storage device, forexecution by, or to control the operation of, data processing apparatus,e.g., a programmable processor, a computer, or multiple computers. Acomputer program can be written in any form of programming language,including compiled or interpreted languages, and it can be deployed inany form, including as a stand-alone program or as a module, component,subroutine, or other unit suitable for use in a computing environment. Acomputer program can be deployed to be executed on one computer or onmultiple computers at one site or distributed across multiple sites andinterconnected by a communication network.

Method steps of the techniques described herein can be performed by oneor more programmable processors executing a computer program to performfunctions by operating on input data and generating output. Method stepscan also be performed by, and apparatus can be implemented as, specialpurpose logic circuitry, e.g., an FPGA (field programmable gate array)or an ASIC (application-specific integrated circuit). Modules can referto portions of the computer program and/or the processor/specialcircuitry that implements that functionality.

Processors suitable for the execution of a computer program include, byway of example, both general and special purpose microprocessors, andany one or more processors of any kind of digital computer. Generally, aprocessor will receive instructions and data from a read-only memory ora random access memory or both. The essential elements of a computer area processor for executing instructions and one or more memory devicesfor storing instructions and data. Generally, a computer will alsoinclude, or be operatively coupled to receive data from or transfer datato, or both, one or more mass storage devices for storing data, e.g.,magnetic, magneto-optical disks, or optical disks. Information carrierssuitable for embodying computer program instructions and data includeall forms of non-volatile memory, including by way of examplesemiconductor memory devices, e.g., EPROM, EEPROM, and flash memorydevices; magnetic disks, e.g., internal hard disks or removable disks;magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor andthe memory can be supplemented by, or incorporated in special purposelogic circuitry.

To provide for interaction with a user, the techniques described hereincan be implemented on a computer having a display device, e.g., a CRT(cathode ray tube) or LCD (liquid crystal display) monitor, fordisplaying information to the user and a keyboard and a pointing device,e.g., a mouse or a trackball, by which the user can provide input to thecomputer (e.g., interact with a user interface element, for example, byclicking a button on such a pointing device). Other kinds of devices canbe used to provide for interaction with a user as well; for example,feedback provided to the user can be any form of sensory feedback, e.g.,visual feedback, auditory feedback, or tactile feedback; and input fromthe user can be received in any form, including acoustic, speech, ortactile input.

The techniques described herein can be implemented in a distributedcomputing system that includes a back-end component, e.g., as a dataserver, and/or a middleware component, e.g., an application server,and/or a front-end component, e.g., a client computer having a graphicaluser interface and/or a Web browser through which a user can interact,or any combination of such back-end, middleware, or front-endcomponents. The components of the system can be interconnected by anyform or medium of digital data communication, e.g., a communicationnetwork. Examples of communication networks include a local area network(“LAN”) and a wide area network (“WAN”), e.g., the Internet, and includeboth wired and wireless networks.

The computing system can include clients and servers. A client andserver are generally remote from each other and typically interact overa communication network. The relationship of client and server arises byvirtue of computer programs running on the respective computers andhaving a client-server relationship to each other.

The term “machine-readable storage media” is not meant to encompassnon-statutory subject matter as defined at the time the attached claimsare construed. The term “machine-readable storage media”, however, ismeant to cover any subject matter which is defined as statutory at thetimes the claims are construed.

A number of embodiments have been described. Nevertheless, it will beunderstood that various modifications may be made and therefore otherembodiments are within the scope of the following claims.

For example, techniques described herein may be implemented using CDMA(wideband and/or narrow band) and non-CDMA air interface technologies,as well as the 1xEV-DO air interface standard. Additionally, a radionode may update its NRT with information received from other devices,for example, a handset. The radio node may receive measurement reportsfrom a handset indicating PSC and possible cell identities ofneighboring radio nodes. The radio node updates its NRT using themeasurement reports and the discovery messages from the neighboringradio nodes.

In another example, a first radio node that is deployed in an enterprisenetwork is not a control point radio node and will not be able todiscover other enterprise radio nodes in the area. In this example, thediscovery process begins when a control point radio node joins theenterprise network.

What is claimed is:
 1. A method for configuring a network, the methodcomprising: receiving, by a first radio node, information identifying asecond radio node in the network, wherein the second radio node isconfigured to communicate with the first radio node, wherein the firstradio node has a communication session with a mobile device at a firsttime, wherein the second radio node has the communication session withthe mobile device at a second time, and wherein the first radio nodediffers from the second radio node; receiving, by the first radio nodefrom the second radio node, information identifying one or more thirdradio nodes in the network that are within a communication range of thesecond radio node; and initiating, by the first radio node, a handoff ofthe communication session with the mobile device, from the second radionode to one of the one or more third radio nodes, using the informationreceived from the second radio node that identifies the one or morethird radio nodes in the network that are within the communication rangeof the second radio node.
 2. The method of claim 1, further comprising:sending, to the second radio node, a request for network informationassociated with the one or more third radio nodes in the network.
 3. Themethod of claim 1, further comprising: receiving, from the second radionode through a radio interface, information identifying the second radionode as being in the network.
 4. The method of claim 1, furthercomprising: using a network protocol to identify the second radio nodeas being in the network.
 5. The method of claim 1, wherein the handoffcomprises one of a soft handoff or a hard handoff.
 6. The method ofclaim 1, wherein the handoff is executed through a direct communicationlink within the network.
 7. The method of claim 1, wherein the handoffis initiated following a detection, by the second radio node, of one ormore of (i) a need to load balance the network, (ii) a need to maintaininterference and power limits within the network, and (iii) one or moremeasurement reports received from a handset.
 8. A system comprising: afirst radio node; and one or more machine-readable hardware storagedevices storing instructions that are executable by the first radio nodeto perform operations comprising: receiving, by the first radio node,information identifying a second radio node in the network, wherein thesecond radio node is configured to communicate with the first radionode, wherein the first radio node has a communication session with amobile device at a first time, wherein the second radio node has thecommunication session with the mobile device at a second time, andwherein the first radio node differs from the second radio node;receiving, by the first radio node from the second radio node,information identifying one or more third radio nodes in the networkthat are within a communication range of the second radio node; andinitiating, by the first radio node, a handoff of the communicationsession with the mobile device, from the second radio node to one of theone or more third radio nodes, using the information received from thesecond radio node that identifies the one or more third radio nodes inthe network that are within the communication range of the second radionode.
 9. The system of claim 8, wherein the operations further comprise:sending, to the second radio node, a request for network informationassociated with the one or more third radio nodes in the network. 10.The system of claim 8, wherein the operations further comprise:receiving, from the second radio node through a radio interface,information identifying the second radio node as being in the network.11. The system of claim 8, wherein the operations further comprise:using a network protocol to identify the second radio node as being inthe network.
 12. The system of claim 8, wherein the handoff comprisesone of a soft handoff or a hard handoff.
 13. The system of claim 8,wherein the handoff is executed through a direct communication linkwithin the network.
 14. The system of claim 8, wherein the handoff isinitiated following a detection, by the second radio node, of one ormore of (i) a need to load balance the network, (ii) a need to maintaininterference and power limits within the network, and (iii) one or moremeasurement reports received from a handset.
 15. One or moremachine-readable hardware storage devices storing instructions that areexecutable by a first radio node to perform operations comprising:receiving, by the first radio node, information identifying a secondradio node in the network, wherein the second radio node is configuredto communicate with the first radio node, wherein the first radio nodehas a communication session with a mobile device at a first time,wherein the second radio node has the communication session with themobile device at a second time, and wherein the first radio node differsfrom the second radio node; receiving, by the first radio node from thesecond radio node, information identifying one or more third radio nodesin the network that are within a communication range of the second radionode; and initiating, by the first radio node, a handoff of thecommunication session with the mobile device, from the second radio nodeto one of the one or more third radio nodes, using the informationreceived from the second radio node that identifies the one or morethird radio nodes in the network that are within the communication rangeof the second radio node.
 16. The one or more machine-readable hardwarestorage devices of claim 15, wherein the operations further comprise:sending, to the second radio node, a request for network informationassociated with the one or more third radio nodes in the network. 17.The one or more machine-readable hardware storage devices of claim 15,wherein the operations further comprise: receiving, from the secondradio node through a radio interface, information identifying the secondradio node as being in the network.
 18. The one or more machine-readablehardware storage devices of claim 15, wherein the operations furthercomprise: using a network protocol to identify the second radio node asbeing in the network.
 19. The one or more machine-readable hardwarestorage devices of claim 15, wherein the handoff comprises one of a softhandoff or a hard handoff.
 20. The one or more machine-readable hardwarestorage devices of claim 15, wherein the handoff is executed through adirect communication link within the network.