Methods of Enabling Base Station Functionality in a User Equipment

ABSTRACT

In this invention, we disclose methods for enabling ad hoc cellular base station functionality within a user equipment when the connection quality between a base station and the user equipment is limited or nonexistent. These methods include measuring a connection quality between a user equipment and its serving base station. If the connection quality is below a threshold, the user equipment can enable its internal ad hoc cellular base station functionality. This is done by running a software within the user equipment that (a) checks the connection quality periodically, and (b) enables ad hoc cellular base station functionality of the connection threshold dips below a certain value. In one embodiment, that threshold could be the same threshold value that a user equipment would use if it were making a decision to handoff to another base station based on poor connection quality.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation under 35 U.S.C. § 120 of U.S. patentapplication Ser. No. 15/991,741, filed May 29, 2018, entitled “Methodsof Enabling Base Station Functionality in a User Equipment,” whichitself is a continuation under 35 U.S.C. § 120 of U.S. patentapplication Ser. No. 14/777,246, filed Sep. 15, 2015, entitled “Methodsof Enabling Base Station Functionality in a User Equipment,” whichitself is an application under 35 U.S.C. § 371 of PCT/US14/29145, filedMar. 14, 2014, entitled “Methods of Enabling Base Station Functionalityin a User Equipment,” which itself claims priority to the following U.S.Provisional Patent Applications No. 61/787,832, entitled “Method ofDirectly Connecting UEs,” filed Mar. 15, 2013, and U.S. ProvisionalPatent Application No. 61/790,105 entitled “Forming Backhaul Links UsingWireless User Equipment,” filed on Mar. 15, 2013, the entire contents ofeach of which are hereby incorporated by reference.

FIELD

The present invention relates generally to wireless multimediatelecommunications. More specifically, this invention relates to methodsof providing ad hoc cellular base station functionality using userequipment.

BACKGROUND

Although cellular network coverage in urban areas is often strong, thereare many situations in which cellular coverage falls short of being ableto provide the desired services. Some examples of these shortcomingsare: lack of in-building coverage, masking in urban canyons, rural areaswithout coverage, geographic topology that impedes coverage, disastersituations where cellular infrastructure is destroyed, and so forth.Present day cellular networks require a connection to a base station inorder to receive cellular service. That is because LTE and othercellular protocols are asymmetric and require a base station to be inthe communication path.

In current wireless communication networks, the roles of the userequipment and the base stations are distinct. User equipment is a devicethrough which a telephone call, an internet connection, or a GPSnavigation session can transpire. Each of these functions is enabled bya connection to larger network—a cellular network, a Wi-Fi network, or asatellite network. Base stations can be stationary or mobile. But eitherway, when a smart phone is out of range of a base station, it is usuallyunable to make a voice call because it does not have connectivity to thecore network.

Some mobile communication networks, however, do not require connectivityto the core network. For example, wireless device-to-device networksprovide communication services to local users. One example is apush-to-talk network where users who are within range of one another cancommunicate over shared radio channels. Public safety personnel employthis type of technology in their land-mobile radios. Another examplecould be dual-use phones that can be cellular telephones when there isnetwork connectivity and peer-to-peer telephones when there is nonetwork connectivity. These phones could, for example, providepeer-to-peer connectivity over a Wi-Fi or Bluetooth network.

While land-mobile radios and dual-use phones can facilitate voicecommunication in the absence of a connection to a base station, and byextension, to the core network, these devices are not without theirlimitations. Land-mobile radios are not cellular telephones, which meansthat users desiring this type of connectivity must carry two separatedevices. Land-mobile radio (“LMR”) users share the same channel. Allusers within the same LMR cell can, therefore, hear all communications.Devices that move outside of the range of the LMR network becomeunreachable.

Dual-use handsets are limited by the range of the base station or accesspoint providing connectivity to the core network. Macro base stationstypically have 15 km or more range. In contrast, the range of a Wi-Fi orBluetooth connection is typically about 300 feet. There is accordingly aneed for providing cellular network connectivity in the absence of astrong signal from a base station.

SUMMARY OF THE INVENTION

In this invention, we disclose methods for enabling ad hoc cellular basestation functionality within a user equipment when the connectionquality between the base station and the user equipment is limited ornonexistent. By enabling this ad hoc cellular base station functionalitywe enable the creation of or integration into an ad hoc cellularnetwork.

In this invention, we disclose methods for establishing or integratingan ad hoc cellular network into an existing cellular network. When an adhoc cellular network is created as a stand-alone network, it is aheterogeneous network as that term is used herein. When the ad hoccellular network is integrated into a fixed cellular network, theresulting combination is also a heterogeneous network as that term isused herein.

The ad hoc cellular networks created herein can be established with asingle ad hoc cellular base station or with more than one ad hoccellular base stations. Ad hoc cellular base stations can be mobile orstationary. They can also be part of a semi-permanent installation. Thedifference between an ad hoc cellular base station and a fixed cellularnode or fixed cellular base station is, ad hoc cellular base stationscan be easily moved. They may remain at a particular location for manymonths, for example in a disaster recovery scenario, but they aredesigned to be moved easily. Fixed cellular base stations, on the otherhand, are part of a fixed infrastructure. Their installation typicallyrequires advanced planning. Their installation, is, therefore, not adhoc.

It is this fixed, advanced planning that the some of the methods of thedisclosed embodiments overcome by automating hardware settings toaccommodate varying operational parameters within a cellular network.Automating these procedures requires utilizing heterogeneous access andbackhaul hardware that can be adapted to fit the networkcharacteristics. It requires having the ability to dynamically alterhardware configurations in response to changing network dynamics.Accomplishing this requires measuring and analyzing network conditionsand altering hardware settings as a result of the analysis to provideoptimized ad hoc cellular networks.

Cellular base stations are traditionally deployed in fixed environments.Even mobile nodes known as Cell on Wheels (“COWS”) are merely portableversions of fixed base stations. As such, their addition to an existingnetwork requires careful planning, which can often mean reevaluating theoperational parameters of existing base stations within a particularneighborhood. This type of enhancement of a network requires substantialadvanced planning.

In contrast, the methods disclosed herein automate the integration of adhoc cellular base stations into an existing cellular network. Thisautomation accounts for managing the individual cellular base stationsand bringing a high-level, end-to-end orchestration to the combined adhoc and fixed cellular network. Even when embodiments described hereinare used to create an independent ad hoc cellular network, they measureand analyze the operational parameters of existing cellular networkswithin range to ensure that their creation does not deleteriously affectthe existing cellular networks within range.

The embodiments disclosed herein are executed on multi radio accesstechnology nodes, which we refer to throughout as “ad hoc cellular basestations.” Because the ad hoc cellular base stations incorporatemultiple access and backhaul radios, they are able to operate overnumerous frequencies, run a variety of protocols, use licensed orunlicensed spectrum, and use wired or wireless connectivity.

In embodiments of the invention, we disclose methods of establishing anad hoc cellular network having an ad hoc cellular base station orintegrating an ad hoc cellular base station into a fixed cellularnetwork comprising the steps of: analyzing a speed to determine amobility state of an ad hoc cellular base station; querying a local orremote cache stored in a computing server to determine a backhaulconfiguration or an access configuration for the ad hoc cellular basestation; receiving the backhaul configuration or the accessconfiguration for the ad hoc cellular base station from the local orremote cache; evaluating an operational parameter of a neighboringcellular base station; determining if the access configuration orbackhaul configuration should be updated based on the operationalparameter; and transmitting or receiving an access signal or a backhaulsignal using the access configuration or the backhaul configuration. Inan additional embodiment performing the previously listed steps, therecould also be a second ad hoc cellular base station further comprisingthe steps of: receiving from a local or remote cache a second location,a second mobility state, or a second travel direction for a second adhoc cellular base station within the ad hoc cellular network; evaluatingat least one of the backhaul configuration, the access configuration,the second location, the second mobility state, or a second traveldirection to determine if either the backhaul configuration or theaccess configuration should be changed to an updated backhaulconfiguration or an updated access configuration; and transmitting anaccess signal or a backhaul signal using the access configuration, theupdated access configuration, the backhaul configuration, or the updatedbackhaul configuration. In yet additional embodiments, the speed isdetermined by using location data or direction data for the ad hoccellular base station.

Alternate embodiments add to these embodiments the following: altering apower level of an access radio or a backhaul radio having transmit orreceive hardware configured to operate over the access configuration orbackhaul configuration; using a wireless mesh backhaul connection; andaltering an antenna configuration based upon an access configuration ora backhaul configuration. In additional embodiments, building on thesesteps there could be communicating a decision to hand-off a data orvoice session of a user being serviced by a source ad hoc cellular basestation to a destination cellular base station; and exchanging messaginginformation between the source ad hoc cellular base station and thedestination cellular base station. The could alternatively becommunicating a decision to hand-in a data or voice session of a userbeing service by a source cellular base station to a destination ad hoccellular base station; and exchanging messaging information between thesource cellular base station and the destination ad hoc cellular basestation.

In some embodiments the access signal or the backhaul signal use fullduplex wireless communication. In some embodiments there could beadditional steps of detecting a coverage gap; establishing at least onewireless backhaul connection to a core network using an antenna having again greater than 0 dB; and using the access configuration to transmitor receive signals on an access radio. There could also be a situationwhere the access configuration or the backhaul configuration isdetermined based on a power source of the ad hoc cellular base station.Alternatively there could be the access configuration or the backhaulconfiguration is determined based on an operational parameter of the adhoc cellular network.

In further embodiments building thereon, there could be methods furthercomprising the ad hoc cellular base station authenticating a userequipment by using an already authenticated user communicating withother users within the ad hoc cellular network or assigning a priorityto a user. An alternate embodiment could include a backhaul connectionof the ad hoc cellular base station to a cellular network is givenpriority treatment based on an operational parameter of the ad hoccellular base station. Additionally in some of these embodiments it ispossible to exchange messaging information with a core cellular network,or to establishing a second backhaul connection using either a cellularor a mesh protocol between the ad hoc cellular base station and a secondcellular base station.

In additional embodiments there could be a method of establishing an adhoc cellular network having an ad hoc cellular base station orintegrating an ad hoc cellular base station into a fixed cellularnetwork comprising the steps of: establishing a wireless backhaulconnection for an ad hoc cellular base station further comprising thesteps of: receiving a data packet from an ad hoc cellular base station;extracting a tunnel overhead packet from the data packet so as to createa modified data packet; storing the tunnel overhead packet in a memory;forwarding the modified data packet to a second ad hoc cellular basestation using an IP routing protocol; receiving an acknowledgement fromthe second ad hoc cellular base station indicating that an establishmentof a bearer is complete; and anchoring an IP session to shield anexternal network from a backhaul IP change.

In alternate embodiments the data packet is an initial attach request orthe modified data packet is forwarded to an evolved packet core. In analternate embodiment, there could be the ad hoc cellular networkproviding situational awareness to a local user with a softwareapplication or a central database by providing at least one of: alocation of an ad hoc cellular base station, a direction or travel of anad hoc cellular base station, a mobility parameter for an ad hoccellular base station, an environmental parameter for an ad hoc cellularbase station, a coverage map of an ad-hoc cellular base station, anenvironmental parameter of a fixed base station, an operationalparameter of a fixed base station, a location of a fixed base station,or a location of a user. In a further embodiment there could bemonitoring a quality of the backhaul connection to the core network todetermine if it falls below a threshold parameter; providing a locallimited core network to the ad hoc network if the backhaul connectionfalls below the threshold parameter further comprising the steps of: thead hoc cellular base station providing a minimal set of core networkfunctionality to a user equipment within the ad hoc network on an accesschannel; Receiving an authentication information from a core networkdatabase having core authentication information stored therein; Storingthe authentication information into a memory; and Using theauthentication information to authenticate the user equipment.

In an alternate embodiment there could be managing the ad hoc cellularnetwork; and providing a voice-over-IP application wherein thevoice-over-IP application is chosen from the group consisting of:push-to-talk, peer-to-peer communication, an ad hoc user nationwidedialing plan; an ad hoc user international dialing plan, conferencecalling, or a speed dial list. An additional embodiment could comprisethe steps of: a first ad hoc cellular base station detecting a third adhoc cellular base station wherein the third ad hoc cellular base stationhas a processor having a limited core network functionality; and using awired backhaul connection or a wireless backhaul connection to integratethe third ad hoc cellular base station into the ad hoc cellular networkwherein the integration is performed by exchanging messaging informationwith the second ad hoc cellular base station.

In yet an additional embodiment, there could further comprise the stepsof: determining if the quality of the backhaul connection to the corenetwork exceeds the threshold parameter; and synchronizing theauthentication information stored in the memory of the ad hoc cellularbase station providing the limited core functionality with the corenetwork database.

An alternate embodiment could be a method of establishing an ad hoccellular network having an ad hoc cellular base station or integratingan ad hoc cellular base station into a fixed cellular network comprisingthe steps of: receiving a message sent from a user equipment operatingin an existing cellular network, wherein the message is sent over acontrol or bearer channel; analyzing a characteristic of the message;analyzing an operational parameter of the existing cellular network;determining if an ad hoc cellular base station should enable, disable,or modify an access signal or a backhaul signal based on the analysis ofthe characteristic of the message or the operational parameter.

An additional embodiment could be a method of establishing an ad hoccellular network having an ad hoc cellular base station or integratingan ad hoc cellular base station into a fixed cellular network comprisingthe steps of: optimizing a data path wherein the optimizing furthercomprises: receiving a first data packet from a user equipment at afirst ad hoc cellular base station wherein the first ad hoc cellularbase station includes a local gateway providing local wireless access;removing a first protocol header from the first data packet; storing thefirst protocol header in a memory; receiving a second data packetwherein the second data packet was sent from a second ad hoc node havingprocessor with limited core network functionality stored thereon;analyzing a plurality of data packet headers stored in the memory inorder to determine which corresponds to the second data packet; andappending a second data packet header to the second data packet. In analternate embodiment there could be a local packet data network gateway(LGW). Additionally an embodiment could further comprise establishing aclosed network.

In an additional embodiment there could be a method of establishing anad hoc cellular network having an ad hoc cellular base station orintegrating an ad hoc cellular base station into a fixed cellularnetwork comprising the steps of: a first ad hoc cellular base stationestablishing a first primary connection with a core cellular network; asecond ad hoc cellular base station establishing a connection with thefirst ad hoc cellular base station; the second ad hoc cellular basestation establishing a second primary connection with the core cellularnetwork; determining if the quality of the first primary connectionfalls below a threshold parameter; and replacing the first primaryconnection with the second primary connection if the quality of thefirst primary connection falls below the threshold parameter. In someembodiments, the threshold parameter is determined by aggregating morethan one threshold parameter and averaging the aggregated thresholdparameters.

In alternate embodiments we disclose methods of converting a userequipment into an ad hoc base station by measuring a connection qualitybetween a user equipment and its serving base station. If the connectionquality is below a threshold, the user equipment can enable its internalad hoc cellular base station functionality. This is done by running asoftware within the user equipment that (a) checks the connectionquality periodically, and (b) enables ad hoc cellular base stationfunctionality of the connection threshold dips below a certain value. Inone embodiment, that threshold could be the same threshold value that auser equipment would use if it were making a decision to handoff toanother base station based on poor connection quality.

In embodiments of this invention, user equipment has the ability toexecute a reverse banding functionality wherein hardware normally usedfor receiving signals becomes hardware that is used for transmitting andvice versa. In some embodiments, the user equipment could haveadditional battery power, solar recharging capabilities, and other meansof enhancing normal consumer-grade power characteristics of userequipment. In many embodiments, the user equipment could be a smartphone or other telephonic device. But in some embodiments tablets,laptops and so forth could be used as well.

In some networks created using the methods disclosed herein, there couldbe a plurality of user equipment connected to one another via typicalcellular protocols. When the user equipment arbitrates who among themshould enable ad hoc cellular base station functionality, they could dothis in a mesh protocol. Once the decision is made as to which userequipment will provide ad hoc cellular base station functionality, thenetwork will revert to conducting itself as a typical cellular networkwhere there is a base station providing service to user equipment.

In some embodiments, an arbitration protocol can be used to decide whichamong more than one user equipment should enable ad hoc cellular basestation functionality. And in other embodiments, user equipment within anetwork being serviced by a user equipment that has enabled ad hoccellular base station functionality can periodically monitor the networkto see if a base station connection quality that exceeds a thresholdvalue has become available.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a prior art architectural rendering of a public safetycellular communication network.

FIG. 2 is an architectural rendering of a cellular communication networkupon which methods of the present invention could be executed.

FIG. 3 is an architectural rendering of an ad hoc cellular base stationupon which methods of the present invention can be executed.

FIG. 4 shows the steps of embodiments of methods for establishing an adhoc cellular network or integrating an ad hoc cellular network into afixed cellular network.

FIG. 5A shows a first portion of a message flow for establishing awireless backhaul connection in an ad hoc cellular network.

FIG. 5B shows a second portion of the message flow for establishing awireless backhaul connection in an ad hoc cellular network.

FIG. 6 is an illustration an architectural set-up upon which methods forestablishing an ad hoc cellular network or integrating an ad hoccellular network into a fixed cellular network could be performed

FIG. 7 shows steps of methods for establishing a wireless backhaulconnection for an ad hoc cellular base station.

FIG. 8 shows an architecture upon which methods of determining if an adhoc cellular base station should establish an ad hoc cellular network orenhance the coverage of a fixed cellular network could be performed.

FIG. 9 depicts steps for methods of determining if an ad hoc cellularbase station should enable, disable, or modify an access signal or abackhaul signal.

FIG. 10 shows steps for methods of optimizing a data path by providing alocal gateway.

FIG. 11 illustrates the steps of methods for creating redundant backhaulconnections within an ad hoc cellular network.

FIG. 12 is a diagram of a wireless communication network.

FIG. 13 shows the method steps of an embodiment wherein a user equipmentin a wireless communication network enables ad hoc cellular base stationfunctionality.

FIG. 14 is an architectural rendering of user equipment having ad hoccellular base station functionality therein.

FIG. 15 shows the steps of embodiments of methods wherein a userequipment in a wireless communication network enables ad hoc cellularbase station functionality.

FIG. 16 shows the steps of embodiments of methods wherein a userequipment in a wireless communication network enables ad hoc cellularbase station functionality.

FIG. 17 shows a wireless communication network wherein user equipmentcan create a backhaul link to each other.

DEFINITIONS

Ad hoc cellular base stations can be mobile, stationary, or part of asemi-permanent installation. The difference between an ad hoc node and afixed cellular base station is ad hoc cellular base stations can beeasily moved. They may remain at a particular location for many months,but they are designed to be moved easily. Ad hoc cellular base stationsare dynamic, heterogeneous nodes. Ad hoc cellular base stations may havecomputer readable instructions stored in memory that allow them toseamlessly integrate into existing cellular networks or to providedlimited local wireless and core network functionality or services.

Ad hoc cellular network is a stand-alone network of ad hoc cellular basestations. These networks can be used by consumers, businesses, or forspecial purposes. Additionally they can be integrated into fixednetworks. They can provide coverage in rural areas. They can enhancecoverage of fixed networks. And they can be used to provide networkservices in areas where there is no network or where a natural orman-made disaster has destroyed part or all of a fixed network.

Cellular means operates within a standards compliant network withindependent and possibly overlapping RF cells.

Cellular base station means a base station, such as 3GPP LTE eNodeB,operating within a standards compliant network with independent andpossibly overlapping RF cells.

Characteristic means the network quality experienced by a user, whichcan be affected by network load, congestion, latency, or capacity.

Destination ad hoc cellular base station means an ad hoc or fixedcellular base station that can receive a hand-in. A destination ad hoccellular base station can be stationary or mobile.

Dynamic heterogeneous node means a node that is able to dynamicallyalter an operational mode or an operational parameter.

Environmental condition means radio frequency interference, temperature,precipitation, or other weather related metric.

EPC means an evolved packet core.

Fixed cellular base stations or fixed cellular nodes or fixed basestations are part of a fixed infrastructure. Their installationtypically requires advanced planning, which means they are not ad hocbase stations or nodes.

Fixed cellular networks or fixed networks are comprised of fixedcellular base stations or fixed cellular nodes.

Heterogeneous means being diverse in character or content.

Heterogeneous network means a network that is diverse in at least one ofthe following operational modes: frequency, protocol, duplexing scheme,wired versus wireless connection, or licensed versus unlicensed spectrum

Heterogeneous node means a node that can establish a heterogeneousnetwork.

HSS means a home subscriber server.

Limited core network functionality means a processor having at least oneof the following functionalities: paging, handover, authentication,location management, SGW selection, radio resource management, mobilitymanagement, roaming management, tracking area management, mobilityanchor, lawful interception, policy enforcement, packet filtering,charging, or providing an anchor between 3GPP and non 3GPP technologies.

MME means mobility management entity.

Neighboring cellular base station could be a fixed base station or an adhoc base station.

Operational parameter means radio frequency, mobility, network load,network configuration, access configuration, backhaul configuration,interference, power level, the existence of know “not spots,” channelavailability, detecting if a user equipment has sent a message to thecore network indicating that it requires more bandwidth, a userequipment's current data rate, the existence of other base stationswithin range, and whether the core network has granted or denied arequest for bandwidth.

PGW means a packet data network gateway.

PCRF means a policy and charging rules function.

PDN means a packet data network.

Reverse banding means a process by which a user equipment transmits on afrequency band upon which it would normally receive and vice versa.

SGW means a switching gateway.

Source ad hoc cellular base station means an ad hoc or fixed cellularbase station from which a hand-off can be performed. A source ad hoccellular base station can be stationary or mobile.

User equipment means an electronic device having at least transmit andreceive hardware, a memory, a processor, an antenna, a user interfaceand a power source. User equipment could be a telephonic device, a smartphone, a tablet or a laptop. User equipment has the ability to execute areverse banding functionality wherein hardware normally used forreceiving signals becomes hardware that is used for transmitting andvice versa. User equipment can become an ad hoc cellular base station.

DETAILED DESCRIPTION

FIG. 1 shows an exemplary diagram of a prior art public safetycommunication network 100 that facilitates two types ofcommunication—either through a tower 110 or peer-to-peer 120. In eitherof these communication modes, the public safety officer's radio must bewithin range of the tower 110, or of his peer 122. Being within range ofa receiving radio or base station is an inherent limitation of allwireless communication networks. Some of the drawbacks of tower-basedinfrastructure are discussed in the background section.

In the public safety communication network 100, range problems arefurther compounded in the United States by the fact that most publicsafety communication networks 100 are owned and operated by individualtowns, cities, municipalities, and the like. This results in a lack ofuniformity nationwide and an inability to leverage infrastructure fromsurrounding localities. Some of the public safety communicationsnetworks 100 in various countries are private networks, and some are runby commercial network operators, an example of one being Verizon or AT&Tin the US. These communication networks 100 most typically support theuse of land mobile radios, although some public safety networks 100 arecapable of supporting smart phones used by public safety personnel.

In contrast to the prior art fixed infrastructure networks and the priorart of ad hoc military networks, the present invention is designed toutilize a mobile cellular base station to create an ad hoc cellularnetwork as a stand-alone network or as a network that seamlesslyintegrates with existing cellular network infrastructure. Although thisapplication uses the term “mobile” it will be understood by thoseskilled in the art that a mobile cellular base station may, at times, bemobile, and at other times may be stationary. The distinction between a“mobile cellular base station” as used in this application and atraditional stationary base station. Examples of stationary nodes arefixed tower base stations, fixed small cells, or a COW (cell on wheels).These types of base stations are not routinely moved, whereas the mobilecellular base stations described herein can be routinely moved. In termsof mobility, mobile cellular base stations could be carried by anynumber of moving entities such as: a vehicle, an airplane, a drone, ahelicopter, a hot air balloon, a person, an animal, a boat, a snowmobile, a dirigible, a blimp, a train, a motorcycle, or a robot.

The process of creating, maintaining, or enhancing an ad hoc cellularnetwork with a mobile cellular base station, alternatively called amobile ad hoc cellular base station is challenging because mobilecellular base stations are not part of the fixed infra-structure. Thefixed infrastructure makes many assumptions when operating that resultfrom the base stations therein being pre-planned and fixed. Theinstallation, operational parameters, antenna characteristics,interference patterns, access and backhaul configurations of ad hoccellular base stations are not preplanned. An ad hoc cellular basestations can change their location at any time.

Adding a ad hoc cellular base station to an existing cellular network ina way that enhances overall network capability requires consideringwhich access and backhaul configurations should be offered, what thetransmission power of the mobile ad hoc cellular base station should be,how the fixed cellular network should respond, and in some instances,deciding whether to include limited core network functionality withinthe mobile ad hoc cellular base stations so that they can perform someof the functions of the core network operational devices. In LTE forexample, a core network operational device could be an EPC. If a mobilead hoc cellular base station did include limited core networkfunctionality within its processor, for an LTE network, thesefunctionalities would include: the HSS, the SGW, the PGW, or the MME.Those of skill in the art will recognize that these functionalities maybe assumed by different entities within different networks outside of anLTE network. Embodiments of the limited core network functionality couldtherefore be adapted to meet the functionalities of these additionalnetworks.

One of the novel aspects of the methods described herein is, they takethese issues into consideration before and during the establishment ofan ad hoc cellular network. Another point of novelty in the methodsdisclosed herein is the fact that they are executed on multi-RAT nodes.Because the nodes have multiple access and backhaul radios built-in, thechoice of which access or which backhaul configuration to adopt is fluidand can be determined by the network conditions in real-time.

In addition, the multi-RAT nodes work cooperatively in some embodimentswith a computing cloud component. The computing cloud component is ableto bring a “God's view,” that is a high level management perspective, tothe ad hoc cellular network. Some of the network management intelligenceresident in the computing cloud is also resident in processors of themulti-RAT nodes. Accordingly, either of these computer mediums can makedecisions about access or backhaul configurations, choosing differentfrequency bands, such as, but not restricted to, 2G, 3G, 4G, LTE, Wi-Fi,high speed Wi-Fi, TV white space, satellite, Bluetooth, ZigBee, licensedor unlicensed spectrum, wired or wireless connectivity, and the like,different communication protocols, duplexing schemes e.g., FDD, TDD,Full Duplex and the like, as well as transmit power levels, antennaorientations, and in the case of phased array antennas, transmissionpower characteristics.

In addition, ad hoc cellular base stations as described herein are ableto provide multimedia services, not just voice, data or Internetservices. The intelligence that is imbued to the ad hoc cellularnetworks facilitates data prioritization, that is prioritizing data forfirst responders in a public safety environment while additionallyallowing simultaneous lower priority users to access additional networkbandwidth if available. Priority can mean capacity guarantees, decisionsregarding resolution of image, audio, video transmissions, or datadownload speeds. These management decisions can be applied to bothaccess and backhaul configurations.

Access and backhaul configurations can further utilize encryption toprovide secure data transmissions. Moreover, secured authorizationssimilar to those used by VPN can be implemented. Ad hoc cellular basestations executing the methods described herein have a memory withintheir architecture. As such, they are able to cache data packets. Ifthere is a path failure, these cached data packets can be retransmitted.In addition, authentication credentials can be cached. These too can beused to reauthenticate in the event of a path loss or a network failure.

FIG. 2 shows an architectural rendering upon which the methods of thepresent invention could be executed. This diagram is merely exemplaryand is not intended to be limiting with respect to the type or number ofhardware elements. Similarly, although FIG. 2 shows a public safetycommunication scenario, the teachings of this application are notlimited to the public safety sector. Those of skill in the art willrecognize its applicability to myriad communication networks, includingwithout limitation, people working in an oil field, a mine, on amilitary base, a news crew covering local events, at an airport, at aseaport, for a support crew that needs to provide lots of bandwidth andimprove cell efficiency, in rural locations, and the like. Theapplicability of the embodiments disclosed herein therefor apply tomilitary, consumer, business, and public safety networks.

The embodiments described herein enhance network coverage by creatingand maintaining an ad hoc cellular network, or extending the range of afixed network. They also create a multi-dimensional heterogeneousnetworks having redundancy and autonomy. When the ad hoc cellular basestations utilizing embodiments discussed herein establishes or enhancesa fixed cellular network, it they so by seamlessly integrating into thefixed network topology. If there is an existing fixed network, themethods disclosed herein provide a means of automating the integrationof the ad hoc cellular into an existing fixed network. This is currentlydone by humans as part of network planning and implementation. Theoverall orchestration of adding to an existing fixed network, both fromthe standpoint of connecting the two networks, and from the standpointof managing the combined networks is a labor intensive process that isautomated by the method embodiments of this invention.

These embodiments could be executed and run on networks having atopology similar to that depicted in FIG. 2 or on any wirelesscommunication network incorporating an ad hoc cellular base station nodeinto the network, whether that base station is still moving or it hasbecome stationary.

Assume that FIG. 2 depicts an emergency scene where first respondershave been called to the scene of a building 230 fire. In terms of thewireless network capabilities near the burning building 230, there is amacro tower 202 providing cellular service to land-mobile radios forpublic safety individuals via a backhaul connection 210 from the macrotower 202 to an ad hoc cellular base station 220. A secondary backhaulconnection 208 could also be established between ad hoc cellular basestation 220 and a fixed base station 207. In this architecture, thefixed base station 207 could be a fixed base station or an ad hoccellular base station. The fixed base station 207 could becommunicatively coupled to a computing cloud component 204 via backhaulconnection 206.

Additional variations of this topology include additional ad hoc nodes222 and 224, the absence of the fixed node 207 and/or the absence ofmacro tower 202. In addition, although FIG. 2 shows three ad hoccellular base stations 220, 222, and 224, the methods of this inventioncan be executed on a single ad hoc cellular base station. The computingcloud component 204 could be an external server as pictured in FIG. 2,as well as an internal processor located within an ad hoc cellular basestation 220. Some of the embodiments discussed herein could be executedon an external computing cloud component 204 or on an internalprocessor, as will be described below.

Assume for purposes of this example that the fire fighters and policeofficers share the macro tower 202, either by sharing a base stationmounted on the tower or by mounting two independent base stations, oneproviding coverage to the fire fighters and one providing coverage tothe police officers. When the first responders arrive at the scene theynotice that the macro coverage boundary 212 does not reach inside of theburning building 230. This means, once they are inside of the building230, they will not have external cellular network connectivity. If theirradios do not have applications that allow them to function inpeer-to-peer mode or if those radios do not have transmit and receivecapabilities that would work anywhere in the building, the firstresponders will not be able to communicate with one another.

When the ad hoc cellular base station 220 is en route to the burningbuilding 230, it could have a backhaul configurations, such as LTE orWi-Fi, which would allow it to provide an access signal having forexample Wi-Fi as the access configuration to individuals within thevehicle containing the ad hoc cellular base station 220. Applicants notethat the methods described herein could be executed on a computerreadable medium located within the ad hoc cellular base station 220, onanother device in the exiting wireless network, on a computing cloudcomponent 204, or on a fixed base station 207.

FIG. 3 shows an architectural diagram of an ad hoc cellular base station300 having a computer readable medium therein where method embodimentscan be stored and executed on the hardware depicted therein. For ease ofexplanation, we refer to an ad hoc cellular base station 300 whendiscussing the architecture of FIG. 3 with the understanding thatsimilar architecture could be present in a fixed base station 207. Andthe method embodiments discussed herein could likewise be executed oneither an ad hoc cellular base station 300 or a fixed base station 207.

Referring to FIG. 3, the ad hoc base station 300 depicted thereinincludes two isolated backhaul radios 310, 312, a GPS receiver coupledto a GPS antenna, “GPS” 314, a Wi-Fi radio 322, an application processor324, a baseband processor 334, a memory 336, two additional backhaulradios 330, 332, which in one embodiment could be a 10 Gigabit Ethernetbackhaul, an expansion slot 320, and isolated access radios 340. Limitedcore network functionality could be stored within the applicationprocessor 324. As previously discussed, isolated backhaul radios 310,312 and isolated access radios 340 could be hardware configured totransmit within at least one of the following: 2G, 3G, 4G, LTE, Wi-Fi,high speed Wi-Fi, TV white space, satellite, Bluetooth, ZigBee, FDD,TDD, full duplex, wired or wireless backhaul, and licensed andunlicensed spectrum.

In some embodiments and without limitation, hardware configurationscould be as follows. At least one access radio 340 could be a 20 MHz 2×2MIMO LTE radio transmitting at 1 W of power. A second access radio 340could be a Wi-Fi access radio, 3×3 MIMO WPA 2 Enterprise. One of thebackhaul radios 310 could be a multi radio mesh, up to 3×3 MIMO, 40 MHzwide, and WPA 2 enterprise grade encryption, another example of abackhaul radio could be cellular backhaul radios. The ad hoc cellularbase station 300 could also include connectors for long haul linksupport and antennas. In some embodiments antennas could be highgain/narrow beam or omni/sectored antenna, or omni antennas. Moreover,the hardware depicted in FIG. 3 is tunable, and, therefore capable oftransmitting and receiving on numerous frequencies. The applicationprocessor 324 is capable of hosting limited core functionality andapplication servers. In embodiments described herein the ad hoc mobilecellular base station could be in a vehicle, an airplane, a drone, ahelicopter, a hot air balloon, a train, a motorcycle, a snow mobile, arobot, on a person, on an animal, or any entity that is capable ofmotion.

The limited core network functionality could include at least one of thefollowing network operation functions: paging, handover, authentication,location management, SGW selection, radio resource management, mobilitymanagement, roaming management, tracking area management, mobilityanchor, lawful interception, policy enforcement, packet filtering,charging, or providing an anchor between 3GPP and non 3GPP technologies.

FIG. 4 depicts a method of establishing an ad hoc cellular networkhaving an ad hoc cellular base station or integrating an ad hoc cellularbase station into a fixed cellular network In one embodiment, thesemethod steps could be stored on a computer readable medium either in anad hoc cellular base station 300 or in a computer readable medium thatis accessible to an ad hoc cellular base station, such as a computingcloud component 204.

In the method of this embodiment, the first step could be analyzing 402a speed of the ad hoc cellular base station 300. This analysis could beperformed by using a velocity measurement obtained from GPS 314, byusing location data or direction data of the ad hoc cellular basestation 300 as a function of time, to determine if the ad hoc cellularbase station 300 has become stationary. Once the ad hoc cellular basestation 300 becomes stationary, the computer readable medium in aprocessor 324 could query 404 a local or remote cache to determine anaccess configuration or a first backhaul configuration to be used by thead hoc cellular base station 300.

As discussed, the access configuration or backhaul configuration couldbe at least one of the following: 2G, 3G, 4G, LTE, Wi-Fi, high speedWi-Fi, TV white space, satellite, Bluetooth, ZigBee, FDD, TDD, fullduplex, wired or wireless backhaul, and licensed and unlicensedspectrum. In some embodiments, the choice of which access configurationor backhaul configuration could be related to an available power sourcefor the ad hoc cellular base station 300. For example, if the ad hoccellular base station 300 is connected to a car battery, it likely hasmore transmit and receive power than if it is connected to a batterycell. The amount of available power, limited by battery life, could be afactor used to determine which access or backhaul configuration shouldbe used. Moreover, this decision could be made dynamically becauseavailable power may change.

After querying the local or remote cache, the processor 324 couldreceive 406 an access configuration or a backhaul configuration. Theprocessor 324 may then evaluate 408 an operational parameter anddetermine 410 if the access configuration or the backhaul configurationshould be updated. Once a final access configuration or backhaulconfiguration is chosen, the ad hoc cellular node 300 could transmit 460an access signal or a backhaul signal.

In an alternate embodiment, the access configuration and the backhaulconfiguration could be within the same frequency and band or exactly thesame frequency and band, e.g., LTE Band 14 used for access and backhaul.In another alternate embodiment, the access configuration or thebackhaul configuration could be full duplex. In a variation of thisembodiment, a second ad hoc cellular base station could be added to thead hoc cellular network. In this embodiment, the ad hoc cellular basestation could establish a second backhaul connection between itself andthe second ad hoc cellular base station. This second backhaul link couldhave a cellular or mesh protocol.

In an additional embodiment, the access or backhaul configuration couldbe determined based on an operational parameter. In yet anotherembodiment, the ad hoc cellular base station could authenticate a userequipment within the ad hoc cellular network by using information froman already authenticated user concerning additional users within the adhoc cellular network. This already authenticated user may, for example,have identifying information about other users within the ad hoccellular network.

Referring again to FIG. 4, in an alternate embodiment after transmitting460 an access or a backhaul signal, the ad hoc cellular base stationcould receive 420 a second location, a second mobility state, or asecond travel direction for a second ad hoc cellular base station. Oncethe processor receives 420 this information, it can evaluate 422 thebackhaul configuration, the access configuration, the second location,the second mobility state, or the second travel direction to determineif either the backhaul configuration or the access configuration shouldbe updated. After making this assessment, the ad hoc cellular node 300could transmit 424 an access or a backhaul signal using the access orbackhaul configuration or the updated access or backhaul configuration.

In an alternate embodiment, after transmitting 460 the access signal orthe backhaul signal, the ad hoc cellular base station could alter 430 apower level of one of its access radios or one of its backhaul radios.It could then use 432 a wireless mesh backhaul connection within the adhoc cellular network. The ad hoc cellular node could then alter 434 anantenna configuration so as to more optimally transmit upon a particularaccess configuration or a backhaul configuration.

In the situation where the ad hoc cellular base station is transitioningfrom a mobile state to a stationary state, it may have to readjust someof the operational parameters of its radio access or backhaul hardware.In that instance, the ad hoc cellular base station 300 may alter 430 apower level of an access or a backhaul radio in order to transmit orreceive over the access or backhaul configuration. In some embodiments,ad hoc cellular base stations 300 are equipped with a plurality ofantennas chosen to support the access and backhaul configurations forthat particular ad hoc cellular base station 300. When establishing anad hoc cellular network, the ad hoc cellular base station 300 could alsoalter 434 an antenna configuration, such as directionality, gain,frequency characteristics, and the like.

In an additional embodiment, the ad hoc cellular base station 300 coulduse query a local or remote cache to cross correlate a first accessconfiguration with a first location. After comparing the two, the ad hoccellular base station could choose an updated first access configurationbased upon information retrieved during its query. For example, the adhoc cellular base station could use geographic information to determinewhich service providers have the best coverage for that area. It could,in that instance choose an access or a backhaul configuration based onthis criterion. Similarly, a TV white space backhaul frequency could bechosen based on availability of spectrum in the particular geographiclocation. In an alternate embodiment, the ad hoc cellular base stationmay query the local or remote cache to discern whether other basestations are operating within its proximity and if so, it could adjustits power level so as to minimize interference.

Referring again to FIG. 4, after the ad hoc cellular base stationtransmits 460 an access signal or a backhaul signal, it couldcommunicate a decision to hand-off a data or voice session of a userfrom a source ad hoc cellular base station to a destination cellularbase station. The source ad hoc cellular base station could be the adhoc cellular base station 300 and the destination cellular base stationcould be a second ad hoc cellular base station or a fixed base station.Once this decision is made, the source ad hoc cellular base station andthe destination cellular base station could exchange handover messagingso as to effectuate the hand-over. In a similar embodiment, a hand-incould be performed from a source cellular base station to a destinationad hoc cellular base station. In this embodiment, the source cellularbase station and the destination ad hoc cellular base station couldexchange hand-in messaging information so as to effectuate the hand-in.In yet an additional embodiment, the hand-off messaging or the hand-inmessaging could further be exchanged with a core network.

In yet an additional embodiment, the ad hoc cellular base station 300could detect a coverage gap within the ad hoc cellular network. Afterdetecting this coverage gap, it could establish at least one wirelessbackhaul connection to a core network using one of its antennas having again of greater than 0 dB. Once this backhaul connection is established,the ad hoc cellular base station 300 could use the access configurationto transmit or receive signals on one of its access radios.

In an alternate embodiment, the ad hoc cellular base station 300 couldestablish a wireless backhaul link. A message flow for this embodimentis shown in FIG. 5. As can be seen in FIG. 5, in this embodiment a firstad hoc cellular base station 510 is communicatively coupled to a secondad hoc cellular base station 515. In addition to the architecturecomponents inherent in an ad hoc cellular base station 300, the secondad hoc cellular base station 515 has an internal processor 530 havinglimited core functionality 540 stored thereon.

FIG. 6 shows an ad hoc cellular network that could be used as anarchitectural basis for performing embodiments described with referenceto FIG. 7. Referring to FIG. 6, this ad hoc cellular network can providelocal wireless access service to users within range of the ad hoccellular network. In this ad hoc cellular network, there is a first adhoc cellular base station 610 and a second ad hoc cellular base station620. The first ad hoc cellular base station 610 and the second ad hoccellular base station 620 have a wireless backhaul connection 615. Thesecond ad hoc cellular base station 620 can optionally be to a computingcloud 630 via backhaul connection 625. The computing could 630 contain aserver 635 and a limited core network functionality processor 640. Thelimited core network functionality processor 640 has some or all of thefunctionality provided by a core EPC, namely functionality typicallyperformed by an HSS 641, a PCRF 642, an MME 643, an SGW 644, an LGW 646,or a PGW 645. The computing cloud 630 is also communicatively coupled tothe Internet 650 or in some embodiments to the core network 652. In analternate embodiment, the limited core functionality processor 640 canbe within the second ad hoc cellular base station 620. In oneembodiment, the first 610 and second cellular base stations 620 haveantennas having higher gain that the average gain in a cellulartelephone, also called user equipment.

In some embodiments at least one ad hoc cellular base station 620 canlocalize the functionality of the PGW 645 by creating a local PGW or LGW646. If user equipment being serviced by the ad hoc cellular basestation 620 creates a specific packet data network that is Local IPAccess enable, LGW 646 could act as a packet data network gateway byhandling the signaling to create a PDN connection. The packet datanetwork, in this embodiment, would be anchored on LGW 646. In thisembodiment, LGW 646 could allocate IP address to user equipment withinthe network. LGW 646 would also anchor these IP addresses. When theuplink data traffic is received by the ad hoc cellular base station 620,it could, using internal processors, route this traffic using LGW 646functionality. LGW 646 functionality has the advantage of optimizingtraffic paths and thereby reducing network overhead. One way this isaccomplished is, for example, if an ad hoc cellular base station 620receives data for more than one user equipment that it is servicing, LGW646 can route the traffic between these two device internally within thead hoc cellular network rather than through any other network elements.In this way, LGW 646 can create a peer-to-peer communication networkbetween these two user equipments. In some embodiments, trafficoptimization done by LGW 646 can improve data throughput by removing andcaching a protocol header that is typically passed on by existingunintelligent fixed cellular nodes. The choice of which ad hoc cellularbase station 610 or 620 is arbitrary and in subsequent embodiments, thearchitecture described with respect to the second ad hoc cellular basestation 620 could be resident on the first ad hoc cellular base station610 and vice versa.

The steps of this embodiment, shown in FIG. 7, are performed by thesecond ad hoc cellular base station 620. Turning to FIG. 7, the secondad hoc cellular base station 620 receives 710 a data packet from thefirst ad hoc cellular base station 610. Rather than forwarding the datapacket over a GTP-U tunnel, the second ad hoc cellular base station 620extracts 720 a tunnel overhead packet from the data packet, therebycreating a modified data packet. The second ad hoc cellular base station620 then stores 730 the tunnel overhead packet. It then forwards 740 themodified data packet to the processor 640, the processor in oneembodiment being located within the second ad hoc cellular base station620. In an alternate embodiment, the processor 640 could be located in acomputing cloud component 630. The processor 640, in conjunction withits limited core functionality, establish a bearer for messaging. Thefirst ad hoc cellular base station 610 then receives 750 from the secondad hoc cellular base station 620, an acknowledgement that bearerestablishment is complete. Lastly, the second ad hoc cellular basestation 620 anchors 760 an IP session to an external cellular network.

In an alternate embodiment of this method, the data packet could be aninitial attach request. In yet an additional alternate embodiment, themodified data packet could be forwarded to the EPC. These embodimentshave the advantage of eliminating tunnel overhead by extracting packetsfrom mobile nodes. In yet another embodiment of this method, the ad hoccellular network could provide situational awareness to a user withinthat network via either the first or second cellular base stations.Examples of situational awareness include without limitation: a locationof an ad hoc cellular base station, a direction or travel of an ad hoccellular base station, a mobility parameter for an ad hoc cellular basestation, an environmental parameter for an ad hoc cellular base station,a coverage map of an ad-hoc cellular base station, an environmentalparameter of a fixed base station, an operational parameter of a fixedbase station, a location of a fixed base station, or a location of auser.

Turning again to FIG. 7, in a further method beginning after theanchoring 760 has transpired, it is possible to monitor 770 the qualityof a backhaul connection to the core network to determine if it fallsbelow a threshold parameter. Threshold parameters could be measured bymeasuring a received signal strength indicator (“RSSI”). An additionalexample of a threshold parameter is set forth in the 3GPP standard36.104, the contents of which are hereby incorporated by reference. Thethreshold parameters according to that standard appear in the table6.2-1 of that standard, reprinted below. In this embodiment, the localarea base station quality thresholds apply.

BS class PRAT Wide Area BS — (note) Local Area BS ≤+24 dBm (for onetransmit antenna port) ≤+21 dBm (for two transmit antenna ports) ≤+18dBm (for four transmit antenna ports) Home BS ≤+20 dBm (for one transmitantenna port) ≤+17 dBm (for two transmit antenna ports) ≤+14 dBm (forfour transmit antenna ports) NOTE: There is no upper limit for the ratedoutput power of the Wide Area Base Station.

Additional examples of threshold parameters are data rate, interference,network load, congestion, and latency.

Referring again to FIG. 7, once the quality of the backhaul connectionhas fallen below a threshold parameter, the first 610 or second ad hoccellular 620 base station could provide 772 a local limited core networkto users within the ad hoc cellular network. In order to provide 772this local limited network, the first 610 or second ad hoc cellular basestation 620 could provide a minimal set of core network functionality touser equipment within the limited core network. A next step in providing774 local limited core network would be to authenticate users thereon byreceiving 776 authentication information from the core network. Examplesof authentication information could be SSID, IMEI, and the like. Thisauthentication information could be stored 778 in a memory and used 780to authenticate any users on the local limited core network.

In an alternate embodiment of this method, the ad hoc cellular networkcould be managed for example by an external computing cloud component,or by either the first ad hoc cellular base station or the second ad hoccellular base station. Management could include making decisions aboutpower levels, the ad hoc cellular base stations could also include avoice-over-IP applications including without limitation: push-to-talk,peer-to-peer communication, an ad hoc user nationwide dialing plan; anad hoc user international dialing plan, conference calling, or a speeddial list. The national or international dialing plans could be similarto the E 164 standard dialing plan. In this embodiment, the voiceapplication server could enable national or international calls betweenfirst responders in disparate locations. For example, a bridgeapplication server could bridge standard E 164 telephony users toemergency users and vice versa. These embodiments could be implementedin closed ad hoc networks of the present invention or in ad hoc cellularnetworks integrated into fixed cellular networks.

In an alternate embodiment of these methods, there could be a third adhoc cellular base station that come within range of the local limitedcore network. In this embodiment, the first or second ad hoc cellularbase station could detect the presence of this third ad hoc cellularbase station. In this embodiment, the third ad hoc cellular base stationcould also have a processor having limited core functionality storedthereon. The first and or second ad hoc cellular base station could usea wired or wireless backhaul connection to integrate the third ad hoccellular base station into the local limited core network. Thisintegration could transpire via exchanging messaging information betweenthe ad hoc cellular nodes. This messaging information could includenetwork operational parameters such as power output, access and backhaulconfigurations, routing tables, user authentication information, antennatransmission characteristics, and the like.

In an alternate embodiment of these methods, it may be the case that thequality of the backhaul connection to the core network is restored abovea threshold parameter. In that case, this embodiment could synchronizethe authentication information it has stored in local memory with an HSSor other core network device providing authentication for core networkusers.

In some situations it may be advantageous when an ad hoc cellular basestation arrives at a location to determine if there is a fixed cellularadequately supporting users within range. In this instance, the ad hoccellular base station may forego establishing an ad hoc cellular networkuntil a user within the existing network needs enhanced coverage. FIG. 8shows an architectural example of when this might occur. In FIG. 8, anad hoc cellular base station 830 may have just arrived at its presentlocation. When it arrives, it can activate internal receivers to assessthe network coverage area 850. The ad hoc cellular base station 830 canlisten to transmissions from the user equipment 840 to the tower 802. Inone embodiment, the ad hoc cellular base station 830 can transmit andreceive signals as though it were another user equipment within thenetwork coverage area 850. By configuring its messaging to appear asthough it is another user equipment, it is able to obtaincharacteristics and operational parameters over control channels aboutother user equipment within the network coverage area 850. Examples ofcharacteristics are: the location of the other user equipment 840, theperimeter of the network coverage area 850, the proximity of the userequipment 840 to the perimeter of the network coverage area 850.Examples of operational parameters are: interference characteristics,the existence of know “not spots,” channel availability, detecting ifthe user equipment 840 has sent a message to the tower 802 indicatingthat it requires more bandwidth, the user equipment's current data rate,the existence of other base stations within range of the tower 802 orthe ad hoc cellular base station 830 and whether the tower 802 hasgranted or denied a request for bandwidth. In these scenarios, the adhoc cellular base station 802 could determine that it would beadvantageous for it to enhance the existing network coverage zone byproviding an access signal for the user equipment 840.

FIG. 9 shows the steps of a method that allows an ad hoc cellular basestation 830 to enhance network coverage as needed. In this embodiment,the ad hoc cellular base station 830 receives 910 a message sent from auser equipment operating within an existing network coverage area,wherein the message is sent over a control channel or a bearer channel.The ad hoc cellular base station 830 then analyzes 920 a characteristicof the message and it analyzes 930 an operational parameter of theexisting cellular network 850. Based on these analyses, the ad hoccellular base station 830 determines 940 if it should enable, disable,or modify an existing access signal or an existing backhaul signal basedon the characteristic of the message or the operational parameter.

In an alternate embodiment, it may be advantageous to in the context ofan ad hoc cellular network for one ad hoc cellular base station to actas a local gateway. The steps of this embodiment are described withreference to FIG. 10. In this embodiment, a first ad hoc cellular basestation 610, which is providing local wireless access, could optimize1005 a data path by receiving 1010 a first data packet from a userequipment. The first ad hoc cellular base station 610, which has a localgateway 646 providing local wireless access, could remove 1020 a firstprotocol header from the data packet and store 1030 the first protocolheader in a memory. The first ad hoc cellular base station 610 couldreceive 1040 a second data packet from a second ad hoc cellular basestation 620 having a processor 640 with limited core networkfunctionality stored thereon. This second data packet may not have asecond protocol header attached thereto. Accordingly, the first ad hoccellular base station 610 could analyze 1050 a plurality of data packetheaders stored in memory in order to determine which one corresponds tothe second data packet. After finding the right data packet header, thefirst ad hoc cellular base station 610 could append the correct datapacket header to the second data packet.

In an alternate method directed toward network resiliency in the contextof an ad hoc cellular networks, and with reference to FIG. 11, a firstad hoc cellular base station 610 could establish 1110 a first primaryconnection with an existing cellular network. A second ad hoc cellularbase station 620 could establish 1120 a backhaul connection to the firstad hoc cellular base station 610. The second ad hoc cellular basestation 620 could also establish 1130 a second primary connection withthe existing network. The first ad hoc cellular base station 610 orsecond ad hoc cellular base station 620 could determine 1140 on anongoing basis if the quality of the first primary connection falls belowa threshold value. Threshold values could be determined by standardssuch as, without limitation, an RSSI or the 3GPP 36.104 standard. If thequality of the first primary connection does fall below a certainthreshold, the first primary connection could be replaced 1150 by thesecond primary connection.

FIG. 12 shows an exemplary wireless communication network within whichembodiments of the present invention could be implemented. In thisnetwork, a base station 1200 could be providing wireless services touser equipment 1210, 1212, 1214, 1216. Additionally, base station 1200could be mounted on a tower, a roof, a light pole, on the interior orexterior of a building, on a tripod, pole, ship mast, and so forth. Themounting configurations are numerous and do not affect the operabilityof the embodiments disclosed herein.

Base station 1200 could be a macro base station or a small cell basestation. These in turn could be fixed or ad hoc. It could be configuredto operate over a single frequency using a single protocol, or overmultiple frequencies, numerous protocols, different duplexing schemes,and different transport protocols, e.g., wired or wireless. Differentprotocols may include Wi-Fi, 2G, 3G, 4G, WCDMA, LTE, LTE Advanced,ZigBee, or Bluetooth. Different duplexing schemes may include timedivision, code division, and frequency division schemes. Disparatefrequency bands may include so-called “whitespace” VHF and UHF channels,cellular telephony bands, public safety bands, and the like.

Similarly, user equipment 1210, 1212, 1214, 1216 could include transmitand receive hardware configured to operate over a single frequency usinga single protocol or over multiple frequencies or multiple protocols ormultiple duplexing schemes. Although the user equipment 1210, 1212,1214, 1216 is depicted as a mobile telephone, those of skill in the artwill recognize that the user equipment 1210, 1212, 1214, 1216 could be asmartphone or any electronic device having transmit and receive hardwareconfigured to operate within a cellular network.

As those of skill in the art will recognize, signal quality within awireless network is dependent upon many things, e.g., distance betweenthe base station and the user equipment, power level of the basestation, interference within the network, the capacity of the basestation in conjunction with the demand being placed upon the basestation, weather conditions, and so forth. Referring to FIG. 12, at onepoint in time, base station 1200 may be providing adequate service touser equipment 1210, 1212, 1214, 1216. At a later point in time, thelevel of service base station 1200 provides may be degraded ornon-existent if, for example, base station 1200 ceases functioning.

In this invention, we provide embodiments that enable ad hoc cellularbase station functionality within a user equipment 1210, 1212, 1214,1216 when the connection quality 1220, 1222, 1224, 1226 falls below athreshold value. In one embodiment, depicted in FIG. 13, a userequipment 1214 could measure 1300 a connection quality 1224 betweenitself and the base station 1200. An example of connection quality 1224could be received signal strength indicator (“RSSI”), data rate, errorrate, congestion, latency, network load, and the like. The userequipment 1214, using internally stored computer readable logic, couldthen analyze the connection quality 1224 to determine 1310 if it isbelow a threshold value. One example of a threshold value could be thethreshold defined within standards that would trigger a handoff of auser equipment from one base station to another.

If the connection quality 1224 is below a threshold value, the userequipment 1214 could enable 1320 its internal ad hoc cellular basestation functionality. FIG. 14 shows an architectural depiction of auser equipment 1400. In this embodiment, there is a radio transceiver1410, which could be hardware configured to transmit or receive overmyriad frequency bands, protocols, duplexing schemes, for example Wi-Fi,Bluetooth, TV White Space and the like. Of note, the band capabilitiesof the transmit hardware and the receive hardware are equivalent. Assuch, a user equipment having this transceiver 1410 architecture couldperform reverse banding. Additionally, user equipment includes a 2G, 3G,or 4G transceiver 1412, a memory 1430, a display 1432, a user interface1434, a power source 1440, a processor 1420, an audio processing module1422, a reverse banding processing module 1424.

The ability to perform reverse banding is part of the ad hoc cellularbase station functionality of the disclosed embodiments. When ad hoccellular base station functionality is enabled, the transmit and receivepaths of the user equipment are switched using internal logic thatcould, for example, be stored in a memory on the user equipment or couldbe embedded within an application “app” on the user equipment. In thisscenario, if for example, user equipment 1400 had a downlink connectionwith base station 1200 over an 800 MHz channel it would be receivingover that 800 MHz channel. If user equipment 1400 had an uplinkconnection with the base station over a 900 MHz channel, it would betransmitting to the base station 1200 over a 900 MHz channel. In thisscenario, user equipment 1400 is a client of base station 1200.

In some embodiments, user equipment 1400 can have an embedded EPC storedin its processor 1420 or as a separate module. In this embodiment, userequipment 1420 could provide some network functionality in the absenceof a backhaul link to a core network.

When ad hoc cellular base station functionality is enabled on the userequipment 1400, these roles are reversed. That is, user equipment 1400becomes a server within the network to other user equipment. As aserver, user equipment 1400 will now transmit over an 800 MHz channel,which creates a downlink connection between itself and its client userequipment. User equipment 1400 becomes a server for the network insteadof a client within the network. As a server, user equipment 1400receives over a 900 MHz channel so that it can provide an uplinkconnection to its clients. In some embodiments, user equipment 1400 isable to receive calls even while it is acting as an ad hoc cellular basestation.

In some embodiments, ad hoc cellular base station functionality couldalso include increasing transmit power of the user equipment 1400 so asto extend its coverage area. In additional embodiments, the userequipment 1400 could include a back-up battery or additional powersource to enable it to provide greater range for a longer duration whenit has enabled its ad hoc cellular base station functionality. In analternate embodiment, user equipment 1400 could reduce its bandwidth inorder to conserve batter power. In an additional embodiment, userequipment 1400 could reduce the amount of data services it provides toclient user equipment in order to conserve batter power.

In some embodiments where there is more than one user equipment 1210,1212, 1214, 1216 having ad hoc cellular base station functionality, thedecision as to which user equipment 1210, 1212, 1214, 1216 should enable1320 ad hoc cellular base station functionality could be made by usingan arbitration protocol. The arbitration protocol could consider batterylife, transmission power, the number of nodes or additional userequipment 1210, 1212, 1214, 1216 having a direct connection to the userequipment 1210, 1212, 1214, 1216 contemplating enabling 1320 ad hoccellular base station functionality, processor speed, processor ability,memory capacity, hardware configuration, transmit or receivecharacteristics, antenna characteristics, and similar characteristicsknown to those of skill in the art when evaluating base stationcapabilities.

Turning to FIG. 15, in the methods of this embodiment, more than oneuser equipment work together in deciding whether to enable ad hoccellular base station functionality. In this embodiment, a first userequipment 1214 measures 1510 a first connection 1224 quality betweenitself and base station 1200. In addition, a second user equipment 1212measures 1520 a second connection 1222 quality between itself and basestation 1200. First user equipment 1214 and second user equipment 1212could then store the first connection 1224 quality and the secondconnection 1222 quality measurements in their respective internalmemories. Using internally programmed logic and its respective internalprocessor, first user equipment 1214 and second user equipment 1212could determine 1530 if the first connection 1224 quality and the secondconnection 1222 quality is below a threshold value. If neither of theconnection quality measurements is below a threshold value, first userequipment 1214 and second user equipment 1212 could continue to monitorthe quality of their respective connections to base station 1200.

If, on the other hand, either first connection 1224 quality or secondconnection 1222 quality is below a threshold value, first user equipment1214 and second user equipment 1212 could establish 1540 a meshcommunication link between them. In one embodiment, this meshcommunication link could be established 1540 using an ad hoc Wi-Fiprotocol. Once the first user equipment 1214 and the second userequipment 1212 have established 1540 a communication link between them,they can notify each other of the low quality of one or both of theirconnections to base station 1200.

Ultimately, first user equipment 1214 or second user equipment 1212 willenable ad hoc cellular base station functionality. We propose severalembodiments governing how the user equipment 1214, 1212 will communicatewith one another to arbitrate which should enable ad hoc cellular basestation functionality. In a first embodiment, first and second userequipment 1214, 1212 could determine which of them has a lowerconnection quality. Whichever is lower, could enable ad hoc cellularbase station functionality. Additional criteria in additionalembodiments could include: which has more batter power, a betterprocessor, more transmit capabilities, which has a direct connection tothe greatest number of neighboring user equipment, which has a higherconnection quality, and the like.

As part of the negotiation regarding which will enable ad hoc cellularbase station functionality, first user equipment 1214 and second userequipment 1212 could exchange authentication information. In oneembodiment, this authentication information could be obtained from thecore network if either first or second user equipment 1214, 1212 stillhas connectivity with base station 1200. In this embodiment, the firstor second user equipment 1214, 1212 could obtain authenticationinformation for a plurality of neighborhood user equipment, for exampleuser equipment 1210 and 1216. In this way, when first or second userequipment 1214, 1212 begins serving additional neighborhood userequipment 1210, 1216 it will have sufficient information to performauthentication. Authentication information in the core could be storedin an HSS, EPC, or similar location. Additionally, base station 1200 mayhave some local EPC functionality whereby it could also storeauthentication information. User equipment 1210, 1212, 1214, 1216 couldalso in alternate embodiments have a micro EPC stored within.Authentication could also be performed between user equipment 1210,1212, 1214, 1216 having internal subscriber identity module (“SIM”)cards and the like.

In an alternate embodiment, when the first and second user equipment1214, 1212 establish 1540 a mesh communication link between them, theycould also establish using internally stored computer readable logic, arouting table for themselves and particularly for other neighborhoodnodes. Although this embodiment has been described with reference to afirst and second user equipment 1214, 1212 establishing 1540 a meshcommunication link, those of skill in the art will recognize that userequipment 1210 and 1216 could also participate in any or all of thesteps of the methods described with reference to FIG. 15.

After first user equipment 1214 and second user equipment 1212, or inalternate embodiments a plurality of user equipment, have determinedwhich among them will enable 1550 ad hoc cellular base stationfunctionality, the chosen user equipment 1214 or 1212 enables 1550 adhoc cellular base station functionality.

Of note, after user equipment 1214 or 1212 enables 1550 ad hoc cellularbase station functionality, it is a server for those user equipment1210, 1216 and 1214 or 1212 within its neighborhood who are notreceiving adequate coverage from base station 1200. That said, userequipment 1214 or 1212 is still able to fill a client role with respectto itself, base station 1200 or any other server that may be withinrange of user equipment 1214. By this, we mean, if user equipment 1214or 1212 receives a call after it has enabled 1550 ad hoc cellular basestation functionality, it will service that call to itself in the sameway that it would service a call between user equipment 1210 and userequipment 1216. Internal contention protocols within user equipment1214, 1212 and reverse banding enable this functionality.

Once a user equipment has enabled ad hoc cellular base stationfunctionality, user equipment within the network could continue tomonitor the availability and connection quality of a link to a basestation having core connectivity. Additionally, with reference to FIG.13, assuming that user equipment 1210, 1212, 1214, 1216 have created anad hoc cellular network wherein user equipment 1212 is the servicingentity, in additional embodiments, the user equipment 1210, 1212, 1214,1216 would continue to monitor network conditions and the real-timelocations of each of the user equipment 1210, 1212, 1214, 1216 todetermine if an additional user equipment should enable 1550 ad hoccellular base station functionality.

If, for example, user equipment 1212 was providing service to userequipment 1214 and 1216 and they began to move out of range of userequipment 1212, user equipment 1212 could initiate a handoff procedurewith user equipment 1214 or 1216. This handoff could occur when userequipment 112 is servicing a call involving one or both of userequipment 1214 or 1216, or when user equipment 1214 or 1216 is in idlemode.

In alternate embodiments, user equipment 1210, 1212, 1214, 1216 canperiodically monitor their connection quality 1220, 1222, 1224, 1266with base station 1200. If the connection quality 1220, 1222, 1224, or1226 with base station 1200 exceeds a threshold quality, user equipment1210, 1212, 1214, or 1216 could initiate a reconnection to base station1200 In this embodiment, if a user equipment is providing ad hoccellular base station functionality, it could disable that functionalityby for example and without limitation handing off in-progress calls orproviding base station 1200 with up-to-date authentication information.In one embodiment, the user equipment 1210, 1212, 1214, 1216 would handoff in progress calls to base station 1200. It could then disable its adhoc cellular base station functionality and return to user equipmentfunctionality. In another embodiment, the user equipment 1210, 1212,1214, 1216 could disable ad hoc cellular base station functionality andreturn to user equipment functionality without handing off in progresscalls.

In an alternate embodiment, shown in FIG. 16, a user equipment 1210 maydetermine that its connection quality is waning, but its internal logicmay be programmed such that the user equipment 1210 observes networkcharacteristics and operational parameters within the network beforeenabling ad hoc cellular base station functionality. In an embodiment,the decision of whether to enable ad hoc cellular base stationfunctionality could depend on a network characteristic or an operationalparameter. The steps of these embodiments are shown in FIG. 16.

As can be seen in FIG. 16, a user equipment 1210 measures 1610 itsconnection quality with base station 1200. After making thismeasurement, user equipment 1210 determines 1620 if the connectionquality is below a threshold. If it is, the user equipment 1210 measures1630 a network characteristic or an operational parameter. Networkcharacteristics could be, without limitation: the location of the otheruser equipment 1212, 1214, 1216 the perimeter of the network coveragearea, the proximity of the user equipment 1212, 1214, 1216 to theperimeter of the network coverage area. Examples of operationalparameters are: radio frequency, mobility, network load, networkconfiguration, access configuration, backhaul configuration,interference, power level, the existence of know “not spots,” channelavailability, detecting if the user equipment 1212, 1214, 1216, has senta message to the core network indicating that it requires morebandwidth, the user equipment's 1212, 1214, 1216 current data rate, theexistence of other base stations within range, and whether the corenetwork has granted or denied a request for bandwidth. In thesescenarios, the user equipment 1212 could determine 1640 that it would beadvantageous for it to enhance the existing network coverage zone byproviding an access signal for the user equipment 1212, 1214, 1216. Inone embodiment, this determination could be made based upon a networkcharacteristic or an operational parameter.

In yet an alternate embodiment, it may be the case that two userequipment(s), which are being serviced by different base stations, maywant to create a backhaul link between them. In this embodiment, shownin FIG. 17, base station 1710 may be providing service over an AT&Tnetwork, while base station 1740 could be providing service over aVerizon network. User equipment 1720 may be a client of base station1710, while user equipment 1730 is a client of base station 1740.Depending on network conditions, operational parameters, network load,and the like, it may be advantageous to create a unified AT&T andVerizon network. This could be accomplished in one embodiment byenabling ad hoc cellular base station functionality within userequipment 1720 and 1730. Once ad hoc cellular base station functionalityhas been enabled, user equipment 1720 could form a backhaul link withuser equipment 1730. In addition, user equipment 1720 could form abackhaul link with base station 1710; and user equipment 1730 can form abackhaul link with base station 1740. In this way, the devices of FIG.17 can create a combined AT&T and Verizon network. The choice of AT&Tand Verizon is an arbitrary choice and could be any of a number ofservice providers, frequencies, protocols, duplexing schemes, and thelike in alternate embodiments.

The foregoing discussion discloses and describes merely exemplaryembodiments of the present invention. In additional embodiments, themethods described herein can be stored on a computer readable mediumsuch as a computer memory storage, a compact disk (CD), flash drive,optical drive, or the like. Further, the computer readable medium couldbe distributed across memory storage devices within multiple servers,multi-RAT nodes, controllers, computing cloud components, mobile nodes,and the like. As will be understood by those skilled in the art, thepresent invention may be embodied in other specific forms withoutdeparting from the spirit or essential characteristics thereof. Forexample, wireless network topology can also apply to wired networks,optical networks, and the like. Various components in the devicesdescribed herein may be added, removed, or substituted with those havingthe same or similar functionality. Various steps as described in thefigures and specification may be added or removed from the processesdescribed herein, and the steps described may be performed in analternative order, consistent with the spirit of the invention.Accordingly, the disclosure of the present invention is intended to beillustrative, but not limiting of the scope of the invention, as well asother claims. The disclosure, including any readily discernible variantsof the teachings herein, defines, in part, the scope of the foregoingclaim terminology.

What is claimed is:
 1. A computer implemented method of providing ad hoccellular base station coverage using a user equipment comprising:measuring at a first user equipment in communication with a basestation, a first connection quality between the first user equipment andthe base station; measuring at a second user equipment in communicationwith the base station, a second connection quality between the seconduser equipment and the base station; determining if the first connectionquality or the second connection quality is less than a threshold value;establishing a mesh communication link between the first user equipmentand the second user equipment; enabling an ad hoc cellular base stationLong Term Evolution (LTE) eNodeB functionality within the first userequipment or the second user equipment based on the determinationwhether the first connection quality or the second connection quality isless than the threshold value; and connecting as an eNodeB to a corecellular network via a mesh backhaul link from the ad hoc cellular basestation at the first user equipment or the second user equipment to asecond base station, thereby providing wireless connectivity to one ormore users via the LTE eNodeB functionality at the ad hoc cellular basestation.
 2. The computer implemented method of claim 1, wherein the meshcommunication link is over a Wi-Fi network.
 3. The computer implementedmethod of claim 1, further comprising: receiving an authenticationinformation from a core network database having core authenticationinformation stored therein; storing the authentication information intoa memory within the first user equipment or the second user equipment;and using the authentication information to authenticate a first userequipment or second user equipment.
 4. The computer implemented methodof claim 1, further comprising running an arbitration protocol todetermine whether the first user equipment or the second user equipmentshould enable the ad hoc cellular base station functionality within thefirst user equipment or the second user equipment.
 5. The computerimplemented method of claim 1, further comprising monitoring the firstconnection quality and the second connection quality to determine ifeither falls below a threshold level to determine if the first userequipment or the second user equipment should disable the ad hoccellular base station functionality operating therein.
 6. The computerimplemented method of claim 5, further comprising handing offin-progress calls to a base station before disabling the ad hoc cellularbase station functionality.
 7. A computer implemented method ofproviding ad hoc cellular base station coverage using a first userequipment comprising: measuring at the first user equipment incommunication with a base station a connection quality between the firstuser equipment and the base station; determining if the connectionquality is less than a threshold value; measuring at the first userequipment a network characteristic or an operational parameter; anddetermining whether to enable an ad hoc cellular base stationfunctionality within the first user equipment based on the measurednetwork characteristic or the measured operational parameter.
 8. Thecomputer implemented method of claim 7, further comprising providing adhoc cellular base station coverage using the first user equipment and asecond user equipment comprising: enabling an ad hoc cellular basestation functionality within the first user equipment and the seconduser equipment; and creating a backhaul connection between the firstuser equipment and the second user equipment.
 9. A first user equipmentconfigured to provide ad hoc cellular base station coverage comprising:transmit hardware; receive hardware; a power source; a memory; and aprocessor having computer readable software stored therein that causesthe first user equipment to: measure at the first user equipment incommunication with a base station a connection quality between the firstuser equipment and the base station; determine if the connection qualityis less than a threshold value; and enable an ad hoc cellular basestation functionality within the first user equipment based on thedetermination of whether the connection quality is less than a thresholdvalue.
 10. The first user equipment of claim 9, wherein the computerreadable software further causes the first user equipment to: measure ata second user equipment a second connection quality between the seconduser equipment and the base station; determine if the first connectionquality or the second connection quality is below a threshold value;establish a mesh communication link between the first user equipment andthe second user equipment; and enable an ad hoc cellular base stationfunctionality within the first user equipment or the second userequipment.
 11. The user equipment of claim 9, wherein the meshcommunication link is over a Wi-Fi network.
 12. The first user equipmentof claim 9, wherein the computer readable software further causes thefirst user equipment to: receive an authentication information from acore network database having core authentication information storedtherein; store the authentication information into a memory within thefirst user equipment or the second user equipment; and use theauthentication information to authenticate the first user equipment orthe second user equipment.
 13. The first user equipment of claim 9,wherein the computer readable software further causes the first userequipment to run an arbitration protocol to determine whether the firstuser equipment or the second user equipment should enable the ad hoccellular base station functionality within the first user equipment orthe second user equipment.
 14. The first user equipment of claim 9,wherein the computer readable software further causes the first userequipment to monitor a first connection quality and a second connectionquality to determine if the first user equipment or the second userequipment should disable the ad hoc cellular base station functionalityoperating therein.
 15. The first user equipment of claim 14, wherein thecomputer readable software further causes the first user equipment tohand off in-progress calls to the base station before disabling the adhoc cellular base station functionality.
 16. The first user equipment ofclaim 14 wherein the computer readable software further causes the firstuser equipment to: enable an ad hoc cellular base station functionalitywithin a first user equipment and a second user equipment; and create abackhaul connection between the first user equipment and the second userequipment.