Methods of incorporating an ad hoc cellular network into a fixed cellular network

ABSTRACT

In this invention, we disclose methods directed toward integrating an ad hoc cellular network into a fixed cellular network. The methods disclosed herein automate the creation and integration of these networks. In additional embodiments, we disclose methods for establishing a stand-alone, ad hoc cellular network. In either of these implementations, we integrate or establish an ad hoc cellular network using mobile ad hoc cellular base stations configured to transmit and receive over a variety of frequencies, protocols, and duplexing schemes. The methods flexibly and dynamically choose an access or backhaul configuration and radio characteristics to optimize network performance. Additional embodiments provide for enhancing an existing network&#39;s coverage as needed, establishing a local network in the event of a loss of backhaul coverage to the core network, and providing local wireless access service within the ad hoc cellular network.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to the following U.S. ProvisionalPatent Applications: No. 61/765,729, entitled “Situation Aware MobileWireless Base Station for First Responders,” filed Feb. 17, 2013 U.S.Provisional Patent Application No. 61/858,035 entitled “Situation AwareMobile Wireless Base Station for First Responders with RSSIMeasurement,” filed on Jul. 24, 2013; U.S. Provisional PatentApplication No. 61/926,620 entitled “Situation Aware Mobile WirelessBase Station for First Responders,” filed on Jan. 13, 2014, U.S. patentapplication Ser. No. 14/183,176 entitled “Methods of Incorporating an AdHoc Cellular Network into a Fixed Cellular Network,” filed on Feb. 18,2014, and PCT Application No. PCT/US2014/16938 entitled “Methods ofIncorporating an Ad Hoc Cellular Network into a Fixed Cellular Network,”filed on Feb. 18, 2014, the entire contents of which are herebyincorporated by reference.

FIELD

The present invention relates generally to wireless multimediatelecommunications. More specifically, this invention relates to methodsof incorporating an ad hoc cellular network into an existing fixedcellular network.

BACKGROUND

Historically, wireless networks have been homogeneous across severaldimensions: radio access technology, macro versus small cell or femtocell, and hub and spoke versus a mesh network. Each of these wirelesscommunication networks has its strengths and weaknesses. Fixed cellularmacro networks suffer from dead spots, storm related outages, impededcoverage in inclement weather, difficulty providing in-buildingcoverage, dropped calls on hand-overs, susceptibility to jamming, and soforth. Small cell access points have limited range. And mobile ad hocnetworks are good for a small team working on a joint mission, buthistorically these networks have been stand-alone.

Wireless multimedia services are typically delivered through a series ofmacro base stations placed on towers or other strategic locations. Thisarchitectural layout applies to civilian and public safety networks.Irrespective of the end-user, the demand being placed on macro networksis exceeding macro network capabilities. On the public safety side,interoperability among different public safety departments and ensuringreliable coverage in hard-to-reach zones, such as in-building, have alsobeen major challenges for the towns and municipalities that providewireless multimedia services to public safety officials.

Recently, civilian operators have been finding ways to enhance cellularnetwork coverage. For example, about 75% of all pro sports teams haveadded distributed antenna systems (“DAS”) to their venues as a way ofreducing the burden placed on the cellular macro network servicing thearena during game time. Although DAS enabled venues increase capacity,they are expensive to install and operate, and they do not providemobility. DAS systems do not add any intelligence to the network.Instead, they simply act as repeaters.

Stepping back, cellular networks are inherently pre-planned networks.They do not form in an ad hoc fashion like a military ad hoc network.Although military ad hoc networks have the advantage of being ad hoc,their flexibility is limited to data channels within the same frequencyband. In addition, military ad hoc networks do not integrate intoexisting cellular networks. Rather, they operate like independentislands.

When femto cells or repeaters are added to cellular networks, theirintegration is also preplanned. Femto cells provide cellular accessusing an Ethernet backhaul. Although they are moveable, they arenonetheless tied to a wired backhaul. Additionally, when a femto cell ismoved, the operator of the femto cell must reconfigure the reintegrationof the femto cell back into the existing network. In some femto cells,this reintegration can be accomplished by inputting the GPS coordinatesof the femto cell. In other femto cells, interference mitigation can beaccomplished by identifying any additional cellular base stations withinrange of the femto cell.

Repeaters are essentially amplifiers. Repeaters take the input signal,amplify it, and send it out. They do not change the frequency of theinput signal, the protocol of the input signal, the duplexing scheme ofthe input signal and so forth.

Looking forward, industry leaders believe that heterogeneous networkswill become more ubiquitous because they increase capacity.Heterogeneity, by its very definition, means being diverse in characteror content. In wireless communication networks of the prior art, thiscould mean adding a small cell to a macro network, the heterogeneitybeing combining a small cell with a macro cell.

Some of the challenges of integrating small cells into a macro cellularnetwork include: backhauling the traffic to the cell site, which can beexpensive and inefficient; finding a site for outdoor small cells; andmanaging a network filled with macro cells and small cells. This isheterogeneity at a base station level.

In another example, military radios may have channel diversity in thatthey could assign different channels to users within a network, eachchannel having a different frequency. This could be seen as frequencyheterogeneity or diversity. But the frequencies assigned within thisnetwork would all be within a particular frequency band. And so managingthis network is fairly straightforward because there is one owner forthe frequency band and therefore only one set of management principlesgoverning the frequency band.

While these examples show some heterogeneity in the prior art, there isa need for furthering the concept of heterogeneity because by doing so,network capacity increases markedly. Heterogeneity can and should existbeyond the base station level. Specifically, the prior art lacksheterogeneity at the network level, that is combining various networkstogether such as an ad hoc cellular network with a fixed cellularnetwork. There is therefore a need for managing ad hoc cellular networksin such a way as to seamlessly integrate them into and enhances thecoverage of existing fixed cellular networks. There is also a need fordynamically leveraging myriad frequencies, protocols, duplexing schemes.

SUMMARY OF THE INVENTION

In this invention, we disclose methods for establishing or integratingan ad hoc cellular network into an existing cellular network. When an adhoc cellular network is created as a stand-alone network, it is aheterogeneous network as that term is used herein. When the ad hoccellular network is integrated into a fixed cellular network, theresulting combination is also a heterogeneous network as that term isused herein.

The ad hoc cellular networks created herein can be established with asingle ad hoc cellular base station or with more than one ad hoccellular base stations. Ad hoc cellular base stations can be mobile orstationary. They can also be part of a semi-permanent installation. Thedifference between an ad hoc cellular base station and a fixed cellularnode or fixed cellular base station is, ad hoc cellular base stationscan be easily moved. They may remain at a particular location for manymonths, for example in a disaster recovery scenario, but they aredesigned to be moved easily. Fixed cellular base stations, on the otherhand, are part of a fixed infrastructure. Their installation typicallyrequires advanced planning. Their installation, is, therefore, not adhoc.

It is this fixed, advanced planning that the some of the methods of thedisclosed embodiments overcome by automating hardware settings toaccommodate varying operational parameters within a cellular network.Automating these procedures requires utilizing heterogeneous access andbackhaul hardware that can be adapted to fit the networkcharacteristics. It requires having the ability to dynamically alterhardware configurations in response to changing network dynamics.Accomplishing this requires measuring and analyzing network conditionsand altering hardware settings as a result of the analysis to provideoptimized ad hoc cellular networks.

Cellular base stations are traditionally deployed in fixed environments.Even mobile nodes known as Cell on Wheels (“COWS”) are merely portableversions of fixed base stations. As such, their addition to an existingnetwork requires careful planning, which can often mean reevaluating theoperational parameters of existing base stations within a particularneighborhood. This type of enhancement of a network requires substantialadvanced planning.

In contrast, the methods disclosed herein automate the integration of adhoc cellular base stations into an existing cellular network. Thisautomation accounts for managing the individual cellular base stationsand bringing a high-level, end-to-end orchestration to the combined adhoc and fixed cellular network. Even when embodiments described hereinare used to create an independent ad hoc cellular network, they measureand analyze the operational parameters of existing cellular networkswithin range to ensure that their creation does not deleteriously affectthe existing cellular networks within range.

The embodiments disclosed herein are executed on multi radio accesstechnology nodes, which we refer to throughout as “ad hoc cellular basestations.” Because the ad hoc cellular base stations incorporatemultiple access and backhaul radios, they are able to operate overnumerous frequencies, run a variety of protocols, use licensed orunlicensed spectrum, and use wired or wireless connectivity.

In embodiments of the invention, we disclose methods of establishing anad hoc cellular network having an ad hoc cellular base station orintegrating an ad hoc cellular base station into a fixed cellularnetwork comprising the steps of: analyzing a speed to determine amobility state of an ad hoc cellular base station; querying a local orremote cache stored in a computing server to determine a backhaulconfiguration or an access configuration for the ad hoc cellular basestation; receiving the backhaul configuration or the accessconfiguration for the ad hoc cellular base station from the local orremote cache; evaluating an operational parameter of a neighboringcellular base station; determining if the access configuration orbackhaul configuration should be updated based on the operationalparameter; and transmitting or receiving an access signal or a backhaulsignal using the access configuration or the backhaul configuration. Inan additional embodiment performing the previously listed steps, therecould also be a second ad hoc cellular base station further comprisingthe steps of: receiving from a local or remote cache a second location,a second mobility state, or a second travel direction for a second adhoc cellular base station within the ad hoc cellular network; evaluatingat least one of the backhaul configuration, the access configuration,the second location, the second mobility state, or a second traveldirection to determine if either the backhaul configuration or theaccess configuration should be changed to an updated backhaulconfiguration or an updated access configuration; and transmitting anaccess signal or a backhaul signal using the access configuration, theupdated access configuration, the backhaul configuration, or the updatedbackhaul configuration. In yet additional embodiments, the speed isdetermined by using location data or direction data for the ad hoccellular base station.

Alternate embodiments add to these embodiments the following: altering apower level of an access radio or a backhaul radio having transmit orreceive hardware configured to operate over the access configuration orbackhaul configuration; using a wireless mesh backhaul connection; andaltering an antenna configuration based upon an access configuration ora backhaul configuration. In additional embodiments, building on thesesteps there could be communicating a decision to hand-off a data orvoice session of a user being serviced by a source ad hoc cellular basestation to a destination cellular base station; and exchanging messaginginformation between the source ad hoc cellular base station and thedestination cellular base station. The could alternatively becommunicating a decision to hand-in a data or voice session of a userbeing service by a source cellular base station to a destination ad hoccellular base station; and exchanging messaging information between thesource cellular base station and the destination ad hoc cellular basestation.

In some embodiments the access signal or the backhaul signal use fullduplex wireless communication. In some embodiments there could beadditional steps of detecting a coverage gap; establishing at least onewireless backhaul connection to a core network using an antenna having again greater than 0 dB; and using the access configuration to transmitor receive signals on an access radio. There could also be a situationwhere the access configuration or the backhaul configuration isdetermined based on a power source of the ad hoc cellular base station.Alternatively there could be the access configuration or the backhaulconfiguration is determined based on an operational parameter of the adhoc cellular network.

In further embodiments building thereon, there could be methods furthercomprising the ad hoc cellular base station authenticating a userequipment by using an already authenticated user communicating withother users within the ad hoc cellular network or assigning a priorityto a user. An alternate embodiment could include a backhaul connectionof the ad hoc cellular base station to a cellular network is givenpriority treatment based on an operational parameter of the ad hoccellular base station. Additionally in some of these embodiments it ispossible to exchange messaging information with a core cellular network,or to establishing a second backhaul connection using either a cellularor a mesh protocol between the ad hoc cellular base station and a secondcellular base station.

In additional embodiments there could be a method of establishing an adhoc cellular network having an ad hoc cellular base station orintegrating an ad hoc cellular base station into a fixed cellularnetwork comprising the steps of: establishing a wireless backhaulconnection for an ad hoc cellular base station further comprising thesteps of: receiving a data packet from an ad hoc cellular base station;extracting a tunnel overhead packet from the data packet so as to createa modified data packet; storing the tunnel overhead packet in a memory;forwarding the modified data packet to a second ad hoc cellular basestation using an IP routing protocol; receiving an acknowledgement fromthe second ad hoc cellular base station indicating that an establishmentof a bearer is complete; and anchoring an IP session to shield anexternal network from a backhaul IP change.

In alternate embodiments the data packet is an initial attach request orthe modified data packet is forwarded to an evolved packet core. In analternate embodiment, there could be the ad hoc cellular networkproviding situational awareness to a local user with a softwareapplication or a central database by providing at least one of: alocation of an ad hoc cellular base station, a direction or travel of anad hoc cellular base station, a mobility parameter for an ad hoccellular base station, an environmental parameter for an ad hoc cellularbase station, a coverage map of an ad-hoc cellular base station, anenvironmental parameter of a fixed base station, an operationalparameter of a fixed base station, a location of a fixed base station,or a location of a user. In a further embodiment there could bemonitoring a quality of the backhaul connection to the core network todetermine if it falls below a threshold parameter; providing a locallimited core network to the ad hoc network if the backhaul connectionfalls below the threshold parameter further comprising the steps of: thead hoc cellular base station providing a minimal set of core networkfunctionality to a user equipment within the ad hoc network on an accesschannel; Receiving an authentication information from a core networkdatabase having core authentication information stored therein; Storingthe authentication information into a memory; and Using theauthentication information to authenticate the user equipment.

In an alternate embodiment there could be managing the ad hoc cellularnetwork; and providing a voice-over-IP application wherein thevoice-over-IP application is chosen from the group consisting of:push-to-talk, peer-to-peer communication, an ad hoc user nationwidedialing plan; an ad hoc user international dialing plan, conferencecalling, or a speed dial list. An additional embodiment could comprisethe steps of: a first ad hoc cellular base station detecting a third adhoc cellular base station wherein the third ad hoc cellular base stationhas a processor having a limited core network functionality; and using awired backhaul connection or a wireless backhaul connection to integratethe third ad hoc cellular base station into the ad hoc cellular networkwherein the integration is performed by exchanging messaging informationwith the second ad hoc cellular base station.

In yet an additional embodiment, there could further comprise the stepsof: determining if the quality of the backhaul connection to the corenetwork exceeds the threshold parameter; and synchronizing theauthentication information stored in the memory of the ad hoc cellularbase station providing the limited core functionality with the corenetwork database.

An alternate embodiment could be a method of establishing an ad hoccellular network having an ad hoc cellular base station or integratingan ad hoc cellular base station into a fixed cellular network comprisingthe steps of: receiving a message sent from a user equipment operatingin an existing cellular network, wherein the message is sent over acontrol or bearer channel; analyzing a characteristic of the message;analyzing an operational parameter of the existing cellular network;determining if an ad hoc cellular base station should enable, disable,or modify an access signal or a backhaul signal based on the analysis ofthe characteristic of the message or the operational parameter.

An additional embodiment could be a method of establishing an ad hoccellular network having an ad hoc cellular base station or integratingan ad hoc cellular base station into a fixed cellular network comprisingthe steps of: optimizing a data path wherein the optimizing furthercomprises: receiving a first data packet from a user equipment at afirst ad hoc cellular base station wherein the first ad hoc cellularbase station includes a local gateway providing local wireless access;removing a first protocol header from the first data packet; storing thefirst protocol header in a memory; receiving a second data packetwherein the second data packet was sent from a second ad hoc node havingprocessor with limited core network functionality stored thereon;analyzing a plurality of data packet headers stored in the memory inorder to determine which corresponds to the second data packet; andappending a second data packet header to the second data packet. In analternate embodiment there could be a local packet data network gateway(LGW). Additionally an embodiment could further comprise establishing aclosed network.

In an additional embodiment there could be a method of establishing anad hoc cellular network having an ad hoc cellular base station orintegrating an ad hoc cellular base station into a fixed cellularnetwork comprising the steps of: a first ad hoc cellular base stationestablishing a first primary connection with a core cellular network; asecond ad hoc cellular base station establishing a connection with thefirst ad hoc cellular base station; the second ad hoc cellular basestation establishing a second primary connection with the core cellularnetwork; determining if the quality of the first primary connectionfalls below a threshold parameter; and replacing the first primaryconnection with the second primary connection if the quality of thefirst primary connection falls below the threshold parameter. In someembodiments, the threshold parameter is determined by aggregating morethan one threshold parameter and averaging the aggregated thresholdparameters.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a prior art architectural rendering of a public safetycellular communication network.

FIG. 2 is an architectural rendering of a cellular communication networkupon which methods of the present invention could be executed.

FIG. 3 is an architectural rendering of an ad hoc cellular base stationupon which methods of the present invention can be executed.

FIG. 4 shows the steps of embodiments of methods for establishing an adhoc cellular network or integrating an ad hoc cellular network into afixed cellular network.

FIG. 5A shows a first portion of a message flow for establishing awireless backhaul connection in an ad hoc cellular network.

FIG. 5B shows a second portion of the message flow for establishing awireless backhaul connection in an ad hoc cellular network.

FIG. 6 is an illustration an architectural set-up upon which methods forestablishing an ad hoc cellular network or integrating an ad hoccellular network into a fixed cellular network could be performed

FIG. 7 shows steps of methods for establishing a wireless backhaulconnection for an ad hoc cellular base station.

FIG. 8 shows an architecture upon which methods of determining if an adhoc cellular base station should establish an ad hoc cellular network orenhance the coverage of a fixed cellular network could be performed.

FIG. 9 depicts steps for methods of determining if an ad hoc cellularbase station should enable, disable, or modify an access signal or abackhaul signal.

FIG. 10 shows steps for methods of optimizing a data path by providing alocal gateway.

FIG. 11 illustrates the steps of methods for creating redundant backhaulconnections within an ad hoc cellular network.

DEFINITIONS

Ad hoc cellular base stations can be mobile, stationary, or part of asemi-permanent installation. The difference between an ad hoc node and afixed cellular base station is ad hoc cellular base stations can beeasily moved. They may remain at a particular location for many months,but they are designed to be moved easily. Ad hoc cellular base stationsare dynamic, heterogeneous nodes. Ad hoc cellular base stations may havecomputer readable instructions stored in memory that allow them toseamlessly integrate into existing cellular networks or to providedlimited local wireless and core network functionality or services.

Ad hoc cellular network is a stand-alone network of ad hoc cellular basestations. These networks can be used by consumers, businesses, or forspecial purposes. Additionally they can be integrated into fixednetworks. They can provide coverage in rural areas. They can enhancecoverage of fixed networks. And they can be used to provide networkservices in areas where there is no network or where a natural orman-made disaster has destroyed part or all of a fixed network.

Cellular means operates within a standards compliant network.

Characteristic means the network quality experienced by a user, whichcan be affected by network load, congestion, latency, or capacity.

Destination ad hoc cellular base station means an ad hoc or fixedcellular base station that can receive a hand-in. A destination ad hoccellular base station can be stationary or mobile.

Dynamic heterogeneous node means a node that is able to dynamicallyalter an operational mode or an operational parameter.

Environmental condition means radio frequency interference, temperature,precipitation, or other weather related metric.

EPC means an evolved packet core.

Fixed cellular base stations or fixed cellular nodes or fixed basestations are part of a fixed infrastructure. Their installationtypically requires advanced planning, which means they are not ad hocbase stations or nodes.

Fixed cellular networks or fixed networks are comprised of fixedcellular base stations or fixed cellular nodes.

Heterogeneous means being diverse in character or content.

Heterogeneous network means a network that is diverse in at least one ofthe following operational modes: frequency, protocol, duplexing scheme,wired versus wireless connection, or licensed versus unlicensed spectrum

Heterogeneous node means a node that can establish a heterogeneousnetwork.

HSS means a home subscriber server.

Limited core network functionality means a processor having at least oneof the following functionalities: paging, handover, authentication,location management, SGW selection, radio resource management, mobilitymanagement, roaming management, tracking area management, mobilityanchor, lawful interception, policy enforcement, packet filtering,charging, or providing an anchor between 3GPP and non 3GPP technologies.

MME means mobility management entity.

Neighboring cellular base station could be a fixed base station or an adhoc base station.

Operational parameter means radio frequency, mobility, network load,network configuration, access configuration, backhaul configuration,interference, or power level.

PGW means a packet data network gateway.

PCRF means a policy and charging rules function.

PDN means a packet data network.

SGW means a switching gateway.

Source ad hoc cellular base station means an ad hoc or fixed cellularbase station from which a hand-off can be performed. A source ad hoccellular base station can be stationary or mobile.

DETAILED DESCRIPTION

FIG. 1 shows an exemplary diagram of a prior art public safetycommunication network 100 that facilitates two types ofcommunication—either through a tower 110 or peer-to-peer 120. In eitherof these communication modes, the public safety officer's radio must bewithin range of the tower 110, or of his peer 122. Being within range ofa receiving radio or base station is an inherent limitation of allwireless communication networks. Some of the drawbacks of tower-basedinfrastructure are discussed in the background section.

In the public safety communication network 100, range problems arefurther compounded in the United States by the fact that most publicsafety communication networks 100 are owned and operated by individualtowns, cities, municipalities, and the like. This results in a lack ofuniformity nationwide and an inability to leverage infrastructure fromsurrounding localities. Some of the public safety communicationsnetworks 100 in various countries are private networks, and some are runby commercial network operators, an example of one being Verizon or AT&Tin the US. These communication networks 100 most typically support theuse of land mobile radios, although some public safety networks 100 arecapable of supporting smart phones used by public safety personnel.

In contrast to the prior art fixed infrastructure networks and the priorart of ad hoc military networks, the present invention is designed toutilize a mobile cellular base station to create an ad hoc cellularnetwork as a stand-alone network or as a network that seamlesslyintegrates with existing cellular network infrastructure. Although thisapplication uses the term “mobile” it will be understood by thoseskilled in the art that a mobile cellular base station may, at times, bemobile, and at other times may be stationary. The distinction between a“mobile cellular base station” as used in this application and atraditional stationary base station. Examples of stationary nodes arefixed tower base stations, fixed small cells, or a COW (cell on wheels).These types of base stations are not routinely moved, whereas the mobilecellular base stations described herein can be routinely moved. In termsof mobility, mobile cellular base stations could be carried by anynumber of moving entities such as: a vehicle, an airplane, a drone, ahelicopter, a hot air balloon, a person, an animal, a boat, a snowmobile, a dirigible, a blimp, a train, a motorcycle, or a robot.

The process of creating, maintaining, or enhancing an ad hoc cellularnetwork with a mobile cellular base station, alternatively called amobile ad hoc cellular base station is challenging because mobilecellular base stations are not part of the fixed infra-structure. Thefixed infrastructure makes many assumptions when operating that resultfrom the base stations therein being pre-planned and fixed. Theinstallation, operational parameters, antenna characteristics,interference patterns, access and backhaul configurations of ad hoccellular base stations are not preplanned. An ad hoc cellular basestations can change their location at any time.

Adding a ad hoc cellular base station to an existing cellular network ina way that enhances overall network capability requires consideringwhich access and backhaul configurations should be offered, what thetransmission power of the mobile ad hoc cellular base station should be,how the fixed cellular network should respond, and in some instances,deciding whether to include limited core network functionality withinthe mobile ad hoc cellular base stations so that they can perform someof the functions of the core network operational devices. In LTE forexample, a core network operational device could be an EPC. If a mobilead hoc cellular base station did include limited core networkfunctionality within its processor, for an LTE network, thesefunctionalities would include: the HSS, the SGW, the PGW, or the MME.Those of skill in the art will recognize that these functionalities maybe assumed by different entities within different networks outside of anLTE network. Embodiments of the limited core network functionality couldtherefore be adapted to meet the functionalities of these additionalnetworks.

One of the novel aspects of the methods described herein is, they takethese issues into consideration before and during the establishment ofan ad hoc cellular network. Another point of novelty in the methodsdisclosed herein is the fact that they are executed on multi-RAT nodes.Because the nodes have multiple access and backhaul radios built-in, thechoice of which access or which backhaul configuration to adopt is fluidand can be determined by the network conditions in real-time.

In addition, the multi-RAT nodes work cooperatively in some embodimentswith a computing cloud component. The computing cloud component is ableto bring a “God's view,” that is a high level management perspective, tothe ad hoc cellular network. Some of the network management intelligenceresident in the computing cloud is also resident in processors of themulti-RAT nodes. Accordingly, either of these computer mediums can makedecisions about access or backhaul configurations, choosing differentfrequency bands, such as, but not restricted to, 2G, 3G, 4G, LTE, Wi-Fi,high speed Wi-Fi, TV white space, satellite, Bluetooth, ZigBee, licensedor unlicensed spectrum, wired or wireless connectivity, and the like,different communication protocols, duplexing schemes e.g., FDD, TDD,Full Duplex and the like, as well as transmit power levels, antennaorientations, and in the case of phased array antennas, transmissionpower characteristics.

In addition, ad hoc cellular base stations as described herein are ableto provide multimedia services, not just voice, data or Internetservices. The intelligence that is imbued to the ad hoc cellularnetworks facilitates data prioritization, that is prioritizing data forfirst responders in a public safety environment while additionallyallowing simultaneous lower priority users to access additional networkbandwidth if available. Priority can mean capacity guarantees, decisionsregarding resolution of image, audio, video transmissions, or datadownload speeds. These management decisions can be applied to bothaccess and backhaul configurations.

Access and backhaul configurations can further utilize encryption toprovide secure data transmissions. Moreover, secured authorizationssimilar to those used by VPN can be implemented. Ad hoc cellular basestations executing the methods described herein have a memory withintheir architecture. As such, they are able to cache data packets. Ifthere is a path failure, these cached data packets can be retransmitted.In addition, authentication credentials can be cached. These too can beused to reauthenticate in the event of a path loss or a network failure.

FIG. 2 shows an architectural rendering upon which the methods of thepresent invention could be executed. This diagram is merely exemplaryand is not intended to be limiting with respect to the type or number ofhardware elements. Similarly, although FIG. 2 shows a public safetycommunication scenario, the teachings of this application are notlimited to the public safety sector. Those of skill in the art willrecognize its applicability to myriad communication networks, includingwithout limitation, people working in an oil field, a mine, on amilitary base, a news crew covering local events, at an airport, at aseaport, for a support crew that needs to provide lots of bandwidth andimprove cell efficiency, in rural locations, and the like. Theapplicability of the embodiments disclosed herein therefor apply tomilitary, consumer, business, and public safety networks.

The embodiments described herein enhance network coverage by creatingand maintaining an ad hoc cellular network, or extending the range of afixed network. They also create a multi-dimensional heterogeneousnetworks having redundancy and autonomy. When the ad hoc cellular basestations utilizing embodiments discussed herein establishes or enhancesa fixed cellular network, it they so by seamlessly integrating into thefixed network topology. If there is an existing fixed network, themethods disclosed herein provide a means of automating the integrationof the ad hoc cellular into an existing fixed network. This is currentlydone by humans as part of network planning and implementation. Theoverall orchestration of adding to an existing fixed network, both fromthe standpoint of connecting the two networks, and from the standpointof managing the combined networks is a labor intensive process that isautomated by the method embodiments of this invention.

These embodiments could be executed and run on networks having atopology similar to that depicted in FIG. 2 or on any wirelesscommunication network incorporating an ad hoc cellular base station nodeinto the network, whether that base station is still moving or it hasbecome stationary.

Assume that FIG. 2 depicts an emergency scene where first respondershave been called to the scene of a building 230 fire. In terms of thewireless network capabilities near the burning building 230, there is amacro tower 202 providing cellular service to land-mobile radios forpublic safety individuals via a backhaul connection 210 from the macrotower 202 to an ad hoc cellular base station 220. A secondary backhaulconnection 208 could also be established between ad hoc cellular basestation 220 and a fixed base station 207. In this architecture, thefixed base station 207 could be a fixed base station or an ad hoccellular base station. The fixed base station 207 could becommunicatively coupled to a computing cloud component 204 via backhaulconnection 206.

Additional variations of this topology include additional ad hoc nodes222 and 224, the absence of the fixed node 207 and/or the absence ofmacro tower 202. In addition, although FIG. 2 shows three ad hoccellular base stations 220, 222, and 224, the methods of this inventioncan be executed on a single ad hoc cellular base station. The computingcloud component 204 could be an external server as pictured in FIG. 2,as well as an internal processor located within an ad hoc cellular basestation 220. Some of the embodiments discussed herein could be executedon an external computing cloud component 204 or on an internalprocessor, as will be described below.

Assume for purposes of this example that the fire fighters and policeofficers share the macro tower 202, either by sharing a base stationmounted on the tower or by mounting two independent base stations, oneproviding coverage to the fire fighters and one providing coverage tothe police officers. When the first responders arrive at the scene theynotice that the macro coverage boundary 212 does not reach inside of theburning building 230. This means, once they are inside of the building230, they will not have external cellular network connectivity. If theirradios do not have applications that allow them to function inpeer-to-peer mode or if those radios do not have transmit and receivecapabilities that would work anywhere in the building, the firstresponders will not be able to communicate with one another.

When the ad hoc cellular base station 220 is en route to the burningbuilding 230, it could have a backhaul configurations, such as LTE orWi-Fi, which would allow it to provide an access signal having forexample Wi-Fi as the access configuration to individuals within thevehicle containing the ad hoc cellular base station 220. Applicants notethat the methods described herein could be executed on a computerreadable medium located within the ad hoc cellular base station 220, onanother device in the exiting wireless network, on a computing cloudcomponent 204, or on a fixed base station 207.

FIG. 3 shows an architectural diagram of an ad hoc cellular base station300 having a computer readable medium therein where method embodimentscan be stored and executed on the hardware depicted therein. For ease ofexplanation, we refer to an ad hoc cellular base station 300 whendiscussing the architecture of FIG. 3 with the understanding thatsimilar architecture could be present in a fixed base station 207. Andthe method embodiments discussed herein could likewise be executed oneither an ad hoc cellular base station 300 or a fixed base station 207.

Referring to FIG. 3, the ad hoc base station 300 depicted thereinincludes two isolated backhaul radios 310, 312, a GPS receiver coupledto a GPS antenna, “GPS” 314, a Wi-Fi radio 322, an application processor324, a baseband processor 334, a memory 336, two additional backhaulradios 330, 332, which in one embodiment could be a 10 Gigabit Ethernetbackhaul, an expansion slot 320, and isolated access radios 340. Limitedcore network functionality could be stored within the applicationprocessor 324. As previously discussed, isolated backhaul radios 310,312 and isolated access radios 340 could be hardware configured totransmit within at least one of the following: 2G, 3G, 4G, LTE, Wi-Fi,high speed Wi-Fi, TV white space, satellite, Bluetooth, ZigBee, FDD,TDD, full duplex, wired or wireless backhaul, and licensed andunlicensed spectrum.

In some embodiments and without limitation, hardware configurationscould be as follows. At least one access radio 340 could be a 20 MHz 2×2MIMO LTE radio transmitting at 1 W of power. A second access radio 340could be a Wi-Fi access radio, 3×3 MIMO WPA 2 Enterprise. One of thebackhaul radios 310 could be a multi radio mesh, up to 3×3 MIMO, 40 MHzwide, and WPA 2 enterprise grade encryption, another example of abackhaul radio could be cellular backhaul radios. The ad hoc cellularbase station 300 could also include connectors for long haul linksupport and antennas. In some embodiments antennas could be highgain/narrow beam or omni/sectored antenna, or omni antennas. Moreover,the hardware depicted in FIG. 3 is tunable, and, therefore capable oftransmitting and receiving on numerous frequencies. The applicationprocessor 324 is capable of hosting limited core functionality andapplication servers. In embodiments described herein the ad hoc mobilecellular base station could be in a vehicle, an airplane, a drone, ahelicopter, a hot air balloon, a train, a motorcycle, a snow mobile, arobot, on a person, on an animal, or any entity that is capable ofmotion.

The limited core network functionality could include at least one of thefollowing network operation functions: paging, handover, authentication,location management, SGW selection, radio resource management, mobilitymanagement, roaming management, tracking area management, mobilityanchor, lawful interception, policy enforcement, packet filtering,charging, or providing an anchor between 3GPP and non 3GPP technologies.

FIG. 4 depicts a method of establishing an ad hoc cellular networkhaving an ad hoc cellular base station or integrating an ad hoc cellularbase station into a fixed cellular network In one embodiment, thesemethod steps could be stored on a computer readable medium either in anad hoc cellular base station 300 or in a computer readable medium thatis accessible to an ad hoc cellular base station, such as a computingcloud component 204.

In the method of this embodiment, the first step could be analyzing 402a speed of the ad hoc cellular base station 300. This analysis could beperformed by using a velocity measurement obtained from GPS 314, byusing location data or direction data of the ad hoc cellular basestation 300 as a function of time, to determine if the ad hoc cellularbase station 300 has become stationary. Once the ad hoc cellular basestation 300 becomes stationary, the computer readable medium in aprocessor 324 could query 404 a local or remote cache to determine anaccess configuration or a first backhaul configuration to be used by thead hoc cellular base station 300.

As discussed, the access configuration or backhaul configuration couldbe at least one of the following: 2G, 3G, 4G, LTE, Wi-Fi, high speedWi-Fi, TV white space, satellite, Bluetooth, ZigBee, FDD, TDD, fullduplex, wired or wireless backhaul, and licensed and unlicensedspectrum. In some embodiments, the choice of which access configurationor backhaul configuration could be related to an available power sourcefor the ad hoc cellular base station 300. For example, if the ad hoccellular base station 300 is connected to a car battery, it likely hasmore transmit and receive power than if it is connected to a batterycell. The amount of available power, limited by battery life, could be afactor used to determine which access or backhaul configuration shouldbe used. Moreover, this decision could be made dynamically becauseavailable power may change.

After querying the local or remote cache, the processor 324 couldreceive 406 an access configuration or a backhaul configuration. Theprocessor 324 may then evaluate 408 an operational parameter anddetermine 410 if the access configuration or the backhaul configurationshould be updated. Once a final access configuration or backhaulconfiguration is chosen, the ad hoc cellular node 300 could transmit 460an access signal or a backhaul signal.

In an alternate embodiment, the access configuration and the backhaulconfiguration could be within the same frequency and band or exactly thesame frequency and band, e.g., LTE Band 14 used for access and backhaul.In another alternate embodiment, the access configuration or thebackhaul configuration could be full duplex. In a variation of thisembodiment, a second ad hoc cellular base station could be added to thead hoc cellular network. In this embodiment, the ad hoc cellular basestation could establish a second backhaul connection between itself andthe second ad hoc cellular base station. This second backhaul link couldhave a cellular or mesh protocol.

In an additional embodiment, the access or backhaul configuration couldbe determined based on an operational parameter. In yet anotherembodiment, the ad hoc cellular base station could authenticate a userequipment within the ad hoc cellular network by using information froman already authenticated user concerning additional users within the adhoc cellular network. This already authenticated user may, for example,have identifying information about other users within the ad hoccellular network.

Referring again to FIG. 4, in an alternate embodiment after transmitting460 an access or a backhaul signal, the ad hoc cellular base stationcould receive 420 a second location, a second mobility state, or asecond travel direction for a second ad hoc cellular base station. Oncethe processor receives 420 this information, it can evaluate 422 thebackhaul configuration, the access configuration, the second location,the second mobility state, or the second travel direction to determineif either the backhaul configuration or the access configuration shouldbe updated. After making this assessment, the ad hoc cellular node 300could transmit 424 an access or a backhaul signal using the access orbackhaul configuration or the updated access or backhaul configuration.

In an alternate embodiment, after transmitting 460 the access signal orthe backhaul signal, the ad hoc cellular base station could alter 430 apower level of one of its access radios or one of its backhaul radios.It could then use 432 a wireless mesh backhaul connection within the adhoc cellular network. The ad hoc cellular node could then alter 434 anantenna configuration so as to more optimally transmit upon a particularaccess configuration or a backhaul configuration.

In the situation where the ad hoc cellular base station is transitioningfrom a mobile state to a stationary state, it may have to readjust someof the operational parameters of its radio access or backhaul hardware.In that instance, the ad hoc cellular base station 300 may alter 430 apower level of an access or a backhaul radio in order to transmit orreceive over the access or backhaul configuration. In some embodiments,ad hoc cellular base stations 300 are equipped with a plurality ofantennas chosen to support the access and backhaul configurations forthat particular ad hoc cellular base station 300. When establishing anad hoc cellular network, the ad hoc cellular base station 300 could alsoalter 434 an antenna configuration, such as directionality, gain,frequency characteristics, and the like.

In an additional embodiment, the ad hoc cellular base station 300 coulduse query a local or remote cache to cross correlate a first accessconfiguration with a first location. After comparing the two, the ad hoccellular base station could choose an updated first access configurationbased upon information retrieved during its query. For example, the adhoc cellular base station could use geographic information to determinewhich service providers have the best coverage for that area. It could,in that instance choose an access or a backhaul configuration based onthis criterion. Similarly, a TV white space backhaul frequency could bechosen based on availability of spectrum in the particular geographiclocation. In an alternate embodiment, the ad hoc cellular base stationmay query the local or remote cache to discern whether other basestations are operating within its proximity and if so, it could adjustits power level so as to minimize interference.

Referring again to FIG. 4, after the ad hoc cellular base stationtransmits 460 an access signal or a backhaul signal, it couldcommunicate a decision to hand-off a data or voice session of a userfrom a source ad hoc cellular base station to a destination cellularbase station. The source ad hoc cellular base station could be the adhoc cellular base station 300 and the destination cellular base stationcould be a second ad hoc cellular base station or a fixed base station.Once this decision is made, the source ad hoc cellular base station andthe destination cellular base station could exchange handover messagingso as to effectuate the hand-over. In a similar embodiment, a hand-incould be performed from a source cellular base station to a destinationad hoc cellular base station. In this embodiment, the source cellularbase station and the destination ad hoc cellular base station couldexchange hand-in messaging information so as to effectuate the hand-in.In yet an additional embodiment, the hand-off messaging or the hand-inmessaging could further be exchanged with a core network.

In yet an additional embodiment, the ad hoc cellular base station 300could detect a coverage gap within the ad hoc cellular network. Afterdetecting this coverage gap, it could establish at least one wirelessbackhaul connection to a core network using one of its antennas having again of greater than 0 dB. Once this backhaul connection is established,the ad hoc cellular base station 300 could use the access configurationto transmit or receive signals on one of its access radios.

In an alternate embodiment, the ad hoc cellular base station 300 couldestablish a wireless backhaul link. A message flow for this embodimentis shown in FIG. 5. As can be seen in FIG. 5, in this embodiment a firstad hoc cellular base station 510 is communicatively coupled to a secondad hoc cellular base station 515. In addition to the architecturecomponents inherent in an ad hoc cellular base station 300, the secondad hoc cellular base station 515 has an internal processor 530 havinglimited core functionality 540 stored thereon.

FIG. 6 shows an ad hoc cellular network that could be used as anarchitectural basis for performing embodiments described with referenceto FIG. 7. Referring to FIG. 6, this ad hoc cellular network can providelocal wireless access service to users within range of the ad hoccellular network. In this ad hoc cellular network, there is a first adhoc cellular base station 610 and a second ad hoc cellular base station620. The first ad hoc cellular base station 610 and the second ad hoccellular base station 620 have a wireless backhaul connection 615. Thesecond ad hoc cellular base station 620 can optionally be to a computingcloud 630 via backhaul connection 625. The computing could 630 contain aserver 635 and a limited core network functionality processor 640. Thelimited core network functionality processor 640 has some or all of thefunctionality provided by a core EPC, namely functionality typicallyperformed by an HSS 641, a PCRF 642, an MME 643, an SGW 644, an LGW 646,or a PGW 645. The computing cloud 630 is also communicatively coupled tothe Internet 650 or in some embodiments to the core network 652. In analternate embodiment, the limited core functionality processor 640 canbe within the second ad hoc cellular base station 620. In oneembodiment, the first 610 and second cellular base stations 620 haveantennas having higher gain that the average gain in a cellulartelephone, also called user equipment.

In some embodiments at least one ad hoc cellular base station 620 canlocalize the functionality of the PGW 645 by creating a local PGW or LGW646. If user equipment being serviced by the ad hoc cellular basestation 620 creates a specific packet data network that is Local IPAccess enable, LGW 646 could act as a packet data network gateway byhandling the signaling to create a PDN connection. The packet datanetwork, in this embodiment, would be anchored on LGW 646. In thisembodiment, LGW 646 could allocate IP address to user equipment withinthe network. LGW 646 would also anchor these IP addresses. When theuplink data traffic is received by the ad hoc cellular base station 620,it could, using internal processors, route this traffic using LGW 646functionality. LGW 646 functionality has the advantage of optimizingtraffic paths and thereby reducing network overhead. One way this isaccomplished is, for example, if an ad hoc cellular base station 620receives data for more than one user equipment that it is servicing, LGW646 can route the traffic between these two device internally within thead hoc cellular network rather than through any other network elements.In this way, LGW 646 can create a peer-to-peer communication networkbetween these two user equipments. In some embodiments, trafficoptimization done by LGW 646 can improve data throughput by removing andcaching a protocol header that is typically passed on by existingunintelligent fixed cellular nodes. The choice of which ad hoc cellularbase station 610 or 620 is arbitrary and in subsequent embodiments, thearchitecture described with respect to the second ad hoc cellular basestation 620 could be resident on the first ad hoc cellular base station610 and vice versa.

The steps of this embodiment, shown in FIG. 7, are performed by thesecond ad hoc cellular base station 620. Turning to FIG. 7, the secondad hoc cellular base station 620 receives 710 a data packet from thefirst ad hoc cellular base station 610. Rather than forwarding the datapacket over a GTP-U tunnel, the second ad hoc cellular base station 620extracts 720 a tunnel overhead packet from the data packet, therebycreating a modified data packet. The second ad hoc cellular base station620 then stores 730 the tunnel overhead packet. It then forwards 740 themodified data packet to the processor 640, the processor in oneembodiment being located within the second ad hoc cellular base station620. In an alternate embodiment, the processor 640 could be located in acomputing cloud component 630. The processor 640, in conjunction withits limited core functionality, establish a bearer for messaging. Thefirst ad hoc cellular base station 610 then receives 750 from the secondad hoc cellular base station 620, an acknowledgement that bearerestablishment is complete. Lastly, the second ad hoc cellular basestation 620 anchors 760 an IP session to an external cellular network.

In an alternate embodiment of this method, the data packet could be aninitial attach request. In yet an additional alternate embodiment, themodified data packet could be forwarded to the EPC. These embodimentshave the advantage of eliminating tunnel overhead by extracting packetsfrom mobile nodes. In yet another embodiment of this method, the ad hoccellular network could provide situational awareness to a user withinthat network via either the first or second cellular base stations.Examples of situational awareness include without limitation: a locationof an ad hoc cellular base station, a direction or travel of an ad hoccellular base station, a mobility parameter for an ad hoc cellular basestation, an environmental parameter for an ad hoc cellular base station,a coverage map of an ad-hoc cellular base station, an environmentalparameter of a fixed base station, an operational parameter of a fixedbase station, a location of a fixed base station, or a location of auser.

Turning again to FIG. 7, in a further method beginning after theanchoring 760 has transpired, it is possible to monitor 770 the qualityof a backhaul connection to the core network to determine if it fallsbelow a threshold parameter. Threshold parameters could be measured bymeasuring a received signal strength indicator (“RSSI”). An additionalexample of a threshold parameter is set forth in the 3GPP standard36.104, the contents of which are hereby incorporated by reference. Thethreshold parameters according to that standard appear in the table6.2-1 of that standard, reprinted below. In this embodiment, the localarea base station quality thresholds apply.

BS class PRAT Wide Area BS — (note) Local Area BS ≦+24 dBm (for onetransmit antenna port) ≦+21 dBm (for two transmit antenna ports) ≦+18dBm (for four transmit antenna ports) Home BS ≦+20 dBm (for one transmitantenna port) ≦+17 dBm (for two transmit antenna ports) ≦+14 dBm (forfour transmit antenna ports) NOTE: There is no upper limit for the ratedoutput power of the Wide Area Base Station.

Additional examples of threshold parameters are data rate, interference,network load, congestion, and latency.

Referring again to FIG. 7, once the quality of the backhaul connectionhas fallen below a threshold parameter, the first 610 or second ad hoccellular 620 base station could provide 772 a local limited core networkto users within the ad hoc cellular network. In order to provide 772this local limited network, the first 610 or second ad hoc cellular basestation 620 could provide a minimal set of core network functionality touser equipment within the limited core network. A next step in providing774 local limited core network would be to authenticate users thereon byreceiving 776 authentication information from the core network. Examplesof authentication information could be SSID, IMEI, and the like. Thisauthentication information could be stored 778 in a memory and used 780to authenticate any users on the local limited core network.

In an alternate embodiment of this method, the ad hoc cellular networkcould be managed for example by an external computing cloud component,or by either the first ad hoc cellular base station or the second ad hoccellular base station. Management could include making decisions aboutpower levels, the ad hoc cellular base stations could also include avoice-over-IP applications including without limitation: push-to-talk,peer-to-peer communication, an ad hoc user nationwide dialing plan; anad hoc user international dialing plan, conference calling, or a speeddial list. The national or international dialing plans could be similarto the E 164 standard dialing plan. In this embodiment, the voiceapplication server could enable national or international calls betweenfirst responders in disparate locations. For example, a bridgeapplication server could bridge standard E 164 telephony users toemergency users and vice versa. These embodiments could be implementedin closed ad hoc networks of the present invention or in ad hoc cellularnetworks integrated into fixed cellular networks.

In an alternate embodiment of these methods, there could be a third adhoc cellular base station that come within range of the local limitedcore network. In this embodiment, the first or second ad hoc cellularbase station could detect the presence of this third ad hoc cellularbase station. In this embodiment, the third ad hoc cellular base stationcould also have a processor having limited core functionality storedthereon. The first and or second ad hoc cellular base station could usea wired or wireless backhaul connection to integrate the third ad hoccellular base station into the local limited core network. Thisintegration could transpire via exchanging messaging information betweenthe ad hoc cellular nodes. This messaging information could includenetwork operational parameters such as power output, access and backhaulconfigurations, routing tables, user authentication information, antennatransmission characteristics, and the like.

In an alternate embodiment of these methods, it may be the case that thequality of the backhaul connection to the core network is restored abovea threshold parameter. In that case, this embodiment could synchronizethe authentication information it has stored in local memory with an HSSor other core network device providing authentication for core networkusers.

In some situations it may be advantageous when an ad hoc cellular basestation arrives at a location to determine if there is a fixed cellularadequately supporting users within range. In this instance, the ad hoccellular base station may forego establishing an ad hoc cellular networkuntil a user within the existing network needs enhanced coverage. FIG. 8shows an architectural example of when this might occur. In FIG. 8, anad hoc cellular base station 830 may have just arrived at its presentlocation. When it arrives, it can activate internal receivers to assessthe network coverage area 850. The ad hoc cellular base station 830 canlisten to transmissions from the user equipment 840 to the tower 802. Inone embodiment, the ad hoc cellular base station 830 can transmit andreceive signals as though it were another user equipment within thenetwork coverage area 850. By configuring its messaging to appear asthough it is another user equipment, it is able to obtaincharacteristics and operational parameters over control channels aboutother user equipment within the network coverage area 850. Examples ofcharacteristics are: the location of the other user equipment 840, theperimeter of the network coverage area 850, the proximity of the userequipment 840 to the perimeter of the network coverage area 850.Examples of operational parameters are: interference characteristics,the existence of know “not spots,” channel availability, detecting ifthe user equipment 840 has sent a message to the tower 802 indicatingthat it requires more bandwidth, the user equipment's current data rate,the existence of other base stations within range of the tower 802 orthe ad hoc cellular base station 830 and whether the tower 802 hasgranted or denied a request for bandwidth. In these scenarios, the adhoc cellular base station 802 could determine that it would beadvantageous for it to enhance the existing network coverage zone byproviding an access signal for the user equipment 840.

FIG. 9 shows the steps of a method that allows an ad hoc cellular basestation 830 to enhance network coverage as needed. In this embodiment,the ad hoc cellular base station 830 receives 910 a message sent from auser equipment operating within an existing network coverage area,wherein the message is sent over a control channel or a bearer channel.The ad hoc cellular base station 830 then analyzes 920 a characteristicof the message and it analyzes 930 an operational parameter of theexisting cellular network 850. Based on these analyses, the ad hoccellular base station 830 determines 940 if it should enable, disable,or modify an existing access signal or an existing backhaul signal basedon the characteristic of the message or the operational parameter.

In an alternate embodiment, it may be advantageous to in the context ofan ad hoc cellular network for one ad hoc cellular base station to actas a local gateway. The steps of this embodiment are described withreference to FIG. 10. In this embodiment, a first ad hoc cellular basestation 610, which is providing local wireless access, could optimize1005 a data path by receiving 1010 a first data packet from a userequipment. The first ad hoc cellular base station 610, which has a localgateway 646 providing local wireless access, could remove 1020 a firstprotocol header from the data packet and store 1030 the first protocolheader in a memory. The first ad hoc cellular base station 610 couldreceive 1040 a second data packet from a second ad hoc cellular basestation 620 having a processor 640 with limited core networkfunctionality stored thereon. This second data packet may not have asecond protocol header attached thereto. Accordingly, the first ad hoccellular base station 610 could analyze 1050 a plurality of data packetheaders stored in memory in order to determine which one corresponds tothe second data packet. After finding the right data packet header, thefirst ad hoc cellular base station 610 could append the correct datapacket header to the second data packet.

In an alternate method directed toward network resiliency in the contextof an ad hoc cellular networks, and with reference to FIG. 11, a firstad hoc cellular base station 610 could establish 1110 a first primaryconnection with an existing cellular network. A second ad hoc cellularbase station 620 could establish 1120 a backhaul connection to the firstad hoc cellular base station 610. The second ad hoc cellular basestation 620 could also establish 1130 a second primary connection withthe existing network. The first ad hoc cellular base station 610 orsecond ad hoc cellular base station 620 could determine 1140 on anongoing basis if the quality of the first primary connection falls belowa threshold value. Threshold values could be determined by standardssuch as, without limitation, an RSSI or the 3GPP 36.104 standard. If thequality of the first primary connection does fall below a certainthreshold, the first primary connection could be replaced 1150 by thesecond primary connection.

The foregoing discussion discloses and describes merely exemplaryembodiments of the present invention. In additional embodiments, themethods described herein can be stored on a computer readable mediumsuch as a computer memory storage, a compact disk (CD), flash drive,optical drive, or the like. Further, the computer readable medium couldbe distributed across memory storage devices within multiple servers,multi-RAT nodes, controllers, computing cloud components, mobile nodes,and the like. As will be understood by those skilled in the art, thepresent invention may be embodied in other specific forms withoutdeparting from the spirit or essential characteristics thereof. Forexample, wireless network topology can also apply to wired networks,optical networks, and the like. Various components in the devicesdescribed herein may be added, removed, or substituted with those havingthe same or similar functionality. Various steps as described in thefigures and specification may be added or removed from the processesdescribed herein, and the steps described may be performed in analternative order, consistent with the spirit of the invention.Accordingly, the disclosure of the present invention is intended to beillustrative, but not limiting of the scope of the invention, as well asother claims. The disclosure, including any readily discernible variantsof the teachings herein, defines, in part, the scope of the foregoingclaim terminology.

What is claimed is:
 1. A method of establishing an ad hoc cellularnetwork having an ad hoc cellular base station comprising the steps of:a. optimizing a data path wherein the optimizing further comprises: i.receiving a first data packet from a user equipment at a first ad hoccellular base station wherein the first ad hoc cellular base stationincludes a local gateway providing local wireless access; ii. removing afirst protocol header from the first data packet; iii. storing the firstprotocol header in a memory; iv. receiving a second data packet whereinthe second data packet was sent from a second ad hoc node havingprocessor with limited core network functionality stored thereon; v.analyzing a plurality of data packet headers stored in the memory inorder to determine which corresponds to the second data packet; and vi.appending a second data packet header to the second data packet.
 2. Themethod of claim 1 further comprising a local packet data network gateway(LGW).
 3. The method of claim 1 further comprising establishing a closednetwork.
 4. A method of integrating an ad hoc cellular base station intoa fixed cellular network comprising the steps of: a. optimizing a datapath wherein the optimizing further comprises: i. receiving a first datapacket from a user equipment at a first ad hoc cellular base stationwherein the first ad hoc cellular base station includes a local gatewayproviding local wireless access; ii. removing a first protocol headerfrom the first data packet; iii. storing the first protocol header in amemory; iv. receiving a second data packet wherein the second datapacket was sent from a second ad hoc node having processor with limitedcore network functionality stored thereon; v. analyzing a plurality ofdata packet headers stored in the memory in order to determine whichcorresponds to the second data packet; and vi. appending a second datapacket header to the second data packet.
 5. The method of claim 4further comprising a local packet data network gateway (LGW).