Point-to-multipoint or multipoint-to-multipoint mesh self-organized network over WIGIG standards with new MAC layer

ABSTRACT

A backhaul system comprises a small cell mesh network including a plurality of small cell mesh network backhaul nodes providing a backhaul network to provide an interconnection between at least one first network node for providing access to a core network and at least one second network node for providing access to an edge network. The small cell mesh network comprises a self-organized network (SON). At least one transmitter at each of the plurality of small cell mesh network backhaul nodes establishes communication links with other small cell mesh network backhaul nodes within the small cell mesh network providing the backhaul network. A controller for controlling communication link configuration by the at least one transmitter between the plurality of small cell mesh network backhaul nodes of the small cell mesh network providing the backhaul network. The controller is further configured to implement the self-organized network (SON) that reconfigure new communications links responsive to a broken communications link within the small cell mesh network providing the backhaul network. The communication link configurations are established by the controller using WiGig standards and a MAC layer configured to transmit on a wireless link of the backhaul network.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 15/847,353, filed Dec. 19, 2017, entitled POINT-TO-MULTIPOINT OR MULTIPOINT-TO-MULTIPOINT MESH SELF-ORGANIZED NETWORK OVER WIGIG STANDARDS WITH NEW MAC LAYER. U.S. patent application Ser. No. 15/847,353 claims priority to U.S. Provisional Application Ser. No. 62/443,958, filed on Jan. 9, 2017, and entitled POINT-TO-MULTIPOINT OR MULTIPOINT-TO-MULTIPOINT MESH SELF-ORGANIZED NETWORK OVER WIGIG STANDARDS WITH NEW MAC LAYER. This application also claims priority to U.S. Provisional Application Ser. No. 62/458,327, filed on Feb. 13, 2017, and entitled POINT-TO-MULTIPOINT OR MULTIPOINT-TO-MULTIPOINT MESH SELF-ORGANIZED NETWORK OVER WIGIG STANDARDS WITH NEW MAC LAYER.

TECHNICAL FIELD

The present invention relates to high capacity data networks, and more particularly, to a system for providing last drop access using a 60 GHz SDN/NFV based packet network.

BACKGROUND

Data transmission networks have vastly expanded within existing technologies due to the expansion of the Internet and wireless voice and data networks. The number of people using portable voice and data devices has greatly increased the burdens on existing network infrastructures. Data transmission networks that a fixed in the manner in which communications links are established do not have the flexibility and scalability that is needed in today's quickly expanding data infrastructure. Thus, there is a need for a data network infrastructure that can adapt to the ever expanding needs of voice and data applications of today's technology.

SUMMARY

The present invention, as disclosed and described herein, in one aspect thereof comprises a backhaul system comprises a small cell mesh network including a plurality of small cell mesh network backhaul nodes providing a backhaul network to provide an interconnection between at least one first network node for providing access to a core network and at least one second network node for providing access to an edge network. The small cell mesh network comprises a self-organized network (SON). At least one transmitter at each of the plurality of small cell mesh network backhaul nodes establishes communication links with other small cell mesh network backhaul nodes within the small cell mesh network providing the backhaul network. A controller for controlling communication link configuration by the at least one transmitter between the plurality of small cell mesh network backhaul nodes of the small cell mesh network providing the backhaul network. The controller is further configured to implement the self-organized network (SON) that reconfigure new communications links responsive to a broken communications link within the small cell mesh network providing the backhaul network. The communication link configurations are established by the controller using WiGig standards and a MAC layer configured to transmit on a wireless link of the backhaul network.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding, reference is now made to the following description taken in conjunction with the accompanying Drawings in which:

FIG. 1 illustrates the manner in which a backhaul network interconnects an edge network and a core network;

FIG. 2 illustrates a network function virtualization;

FIG. 3 illustrates a network function virtualization architectural framework;

FIG. 4 illustrates software defined network architecture;

FIG. 5 illustrates a software defined network function virtualization system;

FIG. 6 illustrates a flow diagram describing a process for provisioning functions;

FIG. 7 illustrates an example of a service chaining process;

FIG. 8 illustrates a wired backhaul network;

FIG. 9 illustrates a wireless backhaul network;

FIG. 10 illustrates a manner for using an SDN-based system for creating connections with the small cell network;

FIG. 11 illustrates a heterogeneous network;

FIG. 12 illustrates communications between an SDN controller and a small cell using OpenFlow messages;

FIG. 13 illustrates a block diagram of a Backhaul Network Key Performance Indicator;

FIG. 14 is a flow diagram illustrating the process for link repair;

FIG. 15 illustrates a small cell backhaul network;

FIG. 16 illustrates a small cell node having a primary link and one or more backup links;

FIG. 17 illustrates a small cell node including means for multiplexing between multiple transceiver types;

FIG. 18 illustrates an SDN-based architecture for link generation;

FIG. 19 illustrates a small cell node implementing fast local restoration within its data plane layer;

FIG. 20 illustrates a flow diagram describing the process for implementing SDN-based local repair;

FIG. 21 illustrates a flow diagram describing the process for detecting link state and for the transmission on primary and backup links;

FIG. 22 illustrates an edge network wirelessly connecting to users to provide a connection to the network core;

FIG. 23 illustrates a mesh network for interconnecting an edge network with users;

FIG. 24 illustrates the components of a self organized network for access;

FIG. 25 illustrates a number of mesh network nodes;

FIG. 26 illustrates a mesh network with interfering structure;

FIG. 27 illustrates a mesh network of access sites connected to multiple users;

FIG. 28 illustrates the wireless connections between an optimally located access site and an associated network site and resident are enterprise users;

FIG. 29 illustrates a network of a plurality of optimally located access sites and network sites using both licensed and unlicensed data bands;

FIG. 30 illustrates the software components of a 60 GHz last drop system;

FIG. 31 illustrates the manner in which a central controller and mesh client operate on top of a WiGig baseband layer;

FIG. 32 illustrates the various mesh software functions for the mesh controller and mesh node;

FIG. 33 illustrates the Mesh Software Components;

FIG. 34 illustrates a flow diagram describing the process for detecting link state and transmitting on primary and backup links within a mesh network; and

FIG. 35 illustrates a diagram of the various mesh software components used within the system.

DETAILED DESCRIPTION

Referring now to the drawings, wherein like reference numbers are used herein to designate like elements throughout, the various views and embodiments of point-to-multipoint or multipoint-to-multipoint mesh self-organized network over wigig standards with new mac layer are illustrated and described, and other possible embodiments are described. The figures are not necessarily drawn to scale, and in some instances the drawings have been exaggerated and/or simplified in places for illustrative purposes only. One of ordinary skill in the art will appreciate the many possible applications and variations based on the following examples of possible embodiments.

Referring now to FIG. 1, there is illustrated the manner in which a backhaul network 102 is used for interconnecting an edge network 104 with a core network 106. In a hierarchical network the backhaul network 102 comprises the intermediate links between the core network 106 (backbone network) and the small subnetworks at the edge of the entire hierarchical network. The backhaul network 102 carries packets/data to and from the core network 106. For example, in a telecommunications network cell phones communicating with a cell tower constitute a local subnetwork. The connection between the cell tower and the rest of the world begins with a backhaul links to the core of the Internet service provider network. Backhaul networks 102 may be used to describe the entire wired part of the network, although some networks have wireless instead of wired backhaul, in whole or in part, for example using microwave bands, mesh networks and edge network topologies. The backhaul network 102 may use high-capacity wireless channels to get packets to the microwave or fiber links.

Backhaul networks 102 may use a variety of technologies. The choice of backhaul technology must take into account parameters such as capacity, cost, reach and the need for such resources as frequency spectrum, optical fiber, wiring or rights-of-way. Generally, backhaul solutions can largely be categorized into wired (leased lines or copper/fiber) or wireless (point-to-point, point to multipoint over high-capacity radio links). Wired solutions are usually very expensive and often impossible to deploy in remote areas. This makes wireless a more suitable and/or viable option. Multi-hop wireless architecture can overcome the hurdles of wired solutions by creating efficient large coverage areas with growing demand in emerging markets where cost is often a major factor in deciding technologies. Wireless backhaul solutions are able to offer carrier grade services which are not easily feasible with wired backhaul connectivity. Backhaul technologies include free space optics, point-to-point microwave radio relay transmission (terrestrial or by satellite), point to multipoint microwave access technologies, such as LMDS, Wi-Fi, WiMAX, DSL variants such as ADSL and SHDSL, PDH and SDH Lasse Esso and ET interfaces, such as (fractional) E1/T1, E3, T3, STM-1/OC-3, etc. and ethernet. The system such as that more fully herein below may also be used within the systems such as that describe in U.S. patent application Ser. No. 14/882,085 entitled APPLICATION OF ORBITAL ANGULAR MOMENTUM TO FIBER, FSO AND RF filed on Oct. 15, 2015 which is incorporated herein by reference in its entirety to transmit information.

In an additional to the plane wave embodiments that are disclosed in the described system for SDN-based channel estimation for multiplexing between LOS mmWaves, NLOS sub-6 GHz and FSO described herein, a system for implementing the twisted waves generated by the application of orthogonal functions to a plane wave may also be utilized. For example, the various embodiments disclosed in U.S. patent application Ser. No. 15/216,474 entitled SYSTEM AND METHOD FOR COMBINING MIMO AND MODE-DIVISION MULTIPLEXING filed on Jul. 21, 2016 and U.S. patent application Ser. No. 15/144,297 entitled SYSTEM AND METHOD FOR COMMUNICATION USING ORBITAL ANGULAR MOMENTUM WITH MULTIPLE LAYER OVERLAY MODULATION filed on May 2 2016, each of which is incorporated herein by reference in their entirety may be used.

Using the system such as that described herein with respect to an SDN-based channel estimation for multiplexing between LOS mmWaves, NLOS sub-6 GHz and FSO, the FSO, RF, sub-6 GHz, LOS, non LOS and other types of signals are multiplexed between to provide the best signal output depending upon present operating conditions.

Hybrid (Heterogeneous) networks consist of networks including devices wherein in the components providing the transmission of data are all the same but may each be configured using the included operating software to provide different types of transmissions including but not limited to point-to-point (P2P); point-to-multipoint (P2MP); multipoint-to-multipoint (MP2MP); etc.

Architecture relates to the various system layers and their application to the system from the application layer to the hardware layer such as that described in U.S. Provisional Application No. 62/371,279, filed on Aug. 5, 2016 and entitled ULTRA-BROADBAND VIRTUALIZED TELECOM AND INTERNET, which is incorporated herein by reference in its entirety.

Multiband as used herein relates to licensed and unlicensed bands as established in FCC regulations. Licensed bands include, but are not limited to, 24 GHz, 30 GHz, 28 GHz and sub-6 GHz. Unlicensed bands include, but are not limited to, U bands (60 GHz), E bands (71-76 GHz, 81-86 GHz) and WiFi.

Topology for systems implementing the described components may configure the nodes in a tree topology or a ring topology. The tree topology comprises a number of nodes interconnected in a tree structure beginning with a single node that expands to multiple second nodes and each of the second nodes expanding to further multiple third nodes or the single node interconnected to each of the other nodes of a network. Each of the other nodes communicates through the single central node. A ring topology includes a ring connection of all nodes with each node connected only to two adjacent nodes.

A multilayer backhaul network provides for communications using each of copper wire, fiber and RF transmissions. RF may use line of sight and non-line of sight transmissions. Copper may comprise vector bundled (VDSL2) and other types of transmissions. Fiber may use GPON or other types of transmissions.

Total Cost Ownership (TCO) can be achieved by using a combination of software defined networking (SDN), network topology and healing networks to balance factors such as power consumption, capacity and reliability/quality to achieve an optimal operating point. A best operating point can be determined that use each of these three factors.

Software Defined Networks and Network Function Virtualization

Diverse proprietary network hardware boxes increase both the capital and operational expense of service providers while causing problems of network management. Network function virtualization (NFV) addresses these issues by implementing network functions as pure software on commodity and generic hardware. Thus, as shown in FIG. 2, a generic off-the-shelf hardware 202 may be used to generate a variety of system applications 204 that are programmed into the hardware. NFV allows flexible provisioning, deployment, and centralized management of virtual network functions. Integrated with Software Defined Networks (SDN), the software-defined NFV architecture further offers agile traffic steering and joint optimization of network functions and resources. This architecture benefits a wide range of applications (e.g., service chaining) and is becoming the dominant form of NFV. Herein below, we introduce development of NFV under the software-defined NFV architecture, with an emphasis on service chaining as its application to Backhaul, Fronthaul and last mile wireless Internet Access. The software-defined NFV architecture is introduced as the state of the art of NFV and presents relationships between NFV and SDN. Finally, significant challenges and relevant solutions of NFV are described and its application domains (i.e. BH/FH/Access) are discussed.

Current network services rely on proprietary boxes and different network devices that are diverse and purpose-built. This situation induces network management problem, which prevents the operation of service additions and network upgrades (ossification). To address this issue and reduce capital expenditures (CapEx) and operating expenditures (OpEx), virtualization has emerged as an approach to decouple the software from the supported hardware and allow network services to be implemented as software. ETSI proposed Network Functions Virtualization (NFV) to virtualize the network functions that were previously carried out by some proprietary dedicated hardware. By decoupling the network functions from the proprietary hardware boxes, NFV provides flexible provisioning of software-based network functionalities on top of an optimally shared physical infrastructure. It addresses the problems of operational costs of managing and controlling these closed and proprietary boxes by leveraging low cost commodity servers.

On the other hand, with the development of Software Defined Networking (SDN), the trend is to integrate SDN with NFV to achieve various network control and management goals (i.e. dynamic resource management and intelligent service orchestration). Through NFV, SDN is able to create a virtual service environment dynamically for a specific type of service chain, consequently the dedicated hardware and complex labor work to provide a new coming service request is avoided. In conjunction with the use of SDN, NFV further enables real-time and dynamic function provisioning along with flexible traffic forwarding.

Software-defined NFV leverages network virtualization and logically centralized intelligence to minimize the service providing cost and maximize the utilization of network resources. In this case, the obtained higher resource utilization will introduce less investigation on the hardware equipment, which on the other hand simplifies networking operations. Moreover, by automating current manually intensive network configuration, provisioning, and management, the time and operational complexity are significantly reduced and manual errors are dramatically decreased, which offers better scalability. On the other hand, especially in large scale networks, deploying and providing a new kind of service usually results in a long and repeated process that requires long cycles of validation and testing. By automating the control, management and orchestration, the deployment time and operation cost will be significantly reduced.

Service chaining is the main area of software-defined NFV. In current networks, a service chain includes a set of hardware dedicated network boxes offering services such as load balancers, firewall, Deep Packet Inspection (DPI), Intrusion Detection System (IDS), etc., to support a dedicated application. When anew service requirement is added, new hardware devices must be deployed, installed and connected, which is extremely time-consuming, complex, high-cost and error-prone. This kind of networking service requires a dedicate plan of networking changes and outages, which requires high OpEx. On the other hand, the architecture of software-defined NFV is able to simplify the service chain deployment and provisioning. It enables easier and cheaper service provisioning in the local area networks, enterprise networks, data center and Internet service provider networks, wireless operator networks and their backhaul, fronthaul and last mile access networks.

The following introduces the state-of-the-art of NFV and its main challenges within the software-defined NFV architecture. Service chaining is highlighted and discussed as a core application of NFV in different contexts. Guidelines are provided for developments of NFV in various applications to backhaul, fronthaul and last mile access.

Software-Defined Network Function Virtualization

To reduce CapEx and OpEx introduced by diverse proprietary hardware boxes, NFV exploits and takes advantage of the virtualization technology. NFV allows network operators and service providers to implement network functions in software, leveraging standard servers and virtualization technologies, instead of purpose-built hardware. Recent trends of increased user information demands, explosion of traffic and diverse service requirements further drive NFV to be integrated with SDN, forming the software-defined NFV architecture. This architecture offers great flexibility, programmability and automation to the operators in service provisioning and service modeling.

Diverse and fixed proprietary boxes make the service, deployment and testing of new systems increasingly difficult. NFV is a key technology to benefit IT virtualization evolution by separating the hardware network functions from the underlying hardware boxes by transferring network functions from dedicated hardware to general software running on commercial off-the-shelf (COTS) equipment, i.e., virtual machines (VMS). These software applications are running on standard IT platforms like high-performance switches, service, and storage. Using NFV, the different network functions can be deployed in different locations of the networks such as data centers, network nodes, and end-nodes of a network edge as required. Currently, the market of NFV includes switching elements, network elements, network services and applications. A summary of these include:

-   -   Network switching elements, i.e., Broadband Network Gateway         (BNG), carrier grade NAT, Broadband remote access server (BRAS),         and routers.     -   Mobile network devices, i.e., Home Location Register/Home         Subscriber Server (HLR/HSS), Serving GPRS Support NodeMobility         Management Entity (SGSNMME), Gateway support node/Packet Data         Network Gateway (GGSN/PDN-GW), RNC, NodeB and Evolved Node B         (eNodeB) such as that disclosed in T. Wu, L. Rui, A. Xiong,         and S. Guo, “An automation PCI allocation method for eNodeB and         home eNodeB cell,” in Proc. IEEE 6th Int. Conf. Wireless Commun.         Netw. Mobile Comput. (WiCOM), September 2010, pp. 1-4, which is         incorporated herein by reference in its entirety.         -   Virtualized home environments as described in A. Berl, H. de             Meer, H. Hlavacs, and T. Treutner, “Virtualization in             energy-efficient future home environments,” IEEE Commun.             Mag., vol. 47, no. 12, pp. 62-67, December 2009 and R.             Mortier et al., “Control and understanding: Owning your home             net-work,” in Proc. IEEE 4th Int. Conf. Commun. Syst. Netw.             (COMSNETS), January 2012, pp. 1-10, each of which are             incorporated herein by reference in its entirety.         -   Tunneling gateway devices, i.e., IPSec/SSL virtual private             network gateways.         -   Traffic analysis elements, i.e., Deep Packet Inspection             (DPI), Quality of Experience (QoE) measurement.         -   Service Assurance, Service Level Agreement (SLA) monitoring,             Test and Diagnostics such as that described in H. Ludwig et             al., “Web service level agreement (WSLA) language             specification,” IBM Corp., New York, N.Y., USA, Tech. Rep.,             2003, pp. 815-824, which is incorporated herein by             reference.         -   Next-Generation Networks (NGN) signaling such as Session             Border Controller (SBCs), IP Multimedia Sub-system (IMS).         -   Application-level optimization devices, i.e., Content             Delivery Network (CDNs), load balancers, cache nodes, and             application accelerators such as that described in F. T.             Leighton and D. M. Lewin, “Content delivery network using             edge-of-network servers for providing content delivery to a             set of participating content providers,” U.S. Pat. No.             6,553,413, Apr. 22, 2003, which is incorporated herein by             reference in its entirety.         -   Network security devices, i.e., Firewalls, intrusion             detection systems, DOS attack detector, virus scanners, spam             protection, etc. such as that described in E. D. Zwicky, S.             Cooper, and D. B. Chapman, Building Internet Firewalls,             Sebastopol, Calif., USA: O'Reilly Media, 2000, which is             incorporated herein by reference in its entirety.

The major advantage of using NFV is to reduce middle dedicated hardware boxes deployed in the traditional networks to take the advantages of cost savings and bring flexibility. On the other side, NFV technology also supports the co-existence of multi-tenancy of network and service functions, through allowing the usage of one physical platform for different services, applications and tenants.

NFV Framework

ETSI defines the NFV architectural framework 302 as illustrated in FIG. 3 enabling virtualized network functions (VNF) 304 to be deployed and executed on a Network Functions Virtualization Infrastructure (NFVI) 306, which consists of commodity servers 307 to provide computing, storage and network functionalities wrapped with a software layer that logically partitions them. Above the hypervisor layer, a VNF 304 is typically mapped to one VM (virtual machine) 309 in the NFVI. The deployment, execution and operation of VNFs 304 on the NFVI 306 are steered by a Management and Orchestration (M&O) system 308, whose behavior is driven by a set of metadata describing the characteristics of the network services and their constituent VNFs. The M&O system includes an NFV Orchestrator 310 in charge of the lifecycle of network services, a set of VNF managers 312 in charge of the life cycle of the VNFs and a virtualized infrastructure manager 314, which can be viewed as an extended cloud management system responsible for controlling and managing NFVI resources.

Software-Defined Networks

A Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding. With its inherent decoupling of the control plane from the data plane, SDN offers a greater control of a network through programming. This combined feature would bring potential benefits of enhanced configuration, improved performance, and encourages innovation in network architecture and operations. Especially, SDN offers a promising alternative for traffic steering by programmatically configuring forwarding rules as described in N. Handigol, S. Seetharaman, M. Flajslik, N. McKeown, and R. Johari, “Plug-n-serve: Load-balancing Web traffic using OpenFlow,” in Proc. ACM SIGCOMM Demo, 2009, pp. 1-2, which is incorporated herein by reference in its entirety.

FIG. 4 depicts the SDN architecture. There are three different layers. The application layer 402 covers an array of applications 404 focusing on network services, and they are mainly software applications communicating with the control layer 406. As the core of SDN, the control layer 406 consists of a centralized controller 408, which logically maintains a global and dynamic network view, takes requests from the application layer 402, and manages the network devices via standard protocols 409 using control policies 410. Communications between the applications layer 402 and the control layer 406 occur through application program interfaces 412. The data-plane layer 414 provides infrastructure including switches, routers and network appliances through physical switches 416, virtual switches 418 and network devices 420. In an SDN context, these devices are programmable and support standard interfaces. Communications between the control layer 406 and the data plane layer 414 occur via application program interfaces 422.

The application layer 402 utilizes the northbound APIs 412 to communicate with the SDN controller 406 (Control Plane Layer), which enable different control mechanisms for the networks. The southbound APIs 422 define the communication interface between the controller layer 406 and data plane devices within the data plane layer 414, which enable the application to control the forwarding device is a flexible and programmable manner.

NFV Versus SDN

NFV and SDN are closely related and highly complementary to each other. NFV can serve SDN by virtualizing the SDN controller 406 (which can be regarded as a network function) to run on the cloud, thus allows dynamic migration of the controllers to the optimal locations. In turn, SDN serves NFV by providing programmable network connectivity between virtual network functions (VNFs) to achieve optimized traffic engineering and steering. However, NFV and SDN are completely different from the concepts to the system architecture and functions, which are summarized by the following aspects.

NFV is a concept of implementing network functions in software manner, while SDN is concept of achieving centrally controlled and programmable network architecture to provide better connectivity. NFV aims at reducing CapEx, OpEx, and space and power consumption, while SDN aims at providing network abstractions to enable flexible network control, configuration and fast innovation. NFV decouples the network functions from the proprietary hardware to achieve agile provisioning and deployment, while SDN decouples the network control plane from the data.

Software-Defined NFV Architecture

The software-defined NFV system is illustrated in FIG. 5. The system consists of a control module 502, forwarding devices 504 and NFV platform 506 at the edge of the network. The logic of packet forwarding is determined by the SDN controller 508 and is implemented in the forwarding devices 504 through forwarding tables. Efficient protocols, e.g., OpenFlow, can be utilized as standardized interfaces in communicating between the centralized controller 502 and distributed forwarding devices 504. The NFV platform 506 leverages commodity servers 510 to implement high bandwidth NFs (network functions) at low cost. Hypervisors 512 run on the servers 510 to support the VMs 513 that implement the NFs. This platform 506 allows customizable and programmable data plane processing functions such as middle box of firewalls, IDSs, proxies, which are running as software within virtual machines, where NFs are delivered to the network operator as pieces of pure software.

The SDN controller 508 and the NFV orchestration system 514 compose the logical control module 502. The NFV orchestration system 514 is in charge of provisioning for virtualized network functions 516, and is controlled by the SDN controller 508 through standard interfaces 518. Referring now to FIG. 6, there is illustrated a process for provisioning functions. After obtaining the network topology and policy requirements at step 602, the control module 508 computes the optimal function assignments (assigning network functions to certain VMs) at step 604 and translates at step 606 the logic policy specifications into optimized routing paths. The function assignments are enforced at step 608 by the NFV orchestration system 514, and the controller 508 steers the traffic traveling through the required and appropriate sequence of VMs 513 and forwarding devices 504 by installing forwarding rules into them at step 610.

From Middle Box to NFV

Though NFV is not limited to virtualizing middle boxes, the concept of NFV was initiated in the context of middle box. The present disclosure introduces the evolution from a traditional purpose-built middle box to NFV, during which consolidated middle box and software-defined middle box act as transitional paradigms.

Middlebox Overview

A middle box is a networking forwarding or processing device that transmits, transforms, filters, inspects or controls network traffic for purposes of network control and management. A middle box service or function is a method or operation performed by a network device that needs specific intelligence about the applications. Typical examples of middle boxes include network address translators (NATs) that modify packet's destination and source addresses, and firewalls that filter unwanted or malicious traffic. The following are commonly deployed middle boxes:

1) Network Address Translator (NAT)

2) Firewall (FW)

3) Intrusion Detection System (IDS)

4) Load Balancer (LB)

5) WAN Optimizer

6) Flow Monitor (FM)

Consolidated Middlebox

Here, an overview for the efforts on consolidating middle boxes is provided, which are precursors to the current NFV paradigm.

1) CoMb

2) APLOMB

3) Integrate Middle Boxes into Network

Software-Defined Middlebox

As SDN evolves, the principles of abstracting the architecture layer of network from the control plane 406 and data plane 414 have been investigated in various contexts. This idea introduces some unique opportunities for the development of middle boxes. Inspired by the idea of SDN, some researchers proposed a software-defined middle box and corresponding networking architecture, with the aim of providing fine-grained and programmable control over the middle box state and network forwarding.

Service Chaining

Service chaining is an important model for network service providers, in which NFV plays an important role. It is utilized to organize the service function deployment, where the ability of specifying an ordered list of service processing for the service's traffic flows is provided. A service chain defines the required processing or functions and the corresponding order that should be applied to the data flow. These chains require the integration of service policy and the above applications to achieve optimal resource utilization.

Traditional service chaining mainly relies on manual configuration which is tedious, error-prone and clumsy. SDN provides new capabilities to steer traffic dynamically based on user requirements. However, hardware-based middle boxes limit the benefit of SDN due to their fixed functionalities and deployment. NFV is a good enabler for SDN. With the ability of dynamic function provisioning offered by NFV and the centralized control of SDN, new opportunities emerged in service chaining. Better performance and resource utilization can be achieved with the software-defined NFV architecture.

SDN & Middle Box Based Service Chaining

SDN offers the flexible control approach and enables dynamic traffic forwarding, and this style of traffic control for middle box-specific flow can realize flexible and efficient service chaining with no need to generate any placement or introduce some constraints on middle boxes, which are on the other hand easily supported by current SDN standards. The following are some of the important functions:

1) Symple

2) Steering

3) Flowtag

Service Chaining in the Software-Defined NFV Architecture

SDN and NFV together have the potential to benefit service operators, satisfy user service level agreements and accurately monitor and control network traffic, which further reduces and minimizes the operating cost. On one hand, NFV moves network functions out of dedicated hardware boxes to the software based on general hardware platform. SDN moves control functions out of the hardware and places it in the software controller. Therefore, the service deployment and service chains can be provided and reconfigured in the controller. In this way, not only flexible and dynamic operations are allowed, the chance for operation error and events will be much smaller because the network controller has an overall view, which reduces the probability of inconsistent configurations.

Moving the required network functions into software means that deploying the service chain no longer requires acquiring a dedicated middle box. In this case, the network functions execute as the software running on virtual machines with the control of a hypervisor 512, which enable flexible computational and networking resource provisioning. Thus, since the computational capacity can be increased when required, there's no need to over-provision. On the other hand, software-defined NFV service chaining also helps the network upgrade process. For geographically distributed networks, upgrading network devices is costly. Moreover, the errors in the network updates and re-configuration can bring down the entire network. However, with the software-defined NFV, service providers are able to create new chains without radically changing hardware. Finally, service operator can utilize these service chaining techniques by themselves, instead of using third party providers. With intelligent service chaining, complexity of resource provisioning is significantly reduced. Thus, service providers can deliver services on demand without the help of third parties.

FIG. 7 illustrates an example of the service chaining process. Within a software-defined NFV architecture, a unified control and orchestration framework 502 is required to integrate the SDN controller 508, forwarding elements 702 and virtual network functions 573. Moreover, due to the existence of dynamic function and resource provisioning, this framework should also provide coordinated control of both network forwarding state and network functions states. Taking user policies 704 as inputs, the control module 502 assigns the NFs 706 fulfilling these services in an optimal way and meanwhile the optimal routing paths 708 of all policies are selected taking account of the resource constraints. The service functions 710 are then chained by the centralized controller and the traffic flows 712 are steered according to the service chains.

Challenges and Problems of Network Function Virtualization

NFV is an important innovation and a promising approach for the service operators and providers. However, it also faces several challenges. Here the corresponding challenges, open problems, and related solutions are summarized with the classifications organized in Table 1.

Function Virtualization

The virtualized functions should meet performance requirements to support packet processing at line-rate for multiple tenants. First, since neither the hypervisors 512 nor the virtual machines 573 have been optimized for the processing of the middle box, obtaining high performance, i.e., high I/O speed, fast packet processing, short transmission delays, etc. from standard servers is the main challenge for function virtualization. Further, as a server may implement a large amount of functionality, their platforms should host a wide range of virtual machine 513 and software packages. Finally, NFV hardware and software platforms should support multi-tenancy, because they are concurrently run by software belonging to the different operators. These co-located VNFs 304 should be isolated not only from a security but also a performance point of view. Here is a summary of some important related works on function virtualization.

-   -   1) DPDK is a set of libraries and drivers for fast packet         processing for the network functions. DPDK can be run on a wide         range of processors. However, the DPDK system has some         limitation to support virtualization as it cannot support         flexible, high performance functionality in the NFV environment.     -   2) NetVM is a software platform for running diversity network         functionality at line-speed based on the general commodity         hardware. It takes advantage of DPDK's high throughput packet         processing capabilities, and further enables flexible traffic         steering and overcomes the performance limitations of hardware         switching. Thus, NetVM provides the capability to support         network function chains by flexible, high-performance network         elements.     -   3) ClickOS is a high-performance, virtualized software network         function platform. It provides small, quickly booting, and         little delay virtual machines, and over one hundred of them can         be concurrently run while guaranteeing performance on a general         commodity server. To achieve high performance, ClickOS relies an         extensive overhaul of Xen's I/O subsystem to speed up the         networking process in middle boxes. ClickOS is proof that         software solutions alone are enough to significantly speed up         virtual machine processing, to the point where the remaining         overheads are dwarfed by the ability to safely consolidate         heterogeneous middle box processing onto the same hardware.         Portability

The NFV framework is expected to support the loading, executing and moving of VNFs 304 across different but standard servers in multi-vendor environments. This capability is known as portability. These virtualized network functions defeat the portability goal and key benefits of NFV, namely the capability of multi-tenancy and resource isolation. The portability challenge is how to achieve high performance leveraging hardware accelerators and at the same time have hardware independent NFs. This approach ensures that the VNFs 304 are OS-independent and resource isolation is also guaranteed since the VNFs 304 are executed on independent VMs and are decoupled from the underlying OS by the hypervisor layer.

Standard Interfaces

NFV relies on existing infrastructure to touch the customer. In this case, it is also highly unlikely that an upgrade of the physical network or entire operational support systems will be feasible. This is a management software integration challenge with the interfaces between NFV and underlying infrastructure. On the other hand, the interfaces between the centralized controller and VNFs 304 should also be standardized. To smoothly bridge NFV with upper and lower layers, the VNFs 304 and the underlying computing platform should be described by standard templates that enable flexible control and management. Thus, north- and south-bound interface APIs 412, 422 need to be developed. North-bound interface 412 interactions are used to control and manage functions to different types of instances, e.g., physical servers, VM 513 and VNFs 304. Since network functions need service-oriented APIs to be controlled directly or indirectly, each network service has a specific operation policy and SLA. Moreover, VNFs 304 could use the north-bound API 412 for the requests. On the other hand, the south-bound APIs 422 are utilized to communicate with the NFVI 306 and request information from other framework entities. Thus, how to design a flexible and efficient API for both the north-bound and south-bound communications are important problems in the research and development of NFV technologies.

Function Deployment

Fine-grained deployment, control and management of network functions are needed in the context of NFV-enabled network nodes, for various optimization purposes. Thus, many challenges are related to algorithm and system design of function deployment.

One of these challenges is to automatically provide network and function process resources according to the usage of the resources involved. A similar and probably even more important challenge is to achieve automatic placement and allocation of the VNFs 304, since the placement and assignment of the VNFs 304 significantly impact the performance of service chaining. Both automated provisioning and placement require a global view of the resources and a unified control and optimization system with various optimization engines running in it. Another issue is to translate higher-level policies, which are generated from the resource allocation and optimization mechanisms, into lower level configurations. Templates and standards should be developed to guarantee automated and consistent translation. For example, when there is a need to achieve a high-level goal of reducing the networking transmission delay, the optimization engine may require an algorithm to provision and place virtual functions ensuring that the least overall transmission delay is achieved. Conversely, when it is required to achieve the minimum or maximum link utilization, it would need a different optimization engine with a different algorithm. For more effective operation and control, the optimization approach should support real-time swap to make provisioning and placements that dynamically match the high-level policies from the operator and application.

Traffic Steering

SDN offers the new agility of traffic steering by allowing the network operators and service providers to specify a logical control policy, and then automatically translates this into data plane 414 forwarding rules. Prior to this, the routing paths are carefully selected by the optimization framework taking into account the physical topology, link capacities, and network resource constraints. Solid work has been done on traffic steering in hardware based middle box systems. However, in the software-defined NFV architecture, traffic steering is jointly optimized with NFV deployment that can achieve better composition. However, the unified optimization paradigm also makes the optimization problem difficult to solve since more variables are introduced. To achieve online computing of traffic steering, heuristic algorithms should be designed to reduce the computing complexity.

TABLE 1 Challenges Description Solution Function Virtualized functions Important related works: Virtualization should meet certain (1) DPDK, a set of requirements to support libraries for fast packet packet processing at processing. line-rate: (2) NetVM, a system for (1) High performance running network (high I/O speed, fast functionality and packet processing, middlebox at line-speed short transmission in general commodity delays, etc.) hardware. (2) Support multi- (3) ClickOS, a small, tenancy quick-boot, low-delay, (3) OS-independent virtualized software middlebox platform. Portability The NFV framework is Deploying network expected to load, execute functions via a virtual and move VNFs across software environment different but standard enhances the portability. servers in multi-vendor This approach ensures environments. This that the VNFs are OS- capability is known independent and resource as portability. isolation is also guaranteed. Standard Standardized API Both VNFs and computing Interfaces should be developed to resources are described enable NFV to reach via standard templates. the customers via Normalized north- and underlying infrastructure south-bound should be and to be centrally developed between these controlled and managed. layers. Function Fine-grained deployment, A monitoring system Deployment control and management collecting and reporting of network functions, are on the behavior of the needed in the context resources, and a unified of NFV-enabled network control and optimization nodes, for various system with various optimization purposes. optimization engines should be developed. Traffic In the software-defind To achieve online Steering NFV architecture, computing of traffic traffic steering should steering, heuristic be jointly optimized algorithms should be with function deployment, designed to reduce the making the optimization computing complexity. problem difficult to solve. Applications

Software-defined NFV technology is useD for delivering significant benefits in niche applications today, while its full scale use and benefits have yet to be achieved. The following describes the major domains that will dominate the software-defined NFV scenario over next few years.

Cloud-Computing

Cloud computing enables globally distributed services and enterprises to quickly deploy, manage and optimize their computing infrastructure dynamically. Partitioning or replicating a service across multiple globally distributed instances allow these services to move closer to the users thus providing richer user experiences, avoid infrastructure bottlenecks, and implement fault tolerance.

NFV is an enabler of such dynamic service provisioning. By replacing service elements with virtual network functions, new functions can be added or improved by updating a software image, rather than waiting for a vendor to develop and manufacture a dedicated box. Furthermore, while integrated with SDN, service providers can express and enforce application traffic management policies and application delivery constraints at the required level of granularity.

NFV allows service providers to provide better services to the users by dynamically changing their deployment topologies or traffic allocations based on user access patterns, user consumption and mobility, infrastructure load characteristics, infrastructure failures and many such situations that may cause service degradation, disruption or churn. Similarly, replicated service instances might need to be moved/instantiated/released to mask infrastructure failures, load conditions, or optimize the deployment based on consumption patterns and social interaction graphs. NFV can also provide intelligent infrastructure support for such dynamic service deployment scenarios. Moreover, since NFV offers good support for multi-tenant usage, it is available for wide area dynamic multi-cloud environments that can be shared by multiple providers to implement their specific distributed service delivery contexts.

Below are summarized some important works trying to implement NFV in clouds:

1) CloudNFV

2) THE REALTIME CLOUD

3) CLOUDBAND

Mobile Network

NFV considers all network functions for virtualization through well-defined standards, i.e., in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station. NFV also benefits data centers owned by mobile service providers, including mobile core network, access networks and mobile cloud networks.

For the core networks, which are the most important part of mobile networks, NFV allows the cellular providers to adopt a network more akin to the data centers, which consist of simple forwarding devices 504, with most functionality executed in commodity servers that are close to the base stations. Some network functions can even be fulfilled by packet-processing rules installed directly in the switches. In the system, a logically centralized controller is able to steer the network traffic through the required network functions to realize service chaining.

For the access networks, the base stations are being virtualized as well. Thus, SDN and NFV are applied to the wireless access networks to sharing their remote basestation infrastructure to achieve better coverage and services with the minimum investment of CapEx and OpEx.

Enterprise Network

NFV is also being utilized in the enterprise network. Network managers would like to consume as much or as little of the network as they need, but there is a gap between what enterprise customers want and what service providers can offer today, which can be address by NFV. It enables the dynamic provisioning of virtual network services on commodity servers within minutes instead of months.

NFV for the enterprise will require their platform to become more comfortable embracing software L4-7 services, as well as changes in their operation models. An understanding of how to optimize performance with DPDKs, and potentially even looking at programmable hardware is critical. Another challenge is the time and process it takes to re-architect monolithic services that were predominantly deployed for north-south traffic.

A comprehensive overview of NFV within the software-defined NFV architecture is provided. NFV and its relationship with SDN has been introduced. The evolution of NFV has been reviewed and the discussion has covered how middle boxes evolved to virtual network functions. In particular, service chaining as a typical application of NFV has been described. Furthermore, software defined NFV challenges and possible solutions were covered. Next, a discussion of how to take the SDN and NFV concepts and leverage them in planning, designing and implementing a wireless backhaul, fronthaul and last mile access networks using standard based protocols as well as open source protocols will be provided.

Access and backhaul networks need to carry significantly more data in order to support ever growing data use within networks which calls for network densification. However, as illustrated in FIG. 8, when many small cells 802 are densely deployed within a small cell network 804, the backhaul network 806 may become a bottleneck due to the issues with providing a wireline link 808 between each cell 802 in the backhaul network 806 due to the large number of wireline connections within a network. The backhaul network 806 then further provides interconnection to the core network 810 for passing messages to and from the small cell network 804.

Referring now to FIG. 9, there is illustrated an implementation of a wireless small cell network 902. The small cell wireless backhaul network 902 is needed due to its multi-hop operation and ability to operate in multiple bands (mmWave bands, Sub 6 GHz bands and free space optical (FSO) bands. The small cell network 902 provides a plurality of wireless connections 904 between the cells 906 and the backhaul network 908. The backhaul network 908 then forwards messages received on the wireless communications links 904 to/from the core network 910.

Referring now also to FIG. 10, there is illustrated the manner to utilize an SDN-based system for creating the connections with the small cell network 902. An SDN controller 1002 enables connections to a number of different small cell backhaul nodes 1004. The SDN controller 902 is based on OpenDaylight and controls adaptively powering on/off small cells 1004 and reconfigures the backhaul forwarding topology according to traffic demands. OpenDaylight is a collaborative open source project hosted by the Linux foundation. OpenDaylight promotes software defined networking (SDN) and network function virtualization (NFV). OpenDaylight software is written in the Java programming language. OpenDaylight supports technologies such as OpenFlow. OpenDaylight is a modular open platform for customizing and automating networks of any size and scale. OpenDaylight is driven by a global, collaborative community of vendor and user organizations.

The core of the OpenDaylight platform is the Model-Driven Service Abstraction Layer (MD-SAL). In OpenDaylight, underlying network devices and network applications are all represented as objects, or models, whose interactions are processed within the SAL. The SAL is a data exchange and adaptation mechanism between data models representing network devices and applications. The data models provide generalized descriptions of a device or application's capabilities without requiring either to know the specific implementation details of the other. Within the SAL, models are simply defined by their respective roles in a given interaction.

The OpenDaylight platform is designed to allow downstream users and solution providers maximum flexibility in building a controller to fit their needs. The modular design of the OpenDaylight platform allows anyone in the OpenDaylight ecosystem to leverage services created by others; to write and incorporate their own; and to share their work with others. OpenDaylight includes support for the broadest set of protocols in any SDN platform—OpenFlow, OVSDB, NETCONF, BGP and many more—that improve programmability of modern networks and solve a range of user needs

The SDN controller 902 uses an optimizer module 1006 that is configured with different policies in order to minimize the power and latency and maximize system capacity. The optimizer module 1006 uses SDN for the operation and management of small cell wireless networks to extend the OpenFlow protocol in order to gather wireless and power consumption statistics, which are exchange between the controller 1002 and small cell backhaul nodes 1004 using and an LTE out of band control channel 1008. OpenFlow is a communication protocol that provides access to the forwarding plane of the network switch or router over the network. OpenFlow enables network controllers to determine the path of network packets across a network of switches. The controllers are distinct from the switches. The separation of the controller from the forwarding allows for more sophisticated traffic management than is feasible using access control lists and routing protocols. Also, OpenFlow allow switches from different vendors to be managed remotely using a single, open protocol. OpenFlow is an enabler of software defined networking.

OpenFlow allows for the remote administration of a layer 3 switch's packet forwarding tables, by adding, modifying and removing packet matching roles in action. Routing decisions can be made periodically or ad hoc by the controller and translated into rules and actions with a configurable lifespan, which are deployed to a switch's flow table, leaving the actual forwarding of matched packets to the switch at wire speed for the duration of those rules. Packets which are unmatched by the switch can be forwarded to the controller. The controller decides to modify existing flow table rules on one or more switches or to deploy new rules, to prevent a structural flow of traffic between switch and controller. It could even be decided to forward the traffic itself, provided that it is told the switch to forward entire packets instead of just the header. The OpenFlow protocol is layered on top of the transmission control protocol and proscribes the use of transport layer security.

Referring now to FIG. 11, there is illustrated a heterogeneous network (HetNet) 1102. In a HetNet, a dense small cell network 1102 comprised of a number of small cell nodes 1004 that coexist with an overlay of LTE eNBs 1104 providing the basic coverage. In such a deployment, traffic from user equipments (UE) 1106 are forwarded from the small cell node 1104 over multiple wireless backhaul links 1108 to a gateway node 1110, which is typically co-located at the eNBs 1104. Thus, in a multi-hop deployment, routing and forwarding are crucial aspects to consider, since they have to dynamically power on and off nodes 1004, according to traffic demand changes creating a liquid wireless backhaul were network resources are used where they are needed. Multi-hop deployment is used for routing and forwarding of the data plan over a multiband (mmWave, sub 6 GHz and FSO) network.

With software defined networking (SDN), packet forwarding can be handled by a centralized controller 1002 (FIG. 10), in a flexible and effective way. Adding device configuration capabilities for this kind of architecture allows small cell wireless networks to be fully managed. In a typical SDN-based architecture, the SDN controller 1002 sends OpenFlow messages that must be routed over the wireless links 1008 towards the 1004. This can lead to potentially long latency.

An SDN-based network architecture for small cell backhaul operation and management is proposed for dealing with these latency issues. Referring now to FIG. 12, based on the HetNets concept, the proposed SDN controller 1202 transmits an OpenFlow messages 1204 via LTE control channels 1206 directly to small cell nodes 1208. Extensions to the OpenDaylight (ODL) controller 1210 provide the necessary resilient routing infrastructure for a small cell backhaul operation. A backhaul orchestrator 1212 dynamically optimizes the small cell backhaul by minimizing power and latency while maximizing the capacity of the backhaul network.

Referring now also to FIG. 13, there is illustrated a more detailed description of a backhaul network KPI (key performance indicator) 1302. The backhaul network KPI 1302 is implemented within the SDN controller 1202 to enable communications between the SDN controller and small cells within the small cell backhaul network. As mentioned previously, the OpenDaylight controller 1210 provides routing infrastructure for the small cell backhaul operation. The OpenDaylight controller 1210 utilizes an application program interface 1304 for enabling communications between the controller 1210 and a backhaul orchestrator 1212. The backhaul orchestrator 1212 dynamically optimizes the small cell backhaul by minimizing power and latency while maximizing the capacity of the backhaul network. The backhaul network KPI 1302 must maintain a communication channel 1206 with the SDN controller 1304 in order to be able to exchange control plane messages with the small cell nodes 1208. This communication channel 1206 can be established in the same network interface as the one used for the data plane (in-band connectivity) or in a different interface (out-of-band). With in-band connectivity, the infrastructure costs are reduced, but if link failure occurs, the node loses the connection with the controller 1210. Out-of-band control plane connectivity requires an additional NIC (network interface controller) in the managed devices. An LTE interface 1210 is used on each SDN enabled small cell backhaul node 1310 for SDN control plane connectivity, in order to provide a robust channel and reduce SDN control latency while the data plane is using the multi-hop backhaul connectivity over a multiband (mmWave, sub 6 GHz and FSO) network.

Small cell wireless backhaul links may have dynamic link outages, especially when operating at mmWave band. A link can temporarily go from non-line of sight to outage (e.g. due to blockage), leading to changes in the backhaul topology and consequently, in the available capacity. When such events happen, the SDN controller 1202 can perform path recalculation between the backhaul small cell nodes 1208 but the process may take a significant amount of time. The backhaul network KPI 1302 as illustrated in FIG. 13 uses fast failover (FF) group tables 1306 from the OpenFlow plug-in 1308 to rapidly repair link failures locally.

The backhaul orchestrator 1212 communicates with the multidimensional optimizer 1310. The Orchestrator Interface 1304 is used to communicate with the backhaul orchestrator 1212 in order to perform the reconfiguration of the small cell backhaul network. Also, this configuration can be triggered by the backhaul orchestrator 1212 through this REST API. The new configurations are pushed to the wireless communications services (WCS) and new paths are requested to the Path Calculator. The multidimensional optimizer 1310 finds a maximum value based upon latency, capacity and 1/power using Euler-Lagrange multipliers. The backhaul network KPI 1302 further includes a packet inspection/handling module 1312. The packet inspection/handling module 1312 inspects and controls the data packets that are transmitted over the communications channels 1203 to the small cell nodes 1208. The packet inspection/handling module 1312 parses packets sent to the SDN controller 1202 (e.g. for new flows when no rules are installed at the small cell backhaul nodes 1208). The extracted information is sent to the path calculator 1314, which replies with a primary path from the source to the destination node according to a given path calculation strategy. The original packet is then sent back to the destination node.

The path calculator 1314 is responsible for calculating alternate paths to the small cell nodes 1208 when existing links fail. The path calculator 1314 computes paths between the powered on small cell backhaul nodes 1208 and instructs the installation of new forwarding rules. The path calculator 1314 uses a network graph that contains only the active nodes. If the fast failover (FF) strategy is active, a maximum disjoint path is also calculated from each intermediate node, and the required forwarding rules are installed in combination with the usage of the FF group table 1306 feature from OpenFlow. The link/path processing calculation module 1314 uses information from the neighbor list 1316 to make the new path calculations. The neighborhood mapper 1316 is a database list of small cell nodes and their associated neighboring nodes. The neighborhood mapper 1316 infers the neighborhood and interference graph for each node/link from the existing topology. Small cell backhaul nodes 1208 send out periodic beacons to neighbors. The collected information statistics are sent to the SDN controller 1202 and used to augment existing data from the backhaul links

The OpenFlow plug-in 1308 includes an OpenFlow detection module 1318 for detecting OpenFlow messages. The flow process module 1320 calculates the message routing. The wireless configuration service 1322 sends wireless specific configuration requests to the managed small cell backhaul nodes 1208 through an OpenFlow protocol extension. The Wireless Statistics Manager 1328 collects wireless related statistics from the managed small cell backhaul nodes 1208 over an aggregator API 1330 through an extension of the statistics manager component 1324 from the OpenFlow Plugin 1308. The statistical information is fed to the statistics module 1324 from the small cell nodes 1208. The requests and statistics can have different types, which are specified by a bit mask field in the request body. Each of the modules within the OpenFlow plugin 1308 communicates with the small cell nodes 1208 through an OpenFlow API 1326. A metrics collector 1328 is responsible for obtaining network performance metrics that cannot be directly retrieved through OpenFlow plug-in 1308. The metrics are obtained through the aggregator API 1330. The calculated data is merged into the available statistics and can be used by every other SDN controller 1202 component.

Referring now to FIG. 14, there is illustrated a flow diagram of the process for link repair. Upon occurrence of a link failure at step 1402 a disjoint backup path toward the gateway node 1110 at each small cell backhaul node 1004 is calculated at step 1404 using the fast failover group tables 1306. If the failure that triggered the usage of a different network path persists, as determined at inquiry step 1408, the controller 1302 week calculates new routes at step 1410 based upon the current apology and previously calculated energy optimization strategies. Control then passes back to inquiry step 1408 to determine if the failure persists. When the failures do not persist, the process is completed at step 1402.

With SDN it is possible to have flexible path calculation strategies act on detailed forwarding decisions. For multi-hop small cell backhaul networks, it will be essential to control the existing paths latency. This requires an estimation of the delay for each link and path at the SDN controller 1202 which can also depend on existing queuing strategies to implement control of existing paths' latency. Therefore, some flows might be routed along low latency paths, while others are routed to higher latency paths with higher capacity. New routing algorithms might be needed, allowing fast path calculation while supporting multiple constraints (bandwidth, latency, capacity and power). Therefore, the SDN-based network would manage flow rules, wireless link and our management parameters. The SDN based network interacts with a backhaul orchestrator 1212, responsible for optimizing the backhaul network operation.

Due to the increasing traffic demand, existing mobile access and backhaul networks face a capacity problem. In order to increase the capacity, it is customary to deploy many small cells which may be dynamically controlled based upon traffic demand as illustrated in FIG. 15. The small cell backhaul network 1502, as described previously, consist of a plurality of individual small cell nodes 1504 that are interconnected via communication links 1506. Each of the small cell nodes 1504 are interconnected with each of the small cell nodes within its vicinity via one of the communication links. Thus, for example as illustrated in FIG. 15 node 1504 x is interconnected with each of the surrounding nodes 1504 y (in this case eight nodes) through an associated communication link 1506. Thus, node 1504 x can communicate over the small cell backhaul network 1502 through any of the adjacent small cell network nodes 1504 y.

As a consequence, the backhaul fabric for small cell networks 1502 needs to cope with the massive increase in user demands since the laying of fiber to each small cell node 1504 is not economically feasible. It is possible to have mmWave based mobile backhaul networks due to the large chunk of spectrum that is available both in unlicensed bands (the 60 GHz and 70/80 GHz bands) as well as licensed bands of 24, 28 and 39 GHz. However, due to the specific propagation characteristics of the mmWave spectrum, communications links 1506 between small cell nodes 1504 may face challenging network outages. Additionally, a more flexible design of the backhaul network 1502 is desired in order to cope with the diversification of service requirements.

A small cell backhaul network architecture based on the concept of software defined networking will be able to address these issues and provide a mmWave based mobile backhaul network. Referring now to FIG. 16, in order to cope with the dynamics of mmWave, the SDN control plane calculates for each small cell node 1602 a backhaul primary link 1604 and a set of backup links 1606. The set of backup links 1606 include at least one backup link which may be utilized if the primary link 1604 goes out. Using OpenFlow Fast Failover groups such as those described herein above, a fast local repair of a mmWave backhaul link 1506 can be achieved leading to a resilient backhaul mesh architecture. The proposed architecture leads to a lower packet loss and consequently higher throughput data rate and better network reliability.

Referring now to FIG. 17, network reliability may also be improved utilizing an architecture wherein each node 1702 uses SDN-based channel estimation to multiplex between line of sight (LOS) mmWaves, non-line of sight (NLOS) sub-6 GHz and free space optics (FSO) transmissions. This is achieved using a LOS mmWave transceiver 1704 for transmitting line of sight millimeter waves 1706, an NLOS transceiver 1708 for transmitting non-line of sight sub-6 GHz signals 1710 and a FSO transceiver 1712 for transmitting FSO signals 1714. Multiplexing control circuitry 1716 multiplexes between the LOS mmWave transceiver 1704, an NLOS transceiver 1708 and an FSO transceiver 1712 based upon the environmental and system operating conditions. When the atmospheric conditions are good, the network relies upon the FSO transceiver 1712. When atmospheric conditions become foggy or rainy, the system adaptively switches to RF LOS transceiver 1708 or the LOS transceiver 1704 using the multiplexer control 1716. If the operating environment has many physical obstacles between the transmitter and the receiver, the system would select the NLOS transceiver 1708.

Despite introducing new technologies at lower layers of the protocol such as better modulation and coding schemes or coordinating multipoint transmissions, the predicted demand is much higher than what can be supported with new physical layer only technologies in the short term. A common assumption to provide increased capacity at scale is to use a higher frequency band were more spectrum is available and to reduce the cell size in order to increase spatial reuse. Backhaul operation is often dominated by proprietary solutions which hinder innovation. An important challenge to solve for small cell backhaul links is an efficient but flexible forwarding architecture which relays user data over a multi-hop wireless backhaul between a plurality of small cell nodes.

Referring now to FIG. 18, in a typical SDN-based architecture, a centralized controller 1802 installs within small cell nodes flexible rules 1804 that determine the forwarding behavior within the data plane. However, a forwarding configuration addressing the inherent resiliency challenges to cope with unstable backhaul links using a combined RF LOS, NLOS and FSO has not been previously addressed. A resilient forwarding configuration of an SDN-based small cell wireless backhaul network 1806 that focuses on SDN-based resiliency mechanisms and uses the concept of OpenFlow fast failover groups 1808 as described hereinabove. The controller 1802 calculates each link 1506 for each small cell node 1504 backup links toward the Gateway. The main link and the backup link are both placed into a fast failover group 1808. The small cell node 1504 uses rapid link monitoring to locally detect if a link is in the outage stage, in which case, the OpenFlow-based fast failover locally switches from a main link to a backup link.

The traditional SDN concept relies on a centralized control plane, which exercises control on forwarding decisions in the data plane. Consequently, the control and data planes are decoupled which allows a very flexible forwarding control. However, using SDN for small cell backhaul links present several challenges. This is because the performance and reliability of mesh-based backhaul networks such as that illustrated in FIG. 15 depends on fast local reactions to topology changes where a centralized control plane is typically too slow to react. Therefore, there been attempts to use proprietary routing and forwarding decisions based on distributed protocols were SDN is used to steer traffic.

In an alternative approach as illustrated in FIG. 19, the forwarding decisions inside the backhaul may be configured by the SDN control plane. SDN-based resiliency using fast local restorations 1902 (e.g. implemented inside the data plane 1904 of the cell small backhaul nodes 1906) may be used whenever local problems such as link outage transitions of the millimeter wave backhaul links are detected. This local repair mechanism, which can be preinstalled, avoids the need to ask the controller how to react in a case when a neighbor node cannot be reached anymore and leads to a more robust data plane behavior.

Referring now to FIG. 20 there is illustrated the process for implementing SDN-based local repair. The process uses SDN to calculate a primary and a secondary path for small cell backhauling. SDN-based local repair is implemented using fast failover groups 1808 (FIG. 18). A primary and a secondary action are put into the same group. Consequently, the SDN controller calculates for each small cell a primary path at step 2002 towards the gateway. Additionally, the SDN controller calculates a backup path towards the gateway at step 2004. Based upon the path calculations, the SDN controller installs forwarding rules for the primary path at step 2006 into the fast failover group 1808 and will additionally install forwarding rules at step 2008 for the backup path into the fast failover group.

Once data packets arrive at a small cell node at step 1010 which should be forwarded to a neighboring small cell node using mmWave links, the data packets will be forwarded according to the first port in the fast failover group table whose port state is active. This requires an OpenFlow data path implementation which uses for each neighbor a dedicated OpenFlow port. Once the primary port is detected to be down, the data packets are automatically forwarded using the next active port, i.e. towards a different neighbor where there is an active backup link. Thus, a determination is made at inquiry step 2002 if the primary path is working. If so, control passes on to step 2014, and the packet is forwarded on the primary path. If inquiry step 2012 determines that the primary path is not working, the packet is forwarded on the backup path at step 2016. The process is then completed at step 2018. This process allows the small cell node to perform a local failover instead of the SDN controller performing a centralized failover. This significantly reduces the reaction time to failures in the mesh forwarding structure.

Referring now to FIG. 21, there is illustrated the process for detecting link state and transmitting on primary and backup links. In order to detect the link state, bidirectional forwarding detection (BFD) is a commonly used technology. BFD determines the state of the court by establishing a connection at step 2102 using a three-way handshake routine. BFD next waits a predetermined period of time at step 2104 and then transmits a periodic control message at step 2106. Inquiry step 2108 determines if a response to the control message has been received. The timeout period is determined by the control messages between the BFD messages. If a response to the control message is received, transmissions are carried out on the link at step 2110 and control passes back to step 2104 to await an additional predetermined period. If no response to the control message is received within a specified time interval, the link is considered down at step 2112. In this manner, link failures may be rapidly detected and reacted to. Consequently, small cell backhaul nodes would send periodic BFD messages to each neighboring backhaul node over the mmWave links to detect link states. Once BFD detects a link down event at inquiry step 2108, the link state is set to down at step 2112. This triggers the OpenFlow datapath to start transmitting to a different neighbor small cell. This is achieved by selecting a backup link at step 2114.

Alternatively, MAC layer protocol messages can be used in order to infer the state of the mmWave backhaul links, which could be integrated into the OpenFlow data path. The media access control (MAC) layer is a lower sublayer of the data link layer of the seven-layer OSI model. The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.

A layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that comprise the contents of that path. Two instances at the same layer are visualized as connected by a horizontal connection in that layer.

The MAC sublayer provides addressing in channel access control mechanisms that make it possible for several terminals or network nodes to communicate with a multiple access network and incorporates a shared medium, e.g. an ethernet network. The hardware that implements the MAC is referred to as the media access controller. The MAC sublayer axis the logical link controller (LLC) sublayer and the networks physical layer. The MAC layer emulates a full-duplex logical communication channel in a multipoint network. The channel may provide unicast, multicast or broadcast communication service.

A weakness with fast failover is that it can only perform local failover. If no alternative local path is available, e.g. all neighbors are not reachable anymore, then crankback routing must be performed. This requires that the packet be sent backwards toward the source to a small cell node which has an alternative active path towards the destination. Thus, crankback forwarding can potentially have large impacts on the latency. Such latency can be reduced significantly by introducing stateful forwarding in the data plane using OpenState. OpenState is a research effort focused in the development of a stateful data plane API for Software-Defined Networking. OpenState is more particularly described in the OpenState v1.0 specification. If packets arrive at a small cell forwarding node which does not have a next hop towards the destination node because the link is down, the node tags the packet and the packet is sent back towards the source. When the message reaches the small cell node having a backup path, the state of the forwarding rules change in such a way that the coming packet traverse the backup path already at the node. Therefore, once a backup link is selected at step 2114, inquiry step 2116 determines if the backup link is operating and available. If so, transmissions are then carried out on the backup link at step 2118 and control passes back to step 2104. If the backup link is not available as determined at inquiry step 2116, the crankback forwarding process is carried out at step 2120 and transmissions carried out on allocated available link.

Referring now to FIG. 22, the use of SDN and NFV within the edge/access network 2202 connected to a backhaul network 2204 in addition to being useful as described herein above, may also be used for providing a high capacity last drop access connections to users 2206 that lowers costs and guarantees flexibility. Last drop connection comprises a wireless access 2202 from the edge/access network 2204 to the user 2206. The last drop connection 2208 is the access connection to a network by user 2206. Data from a user 2206 may be provided over the wireless last drop connection 2208 to the edge network 2202 and then forwarded onward to the backhaul network 2204 and network core 2210. These last drop connections 2208 can be provided between the edge network 2202 and users 2206 in a number of fashions. A last drop connection 2208 provided in the described manner provides a high-capacity access solution that lowers cost and guarantees flexibility and scalability for both residential and enterprise customers with 60 GHz access in both backhaul and fronthaul.

Mesh networks can be applied to both access networks 2202 (from base to end users) and backhaul networks 2204 (from base to network core). A mesh network means that each node is connected to at least two or more sites, so that when a link is broken, the mesh network can self-heal itself, by finding another path to keep the network connections active. FIG. 23 illustrates the use of a mesh network 2302 for the last drop connections 2208 between the user 2206 and the edge network 2202. While the following description is made with respect to using a mesh network to provide the access network 2202 connections, the mesh network could be applied in a similar manner as part of the backhaul network 2204. The last drop connection 2208 comprises what may be termed as a self-organized network for access 2402 as illustrated in FIG. 24. The mesh network 2302 may comprise one or both of an indoor or outdoor network. The mesh network 2302 uses a 60 GHz network to provide scalable capacity and control that is not available in public networks. The self-organized network for access 2402 includes a number of characteristics enabling the communications. The self-organized network 2402 includes a number of characteristics including that the network is self-healing 2404, self-configuring 2406, self-optimizing 2408 and provides auto provisioning 2410. The network 2402 is self-healing 2404 in that when a communications link within the network 2404 breaks down, the network may self-correct the problem in order to cure the failed link. The network 2402 is self-configuring 2406 in that the network software may reconfigure the links automatically without any external inputs from a network manager in order to correct failed communication links. The network 2402 is self-optimizing 2908 in that decisions for placement of nodes within the network 2402 are made in order to optimize the closeness to the various end-users and to further minimize backhaul cost in order to reduce overall network costs. Finally, the auto provisioning functionalities 2410 of the network 2402 enable the network to automatically establish new communication links that are generated based upon failed existing communication links.

Referring now to FIG. 25, there is illustrated a portion of a mesh network 2502 used for implementing the self-organized network for access 2402 described with respect to FIG. 24. The mesh network 2502 includes a plurality of nodes 2504. Each of the nodes 2504 include at least two links 2506 providing a pathway from the node to at least two other nodes. This is done to provide a backup link should a primary link fail. This use of the backup and primary link utilizes SDN and NFV processes such as those described hereinabove. The wireless communication links 2506 between nodes are provided using standard-based unlicensed V-band (60 GHz) to provide SDN/NFV based packet network communications between the nodes 2504. This provides for a 1 Gbps access to users. The use of SDN and NFV processes are used for maintaining the communication links 2506 between nodes 2504. The described system provides solutions to support existing and future traffic demands using a system that leverages existing technologies, new processes, topologies and architectures.

FIG. 26 illustrates a mesh network 2602 that may be used for interconnecting with a number of users. The mesh network 2602 comprises a number of nodes 2604 that communicate with each other using V-band (60 GHz) communications transceiver. The 60 GHz V-band has been standardize under the WiGig standards. The 60 GHz V-band currently provides 7 GHz of spectrum. However, the US is planning to expand the V-band spectrum to include an additional 7 GHz to provide a total of 14 GHz of spectrum. The 60 GHz V-band spectrum provides a communications between nodes at a distance of approximately 200 m to 250 m from each other as indicated generally at 2606. Thus, the transmission distance between nodes 2604 within the 60 GHz system is somewhat limited. The mesh network 2602 implements a number of phase array antennas at the nodes 2604 to retain the highly directional signal required for 60 GHz, but makes the communication links steerable to communicate over a wide area. The use of the 60 GHz V-band enables transmitted signals to be routed and steered around interference typically found in dense urban environments, such as tall buildings or internet congestion due to high user traffic. Thus, as illustrated generally at 2608 by the dashed line, an interfering structure or phenomena, such as a building, may prevent signals from being easily transmitted from nodes positioned at locations 2604A. Thus, when transmitting from node 2604B to node 2604C, system controllers would utilize nodes 2604D rather than nodes 2604A to route signals to steer around the interference structure 2608.

Thus, as shown in FIG. 27 a mesh network would enable an interconnection between a network site 2702 and a number of residential or enterprise users 2704. In this case, each of the access sites 2706 comprises nodes within an associated mesh network. The access sites 2706 wirelessly communicate with each other over communication links 2708 and communicate with the network sites over communication links 2710 which may be wireline or wireless. The access sites 2706 communicate with the residential or enterprise users 2704 over a 60 GHz wireless link 2712.

The communications over the wireless communications link 2712 between the access sites 2706 and in the users 2704 may be implemented using MAC layer protocols and TCP-IP protocols. Normally, MAC layer protocols and TCP-IP protocols are used for packet data transmissions over wireline networks. However, modified, high performance MAC layer protocols (TDMA-TDD MAC) and TCP-IP protocols may be used for communicating over a wireless communications link such as that utilize between the access sites 2706 and users 2704 that overcome the shortcomings of TCP-IP over a wireless link. This can provide up to a 6× improvement in network efficiency and make the TCP-IP protocol more predictable on a wireless link as compared to the existing Wi-Fi/WiGig standard. One example of a modified MAC layer protocol and TCP-IP protocol that may be utilized for wireless communications has been implemented by Facebook. Facebook is implemented using IPv6-only nodes and an SDN-like cloud compute controller and a new modular routing protocol for fast root convergence and failure detection. The Facebook system has re-architected the MAC layer protocol to solve the shortcomings of TCP-IP over a wireless communications link. The modified MAC layer protocol called TDMA-TDD MAC improves wireless network efficiency by 6X. By using concepts derived from LTE-TDD in a 60 GHz WiGi protocol network efficiency may be improved. These same MAC layer implementations may be used for controlling communication in the mesh network wireless communications.

The Facebook system implements a base station having 96 antennas that can support up to 24 different data streams simultaneously over the available bandwidth. The system has demonstrated a 71 bps/Hz data rate which will soon be increased to 100+ bps/Hz. The system comprises a massive MIMO system providing spatial multiplexing that achieves 1.05 Gbps bidirectional data throughput (2.1 Gb per second total throughput or distribution node) in the point to point transmission mode for nodes up to 250 m away. This enables up to 8.4 Gbps of total traffic per installation point assuming four sectors.

Referring now to FIG. 28, there is illustrated a configuration of the access and network sites that are used for providing the self-organized network for providing access to a number of user locations. The network site 2802 comprises an antenna 2804 communicating with the access site 2806 over a point-to-point E-Band link 2808. The antenna array 2804 may in one embodiment utilize Fujitsu GX 4000 antennas. The point-to-point E-band link 2808 comprises a 70 GHz backhaul link for interconnecting the network site 2802 with the access site 2806. The network site 2802 also includes a mini data center 2810 for storing data that may be accessed by users 2812. Data may be uploaded to or downloaded from the many data centers 2810 over an associated fiber ring 2814 interconnecting the network site 2802 to other network sites.

The access site 2806 also includes an antenna 2816 for providing the point-to-multipoint E-band and link 2808 with the network site 2802. The access site antenna 2816 may also comprise in one embodiment a Fujitsu GX 4000 antenna. The access site 2806 additionally includes a phased array of antennas 2818 for providing a point-to-multipoint V-band connection 2820. The phased array antennas 2816 provide point-to-multipoint transmissions to a plurality of residential or enterprise users 2812. Placement of each of the access site 2806 and network site 2802 are achieved using the Optima System that optimally locates access and network sites that is closest to the end-user but minimizes backhaul cost. At the access sites, specially constructed mini-towers provide a high-capacity, last drop access solution that lowers cost and guarantees flexibility. Placement of the access sites 2806 in this manner using the Optima System maximizes operation of the network. The Optima system determines the optimal longitude and latitude for the access site and additionally includes the Z value (height) of the antennas 2818 and 2816 in order to best locate the antennas on an access site poll. While the illustration of FIG. 28 illustrates a single access site 2806, it will be appreciated that the mesh network system will comprise a plurality of access sites 2806 each comprising a specially structured mini-tower.

The access sites 2806 and network sites 2802 may be configured to enable enhanced fixed broadband (eFBB), ultra-reliable low latency communications (uRLLC) with massive MIMO transmissions. The massive MIMO transmissions are provided from antenna arrays at access sites 2806 and network sites 2802 that provide for multiple input/multiple output transmissions. The antenna arrays from the access sites 2806 and the network sites 2802 provide for multipoint-to-multipoint and point-to-point transmissions. Enhanced fixed broadband is a fixed broadband that is enhanced with new advances (i.e., New Radio (NR) technology that uses new 3GPP advances in spectral mask that are more localized) as well as higher order modulation and new spectrum with carrier aggregation. Ultra-reliable low latency communications comprises a service category designed to meet delay-sensitive services such as the tactile Internet, vehicular to vehicular communication, autonomous driving and remote control. uRLLC has a time-to-transmit latency time (the time required to transmit a packet) of not greater than 0.5 ms. The performance level of a uRLLC system should provide a block error rate of at least 10⁻⁵.

Referring now to FIG. 29, there is provided a broader level network illustration of a plurality of optimally located access sites 2806 and network sites 2802 using both licensed and unlicensed data bands. In this case, the network sites 2802 comprise mini-towers with associated antennas located on MDUs (multiple dwelling units). Each of the mini-towers 2902 can either communicate via both the 28 GHz licensed band point-to-point link 2904 to access sites 2806 and to other network sites 2802 via point-to-point e-band connections 2906. The network site 2802 communicates with the access sites 2806 via the 28 GHz licensed band point-to-point links 2904. The network sites 2802 can communicate with other network sites 2802 by either a fiber link 2908 or with other network sites 2802 through a 70-80 GHz e-band point-to-point link 2906. In addition to communicating with other network sites 2802 through e-band point-to-point links 2906, a network site may utilize the e-Band and point to point links 2906 to communicate with connected sites 2910 and smart city sites 2912.

Smart city sites 2912 comprise data collection sensors for supplying information used to manage assets and resources efficiently within an urban area. The data collected is processed and analyzed to perform a variety of functions including monitoring and managing traffic and transportation systems, power plants, water supply networks, waste management, law enforcement, information systems, schools, hospitals and other community services. The connected sites 2910 comprise other network data transmission or collection sites that may be utilized by network site 2904. The network sites 2802 may also connect via a point-to-point V-band connection link 2914 to X-sites 2916. An X-site comprises other sites that may have surveillance cameras or sensors for different applications such as detection of gas for emergencies, ect. Finally, the network sites 2802 may connect to other MDUs 2918 using a point-to-multipoint V-band access link 2920.

Access site 2806A comprises a BB (broadband) access site from a mini-tower 2922 located on an MDU 2924. A BB access sites are for connecting the end user to the access point (base station). These sites are differentiated from aggregation sites and their associated backhaul (from an aggregation point towards the core of the network rather than towards the end users). The access site 2806 provides point to multipoint 60 GHz V-band links 2926 to multiple user locations 2928. Access site 2806B comprises a mini-tower 2930 providing point-to-multipoint 60 GHz V-band links 2926 to multiple users 2928.

Referring now to FIG. 30, the 60 GHz V-band last drop system 3002 described herein builds upon existing technologies in a unique combination along with new techniques in order to provide the unique last drop system. The WiGig protocol 3004 implemented within the Peraso chipset provides for wireless packet data transmissions. The modified MAC/TCP-IP protocol 3006 that has been developed by Facebook is utilized for providing improved wireless packet data transmissions. Communications between the access sites and network sites of the mesh network are controlled utilizing mesh software 3008. The mesh software 3008 is responsible for automatically detecting when a link goes down between nodes within the mesh network and reconfiguring and reestablishing a connection using a new link path. Connections between access nodes of the mesh network and users are provided using point to multipoint transmission techniques 3010 from the access nodes to the users. The control of the mesh network node connections are carried out using SDN/NFV software control techniques 3012 as described herein.

FIG. 31 illustrates the functional blocks of a mesh network used for providing the last drop services to users. The mesh network structure utilizes a central controller 3102 and a mesh client 3104 that operate on top of a WiGig baseband layer 3106. The central controller 3102 provides for the establishment of links between mesh network nodes and controls the reestablishment of failed links when necessary. The mesh client 3104 is located at each mesh network node and provides the interactions with the central controller 3106 in order to control link establishment at the nodes. Each of the central controller 3102 and mesh clients 3104 within the network nodes utilize the WiGig baseband communication control protocol 3106 in order to carry instructions between the central controller 3102 and mesh clients 3104. The combined use of the central controller 3102 and mesh clients 3104 with the WiGig protocol 3106 enables the use of a multi-hop topology for providing links that travel from one point to another through multiple mesh network nodes. The combination additionally provides for quality of signal support for the links between mesh nodes and failover management for failed mesh node links to provide a high reliability system. The platform for initiating these control layers include a phased antenna array associated with the mesh network nodes, WiGig SoC (system-on-a-chip) located on each mesh network node. Mesh software controls the node interactions using the phased antenna array and WiGig SoC.

The mesh software as illustrated in FIG. 32, includes a number of functionalities within the mesh controller 3202 and the mesh node 3204. The system uses big data analytics for targeted decision-making, network awareness, advanced processing with multi-core radios, dynamic porting, open source standards and network slicing. The mesh controller 3202 software and mesh node 3204 software may be updated via the Internet or a private network 3206. The mesh controller 3202 provides centralized routing functionalities 3208. The centralized routing functionalities enable for centralized control of the routing of data packets over communication links that have been established within the system. The neighbor selection functionalities 3210 provide for the selection of neighboring nodes that will be used for reestablishing failed communication links when a primary communication link fails. The network metrics and status functionalities 3212 tracks network status parameters and maintains these to assist in rerouting decisions of other mesh controller 3202 functionalities. The quality of service (QOS) functionalities 3214 monitor EIR (excess information rate) and CIR (committed information rate) traffic in order to assist in maintaining quality of service of signals being transmitted over the wireless connection between nodes of the mesh network for high reliablity. The OpenDayLight functionalities 3216 provide for network management and data switching within the mesh network. OpenDaylight is a collaborative open source project hosted by the Linux foundation. OpenDaylight promotes software defined networking (SDN) and network function virtualization (NFV).

The mesh node 3204 functionalities provide for maintenance of the network of mesh nodes and providing for communications therebetween. The buffer management functionalities 3218 provide for buffering of data that is being transmitted between nodes of the mesh network. The open virtual switch (OVS) functionalities 3220 provide for switching between nodes of the mesh network. OVS (Open vSwitch) is an open source implementation of a distributed virtual multilayer switch. Open vSwitch provides a switching stack for hardware virtualization environments while some hoarding multiple protocols and standards used within computer networks. The ethernet convergence layer/layer 2 bridge 3222 provides for the aggregation of multiple networks into a single network. Ethernet functionalities 3224 provide for ethernet communications between network components over the mesh network nodes. The mesh controller interface 3226 uses OpenFlow to enable communication between the various nodes of the mesh network. The node manager and state machine 3228 monitors the nodes of the mesh network and manages and tracks their state for data packet transmission. The configuration manager 3230 is responsible for configuring the mesh node network when breakdowns in nodes occur requiring reconfigurations of links between nodes. The routing manager 3232 is responsible for generating routing information for packet data that is transmitted over active links within the mesh network. The link metric functionalities 3234 monitor and track the status of links between nodes of the mesh network. The scheduling and quality of service manager 3236 monitors the scheduling of packets between nodes and manages quality of service of links between nodes. The event manager 3238 is part of the mesh node that collects and manages all events in mesh control, node and state machine, configuration management, routing management, scheduling and QoS management, link status and metrics, ect. The baseband host interface 3240 provides for an interface with the application layer by the nodes of the mesh network.

The gateway and/or access point 3242 provides the access point address controls to the ethernet. A number of WiGig BB and RF sectors 3244 provide for interactions with the WiGig and RF network functionalities and provides for a host interface 3246, 802.11 ad physical interface 3248 and 60 GHz phased array interface 3250.

Using these software functions within the mesh controller 3202 and mesh nodes 3204 the mesh software implemented within processor/server at the various nodes can perform a number of operations within the mesh network. The software enables the performance of network discovery and autonomous neighbor selection. This enables nodes to identify the mesh network and automatically determine neighboring nodes that are located in close proximity to the node. The system may also perform topology management using in-band signaling with the mesh network controller 3202. The functions allow for the configuration of the node processor/server for management of node and sector state machines within the mesh network. The mesh software may also be used for detecting link failures and switching the communication links to an alternative path when an existing link has failed. The mesh software may also be used for sector and node recovery when particular sectors or nodes within the mesh network are lost. The mesh software performs link metric collection through for example the link metrics functionalities 3234 to enable the decisions and handling of things such as link failure to be appropriately decision based. The virtual switches 3220 implement L2 transport. The mesh software can also provide simple network management protocol (SNMP) using MIBs (management information bases). SNMP is an Internet standard protocol for collecting and organizing information about managed IP devices on IP networks in for modifying that information to change device behavior. SNMP is widely used in network management for network monitoring. SNMP exposes management data in the forms of variables on the manage systems organized in a management information base which describe the system status and configuration. These variables can then be remotely queried by managing applications. Finally, the mesh software provides for ease of configurability via the use of text file configuration parameters.

Referring now to FIG. 33 there is illustrated the process for implementing SDN-based local link repair when a primary communication link goes down in the mesh network between two nodes. The process uses SDN to calculate a primary and at least one secondary path for each node of the mesh network. SDN-based local repair is implemented using fast failover groups 1808 (FIG. 18). A primary and a secondary action are put into the same group. Consequently, the controller calculates for each node in the mesh network a primary path at step 3302 for a communications link. Additionally, the controller calculates at least one backup path from the node at step 3304. Based upon the path calculations, the controller installs forwarding rules for the primary path at step 3306 into the fast failover group 1808 and will additionally install forwarding rules at step 3308 for the backup path into the fast failover group.

Once data packets arrive at a mesh network node at step 3310 which should be forwarded to a neighboring mesh node using V-band links, the data packets will be forwarded according to the established primary path. Once the primary link is detected to be down at inquiry step 3312, the data packets are automatically forwarded using the next active link, i.e. towards a different neighbor where there is an active backup link. Thus, a determination is made at inquiry step 3312 if the primary path is working. If so, control passes on to step 3314, and the data packet is forwarded on the primary path. If inquiry step 3312 determines that the primary path is not working, the packet is forwarded on the backup path at step 3316. The process is completed at step 3318. This process allows the mesh network node to perform a local failover instead of the SDN controller performing a centralized failover. This significantly reduces the reaction time to failures in the mesh forwarding structure.

Referring now to FIG. 34, there is illustrated the process for detecting link state and transmitting on primary and backup links within the mesh network. In order to detect the link state, bidirectional forwarding detection (BFD) is a commonly used technology. BFD determines the state of the link by establishing a connection at step 3402 using a three-way handshake routine. BFD next waits a predetermined period of time at step 3404 and transmits a periodic control message at step 3406. Inquiry step 3408 determines if a response to the control message has been received. The timeout period is determined by the control messages between the BFD messages. If a response to the control message is received, transmissions are carried out on the link at step 3410 and control passes back to step 3404 to await an additional predetermined period. If no response to the control message is received within a specified time interval, the link is considered down at step 3412. In this manner, link failures may be rapidly detected and reacted to. Consequently, mesh nodes send periodic BFD messages to each neighboring node over the V-band links to detect link states. Once BFD detects a link down event at inquiry step 3408, the link state is set to down at step 3412. This triggers the OpenFlow datapath to start transmitting to a different neighbor small cell. This is achieved by selecting a backup link at step 3414.

A weakness with fast failover is that it can only perform local failover. If no alternative local path is available, e.g. all neighbors are not reachable anymore, then crankback routing must be performed. This requires that the packet be sent backwards toward the source to a small cell node which has an alternative active path towards the destination. Thus, crankback forwarding can potentially have large impacts on the latency. Such latency can be reduced significantly by introducing stateful forwarding in the data plane using OpenState. OpenState is a research effort focused in the development of a stateful data plane API for Software-Defined Networking. OpenState is more particularly described in the OpenState v1.0 specification. If packets arrive at a mesh node which does not have a next hop towards the destination node because the link is down, the node tags the packet and the packet is sent back towards the source. When the message reaches the mesh node having a backup path, the state of the forwarding rules change in such a way that the coming packet traverse the backup path already at the node. Therefore, once a backup link is selected at step 3414, inquiry step 3416 determines if the backup link is operating and available. If so, transmissions are carried out on the backup link at step 3418 and control passes back to step 3404. If the backup link is not available as determined at inquiry step 3416, the crankback forwarding process is carried out at step 3420 and transmissions carried out on allocated available link.

Referring now to FIG. 35, there is illustrated a diagram of the various mesh software components 3502 used within the system. The mesh node software 3504 comprises the software associated with each of the mesh nodes within the mesh network. The mesh node software 3504 provides for control and data plane features above the MAC layer and physical layer. The mesh node software further provides for portable ANSI C applications on the mesh node and POSIX compatible base software services. The mesh network controller software 3506 provides for a centralized controller that manages mesh connectivity. The mesh network controller software 3506 uses open flow based protocols, proprietary in-band signaling of topology management, configuration and events and a JAVA module. The test controller 3508 is used for executing test scripts and for controlling the test environment. The test controller 3508 provides an automated event driven test bench using GUI-based C++ applications. The virtual test bench 3510 enables scalable testing of the mesh software without the target hardware. The virtual test bench 3510 uses Linux hosting of virtual machines with dynamic interconnections. Thus, the combination of mesh software and the element management system 3512 enables remote management and monitoring of the mesh network for field testing and deployments. The element management system 3512 is a web based, SNMP management system. The mesh software 3502 uses open networking to provide the agility of a cloud provider with a software platform that enables rapid creation of new services. Thus, the combination of mesh software 3504, mesh network controller 3506, test controller 3508, virtual test bench 3510 and element management system provides a high capacity solution that lowers costs and provides flexibility and scalability of the system.

It will be appreciated by those skilled in the art having the benefit of this disclosure that this point-to-multipoint or multipoint-to-multipoint mesh self-organized network over WiGig standards with new MAC layer provides a low-cost, flexible and scalable system. It should be understood that the drawings and detailed description herein are to be regarded in an illustrative rather than a restrictive manner, and are not intended to be limiting to the particular forms and examples disclosed. On the contrary, included are any further modifications, changes, rearrangements, substitutions, alternatives, design choices, and embodiments apparent to those of ordinary skill in the art, without departing from the spirit and scope hereof, as defined by the following claims. Thus, it is intended that the following claims be interpreted to embrace all such further modifications, changes, rearrangements, substitutions, alternatives, design choices, and embodiments. 

What is claimed is:
 1. A backhaul system comprising: a small cell mesh network including a plurality of small cell mesh network backhaul nodes providing a backhaul network to provide an interconnection between at least one first network node for providing access to a core network and at least one second network node for providing access to an edge network, wherein the small cell mesh network comprises a self-organized network (SON); at least one transmitter at each of the plurality of small cell mesh network backhaul nodes for establishing communication links with other small cell mesh network backhaul nodes within the small cell mesh network providing the backhaul network; a controller for controlling communication link configuration by the at least one transmitter between the plurality of small cell mesh network backhaul nodes of the small cell mesh network providing the backhaul network; an optimizer module including within the controller for maximizing a total capacity of the small cell mesh network, minimizing latency within the small cell mesh network and minimizing power within the small cell mesh network; wherein the controller is further configured to implement the self-organized network by the optimizer module that reconfigure new communications links responsive to a broken communications link within the small cell mesh network providing the backhaul network that maximizing the total capacity of the small cell mesh network, minimizing the latency within the small cell mesh network and minimizing the power within the small cell mesh network; and wherein the communication link configurations are established by the controller using WiGig standards and a MAC layer configured to transmit on a wireless link of the backhaul network.
 2. The system of claim 1, wherein the controller may configure the communication links to route around interference within the small cell mesh network providing the backhaul network.
 3. The system of claim 1, wherein the small cell mesh network backhaul nodes comprise IPv6 nodes.
 4. The system of claim 1, wherein the MAC layer uses a modified, high performance MAC layer protocol.
 5. The system of claim 4, wherein the modified, high performance MAC layer protocol comprises a protocol selected from a group consisting essentially of a TDMA-TDD MAC protocol and LTE-TDD protocol.
 6. The system of claim 1 further including antenna arrays located at the plurality of small cell network mesh backhaul nodes of the small cell mesh network using massive MIMO transmissions to provide enhanced fixed broadband (eFBB), ultra-reliable low latency communications (uRLLC).
 7. The system of claim 1, wherein the small cell mesh network is self-healing, self-configurable, self-optimizable and auto provisioning.
 8. The system of claim 1, wherein the controller detects link failures within the small cell mesh network and switches communications to alternative links within the small cell mesh network responsive to the detected link failures.
 9. The system of claim 1, wherein the small cell mesh network is configured using text file configuration parameters.
 10. A method comprising: establishing a small cell mesh network including a plurality of small cell mesh network backhaul nodes as a backhaul network to provide an interconnection between at least one first network node for providing access to a core network and at least one second network node for providing access to an edge network, wherein the small cell mesh network comprises a self-organized network (SON); establishing communication links with other small cell mesh network backhaul nodes within the small cell mesh network providing the backhaul network using at least one transmitter at each of the plurality of small cell mesh network backhaul nodes; controlling communication link configuration by the at least one transmitter between the plurality of small cell mesh network backhaul nodes of the small cell mesh network providing the backhaul network; reconfiguring new communications links responsive to a broken communications link within the small cell mesh network providing the backhaul network using the self-organized network, wherein the step of reconfiguring further comprises: maximizing a total capacity of the small cell mesh network, minimizing latency within the small cell mesh network and minimizing power within the small cell mesh network using an optimizer module implemented within the controller; and establishing the communication link configurations using WiGig standards and a MAC layer configured to transmit on a wireless link.
 11. The method of claim 10 further comprising the step of configuring the communication links to route around interference within the small cell mesh network providing the backhaul network.
 12. The method of claim 10, wherein the step of establishing the small cell mesh network backhaul nodes further comprises establishing the small cell mesh network backhaul nodes as IPv6 nodes.
 13. The method of claim 10 further comprising using a modified, high performance MAC layer protocol within the MAC layer.
 14. The method of claim 13, wherein the modified, high performance MAC layer protocol comprises a protocol selected from a group consisting essentially of a TDMA-TDD MAC protocol and LTE-TDD protocol.
 15. The method of claim 10 further including transmitting from each of the plurality of small cell network mesh backhaul nodes of the small cell mesh network with antenna arrays using massive MIMO transmissions to provide enhanced fixed broadband (eFBB), ultra-reliable low latency communications (uRLLC).
 16. The method of claim 10, wherein the small cell mesh network is self-healing, self-configurable, self-optimizable and auto provisioning.
 17. The method of claim 10 further comprising: detecting link failures within the small cell mesh network; and switching communications to alternative links within the small cell mesh network responsive to the detected link failures.
 18. The method of claim 10 further comprising configuring the small cell mesh network using text file configuration parameters.
 19. A backhaul system comprising: a small cell mesh network including a plurality of small cell mesh network backhaul nodes providing a backhaul network to provide an interconnection between at least one first network node for providing access to a core network and at least one second network node for providing access to an edge network, wherein the small cell mesh network comprises a self-organized network (SON), further wherein the small cell mesh network comprises a software defined network (SDN) to provide 60 GHz transmissions and scalable capacity; at least one transmitter at each of the plurality of small cell mesh network backhaul nodes for establishing communication links with other small cell mesh network backhaul nodes within the small cell mesh network providing the backhaul network; a controller for controlling communication link configuration by the at least one transmitter between the plurality of small cell mesh network backhaul nodes of the small cell mesh network providing the backhaul network; an optimizer module including within the controller for maximizing a total capacity of the small cell mesh network, minimizing latency within the small cell mesh network and minimizing power within the small cell mesh network; wherein the controller is further configured to implement the self-organized network by the optimizer module that reconfigure new communications links responsive to a broken communications link within the small cell mesh network providing the backhaul network that maximizing the total capacity of the small cell mesh network, minimizing the latency within the small cell mesh network and minimizing the power within the small cell mesh network; and wherein the communication link configurations are established by the controller using WiGig standards and a MAC layer configured to transmit on a wireless link of the backhaul network.
 20. The system of claim 19, wherein the small cell mesh network is self-healing, self-configurable, self-optimizable and auto provisioning. 