Equivalent home id for mobile communications

ABSTRACT

Facilitating user terminal (UT) access to wireless networks having disparate types of base stations (BSs) is described herein. By way of example, a distinct identifier (ID) can be reserved for a particular type of network access point (e.g. restricted or general access, full or fractional re-use, transmit power, cell size, etc.). The distinct ID can be broadcast by such access points, identifying the access point type. In some aspects, the distinct ID can be unicast to a terminal that is within a predetermined region of the network. Thus, at least within such region, the terminal can be directed to search for or handoff to a preferred type of access point (such as a home Node B). In such aspects, by providing regional-specific access, the subject disclosure can significantly reduce overhead signaling outside a home region where a home or preferred access point is expected to be found.

CLAIM OF PRIORITY UNDER 35 U.S.C. §119

The present application for patent claims priority to U.S. ProvisionalApplication No. 60/976,738 entitled METHODS, APPARATUS, AND SYSTEM FORSUPPORTING ACCESS POINT BASE STATIONS WITHIN A WIRELESS WAN SYSTEM filedOct. 1, 2007, assigned to the assignee hereof and hereby expresslyincorporated by reference herein.

REFERENCE TO CO-PENDING APPLICATIONS FOR PATENT

The present application for patent is related to the followingco-pending U.S. patent application “MOBILE ACCESS IN A DIVERSE ACCESSPOINT NETWORK” by Aziz Gholmieh et al., having Attorney Docket No.072497(QUAFP1280US), filed concurrently herewith, assigned to theassignee hereof and expressly incorporated by reference herein.

BACKGROUND

I. Field

The following disclosure relates generally to wireless communication,and more specifically to managing remote access for devices in a diverseaccess point environment.

II. Background

Wireless communication systems are widely deployed to provide varioustypes of communication (e.g., voice, data, multimedia services, etc.) tomultiple users. Subscription based services allow users to access andutilize various communication content over a service provider's network.As the demand for high-rate and multimedia data services rapidly grows,there lies a challenge to implement efficient and robust communicationsystems with enhanced performance.

Traditional fixed line communication systems, such as digital subscriberline (DSL), cable line, dial-up, or like connections offered by Internetservice providers (ISPs), are alternative and sometimes competingcommunication platforms to wireless communications. However, in recentyears users have begun replacing fixed line communications with mobilecommunications. Several advantages of mobile communication systems, suchas user mobility, small relative size of user equipment (UE), and readyaccess to public switched telephone networks as well as the Internet,have made such systems very convenient and thus very popular. As usershave begun relying more on mobile systems for communication servicestraditionally obtained through fixed line systems, demand for increasedbandwidth, reliable service, high voice quality and low prices hasheightened.

In addition to mobile phone networks currently in place, a new class ofsmall base stations has emerged. These small base stations are low powerand can typically utilize fixed line communications to connect with amobile operator's core network. In addition, these base stations can bedistributed for personal/private use in a home, office, apartment,private recreational facility, and so on, to provide indoor/outdoorwireless coverage to mobile units. These personal base stations aregenerally known as access point base stations, or, alternatively, ashome Node B units (HNBs) or Femto cells. Femto cell base stations offera new paradigm in mobile network connectivity, allowing directsubscriber control of mobile network access and access quality.

SUMMARY

The following presents a simplified summary of one or more aspects inorder to provide a basic understanding of such aspects. This summary isnot an extensive overview of all contemplated aspects, and is intendedto neither identify key or critical elements of all aspects nordelineate the scope of any or all aspects. Its sole purpose is topresent some concepts of one or more aspects in a simplified form as aprelude to the more detailed description that is presented later.

The subject disclosure provides for identifying select groups of accesspoints in a wireless network. In some aspects, a public land mobilenetwork (PLMN) identifier (ID) can be reserved for a selected categoryof such access points. The access points can, in at least one aspect, becategorized as a function of access type, re-use type, transmit power,cell size, or the like, or a combination thereof. Additionally, withinthe reserved PLMN ID, regional groups of the selected access points canbe established as a function of geographic or network region andassociated with an ID (e.g., a registration area identifier, trackingarea identifier, routing area identifier, location area identifier, andso on). If a mobile terminal enters a home region (e.g., determined viathe ID), the reserved PLMN ID can be provided to the mobile terminalfrom the network. In particular aspects, the reserved PLMN ID can beestablished as an equivalent of an operator's PLMN ID, enabling themobile terminal to search for, access and/or handoff to the selectaccess points as if they are part of the operator's PLMN ID. Thus, whenthe mobile terminal is within the home region, selected access pointsare viewed as equivalent to the operator's access points. When notwithin the home region, access points of the reserved PLMN ID can beviewed as separate, and treated different from the operator's accesspoints, ignored, or the like.

In addition to the foregoing, the subject disclosure provides forreduced signaling for mobile terminals in a restricted access (RA) basestation (BS) environment. A home BS that provides network access to themobile terminal can be associated with a home region that encompasses aposition location of the BS. Additionally, the home BS can be associatedwith a reserved PLMN ID pertaining to selected access points of the homeregion (e.g., identified by a category of BS or network cell). When amobile terminal enters the home region, the reserved PLMN ID is receivedfrom the network enabling the terminal to search for, access and/orhandoff to RA BSs. Thus, outside the home region, RA BSs can be ignoredto preserve signaling overhead.

To preserve signaling overhead within the home region, a cell identifierand/or position location of the BS can be tracked when an access requestto the network is denied. According to further aspects, the terminal canrefrain from accessing BSs associated with the reserved PLMN ID for adelay period, to prevent excessive signaling to RA BSs. Where access isprovided to the mobile terminal, a cell identifier and/or positionlocation can be tracked to identify the cell and/or location of the cellfor future access. Accordingly, the terminal can distinguish terminalsthat will restrict network access from those that will grant access,greatly reducing potential BS signaling in densely deployedenvironments.

According to still other aspects, a set of parameters can be receivedfrom the network that increases a likelihood of identifying, accessingand/or handing off to a select category of BS. When the mobile terminalencounters the home region, parameters are provided that increase alikelihood of encountering a type(s) of BS similar to a home BS (e.g., ahome Node B [HNB]). Thus, the terminal is less likely to camp on a macronetwork, for instance, within the home region, and more likely toidentify the home BS or a select type of BS.

According to one or more additional aspects described herein, disclosedis a method of providing regional access in a wireless network. Themethod can comprise obtaining subscriber profile information pertainingto a user terminal (UT) and extracting data representing a networkregion from the information. Additionally, the method can comprisecomparing the network region to data associated with a cell of awireless network and submitting an identifier associated with selectedaccess points of the wireless network to the UT if the network regionmatches a network region of the cell.

In other aspects, disclosed is an apparatus that provides selectiveregional access to a wireless network. The apparatus can comprise aquery module that obtains subscriber profile information pertaining to aUT. Further, the apparatus can comprise an analysis module that extractsdata representing a network region from the information, and comparesthe extracted network region to data associated with a cell of awireless network. In addition to the foregoing, the apparatus cancomprise a communication processor that submits an identifier associatedwith selected access points of the wireless network to the UT if thenetwork region matches a region of the cell.

In one or more additional aspects, disclosed is an apparatus thatprovides regional access in a wireless network. The apparatus cancomprise means for obtaining subscriber profile information pertainingto a UT and means for extracting data representing a network region fromthe information. Additionally, the apparatus can comprise means forcomparing the network region to data associated with a cell of awireless network and means for submitting an identifier associated withselected access points of the wireless network to the UT if the networkregion matches a network region of the cell.

In yet other aspects, disclosed is a processor configured to provideregional access in a wireless network. The processor can comprise afirst module that obtains subscriber profile information pertaining to aUT and a second module that extracts data representing a network regionfrom the information. Furthermore, the processor can comprise a thirdmodule that compares the network region to data associated with a cellof a wireless network. The apparatus can additionally comprise a fourthmodule that submits an identifier associated with selected access pointsof the wireless network to the UT if the network region matches anetwork region of the cell.

In still other aspects, disclosed is a computer program productcomprising a computer-readable medium. The computer-readable medium cancomprise a first set of codes for causing a computer to obtainsubscriber profile information pertaining to a UT and a second set ofcodes for causing the computer to extract data representing a networkregion from the information. Moreover, the computer-readable medium cancomprise a second set of codes for causing the computer to compare thenetwork region to data associated with a cell of a wireless network. Inaddition to the foregoing, the computer-readable medium can comprise athird set of codes for causing the computer to submit an identifierassociated with selected access points of the wireless network if thenetwork region matches a network region of the cell.

According to other aspects of the subject disclosure, provided is amethod for obtaining regional access to a wireless network. The methodcan comprise obtaining an identifier associated with a particular typeof wireless network access point. In at least one aspect, the method canfurther comprise selecting an access point associated with theidentifier to access the wireless network if a current region of arequesting device matches a region of the selected access point.

According to some aspects, provided is a UT configured to obtainregional access to a wireless network. The UT can comprise a signalprocessor that obtains an identifier associated with a particular typeof wireless network access point. Moreover, the UT can comprise anaccess module that selects an access point associated with theidentifier to access the wireless network if a region in which the UT islocated matches a region of the selected access point.

According to additional aspects, provided is an apparatus configured toobtain regional access to a wireless network. The apparatus can comprisemeans for obtaining an identifier associated with a particular type ofwireless network access point. Additionally, the apparatus can comprisemeans for selecting an access point associated with the identifier toaccess the wireless network if a current region of a requesting devicematches a region of the selected access point.

In yet other aspects of the subject disclosure, provided is a processorconfigured to obtain regional access to a wireless network. Theprocessor can comprise a first module configured to obtain an identifierassociated with a particular type of wireless network access point.Further, the processor can comprise a second module configured to selectan access point associated with the identifier to access the wirelessnetwork if a current region of a requesting device matches a region ofthe selected access point.

According to further aspects, disclosed is a computer program productcomprising a computer-readable medium. The computer-readable medium cancomprise a first set of codes for causing a computer to obtain anidentifier associated with a particular type of wireless network accesspoint. The computer-readable medium can further comprise a second set ofcodes for causing the computer to select an access point associated withthe identifier to access the wireless network if a current region of arequesting device matches a region of the selected access point.

To the accomplishment of the foregoing and related ends, the one or moreaspects comprise the features hereinafter fully described andparticularly pointed out in the claims. The following description andthe annexed drawings set forth in detail certain illustrative aspects ofthe one or more aspects. These aspects are indicative, however, of but afew of the various ways in which the principles of various aspects canbe employed and the described aspects are intended to include all suchaspects and their equivalents.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts a block diagram of an example wireless communicationenvironment according to aspects of the subject disclosure.

FIG. 2 illustrates a block diagram of a sample wireless networkcomprising restricted access (RA) base stations (BSs) according to otheraspects.

FIG. 3 depicts a block diagram of an example system that provides mobiledevice access in a disparate access point network according to someaspects.

FIG. 4 illustrates a block diagram of a sample system that obtainssubscriber profile data to facilitate regional access according to someaspects.

FIG. 5 depicts a block diagram of an example networking environmentcomprising regional RA BSs and general access (GA) macro BSs.

FIG. 6 illustrates a block diagram of a sample parameterization recordfor weighting a likelihood of searching or accessing one or morecategories of BSs.

FIG. 7 illustrates a block diagram of an example base station thatprovides regional access to UTs according to aspects of the subjectdisclosure.

FIG. 8 depicts a block diagram of a sample UT that facilitates regionalrestricted network access according to other aspects.

FIG. 9 depicts a flowchart of a sample methodology for providingregional access to select categories of BSs according to some aspects.

FIG. 10 depicts a flowchart of an example methodology for facilitatingreduced signaling in dense deployments of different categories of BSs.

FIG. 11 illustrates a flowchart of an example methodology for accessinga network based on regional groups of select BSs according to aspectsdisclosed herein.

FIG. 12 depicts a flowchart of a sample methodology for facilitatingreduced signaling overhead in dense deployments of disparate categoriesof BSs.

FIGS. 13 and 14 illustrate block diagrams of example systems providingand facilitating, respectively, regional access to select types ofnetwork BSs.

DETAILED DESCRIPTION

Various aspects are now described with reference to the drawings,wherein like reference numerals are used to refer to like elementsthroughout. In the following description, for purposes of explanation,numerous specific details are set forth in order to provide a thoroughunderstanding of one or more aspects. It can be evident, however, thatsuch aspect(s) can be practiced without these specific details. In otherinstances, well-known structures and devices are shown in block diagramform in order to facilitate describing one or more aspects.

In addition, various aspects of the disclosure are described below. Itshould be apparent that the teaching herein can be embodied in a widevariety of forms and that any specific structure and/or functiondisclosed herein is merely representative. Based on the teachings hereinone skilled in the art should appreciate that an aspect disclosed hereincan be implemented independently of any other aspects and that two ormore of these aspects can be combined in various ways. For example, anapparatus can be implemented and/or a method practiced using any numberof the aspects set forth herein. In addition, an apparatus can beimplemented and/or a method practiced using other structure and/orfunctionality in addition to or other than one or more of the aspectsset forth herein. As an example, many of the methods, devices, systemsand apparatuses described herein are described in the context ofimplementing improved base station (BS) access in a wireless environmentcomprising disparate types of access points. One skilled in the artshould appreciate that similar techniques could apply to othercommunication environments.

Development of wireless access points to communication networks havebeen one solution offered to effect convergence between traditionalwireless communication systems and traditional fixed-line communicationsystems. The convergence, otherwise known as fixed-wireless convergence,involves a degree of interoperability between fixed line networks (e.g.intranet, Internet, etc.) and mobile communication networks (e.g.,cellular phone networks). An access point, as utilized herein, includesany suitable node, router, switch, hub, or the like, configured tocommunicatively couple a user terminal (UT) with a communicationnetwork. The access point can be wired (e.g., employing Ethernet,universal serial bus [USB] or other wired connection for communication),wireless (e.g. employing radio signals for communication), or both.Examples of access points include access point base stations (BSs),wireless local area network (WLAN) access points, wireless wide areanetwork (WWAN) access points, including worldwide interoperability formicrowave access (WiMAX) BSs, and the like. Access point BSs compriseaccess points to a mobile communication operator's network, such as acircuit-switched voice network, a combined circuit-switched andpacket-switched voice and data network, or all-packet voice and datanetwork, or the like. Examples of an access point BS (referred herein inthe alternative as a BS) include a Node B (NB), base transceiver station(BTS) a home Node B (HNB), a home eNode B (HeNB), or simply a BS, ofvarious transmit power/cell size including macro cells, micro cells,pico cells, Femto cells, etc.

The introduction of various types of access point BSs into traditionalmacro BS networks enables significant flexibility and consumer controlover personal access to such networks. Users can often configureterminal devices to select a nearby access point BS or a macro networkBS, depending on which provides a better signal. In addition, accesspoint BSs can provide preferable rate plans compared with the macronetwork, at least in some circumstances, enabling users to reduce usagecharges.

As wireless communication bandwidth and data rates have increased overtime, and as UT processing and user interface capabilities have becomemore sophisticated, users are able to employ mobile devices to performfunctions formerly available only with personal computers and fixed linecommunications. However, because typical macro networks are oftendeployed with large-scale public usage as the primary market, indoorreception can often be poorer than outdoor reception (e.g., due toabsorption of radio frequency signals by buildings, insulation, groundlandscaping, etc.), rendering a mobile device less effective than afixed-line computer in such an environment. Access point BSs can providesignificant improvement in this environment, however. As one example,HNB and HeNB technology (hereinafter referred collectively as HNB)provide a user with significant control over personal wirelessconnectivity, indoors and outdoors, often obviating most or all suchconnectivity problems. HNBs, therefore, can further extend UT mobilityeven in a sub-optimal environment for macro networks.

Despite the significant advantages of HNB and other access pointdeployments, some problems have resulted due to added complexity incoupling access point BSs with an operator's macro networks. Forinstance, access point deployment, especially in the case of HNBs, istypically un-planned or semi-planned, meaning that these BSs areinstalled outside of the control of the network operator. Thus, theoperator has limited capacity to implement ideal placement of theseaccess points relative other such access points or relative macro BSs.Furthermore, spatial shaping of wireless signals relative other accesspoint cells, or even precise knowledge of position location of suchaccess point cells can be severely limited. In addition, where HNBdeployment is open to consumer purchase and installation, a very denseinstallation of such cells can occur in high population urban orcommercial areas, leading to wireless resource competition among nearbyHNB and macro cells. Furthermore, HNBs are typically associated with aclosed subscriber group (CSG) and provide network access only to membersof the CSG; access is not provided to the general cellular public, forinstance. Thus, an HNB deployment amid a macro network integratesrestricted access (RA) BSs with general access (GA) BSs.

Many legacy UTs are not equipped to distinguish GA and RA BSs,especially if such BSs both utilize cellular frequencies, and thereforecan spend significant power searching for and attempting to access RABSs that deny service to a UT. Additionally, legacy terminals and legacywireless networking standards require mobile terminals to scan incomingwireless signals to identify optimal signals. Where there are only a fewnearby BSs that the terminal can distinguish, this is typically aworkable process. However, in dense access point deployments, dozens orhundreds of access points can exist in close proximity (e.g., within alarge urban apartment building). If a UT's home access point, having aCSG that includes the UT, is within the dense deployment, distinguishingthe home access point from hundreds or thousands of nearby foreignaccess points can be a significant problem. For instance, the UT islikely to utilize significant power camping on (analyzing pilot andcontrol channels) or signaling foreign access points that will denynetwork access to the UT.

Where the UT is not in a region that includes a home access point, theproblem becomes distinguishing RA BSs from general access (GA) BSs, andignoring the RA BSs. Access points that utilize different frequenciesfrom the macro network, such as WiFi and WiMAX access points, cantypically be distinguished through frequency filtering. However, HNBsoften share macro network frequencies, and thus are not so easilydistinguished. Thus, a need exists for distinguishing HNB BSs from macronetwork BSs. In addition, it can be beneficial to limit UT signaling toRA BSs when a home BS is not likely to be found. Furthermore, it can bebeneficial to increase a likelihood of signaling or searching for RA BSswhere the home BS is expected to be found, and to mitigate redundantsignaling to foreign HNBs. Aspects of the subject disclosure can provideimprovement to many of the foregoing problems.

The subject disclosure provides improved efficiency for UT access in anintegrated, or heterogeneous, wireless access point deployment.Efficiency can result from reduced overhead signaling by distinguishingaccessible access points from inaccessible access points. For instance,access point BSs can be associated with identifiers (IDs) reserved for aparticular type of access point. Such a BS can broadcast an ID(s) withpilot/acquisition signals transmitted within a cell served by the BS.Accordingly, a UT receiving the pilot/acquisition signals can identify aparticular type of access point based on the included ID. A suitablyconfigured UT can then selectively interact with access points based onID type.

To illustrate the foregoing, one example implementation can includeestablishing a set of distinct public land mobile network (PLMN) IDs forparticular types of network access points. For instance, different PLMNIDs can be reserved for HNBs, WiMAX access points, WiFi access pointsand/or like access points that provide wireless access to a core mobilecommunication network (e.g., a third generation partnership project[3GPP] network). Access points can broadcast the associated reservedPLMN ID to notify remote terminals of access point type. Terminalsconfigured to distinguish access points by type can select a particulartype of access point to camp on or request services from. Alternatively,or in addition to the foregoing, the reserved PLMN ID can be sent by anetwork as an equivalent of an operator's PLMN ID. A terminal can thencamp on and/or request service from access points associated with theequivalent PLMN ID as if such access points were associated with theoperator's PLMN ID. In such a manner, legacy terminals not configured toemploy an ID to distinguish types of access points can effectivelyinteract only with particular access points (e.g., associated with anactive subscription) based on the equivalent, reserved PLMN ID providedby the network.

In addition to the foregoing, network regions can be defined todistinguish portions of an access point network based on geographicarea, network area, routing area, registration area, or the like. Thus,for instance, a deployment of HNBs within a country could be segmentedinto various geographic regions of the country, where HNBs within aparticular geographic region are associated with a registration area ID.Thus, in some instances, regions can be established based on geographicboundaries (e.g., latitudes/longitudes, topographical features such aslakes, rivers, mountains, oceans, canyons, etc.) or legal/politicalboundaries (e.g. municipalities, counties, states, provinces, and soon). Alternatively, or in addition, regions can be established onnetwork boundaries (e.g., a Registration Area Identifier, location areaidentifier [LAI], routing area identifier [RAI], tracking areaidentifier [TAI]). Thus, for instance, regions can be established basedon network access areas, network registration areas, network trackingareas, network location areas, or the like.

In addition to the foregoing, where an access point network compriseshome, preferred and/or restricted BSs (e.g., a home HNB), a homeregion(s) can be established for the UT, defining a network and/orgeographic region in which the UT can expect to encounter thehome/preferred/non-restricted access point. Thus, a region in which asubscriber's home HNB resides can be established as a home region/area.When the UT is within the home region, a particular type of access pointcomprising the home access point can be included in network interfacefunctions (e.g. cell search, handoff and/or access request functions).Thus, for instance, where a UT enters a region that includes a home HNB,the UT can include HNBs in such functions. In other regions, HNBs can beignored, reducing signaling overhead in non-home regions. As discussedabove, the HNBs can be identified based on a reserved PLMN ID associatedwith HNBs, or based on the reserved PLMN ID being established as anoperator equivalent, or both.

To enhance a likelihood of identifying home/preferred access points, thesubject disclosure provides for device parameterization that weights alikelihood of searching for, camping on, or handing off to access pointsbased on access point type. The parameterization can establish apriority hierarchy (e.g. a hierarchical cell structure [HCS]) that givesrelative priority to access points and/or frequency channels associatedwith a particular access point ID (e.g., HNB ID, WiFi ID, macro networkID, etc.). As a result, when connected to a high priority-type accesspoint, a terminal is less likely to search for other access points oflower priority, search on frequencies associated with lower priorityaccess points and/or hand off to lower priority access points. Likewise,when connected to a medium or low priority-type access point, a terminalis more likely to search for, switch channel frequency to and/or handoff to higher priority access points. Such a parameterization canfurther be utilized to load balance terminals among various types ofaccess points.

According to other aspects of the subject disclosure, a terminal cantrack access history to further reduce overhead signaling. Thus, where aUT sends a request for services to an access point, and the request isdenied, the UT can track a cell ID of the access point, positionlocation of the access point, or other distinguishing information. Ifthe tracked ID/position location is subsequently encountered, the accesspoint can be ignored to avoid wasted signaling.

According to further aspects, the UT can implement a delay period orpenalty period, upon receiving an access rejection. The delay/penaltyperiod can involve ignoring access points of the same type or categoryas the rejecting access point for a predetermined time. This can reducerapid ping-pong signaling when the UT is proximate foreign HNBs, forinstance.

In another aspect, the UT can switch to a frequency channel employed byGA access points upon receiving an access rejection, to increaselikelihood of successful access following the rejection. If, on theother hand, an access request is allowed, the UT can first determinewhether the connected access point is a GA BS (e.g., a macro networkBS). If not, the UT can track a cell ID, cell position location, etc.,of the allowing non-GA access point, since it is not uncommon for homeRA BSs to be located near many foreign RA BSs (which will reject accessor provided limited access to the UT). The cell ID/position locationinformation can be stored and utilized to identify the allowing accesspoint at a subsequent time. When the allowing non-GA access point issubsequently identified, the access point can be given high priority(e.g. as discussed above) or utilized to the exclusion of other accesspoints (at least within a minimum threshold signal strength, signalquality, or the like). By tracking access points that allow and/or thatdeny access to the UT, significant reduction in wasted signaling can beachieved, providing more efficient mobile communications.

The techniques described herein can be used for various wirelesscommunication systems such as code division multiple access (CDMA), timedivision multiple access (TDMA), frequency division multiple access(FDMA), orthogonal FDMA (OFDMA), SC-FDMA (single carrier FDMA) and othersystems. The terms “system” and “network” are often usedinterchangeably. A CDMA system can implement a radio technology such asUniversal Terrestrial Radio Access (UTRA), CDMA2000, etc. UTRA includesWideband-CDMA (W-CDMA) and other variants of CDMA. CDMA2000 coversIS-2000, IS-95 and IS-856 standards. A TDMA system can implement a radiotechnology such as Global System for Mobile Communications (GSM). AnOFDMA system can implement a radio technology such as Evolved UTRA(E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16(WiMAX), IEEE 802.20, Flash-OFDM®, etc. UTRA and E-UTRA are part ofUniversal Mobile Telecommunication System (UMTS). LTE (long termevolution) is an upcoming release of UMTS that uses E-UTRA, whichemploys OFDMA on the downlink and SC-FDMA on the uplink. UTRA, E-UTRA,UMTS, LTE and GSM are described in documents from an organization named“3rd Generation Partnership Project” (3GPP). CDMA2000 and UMB aredescribed in documents from an organization named “3rd GenerationPartnership Project 2” (3GPP2).

As used in the subject disclosure, the terms “component,” “system,”“module” and the like are intended to refer to a computer-relatedentity, either hardware, software, software in execution, firmware,middle ware, microcode, and/or any combination thereof. For example, amodule can be, but is not limited to being, a process running on aprocessor, a processor, an object, an executable, a thread of execution,a program, a device, and/or a computer. One or more modules can residewithin a process and/or thread of execution and a module can belocalized on one electronic device and/or distributed between two ormore electronic devices. Further, these modules can execute from variouscomputer-readable media having various data structures stored thereon.The modules can communicate by way of local and/or remote processes suchas in accordance with a signal having one or more data packets (e.g.data from one component interacting with another component in a localsystem, distributed system, and/or across a network such as the Internetwith other systems by way of the signal). Additionally, components ormodules of systems described herein can be rearranged and/orcomplemented by additional components/modules/systems in order tofacilitate achieving the various aspects, goals, advantages, etc.,described with regard thereto, and are not limited to the preciseconfigurations set forth in a given figure, as will be appreciated byone skilled in the art.

Furthermore, various aspects are described herein in connection with auser terminal—UT. A UT can also be called a system, a subscriber unit, asubscriber station, mobile station, mobile, mobile communication device,mobile device, remote station, remote terminal, access terminal (AT),user agent (UA), a user device, or user equipment (UE), or the like. Asubscriber station can be a cellular telephone, a cordless telephone, aSession Initiation Protocol (SIP) phone, a wireless local loop (WLL)station, a personal digital assistant (PDA), a handheld device havingwireless connection capability, or other processing device connected toa wireless modem or similar mechanism facilitating wirelesscommunication with a processing device.

In one or more exemplary embodiments, the functions described can beimplemented in hardware, software, firmware, middleware, microcode, orany suitable combination thereof. If implemented in software, thefunctions can be stored on or transmitted over as one or moreinstructions or code on a computer-readable medium. Computer-readablemedia comprises computer-readable hardware, which includes computerstorage media and hardware communication media, and communication mediaincluding any software, middleware, firmware, microcode and/or hardwaremedium that facilitates transfer of a computer program from one place toanother.

As utilized herein, a computer storage media can be any physical mediathat can be accessed by a computer. By way of example, and notlimitation, such storage media can comprise RAM, ROM, EEPROM, CD-ROM orother optical disk storage, magnetic disk storage or other magneticstorage devices, smart cards, and flash memory devices (e.g., card,stick, key drive . . . ), or any other suitable medium that can be usedto carry or store program code in the form of instructions or datastructures and that can be accessed by a computer. Hardwarecommunication media can include any suitable device or data connectionthat facilitates transfer of a computer program from one entity toanother at least in part utilizing electrical, mechanical and/orelectromechanical hardware. In general, a data connection is alsoproperly termed a computer-readable medium. For example, if a program,software or other data is transmitted from a website, server, or otherremote source using a coaxial cable, fiber optic cable, twisted pair,digital subscriber line (DSL), communication bus structure, Ethernet, orwireless technologies such as infrared, radio, and microwave, then thecoaxial cable, fiber optic cable, twisted pair, DSL, or wirelesstechnologies such as infrared, radio, and microwave are included in thedefinition of medium, and any suitable hardware components associatedwith such medium are included in the definition of hardwarecommunication media. Disk and disc, as used herein, includes compactdisc (CD), laser disc, optical disc, digital versatile disc (DVD),floppy disk and blu-ray disc where disks usually reproduce datamagnetically, while discs reproduce data optically with lasers.Combinations of the above should also be included within the scope ofcomputer-readable media.

For a hardware implementation, the processing units' variousillustrative logics, logical blocks, modules, and circuits described inconnection with the aspects disclosed herein can be implemented orperformed within one or more application specific integrated circuits(ASICs), digital signal processors (DSPs), digital signal processingdevices (DSPDs), programmable logic devices (PLDs), field programmablegate arrays (FPGAs), discrete gate or transistor logic, discretehardware components, general purpose processors, controllers,micro-controllers, microprocessors, other electronic units designed toperform the functions described herein, or a combination thereof. Ageneral-purpose processor can be a microprocessor, but, in thealternative, the processor can be any conventional processor,controller, microcontroller, or state machine. A processor can also beimplemented as a combination of computing devices, e.g. a combination ofa DSP and a microprocessor, a plurality of microprocessors, one or moremicroprocessors in conjunction with a DSP core, or any other suitableconfiguration. Additionally, at least one processor can comprise one ormore modules operable to perform one or more of the steps and/or actionsdescribed herein.

Moreover, various aspects or features described herein can beimplemented as a method, apparatus, or article of manufacture usingstandard programming and/or engineering techniques. Further, the stepsand/or actions of a method or algorithm described in connection with theaspects disclosed herein can be embodied directly in hardware, in asoftware module executed by a processor, or in a combination of the two.Additionally, in some aspects, the steps and/or actions of a method oralgorithm can reside as at least one or any combination or set of codesand/or instructions on a device-readable medium, machine-readable mediumand/or computer-readable medium, which can be incorporated into acomputer program product. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device or media.

Additionally, the word “exemplary” is used herein to mean serving as anexample, instance, or illustration. Any aspect or design describedherein as “exemplary” is not necessarily to be construed as preferred oradvantageous over other aspects or designs. Rather, use of the wordexemplary is intended to present concepts in a concrete fashion. As usedin this application and the appended claims, the term “or” is intendedto mean an inclusive “or” rather than an exclusive “or”. That is, unlessspecified otherwise, or clear from context, “X employs A or B” isintended to mean any of the natural inclusive permutations. That is, ifX employs A; X employs B; or X employs both A and B, then “X employs Aor B” is satisfied under any of the foregoing instances. In addition,the articles “a” and “an” as used in this application and the appendedclaims should generally be construed to mean “one or more” unlessspecified otherwise or clear from context to be directed to a singularform.

As used herein, the terms to “infer” or “inference” refer generally tothe process of reasoning about or inferring states of the system,environment, and/or user from a set of observations as captured viaevents and/or data. Inference can be employed to identify a specificcontext or action, or can generate a probability distribution overstates, for example. The inference can be probabilistic—that is, thecomputation of a probability distribution over states of interest basedon a consideration of data and events. Inference can also refer totechniques employed for composing higher-level events from a set ofevents and/or data. Such inference results in the construction of newevents or actions from a set of observed events and/or stored eventdata, whether or not the events are correlated in close temporalproximity, and whether the events and data come from one or severalevent and data sources.

Referring to the drawings, FIG. 1 illustrates an exemplary wirelesscommunication system 100 configured to support a number of users, inwhich various disclosed embodiments and aspects can be implemented. Asshown in FIG. 1, system 100 provides communication for multiple cells,such as macro cells 102 a, 102 b, 102 c, 102 d, 102 e, 102 f, 102 g(alternatively, macro cells 102 a-102 g), with each cell being servicedby a corresponding access point (AP) 104 a, 104 b, 104 c, 104 d, 104 e,104 f, 104 g (alternatively, APs 104 a-104 g). Each cell 102 a-102 g canbe further divided into one or more sectors. Various UTs 106 a, 106 b,106 c, 106 d, 106 e, 106 f, 106 g, 106 h, 106 i, 106 j, 106 k(alternatively, UTs 106 a-106 k) are dispersed throughout system 100.Each AT 106 a-106 k can communicate with one or more APs 104 a-104 g ona forward link (FL) and/or reverse link (RL) at a given moment,depending on whether an AT (106 a-106 k) is active or whether it is insoft handoff, for example. The wireless communication system 100 canprovide service over a large geographic area; for example, macro cells102 a-102 g can cover a few blocks of a neighborhood.

FIG. 2 depicts an exemplary communication system 200 to enabledeployment of access point BSs (e.g., HNBs) within a networkenvironment. System 200 includes multiple access point BSs includingHNBs 210, each of which are installed in corresponding small scalenetwork environments. Examples of small scale network environments caninclude user residences, places of business, indoor/outdoor facilities230, and so forth. The HNBs 210 can be configured to serve associatedUTs 220 (e.g. included in a CSG associated with HNBs 210), or optionallyalien or visitor UTs 220 (e.g., that are not configured for the CSG ofthe HNB 210). Each HNB 210 is further coupled to the Internet 240 and amobile operator core network 250 via a DSL router (not shown), or,alternatively, a cable modem, broadband over power line connection,satellite Internet connection, or a like broadband Internet connection(not shown).

To implement wireless services via HNBs 210, an owner of the HNBs 210subscribes to mobile service, such as 3G mobile services, offeredthrough the mobile operator core network 250. Also, the UE 220 can becapable to operate in a macro cellular environment and/or in aresidential small scale network environment, utilizing varioustechniques described herein. Thus, at least in some disclosed aspects,HNB 210 can be backward compatible with any suitable existing UE 220.Furthermore, in addition to the macro cell mobile network 250, UE 220 isserved by a predetermined number of HNBs 210, specifically HNBs 210 thatreside within a corresponding user residence(s), place(s) of business,or indoor/outdoor facilities 230, and cannot be in a soft handover statewith the macro network 250. It should be appreciated that althoughaspects described herein employ 3GPP terminology, it is to be understoodthat the aspects can also be applied to 3GPP technology (Release 99[Rel99], Rel5, Rel6, Rel7), as well as 3GPP2 technology (1xRTT, 1xEV-DORel0, RevA, RevB) and other known and related technologies.

FIG. 3 illustrates a block diagram of an example system 300 that canfacilitate access to a mobile network that comprises different types orcategories of access points. In some aspects, system 300 can establishGA macro BSs as default access points to a mobile network. Differenttypes of access points, such as HNBs, WiFi access points, WiMAX accesspoints and so on, which can also facilitate wireless communication withthe mobile network, can be established as specialized access points. Adistinct ID is reserved for each type of specialized access point todistinguish one type of access point from other types. If a UT 304 has asubscription pertaining to a specialized access point, an ID associatedwith a type of such access point can be provided to the UT 304.According to some aspects, the ID can be established as an equivalent ofan ID associated with the default GA macro BSs. Thus, legacy UTs (304)that are not configured to identify specialized access point IDs can, atleast in some circumstances, utilize a specialized access point as anequivalent of the default access point.

System 300 comprises a BS 302 that facilitates wireless access to amobile network (not depicted) for remote terminal devices (e.g., UT304). BS 302 can employ a transceiver 306 configured to transmit andreceive wireless data with such terminal devices (304). To facilitatesuch communication, a communication processor 312 can obtain an accesspoint type ID associated with BS 302. The access point type ID can beincluded in signals transmitted by transceiver 306. UTs 304 that receivesuch signals can determine the type of BS 302 from the ID, and determinewhether to access the BS 302 based at least in part on the type of BS.Thus, for instance, if the type ID is a default type (e.g., a PLMN ID ofa service operator) or a specialized type with which the UT 304 has anactive subscription, or is otherwise configured and authorized toaccess, UT 304 can handoff to BS 302 and/or request network servicesfrom such BS 302. Otherwise, if the type ID is not recognized by the UT304 or is associated with an unauthorized type of BS, UT 304 can refrainfrom signaling the BS 302 to preserve processing power and battery life.

In some aspects of the subject disclosure, system 300 can provideregional-based access to a mobile network. In such aspects, geographicregions (e.g. delineated by legal and/or topographical boundaries) ornetwork regions (e.g., Registration Area Identifier, LAI, RAI) can beestablished. Access points contained within a particular region areconsidered part of that region, and are assigned an ID distinct to theregion. In some aspects, a single set of regions can be assigned for allaccess points, regardless of access point type. In other aspects,multiple sets of regions (some of which can overlap) can be assigned todifferent types of access point networks. Thus, for instance, one set ofregions and associated IDs can be established for HNBs, whereas aseparate set of regions and the IDs are established for macro BSs. Inaddition to a network ID (e.g., an operator's PLMN ID) each access pointcan be assigned an ID in which the access point is located.

In some aspects of the subject disclosure, the ID can comprise RegionalSubscription Data employed for regional restricted roaming within avisited PLMN ID. In such aspects, each region has distinct regionalsubscription data, distinguishing each such region from other regions. Asubset of the regions can be selected as home or preferredregions/registration areas for a subscriber. A profile for thesubscriber, maintained by a network operator for instance, can compriseIDs (e.g., PLMN IDs) of home macro network BSs, visited macro networkBSs, as well as IDs of specialized access points usable by thesubscriber's terminal (304). Home/preferred regions for each of thespecialized access points can be written to a Regional Subscription Datafield associated with each specialized access point ID (e.g., PLMN IDsreserved for such types of access points). Thus, as an example, if UT304 is configured and authorized to access macro BSs associated with aparticular network operator as well as a set of HNBs, a subscriberprofile (316) associated with UT 304 can contain a PLMN ID for thenetwork operator, as well as a specialized PLMN ID reserved for HNBs.Furthermore, an ID(s) associated with any HNB home region(s) (e.g., inwhich a home HNB associated with UT 304 is located) can be written tothe Regional Subscription Data field of the profile (316), providingefficient identification of such regions.

When a UT 304 requests access to a network, BS 302 can obtain anidentifier (e.g., a mobile subscriber identifier [MSI], internationalmobile subscriber identifier [IMSI], network-specified identifier, orthe like) associated with the UT 304. A query module 308 can employ theUT ID to obtain a subscriber profile 316 associated with the UT 304 froma network data store 314. An analysis module 310 can obtain access pointID and regional/Registration Area ID information from the profile 316.Based on such information, the analysis module 310 can determine whetherthe UT 304 is associated with any specialized access points, and if so,whether any home regions are specified. If BS 302 is within a homeregion identified by the profile 316, a specialized access point ID canbe transmitted to the UT 304 by BS 302, to facilitate interfacing withthe mobile network via such access points while UT 304 is within thehome region. If BS 302 is not within any home regions identified by theprofile 316, only macro network IDs are transmitted to the UT 304.

As described, regional access can facilitate more efficient mobility forUT 304. Specifically, where authorization to use a particular type of BS(302) involves being within a home region, UT 304 can selectivelyinteract with that type of BS only when in the home region. When outsideof the home region, the particular type of BS (302) can be ignored,yielding reduced signaling overhead for the UT 304.

FIG. 4 illustrates a block diagram of an example network environment400. Network environment 400 comprises several network regions, 408A,408B, 408C, 408D (408A-408D). The network regions can be defined bygeographic area or network area, as described herein. Additionally, thenetwork regions 408A-408D can include various mobile network accesspoints coupled with a core mobile network (not depicted) to providewireless communication services. Access points located within aparticular region are deemed part of such region, and can be assigned anID of the region. Furthermore, the access points are assigned an IDbased at least in part on access point type (e.g., GA, RA, fractionalresource re-use or full resource re-use, transmit power, cell size, orthe like), as described herein.

As depicted, network environment 400 comprises at least four networkregions 408A-408D that include specialized access points. Thespecialized access points can include any non-macro BS that can providea wireless interface, directly or indirectly, to a mobile operator'snetwork, as described herein. For simplicity, however, the belowdescription of network environment 400 will refer to such access pointsas HNBs; however it should be appreciated that other such access pointsare contemplated, and functional description peculiar to an HNB providedbelow can be replaced with functional description suited to such otheraccess points, as would be appreciated by one of skill in the art.

The depicted regions 408A-408D are labeled as a function of accessrelationship to a UT 404. Thus, the regions 408A-408D comprise a firsthome PLMN region 408A (having a home HNB 406A), a first and secondforeign PLMN region 408B, 408C (having no home HNBs) and a second homePLMN region 408D (having home HNB 406B). The home HNBs 406A, 406Bcomprise a CSG listing UTs (404) that are authorized to utilize the homeHNBs 406A, 406B (one such UT being UT 404). UTs not included within theCSG are provided only limited or no network access/communicationservices. Likewise, UTs included within the CSG are provided fullnetwork access/communication services.

As UT 404 travels throughout the network environment 400, communicationservices can be obtained from the macro network access points 402.However, the UT 404 can often obtain preferential services (e.g.,increased bandwidth, increased data rates, higher quality of service,reduced rate plans, etc.) from a home HNB 406A, 406B. In addition, byutilizing the home HNBs 406A, 406B, macro network load can be reduced.Accordingly, it can be beneficial for UT 404 to obtain access from thehome HNBs 406A, 406B when possible.

Under legacy network parameters, UT 404 can interface with a home HNB406A, 406B in a substantially similar manner as a macro BS 402. Thus,the UT 404 can search for the strongest signal and camp on/requestaccess from whichever BS (402, 406A, 406B) provides the strongest orbest quality signal. When outside of the PLMN regions 408A-408Dcomprising specialized access points, the macro network can likelyprovide the best signal, and will typically be selected by the UT 404.However, if the UT 404 is proximate a region (408A-408D) comprising oneor more HNBs (406A, 406B), the nearby HNBs can have much better signalcharacteristics than a distant macro BS 402. Thus, the UT 404 will bemore likely to search for, camp on and request access from the HNBs.Since a deployment of HNBs can typically contain many more foreign HNBs(e.g., in which UT 404 is not included in a CSG) than home HNBs, UT 404can be exposed to many access rejections in attempting to access thestrongest nearby signal. Such a result can lead to significantprocessing overhead and reduction in battery life for UT 404.

To mitigate the foregoing problem, a specialized PLMN ID, for instancethat is unique among operator PLMN IDs, can be reserved for HNB accesspoints. When the specialized PLMN ID is transmitted to UT 404, the UT404 will attempt to access or handoff to an access point broadcastingsuch PLMN ID. In addition, regions 408A-408D can be associated withdistinct regional or Registration Area IDs. Upon subscribing to an HNBwireless subscription, a user profile of UT 404 is associated with oneor more PLMN regions in which a home HNB resides. In general, when UT404 is within a foreign PLMN region (406B, 406C) the network 400 willnot send the specialized PLMN ID to UT 404, and signals comprising suchPLMN ID can be ignored, reducing overhead signaling to foreign HNBs thatwill not provide services to UT 404. However, when UT 404 is within thehome PLMN region(s) 406A, 406D, the network 400 can transmit thespecialized PLMN ID to the UT 404. Accordingly, within the home PLMNregions 406A, 406D, UT 404 can search for and request access from HNBs406A, 406B, as well as the macro network 402.

According to some aspects, a manner in which regional access is providedcan be based on capabilities of the UT 404. For instance, wheresubscriber profile information indicates that UT 404 is capable ofemploying access point IDs to distinguish between HNBs (406A, 406B) andthe macro network 402, the specialized PLMN ID can be transmitteddirectly to the UT 404. Where the subscriber profile information doesnot indicate such capability, however, the specialized PLMN ID can betransmitted as an equivalent of an operator's PLMN ID. Thus, a legacy UT(404) can treat HNBs as macro BSs (402), and attempt to access a networkby either an HNB or macro BS (402) when in the home region.

According to further aspects of the subject disclosure, the network 400can further provide parameters configured to increase a likelihood thatUT 404 will find and access HNBs over the macro network, or vice versa.Thus, when UT 404 is within a home PLMN region 408A, 408D, parametersfavoring HNBs can be provided. On the other hand, where UT 404 is withina foreign PLMN region (408B, 408C) or not within a region containingspecialized access points, parameters favoring macro BSs (402) can beprovided. The parameters can be configured to reduce average timerequired to locate a preferred access point, increase likelihood ofcamping on/requesting services from the preferred access point and/orreduce such likelihoods with respect to non-preferred access points(e.g., see FIG. 6, infra).

In at least some aspects of the subject disclosure, UT 404 can beconfigured to improve detection of the home HNBs 406A, 406B within thehome PLMN regions 408A, 408D, in addition to the parameterizationdescribed herein. In one example, UT 404 can record an ID of HNBs and/orposition location of such HNBs (e.g., based on GPS location, location ofnearest macro BS, or the like) that reject network access to the UT 404.The IDs/positions can be included in a restricted list, or blacklist. By‘remembering’ which HNBs are restricted, the UT 404 can avoid signalingto HNB IDs on the restricted list, reducing signaling and saving batterypower. In addition to the foregoing, UT 404 can store an HNB ID and/orposition location of home HNBs 406A, 406B that permit access to the UT404. The home HNB IDs can be included in a preferred list, and signalsincluding the home HNB IDs can be given priority over other signals.Thus, when receiving a signal comprising the home HNB ID or when in aposition substantially matching the position of the home HNB, UT 404 cancamp on or request access from the home HNBs 406A, 406B and ignoresignals of other BSs (e.g., so long as the signal from the home HNB isat last above a low relative threshold, as described herein).

FIG. 5 illustrates a block diagram of an example system 500 thatprovides regional access to a mobile network. System 500 can includevarious types of access points and base stations that wirelessly coupleremote terminal devices to a core mobile network (e.g., 3GPP corenetwork). Regional access can be based on one or more home regions ofthe terminal devices, and as a function of access capabilities of suchdevices. Where RA is supported, a home region(s) of the device can beobtained and compared with a region in which a serving access point islocated. If the access point region and home region match, the devicecan be provided with information facilitating recognition of RA accesspoints. Additionally, a set of parameters can be provided to the devicethat weights a probability of identifying or camping on a particulartype of access point. The set of parameters can increase a likelihood ofdiscovering a preferred or home access point, as well as provide loadbalancing among the various types of access points. Accordingly, system500 can provide increased efficiency for mobile communications.

As depicted, system 500 can comprise one or more BSs 502. BS 502 cancomprise a registration module 504 that obtains an access request from aremote UT (not depicted). Information identifying the UT can beextracted from the access request, which is provided to a data querymodule 506. The data query module 506 can employ the identifyinginformation to obtain a subscriber profile 516 from components of a corenetwork 512. For instance, the data query module 506 can employ asignaling interface 508 utilizing inter-component protocols (e.g.signaling system 7 [SS7], mobile application part [MAP]) to communicatewith a local network registry and/or data store 510 (e.g. a mobileswitching center [MSC]/visitor location registry [VLR], Serving Generalpacket radio service Support Node [SGSN], or the like). The localregistry 510 can request subscriber data (516) associated with theinformation identifying the UT from a home subscriber registry 514(e.g., HLR). The subscriber profile 516 is provided to the localregistry 510 utilizing inter-network communication (e.g., a MAPinterface), and forwarded to the data query module 506.

Once the BS 502 receives the subscriber profile 516, data can beextracted there from to implement the regional network access. A dataanalysis module 518 can parse the subscriber profile 516 to obtainaccess point IDs, regional/network ID information and subscriptionstatus information, as well as access capabilities of the UT (e.g.,whether the UT is configured and/or authorized for HNB access, WiFiaccess, WiMAX access, macro network access, and so on). As one example,a PLMN ID associated with a service provider's network as well as aspecialized PLMN ID associated with HNBs can be extracted from theprofile 516, if the requesting UT is configured for HNB access. Inaddition, a home region ID associated with the specialized PLMN ID canalso be extracted. The information is provided to registration module504 to determine whether network access is to be provided to the UT inresponse to the request. If BS 502 is an RA BS, registration module 504can further check a CSG 522 to determine whether the requesting UT ispermitted to utilize BS 502.

In some aspects of the subject disclosure, BS 502 can include aselective access module 520 that provides access point ID information toa requesting UT based on a region in which BS 502 resides, and based oncapabilities of the requesting UT. The selective access module 520 can,for instance, provide access point type IDs to the UT that are includedin the subscribe profile 516. Optionally, one or more such access pointtype IDs can be omitted depending on whether the BS 502 is within a homeregion of the UT (indicated in the profile 516), as described herein.Where the UT is within a region comprising one or more specializedaccess points, selective access module 520 can further provide the UTwith a set of parameters configured to increase a probability that theUT will search for, access and/or handoff to an access point associatedwith a specialized access point ID. Alternatively, where the BS 502 isnot in a region associated with a specialized access point type, adifferent set of parameters can be provided to the UT, which increases aprobability that the UT will search for, access and/or handoff to GAmacro BSs. According to at least some aspects, the set of parametersprovided to the UT can be based at least in part on current networkloading. Thus, for instance, where specialized access points are heavilyloaded, the parameters increasing probability of connecting to macro BSscan be sent to the UT. Likewise, where macro BSs are heavily loaded, andthe UT is configured and/or authorized for one or more specializedaccess points (e.g. WiMAX), a set of parameters configured to increasethe probability of connecting to the specialized access points can beprovided instead. Accordingly, BS 502 can be helpful in balancing loadamong various access points in a network comprising disparate types ofsuch access points.

FIG. 6 illustrates a block diagram of an example parameterization record606 transmitted by a network BS 602 to a UT 604. The parameterizationrecord 606 can be broadcast by BS 602 to UTs 604 within a sector of awireless communication network served by the BS 602, or unicastspecifically to UT 604 or a group of such UTs (604). According to someaspects of the subject disclosure, the parameterization record 606 canprovide threshold parameters that weight a likelihood of UT 604searching for, acquiring and/or handing off to a particular type ofnetwork access point (602). Accordingly, the parameterization record 606can be utilized in a network comprising disparate access type BSs (602),such as RA BSs and GA macro BSs, to direct UTs (604) to one or anothertype of BS. Selection of a preferred and/or non-preferred BS (602) canbe based on sector load, UT capabilities, inter-sector interference, andso forth.

The parameterization record 606 can comprise an HCS parameter 608 thatestablishes relative priority of BS 602 and neighboring BSs (notdepicted) in a wireless access network. The HCS parameter 608 can becoupled with a cell search parameter 612 to modify default searchparameters of the UT 604. Thus, for instance, the HCS parameter 608 canprovide a relative priority (e.g., comprising quantitative priority suchas a numerical scale, or qualitative priority such as high, medium, lowor other relative indicators) for BSs (602) of different access type,different re-use type (e.g., full re-use, fractional re-use, etc.),different transmit power (e.g., 50 watt macro cell, 25 watt micro cell,5 watt pico cell, 1 watt Femto cell, or some other suitable combinationof network cell size and transmit power), different access technology(e.g., wireless fidelity [WiFi], worldwide interoperability formicrowave access [WiMAX], licensed cellular radio frequency), or thelike, or a combination thereof. The cell search parameter 612 canestablish one or more minimum thresholds for various types of BSs (602),below which threshold(s) the UT 604 can search for a first set of BStypes and above which threshold(s) UT 604 can search for a second set ofBS types. In some aspects, the set(s) of BS types can be established bythe HCS priority parameter 608.

As one example of the foregoing, the HCS parameter 608 establishes threepriorities, low priority for GA BSs of any suitable type, mediumpriority for fractional re-use BSs (e.g., micro or pico cells thatemploy only a fraction of a channel's bandwidth, which can be moreefficient than full re-use BSs that employ all of the channel'sbandwidth), and high priority for HNBs. The cell search parameter 612can then establish a high minimum threshold for low priority BSs (e.g.,such as GA macro cell BSs), a medium minimum threshold for mediumpriority BSs, and a low minimum threshold for high priority BSs. In suchcase, if UT 604 is served or camping on an HNB, so long as the signal ofthe HNB meets the low minimum threshold, the UT 604 will not search forother BSs, or optionally will search only for other high priority BSs(e.g., other HNBs). If, however, the UT 604 is served by a mediumpriority fractional re-use BS, so long as the signal of the fractionalre-use BS meets the medium minimum threshold, UT 604 will search onlyfor high priority BSs, or optionally for other medium priority BSshaving better signal than the serving fractional re-use BS. If theserving BS is a low priority BS, the UT 604 will search for high ormedium priority BSs if the signal strength meets the high minimumthreshold, and any other suitable BS if the signal strength does notmeet the high minimum threshold. Specific examples of the HCS parameter608 and cell search parameter 612 in a WCDMA network are the HCS_PRIOparameter and S_(searchHCS) parameters, respectively. It should beappreciated, however, that the subject disclosure is not limited toWCDMA networks and parameters. Rather, other suitable wireless networksystems having analogous BS priority and/or search parameters, such as3GPP LTE, UMB, WiMAX, UMTS, and so on, are contemplated as part of thesubject disclosure.

Parameterization record 606 can also include a UE access type 610parameter that includes some capabilities of the UT 604. Thecapabilities can be obtained from the UT 604, or from a networkoperator's HLR, or other suitable network data source. Additionally, theUE access type 610 can be utilized as a selective parameterization flag,selecting one of multiple sets of parameters 608, 612, 614, 616, 618configured for various UT capabilities and contained in theparameterization record 606. Thus, to continue the foregoing example, ifthe UE access type for UT 604 is GA macro network only, a different setof HCS parameters 608 and cell search parameters 612 can be provided toand/or selected by the UT 604, instead of those listed in the exampleabove. For instance, the HCS parameter 608 can give high priority to GAmacro BSs and low priority to RA BSs. In addition, the cell searchparameter 612 can establish a high minimum threshold for the RA BSs,increasing likelihood that UT 604 ignores such BSs or searches for otherBSs when served by an RA BS, and a low minimum threshold for GA BSs. Itshould be appreciated that other suitable priority and search parameterconfigurations can exist, which are correlated to different UTcapabilities. For instance, a different set of parameters can beestablished for multi-mode WiFi/Cellular UTs (604), establishingpriority for WiFi access points, cellular access points, or both,compared with other access point types (e.g. WiMAX).

In addition to the foregoing parameters, parameterization record 606 canfurther comprise a frequency search parameter 614, mobile selectionparameter 616, and a neighbor cell parameter 618. Examples of theforegoing parameters in the WCDMA context can include an S_(INTERSEARCH)parameter (e.g. for searching between different available frequencychannels of a network), S_(INTRASEARCH) parameter (e.g., for searchingwithin a frequency channel) and Qhyst1_(S) and Qoffset1_(S,N), (e.g.,for determining whether to handoff to another BS or add another BS to anactive handover set). In similar fashion as described above, thefrequency search parameter 614, mobile cell selection parameter 616 andneighbor cell selection parameter 618 can be established with varyingminimum thresholds per HCS priority type. Additionally, sets ofpreferred and non-preferred parameters 614, 616, 618 can be provided asa function of UE access type 610. Thus, for instance, if UT 604 isRA-capable, the parameters 614, 616, 618 can establish low minimumthresholds for RA BSs, such as HNBs, and medium and/or high minimumthresholds for other types of BSs. In such case, the UT 604 is morelikely to search within and between frequency channels and handoff to RABSs, and more likely to remain camped on/served by RA BSs.

FIG. 7 depicts a block diagram of an example system 700 comprising a BS702 and one or more UTs 704 (e.g., mobile devices) according to aspectsof the subject disclosure. BS 702 can be configured to provide selectiveaccess to disparate types of mobile network access points, as describedherein. For UTs 704 configured to identify and distinguish between suchtypes of access points, an ID(s) of suitable types of access points canbe transmitted to the UTs 704 to facilitate acceptance of signalsinitiated by such access points. Where the UTs 704 are not configured toidentify and/or distinguish between different types of access points, anaccess point ID can be established as an equivalent to a macro networkID, thereby causing the UT 704 to accept signals comprising the accesspoint ID as if they are macro network BSs. In other aspects of thedisclosure, parameterization for weighting search and/or access priorityas a function of access point type can be sent to the UTs 704, asdescribed herein. Such parameterization can increase a likelihood thatUTs 704 will discover/access one type of access point, or to decrease alikelihood that UTs 704 will discover/access a second type of accesspoint. In some aspects, the parameters provided can be based oncapabilities of the UTs 704.

BS 702 (e.g., access point, . . . ) can comprise a receiver 710 thatreceives signal(s), and over-the-air (OTA) messages from one or more UTs704 through one or more receive antennas 706, and a transmitter 732 thattransmits coded/modulated OTA signals and messages provided by modulator730 to the one or more UTs 704 through a transmit antenna(s) 708.Receiver 710 can receive information from receive antennas 706 and canfurther comprise a signal recipient (not shown) that receives uplinkdata transmitted by UT(s) 704. Additionally, receiver 710 is operativelyassociated with a demodulator 712 that demodulates received information.Demodulated symbols are analyzed by a processor 714. Processor 714 iscoupled to a memory 716 that stores information related to functionsprovided by base station 702. In one instance, stored information cancomprise rules for obtaining various access point IDs and providing suchIDs to UTs 704 and/or establishing one or more such IDs as an equivalentto a macro network ID. Additionally, stored information can comprisesets of parameters configured to establish preferred and non-preferredBSs (702). Particularly, the stored information can comprise parametersestablishing an HCS prioritizing RA BSs relative to GA BSs, andemploying RA-capabilities of UTs 704 to set the relative priorities, asdescribed herein.

Additionally, processor 714 can be coupled to a registration module 722that obtains an access request from a UT 704. The registration module722 can obtain data identifying the requesting UT (704) and provide suchinformation to a data query module 718. Data query module employs theidentifying data to obtain subscriber profile information from a mobilecore network via a signaling interface 728. Once obtained, an analysismodule 720 can extract UT capabilities, suitable access point type IDs,regional access ID information, and like information as describedherein. Based on such information, and optionally based on whether therequesting UT (704) is included in a CSG associated with BS 702,registration module 722 can determine whether to provide access to therequesting UT (704).

In addition to the foregoing, BS 702 can include a selective accessmodule 726. Selective access module 726 can establish and transmit a setof UT parameters that increases a probability that the UT 704 willobtain and access an RA BS, or decreases a probability that the UT 704will access a GA BS in favor of the RA BS. Additionally, BS 702 cancomprise a restriction module 724. Restriction module 724 can facilitatereduced overhead signaling for UTs 704 in a RA BS environment. Forinstance, if registration module 722 denies an access request from arequesting UT (704) (e.g., because BS 702 is an RA BS and the requestingUT is not included in a CSG associated with the BS 702), such UT (704)might immediately try to connect with other nearby BSs. In a densedeployment of RA BSs, such a result can lead to multiple requests thatare ultimately denied, significantly draining battery power of therequesting UT (704). Accordingly, restriction module 724 can submit adelay parameter to the UT if registration module 722 denies the request.The delay parameter requires the UT to ignore access points having acommon access point ID as BS 702 (e.g., a common PLMN ID, or commonreserved PLMN ID) for a delay period. Optionally, selective accessmodule 726 can also submit a parameterization set increasing aprobability that the requesting UT (704) will search for access pointshaving a different access point ID as BS 702. As a result, therequesting UT is more likely to access non RA BSs, significantlyreducing wasted overhead signaling to foreign RA BSs.

FIG. 8 illustrates a block diagram of an example system 800 comprising aUT (e.g., mobile device) 802 that can be configured to interface with aBS 804. UT 802 can be configured to wirelessly couple with one or moresuch BSs 804 (e.g. access point) of a wireless network. Thus, forinstance, UT 802 can receive OTA signals from the BS 804 on a FL channeland respond with OTA signals and messages on a RL channel, as known inthe art. Furthermore, UT 802 can obtain access point IDs from the BS804, which identify types of access points that the UT 802 is configuredand/or authorized to interface to. In some aspects, the access point IDscan be established as equivalents to an operator's macro network ID,which the UT 802 is configured to employ in wireless communications.Alternatively, or in addition, UT 802 can obtain BS search and accessparameterization transmitted by the BS 804. The parameterization can bebased on a type (e.g. transmit power, access type, re-use type) of BS804 and neighboring BSs (not depicted), and optionally based on accesscapabilities of the UT 802, as described herein.

UT 802 includes at least one antenna 806 (e.g., a transmission receiveror group of such receivers comprising an input interface) that receivesa signal and receiver(s) 808, which performs typical actions (e.g.,filters, amplifies, down-converts, etc.) on the received signal.According to at least some aspects, a processor(s) 812 can selectivelyanalyze portions of signals received from demodulator 810 and obtainsynchronization and/or control information pertinent to a selected basestation (804) or type of base station. In general, antenna 806 andtransmitter 834, which wirelessly sends modulated symbols provided bymodulator 832, (collectively referred to as a transceiver) can beconfigured to facilitate wireless data exchange with base station(s)804.

Antenna 806 and receiver(s) 808 can also be coupled with a demodulator810 that can demodulate received symbols and provide them toprocessor(s) 812 for evaluation. It should be appreciated thatprocessor(s) 812 can control and/or reference one or more components(806, 808, 810, 814, 816, 818, 820, 822, 824, 826, 828) of the UT 802.Further, processor(s) 812 can execute one or more modules, applications,engines, or the like (816, 818, 822, 824, 826, 828) that compriseinformation or controls pertinent to executing functions of the UT 802.For instance, such functions can include scanning received wirelesssignals for a PLMN ID of an operator associated with BS 804, adistinguishing ID of BS 804, distinct IDs of specialized network accesspoints (e.g., HNBs, WiFi access points, WiMAX access points, etc.),employ search and/or access parameterization to establish and identifypreferred BS types over non-preferred BS types, or like operations, asdescribed herein.

UT 802 can additionally include memory 814 that is operatively coupledto processor(s) 812. Memory 814 can store data to be transmitted,received, and the like, and instructions (820) suitable to conductwireless communication with a remote device (804). Further, memory 814can store the modules, applications, engines, etc. (816, 818, 822, 824,826, 828) executed by processor(s) 812, above.

In addition to the foregoing, processor(s) 812 and memory 814 can becoupled to an access module 818 configured to generate and submit anetwork access request to BS 804. Additionally, UT 802 can comprise asignal processor 816 that obtains an ID associated with select accesspoints of a wireless network. Such an ID can distinguish the selectaccess points as a function of type, including access type, re-use type,transmit power, cell size, or the like, or a combination thereof. The IDcan be provided to UT 802 subject to approval of an access requestsubmitted by access module 818. In such case, the ID can be submitted byaccess module 818 in subsequent access requests to BSs (804) thattransmit the ID in pilot and/or acquisition data utilized for accessingsuch BSs (804). In at least one aspect, access module 818 can request aparsing module 830 to scan a received wireless signal for dataidentifying whether a cell ID transmitted by BS 804 (e.g., a trackingarea [TA]) is an RA or GA cell ID. If the cell ID is an RA ID, accessmodule 818 can condition submitting an access request to BS 804 based onwhether the cell ID is associated with a home RA BS, such as a home HNB,or whether a delay time restricting access to RA BSs imposed by timingmodule 826 is in effect (see below).

Further to the above, UT 802 can comprise a filtering module 820 thatreferences an access point ID of BS 804 against a set of home region IDsstored in memory 814. The home region IDs can identify one or moregeographic or network regions that provide subscription-based servicesor preferred access services to UT 802. If a suitable home region ID isidentified, filtering module 820 can establish a BS (804) transmittingsuch access point ID as a preferred or high priority BS. Access module818 can then raise a threshold below which an access request issubmitted to such a BS. In some aspects, the filtering module 820 canestablish the access point ID as an equivalent of an operator's PLMN ID,or like identifier associated with the operator. The equivalent ID canenable access module 818 to treat access points utilizing such ID insubstantially similar manner as macro BSs managed by the operator.

In one or more other aspects, UT 802 can comprise a connectivitytracking module 822 that records access history to BSs (804). Thus, forinstance, the connectivity tracking module 822 can record a cell ID orposition location data of an access point that approves an accessrequest. Position location data and/or access location data can beprovided by a location tracking module 828, which can reference aregistration area or access area ID in which the UT 802 is located, orcan include a geographic position location device (e.g., GPS), or othersuitable device for determination position location. The access locationor position location can be correlated to a home access point, which canbe established as a preferred access point or high priority accesspoint. Alternatively, or in addition, connectivity tracking module 822can record a cell ID or access location data of an access point thatdenies the access request. In such case, the cell ID/access location canbe correlated with a foreign access point, and placed on a blacklist.Blacklisted cell IDs/access locations can be ignored by access module818 when determining whether to initiate an access request. In additionto the foregoing, if an access request is denied, a timing module 826can impose a delay time on subsequent signaling to access points sharinga common access point ID as a BS that denies access to UT 802. The delaytime can be helpful in avoiding redundant or wasted signaling to foreignHNBs, for instance.

The aforementioned systems have been described with respect tointeraction between several components, modules and/or communicationinterfaces. It should be appreciated that such systems andcomponents/modules/interfaces can include those components orsub-components specified therein, some of the specified components orsub-components, and/or additional components. For example, a systemcould include HNBs 210, Internet 240, core network 502, and UT 802 or adifferent combination of these and other components. Sub-componentscould also be implemented as components communicatively coupled to othercomponents rather than included within parent components. Additionally,it should be noted that one or more components could be combined into asingle component providing aggregate functionality. For instance, dataquery module 506 can include data analysis module 518, or vice versa, tofacilitate querying subscriber profile information and analyzing theinformation by way of a single component. The components can alsointeract with one or more other components not specifically describedherein but known by those of skill in the art.

Furthermore, as will be appreciated, various portions of the disclosedsystems above and methods below may include or consist of artificialintelligence or knowledge or rule based components, sub-components,processes, means, methodologies, or mechanisms (e.g., support vectormachines, neural networks, expert systems, Bayesian belief networks,fuzzy logic, data fusion engines, classifiers . . .). Such components,inter alia, and in addition to that already described herein, canautomate certain mechanisms or processes performed thereby to makeportions of the systems and methods more adaptive as well as efficientand intelligent.

In view of the exemplary systems described supra, methodologies that maybe implemented in accordance with the disclosed subject matter will bebetter appreciated with reference to the flow charts of FIGS. 9-12.While for purposes of simplicity of explanation, the methodologies areshown and described as a series of blocks, it is to be understood andappreciated that the claimed subject matter is not limited by the orderof the blocks, as some blocks may occur in different orders and/orconcurrently with other blocks from what is depicted and describedherein. Moreover, not all illustrated blocks may be required toimplement the methodologies described hereinafter. Additionally, itshould be further appreciated that the methodologies disclosedhereinafter and throughout this specification are capable of beingstored on an article of manufacture to facilitate transporting andtransferring such methodologies to computers. The term article ofmanufacture, as used, is intended to encompass a computer programaccessible from any computer-readable device, device in conjunction witha carrier, or storage medium.

FIG. 9 illustrates a flowchart of an example methodology 900 forproviding regional access to select categories of BSs according to someaspects of the subject disclosure. At 902, method 900 can obtainsubscriber profile information pertaining to a UT. The subscriberprofile information can be obtained from a network component maintainedby a network operator associated with the UT (e.g., providing wirelessservices for the UT). Additionally, the profile information can includeaccess capabilities of the UT (e.g., whether the UT isconfigured/authorized to access RA BSs, or configured to accessspecialized access points, such as WiFi, HNB, WiMAX, or other suchaccess points as described herein), a PLMN ID of the network operatorassociated with the UT, access point IDs associated with the specializedaccess points, Registration Area ID information, home cell IDs,subscription status, and so on.

At 904, method 900 can extract data representing a network region fromthe profile information. As one example, the network region can compriseRegional Subscription Data, such as a Regional Zone Code supporting arearestricted roaming. In other examples, the network region can comprise aRegistration Area Identifier, TAI, LAI or RAI of a network. In stillother examples, the network region can be based on any suitableidentifier (e.g., number) assigned to distinct geographic and/orpolitical boundaries (e.g., municipality, township, housing distinct,county, state, province, etc.). At 906, method 900 can compare thenetwork region to data associated with a cell of a wireless network,such as a cell serving the UT, or a neighboring cell, or the like. At908, method 900 can submit an ID associated with selected access pointsof a wireless network to the UT if the network region matches a networkregion of the cell. In some aspects, the selected access points can bespecialized access points (e.g., HNBs) located within the networkregion, thereby enabling communication with such access points if the UTis within the network region. By submitting the access point ID when theUT is within the network region, the UT can infer that such selectedaccess points, or a preferred access point in some instances, can befound while in the region.

FIG. 10 depicts a flowchart of an example methodology 1000 forfacilitating reduced signaling for user terminals among densedeployments of disparate categories of BSs. As described below, method1000 can provide improved mobile efficiency, particularly where suchterminals are configured or authorized to access only a subset ofavailable BSs. At 1002, method 1000 can obtain a wireless signalcomprising a request to access a mobile network, or to obtain voice ordata services from a network. At 1004, method 1000 can obtain an ID of arequesting UT from the access request. At 1006, method 1000 can obtainsubscriber profile information specifying one or more home regionsassociated with the requesting UT. At 1008, method 1000 can determinewhether a cell receiving the request matches a home region(s) specifiedin the subscriber profile information. If the cell matches the homeregion(s), method 1000 can proceed to 1014. Otherwise, method 1000proceeds to 1010.

At 1010, method 1000 can submit an operator PLMN ID to the requestingUT. The PLMN ID facilitates access to macro network BSs that provideaccess to the operator's network. At 1012, method 1000 can send operatorfavorable parameters to the requesting UT. Such parameters can increasea likelihood that the UT searches for, accesses and/or hands off to themacro network BSs, or reduce a likelihood that the UT searches for,accesses and/or hands off to BSs other than the macro network BSs.Accordingly, when the UT is outside of an associated home region, method1000 can facilitate directing the UT to a macro network, mitigating oreliminating signaling to non-macro BSs.

At 1014, method 1000 can send a reserved PLMN ID as an equivalent to anoperator's PLMN ID. The reserved PLMN ID can be associated with selectaccess points contained within the home region(s), which the UT isauthorized and configured to utilize. By establishing the reserved PLMNID as an equivalent of the operator's PLMN ID, the select access pointscan be treated substantially similar to macro BSs maintained by theoperator. Accordingly, even where the UT is unable to specificallydistinguish the select access points from the macro BSs, method 1000 canfacilitate access to such select access points.

At 1016, method 1000 can send parameters to the UT that are favorable tothe selected access points associated with the reserved PLMN ID. Suchparameters can increase a likelihood that the UT searches for, accessesand/or hands off to access points associated with the reserved PLMN ID,or reduces a likelihood that the UT searches for, accesses and/or handsoff to access points not associated with the reserved PLMN ID. As aresult, the parameters can reduce terminal load on the macro network,and/or enable the UT to more efficiently locate a home or preferredaccess point associated with the reserved PLMN ID.

Method 1000 can optionally proceed to references numbers 1018 through1024 (e.g., where a cell receiving an access request from the UT is anRA BS). At 1018, method 1000 can compare a mobile ID of the UT to a CSGassociated with a receiving cell. At 1020, a determination is made as towhether the mobile ID matches an ID included in the CSG. If a match isfound, method 1000 proceeds to 1024 where access to the cell is allowed.Otherwise, if no match is found, method 1000 can proceed to 1022 whereaccess to the cell is denied. It should be appreciated that, althoughaccess might be denied by method 1000, an increased likelihood of the UTidentifying a home RA BS can be provided. Specifically, by sending thereserved PLMN ID and network parameters favorable to RA BSs at referencenumbers 1014 and 1016, respectively, the UT can be more likely to signalRA BSs over other types of BSs, potentially reducing a time required tolocate the home RA BS. Accordingly, method 1000 can result in moreefficient mobile access and reduced signaling overhead in manycircumstances.

FIG. 11 illustrates a flowchart of an example methodology 1100 forimproving network access via preferred network access points. At 1102,method 1100 can signal an access point of a wireless network. In someaspects, the signaling can comprise a network access request to theaccess point. Furthermore, the access request can include an ID of arequesting device according to additional aspects. At 1104, method 1100can obtain an ID associated with select access points of the wirelessnetwork. Such ID can be utilized to distinguish the select access pointsfrom other network access points as a function type (e.g., access type,re-use type, transmit power, cell size, etc.). Additionally, accordingto one or more particular aspects, the ID can be provided by a cellreceiving the network access request subject to approval of suchrequest.

At 1106, method 1100 can employ the ID to facilitate accessing thewireless network via at least one of the select access points. In someaspects, the ID can be utilized to distinguish one of the select accesspoints from other types of access points. A decision of whether topursue utilizing the select access points to couple to the wirelessnetwork can be based at least in part on such distinction. Further,employing the ID to filter potential access points can increase aprobability of finding a preferred access point. In other aspects,employing the ID to filter potential access points can lead to improvedload balancing among disparate types of access points. Accordingly,improved mobile efficiency can result in a wireless network environmentcomprising disparate types of network access points, as describedherein.

FIG. 12 depicts a flowchart of a sample methodology 1200 forfacilitating reduced signaling overhead in dense access pointdeployments according to particular aspects of the subject disclosure.At 1202, method 1200 can signal a network access point (e.g. where suchsignal comprises a network access request). At 1204, method 1200 canreceive a regional/network ID in response to the signal. Theregional/network ID can optionally be received subject to approval of anetwork access request. At 1206, method 1200 can compare theregional/network ID to a set of UT-related home region IDs. At 1208,method 1200 can access the wireless network via a specialized accesspoint (e.g. HNB, WiFi, WiMAX, etc.) associated with the regional/networkID if the regional/network ID matches a home region ID. At 1210, method1200 can track and categorize a cell ID of a specialized access pointthat approves of or denies access to the network. In some aspects, suchtracking can be conditioned on the access point being an RA BS. At 1212,method 1200 can implement a delay period for specialized access pointsif an access request is denied. At 1214, method 1200 can switch to anaccess frequency employed at least in part by non-RA access points ifthe access request was denied. At 1216, method 1200 can track positionlocation of a requesting device (e.g. UT) upon approval or denial of anaccess request. The position location can be correlated to an approvingor restricting specialized access point based on whether the request isapproved or denied, respectively. At 1218, method 1200 can obtain aparameter set that weights a likelihood of accessing or handing off tospecialized access points associated with the regional/network ID ascompared with macro BSs located within the region. Thus, for instance,if the access request is denied, the parameters can increase likelihoodof accessing/handing off to macro BSs. Otherwise, where the accessrequest is successful, the parameters can increase likelihood ofaccessing/handing off to specialized access points associated with theregional/network ID.

FIGS. 13 and 14 depict block diagrams of example systems 1300, 1400 thatfacilitate access and implement access, respectively, of a remote deviceto specialized access points of a mobile network, as described herein.For example, systems 1300, 1400 can reside at least partially within awireless communication network and/or within a transmitter such as anode, base station, access point, user terminal, personal computercoupled with a mobile interface card, or the like. It is to beappreciated that systems 1300, 1400 are represented as includingfunctional blocks, which can be functional blocks that representfunctions implemented by a processor, software, or combination thereof(e.g. firmware).

System 1300 can facilitate UT access to specialized access points of awireless network and reduce overhead signaling in mixed deployments ofspecialized access points and macro BSs. System 1300 can comprise ameans 1302 for obtaining subscriber profile information associated witha UT. Such a means 1302 can comprise a transceiver that obtains awireless signal from the UT, as well as a signal processor that canparse the signal to identify and extract the profile information. Inother examples, the means 1302 can comprise a data query means thatemploys a signaling interface to communicate with components of a coremobile network. The query means can obtain the profile information froman HLR, or analogous component, maintained by a network operatorproviding wireless services for the UT.

In addition to the foregoing, system 1300 can comprise a means 1304 forextracting a network region ID (e.g., Registration Area Identifier) froma subscriber profile. In particular, the means 1304 can parse theprofile for a PLMN ID reserved for a type of specialized network accesspoints, as described herein. The Registration Area ID can indicate aregion in which a select group of such specialized access points islocated. A means 1306 for comparing the network Registration Area IDwith a cell ID can determine whether a cell associated with system 1300matches the network Registration Area ID. If so, a means 1308 forsubmitting the Registration Area ID can transmit such ID to the UT, tofacilitate accessing the specialized access points within the identifiedregion. In some aspects, the means 1308 can further equate the reservedPLMN ID to an operator's PLMN ID, obtained from the subscriber profile.Accordingly, the UT can interface with the specialized access points insubstantially similar manner as performed with the operator's macro BSs.

System 1400 can provide regional access to specialized access points ofa mobile network. The system 1400 can comprise a means 1402 forsubmitting a network access request to a suitable access point of thenetwork. The means 1402 can comprise, for instance, a wirelesstransceiver configured to wirelessly communicate with such access point.In addition, a means 1404 for obtaining a network ID of select accesspoints can analyze data received in response to the access request.Particularly, the means 1404 can determine whether the access point isan RA or GA access point, determine an operator's PLMN ID, determine oneor more Registration Area IDs, and determine one or more specializedaccess point IDs reserved for a particular type of access point, wheresuch information is included in the response. In addition to theforegoing, system 1400 can comprise a means 1406 for employing thereceived information in accessing the mobile network. Specifically, themeans 1406 can utilize the specialized access point ID if a RegistrationArea ID matches a region in which the access point is located. In suchcase, means 1406 can employ the specialized access point ID to filterwireless signals obtained by system 1400. The filtering can be utilizedto determine a preferred type of access point for connecting to themobile network, facilitating improved network loading and/or utilizationof beneficial services or rate plans offered by the preferred type ofaccess point.

What has been described above includes examples of aspects of theclaimed subject matter. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing the claimed subject matter, but one of ordinary skill in theart may recognize that many further combinations and permutations of thedisclosed subject matter are possible. Accordingly, the disclosedsubject matter is intended to embrace all such alterations,modifications and variations that fall within the spirit and scope ofthe appended claims. Furthermore, to the extent that the terms“includes,” “has” or “having” are used in either the detaileddescription or the claims, such terms are intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim.

1. A method of providing regional access in a wireless network,comprising: obtaining subscriber profile information pertaining to auser terminal (UT); extracting data representing a network region fromthe information; comparing the network region to data associated with acell of a wireless network; and submitting an identifier associated withselected access points of the wireless network to the UT if the networkregion matches a network region of the cell.
 2. The method of claim 1,further comprising providing the identifier as an equivalent of a publicland mobile network (PLMN) identifier (ID) of a network operatorassociated with the UT.
 3. The method of claim 1, wherein the identifieris a specialized PLMN ID associated with the selected access points, andthe selected access points are home Node Bs (HNBs).
 4. The method ofclaim 1, further comprising obtaining the subscriber profile informationupon receiving a network access request from the UT.
 5. The method ofclaim 1, further comprising employing a closed subscriber group (CSG) ofthe cell to verify whether the UT is authorized to access the wirelessnetwork via the cell.
 6. The method of claim 5, further comprisingdenying network access to the UT if the UT is not authorized to accessthe cell, and submitting a delay parameter to the UT that requires theUT to ignore access points associated with the identifier for a delayperiod.
 7. The method of claim 1, extracting data representing a networkregion further comprises obtaining Regional Subscription Data (RSD)associated with the UT, the RSD identifies the selected access points.8. The method of claim 1, extracting data representing a network regionfurther comprises obtaining a Regional Zone Code (RZC) that supportsarea restricted roaming.
 9. The method of claim 1, further comprisingverifying that the UT is associated with an active subscription thatallows service from at least one of the selected access points.
 10. Themethod of claim 1, further comprising submitting a parameterization setthat increases a likelihood that the UT searches for, accesses or handsoff to at least one of the selected access points, or decreases alikelihood that the UT searches for, access or hands off to accesspoints of a different type than the selected access points.
 11. Themethod of claim 1, further comprising obtaining the subscriber profileinformation via a signaling interface to an operator's core network. 12.An apparatus that provides selective regional access to a wirelessnetwork, comprising: a query module that obtains subscriber profileinformation pertaining to a UT; an analysis module that extracts datarepresenting a network region from the information, and compares theextracted network region to data associated with a cell of a wirelessnetwork; and a communication processor that submits an identifierassociated with selected access points of the wireless network to the UTif the network region matches a region of the cell.
 13. The apparatus ofclaim 12, the communication processor establishes the identifier as anequivalent of a PLMN ID of a network operator associated with the UT.14. The apparatus of claim 12, wherein: the selected access pointscomprise an HNB network, a fractional re-use network, a sub-macro powernetwork or a sub-macro cell network; and the identifier is a PLMN IDreserved for access points of the HNB, fractional re-use, sub-macropower or sub-macro cell, respectively, network.
 15. The apparatus ofclaim 12, further comprising a registration module that extracts an IDof the UT from an access request included in a wireless signal initiatedby the UT, and submits the ID to the query module to obtain thesubscriber profile information.
 16. The apparatus of claim 15, whereinthe registration module verifies whether the UT is authorized to obtainservice from the cell by comparing the ID of the UT to a CSG associatedwith the cell.
 17. The apparatus of claim 15, wherein the registrationmodule verifies whether the UT is associated with an active subscriptionrelated to the selected access points.
 18. The apparatus of claim 12,further comprising a restriction module that submits a delay parameterto the UT if the UT is not authorized to access the cell, the delayparameter requires the UT to ignore access points associated with theidentifier for a delay period.
 19. The apparatus of claim 12, theanalysis module extracts RSD that identifies the selected access pointsfrom the subscriber profile information.
 20. The apparatus of claim 12,wherein: the analysis module extracts an RZC related to area restrictedroaming from the subscriber profile information; and the communicationprocessor compares an RZC of the cell to the extracted RZC to determinewhether the network region matches the network region of the cell. 21.The apparatus of claim 12, further comprising a selective access modulethat submits a set of parameters to the UT that increases a probabilitythat the UT will search for, access or hand off to at least one of theselected access points, or decreases a probability that the UT willsearch for, access or hand off to macro network base stations.
 22. Theapparatus of claim 12, further comprising a signaling interface tocomponents of a core mobile communication network, the query moduleobtains the subscriber profile information via the signaling interface.23. An apparatus that provides regional access in a wireless network,comprising: means for obtaining subscriber profile informationpertaining to a UT; means for extracting data representing a networkregion from the information; means for comparing the network region todata associated with a cell of a wireless network; and means forsubmitting an identifier associated with selected access points of thewireless network to the UT if the network region matches a networkregion of the cell.
 24. At least one processor configured to provideregional access in a wireless network, comprising: a first moduleconfigured to obtain subscriber profile information pertaining to a UT;a second module configured to extract data representing a network regionfrom the information; a third module configured to compare the networkregion to data associated with a cell of a wireless network; and afourth module configured to submit an identifier associated withselected access points of the wireless network to the UT if the networkregion matches a network region of the cell.
 25. A computer programproduct, comprising: a computer-readable medium, comprising: a first setof codes for causing a computer to obtain subscriber profile informationpertaining to a UT; a second set of codes for causing the computer toextract data representing a network region from the information; a thirdset of codes for causing the computer to compare the network region todata associated with a cell of a wireless network; and a fourth set ofcodes for causing the computer to submit an identifier associated withselected access points of the wireless network if the network regionmatches a network region of the cell.
 26. A method for obtainingregional access to a wireless network, comprising: obtaining anidentifier associated with a particular type of wireless network accesspoint; and selecting an access point associated with the identifier toaccess the wireless network if a current region of a requesting devicematches a region of the selected access point.
 27. The method of claim26, further comprising employing the identifier as an equivalent PLMN IDof a mobile operator.
 28. The method of claim 26, further comprisingmaintaining a set of home region IDs associated with subscription-basedwireless services, the home region IDs define one or more geographic ornetwork regions in which the wireless services are available or arepreferred.
 29. The method of claim 28, further comprising verifying thatthe identifier is one of the set of home region IDs.
 30. The method ofclaim 29, further comprising conditioning accessing the wireless networkon the identifier matching one of the set of home region IDs.
 31. Themethod of claim 26, further comprising tracking a cell ID of theselected access point if an access request to such access point isdenied.
 32. The method of claim 26, further comprising employing a delayparameter to refrain from searching for or signaling access pointsassociated with the identifier for a delay period defined by the delayparameter if an access request to one of the select access points isdenied.
 33. The method of claim 26, further comprising switching to acell hierarchy level utilized at least in part by base stations of thewireless network other than the particular type of access points if theaccess request is denied.
 34. The method of claim 26, further comprisingstoring a cell ID of the at least one select access point if an accessrequest to such access point is approved.
 35. The method of claim 26,further comprising tracking a position location of a requesting UT ifaccessing the wireless network is approved, and correlating the positionlocation with a permissible access location to the select access points.36. The method of claim 26, further comprising obtaining a set ofparameters that weights a likelihood of searching for, accessing orhanding off to the particular type of access points in lieu of an accesspoint of the wireless network not associated with the identifier.
 37. AUT configured to obtain regional access to a wireless network,comprising: a signal processor that obtains an identifier associatedwith a particular type of wireless network access point; and an accessmodule that selects an access point associated with the identifier toaccess the wireless network if a region in which the UT is locatedmatches a region of the selected access point.
 38. The UT of claim 37,further comprising a filtering module that references the identifieragainst a set of home region IDs associated with one or more geographicor network regions that provide subscription-based services or preferredservices to the UT.
 39. The UT of claim 38, the identifier is aregistration area identifier, location area identifier (LAI), a routingarea identifier (RAI), a tracking area ID (TAI), or an RZC of thewireless network.
 40. The UT of claim 38, wherein the filtering moduleemploys the identifier as an equivalent of a network operator PLMN ID ifthe identifier matches one of the set of home region IDs.
 41. The UT ofclaim 37, further comprising a connectivity tracking module that recordsat least one of: a cell ID or location data of the access point if theaccess request is denied; or a cell ID or location data of the accesspoint if the access request is approved.
 42. The UT of claim 37, furthercomprising a timing module that imposes a delay time on subsequentsignaling to access points associated with the identifier if the accessrequest is denied.
 43. The UT of claim 37, further comprising a locationtracking module that obtains an access location of the UT if the accessrequest is approved or is denied.
 44. The UT of claim 43, wherein aconnectivity tracking module correlates the access location to at leastone of: a restricted access location if the request is denied; or acurrent registration area if the request is approved.
 45. The UT ofclaim 37, further comprising a parsing module that scans a receivedwireless signal initiated at the selected access point for dataidentifying whether a Registration Area associated with such accesspoint is a restricted registration area or general access registrationarea.
 46. The UT of claim 37, wherein the access module searches,accesses or hands off to an access point not associated with theidentifier after determining that access points associated with theidentifier are not currently suitable for communication with thewireless network.
 47. The UT of claim 46, the access module searches forinter-frequency or intra-frequency cells utilized by access pointsassociated with the identifier before determining that access pointsassociated with the identifier are not currently suitable for thecommunication.
 48. An apparatus configured to obtain regional access toa wireless network, comprising: means for obtaining an identifierassociated with a particular type of wireless network access point; andmeans for selecting an access point associated with the identifier toaccess the wireless network if a current region of a requesting devicematches a region of the selected access point.
 49. At least oneprocessor configured to obtain regional access to a wireless network,comprising: a first module configured to obtain an identifier associatedwith a particular type of wireless network access point; and a secondmodule configured to select an access point associated with theidentifier to access the wireless network if a current region of arequesting device matches a region of the selected access point.
 50. Acomputer program product, comprising: a computer-readable medium,comprising: a first set of codes for causing a computer to obtain anidentifier associated with a particular type of wireless network accesspoint; and a second set of codes for causing the computer to select anaccess point associated with the identifier to access the wirelessnetwork if a current region of a requesting device matches a region ofthe selected access point.