Employing a home base station in a wireless communication environment

ABSTRACT

Systems and methodologies are described that effectuate establishment of an IPSec tunnel for utilization in a wireless communication environment. IPSec establishment procedures on home base stations can be used to establish IPSec tunnels between home base stations situated on open access sectors of wireless communication environments and packet data interworking function components positioned at the contiguity of secured segments of the wireless communication environments. Moreover, high rate packet data point-to-point protocol challenge-handshake authentication protocols can be directed through the IPSec tunnels to facilitate authentication of access terminals associated with the home base stations in order to facilitate further communications with components dispersed within secure areas of wireless communication environments. Further, international mobile subscriber identities (IMSI) affiliated with access terminals associated with home base stations can be used to identify packet data serving nodes with which to establish communications between home base stations and packet data serving nodes.

CROSS-REFERENCE TO RELATED APPLICATIONS

This Application for Patent is a continuation of and claims the benefitof U.S. application Ser. No. 12/132,552 entitled “EMPLOYING A HOME BASESTATION IN A WIRELESS COMMUNICATION ENVIRONMENT,” which was filed Jun.3, 2008, issued as U.S. Pat. No. 8,345,604 on Jan. 1, 2013, as well asU.S. Provisional Patent Application Ser. No. 60/942,643 entitled “HOMEBASE STATION” which was filed on Jun. 7, 2007, now expired. The entiretyof the aforementioned applications are assigned to the Assignee are andherein incorporated by reference.

BACKGROUND

I. Field

The following description relates generally to wireless communications,and more particularly to base stations in a wireless communicationsystem.

II. Background

Wireless communication systems are widely deployed to provide varioustypes of communication; for instance, voice and/or data can be providedvia such wireless communication systems. A typical wirelesscommunication system, or network, can provide multiple users access toone or more shared resources (e.g., bandwidth, transmit power,interference, time slot, . . . ). For instance, a system can use avariety of multiple access techniques such as Frequency DivisionMultiplexing (FDM), Time Division Multiplexing (TDM), Code DivisionMultiplexing (CDM), Orthogonal Frequency Division Multiplexing (OFDM),and others.

Generally, wireless multiple-access communication systems cansimultaneously support communication for multiple access terminals. Eachaccess terminal can communicate with one or more base stations viatransmissions on forward and reverse links. The forward link (ordownlink) refers to the communication link from base stations to accessterminals, and the reverse link (or uplink) refers to the communicationlink from access terminals to base stations. This communication link canbe established via a single-in-single-out, multiple-in-single-out or amultiple-in-multiple-out (MIMO) system.

MIMO systems commonly employ multiple (N_(T)) transmit antennas andmultiple (N_(R)) receive antennas for data transmission. A MIMO channelformed by the N_(T) transmit and N_(R) receive antennas can bedecomposed into N_(S) independent channels, which can be referred to asspatial channels, where N_(S)≦{N_(T),N_(R)}. Each of the N_(S)independent channels corresponds to a dimension. Moreover, MIMO systemscan provide improved performance (e.g., increased spectral efficiency,higher throughput and/or greater reliability) if the additionaldimensionalities created by the multiple transmit and receive antennasare utilized.

MIMO systems can support various duplexing techniques to divide forwardand reverse link communications over a common physical medium. Forinstance, frequency division duplex (FDD) systems can utilize disparatefrequency regions for forward and reverse link communications. Further,in time division duplex (TDD) systems, forward and reverse linkcommunications can employ a common frequency region so that thereciprocity principle allows estimation of the forward link channel fromreverse link channel.

Wireless communication systems oftentimes employ one or more basestations that provide a coverage area. A typical base station cantransmit multiple data streams for broadcast, multicast and/or unicastservices, wherein a data stream may be a stream of data that can be ofindependent reception interest to an access terminal. An access terminalwithin the coverage area of such base station can be employed to receiveone, more than one, or all the data streams carried by the compositestream. Likewise, an access terminal can transmit data to the basestation or another access terminal.

There are many occasions where mobile communications devices, such assmart phones, cell phones, and the like, lose connectivity with themacro cellular network to which they are members. This is especially thecase where the mobile or portable device is taken into homes or businessestablishments where cellular communication coverage is sparse at best.The subject matter as claimed is directed toward resolving or at thevery least mitigating one or all the problems elucidated above.

SUMMARY

The following presents a simplified summary of one or more embodimentsin order to provide a basic understanding of such embodiments. Thissummary is not an extensive overview of all contemplated embodiments,and is intended to neither identify key or critical elements of allembodiments nor delineate the scope of any or all embodiments. Its solepurpose is to present some concepts of one or more embodiments in asimplified form as a prelude to the more detailed description that ispresented later.

The claimed subject matter in accordance with a various aspectsdisclosed herein provides architectures that collapse the BTS/BSC/PCFfunctionalities into a single entity referred to as a home base station.The home base station can utilize or employ an A10 connectionestablished between the home base station and a cellular network packetdata internetworking function thereby providing seamless handover fromthe home base station to cellular networks. Moreover, in accordance withfurther aspects, the claimed matter can employ an A11 concentrator thatallows for consolidating A11 connections thus reducing the impact to thecellular system packet data switching aspects. Additionally, throughutilization of the facilities and functionalities engineered by the homebase station other interfaces (e.g., A13, A16, A17, A18, A19, A21) thatenable and/or facilitate mobile connectivity to the macro cellularnetwork can be instituted and/or utilized.

In accordance with one or more embodiments and corresponding disclosurethereof, various aspects are described in connection with facilitatingor effectuating establishment of an IPSec tunnel for utilization in awireless communication environment. In accordance with an aspect, theclaimed subject matter includes a method that effectuates establishmentof a IPSec tunnel for utilization in a wireless communicationenvironment, comprising utilizing IPSec establishment procedures on ahome base station to establish the IPSec tunnel between the home basestation and a packet data interworking function component, the IPSecestablishment procedures based at least in part on a user, across allusers, or based on a quality of service (QoS), employing at least one ofa high rate packet data (HRDP) point-to-point protocol (PPP)challenge-handshake authentication protocol (CHAP) or non-access stratum(NAS) based support directed through the IPSec tunnel to authenticate anaccess terminal associated with the home base station, utilizing aninternational mobile subscriber identity (IMSI) associated with theaccess terminal to identify or select a packet data serving node withwhich to establish communications between the home base station and thepacket data serving node, and employing A11 signaling to establish anA10 connection with the packet data serving node.

In accordance with yet a further aspect, the claimed subject matterincludes a wireless communication apparatus that establishes and IPSectunnel utilized in a wireless communication environment. The wirelesscommunication apparatus includes means for employing an IPSecestablishment procedure on a means for establishing the IPSec tunnelbetween the means for establishing the IPSec tunnel and a means forintermediating communication between a secure sector of the wirelesscommunication environment and an unguarded sector of the wirelesscommunication environment wherein the IPSec establishment procedurebased at least in part on a user, across all users, a quality of service(QoS), means for employing one or more of a high rate packet data (HRDP)point-to-point protocol (PPP) challenge-handshake authenticationprotocol (CHAP) or non-access stratum (NAS) based support directedthrough the IPSec tunnel to authenticate a means for mobilecommunicating associated with the means for establishing the IPSectunnel, means for utilizing an international mobile subscriber identity(IMSI) associated with the means for mobile communicating to identify orselect a means for serving packet data with which to establishcommunications between the means for establishing the IPSec tunnel andthe means for serving packet data, and means for employing A11 signalingto establish an A10 connection with the means for serving packet data.

In accordance with a further aspect, the claimed matter includeswireless communications apparatus that comprises a memory that retainsinstructions related to using IPSec establishment procedures toestablish an IPSec tunnel extending from a home base station to a packetdata interworking function, directing high rate packet data (HRDP)point-to-point protocol (PPP) challenge-handshake authenticationprotocol (CHAP) through the IPSec tunnel to authenticate an accessterminal associated with the home base station with a secure wirelesscommunication environment, identifying a packet data serving node basedat least in part on an international mobile subscriber identity (IMSI)associated with the access terminal, establishing dynamic datainterchange between the packet data serving node and the home basestation, and establishing an A10 connection with the packet data servingnode using A11 signaling; and a processor, coupled to the memory,configured to execute the instructions retained in the memory.

The claimed matter in accordance with a further aspect includes amachine-readable medium having stored thereon machine-executableinstructions for utilizing IPSec establishment procedures on a home basestation to establish an IPSec tunnel between a home base station and apacket data interworking function component, the IPSec establishmentprocedures based at least in part on a user, across all users, orquality of service (QoS) attributes, employing at least one of a highrate packet data (HRDP) point-to-point protocol (PPP)challenge-handshake authentication protocol (CHAP) or non-access stratum(NAS) support directed through the IPSec tunnel to authenticate anaccess terminal associated with the home base station, utilizing aninternational mobile subscriber identity (IMSI) associated with theaccess terminal to identify or select a packet data serving node withwhich to establish communications between the home base station and thepacket data serving node, and employing A11 signaling to establish anA10 connection with the packet data serving node.

Moreover, the claimed matter in accordance with a further aspect can, ina wireless communications system, include an apparatus comprising: aprocessor configured to: utilize IPSec establishment procedures on ahome base station to establish an IPSec tunnel between a home basestation and a packet data interworking function component wherein theIPSec establishment procedures based in part on a user, across aplurality of users, or a quality of service (QoS) attribute, employ oneor more of a high rate packet data (HRDP) point-to-point protocol (PPP)challenge-handshake authentication protocol (CHAP) or non-access stratum(NAS) based support directed through the IPSec tunnel to authenticate anaccess terminal associated with the home base station, utilize aninternational mobile subscriber identity (IMSI) associated with theaccess terminal to identify or select a packet data serving node withwhich to establish communications between the home base station and thepacket data serving node; and employ A11 signaling to establish an A10connection with the packet data serving node.

To the accomplishment of the foregoing and related ends, the one or moreembodiments comprise the features hereinafter fully described andparticularly pointed out in the claims. The following description andthe annexed drawings set forth in detail certain illustrative aspects ofthe one or more embodiments. These aspects are indicative, however, ofbut a few of the various ways in which the principles of variousembodiments can be employed and the described embodiments are intendedto include all such aspects and their equivalents.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an illustration of a wireless communication system inaccordance with various aspects set forth herein.

FIG. 2 is an illustration of an example network architecture thatemploys a home base station in a wireless communication environment.

FIGS. 3-5 illustrate example network architectures that employ home basestations in a wireless communication environment.

FIG. 6 is an illustration of an example access terminal that establishesa tunnel through a home base station in accordance with various aspectsof the subject disclosure.

FIG. 7 is an illustration of an example home base station thateffectuates tunneling in accordance with various aspects of the subjectdisclosure.

FIG. 8 is a further illustration of an example home base station thateffectuates tunneling in accordance with various aspects of the subjectdisclosure.

FIG. 9 provides illustration of a home base station that effectuatestunneling in accordance with an aspect of the subject disclosure.

FIG. 10 provides illustration of an example network architecture thatincludes an A11 concentrator utilized in accordance with an aspect ofthe subject disclosure.

FIG. 11 is an illustration of an example methodology that facilitatesutilization of a home base station in a wireless communicationenvironment.

FIG. 12 is a further illustration of an example access terminal thatestablishes a tunnel through a home base station in accordance withvarious aspects of the subject disclosure.

FIG. 13 provides illustration of an example home base station thatestablishes a tunnel to a packet data interworking function inaccordance with various aspects of the subject disclosure.

FIG. 14 is an illustration of an example system that facilitatesallocating resource blocks to access terminal(s) via employing aflexible signaling scheme in a wireless communication environment.

FIG. 15 is an illustration of an example system that enablesestablishing a tunnel linking a home base station with a packet datainterworking function situated at the contiguity between the publicInternet and a core cellular wireless communication environment.

DETAILED DESCRIPTION

Various embodiments are now described with reference to the drawings,wherein like reference numerals are used to refer to like elementsthroughout. In the following description, for purposes of explanation,numerous specific details are set forth in order to provide a thoroughunderstanding of one or more embodiments. It may be evident, however,that such embodiment(s) may be practiced without these specific details.In other instances, well-known structures and devices are shown in blockdiagram form in order to facilitate describing one or more embodiments.

As used in this application, the terms “component,” “module,” “system,”and the like are intended to refer to a computer-related entity, eitherhardware, firmware, a combination of hardware and software, software, orsoftware in execution. For example, a component can be, but is notlimited to being, a process running on a processor, a processor, anobject, an executable, a thread of execution, a program, and/or acomputer. By way of illustration, both an application running on acomputing device and the computing device can be a component. One ormore components can reside within a process and/or thread of executionand a component can be localized on one computer and/or distributedbetween two or more computers. In addition, these components can executefrom various computer readable media having various data structuresstored thereon. The components can communicate by way of local and/orremote processes such as in accordance with a signal having one or moredata packets (e.g., data from one component interacting with anothercomponent in a local system, distributed system, and/or across a networksuch as the Internet with other systems by way of the signal).

The techniques described herein can be used for various wirelesscommunication systems such as code division multiple access (CDMA), timedivision multiple access (TDMA), frequency division multiple access(FDMA), orthogonal frequency division multiple access (OFDMA), singlecarrier-frequency division multiple access (SC-FDMA) and other systems.The terms “system” and “network” are often used interchangeably. A CDMAsystem can implement a radio technology such as Universal TerrestrialRadio Access (UTRA), CDMA2000, etc. UTRA includes Wideband-CDMA (W-CDMA)and other variants of CDMA. CDMA2000 covers IS-2000, IS-95 and IS-856standards. A TDMA system can implement a radio technology such as GlobalSystem for Mobile Communications (GSM). An OFDMA system can implement aradio technology such as Evolved UTRA (E-UTRA), Ultra Mobile Broadband(UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20,Flash-OFDM, etc. UTRA and E-UTRA are part of Universal MobileTelecommunication System (UMTS). 3GPP Long Term Evolution (LTE) is anupcoming release of UMTS that uses E-UTRA, which employs OFDMA on thedownlink and SC-FDMA on the uplink.

Single carrier frequency division multiple access (SC-FDMA) utilizessingle carrier modulation and frequency domain equalization. SC-FDMA hassimilar performance and essentially the same overall complexity as thoseof an OFDMA system. A SC-FDMA signal has lower peak-to-average powerratio (PAPR) because of its inherent single carrier structure. SC-FDMAcan be used, for instance, in uplink communications where lower PAPRgreatly benefits access terminals in terms of transmit power efficiency.Accordingly, SC-FDMA can be implemented as an uplink multiple accessscheme in 3GPP Long Term Evolution (LTE) or Evolved UTRA.

Furthermore, various embodiments are described herein in connection withan access terminal. An access terminal can also be called a system,subscriber unit, subscriber station, mobile station, mobile, remotestation, remote terminal, mobile device, user terminal, terminal,wireless communication device, user agent, user device, or userequipment (UE). An access terminal can be a cellular telephone, acordless telephone, a Session Initiation Protocol (SIP) phone, awireless local loop (WLL) station, a personal digital assistant (PDA), ahandheld device having wireless connection capability, computing device,or other processing device connected to a wireless modem. Moreover,various embodiments are described herein in connection with a basestation. A base station can be utilized for communicating with accessterminal(s) and can also be referred to as an access point, Node B,Evolved Node B (eNodeB) or some other terminology.

Moreover, various aspects or features described herein can beimplemented as a method, apparatus, or article of manufacture usingstandard programming and/or engineering techniques. The term “article ofmanufacture” as used herein is intended to encompass a computer programaccessible from any computer-readable device, carrier, or media. Forexample, computer-readable media can include but are not limited tomagnetic storage devices (e.g., hard disk, floppy disk, magnetic strips,etc.), optical disks (e.g., compact disk (CD), digital versatile disk(DVD), etc.), smart cards, and flash memory devices (e.g., EPROM, card,stick, key drive, etc.). Additionally, various storage media describedherein can represent one or more devices and/or other machine-readablemedia for storing information. The term “machine-readable medium” caninclude, without being limited to, wireless channels and various othermedia capable of storing, containing, and/or carrying instruction(s)and/or data.

The claimed subject matter in accordance with an aspect providesarchitectures that collapse the BTS/BSC/PCF functionalities into asingle entity referred to herein as a home base station. The home basestation can utilize or employ an A10 connection established between thehome base station and a cellular network packet data internetworkingfunction thereby providing seamless handover from the home base stationto cellular networks. Moreover, in accordance with a further aspect, theclaimed matter can employ an A11 concentrator that allows forconsolidating A11 connections thus reducing the impact to the cellularsystem packet data switching aspects. In accordance with further aspectsof the claimed matter, the connectivity and functionalities institutedby the home base station can be exploited to enable and utilize otherinterfaces (e.g., A13, A16, A17, A18, A19, A21, etc.) included and/ordefined in a cellular system or network definition (e.g., 3GPP2) withoutmodification.

Referring now to FIG. 1, a wireless communication system 100 isillustrated in accordance with various embodiments presented herein.System 100 comprises a base station 102 that can include multipleantenna groups. For example, one antenna group can include antennas 104and 106, another group can comprise antennas 108 and 110, and anadditional group can include antennas 112 and 114. Two antennas areillustrated for each antenna group; however, more or fewer antennas canbe utilized for each group. Base station 102 can additionally include atransmitter chain and a receiver chain, each of which can in turncomprise a plurality of components associated with signal transmissionand reception (e.g., processors, modulators, multiplexers, demodulators,demultiplexers, antennas, etc.), as will be appreciated by one skilledin the art.

Base station 102 can communicate with one or more access terminals suchas access terminal 116 and access terminal 122; however, it is to beappreciated that base station 102 can communicate with substantially anynumber of access terminals similar to access terminals 116 and 122.Access terminals 116 and 122 can be, for example, cellular phones, smartphones, laptops, handheld communication devices, handheld computingdevices, satellite radios, global positioning systems, PDAs, and/or anyother suitable device for communicating over wireless communicationsystem 100. As depicted, access terminal 116 is in communication withantennas 112 and 114, where antennas 112 and 114 transmit information toaccess terminal 116 over a forward link 118 and receive information fromaccess terminal 116 over a reverse link 120. Moreover, access terminal122 is in communication with antennas 104 and 106, where antennas 104and 106 transmit information to access terminal 122 over a forward link124 and receive information from access terminal 122 over a reverse link126. In a frequency division duplex (FDD) system, forward link 118 canutilize a different frequency band than that used by reverse link 120,and forward link 124 can employ a different frequency band than thatemployed by reverse link 126, for example. Further, in a time divisionduplex (TDD) system, forward link 118 and reverse link 120 can utilize acommon frequency band and forward link 124 and reverse link 126 canutilize a common frequency band.

Each group of antennas and/or the area in which they are designated tocommunicate can be referred to as a sector of base station 102. Forexample, antenna groups can be designed to communicate to accessterminals in a sector of the areas covered by base station 102. Incommunication over forward links 118 and 124, the transmitting antennasof base station 102 can utilize beamforming to improve signal-to-noiseratio of forward links 118 and 124 for access terminals 116 and 122.Also, while base station 102 utilizes beamforming to transmit to accessterminals 116 and 122 scattered randomly through an associated coverage,access terminals in neighboring cells can be subject to lessinterference as compared to a base station transmitting through a singleantenna to all its access terminals.

System 100 can be a home base station environment, for instance. In suchsystem 100, base station 102 can be deployed in a home or smallbusiness/enterprise network environment, for example. Throughutilization of the claimed subject matter, extant functionalities andfeatures typically associated with 3^(rd) Generation (3G) cellularsystems and/or networks can be extended to base station 102 situated inthe home or small business/enterprise network environment, therebyproviding improved interoperability between the greater macro network(e.g., the 3G system and/or network as a whole) and the localized homeor small business/enterprise network environment within which basestation 102 is situated.

Where base station 102 is situated within the home or smallbusiness/enterprise network environment it can be positioned therein toserve two purposes. First, base station 102 can be positioned within thehome or small enterprise/business network environment in order toprovide 3G system and/or network coverage extension and second, basestation 102 can be included within a home or small enterprise/businessnetwork environment in order to provide peak 3G throughput rates forindividual users of system 100. Moreover, the approach adopted andemployed by the claimed subject matter can influence users of system100, wherever possible, to employ base station 102 in preference to thegreater macro network (e.g., the 3G system and/or network). Forinstance, when base station 102 is situated within, or associated with,a home or small business/enterprise network environment the home owneror small business/enterprise proprietor can, for a small monthly fee(paid to the provider of base station 102), acquire unlimited usageminutes for utilization of base station 102 through which the greatermacro network can be accessed without additional charge.

Placing base station 102 on existing interchange media that transportsnetwork traffic between distributed sites and more centralized points ofpresence (e.g., a backhaul) obviates or mitigates the need to utilize T1connections to the home or small business/enterprise networkenvironment, and more particularly forestalls the need to deploy T1connections to base station 102. Rather, the claimed subject matter canemploy existing DSL (Digital Subscriber Loop/Line and/or itsvariants)/Cable modem connections in conjunction with base station 102to transport packets over the backhaul. Such deployment can providesavings for operators (e.g., home users and small business or enterpriseproprietors). Nevertheless, existing technologies on their own typicallyare inadequate to facilitate or effectuate the interconnectivity between3G wireless networks and conventional residential and/or business localarea networks. For instance, extant access terminals 116 and 122employing frequency division duplex (FDD) or time division duplex (TDD)technologies are typically and currently unable to take advantage ofwireless networking technologies that employ IEEE 802.11 standards(e.g., Wi-Fi); existing cellular mobile technologies generally cannottake advantage of Wi-Fi systems. Moreover, devices that utilize or arebased upon the IEEE 802.11 paradigm, such as, for example, DSL or cablemodems, generally are incapable of sustaining speeds in excess of 300KB/second and further the over-the-air (wireless) capacity of thesesystems is generally limited to 3.1 MB/second. Thus, backhaul speeds inthese systems have been perceived as being slower than over-the-airspeeds with the consequential result that to date there has not been anecessity for access terminals (e.g., access terminals 116 and 122) toutilize technologies that have employed the IEEE 802 standards.

FIG. 2 depicts an illustrative network architecture 200 in accordancewith an aspect of the claimed matter. Network architecture 200 asillustrated can include access terminal 202 that can be in continuousand/or operative or sporadic and/or intermittent communication with homebase station 204 and/or with the greater cellular system or network(e.g., 3^(rd) Generation (3G) cellular systems) as indicated by macrobase transceiver station 218. Access terminal 202, as exemplified abovein context with access terminals 116 and 122, can be implementedentirely in hardware and/or a combination of hardware and/or software inexecution. Further, access terminal 202 can be incorporated withinand/or be associated with other compatible components. Additionally,access terminal 202 can be, but is not limited to, any type of machinethat includes a processor and/or is capable of effective communicationwith network topology 208. Illustrative machines that can compriseaccess terminal 202 can include desktop computers, cellular phones,smart phones, laptop computers, notebook computers, Tablet PCs, consumerand/or industrial devices and/or appliances, hand-held devices, personaldigital assistants, multimedia Internet mobile phones, multimediaplayers, and the like.

Network architecture 200 can further include home base station 204 thatthrough utilization of the facilities set forth herein extendsfunctionalities currently extant within a cellular network (e.g., 3^(rd)Generation cellular system) into the home network environment or smallbusiness enterprise network environment. Positioning home base station204 within the home network or small business enterprise network canprovide improved interoperability between the cellular network and thelocal area IEEE 802 based networking (wired and/or wireless) environmenttypical in such home and/or business networks. Moreover, situating homebase station 204 within the home network or small business enterprisenetwork provides for cellular system and/or network coverage extensionto the home or small enterprise network and affords peak cellularthroughput rates for individual users of the enterprise/business networkenvironment. Furthermore, utilization of home base station 204 by accessterminal 202 can influence users of network architecture 200 to,wherever possible, to utilize home base station 204 in preference to thecellular network whenever access terminal 202 is within the ambit ofhome base station 204.

Additionally, positioning or associating home base station 204 withexisting communication modalities (e.g., IEEE 802 based technologies)that transport network traffic between distributed sites and/or morecentralized points of presence can dispense with the need to establishextraneous T1 connectivity beyond that currently available in thehome/small business/enterprise network environment. Rather, home basestation 204 can employ existing DSL/cable modem connectivity totransport packets over existing communication instrumentalities withinand between the home/small business/enterprise network, distributedsites and/or more centralized points of presence. Deployment orassociation of the home base station 204 in conjunction with extant andavailable IEEE 802.11 based communication instrumentalities cantherefore provide pecuniary savings to the home user and/or smallenterprise entrepreneur.

In addition, network architecture 200 can further includefirewall/network address translation (NAT) component 206 that inspectsnetwork traffic traversing through it and denies or permits passagebased on a set of prescribed rules. Firewall/network address translation(NAT) component 206 in effect regulates the flow of traffic betweencomputer networks of different trust levels such as between networksegments affiliated with zones of no trust (e.g., the Internet) andnetwork segments associated with zones of higher trust (e.g., enterpriseintranets). Additionally and/or alternatively, firewall/network addresstranslation (NAT) component 206 can also facilitate network addresstranslation (e.g., network masquerading, native address translation, orInternet Protocol (IP) masquerading) whereby firewall/network addresstranslation (NAT) component 206 rewrites the source and/or destinationIP addresses and/or the Transmission Control Protocol/User DatagramProtocol (TCP/UDP) port numbers of IP packets transiting throughfirewall/network address translation (NAT) component 206. Typically,firewall/network address translation (NAT) component 206 can beimplemented or effectuated entirely in hardware and/or as a combinationof hardware and/or software in execution. Further, firewall/networkaddress translation (NAT) component 206 can be, but is not limited to,any type of mechanism, machine, device, facility, and/or instrument thatincludes a processor and/or is capable of effective and/or operativecommunications with network topology 208. Mechanisms, machines, devices,facilities, and/or instruments that can comprise firewall/networkaddress translation (NAT) component 206 can include Tablet PC's, serverclass computing machines and/or databases, laptop computers, notebookcomputers, desktop computers, cell phones, smart phones, consumerappliances and/or instrumentation, industrial devices and/or components,hand-held devices, personal digital assistants, multimedia Internetenabled phones, multimedia players, and the like.

Network topology 208 can include any viable communication and/orbroadcast technology, for example, wired and/or wireless modalitiesand/or technologies can be utilized to effectuate the claimed subjectmatter. Moreover, network topology 208 can include utilization ofPersonal Area Networks (PANs), Local Area Networks (LANs), Campus AreaNetworks (CANs), Metropolitan Area Networks (MANs), extranets,intranets, the Internet, Wide Area Networks (WANs)—both centralizedand/or distributed—and/or any combination, permutation, and/oraggregation thereof. Network topology 208 can provide the facilities andfunctionalities necessary to interconnect and/or provide datainterchange between the various and disparate components included anddepicted in connection with network architecture 200. Moreover, as willbe readily appreciated by those reasonably skill in the art, networktopology 208, rather than being a single monolithic entity, can becomposed of multiple segments or fragments (e.g., intranets, extranets,and the like) access to some, but not necessarily all, sections orsubsections being limited to identified and/or identifiable individualsand/or utilization.

Packet data interworking function (PDIF) component 210 can also beincluded within network architecture 200 and generally can beresponsible for functions such as providing access to packet dataservices, implementing end-to-end tunnels, allocating IP addresses,encapsulating and de-encapsulating traffic, facilitating userauthentication, and the like. Packet data interworking function (PDIF)component 210, which is referred to as the packet data gateway (PDG)under the 3GPP specification, typically is positioned at the boundarybetween the core network of a cellular communications system and thepublic Internet. Generally, the packet data interworking function (PDIF)component 210 can be thought of as being the protector of the cellularcommunications system from intrusions from the general IP domain atlarge. Accordingly, any entity (e.g., access terminal 202) that needs tocommunicate or gain access with the core network of a cellularcommunications system needs to establish communications with and/orthrough packet data interworking function (PDIF) component 210, and moreparticularly, needs to take measures to initiate IPSec (IP security)tunnels in correspondence with packet data interworking function (PDIF)component 210. Packet data interworking function (PDIF) component 210can be effectuated entirely in hardware and/or a combination of hardwareand/or software in execution. Further, packet data interworking function(PDIF) component 210 can be incorporated within and/or be associatedwith other compatible components. Additionally, packet data interworkingfunction (PDIF) component 210 can be, but is not necessarily limited to,any type of machine that includes a processor and/or is capable ofeffective communication with network topology 208. Illustrative machinesthat can comprise packet data interworking function (PDIF) component 210can include desktop computers, cellular phones, smart phones, laptopcomputers, notebook computers, Tablet PCs, consumer and/or industrialdevices and/or appliances, hand-held devices, personal digitalassistants, multimedia Internet mobile phones, multimedia players, andthe like.

Packet data serving node (PDSN) component 212 as depicted within networkarchitecture 200 can typically be responsible for the establishment,maintenance, and termination of point-to-point protocol (PPP) sessionsbetween itself and one or more access terminal 202. Moreover, packetdata serving node (PDSN) component 212 can also assign dynamic InternetProtocol (IP) addresses in addition to supporting mobile InternetProtocol (IP) functionality. Further, packet data serving node (PDSN)component 212, similar to those components disclosed thus far, can be,implemented and/or effectuated entirely in hardware and/or as acombination of hardware and/or software in execution. Furthermore,packet data serving node (PDSN) component 212 can be, but is not limitedto, any type of engine, machine, instrument of conversion, or mode ofproduction that includes a processor and/or is capable of effectiveand/or operative communications with network topology 208. Illustrativeinstruments of conversion, modes of production, engines, mechanisms,devices, and/or machinery that can comprise and/or embody packet dataserving node (PDSN) component 212 can include desktop computers, serverclass computing devices and/or databases, cell phones, smart phones,laptop computers, notebook computers, Tablet PCs, consumer and/orindustrial devices and/or appliances and/or processes, hand-helddevices, personal digital assistants, multimedia Internet enabled mobilephones, multimedia players, and the like.

Additionally, network architecture 200 can further include access,authentication, and accounting (AAA) component 214 that can beassociated with packet data serving node (PDSN) component 212. Access,authentication, and accounting (AAA) component 214 provides access,authorization, and audit facilities that can include utilization ofbiometric scans, digital signatures, encryption, and the like, in orderto determine the identity and privileges of those individuals attemptingto gain access to secure segments of network topology 208 (e.g.,corporate internet, a 3^(rd) Generation cellular network, and the like)and to track activities of those individuals who are granted access tosecure segments of network topology 208. Once again, like the previouscomponents disclosed herein, access, authentication, and accounting(AAA) component 214 can be implemented and/or effectuated entirely inhardware and/or as a combination of hardware and/or software inexecution. Moreover, access, authentication, and accounting (AAA)component 214 can be, but is not limited to, any type of mechanism,machine, device, facility, and/or instrument that includes a processorand/or is capable of effective and/or operative communications withpacket data serving node (PDSN) component 212 and/or network topology208. Mechanisms, machines, devices, facilities, and/or instruments thatcan comprise access, authentication, and accounting (AAA) component 214can include Tablet PC's, server class computing machines and/ordatabases, laptop computers, notebook computers, desktop computers, cellphones, smart phones, consumer appliances and/or instrumentation,industrial devices and/or components, hand-held devices, personaldigital assistants, multimedia Internet enabled phones, multimediaplayers, and the like.

As illustrated, network architecture 200 can also include proxy callsession control function (P-CSCF) component 216, an IP multimediasubsystem (IMS) that typically identified as the first contact pointthat access terminal 202 makes within an IP multimedia core networksystem. Typical functions provided by proxy call session controlfunction (P-CSCF) component 216 can include forwarding sessioninitiation protocol (SIP) messages received from access terminal 202 andforwarding these messages, depending on the type of message and/orprocedure being carried out, to other components situated and includedin the core network. Once again like previously disclosed componentsassociated with network architecture 200, proxy call session controlfunction (P-CSCF) component 216 can be implemented entirely in hardwareand/or as a combination of hardware and/or software in execution.Additionally, proxy call session control function (P-CSCF) component 216can be, but is not limited to, any type of mechanism, machine, device,facility, and/or instrument that includes a processor and/or is capableof effective and/or operative communications with network topology 208.Mechanisms, machines, devices, facilities, and/or instruments that cancomprise proxy call session control function (P-CSCF) component 216 caninclude Tablet PC's, server class computing machines and/or databases,laptop computers, notebook computers, desktop computers, cell phones,smart phones, consumer appliances and/or instrumentation, industrialdevices and/or components, hand-held devices, personal digitalassistants, multimedia Internet enabled phones, multimedia players, andthe like.

In addition, network architecture 200 can further include macro basetransceiver station component 218 that receives and/or transmits radiosignals and/or has capabilities for encrypting and/or decryptingcommunications with base station controllers. Macro base stationtransceiver station component 218 typically terminates the radio orwireless interface between access terminals 202 and other wired orground based components of network architecture 200. Macro base stationtransceiver station component 218 like other components of networkarchitecture 200 discussed supra can be implemented or effectuatedentirely in hardware and/or as a combination of hardware and/or softwarein execution and can be any type of engine, machine, instrument ofconversion, or mode of production that includes a processor and/or iscapable of effective and/or operative communications with networktopology 208.

FIG. 3 depicts a network architecture 300 that facilitates andeffectuates an aspect of the claimed subject matter. Networkarchitecture 300 can include access terminal 202, home base station 204,firewall/network address translation (NAT) component 206, packet datainterworking function (PDIF) component 210, and packet data serving node(PDSN) component 212. Because much of the configuration and operation ofthe aforementioned components is substantially similar to thosedescribed with respect to components discussed in relation to FIG. 2, adetailed description of such features has been omitted to avoid needlessprolixity and for the sake of brevity and conciseness. Nevertheless,network architecture 300 can include tunnel aspect 302, for example, anIPSec tunnel, construction or establishment of which can be instigatedby access terminal 202. Tunnel aspect 302 in accordance with an aspectof the claimed subject matter, and as illustrated in FIG. 3, can extendfrom access terminal 202 to packet data interworking function component210, and can include home base station 204 and firewall/network addresstranslation (NAT) component 206. Typically under the conceptionexemplified by network architecture 300, access terminal 202 needs to becognizant or aware that it is in communication with a home base station(e.g., home base station 204) rather than a macro base transceiverstation (e.g., macro base transceiver station 218) and based at least inpart on this cognition access terminal 202 can initiate IPSec tunnelestablishment procedures to institute fabrication or establishment oftunnel aspect 302. Upon establishment of tunnel aspect 302, tunnelaspect 302 can effectively and/or seamlessly link access terminal 202with packet data interworking function component 210 with theconsequential result that data interchange or communications betweenaccess terminal 202 and components and devices situated beyond thepublic Internet-core network/intranet periphery 304 (e.g., within the3^(rd) Generation core network) can take place as if the publicInternet-core network/intranet boundary 304 were completely transparentrather than darkly opaque (e.g., a perceptible barrier or hurdle toseamless intercommunication, as is extant currently).

FIG. 4 illustrates a further network architecture 400 that effectuatesand facilitates an aspect of the claimed subject matter. Like networkarchitecture 300 exemplified in FIG. 3, network architecture 400 caninclude access terminal 202, home base station 204, firewall/networkaddress translation (NAT) component 206, packet data interworkingfunction (PDIF) component 210, and packet data serving node (PDSN)component 212. As will be readily appreciated by those cognizant in thisfield of endeavor, access terminal 202, home base station 204,firewall/network address translation (NAT) component 206, packet datainterworking function (PDIF) component 210, packet data serving node(PDSN) component 212 can typically be connected via a wired or wirelesscommunication modality, such as network topology 208. Moreover, as willbe further appreciated by those of ordinary skill in the art, becausemuch of the configuration and operation of the aforementioned componentsare substantially similar to those elucidated with respect to componentsdiscussed in the context of FIG. 2 and FIG. 3, detailed description ofsuch features have been omitted to avoid needless repetition and for thesake of conciseness. Nonetheless, network architecture 400 can alsoinclude tunnel aspect 402, for instance, an IPSec tunnel that can beestablished between and by home base station 204 and packet datainterworking function (PDIF) component 210. In this instance, accessterminal 202 is typically unaware that it has moved within the purviewof a home base station (e.g., home base station 204) or that it iscommunicating with a home base station (e.g., home base station 204).A11 that access terminal 202 is generally concerned about under thisaspect of the claimed subject matter is that tunnel aspect 402 has beenestablished by the home base station (e.g., home base station 204) andthat it (e.g., access terminal 202) is able to utilize tunnel aspect 402in order to seamlessly communicate with devices and/or componentsdispersed beyond or behind the public Internet-core network/intranetboundary 404.

Accordingly, home base station 204 can generally be tasked withestablishing tunneling aspect 402 (e.g., utilizing IPSec tunnelestablishment policies) between home base station 204 to packet datainterworking function component 210. As illustrated tunneling aspect 402perforates the extant barrier (e.g., the public Internet-core networkintranet demarcation 404) between the public Internet at large and theprotected core cellular network (e.g., 3^(rd) generation cellular systemor network) thereby providing seamless interconnectivity between accessterminal 202 and packet serving node component 212; an interconnectivitytypically not permissible without the facilities and functionalityprovided by the claimed subject matter.

Once tunneling aspect 402 has been established, linking home basestation 204 with packet data interworking function component 210 throughfirewall/network address translation (NAT) component 206, the radio linkbetween access terminal 202 and the protected cellular core network willgenerally be exactly the same as it was had access terminal 202 beencommunicating with the cellular core network through macro basetransceiver station 218.

Home base station 204 (e.g., called Home Node B under the 3GPPspecification), once tunneling aspect 402 has been established betweenhome base station 204 and packet data interworking function 210, canship packets into the cellular network (e.g., to packet data servingnode 212 and/or proxy call session control function component 216positioned beyond the public Internet-core network/intranet barrier 404)through tunneling aspect 402. Home base station 204 in order toeffectuate construction of tunneling aspect 402 generally needs tosupply a set of credentials uniquely associated with the home basestation and further that provides transparency with respect to themultiple users that can utilize home base station 204 in order tointeract with the cellular network.

To facilitate the foregoing a packet data serving aspect responsible forestablishing, maintaining, and terminating point-to-point protocol (PPP)sessions and assigning dynamic Internet Protocol (IP) addresses inaddition to supporting mobile Internet Protocol (IP) functionality cantypically be included or associated with home base station 204.Inclusion or association of a packet data serving functionality withhome base station 204, from the perspective of access terminal 202,makes home base station 204 appear functionally identical to macro basetransceiver station 218. With regard to point-to-point protocol (PPP) itshould be noted that it can have two parts: (1) a control part LCP/IPCPthat can be used to authenticate and assign IP addresses to the accessterminal in 3GPP2. In 3GPP this function can be done by a controlprotocol defined as NAS (Non-Access Stratum); and (2) HDLC framing whichis performed to demark IP packet boundaries. Generally this is requiredfor 3GPP2. 3GPP uses packet based framing at the RLC layer to demark IPpackets and generally does not need this function.

FIG. 5 exemplifies a further network architecture 500 that facilitatesand effectuates an aspect of the subject matter as claimed. Networkarchitecture 500 can include access terminal 202, home base station 204,firewall/network address translation (NAT) component 206, packet datainterworking function (PDIF) component 210, and packet data serving nodecomponent 212. As will be understood by those moderately cognizant inthis field of endeavor, packet data interworking function (PDIF)component 210 can be positioned at the contiguity that exists betweenthe public Internet and the core cellular network/intranet (e.g., publicInternet-core network/intranet boundary 504) and that packet dataserving node component 212 is typically situated within the protectedcore cellular network rather than being placed in the public Internet atlarge. Moreover, as will be further appreciated by those ordinarilyskilled in the art, intercommunication between the various devices andcomponents that can comprise both the public Internet and/or the corecellular network/intranet can be carried out by wired and/or wirelesscommunication instrumentalities. Additionally, as will also beunderstood by those of ordinary skill in the art, tunnels linking packetdata interworking function (PDIF) component 210 with home base station204 can be established on a per user basis, or can be performed acrossall users, or differentiated based at least in part on disparate traffictypes (e.g., Quality of Service (QoS)).

As stated in connection with FIGS. 2-4 above, since much of theconfiguration and functionalities of the aforementioned components aresubstantially similar to those previously described in connection withFIGS. 2-4, a detailed description of such features and facilities hasbeen omitted for the sake of brevity. Nevertheless, network architecture500 can include tunnel 502, for instance, an IPSec tunnel, than can beestablished to link home base station 204 with packet data interworkingfunction component 210. In this instance, home base station 204 can hostbase transceiver, base station controller, and/or packet controlfunction (e.g., BTS/BSC/PCF) instrumentalities, but unlike the approachposited in relation to FIG. 4, the packet data serving functionality isabsent from home base station 204; rather actual packet data servingmediation can be facilitated by packet data serving node 212 situatedwithin the core cellular network/intranet.

Thus, in contrast to the implementation set forth with respect to FIG.4, where the home base station 204 communicates by way of InternetProtocol (IP) packets within the tunneling aspect 402 established fromthe home base station 204 to the packet data interworking functioncomponent 210, under the conception provided by FIG. 5 the interchangeemploys point-to-point protocol (PPP) inside tunnel 502 so that thepoint-to-point protocol (PPP) termination point is at packet dataserving node component 212. Consequentially, given that packet dataserving node component 212 is generally situated behind publicInternet-core network/intranet circumscription 504 (e.g., packet dataserving node component 212 is typically positioned on the macro cellularnetwork rather than in the milieu that can comprise the public Internet)the point-to-point protocol (PPP) is being extended all the way into themacro cellular core network rather than being intermediated by thepacket data interworking function component 210.

It should be noted, and as will be apparent to those moderatelycognizant in this field of endeavor, that once tunnel 502 has beenfurnished by home base station 204, connecting home base station 204with packet data interworking function component 210, various aspects oftunnel 502 can be utilized to enable the plethora of interfacesspecified in the macro cellular system specification. For instance, A13interfaces that carry signaling information between the SC/MM functionin a source access node (AN) and the SC/MM function in the target accessnode (AN) for dormant state session transfer. As further illustration,A16 interfaces can be utilized through tunnel 502 established betweenhome base station 204 and packet data interworking function component210. A16 interfaces typically carry signaling information between asource access node (AN) and a target access node (AN) for high ratepacket data (HRPD) Inter-AN Connected State Session Transfer (e.g., hardhandoff).

Additionally, tunnel 502 can also support A17, A18, A19, and/or A21interfaces. A11 interfaces generally carry signaling information betweena source access node (AN) and a target access node (AN) to manageresources in support of inter-AN cross-connectivity (soft/softerhandoff). The A17 interface typically establishes dedicated endpointsfor A18 and A19 interfaces. Additionally, the A17 interface tunnels airinterface forward control channel signaling messages from the sourceaccess node (AN) to a target access node (AN) that has sectors in theaccess terminal's Active Set to be transmitted to the access terminalA18 interfaces generally transport user traffic (e.g., air interfacetraffic channel data) for an access terminal between the source accessnode (AN) and a target RT during cross-connectivity. The A18 interfaceendpoints are typically set up using an A17 interface. A19 interfacesgenerally carry remote transmitter (RT)-specific bearer-relatedcross-connectivity control messages for an access terminal between theaccess node (AN) and a target remote transmitter (RT). The A19 interfaceendpoints are normally set up using the A17 interface. A21 interfacescan carry signaling information between a high rate packet data (HRPD)access node (AN) and the indoor wireless system (IWS). A21 interfacescan provide for handoff to 1×.

FIG. 6 provides depiction 600 of an access terminal 202 in accordancewith an aspect of the claimed subject matter. As has been discussedsupra with regard to FIGS. 1 and 2, access terminal 202 can have basicfunctionality similar to that elucidated in connection with accessterminals 116 and 122, above, and as such these basic functionalitieshave been omitted for purposes of conciseness.

Nevertheless, in addition to the basic functionalities, access terminal202 can also include a tunneling component 602 that can be utilized toestablish a tunnel (e.g., IPSec tunnel) extending from access terminal202 to packet data interworking function component 210. Typically, thetunnel established by tunneling component 602 can include utilization ofhome base station 204 and firewall/network address translation (NAT)component 206. Under this aspect of the claimed subject matter,tunneling component 602 needs to be aware, be made aware, or becomeaware, that it is communicating with a home base station (e.g., homebase station 204) rather than a macro base transceiver station (e.g.,macro base transceiver station 218). Thus, where tunneling component 602is aware, or becomes aware, that it is communicating with a home basestation (e.g., home base station 204) rather than a macro basetransceiver station (e.g., macro base transceiver station 218),tunneling component 602 can commence IPSec tunnel establishmentprocedures to establish a tunnel between access terminal 202 and packetdata interworking function component 210.

Once tunneling component 602 has facilitated or effectuatedestablishment of a tunnel between access terminal 202 and packet datainterworking function component 210, intercommunication between accessterminal 202 and components and devices situated on the core cellularnetwork can take place in a seamless manner; as if the barrier betweenthe public Internet and the core cellular were non-existent.

Turning now to FIG. 7 that provides illustration 700 of home basestation 204 in accordance with an aspect of the claimed subject matter.As has been explicated in connection with FIGS. 1 and 2, home basestation 204 can have basic functionality similar to those elucidated inconnection with access terminals 116 and 122, above, and as such thesebasic functionalities have been omitted for purposes of conciseness.Nevertheless, as illustrated home base station 204 can have additionalcapabilities to those already discussed thus far. Home base station 204can include base transceiver station instrumentalities where a basetransceiver station (BTS) component 704 can facilitate wirelesscommunications between multiple access terminals (e.g., access terminal202) and the core cellular network through utilization of a tunnelextending between home base station 204 and packet data interworkingfunction (PDIF) component 210. Base transceiver station (BTS) component704 in addition can also include aspects related to encrypting and/ordecrypting communications between the various components included withinhome base station 204 as well as devices and aspects that can comprisethe cellular network or system in general.

Further, home base station 204 can also include functionalitiesassociated with base station controllers. Thus, home base station 204can include base station controller (BSC) component 706 that can providethe intelligence and coordination behind the functionality of basetransceiver station (BTS) component 704. Base station controller (BSC)component 706 can, if need be, control a multiplicity of basetransceiver station (BTS) components 704 included or associated withhome base station 204. Generally, base station controller (BSC)component 706 can handle allocation of radio channels, receivesmeasurements from access terminals (e.g., access terminal 202), andcontrols handover from and between base transceiver station (BTS)component(s) 704. Additionally and/or alternatively, base stationcontroller (BSC) component 706 can function as a concentrator wheredisparate low capacity connections from and/or to multiple basetransceiver station (BTS) component(s) 704 can be reduced to a smallernumber of connections thus mitigating congestion in the tunnelestablished between home base station 204 and packet data interworkingfunction (PDIF) component 210.

Home base station 204 can further include packet control function (PCF)component 708 that can control transmission of packets between home basestation 204 itself and a packet data serving node component situated onthe macro cellular network (e.g., packet data serving node 212).

Additionally and/or alternatively, home base station 204 can includefunctionalities and instrumentalities generally allocated to packet dataserving node 212. In this instance, home base station 204 can includepacket data serving node component 710 that can be responsible from theestablishment, maintenance, and termination of point-to-point (PPP)sessions between home base station 204 and one or more access terminals(e.g., access terminal 202) in communication with home base station 204.Packet data serving node component 710, under this conception or aspect,can assign dynamic Internet Protocol (IP) addresses as well assupporting mobile Internet Protocol (IP) functionality. Inclusion ofpacket data serving node component 710 with home base station 204, fromthe perspective of communicating access terminals (e.g., access terminal202), makes home base station 204 appear to be functionally similar oridentical to a typical macro base transceiver station (e.g., macro basetransceiver station 218).

As illustrated the functionalities and instrumentalities exposited abovein connection with base transceiver station (BTS) component 704, basestation controller (BSC) component 706, packet control function (PCF)component 708, and/or packet data serving node component 710, can beensconced or included within tunneling component 702 which can in turnbe associated, included, or integrated with home base station 204.

FIG. 8 provides illustration 800 of home base station 204 in accordancewith a further aspect of the claimed subject matter. As depicted homebase station 204 can include base transceiver (BTS) station aspect 802that can facilitate and effectuate wireless communication between accessterminals (e.g., access terminal 202) and the cellular system/networkthrough a tunnel established and connecting home base station 204 withpacket data interworking function (PDIF) component 210. Similar to basetransceiver station (BTS) component 704, base transceiver station (BTS)aspect 802 can also perform encryption and/or decryption ofcommunications between the many disparate devices and components thatcan comprise the cellular system/network, as well as, between thevarious components and/or aspects included or associated with home basestation 204.

Additionally, home base station 204 can also include instrumentalitiesgenerally associated with base station controllers. Accordingly, homebase station 204 can include base station controller (BSC) aspect 804that can provide the basic intelligence and/or configuration necessaryfor base transceiver station (BTS) aspect 802 to operate in concert withthe plurality of base transceiver station (BTS) aspects (e.g., multiplebase transceiver station (BTS) aspects 802) that can be included orassociated with home base station 204 (e.g., multiple base transceiverstation (BTS) aspects 802 can be utilized where there are a multiplicityof access terminals communicating with, and in the vicinity or purviewof, home base station 204). Base station controller (BSC) aspect 804 canallocate radio channels, receive measurements from access terminalswithin the purview of home base station 204, and control handover fromthe various base transceiver station (BTS) aspects 802 under itssupervision. Moreover, base station controller (BSC) aspect 804 can alsofunction as a consolidator where multiple low capacity connections fromand/or to the various base transceiver station (BTS) aspects 802 can beconsolidated in order to reduce congestion in the tunnel establishedbetween home base station 204 and packet data interworking function(PDIF) component 210.

Additionally, home base station 204 can also include packet controlfunction (PCF) aspect 806 that can control transmission of packetsbetween home base station 204 and a packet data serving node componentpositioned on the greater cellular system/network (e.g., packet dataserving node 212).

Nevertheless, in contrast to the conception disclosed with regard toFIG. 7 the aspect disclosed in FIG. 8, and in particular home basestation 204 does not include the functionalities and instrumentalitiesof the packet data serving node component 710. Rather, home base station204 relies upon the facilities of packet data serving node 212 disposedwithin the macro cellular network to provide the point-to-point protocol(PPP) termination point. Thus, the interchange between home base station204 and the cellular core network employs point-to-point protocol (PPP)inside a tunnel established between home base station 204 and the packetdata interworking function (PDIF) component 210 with the consequentialeffect that communication is now in actuality taking place between homebase station 204 and the packet data serving node (PDSN) component 212rather than being intermediated by packet data interworking function(PDIF) component 210.

As depicted the instrumentalities elucidated above in connection withbase transceiver station (BTS) aspect 802, base station controller (BSC)aspect 804, and packet control function (PCF) aspect 806 can beassociated with, or included within tunneling component 808, which canbe included with home base station 204.

To put FIG. 8 and the functionality of home base station 204 under thisaspect in further perspective, the following overview is presented. Whenan access terminal (e.g., access terminal 202) initiates associationwith home base station 204, the home base station 204 establishes atunnel (e.g., IPSec tunnel) with a packet data interworking function210. Once the tunnel has been established, home base station 204 canutilize high rate packet data (HRPD) point-to-point protocol (PPP)challenge-handshake authentication protocol (CHAP) to authenticateaccess terminal 202. It should be noted without limitation that inaccordance with this aspect of the claimed subject matter the tunnelneeds to be established before high rate packet data (HRPD)authentication takes place as the constructed tunnel is typically neededto transport remote authentication dial in user service (RADIUS)messages. Authentication can be via utilization of access,authentication, and accounting (AAA) component 214 situated in thecellular core network. Home base station 204 in accordance with anaspect of the claimed subject matter can be configured with a list ofpermissible or allowable access terminals (e.g., a list of persistednetwork address identifiers (NAIs)). Additionally and/or alternatively,a list of persisted network address identifiers (NAIs) can be employedto distinguish different service types (e.g., all users using a certainservice can be provided the same network address identifier (NAT)).Other access terminal identifiers can be employed to recognize andauthorize users. Where it is ascertained that an access terminal'snetwork address identifier (NAI) is not present on the list of networkaddress identifiers (NAIs) home base station 204 can deny access to suchan access terminal. Moreover, where the access terminal's networkaddress identifier (NAI) is found in the list of network addressidentifiers (NAIs), but the challenge-handshake authentication protocol(CHAP) aspect fails, home base station 204 can also deny access to suchan access terminal and home base station 204, without remedial measures,will not serve such an access terminal.

Generally, in accordance with an aspect of the claimed subject matterthere can be two levels of authentication, first at the home basestation 204 level and secondly at the access, authentication, andaccounting (AAA) component 214 level. Security at the home base station204 level can be handled by a user (e.g., an administrative user)directly adding network address identifiers (NAIs) of those accessterminals that will typically utilize home base station 204 to gainaccess to the cellular core network. Such user interaction can generallytake place without loss of integrity to the cellular core network.Security from the perspective of the access, authentication, andaccounting (AAA) component 214 level, existing cellular (e.g., 3G)authentication credentials can be employed with the home base station204 accessing access, authentication, and accounting (AAA) component 214for the keys necessary for authentication.

Once the access terminal has been authenticated and authorized, homebase station 204 can use the access terminal's international mobilesubscriber identity (IMSI) to identify and select an appropriate packetdata serving node (e.g., packet data serving node 212) with which toestablish communications. Typically, the “IMSI modulo N” algorithm canbe utilized and performed, where N represents the number of potentialpacket data serving nodes (PDSNs) reachable by home base station 204.Generally, the number “N” can also be remotely configured and updated(e.g., in cases where the number of potential packet data serving nodes(PDSNs) changes) by the carrier. It should be noted that since thepacket control function/radio network controller (PCF/RNC) in wirelessaccess networks also employs the same algorithm to select potentialpacket data serving nodes (PDSNs) it is likely that after an accessterminal transitions to communicate via home base station 204, ratherthan macro base transceiver station 218, that the same packet dataserving node will be selected by home base station 204.

After home base station 204 has identified and/or selected a packet dataserving node (e.g., packet data serving node (PDSN) component 212) homebase station 204 can employ A11 signaling to establish an A10 connectionwith packet data serving node (PDSN) component 212. Accordingly, toeffectuate this general routing encapsulation (GRE) tunneling needs tobe established between packet data serving node (PDSN) component 212 andhome base station 204. Where, during the transition by access terminal202 from macro base transceiver station 218 to home base station 204,the packet data serving node (PDSN) component 212 identified andselected remains the same, there typically is no necessity to performmobile Internet Protocol (MIP) registration. By obviating the necessityto perform mobile Internet Protocol (MIP) registration the interruptionto voice over Internet Protocol (VoIP) service during handoff betweenwireless access network (WAN) coverage and home coverage (e.g.,utilizing communications via home base station 204) can be mitigated toa large extent.

Additional functionalities that can be performed by home base station204 can further include performing accounting and then forwarding anyaccounting records to the packet data serving node (PSDN) via an A11airlink record, supporting network-initiated quality of service (QoS)using existing PDSN-PCF/RNC signaling between packet data serving node(PDSN) component 212 and home base station 204, and using differentsecurity associations (SAs) to support different traffic classes betweenpacket data interworking function (PDIF) component 210 and home basestation 204. In regard to the latter aspect (e.g., supporting differenttraffic classes between packet data interworking function (PDIF)component 210 and home base station 204 base at least in part ondifferent security associations (SAs)) multiple A10 connections (e.g.,either intra or inter access terminal) with similar quality of service(QoS) characteristics can be mapped to the same IPSec securityassociation (SA) in order to restrict the number of child securityassociations (SAs) created.

FIG. 9 provides illustration 900 of a further aspect of home basestation 204 in accordance with the claimed subject matter. As depictedhome base station 204 can be associated with or can include store 902that can include any suitable data necessary for home base station 204to facilitate it aims. For instance, store 902 can include networkaddress identifiers (NAIs) 904 associated with one or more accessterminals (e.g., access terminal 202) currently in, or that potentiallycan be in, communication with home base station 204. Additionally, store902 can also include information regarding user data, data related to aportion of a transaction, credit information, historic data related to aprevious transaction, a portion of data associated with purchasing agood and/or service, a portion of data associated with selling a goodand/or service, geographical location, online activity, previous onlinetransactions, activity across disparate networks, activity across anetwork, credit card verification, membership, duration of membership,communication associated with a network, buddy lists, contacts,questions answered, questions posted, response time for questions, blogdata, blog entries, endorsements, items bought, items sold, products onthe network, information gleaned from a disparate website, informationobtained from the disparate network, ratings from a website, a creditscore, geographical location, a donation to charity, or any otherinformation related to software, applications, web conferencing, and/orany suitable data related to transactions, etc.

It is to be appreciated that store 902 can be, for example, volatilememory or non-volatile memory, or can include both volatile andnon-volatile memory. By way of illustration, and not limitation,non-volatile memory can include read-only memory (ROM), programmableread only memory (PROM), electrically programmable read only memory(EPROM), electrically erasable programmable read only memory (EEPROM),or flash memory. Volatile memory can include random access memory (RAM),which can act as external cache memory. By way of illustration ratherthan limitation, RAM is available in many forms such as static RAM(SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rateSDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink® DRAM (SLDRAM),Rambus® direct RAM (RDRAM), direct Rambus® dynamic RAM (DRDRAM) andRambus® dynamic RAM (RDRAM). Store 902 of the subject systems andmethods is intended to comprise, without being limited to, these and anyother suitable types of memory. In addition, it is to be appreciatedthat store 902 can be a server, a database, a hard drive, and the like.

FIG. 10 illustrates 1000 a further aspect of the claimed subject matterwherein an A11 concentrator component 1002 can be interposed betweenpacket data interworking function (PDIF) component 210 and packet dataserving node (PDSN) component 212. As illustrated, A11 concentratorcomponent 1002 can be employed to minimize the number of A11 connectionsthat need to be made to packet data serving node (PDSN) component 212.In accordance with this aspect of the claimed subject matter, A11concentrator component 1002 can typically maintain a single A11connection with packet data serving node (PDSN) component 212 thusreducing the impact on packet data serving node (PDSN) component 212 ofnecessity to maintain and/or monitor numerous A11 connections betweenitself and devices and/or component that are in communication with it.Accordingly, when an access terminal (e.g., access terminal 202) sendspackets through home base station 204 the perception for an individualutilizing the access terminal is that they are communicating directlywith packet data serving node (PDSN) component 212 situated within thecore cellular network. However in reality access terminal 202 iscommunicating with home base station 204 that in turn establishes andmaintains an A11/A10 interface with A11 concentrator component 1002which in turn can communicate with packet data serving node 212 throughthe A11 connection established between it (e.g., A11 concentratorcomponent 1002) and the packet data serving node 212.

In order to facilitate the foregoing functionality, A11 concentratorcomponent 1002 needs to be pre-provisioned with MN-HA keys that can beutilized to communicate with packet data serving node (PDSN) component212. Moreover, A11 concentrator component 1002 can maintain a mappingbetween the A11 and A10 connections with disparate home base stationsand the A11 and A10 interactions between the disparate home basestations in connection with A11 concentrator component 1002 and packetdata serving node (PDSN) component 212. Typically, the mappingsestablished and/or maintained between the A11 and A10 connections withdisparate home base stations in connection with A11 concentratorcomponent 1002 can be utilized to route packets to and/or from A11concentrator component 1002. Furthermore, the established and/ormaintained mappings can be dynamically updated based at least in part onwhen the home base station (e.g., home base station 204) joined thenetwork and when it established the required A10 connections.Additionally, when a previously established A10 connection is no longerbeing utilized by any access terminal or where no access terminal isassociated with the A10 connection, home base station 204 can bring downthe A10 connection.

Further with regard to the A11 concentrator component 1002, robustheader compression (RoHC) contexts can be addressed directly to packetdata serving node (PDSN) 212 when robust header compression (RoHC) isimplemented on the A11 concentrator component 1002 as a flow protocol.Conversely, when robust header compression (RoHC) is implemented on theA11 concentrator component 1002 as a route protocol, robust headercompression (RoHC) contexts can be targeted to home base station 204.

It should be noted without limitation that while A11 concentratorcomponent 1002 is depicted for the purposes of exposition as a separateand distinct component, it will be appreciated by those ordinarilyskilled in the art that A11 concentrator component 1002 can beassociated or integrated with packet data interworking function (PDIF)component 210 for purposes of deployment thereby reducing the number ofnodes that need to be deployed in the core cellular network.Additionally, it will also be appreciated that similar mechanisms tothose employed by A11 concentrator component 1002 can be utilized forA13 type interfaces to transfer sessions between the macro cellularnetwork and networks based on the IEEE 802 standard. Moreover, A11concentrator component 1002 can be employed to concentrate A16 signalinginformation intercommunicated between source access nodes (ANs) andtarget access nodes (ANs) for high rate packet data Inter-AN connectedState Session Transfer. Additionally, A11 concentrator component 1002can further be utilized to concentrate A17, A18, A19, and/or A21interfaces. As stated supra, A17 interfaces generally carry signalinginformation between a source access node (AN) and a target access node(AN) to manage resources in support of inter-AN cross-connectivity. A18interfaces generally transport user traffic (e.g., air interface trafficchannel data) for an access terminal between the source access node (AN)and a target RT during cross-connectivity. The A18 interface endpointsare typically set up using an A17 interface. A19 interfaces generallycarry remote transmitter (RT)-specific bearer-related cross-connectivitycontrol messages for an access terminal between the access node (AN) anda target remote transmitter (RT). The A19 interface endpoints arenormally set up using the A17 interface. A21 interfaces can carrysignaling information between a high rate packet data (HRPD) access node(AN) and the indoor wireless system (IWS). A21 interfaces can providefor handoff to 1×.

In accordance with a further aspect, A11 concentrator component 1002 canmask or hide the IP address of a target access node (AN) from the homebase station. According to this illustrative aspect, the A11concentrator component 1002, when it receives a particular request, canquery an associated database that maps IP addresses to physicallocations and can thereafter find the appropriate target access node towhich to forward the message. Once this has been done the home basestation and the target access node can do what they need to do based atleast in part on the macro cellular specification.

Referring to FIG. 11, a methodology relating to utilizing a home basestation in a wireless communications environment is illustrated. While,for purposes of simplicity of explanation, the methodology is shown anddescribed as a series of acts, it is to be understood and appreciatedthat the methodology is not limited by the order of acts, as some actscan, in accordance with one or more embodiments, occur in differentorders and/or concurrently with other acts from that shown and describedherein. For example, those skilled in the art will understand andappreciate that a methodology could alternatively be represented as aseries of interrelated states or events, such as in a state diagram.Moreover, not all illustrated acts can be required to implement amethodology in accordance with one or more embodiments.

With reference to FIG. 11, illustrated is a methodology 1100 thatfacilitates employing a home base station in a wireless communicationsenvironment. Method 1100 can commence at 1102 where an IPSec tunnel to apacket data interworking function component situated at the boundary ofthe public Internet and the core cellular communications network can beestablished. The IPSec tunnel can typically be established when anaccess terminal initiates association with a home base station. Once thetunnel has been established between the home base station and the packetdata interworking function component, the home base station can utilizehigh rate packet data (HRPD) point-to-point protocol (PPP)challenge-handshake authentication protocol (CHAP) to authenticate theaccess terminal that initiated association with the home base station.Authentication of access terminal can be effectuated via utilization ofan access, authentication, and accounting facility situated in thecellular core network. Additionally and/or alternatively, the home basestation can consult a list of persisted network address identifiers(NAIs) to identify access terminals that are allowed to access the corecellular network through the home base station. Where it is ascertainedthat the access terminal's network address identifier (NAI) is absentfrom the persisted list of network address identifiers (NAIs) or wherethe challenge-handshake authentication protocol (CHAP) authenticationfails, the home base station can deny access to the access terminal andalternate remedial measures can be implemented.

Once the access terminal has been authenticated, the home base stationcan employ the access terminal's international mobile subscriberidentity (IMSI) to identify and select an appropriate packet dataserving node with which to establish communications, after which at1104, the home base station can employ A11 signaling to establish an A10connection with the identified packet data serving node. At 1106 regulargeneral routing encapsulation (GRE) tunnel packets can be exchangedbetween the home base station and the packet data serving node. Itshould be noted that typically the access terminal retains theassociated with the core cellular network when it has currently activeservices, even when it is within the purview of the home base station,but when the previously active service are terminate, the accessterminal will associate itself with the home base station.

As used herein, the term to “infer” or “inference” refers generally tothe process of reasoning about or inferring states of the system,environment, and/or user from a set of observations as captured viaevents and/or data. Inference can be employed to identify a specificcontext or action, or can generate a probability distribution overstates, for example. The inference can be probabilistic—that is, thecomputation of a probability distribution over states of interest basedon a consideration of data and events. Inference can also refer totechniques employed for composing higher-level events from a set ofevents and/or data. Such inference results in the construction of newevents or actions from a set of observed events and/or stored eventdata, whether or not the events are correlated in close temporalproximity, and whether the events and data come from one or severalevent and data sources.

FIG. 12 is an illustration 1200 of an access terminal 202 that obtainsand/or utilizes a home base station in a wireless communication system.Access terminal 202 comprises a receiver 1202 that receives a signalfrom, for instance, a receive antenna (not shown), and performs typicalactions thereon (e.g., filters, amplifies, downconverts, etc.) thereceived signal and digitizes the conditioned signal to obtain samples.Receiver 1202 can be, for example, an MMSE receiver, and can comprise ademodulator 1204 that can demodulate received symbols and provide themto a processor 1206 for channel estimation. Processor 1206 can be aprocessor dedicated to analyzing information received by receiver 1202and/or generating information for transmission by a transmitter 1214, aprocessor that controls one or more components of access terminal 202,and/or a processor that both analyzes information received by receiver1202, generates information for transmission by transmitter 1214, andcontrols one or more components of access terminal 202.

Access terminal 202 can additionally comprise memory 1208 that isoperatively coupled to processor 1206 and that can store data to betransmitted, received data, and any other suitable information relatedto performing the various actions and functions set forth herein. Forinstance, memory 1208 can store group-specific signaling constraintsemployed by one or more base stations. Memory 1208 can additionallystore protocols and/or algorithms associated with identifying signalingconstraints used for communicating resource block assignments and/oremploying such signaling constraints to analyze received assignmentmessages.

It will be appreciated that the data store (e.g., memory 1208) describedherein can be either volatile memory or nonvolatile memory, or caninclude both volatile and nonvolatile memory. By way of illustration,and not limitation, nonvolatile memory can include read only memory(ROM), programmable ROM (PROM), electrically programmable ROM (EPROM),electrically erasable PROM (EEPROM), or flash memory. Volatile memorycan include random access memory (RAM), which acts as external cachememory. By way of illustration and not limitation, RAM is available inmany forms such as synchronous RAM (SRAM), dynamic RAM (DRAM),synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhancedSDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).The memory 1208 of the subject systems and methods is intended tocomprise, without being limited to, these and any other suitable typesof memory.

Receiver 1202 is further operatively coupled to a tunneling component1210 which can be substantially similar to tunneling component 602 ofFIG. 6. Tunneling component 1210 can be employed to establish a tunnelextending from access terminal 202 to a packet data interworkingfunction component situated at the contiguity between a core cellularcommunications network and the Internet at large. Access terminal 202still further comprises a modulator 1212 and a transmitter 1214 thattransmits the signal to, for instance, a home base station, anotheraccess terminal, etc. Although depicted as being separate from theprocessor 1206, it is to be appreciated that tunneling component 1210and/or modulator 1212 can be part of processor 1206 or a number ofprocessors (not shown).

FIG. 13 is an illustration of a system 1300 that facilitates utilizing ahome base station in a wireless communication environment. System 1300comprises a home base station 204 (e.g., access point, . . . ) with areceiver 1308 that receives signal(s) from one or more access terminals1302 through a plurality of receive antennas 1304, and a transmitter1320 that transmits to the one or more access terminals 1302 through atransmit antenna 1306. Receiver 1308 can receive information fromreceive antennas 1304 and is operatively associated with a demodulator1310 that demodulates received information. Demodulated symbols areanalyzed by a processor 1312 that can be similar to the processordescribed above with regard to FIG. 12, and which is coupled to a memory1314 that stores data to be transmitted to or received from accessterminal(s) 1302 (or a disparate base station (not shown)) and/or anyother suitable information related to performing the various actions andfunctions set forth herein. Processor 1312 is further coupled to atunneling component 1316 that establishes a tunnel extending from homebase station 204 to a packet data interworking function componentsituated at the contiguity between a core cellular communicationsnetwork and the Internet. Further, tunneling component 1316 can provideinformation to be transmitted to a modulator 1318. Modulator 1318 canmultiplex a frame for transmission by a transmitter 1320 throughantennas 1306 to access terminal(s) 1302. Although depicted as beingseparate from the processor 1312, it is to be appreciated that tunnelingcomponent 1316 and/or modulator 1318 can be part of processor 1312 or anumber of processors (not shown).

FIG. 14 shows an example wireless communication system 1400. Thewireless communication system 1400 depicts one home base station 1410and one access terminal 1450 for sake of brevity. However, it is to beappreciated that system 1400 can include more than one home base stationand/or more than one access terminal, wherein additional home basestations and/or access terminals can be substantially similar ordifferent from example home base station 1410 and access terminal 1450described below. In addition, it is to be appreciated that home basestation 1410 and/or access terminal 1450 can employ the systems (FIGS.1-10) and/or method (FIG. 11) described herein to facilitate wirelesscommunication there between.

At home base station 1410, traffic data for a number of data streams isprovided from a data source 1412 to a transmit (TX) data processor 1414.According to an example, each data stream can be transmitted over arespective antenna. TX data processor 1414 formats, codes, andinterleaves the traffic data stream based on a particular coding schemeselected for that data stream to provide coded data.

The coded data for each data stream can be multiplexed with pilot datausing orthogonal frequency division multiplexing (OFDM) techniques.Additionally or alternatively, the pilot symbols can be frequencydivision multiplexed (FDM), time division multiplexed (TDM), or codedivision multiplexed (CDM). The pilot data is typically a known datapattern that is processed in a known manner and can be used at accessterminal 1450 to estimate channel response. The multiplexed pilot andcoded data for each data stream can be modulated (e.g., symbol mapped)based on a particular modulation scheme (e.g., binary phase-shift keying(BPSK), quadrature phase-shift keying (QPSK), M-phase-shift keying(M-PSK), M-quadrature amplitude modulation (M-QAM), etc.) selected forthat data stream to provide modulation symbols. The data rate, coding,and modulation for each data stream can be determined by instructionsperformed or provided by processor 1430.

The modulation symbols for the data streams can be provided to a TX MIMOprocessor 1420, which can further process the modulation symbols (e.g.,for OFDM). TX MIMO processor 1420 then provides N_(T) modulation symbolstreams to N_(T) transmitters (TMTR) 1422 a through 1422 t. In variousembodiments, TX MIMO processor 1420 applies beamforming weights to thesymbols of the data streams and to the antenna from which the symbol isbeing transmitted.

Each transmitter 1422 receives and processes a respective symbol streamto provide one or more analog signals, and further conditions (e.g.,amplifies, filters, and upconverts) the analog signals to provide amodulated signal suitable for transmission over the MIMO channel.Further, N_(T) modulated signals from transmitters 1422 a through 1422 tare transmitted from N_(T) antennas 1424 a through 1424 t, respectively.

At access terminal 1450, the transmitted modulated signals are receivedby N_(R) antennas 1452 a through 1452 r and the received signal fromeach antenna 1452 is provided to a respective receiver (RCVR) 1454 athrough 1454 r. Each receiver 1454 conditions (e.g., filters, amplifies,and downconverts) a respective signal, digitizes the conditioned signalto provide samples, and further processes the samples to provide acorresponding “received” symbol stream.

An RX data processor 1460 can receive and process the N_(R) receivedsymbol streams from N_(R) receivers 1454 based on a particular receiverprocessing technique to provide N_(T) “detected” symbol streams. RX dataprocessor 1460 can demodulate, deinterleave, and decode each detectedsymbol stream to recover the traffic data for the data stream. Theprocessing by RX data processor 1460 is complementary to that performedby TX MIMO processor 1420 and TX data processor 1414 at home basestation 1410.

A processor 1470 can periodically determine which available technologyto utilize as discussed above. Further, processor 1470 can formulate areverse link message comprising a matrix index portion and a rank valueportion.

The reverse link message can comprise various types of informationregarding the communication link and/or the received data stream. Thereverse link message can be processed by a TX data processor 1438, whichalso receives traffic data for a number of data streams from a datasource 1436, modulated by a modulator 1480, conditioned by transmitters1454 a through 1454 r, and transmitted back to base station 1410.

At home base station 1410, the modulated signals from access terminal1450 are received by antennas 1424, conditioned by receivers 1422,demodulated by a demodulator 1440, and processed by a RX data processor1442 to extract the reverse link message transmitted by access terminal1450. Further, processor 1430 can process the extracted message todetermine which precoding matrix to use for determining the beamformingweights.

Processors 1430 and 1470 can direct (e.g., control, coordinate, manage,etc.) operation at home base station 1410 and access terminal 1450,respectively. Respective processors 1430 and 1470 can be associated withmemory 1432 and 1472 that store program codes and data. Processors 1430and 1470 can also perform computations to derive frequency and impulseresponse estimates for the uplink and downlink, respectively.

In an aspect, logical channels are classified into Control Channels andTraffic Channels. Logical Control Channels can include a BroadcastControl Channel (BCCH), which is a DL channel for broadcasting systemcontrol information. Further, Logical Control Channels can include aPaging Control Channel (PCCH), which is a DL channel that transferspaging information. Moreover, the Logical Control Channels can comprisea Multicast Control Channel (MCCH), which is a Point-to-multipoint DLchannel used for transmitting Multimedia Broadcast and Multicast Service(MBMS) scheduling and control information for one or several MTCHs.Generally, after establishing a Radio Resource Control (RRC) connection,this channel is only used by UEs that receive MBMS (e.g., oldMCCH+MSCH). Additionally, the Logical Control Channels can include aDedicated Control Channel (DCCH), which is a Point-to-pointbi-directional channel that transmits dedicated control information andcan be used by UEs having a RRC connection. In an aspect, the LogicalTraffic Channels can comprise a Dedicated Traffic Channel (DTCH), whichis a Point-to-point bi-directional channel dedicated to one UE for thetransfer of user information. Also, the Logical Traffic Channels caninclude a Multicast Traffic Channel (MTCH) for Point-to-multipoint DLchannel for transmitting traffic data.

In an aspect, Transport Channels are classified into DL and UL. DLTransport Channels comprise a Broadcast Channel (BCH), a Downlink SharedData Channel (DL-SDCH) and a Paging Channel (PCH). The PCH can supportUE power saving (e.g., Discontinuous Reception (DRX) cycle can beindicated by the network to the UE, . . . ) by being broadcasted over anentire cell and being mapped to Physical layer (PHY) resources that canbe used for other control/traffic channels. The UL Transport Channelscan comprise a Random Access Channel (RACH), a Request Channel (REQCH),an Uplink Shared Data Channel (UL-SDCH) and a plurality of PHY channels.

The PHY channels can include a set of DL channels and UL channels. Forexample, the DL PHY channels can include: Common Pilot Channel (CPICH);Synchronization Channel (SCH); Common Control Channel (CCCH); Shared DLControl Channel (SDCCH); Multicast Control Channel (MCCH); Shared ULAssignment Channel (SUACH); Acknowledgement Channel (ACKCH); DL PhysicalShared Data Channel (DL-PSDCH); UL Power Control Channel (UPCCH); PagingIndicator Channel (PICH); and/or Load Indicator Channel (LICH). By wayof further illustration, the UL PHY Channels can include: PhysicalRandom Access Channel (PRACH); Channel Quality Indicator Channel(CQICH); Acknowledgement Channel (ACKCH); Antenna Subset IndicatorChannel (ASICH); Shared Request Channel (SREQCH); UL Physical SharedData Channel (UL-PSDCH); and/or Broadband Pilot Channel (BPICH).

It is to be understood that the embodiments described herein can beimplemented in hardware, software, firmware, middleware, microcode, orany combination thereof. For a hardware implementation, the processingunits can be implemented within one or more application specificintegrated circuits (ASICs), digital signal processors (DSPs), digitalsignal processing devices (DSPDs), programmable logic devices (PLDs),field programmable gate arrays (FPGAs), processors, controllers,micro-controllers, microprocessors, other electronic units designed toperform the functions described herein, or a combination thereof.

When the embodiments are implemented in software, firmware, middlewareor microcode, program code or code segments, they can be stored in amachine-readable medium, such as a storage component. A code segment canrepresent a procedure, a function, a subprogram, a program, a routine, asubroutine, a module, a software package, a class, or any combination ofinstructions, data structures, or program statements. A code segment canbe coupled to another code segment or a hardware circuit by passingand/or receiving information, data, arguments, parameters, or memorycontents. Information, arguments, parameters, data, etc. can be passed,forwarded, or transmitted using any suitable means including memorysharing, message passing, token passing, network transmission, etc.

For a software implementation, the techniques described herein can beimplemented with modules (e.g., procedures, functions, and so on) thatperform the functions described herein. The software codes can be storedin memory units and executed by processors. The memory unit can beimplemented within the processor or external to the processor, in whichcase it can be communicatively coupled to the processor via variousmeans as is known in the art.

Turning to FIG. 15, illustrated is a system 1500 that enables utilizinga home base station in a wireless communication environment. System 1500can reside within a home base station, for instance. As depicted, system1500 includes functional blocks that can represent functions implementedby a processor, software, or combination thereof (e.g., firmware).System 1500 includes a logical grouping 1502 of electrical componentsthat can act in conjunction. Logical grouping 1502 can include anelectrical component for establishing an IPSec tunnel to a packet datainterworking function 1504. Further, logical grouping 1502 can includean electrical component for establishing A11/A10 interfaces between ahome base station and a packet data serving node situated in a corecellular communications network 1506. Moreover, logical grouping 1502can include an electrical component for exchanging general routingencapsulation packets between the home base station and the packet dataserving node 1508. Additionally, system 1500 can include a memory 1510that retains instructions for executing functions associated withelectrical components 1504, 1506, and 1508. While shown as beingexternal to memory 1510, it is to be understood that electricalcomponents 1504, 1506, and 1508 can exist within memory 1510.

What has been described above includes examples of one or moreembodiments. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing the aforementioned embodiments, but one of ordinary skill inthe art may recognize that many further combinations and permutations ofvarious embodiments are possible. Accordingly, the described embodimentsare intended to embrace all such alterations, modifications andvariations that fall within the spirit and scope of the appended claims.Furthermore, to the extent that the term “includes” is used in eitherthe detailed description or the claims, such term is intended to beinclusive in a manner similar to the term “comprising” as “comprising”is interpreted when employed as a transitional word in a claim.

What is claimed is:
 1. A method for employing a home base station in awireless communication environment, comprising: establishing an internetprotocol security (IPSec) tunnel between the home base station and apacket data interworking function; establishing a connection with apacket data serving node, wherein establishing the connection with thepacket data serving node comprises: identifying the packet data servingnode based on an international mobile subscriber identity (IMSI)associated with an access terminal, and employing A11 signaling toestablish an A10 connection with the packet data serving node; andexchanging packets between the home base station and the packet dataserving node over the connection.
 2. The method of claim 1, furthercomprising initiating association with an access terminal, wherein theIPSec tunnel is established in response to initiating association withthe access terminal.
 3. The method of claim 1, further comprisingauthenticating an access terminal associated with the home base station.4. The method of claim 3, wherein authenticating comprises utilizing ahigh rate packet data (HRDP) point-to-point protocol (PPP)challenge-handshake authentication protocol (CHAP) through the IPSectunnel.
 5. The method of claim 3, wherein authenticating comprisescommunicating with an access, authentication, and accounting (AAA)facility through the IPSec tunnel.
 6. The method of claim 3, whereinauthenticating comprises determining if a network address identifier(NAI) for the access terminal is included in a list of persisted NAIs onthe home base station.
 7. The method of claim 1, wherein the packetscomprise general routing encapsulation (GRE) tunneling packets.
 8. Awireless communications apparatus, comprising: a memory that retainsinstructions related to: establishing an internet protocol security(IPSec) tunnel between a home base station and a packet datainterworking function, establishing a connection with a packet dataserving node, wherein the instructions related to establishing theconnection with the packet data serving node comprise instructionsrelated to: identifying the packet data serving node based on aninternational mobile subscriber identity (IMSI) associated with anaccess terminal, and employing A11 signaling to establish an A10connection with the packet data serving node; and exchanging packetsbetween the home base station and the packet data serving node over theconnection; and a processor, coupled to the memory, configured toexecute the instructions retained in the memory.
 9. The wirelesscommunications apparatus of claim 8, wherein the memory further retainsinstructions related to initiating association with an access terminal,wherein the IPSec tunnel is established in response to initiatingassociation with the access terminal.
 10. The wireless communicationsapparatus of claim 8, wherein the memory further retains instructionsrelated to authenticating an access terminal associated with the homebase station.
 11. The wireless communications apparatus of claim 10,wherein authenticating comprises: utilizing a high rate packet data(HRDP) point-to-point protocol (PPP) challenge-handshake authenticationprotocol (CHAP) through the IPSec tunnel; communicating with an access,authentication, and accounting (AAA) facility through the IPSec tunnel;or determining if a network address identifier (NAI) for the accessterminal is included in a list of persisted NAIs on the home basestation.
 12. The wireless communications apparatus of claim 8, whereinthe packets comprise general routing encapsulation (GRE) tunnelingpackets.
 13. A non-transitory computer-readable medium, comprising: codefor causing a computer to establish an internet protocol security(IPSec) tunnel between a home base station and a packet datainterworking function; code for causing a computer to establish aconnection with a packet data serving node, wherein the code for causinga computer to establish the connection with the packet data serving nodecomprises: code for causing a computer to identify the packet dataserving node based on an international mobile subscriber identity (IMSI)associated with an access terminal, and code for causing a computer toemploy A11 signaling to establish an A10 connection with the packet dataserving node; and code for causing a computer to exchange packetsbetween the home base station and the packet data serving node over theconnection.
 14. The non-transitory computer-readable medium of claim 13,wherein the computer-readable medium further comprises code for causinga computer to initiate association with an access terminal, wherein theIPSec tunnel is established in response to initiating association withthe access terminal.
 15. The non-transitory computer-readable medium ofclaim 13, wherein the computer-readable medium further comprises codefor causing a computer to authenticate an access terminal associatedwith the home base station.
 16. The non-transitory computer-readablemedium of claim 15, wherein the code for causing a computer toauthenticate comprises: code for causing a computer to utilize a highrate packet data (HRDP) point-to-point protocol (PPP)challenge-handshake authentication protocol (CHAP) through the IPSectunnel; code for causing a computer to communicate with an access,authentication, and accounting (AAA) facility through the IPSec tunnel;or code for causing a computer to determine if a network addressidentifier (NAI) for the access terminal is included in a list ofpersisted NAIs on the home base station.
 17. The non-transitorycomputer-readable medium of claim 13, wherein the packets comprisegeneral routing encapsulation (GRE) tunneling packets.