System and method for communication between programmable base stations and software-defined radio access network controllers

ABSTRACT

Base stations as well as Radio Access Network (RAN) controllers have embedded communication agents that are responsible from control messaging between these entities that enable creation and management of RAN Slices. At a given time, it is possible that multiple active RAN slices co-exist on the same base station, where each RAN slice may run its own scheduler, its own admission control and have its own handoff management parameter values.

RELATED APPLICATIONS

This application claims the benefit of provisional application62/334,364 filed May 10, 2016.

BACKGROUND OF THE INVENTION Field of Invention

The present application pertains to the information exchange between thebase stations and the radio access network controllers ofsoftware-defined wireless broadband communication systems where networkslices may be created, altered or revoked programmatically.

Discussion of Related Art

This invention is concerned with the communication method between acontrol agent and programmable base stations in the radio access networkto enable virtualization in the network.

In both second and third generation cellular networks, controllerscontrol base stations. In second generation networks, this controllerwas called the Base Station Controller (BSC) and was responsible forcontrolling the channel (time-slot) allocation implemented by the basestations, handovers across the base stations and location tracking ofthe mobiles in the network. In third generation networks, the controllerwas renamed as the Radio Network Controller (RNC) and similar to theBSC, it was responsible for radio resource control, channel allocation,power control, handover control, ciphering as well as segmentation andreassembly of the data traffic. Both controllers also act as mobilityanchors for the flowing traffic. Besides the standards specifications,there have been a fair number of prior art in architecting systemsinvolving BSCs and RNCs.

U.S. Pat. No. 5,533,028 B2 discusses a BSC in which the guard fields inthe TDM-based data flows between itself and the base stations, itcontrols is reduced to make room for control and signaling information.U.S. Patent Publication 2003/0063582 A1 discusses a BSC that also servesas a gateway to an external packet data network and as such directlytransfers flows between this network and the base stations.

U.S. Pat. No. 7,983,712 B2 discusses a centralized RNC architecture tosimplify the switching of user data traffic throughout the radio accessnetwork. U.S. Patent Publication 2014/0368306 A1 discusses a systemwhere the data communications between the RNC and the base stations usea fixed-length data size or a variable-length data size. The RNCtransmits information indicating which packet size option to be used.

U.S. Pat. No. 8,027,676 B2 presents a RNC system that includes aconnection setup request transmitter configured to transmit a request toset up the connection to the mobile station located in the specificcell; and a judger configured to judge whether or not to acquireinformation from the mobile station located in the specific cell. In thesystem of the invention, the connection setup request transmitter isconfigured to transmit the connection setup request to the mobilestation only when the judger deems necessary to acquire information fromthe mobile station.

Starting with the fourth-generation cellular network, also known as LTE,the radio network/base station controller has disappeared in thecellular network architecture. Instead, the functionalities of thiscontroller have been moved to the base stations. In other words, theradio resource control, channel allocation, power control, handovercontrol, ciphering and segmentation and reassembly of user data trafficfunctions are all conducted in a distributed fashion within each basestation in LTE.

This invention is intended for fourth generation cellular systems andbeyond. In the system of the present invention, a RAN controller isintroduced into the network. However, the function of this controller isvery different than a BSC or RNC. First, in the network of theinvention, the control functionalities of radio resource control,channel allocation, power control, handover control, ciphering andsegmentation and reassembly of user data traffic functions still resideon the individual base stations. However, the system of the inventionallows for the establishment, modification, and removal of virtual radioaccess networks, described as RAN slices, programmatically. It is thisfunctionality that the RAN controller of the present invention oversees.The concept of virtualization may be described as a methodology thatenables an underlying resource to be shared across multiple consumers,while providing each consumer with the illusion that it owns the entireresource. In wireless systems, specific applications and design goalslead to different virtualization methodologies. We can broadlycategorize the concept of wireless virtualization into the followingdistinct perspectives: wireless network-level virtualization,device-level virtualization, flow-level virtualization, protocol-levelvirtualization, wireless resources-level virtualization. Most of theprevious work on wireless virtualization focuses on a subset of theseperspectives.

Wireless Network-Level Virtualization focuses on enabling multiple,isolated logical wireless networks, potentially each operated by adifferent mobile virtual network operator (MVNO), over a shared physicalwireless network infrastructure. There may be different levels ofnetwork virtualization for a MVNO. The MVNO may have no infrastructureof its own and may be leasing all aspects of the cellular network from amobile network operator (MNO) who owns the network infrastructure.Alternatively, the MVNO may own a portion of the network infrastructure,such as network services or even the entire core network, and lease onlythe access network from a MNO. 3GPP has defined an interoperabilityrequirements document for cellular network-level virtualization forMVNOs. Wireless network-level virtualization may also be employed by asingle network operator in order to define various logical networkswithin its coverage for various purposes.

Device-Level Virtualization focuses on decoupling a portion of the basestation equipment from the rest so that the decoupled portion may berealized on commodity hardware in the cloud as a common resource to beshared across a group of base stations. This architecture is commonlyreferred to as Cloud-RAN in the literature. A typical base station is adistributed architecture composed of the baseband unit (BBU) and remoteradio unit (RRU) parts. The BBU is placed in the equipment room andconnected to the RRH via optical fiber. The Cloud-RAN architecturetypically virtualizes the baseband unit (BBU) functionality in full andrealizes them in a centralized pool in the cloud on high-performanceprogrammable processors and real-time virtualization technology. Thetypical base stations are reduced to simple RRU units with antennas inthis case. The U.S. Patent Publication 2014/027792 A1 discusses aCloud-RAN system and presents a resource scheduling method for the RRUto access the BBU realizations in the cloud.

Flow-Level Virtualization focuses on providing isolation, scheduling,management and service differentiation for both downlink and uplinktraffic flows from other flows in a manner similar to how OpenFlowenables flow differentiation for software-defined networks (SDNs). Oneway of realizing flow-level virtualization is using an overlay filterand software switch module. This method, as described in U.S. PatentPublication 2012/0002620 A1, does not require any modifications to theunderlying base station. The patent application defines a group ofselect flows as a slice, and describes a so-called slice scheduler thatis realized outside the base stations. The slice scheduler decides whichof the flows should enter the base station and ensures that packets offlows from only the desired slice enter the base station at a giventime. The base station then processes these flows in a typical manner byusing a flow-level scheduler. Alternatively, flow-level virtualizationcould also be integrated into the base station protocol stack so thatthe slice scheduler is implemented within the stack, just before theflow scheduler. The U.S. Pat. No. 8,873,482 B2 discusses a flow-levelvirtualization for a base station where the uplink and downlink flowsare grouped into base station slices. Each slice requests to reserve aportion of the base station resources and is given a normalized weightthat reflects this request. The slice scheduler, which is implementedinside the base station, selects which slice to service at a given time,based on the slice weights. For that time, that slice completelycontrols the base station. It then utilizes a flow scheduler to schedulewhich flows to service from that slice. The invention disclosed in thepatent allows for each slice to have its own flow scheduling function.

Protocol-Level Virtualization focuses on the isolation, customization,and management of multiple protocol instances on one base stationequipment. The resource to be virtualized depends on which aspect of theprotocol stack is considered. For a MAC-layer virtualization, forexample, the scheduling operation may be virtualized. In this case, thebase station protocol stack is implemented in such a way that multipleinstances of the scheduler may run on it. U.S. Pat. Nos. 8,700,047 B2and 8,351,948 B2 define flow management functions that contain theoperations of virtual time tagging of packets, scheduler operations andmodel specification operations that specify the relative weights of theflows, and discuss a method to dynamically change the flow managementfunction, and thus the scheduler operation in a base station. Similarly,the U.S. Pat. No. 8,923,239 B2 discusses a base station that dynamicallyselects a scheduling operation based on a received model specification.Here, the model specification includes a weight distribution, modulationand coding scheme, packet loss value, and minimum and maximum rates of aflow. For a PHY-layer virtualization, on the other hand, the modulation,coding, and other signal processing modules that are implemented on ahardware DSP may be virtualized by defining a DSP sharing scheme for themultiple PHY instances. It is also possible to define a full protocolstack virtualization so that multiple different protocol stacks mayoperate on the same base station equipment. This is possible using aprogrammable software-defined radio (SDR) architecture. The SDR allowsfor a base station to support multiple radio access technologies usingthe same hardware components.

Wireless Resources-Level Virtualization focuses on the abstraction anddynamic allocation of the wireless radio resources, which are typicallydefined as a subset of the space defined by the frequency, time, code,power and antenna dimensions. The specific definition of the wirelessresources is standard dependent. For example, in LTE, a wirelessresource is commonly referred to as a resource block (RB) defined in thefrequency-time space. Wireless resources-level virtualization providesthe lowest level of slicing possible. There are multiple possible usesfor wireless resources-level virtualization. It may be used in acellular network to reduce the inter-base station interference. Forexample, U.S. Pat. Nos. 8,660,071 B2 and 8,831,522 B2 present similardistributed dynamic resource partitioning techniques among neighboringbase stations so that the potential interference one base station causesto its neighbors is as small as possible. Similarly, the U.S. PatentPublication 2014/0045513 A1 discusses a scenario where multipleoperators share wireless resources and a central management serveroversees resource partitioning. The resources are dynamicallypartitioned amongst the operators in different parts of the network viaresource ratio change messages sent by the management server. Thewireless resources-level virtualization may also be used to satisfyquality-of-service (QoS) requirements of different flows. For example,LTE uses semi-persistent scheduling for voice flows where a specific RBis reserved for the voice call for the entirety of the call. U.S. Pat.No. 8,681,729 B2 discusses reserving specific RBs to multiple flows fora certain duration of time, described by a message. In the case wheresame RBs are reserved for multiple flows, the system employs amultiplexing technique for the flows to share the common RBs.Alternatively; the wireless resources-level virtualization may be usedto allow for multiple instances of the protocol stack to operate on thebase station at the same time. If no wireless-level virtualization ispresent when full protocol stack virtualization is employed, then thearchitecture remains merely a programmable hardware, where dynamicallyone can alter the active protocol stack in use as is described in theSDR. However, when both levels of virtualization are present, it isindeed possible for multiple instances of the protocol stack to run inparallel on the base station.

In a system architecture, it is possible to have multiple levels ofwireless virtualization at the same time. For example, the U.S. Pat. No.8,874,125 B2 discusses a wireless system with multiple entities (MNO andMVNOs) that utilizes a virtualization architecture that includes jointwireless network-layer virtualization, flow-level virtualization andpartial protocol-layer virtualization. The disclosed system estimatesresource requirements of the entities for each base station based onfeedback from all base stations, computes the corresponding resourceallocations amongst the entities and then enforces flow-levelvirtualization on each base station using the method of U.S. Pat. No.8,700,047 B2.

The invention discussed herein proposes a novel system that allows forcommunication between a RAN controller and a number of base stations toprogrammatically radio access network virtualization. The framework ofthe present invention includes joint wireless network-layervirtualization, flow-level virtualization, protocol-layer virtualizationand wireless resources-level virtualization using a profile definition.The profile specifies how the network of base stations are virtualized,how the flows within each of these virtual networks are virtualized, andspecifies the protocol virtualization for the individual flows as wellas the wireless-resources virtualization for them. The inventiondiscusses a system where controllers communicate with base stations toset-up, modify, terminate as well as control the dynamic RAN slices.

Embodiments of the present invention are an improvement over prior artsystems and methods.

SUMMARY OF THE INVENTION

In one embodiment, the present invention provides a method asimplemented in a radio access network (RAN) controller during power upof a base station comprising: (a) receiving, from a base station, anAuthentication Request message comprising an identity of the basestation, the RAN controller; (b) authenticating the received identity ofthe base station against a database of registered base stations; (c)transmitting a result of the authentication in step (b) as anAcknowledgement message; (d) when the result of the authentication isvalid, receiving, from the base station, a Report message comprising atime stamp and a status of the base station; (e) when the receivedstatus in step (d) indicates that the base station is active,transmitting, to the base station, a Configuration message comprisingprofile information for at least one RAN slice called default RAN sliceto be activated in the base station, wherein the default RAN slice isprogrammed to serve all mobile users that are not part of any RAN slicespre-programmed in the base station before power up; and (f) receiving,from the base station, an Acknowledgement message upon successfulprogramming of the default RAN slice.

In another embodiment, the present invention provides a method asimplemented in a radio access network (RAN) controller comprising: (a)receiving a time-stamped Event Report message from a base station uponattachment of a mobile station to that base station, the Event Reportcomprising an identity of the mobile station and a status of the basestation; (b) in response to Event Report received in step (a),transmitting a Configuration Update message including an identificationof a RAN slice for use with the mobile station based on one of thefollowing: (1) identifying the mobile station is readily associated witha pre-programmed active RAN running in the base station and identifyingthe pre-programmed active RAN as the identified RAN slice in theConfiguration Update message; (2) identifying the mobile station isreadily associated with a pre-programmed default RAN profile andidentifying a default RAN slice running in the base stationcorresponding to the default RAN profile as the identified RAN slice inthe Configuration Update message; or (3) identifying the mobile stationis not associated with any RAN slice, and the Configuration Updatemessage comprising a name of a new RAN slice to be used as theidentified RAN slice and any of, or a combination of, the followingprofile information to program the new RAN slice: downlink schedulernames, uplink scheduler names, admission control rules, handoffmanagement parameters, and percentage of radio resources to be allocatedfor the new RAN slice; (c) receiving, from the base station, anAcknowledgement message upon successful programming of the RAN sliceidentified in (b).

In yet another embodiment, the present invention provides a method asimplemented in a radio access network (RAN) controller, facilitating ahandover of a mobile station based on communicating with a serving basestation and a target base station, the method comprising: (a) receiving,from the serving base station, a Handover Flag message comprising anidentity associated with the mobile station and an identity of thetarget base station; (b) determining a new RAN slice in the target basestation that serves the mobile station after the handover is completedbased on one of the following: (1) the new RAN slice in the target basestation picked according to a pre-programmed active RAN slice that themobile station is associated with; (2) the new RAN slice in the targetbase station picked according to a pre-programmed default RAN profilethat the mobile station is associated with, or (3) the new RAN slice inthe target base station is an un-programmed RAN slice, (c) when themobile station belongs to a pre-programmed RAN slice in the target basestation, transmitting, to the target base station, a first configurationupdate comprising an identification of the pre-programmed RAN slicealong with the request to add the mobile station as a slice user, andwhen the mobile station belongs to a yet un-programmed RAN slice,transmitting, to the target base station, a second configuration updatemessage comprising a request to add the mobile station as a new sliceuser, a name of the new RAN slice, and any of, or a combination of, thefollowing profile information to program the new RAN slice: downlinkscheduler names, uplink scheduler names, admission control rules,handoff management parameters, and percentage of radio resources to beallocated for the new RAN slice, and (d) receiving, from the target basestation, an Acknowledgement message upon successful programming of themobile station to the RAN slice identified in (b).

In another embodiment, a RAN controller is provided that includes aprocessor and computer storage storing computer readable program codeimplementing any one of the above-noted methods.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure, in accordance with one or more various examples,is described in detail with reference to the following figures. Thedrawings are provided for purposes of illustration only and merelydepict examples of the disclosure. These drawings are provided tofacilitate the reader's understanding of the disclosure and should notbe considered limiting of the breadth, scope, or applicability of thedisclosure. It should be noted that for clarity and ease of illustrationthese drawings are not necessarily made to scale.

FIG. 1 depicts the radio access network of the present invention.

FIG. 2 illustrates how the RAN Controller dynamically creates RAN Slicein a base station.

FIG. 3 shows the communication agents in base stations as well as theRAN Controller that enable the transmission of control signaling toallow base station programmability towards dynamic RAN slicing.

FIG. 4 depicts an example control signaling flow between a base stationand RAN Controller when this base station is powered up.

FIG. 5 illustrates an example control signaling flow between a basestation and the RAN Controller upon attachment of a new Mobile User tothis base station.

FIG. 6 shows an example control signaling flow between source and targetbase stations and the RAN Controller during the handover of a MobileUser.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

While this invention is illustrated and described in a preferredembodiment, the invention may be produced in many differentconfigurations. There is depicted in the drawings, and will herein bedescribed in detail, a preferred embodiment of the invention, with theunderstanding that the present disclosure is to be considered as anexemplification of the principles of the invention and the associatedfunctional specifications for its construction and is not intended tolimit the invention to the embodiment illustrated. Those skilled in theart will envision many other possible variations within the scope of thepresent invention.

Note that in this description, references to “one embodiment” or “anembodiment” mean that the feature being referred to is included in atleast one embodiment of the invention. Further, separate references to“one embodiment” in this description do not necessarily refer to thesame embodiment; however, neither are such embodiments mutuallyexclusive, unless so stated and except as will be readily apparent tothose of ordinary skill in the art. Thus, the present invention caninclude any variety of combinations and/or integrations of theembodiments described herein.

The present invention describes a communication system between the basestations and radio access network (RAN) controllers. This system enablesthe overall programmability of the software-defined RAN.

In the software-defined RAN of the present invention, the RANcontrollers have the capability to control the virtualization of the RANwithin their geography based on profiles that may be created, altered orremoved dynamically. This enables a RAN Controller to program a specificprofile description for a RAN slice. In the system, a profile for a RANslice consists of the following information:

-   -   A list of base stations (BSs) for which the profile is valid;    -   A list of user equipment (UEs) and/or a list of flows for which        the profile is valid;    -   The time duration for which the profile is valid;    -   The scheduling operation to be sued for the profile;    -   The handoff operation to be used for the profile;    -   The admission control operation to be used for the profile;    -   The percentage of wireless resources that the profile governs.

In the system of the present invention, the base stations as well as theRAN Controller have embedded Communication Agents that are responsiblefrom control messaging between these entities that enable creation, andmanagement of RAN Slices. At a given time, it is possible that multipleactive RAN slices co-exist on the same base station. In this case, eachRAN slice may run its own scheduler, its own admission control and haveits own handoff management parameter values.

The communication between the RAN Controller and a base station itgoverns starts when the base station is first added to the cellularnetwork. Upon power-up, the Communication Agent in the base stationauthenticates itself with the RAN Controller. If authenticated, the RANController admits it to its pool of programmable base stations.Subsequently, the RAN Controller, via its own Communication Agent, sendsconfiguration information to the base station regarding a DefaultProfile. This profile describes a Default RAN Slice for all mobile usersthat become attached to this base station and do not belong to any otheractive RAN Slice.

The communication between the RAN Controller and a base station itgoverns starts when the base station is first added to the cellularnetwork. Upon power-up, the Communication Agent in the base stationauthenticates itself with the RAN Controller. If authenticated, the RANController admits it to its pool of programmable base stations.Subsequently, the RAN Controller, via its own Communication Agent, sendsconfiguration information to the base station regarding a DefaultProfile. This profile describes a Default RAN Slice for all mobile usersthat become attached to this base station and do not belong to any otheractive RAN Slice.

It is possible to alter the profile specification of an active slice.The RAN Controller initiates this by sending, via its CommunicationAgent, a Configuration Update to the base station. This messageidentifies the slice profile to be modified and the entries that are tobe updated. Upon receipt of this message, the base station immediatelymodifies the slice profile. It is also possible to terminate a sliceprematurely. The RAN Controller can also initiate this by sending, viaits Communication Agent, a Configuration Update to the base station.This message identifies the slice to be terminated. Upon receipt, thebase station immediately terminates this slice. This is conducted bymoving the active mobile users that are being serviced within theto-be-terminated slice to the default slice and allocating the wirelessresources that have been released by the to-be-terminated slice to thedefault slice.

When a handover process is initiated by a base station for one of themobile users, this base station informs the RAN Controller via itsCommunication Agent about the handover initiation right away. Thecontroller then programs or updates a RAN Slice profile in the targetbase station so that when the handover process is completed, the mobileuser continues getting service in its designated RAN slice.

The preferred embodiment of this invention describes a communicationsystem between multiple programmable base stations and one RANController to allow for dynamic RAN Slicing in the network. Each sliceis defined by a distinct profile consisting of the followinginformation:

-   -   A list of slice base stations (BSs);    -   A list of slice user equipment (UEs) and/or a list of slice        flows;    -   The time duration for which the slice is valid;    -   The scheduling operation to be used for the slice;    -   The handover operation to be used for the slice;    -   The admission control operation to be used for the slice;    -   The percentage of wireless resources that the slice governs.

The communication system of the present invention enables the RANController to dynamically program RAN slices across the network. Thesystem of the embodiment is illustrated in FIG. 1. Here, (101-103) showthe programmable base stations. (104-107) show the mobile stations thatare attached to the base stations. (108) shows the RAN Controller. TheRAN Controller communicates with the programmable base stations using adedicated control channel as illustrated in (110-112) which may belogical or physical.

The communication over the control channel enables the RAN Controller todynamically program RAN Slices to the programmable base stations whereeach slice has a corresponding profile description. FIG. 2 shows how thecommunication creates RAN Slices in one base station. In the figure,(201) shows the programmable base station. (202) is the RAN Controller.Using the control channel (210), the RAN Controller sends new profileconfigurations to the base station. It may also send configurationmodifications if necessary. In the figure, (200, 201, 203 and 204) arethree active RAN slices running on the base station. Each slice has itsown Admission Control, Handoff Control, and Scheduling operations aswell as a Radio Resource Mapper that maps scheduled head-of-line packetsto allocated resource blocks for each slice. Also associated with eachslice profile is the percentage of radio resources that are reserved forthe given slice. This is illustrated in the figure as the radio resourceblock (206) being allocated to slice (200), (207) being allocated toslice (203) and (208) being allocated to slice (204).

FIG. 3 illustrates that both the RAN Controller (301) and the BaseStations (303, 305) use an embedded communication agent, (302) for theRAN Controller and (304, 306) for the base stations, to communicate overthe control channel (307, 308).

FIG. 4 shows an example control signaling flow between the communicationagents of a base station (401) and the RAN Controller (402) upon basestation power-up. Upon power-up, the base station sends anAuthentication Request message (403), which includes that base station'sidentity, and optionally base station IP address and its GPScoordinates. Upon receipt, the RAN Controller compares these values withits database of registered base stations. The RAN Controller transmitsthe authentication result as an Acknowledgement (404). If theauthentication is valid, the base station transmits a Report message(405), which includes a time stamp, and its status, which may be Activeor No Service. If Active, the RAN Controller then sends a Configurationmessage (406) to the base station. This message conveys the profileinformation for the default RAN slice. The default slice is programmedto serve all Mobile Users that do not belong to any other active RANSlice. Once programming is completed, the Base Station sends anAcknowledgement message (407). While this sequence of signaling is thepreferred embodiment for how communication is conducted in the systemupon base station power-up, alternative sequences also exist. In anotherembodiment, messages (403) and (405) may be combined and transmittedtogether. As a response, messages (404) and (406) are combined andtransmitted together. In yet another embodiment, the default RAN sliceprofile is pre-programmed to each base station. In this case, uponpower-up, only authentication takes place.

FIG. 5 shows an example control signaling flow between the communicationagents of a base station (502) and the RAN Controller (503) when amobile user (501) attaches to the base station (504). Upon attachment,the communication agent of the base station sends a time-stamped EventReport message (505) to the RAN Controller in which the attached MobileStation's IMSI and/or Phone Number is included, along with its status.The status could be one of the following: idle, connected, detached. Thebase station sends this message as it does not yet know in which RANslice to place this user. The RAN Controller responds by specifying theRAN Slice for the Mobile User. The response could reveal one of threeoptions: The user may belong to a pre-programmed active slice, the usermay belong to the pre-programmed default profile, or the user may belongto an active slice that is not yet programmed into the base station. Ifthe user belongs to a pre-programmed slice, the configuration updatewill include the RAN slice identification along with the request to addthe mobile user as a slice user as part of a profile configurationupdate command (506). If, on the other hand, the user belongs to a yetun-programmed RAN slice, the configuration update command (506) willinclude not only a request to add the mobile user as the new slice user,but also the name of the new RAN slice, and its complete profileinformation, which includes downlink and uplink scheduler names,admission control rules, handoff management parameters as well as thepercentage of radio resources to be allocated for the slice. Onceprogramming is complete, the base station sends an acknowledgementmessage (507). While this sequence of signaling is the preferredembodiment for how communication is conducted in the system upon amobile user attachment to a base station, alternative sequences alsoexist. In another embodiment, the RAN Controller may acquire theinformation about the user attachment from the Core Network. In thiscase, message (505) becomes unnecessary. In another embodiment, themessage (506) may be transmitted as a group of distinct messages ratherthan a single message.

FIG. 6 shows an example control signaling flow between the communicationagents of a serving base station (602), a target base station (603) andthe RAN Controller (604) when the serving base station (602) decides toinitiate a handover for a mobile user (601) to the target base station(603). When the serving base station decides to initiate the handover,it contacts the mobile station in question to start the process (606).This process is to be conducted according to the wireless cellularstandard that is in use. In the preferred embodiment, concurrently, orjust before the start of the initiation, the communication agent of theserving base station sends a Handover Flag to the RAN Controller. Thismessage includes the identities of the Mobile User that is going througha handover as well as the identity of the target base station. Uponreceipt of this message, the RAN Controller needs to determine theactive RAN Slice that this user will belong to in the target basestation after the handover procedure is completed. There are threepossibilities: The user may belong to a pre-programmed active slice inthe target base station which may or may not be the same slice it is inthe serving base station, the user may belong to the pre-programmeddefault profile, or the user may belong to an active slice that is notyet programmed into the base station in the target base station whichmay or may not be the same slice it is in the serving base station. Theidentity of the RAN Slice for this user is conveyed to the target basestation in a configuration update message (607). If the user belongs toa pre-programmed slice in the target base station, the configurationupdate will include the RAN slice identification along with the requestto add the mobile user as a slice user (607). If, on the other hand, theuser belongs to a yet un-programmed RAN slice, the configuration updatecommand (607) will include not only a request to add the mobile user asthe new slice user, but also the name of the new RAN slice, and itscomplete profile information, which includes downlink and uplinkscheduler names, admission control rules, handoff management parametersas well as the percentage of radio resources to be allocated for theslice. Once programming is complete, the target base station sends anacknowledgement message (608). It is desirable to complete this processprior to the completion of the handover procedure, which results in theattachment of the mobile user to the target base station (609). Whilethis sequence of signaling is the preferred embodiment for howcommunication is conducted in the system upon the start of a handoverprocess for a mobile user, alternative sequences also exist. In anotherembodiment, the RAN Controller may acquire the information about thestart of a handover procedure from the Core Network. In this case,message (605) becomes unnecessary. In another embodiment, the message(607) may be transmitted as a group of distinct messages rather than asingle message.

Many of the above-described features and applications can be implementedas software processes that are specified as a set of instructionsrecorded on a computer readable storage medium (also referred to ascomputer readable medium). When these instructions are executed by oneor more processing unit(s) (e.g., one or more processors, cores ofprocessors, or other processing units), they cause the processingunit(s) to perform the actions indicated in the instructions.Embodiments within the scope of the present disclosure may also includetangible and/or non-transitory computer-readable storage media forcarrying or having computer-executable instructions or data structuresstored thereon. Such non-transitory computer-readable storage media canbe any available media that can be accessed by a general purpose orspecial purpose computer, including the functional design of any specialpurpose processor. By way of example, and not limitation, suchnon-transitory computer-readable media can include flash memory, RAM,ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storageor other magnetic storage devices, or any other medium which can be usedto carry or store desired program code means in the form ofcomputer-executable instructions, data structures, or processor chipdesign. The computer readable media does not include carrier waves andelectronic signals passing wirelessly or over wired connections.

Computer-executable instructions include, for example, instructions anddata which cause a general purpose computer, special purpose computer,or special purpose processing device to perform a certain function orgroup of functions. Computer-executable instructions also includeprogram modules that are executed by computers in stand-alone or networkenvironments. Generally, program modules include routines, programs,components, data structures, objects, and the functions inherent in thedesign of special-purpose processors, etc. that perform particular tasksor implement particular abstract data types. Computer-executableinstructions, associated data structures, and program modules representexamples of the program code means for executing steps of the methodsdisclosed herein. The particular sequence of such executableinstructions or associated data structures represents examples ofcorresponding acts for implementing the functions described in suchsteps.

Processors suitable for the execution of a computer program include, byway of example, both general and special purpose microprocessors, andany one or more processors of any kind of digital computer. Generally, aprocessor will receive instructions and data from a read-only memory ora random access memory or both. The essential elements of a computer area processor for performing or executing instructions and one or morememory devices for storing instructions and data. Generally, a computerwill also include, or be operatively coupled to receive data from ortransfer data to, or both, one or more mass storage devices for storingdata, e.g., magnetic, magneto-optical disks, or optical disks.

In this specification, the term “software” is meant to include firmwareresiding in read-only memory or applications stored in magnetic storageor flash storage, for example, a solid-state drive, which can be readinto memory for processing by a processor. Also, in someimplementations, multiple software technologies can be implemented assub-parts of a larger program while remaining distinct softwaretechnologies. In some implementations, multiple software technologiescan also be implemented as separate programs. Finally, any combinationof separate programs that together implement a software technologydescribed here is within the scope of the subject technology. In someimplementations, the software programs, when installed to operate on oneor more electronic systems, define one or more specific machineimplementations that execute and perform the operations of the softwareprograms.

A computer program (also known as a program, software, softwareapplication, script, or code) can be written in any form of programminglanguage, including compiled or interpreted languages, declarative orprocedural languages, and it can be deployed in any form, including as astand-alone program or as a module, component, subroutine, object, orother unit suitable for use in a computing environment. A computerprogram may, but need not, correspond to a file in a file system. Aprogram can be stored in a portion of a file that holds other programsor data (e.g., one or more scripts stored in a markup languagedocument), in a single file dedicated to the program in question, or inmultiple coordinated files (e.g., files that store one or more modules,sub programs, or portions of code). A computer program can be deployedto be executed on one computer or on multiple computers that are locatedat one site or distributed across multiple sites and interconnected by acommunication network.

These functions described above can be implemented in digital electroniccircuitry, in computer software, firmware or hardware. The techniquescan be implemented using one or more computer program products.Programmable processors and computers can be included in or packaged asmobile devices. The processes and logic flows can be performed by one ormore programmable processors and by one or more programmable logiccircuitry. General and special purpose computing devices and storagedevices can be interconnected through communication networks.

Some implementations include electronic components, for examplemicroprocessors, storage and memory that store computer programinstructions in a machine-readable or computer-readable medium(alternatively referred to as computer-readable storage media,machine-readable media, or machine-readable storage media). Someexamples of such computer-readable media include RAM, ROM, read-onlycompact discs (CD-ROM), recordable compact discs (CD-R), rewritablecompact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM,dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g.,DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SDcards, micro-SD cards, etc.), magnetic or solid state hard drives,read-only and recordable Blu-Ray® discs, ultra density optical discs,any other optical or magnetic media, and floppy disks. Thecomputer-readable media can store a computer program that is executableby at least one processing unit and includes sets of instructions forperforming various operations. Examples of computer programs or computercode include machine code, for example is produced by a compiler, andfiles including higher-level code that are executed by a computer, anelectronic component, or a microprocessor using an interpreter.

While the above discussion primarily refers to microprocessor ormulti-core processors that execute software, some implementations areperformed by one or more integrated circuits, for example applicationspecific integrated circuits (ASICs) or field programmable gate arrays(FPGAs). In some implementations, such integrated circuits executeinstructions that are stored on the circuit itself.

As used in this specification and any claims of this application, theterms “computer readable medium” and “computer readable media” areentirely restricted to tangible, physical objects that store informationin a form that is readable by a computer. These terms exclude anywireless signals, wired download signals, and any other ephemeralsignals.

CONCLUSION

A system and method has been shown in the above embodiments for theeffective implementation of a system and method for communicationbetween programmable base stations and software-defined radio accessnetwork controllers. While various preferred embodiments have been shownand described, it will be understood that there is no intent to limitthe invention by such disclosure, but rather, it is intended to coverall modifications falling within the spirit and scope of the invention,as defined in the appended claims. For example, the present inventionshould not be limited by software/program, computing environment, orspecific computing hardware.

The invention claimed is:
 1. A method as implemented in a radio accessnetwork (RAN) controller during power up of a base station comprising:(a) receiving, from a base station, an Authentication Request messagecomprising an identity of the base station, the RAN controller; (b)authenticating the received identity of the base station against adatabase of registered base stations; (c) transmitting a result of theauthentication in step (b) as an Acknowledgement message; (d) when theresult of the authentication is valid, receiving, from the base station,a Report message comprising a time stamp and a status of the basestation; (e) when the received status in step (d) indicates that thebase station is active, transmitting, to the base station, aConfiguration message comprising profile information for at least oneRAN slice called default RAN slice to be activated in the base station,wherein the default RAN slice is programmed to serve all mobile usersthat are not part of any RAN slices pre-programmed in the base stationbefore power up; and (f) receiving, from the base station, anAcknowledgement message upon successful programming of the default RANslice.
 2. The method of claim 1, wherein the Authentication Requestmessage in step (a) further includes an IP address of the base station.3. The method of claim 1, wherein the Authentication Request message instep (a) further includes GPS coordinates associated with the basestation.
 4. The method of claim 1, is implemented using a CommunicationsAgent in a RAN controller and by using the same Communications Agent inthe base station, the two Communications Agents interconnected with adedicated control channel, the Communications Agent in the RANcontroller programming RAN slices in those base stations withCommunication Agents, each slice having a profile description; theCommunications Agent further comprising the subsystems of: a layer 1-3protocol stack to control and process incoming/outgoing control trafficbetween base station and RAN controller, (1) admission control moduleimplementing an admissions control algorithm determining whether toadmit a flow for the given profile, (2) handoff control module definingand implementing a handoff operation from the serving base station tothe target base station for the given profile, (3) scheduling moduledefining and implementing a scheduling operation for the given profile,and (4) a radio resource mapping module mapping virtual resources fromall active virtualized instances to one or more physical radioresources.
 5. The method of claim 1, wherein active profiles in the RANresult in dynamic slicing of the RAN, where each RAN slice spans a givengeography and a subset of the wireless resources within this geography.