Methods and Systems for Dynamic Spectrum Arbitrage Based On Anticipated Traffic Load

ABSTRACT

Methods and system are provided for managing and monitoring allocation of RF spectrum resources based on time, space and frequency. A network may be enabled to allocate excess spectrum resources for use by other network providers on a real-time basis. Allocated resources may be transferred from one provider with excess resources to another in need of additional resources based on contractual terms or on a real-time purchase negotiations and settlements. A network may be enabled to monitor the use of allocated resources on real-time basis and off-load or allow additional users depending on the spectrum resources availability. Public safety networks may be enabled to make spectrum resources available to general public by allocating spectrum resources and monitoring the use of those resources. During an emergency, when traffic increases on a public safety network, the public safety networks may off-load bandwidth traffic to make available necessary resources for public safety users.

CROSS REFERENCE TO RELATED PATENT APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.14/591,095 entitled “Methods and Systems for Dynamic Spectrum Arbitrage”filed on Jan. 7, 2015, which is a continuation of U.S. patentapplication Ser. No. 14/166,127 entitled “Methods and Systems forDynamic Spectrum Arbitrage” filed on Jan. 28, 2014, which is acontinuation of U.S. patent application Ser. No. 13/181,764 filed onJul. 13, 2011, issued on Apr. 29, 2014 as U.S. Pat. No. 8,711,721, whichclaims the benefit of priority to U.S. Provisional Patent Applications:61/364,670 filed on Jul. 15, 2010; 61/410,721 filed on Nov. 5, 2010;61/479,702 filed on Apr. 27, 2011; and 61/490,471 filed on May 26, 2011,the entire contents of each of which are hereby incorporated byreference for all purposes.

This application is also related to U.S. Pat. No. 8,279,786 entitled“Methods and Systems for Dynamic Spectrum Arbitrage” filed on Jun. 21,2012, and U.S. patent application Ser. No. 13/693,441 entitled “Methodsand Systems for Dynamic Spectrum Arbitrage” filed on Dec. 4, 2012, whichare also continuations of U.S. patent application Ser. No. 13/181,764.

BACKGROUND

With the ever increasing use of wireless communication devices foraccessing networks and downloading large files (e.g., video files),there is an increasing demand for radio frequency spectrum. Smart phoneusers complain about dropped calls, slow access to the Internet andsimilar problems which are due largely to too many devices trying toaccess finite RF bandwidth allocated to such services. Yet parts of theRF spectrum, such as the RF bands dedicated to emergency services (e.g.,police, fire and rescue, etc.) go largely unused due to thenon-continuous and episodic employment of such voice-radio communicationbands.

SUMMARY

According to a first embodiment, a method for dynamically managing radiofrequency (RF) spectrum resources in frequency, space and time includesmonitoring the use of RF spectrum resources at a first network anddetermining an amount of unused RF spectrum resources in the firstnetwork. The method includes allocating a portion of the amount ofunused RF spectrum resources of the first network for use by secondaryusers and receiving a request for additional RF spectrum resources froma second network. The method includes providing the second networkaccess to the unused RF spectrum resources of the first network. Themethod may include off-loading a secondary user from the first network.

According to another embodiment, a communication system comprising aserver configured with server-executable instructions to performoperations comprises a dynamic spectrum arbitrage and management. Themanagement enables radio frequency spectrum to be made available to RFdevices in frequency, space and time as described herein. In anotherembodiment, a server configured with server-executable instructions toperform operations comprises a dynamic spectrum arbitrage andmanagement. The management enables radio frequency spectrum to be madeavailable to RF devices in frequency, space and time.

In another embodiment, radiofrequency spectrum clearinghouse includes aserver for monitoring the use of RF spectrum resources. Theclearinghouse determines an amount of unused RF spectrum resources in afirst communication system and allocates a portion of the amount ofunused RF spectrum resources for use by secondary users. The serverforms allocated shares of the unused RF spectrum resources of the firstcommunication system. The allocated shares are to be utilized by asecond communication system. The server may communicate the availabilityof the allocated shares to the second communication system.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated herein and constitutepart of this specification, illustrate exemplary embodiments of theinvention, and, together with the general description given above andthe detailed description given below, serve to explain features of theinvention.

FIG. 1 is a system block diagram illustrating call volume requests madeto a cellular communication network under normal conditions.

FIG. 2 is a system block diagram illustrating call volume requests madeto a cellular communication network under an emergency situationcondition.

FIG. 3 is a system block diagram illustrating call volume requests madeto a cellular communication network under an emergency situationcondition when a first responder arrives on the scene.

FIG. 4 is a system block diagram illustrating call volume requests madeto a cellular communication network as additional emergency responsepersonnel arrive on the scene.

FIG. 5 is a system block diagram illustrating call volume requests madeto a cellular communication network after an emergency situation hasbeen alleviated.

FIG. 6 is a process flow diagram of an embodiment method for managingTiered Priority Access (TPA) operations on a network.

FIG. 7 is a process flow diagram of another embodiment method formanaging TPA operations on a network.

FIG. 8 is an example hierarchical table of classes of users givenpriority access to emergency communication resources.

FIG. 9 is a communication system block diagram of a Dynamic SpectrumArbitrage (DSA) communication system according to an embodiment.

FIG. 10 is a communication system block diagram of a DSA communicationsystem according to an embodiment.

FIG. 11 is a communication system block diagram of a DSA communicationsystem according to an embodiment.

FIG. 12 is a communication system block diagram of a DSA communicationsystem illustrating an embodiment for providing master control for thearbitrage process.

FIG. 13A is a diagram of RF spectrum illustrating its allocationaccording to an embodiment.

FIG. 13B is a diagram illustrating a manner in which RF spectrum may beallocated for use according to an embodiment.

FIG. 14 is a block diagram illustrating the manner in which RF spectrummay be allocated with a guard band for use according to an embodiment.

FIG. 15 is a diagram illustrating a manner in which RF spectrum may bepooled for use allocation according to an embodiment.

FIGS. 16A-16C are block diagrams illustrating a manner in which spectrumis allocated for Mobile Virtual Network Operators (MVNO).

FIG. 17 is a communication system block diagram of a DSA communicationsystem illustrating communication between components of the system forallocating resources according to an embodiment.

FIG. 18 is a communication system block diagram illustratingcommunications between components of two networks in a DSA communicationsystem during resource reservation according to an embodiment.

FIG. 19 is a communication system block diagram of a DSA communicationsystem illustrating bifurcation of resources at an eNodeB according toan embodiment.

FIG. 20 is a communication system block diagram of a DSA communicationsystem illustrating Serving Gateway (SGW) and Gateway (PGW) linkbandwidth allocation and capacity control according to an embodiment.

FIG. 21 is a communication system block diagram of a DSA communicationsystem illustrating combining the x-furcation of resources at an eNodeBand SGW and PGW link bandwidth allocation with capacity controlaccording to an embodiment.

FIG. 22 is a communication system block diagram of a DSA communicationsystem illustrating spectrum allocation based on license and regionalarea methods according to an embodiment.

FIG. 23A is a diagram illustrating typical RF spectrum allocation in alicensed area according to an embodiment.

FIG. 23B is a diagram illustrating RF spectrum allocation in a DSAcommunication system based on license area according to an embodiment.

FIG. 24 is a diagram illustrating spectrum allocation in a DSAcommunication system based on regional area according to an embodiment.

FIG. 25A is a communication system block diagram of a DSA communicationsystem illustrating a situation where the subscriber is using a firstcarrier (carrier A) according to an embodiment.

FIG. 25B is a communication system block diagram of a DSA communicationsystem illustrating a situation in which a subscriber is using a secondcarrier (carrier B) in a de facto type roaming arrangement for spectrumoff-loading according to an embodiment.

FIG. 26A is a communication system block diagram of a DSA communicationsystem illustrating a situation in which the subscriber is using a firstcarrier (carrier A) for both public safety and commercial DSA schemesaccording to an embodiment.

FIG. 26B is a communication system block diagram of a DSA communicationsystem illustrating a situation in which based on the services beingused, geographic location or time the subscriber can use carrier Bresources in a de facto short term lease using DLS according to anembodiment.

FIG. 27A is a communication system block diagram of a DSA communicationsystem illustrating a normal operation situation according to anembodiment.

FIG. 27B is a communication system block diagram of a DSA communicationsystem illustrating additional capacity and spectrum made available foruse by a subscriber according to an embodiment.

FIG. 28 is a process flow diagram illustrating an embodiment method fornetwork selection and reselection in a DSA communication system.

FIG. 29 is a communication block diagram of a DSA communication systemillustrating TAI routing areas where the home non-DSA user equipmentuses one TAI element (TAI) and DSA user equipment use another TAI.

FIG. 30 is a communication block diagram of a DSA communication systemillustrating high level tracking and monitoring of RF spectrum resourceallocations and use according to an embodiment.

FIG. 31 is a communication block diagram of a DSA communication systemillustrating integration required for full mobility between visiting andhome networks.

FIG. 32 is a communication block diagram of a DSA communication systemillustrating media independent handover of user equipment from onenetwork to another according to an embodiment.

FIG. 33 is a communication block diagram of a DSA communication systemillustrating data flow for initiating a network handover according to anembodiment.

FIG. 34 is a communication system block diagram of a DSA communicationsystem illustrating providing user equipment access to several RadioAccess Terminals (RAT) according to an embodiment.

FIG. 35 is a message flow diagram illustrating message communicationsbetween components of a DSA communication system according to anembodiment.

FIGS. 36-40 are process flow diagrams of embodiment methods forallocating and accessing resources using the DSA communication system.

FIG. 41 is a message flow diagram illustrating in more detail messagecommunications between components of a DSA communication systemaccording to an embodiment.

FIGS. 42-44 are process flow diagrams of embodiment methods foroff-loading communication sessions from a host network.

FIGS. 45-49 are process flow diagrams of embodiment methods forallocating and accessing resources in a public safety network using theDSA communication system.

FIGS. 50-53 are process flow diagrams of embodiment methods foroff-loading communication sessions from a public safety network.

FIGS. 54-56 are process flow diagrams of embodiment methods for enablingan authorized public safety authority to access the public safetynetwork using a wireless device from another network.

FIG. 57 is a component block diagram of a server suitable for use withan embodiment.

DETAILED DESCRIPTION

The various embodiments will be described in detail with reference tothe accompanying drawings. Wherever possible, the same reference numberswill be used throughout the drawings to refer to the same or like parts.References made to particular examples and implementations are forillustrative purposes, and are not intended to limit the scope of theinvention or the claims.

As used herein, the terms “mobile device,” “wireless device” and “userequipment (UE)” may be used interchangeably and refer to any one ofvarious cellular telephones, personal data assistants (PDA's), palm-topcomputers, laptop computers with wireless modems, wireless electronicmail receivers (e.g., the Blackberry® and Treo® devices), multimediaInternet enabled cellular telephones (e.g., the iPhone®), and similarpersonal electronic devices. A wireless device may include aprogrammable processor and memory. In a preferred embodiment, thewireless device is a cellular handheld device (e.g., a mobile device),which can communicate via a cellular telephone communications network.

A high priority in responding to any emergency or disaster situation isestablishing effective communications. In large scale emergency ordisaster (both manmade and natural) situations, it is paramount tomaintain communications between all first responders and emergencypersonnel in order to respond, manage, and control the emergencysituation effectively. In the absence of effective communication amongfirst responders and other emergency personnel, resources may not beeffectively mobilized to the areas which need the resources most. Evenin minor emergency situations (e.g., traffic accidents and fires), firstresponders must be able to call on support assets and coordinate withother services (e.g., public utilities, hospitals, etc.). With theubiquity of wireless device ownership and usage, emergency communicationvia wireless devices using commercial cellular communication networksoften are the most efficient and effective means to mobilize emergencyresponse personnel and resources. Enabling wireless devices to provideeffective emergency communications obviates the technical challenges andexpense of coordinating radio frequencies among various first responderagencies (e.g., police, fire, ambulance, FEMA, public utilities, etc.).Also, qualified first responders to an accident who are off duty or notordinarily equipped with radios (e.g., doctors, nurses, retired police,or military personnel) will have or can quickly borrow a wirelessdevice.

Emergency communications over cellular communication networks is notwithout problems, however. As discussed above in the Background,cellular communication networks (“networks”) are designed to accommodateaccess requests from only a fraction of the total number of wirelessdevices in a particular cell. At times of emergency or crisis, networkresources may become overtaxed when predictable human responses to thesituation prompt an extraordinary number of wireless device users withina particular cell to access the network at the same time. Wirelessdevice users may be attempting to alert emergency personnel of theemergency situation (such as a 911 emergency call) or to alert friendsor family members that the user is safe despite being in the area of anemergency situation. Some users may be transmitting images of theemergency condition (fire, accident, etc.) to news services or friends.In a wide scale situation, emergency responders using wireless devicesfor emergency communications will add to the call volume. Regardless,the predictable increase in call volume during an emergency situationcan overwhelm a commercial cellular communications network, particularlyin the cell zone encompassing the emergency, thus rendering the networkunreliable for emergency response personnel communication usage.

To illustrate the problem, consider the case of a traffic accidentoccurring on the highway. FIG. 1 illustrates a cellular communicationnetwork under normal conditions. As illustrated, multiple wirelessdevices 101(a-g) are wirelessly connect to the cellular communicationnetwork via a base station 102 servicing a particular cell 100. The basestation 102 connects via a base station controller (BSC)/radio networkcontroller (RNC) 103 to a Mobile Switching Center (MSC) 104. The MSC 104contains both a public switched telephone network (PSTN) interface andan Internet interface. Calls made to and from any of the multiplewireless devices 101(a-g) may be routed via conventional landlines overthe PSTN 105 or Internet 106 using VOIP. Calls between conventionallandline telephone stations and any one of wireless devices 101(a-g) maybe routed over via the PSTN or Internet. Calls between wireless devices101(a-g) may be routed over the PSTN or Internet to similar MSC 104,BSC/RNC 103, and base station 102 located near the initiating orintended wireless device 101(a-g).

FIG. 1 illustrates the typical situation in which a fraction of thewireless devices within a cell access the network at the same time. Forexample, FIG. 1 shows seven separate wireless devices 101(a-g) locatedwithin the cell, only three of which (101 c, 101 d, and 101 e) arecurrently accessing the network. Thus, the network is operating wellwithin its operating parameters and all requests to the network fromwireless devices 101(a-g) are granted. It is noted that all wirelessdevices 101(a-g) that are turned on but not in use continue tocommunicate with the base station 102 via a link management channel (notillustrated). The network uses these communications to keep track of thewireless devices 101(a-g) within each cell to support call routing.However, the amount of information communicated between all wirelessdevices 101(a-g) and the base station 102 for such tracking purposes issmall (particularly in contrast to the bandwidth required for a normaltelephone call), so the number of on-but-inactive wireless devices 101within a cell normally will not overwhelm the network.

This normal functioning of the cellular network can be disrupted when,for example, an accident stops traffic, prompting delayed drivers tosimultaneously use their wireless devices to alert emergency personnelof the traffic accident (emergency 911 call) or contact friends, familymembers, business associates, etc., to inform them of the delay. FIG. 2illustrates a cellular communication network in such an emergencysituation. In this illustration, a truck 107 in the vicinity of basestation 102 is on fire. Predictably, the truck 107 fire prompts most ofthe wireless devices 101(a-g) users within the vicinity to access thecellular network at approximately the same time. This causes an overloadcondition in the cell by exceeding the bandwidth of the carriers on thelocal base station 102. Consequently, some of the wireless devices 101b, 101 f will not be granted access to the network, and new networkaccess requests may be denied until communication channels open up. Thiscommunication bottleneck may worsen the emergency situation by delayingthe response by emergency personnel and denying first responders witheffective communication over the network.

This problem is exacerbated in disaster situations involving manyvictims and large areas, such as wildfires, floods, hurricanes, tornadosand terrorist attacks. As witnessed during the September 11^(th) attackand Hurricane Katrina, large disasters can destroy part of the cellularand landline telephone network infrastructure, leaving the remainingnetwork more vulnerable to overload conditions. Network overloads duringdisaster events are particularly troublesome since such situationsnaturally involve widespread confusion and require close coordinationamong a large number of emergency and relief personnel.

If a disaster situation will persist long enough (e.g., a flood orhurricane situation), additional cellular communication capacity can beadded to a region by activating a deployable cellular communicationsystem to provide emergency response teams and personnel with theability to communicate. Such recently developed deployable units,referred to herein as a “switch on wheels,” can include a CDMA2000 basestation and switch, Land Mobile Radio (LMR) interoperability equipment,a satellite Fixed Service Satellite (FSS) for remote interconnection tothe Internet and PSTN, and, optionally, a source or remote electricalpower such as a gasoline or diesel powered generator. A more completedescription of an example deployable switch on wheels is provided inU.S. patent application Ser. No. 12/249,143, filed Oct. 10, 2008, theentire contents of which are hereby incorporated by reference in theirentirety.

These switch on wheels are effectively mobile cellular base stationswhich may be deployed in a disaster area and operate as a cellular towerantenna. The switch on wheels sends and receives communication signalsfrom a plurality of wireless devices 101 and serves as a gateway portalto the rest of the conventional communications infrastructure.Communications between the switch on wheels and a wireless device 101 isbroken down into packets for transport as a VOIP communication, and maybe transmitted via satellite to a ground station outside the disasterarea from which the call is forwarded through the telephone network tothe recipient. Even with the added bandwidth provided by deployableswitch on wheels, network overloads may still cause communication delayand frustration to emergency response personnel.

To overcome such problems in the event of a national emergency, the WPAsystem was developed. Conventional WPA systems provide selectedemergency leadership with preemptive access to cellular communicationnetworks. However, conventional WPA systems do not permit calls made tothe wireless device of a registered WPA authority. In other words, whilewireless devices registered for WPA service may be given priority accessfor placing calls on the network, there are no provisions in the WPAsystem enabling those very same wireless devices to receive calls.Incoming calls to wireless devices in a command center may be just asimportant as outgoing calls. Also, conventional WPA systems assume thatif an authorized user needs to make a call, the call will be made fromtheir pre-registered wireless device. However, there may be instanceswhere the authorized personnel do not have their pre-registered wirelessdevice. Alternatively, the wireless device may be damaged. Provisionsmust be made to enable the authorized personnel access to an overloadednetwork. Also, emergency personnel who have not previously registeredtheir wireless device on the WPA system cannot access overloadedcellular communication networks “on the fly.” Many times, off duty,junior, volunteer emergency response personnel may be the firstresponders on the scene on an incident. Such personnel may not beentitled to conventional WPA which is designed to address the needs ofthe leadership. Thus, precisely the personnel who can quickly alleviatea situation given their proximity on the scene are unlikely notpre-registered and authorized for conventional WPA.

To overcome these limitations with conventional cellular communicationnetworks and conventional WPA, the various embodiments provide TieredPriority Access (TPA) capabilities to deliver Quality of Service(QoS)/Grade of Service (GOS) wireless device communications for firstresponders for calls both originated and terminated at a mobile handset.The various embodiments are particularly aimed at the needs of firstresponders at the very start of an emergency event.

TPA as its name implies aims to provide a tiered response to networkcapacity requirements. The tiered response mirrors typical communicationrequirements at the incident scene as more responders appear to helpresolve the problem(s) at hand. When an incident occurs first respondersare either at the incident scene or begin to respond. First respondersreporting to an incident initially arrive on scene in small numbers andmay grow in direct response to the magnitude and severity of theincident.

To accommodate this predictable response, TPA enables an escalation andde-escalation process based upon call volume as first responders arriveon scene and depart as the situation is restored to normal.

In overview, the various embodiments work as follows. During normaloperation, cellular call volume through particular base stations ismonitored to determine if the network is reaching capacity limits. Callvolume may be monitored based on current calls, attempts to access thenetwork, engaged bandwidth, or other methods known to cellular serviceproviders. Call volume may be locally monitored at the base station 102,at a BSC/RNC 103, or an MSC 104 or, in an embodiment, centrally, such asin a Network Operation Center (NOC). Such monitoring is at the cellularlevel, since normal emergency situations are most likely to impact oneor two cell zones, although TPA will work in a similar fashion in theevent of a widespread emergency. When call volume in a cell exceeds athreshold value preselected by the service provider and/or emergencyresponse planners, the system allocates one channel in the affected celltower to TPA operation.

FIG. 2 illustrates a situation in which call volume has exceeded athreshold indicating that TPA should be implemented. As shown in FIG. 2,more wireless devices 101 in the cell supported by the base station 102are attempting to access the network than the network can connect. As aresult, only some of the wireless devices 101 a, 101 c, 101 d, 101 e and101 g will be able to place or receive calls (shown as solid black),while others will be denied access to the network (shown as white). Inthis situation, call volume within the cell served by the base station102 has exceeded the threshold, so one of the communication channels onthe antenna will be allocated to TPA operation. However, the channelremains available to general public use until a TPA-authorized call isplaced. Thus, no change in the communication network is shown in FIG. 2.

The various embodiments address this overload condition in order toallow emergency personnel to use the cellular communication network asthey arrive on scene, as is illustrated in FIG. 3. When an emergencyresponder 108 arrives on scene, that individual may initiate a wirelesstelephone call. If a communications channel has been allocated to TPAoperation and the emergency responder's wireless device ispre-registered as a TPA-authorized wireless device, the network canrecognize the pre-registered TPA authorized wireless device from thewireless device's unique ID and recognizes the call as a TPA-call. Thebase station 102, BSC/RNC 103 or the MSC 104 may ensure the TPA call isconnected. If necessary, the bandwidth allocated to civilian wirelessdevice users is reduced and one or more non-emergency calls may bedropped to enable the TPA call to be connected. This is illustrated inFIG. 3 as the connection to wireless device 101 c has been dropped anddenied further access to the network (illustrated as a white lightningbolt), and the TPA call (illustrated as a dashed black lighting bolt) bythe emergency responder 108 is connected.

As additional emergency personnel 109 arrive on scene of the emergency,additional TPA calls may need to be connected as illustrated in FIG. 4.To accommodate the increase in TPA calls, additional network resourcesmay be automatically allocated to TPA operation in order to provideemergency responders reliable cellular communications. This isillustrated in FIG. 4 which shows connected TPA calls with police 108and fire 109 personnel (illustrated as a dashed black lighting bolts),while wireless devices 101 c and 101 d have been disconnect (illustratedas a white lightning bolts). Automatically allocating more resources toTPA use reduces the bandwidth available to the general public, whichwill limit general access to the network. However, emergency personnelare provided reliable access to the network so long as the heavy callvolume persists.

Eventually the emergency situation will be resolved and emergencypersonnel will begin to scene. As conditions return to normal, civiliancall volume should return to normal levels while the number of emergencyresponders requiring TPA-access will also decline. This is illustratedin FIG. 5 which shows that the fire has been extinguished and firemenhave left the scene. As traffic begins returning to normal flow fewergeneral population wireless devices 101 a-g access the networksimultaneously. With cellular communications returning to normal,cellular communications resources may be released from TPA operations,restoring the network to normal operations. As illustrated, theremaining emergency personnel 108 are connected to the cellularcommunication network in the normal fashion as the call volume hasdecreased to the point that TPA operation has been terminated.

When TPA operation is implemented on one or more communication channels,the cellular system (e.g., locally in the base station, BSC/RNC, or MSC,or in a central location such as a NOC) monitors incoming and outgoingcalls to determine whether any calls are coming from or directed toemergency response personnel. This may be accomplished by recognizing anoriginating or destination wireless device as being TPA pre-registeredwireless device. Alternatively, the system may recognize emergencyresponse personnel when they complete a special dialing procedure suchas the *272 dialing procedure described below.

Wireless devices can be pre-registered for TPA use by authorized users.This may be accomplished by registering as a qualified emergencyresponder (e.g., according to criteria established by governmentalauthorities) with the cellular network provider. As is well known in thetelecommunications art, all wireless devices 101 which access thecellular communication are assigned a unique identification number. Inthe pre-registration process, the cellular network provider stores thewireless device's unique identification number in a database ofauthorized TPA personnel. The cellular network provider may also issuethe individual a unique Personal Identification Number (PIN) for use inimplementing TPA preemption from a non-TPA wireless device as describedmore fully below.

If the emergency responder's wireless device is not pre-registered (suchas a borrowed phone), and the network is overload, the emergencyresponder may be unable to access network resources. In this situation,the emergency responder can activate the embodiment TPA from anon-registered wireless device 101 by first dialing *272 followed by apersonal identification number (PIN) and the telephone number. Thenearest base station 102 to the non-registered wireless device 101receives the transmission from the wireless device 101 indicating thatthe wireless device is initiating a call. The base station 102 (orBSC/RNC 103 connected to the receiving base station) recognizes the *272special dialing prefix and starts to route the call to the appropriatedestination. Alternatively, recognition and routing of the #272 dialingprefix may be accomplished at the MSC 104. This destination may be theclosest PSAP or central location with a database of PINs. The *272 callis similarly processed at the BSC/RNC 103 and later MSC 104 as the callproceeds through the communication network system. The BSC/RNC 103 andMSC 104 controlling the base station antenna 102 and other associatedantennae are programmed to recognize the special dialing procedure usinga database of pre-registered first responder PINs. This PIN database maybe stored at the MSC 104 or at another central location such as a NOC.If the received PIN matches a record in the PIN database, the MSC 104may immediately give the caller preemptive access to the network just asif the call had been made from a TPA-registered wireless device asdescribed above. In order to support this capability, a TPA-allocatedchannel reserves sufficient open capacity during TPA-operation toreceive and recognize *272 dialed calls. If the communication channel isat capacity and a dialed number does not begin with *272, the call ispromptly dropped with no attempt to complete the call. However, if thedialed number begins with *272, the MSC 104 completes the process ofcomparing the entered PIN to the PIN database and the temporarilyregistering the call as a TPA-authorized wireless device. Non-TPA callsmay be dropped if necessary in order to retain sufficient capacity toreceive and recognize *272 calls.

While reference is made throughout the application to the MSC 104monitoring and providing the TPA capability, it should be appreciated byone of skill in the art that other elements of the communication systemmay implement the various method steps. These elements may include, butare not limited to equipment collocated with the base station antenna102, the BSC/RNC 103, or a NOC.

Once a wireless device has been recognized as a TPA-phone by means ofthe *272 dialing procedure, the MSC 104 will track the wireless deviceand continue to treat it as if it were a TPA-registered wireless deviceso long as at least one communication channel is allocated to TPAoperation. Using the unique identification number assigned to thewireless device, the MSC 104 will recognize subsequent calls from thewireless device as TPA-calls without the need for the user to repeat the*272 dialing procedure. Similarly, the MSC 104 can identify incomingcalls to the first responder that should receive TPA preemption service.Thus, a first responder 108 using a non-registered wireless device canregister the wireless device “on the fly” when TPA is implemented forboth incoming and outgoing calls by using the *272 dialing procedure tocall one number (such as a dispatcher or “911”).

In an embodiment, a TPA authorized user with a PIN can authenticate anynumber of wireless devices using the *272 dialing procedure describedabove. This embodiment will enable first responders, such as apoliceman, fireman or emergency medical technician, to “deputize”volunteers, such as military personnel, doctors or retired policementhat they find on the scene, thus creating a reliable ad hoc emergencycommunication network. Since the temporary TPA-authorization of awireless device established by the *272 dialing procedure is rescindedas all communication channels in the affected area return to normaloperation (i.e. cease TPA operation), there is limited concern that theTPA system could be compromised for subsequent emergencies provided theauthorized user's PIN is not revealed. Even if the PIN is revealed, thePIN can be easily changed without significant impact since TPAimplementation is expected to be an infrequent, random and episodicevent.

In a further embodiment, a user of a TPA-registered wireless device whodoes not have (or forgot) a PIN can register another phone “on the fly,”thereby “deputizing” it for the duration of the TPA event by simplyinitiating the special dialing procedure on any wireless device. Forexample, the first responder may use a TPA-registered wireless device todial the number of the wireless device to be “deputized” followed by*272 (any dialing prefix or postscript may be used). When this call isreceived by the MSC 104, the *272 prefix or postscript is recognized asindicating that the dialed number is to be treated as a temporaryTPA-authorized wireless device, allowing it to store the unique ID ofthe called wireless device in a database for tracking such temporary TPAauthorizations. Using this capability, a first responder can quicklydeputize one or more volunteers simply by calling their numbers.

In still a further embodiment, emergency response personnel whoseposition does rise to the level of qualifying for pre-registration TPAservice or PIN may still be the first emergency personnel on the sceneof an emergency situation. The user may use his/her non pre-registeredwireless device to initiate a *272 special dialing procedure. The callmay be forwarded to a PSAP which may issue a temporary PIN and add thewireless device to the database of temporary TPA authorizations.

Alternatively, if the user initiates a *272 special dialing (or similardialing procedure such as 911), the call may be forwarded to a PSAP. Inlarge scale crisis situations, the answering PSAP may be disabled orunable to answer quickly due to the large incoming call volume. In suchsituations, if the *272 call is not answered by the PSAP within apredetermined time frame a temporary TPA authorization may beautomatically issued. Since the circumstances surrounding the issuanceof the temporary TPA authorization have not been fully analyzed by aPSAP operator, it is unclear whether the user receiving the temporaryTPA authorization is properly authorized. Accordingly, the temporary TPAauthorization may be flagged on the PSAP monitor for possibledeactivation or investigation.

In a further embodiment, the cellular network is configured to givecalls from a TPA-registered wireless device and (optionally) temporaryTPA-authorized wireless devices priority when dialing to a civilian(i.e., non-TPA authorized) wireless device within the cell zone(s)implementing TPA operations. When such a call is made, the MSC 104 isprogrammed to route the call to the dialed wireless device through thecommunication channel or channels allocated to TPA operation. If aTPA-allocated channel is at capacity when the call from a TPA-authorizedwireless device is received for a civilian wireless device, anothercivilian wireless device call is dropped in order to provide sufficientcapacity to complete the call, with the associated preemption processbeing used to prevent another 911 call from being dropped. Thisembodiment gives emergency personnel the ability to dial-into anemergency. For example, emergency personnel can use this capacity tocall back a civilian who initially called 911 to report an emergency inorder to request an update from a potential eye witness. As anotherexample, a first responder can call volunteers within the emergencyscene without deputizing their phones, assured of being able to reachthe volunteers even though the communications network is otherwiseoverwhelmed.

TPA operations may be implemented in two embodiments of the presentdisclosure. In a first embodiment described below with reference to FIG.6, one or more cellular communication channels are dedicating to TPAcalls, providing emergency personnel with dedicated communicationcapacity while leaving the remaining communication channels to thegeneral public. In a second embodiment described below with reference toFIG. 7, call preemption for TPA calls is implemented only as a TPAallocated communication channel reaches capacity. These embodiments aredescribed separately below.

FIG. 6 illustrates an example process flow of steps that may be taken toimplement the first embodiment of TPA that may be operable with acomputing device having a processor. During normal operations cellularcommunication network call volume is monitored, block 201. Inparticular, the cellular communication network call volume (or number ofaccess requests or engaged bandwidth) are compared against apredetermined threshold (for example 85% of maximum capacity), block202. If the call volume is below the predetermined threshold a normalsituation is assumed to exist, so the monitoring process returns toblock 201 to continue monitor call volume. If, however, the call volume(or number of access requests or engaged bandwidth) exceeds thepredetermined threshold, an abnormal situation exists which may indicatethat an emergency situation is unfolding. To prepare for an emergencysituation, network resources (e.g., communication channels on aparticular base station antenna) are partitioned and reserved for TPAuse, block 203. By automatically allocating a communication channel toTPA use, the system permits a TPA-authorized wireless device to gainaccess to the network, even when the network is otherwise overloaded.However, TPA preemption does not occur until a TPA-qualified callerattempts to access an overloaded network.

Since the increased call volume may or may not be in response to anemergency situation, a communication channel allocated to TPA continuesto function normally, by handling civilian (i.e., non-TPA) calls in theordinary fashion. In instances where the increased call volume is simplydue to coincidental network requests and no TPA-qualified user isattempting to place a call, call preemption enabled by TPA is notneeded. Thus, the TPA threshold may be exceeded and TPA implemented evenwhen there is no actual emergency incident. Delaying actualimplementation of TPA preemption until the service is required by afirst responder increases the reliability of the network under normalcircumstances.

The system may be informed that an actual emergency situation isoccurring indicated by a TPA-authorized emergency response personnelplacing a TPA call within the affected cell zone. When the communicationchannel is in TPA mode, the cellular system (be it at the base station,BSC/RNC/MSC, or in a central location such as a NOC) monitors incomingand outgoing calls to determine whether any emergency response personnelis using a TPA-pre-registered wireless device or has completed a specialdialing procedure invoking TPA preemption, block 204. If no emergencyresponse personnel has initiated a call using a TPA-authorized wirelessdevice or the special dialing procedure, the system may continues tomonitor access requests, in block 204, as well as call volume, in block201, to determine if the communication channel should be released fromTPA operation, block 202.

If a call is initiated by a TPA-authorized wireless device, or if thecall is generated from a non pre-registered wireless device using the*272 dialing procedure, TPA is initiated, block 205. When TPA isinitiated, block 205, only emergency personnel previously registered orgiven clearance “on the fly” will be permitted access to the partitionedand reserved network resources. As noted above, TPA will normally beimplemented on a single communication channel initially, leaving theremaining channels to general public use. Then, if TPA-use exceeds thecapacity of the TPA-allocated network resources another resource can beconverted to TPA operation. By dedicating network resources to emergencypersonnel use one channel or one resource at a time, the remainingnetwork resources are left available for non-essential general publicuse. In addition, by dedicating network resources for emergencypersonnel communication, emergency personnel are able to both send andreceive calls on their wireless devices.

In an optional embodiment, upon the initiation of TPA, block 205, theMSC 104 may survey the wireless devices 101 located within the affectedcell or serviced by other base station antennae 102 within the sameBSC/RNC 103, to identify all registered or temporarily registered firstresponders. These first responders may be advised via SMS message (orother methods) that they can utilize the TPA service by placing a callor using the special dialing procedure, block 206.

In a further optional embodiment, the base station 102, BSC/RNC 103, orMSC 104 may also send messages to all non-emergency wireless devices 101a-g within the affected area/cell 100 advising them to avoid using theirwireless device 101 a-g except for Emergency 911 calls and to indicatethat emergency services have been notified, block 207. This messagingmay be initiated by the PSAP responsible for the incident area, by thelocal incident Command and Control authority, or by the network serviceprovider. Such messages may be delivered via SMS message or othercommunication means. The system may also notify callers connected to thechannel allocated to TPA use that their calls are being terminated priorto disconnecting the calls.

As the emergency situation continues to unfold and additional emergencyresponse personnel appear on the scene, additional network resources maybe required to support emergency personnel communication. Accordingly,the partitioned and dedicated network resource may be monitored todetermine if additional network resources should be partitioned andallocated to TPA. This may be accomplished by comparing the call volumeon the partitioned and dedicated network resource to a predefinedmaximum or minimum threshold, block 208. If call volume exceeds apredefined maximum (indicating an escalating situation), for example 25%usage of the partitioned and dedicated network resources in the cellsite/sector, additional dedicated network resources may be partitionedto TPA operation, block 211, to allow emergency response personnel tocommunicate.

In an embodiment, before terminating calls in order to allocate theadditional channel to TPA operation, non-essential (i.e., non-emergencypersonnel) wireless devices 101 that have a call or data sessions inprogress with the allocated channel may be informed with a warning toneand/or recorded announcement that their call is being terminated unlessa defined code is entered, block 210. This permits first responders tomaintain their calls by quickly entering a code (e.g., their PIN). If anin process call is an emergency 911 call, the defined code may besupplied by a PSAP.

In an embodiment, the system will continue to automatically retrieve andre-allocate network resources for emergency response personnelcommunication until all available network resources are dedicated toemergency response personnel use. Such an embodiment will maximizecommunication capabilities of emergency response personnel. Otherembodiments may reserve at least a minimum portion of network resource(e.g., one communication channel) to enable the general public theability to alert emergency response personnel to new or developingemergency situation, such as by placing 911 calls. Accordingly, otherembodiments may impose maximum limits to the amount of network resourcesthat are taken away from the general population and dedicated toemergency response personnel communication. To accomplish this, the MSC104 may determine whether the maximum amount of network resources havebeen partitioned and dedicated to emergency response personnelcommunication, in block 209. If the maximum amount of network resourceshave already been partitioned and dedicated, the MSC 104 may continue tomonitor the level of utilization of the partitioned and dedicatednetwork resources, in block 208. If the maximum amount of networkresources that can be partitioned and dedicated has not been reached,the MSC 104 may (optionally) inform current callers that calls are beingterminated, block 210, and reallocate network resources from generalpopulation usage to emergency response personnel communication use,block 211. Once the additional communication channel has been dedicated,the MCS 104 will return to monitoring the level of utilization of thepartitioned and dedicated network resources to determine if theemergency situation is escalating or de-escalating, block 208.

As emergency response personnel work to alleviate the emergency incidentand return conditions to normal, the need for network resources willdecrease as emergency personnel exit the scene. To enable the system toreturn to normal operations, the MSC 104 may continually monitor thecall volume on the partitioned and dedicated network resources for anindication of escalation or de-escalation, block 208. When the level ofuse of the partitioned and dedicated network resource drops below apredefined minimum, the MSC 104 may begin to re-allocate networkresources back to general public usage, block 212. Network resources maybe automatically re-allocated channel by channel, incrementally reducingthe resources allocated to emergency personnel usage, returning tonormal operations in a stepwise fashion.

By demobilizing network resources one channel or network resource at atime, the embodiment provides a flexible communication system which mayadapt to the situation as it evolves. If the situation requires more orless network resources for emergency personnel communication, theembodiment system and method can meet the demand while still providingsome network resources for the general public to use. The system maywait for a period of time after each release of a TPA-dedicated channelin order to accommodate surges in emergency personnel use during theevent wind-down phase, thereby avoiding having to repeat the process ofdropping callers, block 210, unnecessarily.

Once the cellular communication channel has been re-allocated forgeneral public usage, the MSC 104 determines if there are any morenetwork resources that are currently partitioned and dedicated foremergency personnel communication, block 213. If additional networkresources are currently partitioned and dedicated for emergencypersonnel communication, the MSC 104 returns to block 208 to determinewhether the emergency situation is escalating or de-escalating. As theemergency situation further de-escalates and returns to normal,emergency response personnel require less and less network resources tosupport their communications. Thus, the MSC 104 will continue toautomatically re-allocate network resources to general public usage inresponse to call volume, block 212, until all network resources are innormal operating configuration for general public use. The MSC 104 mayreturn to block 201 and may monitor call volume waiting for the nextemergency situation.

In the second embodiment, illustrated in the process flow diagram inFIG. 7, network resources are incrementally allocated to TPA use atlevel of individual calls by way of call preemption so that publicaccess to the network is maximized while meeting emergency personnel userequirements. During normal operations, cellular communication networkusage is monitored, block 302. Network access requests, call volume orengaged bandwidth may be compared to a predetermined threshold (forexample 85% of maximum capacity), block 304. If the usage is below thepredetermined threshold, a normal situation is assumed to exist, so themonitoring process returns to block 302 to continue monitoring callvolume. If, however, the usage exceeds the predetermined threshold, anabnormal situation exists which may indicate that an emergency situationis unfolding. To prepare for an emergency situation, network resources,such as a communication channel on an affected base station antenna, arepartitioned and reserved for TPA use, block 306. By automaticallyallocating a communication channel to TPA use, the system permits aTPA-authorized wireless device to gain access to the network, even whenthe network is otherwise overloaded. However, TPA preemption does notoccur until a TPA-qualified caller attempts to access an overloadednetwork.

Since the increased call volume may or may not be in response to anemergency situation, a communication channel allocated to TPA continuesto function normally by handling civilian (i.e., non-TPA) calls in theordinary fashion. In instances where the increased call volume is simplydue to coincidental call volume and no TPA-qualified user is attemptingto place a call, call preemption enabled by TPA is not needed. Thus, theTPA threshold may be exceeded and TPA implemented even when TPA callpreemption is not required. Delaying actual implementation of TPApreemption until preemption is required by a first responder increasesthe reliability of the network under normal circumstances.

With a network resource allocated to TPA operation, the cellular system(be it at the base station, BSC/RNC or in a central location such as anMSC) monitors incoming and outgoing calls, block 308. The TPA-allocatedchannel continues to function as a normal cellular communication channeluntil (a) the channel is at capacity (i.e., current call volume throughthe channel equals its maximum capacity) and (b) a TPA-qualifiedwireless device attempts to access the network to place or receive acall. Call volume on the TPA-allocated communication channel ismonitored to determine if a call must be dropped in order to connect aTPA-qualified call. Thus, when a new call is received (incoming oroutgoing) that will be allocated to the TPA-allocated channel, thesystem may first determine if that channel is presently at capacity(i.e., has as many calls connected as the channel can reliablymaintain), block 310. If the channel is not at capacity (i.e., there isexcess capacity on the network), the call may be connected, block 315.This monitoring of the TPA channel may prevent disconnecting a civiliancall if sufficient capacity exists on the channel to enable connectionof a new incoming or outgoing TPA call.

As discussed above, the system can recognize a TPA-authorized call bydetermining if the source or destination wireless device is aTPA-registered wireless device, block 312, and if not by the callercompleting a special dialing procedure. The dialing procedure may invokeTPA preemption, block 316. In block 315, the call may be connected. Forexample, if the caller is using (or the call is placed to) aTPA-registered wireless device the call may be connected. The call maybe connected if at least one non-TPA call is connected on theTPA-allocated channel, block 314 and capacity is released to sufficientto connect the TPA call, block 315. This allows the TPA-qualified firstresponder to make a call without delay even though the network is atcapacity. Similarly, if an incoming call is directed to a TPA-qualifiedwireless device, at least one non-TPA call on the TPA channel isterminated in order to connect the incoming call to the TPA-qualifiedwireless device. The process of terminating non-TPA calls from theallocated channel may continue as more calls to TPA-qualified wirelessdevices access the network.

If the caller is not using a TPA-registered phone and did not enter a*272 type dialing sequence, the call may be blocked, block 320, as anon-emergency call at a time when system resources are at capacity. Ifthe caller has entered the special dialing sequence (such as *272 plus aPIN), the entered PIN is compared to PIN values stored in a database(e.g., at the base station 102, BSC/RNC 103, or MSC 104) in block 318.If the PIN matches a registered emergency personnel, a non-TPA callconnected on the TPA-allocated channel, block 314, in order to releasecapacity sufficient to connect the TPA call, block 315.

The system may also monitor call volume on the TPA-allocated channel,block 322 to ensure sufficient capacity remains to accommodate furtheremergency personnel requirements. TPA-call volume (i.e., the volume ofcalls to/from TPA-qualified wireless devices) on a TPA-allocatedcommunication channel may be compared to a threshold value in block 322to determine when to allocate another communication channel to TPA use.If the TPA call volume threshold is exceeded (i.e., test 322=“Yes”),another channel will be allocated to TPA functions block 306, which isdiscussed above.

TPA-call volume on each TPA-allocated channel, block 322, as well ascall volume on all channels, block 324, may continue to be monitored.This may determine when TPA calls are no longer being made, as willoccur when the emergency is resolved and first responders leave thescene, or when total call volume returns to a level at which TPAoperation is no longer required. If call volume continues to exceed theTPA threshold, the system may continue to operate at least one channelin TPA mode, accepting calls, block 308, checking for TPA channel callvolume, block 310 and connecting calls, block 315, if the call isfrom/to a TPA authorized wireless device block 312 or if call volume isless than capacity. As TPA-call volume declines, the number of channelsallocated to TPA-operation can be reduced by releasing a TPA channel,block 326. The monitoring call volume and releasing of channels from TPAallocation will continue until all communication channels are returnedto normal operations. Also, if call volume on non-TPA channels dropsback to normal, the system may deactivate TPA operation on all allocatedchannels since the normal capacity of the network can accommodateTPA-qualified callers without the need for TPA preemption.

This second embodiment allows TPA-allocated channels to be operated in afashion that ensures every TPA-authorized caller can access the networkwhile providing maximum bandwidth possible to the general public.Monitoring of TPA channel call volume allows the system to avoiddropping civilian calls if sufficient capacity exists on the channel toenable connection of a new incoming or outgoing TPA call. If noemergency response personnel initiated a call using a TPA-authorizedwireless device or the special dialing procedure, the system maycontinue to monitor access requests, block 308, and the call volume,block 324, to determine if the communication channel should be releasedfrom TPA operation, block 326.

An additional embodiment provides prioritizing access to TPA-dedicatednetwork resources to enable highest priority callers to use the cellularcommunication network. In a situation where the number of emergencyresponders can exceed the capacity of the cellular network resources,this embodiment may enable high priority users, such as nationalleadership and on-site commanders, to preempt other, lower priorityusers in order to gain instant access to the network. High priorityusers can use their pre-registered wireless devices to gain access tothe network. The unique ID of their wireless devices can be used todetermine the priority of the user from a database of unique IDs.Similarly, high priority users can identify themselves to the networkusing the special dialing procedure, with a code or PIN providingsufficient information for the network (e.g., the MSC 104) to determinethe priority of the user from a database of PINs. Using the priorityvalue determined from a database, the network (e.g., the MSC 104) candetermine whether the present caller has a higher priority than anycallers already connected to TPA-allocated network resources. Assumingthe wireless device 101 is properly authorized, the call may be givenpriority in the queue on the TPA-allocated network resource so that theemergency personnel member using the pre-registered authorized wirelessdevice may be able to complete the call. If the network resource is atcapacity, a call from a person with a lower priority level may bedropped in order to free-up sufficient capacity to complete the call.

FIG. 8 illustrates an example hierarchy of emergency response personnel.Various other configurations are possible and other personnel may beincluded, and personnel roles or status may change based on events, forexample, the military commander 302 may assume the role of executiveleadership, etc. As shown in FIG. 8, Executive Leaders and Policy Makers301 may be given highest priority status. Members of this class maypre-register their wireless devices 101 such that the wireless device101 unique identifier is stored in a hierarchy database. If a call isplaced from any wireless device pre-registered to a member of theexecutive leader and policy maker class 301, the call is placed first inany queue of partitioned and dedicated network resources. Similarly,Disaster Response/Military Command and Control personnel 302 may beprovided the next highest priority class. Lower level priority may beafforded to line police and firefighters 306 and emergency medicaltechnicians 307. In all cases, wireless devices may be pre-registered sotheir unique identifiers and/or the user's PIN can be stored in ahierarchy database to support this embodiment.

The foregoing embodiments may also be implemented in a cellular systemusing a deployable “switch on wheels” cellular communication system.Since such systems may be implemented in large scale emergency/disastersituations with access limited to emergency responders and commandauthority, network overload will occur from too many authorized (i.e.,non-civilian) users placing calls at the same time. To ensure reliablecommunications in such cases, the deployable switch on wheels canimplement the caller priority embodiment so that callers with highestpriority (e.g., national and regional commanders) have assured access tocellular communications, while lowest priority authorized users may bedisconnected if necessary. In this embodiment, a database of authorizedusers indicating individual priority (hierarchy) levels (e.g.,illustrated in FIG. 8) may be maintained in a server within thedeployable switch on wheels.

The foregoing embodiments have been described as being implemented bythe MSC 104. One of skill in the art would appreciate that the foregoingembodiments may be implemented within a number computer switching systemelements within the cellular communications network, including but notlimited to the base station 102, BSC/RNC 103 or NOC. Monitoring of callvolume on communication channels and within a cell is performedautomatically already. Such systems may be reprogrammed to implement theforegoing embodiments so that the implementation of TPA operations isperformed automatically. Thus, the system can automatically recognizewhen call volumes exceed thresholds so that a communication channelshould be allocated to TPA operation. The system can further recognizeTPA authorized calls as described above and dedicate network resourcesand perform the call connections and disconnections described aboveautomatically. Similarly, as call volume declines below the TPAthreshold levels, the systems can automatically return the network tonormal configuration. In this manner, the cellular communication networkcan respond to emergency situations to enable assured communications foremergency personnel without the need for human action or intervention.For example, even if an event goes unreported (e.g., no one bothers todial 911), the system will nevertheless respond to excess call volume toenable an emergency responder to use the network. This capability alsoensures police, fire and EMT personnel (typical individuals who may beauthorized to implement TPA) can use the cellular communication networkduring times of peak usage, such as during rush hour on the freeway orfollowing conclusion of a major sporting event.

The hardware used to implement the forgoing embodiments may beprocessing elements and memory elements configured to execute a set ofinstructions, wherein the set of instructions are for performing methodsteps corresponding to the above methods. Such processing and memoryelements may be in the form of computer-operated switches, servers,workstations and other computer systems used in cellular communicationscenters and remote facilities (e.g., base station antenna locations).Some steps or methods may be performed by circuitry that is specific toa given function.

Wireless devices use the portions of radio frequency (RF) spectrumdedicated to cellular telephone communication. This RF spectrum isshrinking at a fast pace primarily due to the increasing number ofwireless devices using the already burdened RF bandwidth and inefficientallocation of bandwidth in the marketplace. Since the total RF spectrumis finite, as the number of users of the RF spectrum grows, moreefficient methods of RF spectrum management may be required to ensurethat the growing need for RF spectrum is properly addressed.

The currently available RF spectrum is divided among cellular serviceproviders based upon static allocation models such as speculation modelsand archaic licensing deals. The currently practiced static allocationmodels rely on a command and control scheme allowing for allocation ofspectrum to providers in defined blocks of frequency and space. Forexample, one static method of leasing RF spectrum includes assigning,based on a leasing agreement, an entire block or sub-block of spectrumto one operator for their exclusive use. Such wholesale allocation ofspectrum is inefficient because the licensee provider is purchasingspectrum based on a speculation that the spectrum may be used in thefuture.

However, the spectrum usage and traffic are dynamic and may depend upondifferent variables including the time of the day the spectrum is usedand the geographic location of the wireless device using that spectrum.Traffic usage may be time dependent since usage may vary during peak ascompared to non peak hours. Traffic may also be geographically basedsince the location where subscribers use the network may also vary. Forinstance, during the day, time and geographically based usage ofspectrum on a network may vary while subscribers are traveling to work,at work, traveling back from work or during off hours.

Because spectrum usage and traffic are dynamic and impossible topredict, providers inevitably waste spectrum resources by speculatingregarding its future use. Thus, the current spectrum allocation schemesfail to take into consideration real-time data about traffic patterns,encourage under utilization and segmentation of spectrum, and createfurther inefficiencies through the implementation of guard bands andbandwidth throttling or bandwidth intensive features and services.

The various embodiment methods and systems provide a Dynamic SpectrumArbitrage (DSA) system for dynamically managing the availability,allocation, access and use of RF spectrum by using real-time data.Currently, RF spectrum is licensed or purchased in frequency and spacebased upon speculation of future usage and without taking into accountreal-time data. The DSA communication system makes RF spectrum availablebased on frequency, space (i.e., geographical regions) and time, thus,providing a flexible and dynamic spectrum management method and systemas compared to the current static command and control methods. Since theRF spectrum resources are available based on time, frequency and space,spectrum allocated through the DSA communication system may be availablefor short term leases and free from interference. Short term leasing ofspectrum may increase competition in a given market area and improvespectrum efficiency without negatively impacting the carriers' abilityto deliver service. By efficiently and dynamically managing spectrumavailability, allocation, access and use, the DSA communication systemmay in effect increase the RF spectrum availability.

In an embodiment, the DSA communication system may be a stand-alonebusiness affiliated with the participating providers. In such ascenario, components of the DSA communication system may be integratedunits participating network providers to allow providers to monitortheir resources vs. bandwidth traffic and determine whether they need orcan provide additional resources. The non-integrated components of theDSA communication system may manage the overall exchange of resourcesbetween participating providers. Benefits of using the DSA communicationsystem may include optimizing commercial yield and providing wider andmore efficient use of bandwidth on physical (geographic) and time bases.

In an embodiment, the DSA communication system may enable allocationof/access to RF spectrum resources by requiring that the participatingproviders subscribe to the DSA communication system. For example, thesubscription may be based on a pricing arrangement. As a participant inthe DSA communication system, the RF spectrum requesting providers maybe enabled to use any available RF spectrum by slipping in and out ofthe RF spectrum's “swim lanes” in accordance with their need forbandwidth and their preparedness to pay for it. One spectrum's “swimlane” would be the RF spectrum bandwidth that is owned/controlled by oneprovider.

To participate in the DSA communication system, initially the carrier orcarriers may agree to allow secondary use of their spectrum in themarket. DSA communication system may enable each provider to purchaseavailable spectrum in the network of providers or offer to selladditional spectrum to a buyer provider.

In an embodiment, the DSA communication system may determine thecompatibilities of the subscriber wireless devices 101 for using thesecondary networks and clusters. Incompatible Radio Access Networks(RAN) may be used if subscriber devices are capable. Thus, if wirelessdevices 101 are capable of accessing different RANs, the DSAcommunication system may facilitate the devices' access to spectrum fromother RANs even if the switch is between incompatible RANs. DSAcommunication system is policy based and may offer uniqueimplementations for spectrum and capacity management. The DSAcommunication system may be based on Long Term Evolution (LTE),Evolution-Data Optimized or Evolution-Data only (EVDO), EvolvedHigh-Speed Packet Access (HSPA) and any known wireless access platform.

FIG. 9 illustrates a communication component diagram 900 of anembodiment DSA communication system in a wireless access platform basedon Long Term Evolution, LTE. The DSA communication system may includethe Dynamic Spectrum Policy Controller (DPC) 902 connected to a HomeSubscriber Server (HSS) 904 which may communicate with networkcomponents of a provider network. The HSS 904 may be a master userdatabase that supports the Dynamic Spectrum Policy Controller (DPC) 902.The HSS 904 may include the subscription-related information (i.e.,subscription-profile), perform authentication and authorize thesecondary users, and can optionally provide information aboutsubscriber's location and IP information. The HSS 904 may contain users'(SAE) subscription data such as the EPS-subscribed QoS profile and anyaccess restrictions for roaming. It may also hold, store or retaininformation about the PDNs to which the user can connect. This could bein the form of an access point name (APN) (which is a label according toDNS naming conventions describing the access point to the PDN) or a PDNaddress (indicating subscribed IP address(es)). In addition the HSS 904holds dynamic information such as the identity of the MobilityManagement Entity (“MME”) to which the user is currently attached orregistered. The HSS 904 may also integrate the authentication center(AUC), which generates the vectors for authentication and security keys.

The HSS 904 may be connected to a Signaling Server 7 (SS7) 906. Both theDynamic Spectrum Policy Controller (DPC) 902 and the HSS 904 may beconnected to the Internet 106. The HSS 904 may independently communicatewith the in-network components of a network via the SS7 network 906.

The DPC 902 may also communicate with the network components of anetwork provider through a commercial or private wireless carrier 903and Dynamic Spectrum Controller (DSC) 910 or directly through the DSC910 without using a commercial or private carrier. The DSC 910 componentmay be added to network components for networks which participate withthe DSA communication system and may communicate with the OMC/NMS 910.

Availability of Spectrum Resources

In the various embodiments, the DSA communication system may enable aspectrum provider to monitor and assess its RF spectrum usage andavailability, and make available unused RF spectrum for use by otherproviders or unsubscribed users (i.e., secondary users). The DSAcommunication system may provide different methods to determine RFspectrum availability, such as location and database lookup, signaldetectors and spectrum usage beacon. The DSA communication system mayenable one provider (host network) to identify spectrum resources whichmay be offered for use by another provider or provider subscribers (asecondary user), such as on a pay per use or pay per minute basis.

In an exemplary embodiment, as illustrated in FIG. 9, the DSAcommunication system 900 may enable a network to determine availabilityof RF resources. At each network or sub-network, the DSC 910 may monitorcall traffic through OMC/NMS 912 to receive detailed status of thevarious network elements in real-time without inserting another deviceinto the network. The DSC 910 may carry out policy based QoS decisionsbased on the status of the existing traffic, projected traffic marginsand the system policies to determine whether a network or sub-networkhas resources to allocate for secondary use or requires resources fromanother provider.

The DSC 910 may be configured with software to communicate dataregarding the availability of spectrum resources to the DPC 902 usingcapacity policy criteria. The data that is communicated to the DPC 902may include data relating to current excess capacity and expected futurecapacity of the network or sub-network.

The available resources at a network provider may be dynamicallyallocated and de-allocated. The resource poll information may becontrolled by the DSC 910 and relayed to the DPC 902 for centralcoordination. However, based on rule sets in the DSA communicationsystem, the DSC 910 may identify resources available for secondary useon a system level and cluster level as traffic in the system fluctuatesby increasing and decreasing the resource pool for secondary usage mayincrease and decrease and may be reported to the DPC 902 via the DSC910.

Allocation of Available Resources

In the various embodiments, the Dynamic Spectrum Arbitrager (DSA) systemmay further manage allocation or assignment of RF spectrum resources ofa network provider for specific uses, such as use by secondary users.The DSA communication system may manage RF spectrum allocation based onthe providers' varying criteria, such as degrees of prioritization(e.g., low priority or no priority), type of connection (e.g., “alwayson” and “surge” guaranteed access and bandwidth), and price.

In contrast to the currently available spectrum allocation techniques,allocation of spectrum resources by the DSA communication system mayrely on real-time traffic status of participating providers. The DSAcommunication system resource allocation may further depend on differentfactors, such as availability of resources, the type of services thatare being delivered and the policies associated with those services.Some of the key policy criteria that may be considered for allocatingresources in the DSA communication system may include Radio AccessSelection, Capacity Augmentation, Quality of Service (QoS), bearerselection, Congestion Control, Routing, Security, and Rating. The DPCand DSC 910 may perform policy definition and control.

Radio Access Selection: The DSA communication system may be configuredto make the best available spectrum assignment from the available poolof resources. Factors considered in the selection of spectrum assignmentmay include spectrum bandwidth, location of spectrum in the frequencyband, geographic zone along with the requested service, and QoS.

Capacity Augmentation: The DSA communication system may be configured tomake the best available capacity augmentation assignment from theavailable pool of resources. Factors considered in the decision mayinclude spectrum bandwidth, location of spectrum in the frequency band,geographic zone along with the requested service, and QoS.

Bearer Selection: The DSA communication system may be configured toselect the resources required to support the requested QoS profile atthe radio and transport bearer services.

Admission Control: The DSA communication system may be configured tomaintain information of available/allocated resources in both the radioand the IP transport network and perform resource reservation/allocationin response to new service requests.

Congestion Control: The DSA communication system may be configured tomonitor traffic conditions on the primary network, and seek alternativemethods for capacity off load. Additionally, The DSA communicationsystem may be configured to monitor the primary network and performback-off of secondary users as traffic demand increases on the primarynetwork.

Routing: The DSA communication system may be configured to ensure thatthe optimum route for the service is used based on the bearer trafficand available network resources.

Security: The DSA communication system may be configured to providesecurity for the traffic streams by segregating the traffic into tunnelsto ensure no cross pollination of information.

Rating: The DSA communication system may be configured to coordinaterating schemes including prioritization and carrier usage fee and othermetering processes.

The DSA communication system resource allocation may be based ondifferent methods, such as stateless and stateful methods. By employingdifferent allocation methods, the DSA communication system may enableproviders to tailor spectrum allocation and utilization based on theirindividual spectrum traffic demands. The stateless method may involvecoordinating spectrum usage between networks on a real-time basis. Thestateful method may include storing and forwarding spectrum resourcesfollowing defined time intervals. RF spectrum resources may further beallocated on a need basis, which may be based on committed and peakbandwidth/traffic requirements. The need based allocation method mayallow for the greatest flexibility and spectrum utilization. The DSAcommunication system may further employ a just-in-time allocation methodin enabling the providers to allocate spectrum resources. By employingthe just-in-time allocation method, the DSA communication system mayimprove the overall spectrum utilization for a given market and providea revenue source for wireless carriers.

In an embodiment, the DSA communication system may provide the commandand control functions to enable spectrum to be leased for the entirelicense area or for a defined sub-license area, and for a term. Forexample, the DSA communication system may facilitate spectrum resourceallocation using a sub-spectrum block approach with the ability toincrease or decrease the spectrum consumed dynamically. For example,multiple different communication networks can allocate spectrum to thesame user.

As shown in FIG. 9, the components of the DSA communication system whichare not part of a provider's network, such as the DPC 902, may managespectrum allocation between different networks or sub-networks.

In an embodiment, the DSA communication system may enable host networksto allocate resources which are currently assigned for use by primaryusers for use by secondary users. In such a scenario, the secondaryusers may be granted access to the host networks' spectrum capacity orresources regardless of existing available capacity at of the hostnetwork.

Governance and Policy Management

The DSA communication system may operate based on pre-determined rulesand parameters which may be based on the statistics of the channelavailability. For example, operating rules may enable the DSAcommunication system to monitor the level of access to RF spectrum atany given time to allow the system to determine whether capacity isavailable for allocation.

As described above, resource allocation may be done through the DSAcommunication system components, such as the DPC 902 and DSC 910following the rules defined by the business arrangement, devicecompatibility, target system RAN, and capacity and services requested.

FIG. 9 further illustrates the network architecture 900 of an embodimentmethod for implementing DSA policy governance. The DSA communicationsystem may require that the participating parties adhere to thegoverning rules and policies.

In implementing the DSA policies, the Policy Control and Charging RulesFunction (PCRF) 905 of a participating network may provide the policyand service control rules and the Rivada® Policy Control Network (RPCN)may provide policy changes and corrections based on the DSA rules andDPC 902 requirements. The PCRF may be responsible for policy controldecision-making, as well as for controlling the flow-based chargingfunctionalities in the Policy Control Enforcement Function (PCEF), whichresides in the PGW. The PCRF provides the QoS authorization (QoS classidentifier [QCI] and bit rates) that decides how a certain data flowwill be treated in the PCEF and ensures that the data flow andauthorization meets and is in accordance with the user's subscriptionprofile. The RPCN may be a part of each network DSC 910. The RPCN mayfurther maintain a Hot List for public safety users who may also belinked to the commercial system.

For example, when resources of a host network is depleting, the networkPCRF 905/RPCN may instruct the host network to take an action to recoveradditional resources for the preferred users of the home network. Theinstructions sent by the PCRF 905/RPCN may be used to determine thecourse of action needed to be taken to free-up resources for the use ofthe preferred users. For example, the PCRF 905/RPCN instructions may beto reduce QoS for secondary user wireless devices 101 or certainapplications, or shed secondary user wireless devices 101 from thenetwork based on a set of conditions. While managing the level of itsresources by reducing traffic, the host network may implement time slotallocations.

Some optional subcomponents of the EPC may include the MME 914 (MobilityManagement Entity), which is a key control-node for the LTEaccess-network and may be responsible for idle mode UE (User Equipment)tracking and paging procedure including retransmissions and may beinvolved in the bearer activation/deactivation process and is alsoresponsible for choosing the SGW for a UE at the initial attach and attime of intra-LTE handover involving Core Network (CN) node relocation.MME 914 may be responsible for authenticating the user (by interactingwith the HSS). The Non Access Stratum (NAS) signaling terminates at theMME 914 and may also be responsible for generation and allocation oftemporary identities to UEs. MME 914 may check the authorization of theUE to camp on the service provider's Public Land Mobile Network (PLMN)and enforces UE roaming restrictions. SGW 922 (Serving Gateway) mayroute and forward user data packets, while also acting as the mobilityanchor for the user plane during inter-eNodeB handovers and as theanchor for mobility between LTE and other 3GPP technologies. The PGW 908(PDN Gateway) provides connectivity from the UE to external packet datanetworks by being the point of exit and entry of traffic for the UE. AUE may have simultaneous connectivity with more than one PGW 908 foraccessing multiple PDNs. HSS 926 may be a central database that containsuser-related and subscription-related information. The functions of theHSS 926 include, for example, mobility management, call and sessionestablishment support, user authentication and access authorization.ANDSF 918 (Access Network Discovery and Selection Function) providesinformation to the UE about connectivity to 3GPP and non-3GPP accessnetworks (such as Wi-Fi). The purpose of the ANDSF 918 is to assist theUE to discover the access networks in their vicinity and to providerules (policies) to prioritize and manage connections to these networks.Network 900 may also include ePDG (Evolved Packet Data Gateway) is tosecure the data transmission with a UE connected to the EPC over anuntrusted non-3GPP access.

DSA communication system policy and governance may have the sameattributes as those found in a commercial network. However, in the DSAcommunication system, the combination of policy driven QoS with dynamicspectrum arbitrage/allocation may enhance both the primary and secondary(e.g., lessor and lessee) spectrum utilization and reduce the overallcosts.

In an embodiment DSA system, the policy/governance may be set forspecific levels of network resources per session, per “pipe,” per useror a group of users. The policy may also relate to the priorities, suchas emergency calls getting highest priority, or preferences, such asallowing degrading quality for ongoing calls or rejecting new ones atnear congestion time. DSA policy and governance may also invoke routinepolicies which may be applied to facilitate the best route for aparticular type of communication session and service offering.

Access to Allocated Resources of Another Network

In an embodiment, the DSA communication system may manage the access ofusers to available RF spectrum resources of a network. For example, theDSA communication system may manage the access of secondary users tospectrum resources of a primary host network that are allocated forsecondary use.

The secondary users may access spectrum resources of a primary hostnetwork using different methods such as, by acting as a dynamic roameror using a coordinated spectrum scheme with compatible accesstechniques. In allowing the secondary user to access a primary hostspectrum resources, the DSA communication system may enable the wirelessdevice 101 of a subscriber of one provider to change bandwidths from thespectrum belonging to the home network provider of the wireless device101 to one belonging to a host network provider based on differentparameters such as price, quality of reception, geographic area andlocation.

The DSA communication system may provide access to a secondary userbased on different access conditions. The DSA communication system mayprovide access to available spectrum either temporarily or by sharingtraffic throughput for a radio access technique with a primary user of aprimary provider. Temporary access may involve accessing definedspectrum that was allocated for usage based on the policies of the DSAcommunication system. Sharing spectrum may involve allowing thesubscribers of one provider to access radio spectrum at a host provideron a secondary basis.

Secondary users' home network providers may employ different methods todynamically contract for allocated RF spectrum resources of a primaryprovider. For example, the primary provider may auction and thesecondary provider may bid for available spectrum resources. The biddingmay be a fee based process; which may involve managing the reselling ofunused spectrum on temporary or permanent basis to efficiently manageexcess resources that might otherwise go unused for that time; ormanaging leasing of excess RF spectrum on temporary or permanent basis.

FIG. 10 illustrates network architecture 1000 of two wireless networkproviders using the DSA communication system to share spectrumresources. The DSA communication system may be comprised of two generalcomponents: Out-of-network and in-network components. The out-of-networkcomponent of the DSA communication system may include a DPC 902connected to a HSS 904. The DPC 902 may enable the DSA communicationsystem to dynamically manage the access to the allocated spectrumresources of a network. For example, the DPC 902 may manage the accessof secondary users of a network provider to the allocated spectrumresources of a primary network provider.

The DPC 902 may further coordinate DSA communication system policies andeffectuate sharing of relative information between network providers.The DPC 902 may further facilitate the charging policy and resourcerequests which may be communicated with the networks.

The DPC 902 may be configured to communicate with one or severalnetworks (e.g., Network 1 and Network 2) through in-network DSC 910component of each DSA communication system participating provider. In anembodiment, each Network 1 and Network 2 may include a DSC 910 a, 910 bwhich may be an add-on to the online management center/networkmanagement system (OMC/NMS) 912 a, 912 b of a wireless carrier. At eachnetwork, the DSC 910 a, 910 b may manage traffic and capacity of eachnetwork and continuously monitor nodes for capacity constraints basedupon commands received from or policies and rule sets of the DPC 902.The DSC 910 may communicate its findings with the DPC 910.

Each network may include an OMC/NMS 912 a, 912 b which may be incommunication with a wireless network 1002 a, 1002 b. The wirelessnetwork 1002 a, 1002 b may be in communication with wireless accessnodes 102 a, 102 b. Subscriber wireless devices 101 may communicate witha wireless access node 102 a, 102 b. The relationship andinterconnectivity of these components of the network are known.

In an embodiment, the DSC 910 a of Network 1 may determine thatadditional resources may be required by Network 1. The DSC 910 a ofNetwork 1 may be configured to send a request for additional resourcesto the DPC 902. The DPC 902 may receive information regarding asecondary user wireless device 101 a location and the network.

The DPC 902 may be configured to also receive data from other affiliatednetworks such as from the DSC 910 b of Network 2. The DSC 910 b ofNetwork 2 may be further configured to report to the DPC 902 thatspecified amounts of resources are available in Network 2.

The DPC 902 may be configured to process data received from therequesting network (i.e., Network 1) and the supplying network (i.e.,Network 2) and facilitate a real-time access to the resources of Network2 by the requesting Network 1. Once spectrum resources from Network 2are made available for access by users of Network 1, the DSC 910 a mayinstruct the wireless devices 101 a to change networks and access thespectrum resources provided by Network 2. For example, when a wirelessdevice 101 a of Network 1 requests communication resources, its rule setmay be validated by the DSC 910 of Network 2. Network 2 may receive thewireless device's 101 a updated information in the PCRF 905 (shown inFIG. 9). The PCRF 905, with other platforms, may allow the secondaryuser wireless device 101 a to access the allocated resources of Network2.

In an embodiment, the accessibility of resources to a secondary userthrough the DSA communication system may also depend on Host NetworkOperators policy and use criteria for those resources. The criteria caninclude both Radio Access and Core Network Resources.

For example, some of the policy and resource criteria imposed by theHost Network Operator may include: Availability of spectrum (e.g.,separate or co-existence); availability of capacity/bandwidth (e.g., RFand Core); overhead criteria (e.g., percent total available capacityversus used capacity); existence of back-off criteria (e.g.,reselection, handover (intra system and inter-system), termination);treatment (how specific services/applications are treated/routed);barred treatments (e.g., services/applications which are barred foruse); rating (e.g., how services are rated, i.e., possible specialdiscount for off-peak usage); geographic boundary (e.g., defining zonesor cells for inclusion); time (e.g., defining time and day(s) forinclusion including); duration (e.g., defining incremental allocationbased on time and geographic boundary); user equipment types.

The DSA communication system may enable a secondary network to requestspectrum resources based on: time (e.g., when are resources requested);required capacity/bandwidth; treatment (e.g., what services are desired,including QoS); geographic boundary (e.g., where services arerequested); and duration (e.g., for how long are the resourcesrequested).

In an embodiment, the communications that may be performed by the DSC910 a, 910 b may be transparent to the secondary users. In anotherembodiment, the communication may not be transparent.

FIG. 11 illustrates a network component diagram 1100 of an embodimentDSA communication system where spectrum usage and traffic data may beprocessed by a third party or spectrum clearinghouse. The out-of-networkcomponent 1102 of the DSA communication system may includesub-components such as the DPC 902 (shown in FIG. 9). The DPC 902 maycommunicate with the wireless Networks 1 and 2, by communicating withsub-components of the core network 1104 a, 1104 b. The out-of-networkcomponent 1102 may also communicate with one or both networks using theInternet or a private network 106. For example, the DSA communicationsystem out-of-network component 1102 may communicate with the corenetwork 1104 b of Network 2 via the Internet 106 while directlycommunicating with the core network 1104 a of Network 1. The corenetworks 1104 a, 1104 b may include sub-components such as the DSC 910,Long Term Evolution (LTE), (EVDO), (HSPA) and OMC/NMS 912 a.

When Network 1 becomes overburdened and requires additional spectrumresources, the core network 1104 a, may determine a need for spectrumand request for additional spectrum resources from the DSA communicationsystem out-of-network component 1102. Network 2 may determine that ithas available an excess amount of spectrum resources due to low calltraffic. Network 2 may also report the availability of excess resourcesto the out-of-network component 1102. Communication between the DSAout-of-network component 1102 and Network 2 may be through the Internet106. Alternatively, the out-of-network component 1102 and Network 2 maycommunicate directly as shown by dashed line 1106. The DSAout-of-network component 1102 may facilitate the allocation of spectrumresources from Network 2 to Network 1 which is shown here by the dashedline 1108.

The wireless device 101 b may access the allocated resources bydifferent methods. Network 1 may instruct the wireless device 101 b toswitch networks to Network 2 to use the allocated resources as asecondary user on Network 2. Alternatively, the allocated resources ofNetwork 2 may be made available through Network 1 enabling the wirelessdevice 101 b to use the resources of Network 2 without having to changecommunications session from Network 1 to Network 2. For example,networks 1, 2, and 3 may pool spectrum that can be allocated for use bymultiple entities.

FIG. 12 illustrates a communication system 1200 of an embodiment DSAnetwork. The DPC 902 may provide the master control for the arbitrageprocess while serving several different networks. The DPC 902 mayinclude the policy and time dependent arbitrage rules for currentallocations. The DSC 910 may be configured to also have a local copy ofthe policy and time dependent arbitrage rules for the currentallocation. The local copy of the policy and time dependent arbitragerules may ensure that the local control of the network resources may bemaintained. In addition, the DSCs 910 a-910 c may be separate platformsinterfacing with the network operations system providing a demarcationpoint for future network operation issues.

In an embodiment, to ensure disaster recovery of the system in the eventof an incident, the DPC 902 may be configured as a dual mirrored serversite (e.g., DPC 902 a and DPC 902 b) or include several servers in ageographically dispersed cluster. To secure the network, the DPC 902 a,902 b may have a secured link to defined and pre-approved networkoperators 1204 a, 1204 b, 1204 c (e.g., spectrum resource providers) andsystem resource requesters 1206, 1208, 1210 (e.g., bidders).

In the event of a failure of communication between the DPC 902 a, 902 band DSC 910 a, 910 b, 910 c, the DSC 910 a, 910 b, 910 c may beconfigured to use its locally saved policy and rule contents to maintaincontinuity in an arbitrage process that has been initiated by the DPC902 a, 902 b. However, because of the lack of connection with the DSC902 a, 902 b, the DSC 910 a, 910 b, 910 c may not be able to facilitateadditional new resource allocations or bids. To ensure that localcontrol is always maintained, the DSC 910 a, 910 b, 910 c may be furtherconfigured to control and locally override components and functions thatenable the local operators to prematurely terminate or back-offresources from a secondary user.

For example, DSC 910 a may locally store policy and rules of anycommunicating DPCs 902 a, 902 b. As such, if communication between theDPCs 902 a, 902 b and DSC 910 a is compromised after a bid has beenprocessed by a DPC 902 a, 902 b, the DSC 910 a may continue to provideresources to secondary users of bidder 1 1206 without having toterminate the secondary users. Additionally, when Network A 1204 arequires more resources to provide service to its own primary users, theDSC 910 a may locally control the off-loading of secondary users fromNetwork A to free-up resources based on the policies and rules of theDPC 902 a, 902 b.

In an embodiment, the process involved in the DSA communication systemmay be similar in all cases for flow. As illustrated in FIG. 13A,resources of a block of spectrum 1300A may be categorized based on howthey are used by a network. Resources for a given spectrum may becategorized as occupied resources, uncertain resources and availableresources. The occupied resources may be those resources which arecurrently in use by the carrier and may not be allocated by the DSAcommunication system. The uncertain resources may provide a margin forthe carrier to manage peak loads. The uncertain resources may be used upduring the peak loads and not used during low peak loads. The availableresources may be the subset of resources which are not used at all bythe network. The available resources may be made available forallocation to other secondary providers.

In an embodiment, spectrum resources may be allocated to secondary usersby different methods. FIG. 13B illustrates allocation of spectrumresources of a block of spectrum 1300 licensed by a host network,according to an embodiment. The host network may license a RF spectrumblock 1300 a including four channels. The host network may dedicatethree of the four channels of the RF spectrum block for use by thenetwork 1 subscribers. The dedicated channels 1-2 are shaded in the RFspectrum block 1300 b. As shown by RF spectrum 1300 b, Channel 4 mayremain unassigned by the provider. Channel 3 may be partially allocated,partially transitional and partially unassigned as illustrated byspectrum block 1300 c. The transitional section of the spectrum block1300 c may be reserved for use during high traffic periods by theprovider's subscriber. The unassigned portions of the licensed spectrum1300 c may never be used.

In an embodiment, the host network may sublicense the unassigned portionof the licensed spectrum to secondary users using the DSA communicationsystem. In such a scenario, the host operator may make available tosecondary users the unassigned portion of channel 3 and all of channel4.

FIG. 14 illustrates allocation of spectrum resources including a guardband channel of a licensed spectrum 1400, according to an embodiment.The licensed spectrum 1400 may include a guard band 1404 that is eitherdefined or set aside by operators as part of a spectrum deploymentpolicy and program. Such guard bands may include usable resources thatcurrently remain unused. The host network may allow the resourcesavailable in the guard bands to be used by secondary users using the DSAcommunication system. By using the DSA the host network may makeavailable for use the unused guard band resources by combining the guardband into a single usable channel 1402 for resource allocation.

FIG. 15 illustrates pooling and allocation of spectrum resources of morethan one host networks using the DSA communication system, according toan embodiment. In an embodiment, the DSA communication system may beconfigured to survey the available spectrum from different networks andpool the available together for allocation. In an exemplary embodimentas shown by spectrum block (1), each of the host networks, network A andnetwork B, may license a block of spectrum including four channels each.For example, the block of spectrum 1502A licensed by network A mayinclude channels 1A, 2A, 3A, and 4A. The block of spectrum 1502Blicensed by network B may include channels 1B, 2B, 3B, and 4B.

In the exemplary embodiment as shown by spectrum block (2), the spectrumblock 1504A of network A may include available channel 4A and partiallyassigned channel 3A. Channel 3A may be partially assigned for use by thenetwork, partially transitional and partially available for use by othernetworks. The spectrum block 1504B of network B may include availablechannels 1B and 4B and partially assigned channel 3B. Channel 3B may bepartially assigned for use by the network, partially transitional andpartially available for allocation to other networks.

In an exemplary embodiment as shown by spectrum block (3), each spectrumblock 1506A, 1506B of network A and network B may make available theirresources using the DSA communication system. The DSA communicationsystem may pool the available resources from each network and allocatethem for secondary use. For example, the DSA communication system maypool the resources available in channels 1B and 4B and make themavailable to secondary users. The DSA communication system may pool theresources available in channel 4A and the partial resources available inchannel 3A and make them available to secondary users.

The DSA communication system may pool available resources from differentnetworks for allocation to secondary users. In an exemplary embodiment,as shown in spectrum block (4), the DSA communication system may poolavailable resources from channel 4A in network A, spectrum block 1508Aand channels 1B and 4B in network B, spectrum block 1508B, and make themavailable to secondary users.

In an exemplary embodiment, as shown by spectrum block (5), the DSAcommunication system may pool available resources from all channels indifferent networks, including channels with resources that are fullycommitted for use by the network and channels which include availableresources. The DSA communication system may pool spectrum resources fromchannels 3A and 4A in network A, spectrum block 1510A, and channels 1B,3B and 4B in network B, spectrum block 1510B, and make them available tosecondary users.

In an embodiment, the DSA communication system may enable Mobile VirtualNetwork Operators (MVNO) to utilize unused spectrum capacity. Forexample, the DPC 902 may aggregate multiple MVNO's to utilize unusedspectrum capacity in a prioritization scheme. This would enable an MVNOto sell its unused or under used capacity to another MVNO therebyensuring that both MVNO's operating efficiently.

FIGS. 16A-16C illustrate MVNO spectrum aggregation according to anembodiment. FIG. 16A illustrates the allocation or capacity of spectrumfor MVNO A 1602A and MVNO B 1602B where both operators possessunassigned spectrum capacity. FIG. 16B illustrates an exemplaryembodiment method by which the DSA communication system may enable theMVNO B 1604B to increase or augment its available spectrum capacity byreceiving unassigned spectrum from MVNO A 1604A. FIG. 16C illustrates anexemplary embodiment method by which the DSA communication system may beenabled one MVNO C 1606C to receive additional spectrum capacity fromtwo other MVNO's 1606A, 1606B. The MVNO C 1606C may be a new oradditional MVNO and may obtain the available unassigned spectrumcapacity from MVNO A and B 1606A, 1606B for its potential use. In thisscenario, MVNO A and MVNO B 1606A, 1606B may or may not operate on thesame host carrier and may or may not have the same Radio AccessTechnology (RAT). In another embodiment, a conversion may be provided toprovide access between different RAT.

In an embodiment, to measure the quantity of the resources that are usedby secondary users, the host network may use similar processes as usedfor pre-paid users to facilitate the time/duration and usage metering ofsecondary uses which can be done at an individual or global accountbasis.

Depending on the method used by secondary users to access availableresources, several fundamental types of DSA allocation methods may beimplemented, including: 1) virtual-best effort method; 2)virtual-secondary users method; and 3) spectrum allocation method whichmay include License area and Regional area spectrum allocation. Each ofthese allocation methods may have several variations. For example, in avirtual-best effort method, the DSA communication system may beconfigured to make available spectrum resources for an entire licensearea or on a regional, sub-license area basis. Classes of the users mayalso be defined in user's wireless devices 101 by their home networkproviders and may be assigned either secondary user or best effort userstatuses.

In an embodiment, Resources in the virtual-best effort method may beavailable to the MVNO through a grant of access to the network involved.Prioritization may occur within the host network based on PCRF rules ofthe home and host networks.

In the virtual-best effort method, the host network may enable thesecondary user wireless devices 101 to use the same network as the hostnetwork but on a virtual basis, i.e., an MVNO type of arrangement.Different variations of this arrangement may include situations when 1)the secondary user uses the host network with the same rights as thehost network subscribers and 2) the secondary user uses the host networkas a secondary user or on a secondary basis where primary users (hostsubscribers) have higher priority and rights than the secondary usersubscribers. Access priority for primary users may be established innetworks where the primary users are public safety users. Duringemergency situations, the host network may drop secondary users due toan increase in use of its spectrum by other users such as public safetyprimary users.

FIG. 17 illustrates a communication system 1700 of a DSA communicationsystem for allocating resources according to an embodiment. In avirtual-best effort method, the wireless device 101 may be considered avalid roamer as shown in FIG. 17.

During the bidding process, the DSA communication system may implement arule sets which may be used to define the types of services, treatmentsand duration of services for the wireless devices that are grantedaccess to the host network. The rule sets may include information suchas: 1) requested capacity/boundary; 2) treatment of services such aswhen they are required and the QoS; 3) geographic boundaries based onthe requested service; 4) time for when resources are requested; and 5)duration for which requested resources would be used by the secondaryuser. It is contemplated that all or a sub-set of these rules may beused depending on the arbitrage scheme.

In the virtual-best effort method, the DSA communication system mayfollow the industry roaming process in that access to spectrum may begranted to the secondary users provide the service requesting wirelessdevices meet the required authentication processes.Validation/authentication of the secondary user wireless devices 101 maybe performed following standard MAP/IS-41 processes through the use ofthe host's HSS 926 and AAA.

Additional criteria that the DSA communication system may add to theprocess of roaming may include different billing schemes. For example,secondary user's wireless device's 101 access duration or total usagepermissions may be governed by the host network. Such governing schemesenable the host network to control the access of the secondary userslocally and on a real-time basis. In the virtual-best effort method, theDSA communication system may not reserve resources and merely track theconsumption of resources.

In the virtual-best effort method, the primary or host network providermay not grant prioritization to the secondary users except throughdifferentiation afforded by the PCRF 905 and PDN Gateway (PGW) 908 ofthe host network provider. To use the resources of a DSA communicationsystem using the virtual-best effort method, the secondary users mayeither use the PGW(s) 908 of the host network of or the secondarynetwork's PGW which may be either connected to the appropriate ServingGateway (SGW) 922 of the host network or connected to the PGW of thehost through an intermediate PGW 908 that is governed by the hostnetwork.

The PGW is responsible for IP address allocation for the wireless device101, as well as QoS enforcement and flow-based charging according torules from the PCRF. It is responsible for the filtering of downlinkuser IP packets into the different QoS-based bearers. This is performedbased on Traffic Flow Templates (TFTs). The PGW performs QoS enforcementfor guaranteed bit rate (GBR) bearers. It may also serve as the mobilityanchor for interworking with non-3GPP technologies such as CDMA2000 andWiMAX® networks.

All user IP packets may be transferred through the SGW, which serves asthe local mobility anchor for the data bearers when the wireless devicemoves between eNodeBs. The local mobility anchor point for inter-eNodeBhandover includes downlink packet buffering and initiation ofnetwork-triggered service requests, lawful interception, accounting onuser and QCI granularity, and UL/DL charging per wireless device. SGWalso retains the information about the bearers when the wireless devicesare in the idle state (known as “EPS Connection Management—IDLE”[ECM-IDLE]) and temporarily buffers downlink data while the MobilityManagement Entity (MME) initiates paging of the wireless devices toreestablish the bearers. In addition, the SGW performs someadministrative functions in the visited network such as collectinginformation for charging (for example, the volume of data sent to orreceived from the user) and lawful interception. It may also serve asthe mobility anchor for interworking with other 3GPP technologies suchas general packet radio service (GPRS) and UMTS.

The MME is the control node that processes the signaling between thewireless device and the CN. The protocols running between the wirelessdevice and the CN are known as the Non Access Stratum (NAS) protocols(eMM, eSM) and security, AS security, tracking area list management, PDNGW and S-GW selection, handovers (intra- and inter-LTE), authentication,bearer management. The MME also contains mechanisms for avoiding andhandling overload situations.

An eNodeB performs Radio Resource Management functions, such as radiobearer control, radio admission control, radio mobility control,scheduling and dynamic allocation of resources to wireless devices inboth uplink and downlink. eNodeB may perform Header Compression whichrefers to the process of compressing the IP packet headers that couldotherwise represent a significant overhead, especially for small packetssuch as VoIP to help ensure efficient use of the radio interface. TheeNodeB may perform Security functions by ensuring that all data sentover the radio interface is encrypted.

In an embodiment, the virtual-best effort method may enable the DSAcommunication system to manage resources allocation by using differentmethods. For example, the host network's PCRF 905 may control thesecondary users' wireless devices 101 that access the host network andtrack the usage of the resources. The host network's billing system maybe used to bill the secondary user.

Alternatively, the host network's billing system may control/track theusage of the resources by the secondary user, and the secondary user'shome network PCRF 905 may provide preferred services. In such ascenario, the PCRF 905 of the host network may retain final control.

Alternatively, the host network may provide access and secondary user'shome network's PCRF 905 may define the preferred services. Additionally,as part of the allocation process using the virtual-best effort method,different TAI's may be assigned to the secondary user's wireless deviceswhich roam onto the host network. The TAIs may provide differentialservice areas or defined geographic zones for potential usage.

In an embodiment, the subscriber wireless devices may be allowed toaccess the home network through identification of a valid PLMN that ithas in USIM that is either pre-programmed or provided through OTAprovisioning. The home network may direct subscribers to use a hostnetwork as secondary users for different reasons. Additionally, if thewireless device 101 is capable of accessing two networks at the sametime, the wireless device 101 may potentially use the home network forone type of service and be directed to use a host network for otherservices.

In an embodiment, available resources may be allocated to secondaryusers using a virtual-secondary user method (e.g., an Intra-System(i.e., Intra freq-lessor, or Intra freq prime-lessee)). In thevirtual-secondary user method, the primary host network may allow thesecondary users of the secondary network to operate using the primarynetwork's system spectrum resources with different usage rights ascompared to the primary users, such as on a de facto lease but with adifferent SID. This may be achieved by allowing the secondary users toinclude spectrum allocation from the primary host network when there istechnology compatibility between the primary network systems and thesecondary user wireless device 101. This allocation may be applied tothe mobile virtual network operator mobile virtual network operator thatprovides mobile phone services but does not have its own licensedfrequency allocation of radio spectrum, nor infrastructure required toprovide mobile telephone service.

In a virtual-secondary user method, the prioritization of the secondaryusers may follow the host network's PCRF 905 and PGW 908 rules. ThePGW(s) 908 that may be used by the secondary wireless devices 101 mayeither be controlled by the host network or available through thesecondary user's home network. If the PGW 908 is available through thesecondary users' home network, it may either be connected to theappropriate SGW 922 or provided through an intermediate PGW 908 that isgoverned by the host network. In such a scenario, a secondary user maybe considered a valid roamer in the DSA communication system using thevirtual-secondary user method as shown in FIG. 17.

In a virtual-secondary user method, the DSA communication system may usefive fundamental bidding rule sets, which are used to define the typesof services, treatment and duration for the secondary user wirelessdevices 101. The rule sets may include information such as: 1) requestedcapacity/boundary; 2) treatment of services such as when they arerequired and the QoS; 3) geographic boundaries based on the requestedservice; 4) time for when resources are requested; and 5) duration forwhich requested resources would be used by the secondary user, and otherrule sets as applicable. It is contemplated that all or a sub-set ofthese rules may be used depending on the arbitrage scheme.

In an embodiment, when employing the virtual-secondary user method, ahost network may grant access to a secondary user wireless device 101provided it meets a predetermined required authentication process. Thehost network using a virtual-secondary user method may use differentbilling schemes where the wireless devices 101 access or usage total isgoverned by the rules and specifications of the host network, allowingthe secondary user devices 101 to be controlled locally. As secondaryusers in the system, the wireless devices' 101 access to the hostnetwork can be restricted, reduced, or barred depending on theconditions of the host network. The restrictions, reduction or barringmay be imposed on a call, on a regional or system wide basis dependingon the conditions set forth by the host network in the bidding system.The restrictions, reductions or barring may further be performed ondynamic basis by overriding the bidding conditions (e.g., in publicsafety networks).

Authentication or validation of the secondary wireless device user maybe performed following the standard MAP/IS-41. Using MAP/IS-41, the hostHSS 926 and AAA may authenticate secondary user wireless device.

In an embodiment, when using the virtual-secondary user method, the DSAcommunication system may require that different components of the hostand/or home networks be used for resource allocation. For example, thehost network billing system and PCRF 905 may control the secondaryuser's access to the network and track its usage. Alternatively, thehost network's billing system may control and/or track usage and thesecondary users' home network PCRF 905 may provide preferred servicesand the network PCRF 905 may perform the final control. Alternatively,the host network may provide access in the home network PCRF 905 maydefine the preferred services.

When resources that are allocated using the virtual-secondary usermethod are near exhaustion either based on time, usage or othercriteria, the DPC 902 may notify the home network operator in the hostnetwork that the resources may expire. The home network operator, ifallowed, may be enabled to top off or replenish the resources availableto the secondary user by requesting foreign bidding on additionalresources at the host network or otherwise provide additional RFspectrum resources. To provide additional flexibility to the resourceallocation process, different TAI's may be assigned to the secondaryuser's wireless device that is roaming the host network. The TAI's mayprovide differential service areas or different geographic zones forpotential use.

In an embodiment, the secondary user's wireless device may be able toaccess the home network through identification of a valid public landmobile network or PLMN that it may have stored in its universalsubscriber identity module (“USIM”). The USIM may be eitherpre-programmed or provided through OTA provisioning. When using the homenetwork, the secondary user's wireless device 101 may be redirected tosearch for a host network from which it can receive services. Once ahost network is identified, the secondary user wireless device 101 mayuse the host network for all services, or use the host network for onetype of service. Additionally, the use the home network can be for otherservices if the wireless device 101 has the capability of accessing twonetworks at the same time. Various configurations are possible andwithin the scope of the present disclosure.

FIG. 18 illustrates a communication system block diagram 1800illustrating communications between components of two networks in a DSAcommunication system during resource reservation according to anembodiment. In an embodiment, the host network's (i.e., lessor)configuration may be controlled by the OMC 912. Additionally the homenetwork (i.e., lessee) 1802 may be separate from the host network 1804.

In an embodiment, the host network using the virtual-secondary usermethod, may reserve resources by using different methods, including: 1)X-furcating of the eNodeB; 2) SGW and PGW link bandwidth; 3) combinedresource allocation (PGW and eNodeB); and 4) PCRF (host) control. Theseresource reservation methods may be used in combination or may bemutually exclusive depending on the host networks requirements and thebidding process.

By x-furcating the eNodeB, resources may be reserved for secondaryusers. In an exemplary embodiment, as illustrated in FIG. 19, the eNodeB916 b may be bifurcated to reserve resources for secondary users. TheeNodeB 916 b may receive bifurcating instructions from the PCRF 905, MME914 and SGW 922 to partition a percentage if its resources which may beused for another PLMN network. The PGW 908 may be located at the hostnetwork or may be located remotely. According to the receivedinstructions, the eNodeB 916 b may reserve X % of the resources for theuse of the primary users and Y % of the resources for use by secondaryusers. The eNodeB 916 b may transmit an enhanced PLMH (ePLMN) which maybe recognizable to the secondary user wireless device 101 b and camp onthe cell.

In an embodiment, resources may also be reserved through controlling ofthe connectivity between the SGW 922 and the PGW 908 to which thesecondary user wireless device is assigned.

FIG. 20 illustrates an embodiment method for controlling the SGW 922 andPGW 908 a, 908 b link bandwidth allocation scheme according to anembodiment. Resource reservation may be controlled by controlling thehost SGW 922 connectivity to the various PGW 908 a, 908 b. The SGW 922connectivity to the PGW 908 a, 908 b may be controlled through alteringthe available bandwidth between SGW 922 and PGW 908 a, 908 b on adynamic basis. The PGW 908 a, 908 b may be local and/or remote withrespect to the host network. The SGW 922 and PGW 908 link bandwidth maybe altered through the OMC/NMS 912 which may be connected to the DSC910. PGW 908 a may be located at a host network or remotely.

In an embodiment, illustrated in FIG. 21, resources may be reserved forallocation purposes by combining eNodeB x-furcation and SGW-PGW linkbandwidth control methods.

In an embodiment, the host PCRF 905 may control resource reservation forallocation to secondary users. The host PCRF 905 may prioritize thesecondary user wireless device 101 based on the services requested usinga combination of the QCI/ARQ ARQ may be an automatic repeat request. Inthis scenario, the PCRF 905 may assign a QCI/ARQ to the primary userwireless devices 101 a and the secondary user wireless devices 101 b.

In an embodiment, the RF spectrum allocation method may be used to makeresources available for allocation. In the spectrum allocation method(e.g., Inter-System (Intrer freq-lessor, Inter freq prime-lessee)) theprimary network may assign spectrum resources for the use of thesecondary users in a geographic region. Based on this, the secondarynetwork providers may make available the primary network resources aschannels/spectrum of their own normal operational network (i.e., can becompatible or IRAT). This, also, may be applied to MVNO. Thus, secondaryusers may access the primary network resources on their home networksand without having to roam onto the primary network.

The spectrum allocation method may be based on a) licensed area; or b)regional area. In both the license and regional area methods of spectrumallocation, spectrum available for use by the primary network provideroperators (i.e., lessor or Network 1) may be programmable through theOMC/NMS 912. Spectrum allocation method may enable the host network toallocate spectrum based on desired bandwidth, geographic boundary of thesecondary user, time the secondary user request resources, and durationof time for which the secondary user request resources.

In an embodiment, the spectrum allocation method may make spectrumresources available to secondary users on a dynamic basis. The billingprocess for the spectrum allocation method may not involve the use ofthe host or the visiting networks billing platforms. Instead, the DPC902 may coordinate the billing for this effort.

In contrast to the virtual-best effort or virtual-secondary usermethods, the spectrum allocation method may enable the home networkoperator (Network 2) to use the allocated resources for the secondaryuser wireless device 101 and not share the allocated resources with theprimary host network. Therefore, the allocated spectrum resources may beused by the secondary users for the duration of the lease. The secondaryuser home networks may also be enabled to control the allocatedresources for the duration of the lease by using their radio accessnetwork nodes 102.

FIGS. 23A and 23B illustrate an embodiment for allocating spectrumresources to a license area 2300 using the spectrum allocation method.When allocating spectrum resources to a license area 2300, the primaryhost network may allocate a defined amount of spectrum resources to beused by secondary user home networks. Each network operator of thesecondary home network may be granted use of the allocated spectrum overa geographically defined license area. As illustrated in FIG. 23A, ablock of spectrum license 2300 may belong to a specific license area2300.

The license area spectrum allocation method may involve partitioning theblock of spectrum 2302 which may be used over the entire license area.Partitioning may be accomplished in various different channels, bysharing channels, or by other methods. As shown in FIG. 23B, the blockof spectrum 2302 may be partitioned to provide three channels 2304 a,2304 b, 2304 c for use by the primary users and channel 2304 d forleasing.

FIG. 24 illustrates an embodiment for allocating spectrum resources to aregional area using the spectrum allocation method. The regional areaspectrum allocation may involve allocating spectrum within the hostnetwork's defined license area 2300. The primary host network mayallocate certain defined geographic areas. The areas border thesecondary users which may use the allocated spectrum resources.Therefore, the geographic area designated for the use of the allocatedresources may be a sub-area of the entire license area 2300 in whichoperators have access to the spectrum. The host network (i.e., lessor)may lease, sell, option, or otherwise transfer resources on a temporarybasis to other secondary operators for their use in the geographicallydefined sub-areas. This may allow the primary host operator to reservethe use of other geographic areas to the use of their primary users orfor leasing to other secondary networks.

A single resource allocation may be defined for possible use in anoperator's license area 2300. For example, Channel (4) 2302 d may belicensed through the DSA communication system to a successful secondaryuser bidder for regions A 2402. The same Channel 4 may also be licensedto another secondary user bidder for region B 2404. Outside of regions A2402 and B 2404, the full spectrum (Channels 1-4) 2302 may be used bythe primary network. In regions A 2402 and B 2404, only Channels (1-3)2302 a, 2302 b, 2302 c may be used by the primary network operators. Inregions A 2402 and B 2404, the primary user may not use Channel (4) 2302d which is licensed to secondary network providers. For example, abidder for a resource may engage in many different contractualrelationships for spectrum including leasing, buying, optioning,trading, pool, or otherwise transfer spectrum.

Once available resources are allocated, they may be accessed based ondifferent methods. The spectrum access methods may depend on the methodof allocation used by the network which is providing the resources. Ingeneral, spectrum access methods may be divided into two categories ofroaming and non-roaming methods. When resources are accessed based on aroaming method, a secondary user wireless device 101 may be required touse the available resources by roaming onto the primary network. Whenresources are accessed based on non-roaming methods, the secondary userwireless device 101 may be allowed to remain on its home network whileusing the allocated resources.

FIGS. 25A and 25B illustrate two network diagrams showing access toresources using roaming arrangements to allow a wireless device 101 touse resources of another network according to an embodiment. Asillustrated in FIG. 25A, a wireless device 101 may currently use thespectrum of Network 1. Network 1 may communicate to DPC 902 that theadditional spectrum resources may be required to continue service to thewireless device 101. DPC 902 may also receive information from Network 2which may have additional or excess spectrum resources that may beallocated for use to the wireless device 101 from other networks.

As illustrated in FIG. 25B, once the DPC 902 confirmed that Network 2has spectrum for allocation, based on the services being used, timeand/or geographic location, the wireless device 101 may be instructed toswitch carriers from Network 1 to Network 2.

In an embodiment, a secondary user network provider may license or leasethe right to use spectrum resources that are allocated by a primarynetwork. In such a scenario, the secondary user device 101 may not berequired to roam onto the primary network to use the allocated spectrumresources. The secondary user device 101 may remain on the secondaryhome network which may make available the resources of the primarynetwork through the secondary network access points based on thelicensing terms.

FIGS. 26A and 26B illustrate a further spectrum allocation method usingshort term leasing of resources according to an embodiment. Availablespectrum may be leased to other networks by employing the DSAcommunication system, based on a license area, sub-license area or byindividual nodes, cell site. DSA communication system may make availablesuch leased spectrum for secondary use through other networks followinga geographic and space boundary determination. In an embodiment, asecondary user may access allocated spectrum of a host network throughits own secondary network and without having to switch to the hostnetwork.

FIG. 26A illustrates a wireless device 101 in communication with thewireless access node 102 a of Network 1. Network 1 may have a licensingagreement with Network 2 to use a designated block of the spectrum ofNetwork 2. In such a scenario, when the spectrum resources of Network 1are exhausted and additional resources are required, Network 1 may usethe licensed secondary spectrum resources to communicate with thesubscriber wireless devices 101. FIG. 26B illustrates a wireless device101 in communication with Network 1 using licensed secondary spectrumresources of Network 2.

Licensing of spectrum resources may enhance the capacity of a network asillustrated in FIGS. 27A and 27B. As shown in FIG. 27A, network providerA may serve a wireless device 101 through different wireless accesspoints 102 a, 102 b, 102 c depending on the geographic location of thewireless device 101. The wireless access points 102 a, 102 b, 102 c mayserve the wireless device 101 using spectrum resources from networkprovider A.

Due to increased traffic, network provider A may requires additionalspectrum resources to properly serve its subscribers. Network provider Amay license or lease spectrum resources from network provider B toenhanced and augment its available spectrum resources. As illustrated inFIG. 27B, spectrum capacity enhancement of provider A may be achievedthrough co-use of the radio access platform with provider B. In such ascenario, the wireless access point 102 a, 102 b, 102 c may broadcastspectrum signals received from both providers A and B.

Initial Cell Selection

Cell selection or origination may involve the situation where thewireless device 101 of one network is directed to another network foraccessing additional resources available on the new network. Currently,wireless devices 101 are programmed to establish connection with thecorrect networks for receiving services. To find the correct networks,once the wireless device 101 is powered on, it may search preferredPublic Land Mobile Networks (PLMN), preferred roaming list (PRL) andradio carriers that the device is authorized to use. The PLMN/PRL andlist of radio carriers may be provisioned on the wireless device. ThePLMN/PRL list may include PLMN identifications of authorized networksand carrier in ranked order.

Because the DSA communication system may provide dynamic and real-timeaccess to spectrum resources, when using the DSA system, spectrumresources may be available at networks which are not listed on thewireless device's PLMN/PRL.

As part of the DSA communication system process the wireless device 101may be programmed in advance with the appropriate PLMN list. Further,the wireless device 101 may also be provisioned over-the-air on thesecondary home network. The over-the-air provisioning may provideinstructions to one or a group of wireless devices 101 to reinitiate thecell selection process with an updated PLMN list.

Alternatively, the wireless device 101 may be configured with a clientapplication which upon receipt of a WAP/SMS message enables the wirelessdevice 101 to search for a PLMN that has been made available in the DSAprocess.

Several methods may be used to allow the wireless devices to accessavailable resources on different networks. In the DSA communicationsystem, there are at least two types of networks or source systems:virtual or existing networks. Virtual networks may include networks thatutilize the Radio Access Network (RAN) of the primary network. Whenwireless devices 101 are required to access virtual networks, theregulatory features and requirements for emergency calls (e.g., 911calls) and other regulatory stipulations may need to be addressed.

When connecting to virtual networks, the DPC 902 of the primary networkmay control the access of the secondary user wireless device 101 andaccess RF spectrum resources and the subscriber records of the primarysystem to allow the secondary users to appear as roamers on the primarynetwork. The secondary user wireless devices 101 may use a list ofpreferred networks to access virtual networks.

Alternatively, when originating using existing networks, the secondaryuser wireless device 101 may make a cell selection based upon a prioritylist of networks participating in the DSA communication system. Once thesecondary user wireless device 101 is authenticated, the DPC 902 of theprimary host network may validate the secondary user to access resourceson the primary network. If authentication or validation is notsuccessful, the DPC 902 of the primary user may send a request to thesecondary wireless device 101 via a client in the device to re-originateonto the proper system.

Wireless devices 101 may include a universal subscriber identity moduleor USIM. The USIM may be a single or dual USIM. Critical informationsuch as data required to select the correct network may be stored on theUSIM. By using a USIM, a wireless device 101 may be enabled to no longeruse a PLMN. USIM may have stored upon it information such as homeInternational Mobile Subscriber Identity, or IMSI (HPLMN),prioritization list of permitted VPLMNs and forbidden PLMNs list.

If a wireless device 101 uses a dual USIM, it may be enabled toimmediately access spectrum resources available in an alternativenetwork. The dual USIM may further enable a multiband, multimodewireless device 101 to access a variety of networks in the DSA as wellas using standard roaming arrangements.

FIG. 28 illustrates an embodiment method 2800 for network and cellinitialization by a wireless device 101 in the DSA system. The initialnetwork and cell selection may begin with the wireless device 101 whenit is either powered on or trying to reestablish connectivity, block2802. The wireless device 101 may initially search the PLMN/PRL listthat is stored on the device, block 2804, and select a cell byreceiving, reading and determining the strength of nearby cell sitebroadcast channels, block 2806.

The wireless device 101 may read the cell site broadcast channel anddetermine whether the cell site offers the correct system, determination2808. The wireless device 101 may select and establish a connection tothe best cell site available. To identify the best cell site available,the wireless device 101 may measure the adjacent cells based upon theaccess technology to determine which cell is the best to utilize.

If, at initiation, a suitable cell is not available (i.e., determination2808=“No”), the wireless device 101 may use the Any Cell Selectionprocess/stage and continue to search for a suitable cell site byselecting the next PLMN/PRL listing until it finds a site that allowsnormal access following the access protocol in the appropriate PLMNlist, block 2810.

If the correct system is available through the selected cell site (i.e.,determination 2808=“Yes”), the wireless device 101 may receive and readthe System Information Block (SIB)/Master Information Block (MIB)transmitted by the selected cell site, block 2812. The SIB/MIB mayinclude information about the network that the cell site is serving andavailable services through that network.

In an embodiment, SIB/MIB may include a host of information such as PLMNID(s), Cell ID, traffic allocation identifiers (TAI) (routing area), LTEneighbor list, LTE non system sites, GSM cCells, UMTS cells, and CDMAcells. This information may be used by the wireless device 101 fordifferent purposes. For example, when the wireless device 101 moves fromeNodeB to eNodeB, it may use the SIB/MIB information sent from the neweNodeB to determine that a change has occurred in the serving eNodeB. Todetect the change in eNodeB, the wireless device 101 may identify thechange in SIB/MIB information which may include a change in change inthe PLMN availability and TAI parameters. TAI defines specific routingareas that can further be used to refine a geographic region in whichthe wireless device 101 can use available resources.

SIB/MIB information may be transmitted to the cell site by the network.The cell site may receive the network information through the HSS 926 ofthe network. In addition to the data transmitted through the SIB, theHSS 926 of the network may also provide the information as to whichPGW(s) 908 the wireless device 101 may use to access resources on thenetwork.

Upon reading the SIB/MIB, the wireless device 101 may determine whetherreselection is required, at determination block 2814. If no reselectionis required (i.e., determination block 2814=“Yes”), the wireless device101 may camp on the cell channel, in block 2816. If system reselectionis required (i.e., determination block 2814=“No”), the wireless device101 may be instructed to reselect a new cell or system based on the cellselection/reselection process, block 2818.

While camping on the selected cell site, the wireless device 101 mayreceive additional information and instructions over the air from theselected network, such as updated list of public land mobile network orPLMN/PRL. The wireless device 101 may also continue to monitor theSIB/MIB for any changes or additional information.

In an embodiment, the SIB/MIB may provide a Secondary Access Class whichmay enable the wireless device 101 to determine which channels based onthe DSA process it can use for access through the reselection process.The SIB/MIB may also include data to enable the camping wireless device101 to reselect another radio access technology (IRAT) and attempt toacquire a control channel on the new Radio Access Terminal (RAT). Theinformation in the SIB/MIB may, thus, be used to instruct a wirelessdevice 101 to reselect another RAT that is associated with the same oranother network which may be on a another frequency band.

Cell reselection, which may trigger PLMN selection, may be controlledvia specific parameters. For example, the DSA communication system mayemploy barred PLMN-id to prevent a wireless device 101 using resourcesfrom one network to attempt to roam on to other networks. For example,the DSA communication system may prevent a secondary user wirelessdevice 101 using resources of a primary host network to roam back to orestablish connection with the secondary home network. Similarly, the DSAcommunication system using a PLMN id prioritization scheme that is overthe air (OTA), client activated or dual USIM driven may also prevent awireless device 101 using resources of a network to reestablishconnection with other networks unless the DSA communication system rulespermit.

In an embodiment, a wireless device 101 that is camping at a cell sitemay be instructed to perform cell reselection when the capacity of thecurrent cell reaches a predetermined level. In such a scenario, the DSC910 of the current camping network, using the OMC 912, may change theSIB/MIB of the current network to include instructions the campingwireless device 101 to perform a cell reselect and search for anotherTAI area or system. The instructions to perform a cell reselect may alsobe forwarded by the WAP/SMS message to the wireless device 101.

FIG. 29 illustrates an embodiment network diagram for cell reselectionusing changes in the TAI. When using a network, different wirelessdevices 101 may be assigned different TAI's depending on theirparticular uses and device types. For example, a network may assign oneTAI to DSA communication system users. The network may also assignanother TAI to devices which do not use the DSA communication system.The advantage of using multiple and layered TAI's may enable the TAIassigning network to selectively tailor usage traffic. The multiple andlayered TAI's may further enable the TAI assigning networks to preventthe wireless devices 101 that may have correct PLMN-id but are notsupposed to use the selected area from selecting the cells but may bedenied service or may be forced into cell reselection.

In an embodiment, a special client may be installed on DSA communicationsystem compatible wireless devices 101 to enable the wireless devices101 to determine which system and RAT is supposed to use on secondarybases. The PLMN/PRL list of the client application may be updated byreceiving an SMS or WAP that may be transmitted to the handset via atext message or through a data (IP) session. The updated clientapplication may instruct the wireless device 101 to go to the properchannel for accessing allocated resources of a primary network.

Using a client application may facilitate the implementation of the DSAcommunication system in legacy networks and systems which may or may notpossess the ability (e.g., due to software load) to have a secondaryaccess channel defined in the SIB.

In idle mode, the wireless device 101 may be instructed to perform intraand inter frequency measurements in the cell reselection process. Usinginformation in the SIB/MIB or from the client application, the wirelessdevice 101 may perform intra-frequency search, inter-frequency, orinter-radio access tech (iRAT). This process may be controlled by UTRAN.The Intra and Inter frequency measurements or inter-radio accesstechnologies may be on a region or cell/sector bases, depending onconfiguration of the wireless device 101.

Authentication of Secondary User Wireless Devices:

Once the wireless device 101 selects the appropriate cell site andbefore it enters an idle mode, the wireless device may need to beauthenticated by the system on which it is camping. The selected networkrequires validation and authentication of the wireless device 101 toensure that the device possesses the required permissions to access thenetwork.

The DSA communication system may authenticate a wireless device 101using different methods. Authentication of the wireless device with theDSA may depend on the business arrangements between different providersand the DSA system. For example, authentication may be based on generalor prioritization levels. The authentication process may be followedusing the DPC 902 HSS 904 as the anchor and this may be accessed by theAAA/AuC of the 3G/2.5G networks of the PCRF 904 in LTE or similarplatform. The Host Network may authenticate the secondary users by usingstandard MAP/IS-41 signaling.

Upon authentication, each entrant may be assigned: (a) defined usagelevel allowed on host network; duration permitted on system; purchasetype (e.g., wholesale or a range of IMI's); HSS would allow redirectingof inbound calls; applications would continue where they relied on aserver which is accessible from the backend.

Monitoring and Tracking of Allocated Resources:

The DSA communication system may ensure that the primary networkprovider always has adequate resources to manage traffic on the primaryprovider network (e.g., Network 2). Therefore, depending on the volumeof traffic, the DSA communication system may dynamically on a real-timeand/or statistical basis alter the spectrum/capacity available tosecondary users.

For example, at peak hours, call traffic may increase in the primarynetwork. When call traffic increases in the primary network, the DSAcommunication system may reduce the amount of spectrum available forallocation to secondary users to ensure that the primary users haveadequate resources.

The DSA communication system may manage allocation of and access toresources based on different factors including priority level of theusers, time the spectrum is used and the geographic location of theuser. In an embodiment, when the secondary access to the primary networkis related to certain events such as disasters, emergencies, firstresponders or public safety, the DSA communication system may manage thesecondary use of the primary system by using different prioritization.For example, when secondary users are first responders who are using theprimary network resources, the DSA communication system may maintain orincrease the resources allocated to the secondary users by the primarynetwork provider to allow the emergency calls to go throughsuccessfully, even to the detriment of the primary network users.

In an embodiment, the use of spectrum resources of one network by asecondary user may be managed and controlled by different components ofthe DSA communication system such as the DPC 902. For example, the DPC902 of a primary network may monitor the use of the allocated spectrumresources to ensure appropriate steps are taken when allocated resourcesare exhausted or no longer available for secondary use.

The DSC 910 of the primary network may be configured to monitor orreceive data regarding the traffic levels associated with the primarynetwork on which the wireless devices 101 is operational as a secondaryuser. The DSC 910 may further be configured to off-load the secondaryuser by downgrading resources, forcing to terminate (i.e., off-load) aconnection of a secondary user or redirecting a secondary user toanother carrier or channel set if the primary network capacity thresholdis reached.

The DSC 910 of a primary network may also inform the DPC 902 whenoff-loading of secondary users may be required. For example, anunexpected surge of primary callers may cause the DSC 910 to requestthat secondary users be off-loaded to make available resources for theprimary users. When off-loading of secondary users is initiated,technical access parameters may be sent to (OTA) to the wireless device101. Alternatively, the system may dynamically assign resources via LTEusing the X2 link instructing the defined wireless device 101 tohandover to the new LTE network.

Off-loading of secondary users may include redirecting the secondaryusers' connections back to the secondary user's own network, to anotherprovider network or channel or disconnecting the secondary users'connections with the primary provider network. For example, when aprimary host network may be required to terminate a secondary user dueto increased demand on the primary network, the DPC may be configured todetermine whether other networks are available to redirect the secondaryuser's connection instead of terminating. The DPC 902 may inquire forresources from DSC 910 of other networks. If the resources are availablefor use in other networks, the DPC 902, using a rule set, may determinethe most cost effective connection with another host network whichsatisfies the resource request requirements. Once the DPC 902 hasidentified another host network to which the secondary user wirelessdevice 101 may be redirected, the DPC 902 may instruct the wirelessdevice 101 to transition over to the new host network for thecommunication session. The process of off-loading of secondary users mayinclude handover or back-off processes which are explained in moredetail below.

In a further exemplary embodiment, the DPC 902 of the host network mayalso be configured to instruct the primary host network to release thesecondary user wireless device 101 back to the secondary home networkafter the use of the primary network resources is completed. The DPC 902may further be configured to force terminate the secondary user'sconnection with the primary network if the DPC 902 determines thatadditional capacity is required for use by primary users.

If sufficient capacity is available, the DPC 902 may force the secondaryuser to continue to use the resources of the primary host network untilthe traffic volume on the primary host network requires additionalaction based on rule sets.

In the various embodiments, the DSA may further manage the use of theallocated and accessed spectrum. For example, the DSA communicationsystem may manage the use of the host network's RF spectrum by employinga back-off mechanism. When the host spectrum network is accessed by highpriority users, the spectrum may rid of lower priority users to makeavailable spectrum to higher priority users.

FIG. 30 illustrates a network architecture diagram 3000 for monitoringand tracking of spectrum usage according to an embodiment. Tracking andmonitoring of the use of spectrum resources may be performed usingdifferent methods. In a DSA communication system using the virtual-besteffort method of resource allocation, the DSC 910 may monitor usage ofspectrum resources based on pre-arranged billing information andcommunication with the primary network billing platform.

The DSC 910 may monitor the usage level for the group and also trackusage level with the PGW 908. The usage may be compared and monitoredagainst what was anticipated or rather successfully bid. Once apredefined amount of the allocated resources are used by a secondaryuser, the DSC 910 of the primary network may be configured to generate anotice that resources are reaching a critically low level and send it tothe secondary network provider through the DPC 902. The secondary usermay receive the notice through its own DSC 910. Upon receipt of thenotice, the secondary user provider network may rebid for additionalresources or simply let the remaining resources to run out.

In the event that a secondary user is actively using a primary networkwhen allocated resources are fully consumed, the primary network mayinstruct the secondary user wireless device 101 to reconnect to the homenetwork (secondary user network provider), terminate the wirelessdevice's connection, or charge an overage or supplemental fee to thesecondary network based on a previously negotiated contract. Upontermination of connection, the secondary user wireless device may not beable to access the primary network resources unless additional resourcesare allocated for the secondary user.

In a DSA communication system using the virtual-secondary user method,the DSC 910 may monitor the usage of the allocated resources based onpre-arranged billing information and communication with the host primarynetwork billing platform. The process of monitoring the usage of theallocated resources based on a virtual-secondary user method may involvementoring the usage level for the group and also tracking usage of thelevel with the PGW 908.

Similar to the DSA communication system using the virtual-best effortmethod, the DSA communication system using the virtual-secondary usermethod may monitor the usage by comparing the usage against the amountof resources that was allocated to the secondary user network provider.Once a predefined amount of the allocated resources are used by thesecondary user, the DSC 910 of the primary network may be configured togenerate a notice that resources are reaching a critically low level andsend it to the secondary network provider through the DPC 902. Thesecondary user may receive the notice through its own DSC 910. Uponreceipt of the notice, the secondary user provider network may rebid foradditional resources or simply let the remaining resources to run out.

In the DSA communication system that is using the virtual-secondary usermethod, after allocated resources are exhausted, the secondary user maybe terminated by different methods, for example by 1) No prioritizationback-off; or 2) prioritization back-off as discussed below.

In the no prioritization back-off method, when the allocated spectrumresources at the pre-determined level are consumed, no further usage maybe permitted. Once allocated spectrum resources are exhausted, theprimary network DSC 910 may instruct the secondary user wireless deviceto connect to the secondary user home network, terminate the secondaryuser wireless device's connection with the primary network, or charge anoverage free based on previously negotiated contracts. Upon terminationfrom the primary network, the secondary user wireless device may not beable to access the primary network resources unless additional resourcesare obtained by the secondary home network provider.

In the prioritization back-off method, when the allocated spectrumresources are at critically low levels and before the resources arecompletely consumed, the primary network may commence a back-off processduring which the primary network may place the secondary user wirelessdevice 101 on another suitable network. If not, other suitable networksare available to accept the secondary user wireless device 101, theprimary network may handover the secondary user wireless device 101 backto the secondary user home network. The primary network may credit thesecondary network for any allocated resources that were not used by thesecondary users.

When using the resource allocation method, the primary host network maymonitor allocated resources differently depending on whether resourcesare allocated based on a license area or regional area method.

If the allocation of resources is preformed based upon a license areamethod, the primary network may monitor the usage of the resources bythe secondary users. When the allocated resources are near exhaustion,the DSC 910/DPC 902 may inform the secondary user network that thetemporary lease of the resources is about to expire and provide anopportunity to the secondary network to bid for and purchase additionalresources.

If the secondary network fails to or refuses to obtain additionalresources, the primary network may terminate or back-off the secondaryuser from the primary network using different methods, such as, 1) noprioritization back-off; or 2) prioritization method.

In the no prioritization back-off method, when the lease of theresources is expired, the spectrum resources may no longer be availableto the secondary users. The primary network may instruct the secondaryuser wireless devices 101 to either handover to another radio accesssystem in their network or terminate their use.

In the prioritization back-off method, the primary network's DSC 910/DPC902 may coordinate resources with the DSC 910 of the secondary networkwith respect to the affected sites. The secondary network may attempt tohandover the secondary user wireless network to another network, basestation, radio access channel or system for the affected area. Theprimary network may credit the secondary network for unused allocatedresources.

If the allocation of resources is preformed based upon a regional areamethod, the primary network may monitor the usage of the resources bythe secondary users. When the allocated resources are to expire and neara predetermined completion level, the DSC 910/DPC 902 of the primaryhost network may inform the secondary home network that the impendingtermination of resources. The primary network may provide the secondarynetwork an opportunity to rebid for additional resources.

If the secondary network fails or refuses to obtain additionalresources, the primary network may terminate or back-off the secondaryuser from the primary network using different methods, such as, 1) noprioritization back-off; or 2) prioritization method.

In the no prioritization back-off method, when the leased term for theallocated resources is expired, the secondary user may no longer haveaccess to the spectrum resources of the primary network. The primarynetwork may either hand over the secondary user to another radio accesssystem in their network, which can be a host network or another networkor terminate the secondary user's access to the primary networkresources.

In the prioritization back-off method, the DSC 910 and DPC 902 of theprimary network and the DSC 910 of the secondary network may coordinateresources with the affected sites and commence the back-off processbefore the lease of allocated resources is expired. The secondarynetwork may attempt to handover the secondary user wireless network toanother network, base station, radio access channel or system for theaffected area. The primary network may credit the secondary network forunused allocated resources.

Handover of Secondary Users During Off-Loading:

In an embodiment, the DSA communication system may employ handovermethods to prevent interruptions during or maintain communicationsessions between wireless devices 101, the DSA communication systemand/or network providers. For example, a communication session mayinclude a wireless device 101 establishing connection with a network.Handover may occur when the wireless device's 101 connection migratesfrom the home network to a host network and back to the home networkduring the period of one communication session. The SIB/MIB generated bythe network may include the list of cells and networks that may be usedto handover a communication session.

Outside of the DSA communication system, mobile assisted handovers mayinvolve the wireless device 101 informing the servicing network that abetter server is available and changing the connection from the currentserver to the better server. Such mobile assisted handovers may beperformed when wireless devices are roaming on host networks. However,the DSA communication system may not allow such mobile assistedhandovers, because the best server for roaming purposes may not be themost optimum cell for capacity relief Communication sessions with theDSA communication system may involve circuit switch or packet switchedservices.

FIG. 31 illustrates a network component diagram of an embodiment networkcapable of performing handover of communication sessions. To implement ahandover of a communication session, certain connectivity betweencomponents of the host and home networks (e.g., network A and network B)may exist. For example, the PGW 908 of the host and the home networksmay be connected. The PGW 908 of the host and home networks maycommunicate through the Internet or a private data network. The PGW 908of the host may also be connected to the SGW 922 of the home network.The ANDSF 918 of the host and home networks may also be connected toallow handover to the legacy system and to invoke the back-off processwhen the wireless device is required to migrate from the host to thehome network.

Access Network Discovery and Selection Function (ANDSF) is used tomanage intersystem mobility policy and access network discoveryinformation stored in a wireless device supporting provisioning of suchinformation from an ANDSF. The ANDSF may initiate the provision ofinformation from the ANDSF to the wireless device as specified in 3GPPTS 24.302 [3AA].

FIG. 32 illustrates a network diagram of an embodiment method for mediaindependent handover. The ANDSF through the DSA process may initiate thehandover by sending a SMS/WAP message to the wireless device 101instructing it to go a gap or non-gap handover. The handover process maybe initiated under different circumstances and for different reasons.For example, a network may commence a handover process based on contractspecifications between the host and the home network, based on the levelof resources at the host network and whether the resource has reached apredetermined threshold, based on resources leased by the home networkbeing exhausted or based on whether a back-off process is initiated.

When the host resources are no longer available for use or a back-offprocess is initiated, the DSA communication system may employ additionalcomponents or schemes to handover a communication session. In such ascenario, the eNodeB of the host network may perform a back-off processbased on the QCI and ARP designations. The eNodeB 916 back-off mayinvolve handing over the current communication session from the hosteNodeB 916 b to another eNodeB through the use of the X2 link betweenthe exchanging networks. This process may also be achieved by using theDSMPTA process with the ANDSF.

To initiate and implement a handover process, the host network maygenerate and send certain commands to the wireless device 101. Forexample, three different types of handover include: 1) Interfreq; 2)intrafreq; and 3) IRAT.

In the interfreq handover, the network currently serving a wirelessdevice 101 (i.e., the current network) may initiate handover of thewireless device 101 from the current network to another network. In theintrafreq handover, the current network may initiate a handover of thewireless device 101 from one cell in the one network to another cell inthe same network for capability offload. In the IRAT handover, thecurrent network may initiate wireless device 101 handover to anotherRAT.

The interfreq handover may be initiated when the current network sendsinstruction to the secondary user wireless device 101 to begin using theresources of another network. For example, a wireless device 101 on ahome network may be instructed to use a host network for largeupload/downloads of files.

The interfreq handover may be used to offload a secondary user from ahost network based on the policy decision in place. The interfreqhandover may further be used when a wireless device 101 no longer needsto use the services of the host network as a secondary user and thus maybe sent back to the its home network.

The interfreq handovers may further be used when a wireless device 101leave the DSA communication system cluster or cell area and requires tocontinue its communication session. In such a scenario, the wirelessdevice 101 may be either transferred to another network/cluster or sentback to the home network. The interfreq handovers may further be used torelieve network capacity constraints by allowing some primary users touse the services of another network as secondary users.

The intrafreq handovers may be used in current network to relieve cellcongestion by shedding traffic from one cell to another. To avoid aping-pong effect which may prevent resolving capacity issues, theintrafreq handover commands may bar wireless devices 101 from using theneighboring cell/sector, as appears on the PLMN/PRL list, for definedperiods of time.

IRAT handovers may be used to redirect wireless devices 101 to anotherRAT. During a handover from one IRAT to another, both ratio accesstechnology and frequency of operation may be changed. This type ofhandover may be used when the DSA communication system is available andthe wireless device 101 is initially active on a particular channel. Thecurrent network may instruct the wireless device 101 to change toanother RAT through the IRAT handover process. In one embodiment, thehandover command may be initiated from a current network, oralternatively the handover command may be initiated from a differentnetwork or entity. Thus, if the wireless device 101 communicationsession is dropped during the handover process, the wireless device 101may be able to reestablish the communication session with the target RATand not revert back to the previous network.

In one non-limiting embodiment, the session may be dropped duringINTERFREQ and/or INTRAFREQ handovers. In this embodiment, the device mayreestablish connections by reverting back to a previous network.

FIG. 33 illustrates a network component diagram of an embodiment systemrequired for initiating a network handover as part of the DSA process.The handover process may be initiated by the DSC 910 based on its rulesets which are established prior to the bidding or during the biddingprocess. The use of the ANDSF 918 may enable both intrafreq, interfreqand IRAT handovers to take place allow for maximum flexibility.

Back-Off of Secondary Users from the Host Network:

The DPC 902 may continuously monitor the host network resources toensure that sufficient levels of resources are available for the use ofthe primary users of the host network. When the capacity of availableresources at the host network reaches a predefined threshold, the hostnetwork may instruct the wireless device 101 to begin a back-off processof the secondary users. The back-off process may be initiated to free-upresources at the hosting network.

When resources need to be made available to primary users or subscribersof a network, the DSA may initiate a back-off of the secondary users tofree-up additional resources. The back-off process may involve differentor combined methods depending on the DSA configuration. However,commonality of the back-off policy is done using the wireless device 101type and any special flags associated with the device, policy decisionfor redirecting active and idle traffic, policy decision as to whom andthe order to shed traffic, and re-provisioning either OTA or viaactivating a client application.

In an embodiment, the DSA communication system may be configured toemploy tiered priority access (TPA) rules (as explained in detail abovewith respect to FIGS. 1-8) when initiating back-off processes. Forexample, the back-off process may be initiated when a resource levelreaches a predetermined threshold level which may be user defined. Thethreshold detection process may include traffic monitoring of the RadioAccess Network (RAN) and Core Network resources and determining whethera predetermined threshold level is reached which may trigger QoS orrequire shedding of secondary users to free-up resources.

Threshold levels for RAN and Core Network resources may be determinedbased on the traffic usage that secondary users may generate. Forexample, when more than 85% of the RAN resources are used, back-offprocess may be implemented to either reduce the throughput of thesecondary users or shed secondary users from the host network or both.By initiating the back-off process, the host network ensures that amountof available RAN and Core Network resources always remain above 15%.

In an embodiment, the back-off process of the DSA which would allow eachhost network to maintain certain amount of resources free at all timesmay be proactive and independent of actual incidents. In the event of anincident, such as a natural disaster, the DSA communication system mayhave the capacity to make available free resources to first respondersand employ the TPA process if additional resources are necessary.

In an embodiment, the DSA communication system may monitor the trafficduring the back-off process and begin to release RAN resources forsecondary use at user defined intervals.

In an embodiment, each host network may employ certain back-off policiesand resource criteria in deciding whether to initiate a back-offprocess. These policy and resource criteria may include: spectrumavailability (separate or co-existence); capacity/bandwidth availability(RF and Core); overhead criteria (percent total available capacity vs.used capacity); back-off criteria (reselection, handover-intra systemand inter-system) termination); treatment (how specificservices/applications are treated/routed); barred treatments (whichservices/applications are barred for use); rating (how services arerated, i.e., possible special discount for off-peak usage); geographicboundary (define zone or cell for inclusion); time (define time andday(s) for inclusion); duration (define incremental allocation based ontime and geographic boundary); user equipment types.

Back-off process may be implemented differently for different resourceallocation methods. In an embodiment, the back-off process for thevirtual-best effort (pure roaming) allocation method may be governed bythe PCRF 905 policy rules set forth in the (EPC). The eNodeB may also beconfigured to initiate traffic reducing actions based on capacity loadsby using the X2 link. In such a scenario, the eNodeB may enable the hostnetwork to shed secondary users by handing off traffic to the adjacentcell sites. In one embodiment, the eNodeB may send instructions to oneor more entities including the UE. In another embodiment, the eNodeB mayinitiate the process.

Additionally the back-off process for DSA may also involve one or moreitems which will be governed or instituted through the DSC following theagreed upon policy based rule sets and are meant to ensure sessioncontinuity or re-allocation of the UE to another access method in anattempt to ensure the user experience is maintained during the back-offprocess.

In an embodiment, the (DSMPTA) back-off process for virtual-best effortmay be above and beyond the typical rule sets which are part of theAccess and EPC. When traffic reaches a pre-defined threshold, the DSAcommunication system may initiate one or a combination of processes toimplement a DSMPTA back-off process. The PCRF 905 may dynamically adjustthe QCI/ARQ values for the secondary user wireless device 101. This mayinvolve restricting the bandwidth or placing usage onto a best effort orlower priority scheme. The cells which are experiencing capacityconstraint may be placed on a barred cell list so that no additionalsecondary user may access the cells. The updates to the barred cell listmay be communicated to the wireless devices 101 through re-provisioningthe broadcast message that is sent to the wireless devices 101. Thebroadcast message may be updated with information regarding the barredcells and the neighboring available cells.

To ensure that the wireless devices 101 receive and read the broadcastmessages regarding the barred cells and the available neighboring cells,the DSA communication system may send WAP/SMS messages to the configuredwireless devices 101 to force them to reselect. The wireless devices 101will have to read the broadcast messages when they enter the reselectionprocess.

In an embodiment, the DSA may initiate close service groups to restrictthe use of particular cells sites to the roaming wireless devices 101.The combination of CSG and TAI's which may be involved with the capacityissue may restrict the secondary user wireless device 101 from accessingthe network. For example, the CSG and TAI may drop callers, may reducequality, may expand the network, or may provide other items to deal withthe capacity issue.

In an embodiment, during a back-off session, the ANDSF 918 mayfacilitate a handover of the secondary users to another network or backto the secondary user home network. ADDSF 918 may initiate a networkhandover if connectivity is available with another network. The wirelessdevices 101 may be handed over to another network or another accessnetwork (RAT/IRAT).

In an embodiment, the back-off process in DSA using a virtual-secondaryuser method of resources allocation may be governed by the PCRF 905policy rules set forth in the EPC and DPC 902. The PCRF 905 policy rulesof a primary host network which apply to the secondary users may takepriority over those enforced by the DPC 902. However, the PCRF 905policy rules of the primary host network may be dynamically changed oramended based on the conditions set forth by the primary host networkoperations requirements. Additionally, the back-off process in a DSAcommunication system may involve additional items. The implementation ofthese additional items may be controlled and governed through the DSC910 of the primary host network based on the agreed upon policies andrules sets. The DSC 910 policies and rules are designed to ensurecommunication session continuity and good user experience during theback-off process.

In the event that the existing policies and rule sets in the Access andEPC fail to apply to a back-off process, the DSMPTA back-off process forsecondary users may be implemented. For example, when primary hostnetwork traffic reaches a predetermined threshold level, the host DSC910 may instruct the host eNodeB to handover the secondary user toadjacent cell sites within the host network using the X2 link and basedupon the secondary user wireless device 101 QCI/ARQ rule sets.Alternatively, the DSC 910 may instruct the host eNodeB to handover thesecondary user to the home network using the X2 link when the host andhome networks are connected for full mobility.

Based upon instructions received from the host DSC 910, the host PCRF905 may dynamically adjust the QCI/ARQ values for the secondary userwireless devices 101. For example, the host PCRF 905 may restrict thebandwidth, change resources allocation method to virtual-best effort, orchange priority schemes to low priority.

The DSC 910 may instruct the host network to update or generate a listof barred cells and include the cells which are currently experiencingtraffic capacity that is above the predetermined traffic capacitythreshold. The DSC 910 may further instruct the host network tobroadcast a message to re-provision the secondary user wireless devices101 with the updated barred cell list. The broadcast message may furtherinclude information regarding the next ring or multiple rings of cellsadjacent to the constrained cell or group of cells. The broadcastmessage may include changed and valid PLMN-ids, altered TAI for the cellor cells, and altered neighbor lists for the use of the secondary userwireless device 101 to perform a handover process or networkreselection. To ensure that secondary user wireless devices 101 checkfor the re-provisioning broadcast messages, the host network may send aWAP/SMS message to configured wireless devices 101 to force them toperform network reselection.

The host DSC 910 may further instruct the host network to initiate CloseService Groups (CGS) to restrict the use of particular cell sites to theroaming secondary user wireless devices 101. The combination of CGS andTAI involved with the network capacity may restrict access of theroaming secondary user wireless devices 101 to the host network. Theaccess restriction effectuated by the combination of CGS and TAI mayrender the host network only accessible to designated primary users.

In the event that connectivity exists between the primary host andanother network (e.g., the secondary home network), the host DSC 910 mayinstruct the host ANDSF 918 to initiate a network handover of thesecondary user wireless device 101 to another connected network oraccess network (RAT/IRAT).

To reduce capacity overload when eNodeB is x-furcated for resourcesallocation and access, the host OMC 912 (or other policy based controlsconfigured to manage capacity) may instruct the eNodeB to shed theresources accessible to the secondary user wireless devices 101.Accordingly, the resources designated for secondary use and associatedwith an eNodeB for the affected area may be reduced. The reduction inavailable resources of an eNodeB may be force handovers to orreselection of adjacent cell with resources.

The reallocation of eNodeB resources may be balanced by host networkinitiated handovers to force the secondary user wireless devices 101 tohandover to another network on which they can roam and be provided withadequate resources. For example, the handovers may be interfreq RAT orIRAT handovers.

The host PGW 908 may also be used as part of the back-off process. TheSG of the secondary user wireless devices 101 may be connected to theappropriate host PGW 908 based on the policies and rules of the host HSS904 and PCRF 905. The host DSC 910 may control the bandwidth of theconnection between the host PGW 908 and wireless device's 101 SG. Duringthe back-off process, the host DSC 910 may initiate the host network toreduce the bandwidth between the PGW 908 and secondary user wirelessdevice's 101 SG which are being moved out of the host network. Theprocess by which the DSC 910 may reduce bandwidth between the PGW 908and SG may be governed by predetermined policy and rules. The host DSC910 may continue to monitor the host network cells which may beoverburdened by high traffic and assess additional bandwidth reductionto the host PGW 908-device SG connection to reduce traffic.

Not all the processes initiated by the DSC 910 as part of the DSMPTback-off process may be necessary and the implementation of theseprocesses and the order in which they may occur may depend on theagreements between the host and home networks.

In an embodiment, the back-off process may be implemented in the DSAcommunication system using a spectrum allocation method of resourcesallocation. The spectrum allocation method may include the license areaand regional area methods for resources allocation.

In an embodiment, the back-off process for a DSA using a license areamethod may involve the reallocation of the spectrum resources from thesecondary home network (i.e., lessee) to primary host network (i.e.,lessor). The host network using the license area method may initiate theback-off process to handover all the existing secondary user wirelessdevices 101 from the lessor's spectrum to another network or back to thehome network. The time frame for the reallocation will be predeterminedbased on rule sets defined by the lessor and lessee agreements.Depending on the time frame defined in the rule sets, not all thesecondary users may be migrated out the host network in time and as aresult, some secondary users may be dropped.

Based upon pre-negotiated agreements between the lessor and the lessee,the host network may determine whether the back-off process may beapplied to a portion of or the entire license area. Based on thegeographic region involved for capacity relief, spectrum reallocationmay not be required for every cell of the entire license area.Accordingly, back-off processes may be implemented in sub-license areasof the licensed area.

In implementing the back-off process for an entire license area, thehost DSC 910 may inform the DPC 902 that the host network has reached apredefined threshold of traffic capacity. The DPC 902 may communicatethat message to the home DSC 910. The home DSC 910 may reduce the hostresources available to the home eNodeB in a stepwise manner and handoverthe secondary user traffic to a non-leased spectrum. The steps ofreducing the available resources to the eNodeB may be performed on apredefined time intervals bases. If traffic is not migrated in a timelymanner, the home DPC 902 may initiate network handovers to migrate thesecondary users from the host network to another appropriate channel.Once the resources are freed, the home eNodeB may remove the channelfrom its available channel lists.

In implementing the back-off process for sub-license areas (in opposedto the entire license area), the process above may be implemented exceptthat defined cells or TAI's may be used instead of the entire licensearea.

Once the capacity restrictions are resolved by the host network, thespectrum may be reallocated to the home network. To reallocateresources, the host DSC 910 may inform the DPC 902 that spectrumresources are again available for use by the home network. The home DPC902 may inform the home DSC 910 that resources are again available. Theresources may be reallocated to the home network based uponpredetermined policies and rule sets.

For back-off processes which are not governed by rules and policies inthe Access and EPC, the host may initiate a DSMPTA back-off process. Itmay be possible that based on the rules sets.

In an embodiment, the back-off process for a DSA communication systemusing a Regional area method may depend on the policies and rule setsagreed upon by the lessor and the lessee.

The back-off process in a DSA using the Regional area method ofresources allocation may include handing over all the existing secondarywireless devices 101 using the host spectrum in the regional area orsub-regional area back to the home or another network. The host DSC 910and DPC 902/DSC 910 rule sets may define whether the secondary usersshould be moved from the entire or a sub-set of regional area.

The timeframe for the reallocation of resources during the back-offprocess may be predetermined based on policies and rule sets agreed uponby the lessor and lessee. Not all the traffic may be successfullymigrated to the home or another network during the back-off process ifthe timelines set forth in the agreement is not met. In such a scenario,some connections may be dropped or lost as soon as the predeterminedtimeframe is expired.

Upon initiation of the back-off process, the lessee network resourcesassociated with the home eNodeB may be reduced in a stepwise manner. Thehome OMC 912 may initiate reduction of the resources by the eNodeB.Other policy based components of the home network, such as the DPC 902may also initiate the reduction of resources by the eNodeB. The homenetwork may facilitate the handover of the secondary users from the hostnetwork spectrum to the home network spectrum. If the home network doesnot have the capacity to handle the traffic volume or handover is notbeing performed in a timely fashion, it may either handover thecommunication session to another network or channel or force thesecondary user wireless devices 101 to perform a reselection process.Once the eNodeB has handed over all the secondary users from the hostspectrum, it may remove the spectrum channel from the available list ofchannels accessible to secondary users.

Once the capacity restrictions are resolved by the host network, thespectrum may be reallocated to the home network. To reallocationresources, the host DSC 910 may inform the DPC 902 that spectrumresources are again available for use by the home network. The home DPC902 may inform the home DSC 910 that resources are again available. Theresources may be reallocated to the home network based uponpredetermined policies and rule sets.

FIG. 34 shows a smart phone 101 a, a laptop 101 b, and a cell phone 101c communicating with an element 3402 that is connected to a prime 3404and a secondary 2306 and which communicates with a base station 102 aand 102 b via a primary RAT and a secondary RAT. The base station 102 aconnects with a primary network and the base station 102 b connects witha secondary network 102 b. In an embodiment, as illustrated in FIG. 34,the DSA communication system may allow wireless devices 101 a-101 c toaccess several Radio Access Technologies (i.e., primary and secondaryRATs) simultaneously. For example, the DSA may enable a wireless device101 using a primary RAT of a primary network to access a secondary RATon a secondary network only for certain types of services. For example,when the wireless device 101 use of the primary network causes highvolume or bursty traffic, the DSA communication system may enable theprimary network to offload and send the high volume and bursyt trafficto the secondary network. For example, prime and secondary element 2306and 3404 may provide data to route traffic over to the primary andsecondary wireless networks and base stations using a header. Switchingmay occur using a DSA to switch between the networks. In anotherembodiment, the switching may occur using the element 3402, primecomponent or secondary component 3404 or 3406. In yet anotherembodiment, the switching may be initiated by the prime or secondary DSAnetworks, or by another entity that views the capacity of the network.

FIG. 35 illustrates a message flow diagram 3500 of the arbitrate processin a DSA communication system according to an embodiment. In thisembodiment, one bidder (i.e., Network 1) is used for simplicity,however, it is contemplated that multiple bidders may use this process.Network 1 3501 may send a request for resources message 3502 to the DPC902. The DPC 902 may receive the request message and send queries 3504,3506 to participating DSCs 910 a, 910 b of Network 2 and Network 3 basedon pre-defined criteria which may include types and capabilities of theuser wireless device 101 in addition to the geographic criteria of therequesting wireless device 101. Geographic criteria may includegeographic location, geographic polygon or license area of the userwireless device 101. The geographic criteria request may includeparameters that are greater than those that the host network may permit.The DPC 902 may receive resource inquiry responses 3508, 35010 from eachDSC 910 a, 910 b that was contacted.

The DPC 902 may send a resource availability message 3512 to informNetwork 1 that the requested resources are available through DSC 910 a.Network 1 3501 may receive the resource availability message 3510 and inresponse send a resources request message 3514 to the DPC 902 to reservethe available resources at DSC 910 a. The DPC 902 may the send aresource reservation request 3516 to the DSC 910 a. Upon receiving theresource reservation request 3516, the DSC 910 a may reserve therequired spectrum and send a resources reserved message 3518 back to theDPC 902. The DPC 902 may receive a resource bid message 3520 fromNetwork 1, accept the bid (if the bid complies to the policies and rulesof the DPC 902) and send a bid accepted message 3522 to Network 1 3501.Upon accepting the bid from the bidder, the DPC 902 may also send anassign resources request 3524 to the DSC 910 a to allocate the reservedresources to Network 1 3501. The DSC 910 a may receive the assignresources request 3524, allocate the resources to be used by Network 13501 and send a resources allocated message 3526 to the DPC 902. The DPC902 may inform Network 1 3501 that the requested resources are nowallocated to be used by the wireless device 101 subscriber Network 13501 by sending a resources allocated message 3528 to Network 1 3501.The resources may be available for use by Network 1 3501. Once theresources are used, the DSC 910 a may send a resources consumed/releasedmessage 3530 to the DPC 902. The DPC 902 may receive the resourcesconsumed/released message 3530 and send a resources consumed/releasedmessage 3532 to Network 1 3501. Network 1 3501 may settle the chargesfor the spectrum that it used.

FIGS. 36-40 illustrate flow diagrams of an embodiment method forallocating and accessing resources using the DSA communication system.As illustrated in FIG. 36, the Network 1 DSC 910 a may monitor calltraffic as compared to the total spectrum resources available to Network1, block 3602. The DSC 910 a may record and report the resource statusof Network 1 to the DPC 902. The DPC 902 may receive the resource statusreport from Network 1, block 3702, and store it, block 3704. The DSC 910a of Network 1 may determine based on the resources status reportwhether additional resources may be required to provide service to theexisting users of Network 1, determination 3606. If additional resourcesare not required (i.e., determination 3606=“No”), the DSC 910 a maycontinue to monitor resources available vs. bandwidth traffic by goingback to block 3602. If additional resources are required (i.e.,determination 3606=“Yes”), the DSC 910 a may send a request foradditional resources to the DPC 902, block 3608.

The Network 2 DSC 910 b may also monitor resources available vs.bandwidth traffic in Network 2, block 3602, and report the resourcestatus to the DPC 902, block 3804. The DPC 902 may receive the resourcestatus report from DSC 910 b, block 3702 and store the received data,block 3704. The DSC 910 b may determine whether excess amount ofresources are available in Network 2, determination 3804. If excessamounts of resources are not available in Network 2 (i.e., determination3804=“No”), the DSC 910 b may continue to monitor resources availablevs. bandwidth traffic by going back to block 3602. If excess amounts ofresources are available (i.e., determination 3804=“Yes”), the DSC 910 bmay allocate the excess resources or a sub-part of the excess resourcesfor secondary use, block 3806, and report to the DPC 902 that resourcesare allocated for use by secondary users, block 3808. The DPC 902 mayreceive the resource allocation report from DSC 910 b, block 3702, andstore the received data, block 3704.

The DPC 902 may receive resource status reports from many differentnetworks. However, in this embodiment, for ease of illustration, onlyinteractions of DPC 902 with two networks are shown. The status reportsreceived from the networks may further include additional informationsuch as network rules and policies with respect to access and use toallocated resources. For example, the status reports from Network 2 mayinclude system requirements for Network 2 which must be met before awireless device 101 can successfully access the allocated resources onNetwork 2 as a secondary user.

The DPC 902 receives the request for additional resources from DSC 910 aof Network 1, block 3706, and based on data received from other networksselects the best available network from which Network 1 may purchaseadditional resources, in block 3708. In this example, the DPC 902 mayselect Network 2 as the most suitable network to provide resources toNetwork 1. The DPC 902 may send a resource inquiry to the Network 2,block 3710, to determine the availability and quantity of allocatedexcess resources of Network 2.

The DSC 910 b of Network 2 may receive the resource inquiry, block 3810,and determine resource availability, block 3812. The DSC 910 b may senda resource inquiry response to the DPC 902. The resource inquiryresponse may include information about the quantity and quality ofresources available for use by secondary users. The DPC 902 may receivethe resources inquiry response, block 3712.

As illustrated in FIG. 37, the DPC 902 may determine whether resourcesare available based on the data received from the DSC 910 b of Network2, block 3714. If data is not available (i.e., determination block3714=“No”), the DPC 902 may send a no resource available message toNetwork 1, block 3722. Resources may not be available for use by anetwork for different reasons. For example, resources may be purchasedto other bidders before they were reserved by the network. The DSC 910 aof Network 1 may receive the no resource available message, block 3614,and search for other available spectrum resources or terminateconnection sessions with users to free-up resources on Network 1, block3618.

If data is available (i.e., determination 3714=“Yes”), the DPC 902 maysend a resource available message to the DSC 910 a to inform Network 1about the quality and quantity of resources available for secondary useat Network 2, block 3716. The DSC 910 a may receive the resourcesavailable message and send a request resource message to reserve theallocated resources of Network 2 for use by subscribers of Network 1,block 3612. The request resource message may include data such as thequantity of resources that Network 1 may require in this transaction.

The DPC 902 may receive the resources request message, block 3718, andsend a reserve resources request message to Network 2, block 3720. TheDSC 910 b at Network 2 may receive the reserve resource request, block3816, and reserve the requested quantity of the allocated resources foruse by Network 1 subscribers, block 3818. The DSC 910 b of Network 2 mayconfirm that the requested quantity of allocated resources is reservedfor use by Network 1 by sending a resource reserved message, block 3820.The DPC 902 may receive the resource reserved message from Network 2 andprepare for the bidding process as described in FIG. 38.

As illustrated in FIG. 38, the DSC 910 a of Network 1 may send aresource bid to negotiate access to the reserved resources of Network 2,block 3620. The DPC 902 may receive the resource bid and process it,block 3726. The DPC 902 may determine whether the bid received fromNetwork 1 may be accepted, at determination block 3728. The DPC 902 mayevaluate a bid from a network provider based upon policies and rule setsof the DSA communication system in addition to requirements set forth bythe resource offering network, such as prices and allocation or accessmethods or by other methods. If the bid is accepted (i.e., determination3728=“Yes”), the DPC 902 may send an accept bid message to Network 1,block 3730. The DSC 910 a may receive the accept bid message and awaitresource access instructions, in block 3622. Once the bid is accepted,the DPC 902 may also send an assign resources message to the DSC 910 bof Network 2, block 3732. The DSC 910 b may receive the assign resourcesmessage, block 3822, and assign reserved resources for use by Network 1,block 3824. The DSC 910 b may send a resources access message to enableNetwork 1 to access the assigned resources of Network 2, block 3826, andconfigure to establish communication session with the wireless device101 of Network 1, block 3828.

The DPC 902 may relay the resources access message to Network 1, block3734. The DSC 910 a may receive the resources access message, block3624. The resource access message may include data, such as, accessparameters that may be used by secondary user wireless devices 101 toaccess resources on Network 2. The DSC 910 a may send access parametersfor Network 2 to wireless devices 101 which have communication sessionswith Network 1 and Network 1 has designated to migrate to Network 2,block 3626. The designated wireless devices 101 may receive the accessparameters for Network 2, block 3902, and establish a communicationsession with wireless device 101 of Network 1, steps 3904 and 3830.Network 2 may commence the settlement process as described in moredetail below with reference to FIG. 40.

If the bid is rejected (i.e., determination block 3728=“No”), the DPC902 may send a rejected bid message to Network 1, block 3736 (shown inFIG. 39). As illustrated in FIG. 39, the DSC 910 a may receive therejected bid message, block 3736, and determine whether to rebid,determination 3640. If no rebid (i.e., determination 3640=“No”), the DSC910 a may send a cancel resource request message, block 3644. The DPC902 may receive the cancel resource request message, block 3742, andsend a release of resources message to Network 2, block 3744. The DSC910 b of Network 2 may receive the release of resources message, block3832, release the reserved resources for use by other networks, block3834, and report the allocated resource status to DPC 902 by going backto block 3808 as shown in FIG. 36 and follow the steps as describedabove with respect to FIG. 36.

If rebid (i.e., determination 3640=“Yes”), the DSC 910 a may send a newbid for the same resources, block 3642. The DPC 902 may receive the newbid, block 3738, and determine whether to accept the new bid,determination 3740. If the new bid is rejected again (i.e.,determination 3740=“No”), the DPC 902 may send a rejected bid message bygoing back to block 3736. If the bid is accepted (i.e., determination3740=“Yes”), the DPC 902 may send an accept bid message by going back toblock 3730 as shown in FIG. 38 and follow the same steps as describedabove with respect to FIG. 38.

FIG. 40 illustrates the settlement process after Network 2 providesaccess to the secondary user wireless devices 101 of Network 1. DSC 910b of Network 2 may send invoices and payment instructions relating tothe use of allocated resources by Network 1 to the DPC 902, block 3836.The DPC 902 may relay the invoice and payment instructions from Network2 to Network 1, block 3746. DSC 910 a may receive the invoices andpayment instructions, block 3644, and settle the charges with Network 2,steps 3648 and 3840.

Optionally, the DSC 910 b of Network 2 may send usage parameters andpayment instructions to the DPC 902, block 3838. The DPC 902 may receivethe usage parameters and payment instructions, block 3748, create aninvoice, block 3750, and send the invoice to Network 2, block 3752. TheDSC 910 a may receive the invoice and payment instructions, block 3646,and settle the charges with Network 2, steps 3648 and 3840.

FIG. 41 illustrates a message flow diagram 4100 of message communicationbetween components of a network provider which is allocating availableresources to other resources requesting networks. The DSC 910 a atNetwork 1 3501 may send a request for resources from, message 3502. TheDPC 902 may receive the request for resources message and send aresource inquiry to Network 2, message 3504. At Network 2, the resourceinquiry may be received at the DSC 910 b. The DSC 910 b may send aresource inquiry to the OMC 912 in Network 2 to determine whetherresources are available for Network 1, message 4106. The OMC 912 mayreceive the resource inquiry message from the DSC 910 b and send aresource inquiry message to the Access Resources 4102, message 4108. TheOMC 912 may also send a resource inquiry message to the Core Resources4204, message 4110. The Access Resource 4102 and the Core Resources 4204each receive the resource inquiry messages from OMC 912 and send aresource response to the OMC 912, messages 4112, 4114 respectively. Theresources response from the Access Resources 4102 may include messageparameters. The resources response from the Access Resources 4102 mayinclude other message parameters.

The OMC 912 may receive the resource responses from the Access Resource4102 and Core Resource 4104 and send a resource response message to theDSC 910 b indicating status of resources availability in Network 2,message 4116. The DSC 910 b may receive the resource response messagefrom the OMC 912 and send a resource inquiry response to the DPC 902,message 3508. The DPC 902 may receive the a resource inquiry responsefrom the DSC 910 b, determine whether the type of resources requestedare available at Network 2 and send a resources available message to theDSC 910 a of Network 1, message 3512. The DSC 910 a may receive theresources available message and send a resources request message todirect the DPC 902 to request the available resources from Network 2,message 3514. The DPC 902 may receive the resources request message andsend a resources reservation request message to the DSC 910 b to requestthat the available resources in Network 2 be reserved for use by Network1, message 3516. The DSC 910 b may receive the resources reservationrequest message and, via the OMC 912, send a resource reservationrequest to the Access Resource 4102, message 4118, and a resourcereservation request to the Core Resources 4104, message 4120.

The Access Resource 4102 may receive the resource reservation requestfrom the OMC 912, reserve the available resources and send a resourcesreserved message back to the DSC 910 b via the OMC 912, message 4122.Similarly, the Core Resources 4104 may receive the resource reservationrequest from the OMC 912, reserve the available resources and send aresources reserved message back to the DSC 910 b via the OMC 912,message 4124. The DSC 910 b may receive the resources reserved messagefrom the Access Resources 4102 and Core Resources 4104 and sendresources reserved message to the DPC 902 to inform the DPC 902 andNetwork 1 that the requested resources are reserved for use by Network1, message 3518. The DPC 902 may receive a resource bid message from theDSC 910 a of Network 1, message 3520. The DPC 902 may send a bidaccepted message to the DSC 910 a if the bid received by DPC 902satisfies the price and contract requirements of Network 2, message3522. If the bid is accepted, the DPC 902 may send an assign resourcesrequest to the DSC 910 b, message 3524. The DSC 910 b may receive theassign resources request to the Access Resources 4102, message 4126, andan assign resources request to the Core Resources 4104, message 4128.The DSC 910 b may further send a policy for resources assigned messageto the Policy Controller 905, which can be the same or differentrelative to the PCFF, message 4130. The DSC 910 b may further send ametering for resources assigned to the AAA/AuC 4106, message 4132.

FIGS. 42-44 illustrate process flow diagrams of an embodiment method forbacking off secondary users by handing them over back to their homenetwork or terminating their communication session with the hostnetwork. A wireless device 101 from Network 1 may establish a secondaryuser communication session with Network 2 via the DSC 910 b, steps 3904,3830. The DSC 910 b of Network 2 may continuously monitor traffic on thenetwork versus the available resources, block 3602, and send a report tothe DPC 902, block 3604. DPC 902 may receive the resource status reportfrom the DSC 910 b. The DSC 910 b may further determine whether thenetwork volume is greater than the capacity of the network based on itsavailable resources, determination 4404. If the network volume is notgreater than the capacity of the network (i.e., determination4404=“No”), the DSC 910 b may continue to monitor the network trafficversus the available resources by returning to block 3602. If thenetwork volume is greater than the capacity of the network (i.e.,determination 4404=“Yes”), the DSC 910 b may identify a user on thenetwork, block 4406, and determine whether the user is a secondary user,determination 4408.

If the user is a secondary user (i.e., determination 4408=“Yes”), theDSC 910 b may send disconnect session at t message, t being the amountof time left before the secondary user communication session will beterminated by Network 2, block 4410. The disconnect session at t messagemay be received by the DPC 902 as illustrated in FIG. 43, block 4306.Optionally, instead of sending a disconnect session at t message, theDSC 910 b may terminate the communication session of the secondary userto immediately provide additional resources for primary or otherimportant users, block 4412. The decision regarding whether toimmediately terminate or transmit a warning before termination of asecondary user may be based on contractual terms between the primary andsecondary network providers and the DSA communication system policiesand rule sets.

If the user is not a secondary user (i.e., determination 4408=“No”), theDSC 910 b may determine whether any other secondary users are present onthe network, step 4414. If there are other secondary users stillconnected to Network 1 (i.e., determination 4414=“Yes”), the DSC 910 bmay send try to disconnect their sessions first before the primary usersby returning to steps 4410, 4412. If there are no other secondary userson the primary network (i.e., determination 4414=“No”), the DSC 910 bmay keep or drop the primary user communication session based on tieredpriority access rules, block 4416. For example, premium primary users(i.e., those with more expensive subscription plans) may be droppedlast. Alternatively, in an embodiment (not shown), instead ofterminating the primary user communication sessions, the DSC 910 b maytry to handover the users to another network as secondary users, thus,preserving the communication session connection while reducing volume ofNetwork 1. The DSC 910 b may return to monitoring the network volumeversus capacity to determine whether additional callers need to beoff-loaded by returning to block 4404.

As illustrated in FIG. 43, the DPC 902 may relay the disconnect sessionat t message to the DSC 910 a, block 4306. The DSC 910 a may receive thedisconnect session at t message, block 4206, set a timer to count downfrom t, block 4208, and monitor its available resources, block 4210, todetermine whether there is resources available on Network 1 to receivethe secondary user communication session from Network 2, determination4212. If resources are not available on Network 1 (i.e., determination4212=“No”), the DSC 910 a may send a request for resources to the DPC902, block 3808, to reserve and purchase available resources fromnetwork providers by returning to block 3706 of FIG. 36 and followingthe resources allocation steps as described above with respect to FIGS.36-40.

If resources are available on Network 1 (i.e., determination4212=“Yes”), the DSC 910 a may allocate resources to the secondary userthat is going to be terminated from Network 2, block 4212, and sendinstructions for the wireless device 101 to disconnect from Network 2and connect to Network 1 to the DPC 902 as shown in FIG. 44, block 4308.The DSC 910 a may also configure/prepare the Network 1 system to connectto the secondary user wireless device 101, block 4218.

As illustrated in FIG. 44, the DPC 902 may relay the instructions forthe wireless device 101 to disconnect from Network 2 and connect toNetwork 1 to the DSC 910 b of Network 2, block 4308. The DSC 910 b mayreceive the instructions, block 4418, and send them to the secondaryuser wireless device 101 which currently has a communication sessionwith Network 2, block 4420. The wireless device 101 may receive theinstructions to disconnect from Network 2 and connect to Network 1,block 4220, and end communication session with Network 2, block 4222,and establish communication session with Network 1, steps 4224, 4226.

Public Safety Network:

In an embodiment, the primary network provider of the DSA communicationsystem may be a public safety network. A public safety network may bethe holder or owner of public safety spectrum. Public safety spectrum isgenerally reserved for used by public safety authorities. The assignedpublic safety bandwidth typically includes more spectrum than is used bypublic safety authorities on an average bases. An excess amount ofspectrum is assigned for public safety use in anticipation of its useduring public safety emergencies such as disasters.

In an embodiment, the DSA communication system may allow the publicsafety networks to lease spectrum resources to other networks when thepublic safety spectrum is available and not in use. During public safetyemergency situations when all of the network resources may be requiredfor use by public safety authorities, the DSA communication system mayallow the network to retrieve all of its allocated resources from othernetworks by off-loading traffic from the public safety network tofree-up resources.

In addition, if the assigned spectrum of a public safety network provesinadequate to handle a large volume of use by public safety authoritiesduring an emergency, the DSA communication system may enable the publicsafety network to lease or take resources from other networks which areparticipating in the DSA communication system. For example, the DSAcommunication system may require that all participating networks tocontinuously keep a certain percentage (e.g., 10%) of their resourcesunassigned. The public safety networks may use the unassigned resourcesof the participating networks to augment their resources for publicsafety communications during emergencies. The DSA communication systemmay further off-load primary and/or secondary users of a primary networkto free-up resources for use by the public safety authorities.

In an embodiment, access to public safety spectrum may be based ontiered priority access methods described above with respect to FIGS.1-8. For example, police dispatchers may always have access to thespectrum. However, access of other non-governmental users of the publicsafety resources may be limited to certain times periods or datesdepending on the contracts between the users and the public safetynetwork providers.

In an embodiment, off-loading of non-public safety users from the publicsafety or other networks may be performed using a tiered priority accessmethods described above with respect to FIGS. 1-8. For example, in apublic safety network, when resources are required for public safetyuse, the DSA communication system may enable the public safety networkto off-load users in order of preferences such as first, off-loadingsecondary non-public safety users, second, off-loading primarynon-public safety users, third, off-loading, lower ranked public safetyusers, etc. Similar tiered priority access method may be used tooff-load users of another network the resources of which may be used bythe public safety network.

In an embodiment, during an emergency, the DSA communication system mayrestrict access to any resources of a public safety network which isallocated for secondary use. For example, once the DSA communicationsystem determines that there is a public safety emergency, the DSAcommunication system may no longer consider the allocated resources fromthe public safety network which is involved in the emergency asavailable resources for use by other networks.

In an embodiment, the DSA communication system policies and rule setsmay require that participating networks allocate a percent of theirresources for public safety use and disasters response purposes. Duringan emergency, the DSA communication system may enable public safetynetworks to access additional resources which each non-public safetynetwork may allocate for public safety use. In this scenario, if theallocated resources are in use, tiered priority access methods may beused to off-load users from the allocated resources. Other resources ofthe non-public safety network may not be used for public safety unlessproperly negotiated.

FIGS. 45-49 illustrate flow diagrams of an embodiment method forallocating and accessing resources of a public safety network using theDSA communication system. As illustrated in FIG. 45, the DSC 910 a maymonitor resources versus bandwidth traffic in Network 1, block 3602. TheDSC 910 a may record and report the resource status of Network 1 to theDPC 902. The DPC 902 may receive the resource status report from Network1, block 3702, and store it, block 3704. The DSC 910 a of Network 1 maydetermine, based on the resources status report, whether additionalresources may be required to provide service to the existing users ofNetwork 1, determination 3606. If additional resources are not required(i.e., determination 3606=“No”), the DSC 910 a may continue to monitoravailable resources as versus bandwidth traffic by going back to block3602. If additional resources are required (i.e., determination3606=“Yes”), the DSC 910 a may send a request for additional resourcesto the DPC 902, block 3608.

The public safety network DSC 910 b may reserve a predetermined amountof unused spectrum resources as a back-up for use only by public safetyauthorities, in block 4502. This may ensure that if there is a need forresources during an emergency, such as a natural disaster, resources arereadily available to be dedicated for public safety use until additionalresources are released by off-loading secondary users from the network.The Public safety network DSC 910 b may also monitor resources availablevs. bandwidth traffic in Public safety network, block 3602, and reportthe resource status to the DPC 902, block 3804. The DPC 902 may receivethe resource status report from DSC 910 b, block 3702 and store thereceived data, block 3704. The DSC 910 b may determine whether excessamount of resources are available in Public safety network,determination 3804. If excess amounts of resources are not available inPublic safety network (i.e., determination 3804=“No”), the DSC 910 b maycontinue to monitor resources available vs. bandwidth traffic by goingback to block 3602. If excess amounts of resources are available (i.e.,determination 3804=“Yes”), the DSC 910 b may allocate the excessresources or a sub-part of the excess resources for secondary use, block3806, and report to the DPC 902 that resources are allocated for use bysecondary users, block 3808. The DPC 902 may receive the resourceallocation report from DSC 910 b, block 3702, and store the receiveddata, block 3704.

The status reports received from the networks may further includeinformation such as network rules and policies with respect to accessand use to allocated resources. For example, the status reports fromPublic safety network may include system requirements for Public safetynetwork which must be met before a wireless device 101 can successfullyaccess the allocated resources on Public safety network as a secondaryuser.

The DPC 902 receives the request for additional resources from DSC 910 aof Network 1, block 3706, and based on data received from other networksselects the best available network from which Network 1 may purchaseadditional resources, block 3708. In this example, the DPC 902 mayselect Public safety network as the most suitable network to provideresources to Network 1. The DPC 902 may send a resource inquiry to thePublic safety network, in block 3710, to determine the availability andquantity of allocated excess resources of Public safety network.

The DSC 910 b of Public safety network may receive the resource inquiry,block 3810, and determine resource availability, block 3812. The DSC 910b may send a resource inquiry response to the DPC 902. The resourceinquiry response may include information about the quantity and qualityof resources available for use by secondary users. The DPC 902 mayreceive the resources inquiry response, block 3712.

As illustrated in FIG. 46, the DPC 902 may determine whether resourcesare available based on the data received from the DSC 910 b of Publicsafety network, block 3714. If data is not available (i.e.,determination 3714=“No”), the DPC 902 may send a no resource availablemessage to Network 1, block 3722. Resources may not be available for useby a network for different reasons. For example, resources may be soldto other bidders before they were reserved by a requesting network. TheDSC 910 a of Network 1 may receive the no resource available message,block 3614, and search for other available spectrum resources orterminate connection sessions with users to free-up resources on Network1, block 3618.

If data is available (i.e., determination 3714=“Yes”), the DPC 902 maysend a resource available message to the DSC 910 a to inform Network 1about the quality and quantity of resources available for secondary useat Public safety network, block 3716. The DSC 910 a may receive theresources available message and send a request resource message toreserve the allocated resources of Public safety network for use bysubscribers of Network 1, block 3612. The request resource message mayinclude data such as the quantity of resources that Network 1 mayrequire in this transaction. The DPC 902 may receive the resourcesrequest message, block 3718, and send a reserve resources requestmessage to Public safety network, block 3720. The DSC 910 b at Publicsafety network may receive the reserve resource request, block 3816, andreserve the requested quantity of the allocated resources for use byNetwork 1 subscribers, block 3818. The DSC 910 b of Public safetynetwork may confirm that the requested quantity of allocated resourcesis reserved for use by Network 1 by sending a resource reserved message,block 3820. The DPC 902 may receive the resource reserved message fromPublic safety network and prepare for the bidding process as describedin FIG. 47.

As illustrated in FIG. 47, the DSC 910 a of Network 1 may send aresource bid to negotiate access to the reserved resources of Publicsafety network, block 3620. The DPC 902 may receive the resource bid andprocess it, block 3726. The DPC 902 may determine whether the bidreceived from Network 1 may be accepted, in determination block 3728.The DPC 902 may evaluate a bid from a network provider based uponpolicies and rule sets of the DSA communication system in addition torequirements set forth by the resource offering network, such as pricesand allocation or access methods.

If the bid is accepted (i.e., determination 3728=“Yes”), the DPC 902 maysend an accept bid message to Network 1, block 3730. The DSC 910 a mayreceive the accept bid message and await resource access instructions,block 3622. Once the bid is accepted, the DPC 902 may also send anassign resources message to the DSC 910 b of Public safety network,block 3732. The DSC 910 b may receive the assign resources message,block 3822, and assign reserved resources for use by Network 1, block3824. The DSC 910 b may send a resources access message to enableNetwork 1 to access the assigned resources of Public safety network,block 3826, and configure to establish communication session with thewireless device 101 of Network 1, block 3828.

The DPC 902 may relay the resources access message to Network 1, block3734. The DSC 910 a may receive the resources access message, block3624. The resource access message may include data such as accessparameters that may be used by secondary user wireless devices 101 toaccess resources on Public safety network. It should be appreciated thatother data may be included in the resources access message. The DSC 910a may send access parameters for Public safety network to wirelessdevices 101 which have communication sessions with Network 1 and Network1 has designated to migrate to Public safety network, block 3626. Thedesignated wireless devices 101 may receive the access parameters forPublic safety network, block 3902, and establish a communication sessionwith wireless device 101 of Network 1, steps 3904 and 3830. Publicsafety network may commence the settlement process as described in moredetail below with reference to FIG. 49.

If the bid is rejected (i.e., determination 3728=“No”), the DPC 902 maysend a rejected bid message to Network 1, block 3736 (shown in FIG. 48).As illustrated in FIG. 48, the DSC 910 a may receive the rejected bidmessage, block 3736, and determine whether to rebid, determination 3640.If no rebid (i.e., determination 3640=“No”), the DSC 910 a may send acancel resource request message, block 3644. The DPC 902 may receive thecancel resource request message, block 3742, and send a release ofresources message to Public safety network, block 3744. The DSC 910 b ofPublic safety network may receive the release of resources message,block 3832, release the reserved resources for use by other networks,block 3834, and report the allocated resource status to DPC 902 by goingback to block 3808 as shown in FIG. 45 and follow the steps as describedabove with respect to FIG. 45.

If rebid (i.e., determination 3640=“Yes”), the DSC 910 a may send a newbid for the same resources, block 3642. The DPC 902 may receive the newbid, block 3738, and determine whether to accept the new bid,determination 3740. If the new bid is rejected again (i.e.,determination 3740=“No”), the DPC 902 may send a rejected bid message bygoing back to block 3736. If the bid is accepted (i.e., determination3740=“Yes”), the DPC 902 may send an accept bid message by going back toblock 3730 as shown in FIG. 47 and follow the same steps as describedabove with respect to FIG. 47.

FIG. 49 illustrates the settlement process after Public safety networkprovides access to the secondary user wireless devices 101 of Network 1.DSC 910 b of Public safety network may send invoices and paymentinstructions relating to the use of allocated resources by Network 1 tothe DPC 902, block 3836. The DPC 902 may relay the invoice and paymentinstructions from Public safety network to Network 1, block 3746. DSC910 a may receive the invoices and payment instructions, block 3644, andsettle the charges with Public safety network, steps 3648 and 3840.

Optionally, the DSC 910 b of Public safety network may send usageparameters and payment instructions to the DPC 902, block 3838. The DPC902 may receive the usage parameters and payment instructions, block3748, create an invoice, block 3750, and send the invoice to Publicsafety network, block 3752. The DSC 910 a may receive the invoice andpayment instructions, block 3646, and settle the charges with Publicsafety network, steps 3648 and 3840.

FIGS. 50-53 illustrate process flow diagrams of an embodiment method forbacking off secondary users by handing them over back to their homenetwork or terminating their communication session with the hostnetwork. A wireless device 101 from Network 1 may establish a secondaryuser communication session with Public safety network via the DSC 910 b,steps 3904, 3830. The DSC 910 b of Public safety network maycontinuously monitor traffic on the network versus the availableresources, block 3602, and send a report to the DPC 902, block 3604. DPC902 may receive the resource status report from the DSC 910 b. The DSC910 b may further determine whether the network volume is greater thanthe capacity of the network based on its available resources,determination 4404. If the network volume is not greater than thecapacity of the network (i.e., determination 4404=“No”), the DSC 910 bmay continue to monitor the network traffic versus the availableresources by returning to block 3602. If the network volume is greaterthan the capacity of the network (i.e., determination 4404=“Yes”), theDSC 910 b may identify a user on the network, block 4406, and determinewhether the user is a secondary user, determination 4408.

If the network volume exceeds the allocated capacity threshold of thenetwork (i.e., determination 4408=“Yes”), an abnormal situation existswhich may indicate that an emergency situation is unfolding. In thisscenario, the DSC 910 b may follow the processes illustrated in theprocess flow diagrams of FIG. 50 to free-up resources for public safetyuse and FIG. 54 to incrementally allocate network resources based on aTiered Priority Access regime.

As shown in FIG. 50, to free-up resources for public safety use, thePublic safety network may send disconnect session at t message, t beingthe amount of time left before the secondary user communication sessionwill be terminated by Public safety network, block 4410. The disconnectsession at t message may be received by the DPC 902 as illustrated inFIG. 43, block 4306. Optionally, instead of sending a disconnect sessionat t message, the DSC 910 b may terminate the communication session ofthe secondary user to immediately provide additional resources forprimary or other important users, block 4412. The decision regardingwhether to immediately terminate or transmit a warning beforetermination of a secondary user may be based on contractual termsbetween the primary and secondary network providers and the DSAcommunication system policies and rule sets.

If the user is not a secondary user (i.e., determination 4408=“No”), theDSC 910 b may determine whether any other secondary users are present onthe network, block 4414. If there are other secondary users stillconnected to Network 1 (i.e., determination 4414=“Yes”), the DSC 910 bmay send try to disconnect their sessions first before the primary usersby returning to steps 4410, 4412. If there are no other secondary userson the primary network (i.e., determination 4414=“No”), the DSC 910 bmay keep or drop the primary user communication session based on tieredpriority access rules, block 4416. For example, premium primary users(i.e., those with more expensive subscription plans) may be droppedlast. Alternatively, in an embodiment (not shown), instead ofterminating the primary user communication sessions, the DSC 910 b maytry to handover the users to another network as secondary users, thus,preserving the communication session connection while reducing volume ofNetwork 1. The DSC 910 b may return to monitoring the network volumeversus capacity to determine whether additional callers need to beoff-loaded by returning to block 4404.

As illustrated in FIG. 51, the DPC 902 may relay the disconnect sessionat t message to the DSC 910 a, block 4306. The DSC 910 a may receive thedisconnect session at t message, block 4206, set a timer to count downfrom t, block 4208, and monitor its available resources, block 4210, todetermine whether there is resources available on Network 1 to receivethe secondary user communication session from Public safety network,determination 4212. If resources are not available on Network 1 (i.e.,determination 4212=“No”), the DSC 910 a may send a request for resourcesto the DPC 902, block 3808, to reserve and purchase available resourcesfrom network providers by returning to block 3706 of FIG. 45 andfollowing the resources allocation steps as described above with respectto FIGS. 45-49.

If resources are available on Network 1 (i.e., determination4212=“Yes”), the DSC 910 a may allocate resources to the secondary userthat is going to be terminated from Public safety network, block 4212,and send instructions for the wireless device 101 to disconnect fromPublic safety network and connect to Network 1 to the DPC 902 as shownin FIG. 52, block 4308. The DSC 910 a may also configure/prepare theNetwork 1 system to connect to the secondary user wireless device 101,block 4218.

As illustrated in FIG. 52, the DPC 902 may relay the instructions forthe wireless device 101 to disconnect from Public safety network andconnect to Network 1 to the DSC 910 b of Public safety network, block4308. The DSC 910 b may receive the instructions, block 4418, and sendthem to the secondary user wireless device 101 which currently has acommunication session with Public safety network, block 4420. Thewireless device 101 may receive the instructions to disconnect fromPublic safety network and connect to Network 1, block 4220, and endcommunication session with Public safety network, block 4222, andestablish communication session with Network 1, steps 4224, 4226.

In a further embodiment, the Public safety network may monitor all newreserve resource requests and inquiries received from the DPC 902 toensure that resources are provided only to those requests that areinitiated by public safety authorities based on TPA at least untilresource capacity is back to below the threshold levels. The Publicsafety network may receive a reserve resource request at the DSC 910 b,block 3810, and determine whether the resources inquiry is from aTPA-authorized device, determination 312. If the resources requested arefrom a TPA-authorized device (i.e., determination 312=“Yes”), the DSC910 b may disconnect a non-TPA communication session, such as asecondary user communication session, block 314, and connect the TPAcall, block 315. The DSC 910 b may again monitor the resources versusbandwidth available by returning to block 3602 of FIG. 50. If theresource reserve message is received from a wireless device 101 otherthan an authorized device (i.e., determination 312=“No”), the Publicsafety network may block the call until excess resources are againavailable for use by secondary users, block 5302.

In an embodiment, for TPA-authorized personnel who may try to establisha communication session with the Public safety network using a wirelessdevice which is subscribed to a network provider other than the publicsafety network provider, the Public safety authorities may be provided aprefix number which may alert the receiving network provider about arequest to transfer communication session to a public safety network andan access PIN. By using the prefix number and PIN, a Public safety usermay access the Public safety network using any device, even if thedevice is considered a secondary user wireless device 101 on the Publicsafety network.

As illustrated in FIG. 54 to FIG. 56, when an authorized public safetyofficer requires to establish connection with a specific public safetynetwork, he may place a call using any unauthorized wireless device 101of Network 1 and dialing a special prefix number, such as *272, block5402. The DSC 910 a may receive and process the call, block 5404, andidentify the prefix number as a request to transfer the communicationsession to a public safety network, block 5406. The DSC 910 a may send aPIN request to the wireless device 101, block 5408. The wireless device101 may receive the PIN request, block 5410, display the PIN request tothe user using Graphical User Interface (GUI) and receive the user's PINinput, block 5412. The wireless device 101 may send the inputted PIN tothe DSC 910 a for processing, block 5414. The DSC 910 a may receive thePIN, block 5416, and send a request for a network transfer along withthe PIN to the DPC 902, block 5418. The DPC 902 may receive the requestfor network transfer, block 5420, and determine whether the PIN matchesa PIN database, determination 318. If the PIN does not match an entry inthe PIN database (i.e., determination 318=“No”), the DPC 902 may blockthe call, block 5302. If the PIN matches an entry in the PIN database(i.e., determination 318=“No”), the DPC 902 may identify the targetPublic safety network based on the received PIN, block 5422.

As illustrated in FIG. 55, the DPC 902 may determine whether thewireless device 101 of Network 1 includes compatible technology with thetarget Public safety network, block 5424. If the device and the publicsafety network are not technologically compatible (i.e., determination5424=“No”), the DPC 902 may send a network incompatible message back tothe device via the DSC 910 a, block 5426. The DSC 910 a may relay thenetwork incompatibility message, block 5428, and terminate connectionwith the wireless device 101, block 5432. The wireless device 101 mayreceive the network incompatible message, block 5430, display themessage to the user, block 5434, and terminate connection with theNetwork 1, block 5436. If the device and the public safety networktechnologies are compatible (i.e., determination 5424=“Yes”), the DPC902 may send a reserve resources request with PIN to the public safetynetwork DSC 910 b, block 5438. The DSC 910 b may receive the reserveresources request with PIN, block 5440.

In an embodiment, as illustrated in FIG. 56, access to a public safetynetworks by authorized public safety authorities may be on a prioritylevel. For example, the higher ranking officials of a public safetyorganization may have priority access to the network as compared lowerranking officials from the same organization. At any given time,depending on the level of traffic and resources available, the publicsafety network may determine what level of authority may have access tothe network. Accordingly, the DSC 910 b may be configured to allow thosewith required levels of priority and reject those with levels ofpriority lower than required. The DSC 910 b may continuously reevaluatethe resource availability and change the access level of officials basedon the availability of resources. The DSC910 b may determine, based onthe PIN, the level of priority of the user of the wireless device 101,block 5442. The DSC 910 b may determine whether the level of priority ofthe device 101 is allowed to access the public safety network at thattime, determination 5444. If the device 101 priority level is authorized(i.e., determination 5444=“Yes”), the DSC 910 b may disconnect a non-TPAsession or a lower priority TPA session to free-up resources for the newrequest for resources, block 5446, and connect the new TPA session,block 5448, and return back to monitoring the resources of the networkversus the bandwidth traffic, block 3602 of FIG. 45. If the request isfrom a TPA-authorized device which does not have the priority level toaccess the network at that time (i.e., determination 5444=“No”), the DSC910 b may block the call, block 5302.

The embodiments described above, including the spectrum arbitragefunctions, may be implemented within a broadcast system on any of avariety of commercially available server devices, such as the server5700 illustrated in FIG. 57. Such a server 5700 typically includes aprocessor 5701 coupled to volatile memory 5702 and a large capacitynonvolatile memory, such as a disk drive 5703. The server 5700 may alsoinclude a floppy disc drive and/or a compact disc (CD) drive 5706coupled to the processor 5701. The server 5700 may also include networkaccess ports 5704 coupled to the processor 5701 for establishing dataconnections with a network 5705, such as the Internet and local networksfor communicating with broadcast system equipment.

The processor 5701 may be any programmable microprocessor, microcomputeror multiple processor chip or chips that can be configured by softwareinstructions (applications) to perform a variety of functions, includingthe functions of the various embodiments described herein. In somereceiver devices, multiple processors 5701 may be provided, such as oneprocessor dedicated to wireless communication functions and oneprocessor dedicated to running other applications. Typically, softwareapplications may be stored in the internal memory 5702 before they areaccessed and loaded into the processor 5701. In some servers, theprocessor 5701 may include internal memory sufficient to store theapplication software instructions. In some receiver devices, the securememory may be in a separate memory chip coupled to the processor 5701.The internal memory 5702 may be a volatile or nonvolatile memory, suchas flash memory, or a mixture of both. For the purposes of thisdescription, a general reference to memory refers to all memoryaccessible by the processor 5701, including internal memory 5702,removable memory plugged into the device, and memory within theprocessor 5701 itself.

Embodiments include methods for managing, allocating and arbitraging RFbandwidth as described above. Embodiments also include the communicationsystems that enable the DPC methods. Embodiments also include thenon-transitory computer-readable storage media storingcomputer-executable instructions for performing the methods describedabove.

The foregoing method descriptions and the process flow diagrams areprovided merely as illustrative examples and are not intended to requireor imply that the steps of the various embodiments must be performed inthe order presented. As will be appreciated by one of skill in the artthe order of steps in the foregoing embodiments may be performed in anyorder. Words such as “thereafter,” “then,” “next,” etc. are not intendedto limit the order of the steps; these words are simply used to guidethe reader through the description of the methods. Further, anyreference to claim elements in the singular, for example, using thearticles “a,” “an” or “the” is not to be construed as limiting theelement to the singular.

The various illustrative logical blocks, modules, circuits, andalgorithm steps described in connection with the embodiments disclosedherein may be implemented as electronic hardware, computer software, orcombinations of both. To clearly illustrate this interchangeability ofhardware and software, various illustrative components, blocks, modules,circuits, and steps have been described above generally in terms oftheir functionality. Whether such functionality is implemented ashardware or software depends upon the particular application and designconstraints imposed on the overall system. Skilled artisans mayimplement the described functionality in varying ways for eachparticular application, but such implementation decisions should not beinterpreted as causing a departure from the scope of the presentinvention.

The hardware used to implement the various illustrative logics, logicalblocks, modules, and circuits described in connection with theembodiments disclosed herein may be implemented or performed with ageneral purpose processor, a digital signal processor (DPC), anapplication specific integrated circuit (ASIC), a field programmablegate array (FPGA) or other programmable logic device, discrete gate ortransistor logic, discrete hardware components, or any combinationthereof designed to perform the functions described herein. Ageneral-purpose processor may be a microprocessor, but, in thealternative, the processor may be any conventional processor,controller, microcontroller, or state machine. A processor may also beimplemented as a combination of computing devices, e.g., a combinationof a DPC and a microprocessor, a plurality of microprocessors, one ormore microprocessors in conjunction with a DPC core, or any other suchconfiguration. Alternatively, some steps or methods may be performed bycircuitry that is specific to a given function.

In one or more exemplary embodiments, the functions described may beimplemented in hardware, software, firmware, or any combination thereof.If implemented in software, the functions may be stored on ortransmitted over as one or more instructions or code on acomputer-readable medium. The steps of a method or algorithm disclosedherein may be embodied in a processor-executable software module whichmay reside on a tangible, non-transitory computer-readable storagemedium. Tangible, non-transitory computer-readable storage media may beany available media that may be accessed by a computer. By way ofexample, and not limitation, such as, non-transitory computer-readablemedia may comprise RAM, ROM, EEPROM, CD-ROM or other optical diskstorage, magnetic disk storage or other magnetic storage devices, or anyother medium that may be used to store desired program code in the formof instructions or data structures and that may be accessed by acomputer. Disk and disc, as used herein, includes compact disc (CD),laser disc, optical disc, digital versatile disc (DVD), floppy disk, andblu-ray disc where disks usually reproduce data magnetically, whilediscs reproduce data optically with lasers. Combinations of the aboveshould also be included within the scope of non-transitorycomputer-readable media. Additionally, the operations of a method oralgorithm may reside as one or any combination or set of codes and/orinstructions on a tangible, non-transitory machine readable mediumand/or computer-readable medium, which may be incorporated into acomputer program product.

The preceding description of the disclosed embodiments is provided toenable any person skilled in the art to make or use the presentinvention. Various modifications to these embodiments will be readilyapparent to those skilled in the art, and the generic principles definedherein may be applied to other embodiments without departing from thespirit or scope of the invention. Thus, the present invention is notintended to be limited to the embodiments shown herein but is to beaccorded the widest scope consistent with the following claims and theprinciples and novel features disclosed herein.

1-20. (canceled)
 21. A dynamic spectrum arbitrage (DSA) method,comprising: determining, on a communications server, an amount of radiofrequency (RF) spectrum resources available for allocation within afirst communication network; allocating a portion of available RFspectrum resources of the first communication network for access and useby wireless devices that subscribe to a second communication network ata first quality of service (QoS) level; monitoring call traffic in thefirst communication network to determine current and projected networkcongestion amounts; adjusting the QoS level of the wireless devices thatsubscribe to the second network based on an amount of current networkcongestion in the first communication network; and adjusting theallocation of RF spectrum resources based on an amount of projectednetwork congestion.
 22. The DSA method of claim 21, wherein adjustingthe allocation of RF spectrum resources based on the amount of projectednetwork congestion comprises: determining that the determined amount ofprojected network congestion is above a threshold value; and informingthe second communication network that use of allocated RF spectrumresources should be terminated in response to determining that thedetermined amount of projected network congestion is below the thresholdvalue.
 23. The DSA method of claim 21, wherein adjusting the allocationof RF spectrum resources based on the amount of projected networkcongestion comprises: determining that the determined amount ofprojected network congestion is below a threshold value; and allocatingadditional portions of the available RF spectrum resources for accessand use by the wireless devices that subscribe to the secondcommunication network in response to determining that the determinedamount of projected network congestion is below the threshold value. 24.The DSA method of claim 21, further comprising: receiving in thecommunications server a request for RF spectrum resources from a secondserver; receiving a message in the communications server from a firstserver identifying an amount of first communication network RF spectrumresources available for reallocation; and pooling RF spectrum resourcesidentified in the message and RF spectrum resources of at least oneother communication network; wherein allocating the portion of availableRF spectrum resources of the first communication network for access anduse by wireless devices that subscribe to the second communicationnetwork at the first quality of service (QoS) level comprises allocatingthe pooled resources for access and use by wireless devices in thesecond communication network.
 25. The DSA method of claim 24, furthercomprising determining a best-available spectrum assignment from thepooled RF spectrum resources, wherein allocating the pooled resourcesfor access and use by wireless devices in the second communicationnetwork comprises allocating the pooled resources for access and use bywireless devices in the second communication network based on thedetermined best-available spectrum assignment.
 26. The DSA method ofclaim 21, further comprising: sending payment information relating touse of allocated resources to a sever in the second communicationnetwork.
 27. The DSA method of claim 21, further comprising: monitoringthe usage of allocated resources based on pre-arranged billinginformation.
 28. The DSA method of claim 21, further comprising:monitoring communications in the first communication network todetermine an amount of RF spectrum resources in use; and determining adifference between the amount of RF spectrum resources controlled by thefirst communication network and the determined amount of RF spectrumresources in use.
 29. A communications server for accomplishing dynamicspectrum arbitrage (DSA) of available radio frequency (RF) spectrumresources between a first communication network and a secondcommunication network, comprising: network communications circuitry forcommunicating with the first and second communication networks; amemory; and a processor coupled to the memory and the networkcommunications circuitry, wherein the processor is configured withprocessor-executable instructions to perform operations comprising:determining an amount of RF spectrum resources available for allocationwithin a first communication network; allocating a portion of availableRF spectrum resources of the first communication network for access anduse by wireless devices that subscribe to a second communication networkat a first quality of service (QoS) level; monitoring call traffic inthe first communication network to determine current and projectednetwork congestion amounts; adjusting the QoS level of the wirelessdevices that subscribe to the second network based on an amount ofcurrent network congestion in the first communication network; andadjusting the allocation of RF spectrum resources based on an amount ofprojected network congestion.
 30. The communications server of claim 29,wherein the processor is configured with processor-executableinstructions to perform operations such that adjusting the allocation ofRF spectrum resources based on the amount of projected networkcongestion comprises: determining that the determined amount ofprojected network congestion is above a threshold value; and informingthe second communication network that use of allocated RF spectrumresources should be terminated in response to determining that thedetermined amount of projected network congestion is below the thresholdvalue.
 31. The communications server of claim 29, wherein adjusting theallocation of RF spectrum resources based on the amount of projectednetwork congestion comprises: determining that the determined amount ofprojected network congestion is below a threshold value; and allocatingadditional portions of the available RF spectrum resources for accessand use by the wireless devices that subscribe to the secondcommunication network in response to determining that the determinedamount of projected network congestion is below the threshold value. 32.The communications server of claim 29, further comprising: receiving inthe communications server a request for RF spectrum resources from asecond server; receiving a message in the communications server from afirst server identifying an amount of first communication network RFspectrum resources available for reallocation; and pooling RF spectrumresources identified in the message and RF spectrum resources of atleast one other communication network; wherein allocating the portion ofavailable RF spectrum resources of the first communication network foraccess and use by wireless devices that subscribe to the secondcommunication network at the first quality of service (QoS) levelcomprises allocating the pooled resources for access and use by wirelessdevices in the second communication network.
 33. The communicationsserver of claim 32, further comprising determining a best-availablespectrum assignment from the pooled RF spectrum resources, whereinallocating the pooled resources for access and use by wireless devicesin the second communication network comprises allocating the pooledresources for access and use by wireless devices in the secondcommunication network based on the determined best-available spectrumassignment.
 34. The communications server of claim 29, furthercomprising: sending payment information relating to use of allocatedresources to a sever in the second communication network.
 35. Anon-transitory computer readable storage medium having stored thereonprocessor-executable software instructions configured to cause aprocessor to perform dynamic spectrum arbitrage (DSA) operationscomprising: determining an amount of radio frequency (RF) spectrumresources available for allocation within a first communication network;allocating a portion of available RF spectrum resources of the firstcommunication network for access and use by wireless devices thatsubscribe to a second communication network at a first quality ofservice (QoS) level; monitoring call traffic in the first communicationnetwork to determine current and projected network congestion amounts;adjusting the QoS level of the wireless devices that subscribe to thesecond network based on an amount of current network congestion in thefirst communication network; and adjusting the allocation of RF spectrumresources based on an amount of projected network congestion.
 36. Thenon-transitory computer readable storage medium of claim 35, whereinadjusting the allocation of RF spectrum resources based on the amount ofprojected network congestion comprises: determining that the determinedamount of projected network congestion is above a threshold value; andinforming the second communication network that use of allocated RFspectrum resources should be terminated in response to determining thatthe determined amount of projected network congestion is below thethreshold value.
 37. The non-transitory computer readable storage mediumof claim 35, wherein adjusting the allocation of RF spectrum resourcesbased on the amount of projected network congestion comprises:determining that the determined amount of projected network congestionis below a threshold value; and allocating additional portions of theavailable RF spectrum resources for access and use by the wirelessdevices that subscribe to the second communication network in responseto determining that the determined amount of projected networkcongestion is below the threshold value.
 38. The non-transitory computerreadable storage medium of claim 35, further comprising: receiving inthe communications server a request for RF spectrum resources from asecond server; receiving a message in the communications server from afirst server identifying an amount of first communication network RFspectrum resources available for reallocation; and pooling RF spectrumresources identified in the message and RF spectrum resources of atleast one other communication network; wherein allocating the portion ofavailable RF spectrum resources of the first communication network foraccess and use by wireless devices that subscribe to the secondcommunication network at the first quality of service (QoS) levelcomprises allocating the pooled resources for access and use by wirelessdevices in the second communication network.
 39. The non-transitorycomputer readable storage medium of claim 38, further comprisingdetermining a best-available spectrum assignment from the pooled RFspectrum resources, wherein allocating the pooled resources for accessand use by wireless devices in the second communication networkcomprises allocating the pooled resources for access and use by wirelessdevices in the second communication network based on the determinedbest-available spectrum assignment.
 40. The non-transitory computerreadable storage medium of claim 35, further comprising: sending paymentinformation relating to use of allocated resources to a sever in thesecond communication network.