The invention relates to access control for base stations, and in particular for private base stations.
In order to provide a wireless broadband access and high data transfer rates at homes, base stations deployed at homes and communicating with user terminals have been available on the markets for some time. Wireless base stations or routers communicating with user terminals according to the IEEE 802.11x standard (Wireless Local Area Network or Wi-Fi) have been available for years but, recently, private base stations communicating according to cellular radio telecommunication standards have entered the markets. Private base stations are typically associated with uncoordinated deployment, i.e. the network infrastructure and coverage of a cellular telecommunication system is not based on the geographical deployment of the private base stations. A private base station may be called by many names, including Home Base Station, Home NodeB, femto eNodeB, or simply Home Access, and it has become a popular topic within operator and manufacturer communities.
A private base station is a consumer product for uncoordinated deployment, which is not under the control of an operator of a cellular network. The private base station may be located on a different frequency layer than public base stations. For example, one frequency layer of 5 MHz in W-CDMA (Wide-Band Code Division Multiple Access) may be used in a public cell and a separate frequency layer for the private deployment, the private base station also being potentially intended to serve as a public capacity enhancement layer.
It can be assumed that an end user buys an economic private base station and installs the private base station as a physical entity at his home. The private base station then provides coverage and service to user equipment registered by the owner of the private base station. The private base station may be connected via a DSL (Digital Subscriber Line) and via a core network of the operator towards the Internet. The core network of the operator typically comprises one or more network nodes providing the user equipment with an IP (Internet Protocol) connection. In more detail, data packets sent/received by the user equipment are transferred between the user equipment and a peer entity (for example an Internet server or other user equipment) through the one or more network nodes.
A requirement for private base stations is that the system supports efficient mechanisms to restrict access to a private base station unless user equipment has access rights to communicate with a specific private base station. Correspondingly, user equipment should not unnecessarily attempt to camp on a cell of a private base station if it does not have access rights. Furthermore, there is a need to ensure that a private base station is used in the intended operating area.
An improved solution is now provided for private base station access control. The invention is defined in the independent claims. Some embodiments of the invention are set forth in the dependent claims.
According to an aspect, there is now provided a method comprising: receiving an identifier indicating an operation area previously accessed or detected by a communications device requesting communication with a private base station, and controlling access to the private base station on the basis of the identifier.
According to another aspect, there is now provided a method comprising: defining an identifier associated with a neighboring cell or the last visited cell, and transmitting the identifier for a private base station. The invention and various embodiments of the invention provide several advantages, which will become apparent from the detailed description below.
Embodiments of the present invention are described below, by way of example only, with reference to the accompanying drawings, in which
Although the specification may refer to “an”, “one”, or “some” embodiment(s) in several places this does not necessarily mean that each such reference is to the same embodiment(s), or that the feature only applies to a single embodiment. Single features of different embodiments may also be combined to provide other embodiments.
First, a radio system is described by means of
The public base station 106 may have a connection to the base station controller 110 by a digital transmission link 118. The base station controller 110 provides a connection to other parts of the system and possibly the Internet (not shown). The private base station 108 may not necessarily be a part of the radio system, although in some embodiments the private base station may be connectable to a public radio system, such as a radio network controller or a macro (enhanced) node B of a 3GPP LTE (Long Term Evolution) access network. The private base station 108 is connected to a data transmission system for further connections to a core network, such as an IP backbone. For example, the private base station 108 may be connected to WLAN (Wireless Local Area Network), Ethernet, or DSL (Digital Subscriber Line) equipment further providing connectivity to the Internet. The signals 112 to 116 between the user terminals 100 to 104 and the base stations 106 to 108 carry digitized information, which is e.g. traffic data or control data.
It is to be noted that, for conciseness reasons, further elements of a typical wireless communications system are not described. For instance, the system may comprise one or more gateways providing connectivity for the private base station 108 to an operator's packet core network and/or the Internet. Further, a PLMN core network, such as an evolved 3GPP packet core network, may be provided with specifically configured functional elements for communications with the private base stations.
The radio system may be based on GERAN (GSM/EDGE RAN, where EDGE stands for Enhanced Data rates for Global Evolution and RAN stands for Radio Access Network), UTRAN (UMTS Terrestrial RAN) or LTE (Long Term Evolution) network elements, without being limited to them. The radio system may utilize HSDPA, HSUPA (High Speed Uplink Packet Access), WiFi (known as wireless fidelity), or WIMAX (Worldwide Interoperability for Microwave Access).
Each base station 106 to 108, both private and public, broadcasts a signal 112 to 116 such that a user terminal 100 to 104 can observe a potential base station and synchronize to the signal of the base station. The signal may comprise basic system information regarding the base station and the system the base station belongs to. The user terminal synchronizes to the base station signal, determines the basic system information and selects a base station with which to start a communication when switched on or for which to perform a handoff during normal operation. The user terminal then starts the communication with the selected base station.
As private base stations are typically located at homes, they are intended to serve the terminals of the users living at the location of the private base station. There is a need to restrict the use of the private base stations only in specific operation areas, such as a particular country in which the private base station is purchased. If there is no method to ensure what the country is where the home Node B is operated, an end user might take the base station with him when going to a foreign country, connect the base station, and end up calling by using a spectrum not allowed to be used by that operator and not necessarily even by that system in a foreign country. A private base station could be equipped with a user equipment receiver for detecting a broadcast channel (BCH) of the “home” network as the network might not be available in the location where the home Node B is being deployed. However, the additional cost of implementing the user equipment receiver in the home NodeB equipment is not attractive.
In an embodiment, information on the previously accessed or currently available operation area for the user terminal is used for controlling access to a private base station. In accordance with an aspect of the invention, the use of a private base station is allowed only in a predetermined operating area on the basis of this information. Hence, the use of private base stations can be limited to certain operation areas, such as countries. Separate user equipment receivers are not needed. When access control is arranged based on the information on the previously accessed operation area, it is possible to limit the access to a private base station even when macro coverage (by a public base station) is not available.
The base station 200 can transmit a signal such that a digital signal processed by the controller 208 is fed to the transmitter 206 for mixing the baseband signal up to a radio frequency signal which is guided to the antenna 202 to be transmitted as electromagnetic radiation. The signal to be transmitted may be received through the interface 212 or it may be obtained from the memory 210.
A radio frequency electromagnetic signal hitting the antenna 202, in turn, propagates to the receiver 204 which mixes the radio frequency signal down to a baseband signal, filters the analog signal and A/D-converts the signal to a digital form. To process the received signal, the receiver 204 forwards the baseband signal to the controller 208. The digital signal may be filtered and the data in the signal may be digitally processed. The controller 208 may save the data obtained from the pieces of analog and/or digital information of the received signal in the memory 210. The controller may forward the received data to the interface 212, which may forward 214 the data further to the core network or other parts of the system or to the Internet.
The user terminal 100 to 104 refers to a portable computing device. Such computing devices include wireless mobile communication devices operating with or without a subscriber identification module (SIM), including, but not limited to, the following types of devices: mobile phone, smartphone, personal digital assistant (PDA), handset.
The user terminal 220 can transmit a signal such that a digital signal processed by the controller 230 is fed to the transmitter 228 for mixing the baseband signal up to a radio frequency signal, which is guided to the antenna 222 by the isolator 224 to be transmitted as electromagnetic radiation.
A radio frequency electromagnetic signal hitting the antenna 222, in turn, propagates through the isolator 224 to the receiver 226, which mixes the radio frequency signal down to a baseband signal, filters the analog signal and A/D-converts the signal to a digital form. To process the received signal, the receiver 226 forwards the baseband signal to the controller 230. The digital signal may be filtered and the data in the signal may be digitally processed. The controller 230 may save the data obtained from the pieces of analog and/or digital information of the received signal in the memory 232. The user interface 234 may comprise a microphone, a keyboard and a display and various other interfaces.
Let us study some further embodiments for arranging access control for private base stations.
In step 302, at least one identifier indicating an operation area visited or detected by a communications device requesting communication with the private base station is received.
In step 304, the received identifier is compared to at least part of the identification data in the memory to determine 306, if the operation of the private base station is allowed in the area indicated by the identifier.
If the operation is permitted, access to the private base station is allowed 308 and a connection may be established for the requesting communications device.
If the operation is not permitted, the private base station cannot be used in the area and access to the private base station is rejected 310.
In one embodiment, the identifier is in step 304, 306 compared to at least one pre-stored identifier indicating operation area(s) where the private base station is permitted to operate. Thus, if there is a match, access to the private base station is allowed 308. Alternatively, access to the private base station is rejected 310.
In another embodiment, identification data for non-allowed operation areas is stored in the memory, whereby access to the private base station is allowed, if there is no match between the stored identification data and the received identifier.
In one embodiment, the identifier indicates the current operation area of a mobile terminal, such as the user terminal 104. In another embodiment, the identifier indicates an operation area last visited by a mobile terminal.
The steps of
In another embodiment, these features are performed in some other network element controlling or authorizing the access for a private base station. Examples of such network elements are a radio network or access network controller, a core network element, such as a mobile switching center, a packet data transfer node, etc. Similarly to
Such a controlling network element may in step 308 or 310 transmit an authorization or rejection to the private base station. The private base station may be arranged to forward the location area identifier to a network element controlling the access to the private base station, wait for an authorization or rejection response message from the network element, and start or reject the access in accordance with the received response message.
In one embodiment, the private base station 108 or another entity controlling the access to the private base station is arranged to request the identifier for the previously visited and/or currently available operation area(s) from the user terminal. Hence, step 504 or 500 of
With reference to the steps illustrated in
A reference is made to
If a location area identifier cannot be found, in step 704 a request for a location area identifier is transmitted to the user terminal. Then, the procedure may wait for the identifier from the user terminal and enter step 302 when the identifier is received.
If an identifier is found, the validity of the identifier is checked in step 706. For instance, the private base station may check a time stamp associated with the earlier received identifier or time of storage of the earlier received identifier. If the earlier received and stored operation area identifier is sufficiently new enough, in step 708 the private base station is arranged to omit the request transmission and perform the access control based on the stored identifier. For instance, the procedure may continue to step 304 of
There may be further conditions and settings controlling if the private base station shall permit the access request and/or request for the identifier or not. In one embodiment, the private base station is always configured to request the identifier for the first access attempt after the private base station is switched on. Thus, a subsequent device accessing the private base station would not necessarily be anymore required to provide the identifier. The condition when further users are not required to provide the identifier could also be related to other conditions than a power on situation, for instance whether one of the private base stations is connected to the same transmission network domain as previously.
The steps, signaling messages and related functions described above in
In an embodiment, the operation area identifier used for access control purposes for the private base station is a country code of a previously visited or detected network. In another embodiment, the identifier is a network identifier of a previously visited or detected network. In a still another embodiment, the identifier is a public land mobile network identifier. In a still another embodiment, the identifier is a cell identifier. However, it is to be noted that apparatuses may be adapted to use identifiers other than those mentioned above. For instance, the identifier could be an identifier specifically provided from an overlaying network to the user terminal to be used for permitting private base station operation in this area. The mobile terminal may be arranged to obtain the identifier from a cellular network and transmit the identifier to enable the use of the private base station in a particular country or in a limited area. It is also to be noted that more than one identifier may be applied in the embodiments above.
In the following, different embodiments will be described using, as an example of a system architecture whereto the embodiments may be applied, an architecture based on long-term evolution (LTE) of the 3GPP system, without restricting the embodiment to such an architecture, however.
In current 3GPP LTE draft standards, Home Base Stations, Home (e)NodeB, Femto access point, or simply Home Access is used to refer to private base stations. Such 3GPP home NodeB may be configured to provide at least some of the features illustrated above for the private base station 102.
Let us study other examples of embodiments applied to a 3GPP type of system. In a 3GPP type of system, each base station transmits a Broadcast Channel (BCH), which is used for broadcasting information about the cell and the system. The BCH may comprise a Broadcast Control Channel (BCCH), which may be used to transmit basic system information.
In an embodiment, the private base station is configured to transmit an indication of a request for the operation area identifier on a broadcast control channel. In this manner, user terminals may detect the need to determine the currently visited or previously visited operation area and send it to the requesting private base station.
In one embodiment, the operation area identifier is transmitted from the 3GPP UE to the 3GPP private base station, or home eNodeB, in an access procedure message.
In one embodiment, the identifier is transmitted as part of the 3GPP system random access procedure. In a further embodiment, the user terminal is arranged to transmit and the private base station is arranged to receive the identifier in a random access channel message.
However, the above embodiments are only some examples of applicable transport procedures, and the transfer of the request and the identifier is not limited to any specific transmission format.
The processing unit of a base station, a control element controlling the access to a private base station and a user terminal may be implemented as an electronic digital computer, which may comprise a working memory (RAM), a processing unit (CPU), and a system clock. The CPU may comprise a set of registers, an arithmetic logic unit, and a control unit. The control unit is controlled by a sequence of program instructions transferred to the CPU from the RAM. The control unit may contain a number of microinstructions for basic operations. The implementation of microinstructions may vary, depending on the CPU design. The program instructions may be coded by a programming language, which may be a high-level programming language, such as C, Java, etc., or a low-level programming language, such as a machine language, or an assembler. The electronic digital computer may also have an operating system, which may provide system services to a computer program written with the program instructions.
Embodiments of the invention, such as the ones illustrated above, may be implemented as a computer program comprising instructions configuring the processing unit for executing a computer process. The computer program may be embodied on a distribution medium.
The computer program may be in source code form, object code form, or in some intermediate form, and it may be stored in some sort of carrier, which may be any entity or device capable of carrying the program. Such carriers include a record medium, computer memory, read-only memory, electrical carrier signal, telecommunications signal, and software distribution package, for example. Depending on the processing power needed, the computer program may be executed in a single electronic digital computer or it may be distributed amongst a number of computers.
The processing units of a base station, a control element controlling the access to a private base station, and a user terminal may also be implemented as one or more integrated circuits, such as application-specific integrated circuits ASIC. Other hardware embodiments are also feasible, such as a circuit built of separate logic components. A hybrid of these different implementations is also feasible.
It will be obvious to a person skilled in the art that, as technology advances, the inventive concept can be implemented in various ways. The invention and its embodiments are not limited to the examples described above but may vary within the scope of the claims.
Number | Date | Country | Kind |
---|---|---|---|
20075681 | Sep 2007 | FI | national |