US20150099488A1 - Radio Communication System, Method and Arrangement for Use in a Radio Communication System - Google Patents
Radio Communication System, Method and Arrangement for Use in a Radio Communication System Download PDFInfo
- Publication number
- US20150099488A1 US20150099488A1 US14/571,584 US201414571584A US2015099488A1 US 20150099488 A1 US20150099488 A1 US 20150099488A1 US 201414571584 A US201414571584 A US 201414571584A US 2015099488 A1 US2015099488 A1 US 2015099488A1
- Authority
- US
- United States
- Prior art keywords
- user device
- access
- access network
- network
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
- H04W88/10—Access point devices adapted for operation in multiple networks, e.g. multi-mode access points
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/02—Inter-networking arrangements
Definitions
- the present invention generally relates to mobile communication. More particularly, the invention relates to a radio communication system comprising a first access network arranged to operate according to a first Radio Access Technology, a second access network arranged to operate according to a second Radio Access Technology, and a user device which is connectable to the first access network and to the second access network.
- the invention also relates to a method and an arrangement for use in a radio communication system as referred to above, and to an associated computer readable storage medium.
- Radio Access Technologies are available in the modern world of mobile communication, allowing a user of a user device such as a mobile terminal (User Equipment (UE)) to access communication services like voice calls, Internet browsing, video calls, file transmissions, audio/video streaming, electronic messaging and e-commerce.
- Radio Access Technologies can be divided into different categories.
- a first and probably most widely spread category includes RATs suitable for use in mobile or cellular telecommunications systems like GSM (Global System for Mobile Communications), UMTS (Universal Mobile Telecommunications System), FOMA (Freedom of Mobile Multimedia Access), EPS (Evolved Packet System), D-AMPS (Digital-Advanced Mobile Phone Service), CDMA2000 (Code Division Multiple Access 2000) or WiMAX (Worldwide Interoperability for Microwave Access).
- GSM Global System for Mobile Communications
- UMTS Universal Mobile Telecommunications System
- FOMA Freedom of Mobile Multimedia Access
- EPS Evolved Packet System
- D-AMPS Digital-Advanced Mobile Phone Service
- CDMA2000 Code Division Multiple Access 2000
- WiMAX Worldwide Interoperability for Microwave Access
- RATs in this first category are 3GPP (3rd Generation Partnership Project) GPRS/EDGE (General Packet Radio Service/Enhanced Data rates for Global Evolution), 3GPP WCDMA/HSPA (Wideband Code Division Multiple Access/High-Speed Packet Access), 3GPP LTE/E-UTRAN (Long-Term Evolution/Evolved Universal Terrestrial Radio Access Network), and TD-SCDMA (Time Division Synchronous Code Division Multiple Access).
- 3GPP 3rd Generation Partnership Project
- GPRS/EDGE General Packet Radio Service/Enhanced Data rates for Global Evolution
- 3GPP WCDMA/HSPA Wideband Code Division Multiple Access/High-Speed Packet Access
- 3GPP LTE/E-UTRAN Long-Term Evolution/Evolved Universal Terrestrial Radio Access Network
- TD-SCDMA Time Division Synchronous Code Division Multiple Access
- a second category includes RATs which are suitable for use in short-range wireless communication networks, such as Wi-Fi or WLAN (Wireless Local Area Network).
- Wi-Fi Wireless Local Area Network
- WLAN Wireless Local Area Network
- One example of a RAT in this second category is the IEEE 802.11 family of wireless standards.
- Other examples include Bluetooth and NFC (Near-Field Communication).
- a mobile terminal from now on referred to as User Equipment or UE, enabled both for cellular access (e.g. 3GPP LTE/E-UTRAN and/or WCDMA/HSPA for use in EPS and/or UMTS) and for Wi-Fi access, will be used herein as an example of such a multi-RAT-enabled user device.
- UE User Equipment
- Wi-Fi Wireless Fidelity
- the current Wi-Fi deployments are mainly totally separate from mobile networks, and are to be seen as non-integrated.
- the usage of Wi-Fi is mainly driven due to the free and wide unlicensed spectrum, and the increased availability of Wi-Fi in mobile terminals like smartphones and tablets.
- the end-users are also becoming more and more at ease with using Wi-Fi for example at offices and homes.
- Wi-Fi APs Access Points
- third-party is seen as anything else than a mobile operator, and that the third-party is not totally “trusted” by the mobile operator.
- a third-party could be for example a Wi-Fi operator or an end-user himself/-herself.
- public/hotspot enterprise and residential deployments.
- Wi-Fi integration towards the mobile core network is emerging as a good way to improve the end-user experience further.
- These solutions consist mainly of the following components: common authentication between 3GPP and Wi-Fi, and integration of Wi-Fi user plane traffic to the mobile core network.
- the common authentication is based on automatic (U)SIM-based ((Universal) Subscriber Identity Module) authentication in both access types.
- the Wi-Fi user plane integration gives the mobile operator an opportunity to provide the same services, like parental control and subscription-based payment methods, for the end-users both when connected via 3GPP and when connected via Wi-Fi.
- Different solutions are standardized in 3GPP.
- Wi-Fi integration into radio access network is also emerging as an interesting study object. This has basically two different possible levels that could be implemented either separately or together.
- a first level of integration is to combine both 3GPP and Wi-Fi in the small pico base stations to gain access to the Wi-Fi sites with 3GPP technology, and vice versa.
- a second level of integration is to integrate the Wi-Fi access tighter into the RAN by introducing enhanced network controlled traffic steering between 3GPP and Wi-Fi based on knowledge about the total situation on the different accesses.
- the driver for this second level of integration could be to avoid potential issues with UE (User Equipment) controlled Wi-Fi selection, such as selecting Wi-Fi when the Wi-Fi connection is bad or when the UE is moving, thus giving better end-user performance and better utilization of the combined Wi-Fi and cellular radio network resources.
- UE User Equipment
- FIG. 1 illustrates an existing network architecture for integration of a mobile telecommunications system 110 in the form of an EPS system, and a Wi-Fi access network 120 .
- EPS was introduced in 3GPP Release 8 and Release 9.
- the mobile telecommunications (EPS) system 110 comprises a radio access network 112 known as E-UTRAN (Evolved Universal Terrestrial Radio Access Network) and a core network 114 known as EPC (Evolved Packet Core).
- E-UTRAN Evolved Universal Terrestrial Radio Access Network
- EPC Evolved Packet Core
- the E-UTRAN has a combined base station and radio network controller known as eNodeB.
- the EPC has units known as MME (Mobility Management Entity) and a Serving GW (Gateway).
- MME Mobility Management Entity
- S1-MME Mobility Management Entity
- S1-U Serving GW
- FIG. 1 also shows how the Wi-Fi access network 120 is connected to the PDN-GW via the S2a interface and to the 3GPP AAA Server via the STa interface.
- the shown Wi-Fi access network is just an example deployment and contains a Wi-Fi Access Point (AP), a Wi-Fi Access Controller (AC) and a Broadband Network Gateway (BNG).
- AP Wi-Fi Access Point
- AC Wi-Fi Access Controller
- BNG Broadband Network Gateway
- HS2.0 Wi-Fi Alliance with the Hotspot 2.0 (HS2.0) initiative, now officially called PassPoint.
- Hotspot 2.0 For detailed information about Hotspot 2.0, reference is made to Wi-Fi Alliance Hotspot 2.0 (Release 1) TS Version 1.0.0, which can be obtained from the website of the Wi-Fi Alliance at http://www.wi-fi.org/.
- HS2.0 is primarily geared towards Wi-Fi networks.
- HS2.0 builds on IEEE 802.11u, and adds requirements on authentication mechanisms and auto-provisioning support.
- IEEE 802.11u reference is made to IEEE 802.11u-2011, Amendment 9: Interworking with External Networks, which can be obtained from the website http://standards.ieee.org.
- Hotspot 2.0 The momentum of Hotspot 2.0 is due to its roaming support, its mandatory security requirements and for the level of control it provides over the terminal for network discovery and selection. Even if the current release of HS2.0 is not geared towards 3GPP interworking, 3GPP operators are trying to introduce additional traffic steering capabilities, leveraging HS2.0 802.11u mechanisms. Because of the high interest of 3GPP operators, there will be a second release of HS2.0 focusing on 3GPP interworking requirements.
- the HS2.0 contains the following procedures:
- Provisioning Policy related to the created account is pushed towards the terminal. This only takes place when a registration takes place.
- the Access Network Discovery and Selection Function is an entity defined by 3GPP for providing access discovery information as well as mobility and routing policies to the UE.
- the information and policies provided by the ANDSF may be subscriber specific.
- Access Discovery Information is used to provide access discovery information to the UE, which can assist the UE to discover available (3GPP and) non-3GPP access networks without the burden of continuous background scanning.
- ISMP Inter-System Mobility Policies
- ISRP Inter-System Routing Policies
- IMSI International Mobile Subscriber Identity
- a Mobile Country Code consisting of three digits.
- the MCC uniquely identifies the country of the mobile subscriber/subscription of the UE.
- a Mobile Network Code consisting of two or three digits.
- the MNC identifies the home PLMN (Public Land Mobile Network) of the mobile subscriber/subscription.
- the length of the MNC depends on the value of the MCC.
- MSIN Mobile Subscriber Identification Number
- NMSI National Mobile Subscriber Identity
- MNC Mobile Network Code
- MSIN Mobile Subscriber Identification Number
- IMEISV International Mobile station Equipment Identity and Software Version number
- IMEI International Mobile station Equipment Identity
- MSISDN MS international PSTN/ISDN number
- the permanent UE identities are only known in the EPC 114 , whereas the E-UTRAN 112 is only aware of temporary UE identities.
- An example of this is the Globally Unique Temporary UE Identity (GUTI) that uniquely identifies the MME which allocated the GUTI and also identifies the UE within the MME that allocated the GUTI.
- Another example used for paging purposes is the S-TMSI.
- GUTI and S-TMSI are also defined in the aforementioned 3GPP TS 23.003.
- the GUTI is allocated to the UE during an Attach procedure as defined in the aforementioned 3GPP TS 23 . 401 (also see FIGS. 3A and 3B ), and the serving MME holds the association between the GUTI and the UE permanent identifier(s).
- the UE When the UE accesses a Wi-Fi network, it can be authenticated using EAP-SIM (Extensible Authentication Protocol-SIM) and EAP-AKA (Extensible Authentication Protocol-Authentication and Key Agreement) protocols. In these cases, the UE can be identified by either the full authentication Network Access Identifier (NAI) or by the fast re-authentication NAI.
- NAI Network Access Identifier
- the full authentication NAI contains the IMSI of the UE, and the fast re-authentication NAI is similar to the temporary identities used in LTE access in the sense that it is the 3GPP AAA Server that knows the relation between the fast re-authentication NAI and the full authentication NAI.
- FIGS. 3A and 3B shows an overview of the attach procedure used in for instance the E-UTRAN 112 of FIG. 1 .
- the attach procedure is described in detail in 3GPP TS 23.401.
- the UE is authenticated to the network in a step 5a, using credentials stored on the (U)SIM ((Universal) Subscriber Identity Module) in the UE.
- the UE will use the IMSI as an identifier of the UE subscription (and (U)SIM).
- the UE might be assigned other shorter temporary identifiers such as S-TMSI, P-TMSI, URNTI, etc.
- the MME/SGSN in the 3GPP Core Network (CN) will be aware of the IMSI associated and the mapping to temporary identifiers when the UE has an active context in the network.
- FIG. 4 shows an example procedure for a Wi-Fi-enabled UE connecting to a Wi-Fi network, such as access network 120 in FIG. 1 , with a Wi-Fi Access Controller (AC).
- AC Wi-Fi Access Controller
- Other procedures may also be used depending on implementation in the UE and network.
- the EAP signalling is in this procedure used to authenticate the UE towards the network.
- the UE uses IMSI or some other certificate to identify itself towards the network.
- the current methods for integration of Wi-Fi into a 3GPP network described above do not offer good support for network-controlled Wi-Fi/3GPP access selection and service mapping, taking into consideration radio access related input parameters such as UE mobility, 3GPP/Wi-Fi cell and network load, radio link performance, etc.
- the 3GPP radio access network which holds information about radio performance, UE mobility, etc. on the 3GPP side—with the UE context in the Wi-Fi network.
- This can then enable a network entity to take decisions whether the UE should access the Wi-Fi network or not, depending on if the UE is stationary, and/or has a good connection to the Wi-Fi AP (Access Point), etc.
- the decision can then be signaled to the UE or executed internally in the 3GPP/Wi-Fi network (for instance to control UE admission to Wi-Fi).
- a basic concept may also include:
- the concept can be used together with existing methods for integrating UE Wi-Fi traffic in 3GPP networks (e.g. S2a method as seen in FIG. 1 and S2b and S2c methods not shown in FIG. 1 ) as well as existing authentication methods such as (U)SIM-based (e.g. EAP-SIM or EAP-AKA, as described above), or alternatively certificate-based (EAP-TLS), etc.
- EAP-TLS Extensible Authentication Protocol-Transport Layer Security
- such a basic concept may form the basis for network-controlled access selection or service mapping as follows:
- Access A When the UE is connected to one access network (e.g. 3GPP) (Access A) and finds a suitable cell of the other access network (e.g. Wi-Fi) (Access B), it will, depending on implementation rules, initiate access procedure towards Access B.
- access network e.g. 3GPP
- Wi-Fi Wi-Fi
- the UE will identify itself in the network using an identifier known in Access A, or that can be translated by Access B to an identifier known in Access A.
- This identifier will be used by a network node to find the RAN context in the Access A.
- the network can perform internal signaling between the RAN nodes of the different access (Access A and Access B) to convey radio related parameters which can be used for access selection (e.g. moving a UE towards the new access (Access B), leaving the old access (Access A)) and/or service mapping (e.g. mapping some services on the new access (Access B), keeping ongoing UE connection to the old access (Access A)).
- radio related parameters e.g. moving a UE towards the new access (Access B), leaving the old access (Access A)
- service mapping e.g. mapping some services on the new access (Access B), keeping ongoing UE connection to the old access (Access A)
- the network entity responsible for the decisions will convey this information to the UE or to some other network entity which has control of the UE access selection or service mapping.
- a radio communication system comprising a first access network arranged to operate according to a first Radio Access Technology, a second access network arranged to operate according to a second Radio Access Technology, and a user device which is connectable to said first access network and to said second access network.
- the system further comprises:
- an authentication node arranged to identify said user device, when seeking access to said second access network, through a user device identifier for said user device, wherein said user device identifier is associated with said first access network;
- a query node arranged to provide information about a context of said user device in said first access network based on said user device identifier
- an access selection node arranged to generate an access selection decision for the access sought by the user device to the second access network based on the provided context information.
- the system is arranged to cause said access selection decision to be executed.
- the authentication node may be arranged to identify said user device based on a user identifier provided by the user device.
- This identifier may be an International Mobile Subscriber Identity (IMSI).
- the identifier is a temporary identifier assigned to said user device in said first access network, wherein said authentication node is arranged to use the temporary identifier for retrieving a permanent identifier of said user device from a network resource in or via said first access network.
- the temporary identifier may be, for instance, a Packet Temporary Mobile Subscriber Identity (P-TMSI) or Shortened Temporary Mobile Subscriber Identity (S-IMSI).
- the feature “said user device identifier is associated with said first access network” is to be construed broadly to comprise, without limitations, cases where the user device identifier is directly associated with or known to the first access network (for instance a temporary identifier like P-TMSI), as well as cases where the user device identifier is indirectly associated with the first access network (for instance in the form of a mapping between a temporary identifier like P-TMSI—which is directly known to the first access network—and a permanent identifier like IMSI, wherein the mapping is held by a network node somewhere in the radio communication system, for instance in a node in a core network coupled to the first access network).
- a temporary identifier like P-TMSI for instance a temporary identifier like P-TMSI
- IMSI permanent identifier
- the context information provided by said query node about said user device includes a current location of said user device in said first access network.
- said query node may be further configured for signaling with said first access network and/or said second access network to provide parameters to said access selection node, wherein said access selection node is configured to generate said access selection decision based on said parameters.
- the access selection decision involves at least one of the following:
- the access selection node is further configured to cause transmission of said access selection decision to said user device for execution of said access selection decision.
- the access selection node may be further configured to cause transmission of said access selection decision to said first access network and/or to said second access network for execution of said access selection decision.
- the first access network may be part of a mobile telecommunication system compliant with, for instance, GSM, UMTS, FOMA, EPS, D-AMPS or CDMA2000.
- the first access network may for instance be capable of radio communication in accordance with GPRS/EDGE, WCDMA/HSPA, LTE/E-UTRAN, or any combination thereof, or alternatively TD-SCDMA.
- GPRS/EDGE GPRS/EDGE
- WCDMA/HSPA High Speed Packet Access
- LTE/E-UTRAN Long Term Evolution/E-UTRAN
- Other existing and future mobile telecommunication systems and radio communication technologies are however also feasible.
- the second access network may be a short-range wireless communication network compliant with, for instance, IEEE 802.11 (Wi-Fi or WLAN).
- the second access network may be of any of the types referred to above for the first access network.
- Other existing and future technologies are however also feasible, as was referred to in the background section of this document.
- the authentication node, query node and access selection node are to be seen as functional elements rather than structural.
- the functionalities of these three nodes may be split between and/or performed in a distributed cooperative manner by other, existing nodes in the first and second access networks, or in the user device. Some examples of this will be found in the detailed description section of this document.
- some or all of the functionalities of these three nodes may be performed by separate hardware dedicated for this purpose, such as appropriately configured computer equipment.
- Another aspect of the present invention can be summarized as a method for use in a radio communication system of the type which comprises a first access network arranged to operate according to a first Radio Access Technology, a second access network arranged to operate according to a second Radio Access Technology, and a user device which is connectable to said first access network and to said second access network.
- the method comprises:
- the user device is identified based on a user identifier provided by the user device.
- This identifier may be an International Mobile Subscriber Identity (IMSI).
- IMSI International Mobile Subscriber Identity
- the identifier is a temporary identifier assigned to said user device in said first access network, and wherein the identifying of said user device further comprises using the temporary identifier for retrieving a permanent identifier of said user device from a network resource in or via said first access network.
- the context information provided by said query node about said user device includes a current location of said user device in said first access network.
- the method may further comprise:
- the access selection decision involves at least one of the following:
- the generated access selection decision may be transmitted to said user device for execution of the access selection decision.
- the generated access selection decision may be transmitted to said first access network and/or to said second access network for execution of the access selection decision.
- Yet another aspect of the present invention can be summarized as a computer readable storage medium encoded with instructions that, when loaded and executed by a processor, causes performance of the method referred to above.
- Still another aspect of the present invention can be summarized as an arrangement for use in a radio communication system comprising a first access network arranged to operate according to a first Radio Access Technology and a second access network arranged to operate according to a second Radio Access Technology, wherein said arrangement comprises:
- the means for identifying a user device may be implemented by the aforementioned authentication node in the radio communication system aspect of the invention.
- the means for providing information about a context of said user device may be implemented by the aforementioned query node in the radio communication system aspect of the invention.
- the means for generating an access selection decision may be implemented by the aforementioned access selection node in the radio communication system aspect of the invention.
- the arrangement may further comprise means for causing said access selection decision to be executed in said radio communication system.
- the arrangement may further comprise means for causing performance of any functional feature of the method aspect referred to above.
- FIG. 1 schematically illustrates an existing network architecture for integration of a mobile telecommunications system and a Wi-Fi access network.
- FIG. 2 illustrates the definition of International Mobile Subscriber Identity (IMSI).
- IMSI International Mobile Subscriber Identity
- FIGS. 3A and 3B show an overview of an attach procedure used in for instance the radio access network of the mobile telecommunications system shown in FIG. 1 .
- FIG. 4 shows an overview of an attach procedure used in for instance the Wi-Fi access network shown in FIG. 1 .
- FIG. 5A schematically illustrates a high level functional architecture of an embodiment of the present invention.
- FIG. 5B is a flowchart diagram to illustrate the functionality of an embodiment of the present invention.
- FIG. 5C illustrates a computer readable storage medium encoded with instructions that, when loaded and executed by a processor, may cause performance of the functionality shown in FIG. 5B .
- FIG. 6 is a schematic flowchart diagram of a procedure for finding context information about a user device in a first access network when seeking access to a second access network.
- FIG. 7 is a schematic flowchart diagram of a procedure which can be used when maintaining the context information about the user device in the first access network.
- FIG. 8 is a schematic flowchart diagram of a procedure for transferring of parameters related to the first and second access networks, for use when performing an access network selection and/or service mapping decision for the user device seeking access to the second access network.
- FIG. 9 is a schematic block diagram of a user device which is connectable to first and second access networks.
- FIG. 10 is a schematic block diagram illustrating an arrangement according to one aspect of the invention.
- FIG. 5A A high level functional architecture of an embodiment of the present invention is shown in FIG. 5A .
- a corresponding functionality is shown in FIG. 5B .
- a user device 500 is connectable to a first access network 510 , also referred to as Access A.
- the user device 500 is also connectable to a second access network 520 , also referred to as Access B.
- the first access network 510 , Access A is arranged to operate according to a first Radio Access Technology, which in the disclosed embodiments is either 3GPP WCDMA/HSPA or LTE/E-UTRAN, or WCDMA/HSPA and LTE/E-UTRAN in combination.
- the second access network 520 is arranged to operate according to a second Radio Access Technology, which in the disclosed embodiment is WiFi.
- a second Radio Access Technology which in the disclosed embodiment is WiFi.
- the user device 500 is a user equipment, UE.
- An embodiment of such a UE is illustrated in more detail as 900 in FIG. 9 and will be described in more detail later.
- Other embodiments may be however be based on other Radio Access Technologies for the first and second access networks 510 , 520 , as has been referred to previously in this document.
- the architecture shown in FIG. 5A moreover comprises an Authentication Node (AN) 530 , one or more Query Nodes (QNs) 540 and an Access Selection Node (ASN) 550 .
- the illustration shows that for example the QN 540 may be part of Access A or outside of Access A.
- the AN 530 may be part of Access B or outside Access B.
- the ASN 550 it is shown in FIG. 5A as being outside both Access A and B. Any other alternatives are also possible, i.e. the ASN 550 may be part of Access A or Access B as well.
- the ASN 550 is distributed, such that its functionality is performed by or at more than one entity in the system.
- the communication between the AN 530 and the QN(s) 540 occurs via the ASN 550 , or that the communication occurs directly between these functions.
- the authentication node AN 530 is arranged to identify the UE 500 when seeking access to the second access network 520 , Access B, through a user device identifier for the UE 500 , wherein this user device identifier is associated with the first access network 510 , Access A.
- the query node QN 540 is arranged to provide information about a context of the UE 500 in the first access network 510 , Access A, based on the user device identifier.
- the access selection node ASN 550 is arranged to generate an access selection decision for the access sought by the UE 500 to the second access network 520 , Access B, based on the provided context information.
- step 630 the system is arranged to cause the access selection decision to be executed.
- FIG. 5A is a logical drawing rather than a physical; hence the functions of the different entities shown in FIG. 5A can be implemented in different physical units in the system.
- Access A is 3GPP WCDMA/HSPA and Access B is Wi-Fi
- the QN 540 could be communicating towards a radio network controller (RNC) in Access A, or it may be implemented as part of the RNC.
- RNC radio network controller
- the QN 540 could be communicating towards the eNodeB in the E-UTRAN 112 of FIG. 1 , or it may be implemented as part of the eNodeB.
- the AN 530 may be part of for example a Wi-Fi Access Controller (AC)—such as the one shown in the Wi-Fi access network 120 of FIG. 1 —or it may communicate with such a Wi-Fi AC.
- AC Wi-Fi Access Controller
- the ASN 550 could implemented as part of the Wi-Fi AC, the RNC or as a stand-alone physical node.
- the envisioned solution according to FIGS. 5A and 5B is a target-based network-controlled solution, where the UE by itself tries to perform access to the target access (Access B), which then triggers the network to take an access selection or services mapping decision.
- Target-based solutions do not require any UE impacts (meaning that they can be applied to existing UEs on the market).
- Target-based solutions in accordance with the present invention can however still benefit from UE impacts.
- FIG. 5C shows a schematic view of a computer readable storage medium 640 which may be used to accommodate instructions for performing the functionality of the present invention, as is generally outlined in FIG. 5B .
- the computer-readable medium 640 is a memory stick, such as a Universal Serial Bus (USB) stick.
- the USB stick 640 comprises a housing 643 having an interface, such as a connector 644 , and a memory chip 642 .
- the memory chip 642 is a flash memory, i.e. a non-volatile data storage that can be electrically erased and re-programmed.
- the memory chip 642 is programmed with instructions 641 that when loaded (possibly via the connector 644 ) into a processor will cause execution of the method.
- the processor may be at least one CPU (Central Processing Unit), DSP (Digital Signal Processor), FPGA (Field-Programmable Gate Arrays), ASIC (Application Specific Integrated Circuit) or any other electronic programmable logic device, or a combination of any such devices, adapted for executing the instructions stored on the aforementioned storage medium 640 .
- a processor may act as a controller in a node in the first or second access networks (Access A, Access B).
- the instructions may be adapted for execution by several processors, possibly located in different nodes in said first and second networks, in a distributed cooperative manner, as is mentioned is other parts of this document.
- USB stick 640 in FIG. 5C is merely one example of a computer-readable storage medium.
- Other examples may include compact discs, digital video discs, hard drives or other memory technologies commonly used.
- the UE If the UE supports EAP-SIM or EAP-AKA based authentication in Wi-Fi (i.e. Access B), it will (at least for initial attach) identify itself to the Wi-Fi network (internally the Wi-Fi Access Controller or some other node having the authenticator role), using the IMSI ((U)SIM-related identifier).
- Wi-Fi Wi-Fi Access Controller
- IMSI (U)SIM-related identifier
- Embodiments based on other identifiers that can be translated to IMSI by the network e.g. P-TMSI, S-TMSI, temporary EAP identifiers
- the UE In case the UE has been previously connected to a particular access network, it might have been assigned an access-specific temporary identifier, such as 3GPP-defined S-TMSI or P-TMSI, EAP-SIM/AKA fast re-authentication NAI, etc.
- the network node responsible for the authentication needs to either have stored the permanent UE identity (e.g. IMSI received from the last time the UE was connected to the access network), or retrieve the permanent identity from another node or network resource, such as an AAA server or MME ( FIG. 1 ) or Home Location Register (HLR).
- the temporary identifier is used to find the context in the other node.
- the network node responsible for the authentication in the access network needs to also retrieve the IMSI in conjunction with authentication procedure.
- the IMSI could in this case for instance be stored in an AAA-server or HLR, which also contains information about the certificate of the UE.
- the IMSI can be passed on to the node in the target access network responsible for the authentication of the UE.
- the source access network will assign to the UE an UE identity while the UE is in Access A.
- This identity can be assigned using dedicated signaling, transferred in a secure manner over the radio interface of Access A.
- the actual identity could be made up of a random temporary identifier, such as 3GPP S-TMSI, P-TMSI, or it could be an IP address which the UE also uses for communication, or some specific bit-string.
- the identity can also, in combination with UE-specific identity, also contain information which is used for internal routing in the network (such as, for instance, identity information regarding the relevant MME, RNC, Wi-Fi AC, etc). Other possible combinations of identities are also possible.
- the UE When the UE later performs access to the target access network (Access B), it will transfer the assigned identity to the target access network (Access B), which then can be used by Access B to locate the UE context in the source access network (Access A).
- the node responsible for authentication i.e. the Authentication Node (AN) 530 of the UE in the target RAT (Access B) has determined the unique identifier (e.g. IMSI) of the UE seeking the access (as described in subsection 1 above), it will initiate procedure to locate the UE context in the previous RAT (Access A).
- This procedure is achieved by querying a node or function, namely the Query Node (QN) 540 , which is aware of the UE location in the previous RAT.
- This Query Node is able to map the unique identifier to a UE RAN context located either in that node or in a separate node.
- the Query Node 540 will assist the communication between the separate node and the Authentication Node 530 , either by providing addressing information of the Previous RAT Node to the Authentication Node 530 , or by forwarding messages between the Previous RAT Node and Authentication Node 530 .
- the Authentication Node 530 can query multiple Query Nodes 540 for a given UE.
- a Query Node 540 is not aware of the location of the UE, it can either respond with a negative message to the Authentication Node 530 , or it can in turn query another Query Node 540 which could know the location of the UE.
- the Query Nodes 540 can be cascaded. This procedure can be enhanced based on information in the Authentication Node 530 about the location (e.g. geo position) of the access nodes (e.g.
- the Authentication Node 530 can focus on querying Query Nodes 540 which are associated with source RAT nodes which covers the same area as the target RAT nodes (e.g. the 3GPP cells which have partially overlapping coverage with the Wi-Fi cell that the UE is accessing).
- the Query Node 540 can either be implemented together with RAT specific functions such as RNCs, Wi-Fi access controllers, MMEs, etc., or it can be a stand-alone node.
- this signaling to update the location of specific UEs could be part of normal RAT specific mobility signaling (e.g. handovers, path switch, cell update).
- the Query Node 540 can also be implemented together with the Authentication Node 530 .
- FIG. 6 shows an example of this case, where the RAN context of the UE is located in Access A (the source RAT) when the UE is attempting to access Access B (the target RAT).
- the RAT specific node will perform signaling towards the Query Nodes when the UE register in the RAT the first time, and when the UE is moving in the RAT.
- the RAT nodes can also inform the Query Node about UE specific information, such as UE capabilities, ongoing services, UE mobility states etc.
- the UE can be identified in this signaling by using a unique identifier (e.g. IMSI) or a temporary identifier assigned while the UE was in the source RAT (Access A).
- a unique identifier e.g. IMSI
- a temporary identifier assigned while the UE was in the source RAT e.g. IMSI
- FIG. 7 shows an example of this case.
- the RAT specific nodes Access A 1 and A 2 can be for example RNCs, eNodeBs or MMEs, as described in other parts of this document.
- the ASN 550 responsible for performing access selection, and/or service mapping, decisions.
- This ASN node 550 is responsible for deciding if the UE should be accepted in the target access network (Access B) and/or if the UE should leave the source access network (Access A) or not.
- the ASN 550 node can decide if a specific service of the UE should be mapped on a specific access network among Access A or Access B.
- the Access Selection Node 550 can base this decision upon RAN related parameters provided by the source and target RATs, as well as information provided from the UE. Possible parameters include (but are not limited to) information about:
- These parameters can be sent to the ASN 550 both from Access A (source RAT) and from Access B (target RAT) in order to facilitate access selection and/or service mapping decision by the ASN 550 based on those parameters.
- the parameters can also be sent from a node outside of the source and target RATs, such as for instance by a node in a core network coupled to any of the RATs.
- the relevant information for the parameters may be held by an MME in the core network 114 coupled to the RAT 112 as seen in FIG. 1 .
- the signaling to transfer these parameters to the ASN 550 can be performed as separate signaling or piggybacked on the messages used to locate the RAN context.
- the Access Selection Node 550 can be implemented together with the Authentication Node 530 and/or Query Node(s) 540 , or as a stand-alone entity.
- the Access Selection Node 550 can even be implemented in the UE based on information provided by the network (e.g. from source/target RAT).
- the Access Selection Node 550 is implemented in the network, it can be implemented together with existing nodes e.g. MMEs, RNCs, Wi-Fi AP, Wi-Fi AC, eNodeB, etc.
- FIG. 8 shows an example of this case. This example is based on that the signalling from the AN 530 towards the QN(s) 540 is separate from the signalling towards the ASN 550 . Steps 1 to 5 are the same as in FIG. 6 , and the new parts are shown as steps 6 and 7 .
- the ASN 550 takes an access selection and/or service mapping decision for the access sought by the UE to the second access network (Access B, target RAT).
- the decision taken needs to be conveyed to different parts of the network depending on the decision taken, in accordance with the following:
- FIG. 9 illustrates a user device 900 which is connectable to first and second access networks, Access A and Access B.
- the user device 900 may implement the UE 500 according to the preceding drawings and descriptions.
- the user device 900 has a controller 950 which has the overall responsibility for controlling the operation of the user device 900 .
- the controller 950 is a central processing unit (CPU), but it can alternatively be a digital signal processor (DSP), or other programmable electronic logic device such as an application-specific integrated circuit (ASIC) or field-programmable gate array (FPGA).
- the controller 950 is coupled to a memory 960 which comprises a work memory and a storage memory.
- the memory 960 may for instance be implemented in the form of RAM, EEPROM, flash memory (e.g. memory card), magnetic hard disk, or any combination thereof.
- the memory 960 is capable of storing program code which is executable by the controller 950 so as to cause performing of the terminal-side part of the functionalities as described in various parts of this document. In alternative embodiments, some or all of the terminal-side functionality may instead be performed by dedicated hardware.
- the user device 900 has a mobile network interface 952 which allows the user device 900 to communicate with the first access network, Access A.
- the mobile network interface 952 comprises an internal or external antenna as well as appropriate radio circuitry for establishing and maintaining a wireless link to a nearby base station in the first access network, Access A.
- the radio circuitry comprises a radio receiver and transmitter formed for instance by band pass filters, amplifiers, mixers, local oscillators, low pass filters, AD/DA converters, etc.
- the disclosed embodiment of the user device 900 has a wireless interface 954 which may be adapted for communication in accordance with one or more short-range wireless communication standards such as WiFi (e.g. IEEE 802.11, WLAN), Bluetooth, Near Field Communication (NFC), or Infrared Data Association (IrDA).
- a serial interface such as USB may allow the user device 900 to communicate over a serial cable with for instance a personal computer. Such interfaces may be absent in other embodiments.
- Communication protocol stacks 958 are provided to allow communication via any of the interfaces 952 and 954 .
- a user interface 962 allows a user 2 to interact with the user device 900 .
- the user interface 962 includes display means, such as at least one LCD display, as well as input means for the user.
- the input means may e.g. include a keypad with alpha-numeric keys and/or other keys such as arrow keys (navigation keys) and functional keys (soft keys), and/or a joystick, touch pad, rotator, jog dial, etc.
- the display means and input means may be jointly realized by a touch-sensitive display in some embodiments.
- the user interface 962 typically also involves a loudspeaker and a microphone.
- the user device 900 may also be provided with other well-known components, such as power switch, battery, charger interface, accessory interface, and volume controls; such elements are however not indicated in FIG. 9 for the sake of brevity.
- the user device 900 has a (U)SIM reader capable of accessing a (U)SIM card 902 .
- the (U)SIM card 902 comprises electronic circuitry 903 which constitutes a local (U)SIM controller 903 a and a memory 903 b.
- the memory 903 b has a memory area 904 for storing the subscriber identity in the form of an IMSI number.
- a temporary UE identity such as P-TMSI or S-TMSI
- a non-IMSI UE identifier can be read from the (U)SIM memory 903 b or from the memory 960 and be presented by the user device 900 to the access network (Access B or Access A) which it is presently seeking access to.
- FIG. 10 is a schematic block diagram illustrating an arrangement 1090 for use in a radio communication system 1110 , wherein the radio communication system 1110 comprises a first access network 1010 arranged to operate according to a first Radio Access Technology, and a second access network 1020 arranged to operate according to a second Radio Access Technology.
- the first access network 1010 may, for instance, be the access network referred to as Access A and/or 510 in the embodiments described above.
- the second access network 1020 may, for instance, be the access network referred to as Access B or 520 in the embodiments described above.
- the arrangement 1090 comprises means 1030 for identifying a user device 1000 , when seeking access to the second access network 1020 , through a user device identifier for the user device, the user device identifier being associated with the first access network 1010 .
- the user device 1000 may, for instance, be the device referred to as UE, 500 or 900 in the embodiments described above.
- the means 1030 may, for instance, be the authentication node referred to as AN or 530 in the embodiments described above, and the means 1030 may, for instance, be adapted to perform the step 600 in FIG. 5B .
- the arrangement 1090 further comprises means 1040 for providing information about a context of the user device 1000 in the first access network 1010 based on the user device identifier.
- the means 1040 may, for instance, be the query node referred to as QN or 540 in the embodiments described above, and the means 1040 may, for instance, be adapted to perform the step 610 in FIG. 5B .
- the arrangement 1090 also comprises means 1050 for generating an access selection decision for the access sought by the user device 1000 to the second access network 1020 based on the provided context information.
- the means 1050 may, for instance, be the access selection node referred to as ASN or 550 in the embodiments described above, and the means 1050 may, for instance, be adapted to perform the step 620 in FIG. 5B .
- the arrangement 1090 may also comprise means 1060 for causing the access selection decision to be executed in the radio communication system 1110 .
- the means 1060 may, for instance, be adapted to perform the step 630 in FIG. 5B , and it may, for instance, be adapted to cause the access selection decision to be executed by appropriately informing the relevant element(s) in the radio communication system 1110 about the access selection decision taken, as has been described above under sub-section 4 in this detailed description section.
- the arrangement 1090 may further comprise means (collectively referred to as 1070 in FIG. 10 ), for performing any or all of the additional functionality described for the embodiments above and, particularly, any steps of the method referred to in the summary section of this document.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A system includes a first access network arranged to operate according to a first Radio Access Technology, a second access network arranged to operate according to a second Radio Access Technology, and a user device which is connectable to the first access network and to the second access network. The system also includes an authentication node arranged to identify the user device, when seeking access to the second access network, through a user device identifier for the user device, wherein the user device identifier is associated with the first access network. A query node provides information about a context of the user device in the first access network based on the user device identifier. An access selection node generates an access selection decision for the access sought by the user device to the second access network based on the provided context, and the access selection decision is then executed.
Description
- This application is a continuation of U.S. National Stage application Ser. No. 13/697,767 filed Nov. 13, 2012, which is a 35 U.S.C. §371 early national stage application of PCT International Application No. PCT/SE2012/051007, filed on 24 Sep. 2012, which claims priority to U.S. Provisional Application No. 61/644,040, filed on 8 May 2012. The disclosures of the above referenced applications are hereby incorporated herein in their entireties by reference.
- The present invention generally relates to mobile communication. More particularly, the invention relates to a radio communication system comprising a first access network arranged to operate according to a first Radio Access Technology, a second access network arranged to operate according to a second Radio Access Technology, and a user device which is connectable to the first access network and to the second access network. The invention also relates to a method and an arrangement for use in a radio communication system as referred to above, and to an associated computer readable storage medium.
- Different Radio Access Technologies (RAT:s) are available in the modern world of mobile communication, allowing a user of a user device such as a mobile terminal (User Equipment (UE)) to access communication services like voice calls, Internet browsing, video calls, file transmissions, audio/video streaming, electronic messaging and e-commerce. Radio Access Technologies can be divided into different categories.
- A first and probably most widely spread category includes RATs suitable for use in mobile or cellular telecommunications systems like GSM (Global System for Mobile Communications), UMTS (Universal Mobile Telecommunications System), FOMA (Freedom of Mobile Multimedia Access), EPS (Evolved Packet System), D-AMPS (Digital-Advanced Mobile Phone Service), CDMA2000 (Code Division Multiple Access 2000) or WiMAX (Worldwide Interoperability for Microwave Access). Common examples of RATs in this first category are 3GPP (3rd Generation Partnership Project) GPRS/EDGE (General Packet Radio Service/Enhanced Data rates for Global Evolution), 3GPP WCDMA/HSPA (Wideband Code Division Multiple Access/High-Speed Packet Access), 3GPP LTE/E-UTRAN (Long-Term Evolution/Evolved Universal Terrestrial Radio Access Network), and TD-SCDMA (Time Division Synchronous Code Division Multiple Access).
- A second category includes RATs which are suitable for use in short-range wireless communication networks, such as Wi-Fi or WLAN (Wireless Local Area Network). One example of a RAT in this second category is the IEEE 802.11 family of wireless standards. Other examples include Bluetooth and NFC (Near-Field Communication).
- Most user devices are nowadays enabled for use with more than one RAT, such as one or more RATs selected from the first category, as well as one or more RATs selected from the second category. A mobile terminal, from now on referred to as User Equipment or UE, enabled both for cellular access (e.g. 3GPP LTE/E-UTRAN and/or WCDMA/HSPA for use in EPS and/or UMTS) and for Wi-Fi access, will be used herein as an example of such a multi-RAT-enabled user device.
- Because of the inherent differences in architecture and operation between mobile telecommunications networks on the one hand and Wi-Fi networks on the other hand, in many existing setups there has not been any integration between the two. Allowing two such networks to co-exist in parallel but “hidden” from each other is fully acceptable, but not optimal from resource utilization, load distribution and user experience perspectives. Therefore, certain integration attempts have been made, as will now be described in some greater detail, however only for background purposes.
- Introduction
- Operators of mobile telecommunications networks are today mainly using Wi-Fi to offload traffic from the mobile networks, but the opportunity to improve end-user experience regarding performance is also becoming more important. The current Wi-Fi deployments are mainly totally separate from mobile networks, and are to be seen as non-integrated. The usage of Wi-Fi is mainly driven due to the free and wide unlicensed spectrum, and the increased availability of Wi-Fi in mobile terminals like smartphones and tablets. The end-users are also becoming more and more at ease with using Wi-Fi for example at offices and homes.
- The different business segments for Wi-Fi regarding integration possibilities can be divided into mobile operator hosted/controlled versus third-party hosted/-controlled Wi-Fi APs (Access Points). Here, “third-party” is seen as anything else than a mobile operator, and that the third-party is not totally “trusted” by the mobile operator. A third-party could be for example a Wi-Fi operator or an end-user himself/-herself. In both segments there exist public/hotspot, enterprise and residential deployments.
- Different Types of Wi-Fi Integration to Mobile Networks
- Wi-Fi integration towards the mobile core network is emerging as a good way to improve the end-user experience further. These solutions consist mainly of the following components: common authentication between 3GPP and Wi-Fi, and integration of Wi-Fi user plane traffic to the mobile core network. The common authentication is based on automatic (U)SIM-based ((Universal) Subscriber Identity Module) authentication in both access types. The Wi-Fi user plane integration gives the mobile operator an opportunity to provide the same services, like parental control and subscription-based payment methods, for the end-users both when connected via 3GPP and when connected via Wi-Fi. Different solutions are standardized in 3GPP. Overlay solutions (S2b, S2c) have been specified since
3GPP Release 8, while integration solutions (S2a) are currently work-in-progress (S2a, S2b, S2c indicating the 3GPP interface/reference point names towards the PDN-GW). These solutions are specified in 3GPP TS 23.402 (current version=11.3.0), which can be obtained from the website of the 3rd Generation Partnership Project at http://www.3gpp.com/. - Wi-Fi integration into radio access network (RAN) is also emerging as an interesting study object. This has basically two different possible levels that could be implemented either separately or together. A first level of integration is to combine both 3GPP and Wi-Fi in the small pico base stations to gain access to the Wi-Fi sites with 3GPP technology, and vice versa. A second level of integration is to integrate the Wi-Fi access tighter into the RAN by introducing enhanced network controlled traffic steering between 3GPP and Wi-Fi based on knowledge about the total situation on the different accesses. The driver for this second level of integration could be to avoid potential issues with UE (User Equipment) controlled Wi-Fi selection, such as selecting Wi-Fi when the Wi-Fi connection is bad or when the UE is moving, thus giving better end-user performance and better utilization of the combined Wi-Fi and cellular radio network resources.
-
FIG. 1 illustrates an existing network architecture for integration of amobile telecommunications system 110 in the form of an EPS system, and a Wi-Fi access network 120. As is well known, EPS was introduced in3GPP Release 8 andRelease 9. For detailed information about EPS, reference is made to 3GPP TS 23.401 (current version=11.2.0). The mobile telecommunications (EPS)system 110 comprises aradio access network 112 known as E-UTRAN (Evolved Universal Terrestrial Radio Access Network) and acore network 114 known as EPC (Evolved Packet Core). The E-UTRAN has a combined base station and radio network controller known as eNodeB. The EPC has units known as MME (Mobility Management Entity) and a Serving GW (Gateway). As is seen inFIG. 1 , the eNodeB is connected via the S1 interfaces, S1-MME and S1-U to the MME and Serving GW, respectively.FIG. 1 also shows how the Wi-Fi access network 120 is connected to the PDN-GW via the S2a interface and to the 3GPP AAA Server via the STa interface. The shown Wi-Fi access network is just an example deployment and contains a Wi-Fi Access Point (AP), a Wi-Fi Access Controller (AC) and a Broadband Network Gateway (BNG). - Background to Hotspot 2.0
- Different standards organizations have started to recognize the needs for an enhanced user experience for Wi-Fi access, this process being driven by 3GPP operators. An example of this is the Wi-Fi Alliance with the Hotspot 2.0 (HS2.0) initiative, now officially called PassPoint. For detailed information about Hotspot 2.0, reference is made to Wi-Fi Alliance Hotspot 2.0 (Release 1) TS Version 1.0.0, which can be obtained from the website of the Wi-Fi Alliance at http://www.wi-fi.org/. HS2.0 is primarily geared towards Wi-Fi networks. HS2.0 builds on IEEE 802.11u, and adds requirements on authentication mechanisms and auto-provisioning support. For detailed information about IEEE 802.11u, reference is made to IEEE 802.11u-2011, Amendment 9: Interworking with External Networks, which can be obtained from the website http://standards.ieee.org.
- The momentum of Hotspot 2.0 is due to its roaming support, its mandatory security requirements and for the level of control it provides over the terminal for network discovery and selection. Even if the current release of HS2.0 is not geared towards 3GPP interworking, 3GPP operators are trying to introduce additional traffic steering capabilities, leveraging HS2.0 802.11u mechanisms. Because of the high interest of 3GPP operators, there will be a second release of HS2.0 focusing on 3GPP interworking requirements.
- The HS2.0 contains the following procedures:
- 1 Discovery: Where the terminal discovers a Wi-Fi network, and probes it for HS2.0 support, using 802.11u and HS 2.0 extensions.
- 2 Registration is performed by the terminal towards the Wi-Fi Hot-spot network if there is no valid subscription for that network.
- 3 Provisioning: Policy related to the created account is pushed towards the terminal. This only takes place when a registration takes place.
- 4 Access: Cover the requirements and procedures to associate with a HS2.0 Wi-Fi network.
- Background to Access Network Discovery and Selection Function
- The Access Network Discovery and Selection Function (ANDFS) is an entity defined by 3GPP for providing access discovery information as well as mobility and routing policies to the UE. The information and policies provided by the ANDSF may be subscriber specific.
- Access Discovery Information is used to provide access discovery information to the UE, which can assist the UE to discover available (3GPP and) non-3GPP access networks without the burden of continuous background scanning.
- Inter-System Mobility Policies (ISMP) are policies which guide the UE to select the most preferable 3GPP or non-3GPP access. The ISMP are used for UEs that access a single access (3GPP or Wi-Fi) at a time,
- Inter-System Routing Policies (ISRP) are policies which guide the UE to select over which access a certain type of traffic or a certain APN shall be routed. The ISRP are used for UEs that access both 3GPP and Wi-Fi simultaneously.
- Background to Permanent UE Identifiers
- The different permanent UE identifiers are defined in 3GPP TS 23.003 (current version=11.2.0). The definition of International Mobile Subscriber Identity (IMSI) is shown in
FIG. 2 . As seen in this drawing, IMSI is composed of three parts: - 1. A Mobile Country Code (MCC) consisting of three digits. The MCC uniquely identifies the country of the mobile subscriber/subscription of the UE.
- 2. A Mobile Network Code (MNC) consisting of two or three digits. The MNC identifies the home PLMN (Public Land Mobile Network) of the mobile subscriber/subscription. The length of the MNC (two or three digits) depends on the value of the MCC.
- 3. Mobile Subscriber Identification Number (MSIN) identifying the mobile subscriber within a PLMN.
- The National Mobile Subscriber Identity (NMSI) consists of the Mobile Network Code (MNC) and the Mobile Subscriber Identification Number (MSIN).
- The International Mobile station Equipment Identity and Software Version number (IMEISV), the International Mobile station Equipment Identity (IMEI) and the MS international PSTN/ISDN number (MSISDN) are also defined in 3GPP TS 23.003 but are not further described herein.
- In the EPS (110,
FIG. 1 ), the permanent UE identities are only known in theEPC 114, whereas theE-UTRAN 112 is only aware of temporary UE identities. An example of this is the Globally Unique Temporary UE Identity (GUTI) that uniquely identifies the MME which allocated the GUTI and also identifies the UE within the MME that allocated the GUTI. Another example used for paging purposes is the S-TMSI. GUTI and S-TMSI are also defined in the aforementioned 3GPP TS 23.003. The GUTI is allocated to the UE during an Attach procedure as defined in the aforementioned 3GPP TS 23.401 (also seeFIGS. 3A and 3B ), and the serving MME holds the association between the GUTI and the UE permanent identifier(s). - When the UE accesses a Wi-Fi network, it can be authenticated using EAP-SIM (Extensible Authentication Protocol-SIM) and EAP-AKA (Extensible Authentication Protocol-Authentication and Key Agreement) protocols. In these cases, the UE can be identified by either the full authentication Network Access Identifier (NAI) or by the fast re-authentication NAI. The full authentication NAI contains the IMSI of the UE, and the fast re-authentication NAI is similar to the temporary identities used in LTE access in the sense that it is the 3GPP AAA Server that knows the relation between the fast re-authentication NAI and the full authentication NAI.
- Overview 3GPP Attach Procedure
-
FIGS. 3A and 3B shows an overview of the attach procedure used in for instance theE-UTRAN 112 ofFIG. 1 . The attach procedure is described in detail in 3GPP TS 23.401. During this attach procedure, the UE is authenticated to the network in a step 5a, using credentials stored on the (U)SIM ((Universal) Subscriber Identity Module) in the UE. At initial attach, the UE will use the IMSI as an identifier of the UE subscription (and (U)SIM). During the attach to the network, the UE might be assigned other shorter temporary identifiers such as S-TMSI, P-TMSI, URNTI, etc. The MME/SGSN in the 3GPP Core Network (CN) will be aware of the IMSI associated and the mapping to temporary identifiers when the UE has an active context in the network. - Overview of Wi-Fi Attach Procedure with EAP-SIM/AKA Authentication
-
FIG. 4 shows an example procedure for a Wi-Fi-enabled UE connecting to a Wi-Fi network, such asaccess network 120 inFIG. 1 , with a Wi-Fi Access Controller (AC). Other procedures may also be used depending on implementation in the UE and network. The EAP signalling is in this procedure used to authenticate the UE towards the network. The UE uses IMSI or some other certificate to identify itself towards the network. - Some Problems with Existing Solutions
- The current methods for integration of Wi-Fi into a 3GPP network described above do not offer good support for network-controlled Wi-Fi/3GPP access selection and service mapping, taking into consideration radio access related input parameters such as UE mobility, 3GPP/Wi-Fi cell and network load, radio link performance, etc.
- In order to achieve this functionality, it is required to link (connect, associate) the UE context in the 3GPP radio access network (RAN)—which holds information about radio performance, UE mobility, etc. on the 3GPP side—with the UE context in the Wi-Fi network. This can then enable a network entity to take decisions whether the UE should access the Wi-Fi network or not, depending on if the UE is stationary, and/or has a good connection to the Wi-Fi AP (Access Point), etc. The decision can then be signaled to the UE or executed internally in the 3GPP/Wi-Fi network (for instance to control UE admission to Wi-Fi).
- Although mechanisms have been introduced for allowing the UE to perform authentication towards the Wi-Fi network using (U)SIM credentials and identities (IMSI), there is currently no mechanism available for connecting the UE RAN context in the 3GPP RAN with the UE Wi-Fi access context.
- This means that with existing solutions, there is no node in the access network that can identify a single UE to be the same UE when it is active in Wi-Fi and 3GPP, respectively—even if it is handled by the same physical base station (e.g. eNodeB, WiFi AC).
- It is accordingly an object of the invention to eliminate or alleviate at least some of the problems referred to above.
- The present inventors have realized, after inventive and insightful reasoning, that it will be beneficial to introduce additional functionality serving to:
-
- Locate the UE RAN context in the other RAT (Wi-Fi, 3GPP RAN) based on a permanent or temporary identifier of the UE.
- Convey RAN related parameters between the RAN entities serving the UE and thus enabling access network selection or service mapping decisions for the UE to be taken in the network.
- Convey the access network selection or service mapping decisions to RAN nodes (Wi-Fi or 3GPP RAN).
- A basic concept may also include:
-
- Conveying the access network selection or service mapping decisions to the UE (e.g. in the form of access selection commands or access selection policies).
- Assigning temporary identities to the UE while connected in one RAT, which the UE subsequently uses to identify itself in the other RAT.
- The concept can be used together with existing methods for integrating UE Wi-Fi traffic in 3GPP networks (e.g. S2a method as seen in
FIG. 1 and S2b and S2c methods not shown inFIG. 1 ) as well as existing authentication methods such as (U)SIM-based (e.g. EAP-SIM or EAP-AKA, as described above), or alternatively certificate-based (EAP-TLS), etc. For a further description of EAP-TLS (Extensible Authentication Protocol-Transport Layer Security), reference is made to the open standard RFC 5216 by IETF (Internet Engineering Task Force), which is available at http://www.rfc-editor.org/rfc/rfc5216.txt. - On a high level, such a basic concept may form the basis for network-controlled access selection or service mapping as follows:
- 1. When the UE is connected to one access network (e.g. 3GPP) (Access A) and finds a suitable cell of the other access network (e.g. Wi-Fi) (Access B), it will, depending on implementation rules, initiate access procedure towards Access B.
- 2. During this procedure the UE will identify itself in the network using an identifier known in Access A, or that can be translated by Access B to an identifier known in Access A.
- 3. This identifier will be used by a network node to find the RAN context in the Access A.
- 4. Once the RAN context has been located the network can perform internal signaling between the RAN nodes of the different access (Access A and Access B) to convey radio related parameters which can be used for access selection (e.g. moving a UE towards the new access (Access B), leaving the old access (Access A)) and/or service mapping (e.g. mapping some services on the new access (Access B), keeping ongoing UE connection to the old access (Access A)).
- 5. Once an access selection/service mapping decision has been performed, the network entity responsible for the decisions will convey this information to the UE or to some other network entity which has control of the UE access selection or service mapping.
- One aspect of the present invention can therefore be summarized as a radio communication system comprising a first access network arranged to operate according to a first Radio Access Technology, a second access network arranged to operate according to a second Radio Access Technology, and a user device which is connectable to said first access network and to said second access network. The system further comprises:
- an authentication node arranged to identify said user device, when seeking access to said second access network, through a user device identifier for said user device, wherein said user device identifier is associated with said first access network;
- a query node arranged to provide information about a context of said user device in said first access network based on said user device identifier; and
- an access selection node arranged to generate an access selection decision for the access sought by the user device to the second access network based on the provided context information.
- The system is arranged to cause said access selection decision to be executed.
- In one or more embodiments, the authentication node may be arranged to identify said user device based on a user identifier provided by the user device. This identifier may be an International Mobile Subscriber Identity (IMSI).
- In one or more embodiments, the identifier is a temporary identifier assigned to said user device in said first access network, wherein said authentication node is arranged to use the temporary identifier for retrieving a permanent identifier of said user device from a network resource in or via said first access network. The temporary identifier may be, for instance, a Packet Temporary Mobile Subscriber Identity (P-TMSI) or Shortened Temporary Mobile Subscriber Identity (S-IMSI).
- The feature “said user device identifier is associated with said first access network” is to be construed broadly to comprise, without limitations, cases where the user device identifier is directly associated with or known to the first access network (for instance a temporary identifier like P-TMSI), as well as cases where the user device identifier is indirectly associated with the first access network (for instance in the form of a mapping between a temporary identifier like P-TMSI—which is directly known to the first access network—and a permanent identifier like IMSI, wherein the mapping is held by a network node somewhere in the radio communication system, for instance in a node in a core network coupled to the first access network).
- In one or more embodiments, the context information provided by said query node about said user device includes a current location of said user device in said first access network.
- Moreover, said query node may be further configured for signaling with said first access network and/or said second access network to provide parameters to said access selection node, wherein said access selection node is configured to generate said access selection decision based on said parameters.
- These parameters may typically relate to one or more of the following:
- mobility data about said user device,
- work load for a current access point of said user device in said first access network,
- work load for an access point in said second access network to which said user device seeks access,
- transport network load in either of said first or second access networks,
- radio link performance for said user equipment in said first access network,
- Radio Access Technology-specific limitations in either of said first or second access networks,
- ongoing services used by said user device,
- capabilities of said user device for said first or second Radio Access Technologies, and
- a subscription profile of an end-user associated with said user device.
- In one or more embodiments, the access selection decision involves at least one of the following:
- connecting said user device to said second access network,
- disconnecting said user device from said first access network,
- mapping a first service of said user device to said first access network and a second service of said user device to said second access network, and
- maintaining connection for said user device with said first access network. Hence, typical implications of the term “access selection decision” are that the user device shall be connected or disconnected to any of the first and second access networks, that the user device shall maintain a current connection, and/or that services utilized by the user device shall be split between the first and second access networks.
- In one or more embodiments, the access selection node is further configured to cause transmission of said access selection decision to said user device for execution of said access selection decision.
- Alternatively or additionally, the access selection node may be further configured to cause transmission of said access selection decision to said first access network and/or to said second access network for execution of said access selection decision.
- The first access network may be part of a mobile telecommunication system compliant with, for instance, GSM, UMTS, FOMA, EPS, D-AMPS or CDMA2000. Hence, the first access network may for instance be capable of radio communication in accordance with GPRS/EDGE, WCDMA/HSPA, LTE/E-UTRAN, or any combination thereof, or alternatively TD-SCDMA. Other existing and future mobile telecommunication systems and radio communication technologies are however also feasible.
- The second access network may be a short-range wireless communication network compliant with, for instance, IEEE 802.11 (Wi-Fi or WLAN). Alternatively, the second access network may be of any of the types referred to above for the first access network. Other existing and future technologies are however also feasible, as was referred to in the background section of this document.
- The authentication node, query node and access selection node are to be seen as functional elements rather than structural. Hence, in an implementation of the system, the functionalities of these three nodes may be split between and/or performed in a distributed cooperative manner by other, existing nodes in the first and second access networks, or in the user device. Some examples of this will be found in the detailed description section of this document. Alternatively, some or all of the functionalities of these three nodes may be performed by separate hardware dedicated for this purpose, such as appropriately configured computer equipment.
- Another aspect of the present invention can be summarized as a method for use in a radio communication system of the type which comprises a first access network arranged to operate according to a first Radio Access Technology, a second access network arranged to operate according to a second Radio Access Technology, and a user device which is connectable to said first access network and to said second access network. The method comprises:
- identifying said user device, when seeking access to said second access network, through a user device identifier for said user device, wherein said user device identifier is associated with said first access network;
- providing information about a context of said user device in said first access network based on said user device identifier;
- generating an access selection decision for the access sought by the user device to the second access network based on the provided context information; and
- causing execution of said access selection decision.
- In one or more embodiments, the user device is identified based on a user identifier provided by the user device. This identifier may be an International Mobile Subscriber Identity (IMSI).
- In one or more embodiments, the identifier is a temporary identifier assigned to said user device in said first access network, and wherein the identifying of said user device further comprises using the temporary identifier for retrieving a permanent identifier of said user device from a network resource in or via said first access network.
- In one or more embodiments, the context information provided by said query node about said user device includes a current location of said user device in said first access network.
- Moreover, the method may further comprise:
- signaling with said first access network and/or said second access network to provide parameters; and
- generating said access selection decision based on the provided parameters.
- These parameters may typically relate to one or more of the following:
- mobility data about said user device,
- work load for a current access point of said user device in said first access network,
- work load for an access point in said second access network to which said user device seeks access,
- transport network load in either of said first or second access networks,
- radio link performance for said user equipment in said first access network,
- Radio Access Technology-specific limitations in either of said first or second access networks,
- ongoing services used by said user device,
- capabilities of said user device for said first or second Radio Access Technologies, and
- a subscription profile of an end-user associated with said user device.
- In one or more embodiments, the access selection decision involves at least one of the following:
- connecting said user device to said second access network,
- disconnecting said user device from said first access network,
- mapping a first service of said user device to said first access network and a second service of said user device to said second access network, and
- maintaining connection for said user device with said first access network.
- In one or more embodiments, the generated access selection decision may be transmitted to said user device for execution of the access selection decision.
- Alternatively or additionally, the generated access selection decision may be transmitted to said first access network and/or to said second access network for execution of the access selection decision.
- Yet another aspect of the present invention can be summarized as a computer readable storage medium encoded with instructions that, when loaded and executed by a processor, causes performance of the method referred to above.
- Still another aspect of the present invention can be summarized as an arrangement for use in a radio communication system comprising a first access network arranged to operate according to a first Radio Access Technology and a second access network arranged to operate according to a second Radio Access Technology, wherein said arrangement comprises:
- means for identifying a user device, when seeking access to said second access network, through a user device identifier for said user device, wherein said user device identifier is associated with said first access network;
- means for providing information about a context of said user device in said first access network based on said user device identifier; and
- means for generating an access selection decision for the access sought by the user device to the second access network based on the provided context information.
- In embodiments of this arrangement, the means for identifying a user device may be implemented by the aforementioned authentication node in the radio communication system aspect of the invention. Correspondingly, in embodiments of this arrangement, the means for providing information about a context of said user device may be implemented by the aforementioned query node in the radio communication system aspect of the invention. Also, in embodiments of this arrangement, the means for generating an access selection decision may be implemented by the aforementioned access selection node in the radio communication system aspect of the invention.
- The arrangement may further comprise means for causing said access selection decision to be executed in said radio communication system.
- In addition, the arrangement may further comprise means for causing performance of any functional feature of the method aspect referred to above.
- For further objects, features and advantages of the invention and/or its embodiments, reference is made to the following detailed description, to the attached claims as well as to the drawings.
- Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to “a/an/the [element, device, component, means, step, etc]” are to be interpreted openly as referring to at least one instance of the element, device, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated. It should be emphasized that the term “comprises/comprising” when used in this specification is taken to specify the presence of stated features, integers, steps, or components, but does not preclude the presence or addition of one or more other features, integers, steps, components, or groups thereof.
- Embodiments of the invention will be described in further detail below with reference to the accompanying drawings.
-
FIG. 1 schematically illustrates an existing network architecture for integration of a mobile telecommunications system and a Wi-Fi access network. -
FIG. 2 illustrates the definition of International Mobile Subscriber Identity (IMSI). -
FIGS. 3A and 3B show an overview of an attach procedure used in for instance the radio access network of the mobile telecommunications system shown inFIG. 1 . -
FIG. 4 shows an overview of an attach procedure used in for instance the Wi-Fi access network shown inFIG. 1 . -
FIG. 5A schematically illustrates a high level functional architecture of an embodiment of the present invention. -
FIG. 5B is a flowchart diagram to illustrate the functionality of an embodiment of the present invention. -
FIG. 5C illustrates a computer readable storage medium encoded with instructions that, when loaded and executed by a processor, may cause performance of the functionality shown inFIG. 5B . -
FIG. 6 is a schematic flowchart diagram of a procedure for finding context information about a user device in a first access network when seeking access to a second access network. -
FIG. 7 is a schematic flowchart diagram of a procedure which can be used when maintaining the context information about the user device in the first access network. -
FIG. 8 is a schematic flowchart diagram of a procedure for transferring of parameters related to the first and second access networks, for use when performing an access network selection and/or service mapping decision for the user device seeking access to the second access network. -
FIG. 9 is a schematic block diagram of a user device which is connectable to first and second access networks. -
FIG. 10 is a schematic block diagram illustrating an arrangement according to one aspect of the invention. - Embodiments of the invention will now be described with reference to the accompanying drawings. The invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. The terminology used in the detailed description of the particular embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, like numbers refer to like elements.
- A high level functional architecture of an embodiment of the present invention is shown in
FIG. 5A . A corresponding functionality is shown inFIG. 5B . As seen inFIG. 5A , auser device 500 is connectable to afirst access network 510, also referred to as Access A. Theuser device 500 is also connectable to asecond access network 520, also referred to as Access B. Thefirst access network 510, Access A, is arranged to operate according to a first Radio Access Technology, which in the disclosed embodiments is either 3GPP WCDMA/HSPA or LTE/E-UTRAN, or WCDMA/HSPA and LTE/E-UTRAN in combination. Correspondingly, thesecond access network 520, Access B, is arranged to operate according to a second Radio Access Technology, which in the disclosed embodiment is WiFi. Thus, in the disclosed embodiments theuser device 500 is a user equipment, UE. An embodiment of such a UE is illustrated in more detail as 900 inFIG. 9 and will be described in more detail later. Other embodiments may be however be based on other Radio Access Technologies for the first andsecond access networks - The architecture shown in
FIG. 5A moreover comprises an Authentication Node (AN) 530, one or more Query Nodes (QNs) 540 and an Access Selection Node (ASN) 550. The illustration shows that for example theQN 540 may be part of Access A or outside of Access A. In a similar way, theAN 530 may be part of Access B or outside Access B. When it comes to theASN 550, it is shown inFIG. 5A as being outside both Access A and B. Any other alternatives are also possible, i.e. theASN 550 may be part of Access A or Access B as well. It is also possible that theASN 550 is distributed, such that its functionality is performed by or at more than one entity in the system. Furthermore, it is also possible that the communication between theAN 530 and the QN(s) 540 occurs via theASN 550, or that the communication occurs directly between these functions. - As is seen in the flowchart in
FIG. 5B ,step 600, the authentication node AN 530 is arranged to identify theUE 500 when seeking access to thesecond access network 520, Access B, through a user device identifier for theUE 500, wherein this user device identifier is associated with thefirst access network 510, Access A. - As is seen further in the flowchart in
FIG. 5B ,step 610, thequery node QN 540 is arranged to provide information about a context of theUE 500 in thefirst access network 510, Access A, based on the user device identifier. - Moreover, as is seen further in the flowchart in
FIG. 5B ,step 620, the accessselection node ASN 550 is arranged to generate an access selection decision for the access sought by theUE 500 to thesecond access network 520, Access B, based on the provided context information. - Finally, as is seen further in the flowchart in
FIG. 5B , step 630, the system is arranged to cause the access selection decision to be executed. - It is to be understood that
FIG. 5A is a logical drawing rather than a physical; hence the functions of the different entities shown inFIG. 5A can be implemented in different physical units in the system. For example, if Access A is 3GPP WCDMA/HSPA and Access B is Wi-Fi, then theQN 540 could be communicating towards a radio network controller (RNC) in Access A, or it may be implemented as part of the RNC. In another example, if Access A is 3GPP LTE/E-UTRAN and Access B is Wi-Fi, then theQN 540 could be communicating towards the eNodeB in theE-UTRAN 112 ofFIG. 1 , or it may be implemented as part of the eNodeB. Correspondingly, theAN 530 may be part of for example a Wi-Fi Access Controller (AC)—such as the one shown in the Wi-Fi access network 120 of FIG. 1—or it may communicate with such a Wi-Fi AC. Also, in this case, theASN 550 could implemented as part of the Wi-Fi AC, the RNC or as a stand-alone physical node. - The envisioned solution according to
FIGS. 5A and 5B is a target-based network-controlled solution, where the UE by itself tries to perform access to the target access (Access B), which then triggers the network to take an access selection or services mapping decision. - It is to be noticed that this is distinctly different from the existing inter-RAT handover mechanism within 3GPP, where the UE sends a measurement report to the source RAT (over the source radio), so that the source RAT can initiate handover (to a specific target cell). In those types of existing solutions, there is no need for the functionality of finding the RAT context in the source RAT based on a UE identifier, since the handover decision is taken in the source RAT prior to UE accessing the target RAT. The envisioned solution according to
FIGS. 5A and 5B moreover relies on that the UE will not leave the source RAT until it has successfully connected to the target RAT—which is different from existing procedures. This makes it possible to use a mechanism in the target RAT for controlling the UE access selection (i.e. by denying the UE access in the target RAT, the UE will stay in the source RAT). - The advantage of such target-based solutions is that they do not require any UE impacts (meaning that they can be applied to existing UEs on the market). Target-based solutions in accordance with the present invention can however still benefit from UE impacts.
-
FIG. 5C shows a schematic view of a computerreadable storage medium 640 which may be used to accommodate instructions for performing the functionality of the present invention, as is generally outlined inFIG. 5B . In the embodiment shown inFIG. 5C , the computer-readable medium 640 is a memory stick, such as a Universal Serial Bus (USB) stick. TheUSB stick 640 comprises ahousing 643 having an interface, such as aconnector 644, and amemory chip 642. Thememory chip 642 is a flash memory, i.e. a non-volatile data storage that can be electrically erased and re-programmed. Thememory chip 642 is programmed withinstructions 641 that when loaded (possibly via the connector 644) into a processor will cause execution of the method. - The processor may be at least one CPU (Central Processing Unit), DSP (Digital Signal Processor), FPGA (Field-Programmable Gate Arrays), ASIC (Application Specific Integrated Circuit) or any other electronic programmable logic device, or a combination of any such devices, adapted for executing the instructions stored on the
aforementioned storage medium 640. Such a processor may act as a controller in a node in the first or second access networks (Access A, Access B). The instructions may be adapted for execution by several processors, possibly located in different nodes in said first and second networks, in a distributed cooperative manner, as is mentioned is other parts of this document. - It should be noted that the
USB stick 640 inFIG. 5C is merely one example of a computer-readable storage medium. Other examples may include compact discs, digital video discs, hard drives or other memory technologies commonly used. - The general functionality according to
FIGS. 5A and 5B above will now be described in more detail in the following numbered subsections: - 1. Identification of UE when accessing a new target network (Access B)
- 2. Finding the RAN context of the UE in a previous RAT (Access A)
- 3. Transferring of RAN related parameters and performing access network selection/service mapping decision based on those parameters
- The following additions will also be discussed:
- 4. Methods for conveying and/or executing access selection and service mapping decisions
- 5. Methods for using network assigned temporary identities in order to make it less complex to find the UE context in the previous RAT (Access A), as well as additional privacy or integrity functionality (avoiding the use of permanent identifiers).
- 1. Identification of the UE (
FIG. 5B , Step 600) - If the UE supports EAP-SIM or EAP-AKA based authentication in Wi-Fi (i.e. Access B), it will (at least for initial attach) identify itself to the Wi-Fi network (internally the Wi-Fi Access Controller or some other node having the authenticator role), using the IMSI ((U)SIM-related identifier). For details about attach procedures used in Wi-Fi access networks, reference is made to the previous description with respect to
FIG. 4 above. - Similarly, when the UE performs access to 3GPP (i.e. Access A), it will (at least for initial attach) also use the IMSI as an identifier (towards the MME). For details about attach procedures used in 3GPP networks, reference is made to the previous description with respect to
FIGS. 3A and 3B above. - This means that in a typical embodiment there will be a network node (or function) identifying that a particular UE (as given by the IMSI) is performing access to the target network (Access B). This node will then perform a procedure to try to locate the RAT context of the UE in the previous RAT (Access A).
- Embodiments based on other identifiers that can be translated to IMSI by the network (e.g. P-TMSI, S-TMSI, temporary EAP identifiers)
- In case the UE has been previously connected to a particular access network, it might have been assigned an access-specific temporary identifier, such as 3GPP-defined S-TMSI or P-TMSI, EAP-SIM/AKA fast re-authentication NAI, etc. In this case, the network node responsible for the authentication needs to either have stored the permanent UE identity (e.g. IMSI received from the last time the UE was connected to the access network), or retrieve the permanent identity from another node or network resource, such as an AAA server or MME (
FIG. 1 ) or Home Location Register (HLR). In the latter case, the temporary identifier is used to find the context in the other node. - In case the UE uses some non-(U)SIM-based mechanism to identify itself, such as EAP-TLS/TTLS based on a stored certificate in the UE, the network node responsible for the authentication in the access network needs to also retrieve the IMSI in conjunction with authentication procedure. The IMSI could in this case for instance be stored in an AAA-server or HLR, which also contains information about the certificate of the UE. During the authentication procedure the IMSI can be passed on to the node in the target access network responsible for the authentication of the UE.
- Here, the source access network (Access A) will assign to the UE an UE identity while the UE is in Access A. This identity can be assigned using dedicated signaling, transferred in a secure manner over the radio interface of Access A. The actual identity could be made up of a random temporary identifier, such as 3GPP S-TMSI, P-TMSI, or it could be an IP address which the UE also uses for communication, or some specific bit-string. The identity can also, in combination with UE-specific identity, also contain information which is used for internal routing in the network (such as, for instance, identity information regarding the relevant MME, RNC, Wi-Fi AC, etc). Other possible combinations of identities are also possible.
- When the UE later performs access to the target access network (Access B), it will transfer the assigned identity to the target access network (Access B), which then can be used by Access B to locate the UE context in the source access network (Access A).
- 2. Finding the RAN Context of the UE in a Previous RAT (
FIG. 5B , Step 610) - Once the node responsible for authentication, i.e. the Authentication Node (AN) 530 of the UE in the target RAT (Access B) has determined the unique identifier (e.g. IMSI) of the UE seeking the access (as described in
subsection 1 above), it will initiate procedure to locate the UE context in the previous RAT (Access A). This procedure is achieved by querying a node or function, namely the Query Node (QN) 540, which is aware of the UE location in the previous RAT. This Query Node is able to map the unique identifier to a UE RAN context located either in that node or in a separate node. In case the UE RAN context is located in a separate node (Previous RAT Node), theQuery Node 540 will assist the communication between the separate node and theAuthentication Node 530, either by providing addressing information of the Previous RAT Node to theAuthentication Node 530, or by forwarding messages between the Previous RAT Node andAuthentication Node 530. - The
Authentication Node 530 can querymultiple Query Nodes 540 for a given UE. In case aQuery Node 540 is not aware of the location of the UE, it can either respond with a negative message to theAuthentication Node 530, or it can in turn query anotherQuery Node 540 which could know the location of the UE. In other words, theQuery Nodes 540 can be cascaded. This procedure can be enhanced based on information in theAuthentication Node 530 about the location (e.g. geo position) of the access nodes (e.g. 3GPP base stations, Wi-Fi APs) or UE, meaning that theAuthentication Node 530 can focus on queryingQuery Nodes 540 which are associated with source RAT nodes which covers the same area as the target RAT nodes (e.g. the 3GPP cells which have partially overlapping coverage with the Wi-Fi cell that the UE is accessing). - The
Query Node 540 can either be implemented together with RAT specific functions such as RNCs, Wi-Fi access controllers, MMEs, etc., or it can be a stand-alone node. - In the latter case it will receive signaling from the RAT specific nodes to update the
Query Node 540 about the location of specific UEs. This signaling is described further below. - In the former case, i.e. when the
Query Node 540 is implemented together with RAT specific functions, this signaling to update the location of specific UEs could be part of normal RAT specific mobility signaling (e.g. handovers, path switch, cell update). In addition, theQuery Node 540 can also be implemented together with theAuthentication Node 530.FIG. 6 shows an example of this case, where the RAN context of the UE is located in Access A (the source RAT) when the UE is attempting to access Access B (the target RAT). - Signalling Between RAT Specific Nodes and Query Nodes
- In case the Query Nodes are implemented separately from the RAT specific nodes handling the UE RAN context (including mobility handling, etc.), the RAT specific node will perform signaling towards the Query Nodes when the UE register in the RAT the first time, and when the UE is moving in the RAT. In addition to this signalling, the RAT nodes can also inform the Query Node about UE specific information, such as UE capabilities, ongoing services, UE mobility states etc.
- The UE can be identified in this signaling by using a unique identifier (e.g. IMSI) or a temporary identifier assigned while the UE was in the source RAT (Access A).
FIG. 7 shows an example of this case. The RAT specific nodes Access A1 and A2 can be for example RNCs, eNodeBs or MMEs, as described in other parts of this document. - 3. Transferring of RAN Related Parameters and Performing Access Network Selection or Service Mapping Decision Based on Those Parameters (
FIG. 5B , Steps 610 and 620) - In conjunction with the signaling to find the UE context in the source RAT (Access A) as described above and with reference to step 610 of
FIG. 5B , it is possible to also transfer RAN related information from the source and target RATs (Access A and Access B) to the Access Selection Node, ASN, 550 responsible for performing access selection, and/or service mapping, decisions. ThisASN node 550 is responsible for deciding if the UE should be accepted in the target access network (Access B) and/or if the UE should leave the source access network (Access A) or not. Furthermore, theASN 550 node can decide if a specific service of the UE should be mapped on a specific access network among Access A or Access B. - The
Access Selection Node 550 can base this decision upon RAN related parameters provided by the source and target RATs, as well as information provided from the UE. Possible parameters include (but are not limited to) information about: -
- UE mobility (e.g. UE speed)
- Cell load in target or source cell
- Transport network load
- Radio link performance (e.g. Signal to Noise ratio, coding or modulation scheme used)
- RAT-specific limitations (e.g. maximum bit rates, service limitations)
- Ongoing UE services
- UE device capabilities for the different RATs
- Subscription profile of the end-user (e.g. different subscription classes (gold/silver/bronze), pre-paid/post-paid, etc.
- These parameters can be sent to the
ASN 550 both from Access A (source RAT) and from Access B (target RAT) in order to facilitate access selection and/or service mapping decision by theASN 550 based on those parameters. The parameters can also be sent from a node outside of the source and target RATs, such as for instance by a node in a core network coupled to any of the RATs. For instance, the relevant information for the parameters may be held by an MME in thecore network 114 coupled to theRAT 112 as seen inFIG. 1 . - The signaling to transfer these parameters to the
ASN 550 can be performed as separate signaling or piggybacked on the messages used to locate the RAN context. - The
Access Selection Node 550 can be implemented together with theAuthentication Node 530 and/or Query Node(s) 540, or as a stand-alone entity. TheAccess Selection Node 550 can even be implemented in the UE based on information provided by the network (e.g. from source/target RAT). In case theAccess Selection Node 550 is implemented in the network, it can be implemented together with existing nodes e.g. MMEs, RNCs, Wi-Fi AP, Wi-Fi AC, eNodeB, etc. -
FIG. 8 shows an example of this case. This example is based on that the signalling from theAN 530 towards the QN(s) 540 is separate from the signalling towards theASN 550.Steps 1 to 5 are the same as inFIG. 6 , and the new parts are shown assteps - 4. Methods for Conveying and/or Executing Access Selection and/or Service Mapping Decisions (
FIG. 5B , Step 630) - Based on the information made available according to the preceding subsections as described above, the
ASN 550 takes an access selection and/or service mapping decision for the access sought by the UE to the second access network (Access B, target RAT). The decision taken needs to be conveyed to different parts of the network depending on the decision taken, in accordance with the following: -
- If the decision taken is to reject the UE's access attempt to Access B, then the
ASN 550 informs theAN 530 in Access B about the decision. Thus, theAN 530 performs the needed signalling towards the UE to indicate the rejected access attempt. - If the decision taken is to accept the UE's access attempt to Access B, then the
ASN 550 informs theAN 530 in Access B about the decision. Thus, theAN 530 performs the needed signalling towards the UE to indicate the accepted access attempt. - If the decision taken is a service mapping decision (i.e. the UE is allowed to access both Access A and Access B simultaneously), the
ASN 550 needs to inform both the network side and the UE about the decision. The UE needs this information to be able to perform the decided service mapping in the uplink direction. At the network side, there needs to exist a common point in the network that performs the service mapping in the downlink direction towards Accesses A and B. - If the functionality of the
ASN 550 is implemented in the UE and the decision is to not continue with the access attempt to Access B, the UE will stop performing access to Access B. This could include sending some signaling messages to Access B or A.
- If the decision taken is to reject the UE's access attempt to Access B, then the
-
FIG. 9 illustrates a user device 900 which is connectable to first and second access networks, Access A and Access B. The user device 900 may implement theUE 500 according to the preceding drawings and descriptions. - The user device 900 has a
controller 950 which has the overall responsibility for controlling the operation of the user device 900. In the disclosed embodiment, thecontroller 950 is a central processing unit (CPU), but it can alternatively be a digital signal processor (DSP), or other programmable electronic logic device such as an application-specific integrated circuit (ASIC) or field-programmable gate array (FPGA). Thecontroller 950 is coupled to amemory 960 which comprises a work memory and a storage memory. Thememory 960 may for instance be implemented in the form of RAM, EEPROM, flash memory (e.g. memory card), magnetic hard disk, or any combination thereof. Thememory 960 is capable of storing program code which is executable by thecontroller 950 so as to cause performing of the terminal-side part of the functionalities as described in various parts of this document. In alternative embodiments, some or all of the terminal-side functionality may instead be performed by dedicated hardware. - The user device 900 has a
mobile network interface 952 which allows the user device 900 to communicate with the first access network, Access A. Themobile network interface 952 comprises an internal or external antenna as well as appropriate radio circuitry for establishing and maintaining a wireless link to a nearby base station in the first access network, Access A. The radio circuitry comprises a radio receiver and transmitter formed for instance by band pass filters, amplifiers, mixers, local oscillators, low pass filters, AD/DA converters, etc. - In addition, the disclosed embodiment of the user device 900 has a
wireless interface 954 which may be adapted for communication in accordance with one or more short-range wireless communication standards such as WiFi (e.g. IEEE 802.11, WLAN), Bluetooth, Near Field Communication (NFC), or Infrared Data Association (IrDA). In addition, but not shown inFIG. 9 , a serial interface such as USB may allow the user device 900 to communicate over a serial cable with for instance a personal computer. Such interfaces may be absent in other embodiments. - Communication protocol stacks 958 are provided to allow communication via any of the
interfaces - A user interface 962 allows a
user 2 to interact with the user device 900. The user interface 962 includes display means, such as at least one LCD display, as well as input means for the user. The input means may e.g. include a keypad with alpha-numeric keys and/or other keys such as arrow keys (navigation keys) and functional keys (soft keys), and/or a joystick, touch pad, rotator, jog dial, etc. The display means and input means may be jointly realized by a touch-sensitive display in some embodiments. The user interface 962 typically also involves a loudspeaker and a microphone. - The user device 900 may also be provided with other well-known components, such as power switch, battery, charger interface, accessory interface, and volume controls; such elements are however not indicated in
FIG. 9 for the sake of brevity. - To be able to act as a mobile terminal at least with respect to the first access network, Access A, the user device 900 has a (U)SIM reader capable of accessing a (U)
SIM card 902. The (U)SIM card 902 compriseselectronic circuitry 903 which constitutes a local (U)SIM controller 903 a and amemory 903 b. Thememory 903 b has amemory area 904 for storing the subscriber identity in the form of an IMSI number. - Hence, whenever a permanent IMSI number has been referred to in the previous drawings and associated description, it is to be understood that such a permanent IMSI number can be read from the (U)
SIM memory 903 b and be presented by the user device 900 to the access network (Access B or Access A) which it is presently seeking access to. - Moreover, whenever a temporary UE identity (such as P-TMSI or S-TMSI) or a non-IMSI UE identifier has been referred to in the previous drawings and associated description, it is to be understood that such a temporary UE identity or non-IMSI UE identifier can be read from the (U)
SIM memory 903 b or from thememory 960 and be presented by the user device 900 to the access network (Access B or Access A) which it is presently seeking access to. -
FIG. 10 is a schematic block diagram illustrating anarrangement 1090 for use in aradio communication system 1110, wherein theradio communication system 1110 comprises afirst access network 1010 arranged to operate according to a first Radio Access Technology, and asecond access network 1020 arranged to operate according to a second Radio Access Technology. Thefirst access network 1010 may, for instance, be the access network referred to as Access A and/or 510 in the embodiments described above. Thesecond access network 1020 may, for instance, be the access network referred to as Access B or 520 in the embodiments described above. - As seen in
FIG. 10 , thearrangement 1090 comprisesmeans 1030 for identifying auser device 1000, when seeking access to thesecond access network 1020, through a user device identifier for the user device, the user device identifier being associated with thefirst access network 1010. Theuser device 1000 may, for instance, be the device referred to as UE, 500 or 900 in the embodiments described above. Themeans 1030 may, for instance, be the authentication node referred to as AN or 530 in the embodiments described above, and themeans 1030 may, for instance, be adapted to perform thestep 600 inFIG. 5B . - The
arrangement 1090 further comprisesmeans 1040 for providing information about a context of theuser device 1000 in thefirst access network 1010 based on the user device identifier. Themeans 1040 may, for instance, be the query node referred to as QN or 540 in the embodiments described above, and themeans 1040 may, for instance, be adapted to perform thestep 610 inFIG. 5B . - The
arrangement 1090 also comprisesmeans 1050 for generating an access selection decision for the access sought by theuser device 1000 to thesecond access network 1020 based on the provided context information. Themeans 1050 may, for instance, be the access selection node referred to as ASN or 550 in the embodiments described above, and themeans 1050 may, for instance, be adapted to perform thestep 620 inFIG. 5B . - The
arrangement 1090 may also comprise means 1060 for causing the access selection decision to be executed in theradio communication system 1110. Themeans 1060 may, for instance, be adapted to perform the step 630 inFIG. 5B , and it may, for instance, be adapted to cause the access selection decision to be executed by appropriately informing the relevant element(s) in theradio communication system 1110 about the access selection decision taken, as has been described above undersub-section 4 in this detailed description section. - The
arrangement 1090 may further comprise means (collectively referred to as 1070 inFIG. 10 ), for performing any or all of the additional functionality described for the embodiments above and, particularly, any steps of the method referred to in the summary section of this document. - Modifications and other variants of the described embodiment(s) will come to mind to one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the embodiment(s) is/are not to be limited to the specific examples disclosed and that modifications and other variants are intended to be included within the scope of this disclosure. Although specific terms may be employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Claims (20)
1. A method of operating a node of a first Radio Access Network (RAN) of a first Radio Access Technology (RAT), the method comprising:
receiving an access attempt at the node from a user device, wherein the access attempt includes a user device identifier associated with a second Radio Access Network (RAN) of a second Radio Access Technology different than the first Radio Access Technology;
transmitting a query from the node to the second Radio Access Network, wherein the query includes an identification of the user device based on the user device identifier received from the user device; and
after transmitting the query, providing a communication service for the user device through the node of the first Radio Access Network.
2. The method of claim 1 wherein the communication service comprises a communication server previously provided to the user device through the second Radio Access Network.
3. The method of claim 1 wherein the first Radio Access Technology comprises an IEEE 802.11 compliant RAT, and wherein the second Radio Access Technology comprises a GSM (Global System for Mobile Communications) compliant RAT, a UMTS (Universal Mobile Telecommunications System) compliant RAT, an FOMA (Freedom of Mobile Multimedia Access) compliant RAT, an LTE (Long Term Evolution) compliant RAT, a D-AMPS (Digital Advanced Mobile Phone System) compliant RAT, and/or a CDMA (Code Division Multiple Access) 2000 compliant RAT.
4. The method of claim 1 wherein the user device identifier comprises a temporary identifier assigned by the second Radio Access Network.
5. The method of claim 1 wherein the user device identifier comprises an S-TMSI, P-TMSI, and/or EAP-SIM/AKA fast authentication NAI.
6. The method of claim 1 wherein the user device identifier comprises an International Mobile Subscriber Identity (IMSI).
7. The method of claim 1 wherein the query includes the user device identifier received from the user device and associated with the second Radio Access Network.
8. The method of claim 1 wherein the node comprises an IEEE 802.11 compliant node, and wherein the second Radio Access Technology comprises a GSM (Global System for Mobile Communications) compliant RAT, a UMTS (Universal Mobile Telecommunications System) compliant RAT, an FOMA (Freedom of Mobile Multimedia Access) compliant RAT, an LTE (Long Term Evolution) compliant RAT, a D-AMPS (Digital Advanced Mobile Phone System) compliant RAT, and/or a CDMA (Code Division Multiple Access) 2000 compliant RAT.
9. A node of a first Radio Access Network (RAN) of a first Radio Access Technology (RAT), the node comprising:
a processor configured to,
receive an access attempt from a user device, wherein the access attempt includes a user device identifier associated with a second Radio Access Network (RAN) of a second Radio Access Technology different than the first Radio Access Technology;
transmit a query to the second Radio Access Network, wherein the query includes an identification of the user device based on the user device identifier received from the user device; and
provide a communication service for the user device through the node of the first Radio Access Network after transmitting the query.
10. A method of operating a node for use with a first access network arranged to operate according to a first Radio Access Technology capable of providing a communication service over a first communication path to a user device through the first access network and a second access network arranged to operate according to a second Radio Access Technology capable of providing the communication service over a second communication path to the user device through the second access network, wherein the user device is connectable to said first access network and to said second access network and wherein the first and second Radio Access Technologies are different, the method comprising:
obtaining a user device identifier identifying the user device when the user device is seeking access to the second access network, wherein the user device identifier is associated with first first access network, wherein the user device identifier is provided by the user device;
obtaining information about a context of the user device in the first access network based on the user device identifier;
generating an access selection decision for the access sought by the user device to the second access network based on the provided context information; and
causing the access selection decision to be executed.
11. The method of claim 10 wherein the user device identifier comprises a temporary identifier assigned by the second Radio Access Network.
12. The method of claim 11 wherein obtaining information comprises obtaining a permanent identifier for the user device using the temporary identifier and obtaining information about the context using the permanent identifier.
13. The method of claim 11 wherein the temporary identifier is provided from the user device through the second access network.
14. The method of claim 10 wherein the identifier comprises an S-TMSI, P-TMSI, and/or EAP-SIM/AKA fast authentication NAI.
15. The method of claim 10 wherein the user device identifier comprises an International Mobile Subscriber Identity (IMSI).
16. The method of claim 10 wherein generating the access selection decision includes connecting the user device to the second access network including,
identifying the communication service provided initially to the user device through the first access network,
analyzing the provided context information of the user device, and
selecting the second access network to provide the communication service to the user device based on the provided context information of the user device,
wherein causing the access selection decision to be executed comprises providing the communication service through the second access network.
17. The method of claim 10 wherein generating the access selection decision comprises maintaining connection for the user device with the first access network including,
identifying the communication service provided initially to the user device through the first access network,
analyzing the provided context information of the user device, and
selecting the first access network to provide the communication service to the user device based on the provided context information of the user device,
wherein causing the access selection decision to be executed comprises continuing to provide the communication service through the first access network.
18. The method of claim 10 wherein generating the access selection decision comprises mapping a first communication service of the user device to the first access network and a second communication service of the user device to the second access network including,
identifying the first communication service and the second communication service provided initially to the user device through the first access network,
analyzing the provided context information of the user device,
selecting the first access network to provide the first communication service to the user device based on the provided context information of the user device, and
selecting the second access network to provide the second communication service to the user device based on the provided context information of the user device,
wherein executing the access selection decision comprises providing the first communication service through the first access network and providing the second communication service through the second access network.
19. The method of claim 10 wherein the first Radio Access Technology comprises a GSM (Global System for Mobile Communications) compliant RAT, a UMTS (Universal Mobile Telecommunications System) compliant RAT, an FOMA (Freedom of Mobile Multimedia Access) compliant RAT, an LTE (Long Term Evolution) compliant RAT, a D-AMPS (Digital Advanced Mobile Phone System) compliant RAT, and/or a CDMA (Code Division Multiple Access) 2000 compliant RAT, and wherein the second Radio Access Technology comprises an IEEE 802.11 compliant RAT.
20. A node for use with a first access network arranged to operate according to a first Radio Access Technology capable of providing a communication service over a first communication path to a user device through the first access network and a second access network arranged to operate according to a second Radio Access Technology capable of providing the communication service over a second communication path to the user device through the second access network, wherein the user device is connectable to said first access network and to said second access network and wherein the first and second Radio Access Technologies are different, the node comprising:
a processor configured to,
obtain a user device identifier identifying the user device when the user device is seeking access to the second access network, wherein the user device identifier is associated with first access network, wherein the user device identifier is provided by the user device;
obtain information about a context of the user device in the first access network based on the user device identifier;
generate an access selection decision for the access sought by the user device to the second access network based on the provided context information; and
cause the access selection decision to be executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/571,584 US20150099488A1 (en) | 2012-05-08 | 2014-12-16 | Radio Communication System, Method and Arrangement for Use in a Radio Communication System |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261644040P | 2012-05-08 | 2012-05-08 | |
US13/697,767 US8942763B2 (en) | 2012-05-08 | 2012-09-24 | Radio communication system, method and arrangement for use in a radio communication system |
PCT/SE2012/051007 WO2013169161A1 (en) | 2012-05-08 | 2012-09-24 | Radio communication system, method and arrangement for use in a radio communication system |
US14/571,584 US20150099488A1 (en) | 2012-05-08 | 2014-12-16 | Radio Communication System, Method and Arrangement for Use in a Radio Communication System |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/697,767 Continuation US8942763B2 (en) | 2012-05-08 | 2012-09-24 | Radio communication system, method and arrangement for use in a radio communication system |
PCT/SE2012/051007 Continuation WO2013169161A1 (en) | 2012-05-08 | 2012-09-24 | Radio communication system, method and arrangement for use in a radio communication system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150099488A1 true US20150099488A1 (en) | 2015-04-09 |
Family
ID=49551054
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/697,767 Active 2033-02-05 US8942763B2 (en) | 2012-05-08 | 2012-09-24 | Radio communication system, method and arrangement for use in a radio communication system |
US14/571,584 Abandoned US20150099488A1 (en) | 2012-05-08 | 2014-12-16 | Radio Communication System, Method and Arrangement for Use in a Radio Communication System |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/697,767 Active 2033-02-05 US8942763B2 (en) | 2012-05-08 | 2012-09-24 | Radio communication system, method and arrangement for use in a radio communication system |
Country Status (3)
Country | Link |
---|---|
US (2) | US8942763B2 (en) |
EP (1) | EP2848044B1 (en) |
WO (1) | WO2013169161A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180184297A1 (en) * | 2015-06-05 | 2018-06-28 | Convida Wireless, Llc | Unified authentication for integrated small cell and wi-fi networks |
WO2020216941A1 (en) * | 2019-04-26 | 2020-10-29 | Nordic Semiconductor Asa | Apparatus and method for registering an apparatus with a long term evolution (lte) cellular network using a selected access technology |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103517360B (en) * | 2012-06-25 | 2017-04-19 | 华为终端有限公司 | Switching method, system and device |
WO2014015486A1 (en) * | 2012-07-25 | 2014-01-30 | 华为技术有限公司 | Data shunting method, data transmission device and shunting node device |
US10104540B2 (en) * | 2013-01-23 | 2018-10-16 | Qualcomm Incorporated | Determining to use multi-RAN interworking by correlating different RAN identifiers |
US9084147B2 (en) * | 2013-05-08 | 2015-07-14 | Qualcomm Incorporated | Parallel registration to offload PLMN with single SIM |
CN104144473B (en) * | 2013-05-09 | 2019-12-20 | 中兴通讯股份有限公司 | Method for selecting available access network and user equipment |
EP3108691B1 (en) | 2014-02-21 | 2019-02-27 | Telefonaktiebolaget LM Ericsson (publ) | Traffic steering in a wlan based on transmit power control |
WO2015131949A1 (en) * | 2014-03-06 | 2015-09-11 | Vodafone Gmbh | Using services of a mobile packet core network |
CN105307173A (en) * | 2014-06-17 | 2016-02-03 | 中兴通讯股份有限公司 | Communication network architecture, access authentication method and system based on communication network architecture |
US10299120B2 (en) | 2014-06-18 | 2019-05-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and arrangements for identification of user equipments for authentication purposes |
CN107079358B (en) * | 2014-09-30 | 2020-05-29 | 诺基亚技术有限公司 | Method and apparatus for signaling identifiers |
US10009329B2 (en) | 2015-06-23 | 2018-06-26 | Microsoft Technology Licensing, Llc | Learned roving authentication profiles |
EP3160176B1 (en) * | 2015-10-19 | 2019-12-11 | Vodafone GmbH | Using a service of a mobile packet core network without having a sim card |
EP3386240B1 (en) * | 2015-12-31 | 2021-08-11 | Huawei Technologies Co., Ltd. | Switchover method in master-slave network, master device, slave device, and system |
CN107295610B (en) * | 2016-04-01 | 2019-12-20 | 电信科学技术研究院 | Network access method, related equipment and system |
CN107734573B (en) * | 2016-08-12 | 2020-08-07 | 华为技术有限公司 | Switching method, base station and communication system |
US11445564B2 (en) * | 2016-12-20 | 2022-09-13 | Apple Inc. | Apparatuses to switch between LTE rat and NR rat during transition from inactive state to active state |
EP3692732B1 (en) * | 2017-10-04 | 2024-01-17 | Telefonaktiebolaget LM Ericsson (publ) | Identifiers in a wireless communication system |
US10499357B1 (en) * | 2018-08-09 | 2019-12-03 | Nec Corporation | Method and system for transmission of SUSI in the NAS procedure |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030026221A1 (en) * | 2001-08-02 | 2003-02-06 | Kotzin Michael D. | Method and apparatus for communicating information by splitting information among a plurality of proximal units |
US7027433B2 (en) * | 2001-06-20 | 2006-04-11 | Nokia Corporation | Routing a call between different types of networks |
US20080117836A1 (en) * | 2006-11-20 | 2008-05-22 | Raghvendra Gurudath Savoor | Methods and apparatus to manage bandwidth in a wireless network |
US20090092094A1 (en) * | 2007-04-06 | 2009-04-09 | Interdigital Technology Corporation | Method and apparatus for identifying mobile network protocol capabilities |
US20090286527A1 (en) * | 2005-08-26 | 2009-11-19 | Kyung-Yul Cheon | Apparatus and a method for service continuity between umts network and wlan network |
US20100094938A1 (en) * | 2008-10-10 | 2010-04-15 | Nicolas Le Scouarnec | Method of transmitting data between peerss by selecting a network according to at least one criterion and associated management device and communication equipment |
US7917152B2 (en) * | 2003-06-27 | 2011-03-29 | Nokia Corporation | Enhanced fast handover procedures |
US20120307735A1 (en) * | 2008-08-13 | 2012-12-06 | Interdigital Patent Holdings, Inc. | Maintaining circuit switched continuity in an enhanced universal terrestrial radio access network |
US8433804B2 (en) * | 2006-01-13 | 2013-04-30 | At&T Mobility Ii Llc | Dynamic event server subsystem utilizing session initiation protocol |
US8472919B1 (en) * | 2011-09-28 | 2013-06-25 | Cellco Partnership | Network based technique for obtaining operator identifier for mobile devices |
US8942167B2 (en) * | 2009-05-14 | 2015-01-27 | Avaya Inc. | Methods, apparatus and computer readable medium for seamless internet protocol multicast connectivity in unified networks |
US9380501B2 (en) * | 2004-03-12 | 2016-06-28 | InterDigital Technology Corporation, Inc. | Method and system for switching a radio access technology between wireless communication systems with a multi-mode wireless transmit/receive unit |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070135121A1 (en) * | 2005-12-08 | 2007-06-14 | Electronics And Telecommunications Research Institute | User and service mobility support system and method in ubiquitous environment |
EP2389037B1 (en) * | 2006-08-02 | 2013-07-17 | Research In Motion Limited | Supporting radio access system selection by multi-mode mobile stations |
US8347361B2 (en) * | 2006-12-14 | 2013-01-01 | Mosaid Technologies Incorporated | Distributed network management hierarchy in a multi-station communication network |
EP2196037A4 (en) * | 2007-08-23 | 2012-01-25 | Ericsson Telefon Ab L M | Method for network controlled access selection |
EP2235969A4 (en) * | 2008-01-15 | 2014-01-08 | Ericsson Telefon Ab L M | Pre-fetching of input data for access network selection |
EP2304991B1 (en) * | 2008-04-18 | 2018-12-26 | Telefonaktiebolaget LM Ericsson (publ) | Access network selection in a multi-access network environment |
US8238877B2 (en) | 2008-08-14 | 2012-08-07 | Cisco Technology, Inc. | Access technology independent identifier generation |
US8903390B2 (en) | 2009-05-13 | 2014-12-02 | Qualcomm Incorporated | Provisioning single-mode and multimode system selection parameters and service management |
US9213324B2 (en) * | 2009-06-30 | 2015-12-15 | Koninklijke Philips N.V. | Systems and methods for managing interaction with controllable lighting networks |
US9295089B2 (en) * | 2010-09-07 | 2016-03-22 | Interdigital Patent Holdings, Inc. | Bandwidth management, aggregation and internet protocol flow mobility across multiple-access technologies |
-
2012
- 2012-09-24 EP EP12876385.1A patent/EP2848044B1/en active Active
- 2012-09-24 WO PCT/SE2012/051007 patent/WO2013169161A1/en active Application Filing
- 2012-09-24 US US13/697,767 patent/US8942763B2/en active Active
-
2014
- 2014-12-16 US US14/571,584 patent/US20150099488A1/en not_active Abandoned
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7027433B2 (en) * | 2001-06-20 | 2006-04-11 | Nokia Corporation | Routing a call between different types of networks |
US20030026221A1 (en) * | 2001-08-02 | 2003-02-06 | Kotzin Michael D. | Method and apparatus for communicating information by splitting information among a plurality of proximal units |
US7917152B2 (en) * | 2003-06-27 | 2011-03-29 | Nokia Corporation | Enhanced fast handover procedures |
US9380501B2 (en) * | 2004-03-12 | 2016-06-28 | InterDigital Technology Corporation, Inc. | Method and system for switching a radio access technology between wireless communication systems with a multi-mode wireless transmit/receive unit |
US20090286527A1 (en) * | 2005-08-26 | 2009-11-19 | Kyung-Yul Cheon | Apparatus and a method for service continuity between umts network and wlan network |
US8433804B2 (en) * | 2006-01-13 | 2013-04-30 | At&T Mobility Ii Llc | Dynamic event server subsystem utilizing session initiation protocol |
US20080117836A1 (en) * | 2006-11-20 | 2008-05-22 | Raghvendra Gurudath Savoor | Methods and apparatus to manage bandwidth in a wireless network |
US20090092094A1 (en) * | 2007-04-06 | 2009-04-09 | Interdigital Technology Corporation | Method and apparatus for identifying mobile network protocol capabilities |
US20120307735A1 (en) * | 2008-08-13 | 2012-12-06 | Interdigital Patent Holdings, Inc. | Maintaining circuit switched continuity in an enhanced universal terrestrial radio access network |
US20100094938A1 (en) * | 2008-10-10 | 2010-04-15 | Nicolas Le Scouarnec | Method of transmitting data between peerss by selecting a network according to at least one criterion and associated management device and communication equipment |
US8942167B2 (en) * | 2009-05-14 | 2015-01-27 | Avaya Inc. | Methods, apparatus and computer readable medium for seamless internet protocol multicast connectivity in unified networks |
US8472919B1 (en) * | 2011-09-28 | 2013-06-25 | Cellco Partnership | Network based technique for obtaining operator identifier for mobile devices |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180184297A1 (en) * | 2015-06-05 | 2018-06-28 | Convida Wireless, Llc | Unified authentication for integrated small cell and wi-fi networks |
US11032706B2 (en) * | 2015-06-05 | 2021-06-08 | Convida Wireless, Llc | Unified authentication for integrated small cell and Wi-Fi networks |
US11818566B2 (en) | 2015-06-05 | 2023-11-14 | Ipla Holdings Inc. | Unified authentication for integrated small cell and Wi-Fi networks |
WO2020216941A1 (en) * | 2019-04-26 | 2020-10-29 | Nordic Semiconductor Asa | Apparatus and method for registering an apparatus with a long term evolution (lte) cellular network using a selected access technology |
US12096389B2 (en) | 2019-04-26 | 2024-09-17 | Nordic Semiconductor Asa | Apparatus and method for registering an apparatus with a long term evolution (LTE) cellular network using a selected access technology |
Also Published As
Publication number | Publication date |
---|---|
US8942763B2 (en) | 2015-01-27 |
EP2848044A1 (en) | 2015-03-18 |
EP2848044A4 (en) | 2016-03-02 |
US20140051393A1 (en) | 2014-02-20 |
EP2848044B1 (en) | 2019-11-13 |
WO2013169161A1 (en) | 2013-11-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8942763B2 (en) | Radio communication system, method and arrangement for use in a radio communication system | |
CN110235471B (en) | Communication method and communication device | |
US8060084B2 (en) | Network selection scheme using a roaming broker (RB) | |
KR101796120B1 (en) | Network architecture enabling a mobile terminal to roam into a wireless local area network | |
US9264450B2 (en) | Method of seamless policy based network discovery, selection and switching | |
US10412666B2 (en) | UE accessibility indication for WI-FI integration in RAN | |
US7447502B2 (en) | Scheme for providing regulatory compliance in performing network selection in a foreign country | |
CN104521287B (en) | Method for switching network, device, equipment and system | |
EP2853117B1 (en) | A mobile station and a wireless access point and methods therein in a wireless communications network | |
CN111404814B (en) | Data transmission method and communication device | |
KR20100017839A (en) | Mobility procedures and differentiated charging in home node-bs | |
US20110246777A1 (en) | System and Method for Managing Security Key Architecture in Multiple Security Contexts of a Network Environment | |
JP2015512224A (en) | System and method for inter-network service selection | |
EP3679764B1 (en) | A system and method for availing a data service by a user equipment | |
EP2286619B1 (en) | Method for controlling the network selection by the home network operator of dual mode user equipment having both mobile network and fixed-wireless network access capabilities | |
CN106664558B (en) | Method and device for establishing a connection | |
US20240340834A1 (en) | Establishing a Multiple Access Connection | |
US20160007276A1 (en) | Wi-Fi Support Awareness | |
EP2850878B1 (en) | Wireless access point connected to two communication networks | |
KR102484072B1 (en) | Wireless communication method, terminal device and chip | |
CN113261346A (en) | Information transmission method and equipment | |
WO2020034107A1 (en) | Network access method, terminal device and network device | |
US10136377B1 (en) | Mobile device handoff optimization | |
CN116367139A (en) | Communication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |