Method for indicating availability of same service on other radio access system

ABSTRACT

Methods are provided which indicate availability of the same service on a different access network. In these methods, the network controller generates an identifier for each of one or more services provided by a wireless local access network (WLAN). The identifier is associated with a particular service which is also provided by a private radio network. The network controller provides to an access point the identifier to be broadcast to one or more user devices of the WLAN to connect to the particular service via the private radio network. A mobility management entity receives a request from a user device to connect to the private network, where the request includes an identifier associated with a particular service provided to the user device in the WLAN and based on the identifier, the mobility management entity enables the particular service to be provided to the user device via the private radio network.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. application Ser. No.16/540,580, filed Aug. 14, 2019, the entirety of which is incorporatedherein by reference.

TECHNICAL FIELD

The present disclosure relates to interworking between various wirelessradio access systems/networks.

BACKGROUND

To handle increasing traffic from various user equipment (UE) devices inprivate networks, new access technologies are being developed andexplored. In public places that host public events such as sports eventsand music concerts, a Wi-Fi® wireless local area network (WLAN) maybecome overloaded and services available via the Wi-Fi network degradein quality. To offload the Wi-Fi network, other private radio networkssuch as private Long Term Evolution (LTE) networks are gainingpopularity.

One type of a private LTE network is a Citizens Broadband Radio Service(CBRS) network. The Federal Communications Commission (FCC) in theUnited States allocated radio spectrum in the 3550-3700 megahertz (MHz)band (e.g., 3.5 gigahertz (GHz) band) to CBRS for shared wirelessbroadband use by enterprises under certain sharing regulations.Enterprises can use this CBRS spectrum to set up private LTE networksand allow access to consumers and Internet of Things (IoT) devices.Since there is a considerable industry interest in private LTE networkaccess, many entities are looking at leveraging thelightly/semi-licensed bands of CBRS spectrum for building private LTEnetworks. Private LTE network deployments co-exist with an alreadydeployed Wi-Fi network access.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a network architecture indicating anavailability of an identical service available on another radio accesssystem, according to an example embodiment.

FIG. 2 illustrates a mapping table in which the same services are mappedto various radio access systems, according to an example embodiment.

FIGS. 3A and 3B are sequence diagrams illustrating a method of mapping aservice provided by a Wi-Fi network to the same service being providedby the CBRS network, according to an example embodiment.

FIGS. 4A and 4B are sequence diagrams illustrating a method of mapping aservice provided by Wi-Fi network to the same service provided by theCBRS network, according to another example embodiment.

FIG. 5 is a flowchart illustrating a method of indicating anavailability of the same service on another radio access network,according to an example embodiment.

FIG. 6 is a flowchart illustrating a method of enabling the same serviceon another radio access network, according to an example embodiment.

FIG. 7 is a hardware block diagram of a computing device configured tomap the service provided by the Wi-Fi network to the same serviceprovided by the CBRS network and configured to enable the same serviceon another radio access network, according to various exampleembodiments.

DESCRIPTION OF EXAMPLE EMBODIMENTS

Overview

Briefly, methods for indicating an availability of the same service viaanother radio access network are provided. In these methods, a networkcontroller generates an identifier for each of one or more servicesprovided by a wireless local access network (WLAN). The identifier isassociated with a particular service of the one or more services. Thisparticular service is also provided by a private radio network. Thenetwork controller further provides, to an access point, the identifierto be broadcast to one or more user devices of the WLAN to connect tothe particular service via the private radio network.

Additionally, methods for enabling the same service on another radioaccess network are provided. In these methods, a mobility managemententity receives from an access point of a private radio network arequest to connect a user device to the private radio network. Therequest includes an identifier that is associated with a particularservice provided to the user device via a WLAN. The mobility managemententity further enables, based on the identifier, the particular serviceto be provided to the user device via the private radio network.

Example Embodiments

Enterprises today provide access via various networks such as WLAN andprivate radio networks. Enterprises have further segmented the networksinto various services such that access is enabled to each of thosesegmented services. The various services may include but is not limitedto access to specific network resources, enforcement of specific set ofpolicies such as access controls, authorization policies, Internetaccess, firewall rules, and so on.

The networks are segmented using identifiers. In the WLAN, each serviceis associated with a unique service set identifier (SSID). A userconnected to an enterprise SSID or a “guest” SSID, for example, is awareof the services being provided by the Wi-Fi network for those SSID's.Similar service structuring is realized for the CBRS network using anAccess Point Name (APN) and/or CBRS Network Identifier (NID).

As noted above, while the user connected to the Wi-Fi network may beaware of the services identified by the SSID and the treatmentassociated with each of those SSID's on the Wi-Fi network access, theWi-Fi network and the user are not aware of the same or correspondingservice being available on a private LTE network, such as a CBRSnetwork. Similarly, the private LTE network and the user are not awareof the equivalent or corresponding service available on the Wi-Finetwork.

In one or more example embodiments, when the user is attached to a Wi-Finetwork having particular SSID, the user and the Wi-Fi network (i.e.,Wi-Fi access point) are informed or notified of an availability of thesame service through another radio access system, e.g., via CBRS. In oneor more example embodiments, the user is provided with an option toswitch to another radio access system to receive the same service. Theuser may want to switch to another radio access system to receive thesame service when the signal strength of the network (the Wi-Fi network)is bad or when the Wi-Fi network is congested.

In an example embodiment, the user receives the Wi-Fi service for aparticular SSID, in a telecommunication (TR) room 10, for example, whichhas bad service. Both the user and the Wi-Fi network are aware that theservice quality is poor. In an example embodiment, the user and theWi-Fi network are notified to consider the CBRS access system and anequivalent service identity that maps to the service or servicesassociated with the particular SSID are provided to the Wi-Fi networkand the user. One or more example embodiments provide a service thatallows the user to quickly discover the service name associated with theparticular SSID on the CBRS access system, and attach to it. This allowsthe user to attach to the best indoor network or outdoor network asopposed to just being anchored on the Wi-Fi network.

In an example embodiment, a common service identifier across twodifferent access types of networks is provided. Further, there isprovided an advertisement of the service names of identical servicesavailable through the other access technology (Wi-Fi/CBRS). The user isprompted to use a private LTE radio network by receiving the servicename of that identical service available on the CBRS access network. Oneor more example embodiments allow and prompt the users to connect to thebest radio access system (e.g., Wi-Fi or CBRS) and not just to beanchored on the Wi-Fi radio access system. Accordingly, the servicesavailable on the private LTE and Wi-Fi access systems are unified. Anenterprise user attached to the Wi-Fi access system is notified aboutthe availability of the same service through the private LTE network ofthe enterprise. Mapping mechanisms that map the service layers based ona third Generation Partnership Project (3GPP) APN and Wi-Fi SSID basedlayer 2 (L2)/layer 3 (L3) domains are provided.

While one or more example embodiments are described with reference to aWi-Fi radio access system/network and the CBRS radio accesssystem/network or a private LTE radio access system/network, one ofordinary skill in the art would readily appreciate that exampleembodiments are applicable to other radio access systems/networks nowknown or hereinafter developed.

Further, while one or more example embodiments are described withreference to a mapping of an identical service available via differentaccess networks, one of ordinary skill in the art would readilyappreciate that other mappings are possible, as applicable for aparticular configuration. For example, the mapping may be betweensimilar corresponding or closest corresponding services.

FIG. 1 is block diagram of a network architecture indicating anavailability of an identical service available on another radio accesssystem, according to an example embodiment. That is, FIG. 1 illustratesa network architecture for unifying the services available on privateLTE and Wi-Fi network access systems, as an example.

As shown in FIG. 1 , the network architecture includes an administrativedomain 100, a wireless LAN controller (WLC) 110, interworking function(IWK) 120, an access point device (AP) 130, a user equipment device (UE)140, software defined access (SDA) fabric 150, and an authentication,authorization, and accounting server (AAA) server and/or historyaccounting server (HAS) 160.

The administrative domain 100 is a maintained by a service securityprovider that holds security repositories and authenticates andauthorizes clients with credentials. The administrative domain 100generates security policies for a private network and/or groups ofusers. The administrative domain 100 includes a network of computers ora collection of networks and databases such as an identity servicesengine (ISE) 102, a Dynamic Host Configuration Protocol (DHCP) server104, and a network controller 106. The identity services engine 102enables the generation and enforcement of security and access policiesfor the endpoint devices (UEs) connected to company's routers andswitches. The DHCP server 104 assigns dynamic IP addresses to devices ona network so that a UE can have a different IP address every time itconnects to the network. The network controller 106 is the enforcer ofthe policies and controls access to the network. That is, the policiesgenerated by the DHCP server 104 are enforced by the network controller106 in cooperation with the AAA/HAS 160.

Also, policies and provisioning programmed in the administrative domain100 are communicated to the WLC 110. The network controller 106discovers and manages the WLC 110. The WLC 110 communicates via the SDAfabric 150 with the IWK 120 and one or more of the APs 130 based onthese policies. That is, the wireless LAN controller 110 controls anumber of APs 130 and propagates policies set for the administrativedomain 100. The IWK 120 monitors events and works in cooperation withthe wireless LAN controller 110 to control information including thepolicies to the AP 130. The IWK 120 is an example of a mobile managemententity (MIME). The AP 130 provides access to the UE 140. While only oneUE 140 is shown in FIG. 1 , one of ordinary skill in the art wouldreadily appreciate that multiple UEs may be serviced by the same AP. TheUEs may include smartphones, notepads, notebooks, and personalcomputers. In or more example embodiments, the UEs are Wi-Fi and CBRSenabled devices.

The AP 130 may include a CBRS AP 132 and a Wi-Fi AP 134. The CBRS AP 132is connected to the SDA fabric 150 via a Forwarding Element (FE) 152 andthe Wi-Fi AP 134 is connected to the SDA fabric 150 via the FE 154. Thisis provided by way of an example only and not by way of a limitation.One of ordinary skill in the art would readily appreciate that the CBRSAP 132 and the Wi-Fi AP 134 may be separate entities remote from eachother. While FIG. 1 only depicts one AP 130, one of ordinary skill inthe art would readily appreciate that multiple APs may exist in anetwork depending on a particular implementation or configuration.

In an example embodiment, the identifiers of the identical serviceprovided via multiple access systems are mapped to one another in anadministrative domain 100. For example, a network administratorconfigures the network controller 106 to map the Wi-Fi and CBRS privateLTE service constructs. A Wi-Fi SSID is mapped with an APN in a privateLTE network to achieve unified segmentation, service, and data planepolicies.

FIG. 2 illustrates a mapping table 200 in which the same services aremapped across multiple radio access systems/networks, according to anexample embodiment. The mapping table 200 shows 3 Services numbered 1,2, and 3, a column for Wi-Fi SSID, a column for service-token(service-token column 220), a column for mapped private LTE APN, acolumn for Wi-Fi service policies 240, a column for CBRS servicepolicies 250, and a column for data plane identifiers 260.

As shown in FIG. 2 , a Wi-Fi SSID is mapped with the private LTE APN ofa private radio network. For example, the SSID “blizzard” is mapped withan APN “blizzard.com”. The SSID “blizzard-legacy” is mapped with the APN“blizzard-legacy.com” and the SSID “guest” is mapped with the APN“guest.com”. In the mapping table 200, Wi-Fi service policies 240corresponding to the respective SSID 210 in the Wi-Fi access network aremapped to the private LTE network APNs 230 that offer an equivalentservice, identified as CBRS service policies 250. For example, forService 1, the SSID “blizzard” is mapped with the APN “blizzard.com”;the Wi-Fi service policies are internet, voice over IP (VOIP), andspecial services access (e.g., emergency access); and the correspondingCBRS service policies are internet, VOIP, and the same special servicesaccess. In the mapping table 200, data plane identifiers 260 areprovided for each of the Services. For example, for Service 1, the dataplane identifiers are L2-virtual network identifier (VNID)-1 andL3-VNID-2. In an example embodiment, based on the mapping, the networkcontroller 106 generates for each Service, a service token (shown inservice-token column 220). As shown in the mapping table 200, Service 1has a service token of “abx621c3”, Service 2 has a service token of“mbx721c3”, and Service 3 has a service token “tbu625c3”. The servicetoken may be a randomly generated number of alphanumeric characters. Theservice token is a predetermined number of bits, as explained in furtherdetail below.

Referring back to FIG. 1 , the network controller 106 configures theservice token for each SSID on the Wi-Fi APs such as the Wi-Fi AP 134.Additionally, network controller 106 provides the allowed service tokenand, optionally, its corresponding APN mapping to the IWK 120 via theWLC 110.

The Wi-Fi AP 134 broadcasts the service token associated with each SSIDin a beacon and/or probe responses using a vendor specific informationelement (IE). The service token is used in the CBRS (LTE) network torequest an equivalent service identified via the APN while the UE 140 isaccessing the CBRS network. In other words, when the UE 140, forexample, detects poor quality of service on the Wi-Fi access network,the UE 140 transmits the service token to the CBRS AP 132 to request thesame service via the CBRS access network.

The CBRS AP 132 uses the service token received in the request foraccess (an attach request) from the UE 140 to provide the same servicewith the same control policies. That is, using the service token, theCBRS AP 132 provides the same service that the UE 140 was receiving viathe Wi-Fi network including similar segmentation and data plane policiesidentified via data plane identifiers 260 shown in the mapping table ofFIG. 2 .

The CBRS AP 132 communicates the service token received in the attachrequest to the IWK 120. The IWK 120 assigns an APN guaranteeing the UE140 equivalent segmentation, service, and data plane policies.

Further, the AAA/HAS server 160 provides a security group tag (SGT)associated with the user identity to the WLC 110. The SGT and a securitygroup access control list (SGACL) based on the user's group affiliationmay be enforced in the data plane by the IWK 120. Thus, when the useruses the service token obtained in the Wi-Fi network, the user connectsto a private radio (LTE) network and obtains exactly the same servicesincluding segmentation and data plane policies.

FIGS. 3A and 3B are sequence diagrams illustrating a method 300 ofmapping a service provided by a Wi-Fi radio access system/network to thesame service provided by the CBRS radio access system/network, accordingto an example embodiment. FIGS. 3A and 3B illustrate a seamlesstransition between two networks with similar segmentation and consistentaccess policies, according to an example embodiment.

In FIG. 3A, at 302, the UE 140 is configured to include a CBRS profile.The CBRS profile may include a closed security/subscriber group access(CSGA) allowed list that would include APNs that the UE 140 isauthorized to access and corresponding user credentials. In an exampleembodiment, the CBRS profile includes APN “cisco-cbrs” and correspondingauthorization credentials (auth credentials) provided to the UE 140 foraccess to the network.

At 304, the Wi-Fi AP 134 is configured to include SSID service tokenmapping. Specifically, the SSID “blizzard” is mapped to the servicetoken “abx621c3”, the SSID “blizzard legacy” is mapped to the servicetoken “mbx721c3” and the SSID guest is mapped to the service token“tbu625c3”, as shown in FIG. 2 . That is, based on the mapping tablegenerated by the network controller 106 (FIG. 1 ), the Wi-Fi AP 134 isprovisioned to include the service token with the SSIDs it broadcasts.The service token may be a randomly generated number of a predeterminedlength. The length of the service token should be a predetermined numberof bits such as 1 byte or 2 bytes depending on a particularimplementation and the size of the vendor specific information elementin the beacon frame or probe responses.

At 306, the CBRS AP 132 is configured to include a closed subscribergroup (CSG) indicator such as “system information block type 1 (SIB1),shared home network identifier (SHNI): 315.010, Csg-ind: false, CBRS-NIDCsgid:cisco-cbrs”.

At 308, the CBRS AP 132 communicates with the MME 120A. Examples of theMME 120A may include an interworking function (IWF) or the IWK 120 shownin FIG. 1 . The MME 120A manages handover signaling and networkconnection signaling. At 308, CBRS AP 132 performs S1 signaling with theMME 120A to provide the SHNI and the CSG list. The MME 120A performscontrol plane functions. Additionally, in an example embodiment,additional protocol communications are defined for the MME 120A tocommunicate with the WLC 110, as detailed below.

At 310, the Wi-Fi AP 134 broadcasts the SSID with a correspondingservice token to one or more user devices, such as the UE 140. At 312,the UE 140 is connected over the Wi-Fi network to SSID “blizzard” andthe UE 140 also notes the corresponding service token value “abx621c3”.At 314, a connection manager within the UE 140 determines that the Wi-Fiaccess is not good or detects a poor network signal and decides to latchon to the CBRS radio access system/network.

At 316, the CBRS AP 132 is broadcasting information including, forexample, a master information block (MIB) and SIB1 and all other SIBsavailable via the CBRS network. At 318, the broadcast information isprovided to the UE 140 via broadcast control channel (BCCH)-broadcastingchannel (BCH), the downlink-SIB1. The information provided includes aPublic Land Mobile Network (PLMN) identifier: 315-010, Closed SecureGroup (CSG) indicator (ind): false, CSG identifier (csgid: cisco-cbrs).That is, the CBRS AP 132 may broadcast radio resource control (RRC)configuration signaling to the UE 140. The RRC signaling may include,but not limited to, one or more of broadcasting system information,paging, establishment and/or release of an RRC connection, transferringnon-access stratum (NAS) information, access stratum (AS) securityconfiguration, transferring UE's radio access capability, measurementconfiguration and reporting, or mobility control. System information, asnoted above, may include a number of information blocks, a MIB, and oneor more SIBs. System information may also be used to communicate one ormore parameters. For example, one or more SIBs may include a parameterthat may identify the PLMN, e.g., “plmn: 315.010”.

At 320, the UE 140 will do or perform a cell selection by comparingnetwork identifier (NID): “cisco-cbrs” after scanning SIB1. That is, theUE 140 executes a network discovery procedure in which it processesinformation received from the CBRS AP 132 including scanning the MIB andthe SIB1 and all other SIBs.

The method 300 of mapping a service provided by a Wi-Fi radio accesssystem/network to the same service provided by the CBRS radio accesssystem/network, according to an example embodiment, is continued withFIG. 3B (300 cont.). FIG. 3B illustrates that the UE 140 may thenperform an attachment procedure to the CBRS AP 132 based on theconfiguration described above at 302.

In FIG. 3B, the attachment procedure includes a random access procedureat 322 and a RRC connection procedure at 324-328. That is, the UE 140may schedule and/or set up a random access channel (RACH), at the 322.The UE 140 may then establish an RRC connection with the CBRS AP 132 bytransmitting an RRC connection request at 324, and receiving from theCBRS AP 132 an RRC connection setup which may include an internetprotocol (IP) address, at 326. The UE 140 may then transmit a messageindicating that the RRC connection is complete, at 328. The RRCconnection is complete message includes an attach request from the UE140 and the service token “abx621c3”.

At 330, the CBRS AP 132 may send an initial UE-message which includes anattach request (attach-req) and/or a Packet Data Network (PDN)connectivity request (pdn-connectivity-req) to the MME 120A. In anexample embodiment, the initial UE-message also includes the servicetoken provided by the UE 140, at 328.

At 332, the MME 120A communicates, via the CBRS AP 132, with the UE 140and (an AAA/HAS server, not shown in FIG. 3 ) to authenticate the UE140. The MME 120A authenticates the UE 140 and determines whether the UE140 has any required permissions to access the CBRS network.

Provided the UE 140 is successfully authenticated at 332, the MME 120Aperforms a lookup processing to determine a corresponding service in theCBRS network, at 334. That is, the MME 120A, based on the service tokenprovided at 330, performs a lookup into a service mapping table such asthe one shown with reference to FIG. 2 . The MME 120A is configured tostore or access the mapping table generated by the network controller106 (FIG. 1 ) to configure or select the CBRS network access to beprovided to the UE 140. That is, based on the lookup, the MME 120A findsor locates the service token equivalent to the Wi-Fi SSID, APN, andother service policies. In other words, based on the service token, theMME 120A determines a corresponding CBRS service and associated servicepolicies.

At 336, the MME 120A starts a PDN connectivity procedure and passes thetoken to the WLC 110. As an alternative, at 336, the MME 120A canprovide an identifier of the determined CBRS service that corresponds tothe service token to the WLC 110.

At 338, the WLC 110 performs a PDN connectivity procedure and IP addressallocation based on the provided token among other provided parameters.At 340, the MME 120A communicates, via the CBRS AP 132, a message to theUE 140 indicating that the attach request has been accepted. At 342, theUE 140 and the CBRS AP 132 engage in access stratum (AS) security. At344, the CBRS AP 132 transmits an attachment complete message to the MME120A and at 346, the UE 140 is connected to the CBRS network so thatdata can be transmitted to and from the data network, such as theinternet (not shown), and the UE 140 (data transmission starts).Accordingly, Wi-Fi SSID mapping to the CBRS network is provided via theMME 120A utilizing a newly defined service token. In one or more exampleembodiments, the user moves seamlessly between the Wi-Fi network and theCBRS network with similar segmentation and consistent access policies(VXLAN ID, SGT, SGACLs).

FIGS. 4A and 4B are sequence diagrams illustrating a method 300′ ofmapping a service provided by Wi-Fi network to the same service providedby the CBRS network, according to another example embodiment. In thisembodiment, Wi-Fi SSID service construct may be mapped with individualCBRS-NIDs instead of a service token. This involves an enterprise orbusiness to obtain multiple CBRS-NIDs from the CBRS alliance (for eachof the SSIDs) and further involves broadcasting CBRS-NIDs in SIB1 usingmultiple SIBs broadcasts, each through logical CBRS APs. In stillanother embodiment, the SSID is correlated with the same service in theCBRS access network using a PLMN-NID-APN mapping instead of using aservice token. Some operations in FIGS. 4A and 4B are analogous to theoperations shown in FIGS. 3A and 3B. For the sake of brevity, adescription of these operations is not provided in the description ofFIGS. 4A and 4B. These operations are defined with the same numericreference as the ones in FIGS. 3A and 3B.

As shown in FIG. 4A, at 304 a, the Wi-Fi AP 134 is configured with anSSID that is mapped to a PLMN-NID-APN identifier. For example, the SSID“blizzard” is mapped to the PLMN-NID “315.010-cicso.cbrs” and the APN“blizzard.com”, the SSID “blizzard-legacy” is mapped to a PLMN-NID“315.010-cicso.cbrs” and the APN “blizzard-legacy.com”, and the SSID“guest” is mapped to a PLMN-NID “315.010-cicso.cbrs” and the APN“guest.com”. In other words, in another example embodiment, instead ofmapping the SSID to a service token, the SSID is directly mapped to aPLMN-NID and APN such that a combination of PLMN+NID+APN is broadcast toUEs instead of the service token. The network controller 106 (FIG. 1 )generates a mapping table in which PLMN-NID and APN are mapped to theSSID instead of to the service token. The rest of the setup procedure(operations 306 and 308) is consistent with the description above withreference to FIG. 3A.

At 310 a, however, the Wi-Fi AP 134 broadcasts the SSID with thePLMN+NID+APN. For example, the Wi-Fi AP 134 broadcasts “blizzard315-010+cisco.cbrs+blizzard.com”. Similarly, the Wi-Fi AP 134 broadcasts“blizzard-legacy 315-010+cisco-cbrs+blizzard-legacy.com” and “guest315-010+cisco-cbrs+guest.com”. At 312 a, the UE 140 is connected overthe Wi-Fi network to SSID “blizzard” and the UE 140 also notes thecorresponding mapping of the PLMN-NID-APN“315-010+cisco=cbrs+blizzard.com”. Operations 312-320 are the same asdescribed above with reference to FIG. 3A.

Turning to the FIG. 4B, operations 322-326 are the same as describedabove with reference to FIG. 3B. Next, in FIG. 4B, at 328 a, when theRRC connection is complete, the UE 140 transmits a message indicatingthat the RRC connection is complete. The message includes an attachrequest and the NID-APN “cisco-cbrs/blizzard.com”. Operations 330 and332 proceed as described above with reference to FIG. 3B except that inoperation 330 the attach request includes the NID-APN instead of theservice token. Provided the UE 140 is successfully authenticated at 332,the MME 120A performs a lookup processing to determine a correspondingservice in the CBRS network, at 334 a. In another embodiment, the MME120A, based on the CBRS-NID/APN (“cisco-cbrs/blizzard.com”) obtained at330, performs a lookup into a service mapping table in which the SSID ismapped with the PLMN-NID-APN. The MME 120A is configured to access themapping table generated by the network controller 106 (FIG. 1 ) toconfigure or select the CBRS network access to be provided to the UE140. That is, based on the lookup, the MME 120A finds or locates anequivalent Wi-Fi SSID and other service policies. In other words, basedon the CBRS identifiers (PLMN-NID-APN), the MME 120A determinescorresponding Wi-Fi SSID to determine services and service policies tobe provided in the CBRS. In one embodiment, operations 336 and 338 maybe omitted and operations 340-346 are similar to that described abovewith reference to FIG. 3B.

As another embodiment or an additional variation, the reverse servicemapping from the private radio (LTE) network to the Wi-Fi network isprovided and may be achieved through SIB17 signaling. In other words,the UE receiving services via the private radio (LTE) network isprovided with a service token that identifies an identical serviceavailable via the Wi-Fi access network. Accordingly, for example, whennetwork conditions occur such that quality of signal or service degradeson the private radio (LTE) network, the UE may switch to the Wi-Finetwork.

In example embodiments, a method for unifying the services available onthe private radio (LTE) network and the Wi-Fi network are provided. Anenterprise UE attached to the Wi-Fi network will be notified about theavailability of the same service through the private radio (LTE)network. As explained above, mechanisms are provided for mapping theservice layers which are defined based on 3GPP APN and Wi-Fi SSID basedL2/L3 domains.

In example embodiments, the same services provided by various radionetworks are mapped to each other using a mapping table generated by thenetwork controller 106. The mapping table generated by the networkcontroller 106 is propagated to configure the Wi-Fi AP 134 and the MME120A. Additionally, according to various example embodiments, themapping table generated by the network controller 106 may be propagatedto the WLC 110 (FIG. 3 ) and/or to the CBRS AP 132 (in the case of theexample embodiment of the reverse service mapping from the private LTEnetwork to the Wi-Fi network).

FIG. 5 is a flowchart illustrating a method 500 of indicating anavailability of the same service on another radio access system/network,according to an example embodiment. The method 500 is performed by anetwork controller, such as network controller 106 described above withreference to FIG. 1 . At 502, the network controller generates anidentifier for each of one or more services provided by a wireless localaccess network (WLAN). The identifier is associated with a particularservice, of the one or more services. The particular service is alsoprovided by a private radio network. At 504, the network controllerprovides, to an access point, the identifier to be broadcast to one ormore user devices of the WLAN to connect to the particular service viathe private radio network.

According to one or more example embodiments, the private radio networkis a private long term evolution (LTE) network. The WLAN is a Wi-Finetwork and the access point provides access to the Wi-Fi network to theone or more user devices.

According to one or more example embodiments, the method furtherincludes the network controller storing the identifier such that theidentifier is associated with a service set identifier (SSID) of theparticular service provided in the WLAN and with an access point name(APN) identifying the particular service provided in the private radionetwork.

According to one or more example embodiments, the identifier is furtherassociated with at least one policy of the particular service.

According to one or more example embodiments, the identifier is furtherassociated with at least one data plane policy of the particular serviceprovided in the WLAN and virtual network layer 2 and layer 3identifiers.

According to one or more example embodiments, the particular service isone or more of an Internet service or a Voice over Internet Protocol(VoIP) service. The WLAN is a Wi-Fi network and the private radionetwork is a Citizens Broadband Radio Service (CBRS) network.

According to one or more example embodiments, the identifier is aservice token having a predetermined length and is associated with theparticular service having same set of one or more data plane policies inthe WLAN and in the private radio network.

According to one or more example embodiments, the same set of one ormore data plane policies includes at least one of a security group tagassociated with a user device from among the one or more user devices ora security group access control list.

According to one or more example embodiments, the identifier isassociated with a service set identifier (SSID) which identifies theparticular service in the WLAN and is further associated with a publicland mobile network (PLMN) network identifier (NID) access point name(APN) which identifies the particular service in the private radionetwork.

According to one or more example embodiments, the private radio networkis a Citizens Broadband Radio Service (CBRS) network and the identifieris a combination of a shared home network identifier (SHNI), the NID,and the APN.

According to one or more example embodiments, the method furtherincludes the network controller storing the identifier that includes acombination of values identifying the particular service in the privateradio network; and wherein the network controller providing to theaccess point of the WLAN the identifier to be broadcasted to the one ormore user devices.

FIG. 6 is a flowchart illustrating a method 600 of enabling the sameservice on another radio access system/network, according to an exampleembodiment. The method 600 is performed by a mobility management entity,such as the IWK 120 described above with reference to FIG. 1 and/or theMME 120A described above with reference to FIGS. 3A-4B.

At 602, the mobility management entity receives from an access point ofa private radio network, a request to connect a user device to theprivate radio network. The request includes an identifier that isassociated with a particular service provided to the user device via awireless local access network (WLAN). At 604, the mobility managemententity enables, based on the identifier, the particular service to beprovided to the user device via the private radio network.

According to one or more example embodiment, the enabling the particularservice to be provided via the private radio network may includeconfiguring the particular service to be provided in the private radionetwork with a same segmentation and one or more policies of theparticular service provided in the WLAN network.

According to one or more example embodiments, the method may furtherinclude searching, by the mobility management entity, for the identifierin a mapping table to obtain a corresponding service set identifier(SSID) which identifies attributes of the particular service provided inthe WLAN and based on the corresponding SSID, provisioning theparticular service to include the same attributes in the private radionetwork.

In still another embodiment, a network controller (an apparatus) isprovided that includes a memory, a network interface configured toenable network communications, and a processor. The processor isconfigured to generate an identifier for each of one or more servicesprovided by a wireless local access network (WLAN). The identifier isassociated with a particular service, of the one or more services. Theparticular service is also provided by a private radio network. Theprocessor is furthered configured to control the network interface toprovide to an access point the identifier to be broadcast to one or moreuser devices of the WLAN to connect to the particular service via theprivate radio network.

According to one or more example embodiments, the private radio networkis a private long term evolution (LTE) network. The WLAN is a Wi-Finetwork and the access point provides access to the Wi-Fi network to theone or more user devices.

According to one or more example embodiments, the processor is furtherconfigured to control the memory to store the identifier such that theidentifier is associated with a service set identifier (SSID) of theparticular service provided in the WLAN and with an access point name(APN) identifying the particular service provided in the private radionetwork.

According to one or more example embodiments, the identifier is aservice token having a predetermined length and is associated with theparticular service having same set of one or more data plane policies inthe WLAN and in the private radio network.

According to one or more example embodiments, the identifier isassociated with a service set identifier (SSID) which identifies theparticular service in the WLAN and is further associated with a publicland mobile network (PLMN) network identifier (NID) access point name(APN) which identifies the particular service in the private radionetwork.

According to one or more example embodiments, the processor is furtherconfigured to control the network interface to receive from anotheraccess point of the private radio network, a request to connect a userdevice among the one or more user devices to the private radio network.The request includes the identifier. The processor is further configuredto enable, based on the identifier, the particular service to beprovided via the private radio network.

In yet another embodiment, one or more non-transitory computer readablestorage media encoded with instructions are provided. When the media isexecuted by a processor, they cause the processor to generate anidentifier for each of one or more services provided by a wireless localaccess network (WLAN) where the identifier is associated with aparticular service, of the one or more services. The particular serviceis also provided by a private radio network. They further cause theprocessor to provide, to an access point, the identifier to be broadcastto one or more user devices of the WLAN to connect to the particularservice via the private radio network.

FIG. 7 is a hardware block diagram of a computing device 700 configuredto perform the functions of a network controller 106 referred to hereinin connection with FIGS. 1 and 5 and the functions of a mobilitymanagement entity (MME) referred to herein in connection with FIGS. 3,4, and 6 , according to various example embodiments. The functionsinclude mapping the service provided by the Wi-Fi network to the sameservice provided by the CBRS network such that the user device mayswitch to the CBRS network for the same services based on the mapping,according to an example embodiment. The functions further includeenabling, based on the mapping, to provide in the CBRS network aparticular service, which is provided to the user device in the Wi-Finetwork. It should be appreciated that FIG. 7 provides only anillustration of various embodiments and does not imply any limitationswith regard to the environments in which different embodiments may beimplemented. Many modifications to the depicted environment may be made.

As depicted, the computing device 700 includes a bus 712, which providescommunications between computer processor(s) 714, a memory 716, apersistent storage 718, communications interface 720, and input/output(I/O) interface(s) 722. The bus 712 can be implemented with anyarchitecture designed for passing data and/or control informationbetween processors (such as microprocessors, communications and networkprocessors, etc.), system memory, peripheral devices, and any otherhardware components within a system. For example, the bus 712 can beimplemented with one or more buses.

The memory 716 and persistent storage 718 are computer readable storagemedia. In the depicted embodiment, the memory 716 includes a randomaccess memory (RAM) 724 and a cache (cache memory) 726. In general, thememory 716 can include any suitable volatile or non-volatile computerreadable storage media that stores instructions for the control logic725.

When the computing device 700 is a network controller, the control logic725 is mapping and same service availability notification software thatincludes instructions for a notification of the same service availableon a different access network and instructions for mapping mechanisms.That is, the control logic 725 includes instructions for generating anidentifier for each of one or more services provided by the WLAN, wherethe identifier is associated with a particular service, of the one ormore services, which particular service is also provided by a privateradio network and for providing to an access point, the identifier to bebroadcast to one or more user devices of the WLAN to connect to theparticular service via the private radio network.

When the computing device 700 is the MME, the control logic 725 includesenabling the same particular service software that includes instructionsto identify a particular service provided to a user device in the WLANand to enable, based on the identifier, the same service via the privateradio network. That is, the control logic 725 includes instructions forreceiving from an access point of the private radio network, a requestto connect a user device to the private radio network, where the requestincludes an identifier associated with a particular services provided tothe user device via the WLAN and enabling, based on the identifier, theparticular service to be provided to the user device via the privateradio network.

The control logic 725 may be software stored in the memory 716 or thepersistent storage 718 for execution by the processor(s) 714.

One or more programs may be stored in persistent storage 718 forexecution by one or more of the respective computer processors 714 viaone or more memories of memory 716. The persistent storage 718 may be amagnetic hard disk drive, a solid state hard drive, a semiconductorstorage device, read-only memory (ROM), erasable programmable read-onlymemory (EPROM), flash memory, or any other computer readable storagemedia that is capable of storing program instructions or digitalinformation.

The media used by the persistent storage 718 may also be removable. Forexample, a removable hard drive may be used for persistent storage 718.Other examples include optical and magnetic disks, thumb drives, andsmart cards that are inserted into a drive for transfer onto anothercomputer readable storage medium that is also part of persistent storage718.

The communications interface 720, in these examples, provides forcommunications with other data processing systems or devices. In theseexamples, communications interface 720 includes one or more networkinterface cards. Communications interface 720 may provide communicationsthrough the use of either or both physical (wired) and wirelesscommunications links.

The I/O interface(s) 722 allows for input and output of data with otherdevices that may be connected to the computing device 700. For example,the I/O interface 722 may provide a connection to external devices 728such as a keyboard, keypad, a touch screen, and/or some other suitableinput device. External devices 728 can also include portable computerreadable storage media such as database systems, thumb drives, portableoptical or magnetic disks, and memory cards.

Software and data used to practice embodiments can be stored on suchportable computer readable storage media and can be loaded ontopersistent storage 718 via I/O interface(s) 722. I/O interface(s) 722may also connect to a display 730. The display 730 provides a mechanismto display data to a user and may be, for example, a computer monitor.

The programs described herein are identified based upon the applicationfor which they are implemented in a specific embodiment. However, itshould be appreciated that any particular program nomenclature herein isused merely for convenience, and thus the embodiments should not belimited to use solely in any specific application identified and/orimplied by such nomenclature.

Data relating to operations described herein may be stored within anyconventional or other data structures (e.g., files, arrays, lists,stacks, queues, records, etc.) and may be stored in any desired storageunit (e.g., database, data or other repositories, queue, etc.). The datatransmitted between entities may include any desired format andarrangement, and may include any quantity of any types of fields of anysize to store the data. The definition and data model for any datasetsmay indicate the overall structure in any desired fashion (e.g.,computer-related languages, graphical representation, listing, etc.).

The present embodiments may employ any number of any type of userinterface (e.g., Graphical User Interface (GUI), command-line, prompt,etc.) for obtaining or providing information (e.g., data relating toscraping network sites), where the interface may include any informationarranged in any fashion. The interface may include any number of anytypes of input or actuation mechanisms (e.g., buttons, icons, fields,boxes, links, etc.) disposed at any locations to enter/displayinformation and initiate desired actions via any suitable input devices(e.g., mouse, keyboard, etc.). The interface screens may include anysuitable actuators (e.g., links, tabs, etc.) to navigate between thescreens in any fashion.

The environment of the present embodiments may include any number ofcomputer or other processing systems (e.g., client or end-user systems,server systems, etc.) and databases or other repositories arranged inany desired fashion, where the present embodiments may be applied to anydesired type of computing environment (e.g., cloud computing,client-server, network computing, mainframe, stand-alone systems, etc.).The computer or other processing system employed by the presentembodiments may be implemented by any personal or other type of computeror processing system (e.g., desktop, laptop, personal data assistant(PDA), mobile devices, etc.), and may include any commercially availableoperating system and any combination of commercially available andcustom software (e.g., machine learning software, etc.). These systemsmay include any types of monitors and input devices (e.g., keyboard,mouse, voice recognition, etc.) to enter and/or view information.

It is to be understood that the software of the present embodiments maybe implemented in any desired computer language and could be developedby one of ordinary skill in the computer arts based on the functionaldescriptions contained in the specification and flow charts illustratedin the drawings. Further, any references herein of software performingvarious functions generally refer to computer systems or processorsperforming those functions under software control. The computer systemsof the present embodiments may alternatively be implemented by any typeof hardware and/or other processing circuitry.

The various functions of the computer or other processing systems may bedistributed in any manner among any number of software and/or hardwaremodules or units, processing or computer systems and/or circuitry, wherethe computer or processing systems may be disposed locally or remotelyof each other and communicate via any suitable communications medium(e.g., LAN, wireless access network (WAN), Intranet, Internet, hardwire,modem connection, wireless, etc.). For example, the functions of thepresent embodiments may be distributed in any manner among the variousend-user/client and server systems, and/or any other intermediaryprocessing devices. The software and/or algorithms described above andillustrated in the flow charts may be modified in any manner thataccomplishes the functions described herein. In addition, the functionsin the flow charts or description may be performed in any order thataccomplishes a desired operation.

The software of the present embodiments may be available on anon-transitory computer useable medium (e.g., magnetic or opticalmediums, magneto-optic mediums, floppy diskettes, CD-ROM, DVD, memorydevices, etc.) of a stationary or portable program product apparatus ordevice for use with stand-alone systems or systems connected by anetwork or other communications medium.

The communication network may be implemented by any number of any typeof communications network (e.g., LAN, WAN, Internet, Intranet, VPN,etc.). The computer or other processing systems of the presentembodiments may include any conventional or other communications devicesto communicate over the network via any conventional or other protocols.The computer or other processing systems may utilize any type ofconnection (e.g., wired, wireless, etc.) for access to the network.Local communication media may be implemented by any suitablecommunication media (e.g., local area network (LAN), hardwire, wirelesslink, Intranet, etc.).

The present embodiments may employ any number of any type of userinterface (e.g., Graphical User Interface (GUI), command-line, prompt,etc.) for obtaining or providing information (e.g., data relating toproviding enhanced delivery options), where the interface may includeany information arranged in any fashion. The interface may include anynumber of any types of input or actuation mechanisms (e.g., buttons,icons, fields, boxes, links, etc.) disposed at any locations toenter/display information and initiate desired actions via any suitableinput devices (e.g., mouse, keyboard, etc.). The interface screens mayinclude any suitable actuators (e.g., links, tabs, etc.) to navigatebetween the screens in any fashion.

The embodiments presented may be in various forms, such as a system, amethod, and/or a computer program product at any possible technicaldetail level of integration. The computer program product may include acomputer readable storage medium (or media) having computer readableprogram instructions thereon for causing a processor to carry outaspects of presented herein.

[moo] The computer readable storage medium can be a tangible device thatcan retain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present embodiments may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, configuration data for integrated circuitry, oreither source code or object code written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Smalltalk, C++, or the like, and procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The computer readable program instructions may executeentirely on the user's computer, partly on the user's computer, as astand-alone software package, partly on the user's computer and partlyon a remote computer or entirely on the remote computer or server. Inthe latter scenario, the remote computer may be connected to the user'scomputer through any type of network, including a local area network(LAN) or a wide area network (WAN), or the connection may be made to anexternal computer (for example, through the Internet using an InternetService Provider). In some embodiments, electronic circuitry including,for example, programmable logic circuitry, field-programmable gatearrays (FPGA), or programmable logic arrays (PLA) may execute thecomputer readable program instructions by utilizing state information ofthe computer readable program instructions to personalize the electroniccircuitry, in order to perform aspects presented herein.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments. In this regard, each block in the flowchart or blockdiagrams may represent a module, segment, or portion of instructions,which comprises one or more executable instructions for implementing thespecified logical function(s). In some alternative implementations, thefunctions noted in the blocks may occur out of the order noted in thefigures. For example, two blocks shown in succession may, in fact, beexecuted substantially concurrently, or the blocks may sometimes beexecuted in the reverse order, depending upon the functionalityinvolved. It will also be noted that each block of the block diagramsand/or flowchart illustration, and combinations of blocks in the blockdiagrams and/or flowchart illustration, can be implemented by specialpurpose hardware-based systems that perform the specified functions oracts or carry out combinations of special purpose hardware and computerinstructions.

The descriptions of the various embodiments have been presented forpurposes of illustration, but are not intended to be exhaustive orlimited to the embodiments disclosed. Many modifications and variationswill be apparent to those of ordinary skill in the art without departingfrom the scope and spirit of the described embodiments. The terminologyused herein was chosen to best explain the principles of theembodiments, the practical application or technical improvement overtechnologies found in the marketplace, or to enable others of ordinaryskill in the art to understand the embodiments disclosed herein.

The above description is intended by way of example only. Although thetechniques are illustrated and described herein as embodied in one ormore specific examples, it is nevertheless not intended to be limited tothe details shown, since various modifications and structural changesmay be made within the scope and range of equivalents of the claims.

What is claimed is:
 1. A method comprising: generating, by a networkcontroller, an identifier for each of one or more services provided by awireless local access network (WLAN), the identifier including a servicetoken that associates a particular service provided by a private radionetwork with the same particular service of the one or more servicesprovided by the WLAN; and providing, by the network controller, to anaccess point, the identifier to be broadcast to one or more user devicesof the WLAN to connect to the particular service via the private radionetwork.
 2. The method of claim 1, wherein: the private radio network isa private long term evolution (LTE) network, the WLAN is a Wi-Finetwork, and the access point provides access to the Wi-Fi network tothe one or more user devices.
 3. The method of claim 1, furthercomprising: storing, by the network controller, the identifier such thatthe identifier is associated with a service set identifier (SSD) of thesame particular service provided in the WLAN and with an access pointname (APN) identifying the particular service provided in the privateradio network.
 4. The method of claim 1, wherein the identifier isassociated with at least one policy of the particular service.
 5. Themethod of claim 1, wherein the identifier is associated with at leastone data plane policy that includes at least one of a security group tagassociated with a user device from among the one or more user devices ora security group access control list.
 6. The method of claim 1, whereinthe identifier is associated with at least one data plane policy of thesame particular service provided in the WLAN and virtual network layer 2and layer 3 identifiers.
 7. The method of claim 1, wherein theparticular service is one or more of an Internet service or a Voice overInternet Protocol (VoIP) service and wherein the WLAN is a Wi-Fi networkand the private radio network is a Citizens Broadband Radio Service(CBRS) network.
 8. The method of claim 1, further comprising: storing,by the network controller, the identifier that includes a particularcombination of values that is associated with a service set identifier(SSID) which identifies the same particular service in the WLAN and thatis further associated with a public land mobile network (PLMN) networkidentifier (NID) access point name (APN) which identifies the particularservice in the private radio network such that the combination of valuesincludes a shared home network identifier (SHNI), the NID, and the APN.9. A method comprising: receiving, by a mobility management entity froman access point of a private radio network, a request to connect a userdevice to the private radio network, the request including an identifierthat is a service token that associates a particular service provided tothe user device via a wireless local access network (WLAN) with the sameparticular service in the private radio network; and enabling, based onthe identifier, by the mobility management entity, the particularservice to be provided to the user device via the private radio network.10. The method of claim 9, wherein the enabling the particular serviceto be provided via the private radio network includes configuring theparticular service to be provided in the private radio network with asame segmentation and one or more policies of the particular serviceprovided in the WLAN.
 11. The method of claim 9, further comprising:searching, by the mobility management entity, for the identifier in amapping table to obtain a corresponding service set identifier (SSID)which identifies attributes of the particular service provided in theWLAN; and based on the corresponding SSID, provisioning the particularservice to include the same attributes in the private radio network. 12.An apparatus comprising: a memory; a network interface configured toenable network communications; and a processor, wherein the processor isconfigured to: generate an identifier for each of one or more servicesprovided by a wireless local access network (WLAN), the identifierincluding a service token that associates a particular service providedby a private radio network with the same particular service of the oneor more services provided by the WLAN; and control the network interfaceto provide to an access point the identifier to be broadcast to one ormore user devices of the WLAN to connect to the particular service viathe private radio network.
 13. The apparatus of claim 12, wherein: theprivate radio network is a private long term evolution (LTE) network,the WLAN is a Wi-Fi network, and the access point provides access to theWi-Fi network to the one or more user devices.
 14. The apparatus ofclaim 12, wherein the processor is further configured to control thememory to store the identifier such that the identifier is associatedwith a service set identifier (SSID) of the particular service providedin the WLAN and with an access point name (APN) identifying theparticular service provided in the private radio network.
 15. Theapparatus of claim 12, wherein the identifier is associated with atleast one policy of the particular service.
 16. The apparatus of claim12, wherein the identifier is associated with at least one data planepolicy that includes at least one of a security group tag associatedwith a user device from among the one or more user devices or a securitygroup access control list.
 17. The apparatus of claim 12, wherein theidentifier is associated with at least one data plane policy of theparticular service provided in the WLAN and virtual network layer 2 andlayer 3 identifiers.
 18. The apparatus of claim 12, wherein theparticular service is one or more of an Internet service or a Voice overInternet Protocol (VoIP) service and wherein the WLAN is a Wi-Fi networkand the private radio network is a Citizens Broadband Radio Service(CBRS) network.
 19. The apparatus of claim 12, wherein the processor isfurther configured to control the memory to store the identifier thatincludes a particular combination of values that is associated with aservice set identifier (SSID) which identifies the same particularservice in the WLAN and that is further associated with a public landmobile network (PLMN) network identifier (NID) access point name (APN)which identifies the particular service in the private radio networksuch that the combination of values includes a shared home networkidentifier (SHNI), the NID, and the APN.
 20. The apparatus of claim 12,wherein the processor is further configured to control the networkinterface to receive from another access point of the private radionetwork, a request to connect a user device among the one or more userdevices to the private radio network, the request including theidentifier and to enable, based on the identifier, the particularservice to be provided via the private radio network.