Sending an identifier of a wireless local area network to enable handoff of a mobile station to the wireless local area network

ABSTRACT

In a wireless communications network, the presence of a wireless local area network in a cell segment is determined. An identifier of the wireless local area network in the cell segment is sent to at least one mobile station in the cell segment to enable the at least one mobile station to hand off to the wireless local area network. Optionally, information identifying geographic boundaries of cell segments and the wireless local area network can be sent to the at least one mobile station.

RELATED APPLICATION DATA

The present application is a continuation of U.S. application Ser. No.16/021,814, filed Jun. 28, 2018, which is a continuation of U.S.application Ser. No. 15/608,001, filed May 30, 2017 (now U.S. Pat. No.10,039,035) which is a continuation of U.S. application Ser. No.15/043,777, filed Feb. 15, 2016 know U.S. Pat. No. 9,674,739), which isa continuation of U.S. application Ser. No. 14/542,814, filed Nov. 17,2014 (now U.S. Pat. No. 9,288,722), which is a continuation of U.S.application Ser. No. 13/745,970, filed Jan. 21, 2013 (now U.S. Pat. No.8,958,391), which is a continuation of U.S. application Ser. No.11/229,390, filed Sep. 16, 2005 (now U.S. Pat. No. 8,379,558); thedisclosures of each of the above-referenced applications areincorporated by reference herein in their entireties.

TECHNICAL FIELD

The present invention relates generally to sending an identifier of awireless local area network to a mobile station to enable handoff to thewireless local area network.

BACKGROUND

Mobile communications systems are made up of a plurality of cells orcell sectors. Each cell or cell sector provides a radio communicationscenter through which a mobile station establishes a call or othercommunications session with another mobile station or a terminalconnected to either a circuit-switched network (e.g., public-switchedtelephone network or PSTN) or a packet-switched data network. Each cellor cell sector includes a base station (or access point) and a basestation controller (or radio network controller) to enablecommunications with mobile stations in the cell or cell sector.

Wireless networks are capable of carrying both circuit-switched andpacket-switched traffic (e.g., voice traffic, data traffic, etc.).Examples of wireless networks that support communication ofpacket-switched traffic include those that operate according to the CDMA2000 family of standards. The first phase of CDMA 2000 is referred to as1×RTT (also referred to as 3G1× or 1×), which is designed to increasevoice capacity as well as to support data transmission speeds that arefaster than typically available. In addition, for even higher datarates, a 1×EV-DO wireless technology has been developed, defined asTIA/EIA/IS-856, “CDMA 2000, High Rate Packet Data Air InterfaceSpecification,” which is adopted by the TIA. 1×EV-DO provides relativelyhigh data transfer rates over the air interface between mobile stationsand base stations.

Recently, there has been an increase in the use of enterprise andresidential wireless local area networks (WLANs). A WLAN refers to alocal area network that mobile stations can access wirelessly. A WLAN isa private network, either owned by an organization or municipality(enterprise) or by an individual. A WLAN is usually secured such thatonly authorized users are allowed to use the WLAN. A WLAN differs from apublic cellular wireless network in that the WLAN is limited for use byusers of a specific enterprise or a group, whereas the public cellularwireless network is for general use of subscribers of the cellularwireless network. Examples of standards that define WLANs include IEEE(Institute of Electrical and Electronic Engineers) 802.11, 802.11a,802.11b, 802.11g, Bluetooth, WiMAX (Worldwide Interoperability forMicrowave Access), 802.16, and so forth.

Conventionally, mechanisms have not been provided to enable efficienthandoffs from a public cellular wireless network, such as a CDMA 2000network, to a WLAN, since the cellular wireless network and WLAN operateaccording to different technologies.

SUMMARY

In general, a method and apparatus for use in a wireless communicationsnetwork includes determining presence of a wireless local area networkin a cell segment, and sending an identifier of the wireless local areanetwork in the cell segment to at least one mobile station in the cellsegment to enable the at least one mobile station to hand off to thewireless local area network.

Optionally, according to some embodiments, information identifyinggeographic boundaries of cell segments and the wireless local areanetwork can be sent to the at least one mobile station.

Other or alternative features will become apparent from the followingdescription, from the drawings, and from the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an example wireless communications networkthat includes a public cellular wireless network and wireless local areanetworks (WLANs).

FIG. 2 is a message flow diagram of a process of performing idle modehandoff from the public cellular wireless network to a WLAN, accordingto an embodiment.

FIG. 3 is a message flow diagram of a process of performing active modehandoff from a public cellular wireless network to a WLAN, according toan embodiment.

DETAILED DESCRIPTION

In the following description, numerous details are set forth to providean understanding of the present invention. However, it will beunderstood by those skilled in the art that the present invention may bepracticed without these details and that numerous variations ormodifications from the described embodiments may be possible.

Referring to FIG. 1, an example wireless communications network 10includes components that operate according to a public cellular wirelessprotocol, such as a CDMA (code-division multiple access) 2000 protocol.CDMA 2000 is defined by the CDMA 2000 family of standards (collectivelyreferred to as the IS-2000 Standard, which is developed by the ThirdGeneration Partnership Project 2 (3GPP2)). The CDMA 2000 components ofthe wireless network 10 can include 1×RTT components, 1×EV-DOcomponents, 1×EV-DV components, and/or other components. In otherembodiments, other types of public cellular wireless protocols, such asGSM (Global System for Mobile) and UMTS (Universal MobileTelecommunications System) protocols, can be used for communications inthe wireless communications network 10. A “public cellular wirelessprotocol” or “public wireless protocol” defines a wireless network thatis generally available to any subscriber of the wireless network.

Optionally, for circuit-switched communications, the wirelesscommunications network 10 includes a mobile switching center (MSC) 32which is responsible for switching mobile station-originated or mobilestation-terminated circuit-switched traffic. Effectively, the MSC 32 isthe interface for signaling and user traffic between the wirelessnetwork 10 and other public-switched networks (such as a public-switchedtelephone network (PSTN) 34 or other MSCs).

The wireless communications network 10 includes cell segments 12, eachassociated with a radio network controller (RNC) 14 or base stationcontroller (BSC). A “cell segment” refers to either a cell or cellsector. Typically, in the CDMA 2000 context, a BSC is used in a 1×RTTnetwork, while an RNC is used in a 1×EV-DO or 1×EV-DV network. In thisdiscussion, the term “radio network controller” or “RNC” refers to a1×EV-DO or 1×EV-DV RNC, a 1×RTT BSC, or any other type of radio networkcontroller or base station controller. Each RNC 14 is connected to anaccess point 20 (sometimes referred to as a base station transceiver).The access point 20 is an entity used for radio frequency (RF)communications with mobile stations within a cell segment 12.

The RNC 14 supports packet-switched communications, in which packet datais communicated between a mobile station and another endpoint, which canbe a terminal coupled to a data network 16 or another mobile stationthat is capable of communicating packet data. Examples of the datanetwork 16 include private networks (such as local area networks or widearea networks) and public networks (such as the Internet). In oneexample, the RNC 14 supports packet data services through a packet dataserving node (PDSN) 18.

In some embodiments, packet-switched communications are defined by theInternet Protocol (IP). In packet-switched communications (e.g.,electronic mail, web browsing, electronic gaming, voice-over-IP, etc.),packets or other units of data carry payload (including user data) aswell as header information including routing information (in the form ofaddresses) used for routing the packets or data units over one or morepaths of the network to a destination endpoint. IP defines a type ofconnectionless, packet-switched communications. One version of IP,referred to as IPv4, is described in Request for Comments (RFC) 791,entitled “Internet Protocol”, dated September 1981; and another versionof IP, referred to as IPv6, is described in RFC 2460, entitled “InternetProtocol, Version 6 (IPv6) Specification”, dated December 1998.

The RNC 14 includes a controller 22 (to perform various tasks) andstorage 24 (to store data). The RNC 14 also includes an interface 23 forcommunicating with mobile stations over wireless links (through therespective access point 20). Mobile stations 26 each also include acontroller 28 (to perform various tasks) and a storage 30 (to storedata). Examples of mobile stations 26 include mobile telephone handsets,portable computers, personal digital assistants, and so forth.

The RNC 14 is coupled to the PDSN 18 through a data network, such as anR-P (Radio Packet) transport network, to enable packet-switchedcommunications with the packet-switched data network 16. An R-Ptransport network (or interface) supports establishment of an R-Psession, which is a logical connection between the RNC and the PDSN fora particular PPP (Point-to-Point Protocol) session. PPP is described inRFC 1661, entitled “The Point-to-Point Protocol (PPP),” dated July 1994.During a communications session, packet data is routed between a mobilestation 26 and another endpoint through an RNC 14, R-P transportnetwork, and PDSN 18.

In the example arrangement of FIG. 1, two wireless local area networks(WLANs) 36 and 38 are depicted as being inside a cell segment 12. Notethat in alternative arrangements, a cell segment 12 can include just oneWLAN, no WLAN, or more than two WLANs. A WLAN operates according to adifferent wireless technology than the public cellular wireless networkprovided by the RNCs 14 in cell segments 12. As examples, protocols thatdefine WLANs include IEEE 802.11, IEEE 802.11a, IEEE 802.11b, IEEE802.11g, IEEE 802.16, WiMAX, and so forth.

In accordance with some embodiments, the RNCs 14 of the public cellularwireless network and base stations 40, 42 of the WLANs 36, 38 areconfigured to enable handoffs between cell segments 12 of the publiccellular wireless network and the WLAN 36 or 38. The ability toseamlessly hand off a mobile station between a cell segment and a WLANenables authorized users of the WLAN to start communicating in the WLANwhere the users may have access to expanded services and data providedby the WLAN, and/or more advantageous billing arrangements. For example,a user engaged in a voice-over-IP call in the public cellular wirelessnetwork can hand off to a WLAN, where the user can continue thevoice-over-IP call without interruption. The handoff between the publiccellular wireless network and a WLAN can also occur while the user isinvolved in another type of packet-switched communications (e.g., webbrowsing, electronic mail, electronic gaming, etc.).

The WLAN 36 includes one or more multiple base stations (or accesspoints) 40, and the WLAN 38 similarly includes one or multiple basestations (or access points) 42. Generally, the base stations thatoperate within a WLAN have a shorter range than the access points 20associated with cell segments 12. The WLAN can be associated with anenterprise or with a particular group or residence. Unlike in a publiccellular wireless network where any subscriber has access to thecellular wireless network, a WLAN allows only authorized mobile stationsto operate within the WLAN. For example, the first WLAN 36 may belong toCompany X, while the second WLAN 38 may belong to Company Y. Thus,mobile stations of employees of Company X can operate in WLAN 36 but notin WLAN 38, while mobile stations of employees of Company Y can operatein WLAN 38 but not in WLAN 36. Note that employees of either Company Xor Y that are subscribers of the public cellular wireless network areable to operate in the cell segments 12.

In accordance with some embodiments, to enable handoffs between an RNC14 and a base station in a WLAN, a predetermined message or aninformation field of an existing message is defined to communicateidentifier(s) of WLAN(s) within a cell segment 12 to mobile stationssuch that the mobile stations are aware of the presence of the WLAN(s).For example, an identifier of a WLAN can be communicated to mobilestations in a broadcast message, such as a message in a broadcastcontrol channel (BCCH). Alternatively, the identifier of a WLAN can becommunicated in a neighbor list to a specific mobile station. In otherembodiments, other messages or information fields for communicating theidentifier of a WLAN can also be used.

According to some embodiments, to enhance security, the identifier of aWLAN that is communicated from an RNC 14 to a mobile station 26 is a“private” identifier, which is different from a service set identifier(SSID) of the WLAN. Communicating the private identifier reduces theoccurrence of communicating SSIDs in un-secured messages between an RNCand a mobile station. Communicating an SSID of a WLAN, such as sendingthe SSID in a broadcast message, poses a security risk in that hackersmay obtain such an SSID to hack into a WLAN. Note that a WLAN istypically a secure network in which only authorized users are able tocommunicate. Allowing a hacker to gain access to a WLAN would thus beundesirable.

As described in further detail below, two types of handoffs are providedby a mechanism according to some embodiments. A first type of handoff isan idle mode handoff, in which handoff is performed between an RNC and aWLAN while the mobile station is not actively communicating traffic(data, voice, etc.). The mobile station is considered to be idle when itis not actively in a call session. The other type of handoff is theactive mode handoff, in which handoff occurs between an RNC and a WLANwhile the mobile station is active in a call session.

Idle mode handoff is performed by communicating private identifier(s) ofWLAN(s) in a cell segment to the mobile stations in a broadcast message(e.g., BCCH). The broadcast of private identifier(s) of WLAN(s) allowsnotification of available WLANs within a cell segment 12 to mobilestations in the cell segment 12.

To perform active mode handoff, the private identifier(s) of WLAN(s)that a particular mobile station is authorized to use is (are)communicated to the particular mobile station in a neighbor list (e.g.,in a NeighborList message). The NeighborList message identifiesneighboring cell segments 12 as well as WLANs that a mobile station isable to hand off to. In accordance with some embodiments, theNeighborList message contains special fields that contain identifiers ofWLAN(s). According to some embodiments, a first NeighborList messagesent to a first mobile station in a given cell segment 12 can containdifferent neighbors (such as different WLANs) than a second NeighborListmessage sent to a second mobile station in the given cell segment 12.

For example, the first NeighborList message can identify WLAN 36 but notWLAN 38 to the first mobile station, and the second NeighborList messagecan identify WLAN 38 but not WLAN 36 to the second mobile station. Inanother example, the first NeighborList message can identify one or bothof WLANs 36, 38, while the second NeighborList message does not identifyany WLAN. By not including an identifier of a particular WLAN in aneighbor list sent to a mobile station that the mobile station is notauthorized to use, the mobile station would not have to waste resources(e.g., battery power, air interface bandwidth, etc.) scanning for theparticular WLAN to find out that the mobile station in fact is notauthorized to use the particular WLAN.

A benefit of communicating identifiers of WLANs that are present in acell segment 12 (such as either in a broadcast message or in a neighborlist) is that mobile stations in the cell segment 12 are explicitlynotified of the presence of the WLANs. As a result, the mobile stationsin the cell segment 12 would not have to waste resources scanning forWLANs that may or may not be present. Also, by explicitly communicatingidentifiers of available WLANs, it is ensured that the mobile stationsare notified of the presence of WLANs such that the mobile stations willbe able to hand off to appropriate WLANs to take advantage of additionalfeatures offered by some WLANs to authorized users.

FIG. 2 is a message flow diagram of a process of performing idle modehandoff in a particular cell segment 12. The RNC 14 supporting theparticular cell segment 12 identifies (at 102) WLAN(s) in its cellsegment. The identification of WLAN(s) is based on information providedto the RNC by the network operator. Information identifying the WLAN(s)in the cell segment 12 is stored in the storage 24 (FIG. 1) of the RNC14. The RNC 14 also stores (at 104) information mapping privateidentifier(s) to SSID(s) of respective WLAN(s). A network operator candefine proprietary mappings between private identifiers and SSIDs insome implementations.

A message is then sent (at 106) from the RNC 14 to a mobile station 26.Note that the message sent at 106 can also be sent to additional mobilestation(s) in the cell segment 12. The message sent at 106 includespreference information regarding the preferred WLAN or WLANs of themobile station, as well as the mapping information that maps betweenprivate ID(s) and SSID(s) for WLAN(s) in the cell segment 12. Forsecurity, the message sent at 106 can be encrypted or protected by someother technique to prevent unauthorized access of the mapping betweenprivate ID(s) and SSID(s).

The preference information is used by the mobile station to select thepreferred WLAN from among plural WLANs. For example, a mobile stationmay be authorized to use more than one WLAN in a particular cellsegment. One of the WLANs would be the preferred WLAN for the mobilestation. In other embodiments, preference information is not sent fromthe RNC to the mobile station. In response to the message sent at 106,the mobile station stores (at 108) the preference information and themapping information (such as in the storage 30 (FIG. 1) of the mobilestation.

For idle mode handoff, the RNC 14 sends (at 110) a broadcast message(e.g., BCCH) containing the private identifier(s) of the WLAN(s) in thecell segment 12. A broadcast message is received by all mobile stationsin the cell segment 12. Predefined information fields in the BCCH areused to carry the private identifiers. Alternatively, a differentmessage can be defined to carry the private identifiers. Instead ofcommunicating the private identifiers of WLANs in a cell segment in abroadcast message sent to multiple mobile stations in a cell segment 12,the private identifiers of WLANs can be sent in a message targeted to anindividual mobile station.

In response to receiving the private identifier(s) from the RNC, themobile station scans (at 112) for the preferred WLAN from among theidentified WLANs, based on the stored preference information discussedabove. Based on scanning for the preferred WLAN, the mobile stationacquires (at 114) the WLAN control channels to perform the idle modehandoff from the RNC to a base station of the WLAN, such that the mobilestation can subsequently communicate with the base station of the WLANinstead of with the RNC.

Note that similar techniques are employed to perform idle mode handofffrom a WLAN to a cell segment.

FIG. 3 shows a message flow diagram for active mode handoff. Note thattasks 102 and 104 of FIG. 2 have already been performed prior to thestart of FIG. 3, and that a cell call session has been established (at202) between the RNC and mobile station. A cell call session refers to acall session established in the cellular wireless network.

The RNC determines (at 204) if a WLAN exists in the cell segment. If aWLAN does not exist in the cell segment, then the RNC creates (at 206) ageneric neighbor list. A generic neighbor list is a neighbor list thatidentifies other cell segments as neighbors, but that does not identifya WLAN as a candidate neighbor to which a mobile station can hand off.

If the cell segment does contain one or more WLANs, the RNC determines(at 208) whether the mobile station is authorized to use any of theWLAN(s). If not, then the generic neighbor list is created (at 206).However, if the mobile station is authorized to use any of the WLAN(s),then the RNC creates (at 210) a neighbor list that contains WLANidentifier(s) (that the mobile station is authorized to use) as well asidentifiers of neighboring cell segments 12.

The RNC sends (at 212) a NeighborList message to the mobile station,where the NeighborList message contains the neighbor list created at 206or 210. Assuming that a WLAN is present that the mobile station isauthorized to use, the mobile station then determines (at 214) whetherthe mobile station is within range of the WLAN. If so, the mobilestation sends a handoff request (at 216) to the RNC. The RNC thenperforms a handoff procedure (at 218) with the base station of the WLAN.A handoff direction message is then sent (at 220) to the mobile stationto direct the mobile station to hand off to the base station of theWLAN. Next, a WLAN session is established (at 222) between the mobilestation and the base station of the WLAN to continue the communicationof traffic in the WLAN instead of in the cell segment.

Similar techniques are employed to perform active mode handoff from aWLAN to a cell segment.

The determination of whether a mobile station is within the range of aWLAN (performed at 214) can be accomplished in one of a number ofdifferent ways. One technique is based on radio frequency (RF) signalmeasurements, such as RSSI (RF signal strength), C/I (RF signalquality), or RTD (roundtrip delay). However, performing handoff based onmeasurements of RF signals may not be efficient in some scenarios due tothe likelihood of a rapid succession of handoffs (ping-pong handoffs)between two different cell segments or a cell segment and a WLAN at aboundary between the two cell segments or a cell segment and a WLAN.

In an alternative embodiment, instead of basing handoff on measurementsof RF signals, a location-based handoff technique is used. Thelocation-based handoff technique involves defining specific (which canbe fixed) geographic boundaries between cell segments as well asboundaries of a WLAN within a cell segment. Such information defininggeographic boundaries of cell segments and WLANs is communicated by RNCsto a mobile station when the mobile station is located within respectivecell segments. A mobile station is able to acquire information relatingto its location, and based on this acquired location, determine whethera handoff is appropriate. For example, the mobile station can include aglobal positioning system (GPS) receiver to establish its location basedon GPS coordinates. Alternatively, the location of the mobile stationcan be based on triangulation based on signals from three differentaccess points in three cell segments. Based on the determined locationof the mobile station, the mobile station or RNC (as appropriate) canmake a decision regarding whether handoff to a WLAN or to a differentcell segment is desirable.

Defining the boundaries of the cell segments and WLANs can beaccomplished by performing RF propagation analysis where the networkoperator performs measurements with an access point or base station in acell segment or WLAN to determine the appropriate boundaries. Once thegeographic boundaries are ascertained, the information identifyingboundaries are communicated to mobile stations for storage in the mobilestations. Based on determined geographic locations of the mobilestations, the mobile stations will be able to determine whether handoffto another cell segment or WLAN is appropriate. Alternatively, theinformation identifying boundaries is not communicated to mobilestations, but rather, is maintained in an RNC or WLAN base station.Based on the geographic location of a mobile station, the RNC or WLANbase station can then determine whether handoff is desirable (orpermitted). To avoid the issue of ping-pong handoffs between two cellsegments or between a cell segment and a WLAN, hysteresis can be definedfor the boundaries.

Instructions of the various software modules (e.g., software modulesexecuted in the RNCs 14, WLAN base stations 40, 42, or mobile stations26) are loaded for execution on corresponding processors. Processorsinclude microprocessors, microcontrollers, processor modules orsubsystems (including one or more microprocessors or microcontrollers),or other control or computing devices. As used here, a “controller” or“control module” refers to hardware, software, or a combination thereof.A “controller” or “control module” can refer to a single component or toplural components (whether software or hardware).

Data and instructions (of the software) are stored in respective storagedevices, which are implemented as one or more machine-readable storagemedia. The storage media include different forms of memory includingsemiconductor memory devices such as dynamic or static random accessmemories (DRAMs or SRAMs), erasable and programmable read-only memories(EPROMs), electrically erasable and programmable read-only memories(EEPROMs) and flash memories; magnetic disks such as fixed, floppy andremovable disks; other magnetic media including tape; and optical mediasuch as compact disks (CDs) or digital video disks (DVDs).

The instructions of the software are loaded or transported to eachentity in one of many different ways. For example, code segmentsincluding instructions stored on floppy disks, CD or DVD media, a harddisk, or transported through a network interface card, modem, or otherinterface device are loaded into the entity and executed ascorresponding software routines or modules. In the loading or transportprocess, data signals that are embodied in carrier waves (transmittedover telephone lines, network lines, wireless links, cables, and thelike) communicate the code segments, including instructions, to theentity. Such carrier waves are in the form of electrical, optical,acoustical, electromagnetic, or other types of signals.

While some embodiments have been disclosed with respect to a limitednumber of embodiments, those skilled in the art will appreciate numerousmodifications and variations there from. It is intended that theappended claims cover such modifications and variations as fall withinthe true spirit and scope of the invention.

What is claimed is:
 1. An apparatus, comprising: one or more processingelements, configured to: establish a session with a node of a cellularwireless network for communication of data; receive, from the node ofthe cellular wireless network, a message identifying, by explicitidentifiers, at least one WLAN of a plurality of WLANs in cell, whereinthe message identifies only WLANs the apparatus is authorized to use,and wherein the message communicated specifically to the apparatus fromnode of the cellular wireless network; scan for only the at least oneWLAN identified in the message; and determine that a first WLAN of theat least one WLAN is in range, and in response, establish a session withthe first WLAN to continue the communication of data.
 2. The apparatusof claim 1, wherein the one or more processing elements are furtherconfigured to receive a handoff direction message to perform handoff tothe first WLAN.
 3. The apparatus of claim 1, wherein to determine thatthe first WLAN of the at least one WLAN is in range, the one or moreprocessing elements are further configured to: determine whether theapparatus is in range for handoff to the first WLAN based on at leastradio frequency (RF) signal measurements.
 4. The apparatus of claim 1,wherein the one or more processing elements are further configured to:acquire information relating to a location of the apparatus; andreceive, from the cellular wireless network, geographic informationrelated to a plurality of wireless local area networks (WLANs) forstorage in the apparatus.
 5. The apparatus of claim 4, wherein the oneor more processing elements are configured to receive the geographicinformation in a first message that is separate from the messageidentifying the at least one WLAN of the plurality of WLANs.
 6. Theapparatus of claim 4, wherein the one or more processing elements arefurther configured to: determine whether handoff to the first WLAN ispermitted based on at least the location of the apparatus and thereceived geographic information.
 7. The apparatus of claim 4, wherein toacquire information relating to the location of the apparatus, the oneor more processing elements are further configured to acquire globalpositioning system (GPS) coordinates or a location based on signals fromdifferent access points of the cellular wireless network.
 8. Theapparatus of claim 4, wherein the geographic information comprisesinformation identifying geographic boundaries related to the pluralityof WLANs.
 9. A mobile station, comprising: a memory that storesprocessor executable program instructions; and a processor coupled tothe memory, wherein the program instructions, when executed by theprocessor, cause the processor to: establish a session with a node of acellular wireless network for communication of data; receive, from thenode of the cellular wireless network, a message identifying, byexplicit identifiers, at least one WLAN of a plurality of WLANs in cell,wherein the message identifies only WLANs the mobile station isauthorized to use, and wherein the message communicated specifically tothe mobile station from node of the cellular wireless network; scan foronly the at least one WLAN identified in the message; and determine thata first WLAN of the at least one WLAN is in range, and in response,establish a session with the first WLAN to continue the communication ofdata.
 10. The mobile station of claim 9, wherein the programinstructions, when executed by the processor, further cause theprocessor to receive a handoff direction message to perform handoff tothe first WLAN.
 11. The mobile station of claim 9, wherein to determinethat the first WLAN of the at least one WLAN is in range, the programinstructions, when executed by the processor, further cause theprocessor to: determine whether the mobile station is in range forhandoff to the first WLAN based on at least radio frequency (RF) signalmeasurements.
 12. The mobile station of claim 9, wherein the programinstructions, when executed by the processor, further cause theprocessor to: acquire information relating to a location of the mobilestation; and receive, from the cellular wireless network, geographicinformation related to a plurality of wireless local area networks(WLANs) for storage in the mobile station.
 13. The mobile station ofclaim 12, wherein the program instructions, when executed by theprocessor, further cause the processor to receive the geographicinformation in a first message that is separate from the messageidentifying the at least one WLAN of the plurality of WLANs.
 14. Themobile station of claim 12, wherein the program instructions, whenexecuted by the processor, further cause the processor to: determinewhether handoff to the first WLAN is permitted based on at least thelocation of the mobile station and the received geographic information.15. The mobile station of claim 12, wherein to acquire informationrelating to the location of the mobile station, the programinstructions, when executed by the processor, further cause theprocessor to acquire global positioning system (GPS) coordinates or alocation based on signals from different access points of the cellularwireless network.
 16. The mobile station of claim 12, wherein thegeographic information comprises information identifying geographicboundaries related to the plurality of WLANs.
 17. A method of operatinga mobile station, comprising: establishing, by the mobile station, asession with a node of a cellular wireless network for communication ofdata; receiving, by the mobile station from the node of the cellularwireless network, a message identifying, by explicit identifiers, atleast one WLAN of a plurality of WLANs in cell, wherein the messageidentifies only WLANs the mobile station is authorized to use, andwherein the message communicated specifically to the mobile station fromnode of the cellular wireless network; scanning, by the mobile station,for only the at least one WLAN identified in the message; anddetermining, by the mobile station, that a first WLAN of the at leastone WLAN is in range, and in response, establishing a session with thefirst WLAN to continue the communication of data.
 18. The method ofclaim 17, further comprising receiving, by the mobile station, a handoffdirection message to perform handoff to the first WLAN.
 19. The methodof claim 17, determining that the first WLAN of the at least one WLAN isin range comprises determining, by the mobile station, whether themobile station is in range for handoff to the first WLAN based on atleast radio frequency (RF) signal measurements.
 20. The method of claim17, further comprising: acquiring, by the mobile station, informationrelating to a location of the mobile station; and receiving, by themobile station from the cellular wireless network, geographicinformation related to a plurality of wireless local area networks(WLANs) for storage in the mobile station.