Network access through a second wireless network

ABSTRACT

The proposed technology relates to accessing wireless networks and in particular it relates to utilizing a second wireless network for enabling a wireless device, being unable to access a first wireless network, to access a first wireless network. One aspect of the proposed technology relates to a method performed in a wireless device being unable to access a first wireless network. The method comprises accessing a second wireless network and sending information indicating an inability to access the first wireless network to the second wireless network, for further distribution to the first wireless network. Thereby, the proposed method enables the first wireless network to reconfigure at least one access procedure parameter in the first wireless network in order to improve the conditions for the wireless device when accessing the first wireless network. The method further comprises accessing the first wireless network utilizing at least one reconfigured access procedure.

TECHNICAL FIELD

The proposed technology relates to accessing wireless networks and inparticular it relates to utilizing a second wireless network forenabling a wireless device to access a first wireless network. Theproposed technology also relates to methods for enabling access to afirst wireless network, a wireless device and nodes for implementing themethods and to a corresponding computer program.

BACKGROUND

3GPP Long Term Evolution, LTE, is the fourth-generation mobilecommunication technologies standard developed within the 3rd GenerationPartnership Project, 3GPP, to improve the Universal MobileTelecommunication System, UMTS, standard to cope with futurerequirements in terms of improved services such as higher data rates,improved efficiency, and lowered costs. The Universal Terrestrial RadioAccess Network, UTRAN, is the radio access network of a UMTS and EvolvedUTRAN, E-UTRAN, is the radio access network of an LTE system. In anUTRAN and an E-UTRAN, a User Equipment, UE, is wirelessly connected to aRadio Base Station, RBS, commonly referred to as a NodeB, NB, in UMTS,and as an evolved NodeB, eNodeB or eNodeB, in LTE. An RBS is a generalterm for a radio network node capable of transmitting radio signals to aUE and receiving signals transmitted by a UE.

It has been discussed during the work done on 3GPP Coverage EnhancementsTR 36.824, v11.0.0 that there may be situations where an E-UTRAN UE isunable to access the network due to E-UTRAN Random Access Channel, RACH,coverage problems, i.e. the UE may have Broadcast Control Channel, BCCH,coverage and can measure on the cell and read its system information,but the network cannot receive any random access preamble attempts fromthe UE because the UE is power/coverage limited and hence the receivedsignal in the network is thus too weak. Hence, the UE cannot connect tothe E-UTRAN domain of the radio network.

A similar scenario as described above may occur, when the RACH coveragelimitation of the first cell is caused by the fact that massive beamforming is required in order to provide users in the cell with coverage.This could be the situation if the first RAT is e.g. a future 5G celloperating in quite high frequency bands.

The “Mobile and Wireless Communications Enablers for the Twenty-twenty(2020) Information Society”, METIS, is a project co-founded by theEuropean Commission and is a consortium of 29 partners. The projectobjective is to respond to societal challenges for the year 2020 andbeyond by laying the foundation for the next generation of the mobileand wireless communications system. The frequencies being discussed for5G in e.g. the METIS project, are much higher than what is commonly usedfor 3GPP accesses today—suggestions have been made for carrierfrequencies >60 GHz.

In this frequency region, it will be almost impossible for network andUEs more than a few steps away from the network antenna to hear eachother without the use of e.g. advanced multi-antenna techniques such asvery directive beam forming. It will hence not be feasible to create acovering cell/sector which can be used for e.g. RACH purposes in thisscenario.

Hence, there is a need for methods of enabling access to a network whena UE knows about a network, because it can e.g. measure on the cell andread its system information, but the network cannot receive any randomaccess preamble attempts from the UE because the UE is e.g.power/coverage limited and hence the received signal in the network isthus too weak.

SUMMARY

The present disclosure proposes a general method for accessing a networkwhen a wireless device, e.g. a user equipment, UE, knows about awireless network because it can e.g. measure on a cell and read itssystem information, but is unable to access it.

According to one embodiment, this disclosure proposes for a UE in thesituation as outlined above, to acquire E-UTRAN access with the help ofthe GERAN random access procedures, and hence effectively extend thecoverage of the E-UTRAN cell.

In the similar scenario, where the random access coverage limitation ofthe first cell is rather due to the fact that massive beam forming isrequired in order to provide users in the cell with coverage asexplained above, it is also likely that coverage is provided by a lowerfrequency layer of the same, or another, RAT. Hence, a similar solutionis applicable also in this case.

Hence, this disclosure is e.g. based on the idea to use signalingthrough a second wireless network implementing a second RAT (e.g. GERAN)for requesting a reconfiguration of a first wireless networkimplementing a first RAT (e.g. E-UTRAN) for better coverage, forexample, by changing settings for carriers, antennas, pre-coding,repetition coding or other means to improve coverage of the E-UTRANnetwork.

According to one aspect, the proposed technique provides for a method,performed in a wireless device being unable to access a first wirelessnetwork, of accessing the first wireless network. The method comprisesaccessing a second wireless network and sending information indicatingan inability to access the first wireless network to the second wirelessnetwork, for further distribution to the first wireless network.Thereby, the proposed method enables the first wireless network toreconfigure at least one access procedure parameter in the firstwireless network in order to improve the conditions for the wirelessdevice when accessing first wireless network. The method furthercomprises accessing the first wireless network utilizing at least onereconfigured access procedure. The proposed method effectively enhancesthe coverage for a multi-RAT (e.g. GERAN and E-UTRAN) capable wirelessdevice by using a second wireless network to provide access coverage andallows a swift handover/network controlled mobility. Hence, a wirelessdevice may now be able to move from the second wireless network to thefirst wireless network much sooner than was previously possible.Alternatively, the wireless device may now be able to move from thesecond wireless network to the first wireless network, whereas thiswould not have been possible at all before.

According to one aspect, the method further comprises receiving, fromthe second wireless network, information associated with at least oneaccess procedure of the first wireless network. This information istypically utilized by the wireless device in order to improve theconditions for the wireless device when attempting to access the firstwireless network.

According to one aspect the received information comprises informationabout at least one access resource or preamble, which is reserved forthe wireless device and the step of accessing the first wirelessnetwork, comprises using the reserved access resource or preamble. Byreserving resources or preambles for random access interference isdecreased and the conditions for the wireless device when accessingfirst wireless network are improved.

According to one aspect the received information comprises precodinginformation wherein the step of accessing the first wireless networkcomprises using the received precoding information. By changing theprecoding it is e.g. possible to direct the access transmission in afavorable direction.

According to one aspect, the method further comprises sendinginformation to be used in at least one access procedure in the firstwireless network to the second wireless network for further distributionto the first wireless network 100. In this way e.g. measurement reportsmade by the wireless device on at least one signal transmitted from thefirst wireless network may be provided in the first wireless network,thereby improving the conditions for the wireless device when accessingthe first wireless network 100.

The mechanisms to schedule measurements in the downlink and/or uplinkfor a UE in GERAN, together with the possibility to providecontention-free access in the target E-UTRAN cell, enables the networkto avoid doing an erroneous handover and thus, for example, losingcoverage to the UE when the E-UTRAN radio conditions are non-favorablefor doing a GERAN to E-UTRAN handover. Hence, inter-RAT handoverperformance will be improved. This will also be beneficial when doing,for example, performance optimization of inter-RAT load balancing sincethe load balancing will impose additional handover signaling.

According to another aspect, this disclosure also makes it possible touse a non-5G RAT to provide RACH coverage for a 5G RAT cell, which canbe assumed to be operated in the high frequency bands where the coverageis extremely limited without the use of e.g. extensive beam-forming. Bythis disclosure, it is hence possible to use another RAT (e.g.E-UTRAN/UTRAN/GERAN) to provide this for the 5G RAT cell.

According to one aspect, the disclosure further relates to a computerprogram comprising computer program code which, when executed in awireless device, causes the wireless device to execute the methods asdescribed above.

According to another aspect, the disclosure relates to a methodperformed in a first network node or in several network nodes, in afirst wireless network. The method relates to enabling a wireless devicebeing unable to access the first wireless network to access the firstwireless network. The method comprises receiving from a second wirelessnetwork information indicating an inability of the wireless device toaccess the first wireless network, and reconfiguring an access procedureor procedures provided in the first wireless network based on thereceived information. According to one aspect, the at least one accessprocedure parameter is reconfigured such that coverage of the firstwireless network is modified to provide coverage for the wirelessdevice.

According to one aspect, the method further comprises sendinginformation associated with the at least one access procedure of thefirst wireless network to the second wireless network for furtherdistribution to the wireless device.

According to one aspect, the information comprises information about atleast one access resource or preamble which is reserved for the wirelessdevice. According to one aspect, wherein the information comprises arequest for the wireless device to transmit at least one referencesignal. According to one aspect, the method further comprises receiving,from the second wireless network, information to be used in at least oneaccess procedure in the first wireless network.

According to one aspect, the step of reconfiguring the access procedureor procedures comprises reconfiguring the coding or resources to be usedfor accessing the first wireless network. Thereby, scheduled resourcesmay be reserved for the wireless device, wherein the chance to accessthe network increases due to less interference.

According to one aspect, the step of reconfiguring the access procedureor procedures comprises informing the receiver of the radio network nodeabout the precoding used by the wireless device.

According to one aspect, the disclosure further relates to a computerprogram comprising computer program code which, when executed in a firstwireless network node causes the first network node to execute themethod claimed above.

According to another aspect, the disclosure relates to a methodperformed in a second wireless network node, or in several networknodes, in a second wireless network of enabling a wireless device beingunable to access a first wireless network to access the first wirelessnetwork. The method comprises receiving from the wireless deviceinformation indicating an inability to access the first wireless networkand sending to the first wireless network information indicating aninability of the wireless device to access to the first wirelessnetwork, thereby enabling the first wireless network to reconfigure theaccess procedure parameter in the first wireless network to increase thecoverage for the device.

According to another aspect, the method further comprises indicating acapability to assist a wireless device in accessing the first wirelessnetwork.

According to another aspect, the method in a second network node furthercomprises tunneling information associated with at least one accessprocedure of the first wireless network, from the first wireless networkto the wireless device or from the wireless device to the first wirelessnetwork.

According to one aspect, the disclosure further relates to a computerprogram comprising computer program code which, when executed in asecond wireless network node, causes the network node to execute themethod as described above.

According to another aspect, the disclosure relates to a wireless deviceconfigured to access a first wireless network, wherein the wirelessdevice is unable to access the first wireless network. The wirelessdevice comprises a radio communication interface configured tocommunicate with a first radio network node in the first wirelessnetwork and with a second radio network node in a second wirelessnetwork. The wireless device further comprises processing circuitryconfigured to cause the wireless device to access a second wirelessnetwork, send information indicating an inability to access the firstwireless network to the second wireless network, for furtherdistribution to the first wireless network, thereby enabling the firstwireless network to reconfigure at least one access procedure parameterin the first wireless network in order to improve the conditions for thewireless device when accessing first wireless network and access thefirst wireless network utilizing at least one reconfigured accessprocedure.

According to another aspect, the disclosure relates to a first networknode in a first wireless network, configured to enable a wirelessdevice, being unable to access the first wireless network, to access thefirst wireless network. The first wireless network node comprises aradio communication interface configured to communicate with thewireless device, a network communication interface configured tocommunicate with a second wireless network. The a first network nodefurther comprises processing circuitry configured to cause the firstnetwork node to receive, using the network communication interface, fromthe second wireless network information indicating an inability of thewireless device to access the first wireless network, and reconfigure atleast one access procedure parameter in the first wireless network basedon the received information.

According to another aspect, the disclosure relates to a second networknode in a second wireless network configured to enable a wireless devicebeing unable to access a first wireless network to access the firstwireless network. The second wireless network node comprises a radiocommunication interface configured to communicate with the wirelessdevice and a network communication interface configured to communicatewith a first wireless network. The second wireless network node furthercomprises a processing circuitry configured to cause the second networknode to receive, using the radio communication interface, from thewireless device information indicating an inability to access the firstwireless network and send, using the network communication interface, tothe first wireless network information indicating an inability of thewireless device to access to the first wireless network, therebyenabling the first wireless network to reconfigure at least one accessprocedure parameter in the first wireless network to increase thecoverage for the wireless device.

With the above description in mind, the object of the present disclosureis to overcome at least some of the disadvantages of known technology aspreviously described.

BRIEF DESCRIPTION OF THE DRAWINGS

The present technique will be more readily understood through the studyof the following detailed description of the embodiments/aspectstogether with the accompanying drawings, of which:

FIG. 1a illustrates a cell of a first wireless network, wherein thecoverage of the first wireless network is limited for a wireless device.

FIG. 1b shows the first wireless network of FIG. 1a , wherein inaddition a second wireless network is present and wherein the coverageof the second wireless network is good for the wireless device.

FIG. 2a illustrates the sequence of messages exchanged between a deviceand an eNodeB during a random access procedure.

FIG. 2b illustrates two preamble subsets defined for random access.

FIG. 2c is an illustration of random access preamble transmission in thetime-frequency domain.

FIG. 3 illustrates an overview of the signaling in a system whenenabling access to a first wireless network.

FIG. 4 is a flow chart illustrating the proposed method performed in awireless device being unable to access a first wireless network, ofenabling access to the first wireless network.

FIG. 5 is a flow chart illustrating the proposed method performed infirst network node in a first wireless network of enabling a wirelessdevice being unable to access a first wireless network, to access thefirst wireless network.

FIG. 6 is a flow chart illustrating the proposed method performed insecond network node in a second wireless network, of enabling a wirelessdevice being unable to access a first wireless network, to access thefirst wireless network.

FIG. 7 illustrates an overview of the signaling in a system whenenabling access to a first wireless network according to a first exampleembodiment.

FIG. 8 illustrates an overview of the signaling in a system whenenabling access to a first wireless network according to a secondexample embodiment.

FIG. 9 illustrates an overview of the signaling in a system whenenabling access to a first wireless network according to a third exampleembodiment.

FIG. 10 is a schematic diagram illustrating a wireless device.

FIG. 11a is a schematic diagram illustrating a first node.

FIG. 11b is a schematic diagram illustrating a second node.

DETAILED DESCRIPTION

The general object or idea of embodiments of the present disclosure isto address at least one or some of the disadvantages with the prior artsolutions described above as well as below. The various steps describedbelow in connection with the figures should be primarily understood in alogical sense, while each step may involve the communication of one ormore specific messages depending on the implementation and protocolsused.

This disclosure proposes using signaling through a second wirelessnetwork, typically implementing a second radio access technology, forrequesting reconfiguration of at least one random access procedure or aparameter of a random access procedure of a first wireless network forbetter access condition. For example, coverage of the first wirelessnetwork may be increased by changing settings for carriers, antennas,pre-coding, repetitions or other means to improve coverage of the firstwireless network.

Consider the situation when this UE is a multi Radio Access Technology,RAT, capable device capable of not only Evolved UMTS Terrestrial RadioAccess Network, E-UTRAN, but also another RAT, e.g. GSM/EDGE RadioAccess Network, GERAN, and also that this UE is in GERAN coverage butstill is E-UTRAN coverage limited as described above. In this situation,this multi-RAT capable UE will indeed be able to perform GERAN randomaccess, and connect to the GERAN domain of the radio network. The UEwill however not be able to access the E-UTRAN until the E-UTRAN radioconditions are more favorable, e.g. until it has moved to a positioncloser to the E-UTRAN base station.

In this application the term wireless device is generally used. Awireless device, or user equipment, UE, which is the term used in the3GPP specifications, referred to in this application could be anywireless device capable of communicating with a wireless network.Examples of such devices are of course mobile phones, smartphones,laptops and Machine to Machine, M2M, devices etc. However, one mustappreciate that capability to communicate with a wireless network couldbe built in almost any device e.g. a car, a lamp post, a scale and soon.

FIGS. 1a and 1b illustrate a cell 111 of a first wireless network 100,wherein the proposed technique may be implemented. In FIG. 1a coverageof the first wireless network 100 is limited for a wireless device 10,being very close to the cell border. The first wireless network is e.g.an Evolved UMTS Terrestrial Radio Access Network, E-UTRAN or a 5^(th)Generation wireless network. Thus, the wireless device 10 attempts toaccess the first wireless network e.g. by an E-UTRAN Random AccessAttempt, but fails to connect to the network.

FIG. 1b shows the first wireless network 100 of FIG. 1a , wherein, inaddition, a second wireless network 200 is present. The coverage of thesecond wireless network 200 is good for the wireless device 10. Thesecond wireless network is e.g. GSM/EDGE Radio Access Network, GERAN oran Evolved UMTS Terrestrial Radio Access Network, E-UTRAN. Thus, awireless device 10 attempting to access the first wireless network e.g.using an E-UTRAN Random Access Attempt, fails. However, the device isable to access the second wireless network.

The example embodiments below are partly using the example wherein thefirst wireless network is E-UTRAN and wherein the second wirelessnetwork is GERAN. Therefore, the random access procedure in an E-UTRANwill now be described in more detail. However, it must be anticipatedthat the problems and solutions described in this application can beextended to other first/second RATs than LTE/GERAN and 5G/LTE.

In 3GPP Release 11, the Long Term Evolution, LTE, random accessprocedure is a four step procedure used for initial access whenestablishing a radio link, to re-establish a radio link after radio-linkfailure, to establish uplink synchronization or as a scheduling requestif no dedicated scheduling-request resources have been configured on thePhysical Uplink Control Channel, PUCCH.

3GPP Release 11 provides for a LTE random access procedure which is usedin several situations: for initial access when establishing a radio link(moving from Radio Resource Control (RRC)_IDLE to RRC_CONNECTED state);to re-establish a radio link after radio-link failure; to establishuplink synchronization; or, as a scheduling request if no dedicatedscheduling-request resources have been configured on the Physical UplinkControl Channel, PUCCH. The 3GPP Release 11 LTE random access procedureessentially comprises four basic steps which encompass a sequence ofmessages exchanged between the terminal and the eNodeB, as generallyillustrated in FIG. 2a . In FIG. 2a , the four steps essentiallycorrespond to the solid arrows, whereas the dotted arrows essentiallycorrespond to control signaling for the solid arrow step which thedotted arrows precede. For example, the second step is the second arrowS32 a and the third arrow S32. The second arrow S32 a tells the UE tolisten to the third arrow S32 corresponding to the second step. Furtherin the same way the fifth arrow S34 a tells the UE to listen to thefourth step in the RA-procedure corresponding to the last arrow S34.These basic four steps are briefly discussed below.

A first step S31 in the random-access procedure comprises transmissionof a random-access preamble on the Physical Random-Access Channel,PRACH. As part of the first step of the random-access procedure, theterminal randomly selects one preamble to transmit, out of one of thetwo subsets 201, 202 defined for contention-based access as illustratedin FIG. 2b . In LTE totally 64 preambles 204 are defined in each cell.When contention-based setup is used there is a risk for collision of twoUEs accessing the same resource. The subsets used for contention freesetup 203 can be used e.g. at handover, where there is no risk forcollision, i.e. when the terminal and network already have dedicatedmeans of communication.

Which subset to select the preamble from, is given by the amount of datathe terminal would like to, and from a power perspective can, transmiton the Physical Uplink Shared Channel, PUSCH, in the third random accessstep. A time/frequency resource to be used for these transmissions isillustrated in FIG. 2 c, which is understood by reading “4G-LTE/LTEAdvanced for Mobile Broadband” by E. Dahlman et al, Academic Press,2011. The time/frequency resource 205 to be used is given by the commonPRACH configuration of the cell, which can be further limited by anoptional, UE specific mask, which limits the available PRACHopportunities for the given UE.

A second step S32 of the random access procedure comprises the RandomAccess Response. In the Random Access Response the eNodeB transmits amessage on the Physical Downlink Shared Channel, PDSCH, containing theindex of the random-access preamble sequences the network detected andfor which the response is valid; the timing correction calculated by therandom-access preamble receiver; a scheduling grant; as well as atemporary identify, TC-RNTI, used for further communication between theUE and network. A UE which does not receive any Random Access Responsein response to its initial random-access preamble transmission of step 1above within a pre-defined time window, will consider the attemptfailed, and will repeat the random access pre-amble transmission,possibly with higher transmit power, up to a number of maximum of fourtimes, before considering the entire random-access procedure failed.

The third step S33 of the random access procedure serves, e.g., toassign a unique identity to the UE within the cell, C-RNTI. In thisthird step, the UE transmits the necessary information to the eNodeBusing the PUSCH resources assigned to the UE in the Random AccessResponse.

The fourth and last step S34 of the random-access procedure comprises adownlink message for contention resolution. The message of this fourthstep is also known as the RRC Connection Setup message. Based on thecontention resolution message each terminal receiving the downlinkmessage will compare the identity in the message with identitytransmitted in the third step. Only a terminal which observes a matchbetween the identity received in the fourth step and the identitytransmitted as part of the first step will declare the random accessprocedure successful, otherwise the terminal will need to restart therandom access procedure.

The UE power to use in the random access attempt is calculated accordingto a specified formula, known from “3GPP TS 36.213 v.10.6.0. Physicallayer procedures”, reproduced as Expression 1 below, with parameterscarried in the system information. If the UE does not receive aRandomAccessResponse in the second step of the procedure, the transmitpower of the following PRACH transmission is increased by a parameterdelta value up until limited by the UE maximum power:PPRACH=min{P_(CMAX,c)(i),PREAMBLE_RECEIVED_TARGET_POWER+PL_(c)}_[dBm]  Expression 1:

In Expression 1, P_(CMAX,c)(i) is the configured UE transmitting poweras defined in “3GPP TS 36.213 v.10.6.0. Physical layer procedures” forsub frame i of the first cell and PL_(c) is the downlink path lossestimate calculated in the UE for the first cell andPREAMBLE_RECEIVED_TARGET_POWER is the initial power used for thepreambles, i.e. before any potential power ramp-up.

As currently being discussed during the work with the 3GPP CoverageEnhancements, there are situations where a UE is unable to access thenetwork due to Random Access Channel, RACH, coverage problems, e.g. theUE has Broadcast Control Channel, coverage and can thus measure on thecell and read the cell's system information, but the network cannotreceive any random access preamble attempts from the UE because the UEis power/coverage limited, and hence the received signal in the networkis too weak.

In the situation as outlined above, it would be beneficial if it waspossible for the UE to acquire E-UTRAN access with the assistance of theGERAN RACH procedures, and hence effectively extend the coverage of theE-UTRAN cell assuming that the coverage is limited by E-UTRAN RACHprocedures only while the E-UTRAN user plane transfer procedures can bemaintained. This is however not possible today since the UE will not beable to access the E-UTRAN network until the E-UTRAN radio conditionsare more favorable, i.e. until it has moved to a position closer to theE-UTRAN base station, after which the network may trigger a handover tothe E-UTRAN cell. One reason for this is that the access to the E-UTRANcell after the UE has left the GERAN cell will still require E-UTRANRACH access as per legacy methods as described earlier.

Furthermore, if the UE is coverage limited in this manner, it is quitelikely that also the subsequent RRC Connection Request/MSG3 transmissionfrom UE to network, as per the third step of the random access proceduredescribed in the previous section, will also fail.

Additionally, it would in situations as the ones described above, aswell as in the ‘normal’ IRAT handover case from GERAN to E-UTRAN, bebeneficial if it was possible to provide contention-free access for theUE in the target cell upon IRAT HO, i.e. pre-reserving PRACH resourcesand/or preambles to be used by the UE in the target E-UTRAN cell. Thisis already today possible with intra-RAT handovers between two LTEcells, but not in the IRAT case as discussed here.

Finally, for the 5G High-Frequency case discussed earlier, the very highpathloss in the very high frequency bands considered for 5G makes itdifficult for network and UEs to communicate without the use of advancedmulti-antenna techniques such as e.g. extensive beam forming. Sincedetermination of the precoding matrices needed for beam-forming aretypically dependent on measurements (e.g. CSI measurements for LTE) thatare not available prior to initial access (i.e. RACH), the UE will notbe able to perform random access in such a node/network. So, this is asimilar problem to the above disclosed, thus, albeit that the accesstechnologies are different—the same (or a similar) solution should bepossible.

The method of enabling access to the first wireless network will now bedescribed using FIGS. 3, 4, 5 and 6. The method is e.g. performed in thewireless device 10 of FIG. 1.

FIG. 3 is a signaling diagram showing an overview of the signaling in asystem, comprising a wireless device 10 and first network node 110 and asecond network node 210, when enabling access according to thetechnology disclosed herein. More specifically, FIG. 3 discloses anoverview of all the messages going between the wireless device 10 andthe network nodes 110, 210 when executing the methods in the respectivedevice as will now be described referring to FIGS. 4, 5 and 6.

FIG. 4 shows a method, performed in a wireless device 10 being unable toaccess a first wireless network 100, of enabling access to the firstwireless network 100. According to one aspect, the method is initiatedwhen a wireless device attempts, step S0 a, to connect to the firstwireless network, but does not succeed. Another possibility is that thewireless device is informed about the existence of the first wirelessnetwork, but that it already knows that access is not possible. Onecould e.g. assume that in 5G networks precoding or direction informationwill always be needed. According to one aspect of the proposedtechnique, the wireless device 10 receives, step S0 b, from the secondwireless network 200 an indication of a capability to assist inaccessing the first wireless network 100. Hence, the second wirelessnetwork 200 may inform the wireless device that there is a firstwireless network and that the second wireless network may assist thewireless device 10 in accessing it.

In one exemplary embodiment, the first network is not transmittingsystem information e.g. beacon, sync signals etc. However, the wirelessdevice may be aware of its existence. The second system may then requestthe first network to start transmitting system information such asbeacon etc.

Then, the access procedure assisted by the second wireless network isinitiated. The wireless device typically initiates the procedure. In thefirst step, the wireless device accesses, S1, the second wirelessnetwork 200. This implies that the wireless device and the secondarynetwork have exchanged sufficient information to start exchanging data.In the example with the GERAN, this e.g. implies performing a randomaccess procedure, but it may also comprise making a handover to thesecondary wireless network in other way. Note that, the connection tothe second wireless network may have been established long before theattempt to access the first wireless network is started. Then this stepmay then just imply that the wireless device verifies that theconnection is still there.

In the next step, the wireless device sends S2 information indicating aninability to access the first wireless network 100 to the secondwireless network 200, for further distribution to the first wirelessnetwork 100. An inability to access the network implies e.g. that thewireless device has attempted to access the network and failed asdescribed above. The inability may also depend on that the firstwireless network is “off”, i.e. is not transmitting any systeminformation. Hence, the second wireless network 200 tunnels thisinformation to the first wireless network. Thereby, the wireless deviceenables the first wireless network 100 to reconfigure at least oneaccess procedure parameter in the first wireless network 100 in order toimprove the conditions for the wireless device when accessing firstwireless network. This may be implemented in several ways, dependingwhich network node and/or network that is in control of the accessprocedure. If the network is off, the network may get a request to startto transmit system information.

According to one aspect, the information indicating an inability toaccess to the first wireless network is a request for the first wirelessnetwork to reconfigure at least one access procedure parameter. Then theindication is a request sent from UE that is tunneled via the secondwireless network to first wireless network.

Another possibility is that the second wireless network will request thefirst wireless network to modify its access procedures. A further optionis that the indication just comprises information about the inabilityand that the first wireless network then has to start acting on its owninitiative based on the received information in order to improve theconditions for the wireless device. Improved conditions imply e.g.increased capacity or increased coverage. According to one aspect, thisimplies that the information enables the first wireless network toreconfigure an access procedures parameter such that the coverage of anaccess channel is increased for the wireless device. This may beaccomplished by increasing the power or by directing the receiver of thesecond wireless network towards the wireless device.

In the final step, the wireless device accesses S5 the first wirelessnetwork 100 utilizing at least one reconfigured access procedure. Thatthe device utilizes the reconfigured access procedure expresses that thewireless device makes use of an access procedure having a reconfiguredaccess procedure parameter. Reconfiguration is enabled in the previousstep. Note that the wireless device does not necessarily change itsbehavior. The access procedure may be completely reconfigured on thenetwork side by e.g. muting other transmitters or by directing thereceiver in a certain direction. Hence, this step may imply changes onnetwork and/or on the wireless device side. However, the probability forsuccessfully completing the access procedure is somehow improved for thewireless device.

According to one aspect of the disclosure, the method in a wirelessdevice further comprises the step of receiving S3, from the secondwireless network, information associated with at least one accessprocedure of the first wireless network 100. The received information ise.g. a preamble as described in FIG. 3 or other code to use whenaccessing the first wireless network. The information may typicallyoriginate from first wireless network 100. The information may also be arequest for massive repetitions, increased power or TTI bundling i.e.performing extra/blind retransmissions in advance (i.e. withoutreceiving a NACK before) in order to improve the link budget.

According to one aspect of the disclosure, the received informationcomprises information about at least one access resource or preamblewhich is reserved for the wireless device 10. Hence, the network couldthen further improve the likelihood of the subsequent inter RAT handovere.g. from GERAN to E-UTRAN by commanding the UE to use specificpreambles and/or resources for this purpose, in contrast to the RACHprocedure described in FIG. 2a . According to this aspect, the step ofaccessing S5 the first wireless network 100 comprises using the reservedaccess resource or preamble.

One example in an LTE network is letting a UE perform PRACH access inthe E-UTRAN cell that it is being handed over to, just as would be thecase in the ‘normal’ IRAT handover scenario. But beforehand (viatunneling from E-UTRAN→GERAN) provide the UE with an alreadypre-selected LTE PRACH resource/preamble to use in the E-UTRAN cell,i.e. provide contention-free access for the case of IRAT HO. Themethodology of contention-free access exists already for intra-LTEhandovers, but not for this IRAT case. One possibility is to implementthe intra-RAT handover interfaces in the GERAN node, so that the GERANcan signal the contention free resource towards the first E-UTRAN nodeusing the X2 interface. In the case of a multi-RAT base station this isvery straight forward. Hence, according to this aspect, the step ofaccessing S5 the first wireless network 100 comprises using the reservedaccess resource or preamble.

According to one aspect of the disclosure, the received informationcomprises precoding information and wherein the step of accessing S5 thefirst wireless network 100 comprises using the received precodinginformation. This step may e.g. imply that the wireless device isinformed about a precoding matrix to use in order to direct thetransmission for accessing the first wireless network 100 in the optimalphysical direction. According to one aspect the wireless device mayactually turn/tilt the entire antenna system, which in some special casemay be one possibility for a vehicle mounted system. Precoding may alsobe performed in the signal-space.

As an example embodiment of how received information may be usedconsider the following example relating to a 5G VL-MIMO system. For TDDsystems, e.g. a 5G VL-MIMO system where the UE has a few antennascompared to the network, the functionality for enabling random access tothe 5G-system is more straightforward. In this case the first wirelessnetwork is the 5G VL-MIMO system and the second wireless network is, forexample, E-UTRAN or GERAN. The reason that the procedure is easier hereis that the additional gain needed can be won by a suitable choice ofantenna weights on the base station side. Using reciprocity, it issufficient to listen on a UE UL transmission to enable operation betweenUE and base station. In this case the needed functionality is that theUE can be sufficiently synchronized and assigned a RACH preamble toenable the 5G base station to do reception of the RACH.

In this example the procedure is started as described above, by thewireless device 10 indicating an inability to connect to the network. Inresponse, the second base station sends the RACH preamble (i.e. theradio signal used for random access to the first wireless network) to beused by the UE.

According to one aspect, the second wireless network further signals thetiming and frequency resource used for the RACH procedure using the RACHpreamble to the UE and the first wireless network. The first wirelessnetwork listens to the time and frequency resource and correlates thereceived signal using RACH preamble as signaled by the second wirelessnetwork. The first wireless network then continues the RACH procedureusing the antenna weights determined from the RACH preamble receptionfrom the UE.

For the integration of this new functionality into the mobilityframework of the 3GPP core network the configuration messages needed arespecific for the choice of first wireless network and second wirelessnetworks. That this is possible is quite clear as mobility is assumed tobe supported in the first wireless network but the interfaces isdifferent, e.g. E-UTRAN enables intra-RAT mobility through X2 andS1-MME. Furthermore, the case of a first 5G network the naming of thenetwork entities and interfaces implementing the functionality describedis unknown.

According to one aspect of the disclosure, the method in a wirelessdevice further comprises the step of sending S4 information to be usedin at least one access procedure in the first wireless network 100, tothe second wireless network 200 for further distribution to the firstwireless network 100. This aspect implies that the wireless device sendsinformation to the second wireless network, which is supposed tofacilitate the connection to the first wireless network. One example ofsuch information is measurement reports on at least one signaltransmitted from the first wireless network.

According to one aspect, the step of receiving S3 information associatedwith at least one access procedure comprises receiving S3 c from thefirst wireless network 100 a request to transmit at least one referencesignal. Then, the method further comprises transmitting S4 c the atleast one reference signal. For example the E-UTRAN commands a UE tostart transmitting a reference signal e.g. LTE sounding referencesignals whilst still in GERAN in order to provide the LTE RAN with abetter estimate of the uplink conditions for the UE. This mechanism iscurrently not supported by the current 3GPP standard, and hence needs tobe standardized. This could include letting the UE indicate at an earlystage to the GERAN to which E-UTRAN cell it tried to perform access,which would make it easier for the GERAN cell to know which E-UTRAN nodeto contact.

Letting the UE do dedicated uplink transmissions in E-UTRAN can alsoenable the network to time align with the UE. Further enhancements ofthis procedure could use the GERAN time alignment or a dedicated PUSCHtransmission designed for time alignment purposes, similar to RACH.

It is, in the examples above, assumed that the network knows theneighbor relations between the base stations, for example throughintra-rat Automatic Neighbor Relation, ANR, functionality. For somecases, e.g. when the first RAT is 5G with VL-MIMO base stations, oneimportant use case is that the second base station uses the samephysical position as the first 5G base station. This enables theassumption that some basic radio parameters are the same between thefirst and second base station, for example, the timing between UL and DLfor synchronization purposes.

The corresponding method performed in a first network node, or inseveral network nodes, in a first wireless network will now be explainedin further detail. In principle, the functionality could be distributedbetween two or more processing nodes in the first wireless network,where each node has its own complement of processing circuitry andmemory and communication interfaces. However, for simplicity, in thisexample the method is performed in one network node in the firstwireless network.

FIG. 5 is a flow chart illustrating the proposed method performed infirst network node in a first wireless network of enabling a wirelessdevice being unable to access a first wireless network, to access thefirst wireless network. As explained above the method is typicallystarted by a wireless device 10 that indicates, step S1 of FIG. 4, aninability to connect to the first system. This indication is thenforwarded by the second wireless network to the first wireless network.The message transmitted by the wireless device may be directlyforwarded, i.e. without any processing in the second wireless network.Alternatively, a new message comprising information about the inabilityis sent from the first network to the second wireless network.

Hence, in the first step executed in the first wireless network, thefirst network node receives S11 from a second wireless network 200information indicating an inability of the wireless device 10 to accessthe first wireless network 100. Referring back to FIG. 4, this stepimplies that the information that the wireless device 10 is unable toaccess the primary wireless network, as sent in S2, has reached thefirst wireless network 100. As explained above, this may be accomplishedin several ways. One possibility is that the information is tunneled allthe way to the first wireless network. However, there may as well beseveral intermediate nodes involved in forwarding and analyzing theinformation. The principle is that the first wireless network gets holdof the information that a modification is needed. Hence, after receivingthe indication one or several intermediate steps are typicallyperformed, which will be exemplified below. Hence, according to someaspects of the disclosure the method further comprises that data isexchanged between the wireless device and the first wireless network, aswill be explained in relation to steps S12 and S13.

Then, the first network node reconfigures S14 at least one accessprocedure parameter in the first wireless network 100 based on thereceived information in order to improve the conditions for the wirelessdevice 10 when accessing first wireless network 100. The reconfigurationmay be done before or after data exchange, depending on how thereconfiguration is performed. According to one aspect of the disclosure,the at least one access procedure parameter is reconfigured such thatcoverage of the first wireless network is modified to provide coveragefor the wireless device 10. Hence, the coverage is e.g. extended bymodifying the physical direction of receiver of the first network node110.

According to one aspect of the disclosure, the method further comprisessending S12 information associated with the at least one reconfiguredaccess procedure parameter in the first wireless network 100 to thesecond wireless network 200 for further distribution to the wirelessdevice 10. The information is e.g. a preamble, resource information, arequest for measurements etc as described in the different examplesabove and below.

According to one aspect of the disclosure, the method further comprisesreceiving S13, from the second wireless network 200, information to beused in at least one access procedure in the first wireless network 100.As an example, the wireless device 10 may e.g. send measurementsperformed on a reference signal transmitted from the first wirelessnetwork 110. By receiving such measurements the first wireless networknode may e.g. adapt its receiver depending on the precoding used by thewireless device or redirect its receiver in order to optimize thereception when the wireless device accesses the network. Hence,according to one aspect the step of reconfiguring S14 the accessprocedure or procedures comprises informing the receiver of the radionetwork node 110 about the precoding used by the wireless device. Thereceiver may then be adjusted to match the precoder used by the wirelessdevice.

According to one aspect the step of reconfiguring S14 the accessprocedure or procedures comprises reconfiguring the coding or resourcesto be used for S14 d accessing the first wireless network 100.

The corresponding method performed in a second network node, or inseveral network nodes, in a second wireless network will now beexplained in further detail. In principle, the functionality could bedistributed between two or more processing nodes, where each node hasits own complement of processing circuit and memory and communicationinterfaces. However, for simplicity, in this example the method isperformed in one network node in the second wireless network.

FIG. 6 is a flow chart illustrating the proposed method performed insecond network node in a second wireless network, of enabling a wirelessdevice being unable to access a first wireless network, to access thefirst wireless network. As described above the procedure is initiatedwhen a wireless device 10 indicates an inability to connect to thewireless network 110.

In the first step of the method performed in the second wirelessnetwork, the second network node receives S21 from the wireless device10 information indicating an inability to access the first wirelessnetwork. The second wireless network may then either just forward theinformation to the first wireless network. In this case the logic indetermining how to modify the access procedure will be placed in thefirst wireless network. Alternatively, the second wireless networkprocesses the received indication.

In the next step the second network node sends S22 to the first wirelessnetwork 200 information indicating an inability of the wireless device10 to access to the first wireless network 100, thereby enabling thefirst wireless network 100 to reconfigure at least one access procedureparameter in the first wireless network 100 to increase the coverage forthe device. This could be implemented in several ways. For example, theinformation received in the first step could be a tunneled message i.e.a message sent from the wireless device which is forwarded to the firstwireless network without any analysis in the second wireless network.Tunneling is typically used when one tunnels info in a transparentmanner through some other node or network. However, there could also bea direct interface between both networks serving the very same purpose.

According to one aspect the method further comprises indicating S20 acapability to assist a wireless device 10 in accessing the firstwireless network 100. One option is to broadcast system informationstating that: “There is a first wireless network and if you want toaccess it please use me”.

According to one aspect, the method further comprises tunneling S23information associated with at least one access procedure of the firstwireless network 100, from the first wireless network 100 to thewireless device 10. Such information is e.g. a request to transmit asounding signal as will be further described in relation to FIG. 9.

According to one aspect, the method further comprises tunneling S24information to be used in at least one access procedure of the firstwireless network 100, from the wireless device 10 to the first wirelessnetwork 100. As described above the access procedure may be assisted bysending e.g. measurements on at least one signal transmitted from thefirst wireless network.

FIG. 7 illustrates an overview of the signaling in a system whenenabling access to a first wireless network according to a first exampleembodiment.

In this example the wireless device first accesses S1 the secondarynetwork and sends an indication of inability to connect to the networkto the second wireless network. The indication is forwarded S21,S22 bythe second wireless network and received by the second wireless network.

The first wireless network sends information S12 a about at least oneaccess resource or preamble which is reserved for the wireless device 10to the second wireless network, for further distribution to the wirelessdevice 10. The wireless device 10 receives S3 a the resource and/orpreamble information. Finally the wireless device accesses S5 a thenetwork using the received information.

FIG. 8 illustrates an overview of the signaling in a wireless networkwhen enabling access to a first wireless network according to a secondexample embodiment. According to another example embodiment the proposedtechnique enhances the existing, and earlier described RACH accessprocedure for a wireless device being a multi-RAT capable UE. In thisexample the first RAT is E-UTRAN and the second RAT is GERAN.

The UE is configured, according to legacy procedures, with a set ofcamping/access rules/strategies, which are determined between the corenetwork and the UE. Hence the radio access network is typically notaware of this set of rules/strategies. Now, for the sake of thisdisclosure, assume that this configuration is so that the preferred(first) RAT for camping for this UE is E-UTRAN. If now, the UE finds anE-UTRAN cell that suffices requirements for camping/access, but isunable to connect to it, the UE will now instead perform access S1 in acovering GERAN cell that possibly indicates e.g. in the systeminformation its capability to support assistance for E-UTRAN RACH accessprocedures/LTE coverage extension, if such one is available. Upon doingso, the UE will indicate S2/21 explicitly to the second wireless networkthat it failed to connect to the E-UTRAN and also to which specificcell.

The GERAN will thereafter inform S22/S11 the E-UTRAN about thissituation—i.e. that a UE failed to make access to the specific E-UTRANcell but is now connected to a GERAN cell. Possibly, some positioningand/or some initial measurement information regarding the UE could beincluded together with this information.

The E-UTRAN may thereafter (if not doing so already) start transmissionS125 of UE and/or cell-specific reference signals, which the UE issubsequently commanded S12 b/S3 b to measure on via a commands tunneledfrom E-UTRAN to GERAN. For transmission in GERAN, the correspondingmeasurement command needs to be updated accordingly.

The UE will now perform measurements S31 on these E-UTRAN referencesymbols, where after the resulting CSI measurement reports (i.e. CQI andrank measurements) are tunneled back to the LTE RAN S4 b/S13 b. Thisactual tunneling mechanism existing today can probably be used (RIM, see3GPP TS 48.018 (Release 10)), even though E-UTRAN measurement reports(e.g. the ENHANCED MEASUREMENT REPORT needs to be updated in order toconvey CSI reports (today only RSRP/RSRQ can be included).

Now, the E-UTRAN has all the information it requires in order toactively enhance the downlink E-UTRAN coverage for the UE by means ofactivate coverage enhancing features such as e.g. user-specificbeamforming for this very UE, activation of TTI bundling or more robustencoding. Other possibilities include antenna tilt or other AAS relatedfunctionality.

Hence, a subsequent access attempt S5 b such as a inter-RAT handoverfrom GERAN to E-UTRAN will have a increased likelihood of success whenusing the measurements. This example embodiment is not restricted toGERAN to E-UTRAN, but the same principle may be implemented in anynetwork.

FIG. 9 illustrates an overview of the signaling in a wireless networkwhen enabling access to a first wireless network according to a thirdexample embodiment. In this example, as in the other's the wirelessdevice first accesses S1 the secondary network and sends an indicationof an inability to connect to the network to the second wirelessnetwork. The indication is forwarded S21,S22 by the second wirelessnetwork and received by the second wireless network. In this example thefirst wireless network 100 then sends a request S12 c for the wirelessdevice 10 to transmit at least one reference signal. The wireless devicereceives S3 c this request and starts to transmit S4 c the requestedreference signal.

For example, the E-UTRAN also command the UE to start transmitting e.g.LTE sounding reference signals whilst still in GERAN in order to providethe LTE RAN with a better estimate of the uplink conditions for the UE.This mechanism is currently not supported by the current 3GPP standard,and hence need to be standardized. This could include letting the UEindicate at an early stage to the GERAN to which E-UTRAN cell it triedto perform access, which would make it easier for the GERAN cell to knowwhich E-UTRAN node to contact.

The reference signal is typically received S14 c by the first wirelessnetwork node 110 and at least one access procedure parameter is modifiedS14 c based on the reception e.g. by calculating the channel between thewireless device and the first network node 110. Thereby the chance for asuccessful access procedure S5 increases.

Turning now to FIG. 10, a schematic diagram illustrating some modules ofan example embodiment of a wireless device 10 configured to access afirst wireless network 100, when the wireless device is unable to accessthe first wireless network 100, will be described. In this applicationthe term wireless device 10 is any wireless device able to wirelesslyconnect to the first and second wireless network. The wireless device istypically a user equipment, UE, but is may as well be a M2M device.

The wireless device 10 comprises a controller, CTL, or a processingcircuitry 12 that may be constituted by any suitable Central ProcessingUnit, CPU, microcontroller, Digital Signal Processor, DSP, etc. capableof executing computer program code. The computer program may be storedin a memory, MEM 13. The memory 13 can be any combination of a Read Andwrite Memory, RAM, and a Read Only Memory, ROM. The memory 13 may alsocomprise persistent storage, which, for example, can be any single oneor combination of magnetic memory, optical memory, or solid state memoryor even remotely mounted memory.

The wireless device 10 further comprises a radio communication interface(i/f), 11. The wireless communication interface 11 is arranged forwireless communication with wireless devices within range of thewireless device 10 The radio communication interface 11 may be adaptedto communicate over one or several radio access technologies. If severaltechnologies are supported, the node typically comprises severalcommunication interfaces, e.g. one WLAN or Bluetooth communicationinterface 11 a and one cellular communication interface 11 b. a radiocommunication interface 111 configured to communicate with the first andsecond wireless networks 100, 200.

When the above-mentioned computer program code is run in the processingcircuitry 11 of the wireless device 10, it causes the wireless device 10to send information indicating an inability to access the first wirelessnetwork 100 to the second wireless network 200, for further distributionto the first wireless network 100, thereby enabling the first wirelessnetwork 100 to reconfigure at least one access procedure parameter inthe first wireless network 100 in order to improve the conditions forthe wireless device when accessing first wireless network and access thefirst wireless network 100 utilizing at least one reconfigured accessprocedure.

According to one aspect of the disclosure the processing circuitry 12comprises one or several of:

-   -   a first access module 121 configured to access a second wireless        network 200,    -   a first sender module 122 configured to send information        indicating an inability to access the first wireless network to        the second wireless network, for further distribution to the        first wireless network, thereby enabling the first wireless        network to reconfigure at least one access procedure parameter        in the first wireless network in order to improve the conditions        for the wireless device when accessing first wireless network,    -   a second access module 123 configured to access the first        wireless network utilizing at least one reconfigured access        procedure.

According to one aspect the disclosure the processing circuitry 12further comprises a receiver module 124 configured to receive, from thesecond wireless network 200, information associated with at least oneaccess procedure of the first wireless network 100.

According to one aspect the disclosure the processing circuitry 12further comprises a second sender module 125 configured to sendinformation to the second wireless network 200 for further distributionto the first wireless network 100.

The first, second access modules 121, 123 and the first and secondsender modules 122, 125 and the receiver module 124 are implemented inhardware or in software or in a combination thereof. The modules 121,122, 123, 124, 125 are according to one aspect implemented as a computerprogram stored in a memory 13 which run on the processing circuitry 12.The wireless device 10 is further configured to implement all theaspects of the disclosure as described in relation to the methods above.The processing circuitry also comprises the corresponding modules.

According to one aspect the disclosure further relates to the abovementioned computer program, comprising computer readable code which,when run on an wireless device, causes the node to perform any of theaspects of the method described above.

Turning now to FIG. 11a , a schematic diagram illustrating some modulesof an example embodiment of a first network node 110 being configured toenable a wireless device 10, being unable to access a first wirelessnetwork 100, to access the first wireless network 100, will bedescribed. In this application the term network node is generally used.A network node is any node in the wireless communication network e.g. aRBS or an eNodeB.

The first network node 110 comprises a controller, CTL, or a processingcircuitry 113 that may be constituted by any suitable Central ProcessingUnit, CPU, microcontroller, Digital Signal Processor, DSP, etc. capableof executing computer program code. The computer program may be storedin a memory, MEM 114. The memory 114 can be any combination of a ReadAnd write Memory, RAM, and a Read Only Memory, ROM. The memory 13 mayalso comprise persistent storage, which, for example, can be any singleone or combination of magnetic memory, optical memory, or solid statememory or even remotely mounted memory.

The first network node 110 further comprises a radio communicationinterface (i/f), 111. The wireless communication interface 111 isarranged for wireless communication with wireless devices within rangeof the first network node 110. The radio communication interface may beadapted to communicate over one or several radio access technologies. Ifseveral technologies are supported, the node typically comprises severalcommunication interfaces, e.g. one WLAN or Bluetooth communicationinterface 12 a and one cellular communication interface 12 b. a radiocommunication interface 111 configured to communicate with the wirelessdevice 10.

The first network node 110 further comprises a network communicationinterface (i/f), 112. The network communication interface 112 isarranged for wireless communication with a second wireless network. Ifthe method is performed in a distributed system, the networkcommunication interface 112 may be implemented in a separate node withinthe first wireless network.

When the above-mentioned computer program code is run in the processingcircuitry 11 of the first network node 110, it causes the first networknode 110 to receive, using the network communication interface 112, fromthe second wireless network 200 information indicating an inability ofthe wireless device 10 to access the first wireless network 100, and toreconfigure an access procedure parameter in the first wireless network100 based on the received information.

According to one aspect of the disclosure the controller comprises oneor several of:

-   -   a first receiver module 1131 configured to receive from a second        wireless network 200 information indicating an inability of the        wireless device 10 to access the first wireless network 100, and    -   a reconfiguring module 1132 configured to reconfigure an access        procedure or procedures provided in the first wireless network        100 based on the received information in order to improve the        conditions for the wireless device 10 when accessing first        wireless network 100.

According to one aspect of the disclosure the processing circuitry 113further comprises a sender module 1133 configured to send informationassociated with the at least one access procedure of the first wirelessnetwork 100 to the second wireless network 200 for further distributionto the wireless device 10.

According to one aspect of the disclosure the processing circuitry 113further comprises a second receiver module 1134 configured to receiveS13, from the second wireless network 200, information to be used in atleast one access procedure in the first wireless network 100.

The first and second receiver modules 1131, 1134, the reconfiguringmodule 1132 and the sender module 1133 are implemented in hardware or insoftware or in a combination thereof. The modules 1131, 1132, 1133, 1134are according to one aspect implemented as a computer program stored ina memory 214 which run on the processor 213. The processing circuitry213 is further configured to implement all the aspects of the disclosureas described in relation to the methods above and it also comprises thecorresponding modules.

According to one aspect the disclosure further relates to the abovementioned computer program, comprising computer readable code which,when run on a first network node in a first wireless network, causes thefirst network node to perform any of the aspects of the method describedabove.

Turning now to FIG. 11b , a schematic diagram illustrating some modulesof an example embodiment of a second network node 210 in a secondwireless network being configured to enable a wireless device 10, beingunable to access a first wireless network 100, to access the firstwireless network 100, will be described. In this application the termnetwork node is generally used. The network node is any node in thewireless communication network e.g. a RBS or an eNodeB.

The second network node 210 comprises a controller, CTL, or a processingcircuitry 213 that may be constituted by any suitable Central ProcessingUnit, CPU, microcontroller, Digital Signal Processor, DSP, etc. capableof executing computer program code. The computer program may be storedin a memory, MEM 114. The memory 214 can be any combination of a ReadAnd write Memory, RAM, and a Read Only Memory, ROM. The memory 214 mayalso comprise persistent storage, which, for example, can be any singleone or combination of magnetic memory, optical memory, or solid statememory or even remotely mounted memory.

The second network node 210 further comprises a radio communicationinterface (i/f), 211. The radio communication interface 111 is arrangedfor wireless communication with wireless devices within range of thesecond network node 210. The radio communication interface may beadapted to communicate over one or several radio access technologies. Ifseveral technologies are supported, the node typically comprises severalcommunication interfaces, e.g. one WLAN or Bluetooth communicationinterface 12 a and one cellular communication interface 12 b. a radiocommunication interface 111 configured to communicate with the wirelessdevice 10.

The second network node 210 further comprises a network communicationinterface (i/f), 212. The network communication interface 212 isarranged for communication with the first wireless network. If themethod is performed in a distributed system, the network communicationinterface 212 may be implemented in a separate node within the secondwireless network, i.e. not necessarily in the network node implementingthe access procedure.

When the above-mentioned computer program code is run in the processingcircuitry 211 of the second network node 210, it causes the secondnetwork node 210 to receive, using the radio communication interface211, from the wireless device 10 information indicating an inability toaccess the first wireless network and send, using the networkcommunication interface 212, to the first wireless network 200information indicating an inability of the wireless device 10 to accessto the first wireless network 100, thereby enabling the first wirelessnetwork 100 to reconfigure at least one access procedure parameter inthe first wireless network 100 to increase the coverage for the wirelessdevice 10.

According to one aspect of the disclosure the controller 213 comprisesone or several of:

-   -   a receiver module 2131 configured to receive from the wireless        device 10 information indicating an inability to access the        first wireless network 100, and    -   a sender module 2132 configured to send S22 to the first        wireless network 100 information indicating an inability of the        wireless device 10 to access to the first wireless network 100,        thereby enabling the first wireless network 100 to reconfigure        at least one access procedure parameter in the first wireless        network 100 in order to improve the conditions for the wireless        device 10 when accessing first wireless network 100.

According to one aspect the disclosure the processing circuitry 2130further comprises an indicator 1133 configured to indicate a capabilityto assist a wireless device in accessing the first wireless network 100.

According to one aspect the disclosure the processing circuitry 2133further comprises a first tunneling module 2133 configured to tunnelinformation associated with at least one access procedure of the firstwireless network 100, from the first wireless network 100 to thewireless device 10. According to one aspect the disclosure theprocessing circuitry 2134 further comprises a second tunneling module2133 configured to tunnel information to be used in at least one accessprocedure of the first wireless network 100, from the wireless device 10to the first wireless network 100.

The indicator 2130, the receiver module 2131 and the sender module 2132and the first and second tunneling modules 2133, 2134 are implemented inhardware or in software or in a combination thereof. The modules 2130,2131, 2132, 2133, 2134 are according to one aspect implemented as acomputer program stored in a memory 214 which runs on the processor 213.The processing circuitry 213 is further configured to implement all theaspects of the disclosure as described in relation to the methods aboveand it also comprises the corresponding modules.

According to one aspect the disclosure further relates to the abovementioned computer program, comprising computer readable code which,when run on an node in a second wireless network, causes the secondnetwork node to perform any of the aspects of the method describedabove.

The invention claimed is:
 1. A method, performed in a wireless device being unable to access a first wireless network, of enabling access to the first wireless network, the method comprising: receiving, from a second wireless network, information indicating a capability of the second wireless network to assist in accessing the first wireless network; accessing the second wireless network; sending information indicating an inability to access the first wireless network to the second wireless network, for further distribution to the first wireless network, thereby enabling the first wireless network to reconfigure at least one access procedure parameter in the first wireless network in order to improve the conditions for the wireless device when accessing first wireless network; and subsequently accessing the first wireless network, utilizing at least one reconfigured access procedure.
 2. The method of claim 1, further comprising receiving, from the second wireless network, information associated with at least one access procedure of the first wireless network.
 3. The method of claim 2, wherein the received information comprises information about at least one access resource or preamble that is reserved for the wireless device, and wherein the step of accessing the first wireless network comprises using the reserved access resource or preamble.
 4. The method of claim 3, wherein the step of receiving information associated with at least one access procedure comprises receiving, from the first wireless network, a request to transmit at least one reference signal; and wherein the method further comprises transmitting the at least one reference signal.
 5. The method of claim 2, wherein the received information comprises precoding information, and wherein the step of accessing the first wireless network comprises using the received precoding information.
 6. The method of claim 1, further comprising sending, to the second wireless network for further distribution to the first wireless network, information to be used in at least one access procedure in the first wireless network.
 7. The method of claim 1, wherein the information indicating an inability to access to the first wireless network is a request for the first wireless network to reconfigure at least one access procedure parameter in the first wireless network.
 8. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising computer program code that, when executed in a wireless device being unable to access a first wireless network, causes the wireless device to: receive, from a second wireless network, information indicating a capability of the second wireless network to assist in accessing the first wireless network; access the second wireless network; send information indicating an inability to access the first wireless network to the second wireless network, for further distribution to the first wireless network, thereby enabling the first wireless network to reconfigure at least one access procedure parameter in the first wireless network in order to improve the conditions for the wireless device when accessing first wireless network; and subsequently access the first wireless network, utilizing at least one reconfigured access procedure.
 9. A method performed in one or more network nodes in a first wireless network, of enabling a wireless device, being unable to access the first wireless network, to access the first wireless network, the method comprising: receiving, from a second wireless network indicating a capability to assist in accessing the first wireless network, information indicating an inability of the wireless device to access the first wireless network, reconfiguring at least one access procedure provided in the first wireless network, based on the received information, in order to improve the conditions for the wireless device when accessing the first wireless network, and sending information associated with the at least one access procedure of the first wireless network to the second wireless network for further distribution to the wireless device.
 10. The method of claim 9, wherein the step of reconfiguring the at least one access procedure comprises reconfiguring an access procedure parameter such that coverage of the first wireless network is modified to provide coverage for the wireless device.
 11. The method of claim 9, wherein the information comprises information about at least one access resource or preamble which is reserved for the wireless device.
 12. The method of claim 9, wherein the information comprises a request for the wireless device to transmit at least one reference signal.
 13. The method of claim 9, further comprising receiving, from the second wireless network, information to be used in at least one access procedure in the first wireless network.
 14. The method of claim 9, wherein the step of reconfiguring the at least one access procedure comprises reconfiguring the coding or resources to be used for accessing the first wireless network.
 15. The method of claim 9, wherein the step of reconfiguring the at least one access procedure comprises informing a receiver of the radio network node about the precoding used by the wireless device.
 16. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising computer program code that, when executed in a network node in a first wireless network, causes the network node to execute a method of enabling a wireless device, being unable to access the first wireless network, to access the first wireless network, the computer program code comprising instructions for: receiving, from a second wireless network indicating a capability to assist in accessing the first wireless network, information indicating an inability of the wireless device to access the first wireless network, reconfiguring at least one access procedure provided in the first wireless network, based on the received information, in order to improve the conditions for the wireless device when accessing the first wireless network, and sending information associated with the at least one access procedure of the first wireless network to the second wireless network for further distribution to the wireless device.
 17. A method, performed in one or more network nodes in a second wireless network, of enabling a wireless device being unable to access a first wireless network to access the first wireless network, the method comprising the steps: transmitting information indicating a capability of the second wireless network to assist in accessing the first wireless network; receiving, from the wireless device, information indicating an inability to access the first wireless network; and sending, to the first wireless network, information indicating an inability of the wireless device to access to the first wireless network, thereby enabling the first wireless network to reconfigure at least one access procedure parameter in the first wireless network in order to improve the conditions for the wireless device when accessing first wireless network.
 18. The method according to claim 17, further comprising tunneling information associated with at least one access procedure of the first wireless network, from the first wireless network to the wireless device.
 19. The method according to claim 17, further comprising tunneling information to be used in at least one access procedure of the first wireless network, from the wireless device to the first wireless network.
 20. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising computer program code that, when executed in a wireless network node in a second wireless network, causes the wireless network node to enable a wireless device being unable to access a first wireless network to access the first wireless network, the computer program code comprising instructions for: transmitting information indicating a capability of the second wireless network to assist in accessing the first wireless network; receiving, from the wireless device, information indicating an inability to access the first wireless network; and sending, to the first wireless network, information indicating an inability of the wireless device to access to the first wireless network, thereby enabling the first wireless network to reconfigure at least one access procedure parameter in the first wireless network in order to improve the conditions for the wireless device when accessing first wireless network.
 21. A wireless device comprising: a radio communication interface configured to communicate with a first radio network node in the first wireless network and with a second radio network node in a second wireless network, and processing circuitry configured to cause the wireless device to, when the wireless device is unable to access the first wireless network: receiving, from the second wireless network, information indicating a capability of the second wireless network to assist in accessing the first wireless network; access the second wireless network; send information indicating an inability to access the first wireless network to the second wireless network, for further distribution to the first wireless network, thereby enabling the first wireless network to reconfigure at least one access procedure parameter in the first wireless network in order to improve the conditions for the wireless device when accessing first wireless network; and subsequently access the first wireless network utilizing at least one reconfigured access procedure.
 22. A first network node in a first wireless network, configured to enable a wireless device, being unable to access the first wireless network, to access the first wireless network, the first wireless network node comprising: a radio communication interface configured to communicate with the wireless device, a network communication interface configured to communicate with a second wireless network indicating a capability to assist in accessing the first wireless network, and processing circuitry configured to cause the first network node to: receive, using the network communication interface, from the second wireless network, information indicating an inability of the wireless device to access the first wireless network; and reconfigure an access procedure parameter in the first wireless network, based on the received information, in order to improve the conditions for the wireless device when accessing first wireless network.
 23. A second network node in a second wireless network configured to enable a wireless device being unable to access a first wireless network to access the first wireless network, the second wireless network node comprising: a radio communication interface configured to communicate with the wireless device, a network communication interface configured to communicate with a first wireless network, and a processing circuitry configured to cause the second network node to: transmitting, using the radio communication interface, information indicating a capability of the second wireless network to assist in accessing the first wireless network; receive, using the radio communication interface, from the wireless device, information indicating an inability to access the first wireless network; and send, using the network communication interface, to the first wireless network, information indicating an inability of the wireless device to access to the first wireless network, thereby enabling the first wireless network to reconfigure at least one access procedure parameter in the first wireless network in order to improve the conditions for the wireless device when accessing first wireless network. 