Radio Communication System, Method and Arrangement for Use in a Radio Communication System

ABSTRACT

A system includes a first access network arranged to operate according to a first Radio Access Technology, a second access network arranged to operate according to a second Radio Access Technology, and a user device which is connectable to the first access network and to the second access network. The system also includes an authentication node arranged to identify the user device, when seeking access to the second access network, through a user device identifier for the user device, wherein the user device identifier is associated with the first access network. A query node provides information about a context of the user device in the first access network based on the user device identifier. An access selection node generates an access selection decision for the access sought by the user device to the second access network based on the provided context, and the access selection decision is then executed.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. National Stage applicationSer. No. 13/697,767 filed Nov. 13, 2012, which is a 35 U.S.C. §371 earlynational stage application of PCT International Application No.PCT/SE2012/051007, filed on 24 Sep. 2012, which claims priority to U.S.Provisional Application No. 61/644,040, filed on 8 May 2012. Thedisclosures of the above referenced applications are hereby incorporatedherein in their entireties by reference.

TECHNICAL FIELD

The present invention generally relates to mobile communication. Moreparticularly, the invention relates to a radio communication systemcomprising a first access network arranged to operate according to afirst Radio Access Technology, a second access network arranged tooperate according to a second Radio Access Technology, and a user devicewhich is connectable to the first access network and to the secondaccess network. The invention also relates to a method and anarrangement for use in a radio communication system as referred toabove, and to an associated computer readable storage medium.

BACKGROUND

Different Radio Access Technologies (RAT:s) are available in the modernworld of mobile communication, allowing a user of a user device such asa mobile terminal (User Equipment (UE)) to access communication serviceslike voice calls, Internet browsing, video calls, file transmissions,audio/video streaming, electronic messaging and e-commerce. Radio AccessTechnologies can be divided into different categories.

A first and probably most widely spread category includes RATs suitablefor use in mobile or cellular telecommunications systems like GSM(Global System for Mobile Communications), UMTS (Universal MobileTelecommunications System), FOMA (Freedom of Mobile Multimedia Access),EPS (Evolved Packet System), D-AMPS (Digital-Advanced Mobile PhoneService), CDMA2000 (Code Division Multiple Access 2000) or WiMAX(Worldwide Interoperability for Microwave Access). Common examples ofRATs in this first category are 3GPP (3rd Generation PartnershipProject) GPRS/EDGE (General Packet Radio Service/Enhanced Data rates forGlobal Evolution), 3GPP WCDMA/HSPA (Wideband Code Division MultipleAccess/High-Speed Packet Access), 3GPP LTE/E-UTRAN (Long-TermEvolution/Evolved Universal Terrestrial Radio Access Network), andTD-SCDMA (Time Division Synchronous Code Division Multiple Access).

A second category includes RATs which are suitable for use inshort-range wireless communication networks, such as Wi-Fi or WLAN(Wireless Local Area Network). One example of a RAT in this secondcategory is the IEEE 802.11 family of wireless standards. Other examplesinclude Bluetooth and NFC (Near-Field Communication).

Most user devices are nowadays enabled for use with more than one RAT,such as one or more RATs selected from the first category, as well asone or more RATs selected from the second category. A mobile terminal,from now on referred to as User Equipment or UE, enabled both forcellular access (e.g. 3GPP LTE/E-UTRAN and/or WCDMA/HSPA for use in EPSand/or UMTS) and for Wi-Fi access, will be used herein as an example ofsuch a multi-RAT-enabled user device.

Because of the inherent differences in architecture and operationbetween mobile telecommunications networks on the one hand and Wi-Finetworks on the other hand, in many existing setups there has not beenany integration between the two. Allowing two such networks to co-existin parallel but “hidden” from each other is fully acceptable, but notoptimal from resource utilization, load distribution and user experienceperspectives. Therefore, certain integration attempts have been made, aswill now be described in some greater detail, however only forbackground purposes.

Introduction

Operators of mobile telecommunications networks are today mainly usingWi-Fi to offload traffic from the mobile networks, but the opportunityto improve end-user experience regarding performance is also becomingmore important. The current Wi-Fi deployments are mainly totallyseparate from mobile networks, and are to be seen as non-integrated. Theusage of Wi-Fi is mainly driven due to the free and wide unlicensedspectrum, and the increased availability of Wi-Fi in mobile terminalslike smartphones and tablets. The end-users are also becoming more andmore at ease with using Wi-Fi for example at offices and homes.

The different business segments for Wi-Fi regarding integrationpossibilities can be divided into mobile operator hosted/controlledversus third-party hosted/-controlled Wi-Fi APs (Access Points). Here,“third-party” is seen as anything else than a mobile operator, and thatthe third-party is not totally “trusted” by the mobile operator. Athird-party could be for example a Wi-Fi operator or an end-userhimself/-herself. In both segments there exist public/hotspot,enterprise and residential deployments.

Different Types of Wi-Fi Integration to Mobile Networks

Wi-Fi integration towards the mobile core network is emerging as a goodway to improve the end-user experience further. These solutions consistmainly of the following components: common authentication between 3GPPand Wi-Fi, and integration of Wi-Fi user plane traffic to the mobilecore network. The common authentication is based on automatic(U)SIM-based ((Universal) Subscriber Identity Module) authentication inboth access types. The Wi-Fi user plane integration gives the mobileoperator an opportunity to provide the same services, like parentalcontrol and subscription-based payment methods, for the end-users bothwhen connected via 3GPP and when connected via Wi-Fi. Differentsolutions are standardized in 3GPP. Overlay solutions (S2b, S2c) havebeen specified since 3GPP Release 8, while integration solutions (S2a)are currently work-in-progress (S2a, S2b, S2c indicating the 3GPPinterface/reference point names towards the PDN-GW). These solutions arespecified in 3GPP TS 23.402 (current version=11.3.0), which can beobtained from the website of the 3rd Generation Partnership Project athttp://www.3gpp.com/.

Wi-Fi integration into radio access network (RAN) is also emerging as aninteresting study object. This has basically two different possiblelevels that could be implemented either separately or together. A firstlevel of integration is to combine both 3GPP and Wi-Fi in the small picobase stations to gain access to the Wi-Fi sites with 3GPP technology,and vice versa. A second level of integration is to integrate the Wi-Fiaccess tighter into the RAN by introducing enhanced network controlledtraffic steering between 3GPP and Wi-Fi based on knowledge about thetotal situation on the different accesses. The driver for this secondlevel of integration could be to avoid potential issues with UE (UserEquipment) controlled Wi-Fi selection, such as selecting Wi-Fi when theWi-Fi connection is bad or when the UE is moving, thus giving betterend-user performance and better utilization of the combined Wi-Fi andcellular radio network resources.

FIG. 1 illustrates an existing network architecture for integration of amobile telecommunications system 110 in the form of an EPS system, and aWi-Fi access network 120. As is well known, EPS was introduced in 3GPPRelease 8 and Release 9. For detailed information about EPS, referenceis made to 3GPP TS 23.401 (current version=11.2.0). The mobiletelecommunications (EPS) system 110 comprises a radio access network 112known as E-UTRAN (Evolved Universal Terrestrial Radio Access Network)and a core network 114 known as EPC (Evolved Packet Core). The E-UTRANhas a combined base station and radio network controller known aseNodeB. The EPC has units known as MME (Mobility Management Entity) anda Serving GW (Gateway). As is seen in FIG. 1, the eNodeB is connectedvia the S1 interfaces, S1-MME and S1-U to the MME and Serving GW,respectively. FIG. 1 also shows how the Wi-Fi access network 120 isconnected to the PDN-GW via the S2a interface and to the 3GPP AAA Servervia the STa interface. The shown Wi-Fi access network is just an exampledeployment and contains a Wi-Fi Access Point (AP), a Wi-Fi AccessController (AC) and a Broadband Network Gateway (BNG).

Background to Hotspot 2.0

Different standards organizations have started to recognize the needsfor an enhanced user experience for Wi-Fi access, this process beingdriven by 3GPP operators. An example of this is the Wi-Fi Alliance withthe Hotspot 2.0 (HS2.0) initiative, now officially called PassPoint. Fordetailed information about Hotspot 2.0, reference is made to Wi-FiAlliance Hotspot 2.0 (Release 1) TS Version 1.0.0, which can be obtainedfrom the website of the Wi-Fi Alliance at http://www.wi-fi.org/. HS2.0is primarily geared towards Wi-Fi networks. HS2.0 builds on IEEE802.11u, and adds requirements on authentication mechanisms andauto-provisioning support. For detailed information about IEEE 802.11u,reference is made to IEEE 802.11u-2011, Amendment 9: Interworking withExternal Networks, which can be obtained from the websitehttp://standards.ieee.org.

The momentum of Hotspot 2.0 is due to its roaming support, its mandatorysecurity requirements and for the level of control it provides over theterminal for network discovery and selection. Even if the currentrelease of HS2.0 is not geared towards 3GPP interworking, 3GPP operatorsare trying to introduce additional traffic steering capabilities,leveraging HS2.0 802.11u mechanisms. Because of the high interest of3GPP operators, there will be a second release of HS2.0 focusing on 3GPPinterworking requirements.

The HS2.0 contains the following procedures:

1 Discovery: Where the terminal discovers a Wi-Fi network, and probes itfor HS2.0 support, using 802.11u and HS 2.0 extensions.

2 Registration is performed by the terminal towards the Wi-Fi Hot-spotnetwork if there is no valid subscription for that network.

3 Provisioning: Policy related to the created account is pushed towardsthe terminal. This only takes place when a registration takes place.

4 Access: Cover the requirements and procedures to associate with aHS2.0 Wi-Fi network.

Background to Access Network Discovery and Selection Function

The Access Network Discovery and Selection Function (ANDFS) is an entitydefined by 3GPP for providing access discovery information as well asmobility and routing policies to the UE. The information and policiesprovided by the ANDSF may be subscriber specific.

Access Discovery Information is used to provide access discoveryinformation to the UE, which can assist the UE to discover available(3GPP and) non-3GPP access networks without the burden of continuousbackground scanning.

Inter-System Mobility Policies (ISMP) are policies which guide the UE toselect the most preferable 3GPP or non-3GPP access. The ISMP are usedfor UEs that access a single access (3GPP or Wi-Fi) at a time,

Inter-System Routing Policies (ISRP) are policies which guide the UE toselect over which access a certain type of traffic or a certain APNshall be routed. The ISRP are used for UEs that access both 3GPP andWi-Fi simultaneously.

Background to Permanent UE Identifiers

The different permanent UE identifiers are defined in 3GPP TS 23.003(current version=11.2.0). The definition of International MobileSubscriber Identity (IMSI) is shown in FIG. 2. As seen in this drawing,IMSI is composed of three parts:

1. A Mobile Country Code (MCC) consisting of three digits. The MCCuniquely identifies the country of the mobile subscriber/subscription ofthe UE.

2. A Mobile Network Code (MNC) consisting of two or three digits. TheMNC identifies the home PLMN (Public Land Mobile Network) of the mobilesubscriber/subscription. The length of the MNC (two or three digits)depends on the value of the MCC.

3. Mobile Subscriber Identification Number (MSIN) identifying the mobilesubscriber within a PLMN.

The National Mobile Subscriber Identity (NMSI) consists of the MobileNetwork Code (MNC) and the Mobile Subscriber Identification Number(MSIN).

The International Mobile station Equipment Identity and Software Versionnumber (IMEISV), the International Mobile station Equipment Identity(IMEI) and the MS international PSTN/ISDN number (MSISDN) are alsodefined in 3GPP TS 23.003 but are not further described herein.

In the EPS (110, FIG. 1), the permanent UE identities are only known inthe EPC 114, whereas the E-UTRAN 112 is only aware of temporary UEidentities. An example of this is the Globally Unique Temporary UEIdentity (GUTI) that uniquely identifies the MME which allocated theGUTI and also identifies the UE within the MME that allocated the GUTI.Another example used for paging purposes is the S-TMSI. GUTI and S-TMSIare also defined in the aforementioned 3GPP TS 23.003. The GUTI isallocated to the UE during an Attach procedure as defined in theaforementioned 3GPP TS 23.401 (also see FIGS. 3A and 3B), and theserving MME holds the association between the GUTI and the UE permanentidentifier(s).

When the UE accesses a Wi-Fi network, it can be authenticated usingEAP-SIM (Extensible Authentication Protocol-SIM) and EAP-AKA (ExtensibleAuthentication Protocol-Authentication and Key Agreement) protocols. Inthese cases, the UE can be identified by either the full authenticationNetwork Access Identifier (NAI) or by the fast re-authentication NAI.The full authentication NAI contains the IMSI of the UE, and the fastre-authentication NAI is similar to the temporary identities used in LTEaccess in the sense that it is the 3GPP AAA Server that knows therelation between the fast re-authentication NAI and the fullauthentication NAI.

Overview 3GPP Attach Procedure

FIGS. 3A and 3B shows an overview of the attach procedure used in forinstance the E-UTRAN 112 of FIG. 1. The attach procedure is described indetail in 3GPP TS 23.401. During this attach procedure, the UE isauthenticated to the network in a step 5a, using credentials stored onthe (U)SIM ((Universal) Subscriber Identity Module) in the UE. Atinitial attach, the UE will use the IMSI as an identifier of the UEsubscription (and (U)SIM). During the attach to the network, the UEmight be assigned other shorter temporary identifiers such as S-TMSI,P-TMSI, URNTI, etc. The MME/SGSN in the 3GPP Core Network (CN) will beaware of the IMSI associated and the mapping to temporary identifierswhen the UE has an active context in the network.

Overview of Wi-Fi Attach Procedure with EAP-SIM/AKA Authentication

FIG. 4 shows an example procedure for a Wi-Fi-enabled UE connecting to aWi-Fi network, such as access network 120 in FIG. 1, with a Wi-Fi AccessController (AC). Other procedures may also be used depending onimplementation in the UE and network. The EAP signalling is in thisprocedure used to authenticate the UE towards the network. The UE usesIMSI or some other certificate to identify itself towards the network.

Some Problems with Existing Solutions

The current methods for integration of Wi-Fi into a 3GPP networkdescribed above do not offer good support for network-controlledWi-Fi/3GPP access selection and service mapping, taking intoconsideration radio access related input parameters such as UE mobility,3GPP/Wi-Fi cell and network load, radio link performance, etc.

In order to achieve this functionality, it is required to link (connect,associate) the UE context in the 3GPP radio access network (RAN)—whichholds information about radio performance, UE mobility, etc. on the 3GPPside—with the UE context in the Wi-Fi network. This can then enable anetwork entity to take decisions whether the UE should access the Wi-Finetwork or not, depending on if the UE is stationary, and/or has a goodconnection to the Wi-Fi AP (Access Point), etc. The decision can then besignaled to the UE or executed internally in the 3GPP/Wi-Fi network (forinstance to control UE admission to Wi-Fi).

Although mechanisms have been introduced for allowing the UE to performauthentication towards the Wi-Fi network using (U)SIM credentials andidentities (IMSI), there is currently no mechanism available forconnecting the UE RAN context in the 3GPP RAN with the UE Wi-Fi accesscontext.

This means that with existing solutions, there is no node in the accessnetwork that can identify a single UE to be the same UE when it isactive in Wi-Fi and 3GPP, respectively—even if it is handled by the samephysical base station (e.g. eNodeB, WiFi AC).

SUMMARY

It is accordingly an object of the invention to eliminate or alleviateat least some of the problems referred to above.

The present inventors have realized, after inventive and insightfulreasoning, that it will be beneficial to introduce additionalfunctionality serving to:

-   -   Locate the UE RAN context in the other RAT (Wi-Fi, 3GPP RAN)        based on a permanent or temporary identifier of the UE.    -   Convey RAN related parameters between the RAN entities serving        the UE and thus enabling access network selection or service        mapping decisions for the UE to be taken in the network.    -   Convey the access network selection or service mapping decisions        to RAN nodes (Wi-Fi or 3GPP RAN).

A basic concept may also include:

-   -   Conveying the access network selection or service mapping        decisions to the UE (e.g. in the form of access selection        commands or access selection policies).    -   Assigning temporary identities to the UE while connected in one        RAT, which the UE subsequently uses to identify itself in the        other RAT.

The concept can be used together with existing methods for integratingUE Wi-Fi traffic in 3GPP networks (e.g. S2a method as seen in FIG. 1 andS2b and S2c methods not shown in FIG. 1) as well as existingauthentication methods such as (U)SIM-based (e.g. EAP-SIM or EAP-AKA, asdescribed above), or alternatively certificate-based (EAP-TLS), etc. Fora further description of EAP-TLS (Extensible AuthenticationProtocol-Transport Layer Security), reference is made to the openstandard RFC 5216 by IETF (Internet Engineering Task Force), which isavailable at http://www.rfc-editor.org/rfc/rfc5216.txt.

On a high level, such a basic concept may form the basis fornetwork-controlled access selection or service mapping as follows:

1. When the UE is connected to one access network (e.g. 3GPP) (Access A)and finds a suitable cell of the other access network (e.g. Wi-Fi)(Access B), it will, depending on implementation rules, initiate accessprocedure towards Access B.

2. During this procedure the UE will identify itself in the networkusing an identifier known in Access A, or that can be translated byAccess B to an identifier known in Access A.

3. This identifier will be used by a network node to find the RANcontext in the Access A.

4. Once the RAN context has been located the network can performinternal signaling between the RAN nodes of the different access (AccessA and Access B) to convey radio related parameters which can be used foraccess selection (e.g. moving a UE towards the new access (Access B),leaving the old access (Access A)) and/or service mapping (e.g. mappingsome services on the new access (Access B), keeping ongoing UEconnection to the old access (Access A)).

5. Once an access selection/service mapping decision has been performed,the network entity responsible for the decisions will convey thisinformation to the UE or to some other network entity which has controlof the UE access selection or service mapping.

One aspect of the present invention can therefore be summarized as aradio communication system comprising a first access network arranged tooperate according to a first Radio Access Technology, a second accessnetwork arranged to operate according to a second Radio AccessTechnology, and a user device which is connectable to said first accessnetwork and to said second access network. The system further comprises:

an authentication node arranged to identify said user device, whenseeking access to said second access network, through a user deviceidentifier for said user device, wherein said user device identifier isassociated with said first access network;

a query node arranged to provide information about a context of saiduser device in said first access network based on said user deviceidentifier; and

an access selection node arranged to generate an access selectiondecision for the access sought by the user device to the second accessnetwork based on the provided context information.

The system is arranged to cause said access selection decision to beexecuted.

In one or more embodiments, the authentication node may be arranged toidentify said user device based on a user identifier provided by theuser device. This identifier may be an International Mobile SubscriberIdentity (IMSI).

In one or more embodiments, the identifier is a temporary identifierassigned to said user device in said first access network, wherein saidauthentication node is arranged to use the temporary identifier forretrieving a permanent identifier of said user device from a networkresource in or via said first access network. The temporary identifiermay be, for instance, a Packet Temporary Mobile Subscriber Identity(P-TMSI) or Shortened Temporary Mobile Subscriber Identity (S-IMSI).

The feature “said user device identifier is associated with said firstaccess network” is to be construed broadly to comprise, withoutlimitations, cases where the user device identifier is directlyassociated with or known to the first access network (for instance atemporary identifier like P-TMSI), as well as cases where the userdevice identifier is indirectly associated with the first access network(for instance in the form of a mapping between a temporary identifierlike P-TMSI—which is directly known to the first access network—and apermanent identifier like IMSI, wherein the mapping is held by a networknode somewhere in the radio communication system, for instance in a nodein a core network coupled to the first access network).

In one or more embodiments, the context information provided by saidquery node about said user device includes a current location of saiduser device in said first access network.

Moreover, said query node may be further configured for signaling withsaid first access network and/or said second access network to provideparameters to said access selection node, wherein said access selectionnode is configured to generate said access selection decision based onsaid parameters.

These parameters may typically relate to one or more of the following:

mobility data about said user device,

work load for a current access point of said user device in said firstaccess network,

work load for an access point in said second access network to whichsaid user device seeks access,

transport network load in either of said first or second accessnetworks,

radio link performance for said user equipment in said first accessnetwork,

Radio Access Technology-specific limitations in either of said first orsecond access networks,

ongoing services used by said user device,

capabilities of said user device for said first or second Radio AccessTechnologies, and

a subscription profile of an end-user associated with said user device.

In one or more embodiments, the access selection decision involves atleast one of the following:

connecting said user device to said second access network,

disconnecting said user device from said first access network,

mapping a first service of said user device to said first access networkand a second service of said user device to said second access network,and

maintaining connection for said user device with said first accessnetwork. Hence, typical implications of the term “access selectiondecision” are that the user device shall be connected or disconnected toany of the first and second access networks, that the user device shallmaintain a current connection, and/or that services utilized by the userdevice shall be split between the first and second access networks.

In one or more embodiments, the access selection node is furtherconfigured to cause transmission of said access selection decision tosaid user device for execution of said access selection decision.

Alternatively or additionally, the access selection node may be furtherconfigured to cause transmission of said access selection decision tosaid first access network and/or to said second access network forexecution of said access selection decision.

The first access network may be part of a mobile telecommunicationsystem compliant with, for instance, GSM, UMTS, FOMA, EPS, D-AMPS orCDMA2000. Hence, the first access network may for instance be capable ofradio communication in accordance with GPRS/EDGE, WCDMA/HSPA,LTE/E-UTRAN, or any combination thereof, or alternatively TD-SCDMA.Other existing and future mobile telecommunication systems and radiocommunication technologies are however also feasible.

The second access network may be a short-range wireless communicationnetwork compliant with, for instance, IEEE 802.11 (Wi-Fi or WLAN).Alternatively, the second access network may be of any of the typesreferred to above for the first access network. Other existing andfuture technologies are however also feasible, as was referred to in thebackground section of this document.

The authentication node, query node and access selection node are to beseen as functional elements rather than structural. Hence, in animplementation of the system, the functionalities of these three nodesmay be split between and/or performed in a distributed cooperativemanner by other, existing nodes in the first and second access networks,or in the user device. Some examples of this will be found in thedetailed description section of this document. Alternatively, some orall of the functionalities of these three nodes may be performed byseparate hardware dedicated for this purpose, such as appropriatelyconfigured computer equipment.

Another aspect of the present invention can be summarized as a methodfor use in a radio communication system of the type which comprises afirst access network arranged to operate according to a first RadioAccess Technology, a second access network arranged to operate accordingto a second Radio Access Technology, and a user device which isconnectable to said first access network and to said second accessnetwork. The method comprises:

identifying said user device, when seeking access to said second accessnetwork, through a user device identifier for said user device, whereinsaid user device identifier is associated with said first accessnetwork;

providing information about a context of said user device in said firstaccess network based on said user device identifier;

generating an access selection decision for the access sought by theuser device to the second access network based on the provided contextinformation; and

causing execution of said access selection decision.

In one or more embodiments, the user device is identified based on auser identifier provided by the user device. This identifier may be anInternational Mobile Subscriber Identity (IMSI).

In one or more embodiments, the identifier is a temporary identifierassigned to said user device in said first access network, and whereinthe identifying of said user device further comprises using thetemporary identifier for retrieving a permanent identifier of said userdevice from a network resource in or via said first access network.

In one or more embodiments, the context information provided by saidquery node about said user device includes a current location of saiduser device in said first access network.

Moreover, the method may further comprise:

signaling with said first access network and/or said second accessnetwork to provide parameters; and

generating said access selection decision based on the providedparameters.

These parameters may typically relate to one or more of the following:

mobility data about said user device,

work load for a current access point of said user device in said firstaccess network,

work load for an access point in said second access network to whichsaid user device seeks access,

transport network load in either of said first or second accessnetworks,

radio link performance for said user equipment in said first accessnetwork,

Radio Access Technology-specific limitations in either of said first orsecond access networks,

ongoing services used by said user device,

capabilities of said user device for said first or second Radio AccessTechnologies, and

a subscription profile of an end-user associated with said user device.

In one or more embodiments, the access selection decision involves atleast one of the following:

connecting said user device to said second access network,

disconnecting said user device from said first access network,

mapping a first service of said user device to said first access networkand a second service of said user device to said second access network,and

maintaining connection for said user device with said first accessnetwork.

In one or more embodiments, the generated access selection decision maybe transmitted to said user device for execution of the access selectiondecision.

Alternatively or additionally, the generated access selection decisionmay be transmitted to said first access network and/or to said secondaccess network for execution of the access selection decision.

Yet another aspect of the present invention can be summarized as acomputer readable storage medium encoded with instructions that, whenloaded and executed by a processor, causes performance of the methodreferred to above.

Still another aspect of the present invention can be summarized as anarrangement for use in a radio communication system comprising a firstaccess network arranged to operate according to a first Radio AccessTechnology and a second access network arranged to operate according toa second Radio Access Technology, wherein said arrangement comprises:

means for identifying a user device, when seeking access to said secondaccess network, through a user device identifier for said user device,wherein said user device identifier is associated with said first accessnetwork;

means for providing information about a context of said user device insaid first access network based on said user device identifier; and

means for generating an access selection decision for the access soughtby the user device to the second access network based on the providedcontext information.

In embodiments of this arrangement, the means for identifying a userdevice may be implemented by the aforementioned authentication node inthe radio communication system aspect of the invention. Correspondingly,in embodiments of this arrangement, the means for providing informationabout a context of said user device may be implemented by theaforementioned query node in the radio communication system aspect ofthe invention. Also, in embodiments of this arrangement, the means forgenerating an access selection decision may be implemented by theaforementioned access selection node in the radio communication systemaspect of the invention.

The arrangement may further comprise means for causing said accessselection decision to be executed in said radio communication system.

In addition, the arrangement may further comprise means for causingperformance of any functional feature of the method aspect referred toabove.

For further objects, features and advantages of the invention and/or itsembodiments, reference is made to the following detailed description, tothe attached claims as well as to the drawings.

Generally, all terms used in the claims are to be interpreted accordingto their ordinary meaning in the technical field, unless explicitlydefined otherwise herein. All references to “a/an/the [element, device,component, means, step, etc]” are to be interpreted openly as referringto at least one instance of the element, device, component, means, step,etc., unless explicitly stated otherwise. The steps of any methoddisclosed herein do not have to be performed in the exact orderdisclosed, unless explicitly stated. It should be emphasized that theterm “comprises/comprising” when used in this specification is taken tospecify the presence of stated features, integers, steps, or components,but does not preclude the presence or addition of one or more otherfeatures, integers, steps, components, or groups thereof.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the invention will be described in further detail belowwith reference to the accompanying drawings.

FIG. 1 schematically illustrates an existing network architecture forintegration of a mobile telecommunications system and a Wi-Fi accessnetwork.

FIG. 2 illustrates the definition of International Mobile SubscriberIdentity (IMSI).

FIGS. 3A and 3B show an overview of an attach procedure used in forinstance the radio access network of the mobile telecommunicationssystem shown in FIG. 1.

FIG. 4 shows an overview of an attach procedure used in for instance theWi-Fi access network shown in FIG. 1.

FIG. 5A schematically illustrates a high level functional architectureof an embodiment of the present invention.

FIG. 5B is a flowchart diagram to illustrate the functionality of anembodiment of the present invention.

FIG. 5C illustrates a computer readable storage medium encoded withinstructions that, when loaded and executed by a processor, may causeperformance of the functionality shown in FIG. 5B.

FIG. 6 is a schematic flowchart diagram of a procedure for findingcontext information about a user device in a first access network whenseeking access to a second access network.

FIG. 7 is a schematic flowchart diagram of a procedure which can be usedwhen maintaining the context information about the user device in thefirst access network.

FIG. 8 is a schematic flowchart diagram of a procedure for transferringof parameters related to the first and second access networks, for usewhen performing an access network selection and/or service mappingdecision for the user device seeking access to the second accessnetwork.

FIG. 9 is a schematic block diagram of a user device which isconnectable to first and second access networks.

FIG. 10 is a schematic block diagram illustrating an arrangementaccording to one aspect of the invention.

DETAILED DESCRIPTION

Embodiments of the invention will now be described with reference to theaccompanying drawings. The invention may, however, be embodied in manydifferent forms and should not be construed as limited to theembodiments set forth herein; rather, these embodiments are provided sothat this disclosure will be thorough and complete, and will fullyconvey the scope of the invention to those skilled in the art. Theterminology used in the detailed description of the particularembodiments illustrated in the accompanying drawings is not intended tobe limiting of the invention. In the drawings, like numbers refer tolike elements.

A high level functional architecture of an embodiment of the presentinvention is shown in FIG. 5A. A corresponding functionality is shown inFIG. 5B. As seen in FIG. 5A, a user device 500 is connectable to a firstaccess network 510, also referred to as Access A. The user device 500 isalso connectable to a second access network 520, also referred to asAccess B. The first access network 510, Access A, is arranged to operateaccording to a first Radio Access Technology, which in the disclosedembodiments is either 3GPP WCDMA/HSPA or LTE/E-UTRAN, or WCDMA/HSPA andLTE/E-UTRAN in combination. Correspondingly, the second access network520, Access B, is arranged to operate according to a second Radio AccessTechnology, which in the disclosed embodiment is WiFi. Thus, in thedisclosed embodiments the user device 500 is a user equipment, UE. Anembodiment of such a UE is illustrated in more detail as 900 in FIG. 9and will be described in more detail later. Other embodiments may behowever be based on other Radio Access Technologies for the first andsecond access networks 510, 520, as has been referred to previously inthis document.

The architecture shown in FIG. 5A moreover comprises an AuthenticationNode (AN) 530, one or more Query Nodes (QNs) 540 and an Access SelectionNode (ASN) 550. The illustration shows that for example the QN 540 maybe part of Access A or outside of Access A. In a similar way, the AN 530may be part of Access B or outside Access B. When it comes to the ASN550, it is shown in FIG. 5A as being outside both Access A and B. Anyother alternatives are also possible, i.e. the ASN 550 may be part ofAccess A or Access B as well. It is also possible that the ASN 550 isdistributed, such that its functionality is performed by or at more thanone entity in the system. Furthermore, it is also possible that thecommunication between the AN 530 and the QN(s) 540 occurs via the ASN550, or that the communication occurs directly between these functions.

As is seen in the flowchart in FIG. 5B, step 600, the authenticationnode AN 530 is arranged to identify the UE 500 when seeking access tothe second access network 520, Access B, through a user deviceidentifier for the UE 500, wherein this user device identifier isassociated with the first access network 510, Access A.

As is seen further in the flowchart in FIG. 5B, step 610, the query nodeQN 540 is arranged to provide information about a context of the UE 500in the first access network 510, Access A, based on the user deviceidentifier.

Moreover, as is seen further in the flowchart in FIG. 5B, step 620, theaccess selection node ASN 550 is arranged to generate an accessselection decision for the access sought by the UE 500 to the secondaccess network 520, Access B, based on the provided context information.

Finally, as is seen further in the flowchart in FIG. 5B, step 630, thesystem is arranged to cause the access selection decision to beexecuted.

It is to be understood that FIG. 5A is a logical drawing rather than aphysical; hence the functions of the different entities shown in FIG. 5Acan be implemented in different physical units in the system. Forexample, if Access A is 3GPP WCDMA/HSPA and Access B is Wi-Fi, then theQN 540 could be communicating towards a radio network controller (RNC)in Access A, or it may be implemented as part of the RNC. In anotherexample, if Access A is 3GPP LTE/E-UTRAN and Access B is Wi-Fi, then theQN 540 could be communicating towards the eNodeB in the E-UTRAN 112 ofFIG. 1, or it may be implemented as part of the eNodeB. Correspondingly,the AN 530 may be part of for example a Wi-Fi Access Controller(AC)—such as the one shown in the Wi-Fi access network 120 of FIG. 1—orit may communicate with such a Wi-Fi AC. Also, in this case, the ASN 550could implemented as part of the Wi-Fi AC, the RNC or as a stand-alonephysical node.

The envisioned solution according to FIGS. 5A and 5B is a target-basednetwork-controlled solution, where the UE by itself tries to performaccess to the target access (Access B), which then triggers the networkto take an access selection or services mapping decision.

It is to be noticed that this is distinctly different from the existinginter-RAT handover mechanism within 3GPP, where the UE sends ameasurement report to the source RAT (over the source radio), so thatthe source RAT can initiate handover (to a specific target cell). Inthose types of existing solutions, there is no need for thefunctionality of finding the RAT context in the source RAT based on a UEidentifier, since the handover decision is taken in the source RAT priorto UE accessing the target RAT. The envisioned solution according toFIGS. 5A and 5B moreover relies on that the UE will not leave the sourceRAT until it has successfully connected to the target RAT—which isdifferent from existing procedures. This makes it possible to use amechanism in the target RAT for controlling the UE access selection(i.e. by denying the UE access in the target RAT, the UE will stay inthe source RAT).

The advantage of such target-based solutions is that they do not requireany UE impacts (meaning that they can be applied to existing UEs on themarket). Target-based solutions in accordance with the present inventioncan however still benefit from UE impacts.

FIG. 5C shows a schematic view of a computer readable storage medium 640which may be used to accommodate instructions for performing thefunctionality of the present invention, as is generally outlined in FIG.5B. In the embodiment shown in FIG. 5C, the computer-readable medium 640is a memory stick, such as a Universal Serial Bus (USB) stick. The USBstick 640 comprises a housing 643 having an interface, such as aconnector 644, and a memory chip 642. The memory chip 642 is a flashmemory, i.e. a non-volatile data storage that can be electrically erasedand re-programmed. The memory chip 642 is programmed with instructions641 that when loaded (possibly via the connector 644) into a processorwill cause execution of the method.

The processor may be at least one CPU (Central Processing Unit), DSP(Digital Signal Processor), FPGA (Field-Programmable Gate Arrays), ASIC(Application Specific Integrated Circuit) or any other electronicprogrammable logic device, or a combination of any such devices, adaptedfor executing the instructions stored on the aforementioned storagemedium 640. Such a processor may act as a controller in a node in thefirst or second access networks (Access A, Access B). The instructionsmay be adapted for execution by several processors, possibly located indifferent nodes in said first and second networks, in a distributedcooperative manner, as is mentioned is other parts of this document.

It should be noted that the USB stick 640 in FIG. 5C is merely oneexample of a computer-readable storage medium. Other examples mayinclude compact discs, digital video discs, hard drives or other memorytechnologies commonly used.

The general functionality according to FIGS. 5A and 5B above will now bedescribed in more detail in the following numbered subsections:

1. Identification of UE when accessing a new target network (Access B)

2. Finding the RAN context of the UE in a previous RAT (Access A)

3. Transferring of RAN related parameters and performing access networkselection/service mapping decision based on those parameters

The following additions will also be discussed:

4. Methods for conveying and/or executing access selection and servicemapping decisions

5. Methods for using network assigned temporary identities in order tomake it less complex to find the UE context in the previous RAT (AccessA), as well as additional privacy or integrity functionality (avoidingthe use of permanent identifiers).

1. Identification of the UE (FIG. 5B, Step 600)

Embodiments Based on IMSI

If the UE supports EAP-SIM or EAP-AKA based authentication in Wi-Fi(i.e. Access B), it will (at least for initial attach) identify itselfto the Wi-Fi network (internally the Wi-Fi Access Controller or someother node having the authenticator role), using the IMSI((U)SIM-related identifier). For details about attach procedures used inWi-Fi access networks, reference is made to the previous descriptionwith respect to FIG. 4 above.

Similarly, when the UE performs access to 3GPP (i.e. Access A), it will(at least for initial attach) also use the IMSI as an identifier(towards the MME). For details about attach procedures used in 3GPPnetworks, reference is made to the previous description with respect toFIGS. 3A and 3B above.

This means that in a typical embodiment there will be a network node (orfunction) identifying that a particular UE (as given by the IMSI) isperforming access to the target network (Access B). This node will thenperform a procedure to try to locate the RAT context of the UE in theprevious RAT (Access A).

Embodiments based on other identifiers that can be translated to IMSI bythe network (e.g. P-TMSI, S-TMSI, temporary EAP identifiers)

In case the UE has been previously connected to a particular accessnetwork, it might have been assigned an access-specific temporaryidentifier, such as 3GPP-defined S-TMSI or P-TMSI, EAP-SIM/AKA fastre-authentication NAI, etc. In this case, the network node responsiblefor the authentication needs to either have stored the permanent UEidentity (e.g. IMSI received from the last time the UE was connected tothe access network), or retrieve the permanent identity from anothernode or network resource, such as an AAA server or MME (FIG. 1) or HomeLocation Register (HLR). In the latter case, the temporary identifier isused to find the context in the other node.

In case the UE uses some non-(U)SIM-based mechanism to identify itself,such as EAP-TLS/TTLS based on a stored certificate in the UE, thenetwork node responsible for the authentication in the access networkneeds to also retrieve the IMSI in conjunction with authenticationprocedure. The IMSI could in this case for instance be stored in anAAA-server or HLR, which also contains information about the certificateof the UE. During the authentication procedure the IMSI can be passed onto the node in the target access network responsible for theauthentication of the UE.

Embodiments Based on Temporary Identifiers Assigned by Previous RAT(Access A)

Here, the source access network (Access A) will assign to the UE an UEidentity while the UE is in Access A. This identity can be assignedusing dedicated signaling, transferred in a secure manner over the radiointerface of Access A. The actual identity could be made up of a randomtemporary identifier, such as 3GPP S-TMSI, P-TMSI, or it could be an IPaddress which the UE also uses for communication, or some specificbit-string. The identity can also, in combination with UE-specificidentity, also contain information which is used for internal routing inthe network (such as, for instance, identity information regarding therelevant MME, RNC, Wi-Fi AC, etc). Other possible combinations ofidentities are also possible.

When the UE later performs access to the target access network (AccessB), it will transfer the assigned identity to the target access network(Access B), which then can be used by Access B to locate the UE contextin the source access network (Access A).

2. Finding the RAN Context of the UE in a Previous RAT (FIG. 5B, Step610)

Once the node responsible for authentication, i.e. the AuthenticationNode (AN) 530 of the UE in the target RAT (Access B) has determined theunique identifier (e.g. IMSI) of the UE seeking the access (as describedin subsection 1 above), it will initiate procedure to locate the UEcontext in the previous RAT (Access A). This procedure is achieved byquerying a node or function, namely the Query Node (QN) 540, which isaware of the UE location in the previous RAT. This Query Node is able tomap the unique identifier to a UE RAN context located either in thatnode or in a separate node. In case the UE RAN context is located in aseparate node (Previous RAT Node), the Query Node 540 will assist thecommunication between the separate node and the Authentication Node 530,either by providing addressing information of the Previous RAT Node tothe Authentication Node 530, or by forwarding messages between thePrevious RAT Node and Authentication Node 530.

The Authentication Node 530 can query multiple Query Nodes 540 for agiven UE. In case a Query Node 540 is not aware of the location of theUE, it can either respond with a negative message to the AuthenticationNode 530, or it can in turn query another Query Node 540 which couldknow the location of the UE. In other words, the Query Nodes 540 can becascaded. This procedure can be enhanced based on information in theAuthentication Node 530 about the location (e.g. geo position) of theaccess nodes (e.g. 3GPP base stations, Wi-Fi APs) or UE, meaning thatthe Authentication Node 530 can focus on querying Query Nodes 540 whichare associated with source RAT nodes which covers the same area as thetarget RAT nodes (e.g. the 3GPP cells which have partially overlappingcoverage with the Wi-Fi cell that the UE is accessing).

The Query Node 540 can either be implemented together with RAT specificfunctions such as RNCs, Wi-Fi access controllers, MMEs, etc., or it canbe a stand-alone node.

In the latter case it will receive signaling from the RAT specific nodesto update the Query Node 540 about the location of specific UEs. Thissignaling is described further below.

In the former case, i.e. when the Query Node 540 is implemented togetherwith RAT specific functions, this signaling to update the location ofspecific UEs could be part of normal RAT specific mobility signaling(e.g. handovers, path switch, cell update). In addition, the Query Node540 can also be implemented together with the Authentication Node 530.FIG. 6 shows an example of this case, where the RAN context of the UE islocated in Access A (the source RAT) when the UE is attempting to accessAccess B (the target RAT).

Signalling Between RAT Specific Nodes and Query Nodes

In case the Query Nodes are implemented separately from the RAT specificnodes handling the UE RAN context (including mobility handling, etc.),the RAT specific node will perform signaling towards the Query Nodeswhen the UE register in the RAT the first time, and when the UE ismoving in the RAT. In addition to this signalling, the RAT nodes canalso inform the Query Node about UE specific information, such as UEcapabilities, ongoing services, UE mobility states etc.

The UE can be identified in this signaling by using a unique identifier(e.g. IMSI) or a temporary identifier assigned while the UE was in thesource RAT (Access A). FIG. 7 shows an example of this case. The RATspecific nodes Access A1 and A2 can be for example RNCs, eNodeBs orMMEs, as described in other parts of this document.

3. Transferring of RAN Related Parameters and Performing Access NetworkSelection or Service Mapping Decision Based on Those Parameters (FIG.5B, Steps 610 and 620)

In conjunction with the signaling to find the UE context in the sourceRAT (Access A) as described above and with reference to step 610 of FIG.5B, it is possible to also transfer RAN related information from thesource and target RATs (Access A and Access B) to the Access SelectionNode, ASN, 550 responsible for performing access selection, and/orservice mapping, decisions. This ASN node 550 is responsible fordeciding if the UE should be accepted in the target access network(Access B) and/or if the UE should leave the source access network(Access A) or not. Furthermore, the ASN 550 node can decide if aspecific service of the UE should be mapped on a specific access networkamong Access A or Access B.

The Access Selection Node 550 can base this decision upon RAN relatedparameters provided by the source and target RATs, as well asinformation provided from the UE. Possible parameters include (but arenot limited to) information about:

-   -   UE mobility (e.g. UE speed)    -   Cell load in target or source cell    -   Transport network load    -   Radio link performance (e.g. Signal to Noise ratio, coding or        modulation scheme used)    -   RAT-specific limitations (e.g. maximum bit rates, service        limitations)    -   Ongoing UE services    -   UE device capabilities for the different RATs    -   Subscription profile of the end-user (e.g. different        subscription classes (gold/silver/bronze), pre-paid/post-paid,        etc.

These parameters can be sent to the ASN 550 both from Access A (sourceRAT) and from Access B (target RAT) in order to facilitate accessselection and/or service mapping decision by the ASN 550 based on thoseparameters. The parameters can also be sent from a node outside of thesource and target RATs, such as for instance by a node in a core networkcoupled to any of the RATs. For instance, the relevant information forthe parameters may be held by an MME in the core network 114 coupled tothe RAT 112 as seen in FIG. 1.

The signaling to transfer these parameters to the ASN 550 can beperformed as separate signaling or piggybacked on the messages used tolocate the RAN context.

The Access Selection Node 550 can be implemented together with theAuthentication Node 530 and/or Query Node(s) 540, or as a stand-aloneentity. The Access Selection Node 550 can even be implemented in the UEbased on information provided by the network (e.g. from source/targetRAT). In case the Access Selection Node 550 is implemented in thenetwork, it can be implemented together with existing nodes e.g. MMEs,RNCs, Wi-Fi AP, Wi-Fi AC, eNodeB, etc.

FIG. 8 shows an example of this case. This example is based on that thesignalling from the AN 530 towards the QN(s) 540 is separate from thesignalling towards the ASN 550. Steps 1 to 5 are the same as in FIG. 6,and the new parts are shown as steps 6 and 7.

4. Methods for Conveying and/or Executing Access Selection and/orService Mapping Decisions (FIG. 5B, Step 630)

Based on the information made available according to the precedingsubsections as described above, the ASN 550 takes an access selectionand/or service mapping decision for the access sought by the UE to thesecond access network (Access B, target RAT). The decision taken needsto be conveyed to different parts of the network depending on thedecision taken, in accordance with the following:

-   -   If the decision taken is to reject the UE's access attempt to        Access B, then the ASN 550 informs the AN 530 in Access B about        the decision. Thus, the AN 530 performs the needed signalling        towards the UE to indicate the rejected access attempt.    -   If the decision taken is to accept the UE's access attempt to        Access B, then the ASN 550 informs the AN 530 in Access B about        the decision. Thus, the AN 530 performs the needed signalling        towards the UE to indicate the accepted access attempt.    -   If the decision taken is a service mapping decision (i.e. the UE        is allowed to access both Access A and Access B simultaneously),        the ASN 550 needs to inform both the network side and the UE        about the decision. The UE needs this information to be able to        perform the decided service mapping in the uplink direction. At        the network side, there needs to exist a common point in the        network that performs the service mapping in the downlink        direction towards Accesses A and B.    -   If the functionality of the ASN 550 is implemented in the UE and        the decision is to not continue with the access attempt to        Access B, the UE will stop performing access to Access B. This        could include sending some signaling messages to Access B or A.

FIG. 9 illustrates a user device 900 which is connectable to first andsecond access networks, Access A and Access B. The user device 900 mayimplement the UE 500 according to the preceding drawings anddescriptions.

The user device 900 has a controller 950 which has the overallresponsibility for controlling the operation of the user device 900. Inthe disclosed embodiment, the controller 950 is a central processingunit (CPU), but it can alternatively be a digital signal processor(DSP), or other programmable electronic logic device such as anapplication-specific integrated circuit (ASIC) or field-programmablegate array (FPGA). The controller 950 is coupled to a memory 960 whichcomprises a work memory and a storage memory. The memory 960 may forinstance be implemented in the form of RAM, EEPROM, flash memory (e.g.memory card), magnetic hard disk, or any combination thereof. The memory960 is capable of storing program code which is executable by thecontroller 950 so as to cause performing of the terminal-side part ofthe functionalities as described in various parts of this document. Inalternative embodiments, some or all of the terminal-side functionalitymay instead be performed by dedicated hardware.

The user device 900 has a mobile network interface 952 which allows theuser device 900 to communicate with the first access network, Access A.The mobile network interface 952 comprises an internal or externalantenna as well as appropriate radio circuitry for establishing andmaintaining a wireless link to a nearby base station in the first accessnetwork, Access A. The radio circuitry comprises a radio receiver andtransmitter formed for instance by band pass filters, amplifiers,mixers, local oscillators, low pass filters, AD/DA converters, etc.

In addition, the disclosed embodiment of the user device 900 has awireless interface 954 which may be adapted for communication inaccordance with one or more short-range wireless communication standardssuch as WiFi (e.g. IEEE 802.11, WLAN), Bluetooth, Near FieldCommunication (NFC), or Infrared Data Association (IrDA). In addition,but not shown in FIG. 9, a serial interface such as USB may allow theuser device 900 to communicate over a serial cable with for instance apersonal computer. Such interfaces may be absent in other embodiments.

Communication protocol stacks 958 are provided to allow communicationvia any of the interfaces 952 and 954.

A user interface 962 allows a user 2 to interact with the user device900. The user interface 962 includes display means, such as at least oneLCD display, as well as input means for the user. The input means maye.g. include a keypad with alpha-numeric keys and/or other keys such asarrow keys (navigation keys) and functional keys (soft keys), and/or ajoystick, touch pad, rotator, jog dial, etc. The display means and inputmeans may be jointly realized by a touch-sensitive display in someembodiments. The user interface 962 typically also involves aloudspeaker and a microphone.

The user device 900 may also be provided with other well-knowncomponents, such as power switch, battery, charger interface, accessoryinterface, and volume controls; such elements are however not indicatedin FIG. 9 for the sake of brevity.

To be able to act as a mobile terminal at least with respect to thefirst access network, Access A, the user device 900 has a (U)SIM readercapable of accessing a (U)SIM card 902. The (U)SIM card 902 compriseselectronic circuitry 903 which constitutes a local (U)SIM controller 903a and a memory 903 b. The memory 903 b has a memory area 904 for storingthe subscriber identity in the form of an IMSI number.

Hence, whenever a permanent IMSI number has been referred to in theprevious drawings and associated description, it is to be understoodthat such a permanent IMSI number can be read from the (U)SIM memory 903b and be presented by the user device 900 to the access network (AccessB or Access A) which it is presently seeking access to.

Moreover, whenever a temporary UE identity (such as P-TMSI or S-TMSI) ora non-IMSI UE identifier has been referred to in the previous drawingsand associated description, it is to be understood that such a temporaryUE identity or non-IMSI UE identifier can be read from the (U)SIM memory903 b or from the memory 960 and be presented by the user device 900 tothe access network (Access B or Access A) which it is presently seekingaccess to.

FIG. 10 is a schematic block diagram illustrating an arrangement 1090for use in a radio communication system 1110, wherein the radiocommunication system 1110 comprises a first access network 1010 arrangedto operate according to a first Radio Access Technology, and a secondaccess network 1020 arranged to operate according to a second RadioAccess Technology. The first access network 1010 may, for instance, bethe access network referred to as Access A and/or 510 in the embodimentsdescribed above. The second access network 1020 may, for instance, bethe access network referred to as Access B or 520 in the embodimentsdescribed above.

As seen in FIG. 10, the arrangement 1090 comprises means 1030 foridentifying a user device 1000, when seeking access to the second accessnetwork 1020, through a user device identifier for the user device, theuser device identifier being associated with the first access network1010. The user device 1000 may, for instance, be the device referred toas UE, 500 or 900 in the embodiments described above. The means 1030may, for instance, be the authentication node referred to as AN or 530in the embodiments described above, and the means 1030 may, forinstance, be adapted to perform the step 600 in FIG. 5B.

The arrangement 1090 further comprises means 1040 for providinginformation about a context of the user device 1000 in the first accessnetwork 1010 based on the user device identifier. The means 1040 may,for instance, be the query node referred to as QN or 540 in theembodiments described above, and the means 1040 may, for instance, beadapted to perform the step 610 in FIG. 5B.

The arrangement 1090 also comprises means 1050 for generating an accessselection decision for the access sought by the user device 1000 to thesecond access network 1020 based on the provided context information.The means 1050 may, for instance, be the access selection node referredto as ASN or 550 in the embodiments described above, and the means 1050may, for instance, be adapted to perform the step 620 in FIG. 5B.

The arrangement 1090 may also comprise means 1060 for causing the accessselection decision to be executed in the radio communication system1110. The means 1060 may, for instance, be adapted to perform the step630 in FIG. 5B, and it may, for instance, be adapted to cause the accessselection decision to be executed by appropriately informing therelevant element(s) in the radio communication system 1110 about theaccess selection decision taken, as has been described above undersub-section 4 in this detailed description section.

The arrangement 1090 may further comprise means (collectively referredto as 1070 in FIG. 10), for performing any or all of the additionalfunctionality described for the embodiments above and, particularly, anysteps of the method referred to in the summary section of this document.

Modifications and other variants of the described embodiment(s) willcome to mind to one skilled in the art having the benefit of theteachings presented in the foregoing descriptions and the associateddrawings. Therefore, it is to be understood that the embodiment(s)is/are not to be limited to the specific examples disclosed and thatmodifications and other variants are intended to be included within thescope of this disclosure. Although specific terms may be employedherein, they are used in a generic and descriptive sense only and notfor purposes of limitation.

1. A method of operating a node of a first Radio Access Network (RAN) ofa first Radio Access Technology (RAT), the method comprising: receivingan access attempt at the node from a user device, wherein the accessattempt includes a user device identifier associated with a second RadioAccess Network (RAN) of a second Radio Access Technology different thanthe first Radio Access Technology; transmitting a query from the node tothe second Radio Access Network, wherein the query includes anidentification of the user device based on the user device identifierreceived from the user device; and after transmitting the query,providing a communication service for the user device through the nodeof the first Radio Access Network.
 2. The method of claim 1 wherein thecommunication service comprises a communication server previouslyprovided to the user device through the second Radio Access Network. 3.The method of claim 1 wherein the first Radio Access Technologycomprises an IEEE 802.11 compliant RAT, and wherein the second RadioAccess Technology comprises a GSM (Global System for MobileCommunications) compliant RAT, a UMTS (Universal MobileTelecommunications System) compliant RAT, an FOMA (Freedom of MobileMultimedia Access) compliant RAT, an LTE (Long Term Evolution) compliantRAT, a D-AMPS (Digital Advanced Mobile Phone System) compliant RAT,and/or a CDMA (Code Division Multiple Access) 2000 compliant RAT.
 4. Themethod of claim 1 wherein the user device identifier comprises atemporary identifier assigned by the second Radio Access Network.
 5. Themethod of claim 1 wherein the user device identifier comprises anS-TMSI, P-TMSI, and/or EAP-SIM/AKA fast authentication NAI.
 6. Themethod of claim 1 wherein the user device identifier comprises anInternational Mobile Subscriber Identity (IMSI).
 7. The method of claim1 wherein the query includes the user device identifier received fromthe user device and associated with the second Radio Access Network. 8.The method of claim 1 wherein the node comprises an IEEE 802.11compliant node, and wherein the second Radio Access Technology comprisesa GSM (Global System for Mobile Communications) compliant RAT, a UMTS(Universal Mobile Telecommunications System) compliant RAT, an FOMA(Freedom of Mobile Multimedia Access) compliant RAT, an LTE (Long TermEvolution) compliant RAT, a D-AMPS (Digital Advanced Mobile PhoneSystem) compliant RAT, and/or a CDMA (Code Division Multiple Access)2000 compliant RAT.
 9. A node of a first Radio Access Network (RAN) of afirst Radio Access Technology (RAT), the node comprising: a processorconfigured to, receive an access attempt from a user device, wherein theaccess attempt includes a user device identifier associated with asecond Radio Access Network (RAN) of a second Radio Access Technologydifferent than the first Radio Access Technology; transmit a query tothe second Radio Access Network, wherein the query includes anidentification of the user device based on the user device identifierreceived from the user device; and provide a communication service forthe user device through the node of the first Radio Access Network aftertransmitting the query.
 10. A method of operating a node for use with afirst access network arranged to operate according to a first RadioAccess Technology capable of providing a communication service over afirst communication path to a user device through the first accessnetwork and a second access network arranged to operate according to asecond Radio Access Technology capable of providing the communicationservice over a second communication path to the user device through thesecond access network, wherein the user device is connectable to saidfirst access network and to said second access network and wherein thefirst and second Radio Access Technologies are different, the methodcomprising: obtaining a user device identifier identifying the userdevice when the user device is seeking access to the second accessnetwork, wherein the user device identifier is associated with firstfirst access network, wherein the user device identifier is provided bythe user device; obtaining information about a context of the userdevice in the first access network based on the user device identifier;generating an access selection decision for the access sought by theuser device to the second access network based on the provided contextinformation; and causing the access selection decision to be executed.11. The method of claim 10 wherein the user device identifier comprisesa temporary identifier assigned by the second Radio Access Network. 12.The method of claim 11 wherein obtaining information comprises obtaininga permanent identifier for the user device using the temporaryidentifier and obtaining information about the context using thepermanent identifier.
 13. The method of claim 11 wherein the temporaryidentifier is provided from the user device through the second accessnetwork.
 14. The method of claim 10 wherein the identifier comprises anS-TMSI, P-TMSI, and/or EAP-SIM/AKA fast authentication NAI.
 15. Themethod of claim 10 wherein the user device identifier comprises anInternational Mobile Subscriber Identity (IMSI).
 16. The method of claim10 wherein generating the access selection decision includes connectingthe user device to the second access network including, identifying thecommunication service provided initially to the user device through thefirst access network, analyzing the provided context information of theuser device, and selecting the second access network to provide thecommunication service to the user device based on the provided contextinformation of the user device, wherein causing the access selectiondecision to be executed comprises providing the communication servicethrough the second access network.
 17. The method of claim 10 whereingenerating the access selection decision comprises maintainingconnection for the user device with the first access network including,identifying the communication service provided initially to the userdevice through the first access network, analyzing the provided contextinformation of the user device, and selecting the first access networkto provide the communication service to the user device based on theprovided context information of the user device, wherein causing theaccess selection decision to be executed comprises continuing to providethe communication service through the first access network.
 18. Themethod of claim 10 wherein generating the access selection decisioncomprises mapping a first communication service of the user device tothe first access network and a second communication service of the userdevice to the second access network including, identifying the firstcommunication service and the second communication service providedinitially to the user device through the first access network, analyzingthe provided context information of the user device, selecting the firstaccess network to provide the first communication service to the userdevice based on the provided context information of the user device, andselecting the second access network to provide the second communicationservice to the user device based on the provided context information ofthe user device, wherein executing the access selection decisioncomprises providing the first communication service through the firstaccess network and providing the second communication service throughthe second access network.
 19. The method of claim 10 wherein the firstRadio Access Technology comprises a GSM (Global System for MobileCommunications) compliant RAT, a UMTS (Universal MobileTelecommunications System) compliant RAT, an FOMA (Freedom of MobileMultimedia Access) compliant RAT, an LTE (Long Term Evolution) compliantRAT, a D-AMPS (Digital Advanced Mobile Phone System) compliant RAT,and/or a CDMA (Code Division Multiple Access) 2000 compliant RAT, andwherein the second Radio Access Technology comprises an IEEE 802.11compliant RAT.
 20. A node for use with a first access network arrangedto operate according to a first Radio Access Technology capable ofproviding a communication service over a first communication path to auser device through the first access network and a second access networkarranged to operate according to a second Radio Access Technologycapable of providing the communication service over a secondcommunication path to the user device through the second access network,wherein the user device is connectable to said first access network andto said second access network and wherein the first and second RadioAccess Technologies are different, the node comprising: a processorconfigured to, obtain a user device identifier identifying the userdevice when the user device is seeking access to the second accessnetwork, wherein the user device identifier is associated with firstaccess network, wherein the user device identifier is provided by theuser device; obtain information about a context of the user device inthe first access network based on the user device identifier; generatean access selection decision for the access sought by the user device tothe second access network based on the provided context information; andcause the access selection decision to be executed.