US20170078936A1 - Connection attempt to alternative access upon connection attempt rejection - Google Patents

Connection attempt to alternative access upon connection attempt rejection Download PDF

Info

Publication number
US20170078936A1
US20170078936A1 US15/123,186 US201515123186A US2017078936A1 US 20170078936 A1 US20170078936 A1 US 20170078936A1 US 201515123186 A US201515123186 A US 201515123186A US 2017078936 A1 US2017078936 A1 US 2017078936A1
Authority
US
United States
Prior art keywords
access
network
user equipment
candidates
candidate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/123,186
Inventor
Mattias Tan Bergström
Filip Mestanov
Oumer Teyeb
Christofer Lindheimer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Priority to US15/123,186 priority Critical patent/US20170078936A1/en
Assigned to TELEFONAKTIEBOLAGET L M ERICSSON (PUBL) reassignment TELEFONAKTIEBOLAGET L M ERICSSON (PUBL) ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LINDHEIMER, CHRISTOFER, MESTANOV, Filip, TAN BERGSTROM, MATTIAS, TEYEB, OUMER
Publication of US20170078936A1 publication Critical patent/US20170078936A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/26Reselection being triggered by specific parameters by agreed or negotiated communication parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • H04W52/0245Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal according to signal strength
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0251Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
    • H04W52/0258Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity controlling an operation mode according to history or models of usage information, e.g. activity schedule or time of day
    • H04W76/02
    • H04W76/027
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0058Transmission of hand-off measurement information, e.g. measurement reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0066Transmission or use of information for re-establishing the radio link of control information between different types of networks in order to establish a new radio link in the target network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • H04W36/00837Determination of triggering parameters for hand-off
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/30Reselection being triggered by specific parameters by measured or perceived connection quality data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • H04W36/36Reselection control by user or terminal equipment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/02Selection of wireless resources by user or terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/1215Wireless traffic scheduling for collaboration of different radio technologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/52Allocation or scheduling criteria for wireless resources based on load
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present technology relates to a method, a user equipment, a computer, a computer program product and a carrier for performing connection attempts to alternative access points and/or networks upon connection attempt rejection.
  • Wi-Fi or WLAN deployments are totally separate from mobile networks, and can be seen as non-integrated from the user equipment, UE, perspective.
  • OSs for UEs such as AndroidTM and ioS®, support a simple Wi-Fi offloading mechanism where a UE immediately switches all its IP traffic to a Wi-Fi network upon a detection of a suitable network with a received signal strength above a certain level.
  • access selection strategy the decision to offload to a Wi-Fi or not is referred to as access selection strategy and the term “Wi-Fi-if-coverage” is used to refer to the aforementioned strategy of selecting Wi-Fi whenever such a network is detected.
  • FIG. 1 illustrates examples of problems in FIGS. 1 a )- 1 d ) with “Wi-Fi-if-coverage” access network selection. Wi-Fi access selection today is performed by the UE with little consideration of radio performance, session/service continuity, load, mobility, etc.
  • connection manager is software on a UE that is in charge of managing the network connections of the device, taking into account user preferences, operator preferences, network conditions, etc.
  • a user equipment 10 has the possibility to connect to an AP of a mobile access network 20 or an AP of a Wi-Fi Access network 30 .
  • the mobile access network 20 may operate according to the 3GPP and/or LTE standards.
  • the mobile access network is connected to the Internet 60 via a backhaul network 40 and the Wi-Fi access network is connected to the Internet via a backhaul network 50 .
  • the backhaul network 40 of the mobile access network may in this example provide a high rate fibre connection.
  • the Wi-Fi access network offers an low rate xDSL connection 50 , e.g. 10/2 Mbps.
  • the UE may connect to the AP of either the mobile access network 20 via a connection 25 offering 50 Mbps bandwidth, or the AP of the Wi-Fi access network 30 via a connection 35 offering a rate of 2 Mbps.
  • FIG. 1 b illustrates the situation when no consideration of the load conditions in the mobile network 20 and Wi-Fi network 30 are made. As illustrated, while the capacity of the Wi-Fi network 30 is full, the mobile network 20 has low load and a lot of free capacity. As such, the UE might still be offloaded to a Wi-Fi AP that is serving several UEs while the mobile network (e.g. LTE) that it was previously connected to is rather unloaded.
  • a Wi-Fi AP that is serving several UEs while the mobile network (e.g. LTE) that it was previously connected to is rather unloaded.
  • FIG. 1 c illustrates the situation when interruptions of on-going services have occurred due to the change of IP address when the UE switches to the Wi-Fi network 30 .
  • VoIP Voice over IP
  • FIG. 1 c illustrates the situation when interruptions of on-going services have occurred due to the change of IP address when the UE switches to the Wi-Fi network 30 .
  • VoIP Voice over IP
  • a user who started a Voice over IP (VoIP) call while connected to a mobile network 20 is likely to experience a call drop when arriving home and the UE switching to the Wi-Fi network automatically.
  • VoIP Voice over IP
  • Some applications are smart enough to handle this and survive the IP address change (e.g. Spotify®), the majority of current applications do not. This places a lot of burden on application developers if they have to ensure service continuity.
  • FIG. 1 d illustrates the situation when no consideration of the UE's 10 mobility along a path 15 is made.
  • the dotted line of the oval area is indicating the coverage of the 3GPP/LTE mobile network 20
  • the dotted lines of the circles indicate the coverage areas of local Wi-Fi network APs 30 . Due to this, a fast moving UE 10 can end up being offloaded to a Wi-Fi AP 30 for a short duration, just to be handed over back to the mobile network 20 .
  • This is specially a problem in scenarios like cafes with open Wi-Fi, where a user walking by or even driving by the cafe might be affected by this.
  • Such ping pong between the Wi-Fi and mobile network can cause service interruptions as well as generate considerable unnecessary signalling (e.g. towards authentication servers)
  • Wi-Fi has been subject to increased interest from cellular network operators, not only as an extension to fixed broadband access.
  • the interest is mainly about using the Wi-Fi technology as an extension, or alternative to cellular radio access network technologies to handle the always increasing wireless bandwidth demands.
  • Cellular operators that are currently serving mobile users with, e.g., any of the 3GPP technologies, LTE, UMTS/WCDMA, or GSM, see Wi-Fi as a wireless technology that can provide good support in their regular cellular networks.
  • the term “operator-controlled Wi-Fi” points to a Wi-Fi deployment that on some level is integrated with a cellular network operators existing network and where the 3GPP radio access networks and the Wi-Fi wireless access may even be connected to the same core network and provide the same services.
  • Wi-Fi offload is commonly used and points towards that cellular network operators seek means to offload traffic from their cellular networks to Wi-Fi, e.g., in peak-traffic-hours and in situations when the cellular network for one reason or another needs to be off-loaded, e.g. to provide requested quality of service, maximize bandwidth or simply for coverage.
  • One object of some of the provided techniques in this disclosure is to specify UE behavior in reaction to rejection/disconnection from an access network.
  • a method and embodiments thereof are provided, wherein said method is a method in user equipment for access network selection between a first network and a second network.
  • Said first and second networks comprise one or more access candidates.
  • Said method comprise starting the access network selection procedure for one or more access candidates of the second network, and sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by selecting a new access candidate from said one or more access candidates, and performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
  • a user equipment, UE, and embodiments thereof are provided, wherein said UE comprises a processor circuitry and a computer program comprising computer program code which, when run in a processor circuitry causes the UE to perform the steps of starting the access network selection procedure for one or more access candidates of the second network, and sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by selecting a new access candidate from said one or more access candidates, and performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
  • a computer program and embodiments thereof are provided, wherein said computer program comprises computer program code which, when run in a processor circuitry of a user equipment, UE, causes the UE to perform the steps of starting the access network selection procedure for one or more access candidates of the second network, and sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by selecting a new access candidate from said one or more access candidates, and performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
  • a computer program product and embodiments thereof are provided, wherein said computer program product comprises a computer program as defined above and a computer readable means on which the computer program is stored.
  • Said computer program comprises computer program code which, when run in a processor circuitry of a user equipment, UE, causes the UE to perform the steps of starting the access network selection procedure for one or more access candidates of the second network, and sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by selecting a new access candidate from said one or more access candidates, and performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
  • a carrier and embodiments thereof are provided, wherein said carrier contains the computer program as defined above and the carrier is one of an electronic signal, optical signal, radio signal or computer readable storage medium.
  • Said computer program comprises computer program code which, when run in a processor circuitry of a user equipment, UE, causes the UE to perform the steps of starting the access network selection procedure for one or more access candidates of the second network, and sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by selecting a new access candidate from said one or more access candidates, and performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
  • One advantage with the above proposed techniques is that a UE will not try in vain to connect to an access node/network that it has been disconnected/rejected from. Further, one advantage is that UE may try to find the next best access node/network to connect to. Yet another advantage is that the suggested techniques will improve UE battery consumption of the UE, avoid unnecessary network signalling load, and improve the quality of experience of the user. It is also an advantage that the above suggested techniques guarantee predictable and testable UE behaviour.
  • FIGS. 1 a -1 d are block diagrams describing problems with prior art solutions
  • FIGS. 2, 3 and 4 are signalling schemes for illustrating different solutions for achieving final steering decisions to different access candidates, e.g. networks or access points of networks;
  • FIG. 5 is a flowchart of an embodiment of the method for access network selection
  • FIG. 6 is a flowchart of another embodiment of the method.
  • FIG. 7 is a flowchart of further one embodiment of the method.
  • FIG. 8 is a flowchart of yet another embodiment of the method.
  • FIG. 9 is a flowchart of an additional embodiment of the method.
  • FIG. 10 is a block diagram illustrating one example of a user equipment, wherein the method is implemented
  • FIG. 11 is a block diagram illustrating another example of a user equipment, wherein the method is implemented.
  • the term “user equipment”, or abbreviated “UE”, will be used throughout this description for denoting a wireless communication device or any device which is capable of wireless communications.
  • the term user equipment or UE may thus include any device, which may be used by a user for wireless communications. Accordingly, the term user equipment or UE may alternatively be referred to as a mobile terminal, a terminal, a user terminal (UT), a wireless terminal, a wireless communication device, a wireless transmit/receive unit (WTRU), a mobile phone, a cell phone, a table computer, a smart phone, etc.
  • the term user equipment or UE includes MTC (Machine Type Communication) devices, which do not necessarily involve human interaction. MTC devices are sometimes referred to as Machine-to-Machine (M2M) devices.
  • MTC Machine-to-Machine
  • the Access Network Discovery and Selection Function contain data management and control functionality necessary to provide network discovery and selection assistance data as per operators' policy, see references [1], [2] and [3].
  • the ANDSF enables an energy-efficient mechanism of network discovery, where the UE can avoid continuous and energy-consuming background scanning.
  • the ANDSF provides the mobile operators with a tool for the implementation of flexible and efficient UE steering of access mechanisms, where policy control can guide UEs to select one particular RAN over another and where certain traffic should be routed to.
  • the UE can be provided policies from both the ANDSF entities in the Home PLMN network (H-ANDSF) and the Visited PLMN network (V-ANDSF).
  • H-ANDSF Home PLMN network
  • V-ANDSF Visited PLMN network
  • the policies coming from the H-ANDSF take precedence, see ref. [3]. It is also worth noting that user preferences take precedence over both the H-ANDSF and V-ANDSF provided policies.
  • the UE When communicating with the ANDSF server, the UE provides its location and profile to the ANDSF server.
  • the UE's location can be specified in 3GPP cell IDs, 3GPP2 cell IDs, WiMAX cell IDs, WLAN SSIDs, or explicit geographical location.
  • the UE profile can contain detailed information, such as device capabilities and OS type, which can be used by the ANDSF server to customize the ANDSF information to be sent to the UE.
  • the information sent to the UE basically falls into the category of access network discovery or/and operator policies for access selection.
  • FIG. 2 is a signalling scheme illustrating solution 1, which is a UE based solution, i.e. UE makes final steering decision, where the ANDSF is enhanced with additional policies that uses 3GPP RAN assistance information provided to the UE through broadcast signalling, and optionally dedicated signalling. If there are no ANDSF policies deployed or the UE doesn't support it, then an enhanced proprietary Wi-Fi-if-coverage mechanism is used.
  • the main assistance information provided to the UE is the RAN load: percentage load, load levels (low, medium, high), offload preference indicator, etc. Additionally, or alternatively, information such as maximum expected resource allocation for a UE on 3GPP, WLAN RSSI/BSS load thresholds, 3GPP RSRP/Received Signal Code Power (RSCP) thresholds that have to be fulfilled for traffic steering decisions.
  • RSCP Signal Code Power
  • the decisions are based on the RAN assistance information, UE measurements, information provided by WLAN and policies, or conditions that are obtained via ANDSF or via other Open Mobile Alliance Device Management (OMA-DM) mechanisms or pre-configured at the UE to steer traffic to WLAN or to RAN.
  • OMA-DM Open Mobile Alliance Device Management
  • ANDSF ISRP rules can be enhanced to utilize the RAN assistance and WLAN provided information:
  • the value of the thresholds may also be provided by the ANDSF itself rather than included in the RAN assistance information.
  • FIG. 3 is a signalling scheme illustrating solution 2, which follows principles similar to IDLE mode operations in 3GPP, where the UE follows RAN specified rules to perform cell (re-)selection.
  • the RAN provides through dedicated and/or broadcast signalling thresholds which are used in the rules.
  • threshold1 to threshold4 are part of the parameters that are communicated from the RAN
  • measured_metric_A to measured_metric_B are measurement values the UE has gathered and the rules themselves are to be specified in RAN specifications.
  • ANDSF rules can also be used, e.g. for flow based traffic steering via ISRP.
  • FIG. 4 is a signalling scheme illustrating solution 3, which follows principles similar to CONNECTED mode operations in 3GPP, where the following three main steps are employed for traffic steering:
  • UEs in IDLE mode can request to setup an RRC connection for the sake of sending measurement reports when the conditions of Step 1 are satisfied.
  • solution 1 or 2 which are equally applicable to both IDLE and CONNECTED UEs, might be employed for handling IDLE UEs while solution 3 is used only for CONNECTED UEs.
  • One example mechanism is that the 3GPP network broadcasts a set of SSIDs/BSSIDs/HESSIDs/etc. The UE would then for the WLANs corresponding to the broadcasted identifier evaluate whether or not to connect to such a WLAN. Other mechanisms which are based on dedicated signaling are also possible.
  • One problem to be solved is that the current behavior of the UE is not specified when the UE can't connect to the access network prioritized for steering by ANDSF/RAN, e.g. UE gets rejected before admission to the access network and the UE gets disconnects during normal operations with the access network, etc.
  • UE gets rejected before admission to the access network and the UE gets disconnects during normal operations with the access network, etc.
  • a UE might keep on trying to get connected to the access network that just rejected it several times before giving up, wasting UE battery, increasing network signaling load, and degrading the quality of experience of the user.
  • One object of some of the provided technique is to specify UE behavior in reaction to rejection/disconnection from an access network. Instead of repeatedly trying to reconnect to an access node/network that has rejected/disconnected it, a UE will find the next best access node/network to connect with. It says herein that the UE connects or disconnects from a WLAN. This may refer to that the UE connects or disconnects from a certain WLAN access point, i.e. a BSS, identified by a BSSID, or from a set of WLAN access points, i.e. an ESS, identified by an ESSID or HESSID.
  • disconnection here is not limited to the case when the UE has been connected to a WLAN and later gets disconnected, but the solutions presented herein also covers the case when the UE has been rejected from connection to a WLAN e.g. during the connection attempt to that WLAN.
  • the UE might have been disconnected because of genuine problems in the network that do not account for deliberate steering, e.g. problem with credentials, loss of network connectivity, non-responding network nodes, etc.
  • disconnection could also mean that traffic has been rejected and cannot be steered to a certain WLAN. For example a UE gets admitted to connect to a network node but is rejected to route traffic over that access.
  • WLAN Being “connected” to WLAN can mean different things, as exemplified by the existence of one or more of the below conditions:
  • a technique for selection of access candidates e.g. access networks
  • Said technique controls the user equipment to avoid connecting to an access node/network that it has been disconnected/rejected from.
  • the following described technology enhances current ANDSF or RAN procedures when a UE can't connect to the access network prioritized for steering, e.g. UE gets rejected before admission to the access network, UE gets disconnects during normal operations with the access network, etc.
  • FIG. 5 is a flowchart illustrating a method according one embodiment of the method for access network selection. The method may also be considered as a method for controlling connection attempts to alternative access candidates.
  • the method for access network selection is performed in a UE.
  • the method comprises:
  • new access candidate is meant an available alternative access candidate for which an attempt not has been performed.
  • Different stop criterions may be used in step S 120 for stopping the access network attempts, either alone or at the same time as a set of stop criteria. When one stop criterion of the set of stop criteria is fulfilled, the access network selection procedure for the access candidate is terminated.
  • the stop criterion is that a rejection is received from the access candidate to which a connection establishing attempt is performed.
  • a stop criterion is based on a maximum time for a connection establishing attempt, i.e. when the maximum time for a connection establishing attempt to an access candidate is exceeded, the attempt is stopped.
  • Said maximum time may be measured by a timer, which is set and started when a connection establishing attempt is started for an access candidate.
  • Said maximum time may be pre-set of a vendor or operator.
  • the maximum time may be per access network and/or node. It may also be so that there is one maximum time per group of access networks, e.g. one maximum time for accesses of a certain RAT. It may also be so that the maximum time applies to a group of access networks and/or nodes such as one maximum time for all WLANs with an SSID X. It would also be possible that there is one maximum time applicable to all access networks and/or nodes.
  • the maximum time may be signalled from the network to the terminal.
  • a stop criterion is based on a maximum number of connection establishing attempts for establishing connection to an access candidate, i.e. when the maximum number of connection establishing attempts to an access candidate is exceeded, the attempt is stopped. Said number of attempts is measured/counted by a counter means. Said maximum number may be pre-set of a vendor or operator.
  • the UE When a user equipment terminal is disconnected from an access, the UE will start, by step S 110 in the method S 100 , connection attempts to alternative access candidates.
  • the UE terminal will upon disconnection from or rejection of connection attempt to an access node/network A, apply a policy/rule to select an alternative access candidate to connect to, e.g. node/network B.
  • the policy/rule that instructs the UE to connect to the alternative access candidate B may be the same as the policy/rule which instructed the UE to connect to the access node/network A.
  • the alternative access may be of the same Radio Access Technology (RAT) as the first access. For example a UE gets disconnected from a first WLAN and then upon disconnection from that WLAN the UE connects to and/or steers traffic to a second WLAN.
  • RAT Radio Access Technology
  • the UE could be configured to consider a group of nodes in a network to be the same access.
  • an operator may have a first WLAN A, which could have an ESSID identifier “A”, comprising three nodes; WLAN AP 1, WLAN AP 2 and WLAN AP 3, which could have a BSSIDs “1”, “2” and “3”, respectively, and a second WLAN B, which could have an ESSID identifier “B”, comprising two nodes; WLAN AP 4 and WLAN AP 5, which could have a BSSIDs “4”, and “5”, respectively.
  • the UE can consider all the nodes of WLAN A to be one access, for example due to that they share the same ESSID, and all the nodes of WLAN B to be one access, for example due to that they share the same ESSID.
  • all the nodes of WLAN B to be one access, for example due to that they share the same ESSID.
  • the UE could be configured to consider each node of a network to be different accesses, e.g. in the example above with WLAN A and WLAN B there would be in total 5 accesses; WLAN 1, WLAN 2, WLAN 3, WLAN 4 and WLAN 5. And according to some embodiments herein the UE could, upon disconnection from WLAN 1, select WLAN 2 to attempt to connect to, even though the ESSID for WLAN 1 and WLAN 2 is the same.
  • the alternative access is of another Radio Access Technology compared to the first access. For example, a UE gets disconnected from a WLAN and then connects to and/or steers traffic to a 3GPP network.
  • step S 120 different criteria may be used.
  • the UE will select an alternative access given that the first access has indicated to the UE a certain cause value for the disconnection from the first access, while another cause value, or absence of cause value indication the UE would apply a default behavior, where the default behavior could be based on UE implementation and, as explained earlier, may be that the UE is reattempting to connect to the first access.
  • a WLAN network indicates to the UE a cause value X at, or before, the disconnection of the UE.
  • the UE will when being disconnected from the WLAN select alternative access, e.g. another WLAN or an access implementing another Radio Access Technology (RAT) such as a 3GPP RAT, and connect to that other access.
  • RAT Radio Access Technology
  • the network indicates another cause value, e.g. cause value Y, or not providing any cause value, the UE would apply the default behavior which, as explained earlier, may be to try to reconnect to the first access candidate.
  • the benefit of this embodiment is that the WLAN access can decide whether the UE should connect to an alternative access or apply some other behavior.
  • the UE may select the alternative access candidate based on a priority order associated with alternative accesses.
  • This priority order may be indicated by a network node, for example in an ANDSF policy, as described above or some other mechanism such as the RAN mechanism described above.
  • the method S 100 and a UE will upon disconnection, or rejection, from the first access candidate evaluate which access has second highest priority and then evaluate whether that access is available or not. Whether an access is available or not may be determined based on for example an ANDSF policy or some other mechanism such as the RAN mechanism described above. If the second highest priority access is available the UE would attempt to connect to that access, otherwise the UE would refrain from connecting to that access and evaluate which is the third highest priority access and whether the third highest priority access is available or not, and so on.
  • the access network selection procedure S 100 in general: Say the UE has ANDSF rules or RAN policies that control the UE on how to do the access network selection. These policies/rules are always active in the UE. The embodiments proposed of the method S 100 are just concerning once those policies/rules have fired, and on how to proceed.
  • UE notices that it is in the coverage of WLANs belonging to A and C, and they fulfil the criteria, attempts to connect to A but gets rejected, then tries C, gets connected. 2 minutes after that, the UE notices that it is in the coverage of WLANs B and C. It is already connected to C but since B is of higher priority than C, it tries to connect to B.
  • FIG. 6 is a flowchart illustrating a method according another embodiment of the method. As illustrated in the flowchart of this embodiment, the method may comprise a terminating step, which is optional.
  • the method S 100 for access network selection procedure is performed in a UE.
  • the method comprises:
  • the method S 100 comprises the optional terminating step, as illustrated:
  • the attempt is stopped, The UE can use the established connection for sending and receiving signalling and data communication.
  • the attempt/-s for the selected candidate is/are continuing if not one “stop criteria is fulfilled”, which results in that the process leaves the test, S 124 , for step S 121 for checking if a new access candidate is available, and if so, selecting a new candidate, S 122 , and restart the connection attempts, S 123 .
  • FIG. 8 is a flowchart illustrating an embodiment comprising the termination step, S 130 , of the method S 100 .
  • the embodiment operates as the embodiment described above in FIG. 7 , but if a new access candidate is not available, in test criterion in S 121 is not fulfilled, “NO”, because all candidates have been tested without any connection being established. The process is than stopped in the terminating step, S 130 .
  • FIG. 9 is a flowchart illustrating an additional embodiment comprising the termination step, S 130 , of the method S 100 .
  • the method S 100 starts when the UE is e.g. disconnected from the first network, and starts the access network selection procedure for one or more alternative access candidates, S 110 .
  • the method starts, there are usually a number of access candidates available. Whether, or not, there is one or more access candidate is tested in S 121 :
  • step S 122 in step S 120 Different mechanisms or techniques for selecting alternative, or new, access candidates are hereafter exemplified. One such mechanism are to use a priority order of the access candidates.
  • WLAN A For example a case where the UE has four WLAN accesses which should be considered; WLAN A, WLAN B, WLAN C and WLAN D. The UE would then evaluate for these access candidates which are considered available and which are not considered available. It may be so that only WLAN A, WLAN C and WLAN D are considered available and hence the list of available WLANs would only contain these three WLANs. If for example the UE is initially connected to (or is trying to connect to) WLAN A but then gets disconnected from (or is rejected from connecting to) WLAN A the UE would select one of the other WLANs. The UE may select out of those WLANs in the list of available WLANs the WLAN which has the highest priority.
  • the candidate target list contained only WLANs. That is just for the sake of brevity, and the list candidate target can contain accesses belonging to other RATs as well.
  • the above described methods and embodiments thereof may be implemented in digital electronically circuitry, or in computer hardware, firmware, software, or in combinations of them.
  • Devices, means, circuitry or units may be implemented in a computer program product tangibly embodied in a machine readable storage device for execution by a programmable processor; and method steps described above may be performed by a programmable processor executing a program of instructions to perform functions achieved by the method and embodiments thereof by operating on input data and generating output.
  • the described techniques may advantageously be implemented in one or more computer programs that are executable on a programmable system including at least one programmable processor, processing circuitry, processing means, etc. coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device.
  • Each computer program may be implemented in a high-level procedural or object-oriented programming language or in assembly or machine language if desired; and in any case, the language may be a compiled or interpreted language.
  • a processor, processor unit, processing circuitry, processing means, etc. will receive instructions and data from a read-only memory and/or a random access memory.
  • Storage devices such as computer readable means or computer readable storage medium, suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM (erasable programmable read only memory), EEPROM (electrically erasable programmable read only memory), and flash memory devices; magnetic disks such internal hard disks and removable disks; magneto-optical disks; and CD-ROM (Compact Disc Read-Only Memory) disks. Any of the foregoing may be supplemented by, or incorporated in, specially-designed ASICs (Application Specific Integrated Circuits).
  • ASICs Application Specific Integrated Circuits
  • FIGS. 10 and 11 are block schemes illustrating embodiments of a UE for implementing the above described method and its embodiments.
  • FIG. 10 is a block diagram illustrating one example of a UE 200 , preferably a UE for communicating with a radio node 250 in a communications network, e.g. wireless communications network or telecommunications network supporting Wi-Fi by means of a WLAN 250B, 250C or any RAT by means of a RAN 250A.
  • a communications network e.g. wireless communications network or telecommunications network supporting Wi-Fi by means of a WLAN 250B, 250C or any RAT by means of a RAN 250A.
  • Said UE 200 is configured to perform connection establishing attempts.
  • the UE comprises at least one processing circuitry 210 comprising a processor unit 212 and a memory storage 214 .
  • the UE 200 further comprises an interface 220 for enabling input and output communication 222 with other nodes, etc.
  • the UE 200 may also comprise computer readable means or computer readable storage medium 230 on which a computer program is stored. Said means or medium 230 may be fixed in the UE or removable
  • said UE may comprise a different number of computer readable means or computer readable storage medium 230 , and the illustrated number of computer readable means or computer readable storage medium 230 only is for illustrative purposes.
  • One or several of the computer readable means or computer readable storage medium 230 may be physically separated from the other computer readable means or computer readable storage medium 230 , or may reside on the same physical media.
  • Said processing circuitry 210 causes the UE to perform the steps of the above described method S 100 and embodiments thereof.
  • the processing circuitry 210 of the UE 200 is adapted to and operative to start an access network selection procedure for one or more access candidates, sequentially perform connection establishing attempts for the access candidates of the second network to one or more of the access candidates.
  • Said processing circuitry 210 may also cause the UE to perform the step of terminating the access network selection procedure if connection to one of said one or more access candidates is established or each connection establishing attempt for all access candidates have been stopped by a stop criterion.
  • the stop criterion may be that a rejection is received from the access candidate to which a connection establishing attempt is performed, and/or a maximum time for a connection establishing attempt, and/or a maximum number of connection establishing attempts for establishing connection to an access candidate.
  • the UE 200 may be adapted, e.g. by means of the processing circuitry 210 to select a new access candidate from said one or more access candidate, to start a connection establishing attempt to said access candidate, to check if connection to an access candidate is established, and to check if a stop criterion is fulfilled.
  • processing circuitry 210 may be implemented as processing circuitry 210 and a computer program comprising computer program code which, when run in a processor circuitry of a UE, causes the UE to perform the method steps of the method S 100 :
  • the computer program comprises computer program code which, when run in a processor circuitry of a node, causes the node to perform the different embodiments of the method S 100 , as described above.
  • a carrier containing the computer program wherein the carrier is one of an electronic signal, optical signal, radio signal or computer readable storage medium.
  • FIG. 11 is a block diagram illustrating another example of one embodiment of a UE 200 , preferably a UE for communicating with a radio node 250 in a communications network, e.g. wireless communications network or telecommunications network supporting Wi-Fi by means of a WLAN 250B, 250C or any RAT by means of a RAN 250A.
  • a communications network e.g. wireless communications network or telecommunications network supporting Wi-Fi by means of a WLAN 250B, 250C or any RAT by means of a RAN 250A.
  • the above mentioned embodiments of the method S 100 may be implemented as modules of a UE 200 , said modules causes the UE to perform the method steps of the method S 100 .
  • the UE may therefore comprise a first module S 110 for starting the access network selection procedure for one or more access candidates, a second module S 120 for sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates, and a third module S 130 for terminating the access network selection procedure if connection to one of said one or more access candidates is established or each connection establishing attempt for all access candidates have been stopped by a stop criterion.
  • the UE 200 may comprise further modules for implementing the different embodiments of the method S 100 , said modules causes the UE to perform the different embodiments of the method S 100 .
  • the UE 200 may comprise a counter means for enabling a stop criterion which is based on a maximum number of connection establishing attempts for establishing connection to an access candidate, i.e. when the maximum number of connection establishing attempts to an access candidate is exceeded, the attempt is stopped. Said number of attempts is measured/counted by the counter means.
  • Another example is for enabling a stop criterion which is based on a maximum time for a connection establishing attempt, i.e. when the maximum time for a connection establishing attempt to an access candidate is exceeded, the attempt is stopped.
  • Said maximum time may be measured by a timer, which is set and started when a connection establishing attempt is started for an access candidate.
  • the user equipment may comprise a module for handling stop criterion received, e.g. at a rejection from the access candidate to which a connection establishing attempt is performed.
  • the user equipment may comprise a module for handling cause values e.g. in a received rejection, said cause value indicating an alternative access candidate for the user equipment to select.
  • the cause value may also indicate selection of an alternative access candidate implementing a Radio Access Technology which differs from the Radio Access Technology used in the first network.
  • the user equipment may also be adapted to at an absence of a default value, or the cause value is indicating for the user equipment, to perform a default behaviour.
  • the user equipment may further comprise a module for selecting one alternative access candidate based on a priority order.
  • the UE may be adapted to evaluate which of the access candidates available has the highest priority.
  • the user equipment may further comprise a module for maintaining the priority list with a list of available access candidates. Said list of available access candidates may be updated, e.g. at rejection or disconnection with a specific cause value.
  • FIGS. 10 and 11 may be considered as logical units, and do not necessarily correspond to separate physical units or modules.
  • the person skilled in the art would appreciate that the units disclosed in the FIGS. 10 and 11 may be implemented as physically integrated units, and/or physically separate units, and that the units are provided with appropriate processing circuits.

Abstract

The invention relates to methods, user equipments, computer programs, computer program products and carriers for access network selection between a first network and a second network. Said first and second networks comprise one or more access candidates. An access network selection procedure is performed for one or more access candidates of the second network, sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates, by selecting a new access candidate from said one or more access candidates, and performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.

Description

    TECHNICAL FIELD
  • The present technology relates to a method, a user equipment, a computer, a computer program product and a carrier for performing connection attempts to alternative access points and/or networks upon connection attempt rejection.
  • BACKGROUND
  • Most current Wi-Fi or WLAN deployments are totally separate from mobile networks, and can be seen as non-integrated from the user equipment, UE, perspective. Most operating systems, OSs, for UEs such as Android™ and ioS®, support a simple Wi-Fi offloading mechanism where a UE immediately switches all its IP traffic to a Wi-Fi network upon a detection of a suitable network with a received signal strength above a certain level. Henceforth, the decision to offload to a Wi-Fi or not is referred to as access selection strategy and the term “Wi-Fi-if-coverage” is used to refer to the aforementioned strategy of selecting Wi-Fi whenever such a network is detected.
  • There are several drawbacks of the “Wi-Fi-if-coverage” strategy illustrated in FIG. 1. FIG. 1 illustrates examples of problems in FIGS. 1a )-1 d) with “Wi-Fi-if-coverage” access network selection. Wi-Fi access selection today is performed by the UE with little consideration of radio performance, session/service continuity, load, mobility, etc.
  • Though the user/UE can save previous pass codes for already accessed Wi-Fi Access Points, APs, hotspot login for previously non-accessed APs usually requires user intervention, either by entering the pass code in Wi-Fi Connection Manager, CM, or using a web interface. The connection manager is software on a UE that is in charge of managing the network connections of the device, taking into account user preferences, operator preferences, network conditions, etc.
  • In FIGS. 1a-1d , a user equipment 10 has the possibility to connect to an AP of a mobile access network 20 or an AP of a Wi-Fi Access network 30. The mobile access network 20 may operate according to the 3GPP and/or LTE standards.
  • In FIG. 1a , is also illustrated that the mobile access network is connected to the Internet 60 via a backhaul network 40 and the Wi-Fi access network is connected to the Internet via a backhaul network 50. The backhaul network 40 of the mobile access network may in this example provide a high rate fibre connection. The Wi-Fi access network offers an low rate xDSL connection 50, e.g. 10/2 Mbps.
  • The UE may connect to the AP of either the mobile access network 20 via a connection 25 offering 50 Mbps bandwidth, or the AP of the Wi-Fi access network 30 via a connection 35 offering a rate of 2 Mbps.
  • No consideration of expected user experience is made except those considered in the UE 10 implemented proprietary solution, and this can lead to a UE 10 being handed over from a high data rate mobile network connection 25 to a low data rate Wi-Fi connection 35. Even though the UE's OS or some high level software is smart enough to make the offload decisions only when the signal level on the Wi-Fi connection 35 is considerably better than the mobile network link 25, there can still be limitations on the backhaul 40 of the Wi-Fi AP 30 that may end up being the bottleneck.
  • FIG. 1b illustrates the situation when no consideration of the load conditions in the mobile network 20 and Wi-Fi network 30 are made. As illustrated, while the capacity of the Wi-Fi network 30 is full, the mobile network 20 has low load and a lot of free capacity. As such, the UE might still be offloaded to a Wi-Fi AP that is serving several UEs while the mobile network (e.g. LTE) that it was previously connected to is rather unloaded.
  • FIG. 1c illustrates the situation when interruptions of on-going services have occurred due to the change of IP address when the UE switches to the Wi-Fi network 30. For example, a user who started a Voice over IP (VoIP) call while connected to a mobile network 20 is likely to experience a call drop when arriving home and the UE switching to the Wi-Fi network automatically. Though some applications are smart enough to handle this and survive the IP address change (e.g. Spotify®), the majority of current applications do not. This places a lot of burden on application developers if they have to ensure service continuity.
  • FIG. 1d illustrates the situation when no consideration of the UE's 10 mobility along a path 15 is made. The dotted line of the oval area is indicating the coverage of the 3GPP/LTE mobile network 20, the dotted lines of the circles indicate the coverage areas of local Wi-Fi network APs 30. Due to this, a fast moving UE 10 can end up being offloaded to a Wi-Fi AP 30 for a short duration, just to be handed over back to the mobile network 20. This is specially a problem in scenarios like cafes with open Wi-Fi, where a user walking by or even driving by the cafe might be affected by this. Such ping pong between the Wi-Fi and mobile network can cause service interruptions as well as generate considerable unnecessary signalling (e.g. towards authentication servers)
  • Recently, Wi-Fi has been subject to increased interest from cellular network operators, not only as an extension to fixed broadband access. The interest is mainly about using the Wi-Fi technology as an extension, or alternative to cellular radio access network technologies to handle the always increasing wireless bandwidth demands. Cellular operators that are currently serving mobile users with, e.g., any of the 3GPP technologies, LTE, UMTS/WCDMA, or GSM, see Wi-Fi as a wireless technology that can provide good support in their regular cellular networks. The term “operator-controlled Wi-Fi” points to a Wi-Fi deployment that on some level is integrated with a cellular network operators existing network and where the 3GPP radio access networks and the Wi-Fi wireless access may even be connected to the same core network and provide the same services.
  • There is currently quite intense activity in the area of operator-controlled Wi-Fi in several standardization organizations. In 3GPP, activities to connect Wi-Fi access points to the 3GPP-specified core network is pursued, and in Wi-Fi alliance, WFA, activities related to certification of Wi-Fi products are undertaken, which to some extent also is driven from the need to make Wi-Fi a viable wireless technology for cellular operators to support high bandwidth offerings in their networks. The term Wi-Fi offload is commonly used and points towards that cellular network operators seek means to offload traffic from their cellular networks to Wi-Fi, e.g., in peak-traffic-hours and in situations when the cellular network for one reason or another needs to be off-loaded, e.g. to provide requested quality of service, maximize bandwidth or simply for coverage.
  • SUMMARY
  • One object of some of the provided techniques in this disclosure is to specify UE behavior in reaction to rejection/disconnection from an access network.
  • According to one aspect of the following technique, a method and embodiments thereof are provided, wherein said method is a method in user equipment for access network selection between a first network and a second network. Said first and second networks comprise one or more access candidates. Said method comprise starting the access network selection procedure for one or more access candidates of the second network, and sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by selecting a new access candidate from said one or more access candidates, and performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
  • According to another aspect of the technique, a user equipment, UE, and embodiments thereof are provided, wherein said UE comprises a processor circuitry and a computer program comprising computer program code which, when run in a processor circuitry causes the UE to perform the steps of starting the access network selection procedure for one or more access candidates of the second network, and sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by selecting a new access candidate from said one or more access candidates, and performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
  • According to yet another aspect of the technique, a computer program and embodiments thereof are provided, wherein said computer program comprises computer program code which, when run in a processor circuitry of a user equipment, UE, causes the UE to perform the steps of starting the access network selection procedure for one or more access candidates of the second network, and sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by selecting a new access candidate from said one or more access candidates, and performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
  • According to further one aspect of the technique, a computer program product and embodiments thereof are provided, wherein said computer program product comprises a computer program as defined above and a computer readable means on which the computer program is stored. Said computer program comprises computer program code which, when run in a processor circuitry of a user equipment, UE, causes the UE to perform the steps of starting the access network selection procedure for one or more access candidates of the second network, and sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by selecting a new access candidate from said one or more access candidates, and performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
  • According to further one aspect of the technique, a carrier and embodiments thereof are provided, wherein said carrier contains the computer program as defined above and the carrier is one of an electronic signal, optical signal, radio signal or computer readable storage medium. Said computer program comprises computer program code which, when run in a processor circuitry of a user equipment, UE, causes the UE to perform the steps of starting the access network selection procedure for one or more access candidates of the second network, and sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by selecting a new access candidate from said one or more access candidates, and performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
  • One advantage with the above proposed techniques is that a UE will not try in vain to connect to an access node/network that it has been disconnected/rejected from. Further, one advantage is that UE may try to find the next best access node/network to connect to. Yet another advantage is that the suggested techniques will improve UE battery consumption of the UE, avoid unnecessary network signalling load, and improve the quality of experience of the user. It is also an advantage that the above suggested techniques guarantee predictable and testable UE behaviour.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The foregoing, and other, objects, features and advantages of the present solutions will be more readily understood upon reading the following detailed description in conjunction with the drawings in which:
  • FIGS. 1a-1d are block diagrams describing problems with prior art solutions;
  • FIGS. 2, 3 and 4 are signalling schemes for illustrating different solutions for achieving final steering decisions to different access candidates, e.g. networks or access points of networks;
  • FIG. 5 is a flowchart of an embodiment of the method for access network selection;
  • FIG. 6 is a flowchart of another embodiment of the method;
  • FIG. 7 is a flowchart of further one embodiment of the method;
  • FIG. 8 is a flowchart of yet another embodiment of the method;
  • FIG. 9 is a flowchart of an additional embodiment of the method;
  • FIG. 10 is a block diagram illustrating one example of a user equipment, wherein the method is implemented;
  • FIG. 11 is a block diagram illustrating another example of a user equipment, wherein the method is implemented.
  • DETAILED DESCRIPTION
  • In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular circuits, circuit components, techniques, etc. in order to provide a thorough understanding of the present solutions. However, it will be apparent to one skilled in the art that the present solutions may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known methods, devices, and circuits are omitted so as not to obscure the description of the present solutions with unnecessary detail.
  • The term “user equipment”, or abbreviated “UE”, will be used throughout this description for denoting a wireless communication device or any device which is capable of wireless communications. The term user equipment or UE may thus include any device, which may be used by a user for wireless communications. Accordingly, the term user equipment or UE may alternatively be referred to as a mobile terminal, a terminal, a user terminal (UT), a wireless terminal, a wireless communication device, a wireless transmit/receive unit (WTRU), a mobile phone, a cell phone, a table computer, a smart phone, etc. Yet further, the term user equipment or UE includes MTC (Machine Type Communication) devices, which do not necessarily involve human interaction. MTC devices are sometimes referred to as Machine-to-Machine (M2M) devices.
  • Following mechanisms provides the interworking of 3GPP and WLAN networks.
  • The Access Network Discovery and Selection Function (ANDSF) contain data management and control functionality necessary to provide network discovery and selection assistance data as per operators' policy, see references [1], [2] and [3]. By supplying information about available 3GPP and non-3GPP access networks to the UE, the ANDSF enables an energy-efficient mechanism of network discovery, where the UE can avoid continuous and energy-consuming background scanning. Furthermore, the ANDSF provides the mobile operators with a tool for the implementation of flexible and efficient UE steering of access mechanisms, where policy control can guide UEs to select one particular RAN over another and where certain traffic should be routed to.
  • In a roaming scenario, the UE can be provided policies from both the ANDSF entities in the Home PLMN network (H-ANDSF) and the Visited PLMN network (V-ANDSF). In case there are policy conflicts between the two policy sets, the policies coming from the H-ANDSF take precedence, see ref. [3]. It is also worth noting that user preferences take precedence over both the H-ANDSF and V-ANDSF provided policies.
  • When communicating with the ANDSF server, the UE provides its location and profile to the ANDSF server. The UE's location can be specified in 3GPP cell IDs, 3GPP2 cell IDs, WiMAX cell IDs, WLAN SSIDs, or explicit geographical location. The UE profile can contain detailed information, such as device capabilities and OS type, which can be used by the ANDSF server to customize the ANDSF information to be sent to the UE. The information sent to the UE basically falls into the category of access network discovery or/and operator policies for access selection.
  • Rel-12 3GPP RAN level integration that is able to provide more operator control, enhanced user experience and system performance/utilization is required as operator controlled WLAN deployments become more common and WLAN usage increases. In order to address this RAN level integration, a study item, SI, was proposed in the 3GPP plenary meeting #58 that addresses the issue of (operator deployed/controlled) WLAN and 3GPP interworking at RAN level, see ref. [4]. The main aim of the SI was to find solutions that address the under-utilization of operator deployed WLANs, sub-optimal UE performance while connected to WLAN and battery drainage due to unnecessary WLAN scanning. Three solutions were proposed during the study item phase as described in ref. [5], named solutions 1, 2 and 3.
  • FIG. 2 is a signalling scheme illustrating solution 1, which is a UE based solution, i.e. UE makes final steering decision, where the ANDSF is enhanced with additional policies that uses 3GPP RAN assistance information provided to the UE through broadcast signalling, and optionally dedicated signalling. If there are no ANDSF policies deployed or the UE doesn't support it, then an enhanced proprietary Wi-Fi-if-coverage mechanism is used. The main assistance information provided to the UE is the RAN load: percentage load, load levels (low, medium, high), offload preference indicator, etc. Additionally, or alternatively, information such as maximum expected resource allocation for a UE on 3GPP, WLAN RSSI/BSS load thresholds, 3GPP RSRP/Received Signal Code Power (RSCP) thresholds that have to be fulfilled for traffic steering decisions.
  • The decisions are based on the RAN assistance information, UE measurements, information provided by WLAN and policies, or conditions that are obtained via ANDSF or via other Open Mobile Alliance Device Management (OMA-DM) mechanisms or pre-configured at the UE to steer traffic to WLAN or to RAN. For example, ANDSF ISRP rules can be enhanced to utilize the RAN assistance and WLAN provided information:
      • If RAN RSRP is less than a threshold s and RAN direct load is greater than a threshold x, and if WLAN RSSI is greater than a threshold r and WLAN BSS load is less than a threshold y, move flow to WLAN.
      • If RAN RSRP is greater than a threshold s′ and RAN direct load is less than a threshold x′, and if WLAN RSSI is less than a threshold r′ and WLAN BSS load is greater than a threshold y′, move flow to UMTS/LTE.
  • The value of the thresholds (e.g. RAN RSRP/RSCP thresholds) may also be provided by the ANDSF itself rather than included in the RAN assistance information.
  • FIG. 3 is a signalling scheme illustrating solution 2, which follows principles similar to IDLE mode operations in 3GPP, where the UE follows RAN specified rules to perform cell (re-)selection. The RAN provides through dedicated and/or broadcast signalling thresholds which are used in the rules.
  • Below are a couple of examples of RAN rules to be specified for solution 2:
      • If measured_metric_A is less than a threshold1 and measured_metric_B is greater than a threshold2, move flow to WLAN.
      • If measured_metric_A is greater than a threshold3 and measured_metric_B is less than a threshold4, move flow to 3GPP.
  • In the examples above threshold1 to threshold4 are part of the parameters that are communicated from the RAN, measured_metric_A to measured_metric_B are measurement values the UE has gathered and the rules themselves are to be specified in RAN specifications. In additions to the RAN rules, ANDSF rules can also be used, e.g. for flow based traffic steering via ISRP.
  • FIG. 4 is a signalling scheme illustrating solution 3, which follows principles similar to CONNECTED mode operations in 3GPP, where the following three main steps are employed for traffic steering:
    • Step 1. Measurement control configuration: the RAN sends information to the UE that includes details like the target WLAN(s) to be measured, e.g. specific identities such as SSIDs/BSSIDs/HESSIDs or more general information like operating frequencies, events/thresholds for triggering measurement reports, e.g. when WLAN signal becomes better/worse than a certain threshold, WLAN signal becomes better/worse than a certain threshold and 3GPP signal becomes worse/better than another threshold, etc.
    • Step 2. Measurement reporting: When the conditions for triggering thresholds, as configured in Step 1 above, are fulfilled, the UE sends a measurement report to the 3GPP RAN.
    • Step 3. Traffic steering: Based on the measurement report received in Step 2, the RAN evaluates the received measurements and other relevant information obtained in eNB/RNC and as a result of this sends a traffic steering command to the UE, which can specify the traffic to be steered. This can be explicit indication of each bearer to be moved i.e. by specifying DRB/RB-IDs or more general like the QoS Class Identifier (QCI), which can apply to many bearers at once.
    • Step 4. UE ACK/Response: In this step the UE indicates to the RAN whether or not the action dictated by the traffic steering command was successfully performed or not.
  • UEs in IDLE mode can request to setup an RRC connection for the sake of sending measurement reports when the conditions of Step 1 are satisfied. Alternatively, solution 1 or 2, which are equally applicable to both IDLE and CONNECTED UEs, might be employed for handling IDLE UEs while solution 3 is used only for CONNECTED UEs.
  • In the RAN #62 plenary meeting, a decision was made to go forward with a work item (WI) that proposes a solution that is a mixture of solution 1 and 2, see ref. [6]. The objective of this work item is to specify mechanism for WLAN/3GPP access network selection and traffic steering consisting.
  • For the Access Network Selection part:
      • Selected RAN assistance parameters transferred via system broadcast and/or dedicated signalling used within:
        • RAN rules defined within RAN WG specifications in case enhanced ANDSF is not deployed in the network or not supported by the UE.
        • ANDSF policies in case enhanced ANDSF is deployed in the network and supported by the UE.
      • RAN assistance information may be enhanced with WLAN identifiers, as described herein.
  • For the Traffic Routing part:
      • Selected RAN assistance parameters transferred via system broadcast and/or dedicated signalling used within:
        • RAN rules specified in RAN2 WG specifications in case enhanced ANDSF is not deployed or not supported by the UE.
        • ANDSF policies in case enhanced ANDSF is deployed in the network and supported by the UE.
      • RAN assistance information may be enhanced with traffic routing information (e.g. offload granularity) in case ANDSF is not deployed or not supported by the UE.
  • It has in 3GPP been discussed different mechanisms for provisioning WLAN identifiers from the network to the UE which indicates to the UE which WLANs should be considered in the WLAN interworking mechanism.
  • One example mechanism is that the 3GPP network broadcasts a set of SSIDs/BSSIDs/HESSIDs/etc. The UE would then for the WLANs corresponding to the broadcasted identifier evaluate whether or not to connect to such a WLAN. Other mechanisms which are based on dedicated signaling are also possible.
  • One problem to be solved is that the current behavior of the UE is not specified when the UE can't connect to the access network prioritized for steering by ANDSF/RAN, e.g. UE gets rejected before admission to the access network and the UE gets disconnects during normal operations with the access network, etc. For example, a UE might keep on trying to get connected to the access network that just rejected it several times before giving up, wasting UE battery, increasing network signaling load, and degrading the quality of experience of the user.
  • One object of some of the provided technique is to specify UE behavior in reaction to rejection/disconnection from an access network. Instead of repeatedly trying to reconnect to an access node/network that has rejected/disconnected it, a UE will find the next best access node/network to connect with. It says herein that the UE connects or disconnects from a WLAN. This may refer to that the UE connects or disconnects from a certain WLAN access point, i.e. a BSS, identified by a BSSID, or from a set of WLAN access points, i.e. an ESS, identified by an ESSID or HESSID.
  • It herein is also described how the UE selects an alternative access upon disconnection from a first access. It should be appreciated that disconnection here is not limited to the case when the UE has been connected to a WLAN and later gets disconnected, but the solutions presented herein also covers the case when the UE has been rejected from connection to a WLAN e.g. during the connection attempt to that WLAN. Furthermore, the UE might have been disconnected because of genuine problems in the network that do not account for deliberate steering, e.g. problem with credentials, loss of network connectivity, non-responding network nodes, etc.
  • It should also be appreciated that disconnection could also mean that traffic has been rejected and cannot be steered to a certain WLAN. For example a UE gets admitted to connect to a network node but is rejected to route traffic over that access.
  • When it herein says “connect to” it may mean one or more of the below:
  • Being “connected” to WLAN can mean different things, as exemplified by the existence of one or more of the below conditions:
      • Connection could be establishing communication link between the UE and the network node (or nodes), but not necessarily transmitting information;
      • Connection could be establishing a new communication link (when one was previously present, e.g. adding a “bearer”);
      • Connection could be establishing a communication link and transmitting information over that communication link;
      • Connection could be starting to transmit information over a communication link that was previously established;
      • 802.11 Open-system authentication, OSA (Authentication to the WLAN AP) has been completed or is under way;
      • 802.1x EAP-SIM authentication (Authentication to the AAA-servers) has been completed or is under way;
      • Four way hand-shake between the UE and the WLAN network has been completed;
      • An IP address has been assigned to the UE in WLAN;
      • A PDN connection has been established through the WLAN network, i.e., a connection between the UE and the PDN gateway;
      • Data traffic has been started through the WLAN network.
  • In the following, a technique for selection of access candidates, e.g. access networks, will be presented. Said technique controls the user equipment to avoid connecting to an access node/network that it has been disconnected/rejected from. The following described technology enhances current ANDSF or RAN procedures when a UE can't connect to the access network prioritized for steering, e.g. UE gets rejected before admission to the access network, UE gets disconnects during normal operations with the access network, etc.
  • FIG. 5 is a flowchart illustrating a method according one embodiment of the method for access network selection. The method may also be considered as a method for controlling connection attempts to alternative access candidates.
  • The method for access network selection is performed in a UE. According to the following embodiment, the method comprises:
      • S110:—Starting the access network selection procedure for one or more access candidates.
      • S120:—Sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by
        • selecting a new access candidate from said one or more access candidates;
        • performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
  • With new access candidate is meant an available alternative access candidate for which an attempt not has been performed. Different stop criterions may be used in step S120 for stopping the access network attempts, either alone or at the same time as a set of stop criteria. When one stop criterion of the set of stop criteria is fulfilled, the access network selection procedure for the access candidate is terminated.
  • According to one example, the stop criterion is that a rejection is received from the access candidate to which a connection establishing attempt is performed.
  • Another example of a stop criterion is based on a maximum time for a connection establishing attempt, i.e. when the maximum time for a connection establishing attempt to an access candidate is exceeded, the attempt is stopped. Said maximum time may be measured by a timer, which is set and started when a connection establishing attempt is started for an access candidate. Said maximum time may be pre-set of a vendor or operator. The maximum time may be per access network and/or node. It may also be so that there is one maximum time per group of access networks, e.g. one maximum time for accesses of a certain RAT. It may also be so that the maximum time applies to a group of access networks and/or nodes such as one maximum time for all WLANs with an SSID X. It would also be possible that there is one maximum time applicable to all access networks and/or nodes. The maximum time may be signalled from the network to the terminal.
  • Yet another example of a stop criterion is based on a maximum number of connection establishing attempts for establishing connection to an access candidate, i.e. when the maximum number of connection establishing attempts to an access candidate is exceeded, the attempt is stopped. Said number of attempts is measured/counted by a counter means. Said maximum number may be pre-set of a vendor or operator.
  • When a user equipment terminal is disconnected from an access, the UE will start, by step S110 in the method S100, connection attempts to alternative access candidates.
  • The UE terminal will upon disconnection from or rejection of connection attempt to an access node/network A, apply a policy/rule to select an alternative access candidate to connect to, e.g. node/network B. The policy/rule that instructs the UE to connect to the alternative access candidate B may be the same as the policy/rule which instructed the UE to connect to the access node/network A.
  • The alternative access may be of the same Radio Access Technology (RAT) as the first access. For example a UE gets disconnected from a first WLAN and then upon disconnection from that WLAN the UE connects to and/or steers traffic to a second WLAN.
  • The UE could be configured to consider a group of nodes in a network to be the same access. For example, an operator may have a first WLAN A, which could have an ESSID identifier “A”, comprising three nodes; WLAN AP 1, WLAN AP 2 and WLAN AP 3, which could have a BSSIDs “1”, “2” and “3”, respectively, and a second WLAN B, which could have an ESSID identifier “B”, comprising two nodes; WLAN AP 4 and WLAN AP 5, which could have a BSSIDs “4”, and “5”, respectively. According to this embodiment the UE can consider all the nodes of WLAN A to be one access, for example due to that they share the same ESSID, and all the nodes of WLAN B to be one access, for example due to that they share the same ESSID. Hence, according to some embodiments herein, if the UE gets disconnected from a node in WLAN A the UE would select WLAN B and connect to a node in WLAN B.
  • The UE could be configured to consider each node of a network to be different accesses, e.g. in the example above with WLAN A and WLAN B there would be in total 5 accesses; WLAN 1, WLAN 2, WLAN 3, WLAN 4 and WLAN 5. And according to some embodiments herein the UE could, upon disconnection from WLAN 1, select WLAN 2 to attempt to connect to, even though the ESSID for WLAN 1 and WLAN 2 is the same.
  • It would also be possible that the alternative access is of another Radio Access Technology compared to the first access. For example, a UE gets disconnected from a WLAN and then connects to and/or steers traffic to a 3GPP network.
  • For alternative access selection in step S120 different criteria may be used. In some embodiments the UE will select an alternative access given that the first access has indicated to the UE a certain cause value for the disconnection from the first access, while another cause value, or absence of cause value indication the UE would apply a default behavior, where the default behavior could be based on UE implementation and, as explained earlier, may be that the UE is reattempting to connect to the first access.
  • In one realization of this embodiment, a WLAN network indicates to the UE a cause value X at, or before, the disconnection of the UE. The UE will when being disconnected from the WLAN select alternative access, e.g. another WLAN or an access implementing another Radio Access Technology (RAT) such as a 3GPP RAT, and connect to that other access. However if the network indicates another cause value, e.g. cause value Y, or not providing any cause value, the UE would apply the default behavior which, as explained earlier, may be to try to reconnect to the first access candidate. The benefit of this embodiment is that the WLAN access can decide whether the UE should connect to an alternative access or apply some other behavior.
  • Different selection mechanisms for the alternative access can be applied in conjunction with the above embodiments of the method S100. Here after, a few example mechanisms are described.
  • The UE may select the alternative access candidate based on a priority order associated with alternative accesses. This priority order may be indicated by a network node, for example in an ANDSF policy, as described above or some other mechanism such as the RAN mechanism described above.
  • In one possible implementation of this embodiment the method S100 and a UE will upon disconnection, or rejection, from the first access candidate evaluate which access has second highest priority and then evaluate whether that access is available or not. Whether an access is available or not may be determined based on for example an ANDSF policy or some other mechanism such as the RAN mechanism described above. If the second highest priority access is available the UE would attempt to connect to that access, otherwise the UE would refrain from connecting to that access and evaluate which is the third highest priority access and whether the third highest priority access is available or not, and so on.
  • Regarding the access network selection procedure S100 in general: Say the UE has ANDSF rules or RAN policies that control the UE on how to do the access network selection. These policies/rules are always active in the UE. The embodiments proposed of the method S100 are just concerning once those policies/rules have fired, and on how to proceed. Example: a RAN rule that says if RSRP <x and there is a WLAN with RSSI >y, then connect to it. Also WLAN A, B, C . . . are listed according to decreasing priority (i.e. A is the most preferred). So at time x1: UE notices that it is in the coverage of WLANs belonging to A and C, and they fulfil the criteria, attempts to connect to A but gets rejected, then tries C, gets connected. 2 minutes after that, the UE notices that it is in the coverage of WLANs B and C. It is already connected to C but since B is of higher priority than C, it tries to connect to B.
  • FIG. 6 is a flowchart illustrating a method according another embodiment of the method. As illustrated in the flowchart of this embodiment, the method may comprise a terminating step, which is optional.
  • The method S100 for access network selection procedure is performed in a UE. According to the following embodiment, the method comprises:
      • S110:—Starting the access network selection procedure for one or more access candidates;
      • S120:—Sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by
        • selecting a new access candidate from said one or more access candidates;
        • performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
  • The method S100 comprises the optional terminating step, as illustrated:
      • S130:—Terminating access network selection procedure if connection to one of said one or more access candidates is established or each connection establishing attempt for all access candidates have been stopped by a stop criterion.
        • FIG. 7 is a flowchart illustrating an embodiment of the method. In this embodiment of the method, the performing step S120 involves:
      • S121:—A new access candidate available? With new access candidate is meant an available access candidate for which an attempt not has been performed. If any new access candidate is not available, test criterion is not fulfilled, “NO”, because all candidates have been tested without any connection being established. The process is then returned to S110, waiting for starting the access network selection procedure again. The process may be stopped in the terminating step, S130, if used in the embodiment, see FIG. 8 below. If a new access candidate is available, test criterion is fulfilled, “YES”, and steps S122 and S123 are performed.
      • S122:—Selecting a new access candidate from said one or more access candidates.
      • S123:—Start connection establishing attempt to said access candidate. A connection establishing attempt may comprise one or more attempts to establish connection to the access candidate. When the connection establishing attempt has started, the procedure comprises a test, or check, step S124, wherein connection establishing attempts to said access candidate is performed until a connection to the is established or a stop criterion for said access candidate is fulfilled;
      • S124:—Connection to access candidate established or stop criterion fulfilled?
  • As soon as the criterion in S124 is fulfilled, YES, the attempt is stopped, The UE can use the established connection for sending and receiving signalling and data communication. As long as the criterion is not fulfilled, NO, the attempt/-s for the selected candidate is/are continuing if not one “stop criteria is fulfilled”, which results in that the process leaves the test, S124, for step S121 for checking if a new access candidate is available, and if so, selecting a new candidate, S122, and restart the connection attempts, S123.
  • FIG. 8 is a flowchart illustrating an embodiment comprising the termination step, S130, of the method S100. The embodiment operates as the embodiment described above in FIG. 7, but if a new access candidate is not available, in test criterion in S121 is not fulfilled, “NO”, because all candidates have been tested without any connection being established. The process is than stopped in the terminating step, S130.
  • FIG. 9 is a flowchart illustrating an additional embodiment comprising the termination step, S130, of the method S100.
  • The method S100 starts when the UE is e.g. disconnected from the first network, and starts the access network selection procedure for one or more alternative access candidates, S110. When the method starts, there are usually a number of access candidates available. Whether, or not, there is one or more access candidate is tested in S121:
      • S121:—A new access candidate available? If any new access candidate is not available, test criterion is not fulfilled, “NO”, because all candidates have been tested without any connection being established. The process is stopped directly in the terminating step, S130. If a new access candidate is available, test criterion is fulfilled, “YES”, and step S122 is performed.
      • S122:—Selecting a new access candidate from said one or more access candidates. When a new access candidate is selected, e.g. due to a priority order and/or a cause value, step S124 is performed. Said step S124 involves three steps S124A, S124B, and S124C, constituting an inner access candidate connection establishing attempt loop, which now will be described.
      • S124A:—Perform connection establishing attempt to said access candidate. A connection establishing attempt may comprise one or more attempts to establish connection to the access candidate. When the connection establishing attempt has started, the procedure comprises a test, or check, step S124B:
      • Connection established? If the connection establishing attempts to said access candidate is successful, YES, a connection to the access candidate is established, and the method S100 is terminated in the terminating step, S130. However, if a stop criterion is reached in S124C, e.g. the number of attempts is exceeding the maximum number of attempts allowed, the method S100 is continuing by checking for a new access candidate, and if available, as confirmed by the test S121, a new access candidate is selected for the connection attempts. The method S100 is performed until a connection to the UE is established, YES, or a stop criterion for said access candidate is reached in S124C.
  • Regarding the selecting of a new access candidate from said one or more access candidates as in S120, i.e. step S122 in step S120. Different mechanisms or techniques for selecting alternative, or new, access candidates are hereafter exemplified. One such mechanism are to use a priority order of the access candidates.
      • a) The UE evaluates which of the access candidates available that has the highest priority. Consider for example a case where a UE has four access candidates, e.g. WLAN accesses, which should be considered and currently the UE is connected to one of these WLAN accesses. The UE could then, according to this mechanism, upon disconnection from, or upon connection attempt rejection from the WLAN the UE is currently connected to, evaluate which of the other three WLAN accesses has the highest priority and for that access candidate determine whether the access is available or not. If that WLAN is available the UE would attempt to connect to that access candidate, otherwise the UE would determine which of the other two access candidates has highest priority and then evaluate whether that access candidate is available or not. If that access candidate is available the UE would attempt to connect to that access otherwise the UE would evaluate whether the fourth access candidate is available and connect to that fourth access if available.
      • b) A priority list of available access candidates. In another possible implementation of this embodiment the UE will maintain a priority list of available access candidates. I.e. the UE will propagate the priority list only with access candidates which are available. The UE may evaluate for all considered access candidates whether they are available or not and then keep in the list only those access candidates which are available. This availability evaluation procedure may be done periodically and hence list of available accesses, i.e. access candidates, would be kept up-to-date in the sense that all lists in this list are considered available. In addition to or as an alternative to that, the UE may update the priority list when it gets rejected/disconnected with a specific cause value.
  • Consider for example a case where the UE has four WLAN accesses which should be considered; WLAN A, WLAN B, WLAN C and WLAN D. The UE would then evaluate for these access candidates which are considered available and which are not considered available. It may be so that only WLAN A, WLAN C and WLAN D are considered available and hence the list of available WLANs would only contain these three WLANs. If for example the UE is initially connected to (or is trying to connect to) WLAN A but then gets disconnected from (or is rejected from connecting to) WLAN A the UE would select one of the other WLANs. The UE may select out of those WLANs in the list of available WLANs the WLAN which has the highest priority.
  • Note that in the examples above, the candidate target list contained only WLANs. That is just for the sake of brevity, and the list candidate target can contain accesses belonging to other RATs as well.
  • The above described methods and embodiments thereof may be implemented in digital electronically circuitry, or in computer hardware, firmware, software, or in combinations of them. Devices, means, circuitry or units may be implemented in a computer program product tangibly embodied in a machine readable storage device for execution by a programmable processor; and method steps described above may be performed by a programmable processor executing a program of instructions to perform functions achieved by the method and embodiments thereof by operating on input data and generating output.
  • The described techniques may advantageously be implemented in one or more computer programs that are executable on a programmable system including at least one programmable processor, processing circuitry, processing means, etc. coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device. Each computer program may be implemented in a high-level procedural or object-oriented programming language or in assembly or machine language if desired; and in any case, the language may be a compiled or interpreted language.
  • Generally, a processor, processor unit, processing circuitry, processing means, etc., will receive instructions and data from a read-only memory and/or a random access memory. Storage devices, such as computer readable means or computer readable storage medium, suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM (erasable programmable read only memory), EEPROM (electrically erasable programmable read only memory), and flash memory devices; magnetic disks such internal hard disks and removable disks; magneto-optical disks; and CD-ROM (Compact Disc Read-Only Memory) disks. Any of the foregoing may be supplemented by, or incorporated in, specially-designed ASICs (Application Specific Integrated Circuits).
  • FIGS. 10 and 11 are block schemes illustrating embodiments of a UE for implementing the above described method and its embodiments.
  • FIG. 10 is a block diagram illustrating one example of a UE 200, preferably a UE for communicating with a radio node 250 in a communications network, e.g. wireless communications network or telecommunications network supporting Wi-Fi by means of a WLAN 250B, 250C or any RAT by means of a RAN 250A. Thus, different access candidates exist for performing connection establishing attempts towards and to establish a connection 222 over an air interface. Said UE 200 is configured to perform connection establishing attempts. The UE comprises at least one processing circuitry 210 comprising a processor unit 212 and a memory storage 214. The UE 200 further comprises an interface 220 for enabling input and output communication 222 with other nodes, etc. The UE 200 may also comprise computer readable means or computer readable storage medium 230 on which a computer program is stored. Said means or medium 230 may be fixed in the UE or removable.
  • It is understood that said UE may comprise a different number of computer readable means or computer readable storage medium 230, and the illustrated number of computer readable means or computer readable storage medium 230 only is for illustrative purposes. One or several of the computer readable means or computer readable storage medium 230 may be physically separated from the other computer readable means or computer readable storage medium 230, or may reside on the same physical media.
  • Said processing circuitry 210 causes the UE to perform the steps of the above described method S100 and embodiments thereof. Thus, the processing circuitry 210 of the UE 200 is adapted to and operative to start an access network selection procedure for one or more access candidates, sequentially perform connection establishing attempts for the access candidates of the second network to one or more of the access candidates. Said processing circuitry 210 may also cause the UE to perform the step of terminating the access network selection procedure if connection to one of said one or more access candidates is established or each connection establishing attempt for all access candidates have been stopped by a stop criterion.
  • The stop criterion may be that a rejection is received from the access candidate to which a connection establishing attempt is performed, and/or a maximum time for a connection establishing attempt, and/or a maximum number of connection establishing attempts for establishing connection to an access candidate.
  • The UE 200 may be adapted, e.g. by means of the processing circuitry 210 to select a new access candidate from said one or more access candidate, to start a connection establishing attempt to said access candidate, to check if connection to an access candidate is established, and to check if a stop criterion is fulfilled.
  • The above mentioned embodiments may be implemented as processing circuitry 210 and a computer program comprising computer program code which, when run in a processor circuitry of a UE, causes the UE to perform the method steps of the method S100:
    • S110:—Starting the access network selection procedure for one or more access candidates;
    • S120:—Sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates by
      • selecting a new access candidate from said one or more access candidates;
      • performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled; and optionally in some embodiments,
    • S130:—Terminating access network selection procedure if connection to one of said one or more access candidates is established or each connection establishing attempt for all access candidates have been stopped by a stop criterion.
  • The computer program comprises computer program code which, when run in a processor circuitry of a node, causes the node to perform the different embodiments of the method S100, as described above.
  • It is further provided a computer program product comprising said computer program and a computer readable means on which the computer program is stored.
  • It is further provided a carrier containing the computer program, wherein the carrier is one of an electronic signal, optical signal, radio signal or computer readable storage medium.
  • FIG. 11 is a block diagram illustrating another example of one embodiment of a UE 200, preferably a UE for communicating with a radio node 250 in a communications network, e.g. wireless communications network or telecommunications network supporting Wi-Fi by means of a WLAN 250B, 250C or any RAT by means of a RAN 250A. Thus, different access candidates exist for performing connection establishing attempts towards and to establish a connection 222 over an air interface.
  • The above mentioned embodiments of the method S100 may be implemented as modules of a UE 200, said modules causes the UE to perform the method steps of the method S100.
  • The UE may therefore comprise a first module S110 for starting the access network selection procedure for one or more access candidates, a second module S120 for sequentially performing for the access candidates of the second network connection establishing attempts to one or more access candidates, and a third module S130 for terminating the access network selection procedure if connection to one of said one or more access candidates is established or each connection establishing attempt for all access candidates have been stopped by a stop criterion.
  • The UE 200 may comprise further modules for implementing the different embodiments of the method S100, said modules causes the UE to perform the different embodiments of the method S100. E.g. the UE 200 may comprise a counter means for enabling a stop criterion which is based on a maximum number of connection establishing attempts for establishing connection to an access candidate, i.e. when the maximum number of connection establishing attempts to an access candidate is exceeded, the attempt is stopped. Said number of attempts is measured/counted by the counter means. Another example is for enabling a stop criterion which is based on a maximum time for a connection establishing attempt, i.e. when the maximum time for a connection establishing attempt to an access candidate is exceeded, the attempt is stopped. Said maximum time may be measured by a timer, which is set and started when a connection establishing attempt is started for an access candidate. The user equipment may comprise a module for handling stop criterion received, e.g. at a rejection from the access candidate to which a connection establishing attempt is performed. The user equipment may comprise a module for handling cause values e.g. in a received rejection, said cause value indicating an alternative access candidate for the user equipment to select. The cause value may also indicate selection of an alternative access candidate implementing a Radio Access Technology which differs from the Radio Access Technology used in the first network. The user equipment may also be adapted to at an absence of a default value, or the cause value is indicating for the user equipment, to perform a default behaviour.
  • The user equipment may further comprise a module for selecting one alternative access candidate based on a priority order. The UE may be adapted to evaluate which of the access candidates available has the highest priority.
  • The user equipment may further comprise a module for maintaining the priority list with a list of available access candidates. Said list of available access candidates may be updated, e.g. at rejection or disconnection with a specific cause value.
  • The modules described above with reference to FIGS. 10 and 11 may be considered as logical units, and do not necessarily correspond to separate physical units or modules. Thus, the person skilled in the art would appreciate that the units disclosed in the FIGS. 10 and 11 may be implemented as physically integrated units, and/or physically separate units, and that the units are provided with appropriate processing circuits.
  • Modifications and other variants of the described embodiment(s) will come to mind to one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the embodiment(s) is/are not to be limited to the specific examples disclosed and that modifications and other variants are intended to be included within the scope of this disclosure. Although specific terms may be employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
  • A number of embodiments of the described method and UE have been described. It will be understood that various modifications may be made without departing from the scope of the following claims. Therefore, other implementations are within the scope of the following claims.
  • ABBREVIATION LIST
    • WLAN Wireless Local Area Network
    • PDN Public Data Network
    • 3GPP Third Generation Partnership Project
    • LTE Long Term Evolution
    • UMTS Universal Mobile Telecommunications System
    • WCDMA Wideband Code Division Multiple Access
    • GSM Global System for Mobile Communications
    • PLMN Public Land Mobile Network
    • RAN Radio Access Network
    • RAN WG Radio Access Network Working Group
    • RAT Radio Access Technology
    • IP Internet Protocol
    • eNB base (transceiver) station in LTE systems
    • RNC Radio Network Control
    • RRC Radio Resource Control
    • AP Access Point
    • BSS Basic Service Set
    • ESS Extended Service Set
    • SSID Service Set IDentification
    • BSSID Basic Service Set IDentification
    • HESSID Homogenous Extended Service Set IDentification
    • RSSI Received Signal Strength Indicator
    • ISRP Inter System Routing Policy
    • RSRP Reference Signal Received Power
    • DRB Data and Signalling Radio Bearers
    • RB-ID Radio Bearer IDentification
    • EAP-SIM Extensible Authentication Protocol Subscriber Identity Module
    • AAA Authentication, Authorization and Accounting
    REFERENCE LIST
    • [1] 3GPP TS 23.402, Architecture enhancements for non-3GPP accesses.
    • [2] 3GPP TS 24.312, Access Network Discovery and Selection Function (ANDSF) Management Object (MO)
    • [3] 3GPP TS 24.302, Access to the 3GPP Evolved Packet Core (EPC) via non-3GPP access networks; Stage 3
    • [4] RP-122038—New Study Item Proposal on WLAN/3GPP Radio Interworking, Intel Corporation
    • [5] 3GPP TR 37.834: WLAN/3GPP Radio Interworking
    • [6] 3GPP RP-132101, New Work Item Proposal on WLAN/3GPP Radio Interworking

Claims (16)

1-18. (canceled)
19. A user equipment, UE, comprising:
processor circuitry, and
memory containing computer program code which, when run in the processor circuitry, causes the UE to perform a method for access network selection between a first network and a second network, each of said first and second networks comprising one or more access candidates, the method comprising:
starting an access network selection procedure for one or more access candidates of the second network; and
sequentially performing, for the one or more access candidates of the second network, connection establishing attempts to the one or more access candidates by:
selecting a new access candidate from said one or more access candidates; and
performing connection establishing attempts to said access candidate until a connection to the access candidate is established or a stop criterion for said access candidate is fulfilled.
20. The user equipment according to claim 19, wherein the method performed by the user equipment further comprises:
terminating the access network selection procedure if connection to one of said one or more access candidates is established or each connection establishing attempt for all of the one or more access candidates of the second network has been stopped by a stop criterion.
21. The user equipment according to claim 19, wherein the stop criterion is based on a maximum time for a connection establishing attempt.
22. The user equipment according to claim 19, wherein the stop criterion is based on a maximum number of connection establishing attempts for establishing connection to an access candidate.
23. The user equipment according to claim 19, wherein the stop criterion is that a rejection is received from the access candidate to which a connection establishing attempt is performed.
24. The user equipment according to claim 19, wherein the selecting is based on a cause value indicating an alternative access candidate for the user equipment to select.
25. The user equipment according to claim 24, wherein the cause value indicates selecting an alternative access candidate implementing a Radio Access Technology which differs from the Radio Access Technology used in the first network.
26. The user equipment according to claim 24, wherein an absence of a default value or the cause value is indicating for the user equipment to perform a default behaviour.
27. The user equipment according to claim 19, wherein the user equipment selects one alternative access candidate based on a priority order.
28. The user equipment according to claim 27, wherein the UE is adapted to evaluate which of the access candidates available that has the highest priority.
29. The user equipment according to claim 27, wherein the user equipment is adapted to maintain a priority list with a list of available access candidates.
30. The user equipment according to 29, wherein the user equipment is adapted to update said list of available access candidates.
31. The user equipment according to claim 29, wherein the user equipment is adapted to update said list of available access candidates when the user equipment gets rejected or disconnected with a specific cause value.
32. The user equipment according to claim 19, wherein the second network implements a different Radio Access Technology than the Radio Access Technology of the first network.
33. (canceled)
US15/123,186 2014-03-03 2015-03-03 Connection attempt to alternative access upon connection attempt rejection Abandoned US20170078936A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/123,186 US20170078936A1 (en) 2014-03-03 2015-03-03 Connection attempt to alternative access upon connection attempt rejection

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201461947310P 2014-03-03 2014-03-03
US15/123,186 US20170078936A1 (en) 2014-03-03 2015-03-03 Connection attempt to alternative access upon connection attempt rejection
PCT/SE2015/050237 WO2015133964A1 (en) 2014-03-03 2015-03-03 Connection attempt to alternative access upon connection attempt rejection

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2015/050237 A-371-Of-International WO2015133964A1 (en) 2014-03-03 2015-03-03 Connection attempt to alternative access upon connection attempt rejection

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/900,026 Continuation US10470093B2 (en) 2014-03-03 2018-02-20 Connection attempt to alternative access upon connection attempt rejection

Publications (1)

Publication Number Publication Date
US20170078936A1 true US20170078936A1 (en) 2017-03-16

Family

ID=54055640

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/123,186 Abandoned US20170078936A1 (en) 2014-03-03 2015-03-03 Connection attempt to alternative access upon connection attempt rejection
US15/900,026 Expired - Fee Related US10470093B2 (en) 2014-03-03 2018-02-20 Connection attempt to alternative access upon connection attempt rejection

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/900,026 Expired - Fee Related US10470093B2 (en) 2014-03-03 2018-02-20 Connection attempt to alternative access upon connection attempt rejection

Country Status (4)

Country Link
US (2) US20170078936A1 (en)
EP (1) EP3114888A1 (en)
CN (1) CN106031248B (en)
WO (1) WO2015133964A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9998980B2 (en) * 2016-03-29 2018-06-12 Lg Electronics Inc. Wireless power transmitter and receiver
CN110022568A (en) * 2018-01-10 2019-07-16 展讯通信(上海)有限公司 Acceptance controlling method, device and user equipment
US11356937B2 (en) * 2014-03-24 2022-06-07 Apple Inc. Techniques for coordinated application of wireless network selection and traffic routing rules
US11382030B2 (en) * 2016-01-29 2022-07-05 Hewlett Packard Enterprise Development Lp Enterprise-based network selection

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108377523A (en) * 2016-11-03 2018-08-07 上海掌门科技有限公司 A kind of method and apparatus for realizing wireless access point connection
EP3963941A1 (en) * 2019-05-02 2022-03-09 Telefonaktiebolaget LM Ericsson (publ) Wireless operation in a cell with licensed and unlicensed carriers

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6792284B1 (en) * 1999-04-30 2004-09-14 Nokia Mobile Phones Ltd. Method and arrangement for managing cell reselection in a terminal for a cellular system
US20050013264A1 (en) * 2001-12-20 2005-01-20 Per-Erik Sundberg Method and apparatus for switching access between mobile networks
US20050148299A1 (en) * 2004-01-07 2005-07-07 Adrian Buckley System and method for selecting a cellular network on a wireless local area network
US20050221824A1 (en) * 2004-03-02 2005-10-06 Jae-Hwan Lee Method for handover between different type MMMB systems
US8073441B1 (en) * 2010-08-24 2011-12-06 Metropcs Wireless, Inc. Location-based network selection method for a mobile device
US20130083772A1 (en) * 2011-09-30 2013-04-04 Fujitsu Mobile Communications Limited Wireless communication terminal and wireless communication method

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6334052B1 (en) 1997-03-07 2001-12-25 Telefonaktiebolaget Lm Ericsson (Publ) Subscription-based mobile station idle mode cell selection
US6921726B2 (en) 2002-03-13 2005-07-26 Lucent Technologies Inc. Growing smooth semiconductor layers
JP4397168B2 (en) * 2002-08-21 2010-01-13 レノボ シンガポール プライヴェート リミテッド Computer device and wireless network connection method
US7215956B2 (en) * 2003-11-04 2007-05-08 Qualcomm, Incorporated Method and apparatus for scanning frequency channels for handoff candidates while minimizing battery consumption
US20060009216A1 (en) * 2004-06-30 2006-01-12 Welnick William E Multiple mode scanning
US8467784B2 (en) * 2006-07-14 2013-06-18 Qualcomm Incorporated WLAN system scanning and selection
CN101237689B (en) * 2007-01-31 2011-06-08 联芯科技有限公司 Access technology selecting method and device
US7899939B2 (en) * 2007-04-20 2011-03-01 Research In Motion Limited Apparatus, and associated method, for facilitating network selection using access technology indicator
US8160976B2 (en) * 2009-04-17 2012-04-17 Research In Motion Limited Systems and methods for achieving PLMN continuity when moving between networks of different types through network selection
WO2011134099A1 (en) * 2010-04-26 2011-11-03 Nokia Siemens Networks Oy Dynamic frequency refarming
US8406160B2 (en) * 2010-05-21 2013-03-26 Qualcomm Incorporated Time-sliced search of radio access technologies during connected-mode radio link failure
US10045282B2 (en) * 2010-12-20 2018-08-07 Time Warner Cable Enterprises Llc System and method for optimizing scanning from a multi-band communications device
US8699379B2 (en) * 2011-04-08 2014-04-15 Blackberry Limited Configuring mobile station according to type of wireless local area network (WLAN) deployment
US9161380B2 (en) 2011-07-19 2015-10-13 Qualcomm Incorporated Silent redial during mobile-originated call
US9363844B2 (en) * 2013-08-30 2016-06-07 Qualcomm Incorporated Enhance performance of making an emergency call during radio link failure over radio access technology

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6792284B1 (en) * 1999-04-30 2004-09-14 Nokia Mobile Phones Ltd. Method and arrangement for managing cell reselection in a terminal for a cellular system
US20050013264A1 (en) * 2001-12-20 2005-01-20 Per-Erik Sundberg Method and apparatus for switching access between mobile networks
US20050148299A1 (en) * 2004-01-07 2005-07-07 Adrian Buckley System and method for selecting a cellular network on a wireless local area network
US20050221824A1 (en) * 2004-03-02 2005-10-06 Jae-Hwan Lee Method for handover between different type MMMB systems
US8073441B1 (en) * 2010-08-24 2011-12-06 Metropcs Wireless, Inc. Location-based network selection method for a mobile device
US20130083772A1 (en) * 2011-09-30 2013-04-04 Fujitsu Mobile Communications Limited Wireless communication terminal and wireless communication method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11356937B2 (en) * 2014-03-24 2022-06-07 Apple Inc. Techniques for coordinated application of wireless network selection and traffic routing rules
US11382030B2 (en) * 2016-01-29 2022-07-05 Hewlett Packard Enterprise Development Lp Enterprise-based network selection
US9998980B2 (en) * 2016-03-29 2018-06-12 Lg Electronics Inc. Wireless power transmitter and receiver
US10477455B2 (en) 2016-03-29 2019-11-12 Lg Electronics Inc. Wireless power transmitter and receiver
CN110022568A (en) * 2018-01-10 2019-07-16 展讯通信(上海)有限公司 Acceptance controlling method, device and user equipment

Also Published As

Publication number Publication date
CN106031248B (en) 2019-12-13
EP3114888A4 (en) 2017-01-11
CN106031248A (en) 2016-10-12
US20180176842A1 (en) 2018-06-21
WO2015133964A1 (en) 2015-09-11
EP3114888A1 (en) 2017-01-11
US10470093B2 (en) 2019-11-05

Similar Documents

Publication Publication Date Title
US10750397B2 (en) Method of supporting communication using two or more radio access technologies and apparatus for same
US10687298B2 (en) Methods and apparatus to support parallel communication for multiple subscriber identities in a wireless communication device
US10470093B2 (en) Connection attempt to alternative access upon connection attempt rejection
RU2651575C2 (en) Managing selection of subsystem of mobility and/or access between cells
US10299109B2 (en) Methods and apparatus to support multiple subscriber identities in a wireless communication device
US10178609B2 (en) System and method to support inter-wireless local area network communication by a radio access network
US10142818B2 (en) Methods and apparatus to reuse wireless circuitry for multiple subscriber identities in a wireless communication device
US10524177B2 (en) Methods and apparatus to manage data connections for multiple subscriber identities in a wireless communication device
CN105191415B (en) Traffic steering from a first access network to a second access network
US20160277974A1 (en) Controlling the Operation of Mobile Terminals with Respect to Multiple Radio Access Technologies
US10368297B2 (en) Methods, systems and computer program products for network-controlled selection of radio access networks
WO2015180128A1 (en) Methods and apparatus for synergy among multiple subscriber identities in a wireless communication device
RU2676048C1 (en) Efficient exchange of data network identifiers
WO2015065267A1 (en) Methods and apparatuses for policy based wifi/3gpp integration
WO2017003357A1 (en) Device identification in interworking wlan and wide-area cellular networks

Legal Events

Date Code Title Description
AS Assignment

Owner name: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL), SWEDEN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LINDHEIMER, CHRISTOFER;MESTANOV, FILIP;TAN BERGSTROM, MATTIAS;AND OTHERS;SIGNING DATES FROM 20150304 TO 20150522;REEL/FRAME:039663/0032

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION