tech-invite   World Map
3GPP     Specs     Glossaries     UICC       T+       IETF     RFCs     Groups     SIP     ABNFs       Search     Home
 


 

Here        Top        Up        Prev        Next
part:    1     2     3

 

 

5.5   Procedures for the case when WLAN is being used
5.5.1   Procedures for untrusted WLAN with traffic routed back to the EPC with S2b
5.5.1.1   Initial Attach with PMIPv6 on S2b
5.5.1.1a   Initial Attach with GTP on S2b   Word-p. 51
5.5.1.2   UE/ePDG-initiated Detach Procedure and UE-Requested PDN Disconnection with PMIPv6 on S2b   Word-p. 53
5.5.1.2a   UE/ePDG-initiated Detach Procedure and UE-Requested PDN Disconnection with GTP on S2b   Word-p. 54
5.5.1.3   HSS/AAA-initiated Detach Procedure with PMIPv6 on S2b   Word-p. 55      Up
5.5.1.3a   HSS/AAA-initiated Detach Procedure with GTP on S2b   Word-p. 56
5.5.1.4   E-UTRAN to Untrusted Non-3GPP IP Access Handover with PMIPv6 on S2b   Word-p. 57
5.5.1.4a   E-UTRAN to Untrusted Non-3GPP IP Access Handover with GTP on S2b   Word-p. 59
5.5.1.5   UE-initiated Connectivity to Additional PDN with PMIPv6 or GTP on S2b   Word-p. 60
5.5.1.6   Network-Initiated Dynamic PCC for S2b when accessing over BBF access   Word-p. 61
5.5.1.6a   PGW-Initiated Dynamic PCC for GTP based S2b when accessing over BBF access   Word-p. 63
5.5.1.6b   HSS-Initiated Subscribed QoS Modification for GTP based S2b when accessing over BBF access
5.5.1.7   PDN GW initiated Resource Allocation Deactivation with S2b PMIPv6 when accessing over BBF Access Network   Word-p. 64
5.5.1.7a   PDN GW initiated Resource Allocation Deactivation with S2b GTP when accessing over BBF Access Network   Word-p. 66
5.5.1.8   Handover without ePDG relocation for PMIPv6 based S2b   Word-p. 67      Up
5.5.1.8a   Handover without ePDG relocation for GTP based S2b   Word-p. 68
5.5.1.9   IPSec tunnel modified within the same untrusted BBF WLAN IP Accesses with PMIPv6 based S2b   Word-p. 69
5.5.1.9a   IPSec tunnel modified within the same untrusted BBF WLAN IP Accesses with GTP based S2b   Word-p. 70
5.5.1.10a   Dedicated bearer activation with GTP on S2b
5.5.2   Procedures for trusted BBF WLAN with traffic routed to the EPC with S2c   Word-p. 71
5.5.3   Procedures for untrusted BBF WLAN with traffic routed to the EPC with S2c   Word-p. 79
5.6   H(e)NB interworking architecture alternative 1   Word-p. 87
5.7   H(e)NB interworking architecture alternative 2
5.8   H(e)NB interworking architecture alternative 3   Word-p. 104
5.9   Comparison of 3GPP LTE Femto Architecture Options
5.10   3GPP Femto Architecture Decision   Word-p. 117
5.11   Conclusions   Word-p. 121

Up        Top        ToC