| |
Figure 5.4.4-1 | NBIFOM Mode Selection |
Figure 6.1.1-1 | PDN connection establishment over 3GPP access with GTP based S5/S8 |
Figure 6.1.2.1-1 | PDN connection establishment procedure over TWAN access for SCM |
Figure 6.1.2.2-1 | PDN connection establishment procedure over TWAN access for MCM |
Figure 6.1.3-1 | PDN connection establishment over WLAN access |
Figure 6.2.3.1-1 | Addition of trusted WLAN access with SCM and GTP S2a for roaming, LBO and non-roaming scenarios |
Figure 6.2.3.2-1 | UE-Initiated Connectivity to PDN in WLAN on GTP S2a |
Figure 6.2.4.1-1 | Addition of WLAN access to the PDN connection |
Figure 6.3.2.1-1 | Network-initiated IP flow mobility within a PDN connection via E-UTRAN using GTP |
Figure 6.3.2.1-2 | Network-initiated IP flow mobility within a PDN connection via GERAN/UTRAN using GTP |
Figure 6.3.2.2.2-1 | Network-initiated IP flow mobility within a PDN connection over TWAN access using GTP |
Figure 6.3.2.3-1 | IP flow mobility within a PDN connection with negotiation via untrusted WLAN access |
Figure 6.3.3.1-1 | UE-initiated IP flow mobility within a PDN connection via E-UTRAN using GTP |
Figure 6.3.3.1-2 | UE-initiated IP flow mobility within a PDN connection via GERAN/UTRAN using GTP |
Figure 6.3.3.2.2-1 | UE-initiated IP flow mobility within a PDN connection from 3GPP access to TWAN access using GTP |
Figure 6.3.3.3-1 | IP flow mobility within a PDN connection initiated over WLAN access |
Figure 6.4.1-1 | UE requested IP flow mapping via E-UTRAN |
Figure 6.4.1-2 | UE requested IP flow mapping via GERAN/UTRAN access |
Figure 6.4.2.2-1 | UE Requested IP Flow Mapping via Trusted WLAN access using GTP |
Figure 6.4.3-1 | UE Requested IP Flow Mapping via untrusted WLAN access using GTP |
Figure 6.5.1.1-1 | UE-Initiated Removal of 3GPP access via E-UTRAN |
Figure 6.5.1.1-2 | UE-Initiated Removal of 3GPP access via E-UTRAN for last PDN connection |
Figure 6.5.1.1-3 | UE-Initiated Removal of 3GPP access via GERAN/UTRAN |
Figure 6.5.1.2-1 | Network initiated removal of 3GPP access via E-UTRAN from the PDN connection |
Figure 6.5.1.2-2 | Network initiated Removal of 3GPP access via GERAN/UTRAN |
Figure 6.5.2.1-1 | UE-initiated Removal of Trusted WLAN access from the PDN connection for single-connection mode |
Figure 6.5.2.1-2 | UE-initiated Removal of Trusted WLAN access from the PDN connection for multi-connection mode |
Figure 6.5.2.1-3 | UE-initiated Removal of Trusted WLAN access from the last PDN connection for multi-connection mode |
Figure 6.5.2.2-2 | Network-initiated Removal of Trusted WLAN access from the PDN connection |
Figure 6.5.3.1-1 | UE-initiated Removal of Untrusted WLAN access from the PDN connection |
Figure 6.5.3.2-1 | Network-initiated Removal of Untrusted WLAN access from the PDN connection |
Figure 6.6.1.1-1 | Procedure for 3GPP access becomes unusable for GTP S2a |
Figure 6.6.1.2-1 | Procedure for 3GPP access becomes unusable for GTP S2b |
Figure 6.6.1.3-1 | Procedure for Trusted WLAN becomes unusable access for GTP S5/S8 |
Figure 6.6.1.4-1 | Procedure for Untrusted WLAN becomes unusable access for GTP S5/S8 |
Figure 6.6.2.1-1 | Procedure for 3GPP access becomes usable for GTP S5/S8 |
Figure 6.6.2.2.1-1 | Procedure for Trusted WLAN access becomes usable for GTP S5/S8 in SCM |
Figure 6.6.2.2.2-1 | Procedure for Trusted WLAN access becomes usable for GTP S2a in MCM |
Figure 6.6.2.3-1 | Procedure for Untrusted WLAN access becomes usable for GTP S2b |
Figure 6.7.1.1-1 | Procedure for Access Stratum indication move-to-WLAN via E-UTRAN using GTP S2a in SCM |
Figure 6.7.1.1-2 | Procedure for Access Stratum indication move-to-WLAN via UTRAN using GTP S5/S8 in SCM |
Figure 6.7.1.2-1 | Procedure for Access Stratum indication move-to-WLAN for GTP S2a in MCM |
Figure 6.7.2-1 | Procedure for Access Stratum indication move-to-WLAN for GTP S2b |
Figure 6.7.3-1 | Procedure for Access Stratum indication move-from-WLAN via E-UTRAN using GTP S5/S8 |
Figure 6.7.3-2 | Procedure for Access Stratum indication move-from-WLAN via UTRAN using GTP S5/S8 |