Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Gen21222324252627282931323334353637384‑5x
FsNEsRPsSBIsIDs Ti+
Top   in Index   Prev   Next

TS 23.501 (SA2)
System Architecture for the 5G System

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V16.2.0 (Wzip)2019/09  391 p.
V15.7.0 (PDF)2019/09  250 p.

Service-based representation of the 5G Core architecture
5G-EIR (5G-Equipment Identity Register) – AF (Application Function) – AMF (Access and Mobility Management Function) – AUSF (Authentication Server Function) – CHF (Charging Function) – DN (Data Network) – NF (Network Function) – NEF (Network Exposure Function) – NRF (Network Repository Function) – NSSF (Network Slice Selection Function) – NWDAF (Network Data Analytics Function) – PCF (Policy Control Function) – (R)AN ((Radio) Access Network) – SCP (Service Communication Proxy) – SMF (Session Management Function) – SMSF (Short Message Service Function) – UDM (Unified Data Management) – UDSF (Unstructured Data Storage Function) – UPF (User Plane Function) – UDR (Unified Data Repository) –

Here are some links in support of this figure:
N1N2N3N4N9N11N15N16N16aN18N19N20N24N26N27
N5g-eirNafNamfNausfNbsfNchfNlmfNnefNnrfNnssfNpcfNsmfNsmsfNucmfNudmNudrNudsfNnwdaf

Rapporteur:  Ms. Chandramouli, Devaki

The present document defines the Stage 2 system architecture for the 5G System. The 5G System provides data connectivity and services. This specification covers both roaming and non-roaming scenarios in all aspects, including interworking between 5GS and EPS, mobility within 5GS, policy control and charging, and authentication. TS 23.502 contains the stage 2 procedures and flows for 5G System and it is a companion specification to this specification.

short Table of Contents for  TS 23.501  Word version:   16.2.0

each title links to the equivalent title in the full ToC

 

Here   Top

 

1  ScopeWord-p. 16
2  ReferencesWord-p. 16
3  Definitions and abbreviationsWord-p. 20
4  Architecture model and conceptsWord-p. 26
4.1  General conceptsWord-p. 26
4.2  Architecture reference modelWord-p. 27
4.3  Interworking with EPCWord-p. 52
4.4  Specific servicesWord-p. 63
5  High level featuresWord-p. 68
5.1  GeneralWord-p. 68
5.2  Network Access ControlWord-p. 68
5.3  Registration and Connection ManagementWord-p. 70
5.4  3GPP access specific aspectsWord-p. 83
5.5  Non-3GPP access specific aspectsWord-p. 94
5.6  Session ManagementWord-p. 96
5.7  QoS modelWord-p. 122
5.8  User Plane ManagementWord-p. 140
5.9  IdentifiersWord-p. 167
5.10  Security aspectsWord-p. 170
5.11  Support for Dual Connectivity, Multi-ConnectivityWord-p. 172
5.12  ChargingWord-p. 173
5.13  Support for Edge ComputingWord-p. 174
5.14  Policy ControlUpWord-p. 174
5.15  Network slicingWord-p. 174
5.16  Support for specific servicesWord-p. 191
5.17  Interworking and MigrationWord-p. 204
5.18  Network SharingWord-p. 217
5.19  Control Plane Load Control, Congestion and Overload ControlUpWord-p. 219
5.20  External Exposure of Network CapabilityWord-p. 227
5.20a  Data Collection from an AF [R16]Word-p. 228
5.21  Architectural support for virtualized deploymentsWord-p. 228
5.22  System Enablers for priority mechanismWord-p. 236
5.23  Supporting for Asynchronous Type CommunicationWord-p. 238
5.24  3GPP PS Data OffWord-p. 238
5.25  Support of OAM FeaturesWord-p. 239
5.26  Configuration Transfer ProcedureWord-p. 240
5.27  Time Sensitive Communications [R16]Word-p. 242
5.28  Support of integration with TSN [R16]Word-p. 246
5.29  Support for 5G LAN-type service [R16]Word-p. 252
5.30  Support for non-public networks [R16]Word-p. 254
5.31  Support for Cellular IoT [R16]Word-p. 260
5.32  Support for ATSSS [R16]Word-p. 275
5.33  Support for Ultra Reliable Low Latency Communication [R16]Word-p. 287
5.34  Support of deployments topologies with specific SMF Service Areas [R16]Word-p. 293
5.35  Support for Integrated access and backhaul (IAB) [R16]Word-p. 299
6  Network FunctionsWord-p. 302
7  Network Function Services and descriptionsWord-p. 335
8  Control and User Plane Protocol StacksWord-p. 347
A  Relationship between Service-Based Interfaces and Reference PointsWord-p. 358
B (Normative)  Mapping between temporary identitiesWord-p. 360
C  Guidelines and Principles for Compute-Storage SeparationWord-p. 361
D  5GS support for Non-Public Network deployment options [R16]Word-p. 362
E  Communication models for NF/NF services interaction [R16]Word-p. 365
F  Redundant user plane paths based on multiple UEs per device [R16]Word-p. 367
G  SCP Deployment Examples [R16]Word-p. 370
H (Normative)  Signalling of ingress time for time synchronization [R16]Word-p. 376
Z  Change historyWord-p. 377

Up   Top