Tech-invite  3GPPspecsRELsGlossariesSIP
Info21222324252627282931323334353637384‑5x

full Contents for  TS 23.316  Word version:   16.3.0

Top   Up   Prev   None
1…   4…   4.5…   4.7…   5…   6…   7…   7.2.2…   7.2.3…   7.2.4…   7.3…   7.6…   7.7…   8…   9…   10…   A…

 

A  UE behind RG using untrusted Non-3GPP access proceduresWord-p. 78
This Annex describes how untrusted Non-3GPP access to 5GC can be provided to a UE via a 5G-RG and FN-RG connected to 5GC.
Up
The 5G-RG can be connected to 5GC via W-5GAN, NG-RAN or via both accesses. The UE can be connected to 5GC via untrusted non-3GPP access (via 5G-RG), NG-RAN or via both accesses.
NOTE 1:
The reference architecture in figure A-1 only shows the architecture and the network functions directly connected to W-5GAN or N3IWF, and other parts of the architecture are the same as defined in TS 23.501, clause 4.2.
NOTE 2:
The reference architecture in figure A-1 supports service based interfaces for AMF, SMF and other NFs not represented in the figure.
NOTE 3:
The two N2 instances in Figure A-1 apply to a single AMF for a 5G-RG which is simultaneously connected to the same 5G Core Network over 3GPP access and Wireline 5G Access Network.
NOTE 4:
The UE can as well be registered and connected via 3GPP access.
Up
The FN-RG can be connected to 5GC via W-5GAN The UE can be connected to 5GC via untrusted non-3GPP access (via FN-RG), NG-RAN or via both accesses.
NOTE 5:
The reference architecture in figure A-2 only shows the architecture and the network functions directly connected to Wireline 5G Access Network or N3IWF, and other parts of the architecture are the same as defined in TS 23.501, clause 4.2.
NOTE 6:
The reference architecture in figure A-2 supports service based interfaces for AMF, SMF and other NFs not represented in the figure.
B  Change historyWord-p. 80

Up   Top