Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 26.531
Data Collection and Reporting –
General Description and Architecture

V18.2.0 (PDF)  2024/06  40 p.
V17.3.0  2024/06  40 p.
Rapporteur:
Dr. Bradbury, Richard
BBC

essential Table of Contents for  TS 26.531  Word version:  18.2.0

each title, in the "available" or "not available yet" area, links to the equivalent title in the CONTENT
Here   Top

List of Figures and Tables

Figure 4.2-1Reference architecture for data collection and reporting in reference point notation
Figure 4.4-1Reference architecture for data collection and reporting in service-based architecture notation when the Data Collection AF is deployed in the trusted domain
Figure 4.4-2Reference architecture for data collection and reporting in service-based architecture notation when the Data Collection AF is deployed outside the trusted domain
Figure 4.5.2-1Data exposure restriction domain model
Table 4.5.2-1Baseline aggregation functions
Figure 4.6.1-1Static domain model
Table 4.6.2-1Baseline provisioning information for data collection and reporting
Table 4.6.3-1Baseline information for data collection and reporting configuration
Table 4.6.4-1Baseline information for data reporting
Figure 5.1-1High-level procedures for data collection and reporting
Figure 5.2-1High-level procedures for AF registration and provisioning phases
Figure 5.3-1High-level procedures for subscription phase
Figure 5.4-1High-level procedures for data collection client configuration phase
Figure 5.5-1High-level procedures for data reporting and exposure phase
Figure 5.7-1High-level procedures for unsubscription phase
Figure 5.8-1High-level procedures for event consumer authorization
Figure A.2-1Collaboration A with all functions deployed inside the trusted domain
Figure A.3-1Collaboration B with all functions of Application Service Provider deployed outside the trusted domain
Figure A.4-1Collaboration C with all functions of Application Service Provider and Application Server deployed outside the trusted domain
Figure A.5-1Collaboration D with Data Collection AF deployed outside the trusted domain
Figure A.6-1Collaboration E with Data Collection Client deployed as part of the UE Application
Table B.2-1Ownership of baseline UE data domains

Top