Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map



 

Here   Top   Up   Prev   Next
1…   4.3…   4.13…   5…   5.4…   5.6…   5.11…   5.13…   A…   G…   L…   Q…   U…   Y…

 

 

G (Normative)  Reference Architecture and procedures when the NAT is invoked between the UE and the IMS domain [R7]PDF-p. 222
G.1  General
G.2  Reference models
G.3  Network elements for employing the IMS-ALG and IMS Access GatewayPDF-p. 224
G.4  Procedures for employing the IMS-ALG and IMS Access Gateway
G.5  Network elements for employing NAT Traversal for ICE and OutboundPDF-p. 228
G.6  Procedures for employing ICE and Outbound
H  Example HSS deployment [R7]PDF-p. 236
I (Normative)  Border Control Functions [R7]PDF-p. 237
J  Dynamic User Allocation to the Application Servers [R7]PDF-p. 247
K (Normative)  Inter-IMS Network to Network Interface between two IM CN subsystem networks [R8]PDF-p. 250

Up   Top   ToC