Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 23.839
Word version: 12.0.0
0…
5…
6…
5
Building Block I
5
Building Block I
p. 12
5.1
Architecture
p. 12
5.1.1
Architectural requirements and assumptions for building block I
p. 12
5.1.2
Architecture for building block I BBF interworking via WLAN access connection
p. 12
5.1.2.1
Architecture reference model
p. 12
5.1.2.2
Network Elements
p. 21
5.1.2.3
Reference Points
p. 22
5.1.3
Architectures for H(e)NB interworking
p. 22
5.1.3.1
Architecture Alternative 1 - H(e)NB specific policies
p. 22
5.1.3.1.1
General Principles
p. 22
5.1.3.1.2
Non-Roaming
p. 23
5.1.3.1.3
Roaming - Home Routed Traffic
p. 24
5.1.3.1.4
Roaming - Visited Access/LBO
p. 24
5.1.3.1.5
Interworking functions
p. 24
5.1.3.1.6
Reference Points
p. 26
5.1.3.1.7
H(e)NB PF Selection
p. 27
5.1.3.2
Architecture Alternative 2 - Femto Architecture Diagrams
p. 27
5.1.3.2.1
General
p. 27
5.1.3.2.2
Non-Roaming
p. 28
5.1.3.2.3
Roaming - Home Routed Traffic
p. 28
5.1.3.2.4
Roaming - Visited Access/LBO
p. 29
5.1.3.3
Architecture Alternative 3 - H(e)NB specific policies
p. 30
5.1.3.3.1
General Principles
p. 30
5.1.3.3.2
Non-Roaming
p. 31
5.1.3.3.3
Roaming - Home Routed Traffic
p. 32
5.1.3.3.4
Roaming - Visited Access/LBO
p. 32
5.1.3.3.5
Network elements
p. 32
5.1.3.3.6
Reference Point
p. 33
5.1.3.3.7
H(e)NB PF Selection
p. 34
5.2
Policy and QoS interworking between 3GPP and BBF architectures
p. 34
5.2.1
Description
p. 34
5.2.2
Solution
p. 34
5.2.2.1
Policy interworking principles
p. 34
5.2.2.1.1
PCRF - BPCF Functional split
p. 34
5.2.2.1.2
Procedures on S9a
p. 35
5.2.2.1.3
Leg Linking and session association
p. 42
5.2.2.1.4
PCRF/BPCF Discovery and Selection
p. 42
5.2.2.1.5
QoS interworking principles
p. 42
5.2.2.1.6
Assumptions about functionality in the BBF access network
p. 46
5.2.3
Conclusion
p. 46
5.3
Interworking between 3GPP and BBF architectures for authentication, including identities, when WLAN is used
p. 47
5.3.1
Description
p. 47
5.3.2
Solution
p. 48
5.3.3
Conclusion
p. 48
5.4
IP flow mobility support in BBF accesses
p. 48
5.4.1
Description
p. 48
5.4.2
Solution A
p. 49
5.4.3
Conclusion
p. 49
5.5
Procedures for the case when WLAN is being used
p. 49
5.5.1
Procedures for untrusted WLAN with traffic routed back to the EPC with S2b
p. 49
5.5.1.1
Initial Attach with PMIPv6 on S2b
p. 49
5.5.1.1a
Initial Attach with GTP on S2b
p. 51
5.5.1.2
UE/ePDG-initiated Detach Procedure and UE-Requested PDN Disconnection with PMIPv6 on S2b
p. 53
5.5.1.2a
UE/ePDG-initiated Detach Procedure and UE-Requested PDN Disconnection with GTP on S2b
p. 54
5.5.1.3
HSS/AAA-initiated Detach Procedure with PMIPv6 on S2b
p. 55
5.5.1.3a
HSS/AAA-initiated Detach Procedure with GTP on S2b
p. 56
5.5.1.4
E-UTRAN to Untrusted Non-3GPP IP Access Handover with PMIPv6 on S2b
p. 57
5.5.1.4a
E-UTRAN to Untrusted Non-3GPP IP Access Handover with GTP on S2b
p. 59
5.5.1.5
UE-initiated Connectivity to Additional PDN with PMIPv6 or GTP on S2b
p. 60
5.5.1.6
Network-Initiated Dynamic PCC for S2b when accessing over BBF access
p. 61
5.5.1.6a
PGW-Initiated Dynamic PCC for GTP based S2b when accessing over BBF access
p. 63
5.5.1.6b
HSS-Initiated Subscribed QoS Modification for GTP based S2b when accessing over BBF access
p. 63
5.5.1.7
PDN GW initiated Resource Allocation Deactivation with S2b PMIPv6 when accessing over BBF Access Network
p. 64
5.5.1.7a
PDN GW initiated Resource Allocation Deactivation with S2b GTP when accessing over BBF Access Network
p. 66
5.5.1.8
Handover without ePDG relocation for PMIPv6 based S2b
p. 67
5.5.1.8a
Handover without ePDG relocation for GTP based S2b
p. 68
5.5.1.9
IPSec tunnel modified within the same untrusted BBF WLAN IP Accesses with PMIPv6 based S2b
p. 69
5.5.1.9a
IPSec tunnel modified within the same untrusted BBF WLAN IP Accesses with GTP based S2b
p. 70
5.5.1.10a
Dedicated bearer activation with GTP on S2b
p. 70
5.5.2
Procedures for trusted BBF WLAN with traffic routed to the EPC with S2c
p. 71
5.5.2.1
Initial Attach with DSMIPv6 on S2c to trusted BBF access
p. 71
5.5.2.2
UE-initiated Detach Procedure and UE-Requested PDN Disconnection with DSMIPv6 on S2c in trusted BBF access
p. 73
5.5.2.3
HSS-initiated Detach Procedure with DSMIPv6 on S2c in trusted BBF access
p. 74
5.5.2.4
PDN GW-initiated PDN disconnection Procedure with DSMIPv6 on S2c in trusted BBF access
p. 74
5.5.2.5
E-UTRAN to Trusted BBF access Handover with DSMIPv6 on S2c
p. 75
5.5.2.6
Network-Initiated Dynamic PCC for DSMIPV6 on S2c when accessing trusted BBF access
p. 77
5.5.2.7
UE-Initiated Connectivity to Additional PDN with DSMIPv6 on S2c over trusted BBF access
p. 78
5.5.3
Procedures for untrusted BBF WLAN with traffic routed to the EPC with S2c
p. 79
5.5.3.1
Initial Attach with DSMIPv6 on S2c to untrusted BBF access
p. 79
5.5.3.2
UE-initiated Detach Procedure and UE-Requested PDN Disconnection with DSMIPv6 on S2c in untrusted BBF access
p. 80
5.5.3.3
HSS-initiated Detach Procedure with DSMIPv6 on S2c in untrusted BBF access
p. 82
5.5.3.4
PDN GW-initiated PDN disconnection Procedure with DSMIPv6 on S2c in untrusted BBF access
p. 83
5.5.3.5
E-UTRAN to untrusted BBF access Handover with DSMIPv6 on S2c
p. 83
5.5.3.6
Network-Initiated Dynamic PCC for S2c when accessing untrusted BBF access
p. 85
5.5.3.7
UE-Initiated Connectivity to Additional PDN with DSMIPv6 on S2c over untrusted BBF access
p. 86
5.6
H(e)NB interworking architecture alternative 1
p. 87
5.6.1
Procedures
p. 87
5.6.1.1
H(e)NB power on
p. 88
5.6.1.2
UE initial attach and Idle-to-Active transition whilst on H(e)NB
p. 89
5.6.1.3
Idle mode mobility onto H(e)NB
p. 89
5.6.1.4
Bearer Activation / Modification / Deactivation
p. 90
5.6.1.5
Inter H(e)NB mobility
p. 91
5.6.1.5.1
To different H(e)NB GW
p. 91
5.6.1.6
Mobility to macro network
p. 92
5.6.1.7
UE Attach without HeNB GW
p. 93
5.6.1.8
CS call establishment
p. 94
5.6.1.9
UE detach and Active-to-Idle transition whilst on H(e)NB
p. 95
5.6.1.10
H(e)NB policy function initiated bearer Deactivation
p. 96
5.7
H(e)NB interworking architecture alternative 2
p. 96
5.7.1
General
p. 96
5.7.2
TS 23.401 procedures
p. 97
5.7.2.1
E-UTRAN Initial Attach
p. 97
5.7.2.2
UE requested PDN connectivity
p. 99
5.7.3
TS 23.402 Procedures
p. 100
5.7.3.1
Initial E-UTRAN Attach with PMIP-based S5 or S8
p. 100
5.7.3.2
Detach for PMIP-based S5/S8
p. 102
5.7.3.3
Dedicated Bearer Procedures for E-UTRAN Access with PMIP-based S5/S8
p. 103
5.7.3.4
Intra-LTE TAU and Inter-eNodeB (macro to HeNB) Handover with Serving GW Relocation
p. 103
5.8
H(e)NB interworking architecture alternative 3
p. 104
5.8.1
General
p. 104
5.8.2
Procedures
p. 105
5.8.2.1
Procedures for the case when H(e)NB is being used and traffic is routed back to the EPC
p. 105
5.8.2.1.1
S9a Session Establishment Procedure
p. 105
5.8.2.1.2
Bearer Activation Procedure
p. 106
5.8.2.1.3
Bearer Deactivation Procedure
p. 108
5.8.2.1.4
Bearer Modification Procedure
p. 111
5.8.2.1.5
H(e)NB Deregistration Procedure
p. 113
5.9
Comparison of 3GPP LTE Femto Architecture Options
p. 113
5.9.1
General
p. 113
5.9.2
Comparison
p. 115
5.9.2.1
LTE Architecture options
p. 115
5.9.2.2
UMTS Architecture Options
p. 116
5.10
3GPP Femto Architecture Decision
p. 117
5.10.1
3GPP HNB procedure
p. 118
5.10.1.1
3GPP HNB for CS service
p. 118
5.10.1.1.1
S15 session establishment at HNB Power on
p. 118
5.10.1.1.2
S15 session modification (3G Femto)
p. 119
5.10.1.1.3
S15 session termination (3G Femto)
p. 120
5.10.1.2
3GPP HNB procedures for signalling of Tunnel Information for PS services
p. 120
5.11
Conclusions
p. 121