Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 23.862
Word version: 12.0.0
1…
4…
4
Scenarios for interworking between mobile operators and data application providers
5
Architectural Requirements
6
Solutions for interworking between mobile operators and data application providers
7
Conclusion
$
Change history
4
Scenarios for interworking between mobile operators and data application providers
p. 6
5
Architectural Requirements
p. 9
6
Solutions for interworking between mobile operators and data application providers
p. 9
6.1
Architecture #1
p. 9
6.1.1
Architecture Principles
p. 9
6.1.2
Architecture Description
p. 9
6.1.3
Interface Enhancements
p. 13
6.1.4
Impacts on existing nodes or functionality
p. 13
6.1.5
Non-IMS Procedures for Non-roaming Cases
p. 13
6.1.5.0
Introduction
p. 13
6.1.5.1
Authentication Procedures
p. 13
6.1.5.1.0
Introduction
p. 13
6.1.5.1.1
Non-IMS Successful Authentication Procedure
p. 14
6.1.5.1.2
Non-IMS Re-authentication Procedure
p. 14
6.1.5.2
Charging Procedures
p. 15
6.1.5.2.0
Introduction
p. 15
6.1.5.2.1
Non-IMS AS Assisted Offline Charging Scenarios
p. 15
6.1.5.2.2
Non-IMS AS Assisted Online Charging Scenarios
p. 16
6.1.5.3
Mh Interaction Related Procedures
p. 16
6.1.5.3.0
Introduction
p. 16
6.1.5.3.1
Querying Data Procedure
p. 17
6.1.5.3.2
Creating Data Procedure
p. 17
6.1.5.3.3
Deleting Data Procedure
p. 18
6.1.5.3.4
Updating Data Procedure
p. 19
6.1.5.3.5
Subscription to Notifications Procedure
p. 19
6.1.5.3.6
Notification for Data Modification Procedure
p. 20
6.1.5.4
Non-IMS AS Discovery Procedure
p. 20
6.1.5.4.0
Introduction
p. 20
6.1.5.4.1
Non-IMS AS Discovery Procedure based on DHCP/DNS
p. 21
6.1.5.5
Policy Control Interaction Procedures Triggered by Non-IMS Application
p. 21
6.1.5.5.1
Procedures for MNO Owned and 3rd Party Owned Non-IMS AS Cases
p. 21
6.1.6
Non-IMS Procedures for Home-routed Roaming Case
p. 21
6.1.6.1
Authentication Procedures
p. 21
6.1.6.2
Charging Procedures
p. 21
6.1.6.3
Mh Interaction Related Procedures
p. 22
6.1.6.4
Non-IMS AS Discovery Procedure
p. 22
6.1.6.5
Policy Control Interaction Procedures Triggered by Non-IMS Application
p. 22
6.1.7
Evaluation
p. 22
7
Conclusion
p. 22
7.1
Interim Conclusions for Release 12 Specification Work
p. 22
$
Change history
p. 23