For the purposes of the present document, the following terms and definitions apply:
Mobility Management Entity (MME):
manages and stores UE context (for idle state: UE/user identities, UE mobility state, user security parameters). It generates temporary identities and allocates them to UEs. It checks the authorization whether the UE may camp on the TA or on the PLMN. It also authenticates the user.
MME Pool Area:
An MME Pool Area is defined as an area within which a UE may be served without need to change the serving MME. An MME Pool Area is served by one or more MMEs ("pool of MMEs") in parallel.
UPE Pool Area:
A UPE Pool Area is defined as an area within which a UE may be served without need to change the serving UPE. A UPE Pool Area is served by one or more UPEs ("pool of UPEs") in parallel.
User Plane Entity (UPE):
terminates for idle state Ues the downlink data path and triggers/initiates paging when downlink data arrive for the UE. It manages and stores UE contexts, e.g. parameters of the IP bearer service or network internal routing information. It performs replication of the user traffic in case of interception.
It is FFS whether Charging Information for inter-operator accounting is in UPE or in another functional block.
Idle State:
is LTE_IDLE for SAE/LTE or PMM_IDLE for 2G/3G or URA_PCH, which is FFS
IP Service continuity:
IP service continuity is the capability of a system to hide the impact of mobility events to the end user and the IP application(s), i.e. the service can continue without user intervention or special application support to mask the effects of a mobility event.
Nomadic Terminal:
Terminal that does not have full mobile capabilities but would normally be expected to roam between different points of attachment of the network, both wireless and wired.
Backward Handover:
the source RAN node initiates the handover, and resources are prepared in the target RAN Nodes. Examples of this concept are reported in
TR 25.931.
Forward Handover:
The UE changes to the target RAN node without any preparation in the network. Examples of this concept are reported in
TR 25.931.
Trusted non-3GPP IP Access:
A non-3GPP IP Access Network is defined as a "trusted non-3GPP IP Access Network" if the 3GPP EPC system chooses to trust such non-3GPP IP access network. The 3GPP EPC system operator may choose to trust the non-3GPP IP access network operated by the same or different operators, e.g. based on business agreements.
Note that specific security mechanisms may be in place between the trusted non-3GPP IP Access Network and the 3GPP EPC to avoid security threats. It is assumed that an IPSec tunnel between the UE and the 3GPP EPC is not required.
On the contrary, an untrusted non-3GPP IP access is an IP access network where 3GPP network requires use of IPSec between the UE and the 3GPP network in order to provide adequate security mechanism acceptable to 3GPP network operator. An example of such untrusted non-3GPP IP access is WLAN and it is made trusted in the Interworking WLAN specifications developed within 3GPP.
For the purposes of the present document, the following abbreviations apply:
EPC
Evolved Packet Core network
IASA
Inter Access System Anchor