June | 2020

Figure 1: Evolution of Architecture for Untrusted WLAN Interworking

Figure 2: Architecture for Untrusted WLAN Interworking with 5GCN

Figure 3: Control Plane before Signalling IPsec SA

Figure 4: Control Plane after Signalling IPsec SA

Figure 5: Control Plane for Establishing User Plane

Figure 6: User Plane Protocol Stack

Figure 7: Registration Procedure

Figure 8: Session Establishment Procedure

Figure 9: QoS for Untrusted WLAN Accessing 5GCN

Related Articles