@@ -348,37 +348,37 @@ the EPC:
348348- AUSF (Authentication Server Function): Essentially an authentication
349349 server. Includes part of the functionality in the EPC’s HSS.
350350
351- The second group also runs in the Control Plane (CP) but does not have a
352- counterpart in the EPC:
351+ The second group also runs in the Control Plane (CP) but does not have
352+ a direct counterpart in the EPC:
353353
354354- SDSF (Structured Data Storage Network Function): A “helper” service
355- used to store structured data. Might be implemented by an “SQL
355+ used to store structured data. Could be implemented by an “SQL
356356 Database” in a microservices-based system.
357357
358358- UDSF (Unstructured Data Storage Network Function): A “helper” service
359- used to store unstructured data. Might be implemented by a “Key/Value
359+ used to store unstructured data. Could be implemented by a “Key/Value
360360 Store” in a microservices-based system.
361361
362362- NEF (Network Exposure Function): A means to expose select
363363 capabilities to third-party services, including translation between
364- internal and external representations for data. Might be implemented
364+ internal and external representations for data. Could be implemented
365365 by an “API Server” in a microservices-based system.
366366
367367- NFR (NF Repository Function): A means to discover available services.
368- Might be implemented by a “Discovery Service” in a
368+ Could be implemented by a “Discovery Service” in a
369369 microservices-based system.
370370
371371- NSSF (Network Slicing Selector Function): A means to select a Network
372372 Slice to serve a given UE. Network slices are essentially a way to
373373 differentiate service given to different users. It is a key feature
374- of 5G that we discuss in depth later in this tutorial .
374+ of 5G that we discuss in depth later in a later chapter .
375375
376376The third group includes the one component that runs in the User Plane
377377(UP):
378378
379379- UPF (User Plane Function): Forwards traffic between RAN and the
380380 Internet, corresponding to the S/PGW combination in EPC. In addition
381- to packet forwarding, responsible for policy enforcement, lawful
381+ to packet forwarding, it responsible for policy enforcement, lawful
382382 intercept, traffic usage reporting, and QoS policing.
383383
384384Of these, the first and third groups are best viewed as a
@@ -388,7 +388,7 @@ to a cloud native solution as the desired end-state for the Mobile Core.
388388Of particular note, introducing distinct storage services means that all
389389the other services can be stateless, and hence, more readily scalable.
390390Also note that :ref: `Figure 3.10 <fig-5g-core >` adopts an idea that’s
391- common in microservice-based systems, namely, to show a “ message bus”
391+ common in microservice-based systems, namely, to show a * message bus *
392392interconnecting all the components rather than including a full set of
393393pairwise connections. This also suggests a well-understood
394394implementation strategy.
@@ -437,7 +437,7 @@ similar challenge in the chapters that follow. The closer the following
437437discussion gets to implementation details, the more specific we have to
438438be about whether we are using 4G components or 5G components. As a
439439general rule, we use 4G components—particularly with respect to the
440- Mobile Core, since that’s the available open source software —and trust
440+ Mobile Core, since that’s what's available in open source today —and trust
441441the reader can make the appropriate substitution without loss of
442442generality. Like the broader industry, the open source community is in
443443the process of incrementally evolving its 4G code base into its
0 commit comments