Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 22.806
Word version: 13.1.0
0…
5…
6…
5
Use Cases
5.1
Use Case 1 - ACDC activation for UE-initiated applications
5.2
Use Case 2 - preferred handling of DMB
5.3
Use Case 3 - relationship to Access Class 11-15
5.4
Use Case 4 - Non-roaming regional (local) difference in ACDC
5.5
Use Case 5 - Roaming regional (local) difference in ACDC
5.6
Use Case 6 - Categories in ACDC
5.7
Use Case 7 - interaction with other forms of access control - ACB
5.8
Use Case 8 - control range and proportionality
5.9
Use Case 9 - Secure ACDC list provisioning
5.10
Use Case 10 - Control of ACDC
5.11
Use Case 11 - Roaming compatibility when ACDC categorization is honoured in roaming UEs
5.12
Use Case 12 - ACDC Categorization Not Honoured by VPLMN
5.13
Use Case 13 - Network sharing in ACDC
5.14
Use Case 14 - interaction with other forms of access control - EAB
5
Use Cases
p. 9
5.1
Use Case 1 - ACDC activation for UE-initiated applications
p. 9
5.1.1
Description
p. 9
5.1.2
Pre-conditions
p. 9
5.1.3
Service flows
p. 10
5.1.4
Post-conditions
p. 10
5.1.5
Potential requirements
p. 10
5.2
Use Case 2 - preferred handling of DMB
p. 10
5.2.1
Description
p. 10
5.2.2
Pre-conditions
p. 13
5.2.3
Service flows
p. 13
5.2.4
Post-conditions
p. 13
5.2.5
Potential requirements
p. 13
5.3
Use Case 3 - relationship to Access Class 11-15
p. 13
5.3.1
Description
p. 13
5.3.2
Pre-conditions
p. 13
5.3.3
Service flows
p. 14
5.3.4
Post-conditions
p. 14
5.3.5
Potential requirements
p. 14
5.4
Use Case 4 - Non-roaming regional (local) difference in ACDC
p. 14
5.4.1
Description
p. 14
5.4.2
Pre-conditions
p. 14
5.4.3
Service flows
p. 14
5.4.4
Post-conditions
p. 15
5.4.5
Potential requirements
p. 15
5.5
Use Case 5 - Roaming regional (local) difference in ACDC
p. 15
5.5.1
Description
p. 15
5.5.2
Pre-conditions
p. 15
5.5.3
Service flows
p. 15
5.5.4
Post-conditions
p. 16
5.5.5
Potential requirements
p. 16
5.6
Use Case 6 - Categories in ACDC
p. 16
5.6.1
Description
p. 16
5.6.2
Pre-conditions
p. 16
5.6.3
Service flows
p. 16
5.6.4
Post-conditions
p. 16
5.6.5
Potential requirements
p. 17
5.7
Use Case 7 - interaction with other forms of access control - ACB
p. 17
5.7.1
Description
p. 17
5.7.2
Pre-conditions
p. 17
5.7.3
Service flows
p. 18
5.7.4
Post-conditions
p. 18
5.7.5
Potential requirements
p. 18
5.8
Use Case 8 - control range and proportionality
p. 18
5.8.1
Description
p. 18
5.8.2
Pre-conditions
p. 18
5.8.3
Service flows
p. 18
5.8.4
Post-conditions
p. 19
5.8.5
Potential requirements
p. 19
5.9
Use Case 9 - Secure ACDC list provisioning
p. 19
5.9.1
Description
p. 19
5.9.2
Pre-conditions
p. 19
5.9.3
Service flows
p. 19
5.9.4
Post-conditions
p. 19
5.9.5
Potential requirements
p. 19
5.10
Use Case 10 - Control of ACDC
p. 19
5.10.1
Description
p. 19
5.10.2
Pre-conditions
p. 20
5.10.3
Service flows
p. 20
5.10.4
Post-conditions
p. 20
5.10.5
Potential requirements
p. 20
5.11
Use Case 11 - Roaming compatibility when ACDC categorization is honoured in roaming UEs
p. 21
5.11.1
Description
p. 21
5.11.2
Pre-conditions
p. 21
5.11.3
Service flows
p. 22
5.11.4
Post-conditions
p. 22
5.11.5
Potential requirements
p. 22
5.12
Use Case 12 - ACDC Categorization Not Honoured by VPLMN
p. 23
5.12.1
Description
p. 23
5.12.2
Pre-conditions
p. 23
5.12.3
Service flows
p. 24
5.12.4
Post-conditions
p. 25
5.12.5
Potential requirements
p. 25
5.13
Use Case 13 - Network sharing in ACDC
p. 25
5.13.1
Description
p. 25
5.13.2
Pre-conditions
p. 25
5.13.3
Service flows
p. 25
5.13.4
Post-conditions
p. 25
5.13.5
Potential requirements
p. 26
5.14
Use Case 14 - interaction with other forms of access control - EAB
p. 26
5.14.1
Description
p. 26
5.14.2
Pre-conditions
p. 28
5.14.3
Service flows
p. 28
5.14.4
Post-conditions
p. 28
5.14.5
Potential requirements
p. 28