Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 22.806
Word version: 13.1.0
0…
5…
6…
6
Analysis
7
Potential requirements
8
Conclusion
A
Mapping of potential requirements
B
Key issues for consideration
C
ACDC Background Information
$
Change history
6
Analysis
p. 28
6.1
Considerations
p. 28
6.1.1
Relationship with PMOC
p. 28
6.1.2
Relationship with Smart Congestion Mitigation
p. 28
6.1.3
Considerations on charging
p. 28
6.1.4
Considerations on security
p. 29
6.1.5
Considerations on network sharing
p. 29
6.1.6
Relationship with SSAC
p. 29
6.1.7
Considerations on the number of ACDC categories
p. 29
6.1.8
Considerations on assigning, structuring and restricting ACDC categories
p. 29
7
Potential requirements
p. 30
7.1
Consolidated requirements
p. 30
8
Conclusion
p. 30
A
Mapping of potential requirements
p. 32
B
Key issues for consideration
p. 33
B.1
Applicability
p. 33
B.2
Control and triggering
p. 33
B.3
Effects on on-going communication
p. 33
B.4
Control range and proportionality
p. 33
B.5
Interaction with other forms of access control
p. 33
C
ACDC Background Information
p. 34
C.1
Purpose and nature of access control
p. 34
C.1.1
Impact of modern applications on the network
p. 34
C.1.2
Controlling traffic ingress
p. 34
C.1.3
OAM aspects of ACDC operation
p. 36
C.1.4
ACDC categories and control range
p. 36
C.2
UE provisioning and operational impact of ACDC
p. 37
C.2.1
UE provisioning considerations
p. 37
C.2.2
Access control operating regimes
p. 38
C.2.3
Control algorithm in the RAN
p. 38
$
Change history
p. 40