Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 22.830
Word version: 16.1.0
1…
5…
5
Role model scenarios
5.1
3rd party encryption
5.2
Private slice selection
5.3
Network slicing and roaming scenarios
5.4
Enhanced network capability exposure for distribution network of smart grid
5.5
A/V production use cases with local standalone network deployment
5.6
A/V production use cases relying on PLMN infrastructure
5.7
Network slicing for Industry 4.0 verticals
5.8
End-to-end asset tracking
5.9
Network slicing roles in (off-shore) wind farm
5.10
Private slice management
5.11
Management of network selection information in (off-shore) wind farm
6
Considerations
7
Consolidated potential requirements
8
Conclusion and recommendations
$
Change history
5
Role model scenarios
p. 9
5.1
3rd party encryption
p. 9
5.1.1
Description
p. 9
5.1.2
Potential requirements
p. 9
5.2
Private slice selection
p. 9
5.2.1
Description
p. 9
5.2.2
Potential requirements
p. 10
5.3
Network slicing and roaming scenarios
p. 10
5.3.1
Description
p. 10
5.4
Enhanced network capability exposure for distribution network of smart grid
p. 11
5.4.1
Description
p. 11
5.4.2
Potential requirements
p. 12
5.5
A/V production use cases with local standalone network deployment
p. 12
5.5.1
Description
p. 12
5.5.2
Potential requirements
p. 14
5.6
A/V production use cases relying on PLMN infrastructure
p. 14
5.6.1
Description
p. 14
5.6.2
Potential requirements
p. 16
5.7
Network slicing for Industry 4.0 verticals
p. 16
5.7.1
Description
p. 16
5.7.2
Potential requirements
p. 17
5.8
End-to-end asset tracking
p. 17
5.8.1
Description
p. 17
5.8.2
Potential Requirements
p. 19
5.9
Network slicing roles in (off-shore) wind farm
p. 19
5.9.1
Description
p. 19
5.9.2
Potential requirements
p. 21
5.10
Private slice management
p. 21
5.10.1
Description
p. 21
5.10.2
Potential requirements
p. 22
5.11
Management of network selection information in (off-shore) wind farm
p. 22
5.11.1
Description
p. 22
5.11.2
Potential requirements
p. 22
6
Considerations
p. 22
6.1
Considerations on security
p. 22
6.2
Considerations on performance
p. 23
7
Consolidated potential requirements
p. 23
7.1
General
p. 23
7.2
Service exposure
p. 23
7.3
Network slice constraints
p. 24
7.4
Cross-network slice coordination
p. 24
7.5
Slice fault tolerance
p. 24
8
Conclusion and recommendations
p. 24
$
Change history
p. 25