Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 22.978
Word version: 18.0.1
0…
2…
2
References
3
Definitions, symbols and abbreviations
4
Objectives and Drivers for progression to an AIPN
5
End-user and AIPN operator aspects of an AIPN
6
Capability expansion required for the introduction of an AIPN
7
Conclusions
A
Mapping of AIPN Motivations to Key Aspects of an AIPN
B
Use cases for AIPN key aspects
C
Use cases for Security
D
Security Issues
E
Use cases for Personal Network (PN), Personal Area Network (PAN), Ad-hoc Network and Moving Network Support
F
Use Cases for Session Mobility
$
Change history
2
References
p. 8
3
Definitions, symbols and abbreviations
p. 9
3.1
Definitions
p. 9
3.2
Abbreviations
p. 10
4
Objectives and Drivers for progression to an AIPN
p. 10
4.1
High Level Objectives
p. 10
4.2
Motivations and Drivers
p. 11
4.2.1
User related and social drivers
p. 11
4.2.1.1
Consumer trend demanding diversification of mobile services
p. 11
4.2.1.2
Human need to be able to interact with his personal environment
p. 12
4.2.1.3
Social behaviour and the need to understand one's environment
p. 12
4.2.1.4
The social trend of increasing differences in income within societies.
p. 12
4.2.1.5
The need to satisfy user experience of 'early-adopters'
p. 13
4.2.2
Drivers from a Business perspective
p. 13
4.2.2.1
Mobile industry anticipating PS traffic to surpass CS
p. 13
4.2.2.2
Desire of AIPN operators to encompass various access systems that are not specified by 3GPP
p. 13
4.2.2.3
Marriage of IT- and telecom world
p. 14
4.2.2.4
Need for increased system efficiency leading to substantial cost reduction in terms of both equipment (CAPEX), and operational (OPEX) costs.
p. 15
4.2.2.5
Trend of the industry to align along the structure: access / transport / control / services
p. 15
4.2.2.6
Fixed/Mobile network convergence
p. 16
4.2.3
Drivers from a Technology perspective
p. 16
4.2.3.1
Evolution of next generation radio access systems (3GPP specified)
p. 16
4.2.3.2
Progress of broadband wireless IP-based networks (non-3GPP specified)
p. 16
4.2.3.3
Progress in ad-hoc networking for user defined services.
p. 16
4.2.3.4
Dawning of new, radio based services (e.g. Personal Networks, RFIDs, multi-hop access networks)
p. 17
4.2.3.5
Reconfigurable Radio (Software Defined Radio - SDR)
p. 17
4.2.3.6
Web services
p. 17
4.2.3.7
Multi-access
p. 18
4.2.3.8
Progress of advanced Traffic Engineering Technologies
p. 18
4.3
Impacts to current models for the 3GPP System
p. 18
4.3.1
Impacts to current charging models
p. 18
4.3.2
Impacts to current business models
p. 19
4.3.3
Impacts to current service models
p. 20
5
End-user and AIPN operator aspects of an AIPN
p. 20
5.1
AIPN Vision
p. 20
5.1.1
Key aspects of an AIPN
p. 21
5.1.1.1
Common IP-based network
p. 21
5.1.1.2
Support of a variety of different access systems (existing and future)
p. 22
5.1.1.3
Take advantage of convergence of telecommunications and IT industries towards IP technology
p. 22
5.1.1.4
Advanced mobility management:
p. 22
5.1.1.5
Enhanced session management:
p. 23
5.1.1.6
Access system selection
p. 23
5.1.1.7
Enhanced services
p. 23
5.1.1.8
Enhanced network performance
p. 24
5.1.1.9
Network extensibility/composition
p. 24
5.1.1.10
Network management
p. 24
5.1.1.11
Maintenance and improvement of the level of security and privacy functionality
p. 24
5.1.1.12
Quality of Service
p. 25
5.1.1.13
Terminal, Subscription and User identification
p. 25
5.1.1.14
Flexible future development
p. 25
5.1.1.15
Identity Federation
p. 25
5.1.2
Continued support of 3GPP system key aspects within an AIPN
p. 26
5.1.2.1
Efficiency of resource usage
p. 26
5.1.2.2
Charging
p. 26
5.1.2.3
Roaming
p. 26
5.2
Evolution of the 3GPP system to an AIPN
p. 26
5.2.1
Requirements for the evolution of the 3GPP system to an AIPN
p. 26
5.2.1.1
Build upon existing 3GPP capabilities
p. 26
5.2.1.2
Access systems
p. 27
5.2.1.3
Security and Privacy
p. 27
5.2.1.4
Network and mobility
p. 27
5.2.1.5
Evolution of 3GPP to keep current and facilitate new business models
p. 27
5.2.1.6
Lawful Intercept
p. 28
5.2.2
Relationship of the AIPN to existing capabilities
p. 28
5.2.2.1
Reuse of legacy infrastructure
p. 28
5.2.2.2
Reuse of legacy terminals
p. 28
5.3
Migration and cost effective introduction of new technology
p. 28
5.4
Security and Privacy considerations
p. 29
5.4.1
Security Considerations
p. 29
5.4.1.1
Threat environment
p. 30
5.4.1.2
Network heterogeneity and traffic protection
p. 30
5.4.2
Privacy considerations
p. 30
6
Capability expansion required for the introduction of an AIPN
p. 31
6.1
Existing capabilities suitable for an AIPN
p. 31
6.2
New capabilities required for an AIPN
p. 31
6.2.1
Enhanced network performance
p. 31
6.2.1.1
IP-based routing and addressing
p. 32
6.2.2
Support of a variety of different access systems (existing and future)
p. 32
6.2.2.1
Access system selection
p. 33
6.2.3
Enhanced Mobility
p. 33
6.2.3.1
Heterogeneous Access Systems Mobility
p. 33
6.2.3.2
Heterogeneous mobility mechanisms
p. 34
6.2.3.3
Frequent mobility
p. 35
6.2.4
Optimised IP session control
p. 35
6.2.5
Enhanced support of IP traffic
p. 36
6.2.5.1
Support of increased IP traffic demand
p. 36
6.2.5.2
Ability to effectively handle a variety of different types of IP traffic
p. 36
6.2.6
Enhanced Quality of Service
p. 36
6.2.7
Personal Network, Personal Area Network (PAN), Ad-hoc Network and Moving Network Support
p. 37
7
Conclusions
p. 38
7.1
Roadmap for work within Rel-7
p. 39
7.1.1
New requirements for introduction to the 3GPP specifications in Rel-7
p. 39
7.1.2
Impact on specifications in Rel-7
p. 39
7.2
Overall conclusion
p. 43
A
Mapping of AIPN Motivations to Key Aspects of an AIPN
p. 44
B
Use cases for AIPN key aspects
p. 45
B.1
Resilience in the presence of network disruptions and intermittent connectivity
p. 45
B.2
Service adaptation to terminal capabilities
p. 46
B.3
Facilitate integration of networks with different administrative domains (e.g. handle negotiation of administrative issues, security, trust, etc)
p. 47
C
Use cases for Security
p. 47
C.1
User issues
p. 47
C.1.1
Ensure privacy and authenticity so that the user can trust the information he is receiving. This should cover private user to private user communications as well as private user to service provider communications
p. 47
C.1.2
Multiple user identities: Users should be able to have multiple identities from different providers, with the relationship between identities hidden to particular providers (thus supporting privacy)
p. 48
C.2
Network issues
p. 50
C.2.1
Fast re-authentication shall be possible
p. 50
D
Security Issues
p. 52
D.1
Trust domains
p. 52
D.2
Trust establishment
p. 53
D.3
Network heterogeneity and traffic protection
p. 53
D.4
End-to-end protection
p. 53
E
Use cases for Personal Network (PN), Personal Area Network (PAN), Ad-hoc Network and Moving Network Support
p. 54
E.1
Personal Network (PN)
p. 54
E.1.1
Use case 1: PN with the terminal away from the user
p. 54
E.2
Personal Area Network (PAN)
p. 55
E.2.1
Use case 2: Multiple devices held by the same user
p. 55
E.2.1.1
Use case 2a: Subscription data within one device only
p. 55
E.2.1.2
Use case 2b: Relationship between Personal Network and Personal Area Network
p. 56
E.2.3
Impact on an AIPN:
p. 56
E.3
Ad-hoc Network
p. 57
E.3.1
Use Case 1: Formation of an Ad-hoc Network
p. 57
E.3.2
Use Case 2: Movement of an Ad-hoc Network
p. 57
E.3.3
Use case 3: Multiple users within the home
p. 57
E.3..4
Impact to an AIPN
p. 58
E.4
Moving Network
p. 58
E.4.1
Use case 1: Moving Base Station
p. 58
E.4.2
Use case 2: Wireless Access Router
p. 59
E.4.3
Use Case 3: Mobile Router
p. 60
E.4.4
Impact to an AIPN
p. 60
F
Use Cases for Session Mobility
p. 61
F.1
Use Case 1: Redirection of a video stream to the terminal away from the user
p. 61
F.2
Use case 2: Seamless mobility of sessions between terminals
p. 61
$
Change history
p. 63