Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 23.740
Word version: 16.0.0
1…
5…
5
Key Issues
6
Solutions
7
Evaluation
8
Conclusions
$
Change History
5
Key Issues
p. 8
5.1
Key Issue#1: Mutually exclusive access to Network Slices
p. 8
5.1.1
Description
p. 8
5.2
Key issue#2: Enabling interworking for slicing between EPC and 5GC
p. 9
5.2.1
Description
p. 9
5.3
Key Issue#3: Access to specific Network Slices authorized and authenticated through additional User Identifiers
p. 9
5.3.1
Description
p. 9
6
Solutions
p. 10
6.1
Solutions for KI#1
p. 10
6.1.1
Solution #1.1: Mutually Exclusive Access to Network Slices via the use of URSP
p. 10
6.1.1.1
Introduction
p. 10
6.1.1.2
Functional description
p. 10
6.1.1.3
Procedures
p. 11
6.1.1.4
Impacts on existing entities and interfaces
p. 11
6.1.1.5
Evaluation
p. 11
6.1.2
Solution #1.2: Mutually Exclusive Access to Network Slices via UE configuration
p. 11
6.1.2.1
Introduction
p. 11
6.1.2.2
Functional description
p. 12
6.1.2.3
Procedures
p. 12
6.1.2.4
Impacts on existing entities and interfaces
p. 12
6.1.2.5
Evaluation
p. 13
6.1.3
Solution #1.3: Solution to Key issue#1: Mutual exclusion awareness in UE.
p. 13
6.1.3.1
Introduction
p. 13
6.1.3.2
Functional description
p. 14
6.1.3.3
Procedures
p. 15
6.1.3.4
Impacts on existing entities and interfaces
p. 18
6.1.3.5
Evaluation
p. 18
6.1.4
Solution#1.4: Slicing Group Support for Mutually Exclusive Access to Network Slices
p. 19
6.1.4.1
Introduction
p. 19
6.1.4.1.1
Design principles
p. 19
6.1.4.1.2
Working Assumptions and Concepts of Mutually Exclusive Access Slicing Group
p. 19
6.1.4.2
Functional description
p. 20
6.1.4.2.1
Concepts of Mutually Exclusive Access Slicing Group
p. 20
6.1.4.2.2
Identification of Mutually Exclusive Access Slicing Group
p. 21
6.1.4.2.3
UE Support for Mutually Exclusive Access Slicing Group
p. 22
6.1.4.2.4
Roaming Support for Mutually Exclusive Access Slicing Group
p. 22
6.1.4.2.5
URSP/NSSP Support for Mutually Exclusive Access Slicing Group
p. 23
6.1.2.4.6
AMF Support for Mutually Exclusive Access Slicing Group
p. 23
6.1.4.3
Procedures
p. 25
6.1.4.3.1
UE Registration with Mutually Exclusive Access Slicing Group
p. 25
6.1.4.4
Impacts on existing entities and interfaces
p. 28
6.1.4.5
Evaluation
p. 28
6.1.5
Solution #1.5: Mutually Exclusive Access to Network Slices using existing mechanisms
p. 28
6.1.5.1
Introduction
p. 28
6.1.5.2
Functional description
p. 28
6.1.5.2.1
General assumptions
p. 28
6.1.5.2.2
Applying proposed logic to an example
p. 29
6.1.5.3
Procedures
p. 31
6.1.5.3.1
General
p. 31
6.1.5.3.2
Signalling within the network
p. 31
6.1.5.3.3
Interactions with Rel-15 usage of Allowed NSSAI
p. 31
6.1.5.3.4
Characteristics of the solution
p. 31
6.1.5.4
Impacts on existing entities and interfaces
p. 31
6.1.5.5
Evaluation
p. 32
6.1.6
Solution #1.6: Enabling access control to network slices that cannot be access simultaneously
p. 32
6.1.6.1
Introduction
p. 32
6.1.6.1.1
Design Principles
p. 32
6.1.6.1.2
Working Assumptions
p. 32
6.1.6.1.3
Network Slice Access Exclusion Rules
p. 33
6.1.6.2
High-level Description
p. 35
6.1.6.2.1
Services and Illustrated Procedures
p. 35
6.1.6.2.1.1
Registration Procedure
p. 35
6.1.6.2.1.2
Enforcement of mutually exclusive rules
p. 36
6.1.6.2.1.2.1
PDU Establishment
p. 37
6.1.6.3
Impacts on existing services and interfaces
p. 37
6.1.6.4
Evaluation
p. 38
6.1.7
Solution #1.7: Solutions for MEANS via Slicing Group Indication
p. 38
6.1.7.1
Introduction
p. 38
6.1.7.2
Functional description
p. 38
6.1.7.2.1
UE configuration
p. 38
6.1.7.2.2
UE subscription
p. 38
6.1.7.2.3
Operations
p. 38
6.1.7.2.4
Roaming support
p. 39
6.1.7.3
Procedures
p. 40
6.1.7.3.1
RAN configuration
p. 40
6.1.7.3.2
Registration procedure
p. 40
6.1.7.4
Impacts on existing entities and interfaces
p. 41
6.1.7.5
Evaluation
p. 42
6.1.8
Solution #1.8: Solution to Key issue#1: Access to new group of Network Slices.
p. 42
6.1.8.1
Introduction
p. 42
6.1.8.2
Functional description
p. 42
6.1.8.3
Procedures
p. 42
6.1.8.4
Impacts on existing entities and interfaces
p. 42
6.1.8.5
Evaluation
p. 43
6.2
Solutions for KI#2
p. 43
6.2.1
Solution#2.1: Network slice instance selection in initial AMF
p. 43
6.2.1.1
Introduction
p. 43
6.2.1.2
Functional description
p. 43
6.2.1.3
EPS to 5GS handover Procedures
p. 44
6.2.1.4
Impacts on existing entities and interfaces
p. 45
6.2.1.5
Evaluation
p. 45
6.2.2
Solution #2.2: Slice-aware mobility from EPC to 5GC
p. 45
6.2.2.1
Introduction
p. 45
6.2.2.2
Functional description
p. 45
6.2.2.2.1
Idle Mode Mobility from EPC to 5GC
p. 45
6.2.2.2.2
Connected Mode Mobility from EPC to 5GC
p. 46
6.2.2.3
Procedures
p. 47
6.2.2.4
Impacts on existing entities and interfaces
p. 47
6.2.2.5
Evaluation
p. 47
6.2.3
Solution #2.3: Inter RAT mobility Slice support
p. 47
6.2.3.1
Introduction
p. 47
6.2.3.2
Functional description
p. 47
6.2.3.3
Procedures
p. 49
6.2.3.3.1
Registration with AMF and V-SMF change during CONNECTED state mobility
p. 49
6.2.3.3.2
Registration with AMF and V-SMF change during IDLE state mobility
p. 50
6.2.3.4
Impacts on existing entities and interfaces
p. 50
6.2.3.5
Evaluation
p. 51
6.2.4
Solution #2.4: Connected mode mobility from EPC to 5GC
p. 51
6.2.4.1
Introduction
p. 51
6.2.4.2
Functional description
p. 51
6.2.4.3
Procedures
p. 52
6.2.4.3.1
Enhancement to PDN connection establishment
p. 52
6.2.4.3.2
Enhancement to handover preparation from EPC to 5GC
p. 52
6.2.4.4
Impacts on existing entities and interfaces
p. 53
6.2.4.5
Evaluation
p. 53
6.2.5
Solution#2.5: Using the NF discovery to find the S-NSSAI.
p. 53
6.2.5.1
Introduction
p. 53
6.2.5.2
Functional description
p. 53
6.2.5.3
Procedures
p. 54
6.2.5.3.1
EPS to 5GS handover using N26 interface
p. 54
6.2.5.4
Impacts on existing entities and interfaces
p. 55
6.2.5.5
Evaluation
p. 55
6.3
Solutions for KI#3
p. 55
6.3.1
Solution #3.1: Slice Specific Authentication and Authorization using non 3GPP credentials based on secondary authentication
p. 55
6.3.1.1
Introduction
p. 55
6.3.1.2
Functional description
p. 56
6.3.1.3
Procedures
p. 57
6.3.1.3.1
Slice authentication at first PDU session establishment for the S-NSSAI
p. 57
6.3.1.4
Impacts on existing entities and interfaces
p. 58
6.3.1.5
Evaluation
p. 58
6.3.2
Solution #3.2: Solution to KI#3 on Slice Specific Authentication and Authorization using non 3GPP credentials
p. 58
6.3.2.1
Introduction
p. 58
6.3.2.2
Functional description
p. 59
6.3.2.3
Procedures
p. 60
6.3.2.3.1
Secondary Authentication and Authorization During Registration
p. 60
6.3.2.3.2
Secondary Re-Authentication and Re-Authorization after Registration
p. 63
6.3.2.4
Impacts on existing entities and interfaces
p. 63
6.3.2.5
Evaluation
p. 63
6.3.3
Solution #3.3: Solution for configuration of network slice authentication
p. 64
6.3.3.1
Introduction
p. 64
6.3.3.2
Functional description
p. 64
6.3.3.3
Procedures
p. 64
6.3.3.4
Impacts on existing entities and interfaces
p. 64
6.3.3.5
Evaluation
p. 64
7
Evaluation
p. 64
7.1
Evaluations Criteria for KI#1: Mutually Exclusive Access to Network Slices
p. 64
7.2
Evaluations for KI#2: Enabling interworking for slicing between EPC and 5GC
p. 66
8
Conclusions
p. 67
8.1
Conclusions for key issue #1 - Mutually exclusive access to Network Slices
p. 67
8.1.1
Enhancements for change of a set of Network Slices
p. 68
8.2
Conclusions for key issue #2 - Enabling interworking for slicing between EPC and 5GC
p. 69
8.3
Conclusions for key issue #3 - Access to specific Network Slices authorized and authenticated through additional User Identifiers
p. 69
$
Change History
p. 70