Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 23.813
Word version: 11.0.0
0…
4…
4
Key issues
$
Change history
4
Key issues
p. 7
4.1
Key Issue 1: Policy enhancement for sponsored data connectivity
p. 7
4.1.1
Introduction
p. 7
4.1.2
Alternative solutions
p. 8
4.1.2.1
Alternative 1
p. 8
4.1.2.1.1
Reference points enhancements
p. 9
4.1.2.1.2
Call flows
p. 10
4.2
Key issue 2: Coherent access to Policy related databases
p. 12
4.2.1
Description
p. 12
4.2.2
Alternative solutions
p. 12
4.2.2.1
SPR as an Application Front-End of the UDC Architecture
p. 12
4.2.2.2
PCRF as an Application Front-End of the UDC Architecture
p. 13
4.2.3
Comparison of alternatives
p. 14
4.2.4
Conclusion
p. 14
4.3
Key issue 3: QoS and gating control based on spending limits
p. 15
4.3.1
Description
p. 15
4.3.1.1
Common Principles
p. 15
4.3.2
Alternative solutions
p. 15
4.3.2.1
Alternative solution 1 - configuration based solution
p. 15
4.3.2.2
New reference point (Sy) between PCRF and OCS
p. 17
4.3.2.2.1
General
p. 17
4.3.2.2.2
PCRF contacting the OCS (PCRF-Centric approach)
p. 18
4.3.2.2.2.5
Signalling flows
p. 19
4.3.2.2.3
OCS contacting the PCRF (OCS-Centric approach)
p. 23
4.3.2.3
Alternative solution 3 - enhancing Gy and Gx
p. 23
4.3.3
Conclusion
p. 23
4.4
Key issue 4: Service Awareness and Privacy Policies
p. 24
4.4.1
Description
p. 24
4.4.2
Actions resulting from service detection
p. 24
4.4.3
Alternative solutions
p. 24
4.4.3.1
Alternative 1
p. 24
4.4.3.1.1
Reference Points
p. 25
4.4.3.1.2
Functional entities
p. 25
4.4.3.2
Solicited service detection reporting
p. 26
4.4.3.2.1
Specific functions description
p. 26
1.4.3.2.2
Signalling Flows
p. 27
4.4.3.3
Unsolicited service detection reporting
p. 33
4.4.3.3.1
Signalling Flows
p. 33
4.4.3.4
Service Detection and Policy rules definition and structure
p. 34
4.4.3.4.1
General
p. 35
4.4.3.4.2
Service Detection and Policy rule relevant operations
p. 36
4.4.3.4.3
PCC rules modifications
p. 36
4.4.4
Conclusion
p. 36
4.5
Key issue 5: Service Based Traffic Steering
p. 36
4.5.1
Description
p. 36
4.5.2
Conclusion
p. 37
4.6
Key issue 6: Extending Policy Architecture to handle transactional services
p. 37
4.6.1
Description
p. 37
4.6.2
Alternative solutions
p. 37
4.6.2.1
Alternative 1 - Use Rx to authorize transactional services
p. 37
4.6.2.1.1
General
p. 37
4.6.2.1.2
Architecture
p. 37
4.6.2.1.3
Reference points
p. 38
4.6.2.1.4
PCC Information Flows
p. 38
4.6.3
Comparison of alternatives
p. 40
4.6.4
Conclusion
p. 40
$
Change history
p. 41