Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 28.811
Word version: 17.0.0
1…
4…
4
Concepts and overview
5
Scenarios for Network Slicing Management Enhancements
6
Potential requirements for Network Slicing Management Enhancements
7
Possible solutions for Network Slicing Management Enhancements
8
Conclusions and recommendations
$
Change history
4
Concepts and overview
p. 8
4.1
Network slice management terms
p. 8
4.2
Multi-operator relationships in network slice management
p. 9
4.3
End to end management of network slice
p. 10
4.4
Multi-operator concepts
p. 10
4.4.1
National roaming concept
p. 10
5
Scenarios for Network Slicing Management Enhancements
p. 11
5.1
Network Slice using multiple networks scenario 1
p. 11
5.1.1
Description RAN sharing
p. 11
5.1.2
Identified problems and general issues
p. 12
5.2
Network slice using multiple networks scenario 2
p. 13
5.2.1
National Roaming Description
p. 13
5.2.2
Identified problems
p. 13
5.3
Use case - Isolated deployment of multiple network slices of same customer
p. 13
5.3.1
Introduction
p. 13
5.3.2
Issue and gaps
p. 14
5.4
Deployment of edge application service
p. 14
5.4.1
Description
p. 14
5.4.2
Identified problems
p. 14
5.5
Use case - Support network slice specific authentication
p. 15
5.5.1
Description
p. 15
5.5.2
Issue and gaps
p. 15
5.6
Use case - support network slice protection on N6 interface
p. 16
5.6.1
Description
p. 16
5.6.2
Issue and gaps
p. 16
5.7
Use case - management data isolation for different network slice customers
p. 16
5.7.1
Description
p. 16
5.7.2
Issue and gaps
p. 17
6
Potential requirements for Network Slicing Management Enhancements
p. 17
6.1
Potential requirements for Network Slicing Management to support roaming
p. 17
6.2
Potential requirements for Network Slicing Management to support network slice isolation
p. 17
6.3
Potential requirements for Network Slicing Management to support edge computing
p. 18
6.4
Potential requirements for Network Slicing Management to support network slice specific authentication
p. 18
6.5
Potential requirements for Network Slicing Management to support network slice protection on N6 interface
p. 18
6.6
Potential requirements for Network Slicing Management to support management data isolation for different NSCs
p. 19
7
Possible solutions for Network Slicing Management Enhancements
p. 19
7.1
Possible solutions for network slice isolation
p. 19
7.2
Possible solutions for network slice using multiple networks scenario 1 - RAN sharing
p. 20
7.2.1
Alternative 1: solution based on Network Slice as a Service
p. 20
7.2.1.1
Description
p. 20
7.2.1.2
Modelling options
p. 22
7.2.1.2.1
Overview
p. 22
7.2.1.2.2
Alternative 1A: solution based on the existing NetworkSlice IOC
p. 23
7.2.1.2.3
Alternative 1B: solution based on new ExternalNetworkSlice IOC
p. 23
7.2.2
Alternative 2: solution based on Network Slice Subnet as a Service
p. 24
7.2.2.1
Description
p. 24
7.2.2.2
Modelling options
p. 26
7.2.2.2.1
Overview
p. 26
7.2.2.2.2
Alternative 2A: solution based on the existing NetworkSliceSubnet IOC
p. 27
7.2.2.2.3
Alternative 2B: solution based on new ExternalNetworkSliceSubnet IOC
p. 27
7.2.3
Solution analysis
p. 28
7.2.3.1
Overview
p. 28
7.2.3.2
Concepts and Terminology Impact
p. 28
7.2.3.2.1
Basic definitions
p. 28
7.2.3.2.2
Service provider terminology
p. 29
7.2.3.3
NRM Impact
p. 29
7.2.3.3.1
Model in Company-NB management system
p. 29
7.2.3.3.2
Model in Company-NA management system
p. 30
7.2.3.4
Summary and conclusions
p. 30
7.3
Possible solutions for network slice using multiple networks scenario 2 - national roaming
p. 30
7.4
Possible solutions for network slice specific authentication
p. 30
7.5
Possible solutions for network slice protection on N6 interface
p. 31
7.6
Possible solutions for management data isolation for different NSCs
p. 32
8
Conclusions and recommendations
p. 34
$
Change history
p. 36