Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 29.843
Word version: 16.0.0
1…
2…
2
References
3
Definitions, symbols and abbreviations
4
Architectural Baseline
5
Service Based Architecture Deployment Topologies
6
Overload Scenarios
7
Key Requirements for Load Control
8
Key Requirements for Overload Control
9
Evaluation of Release 15 Load and Overload Control
10
Solutions for Load Control
11
Solutions for Overload Control
12
Selected solutions
$
Change History
2
References
p. 6
3
Definitions, symbols and abbreviations
p. 6
3.1
Definitions
p. 6
3.2
Abbreviations
p. 6
4
Architectural Baseline
p. 7
5
Service Based Architecture Deployment Topologies
p. 7
5.1
Introduction
p. 7
5.2
Direct Interaction Models without Intermediaries
p. 7
5.2.1
Direct NF to NF Interaction
p. 7
5.2.2
NF Services as Distributed Collection
p. 7
5.2.3
Interpretation of Overload
p. 8
5.3
Indirect Interaction Models through Intermediaries
p. 8
5.3.1
NF Service Instances behind a Service Communication Proxy without delegated NF Service discovery
p. 8
5.3.2
NF Service Instances behind a Service Communication Proxy with delegated NF Service discovery
p. 9
5.3.3
Interpretation of Overload
p. 9
6
Overload Scenarios
p. 10
6.1
Introduction
p. 10
6.2
Overload Caused due to UE Initiated Signalling
p. 10
6.3
Overload Caused due to Failure and Restart of Network Functions
p. 11
6.4
Overload Caused due to Notifications
p. 11
7
Key Requirements for Load Control
p. 11
7.1
Introduction
p. 11
7.2
Key Requirement #1: Load Information Conveyance
p. 11
7.3
Key Requirement #2: Co-existence with Rel-15 Load Control
p. 12
7.4
Key Requirement #3: Regulation of Load Information Reception and Conveyance in the NRF
p. 12
8
Key Requirements for Overload Control
p. 12
8.1
Introduction
p. 12
8.2
Key Requirement #1: Overload Conveyance
p. 12
8.3
Key Requirement #2: Mechanisms for avoiding and mitigating overload
p. 13
8.4
Key Requirement #3: Overload Control
p. 13
9
Evaluation of Release 15 Load and Overload Control
p. 13
9.1
Introduction
p. 13
9.2
R15 Overload Control
p. 14
9.2.1
Behaviour
p. 14
9.2.2
Evaluation and Conclusion
p. 15
9.3
R15 Load Control Analysis
p. 16
9.3.1
Analysis
p. 16
9.3.2
Evaluation and Conclusion
p. 16
10
Solutions for Load Control
p. 17
10.1
Introduction
p. 17
10.2
Solution #1: Direct Load Information Conveyance
p. 17
10.3
Solution #2: Load Control Co-Existence
p. 17
10.4
Solution #3: Regulation of Load Information Change Notifications Conveyance by the NRF
p. 18
10.5
Solution #4: Regulation of Load Information Updates Reception at the NRF
p. 18
10.6
Evaluation and Conclusion
p. 19
11
Solutions for Overload Control
p. 19
11.1
Introduction
p. 19
11.2
Principles of Overload Control
p. 19
11.3
Solution #1: Conveying Overload Information via Signalling
p. 20
11.4
Solution #2: Explicit Overload Control Information Conveyance
p. 22
11.5
Solution #3: Overload Control Information
p. 22
11.6
Solution #4: Overload Avoidance and Mitigation
p. 24
11.7
Solution #5: Frequency of Inclusion - Piggyback in every HTTP signalling message
p. 26
11.8
Solution #6: Conveying Overload Information via NRF
p. 26
11.9
Solution #7: Converying OCI via Overload Control Service
p. 28
11.10
Solution #8: Overload Control enforcement behaviour
p. 29
11.11
Solution #9: Location of OCI
p. 30
11.12
Solution#10: Overload control by redirecting requests to another NF within a NF set
p. 31
11.13
Solution #11: Overload Control Enforcement by SCPs
p. 32
11.14
Conveyance of Overload Information with hyperlink
p. 32
11.15
Evaluation and Conclusion
p. 34
11.15.1
Evaluation of the Solutions
p. 34
12
Selected solutions
p. 36
12.1
Selected solution for Overload Control
p. 36
12.2
Solution outline and implications on SBI specifications
p. 36
12.2.1
Overload Conveyance - General (key requirement #1.1)
p. 36
12.2.2
Overload Conveyance - Semantics (key requirement #1.2)
p. 36
12.2.3
Overload Conveyance - Frequency (key requirement #1.3)
p. 37
12.2.4
Overload Conveyance - Where to include OCI (key requirement #1.4)
p. 37
12.2.5
Overload Conveyance - HATEOAS (key requirements #1.1 and #1.4)
p. 37
12.2.6
Overload - Avoiding and mitigating (key requirement #2)
p. 37
12.2.7
Overload Control (key requirement #3)
p. 38
$
Change History
p. 39