Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 32.871
Word version: 15.0.0
0…
2…
2
References
3
Definitions and abbreviations
4
Concepts and Background
5
Use cases
6
Potential requirements
7
Policy management architecture
8
Potential solutions
9
Conclusions
$
Change History
2
References
p. 6
3
Definitions and abbreviations
p. 6
3.1
Definitions
p. 6
3.2
Abbreviations
p. 7
4
Concepts and Background
p. 7
4.1
Concepts
p. 7
4.2
NFV policy conflict detection and resolution
p. 7
5
Use cases
p. 7
5.1
Use cases for network deployment
p. 7
5.1.1
Deploy the network function in specific location
p. 7
5.1.1.1
Introduction and assumption
p. 7
5.1.1.2
Actor and roles
p. 8
5.1.1.3
Pre-condition
p. 8
5.1.1.4
Description
p. 8
5.1.1.5
Post-condition
p. 8
5.1.2
Deploy the corresponding network functions in different location
p. 9
5.1.2.1
Introduction and assumption
p. 9
5.1.2.2
Actor and roles
p. 9
5.1.2.3
Pre-condition
p. 9
5.1.2.4
Description
p. 9
5.1.2.5
Post-condition
p. 9
5.1.3
Deploy the network function based on certain location constraints
p. 10
5.1.3.1
Introduction and assumption
p. 10
5.1.3.2
Actor and roles
p. 11
5.1.3.3
Pre-condition
p. 11
5.1.3.4
Description
p. 11
5.1.3.5
Post-condition
p. 11
6
Potential requirements
p. 12
6.1
Requirements for the policy operation
p. 12
6.2
Requirements for network deployment
p. 12
7
Policy management architecture
p. 12
7.1
Overview
p. 12
7.2
Architecture alternative
p. 12
7.3
Mapping of Policy Related Function to MANO functional blocks
p. 14
7.3.1
Overview
p. 14
7.3.2
Mapping the PF to the NFVO and the PAF to the OSS/BSS
p. 14
7.3.3
Mapping the PF to the VNFM and the PAF to the NFVO and/or the EM
p. 14
7.3.4
Mapping the PF to the VIM and the PAF to the NFVO or VNFM
p. 14
7.3.5
Summary of PAF mapping
p. 15
7.3.6
PVF Mapping
p. 15
7.3.7
PSE Mapping
p. 15
8
Potential solutions
p. 15
8.1
General procedure of policy operation
p. 15
8.2
General message flow for policy create
p. 15
8.3
General message flow for policy query
p. 16
8.4
General message flow for policy active/deactive
p. 16
8.5
General message flow for policy update
p. 16
8.6
General message flow for policy conflict report
p. 17
9
Conclusions
p. 17
$
Change History
p. 18