Rec. ITU-T Y.3105 (12/2018) - Requirements of capability exposure in the IMT-2020 network
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of capability exposure in the IMT-2020 network
7 Requirements of capability exposure in the IMT-2020 network
     7.1 General aspects of capability exposure
          7.1.1 Description
               7.1.1.1 Exposing network information to third parties
               7.1.1.2 Control functions customization on third party request
          7.1.2 Requirements
     7.2 Network slice management
          7.2.1 Description
               7.2.1.1 Support of authorized third parties to create, modify and delete network slices
               7.2.1.2 Support of authorized third parties to monitor the network slice state
               7.2.1.3 Support of authorized third parties to adjust the network slice capacity
          7.2.2 Requirements
     7.3 Edge computing
          7.3.1 Description
               7.3.1.1 Support of traffic offloading policy based on third party request
               7.3.1.2 Access control for an application in the network edge
               7.3.1.3 Monitoring of the state of applications hosted on the network edge
          7.3.2 Requirements
     7.4 Network data analytics
          7.4.1 Description
               7.4.1.1 Third party access to the network data analytics results
               7.4.1.2 Third party provision of information to network data analytics for analysis
          7.4.2 Requirements
     7.5 Fixed and mobile convergence
          7.5.1 Description
               7.5.1.1 Exposure of information related to user equipment access network type
          7.5.2 Requirements
     7.6 Customization of quality of service capabilities
          7.6.1 Description
               7.6.1.1 Exposure to third party of quality of service information related to network capabilities
          7.6.2 Requirements
8 Security considerations
Appendix I  Scenarios of capability exposure in the IMT-2020 network
     I.1 Network slice customization by third party
     I.2 Exposure of application-related information for edge computing
     I.3 Exposure of network performance predicted by network data analytics
     I.4 Exposure of access network type and network performances for fixed and mobile convergence
     I.5 Quality of service parameters configuration by third parties
Bibliography