Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TR 28.828
Study on Charging aspects for enhanced support of Non-Public Networks
3GPP‑Page
fToC
↓
Partial Content
→
V18.0.0 (Wzip)
2023/03 46 p.
Rapporteur:
Dr. Chen, Ai
China Mobile Com. Corporation
full Table of Contents for
TR 28.828
Word version: 18.0.0
each clause number in
'red'
refers to the equivalent title in the Partial Content
1
Scope
p. 8
2
References
p. 8
3
Definitions of terms, symbols and abbreviations
p. 9
3.1
Terms
p. 9
3.2
Symbols
p. 9
3.3
Abbreviations
p. 9
4
Background
p. 9
4.1
General
p. 9
4.2
Non-public networks functionality and architecture
p. 10
4.2.1
Stand-alone Non-Public Network (SNPN)
p. 10
4.2.2
Public Network Integrated NPN (PNI-NPN)
p. 11
4.3
Charging modes
p. 11
5
Charging scenarios and key issues for SNPN
p. 12
5.1
Topic 1: Converged charging for data connectivity in SNPN
p. 12
5.1.1
Use cases
p. 12
5.1.1.1
Use case #1a: End users access the SNPN service directly
p. 12
5.1.1.2
Use case #1b: End users access the SNPN service via PLMN
p. 12
5.1.1.3
Use case #1c: End users access the PLMN service via SNPN
p. 12
5.1.2
Potential charging requirements
p. 12
5.1.3
Key issues
p. 13
5.1.4
Possible solutions
p. 13
5.1.4.1
Solution #1: Data connectivity in SNPN Charging per UE directly
p. 13
5.1.4.1.1
General
p. 13
5.1.4.1.2
Reference architecture
p. 13
5.1.4.1.3
Message flows
p. 13
5.1.4.2
Solution #2: Data connectivity in SNPN Charging per UE (access the SNPN via PLMN)
p. 14
5.1.4.2.1
General
p. 14
5.1.4.2.2
Reference architecture
p. 14
5.1.4.2.3
Message flows
p. 14
5.1.4.3
Solution #3: Data connectivity in SNPN Charging per PLMN (access the PLMN via SNPN)
p. 14
5.1.4.3.1
General
p. 14
5.1.4.3.2
Reference architecture
p. 14
5.1.4.3.3
Message flows
p. 15
5.1.5
Evaluation
p. 15
5.1.6
Conclusion
p. 15
5.2
Topic 2: Converged charging for access connection in SNPN
p. 16
5.2.1
Use cases
p. 16
5.2.1.1
Use case #2a: Network access control
p. 16
5.2.1.2
Use case #2b: Converged charging for number of UEs
p. 16
5.2.1.3
Use case #2c: Converged charging for number of PDU sessions
p. 16
5.2.2
Potential charging requirements
p. 16
5.2.3
Key issues
p. 17
5.2.4
Possible solutions
p. 17
5.2.4.1
Solution #1: End user charging for SNPN network usage of access
p. 17
5.2.4.1.1
General
p. 17
5.2.4.1.2
General Registration - PEC charging
p. 17
5.2.4.1.3
General Registration - IEC
p. 17
5.2.4.1.4
General Registration - ECUR
p. 17
5.2.4.1.5
Deregistration - PEC charging
p. 17
5.2.4.2
Solution #2: Converged charging for number of UEs
p. 18
5.2.4.2.1
General
p. 18
5.2.4.2.2
Architecture description
p. 18
5.2.4.2.3
Procedures description
p. 18
5.2.4.3
Solution #3: Converged charging for number of PDU sessions
p. 19
5.2.4.3.1
General
p. 19
5.2.4.3.2
Architecture description
p. 19
5.2.4.3.3
Procedures description
p. 19
5.2.4.4
Solution #4: Converged charging for number of UEs or PDU sessions using separate CCS
p. 21
5.2.4.4.1
General
p. 21
5.2.4.4.2
Architecture description
p. 21
5.2.4.4.3
Procedures description
p. 22
5.2.5
Evaluation
p. 22
5.2.5.1
Evaluation of possible solutions for end user charging for SNPN network usage of access
p. 22
5.2.5.2
Evaluation of possible solutions for converged charging for number of UEs
p. 22
5.2.5.3
Evaluation of possible solutions for converged charging for number of PDU sessions
p. 22
5.2.6
Conclusion
p. 23
5.3
Topic 3: Converged charging for data connectivity in PLMN
p. 23
5.3.1
Use cases
p. 23
5.3.1.1
Use case #3a: End users access the PLMN service via SNPN
p. 23
5.3.1.2
Use case #3b: End users access the SNPN service via PLMN
p. 24
5.3.2
Potential charging requirements
p. 24
5.3.3
Key issues
p. 24
5.3.4
Possible solutions
p. 24
5.3.4.1
Solution #1: Data connectivity in PLMN Charging per UE (access the PLMN via SNPN)
p. 24
5.3.4.1.1
General
p. 24
5.3.4.1.2
Reference architecture
p. 24
5.3.4.1.3
Message flows
p. 25
5.3.4.2
Solution #2: Data connectivity in PLMN Charging per SNPN (access the SNPN via PLMN)
p. 25
5.3.4.2.1
General
p. 25
5.3.4.2.2
Reference architecture
p. 25
5.3.4.2.3
Message flows
p. 26
5.3.5
Evaluation
p. 26
5.3.6
Conclusion
p. 26
6
Charging scenarios and key issues for PNI-NPN
p. 27
6.1
Topic 1: Converged charging for access connection in PNI-NPN
p. 27
6.1.1
Use cases
p. 27
6.1.1.1
Use case #1a: Network access control
p. 27
6.1.1.2
Use case #1b: Converged charging for number of UEs
p. 27
6.1.1.3
Use case #1c: Converged charging for number of PDU sessions
p. 27
6.1.2
Potential charging requirements
p. 27
6.1.3
Key issues
p. 28
6.1.4
Possible solutions
p. 28
6.1.4.1
Solution #1: End user charging for PNI-NPN network usage of access
p. 28
6.1.4.1.1
General
p. 28
6.1.4.1.2
General Registration - PEC charging
p. 29
6.1.4.1.3
General Registration - IEC
p. 31
6.1.4.1.4
General Registration - ECUR
p. 32
6.1.4.1.5
Deregistration - PEC charging
p. 33
6.1.4.2
Solution #2: Converged charging for number of UEs
p. 34
6.1.4.2.1
General
p. 34
6.1.4.2.2
Architecture description
p. 34
6.1.4.2.3
Procedures description
p. 35
6.1.4.3
Solution #3: Converged charging for number of PDU sessions
p. 36
6.1.4.3.1
General
p. 36
6.1.4.3.2
Architecture description
p. 36
6.1.4.3.3
Procedures description
p. 36
6.1.4.4
Solution #4: Converged charging for number of UEs or PDU sessions using separate CCS
p. 37
6.1.4.4.1
General
p. 37
6.1.4.4.2
Architecture description
p. 38
6.1.4.4.3
Procedures description
p. 38
6.1.5
Evaluation
p. 41
6.1.5.1
Evaluation of possible solutions for end user charging for PNI-NPN network usage of access
p. 41
6.1.5.2
Evaluation of possible solutions for converged charging for number of UEs
p. 41
6.1.5.3
Evaluation of possible solutions for converged charging for number of PDU sessions
p. 41
6.1.6
Conclusion
p. 41
6.2
Topic 2: Converged charging for data connectivity in PNI-NPN
p. 42
6.2.1
Use cases
p. 42
6.2.1.1
Use case #1a: End user charging for PNI-NPN data connectivity
p. 42
6.2.2
Potential charging requirements
p. 42
6.2.3
Key issues
p. 42
6.2.4
Possible solutions
p. 42
6.2.4.1
Solution #1: End user charging for PNI-NPN data connectivity
p. 42
6.2.4.1.1
General
p. 42
6.2.4.1.2
Reference architecture
p. 43
6.2.4.1.3
Message flows
p. 43
6.2.5
Evaluation
p. 43
6.2.6
Conclusion
p. 43
$
Change history
p. 45