Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 28.828
Study on Charging aspects for enhanced support of Non-Public Networks

V18.0.0 (Wzip)  2023/03  46 p.
Rapporteur:
Dr. Chen, Ai
China Mobile Com. Corporation

full Table of Contents for  TR 28.828  Word version:  18.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 8
2References  p. 8
3Definitions of terms, symbols and abbreviations  p. 9
3.1Terms  p. 9
3.2Symbols  p. 9
3.3Abbreviations  p. 9
4Background  p. 9
4.1General  p. 9
4.2Non-public networks functionality and architecture  p. 10
4.2.1Stand-alone Non-Public Network (SNPN)  p. 10
4.2.2Public Network Integrated NPN (PNI-NPN)  p. 11
4.3Charging modes  p. 11
5Charging scenarios and key issues for SNPN  p. 12
5.1Topic 1: Converged charging for data connectivity in SNPN  p. 12
5.1.1Use cases  p. 12
5.1.1.1Use case #1a: End users access the SNPN service directly  p. 12
5.1.1.2Use case #1b: End users access the SNPN service via PLMN  p. 12
5.1.1.3Use case #1c: End users access the PLMN service via SNPN  p. 12
5.1.2Potential charging requirements  p. 12
5.1.3Key issues  p. 13
5.1.4Possible solutions  p. 13
5.1.4.1Solution #1: Data connectivity in SNPN Charging per UE directly  p. 13
5.1.4.1.1General  p. 13
5.1.4.1.2Reference architecture  p. 13
5.1.4.1.3Message flows  p. 13
5.1.4.2Solution #2: Data connectivity in SNPN Charging per UE (access the SNPN via PLMN)  p. 14
5.1.4.2.1General  p. 14
5.1.4.2.2Reference architecture  p. 14
5.1.4.2.3Message flows  p. 14
5.1.4.3Solution #3: Data connectivity in SNPN Charging per PLMN (access the PLMN via SNPN)  p. 14
5.1.4.3.1General  p. 14
5.1.4.3.2Reference architecture  p. 14
5.1.4.3.3Message flows  p. 15
5.1.5Evaluation  p. 15
5.1.6Conclusion  p. 15
5.2Topic 2: Converged charging for access connection in SNPN  p. 16
5.2.1Use cases  p. 16
5.2.1.1Use case #2a: Network access control  p. 16
5.2.1.2Use case #2b: Converged charging for number of UEs  p. 16
5.2.1.3Use case #2c: Converged charging for number of PDU sessions  p. 16
5.2.2Potential charging requirements  p. 16
5.2.3Key issues  p. 17
5.2.4Possible solutions  p. 17
5.2.4.1Solution #1: End user charging for SNPN network usage of access  p. 17
5.2.4.1.1General  p. 17
5.2.4.1.2General Registration - PEC charging  p. 17
5.2.4.1.3General Registration - IEC  p. 17
5.2.4.1.4General Registration - ECUR  p. 17
5.2.4.1.5Deregistration - PEC charging  p. 17
5.2.4.2Solution #2: Converged charging for number of UEs  p. 18
5.2.4.2.1General  p. 18
5.2.4.2.2Architecture description  p. 18
5.2.4.2.3Procedures description  p. 18
5.2.4.3Solution #3: Converged charging for number of PDU sessions  p. 19
5.2.4.3.1General  p. 19
5.2.4.3.2Architecture description  p. 19
5.2.4.3.3Procedures description  p. 19
5.2.4.4Solution #4: Converged charging for number of UEs or PDU sessions using separate CCS  p. 21
5.2.4.4.1General  p. 21
5.2.4.4.2Architecture description  p. 21
5.2.4.4.3Procedures description  p. 22
5.2.5Evaluation  p. 22
5.2.5.1Evaluation of possible solutions for end user charging for SNPN network usage of access  p. 22
5.2.5.2Evaluation of possible solutions for converged charging for number of UEs  p. 22
5.2.5.3Evaluation of possible solutions for converged charging for number of PDU sessions  p. 22
5.2.6Conclusion  p. 23
5.3Topic 3: Converged charging for data connectivity in PLMN  p. 23
5.3.1Use cases  p. 23
5.3.1.1Use case #3a: End users access the PLMN service via SNPN  p. 23
5.3.1.2Use case #3b: End users access the SNPN service via PLMN  p. 24
5.3.2Potential charging requirements  p. 24
5.3.3Key issues  p. 24
5.3.4Possible solutions  p. 24
5.3.4.1Solution #1: Data connectivity in PLMN Charging per UE (access the PLMN via SNPN)  p. 24
5.3.4.1.1General  p. 24
5.3.4.1.2Reference architecture  p. 24
5.3.4.1.3Message flows  p. 25
5.3.4.2Solution #2: Data connectivity in PLMN Charging per SNPN (access the SNPN via PLMN)  p. 25
5.3.4.2.1General  p. 25
5.3.4.2.2Reference architecture  p. 25
5.3.4.2.3Message flows  p. 26
5.3.5Evaluation  p. 26
5.3.6Conclusion  p. 26
6Charging scenarios and key issues for PNI-NPN  p. 27
6.1Topic 1: Converged charging for access connection in PNI-NPN  p. 27
6.1.1Use cases  p. 27
6.1.1.1Use case #1a: Network access control  p. 27
6.1.1.2Use case #1b: Converged charging for number of UEs  p. 27
6.1.1.3Use case #1c: Converged charging for number of PDU sessions  p. 27
6.1.2Potential charging requirements  p. 27
6.1.3Key issues  p. 28
6.1.4Possible solutions  p. 28
6.1.4.1Solution #1: End user charging for PNI-NPN network usage of access  p. 28
6.1.4.1.1General  p. 28
6.1.4.1.2General Registration - PEC charging  p. 29
6.1.4.1.3General Registration - IEC  p. 31
6.1.4.1.4General Registration - ECUR  p. 32
6.1.4.1.5Deregistration - PEC charging  p. 33
6.1.4.2Solution #2: Converged charging for number of UEs  p. 34
6.1.4.2.1General  p. 34
6.1.4.2.2Architecture description  p. 34
6.1.4.2.3Procedures description  p. 35
6.1.4.3Solution #3: Converged charging for number of PDU sessions  p. 36
6.1.4.3.1General  p. 36
6.1.4.3.2Architecture description  p. 36
6.1.4.3.3Procedures description  p. 36
6.1.4.4Solution #4: Converged charging for number of UEs or PDU sessions using separate CCS  p. 37
6.1.4.4.1General  p. 37
6.1.4.4.2Architecture description  p. 38
6.1.4.4.3Procedures description  p. 38
6.1.5Evaluation  p. 41
6.1.5.1Evaluation of possible solutions for end user charging for PNI-NPN network usage of access  p. 41
6.1.5.2Evaluation of possible solutions for converged charging for number of UEs  p. 41
6.1.5.3Evaluation of possible solutions for converged charging for number of PDU sessions  p. 41
6.1.6Conclusion  p. 41
6.2Topic 2: Converged charging for data connectivity in PNI-NPN  p. 42
6.2.1Use cases  p. 42
6.2.1.1Use case #1a: End user charging for PNI-NPN data connectivity  p. 42
6.2.2Potential charging requirements  p. 42
6.2.3Key issues  p. 42
6.2.4Possible solutions  p. 42
6.2.4.1Solution #1: End user charging for PNI-NPN data connectivity  p. 42
6.2.4.1.1General  p. 42
6.2.4.1.2Reference architecture  p. 43
6.2.4.1.3Message flows  p. 43
6.2.5Evaluation  p. 43
6.2.6Conclusion  p. 43
$Change history  p. 45

Up   Top