Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 32.845
Word version: 16.0.0
1…
2…
2
References
3
Definitions of terms, symbols and abbreviations
4
Concepts and background
5
Topics
6
Conclusions and Recommendations
$
Change History
2
References
3
Definitions of terms, symbols and abbreviations
Word‑p. 9
3.1
Terms
3.2
Symbols
3.3
Abbreviations
Word‑p. 10
4
Concepts and background
4.0
General Description
4.1
Background
4.1.1
Network Slice Lifecycle
4.1.2
Network Slice Management
Word‑p. 11
4.2
Business Roles related to network slicing charging
Word‑p. 12
4.3
Charging aspect requirement
Word‑p. 14
5
Topics
5.1
Topic 1: Business to Business - Network Slice usage
5.1.1
Use Case
5.1.1.1
Use Case #1.1: CSP consumes a private slice
5.1.1.2
Use Case #1.2: CSP consumes a shared network slice instance
5.1.1.3
Use Case #1.3: CSP consumes multiple network slice instances
Word‑p. 15
5.1.1.4
Use Case #1.4: CSP subscribes the Network Slice Instances
5.1.1.5
Use Case #1.5: CSP consumes a network slice instance under the usage limit
5.1.2
Potential charging requirements
5.1.3
Key issues
Word‑p. 16
5.1.3.1
Key issue #1.1: Performance based charging
5.1.3.2
Key issue #1.2: Usage based charging
5.1.3.3
Key issue #1.3: Network slice template based charging
5.1.4
Solutions
Word‑p. 17
5.1.4.1
Solution #1.1: Network Slice Instance Performance based charging for Key issues #1.1
5.1.4.1.1
Consideration for Network Slice Instance Performance Based Charging
5.1.4.1.2
Architecture Description
5.1.4.1.3
Flow Description
Word‑p. 18
5.1.4.1.4
Solution evaluation
Word‑p. 19
5.1.4.2
Solution #1.2: Usage reporting for Key issues #1.2
5.1.4.2.1
Consideration for usage based charging
5.1.4.2.2
Architecture Description
5.1.4.2.3
Flow Description
Word‑p. 20
5.1.4.2.4
Solution evaluation
5.1.4.3
Solution #1.3: Event Based Charging for Key issues #1.2
Word‑p. 21
5.1.4.3.1
Consideration for event based charging
5.1.4.3.2
Architecture Description
5.1.4.3.3
Flow Description
5.1.4.3.4
Solution evaluation
Word‑p. 22
5.1.4.4
Solution #1.4: Network Slice Instance Performance based charging for Key issues #1.1
5.1.4.4.1
Consideration for Network Slice Instance Performance Based Charging
5.1.4.4.2
Architecture Description
5.1.4.4.3
Flow Description
Word‑p. 23
5.1.4.4.4
Solution evaluation
5.1.4.5
Solution #1.5: Network Slice Instance Performance based charging for Key issues #1.1
Word‑p. 24
5.1.4.5.1
Consideration for Network Slice Instance Performance Based Charging
5.1.4.5.2
Architecture Description
5.1.4.5.3
Flow Description
5.1.4.5.4
Solution evaluation
5.1.4.6
Solution #1.6: Usage reporting for Key issues #1.2
Word‑p. 25
5.1.4.6.1
Consideration for usage limit for CSP
5.1.4.6.2
Architecture Description
5.1.4.6.3
Flow Description
5.1.4.6.4
Solution evaluation
Word‑p. 26
5.1.4.7
Solution #1.7: Network Slice Instance Analytics based charging for Key issues #1.1
5.1.4.7.1
Consideration for Network Slice Instance Analytics Based Charging
5.1.4.7.2
Architecture Description
5.1.4.7.3
Flow Description
Word‑p. 27
5.1.4.7.4
Solution evaluation
Word‑p. 28
5.1.4.8
Solution #1.8: Network Slice Instance Performance based charging for Key issues #1.1
5.1.4.8.1
Consideration for Network Slice Instance Performance Based Charging
5.1.4.8.2
Architecture Description
5.1.4.8.3
Flow Description
Word‑p. 29
5.1.4.8.4
Solution evaluation
5.1.4.9
Solution #1.9: Network Slice Instance Performance based charging for Key issues #1.1
Word‑p. 30
5.1.4.9.1
Consideration for Network Slice Instance Performance Based Charging
5.1.4.9.2
Architecture Description
5.1.4.9.3
Flow Description
5.1.4.9.4
Solution evaluation
5.1.4.10
Solution #1.10: Network Slice Instance Template based charging for Key issues #1.3
5.1.4.10.1
Consideration for Network Slice Instance Template Based Charging
5.1.4.10.2
Architecture Description
Word‑p. 31
5.1.4.10.3
Flow Description
5.1.4.10.4
Solution evaluation
5.1.5
Evaluation
5.1.5.1
Solutions evaluation for Key issue #1.1
5.1.5.2
Solutions evaluation for Key issue #1.2
Word‑p. 32
5.1.5.3
Solutions evaluation for Key issue #1.3
5.1.6
Conclusions
5.2
Topic 2: Business to Business - Network Slice management
5.2.1
Use Cases
5.2.1.1
Use Case #2.1: NSI provisioning - NOP model
5.2.1.2
Use Case #2.2: NSI provisioning - NSaaS model
Word‑p. 33
5.2.2
Potential charging requirements
5.2.3
Key issues
Word‑p. 34
5.2.3.1
Key issue #2.1: Network Slice management based charging - NOP model
5.2.3.2
Key issue #2.2: Network Slice management based charging - NSaaS Model
5.2.4
Solutions
5.2.4.1
Solution #2.1: Network Slice Management based charging for Key issues #2.1
5.2.4.1.1
Consideration for Network Slice Management based Charging
5.2.4.1.2
Architecture Description
5.2.4.1.3
Flow Description
Word‑p. 35
5.2.4.1.4
Solution evaluation
Word‑p. 37
5.2.4.2
Solution #2.2: Network Slice Management based charging for Key issues #2.1 - MnS
5.2.4.2.1
Consideration for Network Slice Management based Charging
5.2.4.2.2
Architecture Description
5.2.4.2.3
Flow Description
5.2.4.2.4
Solution evaluation
Word‑p. 38
5.2.4.3
Solution #2.3: Network Slice Management based charging for Key issues #2.2 - CTF
Word‑p. 39
5.2.4.3.1
Consideration for Network Slice Management based Charging
5.2.4.3.2
Architecture Description
5.2.4.3.3
Flow Description
5.2.4.3.4
Solution evaluation
5.2.4.4
Solution #2.4: Network Slice Management based charging for Key issues #2.2 - MnS
Word‑p. 40
5.2.4.4.1
Consideration for Network Slice Management based Charging
5.2.4.4.2
Architecture Description
5.2.4.4.3
Flow Description
5.2.4.4.4
Solution evaluation
5.2.4.5
Solution #2.5: Communication Service using Network Slice Management based charging for Key issues #2.1
5.2.4.5.1
Consideration for Network Slice Management based Charging
5.2.5
Evaluation
5.2.5.1
Solutions evaluation for Key issue# 2.1
5.2.5.2
Solutions evaluation for Key issue# 2.2
5.2.6
Conclusions
Word‑p. 41
5.3
Topic 3: Business to Consumer
5.3.1
Use Case
5.3.1.1
Use Case #3.1: Consumer consumes communication services
5.3.2
Potential charging requirements
5.3.3
Key issues
5.3.3.1
Key issue #3.1: Usage based charging related to the specific NSI
5.3.4
Solutions
5.3.4.1
Solution #3.1: Usage based charging for Key issues #3.1
5.3.4.1.1
Consideration for usage based charging
5.3.4.1.2
Architecture Description
Word‑p. 42
5.3.4.1.3
Flow Description
5.3.4.1.4
Solution evaluation
5.3.5
Evaluation
5.3.5.1
Solutions evaluation for Key issue# 3.1
5.3.6
Conclusions
5.4
Topic 4: Business to Business to X (B2B2X)
5.4.1
General
6
Conclusions and Recommendations
Word‑p. 43
$
Change History
Word‑p. 44