hash stringlengths 32 32 | doc_id stringlengths 5 12 | section stringlengths 5 1.47k | content stringlengths 0 6.67M |
|---|---|---|---|
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.1 General
| LMR users homed in the IWF shall have the ability to enable, apply, or disable a functional alias in the MC system for the use in communication with MC service users.
The functional alias feature is not a requirement in 3GPP TS 22.179 [3] and is therefore an optional feature for systems that support 3GPP TS 22.179 [3... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.2 IWF information flows for functional alias management
| |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.2.1 IWF functional alias information query request
| Table 10.14.2.1-1 describes the information flow of the functional alias information query request from the IWF to the MC service server.
Table 10.14.2.1-1: IWF functional alias information query request
Information element
Status
Description
MC service ID
M
The identity of the requesting MC service user.
MC se... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.2.2 IWF functional alias information query response
| Table 10.14.2.2-1 describes the information flow of the functional alias information query response from the MC service server to the user homed in the IWF.
Table 10.14.2.2-1: IWF functional alias information query response.
Information element
Status
Description
MC service ID
M
The identity of the MC service u... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.2.3 IWF functional alias activation request
| Table 10.14.2.3-1 describes the information flow of the functional alias activation request from the IWF to the MC service server.
Table 10.14.2.3-1: IWF functional alias activation request
Information element
Status
Description
MC service ID
M
The identity of the requesting MC service user.
Functional alias li... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.2.4 IWF functional alias activation response
| Table 10.14.2.4-1 describes the information flow of the functional alias activation response from the MC service server to the IWF.
Table 10.14.2.4-1: IWF functional alias activation response
Information element
Status
Description
MC service ID
M
The identity of the MC service user that originated the functiona... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.2.5 IWF functional alias de-activation request
| Table 10.14.2.5-1 describes the information flow functional alias de-activation request from the IWF to the MC service server.
Table 10.14.2.5-1: IWF functional alias de-activation request
Information element
Status
Description
MC service ID
M
The identity of the requesting MC service user.
Functional alias lis... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.2.6 IWF functional alias de-activation response
| Table 10.14.2.6-1 describes the information flow of the functional alias de-activation response from the MC service server to the user homed in the IWF.
Table 10.14.2.6-1: IWF functional alias de-activation response
Information element
Status
Description
MC service ID
M
The identity of the MC service user that o... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.2.7 IWF functional alias status notification
| Table 10.14.2.7-1 describes the information flow of the functional alias notification from the MC service server to the IWF.
Table 10.14.2.7-1: IWF functional alias status notification
Information element
Status
Description
MC service ID
M
The identity of the MC service user that originated the functional alias ... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.2.8 IWF Functional alias take over request
| Table 10.14.2.8-1 describes the information flow of the functional alias take over request from the IWF to the MC service server.
Table 10.14.2.8-1: IWF functional alias take over request
Information element
Status
Description
MC service ID
M
The identity of the requesting MC service user.
Functional alias
M
... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.2.9 IWF Functional alias take over response
| Table 10.14.2.9-1 describes the information flow of the functional alias take over response from the MC service server to the IWF.
Table 10.14.2.9-1: IWF functional alias take over response
Information element
Status
Description
MC service ID
M
The identity of the requesting MC service user.
Functional alias
M... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.2.10 IWF Functional alias revoke notification
| Table 10.14.2.10-1 describes the information flow of the functional revoke notification from the MC service server to the IWF.
Table 10.14.2.10-1: IWF functional alias revoke notification
Information element
Status
Description
MC service ID
M
The identity of the requesting MC service user.
Functional alias
M
... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.3 IWF Functional alias management procedures
| |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.3.1 General
| The following subclauses describe the relevant functional alias management procedures between the MC system and the IWF to enable role based addressing of users homed in the IWF.
|
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.3.2 User homed in the IWF retrieves active functional alias(es) for a certain MC service user
| An user homed in the IWF can request the active functional alias(es) for a certain MC service user.
Figure 10.14.3.2-1 below illustrates the active functional alias list query for a certain MC service user.
Figure 10.14.3.2-1: IWF active functional alias list query
1. The user homed in the IWF requests a list of ... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.3.3 User homed in the IWF activates functional alias(es) within an MC system
| The procedure for the user homed in the IWF activates functional alias(es) within an MC system is illustrated in figure 10.14.3.3-1.
Pre-conditions:
1. The IWF has already been provisioned (statically or dynamically) with the functional alias(es) information that the user homed in the IWF is allowed to activate.
2. ... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.3.4 User homed in the IWF de-activates functional alias(es) within an MC system
| The procedure for the user homed in the IWF de-activates functional alias(es) within an MC system is illustrated in figure 10.14.3.4-1.
When a user homed in the IWF does not want to use a functional alias(es) anymore, then the user homed in the IWF can de-activate functional alias(es).
Pre-conditions:
1. MC service ... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.14.3.5 User homed in the IWF takes over functional alias(es) within an MC system
| The procedure for the user homed to IWF takes over functional alias(es) within an MC system is illustrated in figure 10.14.3.5-1.
During functional alias(es) activation, if the functional alias(es) is (are) already used by another MC service user(s), an authorized user homed in the IWF can get an offer to take over th... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.15 First-to-answer call setup
| |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.15.1 Description
| The present document specifies the interworking between LMR users and MCPTT clients for first-to-answer calls. It can be used based on MCPTT IDs, or based on functional alias for interworking with alternative addressing scheme used by the LMR system.
|
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.15.2 Information flows for first-to-answer call
| |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.15.2.1 IWF first-to-answer call request
| Table 10.15.2.1-1 describes the information flow IWF first-to-answer call request from the MCPTT server to the IWF and from the IWF to the MCPTT server.
Table 10.15.2.1-1: IWF first-to-answer call request information elements
Information Element
Status
Description
MCPTT ID
M
The MCPTT ID of the calling party
Fu... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.15.2.2 IWF first-to-answer call response
| Table 10.15.2.2-1 describes the information flow IWF first-to-answer call response from the MCPTT server to the IWF and from the IWF to the MCPTT server.
Table 10.15.2.2-1: IWF first-to-answer call response information elements
Information Element
Status
Description
MCPTT ID
M
The MCPTT ID of the calling party
... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.15.2.3 IWF first-to-answer call cancel request
| Table 10.15.2.3-1 describes the information flow IWF first-to-answer call cancel request from the MCPTT server to the IWF and from the IWF to the MCPTT server.
Table 10.15.2.3-1: IWF first-to-answer call cancel request information elements
Information Element
Status
Description
MCPTT ID
M
The MCPTT ID of the ca... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.15.2.4 IWF first-to-answer call cancel response
| Table 10.15.2.4-1 describes the information flow IWF first-to-answer call cancel response from the MCPTT server to the IWF and from the IWF to the MCPTT server.
Table 10.15.2.4-1: MCPTT first-to-answer call cancel response information elements
Information Element
Status
Description
MCPTT ID
M
The MCPTT ID of th... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.15.3 Procedures
| |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.15.3.1 MCPTT user initiating a first-to-answer call
| In this procedure, an MCPTT user is initiating an MCPTT first-to-answer call for communicating with an LMR user via an IWF.
Pre-conditions:
1. The calling MCPTT user has selected first-to-answer call.
2. The MCPTT client is registered to the MCPTT service, as per procedure in subclause 10.2 in 3GPP TS 23.379 [7].
3... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.15.3.2 LMR user initiating a first-to-answer call
| In this procedure, an MCPTT user is initiating an MCPTT first-to-answer call for communicating with an LMR user via an IWF.
Pre-conditions:
1. The calling LMR user has selected first-to-answer call
2. The MCPTT client is registered to the MCPTT service, as per procedure in subclause 10.2 in 3GPP TS 23.379 [7].
3. T... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.16 Enhanced status
| |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.16.1 General
| 3GPP TS 23.282 [6] clause 7.9 describes a high-level procedure to provide enhanced status information to all the receiving MCData users.
|
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.16.2 Preset values for enhanced status
| The configuration of preset values into the group configuration data is described in 3GPP TS 23 282 [6] clause 7.9.2.
|
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.16.3 Enhanced status for on-network
| |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.16.3.1 Procedure (MCData to IWF)
| The procedure for an MCData user requesting to share enhanced status to an MCData group is as specified in 3GPP TS 23.282 [6] clause 7.9.3 for the enhanced status for on-network use; one or more users using MCData clients 2-n may be LMR users behind an IWF that has affiliated to the MCData group (see clause 10.1.2 of t... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.16.3.2 Procedure (IWF to MCData)
| The procedure for an IWF requesting, on behalf of an LMR user, to share enhanced status to an MCData group is as specified in 3GPP TS 23.282 [6] subclause 7.9.3 for the enhanced status for on-network use, with the exception that MCData client 1 is located behind an IWF and one or more of the MCData clients 2 to n can b... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17 Ad hoc group call
| |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.1 General
| The following clauses define information flows and signalling procedures for ad hoc group calls, where the ad hoc group call is established based on criteria or based on a list of participants provided by the call initiator. The MCPTT server determines the list of users. The list consists of MCPTT users and one LMR use... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.2 Information flows for ad hoc group call
| |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.2.1 General
| The following clauses define information flows for ad hoc group calls on the IWF-1 interface. Ad hoc group call related information flows on reference points other than IWF-1 are defined in 3GPP TS 23.379 [7].
|
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.2.2 IWF ad hoc group call request (MCPTT server – IWF and IWF - MCPTT server)
| Table 10.17.2.2-1 describes the information flow IWF ad hoc group call request from the MCPTT server to the IWF and from the IWF to the MCPTT server.
Table 10.17.2.2-1 IWF Ad hoc group call request information elements
Information Element
Status
Description
MCPTT ID
M
The MCPTT ID of the calling party
Functiona... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.2.3 IWF ad hoc group call response (IWF - MCPTT server and MCPTT server - IWF)
| Table 10.17.2.3-1 describes the information flow IWF ad hoc group call request from the IWF to the MCPTT server and from the MCPTT server to the IWF.
Table 10.17.2.3-1 IWF Ad hoc group call response information elements
Information Element
Status
Description
MCPTT ID
M
The MCPTT ID of the calling party
Function... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.2.4 IWF ad hoc group call release request (MCPTT server – IWF and IWF - MCPTT server)
| Table 10.17.2.4-1 describes the information flow IWF ad hoc group call release request from the MCPTT server to the IWF from the IWF to the MCPTT server.
Table 10.17.2.4-1 IWF ad hoc group call release request information elements
Information Element
Status
Description
MCPTT ID
M
The MCPTT ID of the user authori... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.2.6 IWF ad hoc group emergency alert request (MCPTT server – IWF and IWF - MCPTT server)
| Table 10.17.2.6-1 describes the information flow IWF ad hoc group emergency alert request from the MCPTT server to the IWF and from the IWF to the MCPTT server.
Table 10.17.2.6-1 IWF Ad hoc group emergency alert request information elements
Information Element
Status
Description
MCPTT ID
M
The identity of the al... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.2.8 IWF ad hoc group emergency alert response (IWF - MCPTT server and MCPTT server - IWF)
| Table 10.17.2.8-1 describes the information flow IWF ad hoc group emergency alert response from the IWF to the MCPTT server and from the MCPTT server to the IWF.
Table 10.17.2.8-1 IWF Ad hoc group emergency alert response information elements
Information Element
Status
Description
MCPTT ID
M
The identity of the ... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.3 Procedures
| |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.3.1 Ad hoc group call initiated by an MCPTT user with MCPTT server determining the participant list
| In this procedure, an MCPTT user is initiating an ad hoc group call based on criteria involving both MCPTT users and LMR users.
NOTE 1: How the LMR users are determined and invited to the MCPTT ad hoc group call is outside the scope of the present document.
Pre-conditions:
1. The MCPTT user at MCPTT client 1 is auth... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.3.2 Ad hoc group call initiated by an LMR user with MCPTT server determining the participant list
| In this procedure, an LMR user is initiating an ad hoc group call based on criteria involving both MCPTT users and LMR users.
NOTE 1: How the LMR users are determined and invited to the MCPTT ad hoc group call is outside the scope of the present document.
Pre-conditions:
1. The LMR user is authorized to initiate ad ... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.3.3 IWF ad hoc group call released by the MC system
| In this procedure, the ad hoc group call is released by the MC system due to the release conditions or the ad hoc group call is released by an authorized user.
Pre-conditions:
1. The mapping relationship of group and user identities between the MCPTT system and the LMR system has been configured at the IWF.
2. The m... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.3.4 IWF ad hoc group call released by the LMR system
| In this procedure, the ad hoc group call is released by the LMR system due to a release condition on the LMR system.
NOTE 1: Release conditions on the LMR system are outside the scope of the present document.
Pre-conditions:
1. The LMR user that is sending the ad hoc group call release request to the MCPTT server is... |
b222c2facf93ba50ceb04ea3111d14d8 | 23.283 | 10.17.3.5 IWF ad hoc group call initiated by an MCPTT user using a participants list
| In this procedure, an MCPTT user is initiating an ad hoc group call with both MCPTT users and LMR users.
Pre-conditions:
1. The MCPTT client 1 knows the MCPTT IDs of the participants, including both MCPTT users and LMR users, to be involved in this call.
2. MCPTT client 1 and MCPTT client 2 are registered, and their... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 1 Scope
| The present document defines the Stage 2 architecture enhancements for 5G System (5GS) to support network data analytics services in 5G Core network.
|
30701f0da928d70591b1088aae4273d2 | 23.288 | 2 References
| The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
- References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
- For a specific reference, subsequent revisions do not apply.
-... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 3 Definitions and abbreviations
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 3.1 Definitions
| For the purposes of the present document, the terms and definitions given in TR 21.905 [1], TS 23.501 [2] and TS 23.503 [4]. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905 [1].
Analytics Accuracy Information: Represent a performance measure of an Anal... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 3.2 Abbreviations
| For the purposes of the present document, the abbreviations given in TR 21.905 [1], TS 23.501 [2] and TS 23.503 [4] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905 [1].
AI/ML Artificial Intelligence/Machine Lea... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 4 Reference Architecture for Data Analytics
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 4.1 General
| The NWDAF (Network Data Analytics Function) is part of the architecture specified in TS 23.501 [2] and uses the mechanisms and interfaces specified for 5GC in TS 23.501 [2] and OAM services (see clause 6.2.3.1).
The NWDAF may support the following functionalities:
- Data collection based on subscription to events pro... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 4.2 Non-roaming architecture
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 4.2.0 General
| As depicted in Figure 4.2.0-1, the 5G System architecture allows NWDAF to collect data from any 5GC NF. The NWDAF belongs to the same PLMN as the 5GC NF that provides the data.
Figure 4.2.0-1: Data Collection architecture from any 5GC NF
The Nnf interface is defined for the NWDAF to request subscription to data del... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 4.2.1 Analytics Data Repository Function
| As depicted in Figure 4.2.1-1, the 5G System architecture allows ADRF to store and retrieve the collected data, analytics and ML Model(s). The following options are supported:
- ADRF exposes the Nadrf service for storage and retrieval of data, analytics or ML Model(s) by other 5GC NFs (e.g. NWDAF) which access the dat... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 4.3 Roaming architecture
| Based on operator's policy and local regulations (e.g. privacy), data or analytics may be exchanged between PLMNs (i.e. HPLMN and VPLMN). In a PLMN, an NWDAF is used as exchange point to exchange analytics and to collect input data for analytics with other PLMNs. The NWDAF with roaming exchange capability is called Roa... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 5 Network Data Analytics Functional Description
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 5.1 General
| The NWDAF provides analytics to 5GC NFs and OAM as defined in clause 7. An NWDAF may contain the following logical functions:
- Analytics logical function (AnLF): A logical function in NWDAF, which performs inference, derives analytics information (i.e. derives statistics and/or predictions based on Analytics Consumer... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 5.2 NWDAF Discovery and Selection
| The NWDAF service consumer selects an NWDAF that supports requested analytics information and required analytics capabilities and/or requested ML Model Information by using the NWDAF discovery principles defined in clause 6.3.13 of TS 23.501 [2].
Different deployments may require different discovery and selection para... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 5.3 Horizontal Federated Learning (FL) among multiple NWDAFs
| This clause describes Horizontal Federated Learning.
Federated learning among multiple NWDAFs is a machine learning technique in core network that trains an ML Model across multiple decentralized entities holding local data set, without exchanging/sharing local data set. This approach stands in contrast to centralized... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 5.4 Vertical Federated Learning (VFL)
| Vertical Federated learning is a machine learning technique working without exchanging/sharing of local data set, while maintaining some level of coordination amongst VFL participants, i.e. VFL Server and VFL Client, when training and inference are performed on local ML Models, wherein the local data set in different V... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 5.5 AF Discovery and Selection for VFL
| The AF discovery and selection is defined in clause 6.3.25 of TS 23.501 [2]. In addition to support VFL training and inference, the following factors may be considered for AF discovery and selection:
- VFL capability information per supported AnalyticsID, which includes:
- VFL capability type (i.e. VFL client and/or ... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6 Procedures to Support Network Data Analytics
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.0 General
| This clause specifies procedures to support network data analytics function.
Clause 6.1 and clause 6.2 specify generic procedures which apply to all type of analytics, while clause 6.3 and onwards specify procedures specific to some type of analytics.
|
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1 Procedures for analytics exposure
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.1 Analytics Subscribe/Unsubscribe
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.1.1 Analytics subscribe/unsubscribe by NWDAF service consumer
| This procedure is used by any NWDAF service consumer (e.g. including NFs/OAM) to subscribe/unsubscribe at NWDAF to be notified on analytics information, using Nnwdaf_AnalyticsSubscription service defined in clause 7.2. This service is also used by an NWDAF service consumer to modify existing analytics subscription(s). ... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.1.2 Analytics subscribe/unsubscribe by AFs via NEF
| The analytics exposure to AFs may be performed via NEF by using analytics subscription to NWDAF.
Figure 6.1.1.2-1 illustrates the interaction between AF and NWDAF performed via the NEF.
Figure 6.1.1.2-1: Procedure for analytics subscribe/unsubscribe by AFs via NEF
0. NEF controls the analytics exposure mapping amo... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.2 Analytics Request
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.2.1 Analytics request by NWDAF service consumer
| This procedure is used by the NWDAF service consumer (e.g. including NFs/OAM) to request and get from NWDAF analytics information, using Nnwdaf_AnalyticsInfo service defined in clause 7.3.
Figure 6.1.2.1-1: Network data analytics Request
1. The NWDAF service consumer requests analytics information by invoking Nnwda... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.2.2 Analytics request by AFs via NEF
| The analytics exposure to AFs may be performed via NEF by using analytics request to NWDAF.
Figure 6.1.2.2-1 illustrates the interaction between AF and NWDAF performed via the NEF.
Figure 6.1.2.2-1: Procedure for analytics request by AFs via NEF
0. NEF controls the analytics exposure mapping among the AF identifie... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.3 Contents of Analytics Exposure
| The consumers of the Nnwdaf_AnalyticsSubscription_Subscribe or Nnwdaf_AnalyticsInfo_Request service operations described in clause 7 provide the input parameters listed below.
- A list of Analytics IDs: identifies the requested analytics.
- Analytics Filter Information: indicates the conditions to be fulfilled for re... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.4 Analytics Exposure using DCCF
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.4.1 General
| This clause specifies procedures for analytics exposure using DCCF services, with two options: analytics can be exposed via DCCF, according to clauses 6.1.4.2 and 6.1.4.3, or can be exposed via a messaging framework according to clauses 6.1.4.4 and 6.1.4.5. Which option to use is determined by DCCF configuration.
|
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.4.2 Analytics Exposure via DCCF
| The procedure as depicted in Figure 6.1.4.2-1 is used by analytics consumer(s) (e.g. NFs/OAM) to subscribe/unsubscribe to NWDAF analytics and be notified of analytics information via the DCCF, using Ndccf_DataManagement_Subscribe service operation. Whether a NWDAF service consumer directly contacts the NWDAF or goes vi... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.4.3 Historical Analytics Exposure via DCCF
| The procedure as depicted in Figure 6.1.4.3-1 is used by an analytics consumer (e.g. NFs/OAM) to obtain historical analytics via the DCCF. Historical analytics may be previously computed statistics or predictions stored in an NWDAF or ADRF. Statistics may have been previously computed and stored in the ADRF or NWDAF an... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.4.4 Analytics Exposure via Messaging Framework
| The procedure as depicted in Figure 6.1.4.4-1 is used by analytics consumer(s) (e.g. NFs/OAM) to subscribe/unsubscribe to NWDAF analytics and be notified of analytics information, using Ndccf_DataManagement_Subscribe service operation. The 3GPP DCCF Adaptor (3da) Data Management service and 3GPP Consumer Adaptor (3ca) ... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.4.5 Historical Analytics Exposure via Messaging Framework
| The procedure as depicted in Figure 6.1.4.5-1 is used by an analytics consumer (e.g. NFs/OAM) to obtain historical analytics via the messaging framework. Historical analytics may be previously computed statistics or predictions stored in an NWDAF or ADRF. Statistics may be previously computed and stored in the ADRF or ... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.5 Analytics Exposure in Roaming Case
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.5.1 General
| Based on roaming agreements (e.g. SLA), analytics may be exchanged between PLMNs (i.e. HPLMN and VPLMN of a UE served by the NWDAF analytics consumer). In this case, an NWDAF with roaming exchange capability (RE-NWDAF) is used as entry point in a PLMN to exchange analytics in roaming scenario with other PLMNs. It autho... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.5.2 Analytics Exposure from HPLMN to VPLMN
| Figure 6.1.5.2-1 shows the procedure where a V-RE-NWDAF requests network analytics (i.e. slice load level analytics, NF load analytics, service experience analytics, etc.) in HPLMN from a H-RE-NWDAF, upon receiving an analytics information request/subscribe from a service consumer NF (e.g. AMF) in the VPLMN.
Figure ... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.5.3 Analytics Exposure from VPLMN to HPLMN
| Figure 6.1.5.3-1 shows the procedure that the H-RE-NWDAF requests network analytics (i.e. service experience analytics, slice load level analytics, etc.) in the VPLMN from the V-RE-NWDAF, upon receiving an analytics information request/subscription from the service consumer NF (e.g. PCF) in HPLMN.
Figure 6.1.5.3-1: ... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.1.5.4 Contents of Analytics Exposure in roaming case
| When requesting or subscribing to analytics involving one or more roaming UEs, the Consumer NF shall send the request or subscription to an RE-NWDAF belonging to the same PLMN as the Consumer NF. The Consumer NF may indicate the following parameters in the Nnwdaf_AnalyticsInfo_Request service operation or the Nnwdaf_An... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2 Procedures for Data Collection
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2.1 General
| The Data Collection feature permits NWDAF to retrieve data from various sources (e.g. NF such as AMF, SMF, PCF, NSACF, GMLC and AF; OAM), as a basis of the computation of network analytics.
All available data encompass:
- OAM global NF data,
- Data available in NFs, e.g. behaviour data related to individual UEs or U... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2.2 Data Collection from NFs
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2.2.1 General
| The Data Collection from NFs and SCP is used by NWDAF to subscribe/unsubscribe at any 5GC NF to be notified for data on a set of events.
The Data Collection from NFs and SCP is based on the services of AMF, SMF, UDM, PCF, NRF, NSACF, UPF, LMF and AF (possibly via NEF):
- Event Exposure Service offered by each NF as d... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2.2.2 Procedure for Data Collection from NFs
| The procedure in Figure 6.2.2.2-1 is used by NWDAF to subscribe/unsubscribe at NFs in order to be notified for data collection on a related event (s), using Event Exposure Services as listed in Table 6.2.2.1-1. Depending on local regulation requirements, user consent for UE related data collection and usage of collecte... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2.2.3 Procedure for Data Collection from AF via NEF
| The procedure in Figure 6.2.2.3-1 is used by NWDAF to collect information from AFs via the NEF.
NOTE 1: In this release, AF registers its available data to NWDAF via OAM configuration at NEF.
The AF collectable data information includes: AF identification, AF service identification (e.g. endpoint information of Naf_E... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2.2.4 Procedure for Data Collection from NRF
| The NWDAF may use NRF services and Network Function service framework procedures as defined in clause 5.2.7 and clause 4.17 of TS 23.502 [3]:
- NF/NF service discovery procedures (in clause 4.17.4 of TS 23.502 [3]) and Nnrf_NFDiscovery service (in clause 5.2.7.3 of TS 23.502 [3]) in order to dynamically discover the N... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2.2.5 Usage of Exposure framework by the NWDAF for Data Collection
| The NWDAF shall subscribe (and unsubscribe) to the Event exposure service from NF(s) reusing the framework defined in clause 4.15 of TS 23.502 [3]. This framework supports the possibility for the NWDAF to indicate/request:
- Events-ID: one or multiple Event ID(s) defined in clause 4.15.1 of TS 23.502 [3].
- Target of... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2.3 Data Collection from OAM
| |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2.3.1 General
| The NWDAF may collect relevant management data from the services in the OAM as configured by the PLMN operator.
‐ NG RAN or 5GC performance measurements as defined in TS 28.552 [8].
‐ 5G End to end KPIs as defined in TS 28.554 [10].
‐ 5G application layer measurements from the UEs in the specified area for specified... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2.3.2 Procedure for data collection from OAM
| The interactions between NWDAF and OAM for data collection are illustrated in Figure 6.2.3.2-1. The data collected depends on the use cases. This figure is an abstraction of the OAM performance data file report management service that is defined TS 28.532 [6]. The actual OAM services and reporting mechanisms that NWDAF... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2.4 Correlation between network data and service data
| The Correlation information in input data which helps NWDAF correlate data from different NFs, OAM and UE application(s) is defined in Table 6.2.4-1, which is subject to all the network data analytics.
NOTE: For simplicity, the correlation information is not listed in the input data per network data analytics.
Table ... |
30701f0da928d70591b1088aae4273d2 | 23.288 | 6.2.5 Time coordination across multiple NWDAF instances
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.