CONTENTS

 1     Scope 
 2     References 
 3     Terms and Definitions      
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Overview   
        6.1     Service aspects      
        6.2     General customization model          
        6.3     Service level agreements (SLAs)    
        6.4     Menu-based network customization capabilities      
        6.5     Customer expectations       
        6.6     Network capability requirements    
 7     Functional capabilities      
        7.1     Overview  
        7.2     Naming, addressing and identification capabilities    
        7.3     End-user grouping capability          
        7.4     Application clustering capability      
        7.5     Information navigation and query capabilities          
        7.6     Auto-discovery and auto-configuration capabilities 
        7.7     Information access control and security capabilities 
        7.8     End-to-end transparency capability
        7.9     Connection configuration capability
       7.10     Routing and forwarding control capabilities
       7.11     Alternative path selection and multi-homing capabilities      
       7.12     Mobility control and management capabilities        
       7.13     Traffic measurement and usage parameter control capabilities        
       7.14     SLA negotiation capabilities          
       7.15     End-to-end QoS provision and priority assignment capabilities       
       7.16     Information storage and directory processing capabilities   
       7.17     Segment OAM and end-to-end OAM capabilities 
       7.18     Virtual private network configuration capability      
       7.19     Billing and charging capabilities      
       7.20     Client/server management and agent management capabilities         
 8     Security considerations    
Appendix I – Service procedures and applications scenarios    
        I.1        Customizable personal directory services  
        I.2        Customizable access control services        
        I.3        Customizable end-to-end QoS services    
        I.4        End-user customizable location monitoring services           
        I.5        Customizable home networking services   
        I.6        Client networking services with QoS and security 
Appendix II – Example of functional architecture and service creation scenario for end-user customizable VPN services    
Bibliography