1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Introduction
7 Requirements for network slice management and orchestration
7.1 Requirements for network slice lifecycle management
7.2 Requirements for network slicing performance assurance
7.3 Requirements for network slicing isolation
7.4 Requirements for network slicing exposure
7.5 Requirements for network slicing deployment
7.6 Requirements for mobile network slicing automation
8 High-level architecture aspects of network slice management and
orchestration
8.1 Architecture for network slice management and orchestration
8.2 Functional description of network slice management and
orchestration
8.3 Functional description of resource management
9 Typical procedures of network slicing for 3rd party
9.1 Network slice instantiation
9.2 Network slice modification/termination
10 Security consideration
Appendix I – Scenarios for mobile network slicing orchestration and
management
I.1 Mobile
network slicing orchestration and management for eMBB slicing
I.2 Mobile
network slicing orchestration and management for mMTC slicing
I.3 Mobile
network slicing orchestration and management for uRLLC slicing
Bibliography