Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Introduction             
 7     Requirements for network slice management and orchestration       
        7.1     Requirements for network slice lifecycle management              
        7.2     Requirements for network slicing performance assurance       
        7.3     Requirements for network slicing isolation      
        7.4     Requirements for network slicing exposure    
        7.5     Requirements for network slicing deployment
        7.6     Requirements for mobile network slicing automation 
 8     High-level architecture aspects of network slice management and orchestration       
        8.1     Architecture for network slice management and orchestration              
        8.2     Functional description of network slice management and orchestration            
        8.3     Functional description of resource management          
 9     Typical procedures of network slicing for 3rd party 
        9.1     Network slice instantiation     
        9.2     Network slice modification/termination           
10     Security consideration        
Appendix I – Scenarios for mobile network slicing orchestration and management    
        I.1                  Mobile network slicing orchestration and management for eMBB slicing
        I.2                  Mobile network slicing orchestration and management for mMTC slicing
        I.3                  Mobile network slicing orchestration and management for uRLLC slicing 
Bibliography