Page 198 - 5G Basics - Core Network Aspects
P. 198

1                                                Core network aspects


            1       Scope
            This Recommendation provides the requirements and capability framework for software-defined network
            intelligence capability enhancement (S-NICE). S-NICE is a specific implementation of NICE [ITU-T Y.2301]
            making use of software-defined networking technologies. NICE being an evolved version of NGN, S-NICE
            supports  the  intelligent  features  (five  major  features)  of  NICE  and  makes  usage  of  software-defined
            networking technologies. This Recommendation specifies the requirements and capabilities of S-NICE at the
            next generation network (NGN) service and network stratum.


            2       References
            The following ITU-T Recommendations and other references contain provisions which, through reference in
            this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated
            were valid. All Recommendations and other references are subject to revision; users of this Recommendation
            are  therefore  encouraged  to  investigate  the  possibility  of  applying  the  most  recent  edition  of  the
            Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is
            regularly published. The reference to a document within this Recommendation does not give it, as a stand-
            alone document, the status of a Recommendation.

            [ITU-T Y.2301]      Recommendation ITU-T Y.2301 (2013), Network intelligence capability enhancement –
                                Requirements and capabilities.

            3       Definitions


            3.1     Terms defined elsewhere
            This Recommendation uses the following terms defined elsewhere:
            3.1.1   application [b-ITU-T Y.101]: A structured set of capabilities which provide value-added functionality,
            supported by one or more services.

            3.1.2   application provider [b-ITU-T Y.2012]: A general reference to a provider that offers applications to
            the customers making use of the service capabilities provided by the NGN.

            3.1.3   content [b-ITU-T H.780]: A combination of audio, still image, graphic, video, or data.
            NOTE  –  A  variety  of  formats  are  classified  as  "data"  (e.g.,  text,  encoded  values,  multimedia  description  language
            introduced by [b-ITU-T H.760]).

            3.1.4   context [b-ITU-T Y.2002]: The information that can be used to characterize the environment of a
            user.

            NOTE  –  Context  information  may  include  where  the  user  is,  what  resources  (devices,  access  points,  noise  level,
            bandwidth, etc.) are near the user, at what time the user is moving, interaction history between person and objects,
            etc. According to specific applications, context information can be updated.

            3.1.5   context  awareness  [b-ITU-T  Y.2201]:  The  capability  to  determine  or  influence  a  next  action  in
            telecommunication  or  process  by  referring  to  the  status  of  relevant  entities,  which  form  a  coherent
            environment as a context.

            3.1.6   identity [b-ITU-T Y.2720]: Information about an entity that is sufficient to identify that entity in a
            particular context.

            3.1.7   identity management (IdM) [b-ITU-T Y.2720]: Set of functions and capabilities (e.g., administration,
            management  and  maintenance,  discovery,  communication  exchanges,  correlation  and  binding,  policy
            enforcement, authentication and assertions) used for:
            •       assurance of identity information (e.g., identifiers, credentials, attributes);
            •       assurance of the identity of an entity (e.g., users/subscribers, groups, user devices, organizations,
                    network and service providers, network elements and objects, and virtual objects); and
            •       enabling business and security applications.


            188
   193   194   195   196   197   198   199   200   201   202   203