Page 198 - 5G Basics - Core Network Aspects
P. 198
1 Core network aspects
1 Scope
This Recommendation provides the requirements and capability framework for software-defined network
intelligence capability enhancement (S-NICE). S-NICE is a specific implementation of NICE [ITU-T Y.2301]
making use of software-defined networking technologies. NICE being an evolved version of NGN, S-NICE
supports the intelligent features (five major features) of NICE and makes usage of software-defined
networking technologies. This Recommendation specifies the requirements and capabilities of S-NICE at the
next generation network (NGN) service and network stratum.
2 References
The following ITU-T Recommendations and other references contain provisions which, through reference in
this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated
were valid. All Recommendations and other references are subject to revision; users of this Recommendation
are therefore encouraged to investigate the possibility of applying the most recent edition of the
Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is
regularly published. The reference to a document within this Recommendation does not give it, as a stand-
alone document, the status of a Recommendation.
[ITU-T Y.2301] Recommendation ITU-T Y.2301 (2013), Network intelligence capability enhancement –
Requirements and capabilities.
3 Definitions
3.1 Terms defined elsewhere
This Recommendation uses the following terms defined elsewhere:
3.1.1 application [b-ITU-T Y.101]: A structured set of capabilities which provide value-added functionality,
supported by one or more services.
3.1.2 application provider [b-ITU-T Y.2012]: A general reference to a provider that offers applications to
the customers making use of the service capabilities provided by the NGN.
3.1.3 content [b-ITU-T H.780]: A combination of audio, still image, graphic, video, or data.
NOTE – A variety of formats are classified as "data" (e.g., text, encoded values, multimedia description language
introduced by [b-ITU-T H.760]).
3.1.4 context [b-ITU-T Y.2002]: The information that can be used to characterize the environment of a
user.
NOTE – Context information may include where the user is, what resources (devices, access points, noise level,
bandwidth, etc.) are near the user, at what time the user is moving, interaction history between person and objects,
etc. According to specific applications, context information can be updated.
3.1.5 context awareness [b-ITU-T Y.2201]: The capability to determine or influence a next action in
telecommunication or process by referring to the status of relevant entities, which form a coherent
environment as a context.
3.1.6 identity [b-ITU-T Y.2720]: Information about an entity that is sufficient to identify that entity in a
particular context.
3.1.7 identity management (IdM) [b-ITU-T Y.2720]: Set of functions and capabilities (e.g., administration,
management and maintenance, discovery, communication exchanges, correlation and binding, policy
enforcement, authentication and assertions) used for:
• assurance of identity information (e.g., identifiers, credentials, attributes);
• assurance of the identity of an entity (e.g., users/subscribers, groups, user devices, organizations,
network and service providers, network elements and objects, and virtual objects); and
• enabling business and security applications.
188