Page 366 - 5G Basics - Core Network Aspects
P. 366
1 Core network aspects
1 Scope
This Recommendation describes the requirements, architecture, information flows and other aspects such
as security and charging for streaming services over multi-connection.
2 References
The following ITU-T Recommendations and other references contain provisions which, through reference in
this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated
were valid. All Recommendations and other references are subject to revision; users of this Recommendation
are therefore encouraged to investigate the possibility of applying the most recent edition of the
Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is
regularly published. The reference to a document within this Recommendation does not give it, as a stand-
alone document, the status of a Recommendation.
[ITU-T G.722] Recommendation ITU-T G.722 (2012), 7 kHz audio-coding within 64 kbit/s.
[ITU-T H.264] Recommendation ITU-T H.264 (2014), Advanced video coding for generic audiovisual
services.
[ITU-T X.200] Recommendation ITU-T X.200 (1994) | ISO/IEC 7498-1:1994, Information technology –
Open Systems Interconnection – Basic Reference Model: The basic model.
[ITU-T X.800] Recommendation ITU-T X.800 (1991), Security architecture for Open System
Interconnection for CCITT applications.
[ITU-T Y.1901] Recommendation ITU-T Y.1901 (2009), Requirements for the support of IPTV services.
[ITU-T Y.2233] Recommendation ITU-T Y.2233 (2010), Requirements and framework allowing
accounting and charging capabilities in NGN.
[ITU-T Y.2251] Recommendation ITU-T Y.2251 (2011), Multi-connection requirements.
3 Definitions
3.1 Terms defined elsewhere
This Recommendation uses the following terms defined elsewhere:
3.1.1 access control [ITU-T X.800]: The prevention of unauthorized use of a resource, including the
prevention of use of a resource in an unauthorized manner.
3.1.2 authorization [ITU-T X.800]: The grant of rights, which includes the granting of access based on
access rights.
3.1.3 availability [ITU-T X.800]: The property of being accessible and useable upon demand by an
authorized entity.
3.1.4 confidentiality [ITU-T X.800]: The property that information is not made available or disclosed to
unauthorized individuals, entities, or processes.
3.1.5 connection [ITU-T X.200], clause 5.3.3.2.1: A connection is an association established for the transfer
of data between two or more peer-(N)-entities. This association binds the peer-(N)-entities together with the
(N-1)-entities in the next lower layer.
3.1.6 content protection [ITU-T Y.1901]: Ensuring that an end-user can only use the content they have
already acquired in accordance with the rights that they have been granted by the rights holder.
3.1.7 data integrity [ITU-T X.800]: The property that data has not been altered or destroyed in an
unauthorized manner.
3.1.8 data origin authentication [ITU-T X.800]: The corroboration that the source of data received is as
claimed.
356