Page 50 - 5G Basics - Core Network Aspects
P. 50

1                                                Core network aspects


            1       Scope

            This Recommendation specifies the requirements of data aware networking (information centric networking)
            derived from the use cases and scenarios described in ITU-T Supplement 35 to Recommendation Y.3033. It
            identifies its capabilities to fulfil the requirements, and describes the components including the capabilities
            of the corresponding components.


            2       References
            The following ITU-T Recommendations and other references contain provisions which, through reference in
            this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated
            were valid. All Recommendations and other references are subject to revision; users of this Recommendation
            are  therefore  encouraged  to  investigate  the  possibility  of  applying  the  most  recent  edition  of  the
            Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is
            regularly published. The reference to a document within this Recommendation does not give it, as a stand-
            alone document, the status of a Recommendation.

            [ITU-T Y.3001]   Recommendation ITU-T Y.3001 (2011), Future networks: Objectives and design goals.
            [ITU-T Y.3011]   Recommendation  ITU-T  Y.3011  (2012),  Framework  of  network  virtualization  for  future
                            networks.
            [ITU-T Y.3031]   Recommendation ITU-T Y.3031 (2012), Identification framework in future networks.

            [ITU-T Y.3032]   Recommendation ITU-T Y.3032 (2014), Configuration of node identifiers and their mapping
                            with locators in future networks.

            [ITU-T Y.3033]   Recommendation ITU-T Y.3033 (2014), Framework of data aware networking for future
                            networks.

            [ITU-T Y.3034]   Recommendation  ITU-T  Y.3034  (2015),  Architecture  for  interworking  of  heterogeneous
                            component networks in future networks.

            [ITU-T M.3400]  Recommendation ITU-T M.3400 (2000), TMN management functions.


            3       Definitions

            3.1     Terms defined elsewhere
            This Recommendation uses the following terms defined elsewhere:

            3.1.1   access control [b-CCITT X.800]: The prevention of unauthorized use of a resource, including the
            prevention of use of a resource in an unauthorized manner.
            3.1.2   authorization [b-CCITT X.800]: The granting of rights, which includes the granting of access based
            on access rights.
            3.1.3   availability  [b-CCITT  X.800]:  The  property  of  being  accessible  and  useable  upon  demand  by  an
            authorized entity.
            3.1.4  data ID [ITU-T Y.3033]: An identifier used to identify a data object. It has a form of a series of digits,
            characters and symbols or any of these combinations, which generally do not have any meaning.
            In this Recommendation, “data ID” and “ID” are used interchangeably.
            3.1.5   data integrity [b-CCITT X.800]: The property that data has not been altered or destroyed in an
            unauthorized manner.
            3.1.6  data name [ITU-T Y.3033]: A string of alpha-numeric characters that is used to identify the data
            object. A data name, which may have variable length, is usually configured in such a way that it would be
            easier to be read and remembered by humans.

            In this Recommendation, “data name”, “NDO name”, and simply “name” are used interchangeably.



            40
   45   46   47   48   49   50   51   52   53   54   55