Page 50 - 5G Basics - Core Network Aspects
P. 50
1 Core network aspects
1 Scope
This Recommendation specifies the requirements of data aware networking (information centric networking)
derived from the use cases and scenarios described in ITU-T Supplement 35 to Recommendation Y.3033. It
identifies its capabilities to fulfil the requirements, and describes the components including the capabilities
of the corresponding components.
2 References
The following ITU-T Recommendations and other references contain provisions which, through reference in
this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated
were valid. All Recommendations and other references are subject to revision; users of this Recommendation
are therefore encouraged to investigate the possibility of applying the most recent edition of the
Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is
regularly published. The reference to a document within this Recommendation does not give it, as a stand-
alone document, the status of a Recommendation.
[ITU-T Y.3001] Recommendation ITU-T Y.3001 (2011), Future networks: Objectives and design goals.
[ITU-T Y.3011] Recommendation ITU-T Y.3011 (2012), Framework of network virtualization for future
networks.
[ITU-T Y.3031] Recommendation ITU-T Y.3031 (2012), Identification framework in future networks.
[ITU-T Y.3032] Recommendation ITU-T Y.3032 (2014), Configuration of node identifiers and their mapping
with locators in future networks.
[ITU-T Y.3033] Recommendation ITU-T Y.3033 (2014), Framework of data aware networking for future
networks.
[ITU-T Y.3034] Recommendation ITU-T Y.3034 (2015), Architecture for interworking of heterogeneous
component networks in future networks.
[ITU-T M.3400] Recommendation ITU-T M.3400 (2000), TMN management functions.
3 Definitions
3.1 Terms defined elsewhere
This Recommendation uses the following terms defined elsewhere:
3.1.1 access control [b-CCITT X.800]: The prevention of unauthorized use of a resource, including the
prevention of use of a resource in an unauthorized manner.
3.1.2 authorization [b-CCITT X.800]: The granting of rights, which includes the granting of access based
on access rights.
3.1.3 availability [b-CCITT X.800]: The property of being accessible and useable upon demand by an
authorized entity.
3.1.4 data ID [ITU-T Y.3033]: An identifier used to identify a data object. It has a form of a series of digits,
characters and symbols or any of these combinations, which generally do not have any meaning.
In this Recommendation, “data ID” and “ID” are used interchangeably.
3.1.5 data integrity [b-CCITT X.800]: The property that data has not been altered or destroyed in an
unauthorized manner.
3.1.6 data name [ITU-T Y.3033]: A string of alpha-numeric characters that is used to identify the data
object. A data name, which may have variable length, is usually configured in such a way that it would be
easier to be read and remembered by humans.
In this Recommendation, “data name”, “NDO name”, and simply “name” are used interchangeably.
40