Page 208 - ITU-T Focus Group IMT-2020 Deliverables
P. 208

3                                        ITU-T Focus Group IMT-2020 Deliverables



            7.3     Application and Service Management Requirements for IMT-2020

            In order to prepare IMT-2020 network management scheme, IMT-2020 services defined by the most major
            standard bodies need to be looked into. User equipment is included in this additional network management
            requirement for each service. Three major types of IMT-2020 achievement are defined as the following:
            –       ultra reliable and low latency communication

            –       enhanced mobile broadband
            –       massive machine type communication
            For each key major type achievement, service management requirements are suggested.

            7.3.1   Connected car service management requirement for IMT-2020




































                               Figure 4 – A simplified connected car service useful for revealing
                                            network management requirements

            In this service, the number of cars passing through a specific network domain at a specific time will vary
            widely. Instead of allocating enough networking resource all the time, the operators would want to manage
            their expensive resource in a scalable way.
            Multiple  radio  access  technologies  may  affect  network  management  as  well.  In  figure  4,  there  exist
            differences between the sensor communication and the LTE communication technologies such as sizes of the
            cells  and hand  over  times.  However,  all  of  these  technologies  should  be  managed  together  since  the
            communication devices installed in a car move and stop together.

            Based on these insights (but not limited to), following requirements are suggested for the IMT-2020 network
            management:

            •       There should be principles, policies and methods to manage non-USIM devices.
                    –   The principles may include the way network accept and authenticate the non-USIM type of
                        devices.
                    –   The policies may determine whether the non-USIM type communication should be charged at
                        a certain rate or monitored during the operation time.




            202
   203   204   205   206   207   208   209   210   211   212   213