hash
stringlengths
32
32
doc_id
stringlengths
5
12
section
stringlengths
5
1.47k
content
stringlengths
0
6.67M
556719e8696c25b4ac3572453768229c
22.843
5.6.1 Description
For UAVs operated using the 3GPP network access, the network needs to ensure that the UAVs can use the network reliably and with adequate performance. UAV flight mission need to be monitored for the real-time performance and stability of flight control link to guarantee the safety and continuity of the flight. 5G network can provide wide-area, high-quality and secure connectivity that can enable cost-efficient UAV operations beyond visual line-of-sight. When UAV uses 3GPP network for communications, the UTM/UAV operator may need to monitor the network status along the flight path with the help of 3GPP network.
556719e8696c25b4ac3572453768229c
22.843
5.6.2 Pre-conditions
In the logistics company, UAV A and UAV B are both individual terminals for express delivery and subscribe the communication service from the 5G network. Operator A provides 5G network coverage and communication services for remote commands and control (C2) communication between UAV and UAV control platform. The UTM relies on Operator A to monitor and provide network status from the 5G network for UAV inflight related information.
556719e8696c25b4ac3572453768229c
22.843
5.6.3 Service Flows
Figure 5.6.3-1: Supporting UAV inflight monitoring 1. The logistics company uses UAV A and UAV B to perform delivery operations. UAVs planned flight paths shared a common portion, along waypoint #1 and waypoint #2. 2. UAV/UAV-C A and UAV/UAV-C B register in 5G network and can communicate with UTM though 5G network. 3. The UAV-C A provides planned flight path #A information to UTM (e.g., flight path and required QoS along the planned flight path). 4. UAV A receive the flight path information from UTM/UAS via 5G network and start flight mission. 5. UTM requests 5G network for network condition information (e.g., bitrate, latency, reliability) along the flight path of UAV A. 6. The 5G network provides the requested statistics (e.g., end-to-end latency, QoE) for specific requested area/areas (e.g., degraded QoE at waypoint #2). 7. The UAV-C B provides planned flight path #B (along waypoint #1 and waypoint #2) information to UTM. 8. UTM/UAS determines the final flight path #B (e.g., adjusted to take waypoint #2') and scheduling for UAV/UAV-C B based on the information from Operator A along UAV A flight route, and sends it to UAV/UAV-C B. 9. UAV B receive the flight path #B information from UTM/UAS via 5G network and start flight mission.
556719e8696c25b4ac3572453768229c
22.843
5.6.4 Post-conditions
UAV A and UAV B can finish their delivery tasks with the support of 5G network.
556719e8696c25b4ac3572453768229c
22.843
5.6.5 Existing features partly or fully covering the use case functionality
Existing related service requirements are captured in 3GPP TS 22.125 [3] clause 6.2 "Network exposure for UAV services". [R-6.2-001] The 3GPP system shall provide means to allow a 3rd party to request and obtain real-time monitoring the status information (e.g., location of UAV, communication link status) of a UAV. [R-6.2-002] Based on operator 's policy, the 3GPP system shall provide means to provide a 3rd party with the information regarding the service status for UAVs in a certain geographical area and/or at a certain time. NOTE: Service status is about the information of whether the communication service to the UAV can be provided with a certain QoS by the network. These requirements do not include explicit requirements on QoS related network conditions like bitrate, latency and reliability.
556719e8696c25b4ac3572453768229c
22.843
5.6.6 Potential New Requirements needed to support the use case
[P.R 5.6.6-001] Based on operator’s policy, the 5G system shall be able to provide a method to monitor and provide a 3rd party with information about network conditions and QoS (e.g. bitrate, latency, reliability) along a UAV flight path. [P.R 5.6.6-002] Based on operator’s policy, the 5G system shall be able to provide a method to monitor and provide a 3rd party with information about deviations and violations along a UAV flight path and time. NOTE: Deviations can be e.g. in location and/or time with respect to the original flight plan. Violations can be e.g. with respect to exclusion zones provided together with the flight plan or known via other means.
556719e8696c25b4ac3572453768229c
22.843
5.7 Use case on UAV flight route tracking at Rendezvous points
556719e8696c25b4ac3572453768229c
22.843
5.7.1 Description
Commercial UAV flights are usually BVLOS. Tracking the UAV flights to ensure that they are sticking to the planned route is critical to the success of the mission and the safety of the public. For UAVs that have network communication capability, cellular networks can greatly assist in UAV flight route tracking thanks to their ubiquitous network coverage. However, there are UAVs in the markets today that lack 5G network connection capabilities and probably will remain so for a long time. For such non-networked UAVs, ground stations or stationary devices can provide means to UTM/UAV operator in flight route tracking. Ground stations or stationary devices can be operated by the 5G network operator which has service agreements with the USS/UTM or by a third-party service provider. The ground stations or stationary devices are deployed along popular flight routes. The UTM/UAV operator can have a need to track the flight route of a non 3GPP capable UAVs using the assistance of 5G network and ground station devices to further enhance the safety and security of UAV operations (e.g., for DAA) while also supporting legacy UAVs. Figure 5.7.1-1: UAV flight route tracking at Rendezvous points
556719e8696c25b4ac3572453768229c
22.843
5.7.2 Pre-conditions
A USS/UTM provides environmental surveillance services in an area. It regularly sends out UAVs to fly a planned route collecting environmental data. The UAV is not the subscriber UE of the 5G cellular network operator and can be considered as non-networked UAV for the 5G operator. A 5G cellular network operator provides 5G network services in the area. A 5G cellular network operator provides UAV tracking service in the area. For example, it has several ground stations or stationary devices deployed in strategic areas (e.g., along popular flight routes, close to important infrastructure as airports). The ground stations or stationary devices are capable of 5G connectivity and also detection or communication with non-networked UAVs using e.g. 5G device-to-device communication technologies. The 5G network operator has access to information about the available ground stations. The technologies for detection of any UAV along a flight route is outside the scope of the use-case, however the tracking mechanisms for specific UAV needs to support unambiguous identification of the UAVs to ensure reliable and accurate tracking data about the UAV.
556719e8696c25b4ac3572453768229c
22.843
5.7.3 Service Flows
1. The USS/UTM requests tracking of one of more UAVs from the 5G operator. 2. The 5G network to track those non-network UAVs. The USS/UTM provides the planned flight route information to the 5G network (e.g., waypoints, ETA). 3. The 5G network start to track those UAV, such as requests selected ground stations to monitor the presence of the target UAVs in its proximity. The ground stations monitor the UAV flight route based on the available information about the planned flight route. 4. When a ground station detects and identifies the target UAV in its proximity, e.g., by receiving BRID information from the target UAV, the ground station in the 5G network informs the UTM that the UAV is following the planned route. 5. At estimated time-of-arrival (ETA), the relevant ground station(s) monitor the presence of the target UAV in its proximity and the 5G network informs the UTM that the UAV has completed its flight as scheduled.
556719e8696c25b4ac3572453768229c
22.843
5.7.4 Post-conditions
The UAV finishes the mission with USS/UTM reassured during the whole flight.
556719e8696c25b4ac3572453768229c
22.843
5.7.5 Existing features partly or fully covering the use case functionality
Identification of UAVs which don’t have subscription with the 5G operator for DAA has been specified in Rel-18. Tracking for such UAVs is currently not covered in Rel-18 because release 18 only supports the capability to allow the 5G operator tracking of those UAVs which have the subscription with the 5G operator.
556719e8696c25b4ac3572453768229c
22.843
5.7.6 Potential New Requirements needed to support the use case
[P.R 5.7.6-001] The 5G system shall be able to support a mechanism to enable a network operator to track a UAV which doesn’t have subscription with this network operator.
556719e8696c25b4ac3572453768229c
22.843
5.8 Use case on UAV simultaneous traffic over two networks
556719e8696c25b4ac3572453768229c
22.843
5.8.1 Description
Reliability of UAV traffic is a very important challenge and target for the aviation industry, e.g., for command and control (C2) or other critical data. One scenario of interest includes UAVs, provided with dual SIM/subscription, able to connect simultaneously via two networks for transferring different type of traffic, e.g., using the most reliable network for C2 or other critical data, while other type of traffic is transmitted over the second network. As an example, let us assume the case of a UAV company (“SafeSky”) that offers monitoring and surveillance services for specific venues (e.g., stadiums) or public events. Their drones are 5G-capable and configurable with dual subscription, one for nationwide PLMN connectivity (with MNO-A), one for ad-hoc UAV coverage using networks deployed in specific public safety venues/locations (can be a PLMN or NPN, managed by MNO-A or other MNO). In such scenario, when there is available coverage from both NWs, SafeSky can configure their UAVs to transfer C2 traffic with a local UAV-Controller (UAV-C) via the ad-hoc PLMN1/NPN (most suitable for low volume/data rate, but very stringent real-time latency and reliability), while less critical user data is exchanged with the UAV Supplier Service (USS) and UTM via the wide-area PLMN2 coverage. This is illustrated, at high level, in Figure 5.8.1-1, where PLMN1/NPN is the local NW and PLMN2 is the wide area network. Figure 5.8.1-1: Example of separating UAV traffic over two PLMNs In other examples, different traffic differentiation configurations are possible (in a similar venue scenario), e.g., UAVs may transfer real-time critical payload traffic (e.g., streaming a 4K video of a sport event) with a local endpoint via the ad-hoc PLMN1/NPN, while C2 and UAV monitoring data via the wide-area PLMN2 network.
556719e8696c25b4ac3572453768229c
22.843
5.8.2 Pre-conditions
SafeSky UAV has dual subscription (dual SIM, or SIM and NPN credentials) to two different PLMNs (or a PLMN and an NPN). It is assumed that SafeSky has negotiated with both MNOs proper data policies for traffic generated by its UAVs over their respective networks (e.g., QoS, traffic profile/activity, charging, etc.). UAV is capable of dual radio operation (e.g., NR+NR). UAV’s application configuration policies include when/where to use connectivity via two PLMNs, which network to use for which traffic, specific C2 traffic/QoS parameters, etc. In this example, C2 traffic should go over PLMN1/NPN1 (offering ultra-reliable connectivity), other traffic over PLMN2. It is assumed, in this use case, that UAV connects to the same USS/UTM and UAV-C during the whole flight operation. This scenario assumes mostly UAV-originated traffic and/or that UTM is aware of which data goes over each PLMN connection, so that corresponding uplink and downlink traffic (e.g., for C2 communication) is transferred over the same PLMN connection (e.g., PLMN1).
556719e8696c25b4ac3572453768229c
22.843
5.8.3 Service Flows
Based on UAV configuration policy: 1. SafeSky UAV registers to both PLMN1/NPN1 and PLMN2, using their respective home subscription. 2. When monitoring surveillance service is started, UAV connects with both networks. 3. UAV traffic is transferred simultaneously on both networks, where C2 communication with the UAV-C is routed over PLMN1 and other traffic monitoring data with USS/UTM is routed over PLMN2.
556719e8696c25b4ac3572453768229c
22.843
5.8.4 Post-conditions
The surveillance service runs smoothly, with no glitch in UAV operation and manoeuvring.
556719e8696c25b4ac3572453768229c
22.843
5.8.5 Existing features partly or fully covering the use case functionality
There are no service requirements in TS 22.125 [3] about UAS multi-NW/PLMN support. Other requirements (e.g., from TS 22.261 [4] or TS 22.101 [5]) do not cover the specific target UAV scenarios and functionalities. Some examples of existing requirements are captured below: [from TS 22.261 [4] sec. 6.18: Multi-network connectivity and service delivery across operators] The 5G system shall enable users to obtain services from more than one network simultaneously on an on-demand basis. For a user with a single operator subscription, the use of multiple serving networks operated by different operators shall be under the control of the home operator. When a service is offered by multiple operators, the 5G system shall be able to maintain service continuity with minimum service interruption when the serving network is changed to a different serving network operated by a different operator. NOTE 1: A business agreement is required between the network operators. In the event of the same service being offered by multiple operators, unless directed by the home operator's network, the UE shall be prioritized to receive subscribed services from the home operator's network. NOTE 2: If the service is unavailable (e.g., due to lack of network coverage) from the home operator's network, the UE may be able to receive the service from another operator's network. NOTE 3: QoS provided by the partner operator's network for the same service will be based on the agreement between the two operators and could be different than that provided by the home operator's network. [from TS 22.101 [5] sec. 13.4] The 3GPP system shall support ME with multiple USIMs (on the same UICC or on different UICCs) that are registered at the same time. The 3GPP system shall treat each registration from the USIMs of a MUSIM UE independently. Each registered USIM in a MUSIM UE shall be associated with a dedicated IMEI/PEI. [from others] In addition, there are existing UAV requirements (from TS 22.125 [3]) on 3GPP system to provide monitoring and notification regarding C2 communication changes, which are not specific to inter-PLMN connectivity, for example: The 3GPP system shall support C2 communication with required QoS for pre-defined C2 communication models (e.g. using direct ProSe Communication between UAV and the UAV controller, UTM-navigated C2 communication based on flight plan between UTM and the UAV). The 3GPP system shall support C2 communication with required QoS when switching between the C2 communication models. The 3GPP system shall support a mechanism for the UTM to request monitoring of the C2 communication with required QoS for pre-defined C2 communication models (e.g. using direct ProSe Communication between UAV and the UAV controller, UTM-navigated C2 communication between UTM and the UAV).
556719e8696c25b4ac3572453768229c
22.843
5.8.6 Potential New Requirements needed to support the use case
[PR.5.8-001] The 5G system shall be able to support service enablement layer exposure mechanisms for the UTM or other authorized 3rd party to provide the UAV application with configuration information to route different traffic across different PLMN connections simultaneously, e.g. C2 traffic via one PLMN and other data via the second PLMN. NOTE 1: The above requirements can be extended to scenarios where one network is a PLMN and one is an NPN. NOTE 2: There is no impact on legacy network selection. NOTE 3: It is assumed that UAV traffic handling, over each PLMN, is subject to network control mechanisms (e.g. in accordance with MNO traffic routing priorities, available QoS/resources, etc.).
556719e8696c25b4ac3572453768229c
22.843
5.9 Use case on UAV traffic over alternative networks
556719e8696c25b4ac3572453768229c
22.843
5.9.1 Description
One of the Aviation industry recommendations for UAV operation (and AAM - Advanced Air Mobility) is the ability to support robust reliability and flexible redundancy of critical communication links, including cellular, e.g., for Command and Control (C2) and other flight-critical communications. Within the context of improving 5G reliability and redundancy for UAVs, scenarios with dual subscription and multi-NW connectivity become of interest. For example, drones can be equipped with dual SIM (or dual credentials) and use one subscription for active communication with one network while the second subscription for setting up a “stand-by” connection path, to be used in case the first network becomes unsuitable or unavailable. Figure 5.9.1-1 shows, at high level, the two connectivity options, where UAV traffic is first active on the preferred network (PLMN-1), then switched to the second network (PLMN-2). Other options are not precluded, e.g., one of the two networks could be an NPN. Figure 5.9.1-1: UAV traffic over two alternative PLMNs (one active at a time) Which PLMN to use, and when to switch between them, would be based on specific conditions and policies configurable by the UAV owner/operator. One example is about a UAV operator (“SkyTV”), offering professional aerial video/TV services, in an environment where there is 5G coverage provided by PLMN1 (possibly shared with other PLMNs) overlapping with 5G coverage provided by PLMN2. It can be that both PLMNs are managed by the same MNO (MNO-A), or different MNOs, using different SIM/subscription credentials to access each PLMN. In order to support seamless aerial service and UAV traffic management, the whole flight path can require consistent network connection and complete network coverage. In certain areas, though, the coverage of the first PLMN cannot be guaranteed, or is not preferable (e.g. due to network congestion), while the coverage of PLMN2 is better, or preferred. In such environment, SkyTV is contracted by a national TV broadcaster for video streaming of e.g., outdoor events, races, marathons etc. To improve the reliability and QoS experience, SkyTV can equip its UAVs with dual SIM subscription (to PLMN1 and PLMN2) and configure them such that PLMN-1 is the preferred network, while PLMN-2 should be the stand-by network, together with policies and conditions for switching between them. The example is further elaborated below.
556719e8696c25b4ac3572453768229c
22.843
5.9.2 Pre-conditions
SkyTV UAV has dual SIM subscription to PLMN1 and PLMN2. It is assumed that SkyTV has negotiated with both MNOs proper data subscriptions for traffic generated by its UAVs (e.g., QoS, traffic profile/activity, charging, etc.). UAV’s application is configured to use both PLMNs via both subscriptions (USIM1/USIM2), transfer user data via PLMN-1 if/when available or suitable, otherwise switch to PLMN-2. Network switch is decided and controlled by UAV or UTM, based on configured application policies in the UAV or UTM. UAV’s application policy can include e.g., when/where to use connectivity via two PLMNs, which PLMN should be active/stand-by, specific C2 traffic/QoS policies, switch conditions, etc. It is assumed, in this use case, that UAV’s application connects to the same USS/UTM or UAV-C during the whole flight operation (regardless of which PLMN connection is used). This scenario assumes mostly UAV-originated traffic and/or that UTM is aware of which PLMN connection is used by the UAV, so that both uplink and downlink traffic are transferred over the same active PLMN connection, and USS/UTM interacts with the active PLMN e.g., for UAS identification and traffic management. For example, when UAV application sends the data packets over one PLMN connection, the UTM can reply over the same PLMN connection.
556719e8696c25b4ac3572453768229c
22.843
5.9.3 Service Flows
1. An outdoor marathon event is starting, and SkyTV UAV is set to follow the peloton for all the itinerary (20 miles). SkyTV service provider has configured the UAV application with specific policy on how to route traffic over the two subscribed PLMN networks. 2. Before the kick-off, UAV’s communication module using USIM1 and USIM2 is registered to both PLMNs, has established C2 connection with the UAV-C or USS/UTM, using respective subscriptions/USIM credentials, and is idle (no traffic). Based on UAV operator (SkyTV) policy, PLMN-1 is configured initially as active network (to transfer video data and C2 data) while PLMN-2 is configured as standby network. 2. At the start, UAV’s application transfers real-time video data and exchange control and command data with the USS/UTM or UAV-C via PLMN1, while PLMN-2 connection remains inactive (standby connection). 3. Based on configured UAV application policies, along the itinerary, UAV video traffic and C2 data is switched over PLMN-2: UAV switches its active C2 connection with UAV-C or USS/UTM to PLMN2 while PLMN-1 becomes the standby network. 4. Later, video and C2 traffic is switched back by UAV to PLMN-1 (PLMN2 is inactive). Steps 3&4 can be repeated along the route.
556719e8696c25b4ac3572453768229c
22.843
5.9.4 Post-conditions
SkyTV video service runs smoothly for all 20 miles, with no service degradation when transitioning in and out of PLMN-1 spotty coverage areas and the UAV is under control and monitored by USS/UTM and UAV-C all the time.
556719e8696c25b4ac3572453768229c
22.843
5.9.5 Existing features partly or fully covering the use case functionality
There are no service requirements in TS 22.125 [3] about UAS multi-NW/PLMN support. Other requirements (e.g., from TS 22.261 [4] or TS 22.101 [5]) do not cover the specific target UAV scenarios and functionalities. Some examples of existing requirements are captured below: [from TS 22.261 [4] sec. 6.18: Multi-network connectivity and service delivery across operators] The 5G system shall enable users to obtain services from more than one network simultaneously on an on-demand basis. For a user with a single operator subscription, the use of multiple serving networks operated by different operators shall be under the control of the home operator. When a service is offered by multiple operators, the 5G system shall be able to maintain service continuity with minimum service interruption when the serving network is changed to a different serving network operated by a different operator. NOTE 1: A business agreement is required between the network operators. In the event of the same service being offered by multiple operators, unless directed by the home operator's network, the UE shall be prioritized to receive subscribed services from the home operator's network. NOTE 2: If the service is unavailable (e.g., due to lack of network coverage) from the home operator's network, the UE may be able to receive the service from another operator's network. NOTE 3: QoS provided by the partner operator's network for the same service will be based on the agreement between the two operators and could be different than that provided by the home operator's network. [from TS 22.101 [5] sec. 13.4] The 3GPP system shall support ME with multiple USIMs (on the same UICC or on different UICCs) that are registered at the same time. The 3GPP system shall treat each registration from the USIMs of a MUSIM UE independently. Each registered USIM in a MUSIM UE shall be associated with a dedicated IMEI/PEI. [from others] In addition, there are existing UAV requirements (from TS 22.125 [3]) on 3GPP system to provide monitoring and notification regarding C2 communication changes, which are not specific to inter-PLMN connectivity, for example: The 3GPP system shall support C2 communication with required QoS for pre-defined C2 communication models (e.g., using direct ProSe Communication between UAV and the UAV controller, UTM-navigated C2 communication based on flight plan between UTM and the UAV). The 3GPP system shall support C2 communication with required QoS when switching between the C2 communication models. The 3GPP system shall support a mechanism for the UTM to request monitoring of the C2 communication with required QoS for pre-defined C2 communication models (e.g., using direct ProSe Communication between UAV and the UAV controller, UTM-navigated C2 communication between UTM and the UAV).
556719e8696c25b4ac3572453768229c
22.843
5.9.6 Potential New Requirements needed to support the use case
[PR 5.9.6-001] The 5G system shall be able to support service enablement layer exposure mechanisms for the UTM or other authorized 3rd party to provide the UAV application with configuration information to route and switch traffic between one active and one standby PLMN connection, e.g. for C2 communication reliability and redundancy purpose. NOTE 1: The above requirement can be extended to scenarios where one network is a PLMN and one is an NPN. NOTE 2: There is no impact on legacy network selection. NOTE 3: It is assumed that UAV traffic handling, over each PLMN, is subject to NW control mechanisms (e.g. in accordance with MNO routing priorities, available QoS/NW resources, etc.).
556719e8696c25b4ac3572453768229c
22.843
5.10 Use case on UAV control in different aerial flight zones
556719e8696c25b4ac3572453768229c
22.843
5.10.1 Description
5G networks can provide connectivity to UAV for a variety of services, e.g., command and control, telemetry, remote ID, DAA, payload transfer (e.g., video), etc. In some scenarios, it would be beneficial to control and differentiate UAV operation and communication, e.g., regarding the use of specific network resources and/or specific application(s) settings, in different geographical areas. Some aspects of the 5G connectivity configuration, indeed, may need to be different depending on the area where the UAV is flying, e.g., in urban versus rural, or in areas close to high-risk obstacles or with stricter safety restrictions, like airports, stadiums, etc. This use case describes some means to efficiently support and control differentiation of UAV traffic across different zones and corresponding potential requirements. For example, the UAV and UTM provider may identify different types of aerial flight zones in the territory, e.g., based on data traffic information, flight statistics, network topology. local conditions, events, etc. Based on business agreement with an MNO, the UTM and network can configure specific information on different flight zones, which can include e.g., the geographical location (footprint or 3D volume) of the flight zones and their mapping to different network areas, associated zone type or other means to identify a specific flight zone, and target UAV communication/QoS parameters (per flight zone). UTM and/or the network can then convey to the UAV corresponding policy configuration (static or dynamic), controlling how the UAV should use connectivity services for various applications in different flight zones (e.g., per zone type). The network should also assist UAV to identify and differentiate specific flight zones, so that a UAV can apply the right configured policy based on the actual flight zone it is currently located in. A general example of flight zones settings is illustrated in Fig.1, based on different geographical, logistical and safety factors (e.g., around city centre, stadiums, airports, harbour, rural areas, etc.). The figure may represent the flight zone settings for a specific day, or time of the day, and may vary based on local/temporary change of conditions. Figure 5.10.1-1: Example of UAV flight zones configuration The UAV policy could also contain a default configuration that can be used when no specific flight zone type is applicable or not indicated/available to the UAV. The above would provide the ability for UTM to collaborate with the 5G network to provide flexible control of UAV communication over the identified flight zones, including scalable and dynamic adaptation based on temporary/local changes (e.g., data traffic, NW resources, environmental changes, local events or restrictions), by creating new flight zones that map on specific network areas and/or modifying existing zone types, etc. One specific scenario and flow is further elaborated below.
556719e8696c25b4ac3572453768229c
22.843
5.10.2 Pre-conditions
A UAV service provider (U-Serv), offering monitoring & surveillance UAV services in multiple cities of the country, has an agreement with PLMN-A operator, including the configuration of two different flight zones (for all cities) mapped to different parts of the territory and network, with the following UAV application/traffic policies and conditions: • - Zone A (no restriction/condition): for most areas/location of the cities’ territory ○ normal/default UAV application and communication settings • - Zone B (with restriction/condition): for areas/locations e.g., with larger data traffic/congestion and/or higher drones’ density (e.g., where/when special events or emergency situations happen). ○ Increased frequency and QoS of C2 communication (for more reliable command and control operation) ○ Reduced data traffic activity/QoS for other communications (to reduce network congestion) The Zone B policy configuration may also include other options, e.g., restrictions/conditions may vary based on UAV altitude (above / below a certain threshold, or within a certain range), time of the day, etc.
556719e8696c25b4ac3572453768229c
22.843
5.10.3 Service Flows
1. 1. A U-Serv UAV, located in Zone A, is registered to PLMN-A and starts its daily surveillance service. 2. 2. The UAV detects it is in Zone A, e.g., if indicated by the network or based on UAV available information or pre-configuration, and connects to the network using the corresponding traffic policy for Zone A (normal/default operation). 3. 3. Along the UAV itinerary, UAV detects or is notified of being in a new zone type, Zone B, thus UAV application will apply corresponding traffic settings according to Zone B policy. 4. 4. If UAV detects or is notified that flight zone type changes to Zone A, UAV application will switch back to default traffic policy. Note that change of flight zone type may happen due to the UAV moving across different geographical areas (associated to different zone types) or by change of zone type for the same UAV geographical location (e.g., based on temporary events).
556719e8696c25b4ac3572453768229c
22.843
5.10.4 Post-conditions
U-Serv UAV application can provide smooth service and is able to adapt its communication settings when flying across special locations/areas (zone B), based on UAV traffic policies and flight zone settings under control of UTM and network.
556719e8696c25b4ac3572453768229c
22.843
5.10.5 Existing features partly or fully covering the use case functionality
None identified.
556719e8696c25b4ac3572453768229c
22.843
5.10.6 Potential New Requirements needed to support the use case
[PR 5.10.6-001] The 5G system shall be able to support mechanisms for the UTM to configure different aerial flight zones where UAV application settings and communication QoS may be different, and provide network and UAV with means to identify those flight zones. [PR 5.10.6-002] The 5G system shall be able to support mechanisms for the UTM to provide network and UAV with policy information including UAV application settings and communication QoS to be applied in specific aerial flight zones, e.g. based on flight zone type indicated or available to the UAV in a certain geographical location.
556719e8696c25b4ac3572453768229c
22.843
6 Consolidated potential requirements
556719e8696c25b4ac3572453768229c
22.843
6.1 Network support and exposure for UAV usage
CPR # Consolidated Potential Requirement Original PR # Comment CPR 6.1-001 Based on operator’s policy, the 5G system shall be able to support a method to predict, monitor network conditions and QoS (e.g. bitrate, latency, reliability) and report to 3rd party along a continuous geographic planned flight path of a UAV at specific times of its expected flight duration. P.R 5.2.6-001 P.R 5.6.6-001 CPR 6.1-002 Based on operator’s policy, the 5G system shall be able to provide UTM with the information about geographic areas where UAV service requirements could or could not be met based on predicted network conditions and QoS (e.g. bitrate, latency, reliability). P.R 5.2.6-002 CPR 6.1-003 Based on a 3rd party request, the 5G system shall be able to assist the UTM with mechanism to provide to the 3rd party alternative UAV flight paths, e.g.,based on required waypoints, QoS, and exclusion zones. P.R 5.2.6-003 CPR 6.1-004 Based on a 3rd party request and operator’s policy, the 5G system shall be able to reconfigure network resources to provide the required QoS along a UAV planned flight path, e.g. at particular geographical area(s) and time(s). P.R 5.2.6-004 CPR 6.1-005 The 5G system shall be able to support a mechanism to enable a network operator to track an airborne connected UE which does not have an aerial subscription . P.R 5.7.6-001 CPR 6.1-006 The 5G system shall be able to support service enablement layer exposure mechanisms for the UTM or other authorized 3rd party to provide the UAV application with configuration information to route and switch traffic between one active and one standby PLMN connection, e.g. for C2 communication reliability and redundancy purpose, or to route different traffic across different PLMN connections simultaneously, e.g. C2 traffic via one PLMN and other data via the second PLMN. NOTE 1: The above requirement can be extended to scenarios where one network is a PLMN and one is an NPN. NOTE 2: There is no impact on legacy network selection. NOTE 3: It is assumed that UAV traffic handling, over each PLMN, is subject to NW control mechanisms (e.g. in accordance with MNO routing priorities, available QoS/NW resources, etc.). P.R 5.8.6-001 P.R 5.9.6-001 CPR 6.1-007 The 5G system shall be able to support mechanisms for the UTM to configure different aerial flight zones where UAV application settings and communication QoS may be different, and provide network and UAV with means to identify those flight zones. P.R 5.10.6-001 CPR 6.1-008 The 5G system shall be able to support mechanisms for the UTM to provide network and UAV with policy information including UAV application settings and communication QoS to be applied in specific aerial flight zones, e.g. based on flight zone type indicated or available to the UAV in a certain geographical location. P.R 5.10.6-002 CPR 6.1-009 Based on operator and UTM policy, the 5G system shall be able to provide UTM with an airborne UE’s location and 3GPP identity to fulfil the UTM’s request. NOTE 6: The 3GPP identity and UE location is expected to be used by the UTM to determine the position of airborne objects containing the UE. P.R 5.5.6-001 CPR 6.1-010 Subject to user consent and national or regional regulation, based on operator and UTM policy, and the UTM’s request, the 5G system may be able to provide aerial object location(s) derived using 5G Wireless Sensing to the UTM to fulfil the UTM’s request. NOTE 4: The airborne object location(s) are expected to be used by the UTM to determine the position of airborne objects. P.R 5.5.6-002
556719e8696c25b4ac3572453768229c
22.843
6.2 Safety and Security
CPR # Consolidated Potential Requirement Original PR # Comment CPR 6.2-001 The 5G system shall be able to detect that a connected UE is airborne, when the UE doesn’t have an aerial subscription.. PR 5.1.6-001 CPR 6.2-002 The 5G system shall support means to determine whether UTM supports regulatory requirements e.g., maximal VLOS distance between the UAV and the UAV controller. NOTE 1: The requirement applies to the case of both UAV and UAV controller connected to the 3GPP network PR 5.3.6-001 CPR 6.2-003 Based on operator’s policy, the 5G system shall be able to support a method to monitor and provide a 3rd party with information about deviations and violations along a UAV flight path and time. NOTE 2: Deviations can be e.g. in location and/or time with respect to the original flight plan. Violations can be e.g. with respect to exclusion zones provided together with the flight plan or known via other means. P.R 5.6.6-002 CPR 6.2-004 Based on operator’s policy, the 5G system shall be able to support a method to provide UTM and UAVs with the information collected or generated by the 5G system (e.g., based on sensing results), including e.g. the location or relative distance between3GPP UAVs and other flying objects (can be drones not using 3GPP connectivity). P.R 5.4.6-001 CPR 6.2-005 The 5G system shall be able to track the UAV-Controller, regardless of the type of connection. PR 5.3.6-002 CPR 6.2-006 Based on MNO policies and/or regulatory requirements, the 5G system shall be able to inform the UTM, when the 5G system detects a specific UAV condition or event, in order to enable UTM control of the UAV communication (e.g., when detecting violation of exclusion zones or maximal distance between UAVs). PR 5.3.6-003
556719e8696c25b4ac3572453768229c
22.843
7 Conclusion and recommendations
The present document contains several use cases and service requirements for enhanced UAV usage and safety. It is recommended to define normative service requirements based on the consolidated potential requirements identified in Section 6. Annex A (informative): Change history Change history Date Meeting TDoc CR Rev Cat Subject/Comment New version 2022-08 SA1#99-e S1-222402 TR skeleton 0.0.0 2022-09 SA1#99-e S1-222403, S1-222404, S1-222405, S1-222406 Scope Overview New use case - UAV detection New use case_Supporting UAV pre-flight preparation 0.1.0 2022-11 SA1#100 S1-223436 S1-223616 S1-223719 S1-223720 S1-223721 pCR on use case on supporting UAV pre-flight preparation New use case: Support UAV inflight monitoring New use case_VLoS_geofencing New use case on network-assisted UAV DAA New use case: 3GPP network as an information source to the UTM 0.2.0 2023-02 SA1#101 S1-230357 S1-230786 S1-230787 New use case on UAV flight route tracking at Rendezvous points pCR: Update on UTM pre-/in-flight operation support Update of the use case “Geofencing for Visual Line-of-Sight UAV missions” 0.3.0 2023-03 SA#99 SP-230221 MCC clean-up for presentation to SA 1.0.0 2023-05 SA1#102 S1-231258 S1-231608 S1-231610 S1-231611 S1-231614 S1-231617 S1-231622 S1-231638 S1-231762 S1-231773 pCR on Abbreviations section TR 22843 FS_UAV_ph3 quality improvement CR Use Case on UAV simultaneous traffic over two networks Use Case on UAV flying zones pCR on Use case Geofencing VLoS pCR on updating use case 5.2 Supporting UAV flight preparation pCR on use case on network-assisted UAV DAA Use Case on UAV traffic over two alternative networks pCR on FS-UAV-Ph3_Overview section pCR on consolidated requirements for UAV Phase3 1.1.0 2023-06 SA#100 SP-230517 MCC clean-up for approval by SA 2.0.0 2023-06 SA#100 SP-230517 Raised to v.19.0.0 by MCC following approval by SA 19.0.0 2023-09 SA#101 SP-231027 0001 C Removal of Editor's Notes in TR 22.843 on 5GS to UTM exposure of location 19.1.0 2023-09 SA#101 SP-231027 0003 F Update use case 5.3 Geofencing for Visual Line-of-Sight UAV missions 19.1.0 2023-09 SA#101 SP-231027 0004 1 B pCR on updating use case 5.4 network-assisted UAV DAA 19.1.0 2023-09 SA#101 SP-231027 0002 1 D Quality improvements to TR22.843 19.1.0 2023-09 SA#101 SP-231027 0005 2 B Conclusions and Recommendations 19.1.0 2023-12 SA#102 SP-231410 0008 D Term update in use case 5.3 Geofencing for Visual Line-of-Sight UAV missions 19.2.0 2023-12 SA#102 SP-231410 0007 3 C CPR alignment with agreed CR for TS 22.125 19.2.0
6fd8bf2627f82827816dd131ee257054
22.848
1 Scope
The present document describes use cases and aspects related to interconnect of SNPNs as well as Scalable SNPN Interconnect with dynamic connections. Potential service requirements are derived for these use cases and are consolidated in a dedicated chapter. The report ends with recommendations regarding the continuation of the work. NOTE: There is no requirement for a PLMN to enhance their interconnect with SNPNs or operate an identity provider.
6fd8bf2627f82827816dd131ee257054
22.848
2 References
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. - References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific. - For a specific reference, subsequent revisions do not apply. - For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. [1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications".
6fd8bf2627f82827816dd131ee257054
22.848
3 Definitions of terms, symbols and abbreviations
6fd8bf2627f82827816dd131ee257054
22.848
3.1 Terms
For the purposes of the present document, the terms given in 3GPP TR 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in 3GPP TR 21.905 [1]. SNPN Credential Provider: Entity within the 5G system that creates and manages identity information and provides authentication services for those identities for the purpose of accessing a SNPN NOTE: The SNPN Credential Provider can also authorize access to a non-public network for a subscriber associated with an identity handled by this SNPN Credential Provider. Interconnect: interaction between two SNPNs, or between a SNPN and a SNPN Credential Provider, allowing users subscribed to one SNPN (or to the SNPN Credential Provider) to use the other SNPN Standalone Non-Public Network: an NPN that does not rely on network functions provided by a Public Land Mobile Network (PLMN)
6fd8bf2627f82827816dd131ee257054
22.848
3.2 Abbreviations
For the purposes of the present document, the abbreviations given in 3GPP TR 21.905 [1] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in 3GPP TR 21.905 [1]. SNPN Standalone Non-Public Network
6fd8bf2627f82827816dd131ee257054
22.848
4 Overview
The present document captures a set of use cases and potential service requirements related to the following topics: 1. Scalable SNPN Interconnect with dynamic connections (to support SNPN cellular hotspots). 2. Interconnect of SNPNs
6fd8bf2627f82827816dd131ee257054
22.848
5 Use cases
6fd8bf2627f82827816dd131ee257054
22.848
5.1 Use case on Scalable SNPN Interconnect with dynamic connections
6fd8bf2627f82827816dd131ee257054
22.848
5.1.1 Description
This use case relates only to SNPNs that provide services in a similar way as provided by WLAN hotspots. Today's PLMNs have a centralized database of IP addresses of all operator nodes that connect to the inter-PLMN IP backbone network, including AAA Servers/Proxies. This information is used for firewall and Border Gateway configuration. Signalling connections between VPLMN and HPLMN are long-lived (Diameter and HTTP-based N32f) and support bidirectional (inbound and outbound) signalling. In contrast, there is no administrative entity that manages the interconnect of SNPNs on one hand and SNPN Credential Providers on the other hand. In addition, the number of interconnected SNPNs and SNPN Credential Providers is expected to be considerably greater than the number of PLMNs today. Given the large number of SNPN Credential Providers with which a SNPN needs to interconnect, it is not feasible to maintain permanently established signalling connections between them. Instead, the signalling connection needs to be established dynamically. Ideally, a signalling connection between SNPN A and SNPN Credential Provider B should be established only when a subscriber of SNPN Credential Provider B attempts to connect to SNPN A, and should be released when the last subscriber of SNPN Credential Provider B disconnects from SNPN A. The dynamic establishment of a signalling connection between the SNPN and the SNPN Credential Provider raises several new issues, as follows: - Outbound signalling issue: The SNPN might not know the IP address of the SNPN Credential Provider’s signalling endpoints and vice versa. In some cases, the SNPN Credential Provider may be operated using a cloud provider using dynamic IP address assignment. - Inbound signalling issue: The SNPN and/or the SNPN Credential Provider may reside behind a firewall or a Network Address Translation (NAT) device. - End-to-end signalling issue: The SNPN and/or the SNPN Credential Provider need to have assurance that they are indeed establishing a signalling connection with each other, and that the signalling connection is secure. The issues related to dynamic establishment of a signalling connection between the SNPN and the SNPN Credential Provider are illustrated in Figure 5.1.1-1. Figure 5.1.1-1: Issues with dynamic establishment of signalling connection between SNPN and SNPN Credential Provider
6fd8bf2627f82827816dd131ee257054
22.848
5.1.2 Pre-conditions
1) NetAbove is an Internet service provider that operates SNPNs and serves as a SNPN Credential Provider. As part of the subscription contract, NetAbove allows its subscribers to connect to SNPNs owned by a variety of companies (e.g., hospitality and convention centres, airports, government institutions, schools, restaurants, coffee shops, etc.). 2) NetAbove serves as a SNPN Credential Provider that can authenticate and authorize its subscriber when the subscriber attempts to connect to a SNPN. 3) NetAbove does not have a direct agreement with any of these SNPNs and instead relies on a third party that assists the interconnect of entities affiliated with this third party for the purpose of subscriber authentication and authorization. 4) Kaffa Koffee has launched a chain of coffee shops across the country. Each coffee shop is equipped with a small SNPN allowing customers to access Kaffa Koffee’s private entertainment system, in addition to providing Internet access. 5) Kaffa Koffee’s customers get free access to the entertainment system on the condition that they can assert an identity that can be authenticated by a supported SNPN Credential Provider. 6) A wide variety of companies can take the role of SNPN Credential Providers (e.g., mobile operators, other SNPNs). Kaffa Koffee does not have a direct agreement with any of these SNPN Credential Providers and instead relies on a third party that assists the interconnect of entities affiliated with this third party for the purpose of subscriber authentication and authorization. 7) BananaFed is a third party that assists the interconnect of entities affiliated with this third party for the purpose of subscriber authentication and authorization. 8) NetAbove and Kaffa Koffee both are affiliated with BananaFed.
6fd8bf2627f82827816dd131ee257054
22.848
5.1.3 Service Flows
1) Roy is a subscriber of NetAbove. 2) Roy is visiting a Kaffa Koffee shop and wants to access Kaffa Koffee’s famous entertainment system using his 5G-capable laptop. 3) Using the connection manager on his laptop, Roy selects his NetAbove subscription credentials for connection to Kaffa Koffee’s SNPN. 4) Kaffa Koffee’s SNPN has no direct signalling connection with NetAbove. In order to authenticate the request coming from Roy’s laptop, Kaffa Koffee’s SNPN turns to BananaFed, a third party, for assistance. Both NetAbove and Kaffa Koffee are affiliated with BananaFed. 5) NetAbove’s SNPN Credential Provider server resides in NetAbove’s administrative IP domain and is located behind a firewall. 6) With BananaFed’s assistance, the Kaffa Koffee’s SNPN is able to forward the outbound authentication request to a SNPN Credential Provider server that is owned by NetAbove, even though Kaffa Koffee’s SNPN has no prior knowledge of the IP address of any NetAbove’s SNPN Credential Provider servers. 7) With BananaFed’s assistance, the NetAbove’s SNPN Credential Provider server is able to receive the inbound authentication request originated by Kaffa Koffee’s SNPN even though it is located behind a firewall. 8) With BananaFed’s assistance, the Kaffa Koffee’s SNPN and NetAbove’s SNPN Credential Provider server get assurance that they are establishing a secure connection with the intended remote party. 9) Kaffa Koffee’s SNPN succeeds in authenticating Roy with the SNPN Credential Provider server at NetAbove. 10) NetAbove’s SNPN Credential Provider server desires to be informed when Roy disconnects from Kaffa Koffee’s SNPN. With BananaFed’s assistance, NetAbove’s SNPN Credential Provider server is able to forward the outbound subscription request to the SNPN operated by Kaffa Koffee, even though Kaffa Koffee’s SNPN is located behind a NAT device.
6fd8bf2627f82827816dd131ee257054
22.848
5.1.4 Post-conditions
1) Once Roy’s laptop is connected to the Kaffa Koffee’s SNPN network, Roy can enjoy access to Kaffa Koffee’s entertainment system and access to the Internet. 2) After some time, Roy disconnects gracefully from Kaffa Koffee’s SNPN and the disconnection event is signalled to NetAbove’s SNPN Credential Provider server.
6fd8bf2627f82827816dd131ee257054
22.848
5.1.5 Existing features partly or fully covering the use case functionality
None. The existing interface for interconnect between SNPN and SNPN Credential Provider (aka Credentials Holder) relies on permanent signalling connection between the SNPN and the SNPN Credential Provider.
6fd8bf2627f82827816dd131ee257054
22.848
5.1.6 Potential New Requirements needed to support the use case
[PR 5.1.6-001] Based on the Standalone Non-Public Network (SNPN) configuration, the 5G system shall support a mechanism for a SNPN to be able to interconnect with a large number of SNPN Credential Providers with which the SNPN might not have preconfigured information detailing the IP addresses used by these SNPN Credential Providers to interconnect with the SNPN. [PR 5.1.6-002] Based on the Standalone Non-Public Network (SNPN) configuration, the 5G system shall support a mechanism for a SNPN Credential Provider to be able to interconnect with a large number of Standalone Non-Public Networks (SNPNs) with which the SNPN Credential Provider might not have preconfigured information detailing the IP addresses used by these SNPNs to interconnect with the SNPN Credential Provider. [PR 5.1.6-003] Based on the Standalone Non-Public Network (SNPN) configuration, the 5G system shall support a mechanism for a SNPN to be able to determine how to connect to a SNPN Credential Provider capable of verifying the identity presented by a user attempting to connect to that SNPN. [PR 5.1.6-004] Based on the Standalone Non-Public Network (SNPN) configuration, the 5G system shall support a mechanism for a SNPN to be able to securely interconnect with a SNPN Credential Provider in deployments where the required security information is not preconfigured. [PR 5.1.6-005] Based on the Standalone Non-Public Network (SNPN) configuration, the 5G system shall support a mechanism for a SNPN to enable a SNPN Credential Provider to securely notify events (e.g., a user’s subscription ending) to the Standalone Non-Public Network (SNPN).
6fd8bf2627f82827816dd131ee257054
22.848
5.2 Use case on Interconnect between SNPNs
6fd8bf2627f82827816dd131ee257054
22.848
5.2.1 Description
SNPNs are expected to be deployed in government offices, banks, hotels, hospitals, schools, etc. in an administrative area. Each SNPN exposes its localized services. Interconnect between different SNPN, subject to appropriate agreements, can make access to localized services seamless. Namely, when SNPNs, deployed by different administrations, are interconnected with each other and their services exposed, local services of one SNPN can be accessed via the other SNPNs. For example, a medical service, instantiated on a SNPN deployed in a central hospital, can be exposed to distributed family clinics. Also, an identity created in a family clinic can be utilized at the central hospital. A benefit of the interconnect between SNPN can also be seen when a disaster happens, where PLMN-based service become unavailable due to congestion caused by the disaster in the area. On the other hand, as SNPNs are basically isolated from the PLMNs, the SNPNs are not impacted by the congestion in the PLMNs. This is, for example, good for city governments because the city government can keep their public services over the interconnected SNPNs. In the context of interconnected SNPNs, identity providers authenticate individual users in SNPNs and authorize them to consume services on the SNPNs. Figure 5.2.1-1: Interconnect between SNPNs Assume that multiple SNPNs, for example, SNPN-1, SNPN-2 and SNPN-3, are deployed at different places. In Figure 5.2.1-2, SNPN-1 is the central SNPN and SNPN-2 and SNPN-3 are branches. It is also expected that there is a backbone/transport network to provide interconnectivity among SNPN-1, SNPN-2 and SNPN-3. The backbone network could be a public network (e.g. The internet) or a private/ managed network (e.g. enterprise network owning the SNPNs). Figure 5.2.1-2: Overview of interconnect Following interconnectivity can be considered but the list is not exhaustive. 1. Point-to-point interconnectivity that connects a point with another point. 2. Hub & Spoke interconnectivity that connects a root point with other leaf points. 3. Gateway interconnectivity that connects multiple points with other multiple points with a full mesh topology In a case where a pair of point-to-point interconnectivity in Figure 5.2.1-3 is deployed between SNPN-1 and SNPN-2 and between SNPN-2 and SNPN-3, the interconnectivity has 6 interconnectivity endpoints. Each of SNPN-1, SNPN-2 and SNPN-3 uses 2 interconnectivity endpoints to reach to other SNPNs. As for a traffic destined from a SNPN to another SNPN, each SNPN should manage which route is reached to another a SNPN (e.g. EP12 hosting SNPN-1 supports a point-to-point connectivity to EP21 hosting SNPN-2). Figure 5.2.1-3: point-to-point connectivity In a case where hub & spoke interconnectivity in Figure 5.2.1-4 is deployed among SNPN-1, SNPN-2 and SNPN-3, internal traffic among interconnectivity endpoints transferred via the root endpoint. For example, a central hospital provides SNPN-1, whereas family clinics #2 and #3 are consumers of SNPN-2 and SNPN-3, respectively. As assumed that SNPN-1 is the central SNPN, SNPN-1 can also provide identity services. For example, the internal traffic from EP-3L hosting SNPN-3 is transferred to SNPN-1 via EP-1R and then SNPN-1 routes the traffic from EP-1R to EP-2L hosting SNPN-2. It should be noted that an identity provider service could also be located in the external data network connecting to SNPN-1. Figure 5.2.1-4: Hub & spoke connectivity In a case where gateway interconnectivity in Figure 5.2.1-5 is deployed among SNPN-1, SNPN-2 and SNPN-3, internal traffic among interconnectivity endpoints transferred between each interconnectivity endpoint. Each SNPN can communicate with each other via the gateway interconnect service. For example, services such as an identity provider service could directly be interfaced with the interconnectivity. In this case, the identity provider service can seamlessly be consumed via any SNPNs and an identity assigned with a user can be authenticated and authorized in any SNPN. Figure 5.2.1-5: Gateway connectivity An interconnectivity (e.g. point-to-point, hub & spoke, gateway, etc.) is, for example, designed by a producer of the interconnect. The interconnect describes a collection of interconnectivity endpoints and how to access to the interconnectivity endpoints from SNPN-1, SNPN-2 and SNPN-3. In general, the interconnect information is provided by a producer to consumers. For example, there is a case where the backbone network operator is a producer of the interconnect and SNPN-1, SNPN-2 and SNPN-3 are consumers. In another case, SNPN-1 is a producer of the interconnect and SNPN-2 and SNPN-3 are consumers. The interconnect information may be exchanged between the producer and consumers.
6fd8bf2627f82827816dd131ee257054
22.848
5.2.2 Pre-conditions
It is assumed that a hub & spoke model is deployed in a central hospital and family clinics for this service flow. SNPN-1 is the root, deployed in central hospital and SNPN-2 and SNPN-3 are leaves, deployed in family clinics #2 and #3, respectively. SNPN-1, SNPN-2 and SNPN-3 are connected to the backbone network and they are at least IP reachable with each other. As such, this use case discusses a case of managed interconnect between different SNPNs.
6fd8bf2627f82827816dd131ee257054
22.848
5.2.3 Service Flows
1. An interconnect for a hub & spoke model is designed by a producer of SNPN-1, deployed in the central hospital. The interconnect describes a collection of interconnectivity endpoints for the root and branches and how to access to the interconnectivity endpoints from SNPN-1, SNPN-2 and SNPN-3. 2. The interconnect provided by SNPN-1 to SNPNs deployed in the family clinics, i.e. SNPN-2 and SNPN-3. 3. The management system of SNPN-1 selects an endpoint within 5GS of SNPN-1 to an interconnectivity endpoint (root) and then prepares an access link to the interconnectivity endpoint. 4. The management system of SNPN-2 selects an endpoint within 5GS of SNPN-2 to an interconnectivity endpoint (leaf) and then prepares an access link to the interconnectivity endpoint. 5. The management system of SNPN-3 selects an endpoint within 5GS of SNPN-3 to an interconnectivity endpoint (leaf) and then prepares an access link to the interconnectivity endpoint.
6fd8bf2627f82827816dd131ee257054
22.848
5.2.4 Post-conditions
The interconnect between SNPN-1, SNPN-2 and SNPN-3 is realised using the selected topology model and 5GS endpoints, and then the SNPNs can exchange data.
6fd8bf2627f82827816dd131ee257054
22.848
5.2.5 Existing features partly or fully covering the use case functionality
Further existing features that partly or fully cover the use case functionality are FFS.
6fd8bf2627f82827816dd131ee257054
22.848
5.2.6 Potential New Requirements needed to support the use case
[PR 5.2.6-001] Subject to SNPNs operators’ agreement, the 5G system shall be able to support mechanisms to enable interconnect between standalone non-public networks. [PR 5.2.6-002] Subject to SNPNs operators’ agreement, the 5G system shall be able to support mechanisms for a selection of 5GS endpoints for SNPNs’ interconnect.
6fd8bf2627f82827816dd131ee257054
22.848
5.3 Use case on interconnection of standalone naval non-public networks
6fd8bf2627f82827816dd131ee257054
22.848
5.3.1 Description
This use case deals with self-organizing, broadband, low latency, connectivity solutions between ships in a fleet. It can apply to different sectors including military, coast guard fleet, or fleet of fishing vessels… in short to any situation where intra-fleet communication and coordination is needed. In this use case, 5G systems are deployed on each ship within a fleet, where each system is a fully autonomous communication network enabling inter-ship and intra-ship communication. All vessels in the fleet eventually form a group of 5G standalone non-public networks connected altogether in an inherently variable topology. An example of such an interconnected group of standalone non-public networks is depicted on the Figure 5.3.1-1 below: Figure 5.3.1-1: Example of interconnected group of standalone non-public networks All standalone non-public networks are interconnected together through wireless links, preferably 5G links operating in the same frequency band as the 5G radio links connecting the terminals and the SNPNs (access network). In addition, as the group of interconnected SNPNs can be deployed in operation theatres, or in difficult sea conditions, it is important that its capacity be preserved even in the event of the loss of one or more vessels. Each SNPN in the fleet can both be connected to the other ships through wireless links and offers connectivity in the immediate proximity of the ship where it is deployed. A user on a ship can consume any of the services hosted by the other vessels composing the fleet. This system will finally have the following characteristics: - Average size of targeted fleets: 5 or 6 ships - Self-organized group of SNPNs with interconnection links established dynamically and according to the position of the ships in relation to each other’s and the quality of the radio links - Dynamic routing according to the quality of access and interconnection links - Full-duplex communication between ships - Mobility of terminals from one ship (one SNPN) to another (another SNPN) without loss of communication - Differentiated quality of service management - Very high resilience, the connectivity between the set of SNPNs must remain operational during ship engagements, regardless of sea conditions and number of remaining vessels. - Performances: - 40 km range in line of sight for the interconnection links - 1-10 Mbit/s in 5MHz bandwidth - Latency << 100ms
6fd8bf2627f82827816dd131ee257054
22.848
5.3.2 Pre-conditions
User A terminal is loaded with a USIM that is registered to SNPN A. SNPN A has local coverage on-board ship A and SNPN B has coverage on-board ship B. Service B is offered by an application B instantiated on ship B. Application B has 5G connectivity through SNPN B. User A has needed credentials to access service B.
6fd8bf2627f82827816dd131ee257054
22.848
5.3.3 Service Flows
1) User A on-board ship A and attached to the on-board SNPN A establishes a PDU session to access service B. 2) In the process of establishing the PDU session, the 5G system identifies that communication with service B shall be routed from SNPN A to SNPN B through SNPN D to fulfil the quality of service required by service B. The 5G system configures all resources on this path according to service B quality of service requirements. 3) Later on, ships have moved relatively from each other’s, based on metrics collected on the wireless interconnection links, the 5G system now identifies that the communication with service B shall be routed through SNPN C. The call is handed over to the new path without the user A even noticing it. 4) Later on, unfortunately, SNPN C is no more available (or goes out of reach) and is replaced by a helicopter embedding an ad hoc SNPN. As part of a discovery process, the new SNPN in the helicopter identifies and authenticates itself to those SNPNs in range. The new route now comprising the SNPN on board the helicopter is evaluated against quality of service requirements and eventually selected by the 5G system for user A PDU session. 5) Meanwhile, while the helicopter is being launched, the 5G system realizes that the communication path using SNPN C is no more available and, as a result, User A communication to service B is reconfigured to the initial communication path through SNPN D. The communication is experiencing quality issues until the communication path is switched over to the one involving the SNPN on board the helicopter. 6) The communication with service B is terminated by user A and all resources used for the communication between SNPN A and SNPN B are released.
6fd8bf2627f82827816dd131ee257054
22.848
5.3.4 Post-conditions
User A is attached to SNPN A.
6fd8bf2627f82827816dd131ee257054
22.848
5.3.5 Existing features partly or fully covering the use case functionality
None
6fd8bf2627f82827816dd131ee257054
22.848
5.3.6 Potential New Requirements needed to support the use case
[PR 5.3.6-001] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall be able to support interconnect of standalone non-public networks through links established on a temporary basis forming a group of interconnected Standalone Non-Public Networks with a variable topology. [PR 5.3.6-002] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall be able to support routing of user data through interconnected Standalone Non-Public Networks. [PR 5.3.6-003] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall be able to support discovery, addition and authentication, or detachment of Standalone Non-Public Networks in a group of interconnected Standalone Non-Public Networks. [PR 5.3.6-004] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall be able to support per UE communication, the establishment, reconfiguration and release of user data transmission path between two Standalone Non-Public Networks in a group of interconnected Standalone Non-Public Networks. [PR 5.3.6-005] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall be able to support a user subscribed to one Standalone Non-Public Network to consume a service offered by another Standalone Non-Public Network in a group of interconnected Standalone Non-Public Networks. [PR 5.3.6-006] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall be able to support a mechanism to exploit interconnection links metrics (e.g. jitter, latency, packet loss, capacity) as a criterion to select a suitable route between two distant Standalone Non-Public Networks in a group of interconnected Standalone Non-Public Networks.
6fd8bf2627f82827816dd131ee257054
22.848
5.4 Use case on mobility in a group of interconnected standalone naval non-public networks
6fd8bf2627f82827816dd131ee257054
22.848
5.4.1 Description
This use case deals with self-organizing, broadband, low latency, connectivity solution between ships in a fleet. It is an extension of the use case 5.3 on interconnection of standalone naval non-public networks. This network architecture, unusual in the world of public cellular networks, will however have to support all the mobility functions supported by terrestrial networks. In particular, a terminal will have to be able to move freely from one vessel to another, either in standby or while being actively involved in a communication. This movement should not be perceptible to the user. The situation described in this use case is depicted on the Figure 5.4.1-1 below: Figure 5.4.1-1: Example of mobility in a group of interconnected standalone naval non-public networks
6fd8bf2627f82827816dd131ee257054
22.848
5.4.2 Pre-conditions
User A terminal is loaded with a USIM that is registered to SNPN A. SNPA A has local coverage on-board ship A and SNPN B has coverage on-board ship B. Service B is offered by an application B hosted on ship B. Application B has 5G connectivity through SNPN B. User A has needed credentials to access service B.
6fd8bf2627f82827816dd131ee257054
22.848
5.4.3 Service Flows
1) User A on-board ship A and attached to the on-board SNPN A establishes a PDU session to access service B. 2) User A takes a speed boat, equipped with necessary communication equipment to deploy locally SNPN around the speed boat and to enable connectivity with any vessels in the fleet through wireless links. Once it is deployed, the on-board SNPN selects the SNPNs in range, identifies and authenticates itself to those SNPNs. The SNPN on board the speed boat is then added in the group of interconnected SNPNs through wireless links. 3) As the speed boat moves away from ship A, radio measurements made by user A terminal trigger the 5G system to handover the ongoing communication from SNPN A to the SNPN on-board the speed boat. 4) At this point, user A terminal, although under radio coverage of the SNPN in the speed boat, keeps consuming service B through a communication path made of speed boat SNPN + SNPN A + SNPN D + SNPN B. 5) Somewhere along the path from ship A to ship B, as radio conditions on the 5G link to ship A worsen and as the speedboat approaches ship D, the SNPN on-board the speed boat selects SNPN D as a new anchoring point to the group of interconnected standalone non-public networks. Based on the new resulting topology, the 5G system then seamlessly reconfigures the communication path from user A’s UE to service B so that it can still continue to fulfil QoS required by service B. The communication path is now made of speed boat SNPN + SNPN D + SNPN B. 6) Later on, as the speedboat approaches ship B, the on-board SNPN directly connects to SNPN B in the same anchoring point selection and communication path switching process as previously described to reduce communication latency. 7) From the point in time user A gets on board the speedboat and gets to ship B, his communication with service B is maintained. There is no noticeable alteration of the communication along the path from ship A to ship B. 8) When user A arrives at his destination on ship B, his communication is seamlessly handed over from the SNPN on-board the speedboat to one of the cells on SNPN B. Once connected to SNPN B, he can still access to service B and other local services according to authorizations he’s entrusted with.
6fd8bf2627f82827816dd131ee257054
22.848
5.4.4 Post-conditions
User A is attached to SNPN B and still in communication with service B.
6fd8bf2627f82827816dd131ee257054
22.848
5.4.5 Existing features partly or fully covering the use case functionality
None
6fd8bf2627f82827816dd131ee257054
22.848
5.4.6 Potential New Requirements needed to support the use case
[PR 5.4.6-001] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall be able to support discovery, addition and authentication, or detachment of Standalone Non-Public Networks in a group of interconnected Standalone Non-Public Networks without interrupting ongoing communications. [PR 5.4.6-002] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall be able to support service continuity of UE communications between interconnected Standalone Non-Public Networks with overlapping radio coverage. [PR 5.4.6-003] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall enable packet loss to be minimized during mobility of a UE between interconnected Standalone Non-Public Networks with overlapping radio coverage for some or all connections associated with this UE. [PR 5.4.6-004] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall minimize communication service interruption time during mobility of a UE between interconnected Standalone Non-Public Networks with overlapping radio coverage for some or all connections associated with this UE.
6fd8bf2627f82827816dd131ee257054
22.848
5.5 Use case on quality of service differentiation and resource prioritization in a group of interconnected standalone naval non-public networks
6fd8bf2627f82827816dd131ee257054
22.848
5.5.1 Description
This use case deals with self-organizing, broadband, low latency, connectivity solution between ships in a fleet. It is an extension of the use case 5.3 on interconnection of standalone naval non-public networks. In this use case, several users located on different ships are involved in a real time mission critical communication while the interconnection links between the Standalone Non-Public Networks inside the group of interconnected Standalone Non-Public Networks experiences heavy load. The situation described in this use case is depicted on the Figure 5.5.1-1 below: Figure 5.5.1-1: Example of critical communication in a group of interconnected standalone naval non-public networks
6fd8bf2627f82827816dd131ee257054
22.848
5.5.2 Pre-conditions
All User Equipment are loaded with a USIM and are registered to their local SNPN. A MCX service is available onboard ship A (called MCX A in the following section) All users involved in the use case have needed credentials to access MCX A service.
6fd8bf2627f82827816dd131ee257054
22.848
5.5.3 Service Flows
1) User A requests a real time video streaming involving a MCX server located onboard ship A to users B and D respectively located on ship B and D. 2) If the requested quality of service can be reached, users A, B, D on-board ships A, B, D, and attached to the on-board SNPNs A, B, D, can establish a PDU session to access the video streaming service provided by the MCX server on ship A. 3) While establishing the user B’s PDU session, the 5G system identifies that communication shall be routed from SNPN A to SNPN B through SNPN C to fulfil the quality of service required by the MCX service A. The 5G system configures all resources on this path according to MCX service A’s quality of service requirements. 4) While establishing the user D’s PDU session, the 5G system identifies that communication can be directly routed from SNPN A to SNPN D. The 5G system configures all resources on this path according to MCX service A’s quality of service requirements. 5) At this point in time, users A, B, D consume the real time video service hosted by the MCX server A and the 5G system constantly monitors the achieved end to end quality of service with regards to the application known requirements. 6) The delivered end to end quality of service changes (due to e.g. path loss increase on the interconnection links), thus triggering a notification from the 5G system to the MCX application which decides to lower the video resolution to match the end to end connection capacity and maintain an acceptable experience for the users. 7) Meanwhile, lower priority communications are setup inside the fleet and start to heavily load all the interconnection links. 8) The 5G system ensure that the critical video streaming communication between users A, B, D has higher priority related to the other ongoing data exchanges which results in user A, B, D continuing experiencing a good quality MCX service A.
6fd8bf2627f82827816dd131ee257054
22.848
5.5.4 Post-conditions
Users A, B, D are attached to SNPN A, B, D and still in communication with MCX service A.
6fd8bf2627f82827816dd131ee257054
22.848
5.5.5 Existing features partly or fully covering the use case functionality
None
6fd8bf2627f82827816dd131ee257054
22.848
5.5.6 Potential New Requirements needed to support the use case
[PR 5.5.6-001] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall be able to support prioritization of resources for a service offered by a Standalone Non-Public Network that is consumed by users attached to other interconnected Standalone Non-Public Networks. [PR 5.5.6-002] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall enable a SNPN to monitor the currently delivered end to end QoS for a service hosted by this SNPN and consumed by one or several users attached to other Standalone Non-Public Networks inside a group of interconnected Standalone Non-Public Networks. [PR 5.5.6-003] Based on SNPN configuration and subject to SNPN operator’s policy, the 5G system shall be able to provide event notification upon detecting that the requested end to end QoS level cannot be met for a service hosted by this SNPN and consumed by one or several users attached to other Standalone Non-Public Networks inside a group of interconnected Standalone Non-Public Networks.
6fd8bf2627f82827816dd131ee257054
22.848
6 Consolidated requirements
6fd8bf2627f82827816dd131ee257054
22.848
6.1 Groups of interconnected SNPNs
The potential requirements for enabling groups of interconnected SNPNs correspond to the use cases in clauses 5.2 to 5.5 and are listed in Table 6.1-1. A group of interconnected SNPNs consists of one or more pairs of interconnected SNPNs. The determination of whether a given SNPN can or should be able to participate within a given group of interconnected SNPNs is based on prior arrangement and out of band configuration. How these arrangements and configuration are made is outside the scope of 3GPP and the 5G network. Table 6.1-1 – Consolidated Requirements for groups of interconnected SNPNs CPR # Consolidated Potential Requirement Original PR # Comment CPR 6.1-1 Based on SNPN configuration and subject to SNPN operator's policy, the 5G network shall be able to support mechanisms to enable interconnect between two or more SNPNs NOTE: The interconnect can be established on temporary basis forming a group of interconnected SNPNs with variable topologies. [PR 5.2.6-001] [PR 5.2.6-002] [PR 5.3.6-002] [PR 5.3.6-001] [PR 5.3.6-003] CPR 6.1-2 Based on SNPN configuration and subject to SNPN operator’s policy, the 5G network shall be able to support prioritization of resources for a service offered by a SNPN that is consumed by users attached to other interconnected SNPNs [PR 5.5.6-001] CPR 6.1-3 Based on SNPN configuration and subject to SNPN operator’s policy, the 5G network shall be able to support service continuity for UEs that are moving between interconnected SNPNs NOTE: It is assumed the interconnected SNPNs have overlapping radio coverage [PR 5.4.6-002] [PR 5.4.6-003] [PR 5.4.6-004]
6fd8bf2627f82827816dd131ee257054
22.848
6.2 Consolidated requirements for enabling of SNPN cellular hotspots
The potential requirements for enabling of SNPN cellular hotspots correspond to the use case in clause 5.1 (Scalable SNPN Interconnect with dynamic connections) and are listed in Table 6.2-1. The requirements for SNPN cellular hotspots are intended to enable support of connectivity hotspots based on 3GPP 5G network that provide services in a similar way as provided by WLAN hotspots. Charging requirements are considered out of scope for this functionality. Table 6.2-1 – Consolidated requirements for enabling of SNPN cellular hotspots CPR # Consolidated Potential Requirement Original PR # Comment CPR 6.2-1 Based on the Standalone Non-Public Network (SNPN) configuration, the 5G network shall support a mechanism for an SNPN to be able to interconnect with a large number of SNPN Credential Providers with which the SNPN might not have preconfigured information detailing the IP addresses used by these SNPN Credential Providers to interconnect with the SNPN. [PR 5.1.6-001] Scalability CPR 6.2-2 Based on the Standalone Non-Public Network (SNPN) configuration, the 5G network shall support a mechanism for an SNPN Credential Provider to be able to interconnect with a large number of Standalone Non-Public Networks (SNPNs) with which the SNPN Credential Provider might not have preconfigured information detailing the IP addresses used by these SNPNs to interconnect with the SNPN Credential Provider. [PR 5.1.6-002] Scalability CPR 6.2-3 Based on the Standalone Non-Public Network (SNPN) configuration, the 5G network shall support a mechanism for an SNPN to be able to determine how to connect to an SNPN Credential Provider capable of verifying the identity presented by a user attempting to connect to that SNPN. [PR 5.1.6-003] CPR 6.2-4 Based on the Standalone Non-Public Network (SNPN) configuration, the 5G network shall support a mechanism for an SNPN to be able to securely interconnect with an SNPN Credential Provider in deployments where the required security information is not preconfigured. [PR 5.1.6-004] Security CPR 6.2-5 Based on the Standalone Non-Public Network (SNPN) configuration, the 5G network shall support a mechanism for an SNPN to enable an SNPN Credential Provider to securely notify events (e.g., a user’s subscription ending) to the Standalone Non-Public Network (SNPN). [PR 5.1.6-005] Security
6fd8bf2627f82827816dd131ee257054
22.848
7 Conclusions and recommendations
This technical report identifies several use cases and potential new requirements related to the interconnect of SNPNs with two aspects: - Groups of interconnected SNPNs - Enabling of SNPN cellular hotspots (Scalable SNPN Interconnect with dynamic connections) The resulting service requirements have been consolidated in clause 6. It is recommended to consider the consolidated requirements identified in this TR as the baseline for the subsequent normative work. Annex A (informative): Change history Change history Date Meeting TDoc CR Rev Cat Subject/Comment New version 2023-05 SA1#102 S1-231156 TR skeleton 0.0.0 2023-05 SA1#102 S1-231343 Inclusion of agreed pCRs: S1-231157, S1-231500, S1-231775, S1-231637, S1-231628, S1-231636 0.1.0 2023-08 SA1#103 S1-232598 Inclusion of agreed pCRs: S1-232461, S1-232639, S1-232466, S1-232467, S1-232459 0.2.0 2023-11 SA1#104 S1-233263 Inclusion of agreed pCRs: S1-233480 0.3.0 2024-03 SA1#105 S1-240314 Inclusion of agreed pCRs: S1-240129, S1-240226, S1-240281 0.4.0 2024-03 SA#103 SP-240193 MCC clean-up for presentation for one-step approval 1.0.0 2024-03 SA#103 SP-240193 Raised to v.19.0.0 following one-step approval at SA#103 19.0.0
30577dbcedb3290f42b3a55986900ea7
22.850
1 Scope
This study will investigate ongoing AI/ML work in TSG CT, TSG RAN and TSG SA Working Groups and identify instances of any potential misalignment and/or inconsistencies and provide information on any potential outcome to the respective WGs to resolve any issues with appropriate SA-level co-ordination as necessary. The study is led by TSG SA in close collaboration and inputs from TSG CT and TSG RAN. NOTE: The study item does not impact ongoing studies and normative work for AI/ML across all SA/RAN/CT WGs for Rel-19.
30577dbcedb3290f42b3a55986900ea7
22.850
2 References
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. - References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific. - For a specific reference, subsequent revisions do not apply. - For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. [1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications". [2] 3GPP TR 21.918: "Summary of Rel-18 Work Items". [3] 3GPP TR 38.843: "Study on Artificial Intelligence (AI)/Machine Learning (ML) for NR air interface (Release 18)". [4] 3GPP TR 23.700‑84: "Study on Core Network Enhanced Support for Artificial Intelligence (AI) / Machine Learning (ML)". [5] 3GPP TR 22.874: "5G System (5GS); Study on traffic characteristics and performance requirements for AI/ML model transfer". [6] 3GPP TS 22.261: "Service requirements for the 5G system". [7] 3GPP TR 23.700‑82: "Study on application layer support for AI/ML services". [8] 3GPP TS 23.288: "Architecture enhancements for 5G System (5GS) to support network data analytics services". [9] 3GPP TS 28.105: "Management and orchestration; Artificial Intelligence/ Machine Learning (AI/ML) management". [10] Void. [11] 3GPP TS 38.300: "NR; NR and NG-RAN Overall description; Stage-2". [12] 3GPP TR 26.927: "Study on Artificial Intelligence and Machine learning in 5G media services". [13] 3GPP TS 38.401: "NG-RAN; Architecture description". [14] 3GPP TS 38.420: "NG-RAN; Xn general aspects and principles". [15] 3GPP TS 38.423: "NG-RAN; Xn Application Protocol (XnAP)". [16] 3GPP TS 23.273: "5G System (5GS) Location Services (LCS); Stage 2". [17] 3GPP TR 37.817: "Study on enhancement for data collection for NR and ENDC". [18] 3GPP TR 28.908: "Study on Artificial Intelligence/Machine Learning (AI/ ML) management". [19] 3GPP TR 28.858: "Study on Artificial Intelligence / Machine Learning (AI/ML) management; Phase 2". [20] 3GPP TR 29.889: "Study on Protocol for AI Data Collection from UPF". [21] 3GPP TR 22.876: "Study on AI/ML Model Transfer; Phase 2". [22] 3GPP TS 23.501: "System architecture for the 5G System (5GS)". [23] 3GPP TS 23.502: "Procedures for the 5G System (5GS)". [24] 3GPP TS 23.503: "Policy and charging control framework for the 5G System (5GS); Stage 2". [25] 3GPP TR 33.784: "Study on security aspects of core network enhanced support for Artificial Intelligence Machine Learning (AIML)". [26] 3GPP TR 26.847: "Evaluation of Artificial Intelligence and Machine learning in 5G media services". [27] 3GPP TS 28.552: "Management and orchestration; 5G performance measurements". [28] 3GPP TS 32.425: "Telecommunication management; Performance Management (PM); Performance measurements Evolved Universal Terrestrial Radio Access Network (E-UTRAN)". [29] 3GPP TS 28.554: "Management and orchestration; 5G end to end Key Performance Indicators (KPI)". [30] 3GPP TS 28.541: "Management and orchestration; 5G Network Resource Model (NRM); Stage 2 and stage 3". [31] 3GPP TS 32.254: "Telecommunication management; Charging management; Exposure function Northbound Application Program Interfaces (APIs) charging". [32] 3GPP TS 32.291: "Telecommunication management; Charging management; 5G system, charging service; Stage 3". [33] 3GPP TS 23.436: "Functional architecture and information flows for Application Data Analytics Enablement Service". [34] 3GPP TS 23.482: "Functional architecture and information flows for AIML Enablement Service". [35] 3GPP TS 23.434: "Service Enabler Architecture Layer for Verticals (SEAL); Functional architecture and information flows". [36] 3GPP TS 23.558: "Architecture for enabling Edge Applications". [37] 3GPP TS 29.122: "T8 reference point for Northbound APIs". [38] 3GPP TS 29.513: "5G System; Policy and Charging Control signalling flows and QoS parameter mapping; Stage 3". [39] 3GPP TS 29.514: "5G System; Policy Authorization Service; Stage 3". [40] 3GPP TS 29.517: "5G System; Application Function Event Exposure Service; Stage 3". [41] 3GPP TS 29.591: "5G System; Network Exposure Function Southbound Services; Stage 3". [42] 3GPP TS 29.519: "5G System; Usage of the Unified Data Repository Service for Policy Data, Application Data and Structured Data for Exposure; Stage 3". [43] 3GPP TS 29.520: "5G System; Network Data Analytics Services; Stage 3". [44] 3GPP TS 29.521: "5G System; Binding Support Management Service; Stage 3". [45] 3GPP TS 29.522: "5G System; Network Exposure Function Northbound APIs; Stage 3". [46] 3GPP TS 29.523: "5G System; Policy Control Event Exposure Service; Stage 3". [47] 3GPP TS 29.525: "5G System; UE Policy Control Service; Stage 3". [48] 3GPP TS 29.508: "5G System; Session Management Event Exposure Service; Stage 3". [49] 3GPP TS 29.551: "5G System; Packet Flow Description Management Service; Stage 3". [50] 3GPP TS 29.552: "5G System; Network Data Analytics signalling flows; Stage 3". [51] 3GPP TS 29.574: "5G System; Data Collection Coordination Services; Stage 3". [52] 3GPP TS 29.575: "5G System; Analytics Data Repository Services; Stage 3". [53] 3GPP TS 29.576: "5G System; Messaging Framework Adaptor Services; Stage 3". [54] 3GPP TS 29.503: "5G System; Unified Data Management Services; Stage 3". [55] 3GPP TS 29.504: "5G System; Unified Data Repository Services; Stage 3". [56] 3GPP TS 29.505: "5G System; Usage of the Unified Data Repository services for Subscription Data; Stage 3". [57] 3GPP TS 29.510: "5G System; Network function repository services; Stage 3". [58] 3GPP TS 29.564: "5G System; User Plane Function Services; Stage 3". [59] 3GPP TS 29.518: "5G System; Access and Mobility Management Services; Stage 3". [60] 3GPP TS 29.536: "5G System; Network Slice Admission Control Services; Stage 3". [61] 3GPP TS 29.571: "5G System; Common Data Types for Service Based Interfaces; Stage 3". [62] 3GPP TS 38.214: "NR; Physical layer procedures for data". [63] 3GPP TS 38.215: "NR; Physical layer measurements". [64] 3GPP TS 38.331: "NR; Radio Resource Control (RRC); Protocol specification". [65] 3GPP TS 38.305: "NG Radio Access Network (NG-RAN); Stage 2 functional specification of User Equipment (UE) positioning in NG-RAN". [66] 3GPP TS 37.355: "LTE Positioning Protocol (LPP)". [67] 3GPP TS 38.455: "NG-RAN; NR Positioning Protocol A (NRPPa)". [68] 3GPP TS 38.133: "NR; Requirements for support of radio resource management". [69] 3GPP TR 38.743: "Study on enhancements for Artificial Intelligence (AI)/Machine Learning (ML) for NG-RAN". [70] 3GPP TR 38.744: "Study on Artificial Intelligence (AI)/Machine Learning (ML) for mobility in NR". [71] 3GPP TS 28.104: "Management Data Analytics (MDA)". [72] 3GPP TS 28.622: "Generic Network Resource Model (NRM) Integration Reference Point (IRP); Information Service (IS)". [73] 3GPP TR 28.871: "Study on Service Based Management Architecture enhancement phase 3". [74] 3GPP TR 26.531: "Data Collection and Reporting; General Description and Architecture". [75] 3GPP TS 24.559: "Application Data Analytics Enablement Services (ADAES); Stage 3". [76] 3GPP TS 24.560: "Artificial Intelligence Machine Learning (AIML) Services - Service Enabler Architecture Layer for Verticals (SEAL); Protocol Specification; Stage 3". [77] 3GPP TS 29.482: "Service Enabler Architecture Layer for Verticals (SEAL); Artificial Intelligence Machine Learning Enablement (AIMLE) Services; Stage 3". [78] 3GPP TS 29.549: "Service Enabler Architecture Layer for Verticals (SEAL); Application Programming Interface (API) specification; Stage 3". [79] 3GPP TS 29.558: "Enabling Edge Applications; Application Programming Interface (API) specification; Stage 3". [80] 3GPP TS 24.080: "Mobile radio interface layer 3 Supplementary services specification; Formats and coding". [81] 3GPP TS 29.570: "5G System; Service Communication Proxy Services Stage 3". [82] 3GPP TS 29.572: "5G System; Location Management Services; Stage 3". [83] 3GPP TS 37.340: "Evolved Universal Terrestrial Radio Access (E-UTRA) and NR; Multi-connectivity; Overall Description; Stage 2". [84] 3GPP TS 37.480: "E1 general aspects and principles". [85] 3GPP TS 37.483: "E1 Application Protocol (E1AP)". [86] 3GPP TS 38.470: "NG-RAN; F1 general aspects and principles". [87] 3GPP TS 38.473: "NG-RAN; F1 Application Protocol (F1AP)".
30577dbcedb3290f42b3a55986900ea7
22.850
3 Definitions of terms and abbreviations
30577dbcedb3290f42b3a55986900ea7
22.850
3.1 Terms
For the purposes of the present document, the terms given in TR 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905 [1]. example: text used to clarify abstract rules by applying them literally.
30577dbcedb3290f42b3a55986900ea7
22.850
3.2 Abbreviations
For the purposes of the present document, the abbreviations given in TR 21.905 [1] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905 [1]. <ABBREVIATION> <Expansion>
30577dbcedb3290f42b3a55986900ea7
22.850
4 Background
In Rel-18 and Rel-19, most working groups in TSG SA, TSG CT and TSG RAN have already performed SIs and/or have WIs relating to the AI/ML topic. These activities address different usage scenarios and associated specific use cases exploiting AI/ML for the operation of the 3GPP System ranging from radio interface operations (e.g. beam management, positioning), NG-RAN operations (e.g. energy saving, load balancing), 5GC operations (e.g. assistance to QoS and policy control, prevention and mitigation of signalling storms, etc.), to network management & orchestration, media services and application enablement aspects. In addition, some activities target the enhanced support of the 3GPP System for AI/ML-based applications and services which are themselves out of the scope of 3GPP. With the complexity of the 3GPP systems and its operations and that of AI/ML, it is vital that the use of AI/ML in the operation of the 3GPP system (incl. related AI/ML model LCM) for any given use case be bound to specific principles, guidelines, design criteria and requirements to safeguard the operation of the 3GPP System. This includes the capability to, e.g. fallback to non-AI/ML operation (i.e. not relying on inference process) whenever necessary not to negatively affect the NW and E2E performance. This requires, as a minimum, the introduction of a common set of definitions to prevent any inconsistencies in the definition and use of AI/ML LCM across 3GPP WGs, to identify any misalignments/inconsistencies and to communicate such inconsistencies to WGs for better alignment within 3GPP across different AI/ML related initiatives. NOTE: AI/ML models and associated algorithms are certainly implementation specific and therefore out of scope of this study.
30577dbcedb3290f42b3a55986900ea7
22.850
5 AI/ML related activities in all Working Groups
30577dbcedb3290f42b3a55986900ea7
22.850
5.1 General
This clause will investigate and identify AI/ML related activities of all working groups of Rel-18 features and Rel-19 studies and work items in TSG CT, TSG RAN and TSG SA Working Groups, as given in the list in Table 5.1-1. Table 5.1-1: List of Rel-18 work items and Rel-19 studies and work items for AI/ML activities in 3GPP working groups Unique ID Release Title Acronym Approved SID/WID TRs/TSs SA WG1 920030 Rel-18 Stage 1 of AMMT AIML_MT SP-220440 TS 22.261 [6] 950008 Rel-19 Study on AI/ML Model Transfer Phase2 FS_AIML_MT_Ph2 SP-220439 TR 22.876 [21] 1000030 Rel-19 AI/ML Model Transfer Phase 2 AIML_MT_Ph2 SP-230514 TS 22.261 [6] SA WG2 980019 Rel-18 System Support for AI/ML-based Services AIMLsys SP-231278 TS 23.501 [22] TS 23.502 [23] TS 23.503 [24] TS 23.288 [8] 980020 Rel-18 Enablers for Network Automation for 5G - phase 3 eNA_Ph3 SP-230110 TS 23.501 [22] TS 23.502 [23] TS 23.503 [24] TS 23.288 [8] 1020068 Rel-19 Study on Core Network Enhanced Support for Artificial Intelligence (AI)/Machine Learning (ML) FS_AIML_CN SP-241936 TR 23.700-84 [7] 1040033 Rel-19 Core Network Enhanced Support for Artificial Intelligence (AI)/Machine Learning (ML) AIML_CN SP-240991 TS 23.288 [8] TS 23.501 [22] TS 23.502 [23] TS 23.503 [24] TS 23.273 [16] SA WG3 990042 Rel-18 Security aspects of enablers for Network Automation for 5G - phase 3 eNA_Ph3_SEC Rel-18 SP-230155 TS 33.501 [22] 1030035 Rel-19 Study on security aspects of Core Network Enhanced Support for AIML FS_AIML_CN_SEC SP-240509 TR 33.784 [25] 1060059 Rel-19 Security aspects of Core Network Enhanced Support for AIML AIML_CN_SEC SP-241957 TS 33.501 [22] SA WG4 950011 Rel-19 (started in Rel-18) Feasibility Study on Artificial Intelligence (AI) and Machine Learning (ML) for Media FS_AI4Media SP-220328 TR 26.927 [12] TR 26.847 [26] SA WG5 990119 Rel-18 AI/ML management AIML_MGT SP-230335 TS 28.105 [9] TS 28.552 [27] TS 32.425 [28] TS 28.554 [29] TS 28.541 [30] 1020023 Rel-18 NEF Charging enhancement to support AI/ML in 5GS AIMLsysNEF_CH SP-231706 TS 32.254 [31] TS 32.291 [32] 1020007 Rel-19 Study on AI/ML management - phase 2 FS_AIML_MGT_Ph2 SP-241567 TR 28.858 [19] 1060011 Rel-19 AI/ML management - phase 2 AIML_MGT_Ph2 SP-241944 TS 28.105 [9] TS 28.552 [27] TS 28.554 [29] TS 28.541 [30] SA WG6 970036 Rel-18 Application Data Analytics Enablement Service ADAES SP-230275 TS 23.436 [33] TS 23.434 [35] TS 23.558 [36] 1010005 Rel-19 Study on application layer support for AI/ML services FS_AIMLAPP SP-231182 TR 23.700-82 [4] 1040075 Rel-19 Application enablement for AI/ML services AIML_App SP-241008 TS 23.482 [34] TS 23.436 [33] TS 23.434 [35] TS 23.558 [36] 1060068 Rel-19 Application Data Analytics Enablement Service TEI19_ADAES SP-241695 TS 23.436 [33] CT WG1 1050024 Rel-19 CT1 aspects of application enablement for AIML services AIML_App CP-243310 TS 24.559 [75] TS 24.560 [76] CT WG3 990008 Rel-18 CT WG3 aspects of System Support for AI/ML-based Services AIMLsys CP-230329 TS 29.122 [37] TS 29.513 [38] TS 29.514 [39] TS 29.517 [40] TS 29.591 [41] TS 29.519 [42] TS 29.520 [43] TS 29.521 [44] TS 29.522 [45] 990010 Rel-18 CT WG3 aspects of Enablers for Network Automation for 5G - phase 3 eNA_Ph3 CP-240079 TS 29.508 [48] TS 29.122 [37] TS 29.513 [38] TS 29.517 [40] TS 29.519 [42] TS 29.520 [43] TS 29.522 [45] TS 29.523 [46] TS 29.525 [47] TS 29.551 [49] TS 29.552 [50] TS 29.574 [51] TS 29.575 [52] TS 29.576 [53] TS 29.591 [41] 1050010 Rel-19 Rel-19 Enhancements of Network Automation Enablers eNetAE19 CP-243078 TS 29.508 [48] TS 29.517 [40] TS 29.520 [43] TS 29.522 [45] TS 29.552 [50] TS 29.574 [51] TS 29.575 [52] TS 29.576 [53] TS 29.591 [41] 1050014 Rel-19 CT3 aspects of Core Network Enhanced Support for Artificial Intelligence (AI) and Machine Learning (ML) AIML_CN CP-242247 TS 29.508 [48] TS 29.513 [38] TS 29.517 [40] TS 29.520 [43] TS 29.522 [45] TS 29.552 [50] TS 29.574 [51] TS 29.575 [52] TS 29.576 [53] TS 29.591 [41] 1050024 Rel-19 CT3 aspects of application enablement for AIML services AIML_App CP-243310 TS 29.482 [77] TS 29.549 [78] TS 29.558 [79] 1070004 Rel-19 CT3 aspects of Rel-19 Application Data Analytics Enablement Service TEI19_ADAES CP-250074 TS 29.549 [78] CT WG4 990008 Rel-18 CT WG4 aspects of AIML Rel-18 CT WG4 aspects of AI/ML CP-230329 TS 29.503 [54] TS 29.504 [55] TS 29.505 [56] TS 29.510 [57] TS 29.564 [58] 990010 Rel-18 CT WG4 aspects of Enablers for Network Automation for 5G - phase 3 eNA_Ph3 CP-240079 TS 29.503 [54] TS 29.510 [57] TS 29.518 [59] TS 29.536 [60] TS 29.564 [58] TS 29.571 [61] 1040005 Rel-19 Study on Protocol for AI Data Collection from UPF FS_PAIDC_UPF CP-241025 TR 29.889 [20] 1050014 Rel-19 CT4 aspects of Core Network Enhanced Support for Artificial Intelligence (AI) and Machine Learning (ML) AIML_CN CP-242247 TS 24.080 [80] TS 29.503 [54] TS 29.510 [57] TS 29.518 [59] TS 29.570 [81] TS 29.572 [82] RAN WG1 1020093 Rel-19 Artificial Intelligence (AI)/Machine Learning (ML) for NR air interface NR_AIML_air RP-250792 TR 38.843 [3] TS 38.300 [11] TS 38.214 [62] TS 38.215 [63] TS 38.331 [64] TS 38.305 [65] TS 37.355 [66] TS 38.455 [67] TS 38.133 [68] 1060078 Rel 19 Study on Artificial Intelligence (AI)/Machine Learning (ML) for NR air interface Phase 2 NR_AIML_air_Ph2 RP-250308 TR 38.843 [3] RAN WG2 1020084 Rel-19 Study on Artificial Intelligence (AI)/Machine Learning (ML) for mobility in NR FS_NR_AIML_Mob RP-242393 TR 38.744 [70] RAN WG3 941110 Rel-18 Artificial Intelligence (AI)/Machine Learning (ML) for NG-RAN NR_AIML_NGRAN-Core RP-233441 TS 38.300 [11] TS 38.401 [13] TS 38.420 [14] TS 38.423 [15] 1020083 Rel-19 Study on enhancements for Artificial Intelligence (AI)/Machine Learning (ML) for NG-RAN FS_NR_AIML_NGRAN_enh RP-240323 TR 38.743 [69] 1051124 Rel-19 Enhancements for Artificial Intelligence (AI)/Machine Learning (ML) for NG-RAN NR_AIML_NGRAN_enh-Core RP-250326 TS 38.300 [11] TS 38.401 [13] TS 38.420 [14] TS 38.423 [15] TS 37.340 [83] TS 37.480 [84] TS 37.483 [85] TS 38.470 [86] TS 38.473 [87] RAN WG4 1020093 Rel-19 Perf. part: Artificial Intelligence (AI)/Machine Learning (ML) for NR air interface NR_AIML_air RP-250792 TS 38.133 [68] TS 38.300 [11] TS 38.214 [62] TS 38.215 [63] TS 38.331 [64] TS 38.305 [65] TS 37.355 [66] TS 38.455 [67] Table 5.1-1 comprises 3GPP AI/ML related activities where the consumer of AI/ML models can be either the 3GPP System (including RAN, Core, OAM and Application Enablement) itself to optimize 3GPP-specified functionalities and capabilities (i.e. equivalent to the common term "AI for Network"), or the applications and services that the 3GPP System provides support for (i.e. equivalent to the common term "Network for AI"). Based on the above, the AI/ML related activities of 3GPP can be classified in the following two categories: - 'AI for Network': Work to optimize the 3GPP System performance by employing AI/ML on 3GPP-specified functionalities and capabilities. - 'Network for AI': Work to provide 3GPP System support for AI/ML-based applications and services. Illustrative examples of 3GPP activities in Table 5.1-1 falling into the category 'AI for Network' include NR_AIML_air and AIML_MGT while 'Network for AI' activities include AIMLsys and AIML_App. In addition, certain items may address both 'AI for Network' and 'Network for AI' aspects, e.g. eNA_Ph3, AIML_CN.
30577dbcedb3290f42b3a55986900ea7
22.850
5.2 AI/ML related activities in TSG SA & CT Working Groups
30577dbcedb3290f42b3a55986900ea7
22.850
5.2.1 AI/ML related terminology
30577dbcedb3290f42b3a55986900ea7
22.850
5.2.1.1 TSG SA WG2
The following definitions are provided in clause 3 of TS 23.288 [8]: - Analytics Accuracy Information: Represent a performance measure of an analytics ID provided by an NWDAF containing AnLF, which is composed of the number of correct predictions of the analytics ID out of all predictions and the corresponding number of samples. - ML Model Accuracy Information: Represent a performance measure of a ML Model provided by an NWDAF containing MTLF, which is composed of the number of correct predictions by the ML Model out of all predictions and the corresponding number of samples. - Analytics Feedback Information: Indicates that the consumer NF has taken action(s) influenced by the previously provided analytics, which may or may not affect the ground truth data. The following definitions are provided in clause 5 of TS 23.288 [8]: - Analytics logical function (AnLF): A logical function in NWDAF, which performs inference, derives analytics information (i.e. derives statistics and/or predictions based on Analytics Consumer request) and exposes analytics service i.e. Nnwdaf_AnalyticsSubscription or Nnwdaf_AnalyticsInfo. - Model Training logical function (MTLF): A logical function in NWDAF, which trains Machine Learning (ML) models and exposes new training services (e.g. providing trained ML Model) as defined in clause 7.5 and clause 7.6. The following definitions are provided in clause 3 of TR 23.700-84 [7]: - Horizontal Federated Learning (HFL): a federated learning technique without exchanging/sharing local data set, wherein the local data set in different FL clients for local model training have the same feature space for different samples (e.g. UE IDs). - Vertical Federated Learning (VFL): a federated learning technique without exchanging/sharing local data set, wherein the local data set in different VFL Participant for local model training have different feature spaces for the same samples (e.g. UE IDs). - Label: A label is the training objective in supervised machine learning. - VFL Server: An NWDAF or AF that integrates local training results, computes gradient information or loss information and send them to VFL client(s) for the local ML model update in VFL training process. It also coordinates the VFL training process by discovering and selecting VFL clients. In VFL inference process, The VFL server aggregates local inference results from VFL clients to generate the final VFL inference result and sends the final VFL inference result to the consumer. Only one VFL server may exist for each VFL process. - VFL Client: An NWDAF or AF that holds the local dataset and performs local training and inference as asked by VFL Server. There can be multiple VFL Clients in VFL training and inference. The following definitions are provided in clause 6.15 of TR 23.700-84 [7]: - VFL active participant: A VFL function that owns part of an ML model for an analytic ID and knows the labels for the ML model. The active participant is the main function for training an ML model for an analytic ID. - VFL passive participant: A VFL function that owns part of an ML model for an analytic ID but does not know the labels of the ML model but is able to collect local data for one or more features.
30577dbcedb3290f42b3a55986900ea7
22.850
5.2.1.2 TSG SA WG5
The following definitions are provided in clause 3 of TS 28.105 [9]: - ML model: a manageable representation of an ML model algorithm. NOTE 1: An ML model algorithm is a mathematical algorithm through which running a set of input data can generate a set of inference output. NOTE 2: An ML model algorithm is proprietary and not in scope for standardization and therefore not treated in this specification. NOTE 3: An ML model may include metadata. Metadata may include e.g. information related to the trained model and applicable runtime context. - ML model training: a process performed by an ML training function to take training data, run it through an ML model algorithm, derive the associated loss and adjust the parameterization of that ML model iteratively based on the computed loss and generate the trained ML model. - ML model initial training: a process of training an initial version of an ML model. - ML model re-training: a process of training a previous version of an ML model and generate a new version. NOTE 4: A new version of a trained ML model supports the same type of inference as the previous version of the ML model, i.e. the data type of inference input and data type of inference output remain unchanged between the two versions of the ML model, but parameter values might be different for the re-trained model. - ML model pre-specialized training: the process of training an ML model on a dataset not specific to any type of inference. NOTE 5: The pre-specialised trained model supports an inference scope that may be potentially adapted to support a list of inference types, such as MDA types in MDA, analytics types in NWDAF, type of AI/ML supported functions in NG-RAN, or vendor-specific extensions. - ML model Fine-tuning: the process of training a pre-specialised trained ML model to narrow down its inference scope to a new single inference type, generating a new ML model. NOTE 6: The inference scope refers to a list of inference types that the ML model may be potentially adapted to support. NOTE 7: The type of inference represents the specific type of ML inference supported by the model, such as MDA types in MDA, Analytics types in NWDAF, type of AI/ML supported functions in NG-RAN, or vendor-specific extensions. - Distributed training: a process of distributing the training workload across multiple ML training functions. - Federated Learning: a distributed machine learning approach where the ML model is trained collaboratively by multiple ML training functions. This includes multiple FL clients, which perform training on local data, and one FL server, which aggregates model outcomes from the clients iteratively without exchanging data samples. - Horizontal Federated Learning: a federated learning technique without exchanging/sharing local data set, wherein the local data set in different HFL clients for local model training have the same feature space for different samples. - FL Client: a training function that trains an ML model on local data and shares only the model updates with the FL server, preserving data privacy. - FL Server: a function that aggregates the ML model updates from FL Clients to produce a global ML model. - Reinforcement Learning: a machine learning approach in which an RL agent interacts with an RL environment by observing states, taking actions and receiving rewards as feedback. The RL agent learns a decision-making policy by maximizing rewards over time through trial and error. - ML model joint training: a process of training a group of ML models. - ML training function: a logical function with ML model training capabilities. - ML knowledge: the implicit information representing the experience gained by the training an ML Model NOTE 8 Examples of experience include statistics (e.g. a distribution) or summaries (e.g. tables) indicating the ML model's recommended output for a given set of input data. - AI/ML inference function: a logical function that employs an ML model to conduct inference. - ML model testing: a process of evaluating the performance of an ML model using testing data different from data used for model training and validation. - ML model joint testing: a process of evaluating the performance of a group of ML models using testing data different from data used for model training and validation. - ML testing function: a logical function with ML model testing capabilities. - AI/ML inference: a process of running a set of input data through a trained ML model to produce set of output data, such as predictions. NOTE 5: The inference represents the process to realize the AI capabilities by utilizing a trained ML model and other AI enablers if needed, hence the AI/ML prefix is used when referring to inference as compared to training and testing. - AI/ML inference function: a logical function that employs trained ML model(s) to conduct inference. - AI/ML inference emulation: running the inference process to evaluate the performance of an ML model in an emulation environment before deploying it into the target environment. - ML model deployment: a process of making a trained ML model available for use in the target environment. - ML model loading: a process of making a trained ML model available to an inference function. - AI/ML activation: a process of enabling the inference capability of an AI/ML inference function. - AI/ML deactivation: a process of disabling the inference capability of an AI/ML inference function.
30577dbcedb3290f42b3a55986900ea7
22.850
5.2.1.3 TSG SA WG6
The following definitions are provided in clause 3 of TR TS 23.482 [34]: - ML model: According to TS 28.105 [9], mathematical algorithm that can be "trained" by data and human expert input as examples to replicate a decision an expert would make when provided that same information. - ML model lifecycle: The lifecycle of an ML model aka ML model operational workflow consists of a sequence of ML operations for a given ML task / job (such job can be an analytics task or a VAL automation task). This definition is aligned with the 3GPP definition on ML model lifecycle according to TS 28.105 [9]. - ML model training: According to TS 28.105 [9], ML model training includes capabilities of an ML training function or service to take data, run it through an ML model, derive the associated loss and adjust the parameterization of that ML model based on the computed loss. - ML model inference: According to TS 28.105 [9], ML model training includes capabilities of an ML model inference function that employs an ML model and/or AI decision entity to conduct inference. - AI/ML intermediate model: For federated learning, members need to train models for multiple rounds, intermediate models indicate the model which do not meet the required training rounds and/or meet the requirements of the federated training. - AIMLE service: An AIMLE service is an AIMLE capability which aims assisting in performing or enabling one or more AIML operations. - AI/ML client: an application layer entity (also referred as ML client) which is an AI/ML endpoint and performs client-side operations (e.g. related to the ML model lifecycle). Such AI/ML client can be a VAL client or AIML enabler client and may be configured e.g. to provide ML model training and inference locally e.g. at the VAL UE side. - AIMLE client set identifier: an identifier of the set of selected AIMLE clients. - AI/ML server: an application layer entity which is an AI/ML endpoint and performs server-side operations (e.g. related to the ML model lifecycle). Such AI/ML server can be a VAL server or AIML enabler server. - FL member: An FL member or participant is an entity which has a role in the FL process. An FL member can be an FL client performing ML model training, or an FL server performing aggregation/collaboration for the FL process. - FL client: An FL member which locally trains the ML model as requested by the FL server. Such FL client functionality can be at the network (e.g. AIMLE server with FL client capability) or at the device side (e.g. AIMLE client with FL client capability). - FL server: An FL member which generates global ML model by aggregating local model information from FL clients. - Split AI/ML operation pipeline: A Split AI/ML operation pipeline is a workflow for ML model inference in which AI/ML endpoints are organized and collaborate to process ML models in sequential stages, where processing at each stage involves ML model inference on the output of the previous stage.
30577dbcedb3290f42b3a55986900ea7
22.850
5.2.2 AI/ML related activities
30577dbcedb3290f42b3a55986900ea7
22.850
5.2.2.1 Rel-18 SA WG1 WID - AI/ML model transfer in 5GS (AIML_MT)
30577dbcedb3290f42b3a55986900ea7
22.850
5.2.2.1.1 Description
The objective of this work item is to specify performance requirements (for end-to-end latency, experienced data rate, communication service availability) and service requirements (for AI/ML QoS management, AI/ML model /data distribution/transfer, network performance and resource utilization monitoring/prediction) for 5GS to support the following AI/ML operations for various applications (e.g. image/speech recognition, media editing/enhancements, robot control, automotive): - AI/ML operation splitting between AI/ML endpoints. - AI/ML model/data distribution and sharing over 5G system. - Distributed/Federated Learning over 5G system.