hash
stringlengths
32
32
doc_id
stringlengths
5
12
section
stringlengths
5
1.47k
content
stringlengths
0
6.67M
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.13.1 Description
The network operators offer the digital asset management services for the users, with which some information (e.g. IDs) can be certified by the operator. The digital asset management services can also include - The management of the digital asset container is performed according to the applicable regulations. - The dig...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.13.2 Pre-conditions
Alice has a service subscription with the operator. As part of the service, the network operator provides - The digital asset container management according to the future applicable regulations; - Security protection options of the digital asset container (e.g. cannot be spoofed, access control with a policy determined...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.13.3 Service Flows
1. Alice accesses the digital asset container data services. The digital asset container is initiated with Alice information (digital representation (e.g. avatar) profile, IDs ...). The digital assets are completed and modified over time. The service (allowing to store and update information) can be provided by the net...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.13.4 Post-conditions
Alice is authorized to access and use the dump.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.13.5 Existing features partly or fully covering the use case functionality
This feature is currently not documented in the 3GPP specifications. Concerning the user identity related aspects, the features described in the document TR 22.904 [X] can be applied.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.13.6 Potential New Requirements needed to support the use case
[PR 5.13.6-1] The 5G system shall support allow a user to securely manage a digital asset container (e.g. store and update the information associated with this user). [PR 5.13.6-2] The 5G system shall support mechanisms to retrieve the information of a digital asset container associated with a user by an authorized thi...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.14 Use Case on interconnection of mobile metaverse services
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.14.1 Description
The concept "mobile metaverse" and "metaverse" became popular during the coronavirus pandemic as lockdown measures and work-from-home policies pushed more people online for both business and pleasure, increasing demand for ways to make online interaction more lifelike. The term covers a wide variety of location agnosti...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.14.2 Pre-conditions
Alice has a service subscription with the network operator M4Mobile, which is for communication services. When visiting immersive mobile metaverse service Alice uses digital representation which contains her avatars and other information like her electronic money and associated financial services, IDs, purchased items ...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.14.3 Service Flows
1. Alice would like to buy a travel using mobile metaverse service. 2. Alice connects to the immersive mobile metaverse service A of a travel company with the information she authorises to share for the successful provision of the service (the purchase of the travel). 3. During her session Alice is interested in buying...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.14.4 Post-conditions
Alice appears in the universe with the digital information chosen in her wallet (with some certified via the network operator). She keeps that information as she travels from universe to universe.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.14.5 Existing features partly or fully covering the use case functionality
This feature is currently not documented in the 3GPP specifications. Concerning the user identity related aspects, the features described in the document TR 22.904 [X] can be applied.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.14.6 Potential New Requirements needed to support the use case
[PR 5.14.6-1] The 5G system shall support suitable APIs to securely provide information of a user to an immersive mobile metaverse service when the user accesses the service. [PR 5.14.6-2] The 5G system shall support mechanisms to adapt the user assets and information stored by one immersive mobile metaverse service wi...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.15 Use Case on Access to avatars
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.15.1 Description
Mobile metaverse services often involve the use of digital representation (e.g. avatars, which are discussed throughout this use case.) Given different use cases, the data associated with the avatars of a user are generated and stored in different mobile metaverse servers. For example, a user uses life-like avatars for...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.15.2 Pre-conditions
ClothingA and ClothingB are two small clothing companies that both have virtual stores and provide avatar-based shopping services. Online shoppers can use immersive real-time technology to virtually try-on apparel, accessories, or full looks on the digital representation of themselves, i.e. avatars. Their avatars are s...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.15.3 Service Flows
1. ClothingA and ClothingB register with the operator T. Shaun registers with T by a UE that has a subscription with T. 2. Shaun visits the ClothingA virtual store using his avatar stored in the ClothingA database. He is authenticated by T and ClothingA, and a multimedia communication session is established between Sha...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.15.4 Post-conditions
Shaun tries on products in the ClothingB virtual store with his avatar. Shaun’s user profile on T’s system is updated to record the use of his avatar in the ClothingB virtual store. T charges ClothingA, ClothingB, and Shaun for supporting virtual shopping sessions.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.15.5 Existing features partly or fully covering the use case functionality
The functional requirements for user identity are captured in TS 22.101 clause 26a [4].
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.15.6 Potential New Requirements needed to support the use case
[PR 5.15.6-1] Subject to user consent, operator policy, and regulatory requirements, the 5G system shall be able to store and update the information related to digital representations for a user (e.g. last access time and address). [PR 5.15.6-2] Subject to user consent, operator policy, and regulatory requirements, the...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.16 Use Case on virtual store in a mobile metaverse marketplace
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.16.1 Description
5G technologies especially the XR communication technologies make it possible to run business online (with or without physical offices/stores) to offer various services. Examples include fashion store online, drop-shipping business, virtual real estate agency, virtual assistants, teaching an online course, and online f...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.16.2 Pre-conditions
Magnificent Muggles, a niche fashion company, has set up virtual stores in a metaverse marketplace (a mobile metaverse service) provided by GreenMobile. The corresponding 5G communication subscriptions provided by GreenMobile include the XR enabled multimedia communication services, including IMS based avatar calls) wh...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.16.3 Service Flows
0.1 Magnificent Muggles register with GreenMobile (the provider of 5G communication services and the mobile metaverse service) the digital representation (e.g. avatar) to be used by the virtual shop assistants. Subject to regulatory requirements, the digital representation are then certified to be legally used in a cer...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.16.4 Post-conditions
The 3GPP system with a combination of various technologies offers the users an immersive shopping experience equivalent to a face-to-face purchase in a crowded market.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.16.5 Existing features partly or fully covering the use case functionality
The service requirements on IMS Multimedia Telephony Service and supplementary services are well documented in TS 22.173 since Rel-7, many of which have been implemented in stage-2 and stage-3 WGs. The requirements on 3GPP IMS Multimedia Telephony Service are captured in TS 22.261 [5] clause 6.39 as a result of Rel-18 ...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.16.6 Potential New Requirements needed to support the use case
[PR 5.16.6-1] Subject to user consent, the 5G system shall support mechanisms to securely register, store and update the digital assets for a user. NOTE 1: The user could be a human user using a UE with a certain subscription, or an application running on or connecting via a UE, or a device behind a gateway UE. The use...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.17 Use Case on Work delegation to autonomous virtual alter ego
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.17.1 Description
Artificial Intelligence (AI) is becoming more and more popular in many areas where especially humans cannot handle complicated tasks well (e.g., factory, vehicle, robot, mobile). This trend is likely to continue, and AI will be applied to even more areas. In addition to the rapid expansion of AI, the AI technology itse...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.17.2 Pre-conditions
John has a UE which has connectivity to 5GS based on subscription to MNO and a contract with an autonomous virtual alter ego service provider. The service setting and parameters for this alter ego service are stored in the user’s subscription data. John’s virtual alter ego has been trained by the autonomous virtual alt...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.17.3 Service Flows
1. John has a F2F appointment with his important client at client's office, so he cannot attend an internal web meeting scheduled on the same time. Then, he connects to the alter ego application via his UE and asks his alter ego to show up and participate in the internal web meeting on his behalf. 2. His virtual alter ...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.17.4 Post-conditions
After receiving the feedback from John, the alter ego is retrained. Then, the autonomous virtual alter ego becomes more accurate and finishes the tasks much more immediately. As a result, the time available to him in life is more than doubled.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.17.5 Existing features partly or fully covering the use case functionality
AIML model transfer frameworks documented in TR 23.700-80 [51] can be applied to this use case. IMS MMTEL services documented in TS 22.173 [3] can be applied to this use case.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.17.6 Potential New Requirements needed to support the use case
[PR 5.17.6-1] The 5G system shall be able to provide a means for a subscriber to authorize a third party to use a subscriber’s digital representation (e.g., avatar) and to access multimedia communication services on behalf of the subscriber. [PR 5.17.6-2] The 5G system shall be able to collect charging information asso...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.18 Use Case on virtual meeting room in financial services
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.18.1 Description
Meeting rooms in banks provide a private place for customers and financial manager to communicate, financial manager can provide customized information on the financial products that suitable for the customers. Customers may find a dedicated room for consulting and signing contact safer and the user experiences are bet...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.18.2 Pre-conditions
Each user has a unique digital representation (e.g. avatar) in the mobile metaverse service. Bank R provides consumers a virtual bank as a mobile metaverse service as a location agnostic service experience. This service requires a high level of security in mobile communication as the content is sensitive. Users have th...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.18.3 Service Flows
1. Frank is a very active user of mobile metaverse service X, he does his daily work and entertainment making use of this mobile metaverse service X using his avatar. 2. Bank R has a virtual branch offered as mobile metaverse service X, in which the bank provides financial services and can provides different financial ...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.18.4 Post-conditions
Frank had a safe and realistic experience using his digital representations (e.g. avatar) in the virtual meeting room.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.18.5 Existing features partly or fully covering the use case functionality
None.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.18.6 Potential New Requirements needed to support the use case
[PR 5.18.6-1] Subject to operator policy and national or regional regulation, the 5G system shall support identification of digital representations (e.g. avatars) associated with users, for mobile metaverse services. [PR 5.18.6-2] Subject to operator policy and national or regional regulation, the 5G system shall suppo...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.19 Use Case on Privacy-Aware Dynamic Network Exposure in Immersive Interactive Experiences
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.19.1 Description
With the proliferation of APIs in existing mobile applications already creating an extensive market for application exposure, API integration in emerging Metaverse applications and features is likely to emerge as a major functionality for enhancing experiences across extended reality functions that builds upon already-...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.19.2 Pre-conditions
The following pre-conditions and assumptions apply to this use case: 1. Jenna is developing an application that uses potentially personally identifiable information. 2. Jenna is aware of the existence and relevance of tuneable network characteristics to improve or augment an immersive experience, e.g., sufficient tools...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.19.3 Service Flows
1. Jenna develops an application that uses sensitive data, e.g., an application that uses the real-time location and/or environmental features of users’ appearance and surroundings to generate a personal digital representation (e.g. avatar) in a mobile metaverse service activity. 2. Jenna uses an API exposing tuneable ...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.19.4 Post-conditions
1. Jenna’s digital representations (e.g. avatars) and other personally identifiable information generated through her application are able to safely exchange information through network exposure APIs without compromising the privacy of users or the network. 2. Network providers remain compliant with existing privacy re...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.19.5 Existing feature partly or fully covering use case functionality
Not applicable.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.19.6 Potential New Requirements needed to support the use case
[PR 5.19.6-1] Subject to national/regional regulations, and user consent, the 5G System shall be able to process and expose information from UEs related to user’s location, user’s body, and user’s environment, e.g., user’s home, user’s immediate vicinity. NOTE: This requirement does not affect the ability of regulatory...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.20 Use Case on Immersive Tele-Operated Driving in Hazardous Environment
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.20.1 Description
Operating vehicles, lifting devices, or machines in an industrial environment is hazardous when achieved manually and locally by a human. Depending on the environment, operators are exposed to dangerous material, toxic fumes, extreme temperatures, landslide risks, radioactivity, etc. AGVs already exist, although it is ...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.20.2 Pre-conditions
Bob works in a seaport; he operates a lifting device. The place in which he is operating is surrounded by cranes, machines, containers, pipes, and barrels containing hazardous substances. A new mobile metaverse service is available: instead of locally controlling the device, Bob is installed in a safe remote location f...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.20.3 Service Flows
1. This morning, Bob stayed home as his boss informed him about a potential hazard at the factory that was identified through some sensor on a pipe. Unfortunately, the exact nature and location of the hazard on the pipe are not known. So, Bob decides to remotely inspect the factory before his boss and local public auth...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.20.4 Post-conditions
Thanks to the 5G mobile metaverse “Tele-operated Driving” service, Bob has been able to drive the vehicle remotely in a reactive way avoiding dangers and finding the leak with the help of the information provided via the digital twins.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.20.5 Existing feature partly or fully covering use case functionality
The use case related to traffic flow simulation in clause 5.2 already provides requirements and KPIs related to the operation of a moving UE, similar to an AGV. However, that use case does not envision the use of remote control, e.g., using haptic devices and HMD, which trigger new requirements. The use case related to...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.20.6 Potential New Requirements needed to support the use case
[PR 5.20.6-1] The 5G system shall be able to provide a means to associate data flows related to one or multiple UEs with a single digital twin maintained by the mobile metaverse service. [PR 5.20.6-2] The 5G system shall be able to provide a means to support data flows from one or multiple UEs to update a digital twin ...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.21 Use Case on Virtual Emergency Drill over 5G Metaverse
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.21.1 Description
An Emergency Drill is a crucial activity for governments, local municipalities, and citizens to prepare for potential disasters such as earthquakes, fires, and floods. To make the drills more effective, it is important for a wide range of people, organizations, and government entities to participate and create simulati...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.21.2 Pre-conditions
City A, known for its beautiful beaches, attracts many visitors each year. However, it is located near the sea and is at risk of suffering significant tsunami damage in the event of a major earthquake. With the challenges of providing rapid evacuation guidance for residents, saving lives, and restoring infrastructure, ...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.21.3 Service Flows
1. City A is planning a virtual emergency drill that participants can access from any location, such as their office, home, or even the beach. 2. Mobile operator B will provide the 5G system and anticipated operational and maintenance data for the emergency drill in the metaverse environment. 3. In the metaverse enviro...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.21.4 Post-conditions
By participating in emergency drills, citizens and organizations learn how to respond to disaster scenarios, such as evacuations and rescues, and this information can be incorporated into local government disaster preparedness plans. Additionally, mobile operators can take effective measures to counteract potential net...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.21.5 Existing features partly or fully covering the use case functionality
No existing features are identified.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.21.6 Potential New Requirements needed to support the use case
No potential new requirements have been identified.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.22 Use case of Mobile Metaverse Live Concert
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.22.1 Description
Mobile metaverse services allow people to enjoy an online digital concert with their avatars beyond the limitation of time and space. In order to provide immersive interactive location agnostic service experience to mobile metaverse service customers, large amount of computing resouces is needed to perform real-time pr...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.22.2 Pre-conditions
1) Alex, Bob and Carey are good friends live in different cities, they agree to watch the mobile metaverse live concert together. 2) Alex, Bob and Carey are equipment with XR glasses and tactile, the equipment can capture their voice, facial expression, pose information to generate avatars and interact with the whole l...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.22.3 Service Flows
1. Alex, Bob and Carey’s subscribe to the mobile metaverse live concert services and order a “private box” which can only be used by themselves. Alex, Bob and Carey will be represented at the virtual concert event by their avatars. 2. Due to extensive computing resource requirement for image rendering in the interactiv...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.22.4 Post-conditions
The consumers in the mobile metaverse live concert service enjoy a great immersive experience and socialize with their friends. The 5G system is capable of supporting the communication required by the immersive mobile metaverse live concert service. Some extra edge computing services are also provided to some consumers...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.22.5 Existing feature partly or fully covering use case functionality
The functional and performance requirements for AR/VR services have been captured in TS 22.261 clause 7.6.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.22.6 Potential New Requirements needed to support the use case
[PR 5.22.6-1] Subject to operator policy, the 5G system shall be able to support avatar-based multiparty communication in mobile metaverse service.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.23 Use Case on cooperation between metaverse and network using interactive XR
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.23.1 Description
The mobile metaverse allows users to access an endless virtual world at anytime and anywhere through their terminals. The mobile metaverse are expected to behave as the real world, which means in addition to rendering a virtual environment like the physical world, the perceived spatial-temporal consistency is also the ...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.23.2 Pre-conditions
There are about 12,000 players sign up for a popular game and appear simultaneously in a specific setting, such as Eve Online in 2021. Due to the limitations of the existing server processing, it is not possible to support such a large number of high concurrency, so the network and application server need to cooperate ...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.23.3 Service Flows
1. Bob is a player who attends a popular AR interactive game and gathers with others in a shared environment, they are aware of each other’s action so that they need high synchronization. 2. The service provider will provide deployment information of each server to the 5G network, and request the Bob’s physical locatio...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.23.4 Post-conditions
Bob will have a good experience in this interactive AR game.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.23.5 Existing features partly or fully covering the use case functionality
3GPP started the work of edge computing from R15 to R18. In R15, AF influence mechanism is introduced to inform the 5G network of the application deployment information to assist UPF selection. In R16, 5G system supports QoS monitoring mechanism for end-to-end delay monitoring for URLLC services. In R17, 5GS supports t...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.23.6 Potential New Requirements needed to support the use case
No potential new requirements have been identified.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.24 Use Case on Authorization of Avatar Usage rights
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.24.1 Description
In metaverse, digital humans (avatars) are widely used in business activities, such as advertising, news reporting, live shows. With the maturity of digital human technologies and the continuous growth of market demands, lifelike avatars have become reality in recent years. In the future, more and more people are expec...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.24.2 Pre-conditions
Singer J has her own lifelike avatar, which is used for her live concerts in metaverse. Her touching voice has won hundreds of millions of fans. Company A is a clothing manufacturer. Seeing the commercial value of Singer J, the company invited her to be the company’s brand ambassador, who helps to increase brand awaren...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.24.3 Service Flows
1. Company A registers with the MNO B as an enterprise customer, while Singer J registers as an individual customer of MNO B. MNO B assigns IDs for Company A and Singer J respectively. 2. Singer J registers her personal avatar with MNO B. The avatar is lifelike and mapped to Singer J’s ID in real world. So MNO B identi...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.24.4 Post-conditions
Upon authorization, Singer J has granted the usage rights of her avatar to Company A for one year to be used in mobile metaverse services. During this year, Company A is authorized to use Singer J’s avatar for business purposes. When Company A wants to use Singer J’s avatar in a mobile metaverse service, the 5GS search...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.24.5 Existing features partly or fully covering the use case functionality
None.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.24.6 Potential New Requirements needed to support the use case
[PR 5.24.6-1] Subject to regulatory requirements, user consent and operator’s policy, the 5G system shall support mechanisms to identify an avatar and associate the avatar with a subscriber (i.e. the owner of the avatar). [PR 5.24.6-2] Subject to regulatory requirements, user consent and operator’s policy, the 5G syste...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.25 Use Case on Enabling Metaverse services to users via multiple access connections
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.25.1 Description
The metaverse enables immersive virtual media, 3D avatar and holographic communications for realizing use cases such as interactive gaming, virtualized shared workspaces, and immersive conference rooms for remote collaboration, etc. The goal is to create a virtual world we can work in, interact with, and even escape to...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.25.2 Pre-conditions
Two friends and neighbors Mark and Bob want to enjoy their weekend using a Metaverse application for immersive gaming. Mark is using his home residential broadband (non-3GPP) while Bob is using the 3GPP access network from the same network operator. Both the 3GPP and non-3GPP access network are connected to the network...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.25.3 Service Flows
1. Mark starts the immersive gaming via an authorized 3rd party metaverse application using the network operators broadband access network (non-3GPP access). 2. Bob joins the immersive gaming to play along with Mark via the same authorized 3rd party mobile metaverse services using the same network operator but connecti...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.25.4 Post-conditions
Both Mark and Bob accessing the same mobile metaverse service across different access networks from the same operator can get the same coordinated user experience even when experiencing different network conditions.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.25.5 Existing features partly or fully covering the use case functionality
The 5G system supports non-3GPP access concurrent with 3GPP access and traffic steering already. The traffic steering aspects are covered in TS 24.193. It is already possible to expose QoS monitoring information to third parties, when using 3GPP access. Dynamic QoS policy updates are also possible in the 5GS in the HPL...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.25.6 Potential New Requirements
[PR 5.25.6-1] Subject to operator policy and user consent, 5G system shall be able to provide means to expose network performance information (e.g., bitrate, latency) to an authorized 3rd party metaverse application. NOTE: The network performance information can be per UE and take into account all available 5G access n...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.26 Use Case on IMS-based 3D Avatar Call Support for Accessibility Use Case
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.26.1 Description
3GPP has long standardized functionality to support availability of communication for users with disabilities. Global Text Telephony [56] provides a character-by-character text conversation to enable Global Text for those who rely on it, even for emergency service access. With the advent of speech recognition, it is po...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.26.2 Pre-conditions
Both communicating parties AeCha, Bharathi and Carlos have a mobile subscription with PLMNs Absolute Telecom (PLMN A) and Benefit Wireless (PLMN B) and Celestial Cellular (PLMN C). Both Arndt and Berndt have UEs that support sensors capable of capturing their facial expressions and movements as well as gestures suffici...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.26.3 Service Flows
Scenario 1: IMS 3D Avatar Call between two callers employing accessibility features and translation AeCha calls Bharati. AeCha and Bharati use IMS 3D Avatar Call to communicate through sign language. AeCha signs using Korean sign language. Bharathi signs using Hindi sign language. There are many forms of sign language ...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.26.4 Post-conditions
In each of three scenarios one or both parties are able to sign and see signage in their native sign language in order to communicate with the other party. The possibility to interwork with legacy GTT terminals and legacy audio terminals is also supported.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.26.5 Existing feature partially or fully covering use case functionality
The 5G system supports IMS which is able to handle diverse media, establish calls and support media codec transcoding services. The 5G system supports GTT.
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.26.6 Potential New Requirements
[P.R.-5.26.6-1]The 5G system shall support the encoding of sensor data capturing the facial expression and movement and gestures of a person, in a standard form, such that as part of the avatar encoding [P.R 5.26.6-2] The 5G system shall support a set of transcoders from and to avatar representations e.g. between text,...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.27 Use Case on Localized Mobile Metaverse Overload
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.27.1 Description
The mobile metaverse offering a location related service experience may reach its limits, as significant resource intensive communication is required to support uplink sensor data and downlink media for each user In a crowded environment, such as an amusement park, users may want to experience augmented reality in thei...
8fc4e7e237d7663b7a5c6a2b6436bde3
22.856
5.27.2 Pre-conditions
Ajay and Vijay also have subscriptions with the operator to receive XR multimedia communication service. They both have a mobile subscription to the local operator, Salvo Net. Ajay has a premium ticket to the amusement park. Vijay has a normal ticket. Dream Park offers mobile metaverse services to the park visitors by ...