Neutral Host Solutions For 5G Multi-Operator Deployments in Managed Spaces
Neutral Host Solutions For 5G Multi-Operator Deployments in Managed Spaces
Abstract
In a neutral host architecture, a shared wireless infrastructure is created which is used to provide
services to end-users with subscriptions to several different hosted operators. Neutral host scenarios
are particularly attractive in dense small cell deployments (as may be required for 5G mmWave service)
which may require capital intensive buildouts and cumbersome backhaul and cell site infrastructure
requirements. For example:
• Intercell distances for these deployments are in the order of 100’s of feet. It may be impractically
expensive for all mobile operators serving a specific area to fully deploy a dense small cell
network in the same location or venue.
• In outdoor small cell deployments, local regulations may constrain how much infrastructure can
be deployed. For example, there may only be physical space available for one antenna
assembly at optimal small cell locations even though there may be many different operators
interested in deploying in that location.
• Many indoor locations and venues are managed by a separate enterprise which may want to
deploy their own small cell (e.g., Wi-Fi) network and may find it burdensome to work with and
integrate access capabilities for the multiplicity of mobile/wireless operators that are serving the
general area.
However, by utilizing a neutral host architecture, many different operators are able to share a common
buildout provided by a neutral host provider.
Although neutral host architectures have been deployed with existing Wi-Fi and 4G technologies, the
high performance promised by 5G mmWave access has sparked new interest in these architectures.
With the introduction of 5G services and the system architecture evolution to Network Functions
Virtualization/Software Defined Networking (NFV/SDN), the cost efficiencies of deploying 5G services
may be leveraged by a neutral host service provider to provide tailored and differentiated services
blended with services offered by Mobile Network Operators (MNOs) and to maintain continuity of these
services within the coverage area of the neutral host.
A neutral host deployment can provide cost effective coverage and capacity for wireless environments
such as dense metropolitan areas, enterprises, campuses, entertainment venues and shopping malls.
This document assessment defines the neutral host concept and provides an overview of the technical
solutions to support neutral host.
Foreword
As a leading technology and solutions development organization, the Alliance for Telecommunications
Industry Solutions (ATIS) brings together the top global ICT companies to advance the industry’s
business priorities. ATIS’ 150 member companies are currently working to address 5G, cybersecurity,
robocall mitigation, IoT, artificial intelligence-enabled networks, the all-IP transition, network functions
virtualization, smart cities, emergency services, network evolution, quality of service, billing support,
operations, and much more. These priorities follow a fast-track development lifecycle – from design and
innovation through standards, specifications, requirements, business use cases, software toolkits, open
source solutions, and interoperability testing.
ATIS is accredited by the American National Standards Institute (ANSI). ATIS is the North American
Organizational Partner for the 3rd Generation Partnership Project (3GPP), a founding Partner of the
oneM2M global initiative, a member of the International Telecommunication Union (ITU), and a member
of the Inter-American Telecommunication Commission (CITEL). For more information,
visit www.atis.org.
ATIS-I-0000073
NOTE - The user’s attention is called to the possibility that compliance with this standard may require
use of an invention covered by patent rights. By publication of this standard, no position is taken with
respect to whether use of an invention covered by patent rights will be required, and if any such use is
required no position is taken regarding the validity of this claim or any patent rights in connection
therewith. Please refer to [http://www.atis.org/legal/patentinfo.asp] to determine if any statement has
been filed by a patent holder indicating a willingness to grant a license either without compensation or
on reasonable and non-discriminatory terms and conditions to applicants desiring to obtain a license.
ATIS-I-0000073
Copyright Information
ATIS-I-0000073
No part of this publication may be reproduced in any form, in an electronic retrieval system or
otherwise, without the prior written permission of the publisher. For information, contact ATIS at (202)
628-6380. ATIS is online at http://www.atis.org.
ATIS-I-0000073
Table of Contents
2 Normative References
The following references contain provisions which, through reference in this text, constitute provisions of this
document. At the time of publication, the editions indicated were valid.
[017 Market Drivers for Small Cells] Small Cell Forum SCF017.06.01, Multi-operator market drivers 1
[22.261] 3GPP TS 22.261, Service requirements for next generation new services and markets 2
[22.951] 3GPP TS 22.951, Service aspects and requirements for network sharing 3
[23.251] 3GPP TS 23.251, Network sharing; Architecture and functional description 4
[23.402] 3GPP TS 23.402, Architecture enhancements for non-3GPP accesses 5
[23.501] 3GPP TS 23.501, System Architecture for the 5G System 6
[MulteFire] MulteFire Alliance 7
1 Available from the Small Cell Forum at: < http://scf.io/en/documents/017_-_R6_-_Multi-Operator_Market_Drivers.php >.
2 Available from 3GPP at < http://www.3gpp.org/DynaReport/22261.htm >.
3 Available from 3GPP at: < http://www.3gpp.org/DynaReport/22951.htm >.
4 Available from 3GPP at: < http://www.3gpp.org/DynaReport/23251.htm >.
5 Available from 3GPP at: < http://www.3gpp.org/DynaReport/23402.htm >.
6 Available from 3GPP at < http://www.3gpp.org/DynaReport/23501.htm.>.
7 See: < http://www.multefire.org/ >.
Page 1
ATIS-I-0000073
AP Access Point
DL Distributed Ledger
NH Neutral Host
O-RU O-RAN Radio Unit: a logical node hosting Low-PHY layer and RF
processing based on a lower layer functional split.
RF Radio Frequency
UE User Equipment
These challenges can often be addressed through neutral host architectures where a single access entity builds
and maintains the access infrastructure while allowing the subscribers of client networks to use this single access
infrastructure transparently.
Although neutral host architectures have been deployed with existing Wi-Fi and 4G technologies, the high
performance promised by 5G mmWave access has sparked new interest in these architectures. With the
introduction of 5G services and the system architecture evolution to NFV/SDN, the cost efficiencies of deploying
5G services may be leveraged by a neutral host service provider to provide tailored and differentiated services
blended with services offered by MNOs and to maintain continuity of these services within the coverage area of
the neutral host. For example, a theme park may utilize a 5G architecture for tailored services, such as deep
ATIS-I-0000073
AR/VR experiential services, and at the same time maintain continuity of broadband cellular services within the
confines of the theme park.
In addition, new unlicensed and lightly licensed spectrum options are being developed that work effectively with
Neutral host architectures.
In summary, neutral host architectures can provide coverage and capacity benefits with lower deployment and
maintenance costs for client operators while enabling the neutral host entity to recover deployment costs by
selling access to the client operators. Neutral host entities may also use their access infrastructure for their own
business needs.
The spectrum used by the neutral host may be licensed or unlicensed. In the case of licensed spectrum, it may be
owned by the neutral host directly or may be obtained by the neutral host via an agreement with a licensed
spectrum owner. The neutral host is active in managing the planning and utilization of the spectrum within its
geographic area subject to agreement with the license holder, if any. Several hosted clients may share common
spectrum, or individual hosted clients may use individual spectrum blocks.
Bearer and signaling interconnect are subject to agreement between the neutral host and the hosted clients.
ATIS-I-0000073
Technical restrictions in neutral host solutions may prevent this ideal behavior from being realized. Limitations of
particular solutions will be addressed in later sections.
On occasion, demand overload on the neutral host may mean it is not able to fulfill this ideal, and services have to
be managed to maintain system operation. In this case, the neutral host shall apply a policy-based approach to
manage the overload governed by the commercial agreement between the neutral host and the MNO.
Mobile network operators and other hosted clients purchasing from such a neutral host also gain advantages:
• Effective sharing of infrastructure costs between multiple entities, thus reducing costs to individual hosted
clients.
• Outsourcing of management of small cell infrastructure.
• Possibly increased flexibility of contract terms and reduction in length of commitments including short-
term needs (e.g., for special events).
• Offers the possibility of social benefits and real estate added value due to coverage being provided from a
wider variety of network operators.
5 Enabling Technologies
5.1 5G Aspects Supporting Neutral Host Architectures
The 5G Core (5GC) network architecture is substantially different from the 4G Enhanced Packet Core (EPC). In
constructing the 5GC, Third Generation Partnership Project (3GPP) has repartitioned many existing 4G functions
while adding new functionality creating new architectural reference models with new functional entities and
reference points. The new architecture and functionality provide several advantages and creates opportunities for
new neutral host architectures enabling services and capabilities not possible in previous 3GPP architectures.
The 5GC makes a clear distinction between control plane functions (i.e., functions used for control purposes) and
user plane functions (i.e., functions that carry user data between the client and the appropriate data network). The
control plane elements connect to the user plane elements using the N1, N2 and N4 reference points.
Advantageously, the 5GC can be expressed in two ways; one using service-based interfaces in the control plane
and one using the more traditional reference point architectural view. In the Service Based Architecture (SBA)
view, control plane functions are shown as connected via a “bus” where the service-based interface label is
associated with each individual control function. The advantage of this architectural construct is that any
authorized network function on the “bus” can access the services provided by any other control plane function on
the “bus”. This enables the 5GC to implement new custom, value added features and capabilities while staying
within the standardized architectural reference model.
Figure 5.1-2 - Non-Roaming 5GC Reference Architecture with Reference Point Interfaces
ATIS-I-0000073
The reference point-to-point diagrams do not show functions such as NEF and NRF (which are shown in the
service-based architecture). However, all depicted network functions can interact with these functions as well as
other functions not shown such as the NetWork Data Analytics Function (NWDAF).
As noted earlier, the 5GC explicitly supports the separation of the control plane from the user plane. This enables
deployment scenarios where multiple UPFs (User Plane Functions) can serve the same UE. For example, UEs
concurrently accessing two (e.g., local and central) data networks using multiple PDU Sessions is illustrated in the
figure 5.1-3. This figure shows the architecture for multiple PDU Sessions where two SMFs are selected for the
two different PDU Sessions. However, a single SMF may also have the capability to control both a local and a
central UPF within a PDU Session.
This use of multiple UPFs can be advantageous for some Neutral Host architectures since both the Neutral Host
as well as the hosted client network are now able to terminate traffic from a single UE simultaneously.
Figure 5.1-3 - Non-Roaming 5GC Reference Architecture with Multiple User Plane Functions
In addition, the 5GC architecture also supports concurrent access to two (e.g., local and central) data within a
single PDU Session through the use of two UPFs in series. This architecture is shown in the figure 5.1-4. As in
the previous case, this architecture may also be of interest in 5G Neutral Host deployments where both the
Neutral Host as well as the hosted client network.
ATIS-I-0000073
Figure 5.1-4 - Non-Roaming 5GC Reference Architecture with Multiple User Plane Functions
The AMF in the visited network may be shared with that network’s other traffic or may be a dedicated instance to
support the roaming carrier.
ATIS-I-0000073
N2 N11
3GPP AMF SMF
Access
N3 N2
N4
Non-3GPP
Networks
Untrusted Non-
UE
3GPP Access
Y1
Figure 5.1.2-1 - Non-roaming architecture for 5G Core Network with non-3GPP access
Both control and user plane interactions between the Next Generation Core (NGC) and the Non-3GPP access
network are mediated by a newly defined network function, the Non-3GPP Interworking Function (N3IWF). Once
the UE establishes a connection to the NGC, an N1 reference point is established between the UE, and the AMF.
The UE then supports NAS signalling with the 5GC via the N1. User plane traffic travels between the N3IWF and
ATIS-I-0000073
the untrusted non-3GPP access network via the NWu reference point. In turn, the N3IWF supports an N3
reference point to a UPF for the non-3GPP access network’s user plane traffic.
A UE may be connected to the non-3GPP and a NG-RAN simultaneously, in which case it will maintain separate
N1 reference point instances to the AMF, one for each access network. All of the N1s from a single UE are
anchored to the same AMF.
There are a number of roaming scenarios supported for non-3GPP access networks. For the purposes of neutral
host, the most relevant is shown in the figure 5.1.2-2:
Figure 5.1.2-2- Home-routed Roaming Architecture for Non-3GPP Accesses, N3IWF in same PLMN as
3GPP access
In Figure 5.1.2-2 the N3IWF is provided by the visited network (neutral host), completely abstracting the access
mechanism from the home network (client operator). This enables the neutral host to provide 3GPP compliant
roaming without restricting the type of access network used.
Figure 5.1.3 illustrates the ATSSS functionality split between a 3GPP and N3GPP access network.
3GPP
UPF PDU
access N3
N9
Application UE UPF N6
client (including MA PDU (PSA)
Server host
RG)
N9
Non-3GPP PDU
N3IWF UPF
access N3 (linked)
The 3GPP PDU session and linked N3GPP PDU session of a MA PDU session share the following attributes:
1. DNN: Data Network Name is the name of the data network and end point for an application PDU
session
2. SSC mode: SSC stands for Session and Service Continuity. It is related to how an application PDU
Session is established to support session and service continuity in general (pre-dates ATSSS) as
follows:
a. SSC mode 1: the network preserves connectivity and IP address but the same UPF is maintained
regardless of mobility (could lead to inefficient routing)
b. SSC mode 2: “break before make”, the network release PDU Session and instructs UE to establish a
new one.
c. SSC mode 3: “make before break”, the network allows new PDU session establishment before old
one is released
3. S-NSSAI: Single Network Slice Selection Assistance Information. It is the network slice serving an
application PDU session.
4. PDU session type (IPv4, IPv6 or Ethernet)
5. IP address (for IPv4 and IPv6 PDU session type)
In particular, the study item considers solutions that specify the following:
• How the 5GC and the 5G UE can support multi-access traffic steering between 3GPP and non-3GPP
accesses.
• How the 5G Core network and the 5G UE can support multi-access traffic switching between 3GPP and
non-3GPP accesses. This includes the conditions that can trigger the switching of data traffic to a new
access type.
• How the 5G Core network and the 5G UE can support multi-access traffic splitting between 3GPP and
non-3GPP accesses. This includes the conditions that can trigger the splitting of data traffic across
multiple accesses.
• How the multi-access traffic steering, switching and splitting can be taken into account by the charging
framework. For example, in order to enable the network operator to differentiate charging for data traffic
that is switched and/or split between 3GPP and N3GPP access networks.
ATIS-I-0000073
• How the policy framework can be extended in order to support the requirements for ATSSS.
The study is restricted only to ATSSS procedures applied in the 5G core network. Initially, the study considers
ATSSS functionality between the NG-RAN and untrusted non-3GPP access networks. Subsequently, after the
5GS architecture is enhanced to support trusted non-3GPP access networks, the study will also consider ATSSS
functionality between the NG-RAN and trusted non-3GPP access networks. ATSSS procedures that may be
applied in the NG-RAN are not considered.
If this work is incorporated into normative 3GPP standards, ATSSS procedures could be used to create a layer 2
multipath (L2MP) solution. This in turn can enable session-based link aggregation between 3GPP and non-3GPP
access and could prove to be very useful with 5G mmWave where signal conditions may change dramatically
within very short time intervals. Linking mmWave sessions to alternate access could provide a more seamless
experience since traffic could seamlessly share the aggregate bandwidth as individual Radio Frequency (RF
channel bandwidth varies. This becomes interesting from a neutral host perspective since both 3GPP and non-
3GPP access needs to terminate on the same anchor, favoring neutral host architectures that fully support and
integrate local unlicensed access as well as 3GPP access capabilities.
1. The enterprise assigns a unique global identity to its devices, which incorporates a reference to the
enterprise’s identity to aid in discovery. For example, an NAI (Network Access Identifier) of the form
user@realm could be used. This identity along with credentials can then be provisioned onto the device as
well as the enterprise identity management system.
2. When in the neutral host environment, the device can initiate attachment procedures to attach (connect) to
the neutral host network using a specific unlicensed technology:
• The neutral host receives the global identifier from the device in an attachment request.
• The neutral host validates the identity of the enterprise presented in the global identifier and the existence
of a business and service relationship between the neutral host and the enterprise.
• After validating the enterprise, the neutral host facilitates the use of the appropriate EAP method to
authenticate the device with the enterprise (using the enterprise authentication database).
• The enterprise completes authentication of the device.
ATIS-I-0000073
3. The neutral host may then complete attachment of the device and may associate the device to a network slice
specifically provisioned for the appropriate level of security and trust. Once attached, the neutral host can
provide packet/object transport services.
4. The neutral host creates charging records for all network services provided to the device for the purpose of
upstream billing of the enterprise.
This process of reconciling the CDRs and generating the billing information is typically an offline process and
there is a time delay associated with the generation of the user’s resource consumption data for the HPMN. The
HPMN settles charges with the VPMN based on information provided by the DCH. For subscriber data that
experiences Local Breakout (LBO) in the VPMN network, there is no direct and verifiable accounting trail to the
actual resources consumed by a user since user data does not pass to the HPMN.
Similar charging arrangements could be configured for neutral host architectures where the neutral host plays the
role of the VPMN and the client operator plays the role of the HPMN. However, 5G based neutral host
deployments may require additional service functions to handle accurate, high bandwidth, real-time charging with
verifiable accounting trails. Some examples of the envisioned services are:
• Enable the client operators to reduce and manage costs by gaining access to fine grained, real-time
resource consumption information specific to charging/policy functions in the neutral host network.
• Use of NFV/Virtual Network Function (VNF) constructs in the neutral host network to perform fine grained
management of traffic by enabling the client operator to instantiate specific charging/policy functions in
the neutral host network as needed on a per subscriber basis.
Digital Ledger Technologies (DLT) may offer the potential for providing service flexibility and scaling the current
3GPP systems in addition to simplifying neutral host charging while enabling real-time accountability for charging
events. This latter capability becomes much more attractive with 5G systems offering a rich and diverse set of
services to a HPMN host without the need to establish separate SLAs with each neutral host.
ATIS-I-0000073
Figure 5.3-2 illustrates a DLT based charging arrangement for a generic neutral host architecture. The neutral
host operator and associated client operators establish a smart contract for inter-operator services offered to their
customers. When a subscriber of a client operator consumes services from a neutral host, CDRs are generated
and registered into a block chain-based Distributed Ledger (DL). As services are consumed the neutral host and
client operator register CDR information into the DL. A mobile device may optionally log CDR information into the
distributed ledger, in order to provide traceability, accuracy of information, and prevent fraud.
The DL is processed by a billing system, in accordance with the smart contract between the neutral host and
client operator. The billing system automatically reconciles the CDR records, produces TAP files and generates
billing cost information for resources consumed in the neutral host network, in accordance with the corresponding
smart contract. The client operator can then settle payment with the neutral host provider. Consolidated
subscriber reports are also automatically generated by the billing system for the client operator. Access to CDRs
in a DL enables the client operator to gain access to real-time resource consumption information and lower costs
while increasing the breadth of service offerings through automated reconciliation of accurate and reliable CDR
information.
However, any charging solution needs to meet a minimum set of requirements relative to the charging records:
• Integrity (tamperproof)
• Authenticity of source
• Auditability of records collected
• Authorization (transparency control, access control based on real-time data)
• Traceability (reconciliation of CDR event logs)
• Verifiability (corroboration/verification across two parties)
• Non-repudiation
• Confidentiality
• Privacy (information available on a need to know basis)
• Accounting (smart contracts for records settlement transactions)
ATIS-I-0000073
For DLT based solutions, these requirements may require the use of permissioned private ledgers. These digital
ledgers offer separate control mechanisms to determine who is allowed to participate in the network, execute the
consensus protocol and maintain the shared ledger. A private (permissioned) blockchain network requires an
invitation and must be validated by either the network starter or by a set of rules put in place by the network
starter. As such, the system places restrictions on who is allowed to participate in the network and determine
which types of transactions are accessible.
To address privacy concerns, permissioned private ledgers often support the ability to segregate the network into
channels. Each channel represents a subset of participants that are authorized to see data associated to that
channel. Within the channel, participants may have create, read, and/or update access policy rules with separate
roles enforced through encryption where the decryption keys are distributed only to authorized entities. In the
context of a neutral host deployment, the neutral host to client operator relationship could be captured as a
separate channel.
It is important to note that, as of the publication date of this document, the use of DLTs for charging applications is
still under investigation and may or may not be suitable for neutral host architectures.
6 Spectrum Considerations
6.1 Neutral Host in Licensed Spectrum
A neutral host may operate in licensed spectrum with agreement of the license holder. Scenarios involving use of
shared and unlicensed spectrum are addressed in sections 6.2 and 6.3.
The Spectrum Access System (SAS) coordinates channel access, and needs channel usage information from
incumbent, PAL and GAA users.
Various network architectures are possible to deploy neutral host in shared spectrum, including Roaming, Multi
Operator Core Network, DDAS, Cloud RAN or Self-contained architecture (as described in detail in Section 7).
7 Industry Solutions
7.1 Roaming
7.1.1 Description & References
From a technical point of view, the simplest means to provide a licensed spectrum neutral host solution is via
inter-carrier roaming agreements. This can be implemented in several ways. One is that a spectrum license
holder executes agreements with one or more prospective neutral hosts, providing the use of its spectrum and
Enhanced Packet Core (EPC) network for use in those venues. Either the spectrum license holder or the neutral
host then executes roaming agreements with other wireless service providers, allowing their customers’ UEs to
roam onto the license holder’s network while in the neutral host venue. Either the neutral host or the spectrum
license holder builds the necessary RAN infrastructure to provide service in the neutral host’s venue. UEs
entering the neutral host venue roam onto the spectrum license holder’s network following the same rules applied
for other roaming scenarios (i.e., the spectrum license holder’s network is treated as a visited network).
Another way that roaming can be employed to realize a neutral host solution is for a prospective neutral host to
execute an agreement with a spectrum license holder that does not operate its own EPC network. In this case,
the neutral host may operate the RAN and the EPC and would act as the “visited network”.
Neutral host solutions utilizing roaming standards have a number of unique aspects that affect the deployment of
the solution. These differences can often result from the environment that neutral host solutions are often
deployed where:
• Coverage areas are often very limited (e.g., a venue, campus or building).
• The number of roaming partners / hosted clients may be small (e.g., limited to providers offering services
in that area).
• The hosted clients likely have local (home) facilities improving the performance of home routed services
as compared to typical International roaming scenarios.
• Neutral Host solutions may be deployed in a potentially large number of independent sites (e.g., venue,
campus or building locations) with many different neutral host providers.
These deployment attributes may affect capabilities such as handover, PLMN-ID assignments, voice
support/emergency services and charging when designing a neutral host solution based on roaming standards.
7.1.4 Charging
Charging interfaces will be required between the neutral host (visited) network and the hosted client (home)
network entities. Section 5.3 describes the traditional charging model used in today’s roaming scenarios.
However, as noted above, neutral host solutions differ in many ways from traditional roaming. Relative to
charging, neutral host solutions may not need to deal with international tariff issues, different tax requirements or
monetary exchange rates. As such, new more efficient, real time charging methods should be explored for neutral
host scenarios. For example, Section 5.3 discusses the potential to use Distributed Ledger Technologies (DLT)
for charging.
The figure 7.2.1 shows an overview of the MOCN solution as applied to neutral host. Though MOCN can support
GSM EDGE Radio Access Network (GERAN), Universal Mobile Telecommunications System (UMTS), LTE and
5G services, this discussion will focus on the case of MOCN applied to LTE and 5G. As shown in the diagram, the
neutral host provides a shared LTE eNodeB or 5G gNodeB and associated radio equipment. The MOCN standard
allows this (e/g)NodeB to be connected to more than one core network belonging to different hosted clients. The
(e/g)NodeB broadcasts the identity of all core networks it is serving. Using standard procedures defined by 3GPP
the UE will automatically select the MOCN (e/g)NodeB if it serves its home network. Using MOCN procedures,
the (e/g)NodeB will route communications from the UE to the correct core network.
Prioritization and management of traffic on the radio interface and for other limited resources is also not
standardized in MOCN. The (e/g)NodeB is responsible for enforcement of policy which must be agreed between
the neutral host and each hosted client. Possibilities include fixed resource reservations for each client,
completely shared resources for all clients, or combined approaches that support a mixture of reserved and
shared resources.
7.2.7 Evaluation
The MOCN solution is very compatible with hosted clients and devices that support 3GPP specified technology in
licensed spectrum.
The basic functions needed to support neutral host are specified by 3GPP which should help with the design and
integration of such systems. Standardization should also ensure a good user experience as normal 3GPP
procedures are extensively reused. In concept, particularly for LTE and 5G, the MOCN neutral hosts are
technically straightforward. However, the 3GPP standards do not specify how important operational requirements
are to be realized; for example, how policies and SLAs can be defined and validated and how spectrum should be
managed in MOCN neutral hosts. Therefore, neutral hosts will need to develop their own solutions for these
aspects.
Data
Figure 7.3.3 – Cloud RAN Neutral Host Solution based on Option 6 (MAC/PHY) split
10 38.806 - Study of separation of NR Control Plane (CP) and User Plane (UP) for split option 2
ATIS-I-0000073
NG-C NG-U
Central Central
CP entity UP entity
F1-C F1-U
Distributed
entity DU
gNB
NG-U
NG-C
Central
UP entity
Distributed CU-UP Xn-U
entity
Xn-C CU-CP
F1-C
DU
gNB
NG-C
Central
CP entity
Xn-C CU-CP
NG-U
gNB
F1-C
Distributed
entity E1
In addition to these, the same issues described for shared spectrum and Cloud RAN solutions apply (i.e., the
client service provider does not control the management or placement of the APs). As such, operationally, the
neutral host and the associated environment must somehow provide sufficient operational capabilities to enable
the operator to properly manage its subscribers in the venue or must otherwise satisfy the operator that the user
experience provided is sufficient.
8 Regulatory Considerations
8.1 Emergency Services
Emergency services must be provided for UE’s in the neutral host network. Given the typically small coverage
area of many neutral host deployments, it is likely that emergency service centers for the neutral host coverage
area will be in the hosted client network. Options for emergency services may include:
• The neutral host network may force the UE to perform a CS (Circuit Switched) Fallback for emergency
calls so that IMS emergency calling is not required. This assumes that 2G/3G circuit switched access is
available in the neutral host coverage area.
• Emergency Service support may be provided by the hosted client network (home network). In standard
roaming arrangements, when the UE has roamed out of its home network, 3GPP standards indicate that
emergency services shall not be provided by the home network and shall be provided in the roamed-to
visited network. However, in the neutral host case, the home network likely has local presence along with
emergency services capabilities to cover the neutral host coverage area. One approach to accomplish
this is for the neutral host network to terminate the IMS emergency APN to a P-CSCF and an associated
emergency CSCF (E-CSCF) that is in the hosted client network serving the neutral host coverage area.
Alternatively, if the P-CSCF is in the neutral host network, it could have the ability to route directly to an E-
CSCF in the hosted client’s network that serves the coverage area.
• Emergency Service support may be provided by the neutral host network as would be typical for roaming
situations. In this case, the neutral host network will terminate the IMS emergency APN to a P-CSCF and
associated Emergency CSCF (E-CSCF) that is in the neutral host network. In this case, the neutral host is
responsible for proper handling and routing of emergency calls.
In all cases, it is important that the neutral host network support the ability to:
• Provide emergency services call routing to emergency services facilities that cover the neutral host
coverage area.
ATIS-I-0000073
• Provide the necessary UE location information to the emergency services facilities. This may be
particularly difficult when using unlicensed air interfaces and facilities.
More information regarding IMS emergency services can be found in the following 3GPP references:
• 3GPP TS 23.167, “IP Multimedia Subsystem (IMS) Emergency Sessions”.
• 3GPP TR 23.771, “Study on system impacts of IMS emergency sessions over WLAN”, evaluates
solutions to support IMS emergency sessions in a carrier network that originate using a Wireless Local
Area Network (WLAN).
In addition, ATIS has done significant work related to the application of Emergency Services in North America in
environments typical to many neutral host scenarios. Specifically:
• ATIS-I-0000053, “Wi-Fi Emergency Calling Landscape Assessment”, provides an excellent baseline for
exploring Neutral Host Emergency Calling requirements. This document provides many references and
addresses key use cases that illustrate a number of standards gaps.
• ATIS-0700015.v004, “ATIS Standard for Implementation of 3GPP Common IMS Emergency Procedures
for IMS Origination and ESInet/Legacy Selective Router Termination”, identifies and adapts as necessary
3GPP common IMS emergency procedures for applicability in North America to support emergency
communications originating from an IMS subscriber (wireline or wireless; fixed, mobile or nomadic) and
terminating at an ESInet, or, for appropriate media, legacy emergency services network to support
Multimedia Emergency Services (MMES).
• ATIS-0700028, “Location Accuracy Improvements for Emergency Calls” contains significant content on
the subject of cellular emergency calling. It is important to note that operators supporting Wi-Fi
emergency calls should be able to query the National Emergency Address Database (NEAD) from a
location server using the “existing” Nq interface in ATIS-0700028 to obtain candidate dispatchable
locations associated with the currently connected Wi-Fi access point as well as other nearby Wi-Fi access
points and Bluetooth beacons seen by the originating device.
• ATIS-1000068, “Technical Report on Support of TTY Service over IP using Global Text Telephony”
describes the means that the Teletypewriter (TTY) service can be provided over Internet Protocol (IP)
between operators’ networks through the use of the Global Text Telephony (GTT) capability which
enables simultaneous audio and/or video with text media stream.