5G network slicing

Last updated

5G network slicing is a network architecture that enables the multiplexing of virtualized and independent logical networks on the same physical network infrastructure. [1] [2] Each network slice is an isolated end-to-end network tailored to fulfill diverse requirements requested by a particular application. [3] [1]

Contents

For this reason, this technology assumes a central role to support 5G mobile networks that are designed to efficiently embrace a plethora of services with very different service level requirements (SLR). The realization of this service-oriented view of the network leverages on the concepts of software-defined networking (SDN) and network function virtualization (NFV) that allow the implementation of flexible and scalable network slices on top of a common network infrastructure. [1] [4] [5]

From a business model perspective, each network slice is administrated by a mobile virtual network operator (MVNO). The infrastructure provider (the owner of the telecommunication infrastructure) leases its physical resources to the MVNOs that share the underlying physical network. According to the availability of the assigned resources, a MVNO can autonomously deploy multiple network slices that are customized to the various applications provided to its own users. [1] [6] [7] [8]

History

The history of network slicing can be tracked back to the late 80s with the introduction of the concept of "slice" in the networking field. Overlay networks provided the first form of network slicing since heterogeneous network resources were combined to create virtual networks over a common infrastructure. However, they lacked a mechanism that could enable their programmability. [9] [10]

In the early 2000s, PlanetLab introduced a virtualization framework that allowed groups of users to program network functions in order to obtain isolated and application-specific slices. The advent of SDN technologies in 2009 further extended the programmability capabilities via open interfaces that enabled the realization of fully configurable and scalable network slices. [9] [10]

In the context of mobile networks, network slicing evolved from the concept of RAN sharing that was initially introduced in LTE standard. [11] Examples of such technology are multi-operator radio access networks (MORAN) and multi-operator core networks (MOCN), which allow network operators to share common LTE resources within the same radio access network (RAN).

Key concepts

The "one-size-fits-all" network paradigm employed in the past mobile networks (2G, 3G and 4G) is no longer suited to efficiently address a market model composed of very different applications like machine-type communication, ultra reliable low latency communication and enhanced mobile broadband content delivery. [1] [3] [12]

Network slicing emerges as an essential technique in 5G networks to accommodate such different and possibly contrasting quality of service (QoS) requirements exploiting a single physical network infrastructure. [1] [13]

The basic idea of network slicing is to "slice" the original network architecture in multiple logical and independent networks that are configured to effectively meet the various services requirements. To quantitatively realize such concept, several techniques are employed: [1] [2] [4] [5]

Impact and applications

In commercial terms, network slicing allows a mobile operator to create specific virtual networks that cater to particular clients and use cases. Certain applications - such as mobile broadband, machine-to-machine communications (e.g. in manufacturing or logistics), or smart cars - will benefit from leveraging different aspects of 5G technology. One might require higher speeds, another low latency, and yet another access to edge computing resources. By creating separate slices that prioritise specific resources a 5G operator can offer tailored solutions to particular industries. [14] [15] :3 Some sources insist this will revolutionise industries like marketing, augmented reality, or mobile gaming, [16] [17] while others are more cautious, pointing to unevenness in network coverage and poor reach of advantages beyond increased speed. [18] [19]

Slicing will be very useful to MVNOs as different use cases can be supported in a layer based on parameters like low latency high speed for video streaming for OTT focused MVNOs, similarly telemetry operations could have lower speed parameter and as on.

Slicing can also enhance service continuity via improved roaming across networks, by creating a virtual network running on physical infrastructure that spans multiple local or national networks; or by allowing a host network to create an optimised virtual network which replicates the one offered by a roaming device's home network. [15] :6

Architecture overview

Generic 5G network slicing framework Generic 5G network slicing framework.svg
Generic 5G network slicing framework

Although there are different proposals of network slice architectures, [20] [21] [22] it is possible to define a general architecture that maps the common elements of each solution into a general and unified framework. From a high-level perspective, the network slicing architecture can be considered as composed of two mains blocks, one dedicated to the actual slice implementation and the other dedicated to the slice management and configuration. [3] The first block is designed as a multi-tier architecture composed by three layers (service layer, network function layer, infrastructure layer), where each one contributes to the slice definition and deployment with distinct tasks. The second block is designed as a centralized network entity, generically denoted as network slice controller, that monitors and manages the functionalities between the three layers in order to efficiently coordinate the coexistence of multiple slices. [9]

Service layer

The service layer interfaces directly with the network business entities (e.g. MVNOs and 3rd party service providers) that share the underlying physical network and it provides a unified vision of the service requirements. Each service is formally represented as service instance, which embeds all the network characteristics in the form of SLA requirements that are expected to be fully satisfied by a suitable slice creation. [20]

Network function layer

The network function layer is in charge of the creation of each network slice according to service instance requests coming from the upper layer. It is composed of a set of network functions that embody well-defined behaviors and interfaces. Multiple network functions are placed over the virtual network infrastructure and chained together to create an end-to-end network slice instance that reflects the network characteristics requested by the service. [1] [4] The configuration of the network functions are performed by means of a set of network operations that allow management of their full lifecycle (from their placement when a slice is created to their de-allocation when the function provided is no longer needed). [3]

To increase resource usage efficiency, the same network function can be simultaneously shared by different slices at the cost of an increase in the complexity of operations management. Conversely, a one-to-one mapping between each network function and each slice eases the configuration procedures, but can lead to poor and inefficient resource usage. [1] [5]

Infrastructure layer

The infrastructure layer represents the actual physical network topology (radio access network, transport network and core network) upon which every network slice is multiplexed and it provides the physical network resources to host the several network functions composing each slice. [23]

The network domain of the available resources includes a heterogeneous set of infrastructure components like data centers (storage and computation capacity resources), devices enabling network connectivity such as routers (networking resources) and base stations (radio bandwidth resources). [13]

Network slice controller

The network slice controller is defined as a network orchestrator, which interfaces with the various functionalities performed by each layer to coherently manage each slice request. The benefit of such network element is that it enables an efficient and flexible slice creation that can be reconfigured during its life-cycle. [4] Operationally, the network slice controller oversees several tasks that provide more effective coordination between the aforementioned layers: [2] [3] [9]

Due to the complexity of the performed tasks which address different purposes, the network slice controller can be composed by multiple orchestrators that independently manage a subset of functionalities of each layer. To fulfill the service requirements, the various orchestration entities need to coordinate with each other by exchanging high-level information about the state of the operations involved in the slice creation and deployment. [5]

Slice isolation

Slice isolation is an important requirement that allows enforcing the core concept of network slicing about the simultaneous coexistence of multiple slices sharing the same infrastructure. [1] This property is achieved by imposing that each slice's performance must not have any impact on the other slice's performance. The benefit of this design choice is that enhances the network slice architecture in two main aspects: [1] [3]

Guaranteeing QoS

Slicing has become an important part of 5G networks, but we don't have to forget to guarantee the QoS. Some studies have demonstrated that formulating the problem with the QoS as a stochastic problem, permit us to maximize the average throughput of the AP, while satisfying the constraints related to the QoS. [1] [24]

Monetizing 5G network slicing

Monetizing 5G services faster is one of the topics that interests network operators the most because the costs of building and maintaining 5G networks are high, and it's difficult to predict the demand for 5G services. 5G network slicing is one of the effective ways to offer customized services for different industries such as manufacturing, transportation, and healthcare. Combined with AIOps, ML/AI-driven automation and 5G lifecycle optimization, it can reduce OpEx and increase revenues for network operators.

5G core network slicing

In the 3GPP 5G core architecture, the user plane and control plane functions are separated. Control plane capabilities, for instance, session management, access authentication, policy management, and user data storage are independent of the user plane functionality. The user plane handles packet forwarding, encapsulation or de-capsulation, and associated transport level specifics. This separation leads to the distribution of the user plane functions close to the edge of network slices (e.g., so as to reduce latency) and to be independent of the control plane. [1] The main 5G core network entities are the Authentication server function (AUSF), Unstructured data storage network function (UDSF), Network exposure function (NEF), NF repository function (NRF), Policy control function (PCF), Unified data management (UDM), Network Slice Selection Function (NSSF), Communication Service Management Function (CSMF), AMF, SMF, and UPF. The AMF (as a function of the CP) controls UEs that have been authenticated to use the services of the operator and manages the mobility of the UEs across the gNBs. The SMF (again part of the CP) manages the sessions of UEs, while AMF transmits the session management messages between the UEs and SMF. UPF (as part of the UP) performs the processing and forwarding of the user data. NSSF (as a function of the CP) is responsible for the management and orchestration of network slices. CSMF (as a function of the CP) translates the requirements of services to requirements relating to network slices. [1] 5G Core network functions can be sliced to support specific services for different UEs. Thanks to the modular nature of the 5G core, the network functions of the 5G core can be split and shared between different network slices to reduce management complexity. [1] In general, we can perform 5G core network slicing in two ways. We can implement dedicated core network functions per network slice. In this architecture, each network slice has a set of completely dedicated core network functions (e.g., AUSF, AMF, SMF, and UDM). The UEs can access various services from network slices and different core networks. Alternatively, we can share some control plane functions between the network slices while others such as user plane functions are slice specific (e.g., UPF). AMF is usually shared by several network slices, while SMF and UPF are usually dedicated to specific network slices. The AMF function will be shared between different network slices in order to reduce the mobility management signaling when the UE uses the services of different network slices simultaneously. For example, UE location management or the control signaling between the UE and the old AMF will be reduced when it will be connected to the new AMF of another network slice. Also, UDM and NSSF are typically shared by all network slices to reduce the management complexity of network slices. [1]

Network slicing security

The emergence of network slicing also exposes novel security and privacy challenges, primarily related to aspects such as network slicing life-cycle security, inter-slice security, intra-slice security, slice broker security, zero-touch network and management security, and blockchain security. [25] Therefore, enhancing the security, privacy, and trust of network slicing has become a key research area toward realizing the true capabilities of 5G. Various security solutions are proposed for resolving the security threats, challenges, and issues of network slicing. These solutions include artificial intelligence based solutions, security orchestration, blockchain based solutions, Security Service Level Agreement (SSLA) and policy based solutions, security monitoring based solutions, slice isolation, security-by-design and privacy-by-design, and offering security as a service. [25]

See also

Related Research Articles

<span class="mw-page-title-main">Wireless network</span> Computer network not fully connected by cables

A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking allows homes, telecommunications networks and business installations to avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Admin telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model network structure.

The Intelligent Network (IN) is the standard network architecture specified in the ITU-T Q.1200 series recommendations. It is intended for fixed as well as mobile telecom networks. It allows operators to differentiate themselves by providing value-added services in addition to the standard telecom services such as PSTN, ISDN on fixed networks, and GSM services on mobile phones or other mobile devices.

In telecommunications, provisioning involves the process of preparing and equipping a network to allow it to provide new services to its users. In National Security/Emergency Preparedness telecommunications services, "provisioning" equates to "initiation" and includes altering the state of an existing priority service or capability.

<span class="mw-page-title-main">VLAN</span> Network communications domain that is isolated at the data link layer

A virtual local area network (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer. In this context, virtual refers to a physical object recreated and altered by additional logic, within the local area network. Basically, a VLAN behaves like a virtual switch or network link that can share the same physical structure with other VLANs while staying logically separate from them. Between network devices, VLANs work by applying tags to network frames and handling these tags in networking systems –creating the appearance and functionality of network traffic that is physically on a single network but acts as if it were split between separate networks. In this way, VLANs can keep network applications separate despite being connected to the same physical network, and without requiring multiple sets of cabling and networking devices to be deployed.

Information technology service management (ITSM) are the activities performed by an organization to design, build, deliver, operate and control IT services offered to customers.

<span class="mw-page-title-main">DNP3</span> Computer network protocol

Distributed Network Protocol 3 (DNP3) is a set of communications protocols used between components in process automation systems. Its main use is in utilities such as electric and water companies. Usage in other industries is not common. It was developed for communications between various types of data acquisition and control equipment. It plays a crucial role in SCADA systems, where it is used by SCADA Master Stations, Remote Terminal Units (RTUs), and Intelligent Electronic Devices (IEDs). It is primarily used for communications between a master station and RTUs or IEDs. ICCP, the Inter-Control Center Communications Protocol, is used for inter-master station communications. Competing standards include the older Modbus protocol and the newer IEC 61850 protocol.

Software multitenancy is a software architecture in which a single instance of software runs on a server and serves multiple tenants. Systems designed in such manner are "shared". A tenant is a group of users who share a common access with specific privileges to the software instance. With a multitenant architecture, a software application is designed to provide every tenant a dedicated share of the instance—including its data, configuration, user management, tenant individual functionality and non-functional properties. Multitenancy contrasts with multi-instance architectures, where separate software instances operate on behalf of different tenants.

<span class="mw-page-title-main">Edge computing</span> Distributed computing paradigm

Edge computing is a distributed computing model that brings computation and data storage closer to the sources of data. More broadly, it refers to any design that pushes computation physically closer to a user, so as to reduce the latency compared to when an application runs on a centralized data centre.

A wireless ad hoc network (WANET) or mobile ad hoc network (MANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers or wireless access points. Instead, each node participates in routing by forwarding data for other nodes. The determination of which nodes forward data is made dynamically on the basis of network connectivity and the routing algorithm in use.

<span class="mw-page-title-main">Desktop virtualization</span> Software technology

Desktop virtualization is a software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.

Cloud storage is a model of computer data storage in which data, said to be on "the cloud", is stored remotely in logical pools and is accessible to users over a network, typically the Internet. The physical storage spans multiple servers, and the physical environment is typically owned and managed by a cloud computing provider. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment secured, protected, and running. People and organizations buy or lease storage capacity from the providers to store user, organization, or application data.

In computing, network virtualization is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network. Network virtualization involves platform virtualization, often combined with resource virtualization.

<span class="mw-page-title-main">Cloud computing</span> Form of shared internet-based computing

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each of which is a data center. Cloud computing relies on sharing of resources to achieve coherence and typically uses a pay-as-you-go model, which can help in reducing capital expenses but may also lead to unexpected operating expenses for users.

Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.

Software-defined networking (SDN) is an approach to network management that uses abstraction to enable dynamic and programmatically efficient network configuration to create grouping and segmentation while improving network performance and monitoring in a manner more akin to cloud computing than to traditional network management. SDN is meant to improve the static architecture of traditional networks and may be employed to centralize network intelligence in one network component by disassociating the forwarding process of network packets from the routing process. The control plane consists of one or more controllers, which are considered the brains of the SDN network, where the whole intelligence is incorporated. However, centralization has certain drawbacks related to security, scalability and elasticity.

<span class="mw-page-title-main">Cloud computing architecture</span>

Cloud computing architecture refers to the components and subcomponents required for cloud computing. These components typically consist of a front end platform, back end platforms, a cloud based delivery, and a network. Combined, these components make up cloud computing architecture.

Network functions virtualization (NFV) is a network architecture concept that leverages IT virtualization technologies to virtualize entire classes of network node functions into building blocks that may connect, or chain together, to create and deliver communication services.

IEEE 1914.1 is a standard for packet-based fronthaul transport networks developed under IEEE 1914 Next Generation Fronthaul InterfaceNGFI (xhaul) Working Group. NGFI (xhaul) working group is sponsored by IEEE Communications Society/Standards Development Board (COM/SDB). IEEE 1914.1 standardizes architecture and requirements for mobile fronthaul network – spanning between cell sites and centralized baseband locations in Centralized, Collaborative, Cloud and Clean Radio Access Network C-RAN.

5G NR is a radio access technology (RAT) developed by the 3rd Generation Partnership Project (3GPP) for the 5G mobile network. It was designed to be the global standard for the air interface of 5G networks. It is based on orthogonal frequency-division multiplexing (OFDM), as is the 4G long-term evolution (LTE) standard.

<span class="mw-page-title-main">Aerial base station</span>

An Aerial base station (ABS), also known as unmanned aerial vehicle (UAV)-mounted base station (BS), is a flying antenna system that works as a hub between the backhaul network and the access network. If more than one ABS is involved in such a relaying mechanism the so-called fly ad-hoc network (FANET) is established. FANETs are an aerial form of wireless ad hoc networks (WANET)s or mobile ad hoc networks (MANET)s.

References

  1. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Jalalian, Azad; Yousefi, Saleh; Kunz, Thomas (2023-06-01). "Network slicing in virtualized 5G Core with VNF sharing". Journal of Network and Computer Applications. 215: 103631. doi:10.1016/j.jnca.2023.103631. ISSN   1084-8045.
  2. 1 2 3 Rost, P.; Mannweiler, C.; Michalopoulos, D. S.; Sartori, C.; Sciancalepore, V.; Sastry, N.; Holland, O.; Tayade, S.; Han, B. (2017). "Network Slicing to Enable Scalability and Flexibility in 5G Mobile Networks". IEEE Communications Magazine . 55 (5): 72–79. arXiv: 1704.02129 . Bibcode:2017arXiv170402129R. doi:10.1109/MCOM.2017.1600920. ISSN   0163-6804. S2CID   4082069.
  3. 1 2 3 4 5 6 Foukas, X.; Patounas, G.; Elmokashfi, A.; Marina, M. K. (2017). "Network Slicing in 5G: Survey and Challenges" (PDF). IEEE Communications Magazine. 55 (5): 94–100. doi:10.1109/MCOM.2017.1600951. hdl: 20.500.11820/cd5f221d-27ef-4ac3-9120-8292d9e25102 . ISSN   0163-6804. S2CID   206456479.
  4. 1 2 3 4 Yousaf, F. Z.; Bredel, M.; Schaller, S.; Schneider, F. (2018). "NFV and SDN—Key Technology Enablers for 5G Networks". IEEE Journal on Selected Areas in Communications. 35 (11): 2468–2478. arXiv: 1806.07316 . Bibcode:2018arXiv180607316Z. doi:10.1109/JSAC.2017.2760418. ISSN   0733-8716. S2CID   19639125.
  5. 1 2 3 4 Ordonez-Lucena, J.; Ameigeiras, P.; Lopez, D.; Ramos-Munoz, J. J.; Lorca, J.; Folgueira, J. (2017). "Network Slicing for 5G with SDN/NFV: Concepts, Architectures, and Challenges". IEEE Communications Magazine. 55 (5): 80–87. arXiv: 1703.04676 . Bibcode:2017arXiv170304676O. doi:10.1109/MCOM.2017.1600935. hdl:10481/45368. ISSN   0163-6804. S2CID   206456434.
  6. Zhu, Kun; Hossain, Ekram (2016). "Virtualization of 5G Cellular Networks as a Hierarchical Combinatorial Auction". IEEE Transactions on Mobile Computing. 15 (10): 2640–2654. arXiv: 1511.08256 . doi:10.1109/tmc.2015.2506578. ISSN   1536-1233. S2CID   2319612.
  7. Network Slicing - Use Case Requirements. GSMA. April 2018.
  8. D'Oro, Salvatore; Restuccia, Francesco; Melodia, Tommaso; Palazzo, Sergio (2018). "Low-Complexity Distributed Radio Access Network Slicing: Algorithms and Experimental Results". IEEE/ACM Transactions on Networking. 26 (6): 2815–2828. arXiv: 1803.07586 . Bibcode:2018arXiv180307586D. doi:10.1109/tnet.2018.2878965. ISSN   1063-6692. S2CID   3843197.
  9. 1 2 3 4 Afolabi, Ibrahim; Taleb, Tarik; Samdanis, Konstantinos; Ksentini, Adlen; Flinck, Hannu (2018). "Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions". IEEE Communications Surveys & Tutorials. 20 (3): 2429–2453. doi:10.1109/comst.2018.2815638. ISSN   1553-877X. S2CID   52059869.
  10. 1 2 Bagaa, Miloud; Taleb, Tarik; Gebremariam, Anteneh Atumo; Granelli, Fabrizio; Kiriha, Yoshiaki; Du, Ping; Nakao, Akihiro (2017). "End-to-end Network Slicing for 5G Mobile Networks". Journal of Information Processing. 25: 153–163. doi: 10.2197/ipsjjip.25.153 . hdl: 11572/171819 . ISSN   1882-6652.
  11. "RAN Sharing". www.3gpp.org. Retrieved 2019-07-03.
  12. Shafi, Mansoor; Molisch, Andreas F.; Smith, Peter J.; Haustein, Thomas; Zhu, Peiying; De Silva, Prasan; Tufvesson, Fredrik; Benjebbour, Anass; Wunder, Gerhard (2017). "5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice". IEEE Journal on Selected Areas in Communications. 35 (6): 1201–1221. doi: 10.1109/jsac.2017.2692307 . ISSN   0733-8716.
  13. 1 2 Zhang, H.; Liu, N.; Chu, X.; Long, K.; Aghvami, A.; Leung, V. C. M. (2017). "Network Slicing Based 5G and Future Mobile Networks: Mobility, Resource Management, and Challenges". IEEE Communications Magazine. 55 (8): 138–145. arXiv: 1704.07038 . Bibcode:2017arXiv170407038Z. doi:10.1109/MCOM.2017.1600940. ISSN   0163-6804. S2CID   6755704.
  14. "What Is 5G Network Slicing?". SDXCentral.com. Retrieved 20 February 2020.
  15. 1 2 "An Introduction to Network Slicing" (PDF). GSMA.com. Retrieved 20 February 2020.
  16. Stein, Yuval. "Edge Computing and Network Slicing Will Make 5G Gamer-Friendly". The Fast Mode. Retrieved 20 February 2020.
  17. Newman, Daniel. "4 Reasons 5G Is Critical For Mass Adoption Of AR And VR". Forbes. Retrieved 20 February 2020.
  18. Lomas, Natasha (2 March 2019). "5G phones are here but don't rush to upgrade". TechCrunch. Retrieved 20 February 2020.
  19. "Will 5G Change the Interactive Marketing Experience". gms-worldwide.com. 2019-08-28. Retrieved 20 February 2020.
  20. 1 2 Description of Network Slicing Concept. NGMN Alliance. 2016.
  21. View on 5G Architecture. 5GPPP. 2017.
  22. "Network Slicing and 3GPP Service and Systems Aspects (SA) Standard". IEEE Software Defined Networks. December 2017. Retrieved 2019-07-03.
  23. Jiang, M.; Condoluci, M.; Mahmoodi, T. (2016). "Network slicing management and prioritization; prioritization in 5G mobile systems". European Wireless 2016; 22nd European Wireless Conference: 1–6. ISBN   9783800742219.
  24. Richart, Matías (2020). "Slicing With Guaranteed Quality of Service in WiFi Networks". IEEE Transactions on Network and Service Management. 17 (3): 1822–1837. doi:10.1109/TNSM.2020.3005594. hdl: 10902/20839 . S2CID   221590556.
  25. 1 2 Alwis, Chamitha De; Porambage, Pawani; Dev, Kapal; Gadekallu, Thippa Reddy; Liyanage, Madhusanka (2023). "A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions". IEEE Communications Surveys & Tutorials: 1–1. doi: 10.1109/COMST.2023.3312349 . hdl: 10547/625983 . ISSN   1553-877X.