NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4...

14
NETWORK SLICING IN 5G Hans J. Einsiedler

Transcript of NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4...

Page 1: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

– Confidential – 5G program 1

NETWORK SLICING IN 5G

Hans J. Einsiedler

Page 2: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

2

Broadband access everywhere Broadband access in dense areas Higher user mobility Massive Internet of Things

Extreme real-time communications Lifeline communications Ultra-reliable communications Broadcast-like services

why we NEED 5G! Satisfaction of future use cases

50+ MBPS EVERYWHERE

PERVASIVE VIDEO

HIGH SPEED TRAIN

SENSOR NETWORKS

50

TACTILE INTERNET

NATURAL DISASTER

E-HEALTH SERVICES

BROADCAST SERVICES

Page 3: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

3

The most important use case - the unknown one!we cannot see into a crystal ball!

© Jo

hn Jo

achi

m H

erm

it

Page 4: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

4

Evolution of the network infrastructurefrom silos over monoliths towards slices

© CONFIG consortium

Deviceplatform

Devices Devices

Telco1POTS

Telco2

Telco3

Telco4

Use case 1Use

case 2

Services

Back-bone

Access

Use case 3

Deviceplatform

Devices Devices

Use case 1

Network control and policy

(IP based)

Back-bone

Access

Services 1

Services 3

Services 2

Use case 2

Use case 3

Infrastructure cloud

Past Present Future

Page 5: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

5

Use cases mapped to network slicesRequirements will define the network slices

© NGMN

Page 6: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

6

Slices – a service driven approachNew view on networking - especially on the end-systems

Access ofslice 1

SEA1

SEA2

SEA3

Core 1

Core 2

Core 3

Common access

betweenslice 2 and 3

Slic

e 1

Slic

e 2

Slic

e 3

Core 4

Access1 ofslice 4

Slic

e 4

Access2 ofslice 4

SEA4

Different possibilities to implement slices

End systems (terminals) are part of the slice

3GPP and ETSI expression User Equipment (UE) misleading therefore new expression needed – proposal:Service End-point Agent (SEA)

© CONFIG consortium

Page 7: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

7

Important Slice issue: service end-point agentEnd-systems not separated from the network

© CONFIG consortium

Access ofslice 1

SEA1

SEA2

SEA3

Core 1

Core 2

Core 3

Common access

betweenslice 2 and 3

Slic

e 1

Slic

e 2

Slic

e 3

Core 4

Access1 ofslice 4

Slic

e 4

Access2 ofslice 4

SEA4

End-system (physical node) can be part of different slices as long as the end-system hosted different SEAs

SEA has to be addressed through name or identifier

ID management become very important in slicing

Page 8: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

8

Slicing offers interesting opportunities (1)Roaming in visiting domains

© CONFIG consortium

Control plane in home domain

Data plane in visiting domain Data plane in home domain

Home data plane set-up in visiting domain

Home control plane extended towards visiting domain)

Local infrastructure can be extended towards other operator domains –visiting domains

Some control and data plane functions will be moved into the visiting domain

Legal interception control points (control and data plane) can stay in the home domain

Page 9: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

9

Slicing offers interesting opportunities (2)Local break-out

© CONFIG consortium

Control plane in home domain

Data plane in visiting domain Data plane in home domain

Home data plane set-up in visiting domain

Home control plane extended towards visiting domain)

Operator become a virtual operator in the visiting domain

Some control functions will stay into the home domain

All data plane function will be moved to the visiting domain

Legal interception control plane function will stay in the home domain, data plane function will be in the visiting domain

Page 10: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

10

Modularization and context awareness is neededTwo success stories

Modularization:

TR23.799 v0.8.0 is included in “Solutions for Key Issue 7: Network function granularity and interactions between them”, Section 6.7.4.

Context awareness:

Key points included as text in Section 5.9 “Key Issue 9: 3GPP architecture impacts to support network capability exposure and context information awareness”.

NextGen Core

NF1

NF2 NF3

Access N etwork

NextGen

UENG1

NGC1 NGC2

C- Plane

U- Plane NF5

NF4 NGU1

NG2

NG3

NG4

Figure 6.7.4.1-1: Architecture Modularization Reference Model

Source: 3GPP SA2 TR.23.799 v0.8.0

Page 11: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

11

Where are we now?three options – which is The right one?

Option 1 Option 2 Option 3

Pros

• No changes to 4G RAN

• No need for revolutionary 5G NW

functions design

• No changes to 4G RAN

• 5G NW functions/ new RAT design

can be optimized to fully benefit

from new technologies (e.g.,

virtualization)

• 5G NW functions/ new RAT design

can be optimized to fully benefit

from new technologies (like

virtualization)

• Solves mobility issues of option 2

• Provides a sound migration path

Cons

• Tied to the legacy paradigm for all

the use cases (which may be

expensive)

• New design could only be utilized

where there is new RAT coverage

• Potential signalling burden due to

mobility if the new RAT does not

provide seamless coverage

• Impact on 4G RAN to support

connections to EPC functions and

5G NW functions

NW Network

EPC Evolved packet core

RAN Radio access network

RAT Radio access technology

Defined interface/ reference point

Potential interface/ reference point

EPCfunctions

Fixed NWfunctions

5G NWfunctions

Fixed/Wi-Fi

New RAT

4G evolution

EPCfunctions

Fixed NWfunctions

5G NWfunctions

Fixed/Wi-Fi

New RAT

4G evolution

EPCfunctions

Fixed NWfunctions

Fixed/Wi-Fi

New RAT

4G evolution

© NGMN

Page 12: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

12

Conclusion5G will be a modular plug and play infrastructure

Modular and flexible network architecture: No one-size-fits-all approach

Virtual networks/network slices depending on use case requirements

Context awareness will offer the possibility to optimize the infrastructure and the services

ID management will be important not only to address the customer/end-system, it will also address the interconnection to the slice, the service execution environment

End-systems become part of the network slice through Service End-point Agent (SEA)

Future telecommunication infrastructure will be

modular,

software driven,

access agnostic,

virtualized, and

sliced

Page 13: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

Participants and acknowledgementjoined work of industry and academia

Current participants

* Project management ** Technical management Contact: Hans J. Einsiedler {[email protected]}

13

http://www.5g-control-plane.eu/

Page 14: NETWORK SLICING IN 5G · SEA3 Core 1 Core 2 Core 3 Common access between slice 2 and 3 1 2 3 Core 4 Access1 of slice 4 e 4 Access2 of slice 4 SEA4 End-system (physical node) can be

THANK YOU!