Professional Documents
Culture Documents
Network Slicing
White Paper
Issue V1.0
Date 2017-02-28
China Mobile Communications Corporation, Huawei Technologies Co., Ltd., Deutsche Telekom AGVolkswagen
Abstract
Previous generations of mobile networks enabled voice, data, video, and other life-changing
services. In comparison, 5G will change our society by opening up the telecom ecosystem to
vertical industries. 5G will help vertical industries to achieve the Internet of Everything vision
of ubiquitously connected, highly reliable, ultra-low latency services for massive number of
devices. Service-guaranteed network slicing introduced in this white paper is one of the essen-
tial features for 5G to achieve this vision. Key players from operators, vendors, and vertical
industries have come together to establish a common understanding on service-guaranteed
network slicing in terms of the vision, end-to end (E2E) solution, key enabling technologies, and the
impacts for vertical industries. This white paper describes the thinking on network slicing in 5G.
Previous generations of mobile networks enabled voice, data, video, and other life-changing services. In
comparison, 5G will change our society by opening up the telecom ecosystem to vertical industries. 5G will help
vertical industries to achieve the Internet of Everything vision of ubiquitously connected, highly reliable,
ultra-low latency services for massive number of devices. Service-guaranteed network slicing introduced in this
white paper is one of the essential features for 5G to achieve this vision. Key players from operators, vendors, and
vertical industries have come together to establish a common understanding on service-guaranteed network slicing
in terms of the vision, end-to end (E2E) solution, key enabling technologies, and the impacts for vertical industries.
This white paper describes the thinking on network slicing in 5G.
Table of Contents
1. Industry Trends and Requirements 02
2. Visions of Service-Guaranteed Network Slicing 04
3. Overall Architecture of Service-guaranteed Network Slicing 06
3.1 Concepts 06
3.2 Concept Clarifications 06
3.3 Architecture 07
4. Key Technologies to Enable Service-Guaranteed Network Slicing 09
4.1 Network Management System 09
4.1.1 Network Slice Management (NSM) Architecture 09
4.1.2 Network Capability Exposure via Business Support System 10
4.1.3 Third-party Applications 11
4.2 Security 11
4.2.1 Infrastructure Security 11
4.2.2 Network Management Security 11
4.2.3 NSI Security 12
4.3 Enabling Technologies for Different Technical Domains 12
4.3.1 Access Network 12
4.3.2 Core Network 14
4.3.3 Transport Network 15
4.3.4 Terminal 17
4.4 Technology Evolution 17
5.Use Case for Service-Guaranteed Network Slicing 18
6.Summary and Suggestions 20
1. Industry Trends and
Requirements
The 5G networks are not only envisioned as a diverse. Services such as smart households,
support for Internet of Things (IoT), but also as smart grid, smart agriculture, and intelligent
means to give rise to an unprecedented scale of meter reading, will require supporting an
emerging industries, instilling an infinite vitality extremely large number of connections and
in future telecommunications. IoT requires frequently transmitted small data packets.
support for a diverse range of service types, such Services such as smart vehicles and industrial
as eHealth, Internet of Vehicles (IoV), smart control will require millisecond-level latency and
households, industrial control, environment nearly 100% reliability, while infotainment
monitoring, and so on. These services will drive services will require extreme fix/mobile broad-
the rapid growth of IoT and facilitate hundreds of band connectivity. These requirements indicate
billions of devices to connect to the network, that the 5G networks need be more flexible and
which also conceives the Internet of Everything scalable to support massive connections of
vision especially from vertical industries. different nature. Meanwhile, operators will
perform a gradual shift away from pipe services
The requirements for IoT services are also very towards coping with vertical industry needs:
02
Resource multiplexing and isolation New ecosystem and business model
Different from current telecom practice, vertical The 5G networks will support new roles and
industries are likely to get involved with special- business models, which may involve network
ized network functions (dedicated routing, infrastructure providers, operators (mobile
mobility support, customized flow handling, network operators, mobile virtual network
in-network processing, etc.). To handle such operators, etc.), and vertical service providers.
diversity without losing operation efficiency, These new roles and business relationships help
operators prefer to use resource multiplexing the telecom industry to build a new ecosystem
approach with secured isolation provisioning. together with vertical industries.
03
2. Visions of Service-
Guaranteed Network
Slicing
In the 5G era, vertical industries will trigger the telecommunication industry to develop a new
networks to shift from the traditional ecosystem, but also becomes the new engine to
human-centric services to machine-centric boost the social economy with the following core
services. This not only allows the visions:
04
Terminal
Vertical
Customized Service third-party services
Resource Service
As presented above, the flexibility and diversity several logical networks with different network
expectations from the core visions are real and services, provisions, mechanisms, or assurances
tremendous. The question is how to fulfill these: on the same infrastructure. Vertical industries
the flexibility of services on the one hand and the interested in the supported services therefore
diversity of necessary network technologies on would only be required to concentrate on the
the other hand pose a daunting requirement on management of the network slicing specific
the network design, control, operations and provisions, tightly coupled with the expected
management. Such a system bears a high risk of services. Such concentration on the business
crumbling under its own complexity. To overcome needs ensures interest and competence of
these challenges while still fulfilling the expected vertical industries on the one hand and, on the
future demands, a service-guaranteed network other hand, offload them from complex
slicing is introduced in this white paper, aiming to considerations of designing, deploying, testing
realize the above core visions. It proposes to have and running such networks.
05
3. Overall Architecture
of Service-guaranteed
Network Slicing
3.1 Concepts Network slice type: Network slice types are
high-level categories for NSIs, which reflect the
Since network slicing appeared in the 5G distinct demands for network solutions. Three
vocabulary, a number of concepts have been fundamental network slice types have been identi-
derived from it, i.e. network slicing instance, fied for 5G: eMBB, mMTC, and URLLC. These could
network slice type, etc. This section aims to be further extended, e.g. according to the operators
clarify the definition of these concepts and their policies or with the development of 5G.
corresponding relationships:
Network slice template: Network slice template
Network slicing: Network slicing is the collec- is the output of the slice design phase used to
tion of a set of technologies to create specialized, create NSIs.
dedicated logical networks as a service (NaaS) in
support of network service differentiation and Tenant: Tenants are the operators' customers
meeting the diversified requirements from (for example, customers from vertical industries)
vertical industries. Through flexible and custom- or the operators themselves. They utilize the NSIs
ized design of functions, isolation mechanisms, to provide services to their users. Tenants
and O&M tools, network slicing is capable to typically will have independent O&M require-
provide logical dedicated networks upon a ments, which are uniquely applicable to the NSIs.
common infrastructure.
06
customization of the network slice template with 3.3 Architecture
the same network slice types.
Enabling network slicing in 5G requires native
Network slice template design is separate from support from the overall system architecture. As
the NSI operation. In the design phase, the shown in Figure 2, the overall architecture
network slice template is generated based on the consists of three fundamental layers: the infra-
network capability of each technical domain and structure layer, network slice layer and network
a tenant's particular requirements. In the opera- management layer. The infrastructure layer
tion phase, an NSI is instantiated based on the provides the physical and virtualized resources,
network slice template, which includes the for instance, computing resource, storage
deployment and configuration of related network resource, and connectivity. The network slice
functions and related resources in different layer runs above the infrastructure layer and
technical domains. The network slice design is provides necessary network functions, tools and
separate from the operation to enable the mechanisms to form end-to-end (E2E) logical
repeated use of a network slice template. networks via NSIs. The network management
layer contains the generic BSS/OSS and network
NSIs require multi-dimensional management. slice management (NSM) system, which designs
An NSI usually includes multiple technical and manages network slicing. Moreover, it also
domains. An NSI may also include multiple assures the SLA requirements.
administrative domains that belong to different
operators. To guarantee NSIs fast deployment, it The overall architecture has the following key
is essential to use efficient multi-dimensional features:
management via coordination and cooperation
across such different domains. Common infrastructure: Being different from
the dedicated network solution that uses physi-
NSIs ensure SLA compliance. Tenants will sign cally isolated and static networks to support
service-level agreement (SLA) with operators, tenants, network slicing promotes the use of a
which may include requirement agreements common infrastructure among tenants from the
related to security/confidentiality, same operator. It helps to achieve higher
visibility/manageability, specific service charac- resource utilization efficiency and reduce the
teristics (service type, air interface standard, and service TTM. Moreover, such design is beneficial
customized functions), and corresponding for long-term technology evolution as well as for
performance indicators (latency, throughput, shaping a healthy industry ecosystem.
packet loss rate, call drop rate, and
reliability/availability). On-demand customization: Each technical
domain in an NSI has different customization
Terminals may be involved in the selection of capabilities, which are coordinated through the
NSIs. Terminals can access one or multiple NSIs. NSM system during the process of network slice
Terminals could assist NSI selection based on, for template design, and NSI deployment and O&M.
instance, network slice type, while the network Each technical domain can perform an indepen-
performs the final selection decision. Simple dent tailoring-process in terms of design
terminals, such as sensors, are usually in a static schemes to achieve an effective balance between
and one-to-one relationship with NSIs, because the simplicity needed by commercial practice and
the costs and power consumption requirements architectural complexity.
limit the terminal capability. Therefore, the NSI
selection is solely performed by the network. Isolation: The overall architecture supports
the isolation of NSIs, including resource isola-
tion, O&M isolation, and security isolation. NSIs
07
can be either physically or logically isolated at Furthermore, different tenants may have inde-
different levels. pendent O&M demands. The NSM system
provides access to a number of O&M functions of
Guaranteed-performance: Network slicing NSIs for the tenants, which for instance allows
seamlessly integrates different domains to meet them to configure NSIs related parameters, e.g.,
and ensure industry-defined 5G performance policy.
specifications and to accommodate vertical
industry requirements. Support for multi-vendor and multi-operator
scenarios: Network slicing allows a single opera-
Scalability: Due to virtualization, which is one of tor to manage multiple technical domains, which
the key enabling technologies for network slicing, may be composed of network elements supplied
resources occupied by an NSI can dynamically by different vendors. In addition, the architecture
change, e.g., scaling in/out. also needs to support the scenario, where the
services from the tenants may cover different
O&M Capability Exposure: Tenants may use administrative domains owned by different
dedicated, shared or partially shared NSIs. operators.
NSI A
AN Third-party Third-party
BSS BSS
BSS
NSI B
Network Slice
AN OSS Management
System
AP
Edge DC Core DC
Terminal Access Network Transport Network Core Network 3rd party APP
Common Infrastructure
08
4. Key Technologies to
Enable Service-
Guaranteed Network
Slicing
4.1 Network Management System Figure 3 depicts the overall NSM system archi-
tecture, which uses Layer- and Domain-based
4.1.1 Network Slice Management (NSM) management design principle. Layer-based
Architecture management defines two layers within the NSM:
slice support system (SSS) and domain slice
The NSM system plays an important role in the support system (DSS). Domain-based manage-
entire system architecture. It provides the follow- ment implies that the basic capabilities are
ing services: provided by each individual technical domain. The
cooperation between the DSS and SSS guaran-
Design: design network slice templates tees the E2E SLA.
according to the network capabilities and SLA
requirements. Slice Support System (SSS)
Provisioning: comprise slice instantiation, The SSS mainly comprises two functional blocks:
configuration, and activation. the Network Slice Template Designer and the
Runtime assurance: observe the running status Cross Domain Slice Manager. The former gener-
of NSIs and ensure SLA. ates the network slice template according to the
Decommissioning: delete an NSI when its network capability of each technical domain as
services are not used anymore. well as the functional and performance require-
ments from the tenants. The latter is responsible
The NSM shall be based on the state of the art for the NSI lifecycle management (i.e. provision-
cloud management technologies with enhanced ing, runtime assurance, and decommissioning).
features to support network slicing. It provides The SLA is guaranteed through multi-dimensional
O&M capability using a streamline of aforemen- coordination among different domains. Based on
tioned services, which address inadequacies of the capability of each technical domain, the SSS
the traditional network management system, e.g., decomposes an SLA in terms of sets of require-
long TTM or lack of automatic O&M methods. The ments and maps each segment of SLA to the
NSM system could further help operators to corresponding technical domain. To ensure the
establish an open ecosystem to enable new overall SLA, the SSS aggregates the network
business opportunities. service performance from each individual techni-
09
cal domain. Based on this, the SSS performs DSS ensures the real-time guarantee for decom-
necessary adjustments and configurations to posed SLA capabilities in each domain, e.g. via
ensure closed-loop control. monitoring and fault localization. Each domain has
independent SLA-specific closed-loop control of
To support management across different admin- functions and resources for fast service scheduling
istrative domains for different operators, the and resource optimization.
interworking between different SSSs is compulsory.
The task of the NSM system is not only about
Domain slice Support System (DSS) seamlessly managing and assuring the SLA,
The DSS comprises the Domain Slice Managers together with advanced AI algorithms, it could
(DSMs) for different technical domains: access also predict the network status changes in order
network DSM (AN-DSM), core network DSM (CN- to provide certain management and control
DSM), and transport network DSM (TN-DSM). As a actions for precaution. The NSM system could be
logical entity, the DSM is responsible for the design, standalone (a new management entity) or non-
provisioning, runtime assurance, and decommis- standalone (integrated with OSS).
sioning of subnets in a single technical domain. The
BBS
AP
Edge DC Core DC
4.1.2 Network Capability Exposure via capabilities: design, purchasing, deployment, and
Business Support System monitoring.
The Business Support System (BSS) from opera- Design includes the design and offering of
tors is directly facing the tenants. Therefore, its commercial products related to network slicing.
usability is an essential factor. Operators use the Based on the service types and tenants require-
BSS to provide their abstracted network capability ments, the SLA is formulated. A purchasable
to the tenants. It mainly supports the following product may use one or more NSIs to accommodate
10
the tenants service. Such product with packaged functions, such as service gateway from tenants can
NSIs is used as an offering for the tenants, which be also deployed within the operator networks. This
focus on the commercial attributes of products, would enable preliminary filtration and aggregation
such as, pricing and sales territory. of a large amount of data (e.g., from sensors). The
NSM system should thus support the deployment of
Purchasing is the key part for the user experience third-party applications. The deployment positions
of the tenants. For instance, it is essential for the can be either specified, e.g., in an AN, CN, or dynami-
BSS to have a well-designed store page for display- cally determined by the SSS based on service
ing the products and personal center for monitoring requirements and network conditions during the
the purchasing progress and triggering network network slice design phase.
service related upgrading process.
11
As some network capabilities and interfaces are 4.3 Enabling Technologies for Different
exposed to tenants, the capabilities granted to a Technical Domains
particular tenant are defined by the operator.
Tenants must be authenticated and authorized Network slicing that empowers services with
before being allowed to access these capabilities guaranteed-performance relies on the enabling
and interfaces. technologies from all technical domains and E2E
operation and management. The following
4.2.3 NSI Security sections illustrate the key technologies and
architecture from the perspectives of the AN, CN,
To guarantee security for the network services TN, and terminal.
provided by an NSI, it requires embedding the
security mechanism and security provisioning entity 4.3.1 Access Network
(e.g. security anchors and security functions) into
the logical network architecture of the NSI. With the development of 5G, new radio access
technology (RAT) is also emerging, which aims to
Security isolation: Without security isolation, bring higher access performance compared to the
malicious attacks with access to one NSI may use 4G RAT. The new AN architecture, which includes
that NSI as a launching pad for attacking other NSIs fixed and mobile access, is expected to provide
by, for instance, illegally occupying resources of native support for network slicing. Hence, it is
another NSI. In addition, it may also result in essential to understand how to enable isolation,
breaches of data confidentiality and integrity capability of customization, and guaranteed SLA
attacks. in the AN, while concurrently managing radio
resources efficiently.
Slice access control: A terminal should be authenti-
cated and authorized to access a specific NSI. The To achieve the above-mentioned goal, the AN
communication between the terminal and the design has following attributes:
allocated NSIs should be protected against attacks.
Logical isolation of access resources: AN has
Customized security mechanisms: Terminals may different types of resources. The isolation level of
require different levels of security protection. these resources varies according to the demands
Terminals accessing the eMBB type NSI have strict from different operators and tenants. Frequency
security requirements on authentication and band, time, code, equipment/site, and software
encryption/decryption, which can be similar to the are a number of dimensions, in which AN
mechanisms used in LTE. Terminals like low-cost resources can be isolated. The logical isolation of
sensors accessing the mMTC type NSI require only resources requires resource multiplexing. The
lightweight authentication and amount of allocated resources can be scaled up
encryption/decryption algorithms due to limited or down for higher utilization efficiency depending
computing capability. Terminals accessing the on the traffic load of each NSI.
URLLC type NSI require quick access authentication
and strong encryption algorithms. Access differentiation: According to 3GPP's
specifications for service interaction, new RAT
functions consist of real time (RT) functions and
non-real time (NRT) functions. In the realization of
NSI in the AN, the NRT functions can apply
cloudification and orchestration technologies, in
order to satisfy the customization demands, such
as tailored access functions and configuration
differentiation. In comparison, the RT functions
12
should optimize the resource utilization and the Figure 4. New RAT features flexible air inter-
ensure that the security and isolation require- face designs and a unified media access control
ments of NSIs are satisfied. Specifically, the RT (MAC) scheduling to support different network
functions could either occupy the resources slice types. Such a combination allows time- and
exclusively or share a portion of the resources frequency-domain resource isolation without
according to the flexible configuration. Different sacrificing resource efficiency.
RT functions can apply different physical layer
(PHY) numerologies (e.g., frame-related param- Tailored functions: The protocol stack can be
eters) to provide functional differentiation for tailored to meet the diverse service requirements
different NSIs. The NRT functions can be deployed from different NSIs. For instance as shown in
in a centralized unit (CU), while the RT functions Figure 4, layer 3 (L3) radio resource control (RRC)
are preferred to be deployed in distributed units functions can be customized in network slice
(DUs) close to terminals. In order to deliver the design phase. Layer 2 (L2) can have various
fully converged 5G vision, a seamless resource configurations for different NSIs to meet specific
management covering both fixed line and mobile requirements for radio bearers. In addition, layer 1
access is required. (L1) uses flexible numerology to support different
network slice types.
Figure 4 shows the logical architecture of network
slicing support in a radio access network (RAN). Heterogeneous access: An NSI may contain
The architecture has the following attributes: different types of ANs, such as 3GPP new RAT and
Non-3GPP WLAN. Consolidating fix line and
Co-existence of independent and shared func- mobile access in 5G is a desirable approach,
tions: Different NSIs can either share the same which also requires further updates on the archi-
functions or have dedicated functions as shown in tecture design.
123456
Electricity
Figure 4: Radio access network (RAN) architecture with network slicing support example
13
APP
PCF PCF
UPF: User-Plane Function
UPF SMF SMF UPF UPF SMF PCF: Policy and Charging Function
SMF: Session Management Function
CN AMF AMF: Access and Mobility Function
eMBB NSI uRLLC NSI mMTC NSI
Terminal
Figure 5 Core network (CN) architecture with network slicing support example
Business aspects demand flexible deployment of close to or on the access sites. The second layer is
NSIs. Hence, NSIs may be available only in part of the local DC, and the upper layer is the regional
the network. It is possible for an access node to DC. Taking advantage of cloudification and
support one or multiple NSIs, wherein NSIs can be virtualization, it is possible to let the NSIs
dynamically added or removed. Moreover, NSIs breathe, in the sense of scaling the resources up
supported by an access node can significantly and down according to the real traffic needs.
differ from its neighbors. In order to guarantee
service continuity, terminals and access nodes Modularization: Compared to the 4G CN, the
should be aware of slice availability, especially in control plane and user plane functions will be
order to facilitate terminals with mobility features. further split and partitioned into fine-grained
functional modules. These modules can be
4.3.2 Core Network customized and flexibly combined in an NSI in
order to meet specific functional and/or
The CN is considered as the most critical and performance requirements.
essential part in network slicing. The CN provides
the network services for the tenants and their end Service-Orientation: In 5G, CN will apply
users, for instance control plane functions service-based architecture to realize flexible
(mobility management, session management, orchestration of network functions, services as
policy control, and charging) and user plane well as capabilities, which aims to satisfy diverse
functions (data forwarding). To meet the requirements from different tenants with high
diversified demands of vertical industries, the network operation efficiency.
network service customization and on-demand
deployment are the key concepts that need to be As illustrated in Figure 5, the CN architecture
reflected in the CN design. The CN is envisioned to defines the services provided by different network
have the following attributes: entities and their corresponding relationships.
Such services include control plane and user
Cloudification: Cloud native technology adoption plane services. The CN defined for 5G should allow
will enable the future CN to support a large the coexistence of logically isolated NSIs for
number of NSIs over common infrastructure, different tenants on a common infrastructure. The
which is based on a three-tier DC networking CN makes the decision of NSI selection for a
mode. The bottom layer is the edge DC that is terminal that attaches to the network, which could
14
be based on the assistant from the terminal. Each 4.3.3 Transport Network
NSI has its specific network topology, network
functions, and allocated resources. The CN adopts The TN comprises of different segments such as
a service-based architecture design methodology, Fronthaul, Backhaul, metropolitan area network
which includes a unified database to enable a (MAN), backbone network. To support network
coherent view, and a programmable user plane to slicing, the logical architecture of the TN is shown
support network slicing. The CN architecture in Figure 6, which could coordinate protocols used
promotes the simplification of signaling by different network segments on a data path and
interactions, enables the distribution of network support different types of isolations , e.g. via soft
functions, and allows customized network slicing method upon resource sharing or via hard
function placement (e.g., close to the AN to reduce slicing method upon dedicated resource.
latency). In order to consolidate wireless and
wireline access using the same CN, it is also The logical architecture shown in Figure 6 has the
relevant to consider access-agnostic in the following attributes:
design of CN functions and architecture.
Fusion of multiple technologies: Since a single
technology may not fulfill the diverse demands of
Soft Slicing
NF3
NF1 NF2
Hard Slicing
Figure 6: Transport network (TN) architecture with network slicing support example
15
vertical industries, multiple technologies will be Resource isolation through virtualization and
used together, for instance converged IP and resource pooling: The TN supports network slicing
optical technology in the TN domain. Each based on virtualization and resource pooling.
segment allows for different transmission These two technologies reside in different layers
technologies in parallel, such as optical of the TN. For example, virtualization technologies
wavelength division multiplexing (WDM), Ethernet such as virtual private networks (VPN) and virtual
over fiber or variants of passive optical network local area networks (VLAN) can isolate
(PON) technologies based forwarding. Based on subscriber's data transmission in the TN. A logical
the features of different technologies, it is router can create multiple routing systems within
possible for the TN to provide isolation, data rate a single router, and is another example of such
and latency differentiation for different NSIs. network virtualization. Software-Defined
Networking (SDN) technology enables operations
Convergence of channelization and of virtual networks on an SDN controller. As for
packetization: Packetization enables statistical resource pooling, WDM creates multiple optical
multiplexing to increase network usage efficiency. transmission channels in the optical network.
In comparison, channelization provides necessary Flex-E could be one solution for pooling of link
isolation among services. To enable multiple NSIs resources by partitioning a single Ethernet port
that carry different type of services, it is necessary into multiple sub-channels.
to integrate these two technologies, which can
divide a physical Ethernet port into multiple Customizability: The TN provides various
sub-channels for transmission, for example customization methods for network slicing, in
flexible Ethernet (Flex-E). terms of logical topology, route selection, and
protocol design. The TN offers NSI tenants a
Enabling technologies for low latency: Network customizable topology with logical nodes and
with extreme QoS demands, such as guaranteed links. With a customizable route, different NSIs
ultra-low latency, are the key beneficiaries of can adopt different routing policies and enable
network slicing. The TN requires further different routing protocol suites to fulfill the
innovation to provide breakthroughs in latency specific requirements of multiple services. The
reduction. Latency-oriented resource planning protocol in the TN is also customizable. For
and routing, flexible Ethernet, optimized queuing example, subscriber data can be based on
in chips, and the optical network technologies are different IP and Ethernet variants.
some examples. Such enabling technologies often
produce high cost, which may only present on a Open operation capabilities: SDN technology
small number of NSIs. Current research efforts allows the TN to provide northbound interfaces.
are focusing on various technologies to minimize These interfaces permit tenants to access the
protocol stack size, to reduce transmission logical resources in the TN. This is particularly
distance, to clear congestion, and to cut single useful for tenants to integrate their applications
point processing time. with networks automatically. Open operation
capabilities include the processes of obtaining
Integration of TN and compute: Close integration topologies, nodes, and links, as well as the
of the compute resources from the DC with the TN operation of route forwarding policies, node
will enable further optimizations and additional forwarding entries, and ports.
options for network service delivery. This also
helps to eliminate various different
understandings in fixed and mobile networks,
thus being an important building block for FMC.
16
4.3.4 Terminal where one physical terminal contains multiple
logical terminals and each logical terminal is
Terminal is an indispensable aspect of network associated with one NSI. The operating system
slicing. 5G terminals will be diversified, from (OS) and applications are all network slicing
low-cost devices to high-end equipment (smart specific.
phone, car, industry robot, drone, etc.). Terminals
will also have different ways to support network For the third scenario, the OS and applications
slicing. In general, we envision the following three are aware of different NSIs. Terminals could
scenarios shown in Figure 7. configure and schedule their own resources to
meet the SLA requirements of different NSIs.
In the first scenario, terminals are simple devices Hence, in this scenario, the OS is essential for
with limited capability (e.g., sensors). This is in contrast supporting network slicing, especially to fulfill the
to the second and third scenarios in which a terminal various security requirements.
could connect to multiple NSIs simultaneously. In this
scenario, network slicing related information could be In addition to connecting to the network, terminals
pre-configured in the terminals. could also communicate with other terminals
directly engaging in device-to-device (D2D)
The second scenario represents a solution, communications.
OS OS OS OS OS
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
4.4 Technology Evolution integrated with the NSIs as well as the network
infrastructure.
In the early stage of network slicing deployment,
there could be only a few NSIs. The deployment In current networks, technical domains are
may occur in a semi-automatic mode. As the normally coordinated via centralized network
number of NSIs increases and scenarios, such as, management system. In 5G, performing real-time
dynamic instantiation of NSIs or runtime cross-domain coordination through distributed
adaptation of the deployed NSI emerge, more lower layer such as control plane would be
advanced technologies will be desired to support possible, with potentially unified control logic of
network slicing and its further evolution. different domains.
Specifically:
Advanced automation and AI algorithms can be
Management functions will become real-time, applied in a unified, holistic network manner,
implying that the difference between which could be scalable and flexible, and which
management and control will gradually disappear. might then achieve runtime deployment and
Some management functions will be tightly adaptation of NSIs.
17
5. Use Case for Service-
Guaranteed Network
Slicing
Automotive industry is one of the prime tenants SLA contract via the operators BSS. The
for 5G. Its V2X services are well-accepted 5G use automotive provider becomes the tenant for the
cases. Such services fall into three example operator.
categories:
Step 2: The BSS triggers the design phase by
Entertainment: Example use case is in-car using the Network Slice Template Designer in
video service for the passengers. SSS. Based on the requirements from the
tenant, the operator decides to use three NSIs,
Driving assistant: This is a service with high namely NSI 1, NSI 2, and NSI 3 to accommodate
requirements on latency and reliability. Example the cDrive, cMap, cVideo and services from the
use cases are See-through, providing HD tenants, respectively. These three NSIs can have
dynamic map services with environmental different functions, configurations, AN
awareness, or real-time sharing of sensor deployment, topology, SLA, O&M requirements,
information. and resource usage strategies. For example, to
support URLLC service, NSI 1 requires to have
Efciency and comfort for fully-automated customized protocol stack in AN. For instance,
driving: This is a URLLC service. Example use reduction of the transmission time interval (TTI)
cases are high-density platooning, cooperative at L1 and abandonment of a number of
intersection control, etc. functions on L2 and L3 help fulfill these
requirements. Part of the NSI 1's CN functions
On this basis, the following use case is will be deployed close to the AN. In comparison,
highlighted herein. An automotive provider NSI 2 and NSI 3 do not pose specific demands
offers in-car services cVideo (entertainment), for AN, and they can share the same AN.
cMap (driving assistant), and cDrive (efficiency However, NSI 2 and NSI 3 still require separate
and comfort for fully-automated driving) to its CN that suit individual demands.
end users. The automotive provider cooperates
with an operator as shown in Figure 8, who Step 3: After the design phase, the BSS
provides the network solution for the automotive triggers the Cross Domain Slice Manager in SSS
provider as follows: to deploy the NSIs.
Step 1: The automotive provider declares Step 4: If the tenant plans to operate services
service requirements to the operator, based on crossing multiple operators' administrative
which, the two parties negotiate and sign the domains, this may even require cross-country
18
operations. The SSS will perform cross-domain technical domains in order to provide
collaboration with the SSSs from other guaranteed services via NSIs.
administrative domains for NSI deployment.
Step 7: After the successful deployment of the
Step 5: If customization of TN is required, the NSIs, the BSS activates the usage of the NSIs.
SSS and TN-DSM will first cooperate on network
planning. Multiple TN-DSMs will be involved if The end users of the automotive provider can
the equipment used in the TN is from different access the deployed NSIs after a successful
vendors. If no customization of the TN is authentication. The operator could offer the
required, this step will be skipped. automotive provider O&M system for each NSI.
The automotive provider can perform online
Step 6: The SSS, AN-DSM, and CN-DSM jointly service update and monitoring (e.g., the number
operate to deploy the NSIs in AN domain and CN of end users connected to the NSIs, alarms,
domain, respectively. The SSS performs overall geographical distribution of the end users, data
mapping and coordination among different traffic load, and latency).
Automotive Provider
NSI 2 NSI 3
Central DC
CN CN
NSI 1
CN
RAN Edge DC
RAN
19
6. Summary and
Suggestions
Service-guaranteed network slicing is a collaboration among operators, vendors, and
promising feature for 5G. It requires supports vertical industries to achieve such a challenging
from a complex system, which calls for a plethora goal. The joint collaboration involving the
of enabling technologies, well-developed following aspects will accelerate the growth of 5G
standards, and an increasingly mature industry industries and social economy, as well as help to
chain. We anticipate tight cross-industry create a more open and healthy ecosystem.
20
Promote Cross-Industry Collaboration
Because different vertical industries have
different understanding to apply network slicing
for their services, it is not feasible to bring
success for all vertical industries at once. To start
with, it is very important to introduce
service-guaranteed network slicing to at least
one vertical industry via trial or commercial
deployment. Large-scale deployment is not only
used for demonstration purpose, but also
enables and incubates the potential network
slicing innovations for vertical as well as
telecommunication industries. The successful
experience from one vertical industry can further
attract other vertical partners, which, in turn,
accelerates the full commercialization of network
slicing. Cross-industry collaboration also helps
foster interoperability testing and certification to
advance the network slicing ecosystem.
21
Glossary
Acronym Definition
AI Artificial Intelligence
AN Access Network
AR Augmented Reality
CN Core Network
CU Centralized Unit
DC Data Center
DU Distributed Unit
HD High Definition
OS Operating System
22
SLA Service Level Agreement
TN Transport Network
VR Virtual Reality
23
Copyright China Mobile Communications Corporation, Huawei Technologies Co., Ltd.,
Deutsche Telekom AG, Volkswagen, 2017. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
China Mobile Communications Corporation, Huawei Technologies Co., Ltd., Deutsche Telekom AG, Volkswagen.