25
Network Slicing in Public and Private 3GPP 5G Networks Network Slicing – Networking Symposium Workshop Cinzia Sartori Nokia Bell Labs 19-03-2019 Network Slicing - Networking Symposium

Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

  • Upload
    others

  • View
    6

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia1

Network Slicing in Public and Private 3GPP 5G NetworksNetwork Slicing – Networking Symposium Workshop

Cinzia Sartori

Nokia Bell Labs

19-03-2019

Network Slicing - Networking Symposium

Page 2: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia2 Network Slicing - Networking Symposium

Contents

• Network Slicing vs Private Networks

• Timeline

• 5G Network slicing, Transport Slicing

• Slice Lifecycle Management

• Trails and PoC

Page 3: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia3 Network Slicing - Networking Symposium

What is Network Slicing ?

Public safety

Fixed Wireless Access

Industrial automation

Consumer Mobile Broadband

Connected vehicles

Massive Sensors

Technical aspects Business aspects

Multiple customized logical networks on a shared physical infrastructure in an economic way

Mass Events

Page 4: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia4 Network Slicing - Networking Symposium

Network Slice Characteristics

Data speed Latency Network ServicesReliability Security

Mobility

TCO / ARPU

Geographical coverage

Positioning, Analytics,

Exposure

Management / Control

From simple GB/month to monetizing rich SLA between slice provider and tenant

Page 5: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia5 Network Slicing - Networking Symposium

Network Slicing Use Cases

M2M, IoT EPC overlay for 5G, FWA To support new business models

• Mechanism to provide SLAs for multiple

service providers

• Cloud environment makes the slicing

technically/economically feasible

• Minimum

disruption

• Investment done

in new platform

• 10x-100x difference

in ARPU

• For security and

overload protection

Happening today In the future

MVNO, MOCN

• Dedicated Core

Network in

Network sharing

or MVNO cases

From small number of static operator slices to large number of multi-tenant dynamic slices

Page 6: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia6

Techno-economic modeling of network slicing

Bell Labs Consulting analyzed the costs of implementing and operating network slicing compared to the

potential revenue that could be generated

Three network deployment scenarios were considered for the techno-economic modeling

Network Slicing - Networking Symposium

Page 7: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia7Network Slicing - Networking Symposium

Unleashing the economic potential of network slicing

Page 8: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia8

Challenging for traditional telco architectures and business modelsPrivate Networks requirements: example of Industrial IoT

Autonomy

• Keep data local

• Require a

resilient

architecture

Security

• Full control of

infrastructure,

people, and

information

• IT/Webscale

level of ext.

attacks not

acceptable

Business model

• Avoid vendor &

MNO lock-in

• Fair and quick

access to

spectrum

Liability

• MNOs have

only partial

control of the

solution

Longevity

• Need much

longer

equipment

lifetimes

• Need much

longer support

lifetimes

Network Slicing - Networking Symposium

Page 9: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia9

5G Private Networks – Rel.16

Network Slicing - Networking Symposium

Non-Public and Closed Access Group

Networks

Enhancements to the 5G System to support

non-public and MNO-hosted closed access

group (CAG) networks in terms of:

• Network discovery and selection

• Roaming between CAG and public

networks

• Access control and mobility

• Support of 5G LAN service

Operation in Licensed and Unlicensed

Spectrum

Licensed and unlicensed band operation

Achievable reliability &

latency of communication

Importance of cost &

ease of deployment

Unlicensed Licensed

Low High

ModerateHigh

PLMN

CAG

Two options for deploying private networks

Public + private

servicesPrivate services

5GC

gNB gNB

UE

Non-public network

5GC

gNB

UENo mobility

to PLMN

Can access

non-CAG gNB

Clo

sed

acc

ess

gro

up

No

n-p

ub

lic n

etw

ork

Page 10: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia10

Intelligent, converged operational technologies in a Future X networkTechnology enablers for an industrial IoT revolution

Network Slicing - Networking Symposium

Universal Adaptive Core

Programmable Network OS

Digital Value Platforms

Augmented Cognition Systems

ConvergedEdge Cloud

Software-defined

Massive ScaleAccess

Long fibers

ConvergedNode

Shortwaves & wires

Emerging Devices & Sensors

Smart Network Fabric

Autonomously optimized coverage& capacity

Openness acrossthe architecture

5G wireless protocols for automation

Eliminate wires; support time synchronous ops

Private edge cloud

Scalable, secure local computing

Deep slicing forindustrial IoT networks

Multiple stakeholders on one infrastructure

ML-enabled automated operations

“Expertless” monitoring, prediction, optimization

Page 11: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia11

Rel.15 brings network slicing, R16 private networks5G timeline in 3GPP

Network Slicing - Networking Symposium

Network Slicing Private Networks

2016

Q4

2018

Q1 Q2 Q3 Q4

5G NR NSA

completion

5G NR SA

completion

2017 2019

Q1 Q2 Q3 Q4

5G NR NSA

options 4&7

5G Rel-16

Stage 3 completion

Page 12: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia12 Network Slicing - Networking Symposium

Technology

Page 13: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia13

5G Network Architecture for Network Slicing: Common and Shared functions

Slice Specific Network Functions

N3

DN

N2N7/

N10/

N11N1

N5

UPF

NG-AF

N4

NG-SMF

N6

(*) Could be left up to operator decision

NEF NRF

Slice Common Network Functions

UDM

AMF AUSF PCF

(*) (*)

(*)

NSSF

UENG-

RAN

Shared resources

Dedicated resources

Network Slicing - Networking Symposium

Page 14: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia14

3GPP: Three pre-defined Slice types in 5G

AMF: Core Access and Mobility Management Function

SMF: Session Management Function

UPF: User Plane Function

eMBB

URLLC

mIoT

AM

F

AM

F

AM

F

SMF a

SMF b

UPF a

UPF b

Slice 1

Slice 2

Slice 3

SMF a

SMF b

UPF a

UPF b

SMF a

SMF b

UPF a

UPF b

Slice N

High throughput:

100Mbps - ~1 Gbps

High mobility support

No mobility,

small data: 100 kbps

Low throughput,

terminal battery life 10 years

High density:

100 million connections/km2

Latency: 1ms: 5ms

High availability,

mobility and

edge computing support

…many more can be defined by an operator

Network Slicing - Networking Symposium

Page 15: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia15

RAN Slicing: partly standardized, partly implementation dependent

AMFSMF

UPF

Slice B

SMF

UPF

Slice C

gNB

UE

SMF

UPF

Slice A

The UE can use multiple

network slices at the same

time and within one network

slice multiple PDU sessions

PDU sessions are slice

specific

RAN selects the RAN slice instance and AMF for

the UE based on requested/allowed NSSAI and

Temp ID

Stand. in

3GPP

NG3

NG3

NG11

NG11NG2

standardized in 3GPP

Stand. in

3GPP

Single RRC per UEStand. in

3GPP

Network Slicing - Networking Symposium

Page 16: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia16

Per 3GPP, these are implementation-dependentKey capabilities: RAN

1. Flexible creation of function instances, optimized for

different characteristics or behaviors

– E.g. instances with acceleration, or different algorithmic

behaviors, etc.

2. Flexible placement of function instances at different

locations in the network

– E.g. very close to the radio, or deeper in edge cloud, etc.

3. Flexible, adaptive radio resource management and

scheduler design

– Flexible ways for assigning/reserving/partitioning radio resources

• RAN Capabilities for flexibility for provide diverse functional

behaviors, support diverse KPIs, construct flexible SLAs

User-Plane VM1Low-throughput, Non

Multi-connectivity

User-Plane VM2High-throughput optimized,

Multi-connectivity capable

Low-band High-band WiFi

Cloud RAN

UE/Flow

Placement

CP-UECP-Cell

CP-

CentralCP-OM

RA

N C

P

MAC

Sch RLC

PHY

MAC

Sch RLC

PHY

MAC

PHY

Slice to Instance

Mapper

CP-UE

PDCP

SDAP

PDCP

SDAP

UPF (or SGW-

PGW)

AMF-SMF

(or MME)

UPF (or SGW-

PGW)

F1 F1

Network Slicing - Networking Symposium

Page 17: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia17

WAN

Transport Slice Introducing Nokia NF-IX Architecture

Nokia VSR/vEPC

VNFs

E2E Underlay Based on Segment Routing

Nokia Network services Platform

(SRIC/NSP)

Nokia SR-OS Routers

Nuage Networks Virtual Network

ServicesTelco cloud CO

E2E BGP Signaled Overlay Networks

Network Slicing - Networking Symposium

• Set of distinct connections between multiple network functions (VNF or PNF), e.g. to implement N2, N3 etc. reference points

• Transport slices are realized with

- Deterministic SLA , Any technology (IP, Optics, Microwave and PON, Any tunnel types IP, MPLS, SR, ODU/OCH

Page 18: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia18 Network Slicing - Networking Symposium

Automated Slice

Lifecycle

Management

Page 19: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia19

Preparation, Instantiation, Run-Time and DecommissioningNetwork Slice Instance Lifecycle Management

Network Slicing - Networking Symposium

Design Pre-provision

Network environment

preparation

Preparation

Instantiation/

ConfigurationActivation

Instantiation, Configuration and Activation

SupervisionModification

Run-time

Reporting

De-activation Termination

Decommissioning

Lifecycle of a Network Slice Instance

Page 20: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia20

Mode of Operation Architecture

Network Slicing - Networking Symposium

Service Orchestration Service Assurance/Analytics Service Intelligence

E2E Cross-Domain Orchestration & Service Lifecycle Management

Customer Portal

5G RAN domain controller 5G Core domain controllerTransport domain controller NFVO/VNFM

Domain Controllers

NSW FlowOne NSW eSOC* NSW Digital Intelligence

Adaption Layer

Page 21: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia21

Network Management

and optimization (SON)

NetAct and EdenNet

Planning and

Optimization

Massive scale

network wide

provisioning

Service

Monitoring

& KPIs

Transport and SDN

Management

NSP and Nuage

Closing the Loop

Service Assurance

Digital Intelligence

Secure

Security

Monetize

Digital Experience

Cloud Orchestration

NFVO and VNFM

CloudBand

ETSI

Service Fulfillment

E2E Service Orchestrator

FlowOne Federate

Inventories and Catalogues

Nokia end-to-end portfolio for Slice Lifecycle Management

1

2

3

4

5

Network Slicing - Networking Symposium

Page 22: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia22 Network Slicing - Networking Symposium

Trials, PoCs

Page 23: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia23

5G Smart Urban Mobility

Automated drivingHD maps

Infotainment

5G Smart Sea Port

Real-time video

Deep Slicing & WAN IoT for Smart Sea Port & Urban Mobility

Interworking between functions and services in CSP and vertical-owned clouds for critical applications

Traffic light management

Data processing from mobile

sensors for pollution control

Virtual Reality for remote site

inspections

Different automotive and

public safety slices running

over the same wide area

network

Opportunity for CSPs to partner with vertical industries and become DSPs

Support of massive number of sensorsMobility of edge services and applicationsWAN

IoTDeep

Slicing

Page 24: Network Slicing in Public and Private 3GPP 5G …...architecture Security •Full control of infrastructure, people, and information •IT/Webscale level of ext. attacks not acceptable

© 2019 Nokia24

5G Industrial Automation

Industrial Network Slicing

Process Automation

LAN IoT for Industrial Automation

Light core portable to local cloud owned by industries for data security, provide reliability and low latency

High reliability through Multi-

Connectivity and integration

of Time Sensitive Networks

Plug & Play and automation for dedicated networks operated by vertical industries themselves

Coupling advanced interactive

robots with wireless perimeter

intrusion detection

5G Industrial AutomationUltra-reliable, low-latency connectivity

Integrating industrial services and industrial networks e.g. Time Sensitive Network (TSN)

LAN

IoT