On The Rollout of Network Slicing in Carrier Networks - A Technology Radar
On The Rollout of Network Slicing in Carrier Networks - A Technology Radar
On The Rollout of Network Slicing in Carrier Networks - A Technology Radar
Article
On the Rollout of Network Slicing in Carrier Networks:
A Technology Radar
Jose Ordonez-Lucena 1, *, Pablo Ameigeiras 2 , Luis M. Contreras 1 , Jesús Folgueira 1 and Diego R. López 1
Abstract: Network slicing is a powerful paradigm for network operators to support use cases with
widely diverse requirements atop a common infrastructure. As 5G standards are completed, and
commercial solutions mature, operators need to start thinking about how to integrate network slicing
capabilities in their assets, so that customer-facing solutions can be made available in their portfolio.
This integration is, however, not an easy task, due to the heterogeneity of assets that typically exist
in carrier networks. In this regard, 5G commercial networks may consist of a number of domains,
each with a different technological pace, and built out of products from multiple vendors, including
legacy network devices and functions. These multi-technology, multi-vendor and brownfield features
constitute a challenge for the operator, which is required to deploy and operate slices across all these
domains in order to satisfy the end-to-end nature of the services hosted by these slices. In this context,
Citation: Ordonez-Lucena, J.;
the only realistic option for operators is to introduce slicing capabilities progressively, following a
Ameigeiras, P.; Contreras, L.M.;
phased approach in their roll-out. The purpose of this paper is to precisely help designing this kind
Folgueira, J.; López, D.R. On the
of plan, by means of a technology radar. The radar identifies a set of solutions enabling network
Rollout of Network Slicing in Carrier
Networks: A Technology Radar.
slicing on the individual domains, and classifies these solutions into four rings, each corresponding
Sensors 2021, 21, 8094. https:// to a different timeline: (i) as-is ring, covering today’s slicing solutions; (ii) deploy ring, corresponding
doi.org/10.3390/s21238094 to solutions available in the short term; (iii) test ring, considering medium-term solutions; and
(iv) explore ring, with solutions expected in the long run. This classification is done based on the
Academic Editors: Cristina technical availability of the solutions, together with the foreseen market demands. The value of this
Cervelló-Pastor, Francisco Valera, radar lies in its ability to provide a complete view of the slicing landscape with one single snapshot,
Jorge Navarro Ortiz and by linking solutions to information that operators may use for decision making in their individual
Jasone Astorga go-to-market strategies.
together, within and across domains. The high integration efforts on the operator
side to achieve multi-provider interoperability can be partially relieved by selecting
solutions which are standards-compliant, i.e., based on the use of open interfaces.
• Brownfield environments. Carrier networks are formed of already available equip-
ment and functions (legacy is the common term for them), aimed at offering services
from previous generations and even former releases of the current one. The need
to keep this legacy up and running shall be combined with the introduction of the
slicing functionality, avoiding the creation of silos. Unlike greenfield environments
(e.g., private 5G networks), where network slicing can be easily launched as soon as
commercial products are available, in carrier networks the operator needs to carefully
upgrade its assets in such a way that the the legacy and slicing features can coexist.
This process needs to be conducted in a cost-efficient way, ensuring that the upfront
CAPEX behind every required upgrade will be compensated with a large mass of
customers willing to consume the added slicing features.
The above challenges outline the main issues that operators need to work out to fulfill
the promise of E2E network slicing, in 5G and beyond. However, solving these issues
towards this ultimate goal may require years, specially for the first issue (i.e., the different
slicing readiness across the different domains). In the meantime, operators need to look
for workarounds to start commercializing and monetizing network slicing, incorporating
solutions in their portfolio according to the set of slicing capabilities available in their
networks by then. The population of the portfolio is not an easy task, given the quite
fragmented landscape in standards and literature, with plenty of ad-hoc solutions that
cover particular slicing aspects from different domains and under different assumptions.
Defining a network slicing rollout plan based on the current collection of solutions is a
critical activity for operators to succeed in the market. This activity consists of two steps.
First, identifying all relevant solutions and positioning them in a common space, with
multiple dimensions that reflect the E2E conception of network slicing. Secondly, defining
a go-to-market strategy [3], based on deciding which solutions will be made available,
when, for which customers, and under which business models.
The purpose of this paper is to address the first step, outlining a technology radar to
model this common space. This radar presents a phased-based vision for the introduction of
network slicing capabilities in commercial networks, considering all the domains impacted
in operator assets, including the main three technology domains and the OSS. In this vision,
the radar identifies different solutions for network slicing and captures them into four
rings, each corresponding to a different timeline: as-is ring (today’s slicing), deploy ring
(short-term slicing), test ring (medium-term slicing) and explore ring (long-term slicing).
The position of each solution in the radar is done according to three different criteria: (i) the
technology maturity of the solution, which is related to the readiness of the corresponding
standards; (ii) the roadmap of commercial products, which specifies when the features
associated with the solution will be available; and (iii) the relevance for the customers,
which determines the prioritization of the solution over others.
To the best of our knowledge, this is the first work in the literature that provides a
radar for E2E network slicing, with a focus on the rollout of this technology in carrier net-
works. The radar captures a complete landscape of network slicing solutions, linking them
to different timelines. In addition to this timing, the radar will also outline the dimensions
impacting slice realization, from E2E viewpoint. These dimensions are to be analyzed in
each of the operator managed domains, including Radio Access Network (RAN), Core
Network (CN), Transport Network (TN) and OSS. In the RAN domain, network solutions
are to be discussed based on three dimensions: functionality (e.g., disaggregation and
O-RAN integration), radio resource allocation and penetration (in micro and macro cells).
The CN domain will focus on how to use and combine core network functions for different
slices, including baseline and value-added functions, depending on isolation and customer
requirements. In the TN domain, slicing is to be discussed based on the availability of
transport technologies and SDN-enabled capabilities, including programmability and au-
Sensors 2021, 21, 8094 4 of 52
tomation. Finally, in the OSS domain, aspects related to network slice lifecycle management
and capability exposure (i.e., to expose slicing capabilities to customers through service
APIs) will be taken into account. These dimensions are used to characterize the different
solutions captured in the radar, providing guidance on how and where using them. This
information, together with the timeline provided for these solutions, is the input material
that enables an operator to define the plan for network slicing rollout. For further details
on how to design and execute this plan, see recommendations reported in [4–6].
This article is structured as follows. Section 2 provides the technical background of
E2E network slicing, with focus on the modelling, system architecture and deployment
related aspects. Section 3 outlines the impact that the network slicing may introduce on the
different technology domains. The understanding of these features will enable the reader
to understand the radar, which is introduced in Section 4. The radar is the core contribution
of this article, and hence deserves a detailed discussion, with a thorough analysis of all the
solutions along the different dimensions: CN (Section 5), RAN (Section 6), TN (Section 7)
and OSS (Section 8). Finally, Section 9 summarizes the main conclusions of this work.
and-spoke), across different aggregation levels. The TN domain sets up the data path across
the different RAN and CN functions, by mapping their interfaces into Wide Area Network
(WAN) infrastructure resources. According to this mapping, different TN segments can
be outlined:
• Fronthaul segment, scoping the data path between the RU and the DU. This data path
implements the O-RAN fronthaul interface (split 7-2x).The control, data, management
and synchronization planes of this interface are defined in [11,12].
• Midhaul segment, which sets up the data path between the DU and the CU. This data
path implements the 3GPP F1 interface (split 2) [13].
• Backhaul segment, established between the CU and the UPF. It covers two 3GPP
interfaces: N3 (CU-to-UPF) and N9 interface (UPF-to-UPF). When the UPF connected
to the CU is the anchor UPF, then the N9 interface is not needed [10].
• DN segment, establishing connectivity between the (anchor) UPF [10] and the DN.
This segment is the transport level realization of the 3GPP N6 interface [14].
To make slicing a reality, every technical domain is split into one or more logical
network partitions, each referred to as a network slice subnet. The definition of multiple
slice subnets on a single domain allows this segment to provide differentiated behaviors, in
terms of functionality and/or performance. The stitching of slice subnets across the RAN,
CN and TN results in the definition of network slices.
The rules for the definition of network slice subnets and their composition into network
slices are detailed in the 5G Network Resource Model (NRM), specifically in the Network
Slice NRM fragment [15]. This fragment captures the information model of 5G network
slicing. As seen in Figure 1, this model specifies the relationships across the manageable
entities, each represented as a separate Information Object Class (IOC). An IOC captures the
semantics and attributes of a manageable entity; in other words, it defines the class based
on which instances (objects) from this entity can be created. In the model, we have four
different IOCs: (i) NetworkSlice IOC, representing a network slice; (ii) NetworkSliceSubnet
IOC, associated with a network slice subnet; (iii) ManagedFunction IOC, which represents a
5G network function; and (iv) EP_Transport IOC, which represents an interface associated
with transport level information, e.g., transport address, reachability information, and
QoS profiles. Note that for NetworkSlice and NetworkSliceSubnet IOCs, two additional
constructions are defined:
Figure 1. 3GPP Information Model of a network slice: the Network Slice NRM fragment.
• ServiceProfile: represents the requirements that the slice needs to support for a partic-
ular service. The 1:N relationship of this construction with the NetworkSlice IOC is
because one network slice can host multiple services, as long as they do not impose
conflicting requirements. These services can be from the same customer (the slice
is dedicated for this customer) or different customers (the slice is used for serving
multiple customers).
Sensors 2021, 21, 8094 6 of 52
• SliceProfile: similar to the ServiceProfile, but applied to the slice subnet level.
Though multiple associations can be found across these IOCs, the most typical case
consists in having one slice consisting of two slice subnets: one including NG-RAN func-
tions (RAN slice subnet) and the other 5GC functions (CN slice subnet). Each network slice
subnet can be deployed as an ETSI network service (via the NetworkService class), provided
that one of the network functions is realized as a Virtualized Network Function (VNF) [16].
Finally, the EP_Transport IOC features the TN slicing behavior across the RAN and CN
slice subnets, by mapping the QoS requirements associated to the different interfaces (e.g.,
F1, N3, N6, etc.) into appropriate WAN resources.
AI models &
engine
traning
Mgmt
OSS layer
Catalogues Inventory 3GPP TS 28.5xx [31/32/45/50]
(predictive &
impact analysis)
Onboarding 3GPP TS 28.5xx ETSI NFV 3GPP TS 28.5xx
[31/32/45/50] IETF TEAS [31/32/45/50]
SOL005
Data aggregation
Descriptors (NST/NSST, NSD,..) CM FM PM CM FM PM CM FM PM CM FM PM
Events (alarms, metrics, trace..)
Capacity CI/CD/CT RAN Mgmt Domain NFV Mgmt Domain TN Mgmt Domain CN Mgmt Domain feed
planning tools tools (includes RAN-NSSMF) (NFVO+VIM/CISM) (Transport SDN fabric) (includes CN-NSSMF) Telemetry Discovery
Design
Network layer
RU DU CU-UP SMF DN
mIoT slice PDCP/SDAP
UPF (mIoT
service apps)
CU-UP SMF DN
High PHY
Low Phy
(eMBB
MAC
The network layer is formed of a collection of modular network functions that can be
flexibly combined together to build up network slices. Figure 2 shows an example with
three different slices, one for each main 5G service category. The fact that every slice needs
to be provisioned with a service-tailored user and control planes justifies the allocation
of dedicated NR and 5GC network functions in their RAN and CN slice subnets. Which
network functions are to be dedicated per slice and which ones can be shared with other
slices needs to be analyzed case by case, as it depends (i) on the isolation requirements
of the slice under consideration, and (ii) the type of customer that will consume this slice.
Further discussion on this topic is captured in Sections 5.1 and 6.1.
The OSS layer conveys all the Operation, Administration and Maintenance (OAM)
tools that operators may use to manage the different slices across their entire lifetime [17].
These tools are classified into four main groups, depending on their scoped functionality:
(i) design, (ii) data management, (iii) assurance and (iv) orchestration. The most notable
group is the orchestration, responsible for all the activities related to slice provisioning
(i.e., going from a service order to a deployed network slice) and slice operation (i.e., keep
the deployed slice at the desired state at run-time). This collection of activities shall be
Sensors 2021, 21, 8094 7 of 52
performed consistently across all the technical domains, with an E2E perspective. The
specificities of these domains, each with a different pace of technological evolution and
with legacy from multiple vendors, unveils non-negligible integration issues for operators.
This is exacerbated as the number of slices running in parallel increases.
To cope with the above integration and scalability challenges, operators are required to
adopt novel architecture approaches on the orchestration group. Service-based paradigm,
which is about designing software architectures using Application Programming Interfaces
(APIs) based on web-based technology, is considered as a potential facilitator in this respect.
Originally conceived for 5GC, this architectural style can also be applied to the OSS layer,
resulting in a Service-Based Management Architecture (SBMA). The SBMA consists of
replacing traditional management entities (e.g., Network Managers) with a federated
set of management functions that provide services to each other using REST APIs. The
adoption of SBMA allows fleeing from point-to-point protocol interfaces (e.g., 3GPP Itf-N
interfaces) to a service bus that interconnects all the management functions and polices
the interactions across them. Different SDOs have already captured the benefits of having
a SBMA in their architecture specifications. For example, 3GPP SA5 [18] and ETSI ISG
ZSM [19] have defined their architectural frameworks based on SBMA. Even ETSI ISG NFV,
which originally chose an interface-centric approach for the design of the Management and
Orchestration (MANO) framework, has now decided to migrate towards a SBMA from
NFV Release FOUR on wards [20].
As seen in Figure 2, the management functions building up the OSS’s orchestration
group are arranged into five separate domains: RAN, NFV, TN, CN and E2E management
domains. This design criterion represents a separation of concerns that is reasonable from
the operator’s viewpoint, and which relies on two principles:
• The independent management of network resources and functions from different
technical domains. This facilitates a decoupled evolution of RAN, CN and TN, and
allows the operator to select the technologies and vendor solutions they want for
every technical domain.
• A clear separation between management (i.e., OAM activities on individual technical
domains) and orchestration (i.e., coordination and conflict resolution activities across
technical domains). In the proposed solutions, the RAN, CN and TN management
domains are focused on management activities, while the NFV and E2E management
domains are the ones responsible for orchestration.
The interactions across the different management domains are done with a service
bus, which features the ZSM cross-domain integration fabric [19]. As seen, it is important
for the different domains to make capabilities available for external consumption through
standard APIs. Figure 2 captures relevant references for these APIs.
Network Domain
GST Attribute mIoT NEST eMBB NEST uRLLC NEST
RAN TN CN
Availability X X X 99.9 99.99 99.9999
Session and Service Continuity SSC Mode 1: the IP address SSC Mode 1: the IP address SSC Mode 1: the IP address
X
(SSC) support is preserved is preserved is preserved
Maximum DL (UL) throughput
X X 2 (4) Mbps 200 (200) Mbps 40 (40) Mbps
per UE
DL (UL) throughput per slice X X X Maximum: 30 (60) Gbps Guaranteed: 300 (200) Gbps Maximum: 20 (20) Gbps
Maximum number of PDU
X 500,000 80,000 1500
sessions
Slice Quality of Service (QoS) X X X 3GPP 5QI: 9 3GPP 5QI: 1,2,5,6,7,8,9 3GPP 5QI: 82
Maximum supported packet size X X X 300 bytes 1500 bytes 160 bytes
UE density (per km2 ) X X 100,000 500 80
Can be used simultaneously Can be used simultaneously Cannot be used simultaneously
Simultaneous use of the slice X X X with any slices with same SD with any slices with same SST with any another slice
value but different SST value value but different SD values
Supported device velocity X X 10 km/h-Pedestrian 500 km/h-High speed vehicular 120 km/h-Vehicular
NOTE 1: Slice QoS parameters attribute defines all the QoS relevant parameters supported by the network slice, including priority level, packet delay budget (i.e., maximum allowed latency), packet error rate,
jitter and maximum packet loss rate. These attributes are indexed using a 3GPP defined scalar called 5G Quality Indicator (5QI). For further details on 5QIs, see [10]. NOTE 2: The maximum number of PDU
sessions attribute describes the maximum number of concurrent PDU sessions supported by the network slice. To enforce this quota on the slice, the 5GC network function called Network Slice Access Control
Function (NSCAF) is required. For further information of this function, see Section 5.2.
Sensors 2021, 21, 8094 9 of 52
A Network Slice Type (NEST) is the result of filling GST attributes with values accord-
ing to the service requirements. In essence, a NEST is a filled-in version of a GST, and can
be used by an operator and a vertical customer to agree on the Service Level Agreement
(SLA). Different NESTs allow the description of different network slices. For slices based on
3GPP 5G service categories, the operator may have a set of standardized NESTs (S-NESTs).
For slices addressing specific industry use cases, the operator can define additional NESTs
(P-NESTs) [22].
Table 1 provides one example with three NESTs, one for each slice represented in
Figure 2. The table also qualifies the impact of the NEST attributes on every technical domain.
according to the NESTs specified in Table 1, and (ii) the infrastructure consists of a RAN
with cell sites attached via dedicated fibers to a three-tier TN. This capillarity in TN design
allows the distribution of compute capacity, across Points of Presence (PoPs), which are
physically deployed at three different aggregation levels:
• Central PoPs, which correspond to large-scale core cloud sites. They are typically built
with commodity (x86 or ARM based) hardware, and are ideal to host IT applications
and delay-tolerant telco workloads.
• Regional PoPs, which represent Central Offices featuring the telco edge cloud [26].
The regional PoPs provide virtualization capabilities closer to service delivery end-
points in order to reduce the delay budget, making them ideal to host delay-critical
telco workloads.
• Finally, access PoPs, which are associated with far edge sites. Much more distributed
and closer to cell sites than regional PoPs, the access PoPs provide execution envi-
ronments for hosting workloads with real-time requirements, e.g., virtualized DU
instances (vDUs). In this regard, commodity hardware is no longer valid; they need
to be equipped with advanced, rich-featured CPU architectures (e.g., Intel Xeon) and
hardware acceleration solutions (e.g., FPGA, structured ASICs, etc.) instead [27].
mIoT
CU-UP UPF SMF DN
NSI
eMBB RU SMF DN
DU CU-UP UPF
NSI
Internet
N*25G
3.1. CN Slicing
The impact of network slicing in the CN domain can be summarized into three main
topics: slice identity management, slice-aware device connectivity and the allocation of
separate 5GC functions.
Sensors 2021, 21, 8094 11 of 52
It is used for service discovery in SBA. It stores subscription data It allows the operator to define policies that can be used
It selects the set of The NRF keeps a list of network slices including slicing information, to associate UE applications with S-NSSAI. These policies
network slices (S-NSSAIs) for a given PLMN ID. such as Subscribed S-NSSAI(s), are captured in the Network Slice Seelction Policy
granted to the UE, - Input: S-NSSAI Default S-NSSAI(s) and Default (NSSP), which is part of the URSP that the PCF sends (via
when AMF is unable - Output: NF instances matching the DNN per Subscribed S-NSSAI AMF) to the UE.
by itself. The NSSF S-NSSAI.
determines the It provides slice
Allowed S-NSSAIs. It specific data
also determines the analytics to a NF
serving AMF, possibly
NSSF NRF UDM PCF NWDAF (e.g. NSSF, PCF,
by quering the NRF NSSMF)
- Input: S-NSSAI(s)
- Output: Slice
performance data
It provides the UE with the Allowed per S-NSSAI.
NSSAI, based on the UE Requested It may select serving
NSSAI. If necessary, it request re- AMF SMF UPF instance(s) based
allocation of AMF (via gNB) or directly on S-NSSAI
to target AMF instance. AMF selects
the serving SMF instance based on S-
NSSAI N2 N4 It may use S-NSSAI to compute slice
level user plane metrics, to be
It provides the consumed by performance
Requested
It uses the Requested management services at the OSS
NSSAI (to the
NSSAI (recieved from
gNB) as input
the UE) to select a N6
to the Network gNB N3
Slice Selection
suitable AMF. The UPF DN
gNB makes use of
Allowed NSSAI for
resource allocation N9
(c) A network slice is linked to a tracking area. This is because S-NSSAIs are managed
per tracking area [31].
Based on the above principles, it can be noticed that all cells belonging to the same
tracking areas must serve the same set of network slices. Once the gNB is set with supported
slices (per TAI), its mission is to map traffic from individual PDU sessions into appropriate
NG-RAN resources. This is done by associating the tuple {S-NSSAI, PLMN ID} with one
Dedicated Radio Bearer (DRB). The profile of the DRB is configured with RRM parameters
which are tailored to the service requirements of the slice.
Partial
OK
Handover Request: OK
• PDU session x with S-NSSAI # 1
• PDU session y with S-NSSAI # 2
• PDU session z with S-NSSAI # 3 OK
Handover Response (Partial OK):
• Admitted PDU Sessions: x, y
• Rejected PDU Sessions: z OK
TAC #22
Supported S-NSSAI: 1, 2, 3
OK TAC #11
NOK
Supported S-NSSAI: 1, 2
Handover Request:
• PDU session z with S-NSSAI # 3
Handover Response (NOK):
• Handover Preparation Failure
3.3. TN Slicing
Unlike the NG-RAN and 5GC, the TN domain is out of the scope of the 3GPP network
slice concept. 3GPP provides slicing solutions for the RAN and CN domain, but not for
the TN. However, to maintain consistency on the slice established between the device
and the service application, there is a need to map 3GPP slice criteria into appropriate
transport capabilities offered in the fronthaul, midhaul, backhaul and DN segments. This
is not trivial.
Sensors 2021, 21, 8094 15 of 52
On the one hand, there is the need to configure WAN resources in such a way that
the requirements captured in the ServiceProfile and SliceProfile can be fulfilled in the TN
substrate. This requires translating network function layer requirements associated with
S-NSSAI information (e.g., maximum delay budget, data rates, availability, mobility speed,
usage density) into transport network characteristics that include bandwidth, latency and
criteria such as traffic prioritization, directionality, protection and disjoint routes. This
translation is done at provisioning time.
RRM PROCEDURES
On the other hand, there exists a wide availability of transport technologies in carrier
networks. These technologies provide multi-layer connectivity services using different
topologies (e.g., hub-and-spoke, ring, point-to-point, point-to-multipoint). Though they
do not support slicing natively, these technologies are able to mimic slicing behavior, if
configured (and combined) properly.
In this section, we focus on the main enablers for these two open questions.
domain correlates this information with the transport network topology and derives
the (cell site or border) routers connecting to network functions.
• Traffic segregation and mapping to S-NSSAIs. As 3GPP network functions can be
shared by multiple network slices, it is necessary to segregate traffic belonging to
specific slices on transport interfaces. One option for traffic segregation is to assign
application endpoints to a specific set of S-NSSAI values. This solution is rather
simple, as the TN can map packets to connectivity services based on application
endpoints, provided that (i) the allocation of S-NSSAI to endpoints is known, and (ii)
the application endpoints are visible on the transport layer. While this is the simplest
solution in many cases, it is not a universal solution, as the application endpoint
addresses are not always visible to the site router, e.g., when there is encryption
using IPSec. An alternative solution is the concept of logical transport interfaces,
as shown in Figure 7A. A logical transport interface is a virtual interface separated
from application endpoints. It can be, for example, a specific IP address/VLAN
combination corresponding to an IPSec termination point, or an identifier (e.g., MPLS
label, segment ID) that the TN recognizes, or it can be just a logical interface defined
on top of a physical transport interface. As long as the interface identity can be
derived from packet headers, the TN nodes can perform the mapping to transport
connectivity services.
• Reachability information. Each logical transport interface carries the traffic associated
with some application endpoints that may be using IP addresses separate from the
transport interface. These IP addresses must be reachable, hence they need to be
advertised to populate forwarding tables. A 3GPP network function can advertise
such reachability information by running a dynamic routing protocol towards the
next hop router.
• QoS requirements. To satisfy the service requirements captured in ServiceProfile and
SliceProfile, each logical transport interface needs to be bound to a QoS profile that
includes the applicability and use of DiffServ Code Points (DSCP) [33] and QoS related
properties on that interface.
To allow the TN management domain to receive this information from the 3GPP
management system, the EP_Transport IOC [15] is defined. Part of the Network Slice
NRM fragment (see Figure 1), this class allows the capture of the information that shall
be exchanged between the 3GPP management system (E2E management domain, RAN
management domain and CN management domain) and the TN management domain.
This information is used to configure WAN resources in such a way that the requirements
captured in ServiceProfile and SliceProfile can be fulfilled. Figure 7B shows the construction
of the EP_Transport IOC, and how it maps the logical transport interface to application
endpoints. Notice that one EP_Transport (representing a logical transport interface) can
be associated with more than one multiple EP_Application (representing an application
endpoint of a 3GPP network function), but also the other way around. While the first case
captures the typical situation, the second case can be used for the sake of resilience or load
balance in the TN. For example, in Figure 7A, instead of configuring multiple nextHops for
one EP_Transport to allow multiple optional “links” between the gNB port and the cell site
router, the solution adopted is as follows: to configure one nextHop for each EP_Transport,
but have more than one EP_Transport for an EP_N3 to achieve similar load balance or
resilience goal.
Sensors 2021, 21, 8094 17 of 52
(A)
(B)
Figure 7. On the use of logical transport interfaces for TN slicing support. (A) Traffic segregation and mapping to S-NSSAIs;
the BR is also referred to as Provider Edge (PE) router. (B) Schema for the EP_Transport IOC.
techniques much more closely coupled to the hardware itself, such as optical transport
network switching [34] or novel Ethernet-based solutions like Flex-Ethernet [35,36].
Depending on the customer requirements, the operator may go for soft slicing or
hard slicing, or a mixture of the two. Indeed, it is possible to combine them as shown in
Figure 8, with hard slicing ensuring a dedicated capacity chunk for the customer, and soft
slicing providing traffic seggregation among the services belonging to this customer. This
approach preserves a cost-efficient solution to the customer that has multiple services, and
wants them not to be impacted with traffic congestion or faults issued by services from
other customers.
IMS slice
Customer: Mobile
Segment Routed Gaming slice (Virtual) Network
VPNs Operator
Video streaming slice
Customer: emergency
Inside Hard Pipes PPDR slice authorities
The mission of this section (and upcoming ones) is to present a network slicing technol-
ogy radar that can help operators to build their own journey towards the commercialization
and monetization of slicing. As shown in Figure 9, this radar captures a list of solutions
for network slicing impacting all relevant operator’s sub-systems, including RAN, TN,
CN and OSS. This is complemented by an assessment work, called ring assignment. In
particular, we use four rings with the following semantics:
• As-is ring: represents solutions that are available in today’s carrier networks. These so-
lutions are typically associated with technologies that operators have high confidence
in, with low risk and recommended to be available across the entire service footprint.
In terms of 5G roll-out strategy, this corresponds to 5G NSA (Non Standalone) [37].
• Deploy ring: covers the slicing solutions that can be applied in early 5G SA (Stan-
dalone) networks, based on 3GPP Release 15 standards. Some operators have already
started to activate their SA networks, while some others expect to get them opera-
tionally ready within next year. With this timing in mind, we can say that this ring
captures proven slicing solutions that operators may integrate in the short-term.
• Test ring: captures slicing solutions that are much more focused on satisfying require-
ments from uRLLC and mIoT services. Associated with brand new Rel-16 features,
these solutions have great potential but are unproven in production networks, hence
it is worth operators investing in prototyping efforts in order to evaluate their perfor-
mance and impact. This evaluation is typically done with commercial trials, either
bilateral or multi-vendor, and different Proof of Concepts (PoCs). The upgrade to-
wards Rel-16 is expected within the next 2–3 years; this means that test ring represents
slicing solutions that might be available in the medium term.
• Explore ring: includes slicing solutions that are foreseen in the long run, starting in the
next 4–5 years. These solutions, tied to features from 3GPP Rel-17 on wards, promise
to provide great potential, though their impact and commercial availability is still far
from crystal clear. The role of the operator is to keep track of their evolution through
exploratory activities such as the ones done in research and innovation projects, e.g.,
5G-VINNI [38], 5GROWTH [39] and 5G-CLARITY [40].
Sensors 2021, 21, 8094 20 of 52
As outlined in Section 1, for the position of each solution into this radar, three criteria
have been considered: (i) the technological maturity of the solution, which is subjected to
the readiness of the standards; (ii) the roadmap of commercial products, which specifies
when the features associated with the solution will be available; and (iii) the relevance
for the customers, which determine the prioritization of the solution over others. The
following sections provide details on these solutions, across the involved subsystems: CN
(Section 5), RAN (Section 6), TN (Section 7) and OSS (Section 8).
5. CN Domain
In this domain, the technology radar captures information from two different di-
mensions: functionality and add-on features. The functionality dimension deals with the
discussion on how to use CN functions for the construction of different network slices,
scouting different deployment options for these slices depending on the isolation and
business requirements of hosted services. On the other hand, the add-on features dimen-
sion refers to the set of value-added solutions that complement and extend baseline slice
functionality. The network operator can optionally make use of these solutions to either
(i) provision enriched services to the customer, i.e., new revenue streams; or (ii) streamline
internal network operation, i.e., OPEX savings.
5.1. Functionality
The first 5G commercial networks available worldwide are based on NSA. The reason
is that most communication service providers are looking to deliver mainly high-speed
connectivity to consumers already with 5G-enabled devices today. For these providers,
the NSA mode makes the most sense, because it allows them to leverage their existing
packet core assets (EPC) rather than deploy a completely new 5G network. In this mode,
where 5GC does not exist, there is no native slicing support, as outlined in Section 3.1.
However, this lack of slicing enablers (e.g., no S-NSSAI support) does not mean the
operators are unable to provide service differentiation and traffic segregation at the core
side; in fact, there are a number of solutions that allow the EPC to enforce some level of
traffic separation for overload mitigation when having multiple services. Figure 10 depicts
a functional description of some of these solutions, tagged with NSA slicing (pre-slicing)
wording. As seen, the capabilities across these solutions are quite different, ranging from
basic QoS differentiation (e.g., QCI based common APN-S/PGW) to a complete packet
core separation (e.g., DECOR [41]), with a number of variants in between, some of them
subjected to technology availability. For example, NFV technology is a must for the
implementation of the control user plane separation solution (Figure 10E).
As communication service providers set their sights on new revenue streams from
groundbreaking 5G services (i.e., uRLLC, mIoT, V2X services), they realize the need to
migrate to the SA mode, which represents the target 5G system architecture [42]. With
the first commercial 5GC solution suites already available in the market, operators can
bring native slicing functionality into their carrier-class facilities. Despite being Rel-15
complaint, these first solution suites typically provide very limited capabilities in relation
to S-NSSAI support; in fact, many of them offer single-slice support, with their AMF/SMF
implementations only able to deal with one S-NSSAI at a time. The fact that one single slice
can be configured in the 5GC prevents the operator from using separate slices to achieve
service/customer traffic segregation. In these circumstances, non-NSSAI assisted solutions
shall be used instead. One example is the provisioning of separate Data Network Name
(DNN) [10] for different services/customers. This DNN-based solution is equivalent to
the pre-slicing solution shown in Figure 10B, where virtual APN/QCI (EPC artifacts) are
now replaced with DNN/5QI (5GC artifacts).
Sensors 2021, 21, 8094 21 of 52
(A) (B)
(C) (D)
APN
Requested APN
MME S/PGW-c
Slice #n APN UE QCI/ARP/ QCI/ARP
QCI/ARP RFSP
(E)
Figure 10. Different deployment options for NSA slicing. (A) QCI based common APN-S/PGW. (B) Virtual APN/QCI
based on Charging Characteristics (CC). (C) Dedicated S/PGW. (D) DECOR. (E) Control User Plane Separation.
With the ever-increasing adoption of DevOps practices in the telco industry, 5GC
software may be developed, delivered, tested and brought into operation incrementally at a
far higher cadence than it was before. The CI/CD pipeline [43] will allow vendors to reduce
time-to-market and shorten release cycles in their product roadmap. Based on this rationale,
it is expected that first 5GC solution suites will be quickly upgraded with new features,
including multi-slice support in AMF/SMF. This feature allows the configuration of two or
more slices in the same 5GC, by fetching associated S-NSSAIs from the NSSF and injecting
them into the corresponding AMF/SMF instances. The ability of having multiple 5GC slices
(CN slice subnets) running in parallel may offer operators greater possibilities to tap new
5G use cases targeting public network users (B2C market) and industry companies (B2B
market). These customers may have different service requirements in terms of performance
and functionality, hence the need to define different 5GC slice types for them:
1. Business-to-Customer (B2C) slice types, used for serving traffic from user-
centric applications.
Sensors 2021, 21, 8094 22 of 52
2. Business-to-Business (B2B) slice types, used for the provisioning of non-public net-
works (NPNs) [44], in particular for public network integrated NPNs (PNI-NPNs) [45].
Figure 11 captures a representative number of these 5GC slices types.
B2C Category: 5GC Slice Type A1 B2C Category: 5GC Slice Type A2 B2B Category: 5GC Slice Type B1
Network: E2E public Network: E2E public Network: hybrid (public + on-premises)
B2B Category: 5GC Slice Type B2 B2B Category: 5GC Slice Type B3
Network: hybrid (public + on-premises) Network: hybrid (public + on-premises)
Shared Dedicated Shared Dedicated
PCF SMF UPF NSSF AMF PCF SMF UPF
NSSF NRF
UDM
Dedicated Dedicated
UDM AMF
PCF SMF UPF NRF AMF PCF SMF UPF
(D) (E)
Figure 11. 5GC slice types. (A,B) represents B2C slice types. (C–E) represents B2B slice types.
On the one hand, there is the B2C category (Figure 11A,B). This category includes 5GC
slices (i) designed for end user consumption, so there is no need to have in-slice dedicated
control plane functions; and (ii) to be entirely built on the 5G public network infrastructure
(PLMN). Within this category, two different slice types can be found.
• 5GC slice Type A1 (shared UPF): deployment flavor wherein the 5GC slice does not
have a dedicated UPF; indeed, the in-slice UPF instance is also shared with other 5GC
slices.
• 5GC slice Type A2 (dedicated UPF): deployment flavor wherein the 5GC slice is
allocated with a separate UPF.
In the B2C category, the first 5GC slices to be launched may be of Type A2, with few
slices hosting premium communication services that end users can subscribe to. With a
commercial model based on offering VIP service experiences, the operator looks to keep
existing users and attract new ones, generating moderate revenues from their subscriptions
in the short term.
For Type A1 slices, the situation is rather different. Unlike Type A2 slices, where
traffic isolation across them is preserved with the provision of dedicated UPFs, in Type A1
slices the UPF is shared among them. In this context, operators expect that one UPF can
support multiple 5GC slices, which means that one UPF shall be able to manage user plane
resources (e.g., UE IP addresses, GTP-U Fully Qualified TEIDs, CPU, memory, bandwidth,
etc.) at the S-NSSAI granularity. Unfortunately, the ability for a UPF to perform resource
management (e.g., resource separation, resource allocation, resource usage report) per
5GC slice is not yet available in the standards due to technology limitations inherent to
UPF internals, though 3GPP have already started working on solutions to solve this [46].
Being a Rel-17+ feature, we are still years away from seeing Type A1 slices running in
production networks. However, their availability will mark a major turning point in
operator B2C slicing strategies, with the ability to deploy 5GC slices at a much wider scale,
Sensors 2021, 21, 8094 23 of 52
offering performance levels similar to Type A2 slices, but using a much lower number of
UPFs. Additionally, the operator can use Type A1 slices to aggregate users with similar
performance profiles, all this in a transparent manner, in search of creating efficiency
improvements. This use of slicing, which allows the operator to streamline network
management operations, is referred to as ’Network Slicing for Network Operator internals’
in [17].
On the other hand, there is the B2B category (Figure 11C–E), which covers all the 5GC
slices which are intended for industry customers. Examples of these customers include
verticals and hyperscalers. Unlike the B2C category, the 5GC slices belonging to this new
category will be used to host services for private use (i.e., only available for the customer’s
subscribers), which typically span beyond the operator’s service footprint. This means
that (i) every slice shall have dedicated control plane functions, so that the isolation of
traffic management can be preserved across slices, and (ii) not all the in-slice functions will
be hosted by PLMN; indeed, some of them might be deployed at customer facilities (e.g.,
UPF). Within this category, three different 5GC slice types are worth mentioning.
• 5GC slice Type B1 (baseline CP): deployment flavor wherein 5GC slice is provided
with dedicated UPF and a dedicated SMF. This ensures that in-slice traffic flows have
an independent management and configuration, completely separated from other
5GC slices.
• 5GC slice Type B2 (advanced CP): represents a 5GC slice Type B1 provisioned with
dedicated PCF. Having a slice-specific PCF allows the customer to inject tailored QoS
policies over in-slice traffic flows.
• 5GC slice Type B3 (premium CP): represents a 5GC slice Type B2 provisioned with
dedicated AMF. Having a slice-specific AMF allows the customer to retain full control
over mobility and connection management aspects regarding their subscribers.
The B2B category aims to exploit the real benefits that network slicing enables, which
is the ability to provide separate network partitions with independent management for
different industry customers. What these customers value most is to perceive allocated
5GC slices as dedicated, self-contained networks, under their own control. To that end,
it is important for the operators to ensure that 5GC slices are delivered with network
capabilities equivalent to those offered by private 5GC solutions (e.g., guaranteed SLA,
traffic separation, controllable and configurable network), but at a much more reduced
cost. This, together with the trust on operator’s proven know-how on OAM activities, is
what will drive B2B customers to ask for a 5GC slice rather than purchasing a private 5GC
from a 3rd party.
As evidenced from Figure 11C–E, the customer’s perception of having a dedicated
network requires the operator to provision 5GC slices with separate instances of some
network functions. With the cloud-native design of 5GC and the consolidation of NFV
practices into container-based environments, operators are conducting trials in this direc-
tion, assessing how the allocation of dedicated network functions impacts the number of
5GC slices that can be instantiated. This isolation vs scalability trade-off has demonstrated
that the most optimal solution is to provision 5GC slices with dedicated instances of UPF
and SMF. This flavor, which corresponds to 5GC slice type B1 (Figure 11C), will satisfy the
service requirements of most industry customers [47,48]. However, there also exist specific
customers whose business requirements may make them ask operators for more tailored
5GC slices, such as type B2 slices (Figure 11D) and type B3 slices (Figure 11E). Examples of
these business requirements include the need for the customer to keep full control of QoS
policies, or the need to get separate connection management of their subscribers.
Putting the B2B and B2C category solutions into the timeline reflected in Figure 9, we
can outline two things. First, in relation to the B2C category, we can see that type A2 slices
may be commercially ready in the short term, while type A1 slices are expected in the long
run. Secondly, in relation to the B2B category, we can see that all 5GC slice types may be
available in the medium term, once Rel-16 features are integrated into the 5GC. Unlike the
B2C category, where the difference between 5GC slice types is subjected to the availability
Sensors 2021, 21, 8094 24 of 52
of 3GPP solutions, in the B2B category the technology maturity of all the 5GC slice types is
the same. The decision of going for one or another solution is entirely dependent on the
customer-specific business requirements.
• Multiple slices per UE: though 3GPP Rel-15 specifications allow a device to connect
up to eight slices at the same time, thanks to the introduction of URSP (see Section 3.1)
the reality is that most Rel-15 commercial solutions do not allow this feature. The ex-
isting limitations in commercial 5G SA handheld terminals prevent an UE from being
connected to more than one slice at the same time. These limitations bet on the device’s
Operation System (OS) [29]. The device’s OS mediates between the application clients
and the device’s modem, where the URSP is installed. Operators, vendors, device
manufacturers and chipset providers are working together to find workarounds, with
de-facto solutions currently being assessed in different PoCs. Among these solutions
is the 5G slicing support in Android 12(S) devices, announced by Google in Octo-
ber 2021. (https://cloud.google.com/blog/topics/telecommunications/5g-network-
slicing-with-google-android-enterprise-and-cloud, accessed on 20 October 2021).
• Secondary authentication: Network Slice Specific Authentication and Authorization
(NSSAA) attribute is defined in the GST [21] to specify whether, for a network slice,
registered devices need to be authenticated by an external AAA server (Authentication,
Authorization, Accounting server) using credentials different than the ones used for
the primary authentication. This add-on feature, first introduced in 3GPP Rel-16
specifications, is intended for those industry customers that want to perform a second
authentication over their subscribers. Operators are conducting bilateral trials with
customers to help them understand the value of integrating NSSAA in B2B category
5GC slices, especially when used in the context of PNI-NPNs. In these trials, the
operator-owned 5GC’s NSSAA Function [52] contacts with the customer-owned AAA
server via an AAA proxy. For further details on this interaction, see [10,30].
Finally, in the longer run (i.e., explore ring in the radar), the integration of Rel-17+
features into the 5GC will allow operators to unleash the full potential of 5GC slicing. In
this scouting phase, operators are have set their sights on these two featured solutions.
• Slice Roaming: operators are expected to support roaming for network slicing, at
least for network slices deployed from S-NESTs. However, this feature is still years
away from being in commercial networks, as there are technical and commercial
aspects that need to be agreed upon. The technical aspects are discussed in [53], a
GSMA document where operators have captured their priorities on slice roaming so
as to guide the specification of normative solutions in 3GPP. The commercial aspects
include charging, billing and business models that are still under discussion. Unless
all these aspects are agreed and reported, no multi-operator trials are expected shortly.
• NSACF: the Network Slice Access Control Function (NSACF) is a Rel-17 5GC function
that monitors and controls (i) the number of registred UEs per network slice, and
(ii) the number of PDU sessions per network slice [10]. With the NSACF, operators
can enforce quotas on individual slices, making sure the signalling traffic and packet
flows do not exceed the maximum slice load. NSCAF is still in stage 2 (functional
definition), so no vendor solutions are yet available. In the mean time, operators are
now trying to understand how to best apply this functionality to improve internal
network operation, and how to link them with the admission control functionality at
the NG-RAN side.
6. RAN Domain
In the RAN domain, the technology radar puts the focus on three different dimen-
sions: functionality, radio resource allocation and penetration. The functionality dimension
provides a deep dive on the applicability of open RAN principles on NR protocol stack
functions to design and configure RAN slices, going from monolithic solutions towards
more flexible, service-tailored composition patterns. The radio resource allocation dimension
discusses the availability of solutions to segregate and dispatch cell radio resources to
competing RAN slices, so that their targeted KPIs are met. Finally, the penetration dimension
refers to the penetration of RAN slicing technology within the operator’s footprint.
Sensors 2021, 21, 8094 26 of 52
6.1. Functionality
As noted from Figure 2, the target RAN slicing architecture lies on the possibility of
(i) having a 3-tier NR protocol stack, distributed into RU, DU and CU modules; and (ii)
provisioning a dedicated CU-UP instance to each slice, with tailored PDCP configuration
settings, so that the delay and security requirements for a given S-NSSAI can be fulfilled.
The achievement of these two milestones is mandatory for an operator to have a fully
operable RAN slicing solution, as described later on. For the sake of network efficiency (i.e.,
OPEX savings) or further service innovation (i.e., new revenue streams), the operator might
decide to enhance the baseline solution by integrating add-on features atop. One example
is the integration of the RAN Intelligent Controller (RIC) [54], an optional AI-powered
functionality originally defined in the O-RAN framework [55].
In the following, we describe the stepwise journey we foresee for a future-proof
RAN slicing.
In current NSA scenarios (i.e., as-is ring in the radar), the predominant operator
scenario is a few physical gNBs providing macro coverage to city and suburban areas.
Installed in strategic geographic locations, these gNBs have inbuilt 4G/5G essential features,
including massive MIMO, Dynamic Spectrum Sharing (DSS) [56], Narrow Band IoT (NB-
IoT) and RAN sharing.
As soon as the 5G coverage footprint needs to be extended, something that has already
started with the rollout of first commercial SA networks, operators may migrate towards
gNB cloudification, in search of CAPEX reduction. In fact, with this action, the operators
are able to extend 5G coverage at large scale without the need to deploy costly physical
gNBs everywhere. This bets on different, yet intertwined solutions:
• DU-CU disaggregation, whereby gNB is functionally split into one (centralized) CU
instance and multiple (distributed) DU instances, conforming to a split 2 option. The
result of this disaggregation is that CU can be entirely implemented in software, and
therefore deployed as a VNF in any cloud environment. In fact, while individual DU
instances remain colocated with RU at cell sites, the workload corresponding to the
CU instance can be moved to the telco edge cloud.
• Control User Plane Separation, whereby the virtualized CU software is further decom-
posed into one CU-CP instance and multiple CU-UP instances. This requires a complete
reshaping of CU software design, transforming a coarse-grained (VM-based) VNF into a
number of modular (container-based) VNFs, each hosting a different instance.
These two solutions will be available in the short term, hence they are categorized in
the deploy ring of the radar.
In the medium term, once the penetration rate of cloudified gNBs is significant, the
operators may use deployed assets to have a fully operable RAN slicing environment.
This environment, which shall be compliant with the two requirements captured in the
beginning of this subsection, leverage on two solutions:
• Slice-specific vCU-UP, based on providing each RAN slice with a separate vCU-UP
instance. This solution not only ensures user plane traffic isolation across different
RAN slices [57], but also adapts/customizes the processing of DRB flows according to
the slice specific needs.
• The implementation vDUs, to allow for a 3-tier NR protocol stack. This solution is
the result of a three-step journey, whereby the DU is first separated from the RU
(introducing a fronthaul link between them, according to split option 7-2x), then
designed in software (modelled as a VNF), and finally deployed into access PoPs
(far edge sites). The ability to move DU workloads into a cloud environment is of
particular interest for large-scale slices hosting distributed eMBB services or mIoT
applications. However, this feature does not come like that alone; indeed, it needs to
be accompanied with the provision of rich-featured CPU architectures and hardware
acceleration solutions [27] in the access PoP, as outlined in Section 2.4. These assets
Sensors 2021, 21, 8094 27 of 52
are aimed at reducing the impact that virtualization overheads may introduce on DU
packet-processing performance.
Industry stakeholders (including operators) have started to test these two solutions,
validating their performance and assessing their techno-economic viability in typical
scenarios where the vDU is shared across slices. In parallel, operators have launched a
new activity on RIC, pushed by the O-RAN momentum. Unlike the first workstream,
focused on searching for a baseline RAN slicing environment that can be easily scaled
and replicated across the operator’s service footprint, this new workstream has the goal of
checking how the RIC can further enhance RAN slicing features. As noted in [55], the RIC
is a non-mandatory O-RAN component consisting of two modules: (i) near-RT RIC, which
hosts ms-level RRM logic with embedded intelligence; and (ii) non-RT RIC, which provides
delay-tolerant functionality including service and policy management, RAN analytics and
AI/ML model training. Figure 12 provides details on these two modules. In this testing
phase, the focus is on the near-RT RIC (near-Real Time RIC), and in particular on the
capabilities of the E2 interface [58].
In the long run, when the commercial O-RAN solutions are relatively stable, operators
may focus on how to include the entire RIC in the day-to-day operation of RAN slices,
making it more agile and intelligent [59]. In this regard, the following solutions are currently
being explored:
• xApps. As seen from Figure 12, the near-RT RIC delivers a robust, scalable and
secure platform for xApp hosting. These xApps are third party control applications
that complement traditional RRM functionality, by bringing advanced algorithms
applicable to real-time use cases, including QoS/QoE optimization, per-UE controlled
load balancing, traffic steering and seamless handover control. Operators together
with third party developers are exploring the possibility of implementing slice-specific
RRM procedures through xApps, in order to decouple life cycles of slicing related
innovation (e.g., 4/6-month release cycle) from CU-CP hosted RRM policies (e.g.,
1/2-year release cycle).
• Non-RT RIC. The non-RT RIC (non-Real Time RIC) will be the main driver for AI-
powered RAN slicing. This module will host and manage all AI/ML models that
will later be pushed into the near-RT RIC down to the individual RAN slices. In the
exploratory phase, where the operators are now, the main entry barrier they have
encountered is its complex integration. In fact, the non-RT RIC needs to communicate
with (i) the RU and the vEMS, using O1 interface [60]; (ii) the near-RT RIC, using A1
reference point [61]. In addition, it needs to interact with 3GPP management system,
something that today is still under discussion in O-RAN community.
Figure 12 illustrates the integration of all the O-RAN components into the network
slicing system architecture, including the reference points (E2, O1 and A1 interfaces) across
them. To illustrate the information exchanged between these interfaces, we propose an
example of the use of the RIC to make an AI assisted resource control for RAN slice SLA
assurance. The logic of this resource control is hosted by xApps. Further details on this
example can be found at the end of Section 6.2, once the details on radio resource allocation
are explained.
Sensors 2021, 21, 8094 28 of 52
A1 ENRICHMENT INFO
• Info for UE/group of A1
UEs/applications
A1 POLICY Near-Real-Tme (Near-RT) RIC
• Optimized policies for dynamic O1
• Near-RT monitoring of RAN slices
SLA assurance xAPP-1 xAPP-2 xAPP-n
… performance
• Optimized RAN (E2) actions to
O1 REPORT O1 achieve RAN slice SLA based on O1
• Counters/KPIs from near-RT Messaging infrastructure configuration, A1 policy and E2
RIC, vEMS and RU Conflict xApp reports
O1 CONFIGURATION Database
mitigation Subscription
• Default/static/non-RT
configuration
O1 CU-CP
vEMS
RRC
E2 E2 E2 REPORT
• RAN slice fine-grained statistics
E2 CONTROL/POLICY
RU DU CU-UP • RAN slice assurance actions
PDCP/SDAP • RAN slice resource
allocation/prioritization
O1/Proprietary CU-UP
High PHY
Low PHY
MAC
RLC
RF
PDCP/SDAP
CU-UP
PDCP/SDAP
between the gain from dedicating resources to specific slice services and the overhead in
maintaining numerous resource partitions. The balance is to keep sufficient PRB chunks
to guarantee resource isolation per RAN slice when needed, while not impacting radio
performance due to excessive partitioning.
In the following, we describe the solutions that we foresee from these two RAN slicing
mechanisms, and that are illustrated in the radar shown in Figure 9.
In today’s dominant NSA scenarios (as-is ring in the radar), the only possible solution
for RAN slicing is QCI Priority Scheduling, based on giving a preferential treatment
to those DRBs associated with top-priority services. The priority of a service depends
on the QoS parameters associated with the service flows, with a QCI as key parameter,
complemented with other QoS related info (i.e., GBR + MBR values if service flows convey
GBR traffic, AMBR values if service flows convey non-GBR traffic). Upon computation
on the EPC side, the priorities of different services are sent to the gNB, which uses them
to define corresponding DRB profiles. The number of DRB profiles available in current
production networks is rather low; the reason is a coarse-grained design of DRBs, and that
only few of them convey prioritized traffic.
As we move towards the rollout of the first 5G SA networks, new priority scheduling
solutions are appearing:
• 5QI Priority Scheduling. This solution is equivalent to the QCI Priority Scheduling,
but using 5GC, which provides much more granular QoS control than the EPC. The
fact that (i) the 3GPP 5G QoS framework allows one slice to convey multiple QoS
flows, each featured with a specific 5QI, and (ii) the DRB profiles are computed based
on 5QI, make it possible to have intra-slice service differentiation. Figure 13 illustrates
an example of how this solution works.
• Relative Priority Scheduling, which is an evolution of the previous solution. This
evolution is based on enriching DRB profile characterization with additional con-
figurable settings, including scheduling weight and scheme, among others. These
settings, listed in Figure 13 with the optional “(O)” tag, allow the gNB scheduler to re-
solve conflicting situations that are beyond the capabilities of 5QI priority scheduling.
One example is when QoS flows from different slices have the same 5QI, but there
is a need for preferential treatment of one of these slices. In such a case, scheduling
weight can be used, as elaborated in the top-right corner of Figure 13.
Sensors 2021, 21, 8094 30 of 52
Priority configuration
PLMN ID 1 1 1 2
S-NSSAI 1 2 3 X
Priority
5QI 9 6 6 9 84 6
High low
Scheduling priority 4 2 1 3
[1] [4]
These two solutions build up the RAN slicing suite that operators have started to
deploy, and may be operationally ready in the short term. However, with sights already set
on evolving slicing features in the medium term, operators are also testing other solutions:
• Delay controlled Priority Scheduling. This solution consists of enriching gNB schedul-
ing logic with the adaptive managed latency concept. It allows providing better expe-
rience to Rel-16 services, mostly interactive services that require high data rate and
low latency communications. The adaptive managed latency concept represents the
ability to provide bounded and steady low latency for these services, by coupling gNB
scheduler and application in a feedback loop with dynamic rate adaptation signalled
by the service application. This coupling can be enforced using either vendor-specific
mechanisms or standard frameworks, such as Low Latency, Low Loss, or Scalable
Throughput (L4S) [62]. Figure 14 depicts how L4S congestion marking and feed-
back can be applied for gNB scheduling. Note that this Delay Controlled Priority
Scheduling solution (application layer rate adaptation) is complementary to Relative
Priority Scheduling (network layer service differentiation), and both can be used
simultaneously.
• Hard Radio Resource Partitioning. This is the first solution from the radio resource
partitioning category. For the PRB allocation, this solution assumes that individual
slices are only configured with dedicated resources, without prioritized resources. To
achieve this, the operator sets the same value for the dedicated minimum slice quota
(RRMPolicyDedicatedRatio) and the minimum slice quota (RRMPolicyMinRatio).
From the set of flavours tabulated in Table 2, one can note that the RAN slices resulting
from this solution are compliant with the “dedicated slice-profile 1” settings. This
flavor provides isolation and secure resources in high load conditions, at the cost of
poor multiplexing gains. The reason is that dedicated resources of a slice cannot be
used by others, even though the slice resource usage is below the dedicated minimum
slice quota.
Sensors 2021, 21, 8094 31 of 52
Figure 14. Feedback loop for delay controlled priority scheduling, with in-band L4S.
Finally, in the long run, we can find fully-blown RAN slicing solutions. These solutions,
listed below, are years away from being commercially available; in fact, they are still taking
shape in the reference standards: 3GPP and O-RAN Alliance. Therefore, they are captured
in the explore ring in the radar.
• Static (Policy-based) Flexible Radio Resource Partitioning. It allows for defining pri-
oritized resources per slice, a feature which was disabled in the Hard Radio Resource
Partitioning. With this new option, RAN slices can now be configured according to
“dedicated slice-profile 2” and “prioritized slice” settings, as shown in Table 2. The def-
inition of prioritized resources per slice boosts resource efficiency, at the cost of making
gNB scheduler logic much more complex, with a larger number of decision-making
variables that need to be computed in real-time.
It is important to note that gNB scheduler can work with both hard and flexible radio
resource partitioning solutions, as depicted in Figure 15. This example shows that the
gNB is configured to serve four slices from two different PLMNs: PLMN#1, hosting
mIoT, eMBB and uRLLC slices, and PLMN#2, hosting another eMBB slice. Looking
at the slice specific quotas, one can note that the uRLLC slice is scheduled with hard
approaches. For the remaining slices, flexible resource radio resource partitioning is
applied, with the mIoT slice configured with “dedicated slice-profile 2” flavor and the
eMBB ones configured with “prioritized slice” flavors.
• Dynamic (AI-assisted) Flexible Radio Resource Partitioning. This solution takes
the previous solution to the next level, with the possibility of changing slice resource
quotas over time, depending on collected performance metrics. To cope with this
dynamism, operators need to take humans out of the loop, replacing them with
novel AI-assisted artifacts enabling closed-loop automation. The xApps hosted by the
near-RT RIC are perfect candidates for this role; indeed, they can provide agility and
context-awareness in the decisions of changing resource quotas [63].
Figure 12 illustrates an example of the usability of near-RT RIC for real-time resource
control of operative RAN slices. As seen, the near-RT-RIC makes use of E2 interface to
interact with associated DU, CU-UP and CU-CP instances, for both monitoring (E2 RE-
PORT) and configuration management (E2 CONTROL/POLICY) actions. The governance
of these actions lies on xApps. The logic of these xApps can be assisted with AI/ML mod-
els, which are made available for consumption by the non-RT RIC using the A1 interface.
By comparing collected metrics against AI/ML models, the xApps can make real-time
decisions on quota changes, enforcing them in corresponding CU-UP instances. Though
the ultimate invocation and execution of AI/ML models lies on xApps, this cannot be
done without the Non-RT RIC, which plays a key role in this workflow; indeed, non-RT
Sensors 2021, 21, 8094 32 of 52
RIC is responsible for the management of individual AI/ML model (e.g., AI/ML model
deployment, configuration, performance evaluation, termination, validation and testing).
Parameters are cell specifc, which means that the same slice
could have different quotas in different cells
Max
100%
PRB Scheduling
Shared Resource Pool:
used up to the Maximum f
Quota of each slice
Max
All PRBs
Max
Cell resources
Ded Min t
Dedicated Resource Pool:
defined by the sum of Ded
Minimum Slice Quota Ded Min PLMN #1: mIoT PLMN #1: uRLLC
PLMN#1: eMBB PLMN #2: eMBB
0%
mIoT slice eMBB slice uRLLC slice eMBB slice
PLMN #1 PLMN #2
6.3. Penetration
In this section, we provide a description of the penetration path we foresee for network
slicing in cell sites. For this exercise, it is important to take into account the environment
setup. In this regard, we consider three phases: early introduction (phase 1), full adoption
on standalone private 5G networks (phase 2) and full adoption in public 5G networks
(phase 3).
The phase 1 covers the as-is and deploy rings of the radar. In this phase, it is assumed
a baseline RAN slicing solution, consisting of applying 5QI priority scheduling (see radio
resource allocation dimension) over cloud NG-RAN scenarios (see functionality dimen-
sions), with no mobility support. This setup has minimal impact on production networks,
without compromising backwards compatibility, and therefore constitutes a good candi-
date for early introduction in the PLMN. The integration of baseline RAN slicing in first
SA networks ensures QoS-based service differentiation on RAN side, which is essential for
operators to start commercializing 5GC Type A2 slices for B2C market (see Figure 11).
However, for more elaborated setups leveraging open RAN principles, the above
rationale is no longer valid. The major changes that these setups bring in RAN planning
and configuration patterns prevent their large-scale introduction in today’s commercial
networks, which account for a large percentage of legacy RAN assets. Instead, operators
may initially choose to start testing them RAN slicing on private networks (phase 2) before
moving to macro cells (phase 3).
The phase 2 covers the deploy, test and explore rings of the radar. In this phase, the op-
erator may integrate RAN slicing solutions only in greenfield environments, on-premises,
creating isolated islands of private 5G adoption. This setup constitutes a perfect niche
for the operators to start commercializing their innovative RAN slicing solutions towards
B2B customers, as the radio resource allocation mechanisms and O-RAN components
become available. These solutions can be used either (i) to provide traffic isolation across
on-premises customer services, or (ii) to provide the customer with a guaranteed SLA
between the device and 5GC. In the second case, RAN slicing is used in conjunction with
the B2B category 5GC slices to provide PNI-NPN services.
Sensors 2021, 21, 8094 33 of 52
Finally, there is the phase 3, spanning across the test and explore rings of the radar.
This phase 3 consists of applying the lessons learnt in phase 2 to macro cells. In fact, the
trials in phase 2 will serve the operator as a playground before moving to the PLMN, where
UE density and traffic patterns are radically different, and where mobility events now need
to be taken into account. To facilitate this transition, a three-step journey is foreseen:
• PLMN, single-slice TAI. The operators will start to replicate the trials in specific
tracking areas, with their cells configured with one single S-NSSAI.
• PLMN, multiple-slice TAI. The same solution as the previous one, but configuring
all the cells from the same tracking area with two or more S-NSSAIs.
• PLMN, large-scale. The lessons learnt from the small-scale deployments allow im-
proving RAN slicing before massive adoption in the PLMN, where more complex
problems on capacity planning and mobility management may appear.
7. TN Domain
In the TN domain, the technology radar requires the analysis from two separate
dimensions: transport technologies and transport SDN fabric. The transport technologies
dimension captures the protocol encapsulation and data plane solutions across the different
network segments. On the other hand, the transport SDN fabric dimension refers to the
control and management plane aspects, discussing the application of programmability and
automation through SDN.
These two dimensions are not coupled but complementary, in the sense they can
evolve at a different pace and they do not necessarily need to be used together. The trans-
port technology dimension includes all the Layer 1/2/3 solutions that allow segregating
connectivity resources and enforcing traffic separation at the WAN infrastructure, therefore
enabling TN slicing realization. The sole use of these transport technologies is enough to
have a sliced WAN infrastructure, but not to get it provisioned and operated in a dynamic
way. The latter would require implementing programmability and automation capabili-
ties atop these technologies, something that can only be brought by the SDN paradigm.
The complementarity of the transport SDN fabric lies in the ability to operate with these
technologies using a set of SDN controllers instead of traditional, siloed TN management
systems (which typically lead to rather static, manual configurations). This requires equip-
ping these SDN controllers with programmatic interfaces on the southbound side, towards
the underlying technology devices. These interfaces shall be developed in such a manner
that SDN controllers can inject configuration actions and retrieve collected data following
a model-based approach.
present the journey we foresee towards the realization of an end-to-end TN slicing, based
on a step-wise integration of different transport technologies into carrier networks.
Today’s scenarios are based on 5G NSA, where the slice data path only includes two
segments: backhaul segment (between the physical gNB and S/P-GW) and DN segment
(between S/P-GW and application). Typical implementations for these scenarios bet on
the use of traditional L2/L3 overlay solutions, mainly VPN techniques. Layer 2 VPN
techniques are, for example, Virtual Private LAN Service (VPLS), which sets up a Ethernet-
based communication over MPLS tunnels, or Virtual Leased Line (VLL), which emulates
a pipeline between two given endpoints. Layer 3 VPNs can be realized, for example, via
Virtual Private Routed Networks (VPRN), featuring MPLS-based VPNs. Two main reasons
explain the preference for these technologies. On the one hand, they do not have an impact
in the underlay. Taking into account the brownfield design of today’s transport networks, it
is natural for operators to reuse as much as possible existing overlay technologies, especially
if they are carrier-grade and widely available along the operator footprint. On the other
hand, they are cost-efficient, with a performance that is enough to satisfy the transport
requirements of NSA slices.
In the short term, early B2C slicing offering will require evolving transport networks
with different solutions such as the listed below.
• DiffServ Code Point (DSCP). The integration of 5GC will lead to a change in the
backhaul segment, now based in the N3 interface. Additionally, the DU-CU disag-
gregation will produce the F1 interface for the mid-haul segment. With this scenario,
the setup is as follows: a GTP tunnel encapsulating user packets with slicing infor-
mation captured in the {PLMN ID, S-NSSAI, 5QI} triplet transverses the backhaul
and midhaul segments. Since the IP underlay across these segments is not able to
interpret these 3GPP signalling identifiers, it is not possible for the border router
(see Figure 7A) to apply the constraints represented by this tuple. In this regard, the
UPF and RAN shall perform transport level packet marking in downlink and uplink,
respectively, by setting the DSCP in the outer IP header [65]. This information is used
by the corresponding border routers in the IP underlay to differentiate traffic from
different slices [66,67].
• Segment Routing (SR), and its use across backhaul and midhaul segments. Apart
from the rich built-in features (e.g., highly scalable, responsive, programmability) [68],
what makes SR [69] an ideal technology option for the IP underlay is that it can be
used with both the MPLS forwarding plane (SR-MPLS) and the IPv6 forwarding plane
(SRv6). Examples of realization of slicing in SR networks can be found in [70,71]. The
basis of this realization lies in the ability of SR to encapsulate additional information
for discriminating traffic associated with different slices [72].
The solutions explained so far, belonging to the as-is and deploy rings in the technol-
ogy radar, are part of the soft slicing category presented in Section 2.
In the medium term (the testing ring in the radar), as novel B2B offerings come into
service portfolio and the slicing requirements get burdened, the capabilities offered by soft
slicing solutions are not enough. In this regard, operators have started to evaluate new
technologies, working on three main directions:
• Hard slicing. In this workstream, the operators are focused on trialing technologies
like Flexible Ethernet (Flex-E), Flex-O and DWDM. These technologies are used to
realize the concept of isolated traffic flows operating on common links that avoid neg-
atively influencing the performance of each other in case of congestion. In particular,
Flex-E [35] bets on the principle of calendar-based channelization, which consists of
bundling or dividing physical Ethernet interfaces into multiple Ethernet hard pipes
based on timeslot scheduling. The work in [73] gives further details on how Flex-E
technology might be used to implement hard slicing. Flex-O, described in the ITU-T
G.709.1/Y.1331.1 recommendation [74], provides Optical Transport Network (OTN)
interfaces with comparable functionality to that of Flex-E based Ethernet interfaces.
Finally, DWDM can be used for physical resource separation at wavelength level.
Sensors 2021, 21, 8094 35 of 52
and management complexity of slicing in their transport networks, with multiple vendor
and technology solutions underneath.
As of today, the scope of SDN technology has been circumscribed inside the data
center, using it to simplify the management of internal connectivity as the adoption of
cloud solutions is consolidated. However, the applicability of SDN into transport networks
is a completely radical approach, with the use of new protocols and different model-driven
operational practices quite tied to the specificities of the WAN technologies present in
today’s carrier facilities. Making transport SDN a reality is not an easy task. In this regard,
many efforts have been made over the past few years in this direction, with telco industry
actors working out promising but misaligned solutions. Proof of this is the large number
of architecture frameworks defined so far, e.g., [79–81].
It is now time to move forward and make progress. This requires the definition of a
common strategy to reduce and select the most suitable standards to unify disparate SDN
solutions into a single E2E, open transport SDN architecture. The preferred architecture op-
tion is shown in Figure 17. Originally proposed by Telefónica with the iFUSION brand [82],
this architecture follows a hierarchical model, with specific domain controllers per technol-
ogy domain (IP/MPLS, optical/DWDM and microwave/backhaul) and an overarching
Software-Defined Transport Network controller (SDTN controller). This two-layer control
architecture has become the reference framework for operators worldwide, as echoed in
the white paper published by Telecom Infra Project’s Open Optical and Packet Transport
(OOPT) project group [83].
Service oriented
RESTCONF/
NBI interface
YANG
Technology-agnostic
SDTN Controller
TN Management Domain
Mapper Module E2E Transport Service Abstraction
Transport
Network Slice
Realizer Module E2E Transport Network Control
Controller
interface
YANG
Technology-specific
NBI NBI NBI
interface
F/YANG
Config/operational
PoP #x PoP #y parameters and telemetry
IP/MPLS collection
network
MW Network
OTN/WDM
network
The benefits of the targeted SDN architecture lie in the system design, built upon
three principles.
• Technology domain controllers. The idea is to separate the control per technology con-
cerns, then drive the different particularities of each technology with specific solutions
suited to them. This separation of concerns also enables a higher scalability of the
solution; in fact, in case a transport segment is divided among different administrative
domains, multiple domain SDN controllers for the relevant transport segment might
be included in the hierarchy, in a flexible way.
Sensors 2021, 21, 8094 37 of 52
device oriented configuration management operations. On the other hand, the network
YANG models provide abstract representation of relationships between multiple devices,
including topology and connectivity services. Table 4 captures the network YANG models
that are for consideration at the domain controller NBIs.
Table 4. Overview of network YANG models for the NBI of per-technology domain SDN controllers.
Domain
NBI Models Description
Controller
L3SM [91] These models are used for the provisioning of
L2SM [92] L2/L3 connectivity services.They describe a
L3NM [93] VPN service from the customer (LxSM) or
L2NM [94] network operator (LxNM) viewpoint
IP controller
These models allow to manipulate Traffic
TE [95] Engineering (TE) tunnels. There exist extensions
TE Topology [96] to work with a desired technology (e.g., MPLS
RSVP-TE tunnels, Segment Routing paths).
It is the model with higher market adoption. It
includes technology-specific information from
Optics controller T-API [97]
each transport layer, including DSR/Ethernet,
OTN/ODU and photonics media.
This repository captures the set of models for
Microwave OpenBackhaul the microwave segment. They are extensions
controller model set [98] from those captured in ONF Core Information
Model [99].
Finally, consuming these NBIs, there is the SDTN controller. This controller orches-
trates the domain specific capabilities to provide real-time control of multi-layer and
multi-domain transport network resources. The efforts on this workstream go in three
directions:
• E2E SDN controller: internal logic. The focus here is on the implementation of the
E2E Transport Network Control block of the SDTN controller. The scope of this mod-
ule can be summarized into five functionalities: (i) E2E control across the different
domains, by coordinating the disparate technologies through their corresponding
SDN domain controllers; (ii) per-layer E2E visualization, i.e., per-layer topology com-
position; (iii) stateful control of provisioned network services; (iv) multi-layer Path
Computation Engine (PCE), which has the role of computing paths across multiple
technologies based on the per-layer topology composition; and (v) service binding to
transport resources, which enables the controller to obtain the best Traffic Engineer-
ing (TE) connections for a given transport connectivity service. An example of the
functionality described in (v) is as follows: for a VPN having certain bandwidth and
latency contraints, compute the set of Label Switched Paths (LSPs).
• E2E SDN controller: NBI. The focus here is on the E2E transport network abstraction
block, in charge of exposing an abstracted topology view of the network resources
and the available set of network services to SDTN consumers through an unified NBI.
There is no solution yet in the standards, although quite close cooperation between
Telecom Infra Project’s OOPT [83] and IETF’s TEAS [100] exists in this regard. Ongoing
discussions reveal the idea to use LxSM models (see Table 4) as a starting point for the
NBI implementation.
• Slicing-aware E2E SDN controller. This consists of incorporating the T-NSC, which
will have the awareness of slicing at the transport layer. Though there is not yet an
common view of what T-NSC represents, the telco industry agrees on the need (i) to
align the T-NSC concept with the IETF Slice Controller developed by the IETF TEAS’s
network slice design team [101], and (ii) to implement the T-NSC as an additional
component of the SDTN controller. For the first point, the focus is to align the T-
Sensors 2021, 21, 8094 39 of 52
NSC with the use cases [102] and YANG network models [103] worked out for the
IETF Slice Controller. For the second point, we foresee a solution similar to the
one represented in Figure 17. As seen, the T-NSC might be built out of two separate
modules: the mapper and the realizer. The mapper module is responsible for collecting
the customer-facing view of the TN slice for further processing the TN slice request.
Thus, this module would integrate the customer-facing view on the provider view
for triggering configuration, control and management actions. On the other hand,
there is the realizer module, which is in charge of coordinating different actions on
a number of domain SDN controllers for effectively creating the TN slice, according
to the original customer request. Integrated in the E2E Transport Network Control
Abstraction block (see Figure 17), this module would manage the workflows for the
TN slice provision, as well as for its life cycle.
Putting all the discussed solutions in the technology radar shown in Figure 9, we
observe the following:
• The deploy ring includes IP domain SDN controller: SBI and optics domain SDN
controller: SBI solutions. With the emergence of the first Rel-15 commercial networks,
some operators have recently started the deployment of SDN technology in transport
networks, although not at large scale yet. For now, it is limited to IP/MPLS and
optical/DWDM segments, and highly coupled with specific use cases.
• The test ring covers MW domain SDN controller: SBI, Domain SDN controller:
NBI and E2E SDN controller: internal logic solutions. The operators are currently
conducting trials on features from these three solutions, which are expected to be
available in the medium term.
• The explore ring captures the E2E SDN controller: NBI solution (for the integration
of transport SDN fabric with the rest of OSS assets) and the Slicing-aware E2E SDN
controller solution (to integrate the slice semantics in the transport SDN fabric).
According to the above rationale, it is clear that to get the targeted transport SDN
architecture up and running in carrier networks, operators need to follow a staged approach
where the full, E2E integration of slicing features constitutes the final stage. However, this
does not mean we cannot have TN slicing meanwhile; indeed, as outlined in Section 7.1,
there are multiple transport technologies available for slicing realization. What this really
means is that the operator may not be able to have automation and programmability
capabilities in the short and medium term when allocating and operating transport slices.
The lack of SDN may force the operator to go for static provisioning and management
operations, from the E2E management domain to technology-specific management systems,
using traditional Command Line Interface (CLI) solutions with ad-hoc extensions to avoid
vendor lock-in.
8. OSS Domain
Finally, for the OSS domain, the technology radar addresses two different dimensions:
OAM and capability exposure. On the one hand, the OAM dimension refers to the set of
activities related to network slice life cycle management. On the other hand, the capability
exposure dimension touches on the need for providers to make network slice capabilities
available for consumption to B2B customers, through easy-to-use service APIs.
8.1. OAM
The life cycle of a network slice is articulated into four different phases: preparation
(slice design, slice on-boarding and network set-up), commissioning (slice instantiation
and configuration), operation (slice activation, modification, reporting/supervision and
de-activation) and decommissioning (slice termination) [17]. The operator’s main role is to
manage the life cycle of all slices running in the network. In this endeavor, the operator
makes use of OAM tools available in the OSS layer, as illustrated in Figure 2.
This section outlines the main solutions that enable the OSS to conduct network slice
life cycle management. Their position in the radar (see Figure 9) makes it clear that the
Sensors 2021, 21, 8094 40 of 52
trend is to evolve towards a fully digital OSS stack, wherein design, data management,
assurance and orchestration processes all need to be aligned and integrated across phys-
ical, virtual and cloud assets. This journey needs to be accompanied with new levels
of automation, extending them further up the stack, into the E2E service and network
management domain.
The first stop of the journey is the as-is ring of the radar. Today’s OSS consists of
isolated, monolithic systems passing through specialized applications that require complex
integration. In addition, automation is quite limited (only present in specific parts of the
OSS, and not covering all the management domains) and with many silos (part of the
automation is often developed as standalone scripts used by separate domain teams, with
each team creating and managing automation using its own environment). However, with
the edge computing and 5G SA technologies just around the corner, most of the operators
have already integrated a MANO stack in their OSS, using SOL005 [25]. Apart from the
monetization of Infrastructure as a service (IaaS) services, the MANO stack allows operators
to move carrier-grade functions and services to the cloud, leveraging NFV technology.
This is critical for a cost-efficient delivery of some NSA slicing solutions, like the ones
represented in Figure 10C–E, where there is a need to deploy multiple instances of the
same network functions.
The second stop is the deploy ring of the radar. Coinciding with the early rollout
of 5G SA networks and the commercialization of the first B2C slices, operators need to
integrate slicing logic into their OSS. The short-term focus is on basic slice provisioning. In
this regard, the following solutions are needed.
• NST/NSST. The Network Slice Template (NST) and Network Slice Subnet Template
(NSST) are pre-configured service descriptors that help create a blueprint to ease
replicability (i.e., design once, deploy everywhere) of offered network slices and
slice subnets.
For example, the NSST corresponding to a 5GC slice could include the following
information: (i) the type of services that the 5GC slice supports, (ii) the 5GC slice
topology, and (iii) the 5GC slice placement policy. Based on the fact that a network slice
subnet can be deployed as an ETSI NFV network service (see Figure 1), the information
given in (ii) is a pointer to the corresponding Network Service Descriptor (NSD), while
the information captured in (iii) is the specification of the PoP type where individual
network service components can be deployed, and their affinity/anti-affinity rules.
For the construction of the NST, the approach is similar, but including pointers to
the NSSTs.
The design, development, testing and validation of NSTs/NSSTs/NSDs, and their
subsequent onboarding to the catalogs, are activities that formally belong to the
network slice preparation phase.
• Lite Slice NRM fragment. As seen in Figure 1, the 3GPP information model for
network slicing is complex, with a high number of classes and different containment-
naming relationships across them. Furthermore, this model is in continuous evolution,
as long as the work in 3GPP SA2 and GSMA GST/NEST evolves. For this reason,
it is preferable to have a lite version of the slice NRM fragment in the short term.
This lite version may contain (i) all classes, except the EP_Transport IOC, which is
intended for Rel-16; (ii) simple relationships across them, leveraging as much as
possible on 1:1 mappings; and (iii) a limited number of attributes in the ServiceProfile
and SliceProfile constructions. In these constructions, only the functionality and
performance related attributes that are needed to provision 5GC type A2 slices (B2C
market) will be implemented.
In case of selecting different vendors for the NSMF (in charge of interpreting Service-
Profile attributes) and NSSMF (in charge of interpreting SliceProfile attributes), the
operator must ensure the compatibility of the lite slice NRM fragment with these
NSMF and NSSMF solutions.
Sensors 2021, 21, 8094 41 of 52
• Baseline Decision Engine. The Decision Engine is the OSS component in charge of
performing the feasibility check procedure (see Figure 2). In network slicing, this
procedure makes use of three input data: (i) the service requirements that the slice
must support, captured in the ServiceProfile; (ii) the NST, stored in the catalog; and (iii)
the resource and network status, stored in the inventories. As detailed in Section 2.4,
the feasibility check is a two-step operation. If the outcome of this operation is
‘feasible’, the decision engine uses internal policies and optimization algorithms to
decide on the placement and resource allocation of the requested slice, and send out
the decision to the NSMF, which enforces it. The format of this decision is as follows:
instantiate a new slice, configuring the NG-RAN slice with the radio resource allocation
solution “X”, and deploying the 5GC slice in this PoP “Y”. For the instantiation of the 5GC
slice, use the deployment flavor “Z” from the NSD referred in the NSST.
In the short term, it is recommendable to use a baseline Decision Engine. This solution,
captured in the deploy ring of the radar, assumes that the logic of the Decision engine
is rather simple, built upon simple static rules or simply betting on trial-and-error
approaches. The reason is that the variety of 5GC slice types is expected to be rather
low, and all targeted for B2C market; therefore, there are no really a higher number of
deployment options to choose from.
In the medium term, the upgrade to Rel-16 will allow operators to start commercial-
izing network slicing for the B2B customers, with the 5GC slice types B1, B2 and B3. The
shift from B2C to B2B market requires a much more rich-featured OSS than before, with
better capabilities in terms of provisioning and scalability, and with the integration of first
assurance mechanisms. On the one side, the enhancement in provisioning and scalability
is due to the higher variety of slices, with tens of instances running in parallel. On the
other side, the introduction of assurance features will allow operators to guarantee the QoS
and contracted SLAs of each network slice, much more business-critical than those for B2C
slices. The test ring of the radar captures the solutions that are needed to cope with the
new OSS needs. These include:
• Complete Slice NRM fragment. The new wave of slice offerings will be made avail-
able in the operator’s service portfolio, with the publication of different NESTs. The
wide variety of NEST parameters that can be configured by the customer prior to issu-
ing service order, makes it necessary to evolve Slice NRM fragment. The main focus
will be on the ServiceProfile and SliceProfile constructions, which need to extend their
attributes to make them mappable to NEST parameters. Other minor enhancements
are also expected, for example the addition of EP_Transport IOC and more flexible
class relationships, as depicted in Figure 1.
• Advanced Decision Engine. This solution is based on evolving the logic of the
Decision Engine, with the integration of multi-objective policies and optimization
algorithms. With many more slices running in parallel, each with completely different
requirements, the operator’s system becomes much more dynamic. If changes are too
quick, the stability of the operator’s network could be compromised. To avoid this, it
is critical that the decision on slice placement and resource allocation (i) minimizes the
probability of modifying the slice at operation time, and (ii) optimizes resource usage.
• Baseline slice assurance. The assurance represents the ability of the operator to
retrieve management data from individual slices, using them as input for SLA veri-
fication. Examples of these data includes S-NSSAI level information on slice status
(e.g., activated, de-activated), performance measurements and KPIs (e.g., UL/DL
throughput, latency and packet loss rate) [104,105], notifications on fault events and
alarms (e.g., threshold crossing) [106] and trace data.
The operator may start with S-NSSAI level management data based on the aggrega-
tion of metrics collected from the 5GC (via NWDAF) and NFV MANO (via SOL005).
These data will then be aggregated to check the health of the slice, verifying whether
it meets the SLA requirements. In case of SLA violation, the operator will trigger
corrective/remediation actions (e.g., capacity increase, re-configuration) on the cor-
Sensors 2021, 21, 8094 42 of 52
as-is solution is quite limited, as it only permits provider-managed slices. However, this
situation may radically change with the shift towards SA networks.
PROVIDER CUSTOMER
Tenant-
managed
slices Customer A
Customer B
Regulate @capability
exposure
Customer N
Customer M
Provider- Customer X
managed
slices Customer Y
Virtualized
Infrastructure
N*50G/100G N*200G/400G
Orchestration Mgmt & Control Use
Internet
Physical N*25G
Infrastructure
Cell site Access PoP Regional PoP Central PoP
(>1000) (<100) (<10)
In the short term (deploy ring in the radar), the focus will be on premium B2C users,
as noted in Figure 11. For the provision of Type A2 slices, the operator will bet on internal
NESTs. With the presence of NEF in the Rel-15 5GC solution suite, and the integration of
the first Rel-15 features in their OSS systems, the operators are starting to launch a new
API family: Device Info. It provides the customer with the ability to receive information
related to one or more devices. This includes information on device subscription (e.g.,
subscribed NSSAI), device location tracking (UE location and cell site), device mobility
(handovers), device status (e.g., serving S-NSSAI, loss of connection, etc.) or CN type
change (5GC to EPC coverage, and vice versa). This API family might offer the customer
the possibility to explicitly query for this information (request-response mode) or be
reported with notifications on subscribed events (subscribe-notify mode).
In the medium term (the test ring in the radar), the operators will publish the NESTs
into their service portfolio, once 5GC capabilities necessary for building up B2B category
slices are available. The use of NESTs provides an easy solution for the customer to request
the allocation of a slice. Based on the service requirements captured in the NEST, the
operator can then decide which B2B category slice is most appropriate, and provision
it. In this time frame, it is also expected that customers gain experience with slicing
technology, and hence want to retain more control of their slice. This requires the operators
to increasingly expose further capabilities, with the definition of new API families. Below,
there is a list of API families that some tier-1 operators have started to test and validate
with some industry verticals and hyperscalers.
• Edge computing: these service APIs are available for those customers that want to
extend their allocated slices with third party applications, with these applications
hosted by the telco edge cloud. In a nutshell, this API family provides three main
capabilities: (i) edge node discovery capability, which allows the customer to discover
the set of edge nodes available in a certain region; (ii) edge node profile capability,
whereby the customer can get information on capabilities and supported features of a
given edge node, so as to check whether this node is valid for hosting the application;
Sensors 2021, 21, 8094 44 of 52
(iii) application resource allocation capability, that allows the customer to request the
operator to deploy the application on a given edge node.
• Device configuration: provides the customer with the ability to register a device into
the network slice, and to update device subscription. Based on the subscription infor-
mation received by the customer, the operator updates the Unified Data Management
(UDM) accordingly. This API family is quite useful for (industrial) IoT scenarios,
where B2B customers want to retain control of the configuration of their devices. For
further information on UDM functionality, see Figure 4 and [10].
• Network slice management data: with this API family, the customers can subscribe
to receive management data related to their allocated slices, at per S-NSSAI level.
The individual customers might also choose how they want to consume these data,
according to their preferences. For example, regarding performance management
data, a customer could specify the KPIs to be informed, the batch format and the
reporting period.
• QoS control: provides the customer with the ability to set and modify quality for a
slice (e.g., maximum latency, guaranteed throughput, maximum admissible packet
rate), on demand. The operator captures the customer-triggered request and routes
it through the NEF down to the PCF, which will ultimately set/modify the 5QI
associated with the in-slice PDU session(s).
• Traffic influence: provides the customer with the ability to modify the connection
policies of UEs attached to the slice, in terms of how the traffic flows. For example, if
the customer has deployed a 3rd party application in a specific edge node, with this
API family the customer can then request the re-routing of the in-slice packet flows to
this edge node.
Finally, in the longer run, the integration of Rel-17+ features into the network and OSS
layers will allow operators to unleash the full potential of NSaaS. Examples of API families
that operators foresee to make available in five-to-seven years time are captured below.
• Slice day-2 configuration: allows the customer to retain full control of slice day-to-
day operation, which is the ultimate realization of tenant-managed slices. With this
API family, the customer could request topology changes and resizing (e.g., scaling
in/out) on the slice, based on the processing of alarms and KPIs received.
• Customer-defined slice composition: allows the customer to request a slice à la carte.
To enable this feature, the operator shall define a marketplace with different functions
and applications. The customer should be able to browse this marketplace, design an
E2E slice by connecting selected functions/applications (following a ‘plug-and-play’
approach), and order its provisioning. This is a giant step forward, and requires
thinking of novel ways of designing slices and capturing their service requirements,
beyond today’s NEST approach.
9. Conclusions
As 5G standards get completed and commercial products mature, operators shall
demonstrate their ability to efficiently combine available technology solutions to deliver
network slices for different customers, with a number of these slices being short-lived
and provisioned on demand. Network slicing may allow network operators not only to
achieve relevant CAPEX and OPEX reductions in their managed network infrastructure,
but also to significantly enrich their portfolio with innovative service offerings, which is a
key differentiator in the highly competitive environment the provision of network services
has become today.
Network slicing is an E2E solution that has an impact on all subsystems, including the
different technology domains (including RAN, CN and TN) and the operational systems
(the OSS). The main problem is that the degree of maturity of slicing support is quite
different in these subsystems. Indeed, while the CN is the technology domain that currently
supports the most advanced slicing capabilities, the TN is still in and early phase, with
RAN domain sitting in between. In the case of the OSS, in charge of the management of
Sensors 2021, 21, 8094 45 of 52
these three technology domains and of the orchestration activities across them, we can find
different paces of technology evolution.
According to the above rationale, it is clear that it may take several years for operators
to prepare their systems to fully harness the power of network slicing, and become able to
support NSaaS. Awaiting this moment to start commercializing and monetizing network
slicing is not an option, either for operators (who cannot offset the costs associated with
the introduction of slicing capabilities into their assets) or for customers (which may not
need the full set of capabilities for their use cases from the very beginning). In this context,
what the industry demands is a phased-based rollout of slicing, starting with early-stage
solutions and outlining a vision of what is desired in the longer run to guide progress
and focus.
In this article, we have presented a radar with the mission to help industry in defining
this rollout. This radar captures a complete landscape of network slicing solutions, linking
these solutions to different timelines based on their technical viability and market demands.
In addition to this timing, the radar has also outlined the dimensions that have an impact
on the usability (how and where) of these solutions, across all operator managed domains.
In the RAN domain, network slicing solutions have been discussed based on functional
aspects (e.g., disaggregation and O-RAN integration), radio resource allocation and pene-
tration in the operator’s cell footprint. In the CN domain, discussions have been around
the fulfilment of isolation and customer requirements of network slice customers, resulting
in the use and combination of different 5GC functions, with different profiles. In the TN
domain, solutions have been articulated around the technology capabilities available in
the underlay WAN, complemented with the automation and programmability capabilities
brought by SDN technology. Finally, in the OSS domain, aspects related to network slice
OAM and capability exposure have been addressed, with a focus on provisioning and
assurance activities.
The network slicing solutions captured in the radar have been analyzed based on their
timeline, together with the above dimensions in Sections 4–8. In order to provide the reader
with a common reference system to interpret the content of this radar, we started this work
by providing the technical background of network slicing (Section 2) and its impact on
individual technology domains (Section 3).
We are confident that the radar presented and discussed in this article will be a
valuable reference for operators to outline their network slicing rollout plan within their
service footprint. In fact, each operator can go through the radar and decide which specific
solutions they want to activate in the different domains (CN, RAN, TN and OSS) and how
to combine them, so that the resulting E2E capabilities can meet the service requirements of
the targeted customers. This work has not entered into these decisions, which are entirely
up to each operator, and subjected to certain market and business driven factors. In other
words, this article provides the input material that an operator needs for the definition of
a network slicing rollout plan (e.g., description, analysis and profiling of network slicing
solutions, in terms of timing and features), but with no details on how to execute this plan.
Getting to these details would require going through two activities that are out of the scope
of this article, and therefore not addressed in the discussion of this work:
• First, the definition of a well-defined methodology for the design of a robust rollout
plan. The radar captures all available solutions and categorizes them into different
dimensions and timelines; however, it does not provide clues on how an operator
shall combine them in production networks. Examples of reference methodologies to
this end can be found in [4–6]. These technology analyst reports provide high level
recommendations and good practices for operators to design their individual rollout
plans for network slicing.
• Secondly, the assessment of proposed network slicing solutions, so that their main
advantages and disadvantages can be outlined in advance. This needs to be done
individually (i.e., per domain-specific solution) and E2E (i.e., based on selecting
combinations of RAN+TN+CN solutions). One of the aspects we consider for future
Sensors 2021, 21, 8094 46 of 52
work is the evaluation of these solutions, using either simulation work or PoCs,
depending on the maturity of each solution.
Besides operators, the outcomes of this work may be of relevance for other audience,
including vendors, verticals and researchers. On the one hand, the solutions captured
in this radar can help the vendors to consolidate the feature roadmap in their products.
On the other hand, the verticals can use this radar to understand what slicing capabilities
may be available for consumption, and by when. This knowledge should be important
for them, especially to manage expectations in terms of implementable use cases. Finally,
this work provides a reference for researchers to keep working on the validation of E2E
slicing solutions, using experimental setups that mimic the limitations and conditions of
real-world carrier networks.
Abbreviations
The following abbreviations are used in this manuscript:
5G Fifth Generation
5GC 5G Core
5QI 5G Quality Indicator
AI Artificial Intelligence
AMBR Aggregate Maximum Bit Rate
AMF Access and Mobility management Function
API Application Programming Interface
ASIC Application Specific Integrated Circuit
B2B Business-to-Business
B2C Business-to-Customer
BSS Business Support System
CN Core Network
CSMF Communication Service Management Function
CU Centralized Unit
DN Data Network
DRB Dedicated Radio Bearer
DSCP DiffServ Code Point
DU Distributed Unit
DWDM Dense WDM
E2E end-to-end
eCPRI Enhanced Common Public Radio Interface
EPC Evolved Packet Core
Flex-E Flexible Ethernet
Flex-O Flexible Optical Transport Network
Sensors 2021, 21, 8094 47 of 52
References
1. GSMA. The 5G Guide: A Reference for Operators. White Paper 2019. Available online: https://www.gsma.com/wp-content/
uploads/2019/04/The-5G-Guide_GSMA_2019_04_29_compressed.pdf (accessed on 24 October 2021).
2. Ordonez-Lucena, J.; Ameigeiras, P.; Lopez, D.; Ramos-Munoz, J.J.; Lorca, J.; Folgueira, J. Network slicing for 5G with SDN/NFV:
Concepts, architectures, and challenges. IEEE Commun. Mag. 2017, 55, 80–87. [CrossRef]
3. GSMA. Network Slicing-Use Case Requirements. White Paper 2018. Available online: https://www.gsma.com/futurenetworks/
wp-content/uploads/2018/07/Network-Slicing-Use-Case-Requirements-fixed.pdf (accessed on 24 October 2021).
4. De Gimarlo, S.W. Create Value and Drive Revenue with 5G Network Slicing Phased Approach. Gart. Res. 2021. Available online:
https://www.gartner.com/en/documents/4000232/create-value-and-drive-revenue-with-5g-network-slicing-p (accessed on
24 October 2021).
5. Crawshaw, J. Network Slicing Management: A Key Use Case for Service Orchestration. Omdia 2021. Available online: https:
//omdia.tech.informa.com/OM016836/Network-Slicing-Management-A-Key-Use-Case-for-Service-Orchestration (accessed on
24 October 2021).
6. Ericsson, D.; Little, A. Network Slicing: A go-to-market guide to capture high revenue potential. Ind. Rep. 2021. Available
online: https://www.ericsson.com/assets/local/digital-services/network-slicing/network-slicing-value-potential.pdf?_ga=2.
138537011.1263526122.1635069819-399301922.1635069819 (accessed on 24 October 2021).
7. 3GPP TS 38.401. NG-RAN; Architecture Description (3GPP TS 38.401 Version 16.7.0 Release 16). October 2021. Available online:
https://www.3gpp.org/ftp/Specs/archive/38_series/38.401/38401-g70.zip (accessed on 24 October 2021).
8. Launay, F. NG-RAN Network—Functional Architecture. In NG-RAN and 5G-NR: 5G Radio Access Network and Radio Interface;
Wiley: Hoboken, NJ, USA, 2021; pp. 1–29. [CrossRef]
9. O-RAN Alliance. O-RAN Use Cases and Deployment Scenarios: Towards Open and Smart RAN. White Paper 2020. Available
online: https://static1.squarespace.com/static/5ad774cce74940d7115044b0/t/5e95a0a306c6ab2d1cbca4d3/1586864301196/O-
RAN+Use+Cases+and+Deployment+Scenarios+Whitepaper+February+2020.pdf (accessed on 24 October 2021).
10. 3GPP TS 23.501. 5G; System Architecture for the 5G System (3GPP TS 23.501 Version 17.2.0 Release 17). September 2021. Available
online: https://www.3gpp.org/ftp/Specs/archive/23_series/23.501/23501-h20.zip (accessed on 24 October 2021).
11. O-RAN Alliance. Control, User and Synchronization Plane Specification (O-RAN.WG4.CUS.0-v06); O-RAN Alliance: Alfter, Germany,
2021.
12. O-RAN Alliance. Management Plane Specification Specification (O-RAN.WG4.MP.0-v06); O-RAN Alliance: Alfter, Germany, 2021.
13. 3GPP TS 38.470. NG-RAN; F1 General Aspects and Principles (3GPP TS 38.470 Version 15.6.0 Release 16). Available online:
https://www.3gpp.org/ftp/Specs/archive/38_series/38.470/38470-g50.zip (accessed on 24 October 2021).
14. 3GPP TS 29.561. 5G System; Interworking between 5G Network and External Data Networks (3GPP TS 29.561 Version 17.3.1
Release 17). September 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/29_series/29.561/29561-h31.zip,
(accessed on 24 October 2021).
Sensors 2021, 21, 8094 49 of 52
15. 3GPP TS 28.541. Management and Orchestration; 5G Network Resource Model (NRM); Stage 2 and 3 (3GPP TS 28.541 Version
17.4.0 Release 17). September 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/28_series/28.541/28541-h40.zip
(accessed on 24 October 2021).
16. ETSI GR NFV 003. Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV (ETSI GR NFV 003 Version
1.6.1). March 2021. Available online: https://www.etsi.org/deliver/etsi_gr/NFV/001_099/003/01.06.01_60/gr_nfv003v010601p.
pdf (accessed on 24 October 2021).
17. 3GPP TS 28.530. Management and Orchestration; Use Cases and Requirements (3GPP TS 28.530 Version 17.1.0 Release
17). April 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/28_series/28.530/28530-h10.zip (accessed on
24 October 2021).
18. 3GPP TS 28.533. 5G; Management and Orchestration; Architecture Framework (3GPP TS 28.533 Version 17.0.0 Release 17).
September 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/28_series/28.533/28533-h00.zip (accessed on
24 October 2021).
19. ETSI GS ZSM 002. Zero-Touch Network and Service Management (ZSM); Reference Architecture (ETSI GS ZSM 002 Version 1.1.1).
August 2019. Available online: https://www.etsi.org/deliver/etsi_gs/ZSM/001_099/002/01.01.01_60/gs_ZSM002v010101p.pdf
(accessed on 24 October 2021).
20. ETSI ISG NFV. NFV Release 4 Definition (Release Documentation v0.3.0). April 2021. Available online: https://docbox.etsi.
org/ISG/NFV/Open/Other/ReleaseDocumentation/NFV(21)000025_NFV_Release_4_Definition_v0_3_0.pdf (accessed on 24
October 2021).
21. GSMA PRD NG.116. Generic Network Slice Template (NG.116 Version 5.0). June 2021. Available online: https://www.gsma.
com/newsroom/wp-content/uploads//NG.116-v5.0-7.pdf (accessed on 24 October 2021).
22. GSMA. From Vertical Industry Requirements to Network Slice Characteristics. White Paper 2018. Available on-
line: https://www.gsma.com/futurenetworks/wp-content/uploads/2018/09/5G-Network-Slicing-Report-From-Vertical-
Industry-Requirements-to-Network-Slice-Characteristics.pdf (accessed on 24 October 2021).
23. TM Forum. TMF641 Service Ordering API User Guide; v4.1.0; TM Forum: Parsippany, NJ, USA, 2021.
24. 3GPP TS 28.531. 5G; Management and Orchestration; Provisioning (3GPP TS 28.531 Version 17.1.0 Release 17). September 2021.
Available online: https://www.3gpp.org/ftp/Specs/archive/28_series/28.531/28531-h10.zip (accessed on 24 October 2021).
25. ETSI GS NFV SOL 005. Network Functions Virtualisation (NFV) Release 3; Protocols and Data Models; RESTful Protocols
Specification for the Os-Ma-Nfvo Reference Point (ETSI GS NFV SOL 005 Version 3.5.1). October 2021. Available online: https://
www.etsi.org/deliver/etsi_gs/NFV-SOL/001_099/005/03.05.01_60/gs_nfv-sol005v030501p.pdf (accessed on 24 October 2021).
26. GSMA. Operator Platform Telco Edge Proposal Version 1.0. White Paper 2020. Available online: https://www.gsma.com/
futurenetworks/wp-content/uploads/2020/10/GSMA-Operator-Platform-Proposal-Oct-2020.pdf (accessed on 24 October 2021).
27. Lorca, F.J.; Serna, E.; Aparacio, M.; Chaissagne, A.; Esplá, J.L. Telefonica Views on the Design, Architecture and Technology of
4G/5G Open RAN Networks. White Paper 2021. Available online: https://www.telefonica.com/documents/737979/145981257
/Whitepaper-OpenRAN-Telefonica.pdf/3a160ca9-c325-a3d6-a6da-f9453616144d (accessed on 24 October 2021).
28. 3GPP TS 23.503. 5G; Policy and Charging Control Framework for the 5G System (5GS); Stage 2 (3GPP TS 23.503 Version 17.2.0
Release 17). September 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/23_series/23.503/23503-h20.zip
(accessed on 24 October 2021).
29. NGMN Alliance. 5G Smart Devices Supporting Network Slicing Version 1.1. White Paper 2020. Available online: https://ngmn.
org/wp-content/uploads/201214_NGMN_5G_SmartDevicesSupportingNetworkSlicing.pdf (accessed on 24 October 2021).
30. 3GPP TS 23.502. 5G; Procedures for the 5G System (5GS); Stage 2 (3GPP TS 23.502 Version 17.2.0 Release 17). September 2021.
Available online: https://www.3gpp.org/ftp/Specs/archive/23_series/23.502/23502-h20.zip (accessed on 24 October 2021).
31. Wen, G.; Feng, G.; Zhou, J.; Quin, S. Mobility Management for Network Slicing Based 5G Networks. In Proceedings of the 2018
IEEE 18th International Conference on Communication Technology (ICCT), Chongqing, China, 8–11 October 2018; Volume 55,
pp. 291–296. [CrossRef]
32. 3GPP TS 28.622. Telecommunication Management; Generic Network Resource Model (NRM) Integration Reference Point (IRP);
Information Service (IS) (3GPP TS 28.622 Version 16.9.0 Release 19). Available online: https://www.3gpp.org/ftp/Specs/
archive/28_series/28.622/28622-g90.zip (accessed on 24 October 2021).
33. Nichols, K.; Blake, S.; Baker, F.; Black, D. Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers.
RFC 2474. Available online: https://www.rfc-editor.org/info/rfc2474 (accessed on 24 October 2021). [CrossRef]
34. Coriant. The Role of OTN Switching in 100G and Beyond Transport Networks. White Paper 2015. Available online:
https://www.ofcconference.org/getattachment/90c0e6a4-08c1-45fb-a7f2-2957d444dc7d/The-Role-of-OTN-Switching-in-10
0G-Beyond-Transpo.aspx (accessed on 24 October 2021).
35. IA #OIF FLEXE-02.1. IA Flex Ethernet 2.1-Implementation Agreement. 2019. Available online: https://www.oiforum.com/wp-
content/uploads/OIF-FLEXE02.1.pdf (accessed on 24 October 2021).
36. Viavi Solutions. OIF Flex-E 2.1-Flexible Use of Etherne. 2020. Available online: https://www.viavisolutions.com/de-de/
literature/oif-flexe-20-flexible-use-ethernet-posters-en.pdf (accessed on 24 October 2021).
37. GSMA. 5G Implementation Guidelines. White Paper 2019. Available online: https://www.gsma.com/futurenetworks/wp-
content/uploads/2019/03/5G-Implementation-Guideline-v2.0-July-2019.pdf (accessed on 24 October 2021)
Sensors 2021, 21, 8094 50 of 52
38. H2020 5G-VINNI Project: “5G Verticals Innovation Infrastructure”. Available online: https://www.5g-vinni.eu (accessed on
24 October 2021).
39. H2020 5GROWTH Project: “5G-Enabled Growth in Vertical Industries”. Available online: https://5growth.eu (accessed on
24 October 2021).
40. H2020 5G-CLARITY Project: “Beyong 5G Multi-Tenant Private Networks Integrating Cellular, Wi-Fi and LiFi, Powered by
Artificial Intelligence and Intent Based Policy”. Available online: https://www.5gclarity.com (accessed on 24 October 2021).
41. 3GPP TS 23.707. Architecture Enhancements for Dedicated Core Networks; Stage 2 (3GPP TS 23.707 Version 13.0.0). De-
cember 2014. Available online: https://www.3gpp.org/ftp/Specs/archive/23_series/23.707/23707-d00.zip (accessed on
24 October 2021).
42. Liu, G.; Huang, Y.; Chen, Z.; Liu, Q.; Wang, Q.; Li, N. 5G Deployment: Standalone vs. Non-Standalone from the Operator
Perspective. IEEE Commun. Mag. 2020, 58, 83–89.[CrossRef]
43. Spirent. Building the New Telecom Innovation Pipeline; Spirent Ebook Series; Spirent: Crawley, UK, 2021. Available online:
https://assets.ctfassets.net/wcxs9ap8i19s/4bQsMvPuNvbEorkXMx8a7R/ee4b0e31bd5b06c0ba73d39f93821d67/EB-Building-
the-New-Telecom-Innovation-Pipeline.pdf (accessed on 24 October 2021).
44. Ordonez-Lucena, J.; Chavarria, J.F.; Contreras, L.M.; Pastor, A. The use of 5G Non-Public Networks to support Industry 4.0
scenarios. In Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking (CSCN), Granada,
Spain, 28–30 October 2019; pp. 1–7.
45. Poe, W.Y.; Ordonez-Lucena, J.; Mahmood, K. Provisioning Private 5G Networks by Means of Network Slicing: Architectures and
Challenges. In Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin,
Ireland, 7–11 June 2020; pp. 1–6.[CrossRef]
46. 3GPP Liaison Statement. LS on UPF Support for Multiple Network Slices (S2-2105240/C4-212560). February 2021. Available
online: https://www.3gpp.org/ftp/tsg_sa/WG2_Arch/TSGS2_146E_Electronic_2021-08/Docs/S2-2105240.zip (accessed on
24 October 2021).
47. Balasubramanian, S. (Nokia). End-to-End Network Slicing in 5G System: 3GPP Standards Perspective. 2016. Available online:
https://www.5g-ks.org/pdf/Network_Slicing_in_5GS-E2E_View-Nokia.pdf (accessed on 24 October 2021).
48. Chai, Y.-H.; Lin, F.J. Evaluating Dedicated Slices of Different Configurations in 5G Core. J. Comput. Commun. 2021, 7, 83–
89.[CrossRef]
49. ETSI. Harmonizing Standards for Edge Computing—A Synergized Architecture Leveraging ETSI ISG MEC and 3GPP Specifi-
cations. White Paper 2020; Volume 36. Available online: https://www.etsi.org/images/files/ETSIWhitePapers/ETSI_wp36_
Harmonizing-standards-for-edge-computing.pdf (accessed on 24 October 2021).
50. 3GPP TS 29.520. 5G; 5G System; Network Data Analytics Services; Stage 3 (3GPP TS 29.520 Version 17.4.0 Release 17).
September 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/29_series/29.520/29520-h40.zip (accessed on 24
October 2021).
51. 3GPP TS 23.288. Architecture Enhancements for 5G System (5GS) to Support Network Data Analytics Services (3GPP TS 23.288
Version 17.2.0 Release 17). September 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/23_series/23.288/232
88-h20.zip (accessed on 24 October 2021).
52. 3GPP TS 29.526. 5G; 5G System; Network Slice-Specification Authentication and Authorization (NSSAA) Services; Stage 3 (3GPP
TS 29.526 Version 17.2.0 Release 17). September 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/29_series/29
.526/29526-h20.zip (accessed on 24 October 2021).
53. GSMA PRD NG.113. 5GS Roaming Guidelines (NG.113 Version 4.0). May 2021. Available online: https://www.gsma.com/
newsroom/wp-content/uploads//NG.113-v4.0.pdf (accessed on 24 October 2021).
54. Niknam, S.; Roy, A.; Dhillon, H.S.; Singh, S.; Banerji, R.; Reed, J.H.; Saxena, N.; Yoon, S. Intelligent O-RAN for beyond 5G and 6G
wireless networks. arXiv 2020, arXiv:2005.08374.
55. O-RAN Alliance. O-RAN Architecture Description (O-RAN.WG1.O-v03); O-RAN Alliance: Alfter, Germany, 2020.
56. Sharma, S.K.; Bogale, T.E.; Le, L.B.; Chatzinotas, S.; Wang, X.; Ottersten, B. Dynamic Spectrum Sharing in 5G Wireless Networks
With Full-Duplex Technology: Recent Advances and Research Challenges. IEEE Commun. Surv. Tutor. 2018, 1, 674–707. [CrossRef]
57. Chin-Lin, I.; Kuklinskí, S.; Chen, T. A Perspective of O-RAN Integration with MEC, SON, and Network Slicing in the 5G Era.
IEEE Netw. 2020, 6, 3–4.[CrossRef]
58. O-RAN Alliance. O-RAN Near-Real-Time RAN Intelligent Controller Architecture and General Aspects and Principles (O-
RAN.WG3.E2GAP-v01.01); O-RAN Alliance: Alfter, Germany, 2020.
59. O-RAN Alliance. Slicing Architecture (O-RAN.WG1.Slicing-Architecture-v05); O-RAN Alliance: Alfter, Germany, 2021.
60. O-RAN Alliance. O-RAN O1 Interface Specification for O-DU (O-RAN.WG5.MP.0-v01.00); O-RAN Alliance: Alfter, Germany, 2020.
61. O-RAN Alliance. O-RAN A1 Interface: Type Definitions 2.0 (O-RAN.WG2.A1TD-v02); O-RAN Alliance: Alfter, Germany, 2020.
62. Briscoe, B.; De Schepper, K.; Bagnulo, M.; White, G. Low Latency, Low Loss, Scalable Throughput (L4S) Internet Service
Architecture. Draft-Ietf-Tsvwg-l4s-Arch-10 (Work in Progress). Available online: https://datatracker.ietf.org/doc/draft-ietf-
tsvwg-l4s-arch/ (accessed on 24 October 2021).
63. KDDI and Samsung. E2E Network Slicing PoC with RIC Radio Resource Management. O-RAN Alliance Plugfest. Available
online: https://plugfestvirtualshowcase.o-ran.org/dist/images/part2.pdf (accessed on 24 October 2021).
Sensors 2021, 21, 8094 51 of 52
64. CPRI. Common Public Radio Interface: eCPRI Interface Specification V2.0. 2019. Available online: http://www.cpri.info/
downloads/eCPRI_v_2.0_2019_05_10c.pdf (accessed on 24 October 2021).
65. Henry, J.; Sziget, T.; Contreras, L.M. Diffserv to QCI Mapping. Draft-Henry-Tsvwg-Diffserv-to-Qci-04 (Work in Progress).
Available online: https://datatracker.ietf.org/doc/html/draft-henry-tsvwg-diffserv-to-qci (accessed on 24 October 2021).
66. Kaippamllimalil, J.; Lee, Y.; Saboorian, T.; Shalash, M.; Kozat, U. Traffic Engineered Transport for 5G Networks. In Proceedings of
the 2019 IEEE Conference on Standards for Communications and Networking (CSCN), Granada, Spain, 28–30 October 2019;
pp. 1–7.[CrossRef]
67. Saad, T.; Beeram, V.; Juniper Networks; Wen, B.; Comcast; Ceccarelli, D.; Halpern, J.; Ericsson; Peng, S.; Chen, R.; et al.
Realizing Network Slices in IP/MPLS Networks. Draft-Bestbar-Teas-Ns-Packet-03 (Work in Progress). Available online:
https://datatracker.ietf.org/doc/html/draft-bestbar-teas-ns-packet (accessed on 24 October 2021).
68. Jaksic, D. Segment Routing in Service Provider networks. In Proceedings of the Cisco Connect Event, Rovinj, Croatia, 19–21 March
2018.
69. Filsfils. Segment Routing Architecture. RFC 8402. Available online: https://www.rfc-editor.org/info/rfc8402 (accessed on
24 October 2021).
70. Borsatti, D.; Davoli, G.; Cerroni, W.; Callegati, F. Service Function Chaining Leveraging Segment Routing for 5G Network Slicing.
In Proceedings of the 2019 15th International Conference on Network and Service Management (CNSM), Halifax, NS, Canada,
21–25 October 2019; pp. 1–6. [CrossRef]
71. Gramaglia, M.; Sciancalepore, V.; Fernandez-Maestro, F.J.; Perez, R.; Serrano, P.; Banchs, A. Experimenting with SRv6: A Tunneling
Protocol supporting Network Slicing in 5G and beyond. In Proceedings of the 2020 IEEE 25th International Workshop on
Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Virtual Conference, 14–16 September
2020; pp. 1–6. [CrossRef]
72. Stateless and Scalable Network Slice Identification for SRv6. Draft-Filsfils-Spring-srv6-Stateless-Slice-id-04 (Work in Progress).
Available online: https://datatracker.ietf.org/doc/html/draft-filsfils-spring-srv6-stateless-slice-id (accessed on 24 October 2021).
73. Katsalis, K.; Gatzikis, L.; Samdanis, K. Towards Slicing for Transport Networks: The Case of Flex-Ethernet in 5G. In Proceedings
of the 2018 IEEE Conference on Standards for Communications and Networking (CSCN), Paris, France, 29–31 October 2019;
pp. 1–7. [CrossRef]
74. ITU-T G.709.1/Y.1331.1. Flexible OTN Short-Reach Interfaces. April 2021. Available online: https://www.itu.int/rec/T-REC-G.
709.1/recommendation.asp?lang=en&parent=T-REC-G.709.1-201806-I (accessed on 24 October 2021).
75. Bhattacharjee, S.; Katsalis, K.; Arouk, O.; Schmidt, R.; Wang, T.; An, X.; Bauschert, T.; Nikaein, N. Network Slicing for TSN-Based
Transport Networks. IEEE Access 2021, 9, 62788–62809. [CrossRef]
76. IETF Deterministic Networking (DetNet) Working Group. Available online: https://datatracker.ietf.org/wg/detnet/about/
(accessed on 24 October 2021).
77. MEF 70.1 Draft Release 1. SD-WAN Service Attributes and Service Framework 2020. Available online: https://www.mef.net/
wp-content/uploads/2020/08/MEF-70-1-Draft-R1.pdf (accessed on 24 October 2021).
78. MEF 3.0 Proof of Concept (PoC) 133. SD-WAN and 5G with Network Slicing. Available online: https://www.mef.net/poc/sd-
wan-with-5g-network-slicing/ (accessed on 24 October 2021)
79. ONF TR-522. SDN Architecture for Transport Networks 2016. Available online: https://opennetworking.org/wp-content/
uploads/2014/10/SDN_Architecture_for_Transport_Networks_TR522.pdf (accessed on 24 October 2021).
80. Ceccarelli, D.; Lee, Y. Framework for Abstraction and Control of Traffic Engineered Networks (ATCN). RFC 8453. Available
online: https://www.rfc-editor.org/info/rfc8453 (accessed on 24 October 2021). [CrossRef]
81. Mu, Q.; Boucadair, M.; Lopez, D.; Xie, C.; Geng, L. A Framework for Automating Service and Network Management with YANG
RFC 8969. Available online: https://www.rfc-editor.org/info/rfc8969 (accessed on 24 October 2021). [CrossRef]
82. Contreras, L.M.; Gonzalez, O.; Lopez, V.; Fernández-Palacios, J.P.; Folgueira, J. iFUSION: Standards-based SDN Architecture for
Carrier Transport Network. In Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking
(CSCN), Granada, Spain, 28–30 October 2019; pp. 1–7. [CrossRef]
83. Telefónica; Vodafone; MTN Group, Orange; Telia Company; Deustche Telekom. Open Transport SDN Architecture Whitepa-
per. Available online: https://cdn.brandfolder.io/D8DI15S7/at/jh6nnbb6bjvn7w7t5jbgm5n/OpenTransportArchitecture-
Whitepaper_TIP_Final.pdf (accessed on 24 October 2021).
84. Enns, R.; Bjorklund, M.; Schoenwaelder, J.; Bierman, A. Network Configuration Protocol (NETCONF). RFC 6241. Available
online: https://www.rfc-editor.org/info/rfc6241 (accessed on 24 October 2021).
85. Openconfig. Data Models and APIs. Available online: https://www.openconfig.net/projects/models/ (accessed on
24 October 2021).
86. Gredler, H.; Medved, J.; Previdi, S.; Farrel, A.; Ray, S. North-Bound Distribution of Link-State and Traffic Engineering (TE) Using
BGP. RFC 7752. Available online: https://www.rfc-editor.org/info/rfc7752 (accessed on 24 October 2021). [CrossRef]
87. Vasseur, J.P.; Le Roux, J.L. Path Computation Element (PCE) Communication Protocol (PCEP). RFC 5440. Available online:
https://www.rfc-editor.org/info/rfc5540 (accessed on 24 October 2021). [CrossRef]
88. gRPC. A High Performance, Open Source Universal Remote Procedure Call (RPC) Framework. Available online: https://grpc.io
(accessed on 24 October 2021).
Sensors 2021, 21, 8094 52 of 52
89. Madapatha, C.; Makki, B.; Fang, C.; Teyeb, O.; Dahlman, E.; Alouini, M.S.; Svensson, T. On Integrated Access and Backhaul Networks:
Current Status and Potentials. IEEE Open J. Commun. Soc. 2020, 1, 1374–1389. [CrossRef]
90. Bierman, A.; Bjorjund, M.; Watsen, K. RESTCONF Protocol. RFC 8040. Available online: https://www.rfc-editor.org/info/rfc8040
(accessed on 24 October 2021). [CrossRef]
91. Litkwoski, S.; Tomotaki, L.; Ogaki, K. YANG Data Model for L3VPN Service Delivery. RFC 8049. Available online: https:
//www.rfc-editor.org/info/rfc4364 (accessed on 24 October 2021). [CrossRef]
92. Wen, B.; Fioccola, G.; Xie, C.; Jalil, L. A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery. RFC
8466. Available online: https://www.rfc-editor.org/info/rfc8466 (accessed on 24 October 2021).
93. Barguil, S.; de Dios, O.G.; Boucadair, M.; Munoz, L.; Aguado, A. A Layer 3 VPN Network YANG Model. Draft-Ietf-Opsawg-l3sm-
l3nm-05 (Work in Progress). Available online: https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-l3sm-l3nm (accessed on
24 October 2021).
94. Barguil, S.; De Dios, O.G.; Boucadair, M.; Munoz, L.; Jalil, L.; Ma, J. A Layer 2 VPN Network Yang Model. Draft-Ietf-Opsawg-
l2nm-02 (Work in Progress). Available online: https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-l2nm (accessed on
24 October 2021).
95. Saad, T.; Gandhi, R.; Liu, X.; Beeram, V.; Bryskin, I. A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths
and Interfaces. Draft-Ietf-Teas-Yang-te-25 (Work in Progress). Available online: https://datatracker.ietf.org/doc/draft-ietf-teas-
yang-te/ (accessed on 24 October 2021).
96. Liu, X.; Bryskin, I.; Beeram, V.; Saad, T.; Shah, H.; de Dios, O.G. YANG Data Model for Traffic Engineering (TE) Topologies. RFC
8795. Available online: https://www.rfc-editor.org/info/rfc8795 (accessed on 24 October 2021).
97. ONF Transport API (T-API) Project. Available online: https://github.com/OpenNetworkingFoundation/TAPI (accessed on
15 October 2021).
98. Openbackhaul Project. Available online: https://github.com/openBackhaul/overview (accessed on 15 October 2021).
99. ONF TR-512v1.4. Core Information Model (CoreModel). v1.4.1. 2018. Available online: https://opennetworking.org/wp-
content/uploads/2018/12/TR-512_v1.4_OnfCoreIm-info.zip (accessed on 24 October 2021).
100. IETF Traffic Engineering Architecture and Signalling (TEAS) Working Group. Available online: https://datatracker.ietf.org/wg/
teas/about/ (accessed on 24 October 2021).
101. Farrel, A. Framework for IETF Network Slices. Draft-Ietf-Teas-Ietf-Network-Slices-04 (Work in Progress). Available online:
https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slices (accessed on 24 October 2021).
102. Contreras, L.M. IETF Network Slice Use Cases and Attributes for Northbound Inteface of IETF Network Slice Controllers.
Draft-Contreras-Teas-Slice-Nbi-05 (Work in Progress). Available online: https://datatracker.ietf.org/doc/html/draft-contreras-
teas-slice-nbi(accessed on 24 October 2021).
103. Liu, X. IETF Network Slice Service YANG Data Model. Draft-Liu-Teas-Transport-Network-Slice-Nbi-Yang-05 (Work in
Progress). Available online: https://datatracker.ietf.org/doc/html/draft-liu-teas-transport-network-slice-nbi-yang(accessed on
24 October 2021).
104. 3GPP TS 28.552. 5G; Management and Orchestration; 5G Performance Measurements (3GPP TS 28.552 Version 17.4.0 Release 17).
September 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/28_series/28.552/28552-h40.zip (accessed on
24 October 2021).
105. 3GPP TS 28.554. 5G; Management and Orchestration; 5G end to end Key Performance Indicators (KPIs) (3GPP TS 28.554 Version
17.4.y Release 17). September 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/28_series/28.554/28554-h40.zip
(accessed on 24 October 2021).
106. 3GPP TS 28.545. 5G; Management and Orchestration; Fault Supervision (FS) (3GPP TS 28.552 Version 17.0.0 Release 17).
September 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/28_series/28.545/28545-h00.zip (accessed on
24 October 2021).
107. 3GPP TR 28.809. 5G; Management and Orchestration; Study on Enhancement of Management Data Analytics (MDA) (3GPP TR
28.809 Version 17.0.0 Release 17). September 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/28_series/28.8
09/28809-h00.zip (accessed on 24 October 2021).
108. 3GPP TS 28.104. 5G; Management and Orchestration; Management Data Analytics (MDA) (3GPP TR 28.104 Version 0.2.0).
September 2021. Available online: https://www.3gpp.org/ftp/Specs/archive/28_series/28.104/28104-020.zip (accessed on
24 October 2021).
109. ETSI GS ZSM 009–2. Zero-Touch Network and Service Management (ZSM); Closed-Loop Automation; Part 2: Solutions (ETSI GS
ZSM 009–2 Version 0.7.0 Draft). October 2021. Available online: https://docbox.etsi.org/ISG/ZSM/Open/Drafts/009-2ed111
_Cla_sol/ZSM-009-2_Cla_solv070.zip (accessed on 24 October 2021).
110. GSMA. An Introduction to Network Slicing. White Paper 2017. Available online: https://www.gsma.com/futurenetworks/wp-
content/uploads/2017/11/GSMA-An-Introduction-to-Network-Slicing.pdf (accessed on 24 October 2021).
111. NGMN Alliance. Security Aspects of Network Capabilities Exposure in 5G v1.0. White Paper 2018. Available online:
https://ngmn.org/wp-content/uploads/Publications/2018/180921_NGMN-NCEsec_white_paper_v1.0.pdf (accessed on 24 Oc-
tober 2021).
112. Contreras, L.M.; López, D.R. A Network Service Provider Perspective on Network Slicing. Available online: https://sdn.ieee.
org/newsletter/january-2018/a-network-service-provider-perspective-on-network-slicing (accessed on 24 October 2021).