3,414 research outputs found

    Data-Driven resource orchestration in sliced 5G Networks

    Get PDF
    En los últimos años la quinta generación de comunicaciones móviles ha comenzado a desarrollarse. El 5G supone un gran cambio si se compara con las anteriores generaciones de comunicaciones móviles, puesto que no se centra meramente en aumentar el ancho de banda, reducir la latencia o mejorar la eficiencia espectral, sino en ofrecer un amplio rango de servicios y aplicaciones, con requisitos muy dispares entre sí, a una gran variedad de tipos de usuario. Estos objetivos pretenden ser alcanzados empleando nuevas tecnologías: Network Function Virtualization, Software Defined Networks, Network Slicing, Mobile Edge Computing, etc. El objetivo de este Trabajo de Fin de Máster es analizar el soporte actual de end-to-end Network Slicing en un entorno 5G Open Source y desarrollar una maqueta 5G con software que admita Network-slicing.In the past few years the fifth generation in mobile communications started to arise. 5G supposes a great change compared with the past mobile communication generations, it doesn’t aim merely at improving bandwidth, reducing delay or upgrading spectral efficiency but at offering a wide range of services and applications, with huge differentrequirements, to a vast variety of users. These objectives are to be accomplished using new technologies such as: Network Function Virtualization, Software Defined Networks, Network Slicing, Mobile Edge Computing, etc. The objective of this Master Thesisis to analyze the current support for end-to-end Network Slicing in a 5G Open Source environment and to developan open source5GTestbedwith recent Software contributions in Network Slicing.Máster Universitario en Ingeniería de Telecomunicación (M125

    Secure and Privacy-preserving Network Slicing in 3GPP 5G System Architecture

    Full text link
    Network slicing in 3GPP 5G system architecture has introduced significant improvements in the flexibility and efficiency of mobile communication. However, this new functionality poses challenges in maintaining the privacy of mobile users, especially in multi-hop environments. In this paper, we propose a secure and privacy-preserving network slicing protocol (SPNS) that combines 5G network slicing and onion routing to address these challenges and provide secure and efficient communication. Our approach enables mobile users to select network slices while incorporating measures to prevent curious RAN nodes or external attackers from accessing full slice information. Additionally, we ensure that the 5G core network can authenticate all RANs, while avoiding reliance on a single RAN for service provision. Besides, SPNS implements end-to-end encryption for data transmission within the network slices, providing an extra layer of privacy and security. Finally, we conducted extensive experiments to evaluate the time cost of establishing network slice links under varying conditions. SPNS provides a promising solution for enhancing the privacy and security of communication in 5G networks

    POSENS: a practical open source solution for end-to-end network slicing

    Get PDF
    Network slicing represents a new paradigm to operate mobile networks. With network slicing, the underlying infrastructure is "sliced" into logically separate networks which can be customized to the specific needs of their tenant. Hand-on experiments on this technology are essential to understand its benefits and limits, and to validate the design and deployment choices. While some network slicing prototypes have been built for the radio access networks (RANs), leveraging on the wide availability of radio hardware and open source software, there is currently no open source suite for end-to-end network slicing available to the research community. In this paper we fill this gap by developing an end-to-end network slicing protocol stack, POSENS, which relies on a slice-aware shared RAN solution. We design the required algorithms and protocols, and provide a full implementation leveraging on state-of-the-art software components. We validate the effectiveness of POSENS in achieving tenant isolation and network slices customization, showing that no price in performance is paid to this end. We believe that our tool will prove very useful to researchers and practitioners working on this novel architectural paradigm.This work has been performed in the framework of the H2020-ICT-2014-2 project 5G NORMA (Grant Agreement No. 671584) and within the 5G-MoNArch project, part of the Phase II of the 5th Generation Public Private Partnership (5G-PPP) program partially funded by the European Commission within the Horizon 2020 Framework Program

    End-to-end Mobile Network Slicing

    Get PDF
    Wireless networks have gone through several years of evolution until now and will continue to do so in order to cater for the varying needs of its users. These demands are expected to continue to grow even more in the future, both in size and variability. Hence, the 5G technology needs to consider these variabilities in service demands and potential data explosion which could accompany users’ demands at the core of its architecture. For 5G mobile network to handle these foreseen challenges, network slicing \cite{c13} is seen as a potential path to tread as its standardization is progressing. In light of the proposed 5G network architecture and to support and end-to-end mobile network slicing, we implemented radio access network (RAN) slicing over a virtualized evolved Node B (eNodeB) and ensured multiple core network slices could communicate through it successfully. Our results, challenges and further research path are presented in this thesis report

    An efficient model for mobile network slice embedding under resource uncertainty

    Get PDF
    The fifth generation (5G) of mobile networks will support several new use cases, like the Internet of Things (IoT), massive Machine Type Communication (mMTC) and Ultra-Reliable and Low Latency Communication (URLLC) as well as significant improvements of the conventional Mobile Broadband (MBB) use case. End-to-end network slicing is a key-feature of 5G since it allows to share and at the same time isolate resources between several different use cases as well as between tenants by providing logical network. The virtual separation of the network slices on a common end-to-end mobile network infrastructure enables an efficient usage of the underlying network resources and provides means for security and safety related isolation of the defined logical networks. A much-discussed challenge is the reuse or overbooking of resources guaranteed by contract. However, there is a consensus that over-provisioning of mobile communication bands is economically infeasible and a certain risk of network overload is acceptable for the majority of the 5G use cases. In this paper, an efficient model for mobile network slice embedding is presented which enables an informed decision on network slice admission. This is based on the guaranteed end-to-end mobile network resources that have to be provided on the one hand and the capacities and capabilities of the underlying network infrastructure on the other hand. The network slice embedding problem is solved in form of a Mixed Integer Linear Program with an uncertainty-aware objective function. Subsequently, the confidence in the availability of each resource is analyzed

    Overall 5G-MoNArch architecture and implications for resource elasticity

    Get PDF
    Proceeding of: 2018 European Conference on Networks and Communications (EuCNC), June 18-21, Ljubljana, SloveniaThe fifth generation (5G) of mobile and wireless communications networks aims at addressing a diverse set of use cases, services, and applications with a particular focus on enabling new business cases via network slicing. The development of 5G has thus advanced quickly with research projects and standardization efforts resulting in the 5G baseline architecture. Nevertheless, for the realization of native end-to-end (E2E) network slicing, further features and optimizations shall still be introduced. In this paper, essential building blocks and design principles of the 5G architecture will be discussed capitalizing on the innovations that are being developed in the 5G-MoNArch project. Furthermore, building on the concept of resource elasticity introduced by 5G-MoNArch and briefly resummarized in this paper, an elasticity functional architecture is presented where the architectural implications required for each of the three dimensions of elasticity are described, namely computational, orchestration-driven, and slice-aware elasticity.This work has been performed in the framework of the H2020 project 5G-MoNArch co-funded by the EU

    Identifying 5G system enhancements: enabling technologies for multi-service networks

    Get PDF
    Proceeding of: 2018 IEEE Conference on Standards for Communications and Networking (CSCN)The fifth generation (5G) of mobile and wireless communications networks aims at addressing a diverse set of use cases, services, and applications with a particular focus on enabling new business cases via network slicing. The development of 5G has thus advanced quickly with research projects and standardization efforts resulting in the 5G baseline architecture. Nevertheless, for the realization of native end-to-end (E2E) network slicing, further features and optimizations shall still be introduced. In this paper, we provide a gap analysis of current 5G system (5GS) with respect to some specific enhancements and detail our insights on the enabling innovations that can fill the identified gaps. We will then discuss the essential building blocks and design principles of an evolved 5G baseline architecture capitalizing on the innovations that are being developed.This work has been performed in the framework of the H2020 project 5G-MoNArch co-funded by the EU

    Enhancing Network Slicing Architectures with Machine Learning, Security, Sustainability and Experimental Networks Integration

    Full text link
    Network Slicing (NS) is an essential technique extensively used in 5G networks computing strategies, mobile edge computing, mobile cloud computing, and verticals like the Internet of Vehicles and industrial IoT, among others. NS is foreseen as one of the leading enablers for 6G futuristic and highly demanding applications since it allows the optimization and customization of scarce and disputed resources among dynamic, demanding clients with highly distinct application requirements. Various standardization organizations, like 3GPP's proposal for new generation networks and state-of-the-art 5G/6G research projects, are proposing new NS architectures. However, new NS architectures have to deal with an extensive range of requirements that inherently result in having NS architecture proposals typically fulfilling the needs of specific sets of domains with commonalities. The Slicing Future Internet Infrastructures (SFI2) architecture proposal explores the gap resulting from the diversity of NS architectures target domains by proposing a new NS reference architecture with a defined focus on integrating experimental networks and enhancing the NS architecture with Machine Learning (ML) native optimizations, energy-efficient slicing, and slicing-tailored security functionalities. The SFI2 architectural main contribution includes the utilization of the slice-as-a-service paradigm for end-to-end orchestration of resources across multi-domains and multi-technology experimental networks. In addition, the SFI2 reference architecture instantiations will enhance the multi-domain and multi-technology integrated experimental network deployment with native ML optimization, energy-efficient aware slicing, and slicing-tailored security functionalities for the practical domain.Comment: 10 pages, 11 figure

    Network slicing cost allocation model

    Get PDF
    Within the upcoming fifth generation (5G) mobile networks, a lot of emerging technologies, such as Software Defined Network (SDN), Network Function Virtualization (NFV) and network slicing are proposed in order to leverage more flexibility, agility and cost-efficient deployment. These new networking paradigms are shaping not only the network architectures but will also affect the market structure and business case of the stakeholders involved. Due to its capability of splitting the physical network infrastructure into several isolated logical sub-networks, network slicing opens the network resources to vertical segments aiming at providing customized and more efficient end-to-end (E2E) services. While many standardization efforts within the 3GPP body have been made regarding the system architectural and functional features for the implementation of network slicing in 5G networks, techno-economic analysis of this concept is still at a very incipient stage. This paper initiates this techno-economic work by proposing a model that allocates the network cost to the different deployed slices, which can then later be used to price the different E2E services. This allocation is made from a network infrastructure provider perspective. To feed the proposed model with the required inputs, a resource allocation algorithm together with a 5G network function (NF) dimensioning model are also proposed. Results of the different models as well as the cost saving on the core network part resulting from the use of NFV are discussed as well

    Network Slicing in 5G: Admission, Scheduling, and Security

    Get PDF
    In the past few decades, there was an increase in the number of devices that have wireless capabilities such as phones, televisions, and home appliances. With the high demand for wireless networking, the fifth generation (5G) of mobile networks was designed to support the different services of new applications. In addition, one of the technical issues that 5G would evolve is the increase in traffic and the need to satisfy the user’s experience. With the evolution of wireless networking and 5G, Network Slicing has been introduced to accommodate the diverse requirements of the applications. Thus, network slicing is the concept of partitioning the physical network infrastructure into multiple self-contained logical pieces which can be identified as slices. Each slice can be customized to serve and meet different network requirements and characteristics. In terms of security, network security has allowed for new security vulnerabilities such as Distributed Denial of Service (DDoS) and resource exhaustion. However, slices can be isolated to provide better resource isolation. In addition, each slice is considered an end-to-end virtual network, operators would be able to allocate resources to the tenants which are the service providers. The isolated resources are controlled by the tenants; each tenant has control over how to use them to meet the requirements of the clients. One of the challenges in network slicing is RAN slicing. The target of RAN Slicing is to meet the QoS requirements of different services for each end-user. However, the coexistence of different services is challenging because each service has its requirements. Each slice must estimate its network demands based on the QoS requirements and control the admission to the slice. To solve this issue, we consider the scenario for the enhanced mobile broadband (eMBB) and the ultra-reliable-low-latency communication (URLLC) use cases’ coexistence, and we slice the RAN based on the priority of the user applicatio
    • …
    corecore