SlideShare a Scribd company logo
Network slicing is a method of creating multiple
unique logical and virtual networks on a
common multi-domain infrastructure.
A different approach to view is that network
slicing overlays multiple virtual networks on a
shared network. Each part of the network can
have its own logical topology, security rules and
performance characteristics-within the limits
imposed by the basic physical network.
Different slices are often dedicated to different
purposes, like ensuring a selected application or
service gets priority access to capacity and
delivery or isolating traffic for specific users or
device classes. Slicing networks enables the
network operator to maximise the utilization of
network resources and repair flexibility.
Network slicing is a key function of 5G.
5G network slicing is a virtual network
architecture that belongs to the same family as
Software-defined Networking (SDN) and
Network Function Virtualization (NFV).
One of the foremost innovative aspects of the 5G
architecture is its reliance on 5G network slicing,
which can let operators provide portions of their
networks for specific customer uses cases —
whether that use case is that the smart home, the
web of Things (IoT) factory, the connected car or
the smart energy grid.
The benefits of network slicing are:
• It can help network operators reduce expenditure
(OPEX) and capital expenditure (CAPEX).
• It greatly improves the operational efficiency and
time to market for delivering 5G network services.
• A single network can be used to provide various
services according to user needs and various use
cases.
• Network operators can allocate the proper amount
of required resources as per network slice.
• It overcomes all the shortcomings of the most
popular QoS solution "DiffServ".
Traditionally, private networks have been
deployed to meet specific use cases. This is
expensive, and there is usually little flexibility to
adapt to new services and use cases.
Everything about 5G is changing, because 5G
aims to support billions of connected devices,
many diverse use cases, new performance levels,
and multiple new vertical industries through a
common network.
Using an equivalent physical network for
multiple purposes results in higher resource
utilization, economies of scale and scope, shorter
time to plug and provides clear synergies and
increased value and benefit to society.
Further, because the available base of users,
devices and applications is larger and uses an
equivalent physical network, the edge for
innovation is lowered and can allow targeting of
specific needs or demands.
Fundamentals of 5G Network Slicing Training
by Tonex
Fundamentals of 5G Network Slicing Training
focuses on key principles, architecture and
implementation of 5G network slicing.
Participants discover the way to effectively use
network slicing across 5G core, RAN and
transport networks. you'll also find out how
network slicing is one among key components
that provide 5G operation.
Through the use of 5G, SDN and NFV
technologies, we can gain support knowledge of
network slicing and logical virtual network slicing
suitable for 5G to support diversified services
such as mobile broadband, large-scale Internet of
Things and ultra-reliable low-latency services.
Audience:
• Software Engineers
• Network Design Engineers
• Managers
• Product management, marketing, planning,
operations and employees with little or no
experience in 5G or network slicing.
• People who have 5G network experience but
have never received any formal training on
network slicing.
Learning Objectives:
• How to implement network slicing in 5G
networks
• How to lay the foundation for 5G network
slicing monetization
• How to plan and design the lifecycle
management of network slicing
• How to implement network slicing and be
able to support various services with specific
performance or control requirements on a
common network platform
Learning Objectives:
• Summary of 5G use cases and applications
• 5G network overview
• How to implement operational KPIs on
slice/service instantiation, termination,
activation, deactivation, usage events,
dynamic resource consumption based on
slice/service/network functions, and
performance and analysis events based on
the set of network slice performance
indicators
Course Agenda:
Overview of 5G Networks
• 5G operational use cases
• NSA and SA architecture
• Overview of 5G network transformation
• Software defined infrastructure (SDI)
• Network functions virtualization (NFV)
• Software-defined networking (SDN)
• Network slicing and 3GPP Activities
• Services related to slicing
• Overview of a network slice
Course Agenda:
Overview of 5G Networks
• Network slicing in 5G networks
• The 5G network slicing opportunity
• The use cases identified for 5G and network slicing
• Network slicing use cases requirements
• Extreme (or enhanced) Mobile Broadband (eMBB)
• Massive Machine-Type Communications (mMTC)
• Ultra-reliable Low-Latency Communications
(urLLC)
Course Agenda:
Digital Transformation and Network Slicing
• Technical deep dive on slicing
• Network slicing architecture
• Network slicing challenges
• IoT impact
• Network slicing in 5G networks
• RAN, core, and transport network
• Network slicing operational scenarios
Course Agenda:
Network Slicing Deployment
• Managing public 5G network slices
• Network slice management
• Network slice life cycle management
• Configuration management
• Performance management
• Security management
Learn More:
Fundamentals of 5G Network Slicing Training
https://www.tonex.com/training-courses/
fundamentals-of-5g-network-slicing/

More Related Content

What's hot

5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes
Aalekh Jain
 
NOMA in 5G Networks
NOMA in 5G NetworksNOMA in 5G Networks
NOMA in 5G Networks
SyedShaharyaarHussai
 
5G network architecture progress
5G network architecture progress5G network architecture progress
5G network architecture progress
Mohammad Anwarul Islam
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)
3G4G
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology Tutorial
APNIC
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
Guisun Han
 
5G Network Architecture and Design
5G Network Architecture and Design5G Network Architecture and Design
5G Network Architecture and Design
3G4G
 
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
Center for Transportation Research - UT Austin
 
3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)
3G4G
 
Beam forming
Beam formingBeam forming
Beam forming
Ayush Khandelia
 
5G Physical Channel and Signal
5G Physical Channel and Signal5G Physical Channel and Signal
5G Physical Channel and Signal
Taiz Telecom
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
Karthik
 
What is 5G?
What is 5G?What is 5G?
5G technical_overview_training_sec_1
5G technical_overview_training_sec_15G technical_overview_training_sec_1
5G technical_overview_training_sec_1
Sajal Kumar Das
 
Base Station Antenna needs for the 5G RAN
Base Station Antenna needs for the 5G RANBase Station Antenna needs for the 5G RAN
Base Station Antenna needs for the 5G RAN
3G4G
 
Noma And Future
Noma  And FutureNoma  And Future
Noma And Future
minhaz uddin
 
Massive MIMO
Massive MIMOMassive MIMO
Massive MIMO
Hasan Aghbari
 
IT8602 Mobile Communication Question Bank
IT8602 Mobile Communication Question BankIT8602 Mobile Communication Question Bank
IT8602 Mobile Communication Question Bank
pkaviya
 

What's hot (20)

5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes
 
NOMA in 5G Networks
NOMA in 5G NetworksNOMA in 5G Networks
NOMA in 5G Networks
 
Network Slicing overview_v6
Network Slicing overview_v6Network Slicing overview_v6
Network Slicing overview_v6
 
5G network architecture progress
5G network architecture progress5G network architecture progress
5G network architecture progress
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology Tutorial
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
 
5G Network Architecture and Design
5G Network Architecture and Design5G Network Architecture and Design
5G Network Architecture and Design
 
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
Vehicular mmWave Communication and Joint Communication Radars: Opportunities ...
 
3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)3GPP SON Series: Minimization of Drive Testing (MDT)
3GPP SON Series: Minimization of Drive Testing (MDT)
 
Beam forming
Beam formingBeam forming
Beam forming
 
5G Physical Channel and Signal
5G Physical Channel and Signal5G Physical Channel and Signal
5G Physical Channel and Signal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
What is 5G?
What is 5G?What is 5G?
What is 5G?
 
5G Americas_Network Slicing
5G Americas_Network Slicing5G Americas_Network Slicing
5G Americas_Network Slicing
 
5G technical_overview_training_sec_1
5G technical_overview_training_sec_15G technical_overview_training_sec_1
5G technical_overview_training_sec_1
 
Base Station Antenna needs for the 5G RAN
Base Station Antenna needs for the 5G RANBase Station Antenna needs for the 5G RAN
Base Station Antenna needs for the 5G RAN
 
Noma And Future
Noma  And FutureNoma  And Future
Noma And Future
 
Massive MIMO
Massive MIMOMassive MIMO
Massive MIMO
 
IT8602 Mobile Communication Question Bank
IT8602 Mobile Communication Question BankIT8602 Mobile Communication Question Bank
IT8602 Mobile Communication Question Bank
 

Similar to Fundamentals of 5G Network Slicing

Necos keynote UFRN Telecomday
Necos keynote UFRN TelecomdayNecos keynote UFRN Telecomday
Necos keynote UFRN Telecomday
Augusto Neto
 
CSIR 5G Research
CSIR 5G ResearchCSIR 5G Research
CSIR 5G Research
Sabelo Dlamini
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloud
Ericsson Latin America
 
Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?
idrajeev
 
5 g network-slicing-report
5 g network-slicing-report5 g network-slicing-report
5 g network-slicing-report
ermnas2482
 
The Network Modernization Imperative
The Network Modernization Imperative The Network Modernization Imperative
The Network Modernization Imperative
Community Manager
 
5G slicing and management tmf contribution
5G slicing and management   tmf contribution 5G slicing and management   tmf contribution
5G slicing and management tmf contribution
Saurabh Verma
 
5G Service Assurance and Orchestration
5G Service Assurance and Orchestration5G Service Assurance and Orchestration
5G Service Assurance and Orchestration
Marie-Paule Odini
 
Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gateways
Tal Lavian Ph.D.
 
Evolution of internet by Ali Kashif
Evolution of internet  by Ali KashifEvolution of internet  by Ali Kashif
Evolution of internet by Ali Kashif
Ali Kashif Bashir. Ph.D, MIEEE
 
NECOS - Concertation Meeting EUBrasilCloudFORUM
NECOS -  Concertation Meeting EUBrasilCloudFORUMNECOS -  Concertation Meeting EUBrasilCloudFORUM
NECOS - Concertation Meeting EUBrasilCloudFORUM
EUBrasilCloudFORUM .
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperMarc Curtis
 
bringing transparency on networks
bringing transparency on networksbringing transparency on networks
bringing transparency on networks
nerdic
 
5G Architecture Viewpoints H2020 5G PPP Infrastructure Association
5G Architecture Viewpoints H2020 5G PPP Infrastructure Association5G Architecture Viewpoints H2020 5G PPP Infrastructure Association
5G Architecture Viewpoints H2020 5G PPP Infrastructure Association
ITU
 
5 g core
5 g core5 g core
NECOS Industrial Workshop Technical highlights by Prof. Alex Galis (Universit...
NECOS Industrial Workshop Technical highlights by Prof. Alex Galis (Universit...NECOS Industrial Workshop Technical highlights by Prof. Alex Galis (Universit...
NECOS Industrial Workshop Technical highlights by Prof. Alex Galis (Universit...
Christian Esteve Rothenberg
 
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Alidu Abubakari
 
5G_NETWORK_SLICING.pptx
5G_NETWORK_SLICING.pptx5G_NETWORK_SLICING.pptx
5G_NETWORK_SLICING.pptx
RISAS4
 
Updates on NFV and SDN Activities from the Broadband Forum
Updates on NFV and SDN Activities from the Broadband ForumUpdates on NFV and SDN Activities from the Broadband Forum
Updates on NFV and SDN Activities from the Broadband Forum
Open Networking Summit
 

Similar to Fundamentals of 5G Network Slicing (20)

Necos keynote UFRN Telecomday
Necos keynote UFRN TelecomdayNecos keynote UFRN Telecomday
Necos keynote UFRN Telecomday
 
CSIR 5G Research
CSIR 5G ResearchCSIR 5G Research
CSIR 5G Research
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloud
 
Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?
 
5 g network-slicing-report
5 g network-slicing-report5 g network-slicing-report
5 g network-slicing-report
 
The Network Modernization Imperative
The Network Modernization Imperative The Network Modernization Imperative
The Network Modernization Imperative
 
5G slicing and management tmf contribution
5G slicing and management   tmf contribution 5G slicing and management   tmf contribution
5G slicing and management tmf contribution
 
5G Service Assurance and Orchestration
5G Service Assurance and Orchestration5G Service Assurance and Orchestration
5G Service Assurance and Orchestration
 
Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gateways
 
Evolution of internet by Ali Kashif
Evolution of internet  by Ali KashifEvolution of internet  by Ali Kashif
Evolution of internet by Ali Kashif
 
NECOS - Concertation Meeting EUBrasilCloudFORUM
NECOS -  Concertation Meeting EUBrasilCloudFORUMNECOS -  Concertation Meeting EUBrasilCloudFORUM
NECOS - Concertation Meeting EUBrasilCloudFORUM
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_Paper
 
bringing transparency on networks
bringing transparency on networksbringing transparency on networks
bringing transparency on networks
 
Virtuora Catalog_lowres
Virtuora Catalog_lowresVirtuora Catalog_lowres
Virtuora Catalog_lowres
 
5G Architecture Viewpoints H2020 5G PPP Infrastructure Association
5G Architecture Viewpoints H2020 5G PPP Infrastructure Association5G Architecture Viewpoints H2020 5G PPP Infrastructure Association
5G Architecture Viewpoints H2020 5G PPP Infrastructure Association
 
5 g core
5 g core5 g core
5 g core
 
NECOS Industrial Workshop Technical highlights by Prof. Alex Galis (Universit...
NECOS Industrial Workshop Technical highlights by Prof. Alex Galis (Universit...NECOS Industrial Workshop Technical highlights by Prof. Alex Galis (Universit...
NECOS Industrial Workshop Technical highlights by Prof. Alex Galis (Universit...
 
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
 
5G_NETWORK_SLICING.pptx
5G_NETWORK_SLICING.pptx5G_NETWORK_SLICING.pptx
5G_NETWORK_SLICING.pptx
 
Updates on NFV and SDN Activities from the Broadband Forum
Updates on NFV and SDN Activities from the Broadband ForumUpdates on NFV and SDN Activities from the Broadband Forum
Updates on NFV and SDN Activities from the Broadband Forum
 

More from Tonex

5G AI & Digital Twins Training Course
5G AI & Digital Twins Training Course5G AI & Digital Twins Training Course
5G AI & Digital Twins Training Course
Tonex
 
MBSE for Dod, Digital Engineering Training
MBSE for Dod, Digital Engineering TrainingMBSE for Dod, Digital Engineering Training
MBSE for Dod, Digital Engineering Training
Tonex
 
Engineering Project Management Training, Learn the PMI keys, Project manageme...
Engineering Project Management Training, Learn the PMI keys, Project manageme...Engineering Project Management Training, Learn the PMI keys, Project manageme...
Engineering Project Management Training, Learn the PMI keys, Project manageme...
Tonex
 
Revenue Assurance (RA), Telecom RA Training Course
Revenue Assurance (RA), Telecom RA Training CourseRevenue Assurance (RA), Telecom RA Training Course
Revenue Assurance (RA), Telecom RA Training Course
Tonex
 
5G Systems Engineering Training
5G Systems Engineering Training5G Systems Engineering Training
5G Systems Engineering Training
Tonex
 
Root Cause Analysis Training
Root Cause Analysis TrainingRoot Cause Analysis Training
Root Cause Analysis Training
Tonex
 
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, ToolsLearning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Tonex
 
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Tonex
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On Training
Tonex
 
Bluetooth Low Energy BLE, Hands-On Training
Bluetooth Low Energy BLE, Hands-On TrainingBluetooth Low Energy BLE, Hands-On Training
Bluetooth Low Energy BLE, Hands-On Training
Tonex
 
Learn how manufacturers use root cause analysis, rca training for manufacturers
Learn how manufacturers use root cause analysis, rca training for manufacturersLearn how manufacturers use root cause analysis, rca training for manufacturers
Learn how manufacturers use root cause analysis, rca training for manufacturers
Tonex
 
Spacecraft MBSE-SysML, Hands-On Training
Spacecraft MBSE-SysML, Hands-On TrainingSpacecraft MBSE-SysML, Hands-On Training
Spacecraft MBSE-SysML, Hands-On Training
Tonex
 
CBRS
CBRSCBRS
CBRS
Tonex
 
C Programming and Coding Standards, Learn C Programming
C Programming and Coding Standards, Learn C ProgrammingC Programming and Coding Standards, Learn C Programming
C Programming and Coding Standards, Learn C Programming
Tonex
 
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex
 
Cyber Security Certificate Training
Cyber Security Certificate TrainingCyber Security Certificate Training
Cyber Security Certificate Training
Tonex
 
Electronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation TrainingElectronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation Training
Tonex
 
Join Business Writing Skills Training and Write clear
Join Business Writing Skills Training and Write clearJoin Business Writing Skills Training and Write clear
Join Business Writing Skills Training and Write clear
Tonex
 
Conflict Management Training, Learn The Causes Of Conflict
Conflict Management Training, Learn The Causes Of ConflictConflict Management Training, Learn The Causes Of Conflict
Conflict Management Training, Learn The Causes Of Conflict
Tonex
 
Big Data for Project and Program Managers
Big Data for Project and Program ManagersBig Data for Project and Program Managers
Big Data for Project and Program Managers
Tonex
 

More from Tonex (20)

5G AI & Digital Twins Training Course
5G AI & Digital Twins Training Course5G AI & Digital Twins Training Course
5G AI & Digital Twins Training Course
 
MBSE for Dod, Digital Engineering Training
MBSE for Dod, Digital Engineering TrainingMBSE for Dod, Digital Engineering Training
MBSE for Dod, Digital Engineering Training
 
Engineering Project Management Training, Learn the PMI keys, Project manageme...
Engineering Project Management Training, Learn the PMI keys, Project manageme...Engineering Project Management Training, Learn the PMI keys, Project manageme...
Engineering Project Management Training, Learn the PMI keys, Project manageme...
 
Revenue Assurance (RA), Telecom RA Training Course
Revenue Assurance (RA), Telecom RA Training CourseRevenue Assurance (RA), Telecom RA Training Course
Revenue Assurance (RA), Telecom RA Training Course
 
5G Systems Engineering Training
5G Systems Engineering Training5G Systems Engineering Training
5G Systems Engineering Training
 
Root Cause Analysis Training
Root Cause Analysis TrainingRoot Cause Analysis Training
Root Cause Analysis Training
 
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, ToolsLearning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
 
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On Training
 
Bluetooth Low Energy BLE, Hands-On Training
Bluetooth Low Energy BLE, Hands-On TrainingBluetooth Low Energy BLE, Hands-On Training
Bluetooth Low Energy BLE, Hands-On Training
 
Learn how manufacturers use root cause analysis, rca training for manufacturers
Learn how manufacturers use root cause analysis, rca training for manufacturersLearn how manufacturers use root cause analysis, rca training for manufacturers
Learn how manufacturers use root cause analysis, rca training for manufacturers
 
Spacecraft MBSE-SysML, Hands-On Training
Spacecraft MBSE-SysML, Hands-On TrainingSpacecraft MBSE-SysML, Hands-On Training
Spacecraft MBSE-SysML, Hands-On Training
 
CBRS
CBRSCBRS
CBRS
 
C Programming and Coding Standards, Learn C Programming
C Programming and Coding Standards, Learn C ProgrammingC Programming and Coding Standards, Learn C Programming
C Programming and Coding Standards, Learn C Programming
 
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
 
Cyber Security Certificate Training
Cyber Security Certificate TrainingCyber Security Certificate Training
Cyber Security Certificate Training
 
Electronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation TrainingElectronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation Training
 
Join Business Writing Skills Training and Write clear
Join Business Writing Skills Training and Write clearJoin Business Writing Skills Training and Write clear
Join Business Writing Skills Training and Write clear
 
Conflict Management Training, Learn The Causes Of Conflict
Conflict Management Training, Learn The Causes Of ConflictConflict Management Training, Learn The Causes Of Conflict
Conflict Management Training, Learn The Causes Of Conflict
 
Big Data for Project and Program Managers
Big Data for Project and Program ManagersBig Data for Project and Program Managers
Big Data for Project and Program Managers
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Fundamentals of 5G Network Slicing

  • 1.
  • 2. Network slicing is a method of creating multiple unique logical and virtual networks on a common multi-domain infrastructure. A different approach to view is that network slicing overlays multiple virtual networks on a shared network. Each part of the network can have its own logical topology, security rules and performance characteristics-within the limits imposed by the basic physical network.
  • 3. Different slices are often dedicated to different purposes, like ensuring a selected application or service gets priority access to capacity and delivery or isolating traffic for specific users or device classes. Slicing networks enables the network operator to maximise the utilization of network resources and repair flexibility.
  • 4. Network slicing is a key function of 5G. 5G network slicing is a virtual network architecture that belongs to the same family as Software-defined Networking (SDN) and Network Function Virtualization (NFV).
  • 5. One of the foremost innovative aspects of the 5G architecture is its reliance on 5G network slicing, which can let operators provide portions of their networks for specific customer uses cases — whether that use case is that the smart home, the web of Things (IoT) factory, the connected car or the smart energy grid.
  • 6. The benefits of network slicing are: • It can help network operators reduce expenditure (OPEX) and capital expenditure (CAPEX). • It greatly improves the operational efficiency and time to market for delivering 5G network services. • A single network can be used to provide various services according to user needs and various use cases. • Network operators can allocate the proper amount of required resources as per network slice. • It overcomes all the shortcomings of the most popular QoS solution "DiffServ".
  • 7. Traditionally, private networks have been deployed to meet specific use cases. This is expensive, and there is usually little flexibility to adapt to new services and use cases. Everything about 5G is changing, because 5G aims to support billions of connected devices, many diverse use cases, new performance levels, and multiple new vertical industries through a common network.
  • 8. Using an equivalent physical network for multiple purposes results in higher resource utilization, economies of scale and scope, shorter time to plug and provides clear synergies and increased value and benefit to society. Further, because the available base of users, devices and applications is larger and uses an equivalent physical network, the edge for innovation is lowered and can allow targeting of specific needs or demands.
  • 9. Fundamentals of 5G Network Slicing Training by Tonex Fundamentals of 5G Network Slicing Training focuses on key principles, architecture and implementation of 5G network slicing. Participants discover the way to effectively use network slicing across 5G core, RAN and transport networks. you'll also find out how network slicing is one among key components that provide 5G operation.
  • 10. Through the use of 5G, SDN and NFV technologies, we can gain support knowledge of network slicing and logical virtual network slicing suitable for 5G to support diversified services such as mobile broadband, large-scale Internet of Things and ultra-reliable low-latency services.
  • 11. Audience: • Software Engineers • Network Design Engineers • Managers • Product management, marketing, planning, operations and employees with little or no experience in 5G or network slicing. • People who have 5G network experience but have never received any formal training on network slicing.
  • 12. Learning Objectives: • How to implement network slicing in 5G networks • How to lay the foundation for 5G network slicing monetization • How to plan and design the lifecycle management of network slicing • How to implement network slicing and be able to support various services with specific performance or control requirements on a common network platform
  • 13. Learning Objectives: • Summary of 5G use cases and applications • 5G network overview • How to implement operational KPIs on slice/service instantiation, termination, activation, deactivation, usage events, dynamic resource consumption based on slice/service/network functions, and performance and analysis events based on the set of network slice performance indicators
  • 14. Course Agenda: Overview of 5G Networks • 5G operational use cases • NSA and SA architecture • Overview of 5G network transformation • Software defined infrastructure (SDI) • Network functions virtualization (NFV) • Software-defined networking (SDN) • Network slicing and 3GPP Activities • Services related to slicing • Overview of a network slice
  • 15. Course Agenda: Overview of 5G Networks • Network slicing in 5G networks • The 5G network slicing opportunity • The use cases identified for 5G and network slicing • Network slicing use cases requirements • Extreme (or enhanced) Mobile Broadband (eMBB) • Massive Machine-Type Communications (mMTC) • Ultra-reliable Low-Latency Communications (urLLC)
  • 16. Course Agenda: Digital Transformation and Network Slicing • Technical deep dive on slicing • Network slicing architecture • Network slicing challenges • IoT impact • Network slicing in 5G networks • RAN, core, and transport network • Network slicing operational scenarios
  • 17. Course Agenda: Network Slicing Deployment • Managing public 5G network slices • Network slice management • Network slice life cycle management • Configuration management • Performance management • Security management
  • 18. Learn More: Fundamentals of 5G Network Slicing Training https://www.tonex.com/training-courses/ fundamentals-of-5g-network-slicing/