- 3GPP is working on new standards for managing 5G networks and network slicing, including a new service-oriented management architecture. This will allow operators to configure and manage mobile networks to support different types of services.
- Network slicing is a key 5G feature that will allow vertical industries to utilize 5G networks and services. 3GPP is addressing the management aspects of network slicing.
- The new management architecture introduces functions like the Communication Service Management Function and Network Slice Management Function to provide an appropriate level of abstraction for automation in 5G network management.
Evaluation of 5G Data Duplication for URLLC - Nomor Reseach GmbHEiko Seidel
As you might know Data Duplication can be used in combination of Carrier Aggregation or Dual Connectivity to increase reliability for services such as URLLC. Enclosed a paper of my colleague Dr. Volker Pauli with 5G system/protocol level simulation results for different scenarios for a CU/DU split architecture. Packet loss rates of 10-5 are feasible for URLLC within restricted service areas.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Multi-layer heterogeneous network layout including small cell base stations are considered to be the key to further enhancements of the spectral efficiency achieved in mobile communication networks. It has been recognized that inter-cell interference has become the limiting factor when trying to achieve not only high average user satisfaction, but a high degree of satisfaction for as many users as possible. Therefore, inter-cell interference coordination (ICIC) lies in the focus of researchers defining next generation mobile communication standards, such as LTE-A.
Building upon [1], this paper provides an overview over the background calling for ICIC in heterogeneous LTE-A networks. It outlines techniques standardized in Rel. 10 of LTE-A, discusses them showing their benefits and limitations by means of system-level simulations and motivates the importance of self optimizing network (SON) procedures for ICIC in LTE-A.
PERFORMANCE COMPARISON DCM VERSUS QPSK FOR HIGH DATA RATES IN THE MBOFDM UWB ...csandit
This paper presents the advantage of using a new modulation scheme called dual carrier Modulation (DCM) compared to classical Quadrature Phase Shift Keying (QPSK) modulation.
This comparison is done at data transmission broadband in Multiband OFDM system (MBOFDM) based on Ultra Wide Band UWB. Simulation results show that the use of the modulation DCM for high data rates is more efficient compared with QPSK.
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Eiko Seidel
Initial deployments of LTE networks are based on so-called homogeneous networks consisting of base stations providing basic coverage, called macro base stations. The concept of heterogeneous networks has recently attracted considerable attention to optimize performance particularly for unequal user or traffic distribution. Here, the layer of planned high-power macro eNBs is overlaid with layers of lower-power pico or femto eNBs that are deployed in a less well planed or even entirely uncoordinated manner. Such deployments can achieve significantly improved overall capacity and cell-edge performance and are often seen as the second phase in LTE network deployment.
This paper discusses the concept of heterogeneous networks as compared to homogeneous networks. It demonstrates the need for inter-cell interference coordination (ICIC) and outlines some ICIC methods that are feasible with release 8 /9 of the LTE standard. System-level simulation results illustrate the benefits of the various features discussed in the following.
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...IDES Editor
Clustering is an important research area for
mobile ad hoc networks (MANETs) as it increases the
capacity of network, reduces the routing overhead and
makes the network more scalable in the presence of both
high mobility and a large number of mobile nodes. In
clustering the clusterhead manage and store recent routing
information. However the frequent change of clusterhead
leads to loss of routing information stored, changes the route
between two nodes, affects the performance of the routing
protocol and makes the cluster structure unstable.
Communication overhead in terms of exchanging messages
is needed to elect a new clusterhead. The goal then would be
to keep the clusterhead change as least as possible to make
cluster structure more stable, to prevent loss of routing
information which in turn improve the performance of
routing protocol based on clustering. This can be achieved
by an efficient cluster maintenance scheme. In this work, a
novel clustering algorithm, namely Incremental
Maintenance Clustering Scheme (IMS) is proposed for
Mobile Ad Hoc Networks. The goals are yielding low
number of clusterhead and clustermember changes,
maintaining stable clusters, minimizing the number of
clustering overhead. Through simulations the performance
of IMS is compared with that of least cluster change (LCC)
and maintenance scheme of Cluster Based Routing Protocol
(CBRP) in terms of the number of clusterhead changes,
number of cluster-member changes and clustering overhead
by varying mobility and speed. The simulation results
demonstrate the superiority of IMS over LCC and
maintenance scheme of CBRP.
In Wireless Sensor Network (WSN), QoS (Quality of Service) in sensor application plays a very important
role. QoS based routing is required to ensure the best use of nodes in WSN. In this paper, a comparative
study of QoS based routing in Media Access Control (MAC) protocols are presented based on the traits to
solve problems like prioritization, timeliness, reliability etc. The study mainly focuses on some priority
based QoS protocols used in WSN and a comparison among them. The study reveals that among the five
mentioned protocols; QMAC, PRIMA, DB-MAC, RAP, GTS; PRIMA shows the best performance in the
category of Packet Prioritization, Scheduling Scheme, Queue Type, Energy Awareness and QoS.
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...cseij
For learning problem of Radial Basis Function Process Neural Network (RBF-PNN), an optimization
training method based on GA combined with SA is proposed in this paper. Through building generalized
Fréchet distance to measure similarity between time-varying function samples, the learning problem of
radial basis centre functions and connection weights is converted into the training on corresponding
discrete sequence coefficients. Network training objective function is constructed according to the least
square error criterion, and global optimization solving of network parameters is implemented in feasible
solution space by use of global optimization feature of GA and probabilistic jumping property of SA . The
experiment results illustrate that the training algorithm improves the network training efficiency and
stability.
Evaluation of 5G Data Duplication for URLLC - Nomor Reseach GmbHEiko Seidel
As you might know Data Duplication can be used in combination of Carrier Aggregation or Dual Connectivity to increase reliability for services such as URLLC. Enclosed a paper of my colleague Dr. Volker Pauli with 5G system/protocol level simulation results for different scenarios for a CU/DU split architecture. Packet loss rates of 10-5 are feasible for URLLC within restricted service areas.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Multi-layer heterogeneous network layout including small cell base stations are considered to be the key to further enhancements of the spectral efficiency achieved in mobile communication networks. It has been recognized that inter-cell interference has become the limiting factor when trying to achieve not only high average user satisfaction, but a high degree of satisfaction for as many users as possible. Therefore, inter-cell interference coordination (ICIC) lies in the focus of researchers defining next generation mobile communication standards, such as LTE-A.
Building upon [1], this paper provides an overview over the background calling for ICIC in heterogeneous LTE-A networks. It outlines techniques standardized in Rel. 10 of LTE-A, discusses them showing their benefits and limitations by means of system-level simulations and motivates the importance of self optimizing network (SON) procedures for ICIC in LTE-A.
PERFORMANCE COMPARISON DCM VERSUS QPSK FOR HIGH DATA RATES IN THE MBOFDM UWB ...csandit
This paper presents the advantage of using a new modulation scheme called dual carrier Modulation (DCM) compared to classical Quadrature Phase Shift Keying (QPSK) modulation.
This comparison is done at data transmission broadband in Multiband OFDM system (MBOFDM) based on Ultra Wide Band UWB. Simulation results show that the use of the modulation DCM for high data rates is more efficient compared with QPSK.
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Eiko Seidel
Initial deployments of LTE networks are based on so-called homogeneous networks consisting of base stations providing basic coverage, called macro base stations. The concept of heterogeneous networks has recently attracted considerable attention to optimize performance particularly for unequal user or traffic distribution. Here, the layer of planned high-power macro eNBs is overlaid with layers of lower-power pico or femto eNBs that are deployed in a less well planed or even entirely uncoordinated manner. Such deployments can achieve significantly improved overall capacity and cell-edge performance and are often seen as the second phase in LTE network deployment.
This paper discusses the concept of heterogeneous networks as compared to homogeneous networks. It demonstrates the need for inter-cell interference coordination (ICIC) and outlines some ICIC methods that are feasible with release 8 /9 of the LTE standard. System-level simulation results illustrate the benefits of the various features discussed in the following.
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...IDES Editor
Clustering is an important research area for
mobile ad hoc networks (MANETs) as it increases the
capacity of network, reduces the routing overhead and
makes the network more scalable in the presence of both
high mobility and a large number of mobile nodes. In
clustering the clusterhead manage and store recent routing
information. However the frequent change of clusterhead
leads to loss of routing information stored, changes the route
between two nodes, affects the performance of the routing
protocol and makes the cluster structure unstable.
Communication overhead in terms of exchanging messages
is needed to elect a new clusterhead. The goal then would be
to keep the clusterhead change as least as possible to make
cluster structure more stable, to prevent loss of routing
information which in turn improve the performance of
routing protocol based on clustering. This can be achieved
by an efficient cluster maintenance scheme. In this work, a
novel clustering algorithm, namely Incremental
Maintenance Clustering Scheme (IMS) is proposed for
Mobile Ad Hoc Networks. The goals are yielding low
number of clusterhead and clustermember changes,
maintaining stable clusters, minimizing the number of
clustering overhead. Through simulations the performance
of IMS is compared with that of least cluster change (LCC)
and maintenance scheme of Cluster Based Routing Protocol
(CBRP) in terms of the number of clusterhead changes,
number of cluster-member changes and clustering overhead
by varying mobility and speed. The simulation results
demonstrate the superiority of IMS over LCC and
maintenance scheme of CBRP.
In Wireless Sensor Network (WSN), QoS (Quality of Service) in sensor application plays a very important
role. QoS based routing is required to ensure the best use of nodes in WSN. In this paper, a comparative
study of QoS based routing in Media Access Control (MAC) protocols are presented based on the traits to
solve problems like prioritization, timeliness, reliability etc. The study mainly focuses on some priority
based QoS protocols used in WSN and a comparison among them. The study reveals that among the five
mentioned protocols; QMAC, PRIMA, DB-MAC, RAP, GTS; PRIMA shows the best performance in the
category of Packet Prioritization, Scheduling Scheme, Queue Type, Energy Awareness and QoS.
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...cseij
For learning problem of Radial Basis Function Process Neural Network (RBF-PNN), an optimization
training method based on GA combined with SA is proposed in this paper. Through building generalized
Fréchet distance to measure similarity between time-varying function samples, the learning problem of
radial basis centre functions and connection weights is converted into the training on corresponding
discrete sequence coefficients. Network training objective function is constructed according to the least
square error criterion, and global optimization solving of network parameters is implemented in feasible
solution space by use of global optimization feature of GA and probabilistic jumping property of SA . The
experiment results illustrate that the training algorithm improves the network training efficiency and
stability.
Dynamic fragmentation using path exchange scheme in EONmanishajagtap1
In EON(elastic optical system), fragmentation of lightpath is one primary concern. A few methodologies have been introduced. The paths (i.e. Backup and Primary) available for EON. This liberates the lightpaths to be partitioned into parts are induced by primary lightpaths, which are not to be disturbed to accomplish hitless defragmentation. We trade path function work by flipping the ways. This permits lightpaths to be reallocated amid the defragmentation procedure while they function as backup. For changing path function, we show static spectrum reallocation optimization that overcomes spectrum fragmentation.
TriBA(Triplet Based Architecture) is a Network on Chip processor(NoC) architecture which merges the
core philosophy of Object Oriented Design with the hardware design of multicore processors[1].We
present TriBASim in this paper, a NoC simulator specifically designed for TriBA.In TriBA ,nodes are
connected in recursive triplets .TriBA network topology performance analysis have been carried out from
different perspectives [2] and routing algorithms have been developed [3][4] but the architecture still lacks
a simulator that the researcher can use to run simple and fast behavioural analysis on the architecture
based on common parameters in the Network On Chip arena. TriBASim is introduced in this paper ,a
simulator for TriBA ,based on systemc[6] .TriBASim will lessen the burden on researchers on TriBA ,by
giving them something to just plug in desired parameters and have nodes and topology set up ready for
analysis.
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...ijmnct
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful
interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios.
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...ijmnct
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios.
Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...IDES Editor
Hierarchical Mobile IPv6 (HMIPv6) was designed to
support IP micro-mobility management in the next generation
Internet Protocol (IPv6) and the Next Generation Networks
(NGN) framework. The general idea behind this protocol is
the usage of Mobility Anchor Point (MAP) located at any level
router of network to support hierarchical mobility
management and seamless handover. Further, the distance
MAP selection in HMIPv6 causes MAP overloaded and increase
frequent binding update as the network grows. Therefore, to
address the issue in designing MAP selection scheme, we
propose an enhance distance scheme with a dynamic load
control mechanism (DMS-DLC). From the experimental
results we obtain that the proposed scheme gives better
distribution in MAP load and increase handover speed. In
addition a new proposed research framework was established
that uses the four stages model
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...IOSR Journals
Abstract: In this work, we exploit the SVD assisted multiuser transmitter (MUT) and multiuser detector (MUD) technique, using downlink (DL) preprocessing transmitter and DL postprocessing receiver matrice .In combination with space frequency block coding (SFBC). And also propose the precoded DL transmission scheme, were the both proposed schemes take advantage of the channel state information (CSI) of all users at the base station (BS), but only of the mobile station (MS)’s own CSI, to decompose the MU MIMO channels into parallel single input single output (SISO), these two proposed schemes are compared to the vertical layered space time (V_BLAST) combined with SFBC (SFBC_VBLAST). Our Simulation results show that the performance of the proposed scheme with DL Zero Forcing (ZF) transmitter for interference canceller outperforms the SFBC_VBLAST and the precoded DL schemes with ZF receiver in frequency selective fading channels. Keywords – Post processing, Preprocessing,, SFBC, SVD, ZF.
A Flexible Network Architecture for 5G SystemsEiko Seidel
In this paper, we define a flexible, adaptable, and programmable architecture for 5Gmobile networks, taking into consideration the requirements, KPIs, and the current gaps in the literature, based on three design fundamentals: (i) split of user and control plane, (ii) service-based architecturewithin the core network (in line with recent industry and standard consensus), and (iii) fully flexible support of E2E slicing via per-domain and cross-domain optimisation, devising inter-slice control and management functions, and refining the behavioural models via experiment-driven optimisation.The proposed architecture model further facilitates the
realisation of slices providing specific functionality, such as network resilience, security functions, and network elasticity. The proposed architecture consists of four different layers identified as network layer, controller layer, management and orchestration layer, and service layer. A key contribution of this paper is the definition of the role of each layer, the relationship between layers, and the identification of the required internal modules within each of the layers. In particular, the proposed architecture extends the reference architectures proposed in the Standards Developing Organisations like 3GPP and ETSI, by building on these while addressing several gaps identified within the corresponding baseline models. We additionally present findings, the design guidelines, and evaluation studies on a selected set of key concepts identified to enable flexible cloudification of the protocol stack, adaptive network slicing, and inter-slice control and management.
Dynamic fragmentation using path exchange scheme in EONmanishajagtap1
In EON(elastic optical system), fragmentation of lightpath is one primary concern. A few methodologies have been introduced. The paths (i.e. Backup and Primary) available for EON. This liberates the lightpaths to be partitioned into parts are induced by primary lightpaths, which are not to be disturbed to accomplish hitless defragmentation. We trade path function work by flipping the ways. This permits lightpaths to be reallocated amid the defragmentation procedure while they function as backup. For changing path function, we show static spectrum reallocation optimization that overcomes spectrum fragmentation.
TriBA(Triplet Based Architecture) is a Network on Chip processor(NoC) architecture which merges the
core philosophy of Object Oriented Design with the hardware design of multicore processors[1].We
present TriBASim in this paper, a NoC simulator specifically designed for TriBA.In TriBA ,nodes are
connected in recursive triplets .TriBA network topology performance analysis have been carried out from
different perspectives [2] and routing algorithms have been developed [3][4] but the architecture still lacks
a simulator that the researcher can use to run simple and fast behavioural analysis on the architecture
based on common parameters in the Network On Chip arena. TriBASim is introduced in this paper ,a
simulator for TriBA ,based on systemc[6] .TriBASim will lessen the burden on researchers on TriBA ,by
giving them something to just plug in desired parameters and have nodes and topology set up ready for
analysis.
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...ijmnct
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful
interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios.
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...ijmnct
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios.
Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...IDES Editor
Hierarchical Mobile IPv6 (HMIPv6) was designed to
support IP micro-mobility management in the next generation
Internet Protocol (IPv6) and the Next Generation Networks
(NGN) framework. The general idea behind this protocol is
the usage of Mobility Anchor Point (MAP) located at any level
router of network to support hierarchical mobility
management and seamless handover. Further, the distance
MAP selection in HMIPv6 causes MAP overloaded and increase
frequent binding update as the network grows. Therefore, to
address the issue in designing MAP selection scheme, we
propose an enhance distance scheme with a dynamic load
control mechanism (DMS-DLC). From the experimental
results we obtain that the proposed scheme gives better
distribution in MAP load and increase handover speed. In
addition a new proposed research framework was established
that uses the four stages model
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...IOSR Journals
Abstract: In this work, we exploit the SVD assisted multiuser transmitter (MUT) and multiuser detector (MUD) technique, using downlink (DL) preprocessing transmitter and DL postprocessing receiver matrice .In combination with space frequency block coding (SFBC). And also propose the precoded DL transmission scheme, were the both proposed schemes take advantage of the channel state information (CSI) of all users at the base station (BS), but only of the mobile station (MS)’s own CSI, to decompose the MU MIMO channels into parallel single input single output (SISO), these two proposed schemes are compared to the vertical layered space time (V_BLAST) combined with SFBC (SFBC_VBLAST). Our Simulation results show that the performance of the proposed scheme with DL Zero Forcing (ZF) transmitter for interference canceller outperforms the SFBC_VBLAST and the precoded DL schemes with ZF receiver in frequency selective fading channels. Keywords – Post processing, Preprocessing,, SFBC, SVD, ZF.
A Flexible Network Architecture for 5G SystemsEiko Seidel
In this paper, we define a flexible, adaptable, and programmable architecture for 5Gmobile networks, taking into consideration the requirements, KPIs, and the current gaps in the literature, based on three design fundamentals: (i) split of user and control plane, (ii) service-based architecturewithin the core network (in line with recent industry and standard consensus), and (iii) fully flexible support of E2E slicing via per-domain and cross-domain optimisation, devising inter-slice control and management functions, and refining the behavioural models via experiment-driven optimisation.The proposed architecture model further facilitates the
realisation of slices providing specific functionality, such as network resilience, security functions, and network elasticity. The proposed architecture consists of four different layers identified as network layer, controller layer, management and orchestration layer, and service layer. A key contribution of this paper is the definition of the role of each layer, the relationship between layers, and the identification of the required internal modules within each of the layers. In particular, the proposed architecture extends the reference architectures proposed in the Standards Developing Organisations like 3GPP and ETSI, by building on these while addressing several gaps identified within the corresponding baseline models. We additionally present findings, the design guidelines, and evaluation studies on a selected set of key concepts identified to enable flexible cloudification of the protocol stack, adaptive network slicing, and inter-slice control and management.
Interworking qos management subsystem into ims based architecture multi provi...IJCNCJournal
The third-generation partnership project 3GPP and 3GPP2 have standardized the IP multimedia subsystem
(IMS) to provide ubiquitous and access network-independent IP-based services for next-generation
networks via merging cellular networks and the Internet. The IP Multimedia Subsystem (IMS) seems to be
the technology that will prevail in Next Generation Networks (NGNs). The users wish to communicate
through collections of networks using different protocols; rendering service mapping from one network to
another with the similar QoS is a complex issue thereby. The heterogeneous networks are collections of
communication platforms using different protocols. This heterogeneity implies the need to offer many
different services on the market within short time. In this paper we propose a heterogeneous network model
based on the IMS that provides guaranteed QoS. Our method presents, in the first, an informational
solution. Decisional information is added to the HSS basis to enrich the knowledge base, which is
expressed under the form of "profile of QoSR", where the new information informs directly the decisions to
be taken according to the user’s profile (preferences QoS and pricing, bandwidth, location ...). In the
second, a solution for multi provider’s context which can allow a subscriber to register with one or more
operator(s) according to QoS offered. Thirdly, a mechanism which can be deployed in heterogeneous
networks to preserve the original QoS values of the user session and thus eliminate the cumulative effect of
QoS rounding across the entire communication path. And it is feasible via the “Interworking QoS
Management Sub-network” while adding the new interworking management components, namely: SICs,
DIC, QPA AS and HSS-PQoSR.
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
The quality of service is a need in recent computer network developments. The present paper evaluates some characteristics in a proposed network topology such as dropped packets and bandwidth use, using two traffic sources, firstly a VoIP source over an UDP agent, then a CBR traffic source over an UDP agent as well as the previous one. Two possible configurations are proposed, implementing both of them in the Network Simulator, and implementing in one of them differentiated services to compare the results. Statistics results are shown, in both cases showing the accumulative dropped packet number and the throughput in the link, obtaining a reducer number of dropped packets in the stage with differentiated services, and an improvement in the bandwidth use.
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionEiko Seidel
White Paper Intel SK Telekom
This paper presents the architecture for a user plane function (UPF) in the mobile packet core (MPC) targeting 5G deployments.
Network slicing is a method of creating multiple unique logical and virtual networks on a common multi-domain infrastructure.
A different approach to view is that network slicing overlays multiple virtual networks on a shared network. Each part of the network can have its own logical topology, security rules and performance characteristics-within the limits imposed by the basic physical network.
Network slicing is a key function of 5G.
5G network slicing is a virtual network architecture that belongs to the same family as Software-defined Networking (SDN) and Network Function Virtualization (NFV).
The benefits of network slicing are:
It can help network operators reduce expenditure (OPEX) and capital expenditure (CAPEX).
It greatly improves the operational efficiency and time to market for delivering 5G network services.
A single network can be used to provide various services according to user needs and various use cases.
Network operators can allocate the proper amount of required resources as per network slice.
It overcomes all the shortcomings of the most popular QoS solution "DiffServ".
Fundamentals of 5G Network Slicing Training by Tonex
Fundamentals of 5G Network Slicing Training focuses on key principles, architecture and implementation of 5G network slicing.
Participants discover the way to effectively use network slicing across 5G core, RAN and transport networks. you'll also find out how network slicing is one among key components that provide 5G operation.
Audience:
Software Engineers
Network Design Engineers
Managers
Product management, marketing, planning, operations and employees with little or no experience in 5G or network slicing.
People who have 5G network experience but have never received any formal training on network slicing.
Learning Objectives:
How to implement network slicing in 5G networks
How to lay the foundation for 5G network slicing monetization
How to plan and design the lifecycle management of network slicing
How to implement network slicing and be able to support various services with specific performance or control requirements on a common network platform
Summary of 5G use cases and applications
5G network overview
How to implement operational KPIs on slice/service instantiation, termination, activation, deactivation, usage events, dynamic resource consumption based on slice/service/network functions, and performance and analysis events based on the set of network slice performance indicators
Course Agenda:
Overview of 5G Networks
Digital Transformation and Network Slicing
Network Slicing Deployment
Learn More;
https://www.tonex.com/training-courses/fundamentals-of-5g-network-slicing/
A bandwidth allocation model provisioning framework with autonomic characteri...IJCNCJournal
The Bandwidth Allocation Models (MAM, RDM, G-RDM and AllocTC-Sharing) are management
alternatives currently available which propose different resource (bandwidth) allocation strategies in
multiservice networks. The BAM adoption by a network is typically a management choice and
configuration task executed by the network operations and management system setup in a static or nearly
static way. This paper proposes and explores the alternative of allowing BAM definition and configuration
on a more dynamic way. In effect, one of the basic motivations towards BAM dynamic allocation is the fact
that multiservice networks characteristics (traffic load) may change considerably in daily network
operation and, as such, some dynamics in BAM allocation should be introduced in order to improve
performance. A framework is presented supporting BAM dynamic allocation. The framework adopts an
OpenFlow-based software-defined networking (SDN) implementation approach in order to support
scalability issues with a centralized controller and management network view. The framework architecture
also supports the implementation of some autonomic characteristics which, in brief, look for improving and
facilitating the decision-making process involved with BAM provisioning in a multiservice network. A
proof of concept is presented evaluating different BAM performance under different traffic loads in order to
demonstrate the framework strategy adopted.
Time is everywhere but it's implementation in #5G is not easy. Unlike #4G, #TDD is more common in 5G especially in mid-bands [ #3.5Ghz (CBRS) and #Sub6Ghz ] to higher bands (as in mmWave) spectrums and also in spectrum overlays. TDD provides #spectrum efficiency but requires precision time synchronization.
Read this article to learn more about 5G synchronization challenges and how to address it.
Ns 2 based simulation environment for performance evaluation of umts architec...Makhdoom Waseem Hashmi
Ns 2 based simulation environment for performance evaluation of umts architecture.
NS2, UMTS, 3G, EURANE, scheduling, architecture and umts simultation and NS2 simulation and EURANE SIMULATION
GPRS KPIs based on network performance Mehmet Beyaz
Today, many wireless operators are focused on providing mobile internet access. A large variety of technologies has contributed to the operators’ vision of true mobility and seamless roaming. The currently prevailing technology providing true mobile Internet access on a European scale is general packet radio service (GPRS).
We are living in a world, where a vast amount of digital data which is called big data. Plus as the world becomes more and more connected via the Internet of Things (IoT). The IoT has been a major influence on the Big Data landscape. The analysis of such big data brings ahead business competition to the next level of innovation and productivity.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
Management 5 g
1. Management, Orchestration and Charging for 5G
networks
(Network Slicing onthe way)
March 22, 2018
By Thomas Tovinger, 3GPP SA5 Chairman
In December 2017,3GPP passed two major milestones for 5Gby approving the first set of 5G NR specs and by putting
in place the 5G Phase 1 System Architecture. These achievements have brought about the need for newmanagement
standards,as 5Gadds to the ever-growing size and complexity of telecom systems.
3GPP management standards from working group SA5 are approaching another major milestone for 5G. With our
studies on the 5G management architecture,network slicing and charging completed last year, we are now well under
way with the normative work for the first phase in 3GPP Release 15,which includes building up a new service-
oriented management architecture and all the necessary functionalities for management and charging for 5G
networks.
SA5’s current work also includes several other work/study items such as management of QoE measurement collection
and newtechnologies for RESTful management protocols. However, this article will focus on the new 5G Rel-15
architecture and the main functionalities, including charging.
5G networks and network slicing
Management and orchestration of 5G networks and network slicing is a feature that includes the following work
items: management concept and architecture,provisioning, network resource model, fault supervision, assurance and
performance management,trace management and virtualization management aspects.With the output of these work
items, SA5 provides specified management interfaces in support of 5Gnetworks and network slicing. An operator can
configure and manage the mobile network to support various types of services enabled by 5G, for example eMBB
(enhanced Mobile Broadband) and URLLC (Ultra-Reliable and Low Latency Communications), depending on the
different customers’ needs.The management concept, architecture and provisioning are being defined in
TS 28.530,28.531,28.532 and 28.533.
Network slicing is seen as one of the key features for 5G, allowing vertical industries to take advantage of 5G networks
and services. 3GPP SA5 adopts the network slice concept as defined in SA2 and addresses the management aspects.
Network slicing is about transforming a PLMN from a single network to a network where logical partitions are
created, with appropriate network isolation, resources, optimized topology and specific configuration to serve various
service requirements.
As an example, a variety of communication service instances provided by multiple Network Slice Instances (NSIs) are
illustrated in the figure below. The different parts of an NSI are grouped as Network Slice Subnets (e.g. RAN, 5GC and
Transport) allowing the lifecycle of a Network Slice Subnet Instance (NSSI) tobe managed independently from the
lifecycle of an NSI.
2. Provisioning of network slice instances
The management aspects of a network slice instance can be described by the four phases:
1) Preparation: in the preparation phase the network slice instance does not exist. The preparation phase includes
network slice template design, network slice capacity planning,on-boarding and evaluation of the network slice
requirements,preparing the network environment and other necessary preparations required to be done before the
creation of a network slice instance.
2) Commissioning: provisioning in the commissioning phase includes creation of the network slice instance. During
network slice instance creation all needed resources are allocated and configured to satisfy the network slice
requirements.The creation of a network slice instance can include creation and/or modification of the network slice
instance constituents.
3) Operation: includes the activation, supervision, performance reporting (e.g. for KPI monitoring), resource capacity
planning,modification, and de-activation of a network slice instance. Provisioning in the operation phase involves
activation, modification and de-activation of a network slice instance.
4) Decommissioning: network slice instance provisioning in the decommissioning phase includes decommissioning of
non-shared constituents if required and removing the network slice instance specific configuration from the shared
constituents. After the decommissioning phase,the network slice instance is terminated and does not exist anymore.
Similarly, provisioning for a network slice subnet instance (NSSI) includes the following operations:
3. Create an NSSI;
Activate an NSSI;
De-active an NSSI;
Modify an NSSI;
Terminate an NSSI.
Roles related to 5G networks and network slicing
The roles related to 5Gnetworks and network slicing management include: Communication Service Customer,
Communication Service Provider (CSP),Network Operator (NOP),Network Equipment Provider (NEP),Virtualization
Infrastructure Service Provider (VISP),Data Centre Service Provider (DCSP),NFVI (Network Functions Virtualization
Infrastructure) Supplier and Hardware Supplier.
Depending on actual scenarios:
Each role can be played by one or more organizations simultaneously;
An organization can play one or several roles simultaneously (for example, a company can play CSP and NOP roles
simultaneously).
Management models for network slicing
Different management models can be used in the context of network slicing.
1) Network Slice as a Service (NSaaS): NSaaS can be offered by a CSP to its CSC in the form of a communication service.
This service allows CSC to use and optionally manage the network slice instance. In turn,this CSC can play the role of
CSP and offer their own services (e.g. communication services) on top of the network slice instance. The MNSI
(Managed Network Slice Instance) in the figure represents a network slice instance and CS represents a
communication service.
2) Network Slices as NOP internals: network slices are not part of the CSP service offering and hence are not visible to
CSCs. However, the NOP, to provide support to communication services, may decide to deploy network slices, e.g. for
internalnetwork optimization purposes.
4. Management architecture
SA5 recognizes the need for automation of management by introducing newmanagement functions such as a
communication service management function (CSMF),network slice management function (NSMF) and a network
slice subnet management function (NSSMF) toprovide an appropriate abstraction level for automation.
The 3GPP SA5 management architecture will adopt a service-oriented management architecture which is described as
interaction between management service consumer and management service provider. For example, a management
service consumer can request operations from management service providers on fault supervision service,
performance management service, provisioning service and notification service, etc.
Network Resource Model (NRM) for 5G networks and network slicing
To support management and orchestration of 5Gnetworks, the Network Resource Model (NRM) representing the
manageable aspects of 5Gnetworks needs to be defined,according to 5Gnetwork specifications from other 3GPP
working groups as well as considering requirements from 5Gmanagement architecture and operations.
The 5G NRM specifications family includes 4 specifications: TS 28.540 and TS 28.541 for NRM of NR and NG-RAN,
TS 28.542and TS 28.543 for NRM of 5Gcore network.
According to content categorization, 5G NRM specifications can be divided into 3 parts:
Requirements, also known as stage 1,
Information Model definitions also known as stage 2, and
Solution Set definitions also known as stage 3.
Identified in the specifications of 5G NRM requirements (TS 28.540 and TS 28.542),the NRM of 5Gnetwork comprises
NRM for the 5Gcore network (5GC) and NRM for 5G radioaccess network (i.e. NR and NG-RAN). The 5GC NRM
definitions support management of 5GC Network Functions, respective interfaces as well as AMF Set and AMF Region.
The NR and NG-RAN NRM definitions cover various 5Gradio networks connectivity options (standalone and non-
standalone radio node deployment options) and architectural options (NR nodes with or without functional split).
The 5G Information Model definitions specify the semantics and behavior of information object class attributes and
relations visible on the 5G management interfaces,in a protocol and technology neutralway (UML as protocol-neutral
language is used).The 5G Information Model is defined according to 5GC, NR and NG-RAN specifications. For example,
in 3GPP TS 38.401,the NR node (gNB) is defined tosupport three functional split options (i.e. non-split option, two
split option with CU and DU, three split option with CU-CP, CU-UP and DU),so in the NR NRM Information Model,
corresponding Information Object Class (IOC) is defined for each network function of gNB specified, and different
UML diagrams show the relationship of each gNB split option respectively. Further, in the 5GInformation Model
definitions, the existing Generic NRM Information Service specification (TS 28.622) is referenced toinherit the
attributes of genericinformation object classes, and the existing EPC NRM Information Service specification
5. (TS 28.708) is referenced for 5GS / EPS interworking relationships description.
Finally, NRM Solution Set definitions map the Information Modeldefinitions to a specific protocol definition used for
implementations. According to recommendation from TR 32.866 (Study on RESTfulbased Solution Set),JSON is
expected to be chosen as data modelling language to describe one 5G NRM Solution Set.
Fault Supervision of 5G networks and network slicing
Fault Supervision is one of the fundamentalfunctions for the management of a 5G network and its communication
services. For the fault supervision of 5G networks and network slicing, the following 3GPP TSs are being specified:
1) TS 28.545 “Management and orchestration of networks and network slicing; Fault Supervision (FS); Stage 1”,which
includes:
The use cases and requirements for fault supervision of 5G networks and network slicing.
The definitions of fault supervision related management services (e.g. NetworkSliceAlarmAcknowledgement,
NetworkSliceAlarmListReading, NetworkSliceAlarmClearance, NetworkSliceAlarmNotification,
NetworkSliceAlarmSubscription, etc.)
2) TS 28.546 “Management and orchestration of networks and network slicing; Fault Supervision (FS); Stage 2 and
stage 3”,which includes the definition of:
Interfaces of the fault supervision related management services; (Stage 2)
Notifications; (Stage 2)
Alarm related information models (e.g. alarmInformation, alarmList, etc.); (Stage 2)
Solution set(s) (e.g. RESTful HTTP-based solution set for Fault Supervison); (Stage 3)
New event types and probable causes if necessary.
Assurance data and Performance Management for 5G networks and
network slicing
The 5G network is designed to accommodate continuously fast increasing data trafficdemand,and in addition, to
support new services such as IoT, cloud-based services, industrial control, autonomous driving, mission critical
communications, etc. Such services may have their own performance criteria, such as massive connectivity, extreme
broadband,ultra-low latency and ultra-high reliability.
The performance data of the 5G networks and NFs (Network Functions) are fundamentalfor networkmonitoring,
assessment, analysis, optimization and assurance.For the services with ultra-low latency and ultra-high reliability
requirements,any faults or performance issues in the networks can cause service failure which may result in serious
personaland property losses. Therefore,it is necessary to be able to collect the performance data in real-time (e.g., by
performance data streaming),so that the analytic applications (e.g., network optimization, SON, etc.) could use the
performance data to detect any network performance problems, predict the potential issues and take appropriate
actions quickly or even in advance.
For network slicing, the communication services are provided on top of the end-to-end networkslice instances, so the
performance needs to be monitored from end-to-end point of view.
The end to end performance data of 5Gnetworks (including sub-networks),NSIs (Network Slice Instances) and NSSIs
(Network Slice Subnet Instances) are vitalfor operators to know whether they can meet the communication service
requirement.
The performance data may be used by various kinds of consumers, such as network operator, SON applications,
network optimization applications, network analytics applications, performance assurance applications, etc. To
facilitate various consumers to get their required performance data,the following items are being pursued by this WI:
6. A service based PM framework and a list of PM services as described in the table below:
Management service name Management service description
NF measurement job control
service
The management service for creating and terminating the measurement job(s) for the
NF(s).
NF measurement job
information service
The management service for querying the information ofthe measurement job(s) for the
NF(s).
NF performance data file
reporting Service The management service for reporting the NF performance data file.
NF performance data
streaming service The management service for providing streaming ofNF performance data.
NSSI measurement job control
service
The management service for creating and terminating the measurement job(s) for the
NSSI(s).
NSSI measurement job
information service
The management service for querying the information ofthe measurement job(s) for the
NSSI(s).
NSSI performance data file
reporting Service The management service for reporting the NSSI performance data file.
NSSI performance data
streaming service The management service for providing streaming ofNSSI performance data.
NSI measurement job control
service
The management service for creating and terminating the measurement job(s) for the
NSI(s).
NSI measurement job
information service
The management service for querying the information ofthe measurement job(s) for the
NSI(s).
NSI performance data file
reporting Service The management service for reporting the NSI performance data file.
NSI performance data
streaming service The management service for providing streaming ofNSI performance data.
Network measurement job
control service
The management service for creating and terminating the measurement job(s) to collect
the network performance data that is not specific to network slicing.
Network measurement job
information service
The management service for querying the information ofthe measurement job(s) to collect
the network performance data that is not specific to network slicing.
Network performance data file
reporting service
The management service for reporting the network performance data file that is not
specific to network slicing.
Network performance data
streaming service
The management service for providing network performance data streaming thatis not
specific to network slicing.
Performance measurements (including the data that can be used for performance assurance) for 3GPP NFs;
End to end KPIs, performance measurements (including the data that can be used for performance assurance) for NSIs, NSSIs
and networks (where the performance data is not specific to network slicing).
Management and virtualization aspects of 5G networks
For 5G networks, it is expected that most of the network functions will run as software components on operators'
telco-cloud systems rather than using dedicated hardware components. Besides the virtualization for Core Network
7. (including 5GC, EPC and IMS),the NG-RAN architecture is being defined with functionalsplit between central unit and
distributed unit, where the central unit can also be virtualized.
SA5 has conducted a study on management aspects of the NG-RAN that includes virtualized network functions, and
has concluded in TR 32.864 that the existing specifications (related to management of mobile networks that include
virtualized network functions) need some enhancements for 5G. The enhancements are mainly on the interactions
between 3GPP management system and externalmanagement systems (e.g., ETSI NFV MANO) for the following
aspects:
Management requirements and architecture;
Life Cycle Management (e.g., PNF management);
Configuration Management;
Performance Management;
Fault Management.
There are gaps identified between 3GPP SA5 requirements and ETSI ISGNFV solutions in terms of the required
enhancements,and 3GPP SA5 is in cooperation with ETSI ISG NFV to solve these gaps.
Although the need for enhancements were found in the study for 5G, SA5 has reached the conclusion that they can be
the used for 4Gas well. So the specifications for management of mobile networks that include virtualized network
functions are being made generally applicable to both 4G and 5Gnetworks.
Study on energy efficiency of 5G networks
Following the conclusions of the study on Energy Efficiency (EE) aspects in 3GPP Standards,
TSG SA#75 recommended initiating further follow-up studies on a range of energy efficiency control related issues for
5G networks including the following aspects:
Definition and calculation of EE KPIs in 3GPP Systems
Energy Efficiency control in 3GPP Systems
Coordinated energy saving in RAN and other subsystem in 3GPP Systems
Power consumption reduction at the sitelevel
Energy Efficiency in 3GPP systems with NFV
Energy Efficiency in Self-Organizing Networks (SON).
TR 32.972 (Study on system and functionalaspects of energy efficiency in 5Gnetworks) aims to:
Identify EE KPI definitions made by ETSI TC EE, ITU-T SG5, ETSI NFV ISG, etc., which are relevant for 5G networks, in
addition to definitions made in SA TR 21.866. Such EE KPIs can be defined at various levels, incl. network and equipment
levels (potentially, at virtualized network function and virtualized resource level), and per deployment scenario (dense
urban, rural, etc.). With 5G, potentially, EE KPIs can be defined at network slice level;
Identify metrics to be defined by 3GPP so as to be able to calculate the above EE KPIs for 5G networks. Such metrics might
relate to data volumes, coverage area or energy consumption;
Assess whether existing OA&M mechanisms enable to control and monitor the identified metrics. In particular, check if the
IRP for the control and monitoring of Power, Energy and Environmental (PEE) parameters for Radio Access Networks (RAN)
(TS 28.304, 28.305, 28.306) can be applied to 5G networks. If not, identify potential new OA&M mechanisms;
Elaborate further on the EE control framework defined in TR 21.866 and identify potential gaps with respect to existing
management architectures, incl. SON and NFV based architectures;
Examine whether new energy saving functionalities might enable the 3GPP management system to manage energy more
efficiently. In particular, the applicability of ETSI ES 203 237 (Green Abstraction Layer; Power management capabilities of
the future energy telecommunication fixed network nodes) to the management of 5G networks is to be evaluated;
Identify potential enhancements in existing standards which could lead to achieving improved 3GPP system-wide energy
efficiency.
This study requires interactions with other 3GPP working groups and SDOs working on related topics, including ITU-
T SG5, ETSI TC EE, ETSI NFV ISG.
8. 5G Charging system architecture and service based interface
Commercial deployment of the Rel-15 5GSystem will not be possible without capabilities for Operators to be able to
monetize the various set of features and services which are specified in TS 23.501,TS 23.502 and TS 23.503.This is
defined under the charging framework, which includes e.g. real-time control of subscriber's usage of 5G Network
resources for charging purpose,or per-UE data collection (e.g. for CDRs generation) which can also be used for other
purposes e.g. analytics.
SA5 has investigated, during a study period in 2017,on how charging architecture should evolve, which key features
should be specified as part of charging capabilities, and which alternative amongst charging solutions should be
selected, to better support the first commercial 5G system deployment.Based on the study results, the charging
architecture evolution and selected Rel-15 key functionalities for 5G system are under ongoing normative phase
through development of a complete set of specifications (architecture, functionalities and protocols) A brief overview
of the charging coverage for the Rel-15 5G system is provided in this article.
Service Based Interface
One key evolution of the charging architecture is the adoption of a service based interface integrated into the overall
5G system service based architecture,enabling deployments of charging functions in virtualized environment and use
of newsoftware techniques.The new charging function (CHF) introduced in the 5G system architecture, as shown in
the picture below, allows charging services to be offered toauthorized network functions. A converged online and
offline charging will also be supported.
While offering the service based interface to the 5G system, the overall converged charging system will be able to
interface the billing system as for the existing system (e.g. 4G) to allow Operators to preserve their billing
environment. These evolutions are incorporated in the TS 32.240 umbrella architecture and principles charging
specification. The services, operations and procedures of charging using Service Based Interface will be specified in a
newTS 32.290,and TS 32.291 will be the stage 3 for this interface.
5G Data connectivity charging
9. The "5G Data connectivity charging",achieved by SMFinvocation of charging service(s) exposed by the charging
function (CHF), will be specified in a newTS 32.255,encompassing the various configurations and functionalities
supported via the SMF, which are highlighted below.
For 3GPP network deployments using network slicing, by indicating to the charging system which network slice
instance is serving the UE during the data connectivity, the Operator will be able to apply business case charging
differentiation.Further improvements on flexibility in charging systems deployments for 5G network slicing will be
explored in future releases.
The new 5GQoS model introduced to support requirements from various applications in data connectivity, is
considered to support QoS based charging for subscriber's usage. 5G QoS-based charging is also defined to address
inter-Operator's settlements (i.e. between VPLMN and HPLMN) in roaming Home-routed scenario.
All charging aspects for data services in Local breakout roaming scenarios will be further considered.
In continuation with existing principles on Access type trafficcharging differentiation,the two Access Networks (i.e.
NG-RAN and untrusted WLAN access) supported in Rel-15 are covered.
Charging capabilities encompass the various functionalities introduced in the 5G system to support flexible
deployment of application functions (e.g. edge computing), such as the three different Session and Service Continuity
(SSC) modes and the Uplink Classifiers and Branching Points.
Charging continuity for interworking and handover between 5Gand existing EPC is addressed.
In 5G Multi-Operator Core Network sharing architecture (i.e. shared RAN), identification of the PLMN that the 5G-RAN
resources were used for to convey the traffic, allows settlements between Operators.
The stage 3 for "5Gdata connectivity charging" will be available in TS 32.298 for the CDRs’ ASN.1 definition and in
TS 32.291for the data type definition in the protocol used for the service based interface.
Acknowledgements
The author wishes to thankthe SA5 Rapporteurs of the indicated work items for their input to this article: Zou Lan,
Jan Groenendijk, Zhang Kai, Weixing Wang, Zhu Weihong, Yizhi Yao, Xiaowen Sun, Jean-MichelCornily, Maryse
Gardella and Chen Shan.Thanks also to Kevin Flynn for help with graphics.