SlideShare a Scribd company logo
1 of 8
Download to read offline
Towards automated service-oriented lifecycle
management for 5G networks
Rafia Inam, Athanasios Karapantelakis, Konstantinos Vandikas, Leonid Mokrushin, Aneta Vulgarakis Feljan, Elena Fersman
Ericsson Research, Sweden
Email: {firstname.lastname}@ericsson.com
Abstract—5G networks will be a key enabler for the Internet of
Things by providing a platform to connect a massive number of
devices with heterogeneous sets of network quality requirements.
In this environment, 5G network operators will have to solve
the complex challenge of managing network services for diverse
customer sectors (such as automotive, health or energy) with
different requirements throughout their lifecycle.
In this paper, we present current state of our work on
automating part of the network service lifecycle management
using knowledge management- and decision support techniques.
We also present our ongoing implementation steps for such
management function in 5G networks.
Keywords-5G, service management lifecycle, Internet of Things,
network slicing, knowledge management, cloud computing.
I. INTRODUCTION
The Fifth Generation Mobile networks (5G) are seen as the
network platform to support operation of reliable connectivity
services for Internet of Things (IoT) applications, wherein
billions of heterogeneous devices will be interconnected and
connected towards the Internet [1]. IoT will cover a broad
range of industry segments, from transportation networks and
logistics, healthcare, energy and utilities to industrial automa-
tion, with different requirements, such as network coverage,
latency and throughput [2].
In this environment, 5G network operators will have to deal
with an unprecedented level of complexity to manage network
services for multiple customer segments with different require-
ments. In order to achieve economies of scale, 5G networks
will need to be designed with a greater degree of automation,
because human involvement in network operator’s Operation
and Business Support Systems (OSS/BSS) continues to de-
crease [3]. A paradigm shift from vertical mobile networks
towards the horizontal implementation has been observed in
5G, as shown in Figure 1. It involves virtual slicing of the
network and partitioning of network resources, as compared
to previous and current generation networks. Network slice
means a dedicated virtualized mobile network containing a
set of network resources and providing a guaranteed quality of
service. A slice can be allocated to a service layer application,
for example, a logistics task involving a number of connected
trucks, trailers and containers.
Driven by the IoT vision, 5G system will be able to support
logical network slices and provide services. By service we
mean a logical system of software, IT and telecom components
organized to fulfil a given business objective that has specified
requirements and outcome. Flexibility is a prerequisite for
communication systems in IoT applications. The QoS require-
ments coming from the application domains are important
to manage the network structure, its functionality, and the
dynamic behaviour of such systems. This paper presents an
approach for flexible (re)configuration in 5G network service
lifecycle management to address these QoS issues.
Flexibility of 5G network management can be achieved
by use of knowledge management techniques to generate
and then assign/manage the network slices/resources to ser-
vices. Knowledge management assumes a machine process-
able model (knowledge base) describing various concepts,
their relations and behaviors combined with a set of meth-
ods such as logical inference [4], simulation [5] and veri-
fication [6]. Generally, the knowledge base contains digital
representation of the domain of interest, i.e. generic- and
domain specific models provided by experts and/or obtained
automatically (e.g. using machine learning techniques). The
analysis that knowledge management enables is done by
automatically picking up relevant knowledge w.r.t. matters
under investigation from the knowledge base, and applying
the aforementioned methods to it.
This position paper contributes in addressing the challenge
of automating the service creation and deployment parts of the
network service lifecycle management as a first step towards
automated management of the complete service lifecycle.
Specifically, we focus on the following:
• Capturing of the customer network requirements in a
formally-described Service Level Agreement (SLA). If the
available network resources are not sufficient to fulfill
the specified requirements, a negotiation process may be
involved to refine the requirements.
• Creation of the network slice deployment instructions for
the captured SLA in the 5G network in the form of a
sequence of steps for network resource orchestration (a
workflow).
Paper Outline: Section II identifies the challenges of the next
generation mobile network management, and Section III gives
an overview of the 5G networks as compared to the current
networks. Our idea for automating network service lifecy-
cle management using knowledge management techniques is
presented in Section IV. Section V presents an example and
finally, Section VI concludes the paper with a description of
ongoing and future work.
II. CHALLENGES
A. Differentiated quality of service
The mobile networks of today are not capable of support-
ing applications with varying criticality and requirements on
latency and bandwidth in a differentiated fashion. As an ex-
ample, consider a case of a big event such as music concert or
sport competition. During such an event there is a need in high
bandwidth in the mobile network as the audience is typically
actively using social media and video streaming. In the current
generation mobile networks, performing a remote surgery in an
ambulance passing by such an event would not be feasible as
the network performance may not guarantee sufficient safety.
Note that in this case there is a mix of criticality of two
applications and there needs to be a mechanism to give higher
priority to the data stream of the more critical application.
B. Changes in the mobile network affect the application
In some situations, especially when moving vehicles are
involved, quality of service in the mobile network may heavily
impact the application. An example of such service is a live
video feed from the front camera of a long vehicle to the
driver of a vehicle behind it to make overtaking safer. Such
application requires high bandwidth and low latency of data
transmission. When a vehicle is moving out of the area where
the high bandwidth and the low latency can be guaranteed,
the network layer should be able to notify the application so
that it could switch to a simpler mode when only an assisting
message is displayed to a driver in the rear vehicle to help
overtaking. This application mode only requires low latency
from the mobile network, and not the high bandwidth as the
video stream is skipped.
C. Lifecycle management of the network slices
Service layer application, for example, a logistics task
involving a number of connected trucks, trailers and con-
tainers, will have a network slice allocated to it. Similarly
to allocating virtual machines in a cloud environment, the
virtualized network functions that form a network slice need to
be provisioned, monitored, possibly modified, and decommis-
sioned along with the lifecycle of the corresponding service
layer application.
Below we describe different approaches and technologies
we intend to develop to meet the aforementioned challenges.
We present 5G virtualization to achieve dynamic management
of the network resources and better QoS control, and Service
orchestration to allocate computational resources and enable
automated provisioning of the services. We use knowledge
management techniques to perform provisioning and lifecycle
analysis of network slices.
III. NEXT GENERATION MOBILE NETWORKS
This section provides an overview on the next generation
mobile networks, how they differ from the current traditional
networks, and then briefly describes the concept of network
slicing.
5G is the network for the next generation ultra-high broad-
band infrastructure that will support a fast, secure, and reliable
services to billions of smart devices and cyber physical sys-
tems, such as automotive, robots and drones [7]. It aims to
provide new services at low cost with a focus on providing
a seamless and efficient communication capability. It will
integrate the wireless access systems and IoT together, provide
a seamless cooperation among them, and aims to fulfil very
stringent requirements like high data rates, capturing and send-
ing signals from a larger number of IoT devices, coverage area,
latency, energy consumption, reliable communication, etc.
Thus, it will create a universal communication environment
and will address wider societal systems. An example could be
connecting multiple systems like automotive, transport, safety,
environment, and energy consumption in a bigger system of
systems.
5G networks will need adaptation with intelligent computing
and storage for IoT devices, efficient and controllable sharing
of network infrastructure, better performance through support-
ing QoS aspects for diverse-natured services, and dynamic
uploading/removal of services (also called service commis-
sioning/decommissioning respectively) through the concept of
virtualization of network slices and resources [8].
The paradigm shift from vertical implementations of current
generation of mobile networks to 5G is shown in Figure 1.
The current vertically implemented network architecture is
presented in Figure 1(a), and the envisioned 5G horizon-
tal implementation network architecture in Figure 1(b). The
current structure supports year-long service lifecycle, while
5G aims to support both long- and short-term service life-
cycle. Additionally, it aims to greatly reduce the service
commissioning and decommissioning duration, e.g. reducing
it from current 90-days for commissioning a new service to 90
minutes in future using 5G [8]. This is possible by automating
the service lifecycle management process. Moreover, services
and requirements will vary in their nature to much larger
extent in 5G as compared to the current traditional network
structure. This aspect puts more focus on SLA negotiation with
a customer (before the start of a particular service) to guarantee
certain levels of QoS requirements related to that service, and
SLA renegotiation to change QoS requirements in case the
required QoS could not be satisfied. For example, a service
may require a particular bandwidth with a particular latency.
The bandwidth and latency properties need QoS guarantees,
and need to be a part of the SLA.
Virtualization is a known technique within the operating sys-
tem (OS) and real-time communities. It provides a method to
consolidate multiple, diverse-natured applications on a shared
hardware platform (e.g. a computer) [9], [10]. Virtualization
is a resource-management technique that partitions the system
resources, such as processor, memory or network, in a way that
provides the illusion of a full resource but with a fractional
capacity [11], [12]. Its main advantages are providing isolation
among services by partitioning resources among services, and
fulfilling QoS requirements associated with these services.
Multiple hierarchical Time Division Multiple Access (TDMA)
(a) Traditional Mobile Telecom Network Structure
(b) Envisioned 5G Network Structure
Fig. 1: The paradigm shift from vertical implementations of
current generation of mobile networks to 5G.
based reconfigurable WiFi slots are applied on network re-
sources to achieve run-time temporal isolation and better
resource utilization [13], [14].
Virtualization can be used to partition multiple network
resources into customized network slices depending on the
service requirements [8]. Thus, many parts of the backbone
network can be virtualized, including network connections
(software defined networks - SDN) as well as parts of the
traffic management (“switching”), which previously required
physical hardware (e.g. IP Multimedia Subsystem [15] - IMS
core nodes such as the x-CSCF nodes and HSS). Virtual-
ization will support isolation among independently developed
services/applications, enforce fault containment within the ser-
vices/applications, and provide better quality control for each
service/application [16]. Thus, virtualization will facilitate
the dynamic addition, removal, or updating of services, and
dynamic mapping of different network resources to services.
Creation of network slices, and partitioning and allocation
of resources to these slices is an ongoing work at Ericsson
AB. In this paper, our main focus is on automation of
service lifecycle management process and guaranteeing QoS
requirements using virtual network slices.
IV. PROPOSED ARCHITECTURE
A high-level, conceptual view of the 5G network architec-
ture is presented is Figure 2. It mainly consists of the following
distinct, but interconnected layers:
1) User layer: presents different types of the users and
provides an interface between the users of the network
and the rest of the network system.
2) 5G Service Lifecycle Management layer: captures cus-
tomer requirements, negotiates, and creates SLAs.
3) Orchestration and Control layers: orchestrates the SLA
agreements depending on the customer and the nature of
the requested service. It then transforms this information
to the control layer which is responsible for controlling
(allocating, monitoring, deallocating, etc) the physical
resources.
4) Radio Access and Core Network layer: contains the
radio access infrastructure (e.g. base stations, WiFi
access points, capillary gateways, etc.) and core net-
work functions (e.g. charging and billing, authentication,
switching, etc.) of the system.
5) Devices layer: comprises all physical devices of system
users that can range from long range (e.g. devices
equipped with HSPA, LTE, GSM modems) to low-power
short-range devices (e.g. 802.15-powered personal area
networks such as 802.15.4-enabled devices using 6Low-
Pan, Xbee or 802.15.1 - Bluetooth network stack [17]).
The rest of this section describes the layers of Figure 2 in
greater detail, with an emphasis on the 5G service lifecycle
management layer, namely the customer SLA negotiation,
creation or the network slice description that meets the re-
quirements of this SLA, and transfer of this description to the
orchestration layer for deployment. Since the main focus of
the paper is on the management and orchestration of services
in the 5G network, detailed description and management of
the Radio Access and Core Network and the Devices layers
is out of the scope of this paper.
A. User Layer
Here we define a set of user roles to interface with the
service lifecycle management layer. We consider the following
three roles:
1) 5G network operators own the 5G service lifecycle
management, orchestration and control components of
Fig. 2: A high-level, conceptual view of the architecture of a
5G network, including a service lifecycle management func-
tion. The reader should note that in this paper we specifically
focus on the service deployment part of the lifecycle manage-
ment (i.e. the components filled with white colour) and we
expect to address the service operation and decommissioning
parts of the lifecycle in upcoming work.
the network. They operate the network and are respon-
sible for the creation, deployment and management of
costumers’ network services.
2) Network resource vendors own and maintain network
resources in the network, such as radio equipment and/or
network core equipment. They can be current mobile
network operators (e.g. WiFi access providers, cloud
platform providers), or software vendors. To use their
network resources, the vendors can register resources in
the network using the 5G Lifecycle Management layer.
3) Customers order services along with the service-
requirements specifications from 5G network operators.
The orchestration of the network slice and functionality
of lifecycle management functions depends on the nature
of the ordered service(s) and the role of the user ac-
cessing it. For instance, consider that a big organization
(i.e. a customer) needs a service to interconnect its
employees’ mobile devices in a large corporate network.
The requirements could be a combination of an indoor
wireless access (from a WiFi access provider) and an
outdoor cellular connectivity (e.g. using a set of HSPA
capable base stations from a network operator), and
some standard switching software (by a cloud provider).
The network slice will include the configuration of
radio- and cloud assets that interoperate in order to
seamlessly serve the customer requirements.
B. 5G Service Lifecycle Management Layer
We propose two different choices for the 5G lifecycle
management system to interface with customers.
• The Service Order API that exposes a customer interface
for creating Service Level Agreements (SLAs). These
agreements are subsequently analyzed in order to create a
network slice. The Service Order API can for example be
a RESTful API [18] that uses secure authentication and
JSON [19] representations for the customer requirements.
Third party providers can call this API from their own
systems.
• A generic web portal that uses the Service Order API
described above and a Graphical User Interface (GUI)
to showcase an idealized process of capturing customer
requirements, negotiating, and creating an SLA. The GUI
includes a self-service web portal where customers can
specify a set of network requirements, such as the number
of devices to be supported, latency and throughput of the
network traffic, coverage and network access protocol(s),
value added services based on analysis of their device’s
traffic (e.g. relative levels of device activity), as well as fi-
nancial parameters (e.g. pricing model and budget). Once
the customer is satisfied with the service specification, the
SLA creation and network slice deployment processes
start to deploy the service.
Fig. 3: Information flow in the 5G Network Lifecycle Man-
agement component for creating and deploying network slices.
Figure 3 illustrates the “5G Service Lifecycle Management”
layer in more detail, and in particular the process of network
service deployment, from capturing customer requirements in
an SLA to deploying a new network slice for this SLA.
The SLA creation process is assisted by a knowledge
management and decision support system integrated to the
5G Service Lifecycle Management layer. The application of
knowledge management in context of 5G networks is twofold.
(A) It helps in automating the process of capturing high
level user requirements of the system and translating them
to network requirements. For example, assuming a network
service of connected vehicles, the high level requirements
would relate to number of vehicles that will be connected
through this service, area of coverage, etc., while the network
level requirements would be the throughput/latency of the
network connections, number of radio base stations that have
to be configured to cover the desired area, etc. (B) It offers
a white label optimization toolbox, a set of management
functions that can be reused by different services. For example,
a service routing buses (people logistics) and a service routing
trucks (goods logistic) may have overlapping problem-solving
approach, which leads to reuse same components from this
toolbox.
The customer provides a set of requirements and then the
decision support system checks whether the status of the avail-
able resources in the network can satisfy these requirements. If
the requirements cannot be satisfied, then the system suggests
an alternative set of requirements to the customer, as close
to the original requirements as possible. For example, if a
customer requests onboarding of 2000 devices with throughput
of 1000 Mbps and the analyser within the 5G Service Lifecycle
Management layer shows that it can only guarantee 1000 Mbps
for 800 of these devices, it proposes this to the customer.
Each device gets an access token, i.e. an encrypted string
that identifies the device to the 5G network and lets it access
network connectivity services under the requirements specified
by the SLA. An example of such a service ordering interface
is shown in Section V.
For monitoring purpose, the status of the network is con-
tinuously reported by the orchestration layer to the knowledge
base, and is stored in a relational database.
Once an SLA has been created, it is stored in a database,
and the deployment process can begin. The algorithm used for
the deployment process, uses the SLA requirements (i.e. cus-
tomer requirements) and Virtual Network Functions (VNFs)
definitions as input and produces a network slice deployment
instructions (see Section V).
C. Orchestration and Control layers
The orchestration and control layer receives network slice
deployment instructions and executes them, i.e. deploys the
slice on the physical resources. The network slices will mainly
consist of VNFs. Additionally, a part of a network slice may
also execute on a “bare metal”, i.e. use physically deployed
infrastructure instead of virtual environment (e.g. to accom-
modate the legacy network functions).
A VNF is a self-contained functional component of the
network infrastructure (for example core network nodes,
policy control functions, load balancers, firewalls, etc.). In
addition to pure network functional components, VNFs can
provide common computing functionality such as storage (e.g.
databases, filesystems), authentication, software development
kits (SDKs), etc. Deployment of VNFs can span multiple
nodes.
An important aspect of VNFs is “chaining”, wherein VNFs
can be instantiated and topologically interconnected to form a
service (chaining is explained in Section V) [20]. VNFs can be
conceptualized as pieces of software executed in one or more
virtual machines or containers, replacing the functionality that
historically has been implemented as specific dedicated hard-
ware components in the core network. We consider them as the
building blocks of a network slice. VNF deployments can be
complemented by Software Defined Networks (SDNs), which
can be seen as analogy of physical network connections, but
implemented in software and thus defining logical networks
that can potentially share physical resources. The combination
of these two virtualization technologies has numerous cost
benefits, as it removes dependencies on specific hardware,
reduces deployment time and the operations cost. A well
known example, is the replacement of physical routers with
physical network connections, with virtual router network
functions and SDN connections [21].
The VNF descriptions are stored in the knowledge base and
are used for reference when generating new network slice
deployment instructions. A service description contains the
following components:
• Deployment instructions: a dependency graph of VNFs
the service depends on, each with a corresponding set of
resource requirements and deployment instructions.
• Network configuration: a configuration of the networks
that the service intends to use.
• Service parameters: an optional set of service specific
functional and non-functional requirements.
An example of 3GPP (e.g. HSPA or LTE) mobile net-
work service is shown in Figure 4. The real topology, with
nodes representing different physical entities is illustrated in
Figure 4(a). The virtual description of the topology Figure
4(b) consists of two VNFs, one for an IMS Core Service
(networkCoreService type) and one for a 3GPP Radio Access
Service (radioService type). Each of the aforementioned VNFs
is chained to a set of other VNFs. In case of IMS, three VNFs
encompassing the IMS core network (HSS, P-CSCF and S-
CSCF nodes) and in case of Radio Access, one VNF repre-
senting the network controller (RNC), two VNFs representing
base stations (Node-Bs) and two VNFs representing SGSN
and GGSN nodes.
Both IMS Core and Radio Access services depend on
a set of VNFs to be deployed for each, as well as a
network configuration defining the networking between the
VNFs. Nodes can coexist in a single container (or virtual
machine), or can be spread over multiple containers, as
dictated by the network configuration. We are considering
to use Topology and Orchestration Specification for Cloud
Applications (TOSCA) [22] as the language for expressing
service deployments in the cloud and investigating different
orchestrators such as Cloudify [23], Openstack Heat [24],
Docker Compose [25], Canonical JUJU [26].
In the radio access case as illustrated in Figure 4, when the
IMS Core Service is deployed, the orchestration creates a new
instance in a virtual environment for each VNF. The boxes in
the figure denote different components of IMS system. Note
that the focus is on describing properties of IMS components,
(a) Real Topology of a 3GPP radio access service.
(b) Virtual Description of a 3GPP radio access service.
Fig. 4: This figure illustrates a real topology of a 3GPP
radio access service, consisting of radio access and IMS core
network (top) and how this service can be virtualized as a set
of VNFs, SDNs and Service descriptions. Moving bottom-up,
the SGSN node routes packets from the RNC node towards
the SGSN, which converts the packets to an IP format. The
packets are then routed to P-CSCF node, which is a signalling
(SIP) proxy and the first point of contact in the core network.
The P-CSCF routes the packets to the S-CSCF which controls
user sessions from registration to routing, policy enforcement,
etc. The HSS node is used from S-CSCF as a registrar.
not the functionality of the components. For the 3GPP Ra-
dio Access Service based on its deployment description, the
orchestration reserves resources of the radio assets. In this
case, the Node-B 1 and Node-B 2 VNF instances are not
created anew, but instead the physical radio resources are
used (one instance represents for example one Node-B). The
network configuration description of the IMS Core Service
explains how various VNFs (i.e. HSS, S-CSCF and P-SCSF)
are interconnected and communicate. The 3GPP Radio Access
Service network configuration describes how the radio network
is configured. The 3GPP service network configuration links
the above two configurations together.
V. AN EXAMPLE CASE
A. Prototype Implementation
Fig. 5: The functional view of the architecture of our prototype
5G system.
In this section, we present our implementation of the
architecture suggested in Section IV. Figure 5 illustrates the
functional view of the implemented architecture. We describe
the three parts of the user interface at the top layer. The service
creation interface allows for creation of new services, and
storage of these services in the service description database.
A service consists of a textual description together with
a set of requirements (for example numerical values or a
range of values). The service description is currently stored
in a relational database, but we will be transitioning to a
more sophisticated description format such as XML-based
USDL [27] or business TOSCA.
The customer interface allows for negotiation of SLAs and
subsequent deployment of services as virtual resources in the
cloud infrastructure. The cloud infrastructure consists of a set
of servers forming a cluster controlled by Openstack [28], an
infrastructure as a service provider, while Cloudily is set up on
top as a platform provider. Cloudify accepts the descriptions of
topologies as input, e.g. a number of servers and their network
connections and interfaces with Openstack to deploy these
topologies. The topologies are described in TOSCA language,
as mentioned previously.
The service monitoring and decommissioning interface al-
lows to monitor the service throughout its lifetime and de-
commission it upon request. The monitoring aspect of the
service utilizes Ceilometer [29] which is part of Openstack.
Fig. 6: Conceptual user interface presented to a customer of the example “traffic priority” service.
Ceilometer collects metering information about CPU, Mem-
ory, Disk and Network utilization of both physical and virtual
resources. The information is later on stored and processed
by the ELK [30] stack. The decommissioning allows for
decommissioning of services by interfacing with cloudify API.
Note that the prototype implementation includes a stub for
radio assets (i.e. GGSN, SGSN, RNC and Node-B as presented
in the previous section), where these assets are virtualized,
using the NS-3 network simulator [31]. This allows for testing
of the implementation without using real Node-Bs which are
expensive and difficult to procure (due to licensed spectrum
issues). The authors plan to extend the prototype system to
using real Node-Bs in a controlled test site in the suburb of
Kista, Stockholm, Sweden in the future.
B. End-to-end service provisoning
This section describes the process of service deployment
from capturing high-level user requirements, to matching those
requirements to an NFV topology in the 5G Service Lifecycle
Management layer and eventually sending a description of this
topology to be deployed as a network slice in the underlying
orchestrator. The purpose is to illustrate currently ongoing
work and ideas on how service deployment may look like
from an end-user perspective on the architecture described in
the previous sections.
As an example use case, we are considering a radio access
service which can be parametrized by different traffic priority
classes. Instead of specifying network-level QoS requirements,
customers use a web portal to specify expected quality of
experience (QoE), which includes a high level indicator of
the intended use of the service (e.g. high-definition video
streaming, best effort web browsing, etc.), coverage, as well as
value added services such as basic data analytics (starting from
simple storage of data to identification of peak data transfer
hours, most active devices per day, etc.).
Figure 6 illustrates a conceptual interface, currently under
implementation, presented to customers of this service. The
map illustrated on the right hand side of the figure can be
used as canvas for users to designate the desired area of
radio coverage, while on the left hand side, the users can
describe the quality desired from the network using high
level requirements. Additionally, basic data analytics services
can be orchestrated and deployed in the corresponding cloud
infrastructure. Finally, a slider can be used from the users
to indicate the scale of the deployment. The service can
thus support users of different size and requirements, from
private individuals, to small and medium enterprises up to
large corporations. Table I illustrates potential users of the
service that may have different requirements.
TABLE I: Potential users of the traffic priority service.
Customer Type Description of Service Requirements
Private Individual Basic connectivity for
personal, mobile devices
while roaming in the area.
One traffic class, Best Ef-
fort, no additional ser-
vices, 2 devices.
City bus transport
authority
Scheduling of 50 buses
based on demand of pas-
sengers waiting in bus
stops rather than fixed
schedules.
One traffic class, mission
critical data, including
subscriber mobility
analytics and storage
of critical data for
troubleshooting, 50
devices.
Mining Company Mining company would
like to automate vehi-
cles carrying mined ore
from the mining site to
a nearby depot. The net-
work to support these ve-
hicles includes both pri-
oritized traffic (mission
critical data and media
streams of cameras at-
tached to vehicles for
monitoring purposes).
Two traffic classes, me-
dia streaming and mission
critical data, including ba-
sic data storage of critical
data for troubleshooting if
needed, 100 devices.
VI. CONCLUSIONS AND FUTURE WORK
The 5G networks will connect billions of devices and
will provide connectivity services to Internet of Things (IoT)
applications from different industry segments with varying
criticality and heterogeneous sets of network quality require-
ments (i.e. latency and bandwidth). As such, 5G network
operators will need to address the problem of simultaneously
managing network services for diverse customer segments
with different requirements throughout their lifecycle.
In this position paper, we have presented current state of our
work on automating the network service lifecycle management
for such networks using knowledge management- and decision
support techniques. This automation will provide flexibility in
service deployment and decommissioning, reduce deployment
time from months and weeks to minutes and seconds, and
support better QoS control. Specifically, we have focused on
the part of the management process that includes: capturing of
service driven network requirements by establishing Service
Level Agreements (SLAs). This includes SLA negotiations,
handled by a knowledge management system, when the cos-
tumer requirements can not be fulfilled due to insufficient
network resources. Further, it includes the creation of network
slice deployment instructions for a given SLA in the 5G
network in the form of a workflow, i.e. a sequence of steps
for the network resource orchestration.
Currently, we are implementing our ideas using orches-
trators (such as Cloudify [23], Openstack Heat [24]), and
a language to express the network slice descriptions (e.g.
TOSCA [22]). In the future, we plan to develop the knowledge
management by translating service description and require-
ments specified by a user into exact configuration of resources
and service chains of VNFs. We also intend to evaluate the
complete implementation on a real network in the context of
a real use case. Once the implementation is completed and
the basic functionality is evaluated for correctness, the next
step will be to extend the work towards other layers of the
lifecycle management, such as network operations monitoring
and assurance of SLA fulfilment. Adding support for more
user roles can form another direction of the future work.
REFERENCES
[1] Thibaut Kleiner. 5G Research in Horizon 2020,
http://ec.europa.eu/information society/newsroom/. European
Commission, 2014.
[2] Dam Warrem and Calum Dewar. Understanding 5g: Perspectives on
future technological advancements in mobile. Technical report, GSMA,
December 2014.
[3] Ericsson. 5G: What is it ? More than just improving perfor-
mance and greater flexibility, the next generation is a shift in mind-
set, http://www.ericsson.com/res/docs/2014/5g-what-is-it.pdf. Ericsson
Whitepaper, October 2014.
[4] J. Wielemaker. Logic programming for knowledge-intensive inter-
active applications. PhD thesis, University of Amsterdam, 2009.
http://dare.uva.nl/en/record/300739.
[5] A. Grignard, P. Taillandier, B. Gaudou D. A. Vo, N. Q. Hyunh, and
A. Drogoul. GAMA 1.6: Advancing the Art of Complex Agent-Based
Modeling and Simulation. In PRIMA 2013: Principles and Practice
of Multi-Agent Systems, volume 8291 of Lecture Notes in Computer
Science, pages 117–131. Springer, 2013.
[6] G. Behrmann, A. David, K. G. Larsen, O. M¨oller, P. Pettersson, and
W. Yi. UPPAAL - present and future. In Proc. of 40th IEEE Conference
on Decision and Control. IEEE Computer Society Press, 2001.
[7] NetWorld 2020. European technology platform for communications
networks and services, “5g: Challenges, research priorities, and
recommendations”. In NetWorld 2020 ETP, http://networld2020.eu/wp-
content/uploads/2014/02/NetWorld2020 Joint-Whitepaper-V public-
consultation.pdf, August 2014.
[8] Ericsson. 5g sytems: Enabling industry and society transformation. In
Erisson White Paper, pages 3–14, January 2015.
[9] B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield,
P. Barham, and R. Neugebauer. Xen and the art of virtualization. In
ACM Symposium on Operating Systems Principles (SOSP), 2003.
[10] T. Cucinotta, F. Checconi, and D. Giani. Improving responsiveness
for virtualized networking under intensive computing workloads. In
Proceedings of the 13th Real-Time Linux Workshop, 2011.
[11] Z. Gu and Q. Zhao. A state-of-the-art survey on real-time issues in
embedded systems virtualization. Journal of Software Engineering and
Applications (JSEA), 5:277–290, 2012.
[12] R. Inam, N. Mahmud, M. Behnam, T. Nolte, and M. Sj¨odin. The
multi-resource server for predictable execution on multi-core platforms.
In 20th IEEE Real-Time and Embedded Technology and Applications
Symposium (RTAS), pages 1–11, IEEE, April 2014.
[13] Z, L. Almeida Iqbal, and M. Behnam. Designing network servers
within a hierarchical scheduling framework. In The 30th ACM/SIGAPP
Symposium On Applied Computing (SAC), 2015.
[14] F. Santos, L. Almeida, and L.S. Lopes. Self-configuration of an adaptive
tdma wireless communication protocol for teams of mobile robots. In
Emerging Technologies and Factory Automation, 2008. ETFA 2008.
IEEE International Conference on, pages 1197–1204, 2008.
[15] Ericsson. Introduction to IMS. White Paper, 2007.
[16] Rafia Inam, Moris Behnam, Thomas Nolte, and Mikael Sj¨odin. Compo-
sitional analysis for the multi-resource server. In 20th IEEE International
Conference on Emerging Technologies and Factory Automation, 2015.
[17] IEEE. Ieee 802.15 working group for wpan.
http://grouper.ieee.org/groups/802/15/, May 2015.
[18] Roy Thomas Fielding. Chapter 5: Representational state transfer
(rest). Architectural Styles and the Design of Network-based Software
Architectures (Ph.D.), 2000.
[19] Ed. T. Bray. The javascript object notation (json) data interchange
format. Internet Engineering Task Force (IETF), Request for Comments:
7159, ISSN: 2070-1721, 2014.
[20] ETSI. Network Functions Virtualisation (NFV). White Paper, October
2013. http://portal.etsi.org/NFV/NFV White Paper2.pdf.
[21] Ericsson. Ericsson virtual router,
http://archive.ericsson.net/service/internet/picov/get?docno=1/28701-
fgb1010557&lang=en&highestfree=y. Ericsson Brochure, 2014.
[22] Topology and Orchestration Specification for Cloud
Applications (TOSCA), October 2011. http://www.oasis-
open.org/committees/tc home.php?wg abbrev=tosca.
[23] Cloudify: A cloud application orchestrator. http://getcloudify.org.
[24] Heat: Openstack orchestration service.
https://wiki.openstack.org/wiki/Heat.
[25] Docker Compose: a tool for defining and running complex applications
with Docker. https://docs.docker.com/compose/.
[26] Juju: a service orchestration tool for cloud environments.
http://www.ubuntu.com/cloud/tools/juju.
[27] Srividya Kona, Ajay Bansal, Gopal Gupta, and Thomas D Hite. Web
service discovery and composition using usdl. In E-Commerce Technol-
ogy, 2006. The 8th IEEE International Conference on and Enterprise
Computing, E-Commerce, and E-Services, The 3rd IEEE International
Conference on, pages 65–65. IEEE, 2006.
[28] Openstack IaaS. https://www.openstack.org.
[29] OpenStack Telemetry (Ceilometer). https://wiki.openstack.org/wiki/Ceilometer.
[30] Elasticsearch, Openstack and Kibana product download page.
https://www.elastic.co/products.
[31] ns-3 is a discrete-event network simulator for Internet systems.
https://www.nsnam.org.

More Related Content

What's hot

Unified Billing-Realization of convergent architecture for charging and billi...
Unified Billing-Realization of convergent architecture for charging and billi...Unified Billing-Realization of convergent architecture for charging and billi...
Unified Billing-Realization of convergent architecture for charging and billi...IDES Editor
 
Optimization of Quality of Service in 4G Wireless Networks
Optimization of Quality of Service in 4G Wireless NetworksOptimization of Quality of Service in 4G Wireless Networks
Optimization of Quality of Service in 4G Wireless NetworksIDES Editor
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperMarc Curtis
 
Data Offload Survival Guide Part 3
Data Offload Survival Guide Part 3Data Offload Survival Guide Part 3
Data Offload Survival Guide Part 3Green Packet
 
IRJET- An Incentive Framework for Cellular Traffic Offloading
IRJET-  	  An Incentive Framework for Cellular Traffic OffloadingIRJET-  	  An Incentive Framework for Cellular Traffic Offloading
IRJET- An Incentive Framework for Cellular Traffic OffloadingIRJET Journal
 
Load balancing in_5_g_networks
Load balancing in_5_g_networksLoad balancing in_5_g_networks
Load balancing in_5_g_networksCatherineProtas
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloudEricsson Latin America
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIAEME Publication
 
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Saeid Abolfazli
 
A XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud InfrastructureA XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
 
Network share briefing_paper
Network share briefing_paperNetwork share briefing_paper
Network share briefing_paperFethi HATTAB
 
"Performance Analysis of In-Network Caching in Content-Centric Advanced Meter...
"Performance Analysis of In-Network Caching in Content-Centric Advanced Meter..."Performance Analysis of In-Network Caching in Content-Centric Advanced Meter...
"Performance Analysis of In-Network Caching in Content-Centric Advanced Meter...Khaled Ben Driss
 
Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...IJCNCJournal
 
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENTENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENTIJCNCJournal
 
Www.eecis.udel.edu ~cshen 367_papers_survey_mcc
Www.eecis.udel.edu ~cshen 367_papers_survey_mccWww.eecis.udel.edu ~cshen 367_papers_survey_mcc
Www.eecis.udel.edu ~cshen 367_papers_survey_mccYashank Pratap Singh
 
A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
A Survey of Mobile Cloud Computing: Architecture, Applications, and ApproachesA Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
A Survey of Mobile Cloud Computing: Architecture, Applications, and ApproachesThuy An Dang
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
 

What's hot (20)

Unified Billing-Realization of convergent architecture for charging and billi...
Unified Billing-Realization of convergent architecture for charging and billi...Unified Billing-Realization of convergent architecture for charging and billi...
Unified Billing-Realization of convergent architecture for charging and billi...
 
Optimization of Quality of Service in 4G Wireless Networks
Optimization of Quality of Service in 4G Wireless NetworksOptimization of Quality of Service in 4G Wireless Networks
Optimization of Quality of Service in 4G Wireless Networks
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_Paper
 
IJET-V3I1P24
IJET-V3I1P24IJET-V3I1P24
IJET-V3I1P24
 
Data Offload Survival Guide Part 3
Data Offload Survival Guide Part 3Data Offload Survival Guide Part 3
Data Offload Survival Guide Part 3
 
IRJET- An Incentive Framework for Cellular Traffic Offloading
IRJET-  	  An Incentive Framework for Cellular Traffic OffloadingIRJET-  	  An Incentive Framework for Cellular Traffic Offloading
IRJET- An Incentive Framework for Cellular Traffic Offloading
 
Load balancing in_5_g_networks
Load balancing in_5_g_networksLoad balancing in_5_g_networks
Load balancing in_5_g_networks
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloud
 
White Paper0_
White Paper0_White Paper0_
White Paper0_
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networks
 
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...
 
A XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud InfrastructureA XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud Infrastructure
 
Network share briefing_paper
Network share briefing_paperNetwork share briefing_paper
Network share briefing_paper
 
Software Defined Grid
Software Defined GridSoftware Defined Grid
Software Defined Grid
 
"Performance Analysis of In-Network Caching in Content-Centric Advanced Meter...
"Performance Analysis of In-Network Caching in Content-Centric Advanced Meter..."Performance Analysis of In-Network Caching in Content-Centric Advanced Meter...
"Performance Analysis of In-Network Caching in Content-Centric Advanced Meter...
 
Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...
 
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENTENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
 
Www.eecis.udel.edu ~cshen 367_papers_survey_mcc
Www.eecis.udel.edu ~cshen 367_papers_survey_mccWww.eecis.udel.edu ~cshen 367_papers_survey_mcc
Www.eecis.udel.edu ~cshen 367_papers_survey_mcc
 
A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
A Survey of Mobile Cloud Computing: Architecture, Applications, and ApproachesA Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
 

Similar to Automated Lifecycle Management for 5G Network Services

Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gatewaysTal Lavian Ph.D.
 
5 g network-slicing-report
5 g network-slicing-report5 g network-slicing-report
5 g network-slicing-reportermnas2482
 
5G Challenges and Opportunities
5G Challenges and Opportunities5G Challenges and Opportunities
5G Challenges and OpportunitiesAliMohamedAhmed2
 
Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...IJECEIAES
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKAashish Pande
 
Mobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsMobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsUniversity of Piraeus
 
Paper review on 5 g mobile technology
Paper review on 5 g mobile technology Paper review on 5 g mobile technology
Paper review on 5 g mobile technology Madhunath Yadav
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfadeyimikaipaye
 
5 g network white paper
5 g network white paper 5 g network white paper
5 g network white paper Ravi Sharma
 
My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos...
 My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos... My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos...
My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos...Pradeeban Kathiravelu, Ph.D.
 
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESUSING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESijwscjournal
 
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES ijwscjournal
 
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...antjjournal
 
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESUSING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESijwscjournal
 
IRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud ComputingIRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud ComputingIRJET Journal
 
Wide area network in smart grid kundan
Wide area network in smart grid kundanWide area network in smart grid kundan
Wide area network in smart grid kundanKundan Kumar
 

Similar to Automated Lifecycle Management for 5G Network Services (20)

Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gateways
 
S01725119124
S01725119124S01725119124
S01725119124
 
5 g network-slicing-report
5 g network-slicing-report5 g network-slicing-report
5 g network-slicing-report
 
5G Challenges and Opportunities
5G Challenges and Opportunities5G Challenges and Opportunities
5G Challenges and Opportunities
 
Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
 
Mobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsMobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing Systems
 
Paper review on 5 g mobile technology
Paper review on 5 g mobile technology Paper review on 5 g mobile technology
Paper review on 5 g mobile technology
 
QoS in an LTE network
QoS in an LTE networkQoS in an LTE network
QoS in an LTE network
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
5 g network white paper
5 g network white paper 5 g network white paper
5 g network white paper
 
My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos...
 My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos... My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos...
My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos...
 
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESUSING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
 
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
 
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...
 
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESUSING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
 
IRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud ComputingIRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud Computing
 
Wide area network in smart grid kundan
Wide area network in smart grid kundanWide area network in smart grid kundan
Wide area network in smart grid kundan
 

More from Ericsson

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020Ericsson
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN OrchestrationEricsson
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson
 

More from Ericsson (20)

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applications
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of Things
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN Orchestration
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Automated Lifecycle Management for 5G Network Services

  • 1. Towards automated service-oriented lifecycle management for 5G networks Rafia Inam, Athanasios Karapantelakis, Konstantinos Vandikas, Leonid Mokrushin, Aneta Vulgarakis Feljan, Elena Fersman Ericsson Research, Sweden Email: {firstname.lastname}@ericsson.com Abstract—5G networks will be a key enabler for the Internet of Things by providing a platform to connect a massive number of devices with heterogeneous sets of network quality requirements. In this environment, 5G network operators will have to solve the complex challenge of managing network services for diverse customer sectors (such as automotive, health or energy) with different requirements throughout their lifecycle. In this paper, we present current state of our work on automating part of the network service lifecycle management using knowledge management- and decision support techniques. We also present our ongoing implementation steps for such management function in 5G networks. Keywords-5G, service management lifecycle, Internet of Things, network slicing, knowledge management, cloud computing. I. INTRODUCTION The Fifth Generation Mobile networks (5G) are seen as the network platform to support operation of reliable connectivity services for Internet of Things (IoT) applications, wherein billions of heterogeneous devices will be interconnected and connected towards the Internet [1]. IoT will cover a broad range of industry segments, from transportation networks and logistics, healthcare, energy and utilities to industrial automa- tion, with different requirements, such as network coverage, latency and throughput [2]. In this environment, 5G network operators will have to deal with an unprecedented level of complexity to manage network services for multiple customer segments with different require- ments. In order to achieve economies of scale, 5G networks will need to be designed with a greater degree of automation, because human involvement in network operator’s Operation and Business Support Systems (OSS/BSS) continues to de- crease [3]. A paradigm shift from vertical mobile networks towards the horizontal implementation has been observed in 5G, as shown in Figure 1. It involves virtual slicing of the network and partitioning of network resources, as compared to previous and current generation networks. Network slice means a dedicated virtualized mobile network containing a set of network resources and providing a guaranteed quality of service. A slice can be allocated to a service layer application, for example, a logistics task involving a number of connected trucks, trailers and containers. Driven by the IoT vision, 5G system will be able to support logical network slices and provide services. By service we mean a logical system of software, IT and telecom components organized to fulfil a given business objective that has specified requirements and outcome. Flexibility is a prerequisite for communication systems in IoT applications. The QoS require- ments coming from the application domains are important to manage the network structure, its functionality, and the dynamic behaviour of such systems. This paper presents an approach for flexible (re)configuration in 5G network service lifecycle management to address these QoS issues. Flexibility of 5G network management can be achieved by use of knowledge management techniques to generate and then assign/manage the network slices/resources to ser- vices. Knowledge management assumes a machine process- able model (knowledge base) describing various concepts, their relations and behaviors combined with a set of meth- ods such as logical inference [4], simulation [5] and veri- fication [6]. Generally, the knowledge base contains digital representation of the domain of interest, i.e. generic- and domain specific models provided by experts and/or obtained automatically (e.g. using machine learning techniques). The analysis that knowledge management enables is done by automatically picking up relevant knowledge w.r.t. matters under investigation from the knowledge base, and applying the aforementioned methods to it. This position paper contributes in addressing the challenge of automating the service creation and deployment parts of the network service lifecycle management as a first step towards automated management of the complete service lifecycle. Specifically, we focus on the following: • Capturing of the customer network requirements in a formally-described Service Level Agreement (SLA). If the available network resources are not sufficient to fulfill the specified requirements, a negotiation process may be involved to refine the requirements. • Creation of the network slice deployment instructions for the captured SLA in the 5G network in the form of a sequence of steps for network resource orchestration (a workflow). Paper Outline: Section II identifies the challenges of the next generation mobile network management, and Section III gives an overview of the 5G networks as compared to the current networks. Our idea for automating network service lifecy- cle management using knowledge management techniques is presented in Section IV. Section V presents an example and finally, Section VI concludes the paper with a description of ongoing and future work.
  • 2. II. CHALLENGES A. Differentiated quality of service The mobile networks of today are not capable of support- ing applications with varying criticality and requirements on latency and bandwidth in a differentiated fashion. As an ex- ample, consider a case of a big event such as music concert or sport competition. During such an event there is a need in high bandwidth in the mobile network as the audience is typically actively using social media and video streaming. In the current generation mobile networks, performing a remote surgery in an ambulance passing by such an event would not be feasible as the network performance may not guarantee sufficient safety. Note that in this case there is a mix of criticality of two applications and there needs to be a mechanism to give higher priority to the data stream of the more critical application. B. Changes in the mobile network affect the application In some situations, especially when moving vehicles are involved, quality of service in the mobile network may heavily impact the application. An example of such service is a live video feed from the front camera of a long vehicle to the driver of a vehicle behind it to make overtaking safer. Such application requires high bandwidth and low latency of data transmission. When a vehicle is moving out of the area where the high bandwidth and the low latency can be guaranteed, the network layer should be able to notify the application so that it could switch to a simpler mode when only an assisting message is displayed to a driver in the rear vehicle to help overtaking. This application mode only requires low latency from the mobile network, and not the high bandwidth as the video stream is skipped. C. Lifecycle management of the network slices Service layer application, for example, a logistics task involving a number of connected trucks, trailers and con- tainers, will have a network slice allocated to it. Similarly to allocating virtual machines in a cloud environment, the virtualized network functions that form a network slice need to be provisioned, monitored, possibly modified, and decommis- sioned along with the lifecycle of the corresponding service layer application. Below we describe different approaches and technologies we intend to develop to meet the aforementioned challenges. We present 5G virtualization to achieve dynamic management of the network resources and better QoS control, and Service orchestration to allocate computational resources and enable automated provisioning of the services. We use knowledge management techniques to perform provisioning and lifecycle analysis of network slices. III. NEXT GENERATION MOBILE NETWORKS This section provides an overview on the next generation mobile networks, how they differ from the current traditional networks, and then briefly describes the concept of network slicing. 5G is the network for the next generation ultra-high broad- band infrastructure that will support a fast, secure, and reliable services to billions of smart devices and cyber physical sys- tems, such as automotive, robots and drones [7]. It aims to provide new services at low cost with a focus on providing a seamless and efficient communication capability. It will integrate the wireless access systems and IoT together, provide a seamless cooperation among them, and aims to fulfil very stringent requirements like high data rates, capturing and send- ing signals from a larger number of IoT devices, coverage area, latency, energy consumption, reliable communication, etc. Thus, it will create a universal communication environment and will address wider societal systems. An example could be connecting multiple systems like automotive, transport, safety, environment, and energy consumption in a bigger system of systems. 5G networks will need adaptation with intelligent computing and storage for IoT devices, efficient and controllable sharing of network infrastructure, better performance through support- ing QoS aspects for diverse-natured services, and dynamic uploading/removal of services (also called service commis- sioning/decommissioning respectively) through the concept of virtualization of network slices and resources [8]. The paradigm shift from vertical implementations of current generation of mobile networks to 5G is shown in Figure 1. The current vertically implemented network architecture is presented in Figure 1(a), and the envisioned 5G horizon- tal implementation network architecture in Figure 1(b). The current structure supports year-long service lifecycle, while 5G aims to support both long- and short-term service life- cycle. Additionally, it aims to greatly reduce the service commissioning and decommissioning duration, e.g. reducing it from current 90-days for commissioning a new service to 90 minutes in future using 5G [8]. This is possible by automating the service lifecycle management process. Moreover, services and requirements will vary in their nature to much larger extent in 5G as compared to the current traditional network structure. This aspect puts more focus on SLA negotiation with a customer (before the start of a particular service) to guarantee certain levels of QoS requirements related to that service, and SLA renegotiation to change QoS requirements in case the required QoS could not be satisfied. For example, a service may require a particular bandwidth with a particular latency. The bandwidth and latency properties need QoS guarantees, and need to be a part of the SLA. Virtualization is a known technique within the operating sys- tem (OS) and real-time communities. It provides a method to consolidate multiple, diverse-natured applications on a shared hardware platform (e.g. a computer) [9], [10]. Virtualization is a resource-management technique that partitions the system resources, such as processor, memory or network, in a way that provides the illusion of a full resource but with a fractional capacity [11], [12]. Its main advantages are providing isolation among services by partitioning resources among services, and fulfilling QoS requirements associated with these services. Multiple hierarchical Time Division Multiple Access (TDMA)
  • 3. (a) Traditional Mobile Telecom Network Structure (b) Envisioned 5G Network Structure Fig. 1: The paradigm shift from vertical implementations of current generation of mobile networks to 5G. based reconfigurable WiFi slots are applied on network re- sources to achieve run-time temporal isolation and better resource utilization [13], [14]. Virtualization can be used to partition multiple network resources into customized network slices depending on the service requirements [8]. Thus, many parts of the backbone network can be virtualized, including network connections (software defined networks - SDN) as well as parts of the traffic management (“switching”), which previously required physical hardware (e.g. IP Multimedia Subsystem [15] - IMS core nodes such as the x-CSCF nodes and HSS). Virtual- ization will support isolation among independently developed services/applications, enforce fault containment within the ser- vices/applications, and provide better quality control for each service/application [16]. Thus, virtualization will facilitate the dynamic addition, removal, or updating of services, and dynamic mapping of different network resources to services. Creation of network slices, and partitioning and allocation of resources to these slices is an ongoing work at Ericsson AB. In this paper, our main focus is on automation of service lifecycle management process and guaranteeing QoS requirements using virtual network slices. IV. PROPOSED ARCHITECTURE A high-level, conceptual view of the 5G network architec- ture is presented is Figure 2. It mainly consists of the following distinct, but interconnected layers: 1) User layer: presents different types of the users and provides an interface between the users of the network and the rest of the network system. 2) 5G Service Lifecycle Management layer: captures cus- tomer requirements, negotiates, and creates SLAs. 3) Orchestration and Control layers: orchestrates the SLA agreements depending on the customer and the nature of the requested service. It then transforms this information to the control layer which is responsible for controlling (allocating, monitoring, deallocating, etc) the physical resources. 4) Radio Access and Core Network layer: contains the radio access infrastructure (e.g. base stations, WiFi access points, capillary gateways, etc.) and core net- work functions (e.g. charging and billing, authentication, switching, etc.) of the system. 5) Devices layer: comprises all physical devices of system users that can range from long range (e.g. devices equipped with HSPA, LTE, GSM modems) to low-power short-range devices (e.g. 802.15-powered personal area networks such as 802.15.4-enabled devices using 6Low- Pan, Xbee or 802.15.1 - Bluetooth network stack [17]). The rest of this section describes the layers of Figure 2 in greater detail, with an emphasis on the 5G service lifecycle management layer, namely the customer SLA negotiation, creation or the network slice description that meets the re- quirements of this SLA, and transfer of this description to the orchestration layer for deployment. Since the main focus of the paper is on the management and orchestration of services in the 5G network, detailed description and management of the Radio Access and Core Network and the Devices layers is out of the scope of this paper. A. User Layer Here we define a set of user roles to interface with the service lifecycle management layer. We consider the following three roles: 1) 5G network operators own the 5G service lifecycle management, orchestration and control components of
  • 4. Fig. 2: A high-level, conceptual view of the architecture of a 5G network, including a service lifecycle management func- tion. The reader should note that in this paper we specifically focus on the service deployment part of the lifecycle manage- ment (i.e. the components filled with white colour) and we expect to address the service operation and decommissioning parts of the lifecycle in upcoming work. the network. They operate the network and are respon- sible for the creation, deployment and management of costumers’ network services. 2) Network resource vendors own and maintain network resources in the network, such as radio equipment and/or network core equipment. They can be current mobile network operators (e.g. WiFi access providers, cloud platform providers), or software vendors. To use their network resources, the vendors can register resources in the network using the 5G Lifecycle Management layer. 3) Customers order services along with the service- requirements specifications from 5G network operators. The orchestration of the network slice and functionality of lifecycle management functions depends on the nature of the ordered service(s) and the role of the user ac- cessing it. For instance, consider that a big organization (i.e. a customer) needs a service to interconnect its employees’ mobile devices in a large corporate network. The requirements could be a combination of an indoor wireless access (from a WiFi access provider) and an outdoor cellular connectivity (e.g. using a set of HSPA capable base stations from a network operator), and some standard switching software (by a cloud provider). The network slice will include the configuration of radio- and cloud assets that interoperate in order to seamlessly serve the customer requirements. B. 5G Service Lifecycle Management Layer We propose two different choices for the 5G lifecycle management system to interface with customers. • The Service Order API that exposes a customer interface for creating Service Level Agreements (SLAs). These agreements are subsequently analyzed in order to create a network slice. The Service Order API can for example be a RESTful API [18] that uses secure authentication and JSON [19] representations for the customer requirements. Third party providers can call this API from their own systems. • A generic web portal that uses the Service Order API described above and a Graphical User Interface (GUI) to showcase an idealized process of capturing customer requirements, negotiating, and creating an SLA. The GUI includes a self-service web portal where customers can specify a set of network requirements, such as the number of devices to be supported, latency and throughput of the network traffic, coverage and network access protocol(s), value added services based on analysis of their device’s traffic (e.g. relative levels of device activity), as well as fi- nancial parameters (e.g. pricing model and budget). Once the customer is satisfied with the service specification, the SLA creation and network slice deployment processes start to deploy the service. Fig. 3: Information flow in the 5G Network Lifecycle Man- agement component for creating and deploying network slices. Figure 3 illustrates the “5G Service Lifecycle Management” layer in more detail, and in particular the process of network service deployment, from capturing customer requirements in an SLA to deploying a new network slice for this SLA. The SLA creation process is assisted by a knowledge management and decision support system integrated to the 5G Service Lifecycle Management layer. The application of knowledge management in context of 5G networks is twofold. (A) It helps in automating the process of capturing high level user requirements of the system and translating them
  • 5. to network requirements. For example, assuming a network service of connected vehicles, the high level requirements would relate to number of vehicles that will be connected through this service, area of coverage, etc., while the network level requirements would be the throughput/latency of the network connections, number of radio base stations that have to be configured to cover the desired area, etc. (B) It offers a white label optimization toolbox, a set of management functions that can be reused by different services. For example, a service routing buses (people logistics) and a service routing trucks (goods logistic) may have overlapping problem-solving approach, which leads to reuse same components from this toolbox. The customer provides a set of requirements and then the decision support system checks whether the status of the avail- able resources in the network can satisfy these requirements. If the requirements cannot be satisfied, then the system suggests an alternative set of requirements to the customer, as close to the original requirements as possible. For example, if a customer requests onboarding of 2000 devices with throughput of 1000 Mbps and the analyser within the 5G Service Lifecycle Management layer shows that it can only guarantee 1000 Mbps for 800 of these devices, it proposes this to the customer. Each device gets an access token, i.e. an encrypted string that identifies the device to the 5G network and lets it access network connectivity services under the requirements specified by the SLA. An example of such a service ordering interface is shown in Section V. For monitoring purpose, the status of the network is con- tinuously reported by the orchestration layer to the knowledge base, and is stored in a relational database. Once an SLA has been created, it is stored in a database, and the deployment process can begin. The algorithm used for the deployment process, uses the SLA requirements (i.e. cus- tomer requirements) and Virtual Network Functions (VNFs) definitions as input and produces a network slice deployment instructions (see Section V). C. Orchestration and Control layers The orchestration and control layer receives network slice deployment instructions and executes them, i.e. deploys the slice on the physical resources. The network slices will mainly consist of VNFs. Additionally, a part of a network slice may also execute on a “bare metal”, i.e. use physically deployed infrastructure instead of virtual environment (e.g. to accom- modate the legacy network functions). A VNF is a self-contained functional component of the network infrastructure (for example core network nodes, policy control functions, load balancers, firewalls, etc.). In addition to pure network functional components, VNFs can provide common computing functionality such as storage (e.g. databases, filesystems), authentication, software development kits (SDKs), etc. Deployment of VNFs can span multiple nodes. An important aspect of VNFs is “chaining”, wherein VNFs can be instantiated and topologically interconnected to form a service (chaining is explained in Section V) [20]. VNFs can be conceptualized as pieces of software executed in one or more virtual machines or containers, replacing the functionality that historically has been implemented as specific dedicated hard- ware components in the core network. We consider them as the building blocks of a network slice. VNF deployments can be complemented by Software Defined Networks (SDNs), which can be seen as analogy of physical network connections, but implemented in software and thus defining logical networks that can potentially share physical resources. The combination of these two virtualization technologies has numerous cost benefits, as it removes dependencies on specific hardware, reduces deployment time and the operations cost. A well known example, is the replacement of physical routers with physical network connections, with virtual router network functions and SDN connections [21]. The VNF descriptions are stored in the knowledge base and are used for reference when generating new network slice deployment instructions. A service description contains the following components: • Deployment instructions: a dependency graph of VNFs the service depends on, each with a corresponding set of resource requirements and deployment instructions. • Network configuration: a configuration of the networks that the service intends to use. • Service parameters: an optional set of service specific functional and non-functional requirements. An example of 3GPP (e.g. HSPA or LTE) mobile net- work service is shown in Figure 4. The real topology, with nodes representing different physical entities is illustrated in Figure 4(a). The virtual description of the topology Figure 4(b) consists of two VNFs, one for an IMS Core Service (networkCoreService type) and one for a 3GPP Radio Access Service (radioService type). Each of the aforementioned VNFs is chained to a set of other VNFs. In case of IMS, three VNFs encompassing the IMS core network (HSS, P-CSCF and S- CSCF nodes) and in case of Radio Access, one VNF repre- senting the network controller (RNC), two VNFs representing base stations (Node-Bs) and two VNFs representing SGSN and GGSN nodes. Both IMS Core and Radio Access services depend on a set of VNFs to be deployed for each, as well as a network configuration defining the networking between the VNFs. Nodes can coexist in a single container (or virtual machine), or can be spread over multiple containers, as dictated by the network configuration. We are considering to use Topology and Orchestration Specification for Cloud Applications (TOSCA) [22] as the language for expressing service deployments in the cloud and investigating different orchestrators such as Cloudify [23], Openstack Heat [24], Docker Compose [25], Canonical JUJU [26]. In the radio access case as illustrated in Figure 4, when the IMS Core Service is deployed, the orchestration creates a new instance in a virtual environment for each VNF. The boxes in the figure denote different components of IMS system. Note that the focus is on describing properties of IMS components,
  • 6. (a) Real Topology of a 3GPP radio access service. (b) Virtual Description of a 3GPP radio access service. Fig. 4: This figure illustrates a real topology of a 3GPP radio access service, consisting of radio access and IMS core network (top) and how this service can be virtualized as a set of VNFs, SDNs and Service descriptions. Moving bottom-up, the SGSN node routes packets from the RNC node towards the SGSN, which converts the packets to an IP format. The packets are then routed to P-CSCF node, which is a signalling (SIP) proxy and the first point of contact in the core network. The P-CSCF routes the packets to the S-CSCF which controls user sessions from registration to routing, policy enforcement, etc. The HSS node is used from S-CSCF as a registrar. not the functionality of the components. For the 3GPP Ra- dio Access Service based on its deployment description, the orchestration reserves resources of the radio assets. In this case, the Node-B 1 and Node-B 2 VNF instances are not created anew, but instead the physical radio resources are used (one instance represents for example one Node-B). The network configuration description of the IMS Core Service explains how various VNFs (i.e. HSS, S-CSCF and P-SCSF) are interconnected and communicate. The 3GPP Radio Access Service network configuration describes how the radio network is configured. The 3GPP service network configuration links the above two configurations together. V. AN EXAMPLE CASE A. Prototype Implementation Fig. 5: The functional view of the architecture of our prototype 5G system. In this section, we present our implementation of the architecture suggested in Section IV. Figure 5 illustrates the functional view of the implemented architecture. We describe the three parts of the user interface at the top layer. The service creation interface allows for creation of new services, and storage of these services in the service description database. A service consists of a textual description together with a set of requirements (for example numerical values or a range of values). The service description is currently stored in a relational database, but we will be transitioning to a more sophisticated description format such as XML-based USDL [27] or business TOSCA. The customer interface allows for negotiation of SLAs and subsequent deployment of services as virtual resources in the cloud infrastructure. The cloud infrastructure consists of a set of servers forming a cluster controlled by Openstack [28], an infrastructure as a service provider, while Cloudily is set up on top as a platform provider. Cloudify accepts the descriptions of topologies as input, e.g. a number of servers and their network connections and interfaces with Openstack to deploy these topologies. The topologies are described in TOSCA language, as mentioned previously. The service monitoring and decommissioning interface al- lows to monitor the service throughout its lifetime and de- commission it upon request. The monitoring aspect of the service utilizes Ceilometer [29] which is part of Openstack.
  • 7. Fig. 6: Conceptual user interface presented to a customer of the example “traffic priority” service. Ceilometer collects metering information about CPU, Mem- ory, Disk and Network utilization of both physical and virtual resources. The information is later on stored and processed by the ELK [30] stack. The decommissioning allows for decommissioning of services by interfacing with cloudify API. Note that the prototype implementation includes a stub for radio assets (i.e. GGSN, SGSN, RNC and Node-B as presented in the previous section), where these assets are virtualized, using the NS-3 network simulator [31]. This allows for testing of the implementation without using real Node-Bs which are expensive and difficult to procure (due to licensed spectrum issues). The authors plan to extend the prototype system to using real Node-Bs in a controlled test site in the suburb of Kista, Stockholm, Sweden in the future. B. End-to-end service provisoning This section describes the process of service deployment from capturing high-level user requirements, to matching those requirements to an NFV topology in the 5G Service Lifecycle Management layer and eventually sending a description of this topology to be deployed as a network slice in the underlying orchestrator. The purpose is to illustrate currently ongoing work and ideas on how service deployment may look like from an end-user perspective on the architecture described in the previous sections. As an example use case, we are considering a radio access service which can be parametrized by different traffic priority classes. Instead of specifying network-level QoS requirements, customers use a web portal to specify expected quality of experience (QoE), which includes a high level indicator of the intended use of the service (e.g. high-definition video streaming, best effort web browsing, etc.), coverage, as well as value added services such as basic data analytics (starting from simple storage of data to identification of peak data transfer hours, most active devices per day, etc.). Figure 6 illustrates a conceptual interface, currently under implementation, presented to customers of this service. The map illustrated on the right hand side of the figure can be used as canvas for users to designate the desired area of radio coverage, while on the left hand side, the users can describe the quality desired from the network using high level requirements. Additionally, basic data analytics services can be orchestrated and deployed in the corresponding cloud infrastructure. Finally, a slider can be used from the users to indicate the scale of the deployment. The service can thus support users of different size and requirements, from private individuals, to small and medium enterprises up to large corporations. Table I illustrates potential users of the service that may have different requirements. TABLE I: Potential users of the traffic priority service. Customer Type Description of Service Requirements Private Individual Basic connectivity for personal, mobile devices while roaming in the area. One traffic class, Best Ef- fort, no additional ser- vices, 2 devices. City bus transport authority Scheduling of 50 buses based on demand of pas- sengers waiting in bus stops rather than fixed schedules. One traffic class, mission critical data, including subscriber mobility analytics and storage of critical data for troubleshooting, 50 devices. Mining Company Mining company would like to automate vehi- cles carrying mined ore from the mining site to a nearby depot. The net- work to support these ve- hicles includes both pri- oritized traffic (mission critical data and media streams of cameras at- tached to vehicles for monitoring purposes). Two traffic classes, me- dia streaming and mission critical data, including ba- sic data storage of critical data for troubleshooting if needed, 100 devices.
  • 8. VI. CONCLUSIONS AND FUTURE WORK The 5G networks will connect billions of devices and will provide connectivity services to Internet of Things (IoT) applications from different industry segments with varying criticality and heterogeneous sets of network quality require- ments (i.e. latency and bandwidth). As such, 5G network operators will need to address the problem of simultaneously managing network services for diverse customer segments with different requirements throughout their lifecycle. In this position paper, we have presented current state of our work on automating the network service lifecycle management for such networks using knowledge management- and decision support techniques. This automation will provide flexibility in service deployment and decommissioning, reduce deployment time from months and weeks to minutes and seconds, and support better QoS control. Specifically, we have focused on the part of the management process that includes: capturing of service driven network requirements by establishing Service Level Agreements (SLAs). This includes SLA negotiations, handled by a knowledge management system, when the cos- tumer requirements can not be fulfilled due to insufficient network resources. Further, it includes the creation of network slice deployment instructions for a given SLA in the 5G network in the form of a workflow, i.e. a sequence of steps for the network resource orchestration. Currently, we are implementing our ideas using orches- trators (such as Cloudify [23], Openstack Heat [24]), and a language to express the network slice descriptions (e.g. TOSCA [22]). In the future, we plan to develop the knowledge management by translating service description and require- ments specified by a user into exact configuration of resources and service chains of VNFs. We also intend to evaluate the complete implementation on a real network in the context of a real use case. Once the implementation is completed and the basic functionality is evaluated for correctness, the next step will be to extend the work towards other layers of the lifecycle management, such as network operations monitoring and assurance of SLA fulfilment. Adding support for more user roles can form another direction of the future work. REFERENCES [1] Thibaut Kleiner. 5G Research in Horizon 2020, http://ec.europa.eu/information society/newsroom/. European Commission, 2014. [2] Dam Warrem and Calum Dewar. Understanding 5g: Perspectives on future technological advancements in mobile. Technical report, GSMA, December 2014. [3] Ericsson. 5G: What is it ? More than just improving perfor- mance and greater flexibility, the next generation is a shift in mind- set, http://www.ericsson.com/res/docs/2014/5g-what-is-it.pdf. Ericsson Whitepaper, October 2014. [4] J. Wielemaker. Logic programming for knowledge-intensive inter- active applications. PhD thesis, University of Amsterdam, 2009. http://dare.uva.nl/en/record/300739. [5] A. Grignard, P. Taillandier, B. Gaudou D. A. Vo, N. Q. Hyunh, and A. Drogoul. GAMA 1.6: Advancing the Art of Complex Agent-Based Modeling and Simulation. In PRIMA 2013: Principles and Practice of Multi-Agent Systems, volume 8291 of Lecture Notes in Computer Science, pages 117–131. Springer, 2013. [6] G. Behrmann, A. David, K. G. Larsen, O. M¨oller, P. Pettersson, and W. Yi. UPPAAL - present and future. In Proc. of 40th IEEE Conference on Decision and Control. IEEE Computer Society Press, 2001. [7] NetWorld 2020. European technology platform for communications networks and services, “5g: Challenges, research priorities, and recommendations”. In NetWorld 2020 ETP, http://networld2020.eu/wp- content/uploads/2014/02/NetWorld2020 Joint-Whitepaper-V public- consultation.pdf, August 2014. [8] Ericsson. 5g sytems: Enabling industry and society transformation. In Erisson White Paper, pages 3–14, January 2015. [9] B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer. Xen and the art of virtualization. In ACM Symposium on Operating Systems Principles (SOSP), 2003. [10] T. Cucinotta, F. Checconi, and D. Giani. Improving responsiveness for virtualized networking under intensive computing workloads. In Proceedings of the 13th Real-Time Linux Workshop, 2011. [11] Z. Gu and Q. Zhao. A state-of-the-art survey on real-time issues in embedded systems virtualization. Journal of Software Engineering and Applications (JSEA), 5:277–290, 2012. [12] R. Inam, N. Mahmud, M. Behnam, T. Nolte, and M. Sj¨odin. The multi-resource server for predictable execution on multi-core platforms. In 20th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pages 1–11, IEEE, April 2014. [13] Z, L. Almeida Iqbal, and M. Behnam. Designing network servers within a hierarchical scheduling framework. In The 30th ACM/SIGAPP Symposium On Applied Computing (SAC), 2015. [14] F. Santos, L. Almeida, and L.S. Lopes. Self-configuration of an adaptive tdma wireless communication protocol for teams of mobile robots. In Emerging Technologies and Factory Automation, 2008. ETFA 2008. IEEE International Conference on, pages 1197–1204, 2008. [15] Ericsson. Introduction to IMS. White Paper, 2007. [16] Rafia Inam, Moris Behnam, Thomas Nolte, and Mikael Sj¨odin. Compo- sitional analysis for the multi-resource server. In 20th IEEE International Conference on Emerging Technologies and Factory Automation, 2015. [17] IEEE. Ieee 802.15 working group for wpan. http://grouper.ieee.org/groups/802/15/, May 2015. [18] Roy Thomas Fielding. Chapter 5: Representational state transfer (rest). Architectural Styles and the Design of Network-based Software Architectures (Ph.D.), 2000. [19] Ed. T. Bray. The javascript object notation (json) data interchange format. Internet Engineering Task Force (IETF), Request for Comments: 7159, ISSN: 2070-1721, 2014. [20] ETSI. Network Functions Virtualisation (NFV). White Paper, October 2013. http://portal.etsi.org/NFV/NFV White Paper2.pdf. [21] Ericsson. Ericsson virtual router, http://archive.ericsson.net/service/internet/picov/get?docno=1/28701- fgb1010557&lang=en&highestfree=y. Ericsson Brochure, 2014. [22] Topology and Orchestration Specification for Cloud Applications (TOSCA), October 2011. http://www.oasis- open.org/committees/tc home.php?wg abbrev=tosca. [23] Cloudify: A cloud application orchestrator. http://getcloudify.org. [24] Heat: Openstack orchestration service. https://wiki.openstack.org/wiki/Heat. [25] Docker Compose: a tool for defining and running complex applications with Docker. https://docs.docker.com/compose/. [26] Juju: a service orchestration tool for cloud environments. http://www.ubuntu.com/cloud/tools/juju. [27] Srividya Kona, Ajay Bansal, Gopal Gupta, and Thomas D Hite. Web service discovery and composition using usdl. In E-Commerce Technol- ogy, 2006. The 8th IEEE International Conference on and Enterprise Computing, E-Commerce, and E-Services, The 3rd IEEE International Conference on, pages 65–65. IEEE, 2006. [28] Openstack IaaS. https://www.openstack.org. [29] OpenStack Telemetry (Ceilometer). https://wiki.openstack.org/wiki/Ceilometer. [30] Elasticsearch, Openstack and Kibana product download page. https://www.elastic.co/products. [31] ns-3 is a discrete-event network simulator for Internet systems. https://www.nsnam.org.