Sunteți pe pagina 1din 54

Network Slicing Use Case

Requirements
April 2018
2
Executive Summary
Creating smart 5G networks Requirements for each use case were
analysed, quantified where possible and
Network Slicing is set to be a prominent feature
categorised into performance, functional and
of 5G to allow connectivity and data processing
operational requirements.
tailored to specific customers’ requirements.
Mobile communications provided by smart Defining a common starting point
networks will enhance the efficiency and
This paper proposes the adoption of a “generic
productivity of business processes and will
slice template” that the industry can use as
open up opportunities for operators to address
universal description. A generic slice template
the Business to Business segment more
provides a universal description of a network
effectively.
slice type that can be used by infrastructure
The Business Opportunity size vendors, mobile network operators and slice
buyers. When populated with values for all or a
In the 5G era, different industry verticals are
subset of the attributes, the generic slice
seeking to leverage the power of technology to
descriptor can serve many purposes:
boost productivity across swathes of the
economy. Network Slicing builds on this  Infrastructure vendors, can use the
expectation, and together with the promise of descriptor to define the features of their
Massive IoT and ultra-reliable/low latency products
services, will support the digital transformation  The slice buyer can use the descriptor as a
and mobilisation of industry vertical customers. reference for SLA/contractual agreements
The GSMA estimates that in combination with with the operator
other enablers and capabilities, Network  Operators can exchange slice descriptors
Slicing will permit operators to address a with their roaming partners facilitating the
revenue opportunity worth $300bn by 2025. support of service continuity when moving
between networks.
Understanding the customers’ needs The generic slice template will also serve as a
The possibility of tailoring mobile network baseline for the definition of a set of
properties to the needs of the business through standardised service/slice types.
the configuration of a large set of parameters This study has also been used to identify the
offers unsurpassed flexibility. However, with use cases that can be served by the same
such a diverse range of possible requirements network slice type as well as use cases that
from verticals, operators will need to manage are likely to require simultaneous support,
risks from excessive complexity in the service something referred to as a “network slice
offering and cumbersome management, bundle”. A network slice bundle describes the
leading to higher costs. family of network slice types required to serve
In this paper, the GSMA sets out to understand a group of use cases, for example a network
the service requirements expressed by slice bundle for a vehicle will include slices
business customers from different vertical supporting; a high-reliability telemetry service,
industries in several key sectors including a high bandwidth infotainment service, a low
energy, IoT, automotive, manufacturing and latency “vehicle to network to X” service, a
many more. super low latency vehicle to vehicle, etc.

3
Acknowledgements
Special thanks to the following GSMA Network Slicing Taskforce members for their contribution
and review of this document:
 AT&T Mobility  MediaTek Inc.
 BlackBerry Limited  Metaswitch Networks
 China Mobile Limited  Nokia
 China Telecommunications Corporation  NTT DOCOMO Inc.
 China Unicom  Orange
 Cisco Systems  Qualcomm Incorporated
 Deutsche Telekom AG  Radiomóvil Dipsa
 EE Limited  S.A. de C.V.
 Emirates Telecommunications Corporation  Samsung Electronics Co Ltd
(ETISALAT)
 SK Telecom Co. Ltd.
 Ericsson
 Sprint Corporation
 Gemalto NV
 Starhome Mach
 OPPO
 Syniverse Technologies Inc.
 Hong Kong Telecommunications (HKT)
 Telecom Italia SpA
Limited
 Telefónica S.A.
 Huawei Technologies Co Ltd
 Telenor Group
 Hutchison 3G UK Limited
 Telia Finland Oyj
 Intel Corporation
 United States Cellular Corporation
 Jibe Mobile Inc.
 Verizon Wireless
 KDDI Corporation
 Vodafone Roaming Services
 KT Corporation
 ZTE Corporation
 Kuwait Telecom Company (K.S.C.)

4
Contents
Executive Summary ................................ 3 Summary of requirements ............................. 30
Acknowledgements ................................ 4 Public Safety.......................................... 31
Contents .................................................. 5 Overview .......................................................... 31
Use Cases ........................................................ 31
Introduction ............................................. 7 Summary of Requirements ............................ 32
High-level view on Network Slicing .................7
Smart Cities ........................................... 32
Abbreviations .....................................................8
Overview .......................................................... 32
References ...................................................... 10
Use cases ........................................................ 32
Terminology .................................................... 11
Summary of requirements ............................. 33
Network Slicing: exploring the business
Industry recommendations and
case ........................................................ 13
reshaping the Network Slicing concept
Sizing the Network Slicing opportunity ........ 13
Network Slicing is part of the investment case 35
for 5G ............................................................... 14 Requirements analysis ................................... 35
Go-to-market Strategy .................................... 14 Operational requirements .............................. 39
Avoiding the commercial shortcomings of Generic Network Slicing template ....... 41
previous QoS type solutions ......................... 15 Cross-Standardisation Collaboration
Standardisation Landscape ................. 17 Recommendations ................................ 42
Vertical Industry Organisation ...................... 17 Coordination from System Architecture
Telecom Industry Organisation ..................... 17 Perspective ...................................................... 42
Standards Developing Organisation ............ 18 Coordination from Management Perspective
Telecom Industry Organisation ........... 21 .......................................................................... 42
AR/VR..................................................... 21 Coordination from Security Perspective ...... 43
Overview .......................................................... 21 Coordination between SDOs and Open
Use cases ........................................................ 21 Source .............................................................. 43
Automotive ............................................ 23 Other recommendations ....................... 44
Overview .......................................................... 23 Network Slicing Concept Evolution ..... 44
Use Cases ........................................................ 23 Operational isolation vs. network level
Summary of requirements ............................. 25 isolation ........................................................... 44
Energy.................................................... 25 Not a network slice for each vertical customer
Overview .......................................................... 25 .......................................................................... 45
Use Cases ........................................................ 25 Number of slices supported by the 5G system
Summary of requirement ............................... 27 .......................................................................... 45
Healthcare ............................................. 27 Network slice deployment ............................. 45
Overview .......................................................... 27 Regulatory aspects ............................... 48
Use cases ........................................................ 27 Net Neutrality................................................... 48
Summary of requirements ............................. 27 Quality of Service............................................ 48
Industry 4.0, Manufacturing ................. 28 Cross-Border Data Transfers ........................ 49
Illegal Content ................................................. 50
Overview .......................................................... 28
Summary .......................................................... 51
Use cases ........................................................ 28
Summary of requirements ............................. 29 Next steps .............................................. 53
Internet of Things for Low Power Wide Annex A Document Management ....... 54
Area Applications ................................. 29
Overview .......................................................... 29
Use cases ........................................................ 29

5
1
Introduction

6
Introduction
5G networks, in combination with Network  Chapter 2 explores the business cases for
Slicing, permit business customers to enjoy Network Slicing, which could potentially
connectivity and data processing tailored to change the way network operators do their
their specific business requirements. It is business and to enable new business
expected that providing tailored services to models.
business customers has significant commercial  Chapter 3 gives a snapshot of the
potential. standardisation landscape with respect to
The main purpose of this document is to Network Slicing and covers vertical industry
provide a comprehensive overview about the organisations, telecom industry
service requirements expressed by business organisations as well standards developing
customers from different vertical industries - organisations.
consumers are purposefully not addressed.  Chapter 4 summarises the results of the
These requirements have been collected study the GSMA conducted on the service
through discussions and interviews as well as requirements analysis for different vertical
analysis of available white papers. In addition, industries.
these requirements were analysed in detail and  Chapter 5 represents the core part of this
industry recommendations are deviated document, which aims to analyse the
thereof. The paper also provides an overview service requirements and provides
of the standardisation landscape of Network recommendations towards the industry. It
Slicing, business model considerations and also discusses the idea of the generic slice
regulatory needs. Security, privacy and liability template.
have also been covered in this paper. Finally,  Chapter 6 provides an overview about the
the generic slice template concept is briefly policy aspects around Network Slicing such
introduced which contains all the potential as net neutrality.
attributes a network slice could have. This  Chapter 7 concludes the document and
gives us a baseline for all network slices provides details about the planned next
offered to customers by specifying the values steps.
that each parameter would take for a given
slice instance. High-level view on Network Slicing
This document is the successor of previous From a mobile operator’s point of view, a
documents [1], [2] which are written from the network slice is an independent end-to-end
customer perspective and which define what logical network that runs on a shared physical
Network Slicing is and what Network Slicing infrastructure, capable of providing an agreed
could offer to the customers. service quality. The technology enabling
The document is structured as follows: Network Slicing is transparent to business
customers for whom 5G networks, in
 Chapter 1 introduces the paper and
combination with Network Slicing, allow
provides a brief summary of the Network
connectivity and data processing tailored to the
Slicing definition coming from the previous
specific business requirements. The
papers and the terminology used
customisable network capabilities include data
throughout the document.
speed, quality, latency, reliability, security, and
services. These capabilities are always

7
provided based on a Service Level Agreement It is anticipated that mobile network operators
(SLA) between the mobile operator and the could deploy a single network slice type that
business customer. satisfies the needs of multiple verticals, as well
as multiple network slices of different types that
A network slice could span across multiple
are packaged as a single product targeted
parts of the network (e.g. access network, core
towards business customers (a business
network and transport network) and could be
bundle) who have multiple and diverse
deployed across multiple operators. A network
requirements (for example a vehicle may need
slice comprises of dedicated and/or shared
simultaneously a high bandwidth slice for
resources, e.g. in terms of processing power,
infotainment and an ultra-reliable slice for
storage, and bandwidth and has isolation from
telemetry, assisted driving).
the other network slices.

Abbreviations

Term Description ETSI European Telecommunications


Standards Institute
3GPP Third Generation Partnership
EU European Union
Project
FMC Fixed mobile convergence
3GPP RAN Third Generation Partnership
Project Radio Access Network eMBB Enhanced Mobile Broad Band
3GPP SA Third Generation Partnership GDP Gross Domestic Product
Project Service & Systems GPS Global Positioning System
Aspects
GST Generic Slice Template
4G 4th Generation Mobile Network
HMI Human-machine interface
5G 5th Generation Mobile Network
ICT Information and Communication
5GAA 5G Automotive Association Technologies
AMF Access and Mobility Management IEEE The Institute of Electrical and
Function Electronics Engineers
APEC Asia-Pacific Economic IETF Internet Engineering Task Force
Cooperation
IoT Internet of Things
API Application Programming
IntServ Integrated Services
Interface
IIC Industrial Internet Consortium
AR Augmented Reality
IP Internet Protocol
AN Access Network
IPR Intellectual Property Rights
BBF Broadband Forum
ISG Industry Specification Group
C2C Control-to-control
ISP Internet Service Provider
CN Core Network
ITU International Telecommunication
CV2X Cellular vehicle-to-everything
Union
D2D Device to device
ITU-T ITU Telecommunication
DiffServ Differentiated services Standardisation Sector
E2E End-to-End KPI Key Performance Indicator
EPS Evolved Packet System L3VPN Layer 3 VPN

8
LPWA Low Power Wide Area QoS Quality of Service
LTE Long Term Evolution RTT Round-trip Time
MANO Management and Orchestration SDN Software Defined Networks
MBB Mobile Broadband SDO Standards Developing
MCPTT Mission Critical Push to Talk Organisation

MDM Multiple Dedicated Networks SLA Service Level Agreement

MEC Multi-access Edge Computing SLR Service Level Reporting

MEF Metro Ethernet Forum SR Segment Routing

mMTC Machine Type Communications SST Service Slice type

MTC Machine Type Communication TN Transport Network

NB-IoT Narrow Band IoT TETRA Terrestrial Trunked Radio

NC New Core UE User Equipment

NFV Network Function Virtualisation UPF User Plane Function

NF Network Function URLLC Ultra Reliable Low Latency


Communications
NGFI Next Generation Fronthaul
Interfaces V2X Vehicle to X (e.g. Vehicle,
Infrastructure, Pedestrians)
NGMN Next Generation Mobile Network
VoLTE Voice over LTE
NR New Radio
VPN Virtual Private Network
NSI Network Slice Instance
VR Virtual Reality
OEM Original Equipment Manufacturer
WG Working Group
OSM Open Source Management and
Orchestration (MANO) ZVEI Zentralverband Elektrotechnik
und Elektronikindustrie -
ONAP Open Network Automation Germany's Electrical Industry
Platform
OTT Over The Top
PRD Permanent Reference Document
PPDR Public Protection and Disaster
Recovery
QCI Quality of Service Class Identifier

9
References

Ref Title
[1] Smart 5G networks: enabled by Network Slicing and tailored to customers’ needs
[2] An Introduction to 5G Network Slicing
[3] http://5gaa.org/
[4] https://www.zvei.org/en/
[5] http://www.iiconsortium.org/
[6] https://www.tmforum.org/
[7] https://www.broadband-forum.org/
[8] http://www.etsi.org/technologies-clusters/technologies/nfv
[9] https://portal.etsi.org/tb.aspx?tbid=862&SubTB=862
[10] 5GPPP Project 5GCAR, “Deliverable D2.1: 5GCAR Scenarios, Use Cases, Requirements
and KPIs”.
[11] 5G-PPP White Paper on Automotive Vertical Sector, “5G Automotive Vision”, Oct. 2015
[12] 3GPP TR 22.886 V15.1.0, “Study on enhancement of 3GPP Support for 5G V2X Services”
[13] 3GPP TS 22.186 V15.2.0, “Enhancement of 3GPP support for V2X scenarios”
[14] 3GPP TS 22.185 V14.3.0, “Service requirements for V2X services”
[15] 5GPPP White paper, “5G and Energy”, Sep 2015
[16] 3GPP TS 22.261 V16.1.0, “Service requirements for the 5G system”
[17] Perspectives on Vertical Industries and Implications for 5G”, 06/2016.
https://www.ngmn.org/fileadmin/user_upload/160610_NGMN_Perspectives_on_Vertical_In
dustries_and_Implications_for_5G_v1_0.pdf
[18] 3GPP TS 22.804, “Study on Communication for Automation in Vertical Domains”
[19] What is the Internet of Things
https://www.gsma.com/iot/wp-content/uploads/2016/09/What-is-the-Internet-of-Things.pdf
[20] 3GPP Low Power Wide Area Technologies
https://www.gsma.com/iot/wp-content/uploads/2016/10/3GPP-Low-Power-Wide-Area-
Technologies-GSMA-White-Paper.pdf
[21] ETSI Multi-access Edge Computing (MEC)
http://www.etsi.org/technologies-clusters/technologies/multi-access-edge-computing
[22] ONAP https://www.onap.org/
[23] OSM: https://osm.etsi.org/
[24] ETSI ISG “MEC support for network slicing
https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=53580
[25] Zero-touch Network and Service Management – Introductory White Paper, December 7,
2017
https://portal.etsi.org/TBSiteMap/ZSM/OperatorWhitePaper
[26] NGMN Alliance, “5G End-to-End Architecture Framework”, 10/2017.
[27] Huawei iLab, “Cloud VR–oriented Bearer Network White Paper”, 2017.11.02

10
[28] 3GPP TS 33.501, 0.7.0, “Security architecture and procedures for 5G System”
[29] http://www.ieee802.org/1/pages/802.1as.html
[30] https://standards.ieee.org/findstds/standard/1588-2008.html
[31] 5G Network Slicing for Vertical Industries
https://gsacom.com/paper/5g-network-slicing-vertical-industries/
[32] China Telecom, China’s State Grid, and Huawei, “5G Network Slicing Enabling the Smart
Grid”, January 22, 2018

Terminology  Network Slicing provider: Typically a


telecommunication service provider, is the
 Network Slice: A network slice is a logical
owner or tenant of the network
network that provides specific network
infrastructures from which network slices
capabilities and network characteristics in
are created. The Network Slicing provider
order to serve a defined business purpose
takes the responsibilities of managing and
of a customer. Network Slicing allows
orchestrating corresponding resources that
multiple virtual networks to be created on
the Network Slicing consists of.
top of a common shared physical
infrastructure. A network slice consists of  Business customer: A business customer
different subnets, example: Radio Access tenants the network slice, e.g. customers
Network (RAN) subnet, Core Network (CN) from vertical industries. For instance, a
subnet, Transport network subnet. business customer could be an enterprise
or specialised industry customer (often
referred to as “verticals”).

11
2
Network Slicing:
exploring the business
case

12
Network Slicing: exploring the business case
Sizing the Network Slicing opportunity services, will support the transformation of
vertical industries.
Network Slicing is integral to unlocking the
enterprise opportunity ($300bn by 2025) for
To unlock this opportunity, Network Slicing
the 5G era. Already, the industry expects the
will enable operators to create pre-defined,
enterprise segment to be the most important
differing levels of services to different
source of incremental revenue opportunity in
enterprise verticals, enabling them to
the 5G (Figure 1). Network Slicing is one of
customise their own operations.
the 5G era tools and enablers that will
support operators to unlock the enterprise However, the opportunity could become even

Figure 1: New incremental revenue opportunities in 5G to come from the enterprise segment

opportunity. bigger. Automation and the ability to quickly


create slices could pave the way for
In the 5G era, different industry verticals are
operators to dynamically package and
seeking to leverage the power of technology
repackage network capabilities for different
to boost productivity across swathes of the
customers. This is the end goal of Network
economy. Network Slicing builds on this
Slicing.
expectation, and together with the promise of
Massive IoT and ultra-reliable/low latency

Figure 2: The role of collaboration in the investment case for Network Slicing

13
Network Slicing is part of the investment Network Slicing marginal to the broader
case for 5G investment case for 5G. This is an important
consideration because building a new
There are three considerations about the
investment case to retrofit an already
investment case for Network Slicing,
deployed network is difficult and slow. That is
especially given the potential complexity and
the lesson learned from the past where
cost of the required automation.
VoLTE launches were decoupled from LTE
launches (compared to 2G/3G voice
Firstly, ongoing industry activities to services).
standardise Network Slicing should gear

Figure 3: Stages of the Network Slicing go-to-market strategy

towards minimising the complexity of the Go-to-market Strategy


technical solution so that adoption can be
There are three stages to the Network Slicing
made relatively easy.
go-to-market strategy. These stages deliver
Secondly, the GSMA is working with its value across the Value Chain, and may
members to streamline the commercial happen in parallel depending on local market
deployment scenario for Network Slicing in conditions:
order to drive economies of scale and reduce
Deploy Network Slicing for internal use: This
unitary cost of deployment.
will prove the validity of Network Slicing by
Thirdly, operators and their vendors are using the solution to serve internal customers
working to make the cost of deploying within an operator or the operator’s sister

Figure 4: Factors that could impact commercial adoption of Network Slicing


14
companies. This option offers a low risk solution and seek market validation before
opportunity to experiment and to validate the they buy.
proposition in order to refine it ahead of
Avoiding the commercial shortcomings of
rollout to commercial customers.
previous QoS type solutions
Upsell Network Slicing capabilities to existing
The telecoms industry has had a history of
enterprise customers: This will prove value to
creating technical solutions that can offer
existing enterprise customers and based on
differentiated service levels to different
the typical buying behaviour of business
customers e.g. DiffServ, IntServ, QCI etc. Yet
customers, upselling Network Slicing
despite fully developed technical solutions,
capabilities to these customers ought to be
there is no evidence of widespread
an easier opportunity than targeting new
commercial use of any of these solutions in
customers. These customers can then
the industry.
become proof points and advocates for the
new capabilities. If Network Slicing is to avoid the same
shortcomings, the industry needs to move
Sell to new enterprise customers: When
fast to overcome the technical, commercial
commercially ready, slicing will be made
and regulatory factors that could impede
more broadly available to enterprise
progress.
customers who often require a proven

15
3
Standardisation
landscape

16
Standardisation Landscape
Network Slicing is a concept for running Vertical Industry Organisation
multiple logical customised networks on a Network Slicing aims to support various
shared common infrastructure complying with vertical industries in the 5G era, hence the
agreed Service Level Agreements (SLAs) for direct requirements from vertical industries
different vertical industry customers (or are essential for Network Slicing designs. 5G-
tenants) and requested functionalities. To awareness has been developed among
achieve this goal, Network Slicing needs to be different vertical industries. For instance, 5G
designed from an End-to-End (E2E) Automotive Association (5GAA), created in

Figure 5: Network Slicing Relevant Industry Groups and SDOs Landscape

perspective, spanning over different technical September 2016, aims at a global, cross-
domains (e.g., access network, core network, industry Organisation of companies from the
transport network and network management automotive, technology, and
system) as well as administrative domains telecommunications industries (ICT), working
(e.g., pertaining to different mobile network together to develop end-to-end solutions for
operators). Figure 5 illustrates a snapshot of future mobility and transportation services [3].
various groups and organisations relevant to In Nov 2017, the first Network Slicing
Network Slicing development. workstream was established in 5GAA WG5 to
understand the business aspects of Network
Even though many organisations are tackling Slicing in automotive industry. Manufacturing
Network Slicing issues as discussed above, industry organisations like Zentralverband
they also notice that Network Slicing issues Elektrotechnik und Elektronikindustrie (ZVEI)
cannot be resolved in a single entity. [4] and Industrial Internet Consortium (IIC) [5]
Therefore, they should be liaised between also started to engage with 5G for next
them. The relationship among different generation smart manufacturing solutions.
industry platforms and SDOs is shown in Telecom Industry Organisation
Figure 6.
Telecom Industry Organisations like the
In the following sections more details about GSMA and NGMN (Next Generation Mobile
the vertical industry and telecom industry Networks) describe the business drivers,
organisations as well as the standards concepts, and high-level requirements of E2E
developing organisations will be provided. Network Slicing from the operator’s point of
view. The GSMA has initiated the Network
17
Slicing Taskforce (NEST) project to Standards Developing Organisation
harmonise slicing definition, identify slice
Various technologies and innovations from
types with distinct characteristics and
different technical domains have substantially
consolidate parameter and functionality
contributed to the Network Slicing progress in
requirements. The NEST aims at generating
different Standards Developing Organisations
a Permanent Reference Document (PRD) to
(SDO). Currently, technical specifications of
guide future Network Slicing standards.
those domains are defined in corresponding
The NGMN Alliance is developing, SDOs, namely, Radio Access Network (RAN)
consolidating and communicating and Core Network (CN) by 3GPP, Transport
requirements to ensure that customer needs Network (TN) by BBF and IETF, etc. ITU-
and expectations on mobile services are T(GSTR-TN5G), IEEE(NGFI 1914), MEF and
fulfilled. The Alliance actively drives global other SDOs are working on this topic as well.
alignment and convergence of technology The major SDOs will be introduced in the
standards and industry initiatives with the following sections.
objective to avoid fragmentation and to
guarantee industry scale. 3GPP
3GPP could be considered as the
TM Forum ZOOM project [6] has started a forefront ambassador for Network Slicing.
workstream to analyse Network Slicing There are many Working Groups in 3GPP
business models and business scenarios of related with Network Slicing. In 3GPP
high interest to service providers, vertical SA1, Network Slicing related use cases

Figure 6: SDO relationship figure

industries, and other potential Network and requirements are defined. In 3GPP
Slicing consumers. A number of user stories RAN1/2/3, the RAN slicing-awareness
have been generated, and respective features are discussed. In 3GPP SA2, the
requirements have been derived and mapped fundamental system architecture choice to
to TM Forum Assets. support Network Slicing is specified. For

18
instance, the fundamental network mechanism may be standardised to meet
functions and procedures to support slice such requirement.
selection/access, session management
Another work in IETF is primary to define the
within network slices, as well as the
interface between the 3GPP slicing
terminal behaviour, e.g. a UE could
management system and TN slicing
support maximum eight slices in parallel,
management system. For the IP transport
and a common core network function is
network, this interface is the northbound
defined, i.e. AMF, for one UE to be
interface of TN slicing management system
capable to use all slices.
defined in BBF.
The 3GPP SA5 Working Group are
responsible for completing the creation ETSI
and management of slices in the 3GPP ETSI ISG NFV
realm and for driving the coordinating with The ETSI NFV ISG (Network Function
other relevant SDOs to generate complete Virtualisation) [8] is responsible for
E2E network slices. SA3 Working Group providing technical solutions for
[28] are responsible for security resources such as computing and
capabilities of E2E Network Slicing that storage for Network Slicing. They
require triggering and coordination with consider NFV is a key enabler for the
ETSI ISG NFV on isolation of Network 5G infrastructure. However, further
Slices. work is still required to understand
how NFV technology supports
BBF
Network Slicing, analyses the impacts
BBF’s [7] main scope in Network Slicing is
to the current NFV architecture and
to clarify the requirements for 5G bearer
standardises the NFV slicing resource
networks and defines the related TN
layer. Including security and reliability-
slicing management architecture. The
related features such as virtualisation
BBF should establish formal cooperation
level security isolation scheme,
with 3GPP to facilitate the transmission
function orchestration of virtual border
requirements from 3GPP and coordinate
gateway (such as firewall),
the interface requirements between the
deployment and configuration
3GPP slicing management system and
strategy.
Bearer slicing management system,
including corresponding slicing creation ETSI ISG ZSM
and management processes. The In Dec 2017, ETSI created the Zero
technical definition for a specific interface touch network and Service
is not within the scope of the BBF Management Industry Specification
standardisation, but they can recommend Group (ZSM ISG) [9]. This initiative
the potential options. aims to resolve the 5G E2E Network
Slicing management issue. Their
IETF vision is to enable full automation in
To support Network Slicing, the IP router terms of delivery, deployment,
should be enhanced, which will extend configuration, assurance, and
existing protocols, such as Segment optimisation of network services.
Routing (SR) and L3VPN. Furthermore,
potentially DetNet is a candidate
technology for transporting traffic of
URLLC slice type. Extension or new

19
4
Vertical Requirements

20
Telecom Industry Organisation
This chapter briefly summarises different the status of the different verticals is different
vertical industries, their most important use while some have very concrete ideas about
cases and their most important service use cases and requirements with concrete
requirements. The intention is not to provide values associated to them some have vague
very detailed information, but instead give an ideas with initial indications. More
idea about the biggest challenges for each discussions and analysis are required in the
vertical industry. References to more detailed future to complement the list of verticals as
information are provided where available. well as details about the requirements and
use cases.
It should be noted that the list of verticals is
not complete but can be considered as a
snapshot of the current status. In addition,

AR/VR
It should be noted that AR/VR is not a vertical Use cases
industry in itself. Instead AR/VR use cases
can be found in almost all of the vertical Strong-Interactive VR: Audio-visual
industries. However, these use cases are so interaction
important that they are discussed in a Audio-visual interaction is characterised by a
separate section. human being interacting with the environment
or people, or controlling an UE, and relying
Overview on audio-visual feedback. In order to achieve
Augmented Reality (AR) is a technique where the VR environments with low motion-to-
the real world view is augmented, or assisted, photon requirements, the 5G network slice
by a computer generated views, this can be should have the capability of motion-to-
in single or multi-sensory modes including, photon latency in the range of 7-15ms while
auditory, visual, and haptic. maintaining the 250Mbps user data rate and
motion-to-sound delay less than 20ms.
Virtual Reality (VR) is the technology to
construct a virtual environment, which may During voice conversions, there exists some
be based on the real environment within interactive tasks, 5G Network Slicing is
which people could have real-time required to have the capability to support
interaction. There are a number of key 100ms one-way mouth-to-ear low-delay
technologies used together to enable VR, i.e. speech coding for interactive conversational
360 degree panorama video, Freeview-point, services.
computer graphics, light field, etc. Many Furthermore, audio components and video
applications are derived from VR, for components are usually handled separately,
instance, VR gaming, VR broadcasting, VR so in order to avoid having a negative impact
simulated environment for education, on the user experience, the communication
healthcare, military training, etc. Moreover, system will also have to cater for the VR
the mutuality of the Cloud capability (e.g. audio-video synchronisation. The audio-video
rendering in cloud, edge computing) as well synchronisation thresholds is 5-125ms for
as pervasive network infrastructure audio delayed and 5-45ms for audio
deployment will bring VR applications to a advanced.
new dimension.
21
Strong-Interactive VR: Low-delay speech and direct them to complete tasks. Enabling a
and video coding deeper level of assistance and guidance to
Current speech codecs have an inherent be conveyed.
coding delay of 20-40ms. In a 4G network,
Accelerated Learning: AR training packages
such coding delay is not a problem during a
can facilitate vastly more effective training.
phone call because even a 400ms one-way
Supervisors are able to mentor and assess
delay between speakers does not seriously
capability, resulting in higher-quality work
impair an interactive discussion. However,
with less mistakes.
when the speech voice is used in a highly
interactive environment, e.g., a multiplayer Summary of requirements
game or a virtual reality meeting, the In order to understand VR applications’
requirements on the speech coding delay requirements for Network Slicing, VR
become tougher to meet, and current coding applications could be classified into two
delays are too high. To support interactivity, categories according to how an end user
the one-way delay for speech should be interacts with the virtual environment: weak-
10ms (or lower). These scenarios have a interactive VR (wi-VR) and strong-interactive
critical requirement on transfer bandwidth VR (si-VR). According to the technology
and delay to guarantee good user experience maturity, VR use cases may experience three
compared to current video service. different stages:
Entry-Level VR Advanced VR Ultimate VR
(FOV,8K 2D/3D) (FOV,12K 3D) (FOV,24K 3D)
Data rate 40Mbps(2D) 340Mbps FOV:2.34Gbps
63Mbps(3D)
Typical RTT 30ms(2D) 20ms 10ms
20ms(3D)
Packet loss 2.40E-5 1.00E-6 1.00E-6

Table 1: Network performance requirements from wi-VR[27]

In order to fulfil the performance  entry-level VR (now-2 years)


requirements of low-delay speech and video  advanced VR (3~5 years)
coding, the design of the network slice should  ultimate VR (6-10years).
consider different aspect of video codec, e.g.
frame rates, resolution and bandwidth. The Weak-interactive VR
higher the frame rate (fps - frames per For wi-VR, end users do not have direct
second) the better the video quality, virtual interaction with the virtual environment, the
reality may require the capability of displaying VR content is pre-planned and end users
content at frame rates of 120 fps or more. may be possible to select the observation
point and location. Therefore, end users’
Strong-Interactive AR: Use Cases experience for wi-VR is passive.
Assisting with complex tasks: Use of AR to
overlay instructions can speed up fault finding Strong-Interactive VR
and repairs by utilising heads up display with With the progression of VR technology, end
connected glasses. users could interact with the virtual
environment via specific user interface
Connecting remote workers: Allowing remote
(software or hardware) and the virtual
experts to see exactly what the worker sees
environment will provide real-time response,
22
which brings the interactive and immersive different according to user’s input; hence, the
user experience. The VR content may be content may be not planned in advance.
Entry-Level VR Advanced VR
(FOV,8K 2D/3D) (FOV,12K 3D)
Data rate 120Mbps(2D) 1.40Gbps Data rate
200Mbps(3D)
Typical RTT 10ms 5ms Typical RTT

Packet loss 1.00E-6 1.00E-6 Packet loss

Table 2: Network performance requirements from si-VR[27]

Automotive
Overview However, for a successful deployment of
CV2X, 5G operators need to have a full
Cellular vehicle-to-everything (CV2X) is
understanding of the use cases and
considered as one of the most prominent use
requirements of the automotive industry.
cases for 5G, and the automotive industry
has been one of the first verticals that Use Cases
engaged with the communications technology
5G CV2X use cases have been well studied
industry. CV2X aims to enable
by many research programs (e.g. 5GPPP
communication amongst vehicles (referred to
[10][11]), standardisation (e.g. 3GPP [12][13])
Vehicle to Vehicle or V2V) as well as
and industry oraganisations (e.g. 5GAA [3]).
communication between vehicles and an
A number of representative use case
infrastructure. Not only CV2X will create new
families/classes are presented in the
business opportunities for OEMs, e.g.
following sub-sections.
providing in-car infotainment service, but will
also increases road safety. To support Infotainment
performance critical type of services (e.g. This type of use cases requires direct
autonomous/semi-autonomous/assisted data exchange between vehicle and
driving), CV2X communication also includes application servers via mobile systems.
other connected-vehicle technology, e.g. in- Such services normally focus on providing
car sensors, cameras and radar systems. a more pleasant driving experience both
Providing support for V2X services using for driver and passengers so they are not
operator’s 5G public network, not only will safety-critical and can be delivered using
significantly reduce deployment cost mobile broadband (MBB) connectivity.
compared to running V2X services on a Examples include: music, movies, live TV
dedicated network, but will also offer a better streaming, audio/video conference
coverage. Moreover, CV2X can benefit from streaming (office-in-car), online gaming,
support of critical performance (e.g. ultra- web browsing.
reliable and low latency communication) and
Telematics
customised network services (e.g. network This type of use case also requires direct
function could be tailored according to data exchange between vehicle and
customers’ requirements) that are included application servers via a mobile system,
by design in 5G.
23
which are normally provided by sensor or information captured by the
automotive manufacturer (or their vehicles like traffic information. Such
authorised third-party service provider). information could be used for
Being different from the above category, it collective perception of environment to
provides services to assist the driving avoid potential dangers. One typical
experience. Example use cases are use case is “See-Through”, which
navigation provision, remote health refers to camera and/or radar data
monitoring of the vehicle, precise position sharing to improve/extend driver’s
provisioning, parking slot discovery, visibility. For instance, by receiving a
automated parking, etc. An automotive video stream captured by the front
manufacturer could also use the truck can help the driver behind to
connectivity to schedule a control module make an overtaking decision.
firmware and software update over mobile Information sharing is also one of the
system for selected range/type of essential factors to enable
vehicles. autonomous driving services
mentioned below.
Road Safety and Efficiency
Advanced Driving Service
Basic Safety Services Advanced driving services enable
Basic safety services support the semi-automated or fully automated
driver with additional information to driving.
improve road safety and efficiency.
Cooperative driving
Road Warning Information (on-vehicle sensor data
These services provide information to and driving actions like braking and
the driver about imminent dangers accelerating) can be exchanged
such as red light violation, hazard among vehicles for cooperative
warning, forward collision warning, collision avoidance. Another example
intersection collision warning, traffic use case is cooperative lane merging,
jam warning, etc. Such information where vehicles exchange information
could help the drivers to take remedial on their intended trajectories and
actions (e.g. lane changing, perform automated lane changing
deceleration). Being different from the manoeuvres to avoid collisions and to
driving experience assistance improve traffic flow.
mentioned in Telematics, these use
cases normally are triggered by a Platooning
specific event (e.g. based on real time This use case class describes
road situation detection) and the operating a group of vehicles in a
actions are taken by driver, hence it is closely linked manner so that the
not strictly delay-sensitive but it is vehicles move like a train with virtual
preferred to be delivered as fast as strings attached between vehicles. To
possible. keep the vehicles as close as possible
with safety assurance, the vehicles
Information (Sensor data) Sharing need to share status information (such
Perception of surrounding as speed, heading) as well as their
environment for driving condition driving intentions (such as braking,
analysis is a very crucial aspect to acceleration). By doing this, the overall
improve driving safety. Real-time fuel consumption could be lowered
information could be exchanged
among vehicles, e.g. on-vehicle
24
down and the amount of required gathering relevant use cases and
drivers can also be reduced. requirements working directly with automotive
industry partners. The scale of the challenge
Tele-operation
should not be underestimated: to support
This use case class describes the
advanced driving services, the mobile system
scenarios where a driver could directly
should provide ultra-high reliable and low
control an autonomous-capable
latency communication between the vehicles
vehicle from a remote location such as
and the network, as well as between vehicles
a control centre in certain periods of
and vehicles, exceptional mobility
time. The remote driver receives a
management performance and seamless
video stream taken from the cameras
service continuity even when moving at high
on the vehicle. The real-time video
speed. Furthermore, the mobile system
provides elaborate perception of the
should provide “predictive QoS”, that is
environment to the driver so that the
inform the vehicle of changes in the quality of
diver can operate the vehicle as if
the connectivity going to be provided in the
he/she is personally inside the vehicle.
future so that the vehicle could decide to
Advanced video technology (e.g. VR)
switch from autonomous driving mode to
could further improve the experience
manual driving mode. Examples of factors
of a remote driver.
that the network may use to predict future
Summary of requirements quality of service include weather conditions,
Automotive use cases have huge business road situation, network availability at the
potential, however, they also impose position where the vehicle is travelling etc.
stringent performance requirements for the 5G may have geographic coverage
mobile system. Support of the CV2X limitations (especially at the initial deployment
requirements has been introduced for LTE in stage). It is therefore useful for 5GAA and
3GPP Release 14 [14], while with regards to other relevant industry associations to specify
5G, the plan is to develop technical solutions vehicle (or the device) behaviour in case the
as part of Release 16 is expected to be network performance is not going to meet the
completed at the end of 2019. In parallel to minimum requirements.
the 3GPP activity, 5GAA is working on

Energy
Overview massive volume of MTC type applications of
the emerging smart metering.
The energy vertical has some very specific
requirements on the supporting Use Cases
communication solutions that go beyond what
Energy use cases have been investigated for
current LTE can provide. The business
instance by 5GPPP[15] and 3GPP[16], as
potential of introducing 5G Network Slicing in
well as by vertical customers themselves [32]
the energy domain is exceptionally high, as it
. Some typical use cases are briefly
is expected to provide the necessary support
explained in the following.
not only to the critical machine type
communication (MTC) applications of energy Smart grid
grid protection and control, but also to the Due to the urgent demands of smart grids,
an efficient and reliable communication

25
network solution is expected. The exchange of signalling between each
backbone network domain is a typical other. 5G Network Slicing could provide
network in which terminals are in the high an economical and efficient way to
and extra high voltage area. The terminals support the communication needs.
of a backhaul network are in the medium
voltage area. As for the access network, Smart meters and aggregator gateways
the end points are in the low voltage area. Future power terminals are expected to
A large amount of growing demand supply frequent measurements. This
happens in the medium-voltage and low- evolution leads to the requirement on
voltage domains, which are secondary future networks to carry short data

Bandwidth 1 kbps per residential user.


E2E Latency (upper <5ms between the primary substations and towards the
bound) control centre.
< 10-9 (which is more demanding for high/extra high
Packet-loss voltage than for medium voltage applications. This is
the end to end packet loss including the device.).
Availability >99,999% equal to about 5 minutes downtime per year.
Seamless failover required, i.e. no loss of information in
Failure Convergence
case of a failure while keeping real-time delivery of the
Time
information (i.e. within a small number of milliseconds).
Handling of crisis (Surviving long power downtimes on a large scale,
situations assuring black start capability): mandatory.
Connection density > 1000 km2
Table 3: summary of requirements for Energy industry

substations and distributed energy packages from thousands of users. The


resources, between primary substations data will enable near real-time
and secondary substations. At this optimisation of sections of the low and
moment, there is a lack of energy medium voltage infrastructures. This
measurement and communications optimisation will be particularly beneficial
system between substations. 5G Network for utilities to better serve customers
Slicing could be an economical and (residential and business) in densely
efficient wireless solution compared with a populated areas where 5G Network
traditional fibre-based communication Slicing is expected to become available
system. first.

Micro-grids Electricity traffic scheduling


Micro-grids consist of a set of micro- Power supply and delivery play a more
power, load, energy storage and control and more significant role in modern life,
devices. It could operate in both grid- commercial and industrial operation.
connected mode and island mode. Micro- Power outages as a result cause
grids will play a significant role in the significant economic damage both to the
future electricity smart grid architecture power company and consumers. At
and the associated control network. All present fault location is performed by
Micro-grid elements need extensive means of fibre and Wi-Fi, which results in
26
high latency and low level of reliability. 5G to power outages. Furthermore, by
Network Slicing could play an important building a precise map of power
part in fault location and fault isolation by consumption it is possible to improve the
transmitting critical monitored data, traffic scheduling and production.
controlling signals among feeders, bar
Summary of requirement
switches and automation control servers,.
5G URLLC Network Slicing has the low- Table 3 provides, for reference a set of
latency and high-reliability characteristics requirements for common energy industry
needed to promptly and precisely respond services.

Healthcare
Overview Remote healthcare
The health & wellness industry is about to Live bidirectional video for more efficient
change dramatically thanks to the availability consultation, diagnosis, treatment,
and usage of electronic processes and monitoring as well as for assisted surgery.
communication technology. This change will
Remote surgery
be driven by demographical changes and the
In this use case medical devices are
resulting growing costs as well as the
controlled remotely allowing off site
growing demand for flexible and individual
surgeons to operate on a patient. This is
treatment.
probably the use case with the most
Use cases demanding requirements in terms of
The health & wellness use cases are very latency, reliability and guaranteed quality
diverse with many sub-use cases. The of service. It is unlikely that the early
following list aims to briefly summarise the deployments of 5G networks will have
most important ones. More details to some of sufficient capabilities to support the
these use cases can be found in [17]: functionality required by remote surgery.
Summary of requirements
Hospitals
Deals with processes in and around a The requirements for the health & wellness
hospital. The most prominent examples industry need to be further analysed. With the
are medical device tracking, emergency exception of remote surgery, it seems
communication, (real-time) data reasonable to assume that the requirements
availability and exchange and data on the network are not very stringent,
transfer. therefore it should be possible to support
most of the use cases when the 5G network
Rehabs and care homes is deployed.
Processes in and around rehabs and care
Availability is most important requirement for
homes. Here, the most important use
these use cases, followed by latency and
case is assisted living.
then throughput.
Health and wellness monitoring From a functional point of view, many of the
Tracking health-relevant indicators using mentioned use cases are likely to require
various types of sensors. This data can be precise positioning solutions that also work
collected at a central office where it can when the device is indoor, strong security
be analysed by automated data analytics and both cloud and edge computing
processes as well as human experts. capabilities.
27
Industry 4.0, Manufacturing
Overview different industrial controllers. For higher
flexibility it is expected that this
The “Fourth Industrial Revolution” or Industry
communication is wireless. Depending on
4.0 is set to fundamentally change the
the concrete scenarios, these C2C
manufacturing industry. The main drivers are
systems typically have very challenging
improvements in terms of flexibility,
requirements on the communication
versatility, resource efficiency, cost efficiency,
service.
worker support, and quality of industrial
production and logistics. Motion control
To achieve the required flexibility, wireless Motion control controls moving and/or
connectivity (as a substitute for the wire- rotating parts of machines. Wireless
bound connectivity available in today’s communication is well suited for the
factories) is essential. Generally speaking, control of components, which move
Industry 4.0 use cases have very demanding and/or rotate.
requirements, e.g. in terms of latency,
Mobile robots and mobile platforms
synchronicity and availability.
Mobile robots and mobile platforms
Use cases perform activities like assistance in work
In [18] the Industry 4.0 use cases have been steps and transport of goods, materials
grouped into five different application areas. and other objects and can have a large
These are: Factory automation, Process mobility within the industrial environment.
automation, Human-machine interfaces
Mobile Control Panels with Safety
(HMIs) & production IT, Logistics and
Functions
warehousing and Monitoring and
Mobile control panels with safety functions
maintenance.
are devices for the interaction between
These application areas are composed of a people and production machinery as well
set of basic use cases. These use cases are as for the interaction with moving devices,
briefly summarised below: e.g. for configuring, monitoring,
debugging, controlling and maintaining
Augmented reality machines, robots, cranes or complete
Augmented reality optimally supports production lines. Optionally these panels
shop floor workers, for instance, in tasks are equipped with an emergency stop
like: monitoring of processes and button.
production flows, step-by-step instructions
for specific tasks (e.g. in manual Closed-loop control
assembly workplaces), ad-hoc support Closed-loop control in which several
from a remote expert (e.g. maintenance or sensors are installed in a plant and each
service tasks). It is expected that the AR sensor performs continuous
devices have minimum capabilities and measurements. The measurement data is
that complex functions are executed at transported to a controller, which takes a
the edge cloud. decision to set actuators.

Control-to-control (C2C) Process monitoring


Control-to-control (C2C) communication Process monitoring in which several
refers to the communication between sensors are installed in the plant to give
28
insight into process or environmental positioning and local edge cloud support. For
conditions or inventory of material. The Industry applications, safety and security
data is transported to displays for requirements are very critical and different
observation and/or to databases for from the other industries. Malfunction of the
registration and trending. communication and potential external attacks
via hacking can cause significant damage of
Plant asset management production process even employee health.
Plant asset management that is required Moreover, 5G industrial solutions also need
to keep a plant running. It is essential that to consider how to seamlessly integrate the
the assets, such as pumps, valves, legacy communication methods used in the
heaters, instruments, etc., are maintained. industrial environment.
Timely recognition of any degradation and
continuous self-diagnosis of components Campus networks are well suited to satisfy
are used to support and plan the local coverage requirements of the use
maintenance. Remote software updates cases. Due to the very stringent requirements
enhance and adapt the components to of these use cases, especially in terms of
changing conditions and advances in availability and reliability, some of the factory
technology. owners believe that arrangements such as
exclusive access to spectrum and a private
Summary of requirements network operated by the owner of the factory
Regarding performance, the most demanding will be needed.
requirements of the Industry 4.0 use cases The high throughput needed for some use
are latency, reliability, device synchronicity, cases, for example to support AR, will require
data rates, seamless mobility and energy a large bandwidth that may only be available
efficiency. The most important functional in the above 6GHz spectrum bands.
requirements are plug-and-play support,

Internet of Things for Low Power Wide Area


Applications
Overview There are several use cases, some of them
have been also included in the other vertical
The Internet of Things (IoT) describes the
industries (i.e. road warnings, smart meters,
coordination of multiple machines, devices
etc.) since they apply to a huge variety of
and appliances connected to the Internet
sectors. In the following, only the most
through multiple networks [19]. The IoT
important use cases not address by other
encompasses a huge variety of use cases
vertical industries are briefly described.
including some of the ones already described
above. This section will cover use cases Use cases
relevant for Low Power Wide Area (LPWA)
The following list summarises the most
applications, where the goal is to improve
important use cases:
power efficiency, coverage, total cost of
ownership and sustainability. Areas like Asset Tracking and monitoring
agriculture and environment, consumer, Being able to track and monitor assets is
industrial, logistics, smart building, smart city a very attractive use case because it
and utilities [20] are addressed. allows to optimise the operational
aspects, which differs depending on the
type of asset. There are available
29
examples of assets tracking that range explosions. Also for this use case, the
from suitcases to pallets or containers. expected lifetime for the meter is normally
set by national regulations, for example in
Waste management Europe it is generally for 15 years or
To minimise both costs and the impact on above, while in China it is around 10
the environment, city administrations are years.
looking to make waste collection smarter.
Sensing when residential bins require to Summary of requirements
be collected improves operational cost. In The requirements for LPWA have been
addition, there could be a variety of analysed in quite some detail already. From
sensors installed in bins, like for detecting the above use cases, the following
the emission of gasses or fire. requirements can be highlighted:

Smart parking  A small amount of information is generally


Sensors are used to collect data about the exchanged per transmission, low
occupancy of each parking space are throughput required.
becoming a very prominent use case for  Latency tolerant, better latency
IoT. This solution not only improves traffic performances are expected for use cases
congestion, but it can also improve like asset tracking and parking, but still
revenue collection where parking is paid acceptable in the range of a couple of
for and improve usage of parking spaces seconds.
where drivers can be directed to a free  Coverage is particularly important, for
space. some use cases coverage is more
important indoor and for other it is
Smart manhole outdoor, but it is a constant requirement
Smart manhole can be used to detect for all the use cases.
leakage in the infrastructure, both for
 Power consumption, all use cases
water and gas. Smart pipeline monitoring described above do not have access to
can be deployed by utilising a variety of
mains power and therefore require
sensors like pressure, water flow, gas mechanisms to reduce as much as
detector and acoustic, which report
possible the battery consumption of the
constant measurements to the control devices.
room.
 Mobility is only relevant for asset tracking
Water metering and marginally for waste management.
Involves the use of a flow sensor that
allows measuring the water consumption. IoT is a good example in which most of the
Water meters tend to not have any access use cases can be served with available
to mains power and with an average technology, such as 2G, NB-IoT, etc.
lifetime that exceeds 10 years and in However, these are networks built and
some cases reaches up to 16 years. operated independently from each other.
Serving the IoT use cases over 5G and
Gas Metering Network Slicing technology has the potential
Gas metering is very similar to the water to greatly reduce operational costs, increase
metering use case. Gas meters have efficiency and leverage additional capabilities
stricter requirements on the power an operator can offer.
consumption in order to prevent

30
Public Safety
Overview  Group call capabilities
Several countries are considering updating  Broadcast call capabilities
their existing PPDR networks to take  Pre-emption and prioritisation for
advantage of the advancements in mobile specific services, like Emergency Call
technology and capabilities such as high  Symmetric utilisation
speed data transfer that are underdeveloped  End-to-End encryption; 256 bit or
in the current mainstream systems in use higher
such as TETRA and P25. Adopting the new  Interface to narrowband standards,
technology will also unlock economies of (e.g. TETRA)
scale and the introduction of innovative  Mission Critical Data
solutions as they become available for  Data communications to allow the
commercial services. exchange of text messages, files and
images between public safety officers
Countries such as the United States, South
can greately enhance the efficiency of
Korea and the UK are spearheading the
their operations when compared to
introduction of LTE-based PPDR networks
using only voice media. The following
and the trend seems to point to a deployment
requirements are expected to be met:
of such networks as an overlay of existing
commercial networks. A public safety network  Real-time capability with very low
is therefore conceptually consistent with a delay and jitter, due to automatic
network slice and due to the performance, analysis and overlaying during
availability, isolation properties it is natural to simultaneous usage of different
expect that it will be in a future deployed in a sources
network slice.  High bandwidth in one network cell; up
to 5 Gbit/s
Use Cases  Pre-emption and prioritisation for
The following use cases have been identified specific services
for public safety enabled mobile networks:  Symmetric utilisation
 End-to-End encryption; 256 bit or
Mission Critical Push-To-Talk higher
As for the legacy TETRA and P25  Interface to narrowband standards,
networks, users of public safety networks like TETRA
need to be able to communicate in groups
characterised often by strict hierarchy and Mission Critical Video
facilitated by powerful floor control Real-time capability with very low delay
mechanism. The enablement of MCPTT is and jitter, due to automatic analysis and
underpinned by the following overlaying during simultaneous usage of
requirements: different sources
 Very low end-to-end talk setup time;  High bandwidth in one network cell; up
below 100ms to 5 Gbit/s for video signals with a
 Very high number of users in one cell; minimum resolution of 1080p60
ca. 6000  Pre-emption and prioritisation for
 High quality voice, incl. noise specific services
cancellation
31
 Asymmetric utilisation; higher uplink End-to-End encryption; 256 bit or
capacity than downlink higher
 End-to-End encryption 256 bit or  Interface to narrowband standards,
higher like TETRA
 Interface to narrowband standards, Summary of Requirements
like TETRA Many commonalities emerge from the
Massive Mission Critical IoT analysis of the requirements of the public
Access to the ever-growing number of IoT safety use cases. Some of the requirements,
devices such as security cameras, such as backwards compatibility towards
drones, smoke detectors, health monitors legacy PPDR communication systems, can
will provide unvalued support to the probably be realised at application level via
operations of public safety agencies, it is some interworking function. Security, which
therefore required that a network can stands out as a main requirement for public
support communication with these safety use cases, could be provided at
devices in a secure and reliable manner. application level (e.g. end to end encryption),
The following requirements apply to IoT however it seems a better choice to utilise the
devices used for mission critical capability of implementing different security
operations: models as well as isolation properties that
Network Slicing allows to fulfil the security
 Real-time capability with very low requirement of the public safety use cases.
delay and jitter, due to automatic
analysis and overlaying during The network slice will also need to be
designed to provide capabilities for pre-
simultaneous usage of different
sources emption and prioritisation of mission critical
traffic, radio bearers with high bandwidth for
 Pre-emption and prioritisation for
mission critical data or with low delay and
specific services;
jitter for MCPTT and Mission Critical Video.
 Asymmetric utilisation

Smart Cities
Overview addressed in this paper as part of other by
other vertical industries are briefly explained.
The concept of smart cities envisages the
deployment, management, usage and Use cases
maintenance of city’s assets using ICT. The
goal is to improve efficiency, sustainability Intelligent lighting
and to address the requirements coming from Intelligent lighting refers to lighting
changing demographics. Thereby, areas like networks in which, for instance, lights can
public transport, infrastructure, utilities, public be turned on in a formation on-demand. In
safety, etc. are addressed. addition, maintenance gains can be
improved through regular status reports.
The smart cities use cases are very diverse However, the gains are expected to be
and many of them have already been relatively low. Therefore, the bundling with
addressed within other vertical industries other services is needed, e.g. for
(e.g. waste management, smart parking, monitoring, reporting, and coordination
smart bike sharing, energy grid, etc.). The tasks as well potential sites for small cells
following section focuses on the most or roadside units (for V2X services).
important use cases that are not already

32
Public safety Summary of requirements
Public safety networks open new
The requirements for the smart cities industry
opportunities to detect and fight crime.
have not yet been analysed in detail. For
Examples could be secure and reliable
most of the use cases and requirements no
communication networks for security
concrete values but indications are available.
service and law enforcement as well as
However, it turns out, that most of the use
the real-time analysis of data coming from
cases are not very demanding e.g. compared
different sources like cameras, sensors,
to other industries.
etc.
Regarding the performance requirements, a
Emergency service management very high density of devices as well as the
Emergency service management is about high availability/coverage and high data rate
efficient and target-oriented are the most important requirements.
communication in disaster (natural as well
From the functional requirements energy
as man-made) scenarios. Herby,
efficient operations, especially for sensors
warnings to the people as well as
and security are most important.
communication to non-human entities
(e.g. shutting down elevators, etc.) is
envisioned.

33
5
Industry
Recommendations and
Reshaping the Network
Slicing Concept

34
Industry recommendations and reshaping the Network
Slicing concept
This chapter aims to conclude the findings  Enhanced mobile broadband (eMBB)
from the service requirements analysis  Ultra-reliable low latency
discussed in section 4. Rather than providing communications (URLLC)
details about the collected service  Massive machine type
requirements, this chapter provides communications (mMTC)
conclusions and recommendations derived eMBB in contrast to MBB provides
thereof. Recommendations towards cross- improved data rates, capacity and
standardisation collaboration are expressed coverage. URLLC refers to critical types
and the concept of the generic networking of communication supporting very low
slicing template is briefly introduced. In latency, high reliability as well as small to
addition the concept of Network Slicing is medium data rates. mMTC supports the
reshaped for the purpose of clarifying some IoT use cases with scenarios in which a
common misunderstandings. very large number of (millions to billions)
Requirements analysis of small devices have to be connected
efficiently, e.g. in an energy efficient way.
Use case clustering
The use cases discussed in this
This section provides a descriptive
document can be also grouped into these
comparison outlining similarities and
three main groups. An overview for non-
differences in use case requirements. In
IoT use cases is provided in Figure 7 in
the future this clustering can be extended
which use cases are roughly categorised
allowing identification of required service
based on their throughput, latency and
slice types and their characteristics.
In the literature future use cases are
normally clustered based on their
performance requirements into:

Figure 7: Use case clustering

35
availability requirements1. However, the automotive industry or motion-
based on the performance requirements control and control-to-control use
at least two additional service types can cases from the Industry 4.0 vertical.
be identified: For the latter ones, values of smaller
than 1 microsecond are required.
 eMBBLLC use cases have high
requirements on latency and Today these requirements are met by
bandwidth at the same time. the deploying cable
Availability requirements are in most of connections/networks as like industrial
the cases a bit more relaxed Ethernet systems or fieldbuses. These
compared with URLLC use cases. networks are normally closed solutions
Examples are augmented reality and by a single vendor in which all the
virtual reality use cases. equipment is perfectly aligned. Based
 mMTC/URLLC use cases comprise on standards like IEEE 802.1 AS [29]
sensors sending data which needs to or IEEE 1588 [30] very high
be delivered with a very low latency synchronicity can be achieved in the
and a high reliability. One example is networks.
the motion control use case of Industry When thinking about 5G networks it is
4.0. the expectation of the vertical
Based on the previous findings one of the

X X X
….. …..
time

Figure 8: Cyclic traffic


most important steps is to identify service industries that these very demanding
slice types required to serve the different synchronicity requirements can also
use cases. These service types could be be provided by wireless and cellular
selected based on performance, network. However, especially in
functional or operational requirements. wireless scenarios and for moving
How to do it exactly is subject to future communication partners this is not an
discussions. easy task and it requires more detailed
investigations.
Performance requirements
This section highlights the most important Cyclic traffic
performance requirements requested by Some applications rely on
the vertical industries. Requirements are cyclic/deterministic traffic. Cyclic traffic
explained and initial ideas are discussed is traffic with very regular traffic
on how to address these requirements. patterns, e.g. inter-packet delay (X) –
see Figure 8.
Very tight synchronization
Some use cases have stringent Relevant use cases are, for instance,
requirements in terms of synchronicity Voice over IP (e.g. 20ms inter packet
of communication devices. Examples delay), motion control (e.g. < 0.5ms
are cooperative driving use cases from

1
It should be noted that the clustering should be seen as case was assumed and where no values were available and
indicative. Where available concrete values have been educated guess was done.
considered in case ranges of values were available the worth
36
inter packet delay), control-to-control indicated by variant vertical industry use
(e.g. 4ms inter packet delay), etc. cases.
The network slice must be able to Security
deliver this type of cyclic traffic with Security is a general concern for all
minimum impact on the inter-packet industries, because of the damage
delay. Especially in the RAN, this that security leaks may cause.

Figure 9: Positioning accuracy and energy efficiency indoor and outdoor

requires a special treatment. The pre- However, the security requirements


scheduler feature available in LTE may be very different from industry to
since Release 8 might be a good industry. For instance, the method to
candidate as it allows sending traffic in provide secure connectivity for millions
specific intervals by assigning of low-cost sensors could be very
resources in regular intervals. This different to the mechanisms used to
reduces the delay and jitter as well as provide security for public safety
signaling overhead which improves services. Appropriate technical
the efficiency. However, more analysis solutions should be defined to meet
is required. these requirements and comply with
the requirements and solutions
Functional requirements defined by 3GPP [28].
This section highlights the important
functional requirements derived from the Isolation
service requirements discussions. Some Isolation refers to the degree of
basic functions that operators could resource sharing that could be
provide for industry customers include tolerated by the industry partner.
authentication, firewall, identity Some customers may not mind to
management, etc. Upon these share network resource with other
fundamental requirements, a number of customers, but would require isolation
new functional requirements are also for the computing resource. Sensitivity
37
or criticality of the processes used by For asset tracking type of use cases
some customers may on the other (C), like.g. container tracking in
hand lead to the requirement to only Transport & logistics sector, it is often
want to share the physical site like sufficient to provide a positioning
base stations, but use dedicated solution that works outdoors and with
spectrum. Network Slicing should be relatively low accuracy. On the other
able to be configured with different hand, as mobile devices may be
levels of isolation to satisfy the battery operated, the energy efficiency
customers’ needs. feature of the positioning solution
plays an important role. In addition, in
More details about isolation are
many of these use cases the
discussed in the 0 on page 44
positioning is expected to work
Positioning globally across different networks and
Many use cases have a strong countries.
demand for the capability of
It should be noted that for some use
positioning (geo-localisation) devices.
cases, such as many IoT use cases,
Different customers may have different
GPS or other Global Navigation
requirements in terms of accuracy,
Satellite Systems (GNSS) are not an
energy efficiency, indoor/outdoor
option either because of the high
support, and cost, etc. For some of the
energy efficiency consumption or
use cases, positioning techniques will
because simple devices are not
have to work reliably under
equipped with the suitable receiver.
challenging conditions, e.g. deep
indoors. For other use cases, e.g. automotive,
GNSS is a suitable positioning solution
Figure 9 graphically represents the
for most of the times although there
positioning requirements in terms of
are a number of situations where this
accuracy and energy efficiency for a
is not accessible e.g. tunnels, indoors,
number of use cases.
etc. Hence, it is beneficial to combine
For automotive use cases (A), e.g. the advantages of these systems with
automated cooperative driving like the positioning capabilities of 5G to
short distance platooning, high provide a solution that meets the
precision positioning feature with an customer scenarios.
accuracy of a few centimetres is
Delay tolerance
expected to be supported by the
To support certain vertical industry use
mobile network to ensure the vehicle-
cases, mobile system should be able
to-vehicle/network communication can
to provide guaranteed SLA that is
be used even when GPS is not
agreed with the customers. For
available, such as when moving
instance, certain traffic flows should
through very dense urban scenarios or
reach the end user within certain
in bad weather condition.
latency boundary. At the same time,
For manufacturing use cases (B), high there are use cases that are less
precision indoor positioning with an sensitive to delay variations giving the
accuracy of <1m is required to support mobile system some level of flexibility
for instance mobile control panel with in scheduling traffic. For instance, in
safety functions. automotive industry, (non-critical)
software/firmware update could be

38
deprioritised and delivered when traffic services and capabilities provided by 3GPP
is low such as during off-peak hours. network interfaces, etc.
Predictive QoS However, these APIs might not be enough for
Predictive QoS is an important feature some of the future use cases or future
allowing operators to inform the customers. To better support vertical
service in advance about a quality industries to deliver their services to their own
drop. Predictive QoS can be applied to end users via slicing method, under specific
various KPIs, e.g. coverage, regulatory regimes it may be possible to open
throughput, latency, etc. up certain operational capabilities of the
mobile system towards the vertical industries.
For instance, when a vehicle is moving
Operators could provide a set of APIs to
along a path under autonomous
expose such capabilities towards vertical
driving mode, the mobile system may
customers. This does not only provide
foresee performance drop (e.g. due to
convenience for verticals to manage their
channel condition or system
own service, but also enrich the Network
congestion situation). In this case, the
Slicing business model for telco industry.
mobile system could as a precaution
take corrective actions e.g. resource According to the business incentive as well
rescheduling (scaling up/out), or as service operation methods, vertical
simply inform the vehicle about the customers have very different perspectives in
potential performance drop. Such terms of required operational capabilities.
information could be evaluated by the
vehicle itself in order to make decision Monitoring capability
to switch from autonomous driving Monitoring capability is one of the
mode to manual driving mode to avoid fundamental operational requirements, for
potential danger. The higher accuracy instance monitoring traffic characteristic
a system’s predictive QoS provisioning and performance (e.g., data rate, packet
capability is, the higher possibility for drop, and latency), end user’s
the system to support industry use geographical distribution, etc. Moreover,
cases with critical system performance monitoring itself also contains many
requirements. subcategory according to the add-on
requirements, for instance, monitoring
To find out how predictive QoS works granularity (e.g. per second, per hour,
under realistic conditions and which etc.), per session/user/slice instance
accuracies can be achieved more based monitoring, etc.
analysis and field trials are required.
Limited control capability
Operational requirements
Vertical customers could use APIs
In previous generation mobile systems, provided by the operators to control
operator’s infrastructure as well as the network service. For instance, instead of
provided network services have always be simply using the network service, vertical
presented as a black box for the OTT or customers could decide where to locate
enterprise customers. Only few APIs are the network functions. Moreover, verticals
provided by the network to the service could also decide how to integrate their
providers including making and receiving own applications with the other network
voice calls, sending SMS/MMS, the Service functions to run together within the
Capability Exposure Function (SCEF) that network slice instance provided for them.
provides a means to securely expose the

39
Configuration capability installed in the premises of the
Configuration refers to the capability to enterprise. This makes campus
allow vertical customers to adjust and networks very flexible (i.e. build out
modify the network functions as well as independent of an already existing
underlying resources within the network public network) as they are limited to a
slice instance provided for them. small number of devices, which allows
the rollout of new hardware fast and
Full operation capability efficiently.
Full operation is the highest operational
capability that could be provided via Typically for local coverage a single
slicing method. Within the provided administrative domain is sufficient to
network slice instance, vertical customers serve the customer or use case.
could have full control of the network Nationwide coverage
service operation. Therefore, they are Nationwide coverage requested by
self-responsible for the network service industries, which do not need
assurance and maintenance within the coverage outside a specific country.
limit set by the network operators. In Examples are utilities industries,
particular network access should remain government services and smart cities.
under the control of the operator. The
For this type of coverage, typically a
impact and the application of the
single administrative domain (e.g. a
regulatory obligations will have to be
single network operator) is sufficient.
studied in this approach.
For very demanding use cases,
This might be very helpful for the national roaming could be envisioned
customer in case of networks problems or in order to meet for instance the
outages for instance by configuring availability and coverage
backup paths. requirements. According to NGMN
[26] this is the “business vertical”
Coverage requirements
scenario.
Vertical requirements very much
differentiate in the type of coverage they Global coverage
require. Three main groups have been Global coverage is required by
identified: Local, nationwide and global companies and industries with
coverage. More details are provided in the worldwide points of presence or which
following. are selling their products globally. The
most obvious industry requiring global
Local coverage
coverage is automotive. Other
Local coverage is requested mostly by
examples are transport & logistics use
Industry 4.0 and healthcare industries
cases. Providing global coverage
in which a very specific geographical
normally means that network services
area needs to be covered, e.g. an
need to be provided across multiple
industry area or a hospital.
administrative domains. According to
Local coverage requirements could be NGMN [26] this is the “roaming”
met by a network slice (as a kind of scenario.
VPN based on an existing public
For this type of coverage, the network
network) restricted to a small number
slices used to serve customers need
of base stations or by so called
to be made available also when the
campus networks. A campus network
device is outside its home network.
is a dedicated physical network
40
Several solutions are discussed in network may export the blueprint of a
literature on how to achieve this. custom network slice used by a user
Three of the most prominent so that it can be instantiated and
approaches are briefly introduced: (1) administered by the visited mobile
the visited network could provide to network operator. (3) the home
the roaming user a network slice with network may extend the slice into the
equivalent functionality of the slice visited network, provided it has
used in the home network, e.g. using authorisation from the visited network
standardised slices. (2) the home to control the resources.

Generic Network Slicing template


As discussed in this section, a network slice Template (GST)”. Every Slice can be fully
has different characteristics or attributes described by allocating values (or ranges of
which can be roughly grouped into three values) to each relevant attribute in the GST.
categories: performance, functional and
One of the main areas the industry should
operational.
focus is to agree a definition of a Generic
These attributes need to be specified and Slice Template, with all the KPI names, units
quantified in some way, so that: and granularity, but no actual values. This
would allow to unlock all the benefits
 the slice buyer knows what to expect and
described above. For example, an operator
to be sure that the service requirements
may easily communicate the expected
can be met
behaviour of a network slice provided to a
 the slice provider knows what to deliver
customer when such customer moves to a
 there is a sound basis for a
visited network allowing the visited network to
SLA/contractual agreement between the
decide what mappings would be needed
Slice provider and buyer
between slices in home and visited networks.
 UEs can roam onto another networks, but
This generic template would not be specific to
maintain access to the services that
a vertical, and so would be useable by any
require particular network capabilities e.g. future 5G services. When deploying or
by allowing a home operator to buy a offering a slice to a customer, the “contract”
Slice in a visited domain
would specify the values that each parameter
The general set of attributes that characterise
would take for a given slice instance. Some
a slice (in terms of performance, functionality
examples of parameters, or ranges for
and operation) should be the same for any parameters may be given to communicate
slice implementation, regardless of the values the intent.
associated to those attributes.
The generic slice template serves as a
NOTE: some attributes may be void or not
baseline for the definition of service/slice
applicable to some slice implementations
types by specifying the values (or range of
It is highly beneficial to achieve a common values) for each of those attributes. The GST
method the industry can refer to in order to also serves as baseline for slices only
describe the characteristics of any slide – that negotiated between the operators and its
is what we refer to as a “Generic Slice customer.

41
Cross-Standardisation Collaboration
Recommendations
E2E Network Slicing contains different ETSI ISG MEC named “MEC support for
technical domains as discussed in Section 3 Network Slicing” [24], which focuses on
(e.g. AN, CN, TN, Cloud), and many SDOs identifying the necessary support provided by
are working in parallel to provide slicing Multi-access Edge Computing for Network
solution under their area of competence. The Slicing and, in addition, how the orchestration
technical content is as a result fragmented. In of resources and services from multiple
order to form an E2E solution, significant administrative domains could facilitate that.
work is required in terms of cross-SDO This could be a potential candidate for cross-
cooperation and coordination, which will be SDO coordination for MEC topic.
explained in the following sections.
Coordination from Management
Coordination from System Architecture Perspective
Perspective
Transport Network Aspect
The overall 5G system architecture is under As shown in Figure 6 of Section 3,
the development of 3GPP SA2 Working management aspect is considered
Group, for whom Network Slicing is one of separately in different SDOs based on the
the fundamental design feature of the 5G targeted technical domain. 3GPP SA5
system. To enable E2E connectivity of Working Group is responsible for the life
Network Slicing across multiple technical cycle management of slices (e.g. creation,
domains, potential coordination between run-time assurance, etc.) in the 3GPP
3GPP and other SDOs is desired. For realm that contains the RAN and CN parts
instance, in an FMC (Fixed Mobile of the slices. Transport network, which is
Convergence) scenario, part of the E2E slice one essential part in E2E Network Slicing
may be provided using non-3GPP access solution, is not in 3GPP scope. TN slicing
such as WLAN or fixed access defined in management architecture is instead
BBF), therefore combined efforts between defined by BBF. To enable E2E
3GPP SA2 and BBF may be required to management of a slice, it is essential to
guarantee the correct deployment. align BBF and 3GPP SA5, in terms of
When considering slices that should fulfil use terminology, architecture, interfaces, etc.
cases with low latency requirements that can Moreover, interoperation between 3GPP
be provided using Multi-access Edge and BBF-defined slicing management
Computing (MEC) coordination between entities needs to be in place. For instance,
3GPP SA2 and ETSI MEC [21] would be 3GPP SA5-defined slicing management
required. For instance, some information system needs to send transmission link
such as application instances locations, traffic requirements to BBF-defined TN slicing
rules, identification of traffic that needs to be management system. Vice versa, 3GPP
offloaded to the edge needs to be slicing management system needs to
exchanged between 3GPP network and ETSI retrieve TN information to establish the
MEC system for the purpose of selection transmission link between 3GPP network
and/or reselection of the User Plane Function function entities. The northbound interface
(UPF) and potentially to relocate the that is used for such information
application. There is an ongoing work item in exchange should be aligned between BBF

42
and 3GPP, and IETF could be used to interfaces and protocols etc., but as in the
standardise the protocol of the case of slice management, it does not cover
northbound interface according to the transport as well as virtualisation aspects.
requirements collected by BBF. Hence, the coordination between 3GPP SA3
and ETSI ISG NFV, BBF, and IETF are
Virtualisation Aspect necessary for an overall E2E security.
Virtualisation and cloudification have been
deployed in 4G cores already. This Coordination between SDOs and Open
technologies will continue to be the major Source
features in the 5G new core (5GC) Other than the work from SDOs, open source
design. 5GC network functions are is fast becoming more and more prominent in
modularised (so that they can be the scope of 5G. For example, Open Network
executed as software in a datacentre) and Automation Platform (ONAP), an initiative
interconnected with each other using from operators in cooperation with the Linux
service based interfaces. Hence, to Foundation, is an open source software
deploy and manage slices in a virtualised platform that delivers capabilities for the
network environment, 3GPP SA5 should design, creation, orchestration, monitoring,
coordinate with ETSI ISG NFV. and life cycle management of VNFs, carrier-
Coordination from Security Perspective scale Software Defined Networks (SDNs) as
well as higher-level services [22]. Open
Security is a built-in feature of the overall Source MANO (OSM) is another operator
system architecture that supports Network initiative from ETSI community, which aims to
Slicing in order to provide the fundamental deliver production-quality open source
guarantee of the telecom services as well as Management and Orchestration (MANO)
the specific requirements of the safety-critical stack aligned with ETSI NFV [23]. Currently,
applications and services. Way beyond the there is a lacks of clear understanding of the
slice-internal and slice-specific security relationship between standardisation and
provisions and the access control to the open source especially at the management
slicing subsystem, slice security should be domain as well as competition between open
also systematically designed to empower source initiatives.
secure and reliable E2E slice life cycle
management. As mentioned previously, ETSI’s Zero touch
network and Service Management (ZSM)[24]
E2E slicing security can be implemented at aims to help in this area of coordination
different levels and dimensions, e.g. from among SDOs and open source solutions.
communication method (e.g. authentication) Part of its mandate is to analyse gaps and
to isolation method (e.g. soft isolation based help align approaches from these different
on virtualisation or hard isolation based on organisations. Currently, one of the work
physical entity). Security related work is items in ZSM is to develop an end to end
carried out in multiple SDOs in parallel as view of Network Slicing management looking
well. 3GPP SA3 works on the across domains, for example, 3GPP network
security/isolation method for Network Slicing, slice management and the ETSI NFV
including the definition of overall virtualisation platforms.
implementation, strategies, standard

43
Other recommendations
Additional recommendations are: telecommunication and vertical industries
are required to cooperatively find
 It turned out that for many KPIs, e.g. for
solutions for that.
latency, different interpretations and
 Some use cases and industries have very
understanding throughout the industries
demanding availability and reliability
exist. Therefore, it is recommended to
requirements. However, it is not well
specify/define relevant KPIs in order to
understood how these requirements can
get a common understanding.
be met, e.g. which mechanisms can be
 Requirements some industries pose on
applied to improve availability and
5G and Network Slicing have been
reliability beyond state of the art networks.
derived from today’s use cases and
It is recommended to have a deeper look
processes. However, today these
into these aspects.
requirements are met using fixed line
 It would be beneficial to standardise a
network technologies as like industrial
small set of globally available network
Ethernet or optical fibres. These
slices serving use cases that are of
requirements very often are too
interest in many countries and common to
demanding for cellular networks as 5G.
different verticals and use cases.
Therefore, discussions between

Network Slicing Concept Evolution


Compared to 2015, when NGMN first support a terminal to use multiple slices
introduced Network Slicing concept, the simultaneously. There are a number aspects
understanding of Network Slicing is much that need particular attention.
more mature now. The fundamental system
Operational isolation vs. network level
architecture defined by 3GPP is capable to
isolation

Figure 10: Different Levels of Network Isolation


44
“Isolation” is considered as one of the key commitment, which in turn is implemented via
features that Network Slicing could provide. Network slice isolation solution.
Isolation could be understood from two
Based on a survey with vertical customers,
dimensions: (1) operational isolation, means
the majority of those who have isolation
that vertical customers could have
requirements, have direct requirements on
independent monitoring, control,
operational isolation instead of network level
configuration, or even full operation capability
isolation. There are also some specific
of the network slice; (2) network level
vertical industries that have clear network
isolation, means that vertical customers do
level isolation requirements, e.g. public
not share network function or resources with
safety, smart grid, for security and safety
the other customers. Network level isolation
purpose. Hence, their network slice(s) may
also has different sub-categories, for
not share any network function and resource
instance, shared RAN but isolated core, or
with the other network slices. Such
isolated RAN as well as core, etc.
customers are minority cases.
Operators can provide operational isolation
Not a network slice for each vertical
without or with very weak network isolation.
customer
For instance the system could use IDs to
differentiate the users belonging to different Based also on the clarification of slice
tenants who share the infrastructure. One isolation matter, it is not necessary to provide
example is NB-IoT, which can be treated as a an independently deployed E2E network slice
pre-configured network slice, with many for each vertical customer, because this is
different IoT tenants sharing the same NB- not their fundamental requirement. One
IoT network. network slice could serve many vertical
customers simultaneously.
On overview of the different levels of network
isolation is provided in Figure 10. It is obvious Number of slices supported by the 5G
that the different levels of isolation will have system
different cost. Most expensive mode will be This is one of the fundamental question about
dedicated RAN (L0 or L1), which may only be Network Slicing. Potentially, the amount of
relevant for very few use cases. network slices could be very high under the
It is essential to understand, how to let assumption of full system automation and
vertical customers comprehend this feature programmability. However, the amount of
from business aspects and which kind of slices should be designed based on the
isolation do they prefer to have. capability of the underlying deployed
infrastructure, as well as the performance,
From an operator’s perspective, isolation
functional and operational requirements of
requirements could be identified in different
business customers (especially at the initial
ways. In some cases, it is the vertical
phase of slice deployment). Moreover, it
customers’ direct requirement, i.e. they
ought to be an individual operator choice. It is
directly ask for operational isolation or
technically feasible to have roaming solutions
network level isolation. In other cases,
where the HPLMN and VPLMN have taken
customers do not express any isolation
different strategies in the number of deployed
requirement, but the operator takes decisions
network slices to serve the same customers.
on isolation based on other requirements. For
instance, if a customer requests a service Network slice deployment
level which is quite demanding, the operator Network Slicing deployment will benefit from
may assign dedicated resources in order to network automation. The automation in rolling
ensure it can meet the service level out network slices will be subject to normal
45
learning curve that new technologies are
commonly experiencing. So it can be
expected that the degree of automation of
deployment of a network slice will evolve over
time.

46
6
Regulatory Aspects

47
Regulatory aspects
Network Slicing will be a feature of 5G - this experience is inherently
is based upon software defined network and counterproductive.
network function virtualisation. In reviewing  Consumers should have the ability to
Network Slicing, regulation should be choose between competing service
considered and views on key areas are providers and a variety of offers / tariffs to
provided below. However, from a regulator’s best meet their individual needs.
perspective they will want to understand  Mobile network operators compete along
what, if anything changes from developments many dimensions, such as pricing of
in technology, and how this impacts service packages and devices, different
customers. These changes might impact and calling and data plans, innovative
/ or be constrained by the regulatory aspects applications and features, and network
listed below. Further analysis is required to quality and coverage. The high degree of
understand the evolution of the regulatory competition in the mobile market provides
aspects to align with these changes. ample incentives to ensure customers
Net Neutrality enjoy the benefits.
 Where there is flexibility, mobile network
While there is no single definition of net operators are able to offer a bespoke,
neutrality, it is often used to refer to issues managed service to providers of new
concerning the optimisation of traffic over connected products, such as autonomous
networks. cars, which could not exist without
Mobile network operators face unique constant, high-integrity connectivity.
operational and technical challenges in Operators can also enter into commercial
providing fast, reliable internet access to their arrangements with content and
customers, due to the shared use of network application providers that want to attract
resources and the limited availability of users by offering free access, that is,
spectrum. Network Slicing may provide zero-rating their content so mobile
options of how mobile operator networks can subscribers are not ‘charged’ for the data
better meet customer needs. usage. These kinds of arrangements
enable product and service innovation,
As the net neutrality debate has evolved,
deliver added value to consumers and
policymakers have come to accept that
generate new revenue for network
network management plays an important role
operators, which face constant pressure
in service quality.
to enhance, extend and upgrade their
Industry position – networks.
 To meet the varying needs of consumers, Quality of Service
mobile network operators need the ability The quality of a mobile data service is
to actively manage network traffic and the characterised by a number of important
flexibility to differentiate between different parameters, notably speed, packet loss,
types of traffic. delay and jitter. It is affected by factors such
 Regulation that affects network operators’ as mobile signal strength, network load, and
handling of mobile traffic is not required. user device and application design.
Any regulation that limits their flexibility to
manage network, service quality and Industry Position
provide consumers with a satisfactory  Competitive markets with minimal
regulatory intervention are best able to
48
deliver the quality of mobile service When data is allowed to flow freely across
customers expect. Regulation that sets a national borders it enables organisations to
minimum quality of service is operate, to innovate and to access solutions
disproportionate and unnecessary. The and support anywhere in the world. Enabling
quality of service experienced by mobile cross-border data transfers can help
consumers is affected by many factors, organisations adopt data-driven digital
some of which are beyond the control of transformation strategies that ultimately
operators, such as the device type, benefit individuals and society. Policies that
application and propagation environment. inhibit the free flow of data through unjustified
Defining specific quality targets is neither restrictions or local data storage
proportionate nor practical. requirements can have an adverse impact on
 Mobile networks are technically different consumers, businesses and the economy in
from fixed networks; they make use of general.
shared resources to a greater extent and Cross-border transfers of personal data are
are more traffic-sensitive. Mobile network currently regulated by a number of
operators need to deal with continually international, regional and national
changing traffic patterns and congestion, instruments and laws intended to protect
within the limits imposed by finite network individuals’ privacy, the local economy or
capacity, where one user’s traffic can national security. While many of these
have a significant effect on overall instruments and laws adopt common privacy
network performance. principles, they do not create an
 The commercial, operational and interoperable regulatory framework that
technological environment in which mobile reflects the realities, challenges and potential
services are offered is continuing to of a globally connected world. Emerging
develop. Mobile network operators must frameworks such as the APEC Cross-Border
have the freedom to manage and Privacy Rules and the EU’s Binding
prioritise traffic on their networks. Corporate Rules allow organisations to
Regulation which rigidly defines a transfer personal data generally under certain
particular service quality level is conditions. These frameworks contain
unnecessary and is likely to impact the accountability mechanisms and are based on
development of these services. internationally accepted data protection
 Competitive markets with differentiated principles.
commercial offers and information that
allows consumers to make an informed However, their successful adoption is
choice deliver the best outcomes. If undermined by the implementation by
regulatory authorities are concerned governments of ‘data localisation’ (also
about quality of service, they should known as ‘data sovereignty’) rules that
engage in dialogue with the industry to impose local storage requirements or use of
find solutions that strike the right balance local technology. Such localisation
on transparency of quality of service. requirements can be found in a variety of
Cross-Border Data Transfers sector- and subject-specific rules including for
financial service providers, the public sector
The global digital economy depends on or professional confidentiality reasons and
cross-border data transfers to deliver crucial are sometimes imposed by countries in the
social and economic benefits to individuals, belief that supervisory authorities can more
businesses and governments. easily scrutinise data that is stored locally.

49
It is envisaged that network slices may be different approaches to privacy while
utilised to offer services outside of the home promoting appropriate standards of data
jurisdiction, potentially in a similar manner to protection and to allow accountable
international roaming. Any transfer of data companies to build scalable and
across borders may need to consider consistent data privacy programmes.
regulatory requirements.
Requirements for companies to use local
Industry Position data storage or technology create
Cross-border transfers of data play an unnecessary duplication and cost for
important role in innovation, competition companies and there is little evidence that
and economic and social development. such policies produce tangible benefits for
Governments can facilitate cross-border local economies or improved privacy
data flows in a way that is consistent with protections for individuals.
consumer privacy and local laws by To the extent that governments need to
supporting industry best practices and scrutinise data for official purposes,
frameworks for the movement of data and mobile network operators would
by working to make these frameworks encourage them to achieve this through
interoperable. Governments can also existing lawful means and appropriate
ensure that these frameworks have strong intergovernmental mechanisms that do
accountability mechanisms, and that the not restrict the flow of data.
authorities can play a role in
Illegal Content
overseeing/monitoring their
implementation. Governments should only Today, mobile networks not only offer
impose measures that restrict cross- traditional voice and messaging services, but
border data flows if they are absolutely also provide access to virtually all forms of
necessary to achieve a legitimate public digital content via the internet. In this respect,
policy objective. The application of these mobile network operators offer the same
measures should be proportionate and service as any other internet service provider
not arbitrary or discriminatory against (ISP). This means mobile networks are
foreign suppliers or services. mobile inevitably used, by some, to access illegal
network operators welcome frameworks content, ranging from pirated material that
such as the APEC Cross-Border Privacy infringes intellectual property rights (IPR) to
Rules or the EU’s Binding Corporate racist content or child sexual abuse material
Rules, which allow accountable (child pornography).
organisations to transfer data globally, Laws regarding illegal content vary
provided they meet certain criteria. Such considerably. Some content, such as child
mechanisms are based on commonly sexual abuse material, is considered illegal
recognised data privacy principles and around the world, while other content, such
require organisations to adopt a
as dialogue that calls for political reform, is
comprehensive approach towards data illegal in some countries while being
privacy. This encourages more effective protected by ‘freedom of speech’ rights in
protection for individuals than formalistic others.
administrative requirements while helping
to realise potential social and economic Communications service providers, including
benefits. Such frameworks should be mobile network operators and ISPs, are not
made interoperable across countries and usually liable for illegal content on their
regions to the greatest extent possible in networks and services, provided they are not
order to seek convergence between aware of its presence and follow certain rules
50
e.g., ‘notice and take-down’ processes to abuse content. The GSMA’s Mobile
remove or disable access to the illegal Alliance Against Child Sexual Abuse
content as soon as they are notified of its Content provides leadership in this area
existence by the appropriate legal authority. and works proactively to combat the
misuse of mobile networks and services
Mobile network operators are typically alerted
by criminals seeking to access or share
to illegal content by national hotline
child sexual abuse content.
organisations or law-enforcement agencies.
When content is reported, operators follow Regarding copyright infringement and
procedures according to the relevant data piracy, the mobile industry recognises the
protection, privacy and disclosure legislation. importance of proper compensation for
In the case of child sexual abuse content, rights holders and prevention of
mobile network operators use terms and unauthorised distribution.
conditions, notice and take-down processes
Summary
and reporting mechanisms to keep their
services free of this content. At this stage there do not seem to be new
regulatory challenges as a result of Network
The issues in relation to illegal content,
Slicing. However, the challenge(s) may be
liability, regulatory and self-regulatory
on how best to meet existing regulatory
obligations and commitments will need to be
obligations as result of Network Slicing.
addressed with the introduction of Network
Slicing. These may also vary depending on Implementation of Network Slicing may also
how slices are implemented. need to consider a range of other regulatory
issues from, but not limited to - access to
Industry Position emergency calls, support of law enforcement
The mobile industry is committed to and government access to data and the
working with law enforcement agencies related legislative frameworks that enables
and appropriate authorities, and to having this, to consumer protection and competition
robust processes in place that enable the policy.
swift removal or disabling of confirmed
instances of illegal content hosted on their
services. ISPs, including mobile network
operators, are not qualified to decide what
is and is not illegal content, the scope of
which is wide and varies between
countries. As such, they should not be
expected to monitor and judge third-party
material, whether it is hosted on, or
accessed through, their own network.
National governments decide what
constitutes illegal content in their country;
they should be open and transparent
about which content is illegal before
handing enforcement responsibility to
hotlines, law-enforcement agencies and
industry.
The mobile industry condemns the misuse
of its services for sharing child sexual
51
7
Next Steps

52
Next steps
To date within GSMA we have looked at the Radio to serve new and existing customers.
Network Slicing topic as a new capability that We will also use 5G NR to deliver against
will be delivered with the new 5G core MNO requirements like Fixed Wireless
network. We still have considerable work to Access substitution. Operators are beginning
do, including; definition of slice types and the to differentiate between Consumer focused
parameter sets that may exist within different networks and Business or Vertical focused
slices, validate 3GPP defined Slices, networks.
coordinate industry Slicing activities, explore
While 5G core and the real slicing capability
Business Models, market sizes, market
allow for significantly more efficient
opportunities and value chains, etc. This will
deployment of sliced capability, orchestration
form basis for the deliverables in the next
and configuration mechanisms, operators are
phase. We welcome input from Operators,
willing to explore opportunities for service
Vendors and customers into this technical
differentiation and optimisation offered by
paper.
pre-5G solutions.
Also, many operators are not waiting for 5G
Consequently, another deliverable in the next
Core (3GPP Release16) to explore the
phase will be a paper focusing on the
concept of delivering differentiated
emerging (or bottom up) trend of using
capabilities to different customer sets.
Multiple Dedicated Core Networks (MDCN) to
Operators have different physical and
deliver differentiated services and solutions
increasingly virtual networks and network
utilising existing EPS system capabilities. We
capabilities today, including; 2G, 3G, 4G, NB-
anticipate this paper to be available at the
IoT, Emergency Services LTE, etc.
end of Q318. We welcome input from
Virtualisation of network elements facilitates
Operators, Vendors and customers.
the automation of network orchestration,
configuration and deployment. Current Finally, it is important to continue the
capabilities like Edge Cloud allow us to start interactions with the vertical industries in
to explore lower latency opportunities, and in order to better understand their use cases
the near future we will begin to add 5G New and requirements.

53
Annex A Document Management
A.1 Document History
Version Date Brief Description of Change Approval Editor /
Authority Company

1.0 New Future Network Programme Future Network Future Network


document Programme Programme
Network Slicing Network
Taskforce Slicing
Taskforce

A.2 Other Information


Type Description

Document Owner GSMA Future Networks Programme


Editor / Company Michele Zarri / GSMA
Kelvin Qin/ GSMA
Reviewed & Approved by Future Network Programme Network Slicing Taskforce

It is our intention to provide a quality product for your use. If you find any errors or omissions,
please contact us with your comments. You may notify us at 5GNetworks@gsma.com

Your comments or suggestions & questions are always welcome.

54

S-ar putea să vă placă și