Professional Documents
Culture Documents
System
Sankaran Balasubramaniam
1 © Nokia 2016
Table of contents
2 © Nokia 2016
Network Slicing - Introduction
Formal Definitions
• Network Slice
• A logical network that provides specific network capabilities and network characteristics
• Network Slice instance
• A set of NF instances and the required resources (e.g. compute, storage and networking
resources) which form a deployed Network Slice.
• A NS instance spans across the 5GC, 5G-RAN and the UE
3 © Nokia 2016
E2E Network Slicing – Legacy vs 5GS
4 © Nokia 2016
Network Slice – What Could It Mean?
Resource
Signaling Architecture
Management
5 © Nokia 2016
RAN Slice – Resource Management Possibilities
• Multiple implementations
possible
• Typical considerations
• Service
characteristics
• Network deployment
• Commercial aspects
6 © Nokia 2016
RAN Slices – Example
7 © Nokia 2016
Table of contents
8 © Nokia 2016
Slicing in 5GS – Key Concepts
Slice Identity Management
Slice Awareness
Selection Functions
Resource Management
UE Slice Validation
9 © Nokia 2016
Slice Identity Management
S-NSSAI – Single Network Slice Selection Assistance Information Standardized SST Values
• Identifies a Network Slice across the 5GC, 5G-RAN and the UE
NSSAI is a SST SST Value
• Composed of
collection of eMBB 1
• Mandatory SST (Slice/Service Type) - 8 bits
S-NSSAIs
• Optional SD (Slice Differentiator) - differentiates slices with same SST - 24 bits
URLLC 2
• Standardized S-NSSAI has only SST and no SD
• Non-Standard S-NSSAI can be defined as either SST alone (Non-standard) or SST + SD MIoT 3
Types of NSSAIs
• Subscribed S-NSSAIs
• Stored in the UDM -> 5GC uses this as a default when the UE doesn’t send a Requested NSSAI
• Configured NSSAI
• The PLMN may configure a UE with 1 or more configured NSSAIs – UE uses this as its default NSSAI
• Could be the same as the Subscribed S-NSSAIs
• Allowed NSSAI
• The value assigned by the 5GC & valid in a Registration Area or the PLMN over a given access typeNSSAIs are managed
• Requested NSSAI at the Tracking area
• Can be either Configured or Allowed NSSAI or a combination thereof level in the 5G-RAN
• The UE sends this in both RRC and NAS signalling as part of registration and Registration
• RAN uses this for AMF selection and provisional handling before getting Allowed NSSAI Area level in the 5GC
• 5GC use this for slice selection, validation etc., and returns the Allowed NSSAI
• Rejected NSSAI
• Can be rejected in the Registration Area (or) for the entire PLMN
• UE shouldn’t attempt this NSSAI again in that RA or in the PLMN
• NSSAIs could be mapped – across PLMNs for example
10 © Nokia 2016
Key Concepts - Description
E2E Slice Awareness
- Differentiated Traffic Handling within the 5GS
- QoS Differentiation within a slice Traffic
- Different QoS profiles can be applied for non-GBR bearers within a slice Separation =
- DRB profile can be different for the same 5QI flow type in different slices f(5QI, NSSAI
& PLMN)
- Granularity of Slice Awareness is at the level of a PDU session
- Traffic Separation at Transport : L2VPN via VLANs or L3VPN via MPLS labels
Selection Functions
- RAN Slice Selection based on Requested/Allowed NSSAI
- AMF Selection based on Requested NSSAI & NSSF interaction -> can lead to
change in AMF
Resource Management
Cloud
- RRM policy enforcement across slices Architecture &
- Slice specific Radio Admission Control policies Slice specific
- Resource Isolation across slices dimensioning
- Failure in one slice not affecting the others
11 © Nokia 2016
Key Concepts – Description - Continued
UE Slice Validation
- Comparison of the UE’s Requested NSSAI vs Subscribed NSSAI done by the 5GC
- 5G-RAN plays the slave here, getting the validated slice information in the ICS/PDU Session Request
12 © Nokia 2016
Table of contents
13 © Nokia 2016
E2E Network Slicing in 5GS – High Level Architecture
3GPP Standardized
NG-RAN AMF
Nsmf Slice B
N2 Nnssf SMF
N4 DN-
NSS
UE N3
F UPF 2
N3
Nsmf Slice C
SMF
N3 N4
UPF
RAN slice instance(s):
Serving one or multiple slices PDU sessions are
(S-NSSAIs) slice specific
Transport Functions
14 © Nokia 2016 distinguish NW slices
Slice Allocation in 5GS
PLMN-1 PLMN-1
gNB-1 gNB-2
NSSAI-1, NSSAI-2, NSSAI-3 and NSSAI-4 gNB
TAI-1 : NSSAI-1 & NSSAI-
gNB
TAI-3 : NSSAI-1 & NSSAI-4
gNB-1, gNB-2, gNB-3 and gNB-4 2 TAI-4 : NSSAI-1 & NSSAI-2
TAI-2 : NSSAI-1 & NSSAI-
3
NG Setup gNB-3 gNB-4
gNB
gNB
TAI-5: NSSAI-1, NSSAI-2 TAI-6 : NSSAI-1
& NSSAI-4 TAI-7 : NSSAI-1 & NSSAI-4
UE
PLMN-1 Registration PLMN-1
gNB-1 gNB-2
RAI-1 : TAI-1 & TAI-2 gNB-1 gNB-2
UE-1 : NSSAI-1 (PDU-1) RAI-2 : TAI-3 & TAI-4
UE-2 : NSSAI-1 (PDU-2) & UE-3 : NSSAI-1(PDU-4) & RAI-1 : TAI-1 & TAI-2 RAI-2 : TAI-3 & TAI-4
NSSAI-3 (PDU-3) NSSAI-4 (PDU-5) UE-1 : NSSAI-1 UE-3 : NSSAI-1 & NSSAI-4
UE-2 : NSSAI-1 & NSSAI-3
PDU
gNB-3 gNB-4
RAI-3 : TAI-5 RAI-4 : TAI-6 & TAI-7
Sessions gNB-3 gNB-4
UE-4 : NSSAI-1 (PDU-6) & UE-5 : NSSAI-1 (PDU-8) &
NSSAI-2 (PDU-7) NSSAI-4 (PDU-9) RAI-3 : TAI-5 RAI-4 : TAI-6 & TAI-7
UE-6 : NSSAI-1 (PDU-10) UE-4 : NSSAI-1 & NSSAI-2 UE-5 : NSSAI-1 & NSSAI-4
UE-6 : NSSAI-1
15 © Nokia 2016
RAN Slice & AMF Selection
1) During NG Setup with AMF-1 & AMF-2
• gNB and AMFs exchange their
supported NSSAI lists
• gNB -> NSSAIs per TAC
(1)
• AMF -> NSSAIs in the PLMN
(2)
2) In the RRC Setup Complete message
• UE optionally provides the
Requested NSSAI along with the
PDU session to be established
• Provisional RAN slice selection &
AMF selection done based on
this
(3)
17 © Nokia 2016
Slice Aware PDU Session Handling
5) UE initiates PDU Session Establishment
• Includes the Allowed NSSAI
assigned during the registration
18 © Nokia 2016
Slice Aware Xn Based Mobility Handling
19 © Nokia 2016
Looking Forward – Rel 16
• Security Enhancements – Slice level Authentication & Authorization post the general procedure
• Handling cases where 5GS is not able to support all possible combination of S-NSSAIs for the UE
• Trust relationships between MNOs and slice tenants under various business role models
20 © Nokia 2016
Challenges in Network Slicing
• Complexity in the specification – multiple domains need to work together to implement E2E
slicing
• Service infrastructure
• Security considerations
• Commercial aspects
21 © Nokia 2016
References
22 © Nokia 2016