Professional Documents
Culture Documents
net/publication/341437156
CITATION READS
1 132
5 authors, including:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Soft Failure Localization in Optical Networks Using Machine Learning View project
All content following this page was uploaded by Christian Esteve Rothenberg on 19 May 2021.
Introduction
5G networks (H2020 2018) are conceived as extremely flexible and highly programmable
end-to-end connect-and-compute infrastructures that are both application- and
service-aware, as well as being time-, location-, and context-aware. These 5G networks
represent: (i) an evolution, over 4G networks, in terms of capacity, performance, and
spectrum access in radio network segments and (ii) an evolution of native flexibility and
programmability conversion in all radio and non-radio 5G network segments: Radio
Access Network, Fronthaul and Backhaul Networks, Access Networks, Aggregation
Networks, Core Networks, Mobile Edge Networks and Clouds, Software Networks,
Cloud Networks, Satellite Networks and Edge IoT Networks.
5G networks represent a shift in networking paradigms: namely a transition from
today’s “network of entities” toward a “network of functions.” Indeed, this “network
of functions,” and its most likely manifestation, a “network of virtual functions,” will
in some cases result in the decomposition of current monolithic network entities
into network functions. These functions will constitute the unit of networking for
next-generation systems and should be able to be composed in an “on-demand,”
“on-the-fly” basis. One of the current research challenges consists of devising the
architecture and design of solutions that identify the set of elementary functions or
blocks from which to compose network functions, which are today implemented as
monolithic elements.
In addition, 5G networks rely on a set of new concepts and techniques. Among them,
the following aspects can be highlighted: (i) Realizing network slicing in a cost-efficient
way, (ii) Addressing both end-user and operational services, (iii) Supporting softwariza-
tion natively, (iv) Integrating communication and computation, and (v) Integrating het-
erogeneous technologies (including fixed and wireless technologies).
5G networks are expected to present a number of advantages. One in particular is
a high degree of flexibility. They enforce the necessary degree of flexibility, where and
when needed, with regards to capability, capacity, security, elasticity, and adaptability.
Wiley 5G Ref. Edited by Rahim Tafazolli, Chin-Liang Wang and Periklis Chatzimisios.
Copyright © 2020 John Wiley & Sons Ltd.
DOI: 10.1002/9781119471509.w5GRef095
2 Slicing 5G Networks: An Architectural Survey
These networks will serve highly diverse types of communication – for example between
humans, machines, devices and sensors – with different performance attributes.
Network technologies are making rapid progress in supporting new 5G com-
munications (e.g. URLLC – Ultra Reliable and Low Latency Communication,
mMTC – massive Machine Type Communication, eMBB – enhanced Mobile Broad-
band, and UDN – Ultra Dense Networking) and IoT trends. Emerging vertical industry
applications, such as autonomous/cooperative driving, drone surveillance, remote
sensing, and data analytic, are causing the conventional cloud computing model to
evolve toward edge computing, by utilizing these advanced communications so that
obtaining ultra-low latency, high broadband, and customized data transport service.
In light of this observation, the native integration of advanced networking and cloud
computing domains is one of the research and engineering goals of 5G networks and
beyond. One of the critical driving issues for such integration and interworking is the
simple fact that is extremely inefficient and expensive to build a separate computing and
networking infrastructure for each and/or new service. Further advantages of 5G emerge
in the areas of management, control of systems and resources. 5G networks enable
uniform management and control operations that are becoming part of the design of
dynamic software architectures. They can thereby host and execute services in one or
more distinct network slices (NS).
This article is a survey of the main developments in 5G network slicing. The article is
organized as follows: section titled “Introduction” provides a 5G network overview and
the main characteristics of network slicing; section titled “Network Slicing: A Primer”
introduces the network slicing concepts, including key characteristics, key roles and
slicing viewpoint. Section titled “Surveying the Network Slicing Landscape” presents
the survey of the network slicing landscape, that includes the early definitions of
slicing and Standards Developing Organizations (SDOs’) definitions of slicing (ITU-T
(ITU-T Y.3011 2011), NGNM (NGMN Alliance 2016), IETF (Galis et al. 2017a), 3GPP
(3GPP TR23.799 2016), ETSI (ETSI 2018a), ONF (ONF Recommendation TR-526,
2017)), and key examples of network slicing architectures as developed in EU research
projects. Section titled “Slicing Enablements and Mechanisms” presents advanced
slicing concepts that include slicing operational modes, slice lifecycle, slice control
loops, and end-to-end slicing. Section titled “Outstanding Challenges in Network
Slicing” identifies and presents the remaining key challenges in full realization of
slicing in 5G Networks and beyond; section titled “Concluding Remarks” wraps up
remarks of the slicing in the context of networks and beyond; finally, sections titled
“Acknowledgement, Acronyms, and References” conclude the article.
Slices are expected to considerably transform the networking perspective and enhance
network architectures by: (i) Abstracting away the lower level elements, in various ways;
(ii) Isolating connectivity at a subnetwork level; (iii) Separating logical network behav-
iors from the underlying physical network resources; (iv) Allowing dynamic manage-
ment of network resources by managing resource-relevant slice configuration; (v) Sim-
plifying and reducing the expenditure of operations; (vi) Supporting for rapid service
provisioning; and (vii) Supporting for Network Services deployment.
Although there is no commonly accepted comprehensive definition of Slice yet, the
network slice key concepts discussed below can be utilized as a reference to discuss
and analyze the different slicing models, approaches, and techniques that will be dis-
cussed in the rest of the article. Now there is an overview of the key concepts in slicing,
the key characteristics of slicing, the roles organizations can take, and the viewpoint it
gives them.
The key concepts utilized in the 5G architecture and system design cover the network
slice and the infrastructure slice:
Network Slice: A set of infrastructures (network, cloud, data center (DC)), com-
ponents/network functions, infrastructure resources (i.e. connectivity, compute, and
storage manageable resources) and service functions that have attributes specifically
designed to meet the needs of an industry vertical or a service. As such, a network slice
is a managed group of subsets of resources, network functions/network virtual func-
tions at the data, control, management/orchestration, and service planes at any given
time. The behavior of the network slice is realized via network slice instances (NSIs)
(i.e. activated slices, dynamically and nondisruptively reprovisioned). The network slice
key concepts are the following: (i) A network slice supports at least one type of service;
(ii) A network slice may consist of cross-domain components from separate domains in
the same or different administrations, or components applicable to the infrastructure;
(iii) A resource-only partition is one of the components of a network slice; however on
its own does not fully represent a network slice; (iv) A collection of cloud slice parts
from separate domains is combined, connected through NS, and finally aggregated to
form an end-to-end network slice; and (v) Underlays/overlays supporting all services
equally (with “best effort” support) are not fully representing a network slice.
Infrastructure Slicing: A management mechanism that a resource provider can use
to allocate dedicated infrastructure resources and service functions to users. Broadly,
partition strategies can be classified into three categories: (i) Physical separation, such
as dedicated backbones or dedicated DCs. However, this strategy is not cost-efficient;
(ii) Underlays/overlays supporting all services equally (“best effort” support), such as
underlays/overlays, in the form of virtual private network (VPN) as overlay solution.
These solutions are neither flexible nor agile and (iii) Slicing, through network resources
allocation, where dedicated resources per customer/service ensure both isolation and
customization on top of the same infrastructure.
The key characteristics of network slicing include:
slices: (i) Internal slices, understood as the partitions used for internal services of the
provider, retaining full control and management of them and (ii) External slices, being
those partitions hosting customer services, appearing to the customer as dedicated
networks/clouds/DCs.
From the management plane point of view, NS refer to the managed fully functional
dynamically created partitions of physical and/or virtual network resources, network
physical/virtual and service functions that can act as an independent instance of a con-
nectivity network and/or as a network cloud. Infrastructure resources include connec-
tivity, compute, and storage resources.
From the date plane point of view, NS refer to dynamically created partitions of net-
work forwarding devices with guarantees for isolation, customization, and security.
Cloud Slicing
Different models are being developed for federated cloud computing. One such model,
the Reservoir model (Rochwerger et al. 2009), provides a clear separation between the
functional roles of service providers and infrastructure providers. RESERVOIR (Rochw-
erger et al. 2009) is one of the first cloud papers with the highest number of architectural
citation out of approximately 25 000 published cloud papers as stated in the review paper
(Heilig and Voss 2014). Service providers are entities that understand the needs of a par-
ticular business and offer service applications to address those needs. Service providers
do not own the computational resources needed by these service applications; instead,
they lease resources from infrastructure providers who provide them with a seemingly
infinite pool of computational, network and storage resources.
Infrastructure providers operate cloud sites that own and manage the physical infras-
tructure on which service applications execute. The federation of collaborating sites
Slicing 5G Networks: An Architectural Survey 7
ITU-T Slicing
According to ITU-T Y.3011 (2011), slicing allows LINP with a slice being considered as
a unit of programmable resources, such as network, computation, and storage. LINPs
are isolated from each other, and when combined with programmability in virtual
resources, users of LINPs can program the virtual resources on above the virtual-
ization layer (Key References: ITU-T Y.3011 2011; ITU-T IMT-2020 2019a; ITU-T
IMT2010/SG13 2019; ITU-T 2017a; ITU-T 2017b; ITU-T 2017c; ITU-T IMT-2020
2019b). In other words, each LINP can provide the corresponding users with services
similar to those provided by traditional networks without network virtualization.
The users of LINPs are not limited to the users of services or applications but can
include service providers. For example, a service provider can lease an LINP and can
provide emerging services or technologies such as cloud computing service. The service
providers can realize the emerging services as if they own a dedicated physical network.
To facilitate the deployment of network virtualization, it is necessary to provide control
and management procedures, such as creating, monitoring, and measuring the status
of LINPs.
8 Slicing 5G Networks: An Architectural Survey
Various services
LINP3 manager
LINP2 manager
LINP3
LINP1 manager
Virtual
networks LINP1 LINP2
Virtual resources
Virtual
manager
resources
Physical NW 1 Physical NW 3
Physical NW 4 manager
Physical NW 3 manager
Physical NW 2 manager
Physical NW 1 manager
Physical resources
Physical NW 2 Physical NW 4
(router, switch,
hosts, etc.)
NGMN Slicing
According to NGMN slicing model (NGNM: White Paper on 5G 2016; NGMN Alliance
2016), it consists of three layers (i) the Service Instance Layer, (ii) the NSI Layer, and (iii)
the Resource layer. They do the following:
1) The Service Instance Layer represents the services (end-user service or business ser-
vices), which are to be supported. Each service is represented by a Service Instance.
Typically, services can be provided by the network operator or by third parties.
2) An NSI provides the network characteristics, which are required by a Service
Instance. An NSI may also be shared across multiple Service Instances provided by
the network operator.
3) The NSI may be composed by none, one or more Sub-network Instances, which may
be shared by another NSI.
The NSI may be composed by none, one or more Sub-network Instances, which
may be shared by another NSI. Similarly, the Sub-network Blueprint is used to
Slicing 5G Networks: An Architectural Survey 9
Service
instance 5
Service
instance Service Service Service
Service
layer instance 1 instance 3 instance 4
instance 2
Network
slice instance
layer Sub-network instance Sub-network instance
Sub-network
instance
Sub-network Sub-network (nonvirtualized)
Sub-network instance
instance instance
Resource
layer Resources/network infrastructure/network functions
Figure 3 Network slicing conceptual outline. Source: NGMN Alliance (2016). Reproduced with
permission of NGMN.
create a Sub-network Instance to form a set of Network Functions, which run on the
physical/logical resources (Figure 3).
IETF Slicing
According to the IETF network slicing architecture (Galis et al. 2017b) (Key References
including work in progress: Galis et al. 2017b, 2017c, 2018c; Geng et al. 2018a, 2018b;
Homma et al. 2019; Makhijani et al. 2017; Qiang et al. 2018, 2019; de Foy et al. 2018),
the following terms are defined:
Resource Slice: A grouping of physical or virtual (network, compute, storage) resources.
It inherits the characteristics of the resources, which are also bound to the capability
of the resource. A resource slice could be one of the components of network slice,
however on its own does not represent a network slice fully.
Network Slice: A network slice is a managed group of subsets of resources, network
functions/network virtual functions at the data, control, management/orchestration
planes and services at a given time. Network slice is programmable and has the ability
to expose its capabilities. The behavior of the network slice is realized via NSI(s).
End-to-End Network Slice: A cross-domain network slice, which may consist of
access network (fixed or cellular), transport network, (mobile) core network, etc.
End-to-end network slice can be customized according to the requirements of
network slice tenants.
NSI: An activated network slice. It is created based on a network template. A set of
managed runtime network functions, and resources to run these network functions,
forming a complete instantiated logical network to meet specific network character-
istics required by the service instance(s). It provides the network characteristics that
10 Slicing 5G Networks: An Architectural Survey
are required by a service instance. An NSI may also be shared across multiple service
instances provided by the network operator (Figure 4).
3GPP Slicing
According to 3GPP TR 28.801 (3GPP TR23.799 2016), the network slice concept
includes the following aspects: (i) Completeness of an NSI: An NSI is complete in the
sense that it includes all functionalities and resources necessary to support a certain set
of communication services thus serving a certain business purpose; (ii) Components of
an NSI: The NSI contains NFs. If the NFs are interconnected, the 3GPP management
system contains the information relevant to the connections between these NFs such
as topology of connections, and individual link requirements (e.g. Quality of Service
(QoS) attributes). For the part of the TN (Transport Network) supporting connectivity
between the NFs, the 3GPP management system provides link requirements (e.g.
topology, QoS attributes) to the management system that handles the part of the TN
supporting connectivity between the NFs; (iii) Resources used by the NSI: the NSI is
realized via the required physical and logical resources; (iv) Network Slice Template
(NST): The network slice is described by an NST. The NSI is created using the NST
and instance-specific information; (v) NSI policies and configurations: Instance-specific
policies and configurations are required when creating an NSI network characteristics
examples are ultra-low latency, ultra-reliability, etc. NSI contains a Core Network
part and an Access Network part; (vi) Isolation of NSIs: an NSI may be fully or partly,
logically and/or physically, isolated from another NSI.
The network slice stakeholders involved in 3GPP network slice management (Key
References published and work in progress on slicing includes: 3GPP TR23.799 2016;
3GPP SA2 2016, 2017a,b; 3GPP SA3 2017; 3GPP SA5 2018a) are depicted in the follow-
ing Figure 5.
There is also a collaboration between IETF and 3GPP, where it has been suggested that
the best approach is to ensure that the 3GPP engineers are involved in the IETF work
they are interested in, and that 3GPP states clearly what their requirements (rather than
solutions) are IETF also noted that the work in 3GPP is ongoing.
ETSI Slicing
ETSI’s E2E Network Slicing (ETSI 2018b) identifies a next-gen network slicing (NGNS)
framework defined here as a generalized architecture that would allow different network
service providers to coordinate and concurrently operate different services as active
NS, including slicing design principle (service-oriented approach, slice abstraction, slice
reusability, slice autonomy), an information model, network slice function specification,
and slice enablement.
The network slicing (NS) methods are aimed at providing custom design of networks
suitable for a specific use case (vertical market). Such methods need to be able to trans-
late a service requirement into normalized description of resources across different type
of network domains based on NGMN’s description of network slicing. The three-layer
approach is explained in Figure 6.
According to ETSI NGP there are three key areas of consideration for the NS archi-
tecture (ETSI 2018b, ETSI-2017a, ETSI 2018b). (i) Service description (corresponds to
Slicing 5G Networks: An Architectural Survey 11
Service component
Resource component
NE2 NE4
NS–subnet 2 NS–subnet 4
Network slice
instance 1
Network slice
instance N
Figure 5 3GPP network slice stakeholders. Source: ITU-T IMT2010/SG13 (2019). Reproduced with
permission of 3GPP.
Resource layer
ONF Slicing
The ONF Slicing (ONF Recommendation TR-526 2017) adopts the NGMN terminology
of network slicing.
Slicing 5G Networks: An Architectural Survey 13
Applying slicing to the Software Defined Networking (SDN) architecture, the client
context provides the complete abstract set of resources (as Resource Group) and sup-
porting control logic that constitutes a slice, including the complete collection of related
client service attributes. As such, a 5G slice is comparable to, if not the same as, an
SDN client context, isolated by the controller’s virtualization and client policy functions
and continuously optimized by the orchestration and global policy functions. Going a
step further, a 5G controller is an SDN controller or vice versa. Both 5G and SDN con-
troller manage–control combinations of all relevant network resources/functions/assets
required to serve client-specific purposes. The client context also offers to the client
functions to manage–control the slice resources, including administration and mainte-
nance (OAM) related-functions, as visible by/available to the client according to admin-
istrative policy (Key Reference: ONF Recommendation TR-526 2017).
Recursion in the SDN architecture allows for a high-level client context to be
virtualized and orchestrated over a number of lower-level resource groups, spanning
geographic, business, and technology boundaries as needed. Each lower-level resource
group may itself be exposed by the client context of a lower-level SDN controller. The
SDN architecture thereby naturally supports a recursive composition of slices.
The SDN controller, at the center of a feedback loop and acting autonomously accord-
ing to administratively configured policies, enables dynamic allocation, modification,
and optimization of resource usage. The resources provided to the controller’s clients are
virtualized (abstracted views and services) from the underlying resources and presented
to slices through resource groups. Figure 7 shows a mapping of the SDN architecture,
terminology, and abstractions to 5G slicing.
5GEX EU Project
5GEx project (http://www.5gex.eu) focused on the transition from dedicated physical
networks with dedicated control and dedicated services and resources for different
applications to a “network factory,” where resources and network functions are traded
and provisioned.
The Inter-Provider NFV orchestrator (NFVO) represented in Figure 8 implements
service decomposition by mapping network service components on its current resource
view. The resource view consists of the Inter-Provider topology, potentially augmented
with detailed provider internal topologies and resource locations and capabilities. At
first, the Inter-Provider NFVO selects providers that may need to be involved in deliv-
ering the network service. This decision is policy based considering the Inter-Provider
topology and service catalogues advertised by other service providers on interface
I2-RTadvertise (resource topology) and I2-Cadvertise (service catalogues).
If needed, the multiprovider NFVO may collect further details on charging, offered
capabilities, network services, resources, and topology from selected providers and
may establish/update bilateral (or direct) business relationship to some of them as
decided/necessary. Then, the network service components are mapped on the inter-
provider, or optionally on more detailed topology, based on the information collected
bilaterally from involved providers. Then, the multiprovider NFVO sends the network
service/resource requests to other providers using the I2-S/I2-RC interfaces.
In 5GEx, a slicer management function (Figure 8) is designed with the view to enrich
the resource orchestrator functionality with multitenancy resource slicing and generic
14 Slicing 5G Networks: An Architectural Survey
SDN
controller Resource Resource Server
Administrative
group group
client context
Client context Client context
Resource
orchestration and
Orchestration
virtualization
Virtualization
Support Virtual
Client resources resources
support Resource group
Client context
Customer
MD-PCE
MD-PCE
Element
Policy Resource VNF manager
database repository catalogue
l2-RTbilateral Topology
Service Topology
distribution
specific distribution
l2-RTadvertised
l3-S l3-Mon l3-RT l3-C
Topology
MD-WM
Resource Topology VNF distribution
For provider
internal monitoring abstraction catalogue
orchestration MD-PCE
Vnfm-Vi’ l3-RC Remote
hierarchy
Neighbor (or neighbor)
administrative administrative
l3-RC
NFVO VIM WIM PCE domain domain
(Or-Vi’)
life cycle virtual network function (VNF) management functionality. Additionally, the
slicer function coordinates and integrates multivendor/third party-specific life cycle
VNF management functions.
5G-SONATA EU Project
5G SONATA project (http://sonata-nfv.eu) focused on flexible programmability of
software networks and the optimization of their deployments. This was achieved via
a customizable Service Platform (SP) with a Network Functions Virtualization (NFV)
Orchestrator that supports Network Service Software Development Kit (SDK) for
developers and specialized DevOps workflows. One major component of the SONATA
architecture (see Figure 9) is the SDK, which provides service developers with both a
programming model and a set of software tools. The SDK allows developers to define
complex services consisting of multiple VNFs. A service provider (which can also be
the service developer) can then deploy and manage the created services on one or more
SONATA SPs through the corresponding Gatekeeper components.
A second major component of the system is the SONATA SP. Due to the modular
design of its management and orchestration (MANO) framework, the SP offers
customization opportunities by replacing components of the loosely coupled MANO
framework (MANO plugins).
As far as SONATA is concerned, a slice is an aggregated set of resources that can be
used in the context of an end-to-end networked service composed of VNFs. Slices are
composed of multiple resources, which are isolated from other slices and allow LINP,
with a slice being considered as the basic unit of programmability using network, com-
putation, and storage.
5G-NORMA EU Project
The 5G-NORMA project (http://www.it.uc3m.es/wnl/5gnorma) focused on: (i) Adap-
tive (de)composition and allocation of NFs Joint; (ii) Optimization of RAN and Core
Network, and (iii) SW-defined Mobile Control. This involved the design for service
management; mapping of customer-facing services and procedures to resource-facing
services and procedures; network slicing (service and resource); orchestration; interslice
and intraslice and network programmability as depicted in Figure 10. The same picture
provides a high-level functional perspective of the 5G NORMA system architecture and
shows the separation into four layers as well as the differentiation into intraslice and
interslice functions.
The Service Layer comprises Business Support Systems and business-level Policy
and Decision functions as well as applications and services operated by the tenant.
The MANO Layer realizes 5G NORMA’s Software-defined Mobile Network Orches-
tration (SDMO) concept by extending the ETSI network functions virtualization
management and orchestration (NFV MANO) architecture toward multitenant and
multiservice networks. The Control Layer accommodates the two main controllers:
(i) the Software-Defined Mobile Network Coordinator (SDM-X) for the control
of common (shared) NFs and (ii) Software-Defined Mobile Network Controller
(SDM-C) for dedicated NFs. SDM-X and SDM-C abstract from the technological and
Development Orchestration
SONATA SDK SONATA service platform
MANO framework
Editors
NFVO (Network service management) VNFM (VHF management)
Monitoring
Packaging tool
FSM1
FSMn
FSM1
FSMn
SSM1
SSMn
SSM1
SSMn
Default
Default
Default
Default
Debugging & testing
FSM/SSM
tools
Monitoring data analysis Message broker Message broker Message broker Message broker
(...)
Platform catalogues
tools
(executive) (executive) (executive) (executive)
Service
Conflict resolution
Conflict resolution
Catalogue access VNF lifecycle
Information mgmt.
Slice management
Service lifecycle Service lifecycle VNF lifecycle
Repositories
Private catalogues
Plugin management Message broker
Infrastr.
Gatekeeper
Public catalogues
Services users
Service
Applications & services
layer
Service management
Management &
orchestration
SDM-O
layer
Domain-specific application
management
(e.g., 3GPP network management) VNF
VIM
manager
SDM-X SDM-C
5G-TRANSFORMER EU Project
The 5G-TRANSFORMER project (http://5g-transformer.eu) explores how the network
can better serve the needs of vertical industries by offering the abstraction, flexibility,
and dynamic management capabilities they require via network slicing as the key archi-
tectural concept. The term network slice aligns network functionality to business needs,
since it allows customers to request not just functions, but also business objectives (e.g.
QoS, security, etc.) as a sort of intent. The scope of a slice may be a single customer fac-
ing service or a group of such services. In terms of deployment, NS can be implemented
by means of ETSI NFV network services.
The design of the 5G-TRANSFORMER architecture is presented in Figure 11. It
is conceived to support multiple combinations of stakeholders by introducing open
API among components. Through these APIs, the system hides unnecessary details
from the verticals, allowing them to focus on the definition of the services and the
required SLAs. 5G-TRANSFORMER envisions a system of three major components:
18 Slicing 5G Networks: An Architectural Survey
Vs-So Vs-So
5GT Single-/multi- Single-/multi- 5GT Single-/multi- Single-/multi-
-SO domain domain -SO domain domain
So-So
NFVO-NSO NFVO-RO NFVO-NSO NFVO-RO
Federation
VNFM(s) VNFM(s)
So-Mtp So-Mtp
5GT NFVO-RO SLPOC 5GT NFVO-RO SLPOC
-MTP (resource advertisement, resource -MTP (resource advertisement, resource
abstraction, resource orchestration) abstraction, resource orchestration)
vertical slicer (5GT-VS), service orchestrator (5GT-SO), and mobile transport and
computing platform (5GT-MTP). The 5GT-VS is the entry point for the vertical
requesting a service and it handles the association of these services with slices as well as
network slice management. The 5GT-SO is responsible for end-to-end orchestration of
services across multiple domains and for aggregating local and federated (i.e. from peer
domains) resources and services and exposing them to the 5GT-VS in a unified way.
Finally, the 5GT-MTP provides and manages the virtual and physical IT and network
resources on which service components are eventually deployed. It also decides on the
abstraction level offered to the 5GT-SO.
5G-TRANSFORMER project (http://5g-transformer.eu) focuses on (i) Vertical Slicer
as the logical entry point for verticals to support the creation of their respective trans-
port slices; (ii) Service Orchestrator to orchestrate the federation of transport network-
ing and computing resources from multiple domains and manage their allocation to
slices, and (iii) Mobile Transport and Computing Platform or integrated fronthaul and
backhaul networks as depicted in Figure 11.
5G-Pagoda EU Project
The 5G-Pagoda project (https://5g-pagoda.aalto.fi) proposal is based on: (i) scalable
5G slicing architecture; (ii) extending the current NFV architecture toward support
of different specialized NS composed of multivendor virtualized network function
scalable 5G slicing architecture, and (iii) extending the current NFV architecture
toward supporting different specialized NS composed of multivendor virtualized
network functions.
The generalized 5G-Pagoda (https://5g-pagoda.aalto.fi) architecture for single-domain
slicing is illustrated in Figure 12. The Infrastructure consists of resources that are
Slicing 5G Networks: An Architectural Survey 19
Orchestrator
operator
Intra-domain Slice #n
operator
slicing
(single operator)
Dedicated
slice #n
5G-MoNArch EU Project
In 5G-MoNArch project (https://5g-ppp.eu/5g-monarch), the concept of slice is
analyzed in the context of elasticity, i.e. it refers to the ability to serve multiple slices
over the same physical resources while optimizing the allocation of computational
resources to each slice based on its requirements and demands. The algorithms/policies
for slice aware elasticity reside at the E2E service M&O Layer and more precisely at the
Cross-Slice M&O entity, which triggers the abovementioned resource optimization via
the 3GPP Network Management or the NFV MANO entities.
20 Slicing 5G Networks: An Architectural Survey
Figure 13 Slice aware elasticity support in different phases of the life cycle of network slice instances.
NECOS EU Project
NECOS project (http://www.h2020-necos.eu) is grounded around a specific slicing
model that has as its foundation a mechanism to partition the underlying infrastructure
into constituent slice parts and then combine these slice parts into a full end-to-end
slice.
NECOS is particularly focused on a set of layered abstractions using slicing elements,
ensuring that they all fit together for the purpose of service provisioning. The combi-
nation of the right abstractions, the right layering, and a separation of concerns in the
architectural design allows NECOS to create a powerful and flexible slice-as-a-service
mechanism. In particular, the slice-as-a-service approach provides an adaptable con-
trol plane, having features for creating, growing, shrinking, and closing slices, as well
as adapting slices at the runtime, while considering service requirements and current
cloud resource conditions.
The architecture contains three main high-level subsystems. These are: (i) the NECOS
(Lightweight Software Defined Cloud (LSDC)) Slice Provider (colored in blue); (ii) the
Resource Marketplace (colored in yellow); and (iii) the Resource Providers (colored in
green). These subsystems are provided to support the tenants of NECOS who wish to
use slice-as-a-service. The NECOS (LSDC) slice provider is the subsystem that allows
for the creation of full end-to-end slices from a set of constituent slice parts. In NECOS,
a slice looks the same as the full set of federated resources, with the main attribute being
that the domains look a lot smaller, as they have been sliced. The Resource Marketplace
in NECOS is the way that the NECOS (LSDC) Slice Provider is able to find the slice parts
to build up a slice. Rather than having a predetermined set of providers that have been
configured in a federation, it has been selected a more flexible model of a marketplace
Slicing 5G Networks: An Architectural Survey 21
Slicing orchestrator
Infr. & Mon Abstraction
Domain orchestrator
Domain orchestrator
Domain orchestrator
Resource & VM mgmt Resource & VM monitoring
Slice agent
Slice agent
Slice agent
WAN Slice
controller
DC Slice
controller
controller
DC Slice
Adapters
Slice
Edge DC Net Central DC
Resource domains
from which slice parts can be provisioned. The Resource Providers are those organiza-
tions that can provide the resources required for the slice parts – namely, DC resources
in the form of servers and storage, and network resources.
The tenant of NECOS is expected to be an organization that requires slices for running
their own services. Figure 14 presents these main elements, how they are grouped, and
the way they interact with the tenants (colored in red) who use NECOS.
Initiative EU project
RESERV Transfor
ITU-T NGMN IETF 3GPP ETSI ONF 5GEX SONATA NORMA PAGODA Slicened MoArch NECOS
OIR mer
slicing slicing slicing slicing slicing slicing slicing slicing slicing slicing slicing slicing slicing
cloud slicing
Slicing
characteristics
Connectivity
resource only
slicing
Connectivity
service slicing
Network cloud
slicing
E2E slicing
Multi-domnin
slicing
Uniform
lifecycle
Management
Tenant slice
Management
Slices as a
service
VIM on
demand
WIM on
demand
Resources
Marketplace for
slices
Network
elasticity
Network cloud
elasticity
Infrastructure
monitoring
and attached to an end-to-end slice by a provider initiating the slice creation workflow.
This will overcome the need for peer-to-peer interactions among different providers
after the end-to-end network slice has been put in place.
NECOS seems to be the only initiative that goes beyond the state of the art by consid-
ering a number of unique features, namely the VIM on-demand and WIM on-demand
slicing models, and the Marketplace approach, which have not been considered by other
slicing approaches. These will help deliver a more flexible concept of slicing which goes
beyond the peer-to-peer orchestration and management interactions on which most of
the above initiatives are based.
Monitoring
Application services
Vertical S
Service Mode 3: service-based
i
NFs L7 Apps S [Service slice aaS]
Network service orchestration
Control and management plane Slicing Mode 2: MANO-based
Monitoring
(R) Orchestration [NFV aaS]
Slicing Slicing Mode 1: VIM-dependent
NIM VIM [Platform slice aaS]
Infrastructure Slicing
Mode 0: VIM-independent
Monitoring
[Infra slice aaS]
Network Compute [Bara-metal slice]
resources resources
changes. So, do we change all the software to deal with slices or do lower layer abstrac-
tions suffice to present a slice that all software just runs on?
Slicing at lower layers means that upper layers, such as VIMs and Orchestrators, do
not need to know about slicing. If a slice is presented to them, they can carry on working
with no change or minimal change. If slicing is done otherwise, then all the main soft-
ware elements need to be updated and adjusted to know about slices, i.e. all the APIs, the
modules, and internal function paths need to be adjusted and adapted to factor in slices.
Hence, there are inherent trade-offs when selecting one or the other slicing operational
mode. Ultimately, the actual decision on which slicing approach will depend on multiple
criteria on key aspects of the use-case scenario under consideration, dominated by the
technical footprint of the provider, and the technical abilities and technological choices
of the tenants and interest in opting for more or less control and responsibilities includ-
ing customized software components. In the following, we discuss the key aspects of
each slicing approach before we conclude the best fits to the goals and scope of 5G.
These points show how candidate approaches (slicing modes) and the architecture
meet, discussing the main characteristics, the software (SW) dependencies, and impact
of slice-ready APIs:
Mode 0 – VIM-Independent Slicing: The VIM on-demand model with DC slicing that
allows direct interdomain orchestrator to VIM interaction using a specific allocated
VIM. Multitenancy happens at the lower resource layers. Being a VIM-independent
approach, tenants can choose and have direct control of the VIMs, which can be as
lightweight as desired. However, the freedom of choice and level of control come along
potentially heavyweight operational responsibilities that the tenant must take by him-
self. Slicing support at resource providers can be considered lightweight since they do
not need to run large slicing-capable VIM instances:
Mode 1 – VIM-Dependent Slicing: The slicing in the VIM model, in contrast, is based
on multitenancy at the VIM level and allows direct interdomain orchestrator to
VIM interaction using a specific allocated shim object. The tenant (service/resource)
orchestrator may require changes to use the slice-ready APIs of the providers’
Slicing 5G Networks: An Architectural Survey 25
VIM, which may also require profound software changes and customization to
support slicing. This VIM-dependent approach requires arguably heavyweight
VIMs – becoming a lock-in choice of the provider – but frees the tenant from the
VIM responsibility.
Mode 2 – MANO-Based Slicing: The slicing in the orchestrator model, which uses the
interdomain orchestrator API interaction, a peer-to-peer approach, where a slice is a
set of data structures in the orchestrator. From the tenant’s perspective, depending on
the actual split between a service orchestrator and a resource orchestrator, different
software changes and standardized interfaces may be required. Eventually, the ten-
ant (business support system) BSS/OSS (operations support system) interfaces to the
slice-ready APIs of the provider orchestrator may also need some adaptation.
Mode 3 – Service-Based Slicing: Slicing at the application layer will not provide the
relevant slice as a service. This mode of slicing is constrained by the nature of a
service-specific vertical solution, requiring per-service tenant-provider APIs plus
eventual slicing support in the underlying layers, including multidomain interactions.
Slice Orchestration
A Slice Resource Orchestrator (SRO) is the component responsible for combining dif-
ferent slice parts (i.e. different resource segments) into a single aggregated slice. It is also
responsible for orchestrating the service elements across the slice parts that make up the
full end-to-end slice, and as such it is the component that handles the actual placement
and embedding of virtual machines (VMs) into the resource domains.
The SRO gathers data on the overall view of the slice in terms of allocated computing
resources and network topologies, and stores this in the Slice Database, which is the
component holding such knowledge. The SRO will be the component interacting with
the DC/Wide-area network (WAN) Slice Controllers (returned by the Slice Builder) to
complete the creation of the end-to-end slice. This will be performed by interconnecting
each VIM/WIM instance to its closest domain network edge points and taking care of
setting up the interdomain network connectivity between the different slice parts.
The SRO will take care of performing the slice life cycle management, i.e. continuously
checking whether the allocated slice is capable of fulfilling the requirements that were
initially requested by the tenant. With this goal in mind, the SRO must have access to a
set of monitoring measurements (coming from each slice part) that provide information
about respective slice resource utilization patterns (e.g. the number of available cores,
memory, network delay/loss, etc.). This information sets will be at the granularity of the
slice and will not directly be linked to any of the service instances running on that slice.
The monitoring information is expected to be propagated to the SRO via the underlying
monitoring abstraction implemented by a Slice Monitoring Abstraction layer. Multiple
elasticity scenarios as discussed later in the section titled “Scaling and Elasticity.”
The SRO may (will) also perform the allocation of the resource elements that are
required for the instantiation of the service instances (possibly described by Forward-
ing Graphs) on the global resource view available in each end-to-end slice. This will be
performed by embedding service elements (e.g. a Container, a VM, a VNF, or a virtual
link), on the slice resource view. The orchestrated instantiation of the different service
virtual elements will happen via the northbound interface of an Infrastructure and Man-
agement Abstraction layer. The latter will take care of adapting the above instantiation
26 Slicing 5G Networks: An Architectural Survey
requests to the specific underlying VIM/WIM technology. The SRO will have to request
to that abstraction layer the allocation of different adapters required to interact with the
different Infrastructure Managers running in the slice parts. This will happen via an API
that will provide the entry point to a VIM/WIM the adapter should interact with.
Resource marketplace
Pre-provision
3 - Run-time
Slice controller Slice agent
Upgrade, reconfiguration, scaling 1 - Preparation 1 - Preparation
Infrastructure environment
preparation Design Pre-provision
4 - Decommissioning
2 - Instantiation, configuration and activation
De-activation Termination
Instantiation /
3 - Run-time
configuration Activation
Reporting
3 - Run-time
IMA Upgrade, reconfiguration, scaling
3 - Run-time
4 - Decommissioning
Supervision Reporting
Deactivation Termination
Preparation Phase
This phase starts with the specification of slice templates, followed by the discovery and
preprovisioning of resources, then the preparation of the allocated infrastructure for the
instantiation and support of the slice, and the exchanging of agreement between tenants
and providers. It is divided into three subphases:
• Design: The Slice Builder uses the slice blueprints/descriptors to design a new slice
instance. Here, the different slice parts are described as well as their features, config-
urations, resources needed, and associated workflows.
• Preprovision: The Slice Builder together with the Slice Broker and the Slice Agents
makes an on-demand request of resources via the Slice Request and Marketplace
Interfaces using admission control, resource negotiation, and charging. Net-
work resource availability, latency, and resiliency, as well as polices, are taken in
consideration before doing the allocation.
• Infrastructure Environment Preparation: The Slice Builder uses the Slice Instantiation
Interface to prepare all the infrastructure resources needed for the instantiation and
support of the new slice to be created, via contacting the relevant DC or WAN Slice
Controllers, with the offer from the related Slice agent.
• Activation: The SRO finalizes the activation of the slice performing the steps required
to complete its topology; any pending service deployment is processed; service
instances are activated and becomes ready to start their operation.
Runtime Phase
In this phase, the slice instance is normally operating and has a feedback loop provided
to the SRO via the IMA that is used to monitor the slice performance as well as the
overall infrastructure needs.
• Supervision and Reporting: The performance and status of the slices are monitored
and reported to the SRO through the IMA component. According to the require-
ments of each slice and also to the overall status of the system, the SRO can take
the decision of performing reconfiguration and/or scaling on (some of ) the running
slices.
• Upgrade, Reconfiguration, Scaling: If required, a slice instance is reconfigured and/or
scaled according to its specific requirements and to the overall status of the system.
This process allows performing resource optimization via slicing elasticity.
• Horizontal Scaling: This scaling is appropriate when new slice parts are needed
or when an existing slice part can be shutdown. To add a new slice part, the slice
builder/slice broker mechanism needs to be triggered to find the relevant part. When
doing a shutdown of an existing part, the SRO can use the Slice Runtime Interface to
tell the relevant DC Slice Controller to close the slice part.
• Vertical Scaling: This scaling is appropriate for resources in existing slice parts. It
involves adding/removing resources from a slice part (e.g. computing, memory, or
storage) or network part. The slicing orchestrator might add/remove physical devices
or resources from a slice part to better support its current demand. This is achieved
by the SRO using the Slice Runtime Interface to make a request to the relevant DC
Slice Controller.
• Migration: For a slice, migration needs to be analyzed and defined.
Decommissioning Phase
After a slice instance is no longer needed, the SRO proceeds to finish the life cycle of the
slice.
• Deactivation: The slice instance is deactivated, stopping all its operations and services.
• Termination: The slice instance is terminated and all the allocated resources are
released and reclaimed.
Slicing layer
Physical layer
30 Slicing 5G Networks: An Architectural Survey
Physical layer
In the SaaS-like model, a network slice provider (NSP) designs NSTs in advance, and
a tenant selects and uses one which fulfills most its requirement among the tem-
plates. The specifications of NS are abstracted to Key Performance Indicators (KPIs)
as networks and servers and shown to tenants. In short, detailed parameters of infras-
tructure network are hidden from tenants.
In the PaaS-like model, a tenant makes its request, including connected area, path
routes, the KPIs, and included service functions, and an NSP designs a template and
instantiate a network slice based on the request dynamically. The configurable values
would vary depending on the policy of each NSP.
In the IaaS-like model, a tenant designs its own NSTs and instantiates NSs by indicating
concrete resources to infrastructure operators. In other words, infrastructure opera-
tors provide just their resources, and NSs are coordinated by the tenant.
The management of the elasticity and assurance control loops needs to address a
hybrid model in which the slice orchestrator is responsible for monitoring and con-
trolling platform-related variables, and the tenant is responsible for monitoring and
controlling the top services variables and to request the needed scaling actions.
It is straightforward to observe that the two loops are inherently related, and events
happening on the external one are likely to affect the behavior of the components of
the internal one. For example, when the measured service-related KPIs received by the
components of the tenant’s domain indicate a possible violation of the expected QoS or
SLA for a given service instance, the Service Orchestrator might interact to the SRO via
the Service Orchestrator Adaptor to request a change of topology (service elasticity) for
that service via the IMA (e.g. adding an additional service component).
This request can result in the execution of two different workflows, according to the
status of the resources of the end-to-end slice on which that service is running.
1) A new service element can be added to one of the existing slice parts: the SRO embeds
the service element in the right slice part and interacts with the specific VIM via the
resource adaptation.
2) A new service element cannot be instantiated in any of the available slice parts due
to the lack of resources. In this case, the SRO will trigger the proper slice elasticity
workflow, namely either increasing the resources of an existing slice part or adding
additional slice parts to the end-to-end slice.
Slicing 5G Networks: An Architectural Survey 31
End-to-End Slicing
A slice provides an addressable and manageable end-to-end abstraction and a unit of
orchestration and service deployment with different attributes and requirements. Such
that: (i) end-to-end slices can encapsulate core, edge, IoT, slice parts and (ii) we can use
slices for control, for precise attributes, for isolation, for end-to-end operation, for per
service separation, etc. For example, a Telco Cloud slice will be different to a Content
Distribution Network (CDN) slice or a voice over IP (VoIP) slice.
The creation of an end-to-end slice is one of the most important operations in frame-
works dedicated to NS. The creation of an end-to-end slice involves all the slice MANO
subsystems. Network slicing is getting attention due to the possibility of diverse offer-
ings in terms of services and requirements, standing as one of the main concepts of the
upcoming 5G networks, in which several business models are expected to provide NS
as a service for on-demand vertical clients.
To aid in flexibility of creating the parts for end-to-end slices, we consider that differ-
ent Marketplaces can be available and accessed, based on the use cases of the various
participants. The Marketplaces access resource providers who are those organizations
that can provide the resources required for the slice parts – namely, DC resources in
the form of servers, storage, and network resources. Further resources can be provided
by organizations that have Mobile Edge, Sensor Networks, Wireless, etc. Each resource
provider will be capable of providing slice parts, which will be part of a full end-to-end
slice. The Resource Provider also needs to provision the relevant manager for each slice
part, meaning a VIM for a DC slice part, or a WIM for a network slice part. Examples
of Marketplaces include:
The Telecoms Marketplace, which is a limited setup between close cooperating telecoms
providers, i.e. allowing the creation of slices across each other’s infrastructure.
The Contract Marketplace, which is a setup between partners with a level of trust based
on signed contracts, i.e. allowing their resources to be used by others for slices.
The Open Marketplace, which allows any provider to offer resources and register their
offerings for users.
Frameworks such as the one described in ETSI (2018a) dedicated to NS allow
infrastructure providers to create and operate slice subnets to create/activate an
end-to-end network slice. In ETSI (2018a), three entities interact for the use of a
network slice: the tenant, the NSP, and the Network Slice Agent (NSA). The former uses
the network slice; the NSP provides network slice as a service to tenants, while the NSA
is a component in the infrastructure provider’s domain that maps NSP’s information
and operations within its domain. In ETSI (2018a), NS are defined in terms of two
types of resources: links that relate to traffic or path-related constraints, and nodes
that represent either compute or store resources. End-to-end NS are then created and
setup by a set of managed objects responsible for resource discovery, slice provisioning
based on NS service profiles, and NS instantiation from NS service profiles. Operations
related to the network slice are grouped into two types: NS service operations that
create, remove, modify, and augment an end-to-end network slice, and NS subnet
operations that take place in the context of resources (e.g. monitoring).
Tenants are the users of the slice. The slice provider subsystem maps to the NSP entity
and it is responsible for slice provisioning based on the tenant’s service description.
32 Slicing 5G Networks: An Architectural Survey
The slice controllers (DC and WAN) execute similar functions performed by the
NSA, understanding the slice provider requests and translating them into concrete
actions (e.g. resource allocation, VIM instantiation, etc.) inside the domain, so that
an end-to-end slice can be created, removed, modified, and augmented accordingly.
The resource discovery function is performed by the Marketplace subsystem, the
only subsystem that does not have a direct mapping to the entities described in ETSI
reference framework.
According to the Homma et al. (2019), the provision models for network slicing are
similar to the basic ones adopted in the cloud computing market. More specifically,
they are categorized into the three basic *-as-a-Service (*aaS) provision models:
Software-aaS, Platform-aaS, and Infrastructure-aaS. Certainly, it affords hybrid models
for the provisioning of resources and shares the same abstraction levels established in
the cloud computing market, as explained below:
In a SaaS-like provision model, an NSP designs models in advance. The tenant is respon-
sible for selecting and using the one that fits mostly its requirements. The network
slice specifications are abstracted in the form of KPIs and detailed parameters of the
infrastructure are not exposed to the tenants.
In a PaaS-like provision model, the tenant exposes its request and the NSP creates
a model to be instantiated dynamically based on this request. The tenant’s request
may include technical parameters, such as connected area, paths, KPIs, and service
functions.
In an IaaS-like provision model, the tenant is responsible for designing his own mod-
els and instantiating the NS. The infrastructure operators only provide the resources
indicated by the tenant, who is also responsible for coordinating these resources.
As mentioned before, a hybrid scenario can be provided as, for example, by a bro-
ker coordinating a PaaS type model in a SaaS-like manner. This way, the broker acts
recursively and becomes an NSP as well.
For the Decommissioning End-to-End Slice, the slice owner contacts the list of all slice
controllers obtained informing them appropriately to release the indicated resources.
Slicing KPIs
SDOs and community fora like ETSI NFV Industry Specifications Group, 3GPP, and
others have been concerned with the definition of KPIs for slicing. In particular, for 5G
network slicing the 3GPP has issued the Specification 28 554 (3GPP 2019). This docu-
ment defines several KPIs that are classified into three categories, namely accessibility,
integrity, and utilization KPIs.
Accessibility KPIs: Give a figure of how well the resources provided through slices are
accessible. Specific KPIs are how many customers are registered to a given slice as
well as the ratio between the number of successful registries and the total number of
registration requests.
Integrity KPIs: Integrity is related to the capability of the network slice to deliver informa-
tion end to end. The specific KPIs consist of the end-to-end delay and the throughputs
that can be achieved in a slice instance between particular reference points of 5G
networks.
Slicing 5G Networks: An Architectural Survey 33
Utilization KPIs: These KPIs represent how much used are the resources of a slice.
Specifically, these KPIs are the mean number of sessions that are successfully estab-
lished per slice and the usage of the virtualized resources, i.e. virtual processor, virtual
memory, and virtual disk, in the slice.
Slice Marketplace
A resource marketplace is defined as an actual or nominal place where forces of demand
and supply operate, and where buyers and sellers interact (directly or through intermedi-
aries) to trade slice components or parts, which are computational and communication
resources belonging to one or many resource providers, which will be the constituting
elements of an end-to-end slice (Market Places 2019). The ultimate forces of demand
in that case are the slice providers who act on behalf of the slice tenants to find the
concatenation of slice parts that satisfy determined constraints. On the other hand, the
supply forces can be configured in different ways. First, it can be limited to a set of close
cooperating telecom providers, i.e. allowing the creation of slices across each other’s
infrastructure. Second, it can be constituted by a set of partners with a level of trust
34 Slicing 5G Networks: An Architectural Survey
based on signed contracts, i.e. allowing their resources to be used by others for slices.
Finally, it can be a completely open market where any supplier can participate.
The marketplace is an approach to materialize the same goals as a federation of
resource providers, i.e. allowing for the participation of different suppliers in the pro-
visioning of a service. The reason to opt for a marketplace instead of a static federation
of resource providers is twofold: First, to build end-to-end slices, a mechanism is
needed to reach and interact with providers in multiple geographic places – including
mobile edge and sensor networks – which are often not covered with existing feder-
ation approaches. Second, slice creation is generally more dynamic than federation
agreements, so a highly dynamic runtime mechanism for finding providers is needed.
Observe that there are online marketplaces for flights and for hotel rooms that provide
a good operational model to follow. In these cases, there is a broker which can go to
multiple agents, dynamically, and get a collection of offers for the required resource.
The end-user can then make a choice as to which offer is best suited. The agents can be
a division of the resource provider, or they may be an external aggregator that provides
compound offers. From the perspective of the broker and the end-user, the agent just
provides offers at a price point with certain conditions. Such an approach fits with the
creation of end-to-end slices very well.
In general, markets include mechanisms or means for (i) determining price of the
traded item, (ii) communicating the price information, (iii) facilitating deals and trans-
actions, and (iv) effecting distribution (Market Places 2019). The market for a particular
item is made up of existing and potential customers who need it and have the ability and
willingness to pay for it. Each resource provider may have the freedom to use its own
pricing functions that establish the prices of resources as a function of the resource class
and time. Therefore, when a resource provider participating in the marketplace receives
a request for a slice part, it will be able to answer if it is willing to participate and what
will be the cost of using its resources. The interaction of a resource provider with the
marketplace is done through a specialized agent that receives request and sends replies
to the market broker.
The resource discovery mechanism is meant to locate the appropriate resources that
compose a slice and constitutes the core of the marketplace. The central component of
these mechanisms is the market broker, which receives request from the slice provider
and contacts resource provider agents to check their availability. The broker is a dis-
tributed component. A given slice provider may contact several brokers and each broker
may have registered several resource providers. The interaction of the slice provider
and the broker is through a messaging system. This messaging system defines the gen-
eral slice requirements and acts as the input to the resource discovery mechanism. This
message is created by the slice provider to fulfill the tenant’s requests. The content of
the message will be generally based on a template. The parameters specified in the tem-
plate can specify the different components or parts of the slice with constraints like
geographical location, hosts, storage capacity, connections bandwidth, and others. The
slice broker is responsible to locate resources and prepare a corresponding response,
namely a slice resource alternative message. In practice, the message containing the slice
resource alternatives consists of annotations of the request message with alternative slice
component options.
Slicing 5G Networks: An Architectural Survey 35
Full Networks Isolation: Highly efficient slice creation with guarantees for isolation in
each of the Data/Control/Management/Service planes. Having enablers for safe, secure,
and efficient multitenancy in slices. Methods to enable diverse requirements for NS,
including guarantees for the end-to-end QoS of a service within a slice.
Slicing Service Mapping: Creating an efficient service mapping model binding across
network cloud slicing, specifying policies and methods to realize diverse service require-
ments without re-engineering the infrastructure.
Slicing Resource Mapping: Creating an efficient resource to slice mapping model bind-
ing across network cloud slicing.
Recursion: Namely methods for slicing segmentation allowing a slicing hierarchy with
parent–child relationships.
Customized Security Mechanisms Per Slice: In any shared infrastructure, security is
a key element to guarantee proper operation, and especially a fair share of resources
to each user including resource isolation and allocation policy at different levels and
isolation of network service management for multiple tenants.
NS Reliability: Maintaining the reliability of a network cloud slice instance, which is
being terminated, or after resource changes.
Optimization: Namely methods for automatic selection of network resources for slic-
ing; global resource views; global energy views; network cloud slice deployment based
on global resource and energy efficiency.
Capability Exposure: For network cloud slicing (allowing openness); with APIs for
slice specification and interaction; guarantees for KPIs and/or SLAs characteristics.
Programmability and Monitoring Control of network cloud slices.
Per-tenant Policy Management: In a multitenant, multislice end-to-end hosting and
networking scenario, closed-loop automation requires both per-tenant policies, as
well as the network operator’s own. Per-tenant policies would be set to limit compute,
storage, and network resource usage, block the execution of unauthorized operations,
trigger actions including scaling, healing, and topology reconfiguration to meet the
SLA with a tenant.
Efficient and Lightweight Slice Life Cycle Management: Including creation, activa-
tion/deactivation, protection, elasticity, extensibility, safety, and sizing of the slicing
model per network and per network cloud for slices in access, core, and transport
networks; for slices in DCs; and for slices in edge clouds.
Dedicated Network: Each slice must behave as a dedicated network while sharing
underlying resources, physical and virtual. Monitoring the status and behavior of net-
work cloud slice in a single and/or multidomain environment, and maintenance mech-
anisms have to be defined to show and abstract the proper information for each slice
customer.
Full Scalability: To partition network resources in a scalable manner, it is required to
clearly define to what extent slice customers can be accommodated or not on a given
slice. The application of different SLAs on the offered capabilities of management, con-
trol, and customization of slices will directly impact the scalability issue.
Slice Dimensioning: Overdimensioning has been the normal way in the past for avoid-
ing any kind of congestion. With slicing, the traffic sources and destinations become
much less predictable, if at all. Appropriate planning, dimensioning, and enforcement
are needed to make sustainable the transition to this new form of service.
Slicing 5G Networks: An Architectural Survey 37
Concluding Remarks
A 5G network is a set of infrastructures (network, cloud, DC), components/network
functions, infrastructure resources (i.e. managed connectivity, compute, storage
resources), and service functions that have attributes specifically designed to meet the
needs of an industry vertical or a service. As such, a network slice is a managed group of
subsets of resources, network functions/network virtual functions at the data, control,
management/orchestration, and service planes at any given time. The behavior of the
network slice is realized via NSIs (i.e. activated slices, dynamically and nondisruptively
reprovisioned).
The 5G architecture is designed to provide slices as a service. Each of these slices is a
set of computational and networking resources created with the purpose that customer
users (tenants) can run one or several application services on top.
To ensure that the supported services can be deployed appropriately, these slices are
orchestrated to fulfill on-demand end-to-end quality requirements, independently each
one from the others, and spanning across a shared infrastructure of several administra-
tive domains.
The slicing can be performed either at the resource level or the virtual infrastruc-
ture management level of each of the administrative domains contributing to a slice.
The high-level 5G architecture can be described in terms of its constituting functions,
and from that point of view, four functional domains can be distinguished, namely the
tenant’s domain, the resource domain, the resource marketplace, and the slice provider.
5G networks will require a novel approach on how orchestrate, deploy, and manage
services and slices. Figure 21 presents an indicative list of key issues that are under
research in the context of the 5G slice networking.
Acknowledgment
This work was partially done by the H2020 4th EU-BR Collaborative Call, under the
grant agreement no. 777067 (NECOS – Novel Enablers for Cloud Slicing), funded by the
European Commission and the Brazilian Ministry of Science, Technology, Innovation,
and Communication (MCTIC) through RNP and CTIC. The authors thank all NECOS
project participants, whose contributions have been fundamental to the realization of
this work.
38 Slicing 5G Networks: An Architectural Survey
• Transition from network devices to network functions and virtual network functions
• Transition from network service to precision network services in scalable slices
• Dynamically adapting the network to meet future demands
• Creating the dynamic, configurable, programmable, resilient, safe and cost effective E2E network
• A programmable network operating system with simple interface to the network (smart network fabric)
E2N multi-domain orchestration
E2E coordination, conflict resolution, multi-domain information exchange
Service adapted
network slices
Enabled by
Dedicated ICT Network
network functions Service Slice
including NFV High-precision vertical
network service slice
EDGE EDGE
Smart cloud and
network fabric FIXED
CORE
RADIO EDGE
Enabled by aCCESS aCCESS METRO
EDGE
programmability EDGE EDGE
including SDN
Figure 21 5G networking.
List of Abbreviations
API Application Programming Interface
CDN Content Distribution Network
DC Data Center
eMBB enhanced Mobile BroadBand
IMA Infrastructure and Monitoring Abstraction
KPI Key Performance Indicator
LSDC Lightweight Software Defined Cloud
mMTC massive Machine Type Communication
NFV Network Functions Virtualization
OTT Over-The-Top
QoS Quality of Service
SDN Software Defined Networking
SDO Standards Developing Organization
SLA Service Level Agreement
SRO Slice Resource Orchestrator
URLLC Ultra Reliable and Low Latency Communication
VDU Visual Display Unit
VIM Virtual Infrastructure Manager
VM Virtual Machine
VNF Virtual Network Function
VNFM Virtual Network Function Manager
Slicing 5G Networks: An Architectural Survey 39
Related Articles
Network Slicing/Virtualization Security
Slicing Across Multiple Operator Domains
Core and Transport Network Slicing
References
3GPP (2019). 5G end to end Key Performance Indicators (KPI), Release 15, 3GPP TS
28.554, ver. 15.3.0.
3GPP SA2 (2016). Study on Architecture for Next Generation System/Network slice related
functionality (3GPP TR 23.799).
3GPP SA2 (2017a). System Architecture for the 5G System/Network slice related
functionality (3GPP TS 23.501).
3GPP SA2 (2017b). Procedures for the 5G System: procedures and flows of the
architectural elements/Network slice related procedures (3GPP TS 23.502).
3GPP SA3 (2017). Study on the security aspects of the next generation system/network
slice related security (3GPP TR 33.899).
3GPP SA5 (2017). Study on management and orchestration of network slicing for
next-generation network (3GPP TR 28.801).
3GPP SA5 (2018a). Provisioning of network slicing for 5G networks and services: detailed
specification of network slice provisioning/network slice management (3GPP TS 28.531).
3GPP SA5 (2018b). Management of network slicing in mobile networks – concepts, use
cases and requirements (3GPPTS 28.530).
3GPP TR23.799 (2016). Study “Network Slicing” (2016); SA5 TR 28.801 Study Item
“Network Slicing” (2017).
5G Slicing Association (2018). Position white paper: 5G network slicing for cross industry
digitization. http://www-file.huawei.com/-/media/CORPORATE/PDF/white%20paper/
5G-Network-Slicing-for-Cross-Industry-Digitization-Position-Paper.pdf?source=corp_
comm.
ETSI (2017a). Network Operator Perspectives on NFV priorities for 5G. https://portal.etsi
.org/NFV/NFV_White_Paper_5G.pdf.
ETSI (2017b). GS NGP 001: next generation protocol (NGP); Scenario Definitions. http://
www.etsi.org/technologies-clusters/technologies/next-generation-protocols
ETSI (2018a). E2E network slicing reference framework and information model. Kiran,
Makhijani-Huawei Technologies, Kevin Smith-Vodafone John Grant – Ninetiles Alex
Galis- UCL, Xavier Defoy-Interdigital - published in October 2018, https://www.etsi
.org/deliver/etsi_gr/NGP/001_099/011/01.01.01_60/gr_ngp011v010101p.pdf.
ETSI (2018b). E2E network slicing reference framework and information model. Kiran,
Makhijani-Huawei Technologies, Kevin Smith-Vodafone John Grant – Ninetiles Alex
Galis-UCL, Xavier Defoy-Interdigital published in October 2018 by ETSI as a standard
40 Slicing 5G Networks: An Architectural Survey
ITU-T IMT2010/SG13 (2019). Future networks, with focus on IMT-2020, cloud computing
and trusted network infrastructures. http://www.itu.int/en/ITU-T/focusgroups/imt-
2020/Pages/default.aspx (accessed on July 2019).
ITU-T IMT-2020 (2019a). Network slice life-cycle management level architecture. https://
www.itu.int/en/publications/Documents/tsb/2017-IMT2020-deliverables/mobile/index
.html#p=49 (accessed July 2019).
ITU-T IMT-2020 (2019b). Network management requirements (O-046). http://www.itu
.int/en/ITU-T/focusgroups/imt- 2020/Pages/default.aspx.
ITU-T Y.3011 (2011). Future networks: objectives and design goals. http://www.itu.int/rec/
T-REC-Y.3001-201105-I (accessed on July 2019).
Kuklinski, S. and Tomaszewski, L. (2019). Key performance indicators for 5G network
slicing. 2nd Workshop on Advances in Slicing for Softwarized Infrastructures, Paris,
France, 28th June 2019.
Makhijani, K., Qin, J., Ravindran, R. et al. (2017). IETF Draft NetSlices use cases
draft-netslices-usecases-01.
Market Places (2019). Business Dictionary, Market Definition. http://businessdictionary
.com/definition/market.html (accessed on July 2019).
NECOS (2018). D6.1: report on design of federated cloud environment. Released in
October 2018.
NGMN Alliance (2016). Description of network slicing concept. https://www.ngmn.org/
fileadmin/user_upload/160113_Network_Slicing_v1_0.pdf.
NGNM: White Paper on 5G (2016). https://www.ngmn.org/5g-white-paper/5g-white-
paper.html (accessed on July 2019).
ONF Recommendation TR-526 (2017). Applying SDN architecture to Network Slicing.
TR-526 Applying_SDN_Architecture_to_5G_Slicing_TR-526.pdf.
Qiang, L., Geng, L., Makhijani, K. et al. (2018). IETF Draft NetSlices management use
cases. draft-qiang-coms-use-cases-00.
Qiang, L., Galis, A., Geng, L. et al. (2019). IETF Draft NetSlices information model.
draft-qiang-coms-netslicing-information-model-02.
Report on Net Slicing Support with ETSI NFV Architecture Framework (2017). http://
www.etsi.org/deliver/etsi_gr/NFV-EVE/001_099/012/03.01.01_60/gr_NFV-
EVE012v030101p.pdf.
Rochwerger, B., Caceres, J., Montero, R. et al. (2009). The reservoir model and architecture
for open federated cloud computing. IBM Journal of Research and Development 53 (4):
http://www.haifa.ibm.com/dept/stt/sas_public.html.
Further Reading