Security Level: 5G E2E Slicing Technology Update · Backup/Recovery Security Forwarding Subscriber...
Transcript of Security Level: 5G E2E Slicing Technology Update · Backup/Recovery Security Forwarding Subscriber...
Security Level:
5G E2E Slicing
Technology Update
Jianjun WuDirector, Future Arch. Lab, Huawei
June 28th, 2018
Security Level:
Major Components of 5G Slicing
a) F-OFDM – Filtered OFDM – flexibly isolates the bands allowing different behaviors
b) Mixed Numerology – enable the different slicing features within RAN Slicing part
c) Slicing Breathe – Must be possible for slices to change size and to exchange physical resources
time
freq
uen
cy
((
((
EMBB
URLLC
MMTC
other
5G – air(s)5G - UE Orchestration Hierarchy
SDN (T)SDNSDN NFV NFV SDNNFV SDN
1
2
33 4 4
5
SDN3
5
MEC
MEC
Security Level:
Technology Components in RAN Slicing
f-OFDM
Programmable Air-Interface
Mix numerology
Dynamic-TDDSelf-Contained Frame
2
3 4
Low Latency
Sub-Frame
High Speed Mobility
Sub-Frame
Support unknown
services
m-MIMO, UDN, D2D
NR
F-O
FD
M
SC
MA
P-C
ode
F-D
uple
x
mm
Wave
UCNC
SoftAI
Hyper-Cell
Grant Free
New UE-ID
New UE State
F-Compatible
X-Numerology
SC-Frame
Flex-CTRL
1
2
3
4
1
f-OFDMForward
Compatibility
Security Level:
Throughput with RAN Slicing
*LTE:19.12MbpsAvg. 2018Q1 in China
5G: 0.5~1Gbps5G Trail in Hangzhou
LTE
m-MIMO, UDN, D2D
NRF-O
FD
M
SC
MA
P-C
ode
F-D
uple
x
mm
Wave
UCNC
SoftAI
Hyper-Cell
Grant Free
New UE-ID
New UE State
F-Compatible
X-Numerology
SC-Frame
Flex-CTRL
5G
*中国宽带联盟,宽带速率报告2018Q1
Security Level:
4G: 30-50ms
Flexible RTT with RAN Slicing
uRLLC HARQ
slot
non-slot
30KHz60KHz
60KHz 60KHz
uRLLC
eMBB
Short TTI
Self-Contain Frame
Multi-numerology 5G: 10-20ms
6-10ms NR ONLY
NR gNB
NGC
Security Level:
Flexible Service Delivery with CN Slicing
Charging
Mobility Mgmt.
Policy
Backup/RecoverySecurity
Forwarding
Packet SchedulerSubscriber DB
Device Mgmt. Session Mgmt.
Network Function Library
CN-Domain Slicing
Manager
Critical Connectivity
eMBB 8K 3D AR/MR
Massive Connectivity
UPCP
CP
CDN
UP
UP
CO Local DC Regional DC
CP (PSM)
CU
UPCP
IMS
100Gλ30Gλ
10Gλ
DU
DU CU
DU CU
CUDUVoice
SBA based Repository FunctionSlice
`
Non-3GPP
eNB
BTSNodeB
HSS/HLR
SGSN MMEOCS
PCRF
TDF
OFCS
AAA
PGW/GGSNSGW
ePDG
Security Level:
Slicing
management
template
OS
Stack
Access
policy
Multiplexing policy
CE
1
2
3
MPUDP
MPTCP 云端
123
123~231 CE
Bandwidth diversity
Preemptive Retreating
Congestion policy
CPU policy Task priority policyMemory policy
RF policyAllocation policy Dual cards policy
instances
PreemptiveMultiplexin
gDynamic diversity
Dual conn. Dedicated band
Lower 2nd card
Continuous memory
Big coresHigh
Priority
IP1:Port1+
IP2:Port2123
CP UP
Smart phone may support differentiated performance in different layers
Terminal: Network Slicing Awareness
Security Level:
BSS
Slice supporting system (SSS) Network Slice
Template Designer
Cross Domain Slice Manager(multi-vendor)
OSSE
MS
TN-DSM CN-DSMAN-DSM
1:N 1:N
Third-party “BSS”
Third-party “BSS”
Domain Slice supporting system (DSS)
Terminal AN(1..n) TN(1..n) CN(1..n)
Edge DC Core DC
APP
AP
Common Infrastructure Layer
Electricity
123456
Slice 2# Slice 3#Slice 1#
URLLC_PHY
URLLC_RRC
eMBB_E-UTRA MAC URLLC_MAC
eMBB_PDCP URLLC_PDCP
mMTC_RRCeMBB E-TURA RRC
eMBB_E-UTRA RLC URLCC_RLC
eMBB_E-UTRA PHY
mMTC_MAC
mMTC_PHY
Flexible Shared Radio Resource
mMTC_PDCP
mMTC_RLCmMTC_RLC
Unified NR Radio Resource Scheduler
eMBB_NR RLC
eMBB_NR MAC
eMBB_NR PHY
UE(Access Multi-Slices)
Signaling link
Slice Common New RAT RRCSlice Common E-UTRA RRC
E-UTRA Scheduler
eMBB NR RRC
Network SliceRAN part
Data link
• Flexible Air Interface, Scheduling optimization
•RAN functions flexible configuration
1. Access Network
•VPN/VPN+
• FlexE
•OTN
2. Transport Network
• Service-based Architecture
•Modularization
•Virtualization
3. Core Network•API towards 3rd party
•Cross domain mgmt.
•Autonomous mgmt.
4. Network Mgmt.
• OS
• Protocol stack
• Access
5. Terminal
Technology is not Bottleneck Anymore
Security Level:
• Generic Slice Template: From tenant requirements to network slice deployment
• Network slice instances are constructed based on tenants, and its execution is to enforce the SLA within specific network slice. Network slice is pre-constructed Network.
GST(Generic Slice Template)
Configure
eMBB URLLC mMTC
Mapping Mapping
Network Slice
Instance
Network
Slice
NST *(Network Slice Template)
3G
PP
Sco
pe
GSMA Scope
Operator
Tenant
Network Slicing Deployment
Three-layer Model to capture
Vertical’s demands
Security Level:
Company B
VR broadcasting Company B
VR broadcasting
[3,2]
[1, 2] Company B
5G
eMBB service
mMTC service
uRLLC service
VR Live
Live
Remote control
Telemedicine
Smart Grid
V2X
Company D:
remote control excavator
Company E: Hospital
telemedicine in ambulance
Company F: automotive
infotainment
NST NSIFundamental Service /
Sliced Network
Company C
SLA-guaranteed broadcasting
Company G: automotive
infotainment
SST=1
SST=2
SST=3
[1, 3]
Company A
VR broadcasting Company A
VR broadcasting
[3,1]
[1, 1] Company A
Company D:
remote control excavator
[1, 4]
[3, 3]
[1, 5]
Company E: Power Grid
metering and dispatch Company F: Power Grid
metering and dispatch
[1, 6][2, 1]
[1, 7][3, 5]
Company C
Company D
Company E
Company F
Company G
Tenant
GSTConfigure/Sign
[SST, SD]
Network Slicing Deployment
The essence of NSI is to support business application based on network capabilities
Security Level:
Slice Supporting System (SSS)
Network Slice Designer
Cross Domain Manager
Terminal AN(1..n) TN(1..n) CN(1..n)
Edge DC Core DC
APP
AP
Domain Slice supporting System(DSS)
Common Infrastructure Layer
AN-DSM TN-DSMAN-DSM TN-DSM
CN-DSMCN-DSM
Slice Supporting System (SSS)
Network Slice Designer
Cross Domain Manager
I1I1
I2
Tenants
BSS
I3
Bring business innovation, enable differentiated customer experience
OperatorTerminal of subscriberBE
Contract
Operator
Device/TerminalVertical Industry
SLAContract
Being operated
New Network Operation and ServicesHow to establish transparent, collaborative,
effective Slicing ecosystem is the key for
5G success.
Security Level:
Network Slicing Deployment - Operators
URLLC slice
eMBB slice
+ +
Antenna & RF Baseband Processing Protocol Stack
+ +
Transport Core
f
f Option 1
+ +
Antenna & RF Baseband Processing Protocol Stack
+ +
Transport Core
Option 2
f
f f
How to build sliced networks from operators point of view? - Sharing the same bandwidth or dedicated spectrum?
Security Level:
Tenant 1 slice
Tenant 2 slice
+ +
Antenna & RF Baseband Processing Protocol Stack
+ +
Transport Core Network
f
+ +
Antenna & RF Baseband Processing Protocol Stack
+ +
Transport Core Network
f
Network Slicing Deployment - TenantsHow to GET the slice from Tenants point of view? - How to get a real piece of sliced network, especially in RAN side ?
- The technical components can offer many possibilities, but does tenant really need this, also want to pay for it ?
Copyright©2017 Huawei Technologies Co., Ltd. All Rights Reserved.
The information in this document may contain predictive statements including, without
limitation, statements regarding the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that could cause actual
results and developments to differ materially from those expressed or implied in the
predictive statements. Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei may change the
information at any time without notice.
Thank You.
Thank you!
More collaboration for business innovation
are needed!