Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions
read more
Citations
6G Wireless Networks: Vision, Requirements, Architecture, and Key Technologies
Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts
Blockchain for Internet of Things: A Survey
6G and Beyond: The Future of Wireless Communications Systems
5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges
References
MapReduce: simplified data processing on large clusters
MapReduce: simplified data processing on large clusters
OpenFlow: enabling innovation in campus networks
Xen and the art of virtualization
The Google file system
Related Papers (5)
Frequently Asked Questions (19)
Q2. What is the role of NFV in the development of mobile core networks?
the need for more flexibility and elasticity has led to the consideration of SDN and NFV as the key enablers for more dynamic EPC networks, paving the way to a network of capabilities.
Q3. What is the catalyst for enabling such a scalable multi-service mobile backhaul?
The catalyst for enabling such scalable multi-service mobile backhaul is Multi-Protocol Label Switching (MPLS) that supported the progressive adoption of different transport layer technologies unifying 2G Time Division Multiplexing (TDM) and High-level Data Link Control (HDLC) transport, 3G Asynchronous Transfer Mode (ATM) and Frame Relay as well as 4G Ethernet and IP [148] [149].
Q4. What was the first use of virtualization in the 70s?
Virtualization was widely adopted for data centers in the 70s and by the early 80s, it was applied into networking, for connecting remote sites securely with controlled performance through the Internet.
Q5. What is the definition of UE slicing?
UE slicing considers the smart devices as a commodity hardware platform having a pre-installed middleware (similar to a hypervisor on general-purpose servers or PCs), which can accommodate, manage and schedule resources between multiple mobile OS entities.
Q6. What are the main advantages of leased resources?
Such leased resources can help against complex and lengthy processes for site acquisition in urban areas as well as to enhance network coverage with low risk in remote areas.
Q7. What are the main challenges of network slicing?
Although network slicing is currently undergoing a standardization phase, there are still numerous open research problems and implementation challenges to be addressed.
Q8. What is the advantage of a service-oriented NG core architecture?
The service-oriented NG core architecture could be easily deployed in a software-based/virtualized environment (e.g. VM or container), wherein libraries of functions may be requested from a VNF catalog and composed into end-toend service chains on demand.
Q9. What is the definition of a network slice orchestration architecture?
The network slice orchestration architecture consists of:• End-to-end service management and orchestrator: receives network slice requests from verticals and third parties, and creates a slice by performing slice brokering, admission control, policy provisioning and service mapping, considering the desired SLA, customization and slice template.
Q10. What is the main advantage of the functional split?
This flexible functional split can highly impact the performance of network slicing and the optimal split largely depends on the characteristics of the target service.
Q11. What is the concept of core network slicing?
the notion of core network slicing is centered around the possibility to deploy multiple instances of virtual EPC (vEPC) running in parallel in order for each to fulfill different service demands, e.g. a delay-sensitive service may require a distributed vEPC closer to the end user.
Q12. What is the role of a RAN centralization in the mobile backhaul?
Initial efforts to address such requirements considered: (i) small cell enhancements for the mobile backhaul focusing on scalable connectivity and various coordination types with the macro, i.e. tight or loose [151], and (ii) RAN centralization using the Common Public Radio Interface (CPRI) interface [152], which allows an ideal optical fiber fronthaul.
Q13. What is the role of the MOP in the network sharing management paradigm?
This network sharing management paradigm introduces the Master Operator (MOP) as a single actor, which is responsible for the shared infrastructure deployment, including the spectrum and related operations.
Q14. What is the way to ensure isolation and performance guarantees between the different logical networks?
Network slicing can assure isolation and performance guarantees between the different logical networks that employ a different fronthaul/backhaul flavor according to the corresponding base station functional split.
Q15. Why does a slice tenant have the highest level of control and privileges?
This is because the SLA allows the slice consumer to operate and manage his/her own virtualization platform and other related management support systems, and hence can deploy any form of network functions as needed to deliver the desired set of network services.
Q16. What is the advantage of connecting distributed RRH physical layers to a common MAC?
This option leverages the benefits of connecting distributed RRH physical layers to a common MAC, which allows coordinated scheduling and dynamic point selection, i.e. Coordinated Multi-Point (CoMP).
Q17. How much of the cost of investment could be saved by network slicing?
Such savings on the investment cost could even rise to as high as more than half of the total cost of investment, when adopting active resource brokering in the form of network slicing.
Q18. Why is the network slice resource allocation problem so complex?
This is due to the fact that network slices, especially those which are not deployed for a known number of users, often face the challenge of insufficient resources as the number of users increases, thereby resulting into poor network performance.
Q19. What is the advantage of virtualizing the RLC layer and other layers above it?
The RLC layer and other layers above it are virtualized at the BBU allowing multiple MAC entities to be associated with a common RLC entity.